Quantum DXi4700 User Manual page 90

Hide thumbs Also See for DXi4700:
Table of Contents

Advertisement

Chapter 4: Configuration Wizards
Replication Wizard
Encryption Option
NONE
AES 128-BIT
AES 256 BIT
TLS-256
Caution: Select 128-bit encryption if you are sending data to a DXi running a system
software version prior to DXi 2.1 Software.
Note: AES encryption options are available only if the Data-in-Flight license is installed (see
License Keys on page
c. In the Source IP Address field, enter the IP address that is used to uniquely identify the source
DXi to the target. This may be different than the actual network IP address of the source DXi.
If the target system is at DXi 2.1 Software or higher, this field is not required. If the target system is
at DXi 2.0.1.x Software or below, then you must enter the IP address by which the target system
recognizes the source system. The default value is 0.0.0.0.
2. If data on other DXi systems will be replicated to this DXi4700, enter the following information under
Source DXis:
a. In the Source Hostnames or IP Addresses box, enter the hostname or IP address of the
system that will send the replicated data to the DXi4700.
You can specify up to 10 replication sources. To enter multiple sources, press <Enter> after each
entry.
b. In the Maximum Snapshots Per Share or Partition drop-down box, select the number of
snapshots to retain for each replicated DXi (up to 32).
During scheduled or manual data replication, the DXi receives a snapshot from the source system.
A snapshot contains all of the data necessary to fully recover or failback a DXi to the point in time
when the snapshot was saved.
3. Click Next to continue.
Quantum DXi4700 User's Guide
Description
Data is not encrypted when sending replication data to the target system.
Data is encrypted using AES 128-bit encryption when sending replication
data to the target system.
Data is encrypted using AES 256-bit encryption when sending replication
data to the target system.
Data is encrypted using TLS with AES 256-bit encryption when sending
replication data to the target system.
Note: If TLS encryption is selected, the factory intstalled certificates
should be considered public domain and are not secure. New
certificate and key files must be installed (see
page
315).
349).
Data Encryption on
90

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents