Solved

Moving Checkpoint config from existing IP710 to IP1287 cluster

Posted on 2013-06-08
4
429 Views
Last Modified: 2013-07-19
I  have an IP710 HA pair and need to migrate the config to a new IP1287 HA pair.  Is this process handled completely from the Management server?  Has anybody done this before? I don't want to screw this up.
Thanks
0
Comment
Question by:dhuff2012
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 39234487
Yes, this can be done.

As long as you are moving to IPSO 6.2, there is a config migration tool that we can use to migrate teh config from one device to a new one.

The basic steps are:

1.  Option the config file from the old device, found in /config/db/initial
2.  Build new IP appliance and configure 1 interface to allow use of voyager
3.  Go to "tools > config migration" and upload the new config file.
4.  Answer all interview type questions, ie which device did this config come from and map interfaces etc
5.  Uppon completion we need to reboot the device to active the old config.


This works for items like interfaces, users, routes, OSPF etc

For more information, see the admin guides for your version of IPSO

HTH
0
 

Author Comment

by:dhuff2012
ID: 39236551
Is there a cost for voyager?  Also, what do I need to consider about a migration of this type?
0
 
LVL 18

Expert Comment

by:deimark
ID: 39236752
voyager is the web interface for all IPSO appliances and its free bud.  ITs built in to the OS.

Main points to consider is that you have the same number of interfaces when moving from one to the other as we map original interfaces to the new system
0
 

Author Closing Comment

by:dhuff2012
ID: 39340858
Sorry I accepted this so late.  Thanks for the help
0

Featured Post

[Webinar] Learn How Hackers Steal Your Credentials

Do You Know How Hackers Steal Your Credentials? Join us and Skyport Systems to learn how hackers steal your credentials and why Active Directory must be secure to stop them. Thursday, July 13, 2017 10:00 A.M. PDT

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This is a high-level webinar that covers the history of enterprise open source database use. It addresses both the advantages companies see in using open source database technologies, as well as the fears and reservations they might have. In this…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question