ACRONIS Backup & Recovery 10 Advanced Server Virtual Edition User's Guide Page 89

  • Download
  • Add to my manuals
  • Print
  • Page
    / 410
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 88
Copyright © Acronis, Inc., 2000-2009 89
2.14.8. Communication between Acronis Backup & Recovery 10
components
This section describes how Acronis Backup & Recovery 10 components communicate with each other
using secure authentication and encryption.
This section also provides information on configuring communication settings, selecting a network
port for communication, and managing security certificates.
2.14.8.1. Secure communication
Acronis Backup & Recovery 10 provides the capability to secure the data transferred between its
components within a local area network and through a perimeter network (also known as
demilitarized zone, DMZ).
There are two mechanisms which ensure secure communication between Acronis Backup & Recovery
10 components:
Secure authentication provides secure transfer of certificates needed to establish a connection,
by using the Secure Sockets Layer (SSL) protocol.
Encrypted communication provides secure transfer of information between any two
componentsfor example, between Acronis Backup & Recovery 10 Agent and Acronis Backup &
Recovery 10 Storage Nodeby encrypting the data being transferred.
For instructions on how to set up secure authentication and data encryption settings, see Configuring
communication options (p. 90).
For instructions on how to manage SSL certificates used for secure authentication, see SSL certificates
(p. 93).
Note: The components of earlier Acronis products, including those of the Acronis True Image Echo family, cannot
connect to the Acronis Backup & Recovery 10 components, regardless of the secure authentication and data
encryption settings.
2.14.8.2. Client and server applications
There are two stakeholders of the secure communication process:
Client application, or client, is an application that tries to establish connection.
Server application, or server, is an application to which the client tries to connect.
For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup
& Recovery 10 Agent on a remote machine, the former is the client and the latter is the server.
An Acronis component can act as a client application, a server application, or both, as shown in the
following table.
Component name Can be client Can be server
Acronis Backup & Recovery 10 Management Console Yes No
Acronis Backup & Recovery 10 Agent Yes Yes
Page view 88
1 2 ... 84 85 86 87 88 89 90 91 92 93 94 ... 409 410

Comments to this Manuals

No comments