Configure the target system role and create a secure tunnel

After configuring the system role for the source and granting management privilege to the target, you must configure the system role for the target and create a secure tunnel between the source and target systems. For more information about secure tunnels, see About secure tunnels for Unitrends systems.

To configure the system role for the target

1        Verify that all requirements have been met for the source and target systems. See Replication requirements.

2        Open a browser and connect to the target system.

3        Select Replication > Replication Wizard. On the welcome page, click Next to begin replication setup.

4        The wizard asks how you would like to configure the system. Click Replication Target so it is highlighted. Click Next.

5        If you have not configured the system as a replication target, the wizard prompts you to change the installation type. Select Install as a vault (a replication target for some other local backup system). (If you have already configured the system as a replication target, the wizard skips to the next step.) Click Next.

To create a secure tunnel

6        The wizard asks you to select a source to replicate to the target. Perform one of the following:

     If the replication source has not been added to the target system’s hosts file, select Add a New Source from the drop-down menu. Enter the hostname and IP address of the replication source in the specified fields. Be sure to enter the hostname exactly as it displays in the hosts file on the replication target system. Click Next to view the Create a Secure Tunnel Target step.

     If the source has already been added, select it in the drop-down menu. Click Next to view the Create a Secure Tunnel Target step.

7        At the top of the Create a Secure Tunnel target page, the network settings for the connection display. These settings are used to create the secure tunnel interface. Use the default IP, subnet, and port unless these settings cause a conflict in your environment. If necessary, enter your own values. Click Create a Secure Tunnel Target.

8        A message displays asking if you are sure you want to proceed. Once you create a secure tunnel, this procedure cannot be undone. If you are ready to create a secure tunnel, click Yes to proceed with signing the secure tunnel certificate request.

Note: If the replication setup process is interrupted after Step 7, the wizard skips this step when you start over with the setup process. This is not an error, as a secure tunnel can only be created once. When the wizard skips this step, proceed to Step 8.

9        Click Sign Request. You are prompted to browse and open the file called <source>.csr you saved earlier. By opening the file, you sign the certificate. Click Okay and save the signed certificate file called <source>.<target>.crt in a convenient location.

10    You are prompted to save the Certificate Authority file. Click Okay and save the file called <target>-ca.crt in a convenient location.

11    You are prompted to send the certificate files and other information to the source system for final configuration. Click Okay.

To continue the replication setup, you must return to the replication wizard on the source system and proceed to Configure the secure tunnel and add the source system to the target.