D-Link DNS-1250-04 Acronis Backup Software User Manual for DNS-1250-04 - Page 94

Backup selection, Location selection, Access credentials for source, To select a location

Page 94 highlights

 To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. 1. In the table to the right of the tree, select the archive. The table displays the names of the archives contained in each vault/folder you select. If the archive is password-protected, provide the password. 2. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 3. Click OK. 5.4.3 Backup selection To specify a backup to validate 1. In the upper pane, select a backup by its creation date/time. The bottom part of the window displays the selected backup content, assisting you to find the right backup. 2. Click OK. 5.4.4 Location selection To select a location Enter the full path to the location in the Path field or select the desired location in the folders tree.  To select a personal vault, expand the Personal group and click the appropriate vault.  To select a local folder (CD/DVD drive, or locally attached tape device), expand the Local folders group and click the required folder.  To select a network share, expand the Network folders group, select the required networked machine and then click the shared folder. If the network share requires access credentials, the program will ask for them.  To select FTP or SFTP server, expand the corresponding group and click the appropriate folder on the server. According to the original FTP specification, credentials required for access to FTP servers are transferred through a network as plaintext. This means that the user name and password can be intercepted by an eavesdropper using a packet sniffer. Using the archives table To assist you with choosing the right location, the table displays the names of the archives contained in each location you select. While you are reviewing the location content, archives can be added, deleted or modified by another user or by the program itself according to scheduled operations. Use the Refresh button to refresh the list of archives. 5.4.5 Access credentials for source Specify the credentials required for access to the location where the backup archive is stored.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153

To select
FTP
or
SFTP
server, expand the corresponding group and click the appropriate folder on
the server.
According to the original FTP specification, credentials required for access to FTP servers are
transferred through a network as plaintext. This means that the user name and password can be
intercepted by an eavesdropper using a packet sniffer.
1.
In the table to the right of the tree, select the archive. The table displays the names of the
archives contained in each vault/folder you select. If the archive is password-protected, provide
the password.
2.
While you are reviewing the location content, archives can be added, deleted or modified by
another user or by the program itself according to scheduled operations. Use the
Refresh
button
to refresh the list of archives.
3.
Click
OK
.
5.4.3
Backup selection
To specify a backup to validate
1.
In the upper pane, select a backup by its creation date/time.
The bottom part of the window displays the selected backup content, assisting you to find the
right backup.
2.
Click
OK
.
5.4.4
Location selection
To select a location
Enter the full path to the location in the Path field or select the desired location in the folders tree.
To select a personal vault, expand the
Personal
group and click the appropriate vault.
To select a local folder
(CD/DVD drive, or locally attached tape device), expand the
Local folders
group and click the required folder.
To select a network share, expand the
Network folders
group, select the required networked
machine and then click the shared folder. If the network share requires access credentials, the
program will ask for them.
To select
FTP
or
SFTP
server, expand the corresponding group and click the appropriate folder on
the server.
According to the original FTP specification, credentials required for access to FTP servers are
transferred through a network as plaintext. This means that the user name and password can be
intercepted by an eavesdropper using a packet sniffer.
Using the archives table
To assist you with choosing the right location, the table displays the names of the archives contained
in each location you select. While you are reviewing the location content, archives can be added,
deleted or modified by another user or by the program itself according to scheduled operations. Use
the
Refresh
button to refresh the list of archives.
5.4.5
Access credentials for source
Specify the credentials required for access to the location where the backup archive is stored.