Solved

Secondary DPM Configuration

Posted on 2013-01-06
2
761 Views
Last Modified: 2013-06-12
Hello All,

I am currently trying to configure a secondary DPM (both are 2012) to protect our primary server.

I am not receiving any errors but am not sure what configuration decisions to make.

Currently our Primary DPM is configured to protect itself. With the addition of a Secondary DPM, should I stop that?

When I attempt to protect the PDPM's C: from SDPM, It discovers the mount points for all of the replicas protected by PDPM, and asks to add these, should I?

After passing those messages, I am advised that the source (C:) cannot be protected because it is protected on the primary server.

my PDPM currently protects its own C: and system state.

Should I unprotect C: on the primary so I can do it from the Secondary, and do I need to add those mount points?

I have been unable to find a good configuration guide online, other than paraphrasing of  "protect the bits you want", which is not technical enough!

Thanks.
0
Comment
Question by:FCAustralia
  • 2
2 Comments
 
LVL 9

Assisted Solution

by:Sandeep Gupta
Sandeep Gupta earned 500 total points
ID: 38754865
0
 
LVL 9

Accepted Solution

by:
Sandeep Gupta earned 500 total points
ID: 38754874
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
New Windows 7 Installations take days for Windows-Updates to show up and install. This can easily be fixed. I have finally decided to write an article because this seems to get asked several times a day lately. This Article and the Links apply to…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question