Ipswitch Failover V9.5 Administrator's Guide

Ipswitch Failover V9.5 Administrator's Guide

Administrator's Guide For Ipswitch Failover v9.5 Copyright ©1991-2016 Ipswitch, Inc. All rights reserved. This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with the terms of such license. Except as permitted by such license, no part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the express prior written consent of Ipswitch, Inc. The content of this document is furnished for informational use only, is subject to change without notice, and should not be construed as a commitment by Ipswitch, Inc. While every effort has been made to assure the accuracy of the information contained herein, Ipswitch, Inc. assumes no responsibility for errors or omissions. Ipswitch, Inc., also assumes no liability for damages resulting from the use of the information contained in this document. WS_FTP, the WS_FTP logos, Ipswitch, and the Ipswitch logo, MOVEit and the MOVEit logo, MessageWay and the MessageWay logo are trademarks of Ipswitch, Inc. Other products and their brands or company names, are or may be trademarks or registered trademarks, and are the property of their respective companies. Contents Preface: About This Book.........................................................................vii Part I: Getting Started..................................................................................9 Chapter 1: Ipswitch Failover Concepts.................................................................................11 Overview..........................................................................................................................................................11 Architecture......................................................................................................................................................11 Protection.........................................................................................................................................................13 Ipswitch Failover Networking Configuration..................................................................................................14 Ipswitch Failover Communications.................................................................................................................15 Ipswitch Failover Switchover and Failover Processes.....................................................................................17 Recovery from a Failover.................................................................................................................................20 Part II: Configuration.................................................................................21 Chapter 2: Status and Control...............................................................................................23 Using the Failover Management Service User Interface..................................................................................23 Managing Ipswitch Failover Clusters..............................................................................................................86 Review the Status of Ipswitch Failover Clusters and Groups..........................................................................86 Exit Ipswitch Advanced Management Client ..................................................................................................87 Shutdown Windows with Ipswitch Failover Installed......................................................................................87 Controlled Shutdown........................................................................................................................................87 Chapter 3: Configuring Ipswitch Failover............................................................................89 Configure Server Wizard..................................................................................................................................89 Configure Machine Identity.............................................................................................................................90 Configure Server Role......................................................................................................................................90 Change the Client Connection Port..................................................................................................................91 Configure Channel IP Routing.........................................................................................................................91 Configure the Default Channel Port.................................................................................................................92 Configure Low Bandwidth Optimization.........................................................................................................92 Configure Public IP Addressing.......................................................................................................................93 Management IP Addressing.............................................................................................................................94 Add/Remove an Ipswitch Failover License Key..............................................................................................95 Configure the Message Queue Logs................................................................................................................96 Configure Maximum Disk Usage....................................................................................................................97 Part III: Management..................................................................................99 Chapter 4: Server Protection...............................................................................................101 Overview........................................................................................................................................................101 Monitoring the Status of Servers....................................................................................................................101 Configure Ipswitch Failover Settings.............................................................................................................102 Forcing a Switchover.....................................................................................................................................106 Failover versus Switchover............................................................................................................................107 Split-brain Avoidance.....................................................................................................................................111 Ipswitch, Inc. iii Administrator's Guide Chapter 5: Network Protection............................................................................................113 Overview........................................................................................................................................................113 Configure Public Network Monitoring..........................................................................................................113 Chapter 6: Application Protection.......................................................................................117 Applications Environment..............................................................................................................................117 Applications: Summary..................................................................................................................................117 Applications: Services....................................................................................................................................121 Applications: Tasks........................................................................................................................................121 Chapter 7: Data Protection..................................................................................................125 Data: Replication............................................................................................................................................125 Part IV: Reference....................................................................................133 Appendix A: Other Administrative Tasks...................................................................135 Post Installation Configuration..............................................................................................................................135 Configure the VmAdapter Plug-in.................................................................................................................135 Adding an Additional Network Interface Card..............................................................................................136 Business Application Groups................................................................................................................................137 Installing the Business Application Plug-in...................................................................................................137 Creating a Business Application Group.........................................................................................................138 Editing a Business Application Group...........................................................................................................143

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    182 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us