The
DD system's Ethernet interface enables data to be replicated from the production system to the
Cyber Recovery vault when a synchronization job is run.
Policies can be run manually or scheduled to synchronize regularly. Each synchronization job triggers the opening and closing of the
Cyber Recovery vault through the
DD replication Ethernet interface, as needed. On completion of the replication, the
Cyber Recovery vaultDD system's replication Ethernet interface returns to a closed state.
The following table describes the connection states:
Table 1. Cyber Recovery connection states
Status
Icon
Description
Locked
All configured replication connections are closed because no replication is being performed. If a replication policy is run, the
Cyber Recovery software opens the connection and changes the vault state to Unlocked.
Unlocked
One or more replication network connections are open because a replication is being performed. The state returns to Locked when the replication completes.
Secured
All replication network connections are secured because a security officer or admin user manually locked the connection due to a security breach. You cannot initiate any replication policy actions. When the
Cyber Recovery vault is released and returns to the Locked state, you can then run replication policies.
Degraded
If there are multiple
DD systems in the
Cyber Recovery vault and one
DD system is unable to communicate with the
Cyber Recovery software, the vault status is Degraded. This scenario can occur if you change either the FQDN or the IP address of the
DD system. An alert notifies you about the
Cyber Recovery vault status.
Unknown
If there are multiple
DD systems in the
Cyber Recovery vault and all the
DD systems are unable to communicate with the
Cyber Recovery software, the vault status is Unknown. This scenario can occur if you do not create policies when you first install the
Cyber Recovery software or if you change either the FQDNs or IP addresses of the
DD systems. An alert notifies you about the
Cyber Recovery vault status.
Both the security officer and admin user can view the state of the
Cyber Recovery vault.
Data is not available for the Topic
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\