Solved

restoring checkpoint configuration from cd

Posted on 2010-11-26
3
467 Views
Last Modified: 2012-05-10
Hello expert,

I have two system “checkpoint R65.

I backup my configuration and would like to restore same to the second system.

I would like to burn same on CD and restore it.

Can this be accomplished and if so can you provide guidance

RegardS

0
Comment
Question by:jomfra
  • 2
3 Comments
 
LVL 18

Expert Comment

by:deimark
ID: 34222052
No, we cannot burn the backup to a cd image for restore, however, we can do a backup and rebuild on the unit.

The backup and restore process is documented in the upgrade guide fro R65 bud, that has a lot more info in it but the gist is as follows:

1.   run the upgrade_export tool on the old box, save the resulting file off the box
2.   Build a new box using the R65 CD
3.  Run the upgrade_import tool on the new box using the file created at 1

HTH
0
 

Author Comment

by:jomfra
ID: 34232475
Hello Deimark,

I using the secureplatform gui to backup the configuration.

I then  using the restore (cli) option to restore the configuration.

I do not need to upgrade the box both boxes aready have a working configuratoin.

It is just that i am try to find a methed both box in sync.

I normally use ssh utility putty to telnet the config to the second box, but recently

putty was timing out frequenly during the restore process.

I needed an altenative method  
0
 
LVL 18

Accepted Solution

by:
deimark earned 50 total points
ID: 34234855
Use FTP or SCP to copy the file across.

I prefer to have the backup available via an FTP serer and then use the CLI to pull the file via FTP.

If you use SSH, the session should not time out.

If there are time out issues due to other config, then use a console connection (serial) to pull the file via FTP,  this will not time out.

Later versions of putty have console abilities
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now