Configuring proxy server settings

The protection agents can transfer data through an HTTP/HTTPS proxy server. The server must work through an HTTP tunnel without scanning or interfering with the HTTP traffic. Man-in-the-middle proxies are not supported.

Because the agent registers itself in the cloud during the installation, you must configure the proxy server settings during the installation of the agent or in advance.

For Windows

If a proxy server is configured in Control panel > Internet Options > Connections, the setup program reads the proxy server settings from the registry and uses them automatically.

Use this procedure if you want to perform the following tasks.

  • Configure the proxy settings before the installation of the agent.
  • Update the proxy settings after the installation of the agent.

To configure the proxy settings during the installation of the agent, see Installing protection agents in Windows.

This procedure is valid only when the http-proxy.yaml file does not exist on the machine. If the http-proxy.yaml file exists on the machine, you must update the proxy settings in the file, as it overrides the settings in the aakore.yaml file.

The %programdata%\Acronis\Agent\var\aakore\http-proxy.yaml file is created when you configure the proxy server settings by using Cyber Protection Monitor. For more information, see Configuring proxy server settings in Cyber Protect Monitor.

To open the http-proxy.yaml file, you must be member of the Administrators group in Windows.

To configure the proxy settings

  1. Create a new text document and open it in a text editor, such as Notepad.
  2. Copy and paste the following lines into the file.

    Windows Registry Editor Version 5.00

    [HKEY_LOCAL_MACHINE\SOFTWARE\Acronis\Global\HttpProxy]
    "Enabled"=dword:00000001
    "Host"="proxy.company.com"
    "Port"=dword:000001bb
    "Login"="proxy_login"
    "Password"="proxy_password"
  3. Replace proxy.company.com with your proxy server host name/IP address, and 000001bb with the hexadecimal value of the port number. For example, 000001bb is port 443.
  4. If your proxy server requires authentication, replace proxy_login and proxy_password with the proxy server credentials. Otherwise, delete these lines from the file.
  5. Save the document as proxy.reg.
  6. Run the file as an administrator.
  7. Confirm that you want to edit the Windows registry.
  8. If the agent is not installed on this workload yet, install it now. If the agent is already installed on the workload, continue to the next step.
  9. Open the %programdata%\Acronis\Agent\etc\aakore.yaml file in a text editor.

    To open this file, you must be member of the Administrators group in Windows.

  10. Locate the env section or create it, and then add the following lines.

    env:
    http-proxy: proxy_login:proxy_password@proxy_address:port
    https-proxy: proxy_login:proxy_password@proxy_address:port
  11. Replace proxy_login and proxy_password with the proxy server credentials, and proxy_address:port with the address and port number of the proxy server.
  12. In the Start menu, click Run, type: cmd, and then click OK.
  13. Restart the aakore service by running the following commands.

    net stop aakore
    net start aakore
  14. Restart the agent by running the following commands.

    net stop mms
    net start mms

For macOS

Use this procedure if you want to perform the following tasks.

  • Configure the proxy settings before the installation of the agent.
  • Update the proxy settings after the installation of the agent.

To configure the proxy settings during the installation of the agent, see Installing protection agents in macOS.

To configure the proxy settings

  1. Create the /Library/Application Support/Acronis/Registry/Global.config file and open it in a text editor, such as Text Edit.
  2. Copy and paste the following lines into the file.

    <?xml version="1.0" ?>
    <registry name="Global">
        <key name="HttpProxy">
            <value name="Enabled" type="Tdword">"1"</value>
            <value name="Host" type="TString">"proxy.company.com"</value>
            <value name="Port" type="Tdword">"443"</value>
            <value name="Login" type="TString">"proxy_login"</value>
            <value name="Password" type="TString">"proxy_password"</value>
        </key>
    </registry>
  3. Replace proxy.company.com with your proxy server host name/IP address, and 443 with the decimal value of the port number.
  4. If your proxy server requires authentication, replace proxy_login and proxy_password with the proxy server credentials. Otherwise, delete these lines from the file.
  5. Save the file.
  6. If the agent is not installed on this workload yet, install it now. If the agent is already installed on the workload, continue to the next step.
  7. Open the /Library/Application Support/Acronis/Agent/etc/aakore.yaml file in a text editor.
  8. Locate the env section or create it and then add the following lines.

    env:
    http-proxy: proxy_login:proxy_password@proxy_address:port
    https-proxy: proxy_login:proxy_password@proxy_address:port
  9. Replace proxy_login and proxy_password with the proxy server credentials, and proxy_address:port with the address and port number of the proxy server.
  10. Go to Applications > Utilities > Terminal.
  11. Restart the aakore service by running the following commands.

    sudo launchctl stop aakore
    sudo launchctl start aakore
  12. Restart the agent by running the following commands.

    sudo launchctl stop acronis_mms
    sudo launchctl start acronis_mms

For Linux

Run the installation file with the --http-proxy-host=ADDRESS --http-proxy-port=PORT --http-proxy-login=LOGIN --http-proxy-password=PASSWORD parameters. Use the following procedure to update the proxy settings after the installation of the protection agent.

To configure the proxy settings

  1. Open the /etc/Acronis/Global.config file in a text editor.
  2. Do one of the following:

    • If the proxy settings were specified during the agent installation, locate the following section.

      <key name="HttpProxy">

          <value name="Enabled" type="Tdword">"1"</value>

          <value name="Host" type="TString">"ADDRESS"</value>

          <value name="Port" type="Tdword">"PORT"</value>

          <value name="Login" type="TString">"LOGIN"</value>

          <value name="Password" type="TString">"PASSWORD"</value>

      </key>
    • If the proxy settings were not specified during the agent installation, copy the following lines and paste them into the file between the <registry name="Global">...</registry> tags.

      <key name="HttpProxy">
          <value name="Enabled" type="Tdword">"1"</value>
          <value name="Host" type="TString">"ADDRESS"</value>
          <value name="Port" type="Tdword">"PORT"</value>
          <value name="Login" type="TString">"LOGIN"</value>
          <value name="Password" type="TString">"PASSWORD"</value>
      </key>
  3. Replace ADDRESS with the new proxy server host name/IP address, and PORT with the decimal value of the port number.
  4. If your proxy server requires authentication, replace LOGIN and PASSWORD with the proxy server credentials. Otherwise, delete these lines from the file.
  5. Save the file.
  6. Open file /opt/acronis/etc/aakore.yaml in a text editor.
  7. Locate the env section or create it and add the following lines:

    env:
        http-proxy: proxy_login:proxy_password@proxy_address:port
        https-proxy: proxy_login:proxy_password@proxy_address:port
  8. Replace proxy_login and proxy_password with the proxy server credentials, and proxy_address:port with the address and port number of the proxy server.
  9. Restart the aakore service by running the following command.

    sudo service aakore restart
  10. Restart the agent by executing the running command in any directory.

    sudo service acronis_mms restart

For bootable media

When working under bootable media, you might need to access the cloud storage via a proxy server. To configure the proxy server settings, click Tools > Proxy server, and then configure the proxy server host name/IP address, port, and credentials.