Planned migration.........................................................................................................................................................4
Disaster recovery..........................................................................................................................................................4
SRM requirements............................................................................................................................................................. 5
Configure replication....................................................................................................................................................5
Install SRM software..........................................................................................................................................................6
Install the SRA software....................................................................................................................................................6
Configure SRM...................................................................................................................................................................6
Volume discovery............................................................................................................................................................... 8
Create a recovery plan.......................................................................................................................................................8
Test a recovery plan...........................................................................................................................................................9
Failover and failback...........................................................................................................................................................9
Automatic failover.............................................................................................................................................................10
Reprotection......................................................................................................................................................................10
Automated failback...........................................................................................................................................................10
3 Troubleshooting............................................................................................................................................ 11
4 Best practices.............................................................................................................................................. 14
Contents
Contents
3