The glossary below contains many of the terms you will find in common use throughout the Symantec Security Response website. Please refer to this list to find definitions of terms and answers to other Internet security-related questions.
An RVG on the Bunker node that contains only a Replicator Log but no data volumes and has RLINKs to the Primary and Secondary. Under normal operating conditions this RVG will function as a Secondary. In the case of a disaster at the Primary, the Bunker RVG can act as a Primary and can be used to replay the pending writes from the Replicator Log on the Bunker node to the Secondary and thus bring the Secondary up-to-date with the original Primary.
Follow us for all the latest news, tips and updates.