
• Replication “to“ settings
• Replication “from“ settings
The Replication “to“settings section is used to configure lower ERA Servers. The option Enable “to“ replication
must be enabled and the IP address or the name of the master ERA Server Upper server entered. Data from the
lower server is then replicated to the master server.
The Replication “from“ settings allow master “upper” ERA Servers to accept data from lower ERA Servers, or to
transfer them to their master servers. The option Enable “from“ replication must be enabled and names of lower
servers should be defined delimited by a comma.
Both of these options must be enabled for ERA Servers located anywhere in the middle of the replication hierarchy
i.e., they have both upper and lower servers.
All of the previously mentioned scenarios are described by the figure below. The beige computers represent
individual ERA Servers. Each ERA Server is represented by its name which should be the same as %Computer Name%,
to avoid confusion and the corresponding settings in the replication dialog window.
Other options which influence the replication behavior of servers:
• Replicate threat log, Replicate firewall log, Replicate event log, Replicate scan log
If these options are selected, all information displayed on the Clients, Threat Log, Firewall Log, Event Log, Scan
Log, and Tasks tab is replicated in individual columns and lines. Information not stored directly in the database,
but in individual files i.e., .txt or .xml format, may not be replicated.
• Automatically replicate threat log details, Automatically replicate scan log details, Automatically replicate
client details
These options enable automatic replication of the complementary information stored in individual files. They can
also be downloaded on demand by clicking the Request button.
NOTE: You may wonder why some logs are replicated automatically and detailed logs and client configuration logs are
Comentarios a estos manuales