ACRONIS Backup & Recovery 10 Advanced Server User's Guide Page 131

  • Download
  • Add to my manuals
  • Print
  • Page
    / 381
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 130
Copyright © Acronis, Inc., 2000-2010 131
To create a new folder for the database, click
Create folder.
2. Click OK.
When choosing a folder for the vault's database, follow these considerations:
The folder size may become largeone estimate is 200 GB per 8 TB of used space, or about 2.5
percent.
The folder permissions must allow the user account under which the storage node's service is
running (by default, ASN User) to write to the folder. When assigning permissions, specify the
user account explicitly (not just Everyone).
Vault encryption
If you protect a vault with encryption, anything written to the vault will be encrypted and anything
read from it will be decrypted transparently by the storage node, using a vault-specific encryption
key stored on the node. In case the storage medium is stolen or accessed by an unauthorized person,
the malefactor will not be able to decrypt the vault contents without access to the storage node.
This encryption has nothing to do with the archive encryption specified by the backup plan and
performed by an agent. If the archive is already encrypted, the storage node-side encryption is
applied over the encryption performed by the agent.
To protect the vault with encryption
1. Select the Encrypt check box.
2. In the Enter the password field, type a password.
3. In the Confirm the password field, re-type the password.
4. Select one of the following:
AES 128the vault contents will be encrypted using the Advanced Standard Encryption (AES)
algorithm with a 128-bit key
AES 192the vault contents will be encrypted using the AES algorithm with a 192-bit key
AES 256the vault contents will be encrypted using the AES algorithm with a 256-bit key.
5. Click OK.
The AES cryptographic algorithm operates in the Cipher-block chaining (CBC) mode and uses a
randomly generated key with a user-defined size of 128, 192 or 256 bits. The larger the key size, the
longer it will take for the program to encrypt the archives stored in the vault and the more secure the
archives will be.
The encryption key is then encrypted with AES-256 using a SHA-256 hash of the password as a key.
The password itself is not stored anywhere on the disk; the password hash is used for verification
purposes. With this two-level security, the archives are protected from any unauthorized access, but
recovering a lost password is not possible.
Creating an unmanaged centralized vault
To create an unmanaged centralized vault, perform the following steps.
Vault
Name
Specify a unique name for the vault. The creation of two centralized vaults with the same
name is prohibited.
Comments
Page view 130
1 2 ... 126 127 128 129 130 131 132 133 134 135 136 ... 380 381

Comments to this Manuals

No comments