Chapter 4: Configuration Wizards
Replication Wizard
Quantum DXi4700 User’s Guide
90
Encryption Option
Description
NONE
Data is not encrypted when sending replication data to the target system.
AES 128-BIT
Data is encrypted using AES 128-bit encryption when sending replication
data to the target system.
AES 256 BIT
Data is encrypted using AES 256-bit encryption when sending replication
data to the target system.
TLS-256
Data is encrypted using TLS with AES 256-bit encryption when sending
replication data to the target system.
Note:
If TLS encryption is selected, the factory intstalled certificates
should be considered public domain and are not secure. New
certificate and key files must be installed (see
).
Caution:
Select 128-bit encryption if you are sending data to a DXi running a system
software version prior to DXi 2.1 Software.
Note:
AES encryption options are available only if the Data-in-Flight license is installed (see
).
c. In the
Source IP Address
field, enter the IP address that is used to uniquely identify the source
DXi to the target. This may be different than the actual network IP address of the source DXi.
If the target system is at DXi 2.1 Software or higher, this field is not required. If the target system is
at DXi 2.0.1.x Software or below, then you must enter the IP address by which the target system
recognizes the source system. The default value is
0.0.0.0
.
2. If data on other DXi systems will be replicated to this DXi4700, enter the following information under
Source
DXis
:
a. In the
Source Hostnames or IP Addresses
box, enter the hostname or IP address of the
system that will send the replicated data to the DXi4700.
You can specify up to 10 replication sources. To enter multiple sources, press
<Enter>
after each
entry.
b. In the
Maximum Snapshots Per Share or Partition
drop-down box, select the number of
snapshots to retain for each replicated DXi (up to 32).
During scheduled or manual data replication, the DXi receives a snapshot from the source system.
A snapshot contains all of the data necessary to fully recover or failback a DXi to the point in time
when the snapshot was saved.
3. Click
Next
to continue.