Chapter 8: DXi4500 Data Services
Source Role Configuration
Quantum DXi4500 User’s Guide
141
Figure 54 Source Role General
Page
2
Enter the
Host Name or IP Address
for the replication target and
click
Apply
.
Use Encryption
is selected by default. When
Use Encryption
is
enabled, data that is replicated is encrypted before it is replicated to
another system. If your data network is already secured, disable
Use
Encryption
for increased replication performance.
Source Role
Performance
The
Source Role Performance
information displays the following
statistics:
•
Total Data Sent
- This field indicates the original, native size of the
data transferred during replication or failback. This does not
indicate the actual number of bytes sent over the network during
replication or failback.
•
Total Bytes Sent
- This field indicates the actual number of bytes
transferred over the network during replication or failback, and is
usually much less than the native size due to the benefits of data
deduplication.
•
Average Send Rate
- This field is based on the actual number of
bytes transferred over the network during replication or failback.
They are a measure of the total, number of bytes sent (in MB/sec)
Summary of Contents for DXi4500
Page 18: ...Preface xviii Quantum DXi4500 User s Guide...
Page 22: ...Preface xxii Quantum DXi4500 User s Guide...
Page 34: ...Chapter 1 DXi4500 System Description DXi Advanced Reporting 12 Quantum DXi4500 User s Guide...
Page 56: ...Chapter 3 DXi4500 Concepts Network Segmentation 34 Quantum DXi4500 User s Guide...
Page 146: ...Chapter 6 DXi4500 Status System 124 Quantum DXi4500 User s Guide...
Page 218: ...Appendix A DXi4500 System Specifications 196 Quantum DXi6500 User s Guide...