Quantum DXi4700 User Manual page 254

Hide thumbs Also See for DXi4700:
Table of Contents

Advertisement

Chapter 9: Configuration
Replication Configuration
Tasks
Use the Replication Configuration page to perform the following tasks:
View information about configured replication target systems (see
l
Add, edit, or delete a replication target (see
l
Replication Target on page
Pause or resume replication to a target (see
l
page
259).
Configure a constant replication throttle (see
l
View information about allowed replication source systems (see
l
Add or delete an allowed replication source (see
l
Deleting a Replication Source on page
Specify the maximum number of received snapshots to retain for each source (see
l
Maximum Number of Snapshots on page
Target DXis List
The Target DXis list displays the following information for each target DXi:
Target
Status
Source IP
Encryption
Original Data Size
Quantum DXi4700 User's Guide
Adding a Replication Target on the next page,Editing a
257, or
Deleting a Replication Target on page
Pausing or Resuming Replication to a Target on
Enabling System Throttling on page
262).
262).
The IP address of the target system that the DXi4700 is configured to send data to.
The replication status of the DXi4700. For a detailed description of all possible
replication statuses, see
The IP address that is used to uniquely identify the source DXi to the target.
The type of encryption used when sending replicated data to the target system
(None, 128-bit, 256-bit, or TLS with AES 256).
Important Information
If TLS with AES 256 is selected, the factory installed certificates are
l
inadequate for security. The factory installed certificates should be
considered public domain and are provided only for convenience. You must
install new certificates for secure encryption.
TLS with AES 256 must be enabled for this encryption option to appear
l
(see
Data Encryption on page
The original, native size of data sent during replication or failback. This value does
not represent the amount of data actually sent over the network during replication
or failback because data is deduplicated and compressed before being sent.
Target DXis List
Source DXis List on page
Adding a Replication Source on page 261
Replication Overview on page
315).
below).
258).
259).
260).
or
Changing the
116.
254

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents