Index_C


C

Capacity scalability, 17

Certificate Authority (CA), 345

Certificates defined, 344

in message content security, 344–46

revocation checking, 346

services, 344–46

trust list, 345

Checkpoint file, 85

Circular logging, 85–87

defined, 85

disabling, 85–86

functioning of, 86

See also Logging

Clones, 137–38

defined, 137

technology, 227–32

technology, using, 175

technology illustration, 138

See also snapshots

Cluster Administrator, 283

illustrated, 284

running, 281

Clustering

Active/Active, 276, 277

Active/Passive, 276, 277

complexity effects, 275

as downtime solution, 274

geo, 290–91

high availability and, 241–42

as high-priority requirement, 241

history lesson, 257–72

Microsoft three-pronged approach, 245–47

problems not solved by, 244

problem solving and, 243–44

ROI justification, 275

SGs and, 57

technology, 379–80

Cluster management

best practices, 287–94

memory, 68, 264–66

tools and monitoring, 287–89

Clusters

binaries removal, 292

decision points, 273–75

defined, 241

design scenarios, 289–90

design utilizing mount points, 279

disaster recovery, 294–96

drive letter limitations, 279–80

failover, improving, 266–67

failover modes, 255

four-node configuration, 280

in-place/rolling upgrade strategy, 285–86

installation, 280–85

installing Exchange 2000/2003 Server in, 282

IP addressing and naming, 291

leveraging, 241–96

managing, 267–70

migrating to, 285–87

monitoring, 288

monitoring and memory-management

improvements, 268

mount points utilization, 294

move mailbox strategy, 286–87

MSCS, 249

NLB, 246

permissions model, 269

resources, 249–50, 292

shared-nothing, 248

storage design, 275–80

storage design before configuration, 293–94

stretched, 224

successful deployment of, 272–96

supported components, 271–72

terminology, 251–52

two-node configuration, 281

upgrading to, 285–87

virtual server removal, 292

Windows technology fundamentals, 244–57

CNI study, 31, 32, 33, 34

Compaq Insight Manager (CIM), 372

Component Load Balancing (CLB), 246–47

defined, 246

LOB application focus, 247

See also Clustering

Computer Management tool, 369

Configuration management, 20, 370–73

challenges, 371

defined, 352

practices, 371

See also Proactive management

Contact information worksheet, 178

Content indexing, 89–90

Corruption

logical, 104–5

physical, 98–100




Mission-Critical Microsoft Exchange 2003. Designing and Building Reliable Exchange Servers
Mission-Critical Microsoft Exchange 2003: Designing and Building Reliable Exchange Servers (HP Technologies)
ISBN: 155558294X
EAN: 2147483647
Year: 2003
Pages: 91
Authors: Jerry Cochran

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net