Failback steps for authentication data
Use the following steps on a protocol node in the primary cluster after the node is repaired or replaced to fail back the authentication configuration.
- Save the current file authentication information on the primary cluster.
- Remove file authentication from the primary cluster.
- Restore file authentication on the primary cluster based on the information that is saved in step 1.
Restore steps for authentication data
Use the following steps on a protocol node in the primary cluster and the secondary cluster to restore the authentication configuration.
- Save the current file authentication information on the primary cluster.
- Remove file authentication from the primary cluster.
- Restore file authentication on the primary cluster based on the information that is saved in step 1.
- Save the current file authentication information on the secondary cluster.
- Remove file authentication from the secondary cluster.
- Restore file authentication on the secondary cluster based on the information that is saved in step 4.