Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
Chapter 11 Common Administrative Tasks
11-10
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
done at both configuration setup and again when the task actually runs. For
version and compatibility information, see the
version and compatibility information, see the
Full versus Partial Backups
During a full initial backup, a backup for 800GB may take up to 10 hours. Partial
backup depends on how much data got accumulated and how many files have been
changed and to what extent. If you want to perform daily backups, this action may
take up to 3 hours. Weekly and monthly backups may take longer time. These
numbers may vary.
backup depends on how much data got accumulated and how many files have been
changed and to what extent. If you want to perform daily backups, this action may
take up to 3 hours. Weekly and monthly backups may take longer time. These
numbers may vary.
Note
Data from an Security Management appliance can be backed up to exactly one
Security Management appliance. Chained backup, that is backup to a backup is
not supported. If a backup is scheduled to or from an Security Management
appliance, you will not be allowed to schedule another backup to or from that
Security Management appliance. The current ongoing backup and future backups
should be canceled to schedule backups to another Security Management
appliance.
Security Management appliance. Chained backup, that is backup to a backup is
not supported. If a backup is scheduled to or from an Security Management
appliance, you will not be allowed to schedule another backup to or from that
Security Management appliance. The current ongoing backup and future backups
should be canceled to schedule backups to another Security Management
appliance.
Scheduling a Backup
Scheduling a backup is typically performed when a user wants to transfer data
from one Security Management appliance to another Security Management
appliance.
from one Security Management appliance to another Security Management
appliance.
In the following diagram you can see a typical data transfer from the ‘source’
Security Management appliance, SMA 1, to the ‘target’ Security Management
appliance, SMA 2.
Security Management appliance, SMA 1, to the ‘target’ Security Management
appliance, SMA 2.