A rogue application that is part of a client system and that imitates the client, API, or GUI application can initiate an attack on the server. To reduce server vulnerability to such attacks, you can specify a percentage of client extents for the server to verify.
If the server detects that a security attack is in progress, the current session is canceled. In addition, setting of the node DEDUPLICATION parameter is changed from CLIENTORSERVER to SERVERONLY. The SERVERONLY setting disables client-side data deduplication for that node.
The server also issues a message that a potential security attack was detected and that client-side data deduplication was disabled for the node.
If client-side data deduplication is disabled, all other client operations (for example, backup operations) continue. Only the client-side data deduplication feature is disabled. If client-side data deduplication is disabled for a node because a potential attack was detected, the server deduplicates the data that is eligible for client-side data deduplication.
To show the current value for SET DEDUPVERIFICATIONLEVEL, issue the QUERY STATUS command. Check the value in the Client-side Deduplication Verification Level field.