< Previous | TOC | Index | Next >
With the use of I/O enabled fencing, all remaining cases with the potential to corrupt data (for which jeopardy handling cannot protect) are addressed.
See Fencing administration.
^ Return to Top