The scanning process is always recommended to be done from the slave and then imported into the corresponding master.
After configuring the credentials, the first scan is executed: