Fujitsu ETERNUS CS800 S5 User Manual page 250

File
Table of Contents

Advertisement

Replication Configuration
Figure 148: Edit Target Host
3. In the Encryption drop-down box, select the type of encryption to use when sending
replication data to the target system (None, 128-bit, or 256-bit).
Using 256-bit encryption (default) provides a stronger level of security but may have an
impact on system performance in some situations. For best performance, if your data
network is already secured, you should select None for encryption.
V
4. In the Source IP Address box, enter the IP address that is used to uniquely identify the
source system to the target. This may be different than the actual network IP address
of the source system.
If the target system is at ETERNUS CS800 2.1 Software or higher, the Source IP
Address field is not required. If the target system is at ETERNUS CS800 2.0.1.x
Software or below, then you must enter the IP address by which the target system
recognizes the source system. The default value is 0.0.0.0.
I
I
5. Under Target Systems, select the target and click Resume to resume replication.
236
CAUTION!
For encryption, select None or 128-bit if you are sending data to a ETERNUS
CS800 running a system software version prior to ETERNUS CS800 2.1
Software.
The Source IP Address field does not accept fully qualified domain names.
You must enter a valid IP address. Make sure this IP address is configured in
the allowable sources list on the target ETERNUS CS800.
When configuring segmented network interfaces, if the source system
replication, data, and management interfaces are on the same subnet, you
must add a host route on the source system to make sure the replication
interface is correctly selected when replicating data to the target system (see
"Understanding Interface Routing" on page
296).
U41840-J-Z125-7-76
Configuration

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents