Acronis Backup & Recovery 10 Advanced Workstation TIDLBPDES5 Manuale Utente

Codici prodotto
TIDLBPDES5
Pagina di 360
 
• 
Encrypted communication provides secure transfer of information between any two 
components—for example, between Acronis Backup & Recovery 10 Agent and Acronis Backup & 
Recovery 10 Storage Node—by encrypting the data being transferred. 
For instructions on how to set up secure authentication and data encryption settings, see Configuring 
communication options (p. 74). 
For instructions on how to manage SSL certificates used for secure authentication, see SSL certificates 
(p. 79). 
Note: The components of earlier Acronis products, including those of the Acronis True Image Echo family, cannot 
connect to the Acronis Backup & Recovery 10 components, regardless of the secure authentication and data 
encryption settings. 
 
2.11.8.2.  Client and server applications 
There are two stakeholders of the secure communication process: 
• 
Client application, or client, is an application that tries to establish connection. 
• 
Server application, or server, is an application to which the client tries to connect. 
For example, if Acronis Backup & Recovery 10 Management Console is connecting to Acronis Backup 
& Recovery 10 Agent on a remote machine, the former is the client and the latter is the server. 
An Acronis component can act as a client application, a server application, or both, as shown in the 
following table. 
Component name 
Can be 
client 
Can be 
server 
Acronis Backup & Recovery 10 
Management Console 
Yes No 
Acronis Backup & Recovery 10 Agent 
Yes 
Yes 
Acronis Backup & Recovery 10 
Management Server 
Yes Yes 
Acronis Backup & Recovery 10 
Storage Node 
Yes Yes 
Acronis PXE Server 
No 
Yes 
Acronis Backup & Recovery 10 
Bootable Agent 
Yes Yes 
 
 
 
2.11.8.3.  Configuring communication settings 
You can configure communication settings, such as whether to encrypt transferred data, for Acronis 
Backup & Recovery 10 components installed on one or more machines, by using Acronis 
Administrative Template. For information on how to load the Administrative Template, see How to 
load Acronis Administrative Template (p. 78). 
74
 
Copyright © Acronis, Inc., 2000-2009