LogoLogo
Web HomeTutorialsPortal
  • Bamboozle Wiki and Documents
  • Products
    • Cloud
      • Compute
        • Managing Virtual Machines
          • Supported guest operating systems
          • Creating virtual machines
          • Connecting to virtual machines
          • Managing virtual machine power state
          • Attaching ISO images to virtual machines
          • Reconfiguring virtual machines
            • Changing virtual machine resources
            • Configuring network interfaces of virtual machines
            • Configuring virtual machine volumes
          • Monitoring virtual machines
          • Shelving virtual machines
          • Rescuing virtual machines
          • Managing guest tools
            • Installing guest tools
            • Uninstalling guest tools
          • Troubleshooting virtual machines
          • Deleting virtual machines
          • Managing SSH keys
        • Managing security groups
          • Creating and deleting security groups
          • Managing security group rules
          • Changing security group assignment
        • Managing images
          • Uploading images
          • Creating volumes from images
          • Preparing templates
            • Preparing Linux templates
            • Preparing Windows templates
            • Enabling logging for virtual machines
        • Managing volumes
          • Creating and deleting volumes
          • Attaching and detaching volumes
          • Resizing volumes
          • Creating images from volumes
          • Cloning volumes
          • Managing volume snapshots
        • Managing virtual networks
        • Managing VPN connections
          • Creating VPN connections
          • Editing VPN connections
          • Restarting and deleting VPN connections
        • Managing virtual routers
          • Managing router interfaces
          • Managing static routes
      • Managed Kubernetes
        • Creating and deleting Kubernetes clusters
      • Object Storage
        • Instances
        • How-to
          • Access Storage with S3 SDKs
          • Access Object Storage with Cyberduck
          • Access Storage with Mountainduck
        • Addtional Ressources
          • Supported Amazon S3 features
    • Servers
      • Cloud Servers
      • Dedicated Servers
    • Cyber Protect
      • Welcome to Cyber Protect
      • Supported features by OS
      • Activating the account
        • Password requirements
        • Two-factor authentication
      • Accessing the Cyber Protect service
      • The Cyber Protect console
      • Installing the software
        • Which agent do I need?
        • System requirements for agents
        • Preparation
        • Linux packages
        • Proxy server settings
        • Installing the Protection Agents
          • Downloading protection agents
          • Installing protection agents in Windows
          • Installing protection agents in Linux
          • Installing protection agents in macOS
          • Granting the required system permissions to the Connect Agent
          • Changing the logon account on Windows machines
          • Dynamic installation and uninstallation of components
    • Business Email
      • Getting started
        • DNS Records
        • Setting up a Mail Client with IMAP
        • Setting up your Mailbox with macOS, iOS, ipadOS and Android Devices
        • Configure Microsoft Outlook for Business Email
        • Zimbra Connector for Microsoft Outlook User Guide
      • Web Mail Client
        • Webmail Login
        • Mail
          • Left Sidebar
          • Email Pane
          • Reading Pane
          • Keyboard Shortcuts
      • Zimbra Modern Desktop
    • Web Hosting
      • Linux Web Hosting
        • cPanel Overview
          • Getting Started in cPanel
          • Server Information for cPanel
        • Preferences
          • Account Preferences
          • Audit Log
          • Change Language
          • Contact Information
      • Windows Web Hosting
    • SSL Certificates
      • SSL Intermediate and ROOT CA Bundles
        • RapidSSL CA Bundle
  • Tutorials
    • Rocky Linux
      • Rocky Linux 9
        • Basic Server Setup with Rocky Linux 9
  • Billing
    • Payment Methods
    • Credit Card Refunds
  • Legal
    • Legal Documents
      • Terms & Conditions
      • Master Agreement for Datacenter IP Services
      • Privacy
      • Service Level Agreement (SLA)
        • Public & Private Cloud
        • IP Transit Service Level Agreement
      • GDPR
        • FAQ
        • Data Processing Agreement
          • Schedule 1: Description of the Processing and Subprocessors
          • Schedule 2: Controller-to-Controller Information for International Data Transfers
      • Supplier Code of Conduct
  • Security
    • Platform Security
    • Infrastructure Security
    • Certification Reports
  • Pricing
    • Overview
    • Cloud
      • Compute
      • Volumes & Snapshots
      • Load Balancers
      • VPN
      • Elastic IPs
      • Traffic
    • Billing Q&A
      • Colocation - 95th percentile billing
  • Other Technical Information
    • Peering
Powered by GitBook
LogoLogo

Copyright © 2024 Bamboozle Web Services, Inc. All Rights Reserved.

On this page
  • In Windows
  • In Linux
  • In macOS
  • In bootable media

Was this helpful?

Export as PDF
  1. Products
  2. Cyber Protect
  3. Installing the software

Proxy server settings

The protection agents can transfer data through an HTTP/HTTPS proxy server. The server must work through an HTTP tunnel without scanning or interfering with the HTTP traffic. Man-in-the-middle proxies are not supported.

Because the agent registers itself in the cloud during the installation, the proxy server settings must be provided during the installation or in advance.

In Windows

If a proxy server is configured in Windows (Control panel > Internet Options > Connections), the setup program reads the proxy server settings from the registry and uses them automatically. Also, you can enter the proxy settings during the installation, or specify them in advance by using the procedure described below. To change the proxy settings after the installation, use the same procedure.

To specify the proxy settings in Windows

  1. Create a new text document and open it in a text editor, such as Notepad.

  2. Copy and paste the following lines into the file:

    Windows Registry Editor Version 5.00
    
    [HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Global\HttpProxy]
    "Enabled"=dword:00000001
    "Host"="proxy.company.com"
    "Port"=dword:000001bb
    "Login"="proxy_login"
    "Password"="proxy_password"
  3. Replace proxy.company.com with your proxy server host name/IP address, and 000001bb with the hexadecimal value of the port number. For example, 000001bb is port 443.

  4. If your proxy server requires authentication, replace proxy_login and proxy_password with the proxy server credentials. Otherwise, delete these lines from the file.

  5. Save the document as proxy.reg.

  6. Run the file as an administrator.

  7. Confirm that you want to edit the Windows registry.

  8. If the protection agent is not installed yet, you can install it now.

  9. Open file %programdata%\Acronis\Agent\etc\aakore.yaml in a text editor.

  10. Locate the env section or create it and add the following lines:

    env:
        http-proxy: proxy_login:proxy_password@proxy_address:port
        https-proxy: proxy_login:proxy_password@proxy_address:port
  11. Replace proxy_login and proxy_password with the proxy server credentials, and proxy_address:port with the address and port number of the proxy server.

  12. In the Start menu, click Run, type: cmd, and click OK.

  13. Restart the aakore service by using the following commands:

    net stop aakore
    net start aakore
  14. Restart the agent by using the following commands:

    net stop mms
    net start mms

In Linux

Run the installation file with the parameters --http-proxy-host=ADDRESS --http-proxy-port=PORT --http-proxy-login=LOGIN--http-proxy-password=PASSWORD. To change the proxy settings after the installation, use the procedure described below.

To change the proxy settings in Linux

  1. Open the file /etc/Acronis/Global.config in a text editor.

  2. Do one of the following:

    • If the proxy settings were specified during the agent installation, find the following section:

      <key name="HttpProxy">
          <value name="Enabled" type="Tdword">"1"</value>
          <value name="Host" type="TString">"ADDRESS"</value>
          <value name="Port" type="Tdword">"PORT"</value>
          <value name="Login" type="TString">"LOGIN"</value>
          <value name="Password" type="TString">"PASSWORD"</value>
      </key>
    • Otherwise, copy the above lines and paste them into the file between the <registry name="Global">...</registry> tags.

  3. Replace ADDRESS with the new proxy server host name/IP address, and PORT with the decimal value of the port number.

  4. If your proxy server requires authentication, replace LOGIN and PASSWORD with the proxy server credentials. Otherwise, delete these lines from the file.

  5. Save the file.

  6. Open file /opt/acronis/etc/aakore.yaml in a text editor.

  7. Locate the env section or create it and add the following lines:

    env:
        http-proxy: proxy_login:proxy_password@proxy_address:port
        https-proxy: proxy_login:proxy_password@proxy_address:port
  8. Replace proxy_login and proxy_password with the proxy server credentials, and proxy_address:port with the address and port number of the proxy server.

  9. Restart the aakore service by using the following command:

    sudo service aakore restart
  10. Restart the agent by executing the following command in any directory:

    sudo service acronis_mms restart

In macOS

You can enter the proxy settings during the installation, or specify them in advance by using the procedure described below. To change the proxy settings after the installation, use the same procedure.

To specify the proxy settings in macOS

  1. Create the file /Library/Application Support/Acronis/Registry/Global.config and open it in a text editor, such as Text Edit.

  2. Copy and paste the following lines into the file

    <?xml version="1.0" ?>
    <registry name="Global">
        <key name="HttpProxy">
            <value name="Enabled" type="Tdword">"1"</value>
            <value name="Host" type="TString">"proxy.company.com"</value>
            <value name="Port" type="Tdword">"443"</value>
            <value name="Login" type="TString">"proxy_login"</value>
            <value name="Password" type="TString">"proxy_password"</value>
        </key>
    </registry>
  3. Replace proxy.company.com with your proxy server host name/IP address, and 443 with the decimal value of the port number.

  4. If your proxy server requires authentication, replace proxy_login and proxy_password with the proxy server credentials. Otherwise, delete these lines from the file.

  5. Save the file.

  6. If the protection agent is not installed yet, you can install it now.

  7. Open file /Library/Application Support/Acronis/Agent/etc/aakore.yaml in a text editor.

  8. Locate the env section or create it and add the following lines:

    env:
        http-proxy: proxy_login:proxy_password@proxy_address:port
        https-proxy: proxy_login:proxy_password@proxy_address:port
  9. Replace proxy_login and proxy_password with the proxy server credentials, and proxy_address:port with the address and port number of the proxy server.

  10. Go to Applications > Utilities > Terminal

  11. Restart the aakore service by using the following commands:

    sudo launchctl stop aakore
    sudo launchctl start aakore
  12. Restart the agent by using the following commands:

    sudo launchctl stop acronis_mms
    sudo launchctl start acronis_mms

In bootable media

When working under bootable media, you may need to access the cloud storage via a proxy server. To specify the proxy server settings, click Tools > Proxy server, and then specify the proxy server host name/IP address, port, and credentials.

PreviousLinux packagesNextInstalling the Protection Agents

Last updated 2 years ago

Was this helpful?