Database multiplexing mode replicates the database on all servers that comprise the cluster system. It achieves this by transferring and reflecting the updated transaction logs of the database from the primary server to the standby server.
To safeguard the database against unauthorized access and protect the confidentiality of data when transferring the transaction logs, carefully consider security and take note of the following:
Do not use trust authentication when using replication connection.
Configure the admin network and the log transfer network so that they cannot be connected from the outside, as shown below.
Figure 5.5 Security
However, it may not always be possible to adopt the configuration mentioned above. For example, you may want to place the servers in a nearby/neighboring office to minimize network delays.
In this case, combine the following features to enhance security:
When these features are combined, security will be achieved as shown below.
Figure 5.6 Security achieved when standby server authentication is combined with transaction log encryption
See
Refer to "Performing Database Multiplexing" under "Configuring Secure Communication Using Secure Sockets Layer" in the Operation Guide for information on encrypting SSL communications.