You are here: Legacy Vaulting > Vaulting setup > Configuring a secure tunnel with legacy vaults

Configuring a secure tunnel with legacy vaults

Note:  The steps described here can be run as a standalone procedure or as part of a larger process. For an overview of the process, see Vaulting setup.

This section describes how secure tunnels are used, prerequisites needed, and the steps for configuring a secure tunnel. See the following topics for details:

About secure tunnels for Unitrends legacy vaulting systems
Prerequisites to configuring a secure tunnel for legacy vaults
Prerequisites to configuring a secure tunnel for legacy vaults