Fujitsu ETERNUS CS800 S6 User Manual page 153

Hide thumbs Also See for ETERNUS CS800 S6:
Table of Contents

Advertisement

If two targets are already specified, you must delete a target before adding another.
First click Pause to pause replication to the target, and then click Delete to remove
the target.
Before specifying a target, make sure you have completed the Replication wizard on
the target ETERNUS CS800. The target ETERNUS CS800 must be configured to allow the
source ETERNUS CS800 hostname or IP address.
You can specify up to two targets:
a. In the Target Hostname or IP Address box, enter the hostname or IP address of
the system that will receive the replicated data.
When entering IP addresses, never use an address that is in a reserved IP address
range. To see a list of reserved IP address ranges, click the quick tip icon [?]
located near the IP address field.
To use hostname format, you must specify at least one DNS IP address on the
Network page (see
b. (Optional) Select an encryption option:
NONE
AES 128-BIT
AES 256 BIT
c. In the Source IP Address field, enter the IP address that is used to uniquely
identify the source ETERNUS CS800 to the target. This may be different than the
actual network IP address of the source ETERNUS CS800.
If the target system is at ETERNUS CS800 2.1 Software or higher, this field is not
required. If the target system is at ETERNUS CS800 2.0.1.x Software or below, then
you must enter the IP address by which the target system recognizes the source
system. The default value is 0.0.0.0.
2. If data on other ETERNUS CS800 systems will be replicated to this ETERNUS CS800,
ETERNUS CS800
"Network" on page
CAUTION!
Select 128-bit encryption if you are sending data to a ETERNUS CS800
running a system software version prior to ETERNUS CS800 2.1.1 Software.
AES encryption options are available only if the Data-in-Flight license is
installed.
293).
Data is not encrypted when sending replication
data to the target system.
Data is encrypted using AES 128-bit encryption
when sending replication data to the target
system.
Data is encrypted using AES 256-bit encryption
when sending replication data to the target
system.
8.5 Replication Wizard
153

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents