Reference Guide
vConverter v4.1 Chapter 1 Introduction 5
20BDifferent Destinations Cutover
When your initial and final targets are different, select Different Destinations Cutover
(DDC) as the conversion type. The initial P2V event will target the first destination. The
VM can be moved to the second destination. Then, the initial P2V event can be modified
to allow the final synchronization to retarget the VM.
21BRaw Device Mapping
Raw Device Mapping (RDM) is a file in a separate VMFS volume that acts as a proxy for
a raw physical device. An RDM provides a VM with direct access to a logical unit
number (LUN) on a fiber channel or iSCSI physical storage system. With P2V to RDM,
all source volumes to be converted are placed on a single device. Typically, an RDM is
useful for utilizing Storage Area Network (SAN) software for replication and snapshots.
Input/Output (I/O) improves because multiple servers need not read and write to a LUN;
only a VM with access to RDM will do so.
22BVirtual Appliance for VMware ESXi 3.5 and Xen Embedded
Virtual Appliance (VA) replaces the console operating system (COS) environment. VA is
a custom VM that can create and remove virtual disks as well as mount and unmount
them. It can also create partitions and write data. VA features a preinstalled and pre-
configured environment with all the necessary configurations for conversion. There is no
need to install an agent on the target server.
For ESXi 3.5, VA allows you to skip installation of an agent to COS. For Xen Embedded,
VA can be run in para- or full-virtualization modes.
23BUser Profiles
Through the fields on vConverter’s User Profiles tab you can create one set of credentials
to use with multiple source servers. You can create distinct profiles for each system and
save them for later use.
24BTask Profiles
The fields on the Task Profiles tab help you increase multi-conversion process efficiency
by allowing you to configure a conversion once and save the settings for future use.
These profiles are not associated with specific sources or targets; rather, they define only
general settings.
25BFiltering
Use Filtering to locate systems in large networks easily. You can search networks by
system name or IP address. Search criteria can include wildcards and multiple values.
26BQuick Convert










