HP StorageWorks Storage Mirroring Data Migration user's guide (T2558-96333, May 2009)

20 of 49
Migrating a source to an existing target
Use the following instructions to migrate a source to an existing physical or virtual target.
1. Click Migrate Server from the left navigation pane.
2. Identify the source server that you want to migrate.
Server—Specify the name of the source server. You can also click Browse
to select the name from Active Directory or from a network drill-down list.
User name—Specify a user that is a member of the Double-Take Admin
security group on the source. If your source is the only domain controller in
your network, the account must also be a local account in the local
administrators group.
Password—Specify the password associated with the User name you
entered.
Domain—If you are working in a domain environment, specify the Domain.
3. Click Next to continue.
4. Identify the target server. This is the server that, after the migration, will become
your new source.
Provision a new virtual machine for this migration—Do not select this
option. This option is only for migrating to an automatically provisioned (non-
existing) virtual machine hosted on a VMware ESXserver or a Hyper-V
server.
Server—Specify the name of the existing target server. You can also click
Browse to select the name from Active Directory or from a network drill-down
list.
User name—Specify a user that is a member of the Double-Take Admin
security group on the target. If your source is the only domain controller in
your network, the account must also be a local account in the local
administrators group.
Password—Specify the password associated with the User name you
entered.
Domain—If you are working in a domain environment, specify the Domain.
5. Click Next to continue.
6. By default, Storage Mirroring Data Migration selects your entire source for
migration. It automatically excludes particular files that cannot be used during the
migration. If desired, you can exclude other files that you do not want to migrate,
but be careful when excluding data. Excluded volumes, folders, and/or files may
compromise the integrity of your installed applications. There are some volumes,