Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
11-15
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
Chapter 11 Common Administrative Tasks
Additionally, if you try to schedule a report and forget that a backup is in progress,
you can check the system status by choosing Management Appliance >
Centralized Services. From this window you can see the warning that a system
backup is in progress.
you can check the system status by choosing Management Appliance >
Centralized Services. From this window you can see the warning that a system
backup is in progress.
Interruption of Backup Process
If there is an interruption of the backup process and the backup process is not
completed, the next time a backup is attempted, the Security Management
appliance can start the backup process up from where it was stopped.When a
backup is cancelled, the backup process does not erase the data it has already
backed up onto the target machine.
completed, the next time a backup is attempted, the Security Management
appliance can start the backup process up from where it was stopped.When a
backup is cancelled, the backup process does not erase the data it has already
backed up onto the target machine.
During the next backup, the backup process compares the files that have already
been backed up and does not transfer the files if they are identical. If the files have
changed, the backup process synchronizes the files in the time between the two
backups.
been backed up and does not transfer the files if they are identical. If the files have
changed, the backup process synchronizes the files in the time between the two
backups.
Scheduling a backup should not take much time as it needs to backup just the data
that has been accumulated since the completion of first backup. The time taken
for this backup depends on time elapsed from the first backup and amount of data
collected during that time. After this backup, data on both the Security
Management appliances are identical.
that has been accumulated since the completion of first backup. The time taken
for this backup depends on time elapsed from the first backup and amount of data
collected during that time. After this backup, data on both the Security
Management appliances are identical.