DL4300 Appliance
Replication with Rapid Recovery
20
Key security concepts and considerations include:
•
Encryption is performed using 256 Bit Advanced Encryption Standard (AES) in Cipher Block Chaining (CBC) mode that
is compliant with SHA-3.
•
Deduplication operates within an encryption domain to ensure privacy.
•
Encryption is performed without impact on performance.
•
You can apply a single encryption key to any number of protected machines, but any protected machine can only have
one encryption key applied at a time.
•
You can add, remove, import, export, modify, and delete encryption keys that are configured on the Rapid Recovery
Core.
CAUTION:
Rapid Recovery takes a new snapshot whenever you apply an encryption key to a
protected machine. A new snapshot is also triggered after you disassociate an encryption key for a
protected machine.
Encryption keys generated from the Rapid Recovery Core are text files that contain four parameters, as described
in the following table:
Table 1. Components of an encryption key
The Name describes the value equivalent to the key name given when adding a key in the RR Core console. The
key consists of 107 randomly generated English alphabetic, numeric, and mathematical operator characters. The
ID consists of 26 randomly generated upper-case and lower-case English characters. The Comment contains the
text of the key description entered when the key was created.
Component
Description
Name
This value is equivalent to the key name given when
adding a key in the Rapid Recovery Core Console.
Key
This parameter consists of 107 randomly generated
English alphabetic, numeric, and mathematical
operator characters.
ID
The key ID consists of 26 randomly generated
upper-case and lower-case English characters.
Comment
The comment contains the text of the key description
entered when the key was created.
Parent topic
Replication with Rapid Recovery
This section provides conceptual and procedural information to help you understand and configure replication in
Rapid Recovery.
Replication is the process of copying recovery points from one Rapid Recovery Core and transmitting them
to another Rapid Recovery Core for disaster recovery purposes. The process requires a paired source-target
relationship between two or more Cores.
The source Core copies the recovery points of selected protected machines, and then asynchronously and
continually transmits that snapshot data to the target Core.
Unless you change the default behavior by setting a replication schedule, the Core starts a replication job
immediately after completion of every backup snapshot, checksum check, attachability check, and the nightly
jobs. For more information, see
.