Chapter 13 failover and failback -1, Chapter 16 server settings -1, Chapter 17 security -1 – HP Storage Mirroring Software User Manual
Page 5

iii
Chapter 13 Failover and Failback ........................................13-1
Configuring failover ........................................................................ 13-1
Editing failover configuration ......................................................... 13-3
Removing failover configuration ..................................................... 13-4
Monitoring failover ......................................................................... 13-4
Testing failover ............................................................................... 13-5
Failover manual intervention .......................................................... 13-5
Initiating failback ........................................................................... 13-6
Chapter 14 Restoration .......................................................14-1
Chapter 15 Monitoring Tools ...............................................15-1
Linux System Log ........................................................................... 15-9
DTStat .......................................................................................... 15-19
Chapter 16 Server Settings .................................................16-1
General ........................................................................................... 16-2
Setup .............................................................................................. 16-4
Network .......................................................................................... 16-5
Queue ............................................................................................. 16-6
Source ............................................................................................ 16-8
Target ........................................................................................... 16-10
Database ...................................................................................... 16-11
Logging ......................................................................................... 16-12
E-mail notification ........................................................................ 16-13
Chapter 17 Security ............................................................17-1
Index........................................................................................ I