Information Technology Reference
In-Depth Information
FIGURE 2-4 Short-term protection
MORE INFO DPM SECONDARY SERVERS
You can learn more about DPM secondary servers at http://technet.microsoft.com/en-us/
library/jj244598.aspx .
DPM chaining
DPM chaining differs from a basic secondary DPM server configuration because not only does
the second DPM server protect the first, but the first DPM server is configured to protect the
second. Each DPM server has a set of workloads for which it functions as the primary DPM
server. Those workloads are configured for secondary protection on the partner DPM server.
For example, you have two DPM servers, SYD-DPM and MEL-DPM. In a chaining configu-
ration, you configure SYD-DPM to protect MEL-DPM, and configure MEL-DPM to protect
SYD-DPM. If you configure SYD-DPM as the primary server protecting servers SYD-FS1 and
SYD-FS2, you would configure secondary protection for SYD-FS1 and SYD-FS2 on MEL-DPM.
Similarly, if you configure MEL-DPM as the primary server protecting servers MEL-FS3 and
MEL-FS4, you would configure secondary protection for MEL-FS3 and MEL-FS4 on SYD-DPM.
 
Search WWH ::




Custom Search