Solved

SCCM Secondary site configuration

Posted on 2010-11-16
4
2,417 Views
Last Modified: 2012-06-22
Hi,

Our organization has a single domain. we have just setup an SCCM primary server and a secondary site server. My knowledge is limited with sccm so i turn to you guys for help.
Below are my questions:

1. Which is preferrable for secondary site, Branch DP or Standard DP?
2. Where do we need to setup the DP? is it under "Primary site > Site settings > Site Systems > secondary site server" or should it be under "Secondary Site > Site settings > Site Systems > secondary site server "? or what's the difference between the two locations?
3. Same question as with #2 but for proxy management point on secondary site.
4. how do we monitor if clients are using the secondary site as DP

Thanks! :)
0
Comment
Question by:sproku
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 4

Expert Comment

by:jhindson
ID: 34154793
Since you have setup a secondary site, I would suggest using a standard DP. You can have both a branch and standard DP in your secondary site if needed. Branch DPs are designed for smaller sites,  without a server. If you have a server available in the secondary site, create a Server Share on that server to function as your standard DP.

You should be able to configure a Server Share for a distribution point from either the primary or secondary site within the SCCM console. I don't believe it will make a difference where you setup the Server Share/DP, from an SCCM standpoint, as long as it's a server share pointing to a valid location. For the proxy management point, add the server role from the Primary site settings by right-clicking on the secondary server and selecting New Roles.

You can monitor the site your clients are assigned to from the All System collection. If you have properly configured your subnets and SCCM site boundaries, using the SCCM client installation property of SMSSITECODE=AUTO should automatically assign your clients to the proper SCCM site.

I hope this helps.
0
 

Author Comment

by:sproku
ID: 34160742
Thanks Jhindson,

I have here follow up questions. hope you dont mind :)

I'd like to clarify what's the difference between adding the role under the parent site's site settings and the secondary site settings?

I think for a Primary - Secondary site structure, all installed clients are automatically assigned to the Primary site. Actually my question was if there's a way or logs to look at to verify if clients belonging to the secondary site boundary are actually using its DP?
0
 
LVL 4

Accepted Solution

by:
jhindson earned 250 total points
ID: 34163326
sproku, you are correct, clients are assigned to primary sites.

I don't believe it makes any difference where the role is assigned, parent site or secondary site.

This TechNet article explains the process of a client determining the appropriate distribution point to use. http://technet.microsoft.com/en-us/library/bb632366.aspx

See this excerpt:
"The distribution points searched first will be the distribution points in the client's current site. The current site might be the client's assigned site, or a secondary site attached to its assigned site, or another site into which the client has roamed. If the content is not available in the client's current site, distribution points are searched in the client's assigned site. In this way, clients can access content only from distribution points from their current site, or their assigned site."

I can't find any documentation about how to verify the DP being used. I suggest looking at the LocationServices.log, CAS.log, Execmgr.log and ContentTransferManager.log.
0
 

Author Closing Comment

by:sproku
ID: 34163411
Thanks.. :)
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Invest in your employees with these five simple steps to improve employee engagement and retention.
Postmortem reporting allow us to examine mistakes in a way that focuses on the situational aspects of a failure’s mechanism and the decision-making process of individuals proximate to the failure. Read our guide on how to handle IT post-mortem repor…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
The view will learn how to download and install SIMTOOLS and FORMLIST into Excel, how to use SIMTOOLS to generate a Monte Carlo simulation of 30 sales calls, and how to calculate the conditional probability based on the results of the Monte Carlo …
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question