SlideShare a Scribd company logo
Vinod Subramaniam Clearthought Systems Inc
[object Object],[object Object],[object Object]
[object Object]
1. Click “Hosts”  in the Resources menu  2. Click the host which has the production LUN that is  to be mirrored using HUR to the DR site
1. Click unpaired to see the LUNs that are to be copied to    the DR site
1. LDEV  0:3C is mapped to ports CL3-B and CL4-B.  Select    the first path and the “Pair management “  button will be   enabled.
1. Click “Pair  Management “ to enter the    Pair Management wizard
1. Click “Next“ to set up the Pair Associations
1. Click “Add Group“ to set up the Pair Group Name
1. Enter the Pair Group Name and select copy type as UR and click OK.
1. Enter the S-VOL Information and click Add Selection
1. Click Next to move to the Group Management step
1. Click Create Group to set up the Copy    Group details
1. Setup Site Information, CCI Server Instances and click OK
1. Review PAIR information carefully and click next.
1. Click the edit icon to change Journal Options and scheduling parameters
1. Set the Execution time and click Pair Setting to setup Journal Group Options
1. Set the Copy Pace, Journal Groups and click OK after reviewing the information carefully
1. Set the Copy Pace, Journal Groups and click OK after reviewing the information carefully
1. At this point you can either click save to create a workflow or next to execute or schedule the task.
1. Review the confirmation carefully, scroll down and select the confirmation checkbox and click confirm
1. Click Finish and navigate to the tasks menu option to check the status of the task
1. Status of  Task TASK007 must be either executing or scheduled.

More Related Content

Similar to Pair Management With Hi Command Replication Manager 6

E book Microsoft Dynamics CRM 2013 Personal Dashboard for End Users
E book Microsoft Dynamics CRM 2013 Personal Dashboard for End UsersE book Microsoft Dynamics CRM 2013 Personal Dashboard for End Users
E book Microsoft Dynamics CRM 2013 Personal Dashboard for End Users
Aileen Gusni
 
Hyper v server configuration tool guide v 1.2
Hyper v server configuration tool guide v 1.2Hyper v server configuration tool guide v 1.2
Hyper v server configuration tool guide v 1.2
PSD Solutions .....
 
Epm live 4.3_installation_guide
Epm live 4.3_installation_guideEpm live 4.3_installation_guide
Epm live 4.3_installation_guideazurise
 
Nintex installation guide
Nintex installation guideNintex installation guide
Nintex installation guideparallelminds
 
Mcafee Epolicy Orchestrator
Mcafee Epolicy OrchestratorMcafee Epolicy Orchestrator
Mcafee Epolicy OrchestratorMindRiver Group
 
199 sap-co-configuration-guide
199 sap-co-configuration-guide199 sap-co-configuration-guide
199 sap-co-configuration-guide
ambrish nigam
 
SAP CO CONFIGURATION
SAP CO CONFIGURATIONSAP CO CONFIGURATION
SAP CO CONFIGURATION
PKVINCENT
 
03 setting up database server sample
03   setting up database server sample03   setting up database server sample
03 setting up database server sample
Sarath Chandra Aravapalli
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
Mahmmoud Mahdi
 
Dynamics 365 self hosting bots
Dynamics 365 self hosting botsDynamics 365 self hosting bots
Dynamics 365 self hosting bots
Amit Patil
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and GroupsSyAM Software
 
Installation And Administration of Pentaho
Installation And Administration of PentahoInstallation And Administration of Pentaho
Installation And Administration of Pentaho
pentaho Content
 
Pentaho: Installation And Administration
Pentaho: Installation And AdministrationPentaho: Installation And Administration
Pentaho: Installation And Administration
DataminingTools Inc
 
Bpc 10.0 NW Mass User Management tool
Bpc 10.0 NW Mass User Management toolBpc 10.0 NW Mass User Management tool
Bpc 10.0 NW Mass User Management tool
Shanmugam Veerichetty
 
Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...
Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...
Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...
Gestion-Ressources Inc.
 
red_hat_enterprise_linux-7-system_administrators_guide-en-us.pdf
red_hat_enterprise_linux-7-system_administrators_guide-en-us.pdfred_hat_enterprise_linux-7-system_administrators_guide-en-us.pdf
red_hat_enterprise_linux-7-system_administrators_guide-en-us.pdf
milton674800
 
PayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP SoftwarePayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP Software
Ranganath Shivaram
 

Similar to Pair Management With Hi Command Replication Manager 6 (20)

E book Microsoft Dynamics CRM 2013 Personal Dashboard for End Users
E book Microsoft Dynamics CRM 2013 Personal Dashboard for End UsersE book Microsoft Dynamics CRM 2013 Personal Dashboard for End Users
E book Microsoft Dynamics CRM 2013 Personal Dashboard for End Users
 
Hyper v server configuration tool guide v 1.2
Hyper v server configuration tool guide v 1.2Hyper v server configuration tool guide v 1.2
Hyper v server configuration tool guide v 1.2
 
Epm live 4.3_installation_guide
Epm live 4.3_installation_guideEpm live 4.3_installation_guide
Epm live 4.3_installation_guide
 
Nintex installation guide
Nintex installation guideNintex installation guide
Nintex installation guide
 
Mcafee Epolicy Orchestrator
Mcafee Epolicy OrchestratorMcafee Epolicy Orchestrator
Mcafee Epolicy Orchestrator
 
199 sap-co-configuration-guide
199 sap-co-configuration-guide199 sap-co-configuration-guide
199 sap-co-configuration-guide
 
SAP CO CONFIGURATION
SAP CO CONFIGURATIONSAP CO CONFIGURATION
SAP CO CONFIGURATION
 
Sap hr
Sap hrSap hr
Sap hr
 
03 setting up database server sample
03   setting up database server sample03   setting up database server sample
03 setting up database server sample
 
Lesson 10: Managing Printers
Lesson 10: Managing PrintersLesson 10: Managing Printers
Lesson 10: Managing Printers
 
Migration Suite
Migration SuiteMigration Suite
Migration Suite
 
Dynamics 365 self hosting bots
Dynamics 365 self hosting botsDynamics 365 self hosting bots
Dynamics 365 self hosting bots
 
Configuring Sites, Users and Groups
Configuring Sites, Users and GroupsConfiguring Sites, Users and Groups
Configuring Sites, Users and Groups
 
FailOver Clustring
FailOver ClustringFailOver Clustring
FailOver Clustring
 
Installation And Administration of Pentaho
Installation And Administration of PentahoInstallation And Administration of Pentaho
Installation And Administration of Pentaho
 
Pentaho: Installation And Administration
Pentaho: Installation And AdministrationPentaho: Installation And Administration
Pentaho: Installation And Administration
 
Bpc 10.0 NW Mass User Management tool
Bpc 10.0 NW Mass User Management toolBpc 10.0 NW Mass User Management tool
Bpc 10.0 NW Mass User Management tool
 
Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...
Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...
Manuel pour le module d'exportation des données comptables d'OpenERP vers Sag...
 
red_hat_enterprise_linux-7-system_administrators_guide-en-us.pdf
red_hat_enterprise_linux-7-system_administrators_guide-en-us.pdfred_hat_enterprise_linux-7-system_administrators_guide-en-us.pdf
red_hat_enterprise_linux-7-system_administrators_guide-en-us.pdf
 
PayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP SoftwarePayrollAdmin - Attendance and Payroll Management ERP Software
PayrollAdmin - Attendance and Payroll Management ERP Software
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Pair Management With Hi Command Replication Manager 6

  • 2.
  • 3.
  • 4. 1. Click “Hosts” in the Resources menu 2. Click the host which has the production LUN that is to be mirrored using HUR to the DR site
  • 5. 1. Click unpaired to see the LUNs that are to be copied to the DR site
  • 6. 1. LDEV 0:3C is mapped to ports CL3-B and CL4-B. Select the first path and the “Pair management “ button will be enabled.
  • 7. 1. Click “Pair Management “ to enter the Pair Management wizard
  • 8. 1. Click “Next“ to set up the Pair Associations
  • 9. 1. Click “Add Group“ to set up the Pair Group Name
  • 10. 1. Enter the Pair Group Name and select copy type as UR and click OK.
  • 11. 1. Enter the S-VOL Information and click Add Selection
  • 12. 1. Click Next to move to the Group Management step
  • 13. 1. Click Create Group to set up the Copy Group details
  • 14. 1. Setup Site Information, CCI Server Instances and click OK
  • 15. 1. Review PAIR information carefully and click next.
  • 16. 1. Click the edit icon to change Journal Options and scheduling parameters
  • 17. 1. Set the Execution time and click Pair Setting to setup Journal Group Options
  • 18. 1. Set the Copy Pace, Journal Groups and click OK after reviewing the information carefully
  • 19. 1. Set the Copy Pace, Journal Groups and click OK after reviewing the information carefully
  • 20. 1. At this point you can either click save to create a workflow or next to execute or schedule the task.
  • 21. 1. Review the confirmation carefully, scroll down and select the confirmation checkbox and click confirm
  • 22. 1. Click Finish and navigate to the tasks menu option to check the status of the task
  • 23. 1. Status of Task TASK007 must be either executing or scheduled.