
ii
Connection settings ......................................................................... 3-13
Route................................................................................................................. 3-13
Protected Storage Groups ..................................................................................... 3-13
Mirror type ......................................................................................................... 3-14
Enable compression ............................................................................................. 3-14
Advanced settings ........................................................................... 3-14
Replication set rules............................................................................................. 3-15
Failover/failback scripts ........................................................................................ 3-16
Force AD replication ............................................................................................. 3-17
Target(ed) domain controller................................................................................. 3-17
Advanced settings................................................................................................ 3-18
Saving configuration changes.......................................................... 3-19
Chapter 4 Protecting an Exchange Cluster with a
Like-Named Cluster ...............................................................4-1
Prerequisites ..................................................................................... 4-1
Permissions ....................................................................................... 4-1
Multiple EVS ...................................................................................... 4-1
Configuring a standby cluster ............................................................ 4-2
Enabling protection ........................................................................... 4-5
Dealing with a failure ........................................................................ 4-6
Graceful failover .................................................................................................... 4-6
Site failure failover................................................................................................. 4-6
Differences in failback ............................................................................................ 4-6
Chapter 5 Protecting a SQL Server.........................................5-1
Select a task ...................................................................................... 5-1
Select a domain ................................................................................. 5-2
Select source and target servers ....................................................... 5-3
Add or manage servers........................................................................................... 5-4
Enter server login information ................................................................................. 5-5
Using clustered SQL servers .................................................................................... 5-5
Configure protection settings ............................................................ 5-5
Select SQL instances.......................................................................... 5-6
Failover settings ................................................................................ 5-6
Failover type ......................................................................................................... 5-7
Services ............................................................................................................... 5-9
Resources (cluster only) ....................................................................................... 5-10
Monitor settings .............................................................................. 5-11
Application Monitoring (BETA) ............................................................................... 5-12
Snapshot settings ............................................................................ 5-13
Connection settings ......................................................................... 5-14
Route................................................................................................................. 5-14
Protected Databases ............................................................................................ 5-14
Mirror type ......................................................................................................... 5-18
Enable compression ............................................................................................. 5-18
Kommentare zu diesen Handbüchern