Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Moving Checkpoint config from existing IP710 to IP1287 cluster

Posted on 2013-06-08
4
427 Views
Last Modified: 2013-07-19
I  have an IP710 HA pair and need to migrate the config to a new IP1287 HA pair.  Is this process handled completely from the Management server?  Has anybody done this before? I don't want to screw this up.
Thanks
0
Comment
Question by:dhuff2012
  • 2
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 39234487
Yes, this can be done.

As long as you are moving to IPSO 6.2, there is a config migration tool that we can use to migrate teh config from one device to a new one.

The basic steps are:

1.  Option the config file from the old device, found in /config/db/initial
2.  Build new IP appliance and configure 1 interface to allow use of voyager
3.  Go to "tools > config migration" and upload the new config file.
4.  Answer all interview type questions, ie which device did this config come from and map interfaces etc
5.  Uppon completion we need to reboot the device to active the old config.


This works for items like interfaces, users, routes, OSPF etc

For more information, see the admin guides for your version of IPSO

HTH
0
 

Author Comment

by:dhuff2012
ID: 39236551
Is there a cost for voyager?  Also, what do I need to consider about a migration of this type?
0
 
LVL 18

Expert Comment

by:deimark
ID: 39236752
voyager is the web interface for all IPSO appliances and its free bud.  ITs built in to the OS.

Main points to consider is that you have the same number of interfaces when moving from one to the other as we map original interfaces to the new system
0
 

Author Closing Comment

by:dhuff2012
ID: 39340858
Sorry I accepted this so late.  Thanks for the help
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Optimal Xbox 360 connectivity requires "OPEN NAT". If you use Juniper Netscreen or SSG firewall products in a home setting, the following steps will allow you get rid of the dreaded warning screen below and achieve the best online gaming environment…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question