Step I: Configuring a secure tunnel with legacy vaults
Tip: The steps described here can be run as a standalone procedure or as part of a larger process. For an overview of the process, see To set up vaulting between a backup system and vault.
This section describes how secure tunnels are used, prerequisites needed, and the steps for configuring a secure tunnel. See the following topics for details:
• About secure tunnels for Unitrends legacy vaulting systems
• Prerequisites to configuring a secure tunnel for legacy vaults