Solved

Exch 2010 DAG and replication

Posted on 2012-04-09
9
565 Views
Last Modified: 2012-04-23
I have a network that currently has a DAG with 2 servers at the main site. Then there is a remote site with a DAG with 2 servers, then there is a standalone exch 2010 server at another remote site, and last there is another remote site which does not have an exchange server at it but would like to replicate the DAG possibly here.
So my question is, how do I or what is the best way to replicate DAGs from one site to another for DR purposes?
0
Comment
Question by:vmich
  • 4
  • 4
9 Comments
 
LVL 7

Expert Comment

by:abdulalikhan
ID: 37823474
To create a DR site depends on your requirements. But to explain DAG expansion, for each DAG a Mailbox Server should be placed at the DR site. A Single CAS/HUB should also be added to DR site to provide Client access and HUB transport depending on the number of clients and email load.

For Example, If you have 3 DAG in your environment and you want to create a DR site for every DAG, you need to put three Mailbox Servers either Physical or Virtual at DR site, plus at least a Single CAS/HUB server.
0
 

Author Comment

by:vmich
ID: 37823498
So for our setup then since we have 2 sites with a DAG with 2 servers and one site that has just a standalone exch server, the dr site would have to have 3 vm's to accomindate the DAG replication, one to each VM?
0
 
LVL 7

Expert Comment

by:abdulalikhan
ID: 37823527
If you want to create all the sites a DAG then you must set up three VM / Physical servers for Mailbox roles only.

To further Elaborate:

Site 'A': 2 Mailboxes 'DAG1'
Site 'B': 2 Mailboxes 'DAG2'
Site 'C': 1 Mailbox 'DAG3'

Every site should have CAS/HUB servers to facilitate the DAGs.

This is without DR.

With DR you just need to include at least,

3 Mailbox servers one for each DAG and at least a CAS/HUB server.
0
 
LVL 41

Expert Comment

by:Amit
ID: 37823534
Planning is very important, before setting  up DAG. In your case, you are in site mode DAG. Moving to Global DAG is complicated and might required lot of work. You need to consider lot of things, A) Bandwidth, B) Current Server, can they handle Global DAG load. etc. Better to stick to site DAG. Also you need to see, if it is worth setting up DAG over the WAN.
0
Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

 

Author Comment

by:vmich
ID: 37823559
Ok just to make sure I am on the same page as you,,
I have Site A DAG 2 servers
Site B DAG 2 servers
Site C standalone exch 2010 server.

DR Site needs:
1 VM for site A (mailbox server)
1 VM for site B(mailbox server)
then one of the above vm's in the DR site has to have CAS/HUB running on it.
That wahy with this setup, if any of my DAG's goes down, their db's would be at the DR site which would keep the mail flowing correct?
0
 
LVL 7

Accepted Solution

by:
abdulalikhan earned 500 total points
ID: 37823571
Yes, you are right but the standalone will not be replicated. We are only talking about DAG replication.

For activating the DR you require a manual intervention it cannot be automatically shifted in case of a SITE DR.
0
 

Author Comment

by:vmich
ID: 37823580
Ok so basically if a DAG site goes down, what you have to mount the DB's at the DR site to for them to be able to get their email?
0
 
LVL 7

Expert Comment

by:abdulalikhan
ID: 37823618
There is a process to do the failure and failback, I am sending you the below article to understand the DAG and failure and failback.

http://www.msexchange.org/articles_tutorials/exchange-server-2010/management-administration/planning-deploying-testing-exchange-2010-site-resilient-solution-sized-medium-organization-part1.html

You can browse directly to the DR parts if you have the general understanding.
0
 

Author Closing Comment

by:vmich
ID: 37883447
solved
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Easy CSR creation in Exchange 2007,2010 and 2013
This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
In this video we show how to create a Distribution Group in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >>…
how to add IIS SMTP to handle application/Scanner relays into office 365.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now