Solved

Cisco Ironport M660 Config File Export

Posted on 2013-01-02
1
1,502 Views
Last Modified: 2013-01-03
I'm able to export my Cisco Ironort M660 Config file through the admin web interface, exporting a .xml file.

Is there anyway to export to a .csv instead of .xml?  Through the CLI possibly?

Thank you
0
Comment
Question by:cas_three
1 Comment
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 38739845
xml is still good to retain as eventually for importing back to new or existing appliance, it need to be in that format. dtd is available to ensure the configuration syntax is right.

E.g. The values in XML syntax are parsed and validated against the DTD located in the configuration directory on your Cisco IronPort appliance. The DTD file is named config.dtd. If validation errors are reported at the command line when you use the loadconfig command, the changes are not loaded. You can download the DTD to validate configuration files outside of the appliance before uploading them.

there are cisco tools that you can leverage - saw reporting as csv (but not what you want)
https://supportforums.cisco.com/docs/DOC-9075

I saw this parsing effort to convert XML to CSV but nt sure if it covers whole config ...maybe customised it further ...need more help then
http://pauljbrice.wordpress.com/2011/06/07/ironport-c-series-xml-parsing/

Also did saw the CSV is more for SLBL backup @ http://itthatshouldjustwork.blogspot.sg/2012/06/backup-slbl-on-ironport-c160-devices.html
or
https://www.corelan.be/index.php/2008/07/27/free-tool-cisco-ironport-c350-safelist-blocklist-merge-utility/

But coming back to save config, not that in user guide Cisco suggested any csv format (pg327/328) not even in using "backupconfig" (pg290 and pg333) @ http://www.cisco.com/en/US/docs/security/security_management/sma/sma7.9/SMA_7.9_User_Guide.pdf

There is automated means for backup of config as shared in below but as wholesale not csv format though @ https://supportforums.cisco.com/thread/2066895
0

Featured Post

Active Directory Webinar

We all know we need to protect and secure our privileges, but where to start? Join Experts Exchange and ManageEngine on Tuesday, April 11, 2017 10:00 AM PDT to learn how to track and secure privileged users in Active Directory.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CCTV Security Cameras 4 120
Is KairosPlanet a fraud? 6 50
Staff want to build his own server- Suggestions and IT policy 4 81
ASA5510 Blocking a Wanted Website/Host 9 26
BIND is the most widely used Name Server. A Name Server is the one that translates a site name to it's IP address. There is a new bug in BIND (https://kb.isc.org/article/AA-01272), affecting all versions of BIND 9 from BIND 9.1.0 (inclusive) thro…
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question