When you configure DHCP snooping on your switch, you are enabling the switch to differentiate untrusted interfaces from trusted interfaces. You must enable DHCP snooping globally before you can use DHCP snooping on a VLAN. You can enable DHCP snooping independently from other DHCP features.
Once you have enabled DHCP snooping, all the DHCP relay information option configuration commands are disabled; this includes the following commands:
•ip dhcp relay information check
•ip dhcp relay information policy
•ip dhcp relay information option
•ip dhcp relay information trusted
•ip dhcp relay information trust-all
These sections describe how to configure DHCP snooping:
DHCP snooping is disabled by default. Table 19-1 shows all the default configuration values for each DHCP snooping option.
Table 19-1 Default Configuration Values for DHCP Snooping
Option
Default Value/State
DHCP snooping
Disabled
DHCP snooping information option
Enabled
DHCP snooping limit rate
Infinite (functions as if rate limiting were disabled)
DHCP snooping trust
Untrusted
DHCP snooping vlan
Disabled
If you want to change the default configuration values, see the "Enabling DHCP Snooping" section.
Enabling DHCP Snooping
To enable DHCP snooping, perform this task:
Command
Purpose
Step 1
Switch(config)# ip dhcp snooping
Enables DHCP snooping globally.
You can use the no keyword to disable DHCP snooping.
Step 2
Switch(config)# ip dhcp snoopingvlannumber
[number]
Enables DHCP snooping on your VLANs.
Step 3
Switch(config)# ip dhcp snoopinginformation
option
Enables DHCP Option 82 data insertion.
Step 4
Switch(config-if)# ip dhcp snoopingtrust
Configures the interface as trusted or untrusted.
You can use the no keyword of to configure an interface to receive only messages from within the network.
Step 5
Switch(config-if)# ip dhcp snoopinglimit rate
rate
Configures the number of DHCP packets per second (pps) that an interface can receive.
Note You may not want to configure untrusted rate limiting to more than 100 pps.
Normally, the rate limit applies to untrusted interfaces. If you want to set up rate limiting for trusted interfaces, keep in mind that trusted interfaces aggregate all DHCP traffic in the switch, and you will need to adjust the rate limit to a higher value.
Step 6
Switch(config)# end
Exits configuration mode.
Step 7
Switch# show ip dhcp snooping
Verifies the configuration.
You can configure DHCP snooping for a single VLAN or a range of VLANs. To configure a single VLAN, enter a single VLAN number. To configure a range of VLANs, enter a beginning and an ending VLAN number.
This example shows how to enable DHCP snooping on VLANs 10 through 100:
Switch# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# ip dhcp snooping
Switch(config)# ip dhcp snooping vlan 10 100
Switch(config)# ip dhcp snooping information option
Switch(config-if)# ip dhcp snooping trust
Switch(config-if)# ip dhcp snooping limit rate 100
Switch(config)# end
Switch# show ip dhcp snooping
DHCP Snooping is configured on the following VLANs:
10 30-40 100 200-220
Insertion of option 82 information is enabled.
Interface Trusted Rate limit (pps)
--------- ------- ----------------
FastEthernet2/1 yes 10
FastEthernet2/2 yes none
FastEthernet3/1 no 20
Switch#
Configuring DHCP Snooping on Private VLAN
DHCP snooping can be enabled on private VLANs, which provide isolation between Layer 2 ports within the same VLAN. If DHCP snooping is enabled (or disabled), the configuration is propagated to both the primary VLAN and its associated secondary VLANs; you cannot enable (or disable) DHCP snooping on a primary VLAN without reflecting this configuration change on the secondary VLANs.
Configuring DHCP snooping on a secondary VLAN is still allowed, but it will not take effect if the associated primary VLAN is already configured. If this is the case, the effective DHCP snooping mode on the secondary VLAN is derived from the corresponding primary VLAN. Manually configuring DHCP snooping on a secondary VLAN will cause the switch to issue the error message:
DHCP Snooping configuration may not take effect on secondary vlan XXX
The command show ip dhcp snooping will display all VLANs with DHCP snooping enabled, including both primary VLANs and their corresponding secondary VLANs.
Displaying DHCP Snooping Information
You can display a DHCP snooping binding table and configuration information for all interfaces on a switch.
Displaying a Binding Table
The DHCP snooping binding table for each switch contains binding entries that correspond to untrusted ports. It does not contain information about hosts interconnected with a trusted port, because each interconnected switch will have its own DHCP snooping binding table.
This example shows how to display the DHCP snooping binding information for a switch.
Switch# show ip dhcp snooping binding
MacAddress IP Address Lease (seconds) Type VLAN Interface
중요 이 문서에서는 컴퓨터에서 보안 설정 수준을 낮추거나 보안 기능을 해제하는 방법에 대해 설명합니다. 특정 문제를 해결하기 위해 이와 같이 변경할 수 있습니다. 이렇게 변경하기 전에 특정 환경에서 이러한 문제 해결 방법을 사용하는 것과 관련된 위험을 평가하는 것이 좋습니다. 이 해결 방법을 사용하는 경우 적절한 시스템 보호 조치를 추가로 취하십시오. 경고 이 해결 방법으로 인해 컴퓨터나 네트워크가 악의 있는 사용자나 바이러스 같은 악의 있는 소프트웨어의 공격에 취약해질 수 있습니다. 이 해결 방법을 권장하지는 않지만 사용자 판단에 따라 해결 방법을 구현할 수 있도록 이에 대한 정보를 제공하고 있습니다. 이 해결 방법의 사용에 따른 모든 책임은 사용자에게 있습니다. 참고 바이러스 백신 프로그램은 컴퓨터를 바이러스로부터 보호하도록 설계되었습니다. 바이러스 백신 프로그램이 해제되었을 때 신뢰하지 않는 원본으로부터 파일을 다운로드하거나 열거나, 신뢰하지 않는 웹 사이트를 방문하거나, 전자 메일 첨부 파일을 열지 말아야 합니다.
컴퓨터 바이러스에 대한 자세한 정보는 Microsoft 기술 자료의 다음 문서를 참조하십시오.
129972 (http://support.microsoft.com/kb/129972/) 컴퓨터 바이러스: 설명, 예방 및 복구
요약
본 문서에서는 바이러스 백신 소프트웨어가 설치된 Microsoft Exchange Server 컴퓨터 문제 해결에 대한 권장 사항을 설명합니다.
추가정보
파일기반바이러스백신소프트웨어
Exchange 컴퓨터에 파일 기반 검색 바이러스 백신 소프트웨어를 설치할 수 있습니다. 그러나 Exchange 컴퓨터의 프로그램과 데이터베이스 파일에 대한 검색은 절대 실행하지 마십시오.
또한 Exchange 2000 서버의 IFS(설치 가능 파일 시스템) 드라이브(M 드라이브)에 대해서도 검색을 실행하지 마십시오. 이렇게 할 경우 바이러스에 대한 잘못된 보고서를 받을 수 있으며 파일을 치료하려고 시도하면 Exchange 2000 데이터베이스가 손상될 수 있습니다.
Exchange 2000에서 드라이브 M은 Exchange IFS를 위한 편리한 레이블입니다. Exchange IFS를 사용하면 Exchange 정보 저장소를 파일 시스템으로 보고 사용할 수 있습니다. 참고 M 드라이브는 M 이외의 문자를 사용할 수 있습니다. 이 드라이브는 일반적으로 M 드라이브로 참조되지만, 문자 M을 이미 사용 중이면 이 드라이브에는 다른 드라이브 문자가 사용됩니다. M 드라이브의 바이러스 백신 검색으로 인해 발생하는 문제에 대한 자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
299046 (http://support.microsoft.com/kb/299046/) XADM: 일정 항목이 사용자 폴더에서 사라진다
상황에 따라 Exchange IFS에 추가 문제가 발생할 수 있습니다. 자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
305145 (http://support.microsoft.com/kb/305145/) HOWTO: XADM: M 드라이브에서 IFS 매핑 제거
Exchange 컴퓨터에서 파일 기반 바이러스 검색 프로그램을 실행해야 하는 경우 예약된 검색과 실시간 검색에서 Exchange 관련 파일과 폴더를 제거하십시오. Exchange 2000 실행 파일의 파일 기반 검색은 지원됩니다. 중요 Exchange 데이터베이스, 로그, 임시 파일, IIS 시스템 파일 또는 IFS 드라이브(M 드라이브)에 대해서는 파일 기반 검색 소프트웨어를 실행하지 마십시오. 이러한 파일이 들어 있는 폴더를 검색하지 않도록 바이러스 백신 소프트웨어를 구성하십시오.
Exchange 컴퓨터의 운영 체제와 Exchange 프로그램 파일(Exchsrvr\Bin 폴더)에 대해서는 파일 기반 바이러스 백신 소프트웨어를 실행할 수 있지만 다음 폴더의 파일에 대해서는 파일 기반 바이러스 백신 소프트웨어를 실행하지 마십시오.
•Exchange 데이터베이스 및 로그 파일
•Exchange .mta 파일(기본 위치: \Exchsrvr\Mtadata)
•Exchange 메시지 추적 로그 파일(기본 위치: \Exchsrvr\Server_Name.log).
•가상 서버 폴더(기본 위치: \Exchsrvr\Mailroot)
•SRS(사이트 복제 서비스) 파일(기본 위치: \Exchsrvr\Srsdata)
•IIS(인터넷 정보 서비스) 시스템 파일(기본 위치: \%SystemRoot%\System32\Inetsrv)
•인터넷 메일 커넥터 파일(기본 위치: \Exchsrvr\IMCData)
•메시지 변환에 사용된 스트리밍 임시 파일을 저장하는 데 사용되는 작업 폴더. 기본적으로 이 작업 폴더는 \Exchsrvr\MDBData에 있습니다.
•Eseutil.exe 같은 오프라인 유지 관리 유틸리티에 함께 사용되는 임시 폴더. 기본적으로 이 폴더는 .exe 파일이 실행되는 위치이지만 유틸리티를 실행할 때 이 위치를 구성할 수 있습니다.
다음 폴더에 대해서는 파일 기반 검색을 실행할 수 있습니다.
•Exchsrvr\Address
•Exchsrvr\Bin
•Exchsrvr\Exchweb
•Exchsrvr\Res
•Exchsrvr\Schema
운영 체제와 Exchange를 업그레이드하는 동안 임시로 파일 기반 검색 소프트웨어를 해제하십시오. 여기에는 Exchange 또는 운영 체제의 새로운 버전으로 업그레이드하고 Exchange 또는 운영 체제 수정 프로그램이나 서비스 팩을 적용하는 것이 포함됩니다.
Exchange 또는 운영 체제 제품을 업그레이드하거나 서비스 팩 또는 수정 프로그램을 적용하는 경우, 업데이트나 업그레이드를 수행하기 전에 타사 서비스, 하드웨어 공급업체 및 운영 체제 모니터, 에이전트 또는 Exchange 모니터를 모두 중지하고 해제하는 것이 일반적입니다. 또한 성능 모니터, Microsoft나 타사 백업 프로그램 및 Microsoft SNMP(Simple Network Management Protocol)를 중지하고 해제하십시오. 그런 다음 업그레이드나 수정 프로그램을 적용하기 전에 Exchange 컴퓨터를 다시 시작하십시오. 이렇게 하면 업데이트 프로세스가 액세스해야 하는 파일이 잠기는 것이 방지됩니다. 중요 이 절차에는 Exchange나 운영 체제의 모든 버전을 업그레이드하기 전과 Exchange나 운영 체제 서비스 팩 또는 수정 프로그램을 적용하기 전에 파일 기반 검색 바이러스 백신 소프트웨어를 비롯한 모든 바이러스 백신 프로그램을 중지하고 해제하는 것도 포함됩니다.
Exchange 정보저장소검색소프트웨어
Microsoft는 다른 제조업체가 정보 저장소를 검색하는 바이러스 백신 프로그램을 작성하는 데 사용할 수 있는 API(응용 프로그래밍 인터페이스)를 제공합니다. 이런 종류의 소프트웨어가 Exchange 컴퓨터에서 실행되고 있고 문제가 발생하는 경우 문제를 조사하고 일반적인 문제 해결 절차를 수행하십시오. 이러한 절차를 수행해도 문제가 해결되지 않으면 바이러스 백신 소프트웨어를 임시로 해제하거나 제거하여 문제의 원인인지 확인하십시오. 바이러스 백신 소프트웨어가 문제의 원인이 아니면 바이러스 백신 소프트웨어를 다시 설정할 수 있습니다.
바이러스 백신 소프트웨어를 해제하거나 제거한 후에 문제가 발생하지 않는 경우 바이러스 백신 소프트웨어 제조업체에 최신 업데이트가 있는지 문의하십시오. 소프트웨어의 최신 업데이트로도 문제가 해결되지 않으면 바이러스 백신 소프트웨어 제조업체 및 Microsoft와 계속 협력하여 문제 해결 방법을 찾으십시오.
자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
241855 (http://support.microsoft.com/kb/241855/) 이벤트 ID 145가 발생하면서 정보 저장소가 시작되지 않는다
이 문서에 나와 있는 다른 공급업체 제품은 Microsoft와 무관한 회사에서 제조한 것입니다. Microsoft는 이들 제품의 성능이나 신뢰성에 관하여 명시적이든 묵시적이든 어떠한 보증도 하지 않습니다.
파일 기반 검색 프로그램에서 검사점(.chk) 파일이 포함된 폴더를 제외합니다. 참고Exchange 데이터베이스와 로그 파일을 새 위치로 이동하고 해당 폴더를 제외하는 경우에도 .chk 파일이 계속 검색될 수 있습니다. .chk 파일을 검색하는 경우에 발생할 수 있는 문제에 대한 자세한 내용은 Microsoft 기술 자료의 다음 문서를 참조하십시오.
253111 (http://support.microsoft.com/kb/253111/) Exchange Server 데이터베이스 서비스에 자체 .edb 파일이나 .chk 파일에 대한 쓰기 액세스가 거부되면 오류 이벤트가 기록된다
176239 (http://support.microsoft.com/kb/176239/) XADM: 데이터베이스가 시작되지 않는다. 순환 로깅이 로그 파일을 너무 빨리 삭제했다
Unable to resend the message. The nondelivery report does not contain sufficient information about the original message. To resend the message, open it in your Sent Items folder, click the Actions menu, and click "Resend this message".
Option to strip attachments for messages that generate an NDR
KB문서
Article ID : 308303
Last Review : February 28, 2007
Revision : 2.2
This article was previously published under Q308303
Important This article contains information about how to modify the registry. Make sure to back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:
256986 (http://support.microsoft.com/kb/256986/) Description of the Microsoft Windows registry
SUMMARY
This article describes an option that you can enable on a computer that is running Exchange 2000 Service Pack 2 (SP2) or later to remove attachments if a message cannot be delivered. For more information about the latest service pack for Microsoft Exchange 2000 Server, click the following article number to view the article in the Microsoft Knowledge Base:
301378 (http://support.microsoft.com/kb/301378/) How to obtain the latest Exchange 2000 Server service pack
Note Starting with Microsoft Exchange Server 2003 Service Pack 1 (SP1), Exchange Server will automatically remove an attachment that is 10 megabytes (MB) from DSN messages that are generated by the SMTP engine. The registry key that is specified in the "More Information" section can be used to modify the default behavior.
MORE INFORMATION
If you enable this option, you can save server and network resources. However, there are drawbacks to this implementation of Simple Mail Transfer Protocol (SMTP) attachment stripping. If you enable this option to strip the attachments from the non-delivery report (NDR), the details that are necessary to display the notification in the preview pane are also stripped, and the originator of the message cannot use the Send Again option. If the originator of the message tries to use the Send Again option from the NDR, the originator of the message receives the following error message:
Unable to resend the message. The nondelivery report does not contain sufficient information about the original message. To resend the message, open it in your Sent Items folder, click the Actions menu, and click "Resend this message".
However, the originator of the message cannot resend the message, even by using the method in the error message.
To enable this option, you need to edit the registry. Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.
To enable this option:
1.Start Registry Editor (Regedt32.exe).
2.Locate and click the following key in the registry:
3.On the Edit menu, click Add Key, add the following registry key, and then click OK:
Key name: Queuing
Class: Leave the class blank
4.Click the Queuing registry key that you just added. On the Edit menu, click Add Value, and then add the following registry value:
Value name: MaxDSNSize
Data type: REG_DWORD
Radix: Decimal
Value data: This value is the size limit in bytes; messages that are larger than this value that generate an NDR do not return attachments or full message properties.
5.Close Registry Editor.
You must restart the SMTP service for this registry change to take effect.
APPLIES TO
•Microsoft Exchange 2000 Server Standard Edition
•Microsoft Exchange Server 2003 Enterprise Edition
사서함 메세지 용량에는 항상 한계가 있기 마련이라 용량 이슈가 생기게 되면 PST 파일로 백업을 받아야 합니다.
자동 보관?
메일을 만들고 받으면서 Microsoft Outlook 사서함이 점차 커집니다. 사서함을 관리할 수 있도록 유지하려면 중요하지만 자주 사용하지 않는 오래된 항목을 저장(보관)할 다른 장소가 필요합니다. 또한 이러한 오래된 항목을 자동으로 보관 위치로 이동하는 방법과 내용이 만료되고 더 이상 유효하지 않은 항목을 자동으로 삭제할 방법이 필요합니다. 자동 보관으로 이러한 과정을 모두 처리할 수 있습니다.
자동 보관은 기본적으로 켜져 있으며 지정된 간격으로 자동 실행되어 오래되거나 만료된 항목을 폴더에서 삭제합니다. 지정된 보관 기간이 되면 오래된 항목이 되며 할당받은 프로젝트의 목표에 대한 내용이 들어 있는 원본 전자 메일 등이 포함될 수 있습니다. 만료된 항목은 넉 달 전에 있었던 모임인데 여전히 일정에 표시되는 항목 등 특정 날짜 후에 내용이 더 이상 유효하지 않은 메일 및 모임 항목입니다. 만료 날짜는 선택 사항이지만 항목을 만들 때나 나중에라도 정의할 수 있습니다. 항목이 만료되면 사용할 수 없게 되며 취소선이 표시됩니다
1. [파일 - 새로 만들기 - Outlook 데이터 파일]을 선택하세요.
2. [Office Outlook 개인 폴더 파일(.pst)]를 반드시 선택 후 [확인]을 클릭하세요
3. [저장위치]를 선택하게 됩니다. 사내 PC는 모두 파티션이 2개이상으로 나누어져 있습니다.
C:가 아닌 다른 로컬디스크를 선택하시기 바랍니다 (D: 추천)
4.[새 폴더 만들기]를 클릭 후 새 폴더를 생성, 폴더 선택 후 [확인]해 주세요
5. [파일이름]을 지정하시고 [확인]을 클릭하세요.
6. 파일이름이 아닌 아웃룩에서의 [표시이름]을 입력해주시고 [확인]을 클릭하세요.
7.다음과 같이 사서함과 공용폴더가 아닌 [개인보관폴더]가 생성된 것을 확인 하실 수 있습니다.
8. 자동보관 설정을 위하여 [도구 - 옵션] 에서 [기타 - 자동보관]을 선택 하세요.
9. 자동보관 설정은 다음과 같이 [14일], [3개월]을 선택 후
[찾아보기]를 클릭 후 위에서 생성하신 PST 파일은 찾아 주시기 바랍니다.
그리고 마지막으로 [이 설정을 모든 폴더에 적용]을 클릭 후 [확인]을 클릭 하세요.
10. 자동보관 설정이 정상적으로 설정이 되었는지 확인을 위해 [받은 편지함의 속성]을 선택하세요.
OWA(Outlook Web Access) 관리 도구에서는 관리자가 조정할 수 있는 모든 OWA 설정에 대해 웹 기반 UI를 제공하고 도메인의 모든 서버 목록을 제공하며 이 관리 도구를 사용할 경우 모든 프런트 엔드 및 백 엔드 서버에서 OWA 설정을 관리할 수 있습니다. 이 도구는 서버 레지스트리에 설정을 올바르게 기록하도록 해 주며 구성할 수 있는 모든 기능에 대한 인라인 설명서를 제공합니다.
Regedit를 수정할 필요 없이 OWA Admin이 웹 기반 폼으로 손쉽게 적용이 가능합니다.
테마 및 정크 메일, 자동 서명, 주소록, 보안, 등 OWA기능을 손쉽게 변경할 수 있습니다.
Main 화면
서버기능 수정
테마적용
설치 요구 사항
Exchange 2003용 Outlook Web Access 웹 관리 도구(OWA Admin)는 IIS(Internet Information Server), .Net framework 버전 1.1, ASP.Net이 설치된 시스템에 설치해야 합니다.
OWA Admin 도구에는 SSL 연결이 필요합니다.이 SSL 연결은 인증을 활성화하고 Exchange 서버에 원격으로 액세스하기 위해 필요합니다.OWA Admin을 설치하는 시스템에 SSL 인증서가 없는 경우 OWA Admin 설치 프로그램은 테스트 인증서를 자동으로 만들고 구성합니다.
설치 권장 사항
OWA Admin 도구는 원격 서버에서 OWA 설정을 관리하기 위해 만들어졌습니다.Exchange 서버가 아닌 별도의 워크스테이션에 OWA Admin 도구를 설치하는 것이 좋습니다.이렇게 하면 Exchange 네트워크에 보안 위험을 줄일 수 있습니다.또한 사용자의 회사 보안벽 DMZ 영역에 있는 Exchange 프런트 엔드 서버에 이 도구를 설치하지 않는 것이 좋습니다.원격 서버에 연결하여 관리할 때 OWA Admin 도구는Windows Management Interface (WMI) 포트의 영향을 받는데이 포트는 일반적으로 방화벽에서는 열리지 않기 때문입니다.
알려진 문제점
Windows 2000 Server .Net framework 메모리 사용
OWA Admin 도구를 Windows 2000 Server에 설치하는 경우 시스템을 다시 시작하지 않으면 .Net framework가 자동으로 언로드되지 않고 일부 메모리가 해제되지 않는다는 점에 유의하십시오.Windows 2003 Server에서는 사용하지 않을 경우 잠시 후 IIS가 자동으로 모든 .Net framework 응용 프로그램 메모리를 해제합니다.
브라우저 지원
OWA Admin 도구는 Microsoft Internet Explorer 버전 6.0 Service Pack 1에서만 테스트되고 지원됩니다.다른 브라우저에서 작동하더라도 Microsoft에서는 다른 브라우저에 관련된 문제점을 해결하거나 지원하지 않습니다.
In order to assist customers in designing their storage layout for Exchange 2007, we have put together a calculator that focuses on driving the storage requirements (I/O performance and capacity) and what the optimal LUN layout should be based on a set of input factors.
Exchange 2007 사용자 DB(Storage) Size 계산을 하는 Excel Sheet입니다.
EDIT: This post has been updated on 9/23/08 for the new version of storage calculator. For the list of latest major changes, please see THIS.
In order to assist customers in designing their storage layout for Exchange 2007, we have put together a calculator that focuses on driving the storage requirements (I/O performance and capacity) and what the optimal LUN layout should be based on a set of input factors.
The calculator uses all the recommendations outlined in the following articles, and thus we recommend you read them before utilizing the calculator:
The calculator is broken out into the following sections (worksheets):
Input
Storage Requirements
LUN Requirements
Backup Requirements
Log Replication Requirements
Storage Design
Important: The data points provided in the calculator are an example configuration. As such any data points entered into the Input worksheet are specific to that particular configuration and do not apply for other configurations. Please ensure you are using the correct data points for your design.
This section is where you enter in all the relevant information regarding your design, so that the calculator can generate what you need in order to achieve your design.
Note: There are many input factors that need to be accounted for before you can design your solution. Each input factor is briefly listed below; there are additional notes within the calculator that explain them in more detail.
Step 1 - Server Configuration
Exchange Server Configuration
Which version of Exchange 2007 are you using? Depending on the version you select (RTM or SP1+), there is a different amount of RAM required per storage group. Exchange 2007 SP1 and later requires less RAM per storage group, than the RTM version does due to changes in the Jet architecture.
How many mailbox servers are you going to deploy? If you enter more than a single server, the calculator will evenly distribute the user mailboxes across the total number of mailbox servers and make performance and capacity recommendations for each server, as well as, for the entire environment.
What High Availability configuration are you deploying? You can select none, LCR, CCR, or SCC.
Are you using Content Indexing? By default this is enabled in Exchange 2007 and requires an additional 5% capacity per storage group.
Are you going to deploy a Dedicated Restore LUN? A dedicated restore LUN is used as a staging point for the restoration of data or could be used during maintenance activities; if one is selected then additional capacity will not be factored into each database LUN.
What percentage of disk space do you want to ensure remains free on the LUN? Most operations management programs have capacity thresholds that alert when a LUN is more than 80% utilized. This value allows you to ensure that each LUN has a certain percentage of disk space available so that the LUN is not designed and implemented at maximum capacity.
Exchange Data Configuration
What will be the deleted item retention? By default in Exchange 2007, the deleted item retention per database is 14 days.
What will be the Data Overhead Factor? Microsoft recommends using 20% to account for any extraneous growth that may occur.
How many mailboxes do you move per week? In terms of transactions, you have to take into account how many mailboxes you will either be moving to this server or within this server, as transactions will always get generated in the target storage group.
IOPS Configuration
What will be the I/O Overhead Factor? Microsoft recommends using 20% to ensure adequate headroom in terms of I/O to allow for abnormal spikes in I/O that may occur from to time.
Additional IOPS Requirements / Server? In other words, what additional I/O requirements do you need to factor into the solution for each mailbox server (e.g. certain third-party mobility products have additional I/O requirements that need to be factored into any design if they are being utilized)? This may require additional testing by comparing a baseline system against a system that has the I/O generating application installed and running.
Standby Continuous Replication Configuration
Are you going to deploy Standby Continuous Replication (SCR) with this server? If so, choose the number of SCR targets you will have for each source mailbox server (note: if you do choose to have an SCR target, the calculator assumes that all storage groups on the source server will have an SCR target).
What will be the SCR target's high availability configuration? You can select either "Single-Node" or "Match Source Configuration". If you choose single-node you are either deploying 2-node source clusters (CCR or SCC) and want only a single node to be the standby cluster or you are deploying standalone mailbox servers (or LCR); the other option for "Single-Node" is if you are performing database portability instead of server recovery. If you choose "Match Source Configuration" you are performing server recovery to retain the same level of availability as the source environment.
What will be the SCR log replay delay? This parameter is used to specify the amount of time that the Microsoft Exchange Replication service should wait before replaying log files that have been copied to the SCR target computer. The default is 1 day (86400 seconds) and you can configure up to 7 days. Or you can disable log replay delay by setting the input to 0, in which case the replication service will delay the last 50 logs from being replayed into the SCR target database. The value you specify here will influence the log capacity requirements.
What will be the SCR log truncation delay? This parameter is used to specify the amount of time that the Microsoft Exchange Replication service should wait before truncating log files that have been copied to the SCR target computer and replayed into the copy of the database. The time period begins after the log has been successfully replayed into the copy of the database. The maximum allowable setting for this value is 7 days. The minimum allowable setting is 0 seconds, although setting this value to 0 seconds effectively eliminates any delay in log truncation activity.
Database Configuration
Do you want to follow Microsoft's recommendations regarding maximum database size? Microsoft recommends that the database size should not be more than 100GB in size when continuous replication is not in use and no more than 200GB when continuous replication is in use. This is by no means a hard limit, but a recommendation based on the impact database size has to recovery times. If you want to follow Microsoft's recommendation, then select Yes. Otherwise, select No.
Do you want to specify a custom Maximum Database Size? If you selected No for the previous field, then you need to enter in a custom maximum database size.
Step 2 - Mailbox Configuration
The calculator provides the capability to design a storage solution that can support three different tiers (or classes) of mailbox users.
Mailbox Configuration
How many mailboxes will you deploy on the server or in the environment? If deploying a single server environment, this is how many mailboxes you will deploy on this server. If you are deploying multiple servers, then this is how many mailboxes you will deploy in the environment. For example, if you choose to deploy 5 servers, and want 3000 mailboxes per server, then enter 15000 here.
What is the solution's projected growth in terms of number of mailboxes over its lifecycle? Enter in the total percentage by which you believe the number of mailboxes will grow during the solution's lifecycle. For example, if you believe the solution will increase by 30% and you are starting out with 1000 mailboxes, then at the end of the lifecycle, the solution will have 1300 mailboxes. The calculator will utilize the projected growth plus the number of mailboxes to ensure that the capacity and performance requirements can be sustained throughout the solution's lifecycle.
How much mail do the users send and receive per day on average? The usage profiles found here are based on the work done around the memory and processor scalability requirements.
What is the average message size? For most customers the average message size is around 50KB.
What will be the prohibit send & receive mailbox size limit? If you want to adequately control your capacity requirements, you need to set a hard mailbox size limit (prohibit send and receive) for the majority of your users.
Predict IOPS Value? This question asks whether you want to override the calculator in determining the IOPS / mailbox value. By default the calculator will predict the IOPS / mailbox value based on the number of messages per mailbox, the user memory profile, and in what Outlook mode the mailboxes are operating. For some customers that want to design toward a specific I/O profile, this option will not be viable. Therefore, if you want to design toward a specific I/O profile, select No to the "Override IOPS Calculation" question.
IOPS / Mailbox? Only enter a value in this field if you selected "No" to the "Predict IOPS Value" question.
What will be the database read:write ratio? Only adjust this value if you selected "No" to the "Predict IOPS Value" parameter. When IOPS prediction is enabled, the calculator will calculate the read:write ratio based on the message profile and the Outlook mode in use.
In what Outlook mode will the majority of the clients operate? Select either Online or Cached Mode depending on how the majority of your users operate (>75%).
Client Configuration
What will be the user concurrency? Typically most customers should design toward 100% concurrency.
Step 3 - Backup Configuration
Backup Configuration
What backup methodology will be used to backup the solution? Choose Hardware VSS Backup/Restore, Software VSS Backup/Restore, Streaming, or VSS Backup Only. The backup methodology will affect the LUN design.
What will be the backup frequency? You can choose Daily Full, Weekly Full with Daily Differential, or Weekly Full with Daily Incremental. The backup frequency will affect the LUN design and the disk space requirements (e.g. if performing daily differentials, then you need to account for 7 days of log generation in your capacity design).
What is the streaming backup rate in MB/s for your environment? Enter in the rate at which you can backup your Exchange data when performing a streaming (online) backup.
What is the streaming restore rate in MB/s for your environment? Enter in the rate at which you can restore your Exchange data when performing a streaming (online) restore.
How many times can you operate without log truncation? Select how many times you can survive without a full backup or an incremental backup. For example, if you are a performing weekly full backup and daily differential backups, the only time log truncation occurs is during the full backup. If the full backup fails, then you have to wait an entire week to perform another full backup or perform an emergency full backup. This parameter allows you to ensure that you have enough capacity to not have to perform an immediate full backup.
Step 4 - Replication Requirements
The data for this section will help determine the appropriate log bandwidth requirements for both geographically dispersed CCR and SCR configurations.
Log Replication Configuration
How many transaction logs are generated for each hour in the day? Enter in the number of transaction logs that are generated for each hour in the day.
Now you may be wondering how you can collect this data. We've written a simple VBS script that will collect all files in a folder and output it to a log file. You can use Task Scheduler to execute this script at certain intervals in the day (e.g. every 15 minutes). Once you have generated the log file for a 24 hour period, you can import it into Excel, massage the data (i.e. remove duplicate entries) and determine how many logs are generated for each hour. If you do this for each storage group, you will be able to determine your log generation rate for each hour in the day. This script is named collectlogs.vbsrename (just rename it to collectlogs.vbs) and you can find it here:
What type of network link will you be using between the servers? Select the appropriate network link you will be using between the two nodes in the geographically dispersed cluster or between the SCR source and SCR targets.
What is the latency on the network link? Enter in the latency (in milliseconds) that exists on the network link.
How can you survive a network outage? When a network outage occurs, log replication cannot occur. As a result, the copy queue length will increase on the source; in addition, log truncation cannot occur on the source. For geographically dispersed CCR or remote SCR deployments, network outages can seriously affect the solution's usefulness. If the outage is too long, log capacity on the source may become compromised and as result, a manual log truncation event must occur. Once that happens, the remote copies must be reseeded. The Network Failure Tolerance parameter ensures there is enough capacity on the log LUNs to ensure that you can survive an excessive network outage.
Recovery Configuration
What is your Recovery Point Objective? Enter in the recovery point objective (RPO) for which you are designing; this will help determine the log replication throughput requirements necessary for the SCR targets.
Storage Requirements
This section deals with outputting the I/O performance and capacity storage requirements based on the input factors entered into the calculator.
Calculations
The Calculations Pane performs all the calculations based on the input factors and outputs the key calculations into the Results Pane. For this blog, I will not delve into the specifics of the calculations, but feel free to review them within the calculator.
Results
Based on the above input factors the calculator will recommend the following settings.
Number of Servers & Data Copies
The Number of Servers and Data Copies table will provide you with
The Number of Mailbox Servers that will exist in your environment. This value is based on the Number of Exchange Mailbox Servers that you entered in the Input section.
The Number of SCR Target Servers. This value is based on the Number of Exchange Mailbox Servers and the Number of SCR Targets / Source Server that you entered in the Input section. For SCR targets, it is assumed that if you are utilizing CCR as the source and you are matching the source HA configuration for the SCR target, then you will be replicating the storage groups to both nodes of the SCR standby cluster.
The Number of Data Copies value will tell you how many copies of the data you will have. For example if you selected LCR or CCR, you will have at least 2 copies (you could have more if you specified a number of SCR targets). For SCR targets, it is assumed that if you are utilizing CCR as the source and you are matching the source HA configuration for the SCR target, then you will be replicating the storage groups to both nodes of the SCR standby cluster.
User Mailbox Configuration
The Mailbox Configuration table will provide you with
The Number of Mailboxes that you entered in the Input section (this value will include the projected growth).
The Mailbox Size is the actual mailbox size on disk that factors in the prohibit send/receive limit, the number of messages the user sends/receives per day, the deleted item retention window, and the average database daily churn per mailbox. It is important to note that the Mailbox size on disk is actually higher than your mailbox size limit; this is to be expected.
The Database Cache / Mailbox value is the necessary amount of RAM per mailbox that is needed to increase the database cache so that the number of database reads can be reduced.
The Transaction Logs Generated / Mailbox value is based on the message profile selected and the average message size and indicates how many transaction logs will be generated per mailbox.
The IOPS / Mailbox value is either the calculated IOPS / Mailbox value that is based on the number of messages per mailbox, the user memory profile, in what Outlook mode the mailboxes are operating. If you had chosen to enter in a specific IOPS / mailbox value rather than allowing the calculator determining the value based on the above requirements, then this value will be that custom value.
Solution Configuration
The Solution Configuration table will provide you with
The Recommended RAM Configuration for the mailbox server. This is the amount of RAM needed to support the number of databases required, in addition to, the number of mailboxes based on their memory profile.
The Recommended Number of Databases is the calculated number of databases required to support the mailbox population. This number can be used with the DPM 2007 Storage Calculator. Also, if you selected to have multiple mailbox servers, the Total for all Servers column, will output the total number of storage groups for all mailbox servers.
The Recommended Number of Mailboxes / Database is the calculated number of mailboxes per database ensuring that the database size does not go above the recommended size limit (for non-Continuous Replication (CR) systems 100GB, for CR systems 200GB).
The Number of Tier-x Mailboxes / Database provides a breakdown of how many mailboxes from each mailbox tier will be stored within a database.
The Total Number of Mailboxes outlines how many mailboxes will reside on each server, as well as, the total number of mailboxes that will exist within the environment if you selected to have multiple mailbox servers.
Transaction Log Requirements
The The Transaction Log Requirements table will provide you with
The User Transaction Logs Generated / Day indicates how many transaction logs will be generated during the day for the server. The Total for all Servers column outputs the total number of user transaction logs generated across all mailbox servers.
The Average Mailbox Move Transaction Logs Generated / Day indicates how many transaction logs will be generated during the day for the server. This number is an assumption and assumes that an equal percentage of mailboxes will be moved each day, as opposed to moving all mailboxes on the same day. The Total for all Servers column outputs the average move mailbox transaction logs generated across all mailbox servers.
The Average Transaction Logs Generated / Day is the total number of transaction logs that are generated per day on the server (includes user generated logs and mailbox move generated logs). The Total for all Servers column outputs the average number of transaction logs generated across all mailbox servers.
The User Transaction Logs Generated / SG / Day indicates how many transaction logs will be generated during the day for each storage group.
The Average Mailbox Move Transaction Logs Generated / SG / Day indicates how many transaction logs will be generated during the day for each storage group. This number is an assumption and assumes that an equal percentage of mailboxes will be moved each day, as opposed to moving all mailboxes on the same day.
The Average Transaction Logs Generated / SG / Day is the total number of transaction logs that are generated per day for a storage group on the server (includes user generated logs and mailbox move generated logs). This number can be used with the DPM 2007 Storage Calculator.
Disk Space & Performance Requirements
The Disk Space & Performance Requirements table will provide you with
The Total Database Disk Space Required/ Replica is the amount of space required to support the database infrastructure for each replica that exists. This value is derived from the mailbox size on disk, the data overhead factor, whether a dedicated restore LUN is available, and the use of content indexing. The Total for all Mailbox Servers column outputs the total database disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total database disk space required for all SCR target servers.
The Total Log Disk Space Required/ Replica is the amount of space required to support the log infrastructure for each replica that exists. This value takes into account the number of mailboxes moved per week (assumes worst case and that all mailboxes are moved on the same day), the type of backup frequency in use, the number of days that can be tolerated without log truncation and the number of transaction logs generated per day. This number can be used with the DPM 2007 Storage Calculator. The Total for all Mailbox Servers column outputs the total log disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total log disk space required for all SCR target servers.
The Total Database LUN Space Required/ Replica is the LUN size required to support the database infrastructure for each replica that exists. The Total for all Mailbox Servers column outputs the database LUN disk space required for all mailbox servers. The Total for all SCR Servers column outputs the database LUN disk space required for all SCR target servers.
The Total Log LUN Space Required / Replica is the LUN size required to support the log infrastructure for each replica that exists. The Total for all Mailbox Servers column outputs the log LUN disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers..
The Restore LUN Size / Node is the amount of space needed to support a restore LUN if the option was selected in the Input Factor section; this will include space for up to 7 databases and 7 transaction log sets. If CCR is chosen as the continuous replication solution, then a Restore LUN will be provisioned for each node in the cluster. If there are SCR targets, then you will also need to provision a restore LUN on each SCR target server. The Total for all Mailbox Servers column outputs the log LUN disk space required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers.
The Required Database IOPS is the amount of read and write host I/O the database disk set must sustain during peak load. The Total for all Mailbox Servers column outputs the total database IOPS required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers.
The Required Log IOPS is the amount of read and write host I/O that will occur against the transaction log disk set. The Total for all Mailbox Servers column outputs the total database IOPS required for all mailbox servers. The Total for all SCR Servers column outputs the total Restore LUN disk space required for all SCR target servers.
LUN Requirements
The LUN Requirements section is really a continuation of the Storage Requirements section. It outlines what we believe is the appropriate LUN design based on the input factors and the analysis performed in the previous section.
Note: The term LUN utilized in the calculator refers only the representation of the disk that is exposed to the host operating system. It does not define the disk configuration.
LUN Design
The LUN Design highlights the LUN architecture chosen for this server solution. The architecture is derived from the backup type and frequency that was chosen in the Storage Requirements section.
If you selected to perform a weekly full backup and are not using hardware-based VSS as a backup solution, then we will recommend the 2 LUNs / Backup Set approach. This approach places the storage group backup set on the same log and db LUN. This can reduce the number of LUNs on the server. For example, if you have 14 databases, the calculator will recommend that SG1-7 be grouped together on 2 LUNs; this becomes the backup set. SG8-14 will be grouped together on another 2 LUNs to become a second backup set.
If you selected to use hardware VSS as a backup method or are performing daily full backups, then we recommend the 2 LUNs / Storage Group approach. This approach places each storage group set on its own set of LUNs.
LUN Configuration
The LUN Configuration table highlights the number of databases that should be placed on a single LUN. This is derived from LUN Architecture model.
This section also documents how many LUNs will be required for the entire solution, broken out by Database and Log sets (remember continuous replication will require an additional number of LUNs), and the number of restore LUNs for both the source, replica, and SCR targets.
Database Configuration
The Database Configuration table outlines how many databases are required, the number of mailboxes per database, the size of each database, and the transaction log size required for each database.
SG LUN Design
The SG LUN Design table outlines the physical LUN layout and follows the recommended number of storage groups per LUN approach based on the LUN Architecture model. It also documents the LUN size required to support layout (this is where we factor in the additional capacity for content indexing, the LUN Free Space Percentage, and whether you are using a Restore LUN), as well as the transaction log LUN.
Backup Requirements
The Backup Requirements section is really a continuation of the Storage Requirements section. It outlines what we believe is the appropriate backup design based on the input factors and the analysis performed in the previous sections.
Streaming Backup Window Requirements
If you selected to utilize a streaming backup methodology, then the Streaming Backup Window Requirements section will provide you with:
The Full Backup Window / SG is the amount of time it will take to back up a single storage group utilizing a streaming backup application by taking into account the calculated database size and the backup rate. You should validate this metric against your Service Level Agreements to determine if it is acceptable.
The Incremental or Differential backup Window / SG is the amount of time it will take to perform an incremental or differential streaming backup for a single storage group and is based on the number of transaction logs that are generated per day and the backup rate.
Streaming Restore Window Requirements
If you selected to utilize a streaming backup methodology, then the Streaming Restore Window Requirements section will provide you with:
The Full Restore Window / SG is the amount of time it will take to restore a single storage group utilizing a streaming restore process by taking into account the calculated database size and the restore rate. You should validate this metric against your Service Level Agreements to determine if it is acceptable.
The Incremental or Differential Restore Window / SG is the amount of time it will take to perform an incremental or differential streaming restore for a single storage group and is based on the number of transaction logs that are generated per day and the restore rate.
Backup Configuration
The Backup Configuration table outlines the number of databases that will be placed within a single LUN and the type of backup methodology and frequency in which the backups will occur.
Backup Frequency Configuration
The Backup Frequency Configuration section will provide you with an outline on how you should perform the backups for each server, utilizing either a daily full backup or weekly full backup frequency.
Log Replication Requirements
The Log Replication Requirements section is another continuation of the Storage Requirements section. It outlines what we believe is the throughput required to replicate the transaction logs for SCR targets or a geographically dispersed CCR scenario. Please note that if you selected to have multiple mailbox servers, then the data outputted in this section represents all mailbox servers.
Log Replication Throughput Requirements
The Log Replication Throughput Requirements table will provide you with
The Transaction Logs Generated / Day is the amount of logs that will be generated for the entire day (includes user generated logs and mailbox move generated logs).
The Geographically Dispersed CCR Throughput Required / CMS is the throughput required to sustain a single geographically dispersed cluster's log generation. This value is based on the peak log generation hour.
The Geographically Dispersed CCR Throughput Required is the throughput required to sustain all geographically dispersed clusters' log generation. This value is based on the peak log generation hour.
The SCR Throughput Required SCR Target / Source is the throughput required to sustain log replication to a single SCR target from a single source mailbox server. This value is based on the recovery point objective. This model does not assume that the peak hours are contiguous. The effect is that you can modify this to have peak hours at, 8am and 4pm, and the resulting bandwidth requirement will assume that you can take the time in between 8 and 4 to catch up within the specified RPO.
The Total SCR Throughput Required is the total throughput required to sustain log replication to all SCR targets from all source mailbox servers.
Chosen Network Link Suitability
The Chosen Network Link Suitability table will dictate whether the chosen network link has sufficient capacity to sustain geographically dispersed CCR replication and/or SCR replication. If the network link cannot sustain the log replication traffic, then you will need to either upgrade the network link to the recommended network link throughput, or adjust the design appropriately.
Recommended Network Link
The Recommended Network Link table recommends an appropriate network link if the chosen network link does not have sufficient capacity to sustain log replication for geographically dispersed CCR and SCR solutions.
TCP/IP Settings for Geographically Dispersed CCR
The TCP/IP Settings for Geographically Dispersed CCR table outlines the custom TCPWindowSize and TCP1323Opts values you should deploy on the source and target server (assuming both source and target are Windows Server 2003) to improve the number of logs that can be replicated per second. This value is determined based on the network link (either the chosen network link if it is acceptable, or the recommended network link) and its latency.
TCP/IP Settings for SCR
The TCP/IP Settings for SCR table outlines the custom TCPWindowSize and TCP1323Opts values you should deploy on the source and target server (assuming both source and target are Windows Server 2003) to improve the number of logs that can be replicated per second. This value is determined based on the network link (either the chosen network link if it is acceptable, or the recommended network link) and its latency. Please note that in the SCR target replication scenario, the recommendation assumes that all SCR targets will replicate over the same network link.
Note: the Network Link recommendations do not take into account database seeding or any other data that may also utilize the link.
Storage Design
The Storage Design worksheet is designed to take the data collected from the Input worksheet and Storage Requirements worksheet and help you determine the number of physical disks needed to support the databases, transaction logs, and Restore LUN configurations.
Storage Design Input Factors
In order to determine the physical disk requirements, you must enter in some basic information about your storage solution.
Step 1 - RAID Configuration
RAID Parity Configuration
For the RAID Parity Configuration table you need to select the type of building block your storage solution utilizes. For example, some storage vendors build the underlying storage in sets of data+parity (d+p) groups. A RAID-5 3+1 configuration means that 3 disks will be used for capacity and 1 disk will be used for parity, even though parity is distributed across all the disks. So if you had a capacity requirement that would utilize 15 disks, then you would need to deploy 5 3+1 groups to build that RAID-5 array.
RAID-1/0 supports 1d+1p, 2d+2p, and 4d+4p groupings
RAID-5 supports 3d+1p through 20d+1p groupings (though storage solutions could support more than that).
RAID-6 supports 6d+2p groupings.
RAID Rebuild Overhead
When a disk is lost, the disk needs to be replaced and rebuilt. During this time, the performance of the RAID group is affected. This impact as a result can affect user actions. Therefore, to ensure that RAID rebuilds do not affect the overall performance of the mailbox server, Microsoft recommends that you should ensure sufficient overhead is provisioned into the performance calculations when designing for RAID parity. Most RAID-1/0 implementations will suffer a 25% performance penalty during a rebuild. Most RAID-5 and RAID-6 implementations will suffer a 50% performance penalty during a rebuild.
The calculator defaults with the following as Microsoft recommendations, but they are adjustable:
For RAID-1/0 implementations, ensure that you factor in an additional 35% performance overhead.
For RAID-5/RAID-6 implementations, ensure that you factor in an additional 100% performance overhead.
RAID Configuration
By default the calculator will recommend either RAID-1/0 or RAID-5 by evaluating capacity and I/O factors and determining which configuration utilizes the least amount of disks while satisfying the requirements. If you would like to override this and force the calculator to utilize a particular RAID configuration (e.g., RAID-0 or RAID-6), select "Yes" to this option and then select the appropriate RAID configuration in the cell labeled "Desired RAID Configuration."
By default the calculator utilizes RAID-5 for the Restore LUN. However, you can define a specific RAID configuration for the Restore LUN.
Step 2 - Disk Selection
In this section you can select the appropriate disk capacity and disk type that you will want to utilize for your databases, transaction logs, and Restore LUN disks.
The storage calculator allows you to select up to three different disk configuration scenarios, which allows you to perform comparisons. The calculator will then run through the possible iterations and choose an appropriate configuration that ensures that both capacity and performance metrics are met while utilizing the least amount of physical disks. However, please keep in mind that the calculator does not take into account other factors that should be considered when evaluating different storage solutions like cost per disk, power consumption per disk, additional hardware (e.g., storage controller, disk enclosures) and software costs, and operational management costs.
Storage Design Calculations
The Calculations Pane performs all the calculations based on the input factors and outputs the key calculations into the Results Pane. For this blog, I will not delve into the specifics of the calculations, but feel free to review them within the calculator.
Storage Design Results
The Storage Design Results section outputs the recommended configuration for the solution. The recommendations made are the following:
Optimum RAID configuration
Optimum number of disks for databases, transaction logs, and Restore LUN
RAID Configurations
The RAID Configurations Table outlines the number of disks required and the RAID configuration that should be used for each disk configuration that you previously had selected in the Input section.
Recommended RAID Configuration / Server
This table recommends the optimum configuration for each mailbox server ensuring that performance and capacity requirements are met in the design. If multiple disk types and capacities configurations were originally selected, then each configuration will be compared and the disk / RAID option that utilizes the least number of disks (while ensuring the performance and capacity requirements are met) will be recommended.
Storage Configuration
This table will output the total number of disks required for each mailbox server (for both source and replica instances in the LCR/CCR scenario) and its respective SCR targets. It will also identify the total number of disks required to support the entire environment.
Conclusion
Hopefully you will find this calculator invaluable in helping to determine your storage requirements for Exchange 2007 mailbox servers. If you have any questions or suggestions, please email strgcalc AT microsoft DOT com.