![]() |
This is the server that will become your new source when you are recovering an entire server. This server can be an existing physical or virtual machine, or Double-Take RecoverNow can provision (automatically create) a virtual machine for you during the recovery process.
Physical or existing virtual machine—If your recovery server is a physical server or an existing virtual server, it can have any of the following Windows operating system editions.
Keep in mind that a physical or existing virtual recovery server may meet these requirements but may not be suitable to recover the source in the event of a source failure. See the Target compatibility table for additional information regarding an appropriate recovery server for your particular source.
ESX 4.0.x or 4.1 or ESXi 4.0.x or 4.1 Standard, Advanced, Enterprise, or Enterprise Plus
If you are using the Standard edition of ESX 4.0 or ESXi 4.0, you must have update 1 or later.
If your source is a Windows 2008 R2 server, your ESX server must have version 3.5 update 5 or later or ESX 4.0 update 1 or later.
VirtualCenter—Although VirtualCenter is not required for the ESX versions, if you are using it, then you must use version 2.5 or later.
VMotion is only supported if you are using VirtualCenter.
Operating system version
The source and target must have the same operating system. For example, you cannot have Windows 2003 on the source and Windows 2008 on the target. The two servers do not have to have the same level of service pack or hotfix. Windows 2003 and 2003 R2 are considered the same operating system, however the Windows 2008 and 2008 R2 releases are considered different operating systems. Therefore, you can have Windows 2003 on the source and Windows 2003 R2 on the target, but you cannot have Windows 2008 on the source and Windows 2008 R2 on the target. The Windows edition (Standard, Enterprise, and so on) does not have to be the same.
The target cannot be a domain controller. Ideally, the target should not host any functionality (file server, application server, and so on) because the functionality will be removed when recovery occurs.
If your source is a domain controller, it will start in a non-authoritative restore mode after recovery. This means that if the source was communicating with other domain controllers before recovery, it will require one of those domain controllers to be reachable after recovery so it can request updates. If this communication is not available, the domain controller will not function after recovery. If the source is the only domain controller, this is not an issue.
Architecture
The source and the target must have the same architecture. For example, you cannot migrate a 32-bit server to a 64-bit server.
Processors
There are no limits on the number or speed of the processors, but the source and the target should have at least the same number of processors. If the target has fewer processors or slower speeds than the source, there will be performance impacts for the users after recovery.
Memory
The target memory should be within 25% (plus or minus) of the source. If the target has much less memory than the source, there will be performance impacts for the users after recovery.
Network adapters
You must map at least one NIC from the source to one NIC on the target. If the source has more NICs than the target, some of the source NICs will not be mapped to the target. Therefore, the IP addresses associated with those NICs will not be available after recovery. If there are more NICs on the target than the source, the additional NICs will still be available after recovery.
File system format
The source and the target must have the same file system format. For example, an NTFS volume cannot be sent to a FAT volume.
HAL type and version
The Windows hardware abstraction layer (HAL) refers to a layer of software that deals directly with your computer hardware. The HAL type and version do not have to be identical, but they must be compatible between the source and the target. If the two are incompatible, Double-Take Move will warn you. In that case, you must upgrade or downgrade the target.
System volume
The target must have the same system volume as the source. The system volume is the disk volume that contains the hardware-specific files that are needed to start Windows. The system volume might be the same volume as the boot volume, but that configuration is not required.
Logical volumes
There are no limits to the number of logical volumes, although you are bound by operating system limits. For each volume you are protecting on the source, the target must have a matching volume. For example, if you are protecting drives C: and D: on the source, the target cannot have drives D: and E:. In this case, the target must also have drives C: and D:.
System path
The source and the target must have the same system path. The system path includes the location of the Windows files, Program Files, and Documents and Settings.
Double-Take Move path
Double-Take Move must be installed on the same volume on the source and the target.
The target must have enough space to store the data from the source. This amount of disk space will depend on the applications and data files you are protecting. The more data you are protecting, the more disk space you will need.
The target must also have enough space to store, process, and apply the source's system state data. The size of the system state will depend on the operating system and architecture. Windows 2003 operating systems need at a minimum 2-3 GB of free space for the system state. Windows 2008 operating systems need at a minimum 7-9 GB of free space for the system state. Windows 2008 R2 operating systems need 10 GB of free space for the system state. These minimums are for a clean operating system installation. Operating system customizations will increase the disk space requirement.