Installation guide

4-55
Device Manager Guide, Cisco ACE 4700 Series Application Control Engine Appliance
OL-26645-02
Chapter 4 Configuring Virtual Contexts
Performing Device Backup and Restore Functions
disk0: only—The Device Manager permits continued GUI functionality during the backup process
and polls the ACE for the backup status, which it displays on the Backup / Restore page.
disk0: and a remote server—The Device Manager suspends GUI operation and displays a “Please
Wait” message in the Backup dialog box until the process is complete. During this process, the ACE
Device Manager instructs the ACE to create and save the backup file locally to disk0: and then place
a copy of the file on the specified remote server.
Step 13 In the Backup / Restore page, click Poll Now to ensure that the latest backup statistics are displayed, and
then click on the Status link (Success, In Progress, or Failed) located in the Latest Backup column to
view details of the backup operation.
If the backup status is either Success or In Progress, then the Show Backup Status Detail pop-up window
appears and displays a list of the files successfully backed up. When the backup status is In Progress,
the ACE Device Manager polls the ACE every 2 minutes to retrieve the latest status information and
then it automatically updates the status information displayed. The polling continues until the ACE
Device Manager receives a status of either Success or Failed. If the backup status is Failed, then the
Show Backup Errors popup window appears, displaying the reason for the failed backup attempt.
Related Topics
Restoring Device Configuration and Dependencies, page 4-55
Restoring Device Configuration and Dependencies
You can restore an ACE configuration and its dependencies using a backup file.
Caution The restore operation clears any existing SSL certificate and key-pair files, license files, and checkpoints
in a context before it restores the backup archive file. If your configuration includes SSL files or
checkpoints and you excluded them when you created the backup archive, those files will no longer exist
in the context after you restore the backup archive. To preserve any existing exportable SSL certificate
and key files in the context, before you execute the restore operation, export the certificates and keys
that you want to keep to an FTP, SFTP, or TFTP server by using the CLI and the crypto export
command. After you restore the archive, import the SSL files into the context. For details on exporting
and importing SSL certificate and key pair files using the CLI, see the SSL Guide, Cisco ACE
Application Control Engine.
You can also use the exclude option of the restore command to instruct the ACE not to clear the SSL
files in disk0: and to ignore the SSL files in the backup archive when the ACE restores the backup.
Ignore this Caution if the ACE is using the NPE software version, which does not allow encryption
protocols (see the “Information About the ACE No Payload Encryption Software Version” section on
page 1-2)
Note If your web browser supports the Remember Passwords option and you enable this option, the web
browser may fill in the Username and Password fields for user authentication. By default, these fields
should be empty. You can change the username and password fields from whatever the web browser
inserts into the two fields.