Failback steps for authentication data

Use the following steps on a protocol node in the primary cluster after the node is repaired or replaced to fail back the authentication configuration.

  1. Save the current file authentication information on the primary cluster.
  2. Remove file authentication from the primary cluster.
  3. Restore file authentication on the primary cluster based on the information that is saved in step 1.

Restore steps for authentication data

Use the following steps on a protocol node in the primary cluster and the secondary cluster to restore the authentication configuration.

  1. Save the current file authentication information on the primary cluster.
  2. Remove file authentication from the primary cluster.
  3. Restore file authentication on the primary cluster based on the information that is saved in step 1.
  4. Save the current file authentication information on the secondary cluster.
  5. Remove file authentication from the secondary cluster.
  6. Restore file authentication on the secondary cluster based on the information that is saved in step 4.