Prerequisites to configuring a secure tunnel for legacy vaults

Verify the following before configuring a secure tunnel:

     Ensure that the backup system can contact the vault, and verify that the vault IP address has been added to the backup system’s hosts table. To configure the hosts table, select Settings > Clients, Networking, Notifications > Networks > Hosts.

     Ensure that the hostname of the backup system is not the same as the hostname of the vault. To change the backup system’s hostname, select Settings > Clients, Networking, Notifications > Networks > Hostname.