Configure encryption on the replication target

In replicating systems, backups that are encrypted on the source are encrypted on the target using the target system’s key. If encryption is not configured on the target, replication of encrypted backups fails. Once encryption is configured, the target can receive both encrypted and non-encrypted backups from source systems for replication.

Follow the steps in To configure encryption to configure encryption on the replication target. If you would like to replicate backups to a logical device, see Add a logical device to associate with a source system If you are ready to begin standard replication setup, proceed to Configure the source system role and grant privilege to the target for remote management. For cross-replication setup, proceed to Configure the ST source system for cross-replication and grant management privilege to the ST target.