DR protection can be achieved only after eReplication detects resources related to the protected objects.
Figure 1 illustrates the process of initially configuring the DR services.