Secured and Non-secured Clusters
The following table explains the scenarios supported based on whether the clusters or secured or non- secured:
| Source Cluster | Destination Cluster | Running on Source | Running on Destination | 
|---|---|---|---|
| Non-secured | Non-secured | Supported | Supported | 
| Non-secured | Secured | Not Supported | Supported | 
| Secured | Non-secured | Supported | Not Supported | 
| Secured | Secured | Supported | Supported | 
