About Backup and Restore
The ability to recover from a disaster is an essential part of any system maintenance plan. As part of your disaster recovery plan, we recommend that you perform periodic backups to a secure remote location.
What Is Backed Up?
Device backups are always configuration-only. Management center backups are as follows.
Backup Type |
Backed Up |
Not Backed Up |
---|---|---|
Configurations |
Most configurations are backed up. In a multidomain deployment, you must back up configurations. You cannot back up events or TID data only. |
These configurations are not backed up and must be reconfigured after restore:
|
Events |
All events in the management center database. |
Intrusion event review status is not backed up. Restored intrusion events do not appear on Reviewed Events pages. |
Threat Intelligence Director (TID) data. |
For more information, see About Backing Up and Restoring threat intelligence director Data in the Cisco Secure Firewall Management Center Device Configuration Guide. |
|
Reports |
— |
Reports stored on the management center are not backed up as part of any backup. You should store reports in a secure remote location. |
What Is Restored?
Restoring configurations overwrites all backed-up configurations, with very few exceptions. On the management center, restoring events and TID data overwrites all existing events and TID data, with the exception of intrusion events.
Make sure you understand and plan for the following:
-
You cannot restore what is not backed up, as decribed above.
-
Restoring fails VPN certificates.
The threat defense restore process removes VPN certificates and all VPN configurations from threat defense devices, including certificates added after the backup was taken. After you restore the threat defense device, you must re-add/re-enroll all VPN certificates, and redeploy the device.
-
Restoring to a configured management center — instead of factory-fresh or reimaged — merges intrusion events and file lists.
The management center event restore process does not overwrite intrusion events. Instead, the intrusion events in the backup are added to the database. To avoid duplicates, delete existing intrusion events before you restore.
The management center configuration restore process does not overwrite clean and custom detection file lists used by malware defense. Instead, it merges existing file lists with the file lists in the backup. To replace file lists, delete existing file lists before you restore.
On-Demand Backups
You can perform on-demand backups for the management center and many threat defense devices from the management center.
For more information, see Backing Up Management Centers or Managed Devices.
Scheduled Backups
You can use the scheduler on management center to automate backups. You can also schedule remote device backups from the management center.
The management center setup process schedules weekly configuration-only backups, to be stored locally. This is not a substitute for full off-site backups—after initial setup finishes, you should review your scheduled tasks and adjust them to fit your organization's needs.
For more information, see Scheduled Backups.
Storing Backup Files
You can store backups locally. However, we recommend you back up management centers and managed devices to a secure remote location by mounting an NFS, SMB, or SSHFS network volume as remote storage. After you do this, all subsequent backups are copied to that volume, but you can still use the management center to manage them.
For more information, see Remote Storage Device and Manage Backups and Remote Storage.
Restoring from Backup
You restore the management center from the Backup Management page. You must use the threat defense CLI to restore threat defense devices, except for the ISA 3000 zero-touch restore, which uses an SD card and the reset button.
For more information, see Restoring Management Centers and Managed Devices.