ACRONIS SNAP DEPLOY 3 - FOR WORKSTATION User's Guide Page 14

  • Download
  • Add to my manuals
  • Print
  • Page
    / 145
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 13
14 Copyright © Acronis International GmbH, 2002-2014
1.4.9 Multicast TTL and network bandwidth throttling
Deployment configuration has a parameter that specifies time to live (TTL) for multicast packets. By
using this setting, you can limit the distribution of multicast packets via gateways.
By setting the permitted bandwidth, you can limit the network usage during deployment.
1.4.10 Falling back to unicast
To make deployment to multiple machines faster, Acronis Snap Deploy 5 multicasts the contents of
the master image (the deployment stream) across the network. This way, deployment can run
simultaneously on all machines even though the deployment stream is sent only once.
If the network restricts multicasting, Acronis Snap Deploy 5 can automatically switch to the use of
unicast instead.
When using unicast, Acronis Snap Deploy 5 sends a copy of the deployment stream to each machine.
This way, the network becomes more loaded, so the deployment process may take longer.
1.4.11 Encrypted communication
Components of Acronis Snap Deploy 5 communicate to each other by using the Secure Sockets Layer
(SSL) cryptographic protocol. Encryption starts on the first (earliest) stage of the connection attempt,
so all data transferred in the next steps (including data required for client authentication) is
encrypted.
After the components of Acronis Snap Deploy 5 are installed, encrypted communication between the
components is enabled automatically.
The contents of the master image are transferred unencrypted.
1.4.12 Password protection
Master images taken with Acronis Snap Deploy 5 can be protected with a password to prevent
unauthorized deployment.
Acronis Snap Deploy 5 also supports password-protected backups created by Acronis True Image,
Acronis Backup & Recovery 10, Acronis Backup & Recovery 11, or Acronis Backup 11.5.
To prevent Acronis bootable components from unauthorized execution, the bootable components in
the Acronis boot menu can also be protected with a password. The user will be asked for the
password when selecting a bootable component. No password is required to start the operating
system on the machine.
1.5 Supported operating systems for imaging and
deployment
Acronis Snap Deploy 5 provides full-featured imaging and deployment of the operating systems listed
in the table that follows.
For most operating systems, you can change settings such as the network name that the machines
will have after the deployment.
Page view 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 144 145

Comments to this Manuals

No comments