To deny a request without reviewing it, see Ignoring a replication request from a customer.
1. |
3. |
The Pending Replication Requests section appears.
The Review Replication Request window appears.
5. |
For more information about replication requests, see Reviewing a replication request from a customer.
Complete the following procedure to ignore a replication request from a customer.
1. |
3. |
The Pending Replication Requests section appears.
5. |
For more information about replication, see Replication and Replicating to a self-managed target Core.
1. |
2. |
3. |
On the Protected Machines page, select the protected machines you want to replicate, and then use the drop-down lists in the Repository column to select a repository for each protected machine. |
a. |
On the Protected Machines page of the Replication Wizard, select Use a seed drive to perform initial transfer. |
▪ |
If you currently have one or more protected machines replicating to a target Core, you can include these machines on the seed drive by selecting the option Include already replicated recovery points in the seed drive. |
b. |
c. |
On the Seed Drive Location page of the wizard, use the Location type drop-down list to select from the following destination types: |
▪ |
▪ |
▪ |
d. |
e. |
f. |
On the Seed Drive Options page of the wizard, enter the information as described in the following table. |
| |||
In the event the path already contains a seed drive, select one of the following options: | |||
|
▪ |
▪ |
h. |
On the Protected Machines page of the wizard, select the protected machines you want to replicate to the target Core using the seed drive. |
5. |
Complete the follow procedure to consume the data from the seed drive file on the target Core.
2. |
On the target Core, open the Rapid Recovery Core Console, and from the icon bar, click |
3. |
On the Replication page, under Incoming Replication, click the drop-down menu for the correct source Core, and then select Consume. |
The Consume dialog box appears.
4. |
◦ |
◦ |
◦ |
5. |
Enter the user name. It is used to establish logon credentials for the network share. | ||||
Select an account from the drop-down list. | ||||
Select a container associated with your account from the drop-down menu. | ||||
6. |
The Core searches for the file.
After finding the file, the following text boxes appear in the Consume window, pre-populated with the data gathered from Step 4, Step 5, and the file. The Date Range displays the dates of the oldest and newest recovery points contained in the seed drive. Any comments entered when the seed drive was created are automatically imported.
7. |
8. |
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy