Hp Storage Mirroring Software User Manual Page 261

  • Download
  • Add to my manuals
  • Print
  • Page
    / 678
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 260
Workload protection Page 260 of 677
Your source can have no more than four NICs enabled, except if your
source is ESX version 4.x. In that case, you can have up to ten NICs.
l User name—Specify a user that is a member of the Double-Take Admin and
local administrator security groups on the source. If you want to use a domain
user account, enter a fully-qualified domain name in the format
domain\username or username@domain.
l Password—Specify the password associated with the User name you
entered.
6. Click Next to continue.
7. Choose the volumes on the source server that you want to protect.
l Select the volumes to protect—By default the system volume will be
selected for protection. You will be unable to deselect the system volume.
Select any other volumes on the source that you want to protect.
l Exclude these paths—If there are specific paths on a volume that you do
not want to protect, specify those locations. Keep in mind that missing data
may impact the integrity of your applications. Specify any paths to exclude
from protection and click Add. If you need to remove a path from being
excluded, select the path and click Remove.
8. Click Next to continue.
9. Specify the target server. If you are protecting to a Hyper-V server, this is the name
of the Hyper-V server. If you are protecting to a ESXserver, this is the host name of
your virtual recovery appliance.
Page view 260
1 2 ... 256 257 258 259 260 261 262 263 264 265 266 ... 677 678

Comments to this Manuals

No comments