Users Guide

NOTE: In this scenario, customers only have access to their own data.
Possible replication configurations include:
Point-to-point replication. Replicates one or more protected machines from a single source Core to a single target Core.
Figure 9. Point-to-point replication configuration
Multipoint-to-point replication. Replicates protected machines from multiple source Cores to a single target Core.
Figure 10. Multipoint-to-point replication configuration
Point-to-multipoint replication. Replicates one or more protected machines from a single source Core to more than one
target Core.
200
Protecting workstations and servers