Step I:    Configuring a secure tunnel with legacy vaults

Tip: The steps described here can be run as a standalone procedure or as part of a larger process. For an overview of the process, see To set up vaulting between a backup system and vault.

This section describes how secure tunnels are used, prerequisites needed, and the steps for configuring a secure tunnel. See the following topics for details:

     About secure tunnels for Unitrends legacy vaulting systems

     Prerequisites to configuring a secure tunnel for legacy vaults

     To configure a secure tunnel for legacy vaults