1. Select the virtual machine you want to protect in the protected site, then right-click and select VSphere Replication
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image001 "border=" 0 "alt=" clip_image001 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szllmqg4eoaahwsrhn7h0186.jpg "width=" 493 "height=" 552 "/>
2. Set up disk copy, that is, enable disk replication, select disk file location and disk type
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image002 "border=" 0 "alt=" clip_image002 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szllrxpevraafs7fljdki225.jpg "width=" 495 "height=" 462 "/>
3. Set the recovery point Objective (RPO) to a minimum of 15 minutes, whether the guest operating system needs to use silent mode to create a snapshot (to ensure file system consistency), and the location of the destination folder
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image003 "border=" 0 "alt=" clip_image003 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlluqbuhhaagj1al1g3k172.jpg "width=" 506 "height=" 470 "/>
4. Setting up a VR server
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image004 "border=" 0 "alt=" clip_image004 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szll-yiybmaaeafaznuu0562.jpg "width=" 530 "height=" 493 "/>
5. Display information about the protected virtual machine replication
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image005 "border=" 0 "alt=" clip_image005 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szll_s8pnvaafn6_zodz0303.jpg "width=" 575 "height=" 539 "/>
6. Apply the virtual machine replication configuration
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image006 "border=" 0 "alt=" clip_image006 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlmda3xhsaaa7qftvwqg636.jpg "width=" 433 "height=" 127 "/>
7. SRM begins replication of protected virtual machines
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image007 "border=" 0 "alt=" clip_image007 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szlmci_qv0aadc8z7dmuu377.jpg "width=" 588 "height=" 165 "/>
8. Complete replication of protected virtual machines
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image008 "border=" 0 "alt=" clip_image008 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szlmhj0csxaac2va58b0k980.jpg "width=" 575 "height=" 154 "/>
9. In the SRM protection Group, edit the protection group to add the protected virtual machine that has just completed the replication to the protection group
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image009 "border=" 0 "alt=" clip_image009 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlmhj4jqtaaefs5iqaue384.jpg "width=" 567 "height=" 307 "/>
10. Start editing the protection group
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image010 "border=" 0 "alt=" clip_image010 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szlmkaaae_aadpvcvtyei018.jpg "width=" 472 "height=" 388 "/>
11. Select the protected virtual machine to complete replication
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image011 "border=" 0 "alt=" clip_image011 "src=" http://s3.51cto.com/wyfs02/M01/58 /87/wkiol1szlmpyiislaadmr2lidti154.jpg "width=" 473 "height=" 387 "/>
12. Set the name of the protection group
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image012 "border=" 0 "alt=" clip_image012 "src=" http://s3.51cto.com/wyfs02/M02/58 /87/wkiol1szlmowddlhaadbig0zzvc216.jpg "width=" 492 "height=" 398 "/>
13. Display information about the protection group
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image013 "border=" 0 "alt=" clip_image013 "src=" http://s3.51cto.com/wyfs02/M00/58 /87/wkiol1szlmtrzmfhaaddyd9w3_y492.jpg "width=" 486 "height=" 394 "/>
14. Complete the edit of the protection group
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image014 "border=" 0 "alt=" clip_image014 "src=" http://s3.51cto.com/wyfs02/M00/58 /8a/wkiom1szk_ybsurgaaelyrvtnai988.jpg "width=" 545 "height=" 340 "/>
15. Open the Recovery plan interface, select the corresponding protection plan, and select "Test" to test the availability of the protected virtual machine. If the protected site DataCenter01 real failure, select recover, this time select test
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image015 "border=" 0 "alt=" clip_image015 "src=" http://s3.51cto.com/wyfs02/M01/58 /8a/wkiom1szk_3xfxpoaagjrm9q1xi583.jpg "width=" 549 "height=" 406 "/>
16. Start the test of the protected virtual machine recovery plan and finally show the success
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image016 "border=" 0 "alt=" clip_image016 "src=" http://s3.51cto.com/wyfs02/M02/58 /8a/wkiom1szk_7wgux8aaekrctyrqa079.jpg "width=" 602 "height=" 226 "/>
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image017 "border=" 0 "alt=" clip_image017 "src=" http://s3.51cto.com/wyfs02/M00/58 /8a/wkiom1szk_7sau1taaet2xgtwse283.jpg "width=" 622 "height=" 287 "/>
17. After completing the test plan, select "clean" to clean up the test environment
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image018 "border=" 0 "alt=" clip_image018 "src=" http://s3.51cto.com/wyfs02/M01/58 /8a/wkiom1szk_-dqdnfaaetvjtleia198.jpg "width=" 473 "height=" 393 "/>
18. Display cleanup Action related information, select "Start" to start cleaning
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image019 "border=" 0 "alt=" clip_image019 "src=" http://s3.51cto.com/wyfs02/M02/58 /8a/wkiom1szlacyv2m1aadz6wbxj6s998.jpg "width=" 495 "height=" 417 "/>
19. On the Recovery Plan screen, select the Virtual Machine tab on the left, select the corresponding virtual machine, select "Configure Recovery", and set the configuration of the virtual machine when it is restored.
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image020 "border=" 0 "alt=" clip_image020 "src=" http://s3.51cto.com/wyfs02/M00/58 /8a/wkiom1szlaca5jfvaad0kx1qqby813.jpg "width=" 567 "height=" 271 "/>
20. Set the IP address of the recovery process, the priority, and the dependencies between the virtual machines.
650) this.width=650; "Style=" border-right-0px; border-top-width:0px; border-bottom-width:0px; border-left-width:0px "title=" clip_image021 "border=" 0 "alt=" clip_image021 "src=" http://s3.51cto.com/wyfs02/M01/58 /8a/wkiom1szlagzgdagaaff0fhro5y298.jpg "width=" 595 "height=" 461 "/>
VMware Site Recovery Manager 5.1 installation configuration-part4-use