Hp Storage Mirroring V4.5 Software Uživatelský manuál Strana 23

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 163
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 22
3 - 1
Protecting an
Exchange Server
To configure protection for your Exchange servers, you will complete the following steps:
1. Install Exchange on the source server and apply any Exchange service packs or patches. Use the
default installation options for Exchange.
2. Install Exchange on the target, placing it in the same Exchange organization as the source and
verifying that the installation location for the target is the same as the source. Apply any
Exchange service packs or patches. Use the default installation options for Exchange with the
following considerations:
The target must be a unique installation (that is, two Exchange servers must be available for
a protection pair)
Logical drive mapping must be the same on the source and target, and must assigned prior
to running the Application Manager
3. Install Storage Mirroring on the source and target Exchange servers. See the Storage Mirroring
Getting Started guide for more information.
4. Install the Application Manager on page 2-1
5. Verify the Exchange environment (recommended) on page 3-1
6. Select a task on page 3-2
7. Select a domain on page 3-2
8. Select source and target servers on page 3-3
9. (Optional) Configure protection settings on page 3-4
10. Validate the Configuration on page 9-1
To protect your Exchange server, you will complete the following steps:
1. Enable protection on page 10-1
2. Monitor protection status on page 10-2
In the event of a failure, you will need to perform some additional tasks. These tasks are described
in Failover, Failback, and Restoration on page 11-1.
Verify the Exchange environment (recommended)
Before you use Application Manager, complete the following tasks to verify that the environment is
properly set up.
1. With both Exchange servers online, use Active Directory Users and Computers to move an
existing user from the source to the target and then back to the original source.
2. Verify that you can create a new user on the target.
3. To verify connectivity, create an Outlook
®
profile for the new user on a client machine and
connect to the target.
NOTE: If you need to protect any data that is stored on a non-mailbox server role (for example,
SMTP queue data), you will need to configure protection for that data separately. In
addition, you may need to manually update the DNS setting for the client access server
to point to the target site.
Zobrazit stránku 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 162 163

Komentáře k této Příručce

Žádné komentáře