Chapter 9: Configuration
Replication Configuration
Quantum DXi4700 User’s Guide
254
Tasks
Use the
Replication Configuration
page to perform the following tasks:
l
View information about configured replication target systems (see
).
l
Add, edit, or delete a replication target (see
Adding a Replication Target on the next page
Replication Target on page 257
Deleting a Replication Target on page 258
).
l
Pause or resume replication to a target (see
Pausing or Resuming Replication to a Target on
).
l
Configure a constant replication throttle (see
Enabling System Throttling on page 259
).
l
View information about allowed replication source systems (see
).
l
Add or delete an allowed replication source (see
Adding a Replication Source on page 261
or
Deleting a Replication Source on page 262
).
l
Specify the maximum number of received snapshots to retain for each source (see
Maximum Number of Snapshots on page 262
).
Target DXis List
The
Target DXis
list displays the following information for each target DXi:
Target
The IP address of the target system that the DXi4700 is configured to send data to.
Status
The replication status of the DXi4700. For a detailed description of all possible
replication statuses, see
Replication Overview on page 116
.
Source IP
The IP address that is used to uniquely identify the source DXi to the target.
Encryption
The type of encryption used when sending replicated data to the target system
(
None
,
128-bit
,
256-bit
, or
TLS with AES 256
).
Important Information
l
If
TLS with AES 256
is selected, the factory installed certificates are
inadequate for security. The factory installed certificates should be
considered public domain and are provided only for convenience. You must
install new certificates for secure encryption.
l
TLS with AES 256
must be enabled for this encryption option to appear
).
Original Data Size
The original, native size of data sent during replication or failback. This value does
not represent the amount of data actually sent over the network during replication
or failback because data is deduplicated and compressed before being sent.