Encryption handling

In replicating systems, backups that are encrypted on the source are encrypted on the target using the target system’s key. In-flight, the backup data is first decrypted via the transmission protocol, then before being saved on the target, is re-encrypted using the target’s key. If encryption is not configured on the target, replication of encrypted backups fails. For this reason, it is recommended that encryption be configured on the target system. Once encryption is configured, the target can receive both encrypted and non-encrypted backups from source systems for replication.

In vaulting systems, encrypted backups remain encrypted as they were on the source system. To restore encrypted data from the vault, the source system’s encryption key must be used.