28
•
Replication “to“ settings
•
Replication “from“ settings
The
Replication “to“settings
section is used to configure lower ERA Servers. The option
Enable “to“ replication
must be enabled and the IP address or the name of the master ERA Server (
Upper server
) entered. Data from the
lower server is then replicated to the master server.
The
Replication “from“ settings
allow master “upper” ERA Servers to accept data from lower ERA Servers, or to
transfer them to their master servers. The option
Enable “from“ replication
must be enabled and names of lower
servers should be defined (delimited by a comma).
Both of these options must be enabled for ERA Servers located anywhere in the middle of the replication hierarchy
(i.e., they have both upper and lower servers).
All of the previously mentioned scenarios are described by the figure below. The beige computers represent
individual ERA Servers. Each ERA Server is represented by its name (which should be the same as %
Computer Name%
,
to avoid confusion) and the corresponding settings in the replication dialog window.
Other options which influence the replication behavior of servers:
•
Replicate threat log, Replicate firewall log, Replicate event log, Replicate scan log
If these options are selected, all information displayed on the
Clients
,
Threat Log
,
Firewall Log
,
Event Log
,
Scan
Log
, and
Tasks
tab is replicated in individual columns and lines. Information not stored directly in the database,
but in individual files (i.e., .txt or .xml format), may not be replicated.
•
Automatically replicate threat log details, Automatically replicate scan log details, Automatically replicate
client details
These options enable automatic replication of the complementary information stored in individual files. They can
also be downloaded on demand by clicking the
Request
button).
NOTE:
You may wonder why some logs are replicated automatically and detailed logs and client configuration logs are