In standard replication, one system acts as a source, and a second system acts as a target. For a target or a management system to remotely manage a local backup system, the backup system has to explicitly grant privilege to the manager. This is done to secure a two-way handshake between the manager and the managed system. As part of the setup process, you will create a secure tunnel for optimized, secure communication between the source and target systems. For more details about remote management, see Granting privilege for remote management. For more details about secure tunnels, see About secure tunnels for Unitrends systems.
Begin replication setup by configuring the role of the source system and granting privilege to the target for remote management.
Tip! To use the Replication Wizard, it is best to connect to both the source and target systems in separate tabs in the same browser. The setup steps require that you switch from one system to the other at various points.
1 Verify that all requirements have been met for the source and target systems. See Replication requirements.
2 Open a browser and connect to the source system.
3 Select Replication > Replication Wizard. On the welcome screen, click Next to begin replication setup.
4 The wizard asks how you would like to configure the system. Click Replication Source so it is highlighted. Click Next.
To grant the remote management privilege
5 The wizard asks you to select a target for the source system’s replicated backups. Perform one of the following:
• If the target has not been added to the source system’s hosts file, select Add a New Target in the drop-down menu. Enter the hostname and IP address of the replication target in the specified fields. Be sure to enter the hostname exactly as it displays in the hosts file on the replication target system. Click Next.
• If the replication target has already been added, select it in the drop-down menu. Click Next.
6 Check the box that reads I agree that target can manage my system. This allows the target system to manage the source system. Click Next to proceed with generating a secure tunnel certificate request.
7 Click Generate Request. This generates a certificate signing request file. Click Okay, and save the file <source>.csr in a convenient location.
To continue with replication setup, you must configure the system role for the target and accept management privileges, as explained in Configure the target system role and create a secure tunnel.