Secured and Non-secured Clusters

The following table explains the scenarios supported based on whether the clusters or secured or non- secured:

Source ClusterDestination ClusterRunning on SourceRunning on Destination
Non-securedNon-securedSupportedSupported
Non-securedSecuredNot SupportedSupported
SecuredNon-secured
SupportedNot Supported
SecuredSecuredSupportedSupported
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard