A deployment uses native encryption for replication traffic between two clusters. An administrator subsequently enables network segmentation to isolate this traffic. Which specific maintenance step must be performed to ensure the encrypted replication functions correctly on the new segmented network?
Submit