not limited to, the implied warranties of merchantability and fitness for a particular purpose.
Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential
damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this
document may be photocopied, reproduced, or translated into another language without the prior
written consent of Hewlett-Packard. The information contained in this document is subject to change
without notice.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained
herein. The information is provided "as is" without warranty of any kind and is subject to change
without notice. The warranties for Hewlett-Packard Company products are set forth in the express
limited warranty statements for such products. Nothing herein should be construed as constituting
an additional warranty.
HP StorageWorks Storage Mirroring Application Manager User’s Guide
Ninth Edition (March 2009)
Part Number: T2558-96322
Appendix F Using the DNS Failover (DFO) Utility ...................)-1
Appendix G Using the Exchange Failover (EFO) Utility.......... G-1
v
Introduction
This document describes how to use the Storage Mirroring
Application Manager to create and validate your application
configuration. The Application Manager lets you quickly configure
protection for an application without requiring you to have advanced
knowledge of either Storage Mirroring or your application. The Application Manager works by
gathering information about your source and target environments, then configuring Storage Mirroring
to protect the source.
About the Storage Mirroring Application Manager
The Application Manager is used to simplify the setup of standard Storage Mirroring connections. The
Application Manager discovers all servers running a designated application in your environment so
that you can determine which servers are not protected. It gathers information about the
environment from various sources (including Storage Mirroring, Active Directory
automatically configures Storage Mirroring to protect that environment. It also performs a “health
check” to make sure that your configuration is correct. This check not only helps to reduce
configuration errors, but it also simplifies the setup process.
Supported configurations
NOTE:Blackberry Server and Exchange cannot be protected on the same machine.
®
, and DNS) and
Exchange
Exchange 2003Exchange 2007
Source to target topology
One to oneYesYes
Many to oneNoNo
One to manyNoNo
Cascaded (chained)NoNo
Cluster support
Cluster to clusterYesMailbox role only
Cluster to standaloneYesMailbox role only
Standalone to clusterNoNo
Application configurations
2000/2003 front-end
server
2000/2003 back-end serverYesN/A
2007 consolidated rolesN/AMailbox role only
NoN/A
2007 distributed rolesN/AMailbox role only
Domain topology
Single forestYesYes
Multiple forestNoNo
1 - 1
Exchange 2003Exchange 2007
Parent/childYesYes
Child/childYesYes
NOTE:For Exchange 2007, in a consolidated role environment only the mailbox role is protected.
The Hub Transport and Client Access roles are not protected or failed over because they
are already installed on the target.
For Exchange 2007, replication and failover between a distributed role source
configuration to a consolidated role target configuration is permitted, provided that the
systems are configured as follows:
The source Mailbox Server role is installed on a standalone server or MSCS cluster
with the other roles residing on different servers.
The target configuration is a stand-alone server with the Mailbox, Hub Transport, and
Client Access roles installed.
In these configurations, Storage Mirroring will not replicate any data associated with the
Hub Transport/Client Access data; however, the target Hub Transport/Client Access roles
function properly when failing over the source Mailbox role, allowing necessary
operations to resume.
Using the Application Manager with Exchange in clustered
environments
The Application Manager can be used in the following cluster configurations with Exchange 2003:
Clustered source to standalone target
Multi-node cluster to another multi-node cluster
Multi-node cluster to a single-node cluster (requires GeoCluster
Single-node cluster to a multi-node cluster (requires GeoCluster PLUS)
®
PLUS)
NOTE:The Application Manager does not support configurations where Exchange and the
domain controller are on the same node of a cluster.
When using Exchange on a cluster, Exchange must be installed in its own uniquely named
group and not in the cluster group.
Like-named cluster support is only available for clusters running Exchange 2003. It is not
available for Exchange 2007.
SQL
SQL Server
2000
Source to target topology
One to oneYesYesYesYes
Many to oneDatabase mode
only
One to manyNoNoNoNo
Cascaded (chained)NoNoNoNo
Cluster support
Cluster to clusterNoYesYesNo
SQL Server
2005
Database mode
only
SQL Server
2008
Database mode
only
SQL Express
Database mode
only
1 - 2
SQL Server
2000
SQL Server
2005
SQL Server
2008
SQL Express
Cluster to
standalone
Standalone to
cluster
Application configurations
Named instanceYesYesYesYes
Database onlyYesYes (standalone
Domain topology
Single forestYesYesYesYes
Multiple forestNoNoNoNo
Parent/childYesYesYesYes
Child/childYesYesYesYes
NoNoNoNo
NoNoNoNo
only)
Yes (standalone
only)
Yes
Using the Application Manager with SQL in clustered
environments
The Application Manager can be used with SQL Server 2005 or SQL Server 2008 in a cluster-to-cluster
environment.
If you want to use SQL 2000 in a clustered environment, or if you have a cluster-to-standalone
configuration, refer to one of the following application notes, available from
http://www.hp.com/support
Guidelines for using Microsoft SQL Server 2000 with Storage Mirroring
Guidelines for using Microsoft SQL Server 2005 with Storage Mirroring
.
SharePoint
SQL 2000SQL 2005SQL 2008
Source to target topology
One to oneYesYesYes
Many to oneNoNoNo
One to manyNoNoNo
Cascaded (chained)NoNoNo
Cluster support
Cluster to clusterNoNoNo
Cluster to standaloneNoNoNo
Standalone to clusterNoNoNo
Application configurations
WSSYesYesYes
MOSS 2007YesYesYes
Domain topology
1 - 3
SQL 2000SQL 2005SQL 2008
Single forestYesYesYes
Multiple forestNoNoNo
Parent/childYesYesYes
Child/childYesYesYes
Application Manager for SharePoint supports only SQL instance mode protection. Database-only
protection mode is not available.
By default, Application Manager for SharePoint displays the Advanced options and automatically
selects to failover Server Name and Hostname (SPNs). These two options are required to make
SharePoint failover work correctly.
Application Manager for SharePoint does not support graceful/soft failover.
Only target web servers running a version of SharePoint that is identical to what is installed on
the source web front-end can be extended into the source SharePoint configuration.
The SharePoint Admin account used to install WSS 3 or MOSS 2007 on the source web front-end
is required to extend a target web server into the SharePoint configuration.
File server
Windows 2003Windows 2008
Source to target topology
One to oneYesYes
Many to oneNoNo
One to manyNoNo
Cascaded (chained)NoNo
Cluster support
Cluster to clusterNoNo
Cluster to standaloneNoNo
Standalone to clusterNoNo
Domain topology
Single forestYesYes
Multiple forestNoNo
Parent/childNoNo
Child/childYes, as long as the
child domain has a
DNS server. If the
DNS server resides
in the parent
domain, then
validation will fail.
Yes, as long as the
child domain has a
DNS server. If the
DNS server resides
in the parent
domain, then
validation will fail.
Application Manager for file severs does not support graceful/soft failover.
1 - 4
BlackBerry
The Application Manager can be used to configure Storage Mirroring to provide high availability for
BlackBerry Enterprise Server using a Microsoft SQL Server database back end. This allows a
secondary server to assume the identity and role of a failed server while maintaining the availability
of BlackBerry Enterprise Server and/or SQL Server services with minimal disruption or data loss.
All versions
Consolidated to consolidatedSupported
Distributed to distributed Not supported
Distributed to consolidated Not supported
Requirements
The Application Manager will run from any client (or server) on any Microsoft® Windows® operating
system that has access to the domain in which the servers are located.
NOTE:Storage Mirroring Application Manager should be run on a machine that is not a domain
controller. Hewlett-Packard recommends that you run Application Manager from either a
third “administrative” client that is running a supported operating system or from the
Storage Mirroring target.
If you attempt to run Application Manager on a domain controller, the following errors
may occur:
Application Manager could not verify credentials when connecting to the server
x.x.x.x. Due to technical restrictions, credentials cannot be verified when used to
connect to a local machine.
GetWbemScope: Attempting connection to WBEM server (using specified
The Application Manager requires the following minimum system configuration:
Two servers that meet one of the following operating system requirements:
Microsoft Windows 2003 with Service Pack 1 or later
Microsoft Windows XP with Service Pack 2 or later
Microsoft Windows Vista
Microsoft Windows 2008
NOTE:Windows 2008 Server Core installation option is not supported.
Microsoft Windows 2008 can only be used with the following application versions:
Exchange 2007
SQL 2005 and SQL 2008
File Server
SharePoint
Two licensed copies of Storage Mirroring with the most recent Windows Server 2008 feature pack
NOTE:Storage Mirroring must be installed and running on the source and target servers. If
the Storage Mirroring service is not installed or not running on source or target server,
an error will appear.
1 - 5
A copy of the most recent version of the Storage Mirroring Application Manager
NOTE:The version of Storage Mirroring and Storage Mirroring Application Manager must be
the same.
See the Hewlett-Packard support website to obtain the most recent version of the
Application Manager.
.NET Framework version 3.5 with service pack 1 or later. If you do not have .NET Framework
version 3.5 SP 1 installed, Application Manager will prompt you to install it
Microsoft Installer version 3.0 or later (as required by the .NET Framework version 3.5 SP 1)
An active internet connection (required only during the Application Manager installation to
download the Microsoft Admin Pack, .NET Framework, and/or SQL Server 2005 Backward
Compatibility components containing the SQLDMO libraries)
NOTE:Alternatively, these packages are available on the Hewlett-Packard support website
and can be downloaded to a different server, from which you can use an internal file
share or removable media to copy the files to the Application Manager client.
If you are using the Target Data Verification feature, you will need to install the Volume Shadow
Copy Service SDK (Vshadow.exe) in the windows\system32 directory on the target server.
This tool is available for download from the Windows Download Center on the Microsoft website
(www.microsoft.com).
The target must have drive letters that match the drive letters where the protected application
stores data
Application Manager does not support single-label DNS domain names (that is, domain names
that do not include a suffix such as
The program files for your application must be installed in the same location on the target and
.com, .corp, .net, and so on)
the source
In addition, your environment must adhere to requirements specific to the application you are
protecting. For additional requirements, see:
Exchange requirements on page 1-6
SQL requirements on page 1-7
File server requirements on page 1-8
SharePoint requirements on page 1-8
BlackBerry requirements on page 1-9
Exchange requirements
If you are using the Application Manager for Exchange, your system must meet the following
requirements.
Two licensed copies of Microsoft Exchange Server that meet one of the following requirements:
Exchange Server 2003
1 - 6
Exchange 2007
NOTE:
Hewlett-Packard recommends that the Exchange version be the same as the
operating system version (for example, Windows Server 2003 running Exchange
2003).
Only Exchange 2007 is supported with Windows Server 2008.
The source and target servers must both be running a Microsoft-supported
operating system/Exchange combination.
Both source and target Exchange versions must be identical.
To perform target data verification, you must be using Exchange 2003 with service
pack 1 or later.
For Exchange 2007, Application Manager may be run on a workstation, provided
that the Exchange 2007 Management Tools are installed prior to installing the
Application Manager.
To use the Application Manager for Exchange, Storage Mirroring must be running under the
localsystem account.
The client or server that is running the Application Manager must have access to the domain in
which the Exchange servers are located.
The source and target Exchange servers must be in the same root forest domain.
The source and target servers must be part of the same Exchange Administrative Group.
The target Exchange server cannot be a domain controller.
The Exchange configurations on the source and target servers must be identical for the following
components:
Storage groups
Location of storage groups (log and data files)
Log file prefixes
Database locations (log and data files)
Message Transfer Agent (MTA) location
Queue paths
NOTE:This requirement does not apply to like-named clusters.
In a parent\child domain, at least one domain controller in the child domain must designated as
a global catalog server.
The Application Manager does not support configurations where Exchange and the domain
controller are on the same node of a cluster.
While installing Exchange Server 2003 on a domain controller is a supported operation, it is not
generally recommended. Hewlett-Packard also does not recommend this configuration. If you
must use Exchange Server2003 on a domain controller, review the following Microsoft Knowledge
Base articles:
If you are using the Application Manager for SQL, your system must meet the following requirements.
Two licensed copies of Microsoft SQL Server that meet one of the following requirements:
SQL Server 2000 with Service Pack 4 or later
1 - 7
SQL Server 2005
SQL Server 2008
SQL Sever Express
NOTE:
If you are using SQL Server, you will be prompted to download and install the
Microsoft SQL Server 2005 backward compatibility components. This package
includes the SQLDMO library, which is required to run the Application Manager.
You should use the same version and service pack of SQL Server on both the
source and target servers. Exceptions would be that in Database Only protection
mode you may use a newer version of SQL Server on the target server or have a
32-bit source and a 64-bit target to perform a failover (for instance, when using
Application Manager to facilitate a migration from SQL Server 2000 on the source
to SQL Server 2005 on the target, or to migrate data from a 32-bit source to a
64-bit target). You cannot failback when using different versions of SQL Server
on the source and target.
To enable the Application Manager to work with MSDE (SQL Express 2000) and SQL Server 2005
Express, Named Pipes and TCP/IP need to be added to the Enabled Protocols. By default, these
are disabled. They must be enabled to accept remote connections.
For MSDE, you must run the svrnetcn.exe command, which is located in the C:\Program
For SQL Server 2005 Express, you must launch the SQL Server Configuration Manager,
expand SQL Server 2005 Network Configuration, and for Protocols for MSSQLSERVER
enable Named Pipes and TCP/IP.
To use the Application Manager for SQL, the user logged on to Windows must be a member of
the SQL Server sysadmin role on the source and target servers.
The source and target SQL servers must be in the same domain; otherwise, the SQL Server
service on both the source and target servers must be configured to start with the same domain
user account.
In order to protect SQL named instances, both the source and target SQL Servers must have
named instances with the exact same name installed prior to configuring protection.
File server requirements
If you are using the Application Manager for file servers, your system must meet the following
requirement.
Two licensed copies of Storage Mirroring 5.0 with the latest service pack
NOTE:
Hewlett-Packard strongly recommends that the target server be a dedicated
standby server which does not host any critical applications. During failback for file
servers, the Server service is re-started, which could also re-start any dependent
services.
File server protection is currently only supported in a flat domain.
SharePoint requirements
If you are using the Application Manager for SharePoint, your system must meet the following
requirements.
Windows SharePoint Services (WSS) version 3
NOTE:WSS 3.0 service pack 1 is required for Windows 2008.
Microsoft Office SharePoint Server (MOSS) 2007
NOTE:MOSS 2007 service pack 1 is required for Windows 2008.
1 - 8
SQL Server 2000, SQL Server 2005, or SQL Server 2008 back-end
NOTE:SharePoint protection is currently only supported in a flat domain.
Windows Firewall—You will need to open port 6350 for Sharepoint communication.
BlackBerry requirements
If you are using the Application Manager for BlackBerry, your system must meet the following
requirements.
Licensed copies of Microsoft SQL Server that meet one of the following requirements:
SQL Server 2000 with Service Pack 4 or later
SQL Server 2005
SQL Express
NOTE:
If you are using SQL Server, you will be prompted to download and install the
Microsoft SQL Server 2005 backward compatibility components. This package
includes the SQLDMO library, which is required to run the Application Manager.
You should use the same version and service pack of SQL Server on both the
source and target servers. The only exception would be that you may use a newer
version of SQL Server on the target server to perform a failover while in Database Only protection mode (for instance, when using Application Manager to facilitate
a migration from SQL Server 2000 on the source to SQL Server 2005 on the
target). You can NOT failback when using different versions of SQL Server on the
source and target.
Licensed copies of BlackBerry Enterprise Server for Microsoft Exchange versions 4.1.4
through 4.1.6
Licensed copies of Microsoft Exchange Server that meet one of the following requirements:
NOTE:
Hewlett-Packard recommends that the Exchange version be the same as the
operating system version (for example, Windows Server 2003 running Exchange
2003).
The source and target servers must both be running a Microsoft-supported
operating system/Exchange combination.
Both source and target Exchange versions must be identical.
To perform target data verification, you must be using Exchange 2003 with service
pack 1 or later.
Related documentation
Before you begin to configure your solution, make sure that you have complete documentation for
your operating system, application, and Storage Mirroring.
User’s guide
The following document(s) contain additional information that you may need while setting up this
solution:
Storage Mirroring User’s Guide or online documentation
NOTE:The Storage Mirroring User’s Guide contains a list of Storage Mirroring error codes. This
reference is useful for troubleshooting.
1 - 9
Application notes
While the Application Manager greatly simplifies the process of configuring your application for use
with Storage Mirroring, Hewlett-Packard recognizes that in some environments a manual process for
application configuration is more desirable. However, the manual process is much more time
consuming and labor intensive. Hewlett-Packard has application notes which provide guidelines on
using manual processes to configure your application with Storage Mirroring.
To obtain application notes for the manual process for Exchange configurations, you must contact
Hewlett-Packard technical support. Current contact information for technical support is available at
http://www.hp.com/support
Application notes for other applications are available for download from the Application Notes page
of the Hewlett-Packard support web site (http://www.hp.com/support
.
).
Readme files
The following readme files contain additional reference information related to the Application
Manager:
Readme_Application_Manager.htm—The readme file contains information about known issues
and workarounds in the current release of the Application Manager.
Readme_DFO.htm—The DNS failover utility (DFO.exe), which is called in the failover scripts,
automatically updates DNS resource records in order to seamlessly redirect network clients. The
DFO readme file documents DFO syntax, known issues, and workarounds.
The readme files can be found in the folder where the Application Manager is installed (the default
installation location is either \Program Files\Storage Mirroring\ or \Program files\Application
Manager).
1 - 10
Navigating the user
interface
The Application Manager interface is designed to guide you through the process of configuring
protection for your servers. The default configuration parameters have been selected to be
appropriate for most configurations; however, you may need to modify them for your specific
environment. Any changes you make to non-machine specific configuration settings (such as Missed
Packets) will become the default the next time you run the Application Manager.
When you launch the Application Manager and select an application to protect, you will see the main
Application Manager window. The Setup tab of the Application Manager window leads you through
the steps to configure protection for a server using standard Windows-style controls. Enter
information in fields, select options from drop-down menus, click buttons, and use menu options to
configure protection.
After protection has been set up, use the Monitor tab to view information about the current
source/target pair. Based on the current protection status and/or failover state, the Failover,
Monitoring, and Protection button text on the Monitor tab will be updated to display the available
command. If the Application Manager is not in a state that will allow any of these options to be
executed, the corresponding button(s) will be grayed out (disabled).
The interface provides tooltip-style online help. When you place the pointer over a field in the
Application Manager, a tooltip will appear to provide additional information about the field.
Install the Application Manager
If you have not done so already, install the Application Manager by running the Application Manager
installation file downloaded from the Hewlett-Packard support website or from your installation
media. If you install .NET during the Application Manager installation, you may be required to reboot
your system prior to the installation of Application Manager. After the reboot, the installation should
continue.
When the installation autorun file is launched, the Application Manager will detect the platform that
the server is running on (that is, whether it is on 32-bit or 64-bit). When you select Install
Application Manager, the correct version of Application Manager will be installed automatically.
NOTE:On 32-bit systems, if Storage Mirroring is installed before the Application Manager is
For the initial setup, the Application Manager only needs to be installed on one system. For managing
failover and failback, the Application Manager should be run from either the target server or an
administrative workstation.
installed, then the Application Manager will be installed to the same location as Storage
Mirroring. If the Application Manager is installed before Storage Mirroring, then the
Application Manager will be installed to the \Application Manager directory that is created.
On 64-bit systems, Storage Mirroring is installed to the Program Files directory (not
\Program Files <x86>). When the Application Manager is installed, the Application
Manager will be installed to the \Program Files folder where Storage Mirroring resides. If
the Application Manager is installed before Storage Mirroring, then the Application
Manager will be installed to \Program Files\Application Manager. If Storage Mirroring is
subsequently installed, it will be in a separate directory (that is, the Application Manager
will be installed to \Program Files\Application Manager and Storage Mirroring will be
installed to \Program Files\Storage Mirroring).
2 - 1
The Application Manager installation uses an active internet connection to download the Microsoft
Admin Pack and SQL server backward compatibility (SQLDMO) files. In addition, if you do not have
.NET Framework version 3.5 SP1 installed, you will be prompted to install it. Microsoft Installer
version 3.0 or later is required to install the .NET Framework.
NOTE:Alternatively, these packages are available on the Hewlett-Packard support website and
can be downloaded to a different server, from which you can use an internal file share or
removable media to copy the files to the Application Manager client.
Start the Application Manager
Launch the Application Manager by selecting Start, Programs, Storage Mirroring, Application
Manager. The Application Manager will open. If you have not yet set up protection, the window will
show the Welcome screen.
You can protect servers for a different application by selecting one of the following options in the
Tasks area on the left pane:
Protect Exchange Server—To protect an Exchange server, click this option. The right pane will
display the Manage Exchange page, which will lead you through the steps to protect an Exchange
server. Continue with Protecting an Exchange Server on page 3-1.
Protect SQL Server—To protect a SQL server, click this option. The right pane will display the
Manage SQL page, which will lead you through the steps to protect a SQL server. Continue with
Protecting a SQL Server on page 5-1.
Protect File Server—To protect a file server, click this option. The right pane will display the
Manage File Server page, which will lead you through the steps to protect a File server. Continue
with Protecting a File Server on page 6-1.
Protect SharePoint Server—To protect a SharePoint server, click this option. The right pane
will display the Manage SharePoint Server page, which will lead you through the steps to protect
a SharePoint server. Continue with Protecting a SharePoint Server on page 7-1.
Protect BlackBerry Server—To protect a BlackBerry server, click this option. The right pane will
display the Manage BlackBerry Server page, which will lead you through the steps to protect a
BlackBerry server. Continue with Protecting a BlackBerry Server on page 8-1.
2 - 2
Menu options
Based on the current protection status and/or failover state, the Protection, Monitoring, and
Failover/Failback menu options will be updated to display the available commands. If the Application
Manager is not in a state that will allow any of these options to be executed, the corresponding menu
option(s) will be grayed out (disabled).
The following menu options are available on the main Application Manager window:
File menu
New—Start a new application server protection
Exit—Exit the Application Manager
Tools menu
Options—Modify Application Manager preferences and clear cached credentials
Delegate Rights (Exchange Only)— Assign Exchange administrative rights to an account
Actions menu
Configure Protection—Launch the Configure Protection dialog box
Validate—Validate the source/target configuration
Enable/Disable Protection—Enable or disable protection for the source server
Enable/Disable Monitoring—Enable or disable failover monitoring for the source server
Failover/Failback—Initiate manual failover or failback
View source DFO log—Launch a viewer to examine the log file generated by the dfo.exe utility
on the source server
View source ExchFailover log (Exchange only)—Launch a viewer to examine the log file
generated by the exchfailover.exe utility on the source server
View target DFO log—Launch a viewer to examine the log file generated by the dfo.exe utility
on the target server
View target ExchFailover log (Exchange only)—Launch a viewer to examine the log file
generated by the exchfailover.exe utility on the target server
Manage SQL Servers (SQL and SharePoint only)—Extended options for selecting SQL servers
and testing SQL services on those servers. This is the same window that is displayed when you
click the Advanced Find button on the SQL Manager or Sharepoint Manager main page.
Verify Target Data (Exchange and SQL only)—Verify that the target stores (for Exchange) or
databases (for SQL) will mount with the replicated data without forcing a re-mirror
Restore PF Tree (Exchange only)—Add the target back to the PF list to which the source belongs
NOTE:This option is only available when Application Manager is running in the Advanced
context.
Manage Snapshots—Launch the Snapshot Manager.
Help menu
View Welcome Page—Return to the initial Application Manager screen, from which you can
check for product updates or access the Hewlett-Packard website
View Online Help—Launch the Application Manager online help
View User’s Guide—Launch the Application Manager User’s Guide PDF
About—View the Application Manager revision number and copyright information
2 - 3
Change Application Manager preferences
To change display preferences for the Application Manager, select Tools, Options. The Options
dialog box will appear.
1. In the Service Listen Port field, enter the value for the Storage Mirroring port to be used for
Application Manager communication. The default port is 6320.
NOTE:The Storage Mirroring Application Manager Service Listen Port must be the same as
the Storage Mirroring Service Listen Port on both the source and target servers.
You can also change the port through the Storage Mirroring Management Console.
2. To specify the rate at which the Application Manager updates the protection status, clear the
Enable automatic adjustment of refresh interval checkbox, then enter the desired Refresh
Interval. You can enter a value between 1 and 30,000 seconds.
3. If you want the refresh interval to be updated automatically, select the Enable automatic
adjustment of refresh interval checkbox.
NOTE:If the Application Manager appears to be running slowly, it may be because the
refresh interval is set to a long interval. Set a shorter refresh interval and make sure
that the automatic adjustment option is not selected.
4. In the Maximum log file size field, enter the maximum size for the dtam.verbose.log file.
When the maximum size is reached, the dtam.verbose.log file is renamed to
dtam.verbose.prev.log and subsequent actions are logged to a new dtam.verbose.log file
(Default = 1 MB).
5. Select the Enable verbose logging checkbox to have all user interactions with Application
Manager logged to the dtam.verbose.log file (Default = selected).
6. Select the Always show protection details checkbox to have the Protection Details section on
the Monitor tab expanded by default.
7. Select the Display statistics values in bytes checkbox if you always want to show the values
on the Protection Details section on the Monitor tab values in bytes, rather than in MB, GB, or
TB.
8. Select the Load last selected server upon startup checkbox to automatically reconnect to the
last protected source/target pair when Application Manager is re-started.
2 - 4
9. Select the Enable Alternative DNS checkbox to launch Application Manager in \Altdns mode
the next time it is opened. For more information, see Using a non-Microsoft DNS Server on
page D-1.
10. Select the Display Advanced Options checkbox to launch Application Manager in \Advanced
mode the next time it is opened.
11. Click the Clear Cached Credentials button to clear the cached user name and password.
12. Click OK to save your changes, or Cancel to discard your changes and exit the Options dialog
box.
Using the online help
To view additional information about a task in the Application Manager interface, from the Help
menu, click View Online Help. This will launch the online help file in your internet browser.
To search for information about a topic, use tabs on the left pane:
The Contents tab provides a table of contents for the help file. Click a topic to view the topic in
the right pane.
The Index tab provides a list of terms. Click on a term to view the help topic(s) that include that
term.
The Search tab allows you to enter a word or words. When you click the Search button, a list of
all topics that include that term appears. Click on the topic title to view the topic.
While viewing the online help and readme (.htm) files in Internet Explorer, a message may appear
stating that Internet Explorer has restricted the file from showing active content. You can disable this
setting by modifying your Internet Explorer security settings.
1. In Internet Explorer, select Tools, Internet Options.
2. On the Advanced tab, scroll down to the Security section.
3. Enable Allow active content to run in files on My Computer.
2 - 5
Protecting an
Exchange Server
To configure protection for your Exchange servers, you will complete the following steps:
1. Install Exchange on the source server and apply any Exchange service packs or patches. Use the
default installation options for Exchange.
2. Install Exchange on the target, placing it in the same Exchange organization as the source and
verifying that the installation location for the target is the same as the source. Apply any
Exchange service packs or patches. Use the default installation options for Exchange with the
following considerations:
The target must be a unique installation (that is, two Exchange servers must be available for
a protection pair)
Logical drive mapping must be the same on the source and target, and must assigned prior
to running the Application Manager
3. Install Storage Mirroring on the source and target Exchange servers. See the Storage Mirroring
Getting Started guide for more information.
4. Install the Application Manager on page 2-1
5. Verify the Exchange environment (recommended) on page 3-1
6. Select a task on page 3-2
7. Select a domain on page 3-2
8. Select source and target servers on page 3-3
9. (Optional) Configure protection settings on page 3-4
10. Validate the Configuration on page 9-1
To protect your Exchange server, you will complete the following steps:
1. Enable protection on page 10-1
2. Monitor protection status on page 10-2
In the event of a failure, you will need to perform some additional tasks. These tasks are described
in Failover, Failback, and Restoration on page 11-1.
NOTE:If you need to protect any data that is stored on a non-mailbox server role (for example,
SMTP queue data), you will need to configure protection for that data separately. In
addition, you may need to manually update the DNS setting for the client access server
to point to the target site.
Verify the Exchange environment (recommended)
Before you use Application Manager, complete the following tasks to verify that the environment is
properly set up.
1. With both Exchange servers online, use Active Directory Users and Computers to move an
existing user from the source to the target and then back to the original source.
2. Verify that you can create a new user on the target.
3. To verify connectivity, create an Outlook
connect to the target.
®
profile for the new user on a client machine and
3 - 1
Select a task
To protect an Exchange server, open the Application Manager (Start, Programs, Storage
Mirroring, Application Manager), then on the Tasks area on the left pane, select Protect
Exchange Server. The Manage Exchange page will appear in the right pane. Make sure that the
Setup tab is in view.
NOTE:You can also launch Application Manager for Exchange by using the command line
/exchange option (dtam /exchange).
Select a domain
The Domain Name on the main window will be populated automatically with the root domain where
the Application Manager client resides. This is necessary for Application Manager to gather Exchange
information from the Configuration container.
If you want to change the domain, type in a domain name for a trusted root domain that the
Application Manager client can connect to, then press Tab or click on another field. If the domain you
entered doesn’t exist or you do not have the credentials to modify Active Directory for the new
domain, the Domain Login window will appear. You will be prompted to enter the domain name, user
name, and password to use for logging in to the domain.
NOTE:Domain names must include a suffix, such as
The user account should have administrator permissions. For more information about configuring
permissions, see Recommended Credentials on page A-1.
3 - 2
.com, .corp, or .net.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format NetBIOS domain name\username or username.
If you enter a non-qualified name, the default domain will be used.
NOTE:When the Application Manager launches, it selects the forest root automatically. The
domain that is entered MUST be the root of the forest domain, since this is where all
Exchange server objects reside (even if the Exchange server is a member of a child
domain).
Select source and target servers
The Application Manager will automatically attempt to populate the Source Server and Target
Server lists with any servers in the specified domain that are running Exchange.
If you select a source/target pair for which you have previously enabled and disabled protection, you
may use the existing configuration settings (provided that the source/target connection is not
currently active, in which case the existing setting s will always be used). When you select Configure
or Validate, a prompt will appear asking if you want to re-use the previous configuration information.
Click Yes to re-use the previous information, or click No to revert to the Application Manager default
settings.
NOTE:If the IP address(es) for the source or target server have changed since you originally
configured protection (for example, if you configure the source or target in a staging area
and then send it to a production location), you must re-configure the protection settings.
When you are prompted to re-use the previous protection configuration, click No, then
click the Configure Protection button.
1. In the Source Server field, select the Exchange server that you want to protect. If this is your
first time to log in to the selected server, you will be prompted to enter server login information.
For more information about logging in to servers, see Enter server login information on
page 3-4.
NOTE:You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear
stating that the source is not available and that if the source is failed over, you should
first select the target.
If you select the target, then select the source (as recommended in the prompt), the
same prompt appears (though you would expect to get a prompt to failover). The
ability to failover using the Application Manager will not be available until a failover
condition has been met in accordance with the failover monitor settings set on the
Monitoring tab.
2. In the Target Server field, select the backup Exchange server that will protect the source
server in the event of a failure. The target must be in the same Exchange admin group as the
source.
3 - 3
Notice that after the source and target servers are selected, the Protection Status on the Monitor tab
changes to Unprotected.
NOTE:If you select a target that is monitoring a connection that has met a failover condition and
requires manual intervention, a prompt will appear asking if you want to initiate failover.
Enter server login information
After you select a server for the first time, you will be prompted to enter a user name and password
to use for logging in to the selected server. The login account MUST be a member of the Storage
Mirroring Admin local security group for the selected server. For more information about permissions,
see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If you
enter a non-qualified name, the DNS domain will be used. Entering the credentials for the logged-on
user may be valid.
The Application Manager will attempt to use the same user name and password the next time you
select a server.
Using clustered Exchange servers
Exchange virtual servers (EVS) are selectable in the same way as physical servers; however, physical
servers that are members of a cluster (called a “node”) are not shown in the server drop-down list.
For more information about setting up protection for a cluster with a like-named cluster, see
Protecting an Exchange Cluster with a Like-Named Cluster on page 4-1.
Configure protection settings
If you do not need to change the configuration settings, continue with Validate the Configuration
on page 9-1.
If you have already enabled protection for a connection and need to change the configuration
parameters, you will first need to disable protection as described in Disable protection on
page 10-2.
To change the default configuration parameters, click Configure from the main Application Manager
window, or select Actions, Configure Protection from the menu. The Configure Protection window
will appear.
The Configure Protection window has tabs for configuring failover, connection, and advanced settings.
The following sections describe the options on each of these tabs.
3 - 4
Failover settings
The Failover tab includes options that will be applied during Exchange failover.
Failover type
Failover Type indicates what name resolution method will be used to redirect users to the target
Exchange server in the event of a source failure. By default, DNS Failover is selected.
NOTE:For clustered environments, only DNS failover is supported.
DNS failover
DNS Failover is the recommended method for failover. Use this option if you want to failover by
updating the DNS records associated with the source. This will modify all source server A, MX, and
PTR-type DNS resource records to point to the target.
In DNS Failover, the DNS records for the source server are modified to point to the target server’s IP
address. This allows clients to resolve the source Exchange server name to the target server’s
network name and IP address at failover time. DNS Failover eliminates duplicate server name and IP
addresses on your network.
3 - 5
After you select the DNS Failover option, click Configure. The Configure DNS Failover window will
appear.
Configure the following information for DNS failover:
1. To add additional DNS server IP addresses, type the IP address into the DNS Server field, then
click Add.
2. The list box under the DNS Server field contains all DNS IP addresses for the source and target
servers. The label after the DNS IP address indicates whether the DNS IP address belongs to the
source, target, or both.
NOTE:To remove an IP address from the DNS server list, select the IP address, then click
the Delete button.
3. In the Source IP column, select the checkbox next to the source IP address(es) to be monitored
for failover.
4. In the Target IP column, select the target IP address to be used when failover occurs.
NOTE:If one or more IP addresses are configured for the SMTP virtual server on the target,
the first IP address will be the default target IP address for all source IP addresses.
If the target is monitoring multiple source IP addresses for failover, each monitored
source IP address must be mapped to a unique target IP address.
5. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s
affected DNS records, select the Update TTL checkbox, then enter the desired update interval
(in seconds). The default is the current TTL of the source’s A records. The recommended value is
300 seconds (5 minutes) or less.
6. In the Username field, enter the user name that will be used to access/modify DNS records.
The login account MUST be a member of the DNSAdmins group for the domain in which the DNS
server resides. For more information about permissions, see Recommended Credentials on
page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If
you enter a non-qualified name, the DNS domain will be used by default. The domain name is
obtained from the DNS server name, provided that reverse lookup in DNS is enabled. For more
information about enabling reverse lookup, refer to your Microsoft documentation.
3 - 6
7. In the Password field, enter the password that will be used to access/modify DNS records.
8. Click the Test button to validate that DNS failover is configured correctly for the selected DNS
server(s) and that the specified credentials are sufficient to update DNS.
9. When the DNS configuration is complete, click OK to save your entries and return to the
Configure Protection window.
NOTE:
If you are running Windows Server 2000 on the primary DNS server hosting zones or
domains that contain source and/or target resource records, you must have the DNS
WMI Provider installed on that DNS server.
The Dynamic updates setting for the DNS zone should be set to Secure only.
Otherwise, you must disable dynamic registration on the source server in order to
prevent the source from reclaiming its DNS record.
If a hosts file entry for the source server exists on the client machine, errors may occur
during a failover and failback.
Reverse lookup in DNS should be enabled. For more information about enabling reverse
lookup, refer to your Microsoft documentation.
DNS registration for the private (devoted to Storage Mirroring) NIC IP should be
disabled.
If your Exchange server is using a public IP address to receive email, you will have to
change the public advertised DNS MX record to reflect the target IP. Consult your
service provider for instructions.
To allow external email to be delivered to the target server when the source is
unavailable, you should create an additional external MX record for the target server.
The target MX record should have a lower priority than the source. Refer to your router
or firewall documentation for more information.
For more information about using the DNS Failover utility, access the dfo.exe help by
typing
dfo.exe /? from a command prompt.
In order to set the primary DNS server with which the Application Manager will communicate during
failover, you must launch Application Manager using the command line
option (
dtam /exchange /advanced). When launched in the Advanced context, the Client DNS
/exchange /advanced
Server field will appear on the Configure DNS Failover window. Use the Client DNS Server field to
select the primary DNS server.
Identity failover
Select this option if you want to failover by transferring the source IP address and name to the target.
When using identity failover, it is possible that a name and/or IP address conflict can occur either
during failover or when the original source server comes back online. To avoid this conflict, use DNS
Failover.
NOTE:Identity failover is not supported in clustered environments.
Application Manager cannot be used for failover or failback when the Identity failover
method is selected. However, the Failover Control Center can still be used to initiate
failover. DNS failover reduces downtime and provides other benefits. It is recommended
for most environments.
In Identity Failover, the target’s physical identity is modified to match the source during a failover.
This includes the target adopting the source server’s name, primary IP address, and drive shares
during a failover. Identity failover may be required in the following situations:
Access to the domain controller or DNS server is not available (for example, due to permissions)
from the account that Storage Mirroring runs under on the source/target servers.
If you determine that the time it takes to propagate the necessary DNS or Active Directory
changes to the rest of your environment is not acceptable. The time needed to propagate these
changes depends on your Active Directory Replication and DNS server settings.
If you have client applications that are configured to connect to an IP address rather than a server
name.
3 - 7
After you select the Identity Failover option, click Configure. The Configure Identity Failover window
will appear.
Enter the following information for Identity failover:
1. In the Source IP column, select the source IP address(es) to be monitored for failover.
2. In the Target NIC column, select the target NIC to be used when failover occurs.
3. The Target IP Addresses area displays the IP address(es) of the selected target NIC.
4. Select the IP Address checkbox if you want the specified source IP address to be monitored
(Default = selected).
NOTE:If your source and target servers are on different subnets, you should NOT failover
the IP address. Instead, if the server name is required you should choose DNS failover
with the Advanced switch and select the Server Name. For more information, see
Advanced settings on page 3-18.
5. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = NOT selected).
6. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = NOT selected).
7. Select the Active Directory Hostname (SPNs) checkbox to remove the host SPN (Service
Principle Name) from Active Directory for the source automatically and add it to Active Directory
for the target during failover (Default = NOT selected).
NOTE:You should NOT select this option when using Exchange.
8. Click OK to save your entries and return to the Configure Protection window.
Services
Application Manager will determine the appropriate Exchange services to start/stop based on your
operating system/Exchange configuration. You should only modify this selection if there are
additional services that need to be started along with Exchange during the failover/failback process.
3 - 8
Loading...
+ 133 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.