Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

PowerScale OneFS Web Administration Guide

SyncIQ traffic encryption

SyncIQ data that is transmitted between the source and target clusters is encrypted.

SyncIQ provides additional protection from man-in-the-middle attacks and prevents unauthorized source or target relationships. The standard certificate configuration for SyncIQ policy encryption requires six files:

  • SourceClusterCert.pem - A single end-entity certificate that identifies the Source cluster
  • SourceClusterKey.pem - The associated private key file that goes with the Source cluster identity cert
  • SourceClusterCA.pem - A self-signed root CA file that issued the Source cluster identity cert
  • TargetClusterCert.pem - A single end-entity certificate that identifies the Target cluster
  • TargetClusterKey.pem - The associated private key file that goes with the Target cluster identity cert
  • TargetClusterCA.pem - A self-signed root CA file that issued the Target cluster identity cert (may be the same as 3)

Because SyncIQ encryption requires mutual authentication SSL handshakes, each cluster must specify its own identity certificate and the CA certificate of the peer.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\