VMware Site Recovery Manager 5.1 installation configuration-part4-use

Source: Internet
Author: User

1. Select the virtual machine you want to protect in the protected site, then right-click and select VSphere Replication

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image001 "border=" 0 "alt=" clip_image001 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szllmqg4eoaahwsrhn7h0186.jpg "width=" 493 "height=" 552 "/>

2. Set up disk copy, that is, enable disk replication, select disk file location and disk type

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image002 "border=" 0 "alt=" clip_image002 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szllrxpevraafs7fljdki225.jpg "width=" 495 "height=" 462 "/>

3. Set the recovery point Objective (RPO) to a minimum of 15 minutes, whether the guest operating system needs to use silent mode to create a snapshot (to ensure file system consistency), and the location of the destination folder

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image003 "border=" 0 "alt=" clip_image003 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlluqbuhhaagj1al1g3k172.jpg "width=" 506 "height=" 470 "/>

4. Setting up a VR server

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image004 "border=" 0 "alt=" clip_image004 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szll-yiybmaaeafaznuu0562.jpg "width=" 530 "height=" 493 "/>

5. Display information about the protected virtual machine replication

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image005 "border=" 0 "alt=" clip_image005 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szll_s8pnvaafn6_zodz0303.jpg "width=" 575 "height=" 539 "/>

6. Apply the virtual machine replication configuration

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image006 "border=" 0 "alt=" clip_image006 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlmda3xhsaaa7qftvwqg636.jpg "width=" 433 "height=" 127 "/>

7. SRM begins replication of protected virtual machines

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image007 "border=" 0 "alt=" clip_image007 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szlmci_qv0aadc8z7dmuu377.jpg "width=" 588 "height=" 165 "/>

8. Complete replication of protected virtual machines

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image008 "border=" 0 "alt=" clip_image008 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szlmhj0csxaac2va58b0k980.jpg "width=" 575 "height=" 154 "/>

9. In the SRM protection Group, edit the protection group to add the protected virtual machine that has just completed the replication to the protection group

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image009 "border=" 0 "alt=" clip_image009 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlmhj4jqtaaefs5iqaue384.jpg "width=" 567 "height=" 307 "/>

10. Start editing the protection group

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image010 "border=" 0 "alt=" clip_image010 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szlmkaaae_aadpvcvtyei018.jpg "width=" 472 "height=" 388 "/>

11. Select the protected virtual machine to complete replication

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image011 "border=" 0 "alt=" clip_image011 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szlmpyiislaadmr2lidti154.jpg "width=" 473 "height=" 387 "/>

12. Set the name of the protection group

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image012 "border=" 0 "alt=" clip_image012 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlmowddlhaadbig0zzvc216.jpg "width=" 492 "height=" 398 "/>

13. Display information about the protection group

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image013 "border=" 0 "alt=" clip_image013 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szlmtrzmfhaaddyd9w3_y492.jpg "width=" 486 "height=" 394 "/>

14. Complete the edit of the protection group

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image014 "border=" 0 "alt=" clip_image014 "src=" http://s3.51cto.com/wyfs02/M00/58 /8a/wkiom1szk_ybsurgaaelyrvtnai988.jpg "width=" 545 "height=" 340 "/>

15. Open the Recovery plan interface, select the corresponding protection plan, and select "Test" to test the availability of the protected virtual machine. If the protected site DataCenter01 real failure, select recover, this time select test

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image015 "border=" 0 "alt=" clip_image015 "src=" http://s3.51cto.com/wyfs02/M01/58 /8a/wkiom1szk_3xfxpoaagjrm9q1xi583.jpg "width=" 549 "height=" 406 "/>

16. Start the test of the protected virtual machine recovery plan and finally show the success

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image016 "border=" 0 "alt=" clip_image016 "src=" http://s3.51cto.com/wyfs02/M02/58 /8a/wkiom1szk_7wgux8aaekrctyrqa079.jpg "width=" 602 "height=" 226 "/>

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image017 "border=" 0 "alt=" clip_image017 "src=" http://s3.51cto.com/wyfs02/M00/58 /8a/wkiom1szk_7sau1taaet2xgtwse283.jpg "width=" 622 "height=" 287 "/>

17. After completing the test plan, select "clean" to clean up the test environment

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image018 "border=" 0 "alt=" clip_image018 "src=" http://s3.51cto.com/wyfs02/M01/58 /8a/wkiom1szk_-dqdnfaaetvjtleia198.jpg "width=" 473 "height=" 393 "/>

18. Display cleanup Action related information, select "Start" to start cleaning

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image019 "border=" 0 "alt=" clip_image019 "src=" http://s3.51cto.com/wyfs02/M02/58 /8a/wkiom1szlacyv2m1aadz6wbxj6s998.jpg "width=" 495 "height=" 417 "/>

19. On the Recovery Plan screen, select the Virtual Machine tab on the left, select the corresponding virtual machine, select "Configure Recovery", and set the configuration of the virtual machine when it is restored.

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image020 "border=" 0 "alt=" clip_image020 "src=" http://s3.51cto.com/wyfs02/M00/58 /8a/wkiom1szlaca5jfvaad0kx1qqby813.jpg "width=" 567 "height=" 271 "/>

20. Set the IP address of the recovery process, the priority, and the dependencies between the virtual machines.

650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image021 "border=" 0 "alt=" clip_image021 "src=" http://s3.51cto.com/wyfs02/M01/58 /8a/wkiom1szlagzgdagaaff0fhro5y298.jpg "width=" 595 "height=" 461 "/>

VMware Site Recovery Manager 5.1 installation configuration-part4-use

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.