Security considerations for Volume Replicator

Volume Replicator operations can be performed directly from the VEA or using the CLI. To understand the concept of the local (originator) host and remote (target) host better, you need to understand how the configuration-specific operations are performed. Using VEA, any operation on a Volume Replicator host to which the VEA is not directly connected, is performed as a remote operation.

You can perform the operations on various Volume Replicator objects which include RVG, RDS, replicated volumes, and the RLINKs (Secondaries). Some Volume Replicator operations involve more than one host as a part of their operations. Before you execute such an operation, Volume Replicator first validates whether the originator host is allowed to execute the specified operation on the target hosts. If not, the specified operation fails. This validation process is referred to as the security check. Local operations for the hosts that are connected to VEA require local administrative privileges.