
II
O
one-to-many
configuration 1-10
one-to-one
configuration 1-7, 1-8
orphan files 11-6
overview
operations 1-3
product 1-1
P
Performance Monitor 19-36
ports
Failover Control Center 3-7
overview 7-1
server 20-5
Q
queuing 10-9, 10-10, 20-6
R
refresh rate 3-7
remirroring
options compared 11-4
reparse points 4-3
replication
capabilities 4-3
overview 1-4
starting 11-7
replication set
copying 4-7
creating 4-5, 4-6
deleting 4-7
modifying 4-7
renaming 4-7
replication capabilities 4-3
size 4-8
resources 1-14
restoration
disaster recovery 16-1
high availability 18-1
overview 1-6
return values 21-1
routers 17-2
S
scripts
credentials 20-14
mirroring 11-5
security
credentials
Failover Control Center 3-7
Management Console 22-3
groups 22-5
how it works 22-2
overview 22-1
service 22-4
security by name 20-8
server properties
database 20-12
e-mail notification 20-15
general 20-2
licensing 20-3
logging 20-13
network 20-5
queue 20-6
script credentials 20-14
setup 20-4
source 20-8
target 20-10
service 22-4
setup settings 20-4
shares
Macintosh 17-9
NFS 17-10
updating 17-17
simulating a connection 9-1
single server
configuration 1-12
SMTP server 20-15
snapshots
automatic 14-4
manual controls 14-5
overview 14-1, 14-2
scheduling 14-5
SNMP 19-39
source settings 20-8
sparse files 4-3
statistics
DTStat 19-29
log 20-13
Performance Monitor 19-36
SNMP 19-39
system information 9-1
system requirements 2-1
T
target controls 13-1
target path blocking 10-14
target settings 20-10
task command
processing 20-4
TDU 9-1
Throughput Diagnostics
Utility 9-1
transmission
controls 13-1
manual controls 13-1
overview 13-1
scheduling 13-2
U
uninstall
uninstalling 2-9
uninstalling
automatically 2-10
upgrade
notes 2-3
upgrading 2-4
upgrading automatically 2-6
V
verification
log 12-3, 20-13
manual control 12-1
overview 12-1
scheduling 12-2
version interoperability 2-3
virtual server
configuration 1-13
virus protection 4-2
W
Windows NT security by
name 20-8
WINS 17-3
workspaces 3-6
Komentarze do niniejszej Instrukcji