Acronis true image echo Manual

Descargar
Página de 162
 
15                                                                                 Copyright © Acronis, Inc., 2000-2009 
 
2.2.3 Encrypted communication 
Acronis True Image Echo Enterprise Server provides capability to secure all data 
transferred between Acronis components within local net and through DMZ, including the 
backup stream. 
Encryption starts on the first (earliest) stage of connection attempt, so all data transferred 
on the next steps (including data required for client authentication) is encrypted.  
Once Acronis True Image Echo Enterprise Server components are installed, encrypted 
communication between the components is enabled automatically. 
The earlier versions of Acronis True Image Enterprise Server did not support encrypted 
communication, therefore connection to such components, if they present on the 
network, will not be encrypted. You have an option to completely disable non-encrypted 
communication with some or all Acronis True Image Echo Enterprise Server components. 
In this case, the components will not be able to communicate with components of earlier 
versions. For how to disable non-encrypted communication, see the next section. 
 
The earlier versions of Acronis True Image Management Console cannot communicate 
with Acronis True Image Echo Enterprise Server agents. The console must be upgraded 
to the Acronis True Image Echo Enterprise Server console. 
Encryption is provided with Secure Socket Layer mechanism. There are two stakeholders 
of the encryption operation: 
Client application – the application that tries to establish (initiates) connection. This 
could be the Acronis True Image Management Console or Acronis Group Server. Acronis 
True Image Echo Enterprise Server local version can also be a client when it performs 
backup to Acronis Backup Server. 
Server application – the application to which the client tries to connect. This could be 
Acronis True Image Agent, Acronis Group Server, Acronis Backup Server. 
2.2.4  Security parameters in Acronis Administrative Template 
As stated above, encryption generally does not require setting up. However, connection to 
Acronis components of earlier versions will not be encrypted. To completely disable non-
encrypted communication with some or all Acronis True Image Echo Enterprise Server 
components, use the Administrative Template, provided by Acronis. 
Through the Microsoft Group Policy mechanism, the template can be applied to a single 
computer as well as to a domain. 
How to apply Acronis Administrative Template 
1. Run Windows Group Policy Objects Editor (\WINDOWS\system32\gpedit.msc). 
2. Open the Group Policy object you want to edit, and in the console tree right-click 
Administrative Templates. 
3. Click Add/Remove Templates.  
4. Click Add.  
5. Browse to the Acronis Administrative Template  
(\Program files\Common Files\Acronis\Agent \acronis_agent.adm or \Program 
files\Acronis\TrueImageConsole\acronis_agent.adm), and click Open. 
6. Once the template is added, open it and edit the desired settings.