Chapter 4: Configuration Wizards
Replication Wizard
Quantum DXi4700 User’s Guide 90
Encryption Option Description
NONE Data is not encrypted when sending replication data to the target system.
AES 128-BIT Data is encrypted using AES 128-bit encryption when sending replication
data to the target system.
AES 256 BIT Data is encrypted using AES 256-bit encryption when sending replication
data to the target system.
TLS-256 Data is encrypted using TLS with AES 256-bit encryption when sending
replication data to the target system.
Note: If TLS encryption is selected, the factory intstalled certificates
should be considered public domain and are not secure. New
certificate and key files must be installed (see Data Encryption on
page 315).
Caution: Select 128-bit encryption if you are sending data to a DXi running a system
software version prior to DXi 2.1 Software.
Note: AES encryption options are available only if the Data-in-Flight license is installed (see
License Keys on page 349).
c. In the Source IP Address field, enter the IP address that is used to uniquely identify the source
DXi to the target. This may be different than the actual network IP address of the source DXi.
If the target system is at DXi 2.1 Software or higher, this field is not required. If the target system is
at DXi 2.0.1.x Software or below, then you must enter the IP address by which the target system
recognizes the source system. The default value is 0.0.0.0.
2. If data on other DXi systems will be replicated to this DXi4700, enter the following information under
Source DXis:
a. In the Source Hostnames or IP Addresses box, enter the hostname or IP address of the
system that will send the replicated data to the DXi4700.
You can specify up to 10 replication sources. To enter multiple sources, press <Enter> after each
entry.
b. In the Maximum Snapshots Per Share or Partition drop-down box, select the number of
snapshots to retain for each replicated DXi (up to 32).
During scheduled or manual data replication, the DXi receives a snapshot from the source system.
A snapshot contains all of the data necessary to fully recover or failback a DXi to the point in time
when the snapshot was saved.
3. Click Next to continue.