Frequently Asked Questions
What does the name Teneros mean?
In Latin, it is derived from Tenere and Teneo meaning to hold, to keep, to preserve, to maintain. In our customers' businesses it translates to "Always-On, Available and Accessible Mission Critical Applications".

Which clients are supported by the ACA?
Outlook 2003, Outlook 2002/XP, Outlook 2000 and Outlook Web Access are supported.

Which versions of Microsoft Exchange does the ACA support?
Exchange 2003 is supported (all service packs). Upcoming releases will support Exchange 2000.

Which versions of Active Directory does the ACA support?
Active Directory running on Windows 2003 (all service packs) and Windows 2000 SP4 is supported.

Does the ACA support network link aggregation standards such as 802.3AD?
Yes, the ACA has full support for network link aggregation via 802.3AD.

Does the ACA protect from all forms of Exchange downtime?
Yes, the ACA provides protection from all forms of Exchange planned and unplanned downtime including power failure, disconnection from network, operating system failure, Exchange application failure, partial failures of Exchange services or components and regular planned maintenance related downtime.

Can the ACA protect an Exchange front end server?
Yes, the first release of the ACA only protects the Exchange backend server. Upcoming releases of the appliance will include support for protecting the Exchange front end server.

Can the setup of the Teneros ACA be completed remotely?
Yes, via the web interface.

Does the ACA install any software on the Exchange server?
No, the ACA doesn’t install any software on the Exchange server.

Does the ACA modify any setting or configuration on the Exchange server?
No, the ACA doesn’t require any modification of the Exchange server.

What redundancy is built into the ACA?
The ACA has multiple independent hardware and software control systems to monitor and self-heal in case of failure. The ACA also has multiple CPUs and hot swappable power supplies and hard disks. Hardware RAID with redundant controllers are built into the appliance to provide additional resiliency.

What type of replication technology is used by the ACA?
The ACA uses Teneros patent pending replication technology, Transactional Integrity Validation, that prevents data corruption being replicated from the Exchange server to the ACA.

What is the process for repairing the ACA in case of hardware failures?
The two most common causes of hardware failure, power supplies and hard disks, are redundant and hot swappable in the ACA and can be easily replaced.

How does the ACA secure against virus attacks and other intrusion attempts?
The ACA has built-in virus protection based on the award winning Sophos anti-virus technology. The ACA architecture also provides for sophisticated anti-intrusion measures against day-zero worm and virus attacks, network-level attack, identity spoofing, and Trojans.

How does the ACA prevent accidental or malicious attempts at accessing the ACA and executing harmful actions?
The ACA is immune to both accidental and deliberate attempts to access it. The ACA is a "locked down," securely-isolated appliance that is not open to any standard administrative or access methods.

Does the ACA require to be backed up?
No, the ACA doesn’t require periodic backups.

Can users continue to access the Exchange server during installation?
Yes, users have un-interrupted access to the Exchange server while installation is in progress.

How long does it take for failover to complete?
The failover process is instantaneous and non-disruptive to end-users, thanks to the Teneros ACA Instant-On technology. Full services are available within seconds ensuring continuous email operation.

Do end users experience downtime during failover?
No, the end users experience no disruption of service during a failover.

After failover can users access their old email data?
Yes, after failover end users have access to their complete mailbox data exactly as it existed on the Exchange server at the moment of failure.

Do the existing user accounts and passwords continue to work during failover?
Yes, all existing user accounts and passwords continue to work seamlessly after failover.

Do end users experience downtime during failback?
No, the end users experience no downtime during failback.

After failback can users access email data sent and received during failover?
Yes, the end users can see their complete mailbox after failback, including the messages that were sent or received during failover.

Can the administrator install or modify software on the ACA?
The ACA is a locked down appliance and doesn’t require maintenance by the IT administrator.

^top

 

 
Support
Frequently Asked Questions
Customer Login
Newsletter