Note: The steps described here can be run as a standalone procedure or as part of a larger process. For an overview of the process, see Vaulting setup.
This section describes how secure tunnels are used, prerequisites needed, and the steps for configuring a secure tunnel. See the following topics for details:
• | About secure tunnels for Unitrends legacy vaulting systems |
• | Prerequisites to configuring a secure tunnel for legacy vaults |
• | Prerequisites to configuring a secure tunnel for legacy vaults |