SlideShare a Scribd company logo
1 of 202
Download to read offline
Document Identifier:
UG01.2.0
Effective Date:
August 2012
Covering Backbox Product Version: 2.2.8
Author: Eyal Estrin
How to
configure new
device
BACKBOX
K E E P I T S A F E
www.backbox.co
Copyright © 2012 Safeway. All rights reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise,
without prior written permission from Safeway.
All copyright, confidential information, patents, design rights and all other intellectual property rights of
whatsoever nature contained herein are and shall remain the sole and exclusive property of Safeway Ltd. The
information furnished herein is believed to be accurate and reliable.
However, no responsibility is assumed by Safeway for its use, or for any infringements of patents or other rights
of third parties resulting from its use.
The Safeway name and Safeway logo are trademarks or registered trademarks of Safeway Limited.
All other trademarks are the property of their respective owners.
Table of Contents
1. Introduction...........................................................................................................10
1.1. Purpose.........................................................................................................................................10
2. Adding new devices..............................................................................................11
2.1. 3COM 5500 Switch .......................................................................................................................11
2.2. Access Layers PortNox.................................................................................................................12
2.3. Aladdin eSafe................................................................................................................................14
2.4. AlgoSec Firewall Analyzer ............................................................................................................15
2.5. Allot NetEnforcer...........................................................................................................................16
2.6. Allot NetXplorer.............................................................................................................................17
2.7. Aruba switch..................................................................................................................................18
2.8. Astaro Command Center ..............................................................................................................19
2.9. Astaro Security Gateway ..............................................................................................................20
2.10. AudioCodes BusinessPLUS......................................................................................................21
2.11. AudioCodes Mediant 2000........................................................................................................23
2.12. AudioCodes MP-112 .................................................................................................................24
2.13. AudioCodes MP-114 .................................................................................................................25
2.14. AudioCodes MP-124 .................................................................................................................26
2.15. AudioCodes MSBG ...................................................................................................................27
2.16. Avaya 5500 series.....................................................................................................................28
2.17. BackBox Self-Backup................................................................................................................29
2.18. BackBox CIFS Export................................................................................................................30
2.19. BackBox FTP Export .................................................................................................................31
2.20. BackBox SCP Export ................................................................................................................32
2.21. Barracuda Firewall ....................................................................................................................33
2.22. Bind DNS Server .......................................................................................................................34
2.23. Blue Coat Proxy AV...................................................................................................................35
2.24. Blue Coat Proxy SG ..................................................................................................................36
2.25. Brocade DS-490 fiber switch.....................................................................................................37
2.26. Brocade DS-5100 switch...........................................................................................................38
2.27. Centerity Monitor .......................................................................................................................39
2.28. CheckPoint Connectra ..............................................................................................................40
2.29. CheckPoint Firewall – Single Gateway .....................................................................................41
2.30. CheckPoint Firewall – Management..........................................................................................42
2.31. CheckPoint Firewall (Windows).................................................................................................43
2.32. CheckPoint Firewall – Module...................................................................................................45
2.33. CheckPoint Firewall – Provider-1..............................................................................................46
2.34. CheckPoint Firewall – Provider-1 (CMA Backup) .....................................................................47
2.35. CheckPoint SG80......................................................................................................................48
2.36. CheckPoint Safe@Office...........................................................................................................49
2.37. CheckPoint VPN-1 Edge...........................................................................................................50
2.38. CheckPoint EndPoint Security R80...........................................................................................51
2.39. Cisco ACS .................................................................................................................................53
2.40. Cisco Router..............................................................................................................................54
2.41. Cisco Router (Telnet/TFTP and SSH/TFTP).............................................................................55
2.42. Cisco Switch..............................................................................................................................56
2.43. Cisco Switch (Telnet/TFTP and SSH/TFTP).............................................................................57
2.44. Cisco Nexus 1000v switch ........................................................................................................58
2.45. Cisco CatOS switch...................................................................................................................59
2.46. Cisco MDS 9000........................................................................................................................60
2.47. Cisco 6500 WiSM......................................................................................................................61
2.48. Cisco WLC (Wireless LAN Controller) ......................................................................................62
2.49. Cisco PIX (IOS 6.1) ...................................................................................................................63
2.50. Cisco PIX (IOS 6.3 and above) .................................................................................................64
2.51. Cisco ASA .................................................................................................................................65
2.52. Cisco FWSM..............................................................................................................................66
2.53. Cisco IronPort Mail ....................................................................................................................67
2.54. Cisco IronPort Management......................................................................................................68
2.55. Cisco IronPort Web ...................................................................................................................69
2.56. Cisco IP Telephony ...................................................................................................................70
2.57. Citrix NetScaler..........................................................................................................................72
2.58. ClearSwift Email Appliance .......................................................................................................73
2.59. ClearSwift MIMEsweeper for SMTP..........................................................................................76
2.60. ClearSwift Web Gateway ..........................................................................................................78
2.61. Crossbeam C series..................................................................................................................81
2.62. Crossbeam X series ..................................................................................................................82
2.63. D-link Switch..............................................................................................................................83
2.64. Dell PowerConnect 54xx ...........................................................................................................84
2.65. Dell PowerConnect M6xxx ........................................................................................................85
2.66. Enterasys switch........................................................................................................................86
2.67. Extreme Networks Switch .........................................................................................................87
2.68. Fireye.........................................................................................................................................88
2.69. FireMon 5.x................................................................................................................................89
2.70. ForeScout CounterAct...............................................................................................................92
2.71. Fortinet FortiAnalyzer ................................................................................................................94
2.72. FortiBalancer .............................................................................................................................95
2.73. Fortinet FortiGate ......................................................................................................................96
2.74. Fortinet FortiMail........................................................................................................................97
2.75. Foundry FGS switch..................................................................................................................98
2.76. F5 BigIP.....................................................................................................................................99
2.77. F5 FirePass .............................................................................................................................100
2.78. HP ProCurve (SCP) ................................................................................................................102
2.79. HP ProCurve (No IP SSH Filetransfer) ...................................................................................103
2.80. Huawei Switch.........................................................................................................................104
2.81. IBM DataPower SX 3.8.x.........................................................................................................105
2.82. Imperva SecureSphere ...........................................................................................................106
2.83. Imprivata One-Sign .................................................................................................................107
2.84. Juniper ISG..............................................................................................................................108
2.85. Juniper NetScreen...................................................................................................................109
2.86. Juniper NSM 2011...................................................................................................................110
2.87. Juniper Switch .........................................................................................................................111
2.88. Juniper Router.........................................................................................................................112
2.89. Juniper SRX ............................................................................................................................113
2.90. Juniper SSG ............................................................................................................................114
2.91. Juniper SA (Secure Access) ...................................................................................................115
2.92. Juniper Unified Access Control ...............................................................................................118
2.93. Juniper WLC............................................................................................................................119
2.94. Linux Generic ..........................................................................................................................120
2.95. Linux (Generic) IPTables.........................................................................................................121
2.96. Linux (Generic) Squid Proxy ...................................................................................................122
2.97. McAfee ePO 4.x ......................................................................................................................123
2.98. McAfee Intrushield Management.............................................................................................125
2.99. Microsoft ISA Server 2006 ......................................................................................................127
2.100. Microsoft TMG 2010................................................................................................................129
2.101. Microsoft UAG 2010 ................................................................................................................131
2.102. Motorola RFS 7000 .................................................................................................................133
2.103. NetAPP ONTAP 8.x ................................................................................................................134
2.104. Netgear FSM / GSM switch.....................................................................................................135
2.105. Nokia Crypto Cluster ...............................................................................................................136
2.106. Nokia IPSO..............................................................................................................................137
2.107. Nortel 2360 Switch ..................................................................................................................138
2.108. Nortel 460/470 Switch (Telnet)................................................................................................139
2.109. Nortel 460/470 Switch (SNMPv2/TFTP) .................................................................................140
2.110. Nortel 460/470 Switch (All)......................................................................................................141
2.111. Nortel Passport 1600...............................................................................................................142
2.112. Nortel Passport 8000 (SNMP/TFTP).......................................................................................143
2.113. Nortel Passport 8000 (Running-config)...................................................................................144
2.114. PaloAlto PA-Series..................................................................................................................145
2.115. PFSense Firewall ....................................................................................................................147
PineApp Mail-SeCure ............................................................................................................................148
2.116. PineApp Mail-SeCure (HTTPS)...............................................................................................150
2.117. Radiator Radius Server ...........................................................................................................151
Radware Alteon OS (Telnet / SSH) .......................................................................................................152
2.118. Radware Alteon (SNMP/TFTP)...............................................................................................153
2.119. Radware AppDirector (1.03)....................................................................................................154
2.120. Radware AppDirector (1.06 and above)..................................................................................155
2.121. Radware AppDirector ODS (2.x and above) ...........................................................................156
2.122. Radware Apsolute-Vision........................................................................................................157
Radware CID (1.x – 2.x) ........................................................................................................................158
2.123. Radware CID (3.x and above).................................................................................................159
2.124. Radware DefensePro (3.x)......................................................................................................160
2.125. Radware DefensePro (4.x – 6.x).............................................................................................161
2.126. Radware LinkProof (4.x – 5.x).................................................................................................162
2.127. Radware LinkProof (6.x and above)........................................................................................163
2.128. Radware WSD.........................................................................................................................164
2.129. Redback RB400 ......................................................................................................................165
2.130. Riverbed Steelhead.................................................................................................................166
2.131. SkyBox (Windows) ..................................................................................................................167
2.132. SonicWall NSA 2400 ...............................................................................................................169
2.133. StoneSoft StoneGate Management 5.3.4 ...............................................................................170
2.134. Symantec Brightmail Gateway 9.0 ..........................................................................................171
2.135. Symantec Brightmail Gateway 9.0 (SCP) ...............................................................................173
2.136. Symantec Endpoint Protection 11...........................................................................................174
2.137. Tenor - Quintun .......................................................................................................................177
2.138. TippingPoint SMS....................................................................................................................178
2.139. TrendMicro IMSS 7.x (Windows).............................................................................................180
2.140. TrendMicro IMSVA ..................................................................................................................182
2.141. TrendMicro IWSS 2.2 ..............................................................................................................183
2.142. TrendMicro IWSS 3.1 Virtual Appliance (IWSVA)...................................................................184
2.143. TrendMicro IWSS 5.x Virtual Appliance (IWSVA)...................................................................185
2.144. TrendMicro OfficeScan............................................................................................................186
2.145. Tufin SecureTrack/SecureChange Workflow..........................................................................188
2.146. VMware ESXi 4.1 and above ..................................................................................................189
2.147. WatchGuard XCS....................................................................................................................192
2.148. WatchGuard XTM....................................................................................................................193
2.149. Websense Content Gateway...................................................................................................194
2.150. Websense Content Gateway Management ............................................................................195
2.151. Websense Web Security 7.5...................................................................................................197
2.152. Websense DLP........................................................................................................................199
2.153. Websense Triton 7.6 ...............................................................................................................201
About this guide
This document is divided into the following chapters:
• Chapter 1, “Introduction“, purpose of this document.
• Chapter 2, “Adding new devices”, explain how to add new devices and configure backup.
Who Should Use It
This guide is intended for all Backbox users. The 3 different types of user are:
• System Administrators - to install, configure and schedule backups.
• Backup Operators - to configure and schedule backups.
This guide assumes that you have some knowledge of the operating system.
Typographical Conventions
This document uses the following typographical conventions:
Screen names, button names, command and option names appear in bold type. The names of directories,
files, machines, partitions, and volumes also appear in bold.
Variable information appears in italic type. This includes user-supplied information on command lines.
Warnings appear as follows:
Warning: Warning text.
1. Introduction
1.1. Purpose
This guide explains how to configure backup for new devices using BackBox application.
2. Adding new devices
The following sections describe how to add new devices and configure backup.
2.1. 3COM 5500 Switch
Pre-requirements
• Enable routing between the 3COM device and the backup device.
• Enable Telnet or SSH between the backup device and the 3COM device.
Backup configuration instructions
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select 3COM, from the drop-down list.
• Product: Select Switch, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select backup type (either Pass/Ena (Telnet), User/Pass (Telnet), User/Pass (SSH),
User/Pass/Super (Telnet) or User/Pass/Super (SSH)), from the drop-down list.
• Username: Put here the username for the remote device.
• Password: Put here the password for the remote server/device.
• Super Password: Put here the 3COM “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after super password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.2. Access Layers PortNox
Pre-requirements:
• Enable routing between the Portnox server and the backup device.
• In-case the database is installed locally on the Portnox server, enable FTP access from the Portnox
server to the backup device.
• In-case the database is installed on remote SQL server, enable FTP access from the Portnox SQL
database server to the backup device.
Backup configuration instructions (create FTP account on the BackBox server):
1. Login to the BackBox web interface.
2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and
password.
3. Click Add.
Backup configuration instructions (inside the PortNox server):
1. In-case the Portnox database is installed on the same server as the Portnox server, login to the Portnox
server using administrative account.
2. In-case the Portnox database is installed on remote SQL server, login to the SQL server using
administrative account.
3. Download from the Internet and install 7Zip on the server (http://www.7-zip.org)
4. Double click on “My Computer” -> double click on drive letter (for example drive C) -> right click -> New
folder -> specify the name “PortnoxBackup”.
5. In-case the Portnox database is installed on the same server as the Portnox server, login to the BackBox
web interface -> from the upper pane, click on Documents -> BackBox Documentation -> download the
script Access Layers -> Portnox -> Local Database.
6. In-case the Portnox database is installed on remote SQL server, login to the BackBox web interface ->
from the upper pane, click on Documents -> BackBox Documentation -> download the script Access
Layers -> Portnox -> Remote Database.
7. Replace the value of the parameter FTPPassword with the password for the BackBox OS user
“ftpbackbox” (if it is different than “backbox”)
Note: To change the “ftpbackbox” account password, login to the BackBox web interface ->
Authentication -> Operating system users -> locate the account “ftpbackbox” -> click on Edit icon ->
specify new password and confirm it -> click on Save.
8. Replace the value of the parameter FTPServer with the IP/hostname of the BackBox server.
9. Replace the value of the parameter ServerIP with the main IP address of the Portnox server.
10. Replace the value of the string “.AccessLayers” with “.” and the Portnox database server name.
11. Save the file as C:PortnoxBackupPortNoxBackup.bat
12. Create a schedule task to run the file bellow at regular intervals:
C:PortnoxBackupPortNoxBackup.bat
Backup configuration instructions (inside the BackBox web console):
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Access Layers, from the drop-down list.
• Product: Select Portnox, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (Local), from the drop-down list.
• Username: Put here the ftpbackbox
• Password: Put here the password for the “ftpbackbox” account on the BackBox server.
2. Click on Save.
2.3. Aladdin eSafe
Pre-requirements:
• Enable routing between the eSafe and the backup device.
• Enable SSH access from the backup device to the eSafe.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Aladdin, from the drop-down list.
• Product: Select eSafe, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here “root”.
• Password: Put here the password for the “root” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.4. AlgoSec Firewall Analyzer
Pre-requirements:
• Enable routing between the AlgoSec device and the backup device.
• Enable SSH access from the backup device to the AlgoSec device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AlgoSec, from the drop-down list.
• Product: Select Firewall Analyzer, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here “root”.
• Password: Put here the password for the “root” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.5. Allot NetEnforcer
Pre-requirements:
• Enable routing between the NetEnforcer device and the backup device.
• Enable SSH access from the backup device to the NetEnforcer device.
Backup configuration instructions:
3. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Allot, from the drop-down list.
• Product: Select NetEnforcer, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: SSH, from the drop-down list.
• Username: Put here “root”.
• Password: Put here the password for the “root” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
4. Click on Save.
2.6. Allot NetXplorer
Pre-requirements:
• Enable routing between the NetXplorer device and the backup device.
• Enable SSH access from the backup device to the NetXplorer device.
Backup configuration instructions:
5. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Allot, from the drop-down list.
• Product: Select NetXplorer, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select SSH, from the drop-down list.
• Username: Put here “root”.
• Password: Put here the password for the “root” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
6. Click on Save.
2.7. Aruba switch
Pre-requirements:
• Enable routing between the Aruba switch and the backup device.
• Enable Telnet or SSH access from the backup device to the Aruba switch.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Aruba, from the drop-down list.
• Product: Select Security switch, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (Telnet) or Backup (SSH), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.8. Astaro Command Center
Pre-requirements:
• Enable routing between the Astaro device and the backup device.
• Enable SSH access from the backup device to the Astaro device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Astaro, from the drop-down list.
• Product: Select Command Center, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select backup type, from the drop-down list. Available options:
• Backup (SSH) – Backup the configuration
• Backup Encrypted (SSH) – Backup the configuration in encrypted mode
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• SU Password: Put here the password for the privileged mode.
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after SU password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.9. Astaro Security Gateway
Pre-requirements:
• Enable routing between the Astaro device and the backup device.
• Enable SSH access from the backup device to the Astaro device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Astaro, from the drop-down list.
• Product: Select Security Gateway, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select backup type, from the drop-down list. Available options:
• Backup (SSH) – Backup the configuration
• Backup Encrypted (SSH) – Backup the configuration in encrypted mode
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• SU Password: Put here the password for the privileged mode.
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after SU password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.10. AudioCodes BusinessPLUS
Pre-requirements:
• Enable routing between the AudioCodes device and the backup device.
• Enable FTP traffic from the AudioCodes device to the backup device.
Backup configuration instructions (create FTP account on the BackBox server):
1. Login to the BackBox web interface.
2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and
password.
3. Click Add.
Backup configuration instructions (inside the AudioCodes web console):
1. Open an internet browser and login to the address:
http://< IP_Address>
2. Supply credentials to login to the management console.
3. From the left pane, click on Configuration -> select Full.
4. Expand Backup -> click on Backup System.
• Select the days of the week and time for the backup process
• Status – change to Enabled
• Server address – specify here the IP address of the BackBox
• Directory – specify “/”
• User name – specify the FTP account on the BackBox
• Password – specify the password for the FTP account
5. Under “Advanced Settings” select which settings to backup.
6. Click on Submit.
Backup configuration instructions (inside the BackBox web console):
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AudioCodes, from the drop-down list.
• Product: Select BusinessPLUS, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (Local), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
2. Click on Save.
2.11. AudioCodes Mediant 2000
Pre-requirements:
• Enable routing between the AudioCodes device and the backup device.
• Enable SSH access from the backup device to the AudioCodes device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AudioCodes, from the drop-down list.
• Product: Select Mediant 2000, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.12. AudioCodes MP-112
Pre-requirements:
• Enable routing between the AudioCodes device and the backup device.
• Enable SSH access from the backup device to the AudioCodes device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AudioCodes, from the drop-down list.
• Product: Select MP-112, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.13. AudioCodes MP-114
Pre-requirements:
• Enable routing between the AudioCodes device and the backup device.
• Enable Telnet access from the backup device to the AudioCodes device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AudioCodes, from the drop-down list.
• Product: Select MP-114, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (Telnet), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
2. Click on Save.
2.14. AudioCodes MP-124
Pre-requirements:
• Enable routing between the AudioCodes device and the backup device.
• Enable SSH access from the backup device to the AudioCodes device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AudioCodes, from the drop-down list.
• Product: Select MP-124, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.15. AudioCodes MSBG
Pre-requirements:
• Enable routing between the AudioCodes device and the backup device.
• Enable HTTPS traffic (port 8082TCP) from backup device to the AudioCodes device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select AudioCodes, from the drop-down list.
• Product: Select MSBG, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (HTTPS), from the drop-down list.
• Username: Put here the account for the remote account.
• Password: Put here the password for the account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.16. Avaya 5500 series
Pre-requirements:
• Enable routing between the Avaya switch and the backup device.
• Enable SNMP and ICMP access from the backup device to the Avaya switch (for SNMPv2/TFTP)
• Configure Read/Write SNMP version 2 community on the Avaya switch (for SNMPv2/TFTP)
• Enable TFTP access from the Avaya switch to the backup device (for SNMPv2/TFTP)
• Enable Telnet access from the backup device to the Avaya switch (for Telnet backup)
• Enable SSH access from the backup device to the Avaya switch (for SSH backup)
• Avaya firmware 5.x or above.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Avaya, from the drop-down list.
• Product: Select 5500 series, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select backup option, from the drop-down list. Available options:
• Backup (SNMPv2/TFTP) BIN - backup configuration in binary format
• Backup (SNMPv2/Telnet/TFTP) - backup configuration (ASCII + binary)
• Backup (Telnet) – backup configuration in ASCII format
• Username: Put here username to access the remote device
• Password: Put here the password for the remote device
• SNMP Community string: Put here the SNMP R/W community string for the remote device.
• Server IP: Select the relevant IP of the BackBox.
2. Click on Save.
2.17. BackBox Self-Backup
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the BackBox.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select BackBox, from the drop-down list.
• Product: Select Self-Backup, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Server IP: Select the relevant IP of the BackBox.
2. Click on Save.
2.18. BackBox CIFS Export
Pre-requirements:
• Enable routing between the CIFS server (Windows, NetApp, etc) and the BackBox.
• Enable CIFS traffic (port 445TCP) from BackBox to the CIFS server.
• Account with Read/Write access on the remote storage device.
• Path to save files on the remote storage device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote storage device.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select BackBox, from the drop-down list.
• Product: Select CIFS Export, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Export (CIFS), from the drop-down list.
• Username: Put here the account for the remote storage device.
• Password: Put here the password for the account on the remote server/device.
• Remote Path: Specify here the path of the share on the remote storage.
• Note: Specify “/” character instead of “” (for example: //myserver/myshare)
• Days to store: Specify here the number of days to export backups to the remote storage.
2. Click on Save.
Important note:
When adding the above device to a scheduled backup job, the recommendation is to add it to a separate
backup job from the rest of the devices that starts after all the other backup jobs have completed.
2.19. BackBox FTP Export
Pre-requirements:
• Enable routing between the FTP server and the BackBox.
• Enable FTP traffic (port 21TCP) from BackBox to the FTP server.
• Account with Read/Write access on the remote storage device.
• Path to save files on the remote storage device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote storage device.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select BackBox, from the drop-down list.
• Product: Select FTP Export, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Export (FTP), from the drop-down list.
• Username: Put here the account for the remote storage device.
• Password: Put here the password for the account on the remote server/device.
• Remote Path: Specify here the path of the share on the remote storage.
• Note: For the root folder of the FTP server (or user’s home folder) specify “/” (without “”)
• Days to store: Specify here the number of days to export backups to the remote storage.
2. Click on Save.
Important note:
When adding the above device to a scheduled backup job, the recommendation is to add it to a separate
backup job from the rest of the devices that starts after all the other backup jobs have completed.
2.20. BackBox SCP Export
Pre-requirements:
• Enable routing between the SCP server and the BackBox.
• Enable SCP traffic (port 22TCP) from BackBox to the SCP server.
• Account with Read/Write access on the remote storage device.
• Path to save files on the remote storage device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote storage device.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select BackBox, from the drop-down list.
• Product: Select SCP Export, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Export (SCP), from the drop-down list.
• Username: Put here the account for the remote storage device.
• Password: Put here the password for the account on the remote server/device.
• Remote Path: Specify here the path of the share on the remote storage.
• Days to store: Specify here the number of days to export backups to the remote storage.
2. Click on Save.
Important note:
When adding the above device to a scheduled backup job, the recommendation is to add it to a separate
backup job from the rest of the devices that starts after all the other backup jobs have completed.
2.21. Barracuda Firewall
Pre-requirements:
• Enable routing between the Barrcuda device and the backup device.
• Enable SSH access from the backup device to the Barracuda device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Barracuda, from the drop-down list.
• Product: Select Firewall, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• “Backup (SSH)”
• Username: Put here “root”.
• Password: Put here the password for the “root” account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.22. Bind DNS Server
Pre-requirements:
• Enable routing between the Bind server and the backup device.
• Enable SSH access from the backup device to the Bind server.
Backup configuration instructions:
3. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Bind, from the drop-down list.
• Product: Select DNS Server, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• “Backup (SSH)”
• Username: Put here “root”.
• Password: Put here the password for the “root” account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
4. Click on Save.
2.23. Blue Coat Proxy AV
Pre-requirements:
• Enable routing between the Blue Coat and the backup device.
• Enable HTTPS access from the backup device to the Blue Coat.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Blue Coat, from the drop-down list.
• Product: Select ProxyAV, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select backup type, from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.24. Blue Coat Proxy SG
Pre-requirements:
• Enable routing between the Blue Coat and the backup device.
• Enable SSH access (for SSH backup), from the backup device to the Blue Coat.
• Enable HTTPS access (for WGET backup), from the backup device to the Blue Coat.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Blue Coat, from the drop-down list.
• Product: Select ProxySG, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Possible options: “Backup (SSH)” and “Backup (WGET)”.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Enable password: Put here the “enable” password.
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.25. Brocade DS-490 fiber switch
Pre-requirements:
• Enable routing between the Brocade switch and the backup device.
• Enable SSH access (for SSH backup), from the backup device to the Brocade switch.
• Enable Telnet access (for Telnet backup), from the backup device to the Brocade switch.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Brocade, from the drop-down list.
• Product: Select DS-490, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Possible options: “Backup (SSH)” and “Backup (Telnet)”.
• Username: Put here the username for the remote device.
• Password: Put here the password for the remote device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.26. Brocade DS-5100 switch
Pre-requirements:
• Enable routing between the Brocade switch and the backup device.
• Enable SSH access, from the backup device to the Brocade switch.
• Enable SCP access, from the Brocade switch to the backup device.
Backup configuration instructions:
3. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Brocade, from the drop-down list.
• Product: Select DS-5100, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select the backup type (SSH/SCP), from the drop-down list.
• Username: Put here the username for the remote device.
• Password: Put here the password for the remote device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
4. Click on Save.
2.27. Centerity Monitor
Pre-requirements:
• Enable routing between the Centerity server and the backup device.
• Enable SSH access, from the backup device to the Centerity server.
Backup configuration instructions:
2. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Centerity, from the drop-down list.
• Product: Select Monitor, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here the username for the Centerity
• Password: Put here the password for the above account on the remote server/device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
3. Click on Save.
2.28. CheckPoint Connectra
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable SSH access from the backup device to the CheckPoint device.
Backup configuration instructions:
5. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Connectra, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• “CPBackup (SSH)” - Perform CPBackup
• “CPBackup & Logs (SSH)” - Perform CPBackup and collect log files.
• “Upgrade_Export (SSH)” - Perform Upgrade Export.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Expert password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
6. Click on Save.
2.29. CheckPoint Firewall – Single Gateway
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable SSH access from the backup device to the CheckPoint device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Single gateway, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• “CPBackup (SSH)” - Perform CPBackup
• “CPBackup & Logs (SSH)” - Perform CPBackup and collect log files.
• “Upgrade_Export (SSH)” - Perform Upgrade Export.
• “Migrate_Export (SSH)” - Perform Migrate Export (R71 and above).
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Expert password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.30. CheckPoint Firewall – Management
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable SSH access from the backup device to the CheckPoint device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Management, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• “CPBackup (SSH)” - Perform CPBackup
• “CPBackup & Logs (SSH)” - Perform CPBackup and collect log files.
• “Upgrade_Export (SSH)” - Perform Upgrade Export.
• “Migrate_Export (SSH)” - Perform Migrate Export (R71 and above).
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Expert password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.31. CheckPoint Firewall (Windows)
Pre-requirements:
• Enable routing between the CheckPoint server and the backup device.
• Enable FTP access from the CheckPoint server to the backup device.
Backup configuration instructions (create FTP account on the BackBox server):
1. Login to the BackBox web interface.
2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and
password.
3. Click Add.
Backup configuration instructions (inside the CheckPoint server):
1. Login to the Windows server using administrative account.
2. Download from the Internet and install 7Zip on the server (http://www.7-zip.org)
3. Double click on “My Computer” -> double click on drive letter (for example drive C) -> right click -> New
folder -> specify the name “BackBox”.
4. Login to the BackBox web interface -> from the upper pane, click on Documents -> BackBox
Documentation -> download the script CheckPoint -> Management/Single Gateway.
Note: For CheckPoint R75.20 and above, download “Management/Single Gateway (Migrate Export)”
5. Replace the value of the parameter FTPPassword with the password for the BackBox OS user
“ftpbackbox” (if it is different than “backbox”)
Note: To change the “ftpbackbox” account password, login to the BackBox web interface ->
Authentication -> Operating system users -> locate the account “ftpbackbox” -> click on Edit icon ->
specify new password and confirm it -> click on Save.
6. Replace the value of the parameter FTPServer with the IP/hostname of the BackBox server.
7. Replace the value of the parameter ServerIP with the main IP address of the CheckPoint server.
8. Save the file as C:BackBoxCheckPoint_Backup.bat
9. Create a schedule task to run the file bellow at regular intervals:
C:BackBoxCheckPoint_Backup.bat
Backup configuration instructions (inside the BackBox web console):
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select either Management or Single Gateway, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Upgrade Export (Windows), from the drop-down list.
• Username: Put here the ftpbackbox
• Password: Put here the password for the “ftpbackbox” account on the BackBox server.
2. Click on Save.
2.32. CheckPoint Firewall – Module
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable SSH access from the backup device to the CheckPoint device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Module, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Possible options: “Conf Files (SSH)”, “CPBackup (SSH)” and “CPBackup & GateD (SSH)”
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Expert password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.33. CheckPoint Firewall – Provider-1
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable SSH access from the backup device to the CheckPoint device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Provider-1, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Expert password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.34. CheckPoint Firewall – Provider-1 (CMA Backup)
Pre-requirements:
• Enable routing between the CheckPoint CMA and the backup device.
• Enable SSH access from the backup device to the CheckPoint CMA.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the CMA to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Provider-1, from the drop-down list.
• Version: Select either R71 or R75, from the drop-down list.
• Backup type: Select CMA Backup (SSH), from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the CMA.
• Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Expert password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.35. CheckPoint SG80
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable SSH access from the backup device to the CheckPoint device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select SG80, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.36. CheckPoint Safe@Office
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable HTTPS access from the backup device to the CheckPoint device.
• Firmware version 5.0 or above.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select Safe@Office, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.37. CheckPoint VPN-1 Edge
Pre-requirements:
• Enable routing between the CheckPoint device and the backup device.
• Enable HTTPS access from the backup device to the CheckPoint device.
• Firmware version 5.0 or above.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select VPN-1 Edge, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.38. CheckPoint EndPoint Security R80
Pre-requirements:
• Enable routing between the CheckPoint server and the backup device.
• Enable FTP access from the CheckPoint server to the backup device.
Backup configuration instructions (create FTP account on the BackBox server):
1. Login to the BackBox web interface.
2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and
password.
3. Click Add.
Backup configuration instructions (inside the CheckPoint server):
1. Login to the Windows server using administrative account.
2. Download from the Internet and install 7Zip on the server (http://www.7-zip.org)
3. Double click on “My Computer” -> double click on drive letter (for example drive C) -> right click -> New
folder -> specify the name “BackBox”.
4. Login to the BackBox web interface -> from the upper pane, click on Documents -> BackBox
Documentation -> download the script CheckPoint -> Endpoint Security.
5. Replace the value of the parameter FTPPassword with the password for the BackBox OS user
“ftpbackbox” (if it is different than “backbox”)
Note: To change the “ftpbackbox” account password, login to the BackBox web interface ->
Authentication -> Operating system users -> locate the account “ftpbackbox” -> click on Edit icon ->
specify new password and confirm it -> click on Save.
6. Replace the value of the parameter FTPServer with the IP/hostname of the BackBox server.
7. Replace the value of the parameter ServerIP with the main IP address of the CheckPoint server.
8. Save the file as C:BackBoxCheckPoint_EPS_Backup.bat
9. Create a schedule task to run the file bellow at regular intervals:
C:BackBoxCheckPoint_EPS_Backup.bat
Backup configuration instructions (inside the BackBox web console):
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select CheckPoint, from the drop-down list.
• Product: Select EndPoint Security, from the drop-down list.
• Version: Select R80, from the drop-down list.
• Backup type: Select Migrate Export (Windows), from the drop-down list.
• Username: Put here the ftpbackbox
• Password: Put here the password for the “ftpbackbox” account on the BackBox server.
2. Click on Save.
2.39. Cisco ACS
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable SSH access, from the backup device to the Cisco device.
• Enable TFTP access from the Cisco device to the backup device.
• Add the BackBox device access to Cisco ACS from the Cisco ACS web console (System
Administration -> Administrators -> Settings -> Access -> click on Create)
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select ACS, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Username: Put here the username to access the Cisco device.
• Note: The account must have admin role on the Cisco ACS CLI.
• Password: Put here the password to access the Cisco device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.40. Cisco Router
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
• Enable SNMP server on the Cisco device (for SNMP backup).
• Enable SNMP and ICMP access from the backup device to the Cisco device (for SNMP backup).
• Configure Read/Write community on the Cisco device (for SNMP backup).
• Enable TFTP access from the Cisco device to the backup device (for SNMP backup).
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select Router, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet) – need Password and Enable password.
• User/Pass (SSH) – need Username and Password.
• User/Pass (Telnet) – need Username and Password.
• User/Pass/Ena (SSH) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.41. Cisco Router (Telnet/TFTP and SSH/TFTP)
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
• Enable TFTP access from the Cisco device to the backup device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select Router, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet/TFTP) – need Password and Enable password.
• User/Pass (SSH/TFTP) – need Username and Password.
• User/Pass (Telnet/TFTP) – need Username and Password.
• User/Pass/Ena (SSH/TFTP) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet/TFTP) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Server IP: Select the relevant IP address of the BackBox server.
2. Click on Save.
2.42. Cisco Switch
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
• Enable SNMP server on the Cisco device (for SNMP backup).
• Enable SNMP and ICMP access from the backup device to the Cisco device (for SNMP backup).
• Configure Read/Write community on the Cisco device (for SNMP backup).
• Enable TFTP access from the Cisco device to the backup device (for SNMP backup).
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select Switch, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet) – need Password and Enable password.
• User/Pass (SSH) – need Username and Password.
• User/Pass (Telnet) – need Username and Password.
• User/Pass/Ena (SSH) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.43. Cisco Switch (Telnet/TFTP and SSH/TFTP)
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
• Enable TFTP access from the Cisco device to the backup device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select Switch, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet/TFTP) – need Password and Enable password.
• User/Pass (SSH/TFTP) – need Username and Password.
• User/Pass (Telnet/TFTP) – need Username and Password.
• User/Pass/Ena (SSH/TFTP) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet/TFTP) – need Username, Password and Enable password.
• Server IP: Select the relevant IP address of the BackBox server.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Server IP: Select the relevant IP address of the BackBox server.
2. Click on Save.
2.44. Cisco Nexus 1000v switch
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select Nexus 1000V, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• User/Pass (SSH) – need Username and Password.
• User/Pass (Telnet) – need Username and Password..
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Port: Change this value only if it is different than the port written.
• Prompt after password: Change this value only if it is different than the prompt written.
2. Click on Save.
2.45. Cisco CatOS switch
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
• Login to the Cisco switch using either Telnet or SSH, enter enable privileged mode, and run the
commands bellow:
• set prompt SWITCHNAME>
Note: Replace the value SWITCHNAME with the switch hostname.
• wr mem
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select CatOS Switch, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet) – need Password and Enable password.
• User/Pass (SSH) – need Username and Password.
• User/Pass (Telnet) – need Username and Password.
• User/Pass/Ena (SSH) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.46. Cisco MDS 9000
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable SSH access, from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select MDS 9000, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Prompt after password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.47. Cisco 6500 WiSM
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access, from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select 6500 WiSM, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (Telnet), from the drop-down list.
• Username: Put here the username to access the Cisco device.
• Password: Put here the password to access the Cisco device.
• Prompt after password: Change this value only if it is different than the prompt written.
2. Click on Save.
2.48. Cisco WLC (Wireless LAN Controller)
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable SSH access, from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select WLC, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here the username to access the Cisco device.
• Password: Put here the password to access the Cisco device.
• Port: Change this value only if it is different than the port written.
• Prompt after password: Change this value only if it is different than the prompt written.
2. Click on Save.
2.49. Cisco PIX (IOS 6.1)
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select PIX, from the drop-down list.
• Version: Select version 6.1, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list.
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
2. Click on Save.
2.50. Cisco PIX (IOS 6.3 and above)
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select PIX, from the drop-down list.
• Version: Select version 6.3 and above, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet) – need Password and Enable password.
• User/Pass/Ena (SSH) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.51. Cisco ASA
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
• Enable TFTP access from the Cisco device to the backup device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select ASA, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet) – need Password and Enable password.
• User/Pass/Ena (SSH) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.52. Cisco FWSM
Pre-requirements:
• Enable routing between the Cisco device and the backup device.
• Enable Telnet access (for Telnet backup), from the backup device to the Cisco device.
• Enable SSH access (for SSH backup), from the backup device to the Cisco device.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select FWSM, from the drop-down list.
• Version: Select the relevant version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Possible options:
• Pass/Ena (Telnet) – need Password and Enable password.
• User/Pass/Ena (SSH) – need Username, Password and Enable password.
• User/Pass/Ena (Telnet) – need Username, Password and Enable password.
• Username: Put here the username to access the Cisco device (if exists).
• Password: Put here the password to access the Cisco device.
• Enable Password: Put here the Cisco “enable” password (if exist on the remote server).
• Prompt after password: Change this value only if it is different than the prompt written.
• Prompt after Enable password: Change this value only if it is different than the prompt written.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.53. Cisco IronPort Mail
Pre-requirements:
• Enable routing between the Cisco IronPort and the backup device.
• Enable FTP from the IronPort mail console.
• Enable FTP access from the backup device to the Cisco IronPort
• Enable SSH bi-directional from the backup device to the Cisco IronPort.
• Enable HTTPS access from the backup device to the Cisco IronPort (for Backup HTTPS only)
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select IronPort Mail, from the drop-down list.
• Version: Select version, from the drop-down list.
• Backup type: Select a backup type, from the drop-down list. Available options:
• Backup (SSH) – backup the current XML configuration file
• Backup (HTTPS) – backup the current XML configuration file
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
2.54. Cisco IronPort Management
Pre-requirements:
• Enable routing between the Cisco IronPort and the backup device.
• Enable FTP from the IronPort mail console.
• Enable FTP access from the backup device to the Cisco IronPort
• Enable SSH bi-directional from the backup device to the Cisco IronPort.
Backup configuration instructions:
1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details:
• Device Name: Put here a name to recognize the device.
• IP: Put here the IP address of the remote device to backup.
• Group: Select from the device groups drop-down list (Optional field).
• Vendor: Select Cisco, from the drop-down list.
• Product: Select IronPort Management, from the drop-down list.
• Version: Select version, from the drop-down list.
• Backup type: Select Backup (SSH), from the drop-down list.
• Username: Put here “admin”.
• Password: Put here the password for the “admin” account on the remote server/device.
• Port: Change this value only if it is different than the port written.
2. Click on Save.
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device
Back box how-to_configure_a_new_device

More Related Content

What's hot

510(k) Pre-Market Notification Project
510(k) Pre-Market Notification Project510(k) Pre-Market Notification Project
510(k) Pre-Market Notification Project
Brandon MacAleese
 
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
Joanne Pelaschier, RAC, CQA, CQE
 

What's hot (18)

510(k) Pre-Market Notification Project
510(k) Pre-Market Notification Project510(k) Pre-Market Notification Project
510(k) Pre-Market Notification Project
 
Finanziamenti per lo startup d’impresa
Finanziamenti per lo startup d’impresaFinanziamenti per lo startup d’impresa
Finanziamenti per lo startup d’impresa
 
volvo wiring diagram vm
volvo wiring diagram vmvolvo wiring diagram vm
volvo wiring diagram vm
 
FDA 510(k) Submission Tips & Best Practices
FDA 510(k) Submission Tips & Best PracticesFDA 510(k) Submission Tips & Best Practices
FDA 510(k) Submission Tips & Best Practices
 
Apc200 ecm eci user manual v1.2
Apc200 ecm eci user manual v1.2Apc200 ecm eci user manual v1.2
Apc200 ecm eci user manual v1.2
 
11 customizing the os v1.00_en
11 customizing the os v1.00_en11 customizing the os v1.00_en
11 customizing the os v1.00_en
 
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
mock 510(k) for UCSC Extension Regulatory Submissions Devices and Diagnostics...
 
INTRAORAL RADIOGRAPHY
INTRAORAL RADIOGRAPHYINTRAORAL RADIOGRAPHY
INTRAORAL RADIOGRAPHY
 
Rule 11 vs Rule 10 UE 2017-745 v01
Rule 11  vs Rule 10 UE 2017-745 v01Rule 11  vs Rule 10 UE 2017-745 v01
Rule 11 vs Rule 10 UE 2017-745 v01
 
Guia dos Roadies
Guia dos RoadiesGuia dos Roadies
Guia dos Roadies
 
Advances in CBCT in cleft patients
Advances in CBCT in cleft patients Advances in CBCT in cleft patients
Advances in CBCT in cleft patients
 
Sdmo mics-nexys-control panel-manual
Sdmo mics-nexys-control panel-manualSdmo mics-nexys-control panel-manual
Sdmo mics-nexys-control panel-manual
 
Presentation: Manufacturing medical devices
Presentation: Manufacturing medical devicesPresentation: Manufacturing medical devices
Presentation: Manufacturing medical devices
 
Artcam proreferencemanual810 186_219
Artcam proreferencemanual810 186_219Artcam proreferencemanual810 186_219
Artcam proreferencemanual810 186_219
 
ISO 10993-7 Biological Evaluation of Medical Devices - Ethylene Oxide Sterili...
ISO 10993-7 Biological Evaluation of Medical Devices - Ethylene Oxide Sterili...ISO 10993-7 Biological Evaluation of Medical Devices - Ethylene Oxide Sterili...
ISO 10993-7 Biological Evaluation of Medical Devices - Ethylene Oxide Sterili...
 
Dental Diagnostic imaging
Dental Diagnostic imagingDental Diagnostic imaging
Dental Diagnostic imaging
 
Dental panorama part 1
Dental panorama part 1Dental panorama part 1
Dental panorama part 1
 
Medical Device Regulations - 510(k) Process
Medical Device Regulations - 510(k) ProcessMedical Device Regulations - 510(k) Process
Medical Device Regulations - 510(k) Process
 

Similar to Back box how-to_configure_a_new_device

블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼
블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼
블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼
HION IT
 
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
HION IT
 
2.oracle purchasing
2.oracle purchasing2.oracle purchasing
2.oracle purchasing
Tamir Taha
 
Ovm user's guide
Ovm user's guideOvm user's guide
Ovm user's guide
conlee82
 
Samsung Galaxy S User Manual
Samsung Galaxy S User ManualSamsung Galaxy S User Manual
Samsung Galaxy S User Manual
Greg Robinson
 
Oracle pl-sql user's guide & reference
Oracle   pl-sql user's guide & referenceOracle   pl-sql user's guide & reference
Oracle pl-sql user's guide & reference
desitaria
 
Ssl manuf roadmap-sept2013
Ssl manuf roadmap-sept2013Ssl manuf roadmap-sept2013
Ssl manuf roadmap-sept2013
babujacob
 

Similar to Back box how-to_configure_a_new_device (20)

V3 full guide_preview
V3 full guide_previewV3 full guide_preview
V3 full guide_preview
 
블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼
블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼
블루버드PDA Bluebird EF500 1D 2D 5인치 디스플레이 안드로이드PDA 멀티OS지원 PTT지원 모바일POS 산업용PDA 매뉴얼
 
Dell Latitude 5490 - Laptops Trần Phát
Dell Latitude 5490 - Laptops Trần PhátDell Latitude 5490 - Laptops Trần Phát
Dell Latitude 5490 - Laptops Trần Phát
 
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
 
Galaxy s2
Galaxy s2Galaxy s2
Galaxy s2
 
Nokia E71 1 Ug En
Nokia E71 1 Ug EnNokia E71 1 Ug En
Nokia E71 1 Ug En
 
Plsql
PlsqlPlsql
Plsql
 
2.oracle purchasing
2.oracle purchasing2.oracle purchasing
2.oracle purchasing
 
vhdl
vhdlvhdl
vhdl
 
Jands
JandsJands
Jands
 
Samsung Galaxy Rush Manual / User Guide
Samsung Galaxy Rush Manual / User GuideSamsung Galaxy Rush Manual / User Guide
Samsung Galaxy Rush Manual / User Guide
 
Dell Vostro 5480: Laptop văn phòng mỏng nhẹ
Dell Vostro 5480: Laptop văn phòng mỏng nhẹDell Vostro 5480: Laptop văn phòng mỏng nhẹ
Dell Vostro 5480: Laptop văn phòng mỏng nhẹ
 
Ovm user's guide
Ovm user's guideOvm user's guide
Ovm user's guide
 
Samsung Galaxy S User Manual
Samsung Galaxy S User ManualSamsung Galaxy S User Manual
Samsung Galaxy S User Manual
 
Oracle pl-sql user's guide & reference
Oracle   pl-sql user's guide & referenceOracle   pl-sql user's guide & reference
Oracle pl-sql user's guide & reference
 
121poug
121poug121poug
121poug
 
SoundForge v8.0.pdf
SoundForge v8.0.pdfSoundForge v8.0.pdf
SoundForge v8.0.pdf
 
Guia implementacion seguridad oracle 12c
Guia implementacion seguridad oracle 12cGuia implementacion seguridad oracle 12c
Guia implementacion seguridad oracle 12c
 
Polycom soundstation ip7000 user guide
Polycom soundstation ip7000 user guidePolycom soundstation ip7000 user guide
Polycom soundstation ip7000 user guide
 
Ssl manuf roadmap-sept2013
Ssl manuf roadmap-sept2013Ssl manuf roadmap-sept2013
Ssl manuf roadmap-sept2013
 

Back box how-to_configure_a_new_device

  • 1. Document Identifier: UG01.2.0 Effective Date: August 2012 Covering Backbox Product Version: 2.2.8 Author: Eyal Estrin How to configure new device BACKBOX K E E P I T S A F E www.backbox.co
  • 2. Copyright © 2012 Safeway. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission from Safeway. All copyright, confidential information, patents, design rights and all other intellectual property rights of whatsoever nature contained herein are and shall remain the sole and exclusive property of Safeway Ltd. The information furnished herein is believed to be accurate and reliable. However, no responsibility is assumed by Safeway for its use, or for any infringements of patents or other rights of third parties resulting from its use. The Safeway name and Safeway logo are trademarks or registered trademarks of Safeway Limited. All other trademarks are the property of their respective owners.
  • 3. Table of Contents 1. Introduction...........................................................................................................10 1.1. Purpose.........................................................................................................................................10 2. Adding new devices..............................................................................................11 2.1. 3COM 5500 Switch .......................................................................................................................11 2.2. Access Layers PortNox.................................................................................................................12 2.3. Aladdin eSafe................................................................................................................................14 2.4. AlgoSec Firewall Analyzer ............................................................................................................15 2.5. Allot NetEnforcer...........................................................................................................................16 2.6. Allot NetXplorer.............................................................................................................................17 2.7. Aruba switch..................................................................................................................................18 2.8. Astaro Command Center ..............................................................................................................19 2.9. Astaro Security Gateway ..............................................................................................................20 2.10. AudioCodes BusinessPLUS......................................................................................................21 2.11. AudioCodes Mediant 2000........................................................................................................23 2.12. AudioCodes MP-112 .................................................................................................................24 2.13. AudioCodes MP-114 .................................................................................................................25 2.14. AudioCodes MP-124 .................................................................................................................26 2.15. AudioCodes MSBG ...................................................................................................................27 2.16. Avaya 5500 series.....................................................................................................................28 2.17. BackBox Self-Backup................................................................................................................29 2.18. BackBox CIFS Export................................................................................................................30 2.19. BackBox FTP Export .................................................................................................................31 2.20. BackBox SCP Export ................................................................................................................32 2.21. Barracuda Firewall ....................................................................................................................33 2.22. Bind DNS Server .......................................................................................................................34 2.23. Blue Coat Proxy AV...................................................................................................................35 2.24. Blue Coat Proxy SG ..................................................................................................................36 2.25. Brocade DS-490 fiber switch.....................................................................................................37 2.26. Brocade DS-5100 switch...........................................................................................................38 2.27. Centerity Monitor .......................................................................................................................39 2.28. CheckPoint Connectra ..............................................................................................................40
  • 4. 2.29. CheckPoint Firewall – Single Gateway .....................................................................................41 2.30. CheckPoint Firewall – Management..........................................................................................42 2.31. CheckPoint Firewall (Windows).................................................................................................43 2.32. CheckPoint Firewall – Module...................................................................................................45 2.33. CheckPoint Firewall – Provider-1..............................................................................................46 2.34. CheckPoint Firewall – Provider-1 (CMA Backup) .....................................................................47 2.35. CheckPoint SG80......................................................................................................................48 2.36. CheckPoint Safe@Office...........................................................................................................49 2.37. CheckPoint VPN-1 Edge...........................................................................................................50 2.38. CheckPoint EndPoint Security R80...........................................................................................51 2.39. Cisco ACS .................................................................................................................................53 2.40. Cisco Router..............................................................................................................................54 2.41. Cisco Router (Telnet/TFTP and SSH/TFTP).............................................................................55 2.42. Cisco Switch..............................................................................................................................56 2.43. Cisco Switch (Telnet/TFTP and SSH/TFTP).............................................................................57 2.44. Cisco Nexus 1000v switch ........................................................................................................58 2.45. Cisco CatOS switch...................................................................................................................59 2.46. Cisco MDS 9000........................................................................................................................60 2.47. Cisco 6500 WiSM......................................................................................................................61 2.48. Cisco WLC (Wireless LAN Controller) ......................................................................................62 2.49. Cisco PIX (IOS 6.1) ...................................................................................................................63 2.50. Cisco PIX (IOS 6.3 and above) .................................................................................................64 2.51. Cisco ASA .................................................................................................................................65 2.52. Cisco FWSM..............................................................................................................................66 2.53. Cisco IronPort Mail ....................................................................................................................67 2.54. Cisco IronPort Management......................................................................................................68 2.55. Cisco IronPort Web ...................................................................................................................69 2.56. Cisco IP Telephony ...................................................................................................................70 2.57. Citrix NetScaler..........................................................................................................................72 2.58. ClearSwift Email Appliance .......................................................................................................73 2.59. ClearSwift MIMEsweeper for SMTP..........................................................................................76 2.60. ClearSwift Web Gateway ..........................................................................................................78 2.61. Crossbeam C series..................................................................................................................81 2.62. Crossbeam X series ..................................................................................................................82 2.63. D-link Switch..............................................................................................................................83
  • 5. 2.64. Dell PowerConnect 54xx ...........................................................................................................84 2.65. Dell PowerConnect M6xxx ........................................................................................................85 2.66. Enterasys switch........................................................................................................................86 2.67. Extreme Networks Switch .........................................................................................................87 2.68. Fireye.........................................................................................................................................88 2.69. FireMon 5.x................................................................................................................................89 2.70. ForeScout CounterAct...............................................................................................................92 2.71. Fortinet FortiAnalyzer ................................................................................................................94 2.72. FortiBalancer .............................................................................................................................95 2.73. Fortinet FortiGate ......................................................................................................................96 2.74. Fortinet FortiMail........................................................................................................................97 2.75. Foundry FGS switch..................................................................................................................98 2.76. F5 BigIP.....................................................................................................................................99 2.77. F5 FirePass .............................................................................................................................100 2.78. HP ProCurve (SCP) ................................................................................................................102 2.79. HP ProCurve (No IP SSH Filetransfer) ...................................................................................103 2.80. Huawei Switch.........................................................................................................................104 2.81. IBM DataPower SX 3.8.x.........................................................................................................105 2.82. Imperva SecureSphere ...........................................................................................................106 2.83. Imprivata One-Sign .................................................................................................................107 2.84. Juniper ISG..............................................................................................................................108 2.85. Juniper NetScreen...................................................................................................................109 2.86. Juniper NSM 2011...................................................................................................................110 2.87. Juniper Switch .........................................................................................................................111 2.88. Juniper Router.........................................................................................................................112 2.89. Juniper SRX ............................................................................................................................113 2.90. Juniper SSG ............................................................................................................................114 2.91. Juniper SA (Secure Access) ...................................................................................................115 2.92. Juniper Unified Access Control ...............................................................................................118 2.93. Juniper WLC............................................................................................................................119 2.94. Linux Generic ..........................................................................................................................120 2.95. Linux (Generic) IPTables.........................................................................................................121 2.96. Linux (Generic) Squid Proxy ...................................................................................................122 2.97. McAfee ePO 4.x ......................................................................................................................123 2.98. McAfee Intrushield Management.............................................................................................125
  • 6. 2.99. Microsoft ISA Server 2006 ......................................................................................................127 2.100. Microsoft TMG 2010................................................................................................................129 2.101. Microsoft UAG 2010 ................................................................................................................131 2.102. Motorola RFS 7000 .................................................................................................................133 2.103. NetAPP ONTAP 8.x ................................................................................................................134 2.104. Netgear FSM / GSM switch.....................................................................................................135 2.105. Nokia Crypto Cluster ...............................................................................................................136 2.106. Nokia IPSO..............................................................................................................................137 2.107. Nortel 2360 Switch ..................................................................................................................138 2.108. Nortel 460/470 Switch (Telnet)................................................................................................139 2.109. Nortel 460/470 Switch (SNMPv2/TFTP) .................................................................................140 2.110. Nortel 460/470 Switch (All)......................................................................................................141 2.111. Nortel Passport 1600...............................................................................................................142 2.112. Nortel Passport 8000 (SNMP/TFTP).......................................................................................143 2.113. Nortel Passport 8000 (Running-config)...................................................................................144 2.114. PaloAlto PA-Series..................................................................................................................145 2.115. PFSense Firewall ....................................................................................................................147 PineApp Mail-SeCure ............................................................................................................................148 2.116. PineApp Mail-SeCure (HTTPS)...............................................................................................150 2.117. Radiator Radius Server ...........................................................................................................151 Radware Alteon OS (Telnet / SSH) .......................................................................................................152 2.118. Radware Alteon (SNMP/TFTP)...............................................................................................153 2.119. Radware AppDirector (1.03)....................................................................................................154 2.120. Radware AppDirector (1.06 and above)..................................................................................155 2.121. Radware AppDirector ODS (2.x and above) ...........................................................................156 2.122. Radware Apsolute-Vision........................................................................................................157 Radware CID (1.x – 2.x) ........................................................................................................................158 2.123. Radware CID (3.x and above).................................................................................................159 2.124. Radware DefensePro (3.x)......................................................................................................160 2.125. Radware DefensePro (4.x – 6.x).............................................................................................161 2.126. Radware LinkProof (4.x – 5.x).................................................................................................162 2.127. Radware LinkProof (6.x and above)........................................................................................163 2.128. Radware WSD.........................................................................................................................164 2.129. Redback RB400 ......................................................................................................................165 2.130. Riverbed Steelhead.................................................................................................................166
  • 7. 2.131. SkyBox (Windows) ..................................................................................................................167 2.132. SonicWall NSA 2400 ...............................................................................................................169 2.133. StoneSoft StoneGate Management 5.3.4 ...............................................................................170 2.134. Symantec Brightmail Gateway 9.0 ..........................................................................................171 2.135. Symantec Brightmail Gateway 9.0 (SCP) ...............................................................................173 2.136. Symantec Endpoint Protection 11...........................................................................................174 2.137. Tenor - Quintun .......................................................................................................................177 2.138. TippingPoint SMS....................................................................................................................178 2.139. TrendMicro IMSS 7.x (Windows).............................................................................................180 2.140. TrendMicro IMSVA ..................................................................................................................182 2.141. TrendMicro IWSS 2.2 ..............................................................................................................183 2.142. TrendMicro IWSS 3.1 Virtual Appliance (IWSVA)...................................................................184 2.143. TrendMicro IWSS 5.x Virtual Appliance (IWSVA)...................................................................185 2.144. TrendMicro OfficeScan............................................................................................................186 2.145. Tufin SecureTrack/SecureChange Workflow..........................................................................188 2.146. VMware ESXi 4.1 and above ..................................................................................................189 2.147. WatchGuard XCS....................................................................................................................192 2.148. WatchGuard XTM....................................................................................................................193 2.149. Websense Content Gateway...................................................................................................194 2.150. Websense Content Gateway Management ............................................................................195 2.151. Websense Web Security 7.5...................................................................................................197 2.152. Websense DLP........................................................................................................................199 2.153. Websense Triton 7.6 ...............................................................................................................201
  • 8. About this guide This document is divided into the following chapters: • Chapter 1, “Introduction“, purpose of this document. • Chapter 2, “Adding new devices”, explain how to add new devices and configure backup. Who Should Use It This guide is intended for all Backbox users. The 3 different types of user are: • System Administrators - to install, configure and schedule backups. • Backup Operators - to configure and schedule backups. This guide assumes that you have some knowledge of the operating system.
  • 9. Typographical Conventions This document uses the following typographical conventions: Screen names, button names, command and option names appear in bold type. The names of directories, files, machines, partitions, and volumes also appear in bold. Variable information appears in italic type. This includes user-supplied information on command lines. Warnings appear as follows: Warning: Warning text.
  • 10. 1. Introduction 1.1. Purpose This guide explains how to configure backup for new devices using BackBox application.
  • 11. 2. Adding new devices The following sections describe how to add new devices and configure backup. 2.1. 3COM 5500 Switch Pre-requirements • Enable routing between the 3COM device and the backup device. • Enable Telnet or SSH between the backup device and the 3COM device. Backup configuration instructions 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select 3COM, from the drop-down list. • Product: Select Switch, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select backup type (either Pass/Ena (Telnet), User/Pass (Telnet), User/Pass (SSH), User/Pass/Super (Telnet) or User/Pass/Super (SSH)), from the drop-down list. • Username: Put here the username for the remote device. • Password: Put here the password for the remote server/device. • Super Password: Put here the 3COM “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after super password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 12. 2.2. Access Layers PortNox Pre-requirements: • Enable routing between the Portnox server and the backup device. • In-case the database is installed locally on the Portnox server, enable FTP access from the Portnox server to the backup device. • In-case the database is installed on remote SQL server, enable FTP access from the Portnox SQL database server to the backup device. Backup configuration instructions (create FTP account on the BackBox server): 1. Login to the BackBox web interface. 2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and password. 3. Click Add. Backup configuration instructions (inside the PortNox server): 1. In-case the Portnox database is installed on the same server as the Portnox server, login to the Portnox server using administrative account. 2. In-case the Portnox database is installed on remote SQL server, login to the SQL server using administrative account. 3. Download from the Internet and install 7Zip on the server (http://www.7-zip.org) 4. Double click on “My Computer” -> double click on drive letter (for example drive C) -> right click -> New folder -> specify the name “PortnoxBackup”. 5. In-case the Portnox database is installed on the same server as the Portnox server, login to the BackBox web interface -> from the upper pane, click on Documents -> BackBox Documentation -> download the script Access Layers -> Portnox -> Local Database. 6. In-case the Portnox database is installed on remote SQL server, login to the BackBox web interface -> from the upper pane, click on Documents -> BackBox Documentation -> download the script Access Layers -> Portnox -> Remote Database. 7. Replace the value of the parameter FTPPassword with the password for the BackBox OS user “ftpbackbox” (if it is different than “backbox”) Note: To change the “ftpbackbox” account password, login to the BackBox web interface -> Authentication -> Operating system users -> locate the account “ftpbackbox” -> click on Edit icon -> specify new password and confirm it -> click on Save. 8. Replace the value of the parameter FTPServer with the IP/hostname of the BackBox server. 9. Replace the value of the parameter ServerIP with the main IP address of the Portnox server. 10. Replace the value of the string “.AccessLayers” with “.” and the Portnox database server name. 11. Save the file as C:PortnoxBackupPortNoxBackup.bat
  • 13. 12. Create a schedule task to run the file bellow at regular intervals: C:PortnoxBackupPortNoxBackup.bat Backup configuration instructions (inside the BackBox web console): 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Access Layers, from the drop-down list. • Product: Select Portnox, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (Local), from the drop-down list. • Username: Put here the ftpbackbox • Password: Put here the password for the “ftpbackbox” account on the BackBox server. 2. Click on Save.
  • 14. 2.3. Aladdin eSafe Pre-requirements: • Enable routing between the eSafe and the backup device. • Enable SSH access from the backup device to the eSafe. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Aladdin, from the drop-down list. • Product: Select eSafe, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here “root”. • Password: Put here the password for the “root” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 15. 2.4. AlgoSec Firewall Analyzer Pre-requirements: • Enable routing between the AlgoSec device and the backup device. • Enable SSH access from the backup device to the AlgoSec device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AlgoSec, from the drop-down list. • Product: Select Firewall Analyzer, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here “root”. • Password: Put here the password for the “root” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 16. 2.5. Allot NetEnforcer Pre-requirements: • Enable routing between the NetEnforcer device and the backup device. • Enable SSH access from the backup device to the NetEnforcer device. Backup configuration instructions: 3. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Allot, from the drop-down list. • Product: Select NetEnforcer, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: SSH, from the drop-down list. • Username: Put here “root”. • Password: Put here the password for the “root” account on the remote server/device. • Port: Change this value only if it is different than the port written. 4. Click on Save.
  • 17. 2.6. Allot NetXplorer Pre-requirements: • Enable routing between the NetXplorer device and the backup device. • Enable SSH access from the backup device to the NetXplorer device. Backup configuration instructions: 5. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Allot, from the drop-down list. • Product: Select NetXplorer, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select SSH, from the drop-down list. • Username: Put here “root”. • Password: Put here the password for the “root” account on the remote server/device. • Port: Change this value only if it is different than the port written. 6. Click on Save.
  • 18. 2.7. Aruba switch Pre-requirements: • Enable routing between the Aruba switch and the backup device. • Enable Telnet or SSH access from the backup device to the Aruba switch. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Aruba, from the drop-down list. • Product: Select Security switch, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (Telnet) or Backup (SSH), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 19. 2.8. Astaro Command Center Pre-requirements: • Enable routing between the Astaro device and the backup device. • Enable SSH access from the backup device to the Astaro device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Astaro, from the drop-down list. • Product: Select Command Center, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select backup type, from the drop-down list. Available options: • Backup (SSH) – Backup the configuration • Backup Encrypted (SSH) – Backup the configuration in encrypted mode • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • SU Password: Put here the password for the privileged mode. • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after SU password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 20. 2.9. Astaro Security Gateway Pre-requirements: • Enable routing between the Astaro device and the backup device. • Enable SSH access from the backup device to the Astaro device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Astaro, from the drop-down list. • Product: Select Security Gateway, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select backup type, from the drop-down list. Available options: • Backup (SSH) – Backup the configuration • Backup Encrypted (SSH) – Backup the configuration in encrypted mode • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • SU Password: Put here the password for the privileged mode. • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after SU password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 21. 2.10. AudioCodes BusinessPLUS Pre-requirements: • Enable routing between the AudioCodes device and the backup device. • Enable FTP traffic from the AudioCodes device to the backup device. Backup configuration instructions (create FTP account on the BackBox server): 1. Login to the BackBox web interface. 2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and password. 3. Click Add. Backup configuration instructions (inside the AudioCodes web console): 1. Open an internet browser and login to the address: http://< IP_Address> 2. Supply credentials to login to the management console. 3. From the left pane, click on Configuration -> select Full. 4. Expand Backup -> click on Backup System. • Select the days of the week and time for the backup process • Status – change to Enabled • Server address – specify here the IP address of the BackBox
  • 22. • Directory – specify “/” • User name – specify the FTP account on the BackBox • Password – specify the password for the FTP account 5. Under “Advanced Settings” select which settings to backup. 6. Click on Submit. Backup configuration instructions (inside the BackBox web console): 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AudioCodes, from the drop-down list. • Product: Select BusinessPLUS, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (Local), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. 2. Click on Save.
  • 23. 2.11. AudioCodes Mediant 2000 Pre-requirements: • Enable routing between the AudioCodes device and the backup device. • Enable SSH access from the backup device to the AudioCodes device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AudioCodes, from the drop-down list. • Product: Select Mediant 2000, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 24. 2.12. AudioCodes MP-112 Pre-requirements: • Enable routing between the AudioCodes device and the backup device. • Enable SSH access from the backup device to the AudioCodes device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AudioCodes, from the drop-down list. • Product: Select MP-112, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 25. 2.13. AudioCodes MP-114 Pre-requirements: • Enable routing between the AudioCodes device and the backup device. • Enable Telnet access from the backup device to the AudioCodes device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AudioCodes, from the drop-down list. • Product: Select MP-114, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (Telnet), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. 2. Click on Save.
  • 26. 2.14. AudioCodes MP-124 Pre-requirements: • Enable routing between the AudioCodes device and the backup device. • Enable SSH access from the backup device to the AudioCodes device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AudioCodes, from the drop-down list. • Product: Select MP-124, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 27. 2.15. AudioCodes MSBG Pre-requirements: • Enable routing between the AudioCodes device and the backup device. • Enable HTTPS traffic (port 8082TCP) from backup device to the AudioCodes device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select AudioCodes, from the drop-down list. • Product: Select MSBG, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (HTTPS), from the drop-down list. • Username: Put here the account for the remote account. • Password: Put here the password for the account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 28. 2.16. Avaya 5500 series Pre-requirements: • Enable routing between the Avaya switch and the backup device. • Enable SNMP and ICMP access from the backup device to the Avaya switch (for SNMPv2/TFTP) • Configure Read/Write SNMP version 2 community on the Avaya switch (for SNMPv2/TFTP) • Enable TFTP access from the Avaya switch to the backup device (for SNMPv2/TFTP) • Enable Telnet access from the backup device to the Avaya switch (for Telnet backup) • Enable SSH access from the backup device to the Avaya switch (for SSH backup) • Avaya firmware 5.x or above. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Avaya, from the drop-down list. • Product: Select 5500 series, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select backup option, from the drop-down list. Available options: • Backup (SNMPv2/TFTP) BIN - backup configuration in binary format • Backup (SNMPv2/Telnet/TFTP) - backup configuration (ASCII + binary) • Backup (Telnet) – backup configuration in ASCII format • Username: Put here username to access the remote device • Password: Put here the password for the remote device • SNMP Community string: Put here the SNMP R/W community string for the remote device. • Server IP: Select the relevant IP of the BackBox. 2. Click on Save.
  • 29. 2.17. BackBox Self-Backup Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the BackBox. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select BackBox, from the drop-down list. • Product: Select Self-Backup, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Server IP: Select the relevant IP of the BackBox. 2. Click on Save.
  • 30. 2.18. BackBox CIFS Export Pre-requirements: • Enable routing between the CIFS server (Windows, NetApp, etc) and the BackBox. • Enable CIFS traffic (port 445TCP) from BackBox to the CIFS server. • Account with Read/Write access on the remote storage device. • Path to save files on the remote storage device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote storage device. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select BackBox, from the drop-down list. • Product: Select CIFS Export, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Export (CIFS), from the drop-down list. • Username: Put here the account for the remote storage device. • Password: Put here the password for the account on the remote server/device. • Remote Path: Specify here the path of the share on the remote storage. • Note: Specify “/” character instead of “” (for example: //myserver/myshare) • Days to store: Specify here the number of days to export backups to the remote storage. 2. Click on Save. Important note: When adding the above device to a scheduled backup job, the recommendation is to add it to a separate backup job from the rest of the devices that starts after all the other backup jobs have completed.
  • 31. 2.19. BackBox FTP Export Pre-requirements: • Enable routing between the FTP server and the BackBox. • Enable FTP traffic (port 21TCP) from BackBox to the FTP server. • Account with Read/Write access on the remote storage device. • Path to save files on the remote storage device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote storage device. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select BackBox, from the drop-down list. • Product: Select FTP Export, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Export (FTP), from the drop-down list. • Username: Put here the account for the remote storage device. • Password: Put here the password for the account on the remote server/device. • Remote Path: Specify here the path of the share on the remote storage. • Note: For the root folder of the FTP server (or user’s home folder) specify “/” (without “”) • Days to store: Specify here the number of days to export backups to the remote storage. 2. Click on Save. Important note: When adding the above device to a scheduled backup job, the recommendation is to add it to a separate backup job from the rest of the devices that starts after all the other backup jobs have completed.
  • 32. 2.20. BackBox SCP Export Pre-requirements: • Enable routing between the SCP server and the BackBox. • Enable SCP traffic (port 22TCP) from BackBox to the SCP server. • Account with Read/Write access on the remote storage device. • Path to save files on the remote storage device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote storage device. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select BackBox, from the drop-down list. • Product: Select SCP Export, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Export (SCP), from the drop-down list. • Username: Put here the account for the remote storage device. • Password: Put here the password for the account on the remote server/device. • Remote Path: Specify here the path of the share on the remote storage. • Days to store: Specify here the number of days to export backups to the remote storage. 2. Click on Save. Important note: When adding the above device to a scheduled backup job, the recommendation is to add it to a separate backup job from the rest of the devices that starts after all the other backup jobs have completed.
  • 33. 2.21. Barracuda Firewall Pre-requirements: • Enable routing between the Barrcuda device and the backup device. • Enable SSH access from the backup device to the Barracuda device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Barracuda, from the drop-down list. • Product: Select Firewall, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • “Backup (SSH)” • Username: Put here “root”. • Password: Put here the password for the “root” account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 34. 2.22. Bind DNS Server Pre-requirements: • Enable routing between the Bind server and the backup device. • Enable SSH access from the backup device to the Bind server. Backup configuration instructions: 3. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Bind, from the drop-down list. • Product: Select DNS Server, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • “Backup (SSH)” • Username: Put here “root”. • Password: Put here the password for the “root” account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 4. Click on Save.
  • 35. 2.23. Blue Coat Proxy AV Pre-requirements: • Enable routing between the Blue Coat and the backup device. • Enable HTTPS access from the backup device to the Blue Coat. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Blue Coat, from the drop-down list. • Product: Select ProxyAV, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select backup type, from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 36. 2.24. Blue Coat Proxy SG Pre-requirements: • Enable routing between the Blue Coat and the backup device. • Enable SSH access (for SSH backup), from the backup device to the Blue Coat. • Enable HTTPS access (for WGET backup), from the backup device to the Blue Coat. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Blue Coat, from the drop-down list. • Product: Select ProxySG, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Possible options: “Backup (SSH)” and “Backup (WGET)”. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Enable password: Put here the “enable” password. • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 37. 2.25. Brocade DS-490 fiber switch Pre-requirements: • Enable routing between the Brocade switch and the backup device. • Enable SSH access (for SSH backup), from the backup device to the Brocade switch. • Enable Telnet access (for Telnet backup), from the backup device to the Brocade switch. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Brocade, from the drop-down list. • Product: Select DS-490, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Possible options: “Backup (SSH)” and “Backup (Telnet)”. • Username: Put here the username for the remote device. • Password: Put here the password for the remote device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 38. 2.26. Brocade DS-5100 switch Pre-requirements: • Enable routing between the Brocade switch and the backup device. • Enable SSH access, from the backup device to the Brocade switch. • Enable SCP access, from the Brocade switch to the backup device. Backup configuration instructions: 3. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Brocade, from the drop-down list. • Product: Select DS-5100, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select the backup type (SSH/SCP), from the drop-down list. • Username: Put here the username for the remote device. • Password: Put here the password for the remote device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 4. Click on Save.
  • 39. 2.27. Centerity Monitor Pre-requirements: • Enable routing between the Centerity server and the backup device. • Enable SSH access, from the backup device to the Centerity server. Backup configuration instructions: 2. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Centerity, from the drop-down list. • Product: Select Monitor, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here the username for the Centerity • Password: Put here the password for the above account on the remote server/device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 3. Click on Save.
  • 40. 2.28. CheckPoint Connectra Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable SSH access from the backup device to the CheckPoint device. Backup configuration instructions: 5. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Connectra, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • “CPBackup (SSH)” - Perform CPBackup • “CPBackup & Logs (SSH)” - Perform CPBackup and collect log files. • “Upgrade_Export (SSH)” - Perform Upgrade Export. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Expert password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 6. Click on Save.
  • 41. 2.29. CheckPoint Firewall – Single Gateway Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable SSH access from the backup device to the CheckPoint device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Single gateway, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • “CPBackup (SSH)” - Perform CPBackup • “CPBackup & Logs (SSH)” - Perform CPBackup and collect log files. • “Upgrade_Export (SSH)” - Perform Upgrade Export. • “Migrate_Export (SSH)” - Perform Migrate Export (R71 and above). • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Expert password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 42. 2.30. CheckPoint Firewall – Management Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable SSH access from the backup device to the CheckPoint device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Management, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • “CPBackup (SSH)” - Perform CPBackup • “CPBackup & Logs (SSH)” - Perform CPBackup and collect log files. • “Upgrade_Export (SSH)” - Perform Upgrade Export. • “Migrate_Export (SSH)” - Perform Migrate Export (R71 and above). • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Expert password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 43. 2.31. CheckPoint Firewall (Windows) Pre-requirements: • Enable routing between the CheckPoint server and the backup device. • Enable FTP access from the CheckPoint server to the backup device. Backup configuration instructions (create FTP account on the BackBox server): 1. Login to the BackBox web interface. 2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and password. 3. Click Add. Backup configuration instructions (inside the CheckPoint server): 1. Login to the Windows server using administrative account. 2. Download from the Internet and install 7Zip on the server (http://www.7-zip.org) 3. Double click on “My Computer” -> double click on drive letter (for example drive C) -> right click -> New folder -> specify the name “BackBox”. 4. Login to the BackBox web interface -> from the upper pane, click on Documents -> BackBox Documentation -> download the script CheckPoint -> Management/Single Gateway. Note: For CheckPoint R75.20 and above, download “Management/Single Gateway (Migrate Export)” 5. Replace the value of the parameter FTPPassword with the password for the BackBox OS user “ftpbackbox” (if it is different than “backbox”) Note: To change the “ftpbackbox” account password, login to the BackBox web interface -> Authentication -> Operating system users -> locate the account “ftpbackbox” -> click on Edit icon -> specify new password and confirm it -> click on Save. 6. Replace the value of the parameter FTPServer with the IP/hostname of the BackBox server. 7. Replace the value of the parameter ServerIP with the main IP address of the CheckPoint server. 8. Save the file as C:BackBoxCheckPoint_Backup.bat 9. Create a schedule task to run the file bellow at regular intervals: C:BackBoxCheckPoint_Backup.bat
  • 44. Backup configuration instructions (inside the BackBox web console): 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select either Management or Single Gateway, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Upgrade Export (Windows), from the drop-down list. • Username: Put here the ftpbackbox • Password: Put here the password for the “ftpbackbox” account on the BackBox server. 2. Click on Save.
  • 45. 2.32. CheckPoint Firewall – Module Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable SSH access from the backup device to the CheckPoint device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Module, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Possible options: “Conf Files (SSH)”, “CPBackup (SSH)” and “CPBackup & GateD (SSH)” • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Expert password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 46. 2.33. CheckPoint Firewall – Provider-1 Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable SSH access from the backup device to the CheckPoint device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Provider-1, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Expert password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 47. 2.34. CheckPoint Firewall – Provider-1 (CMA Backup) Pre-requirements: • Enable routing between the CheckPoint CMA and the backup device. • Enable SSH access from the backup device to the CheckPoint CMA. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the CMA to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Provider-1, from the drop-down list. • Version: Select either R71 or R75, from the drop-down list. • Backup type: Select CMA Backup (SSH), from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the CMA. • Expert Password: Put here the CheckPoint “expert” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Expert password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 48. 2.35. CheckPoint SG80 Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable SSH access from the backup device to the CheckPoint device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select SG80, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 49. 2.36. CheckPoint Safe@Office Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable HTTPS access from the backup device to the CheckPoint device. • Firmware version 5.0 or above. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select Safe@Office, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 50. 2.37. CheckPoint VPN-1 Edge Pre-requirements: • Enable routing between the CheckPoint device and the backup device. • Enable HTTPS access from the backup device to the CheckPoint device. • Firmware version 5.0 or above. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select VPN-1 Edge, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 51. 2.38. CheckPoint EndPoint Security R80 Pre-requirements: • Enable routing between the CheckPoint server and the backup device. • Enable FTP access from the CheckPoint server to the backup device. Backup configuration instructions (create FTP account on the BackBox server): 1. Login to the BackBox web interface. 2. From the upper pane, click on Authentication -> Operating System Users -> supply account name and password. 3. Click Add. Backup configuration instructions (inside the CheckPoint server): 1. Login to the Windows server using administrative account. 2. Download from the Internet and install 7Zip on the server (http://www.7-zip.org) 3. Double click on “My Computer” -> double click on drive letter (for example drive C) -> right click -> New folder -> specify the name “BackBox”. 4. Login to the BackBox web interface -> from the upper pane, click on Documents -> BackBox Documentation -> download the script CheckPoint -> Endpoint Security. 5. Replace the value of the parameter FTPPassword with the password for the BackBox OS user “ftpbackbox” (if it is different than “backbox”) Note: To change the “ftpbackbox” account password, login to the BackBox web interface -> Authentication -> Operating system users -> locate the account “ftpbackbox” -> click on Edit icon -> specify new password and confirm it -> click on Save. 6. Replace the value of the parameter FTPServer with the IP/hostname of the BackBox server. 7. Replace the value of the parameter ServerIP with the main IP address of the CheckPoint server. 8. Save the file as C:BackBoxCheckPoint_EPS_Backup.bat 9. Create a schedule task to run the file bellow at regular intervals: C:BackBoxCheckPoint_EPS_Backup.bat
  • 52. Backup configuration instructions (inside the BackBox web console): 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select CheckPoint, from the drop-down list. • Product: Select EndPoint Security, from the drop-down list. • Version: Select R80, from the drop-down list. • Backup type: Select Migrate Export (Windows), from the drop-down list. • Username: Put here the ftpbackbox • Password: Put here the password for the “ftpbackbox” account on the BackBox server. 2. Click on Save.
  • 53. 2.39. Cisco ACS Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable SSH access, from the backup device to the Cisco device. • Enable TFTP access from the Cisco device to the backup device. • Add the BackBox device access to Cisco ACS from the Cisco ACS web console (System Administration -> Administrators -> Settings -> Access -> click on Create) Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select ACS, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Username: Put here the username to access the Cisco device. • Note: The account must have admin role on the Cisco ACS CLI. • Password: Put here the password to access the Cisco device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 54. 2.40. Cisco Router Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. • Enable SNMP server on the Cisco device (for SNMP backup). • Enable SNMP and ICMP access from the backup device to the Cisco device (for SNMP backup). • Configure Read/Write community on the Cisco device (for SNMP backup). • Enable TFTP access from the Cisco device to the backup device (for SNMP backup). Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select Router, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet) – need Password and Enable password. • User/Pass (SSH) – need Username and Password. • User/Pass (Telnet) – need Username and Password. • User/Pass/Ena (SSH) – need Username, Password and Enable password. • User/Pass/Ena (Telnet) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 55. 2.41. Cisco Router (Telnet/TFTP and SSH/TFTP) Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. • Enable TFTP access from the Cisco device to the backup device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select Router, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet/TFTP) – need Password and Enable password. • User/Pass (SSH/TFTP) – need Username and Password. • User/Pass (Telnet/TFTP) – need Username and Password. • User/Pass/Ena (SSH/TFTP) – need Username, Password and Enable password. • User/Pass/Ena (Telnet/TFTP) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Server IP: Select the relevant IP address of the BackBox server. 2. Click on Save.
  • 56. 2.42. Cisco Switch Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. • Enable SNMP server on the Cisco device (for SNMP backup). • Enable SNMP and ICMP access from the backup device to the Cisco device (for SNMP backup). • Configure Read/Write community on the Cisco device (for SNMP backup). • Enable TFTP access from the Cisco device to the backup device (for SNMP backup). Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select Switch, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet) – need Password and Enable password. • User/Pass (SSH) – need Username and Password. • User/Pass (Telnet) – need Username and Password. • User/Pass/Ena (SSH) – need Username, Password and Enable password. • User/Pass/Ena (Telnet) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 57. 2.43. Cisco Switch (Telnet/TFTP and SSH/TFTP) Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. • Enable TFTP access from the Cisco device to the backup device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select Switch, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet/TFTP) – need Password and Enable password. • User/Pass (SSH/TFTP) – need Username and Password. • User/Pass (Telnet/TFTP) – need Username and Password. • User/Pass/Ena (SSH/TFTP) – need Username, Password and Enable password. • User/Pass/Ena (Telnet/TFTP) – need Username, Password and Enable password. • Server IP: Select the relevant IP address of the BackBox server. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Server IP: Select the relevant IP address of the BackBox server. 2. Click on Save.
  • 58. 2.44. Cisco Nexus 1000v switch Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select Nexus 1000V, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • User/Pass (SSH) – need Username and Password. • User/Pass (Telnet) – need Username and Password.. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Port: Change this value only if it is different than the port written. • Prompt after password: Change this value only if it is different than the prompt written. 2. Click on Save.
  • 59. 2.45. Cisco CatOS switch Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. • Login to the Cisco switch using either Telnet or SSH, enter enable privileged mode, and run the commands bellow: • set prompt SWITCHNAME> Note: Replace the value SWITCHNAME with the switch hostname. • wr mem Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select CatOS Switch, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet) – need Password and Enable password. • User/Pass (SSH) – need Username and Password. • User/Pass (Telnet) – need Username and Password. • User/Pass/Ena (SSH) – need Username, Password and Enable password. • User/Pass/Ena (Telnet) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 60. 2.46. Cisco MDS 9000 Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable SSH access, from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select MDS 9000, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Prompt after password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 61. 2.47. Cisco 6500 WiSM Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access, from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select 6500 WiSM, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (Telnet), from the drop-down list. • Username: Put here the username to access the Cisco device. • Password: Put here the password to access the Cisco device. • Prompt after password: Change this value only if it is different than the prompt written. 2. Click on Save.
  • 62. 2.48. Cisco WLC (Wireless LAN Controller) Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable SSH access, from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select WLC, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here the username to access the Cisco device. • Password: Put here the password to access the Cisco device. • Port: Change this value only if it is different than the port written. • Prompt after password: Change this value only if it is different than the prompt written. 2. Click on Save.
  • 63. 2.49. Cisco PIX (IOS 6.1) Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select PIX, from the drop-down list. • Version: Select version 6.1, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. 2. Click on Save.
  • 64. 2.50. Cisco PIX (IOS 6.3 and above) Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select PIX, from the drop-down list. • Version: Select version 6.3 and above, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet) – need Password and Enable password. • User/Pass/Ena (SSH) – need Username, Password and Enable password. • User/Pass/Ena (Telnet) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 65. 2.51. Cisco ASA Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. • Enable TFTP access from the Cisco device to the backup device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select ASA, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet) – need Password and Enable password. • User/Pass/Ena (SSH) – need Username, Password and Enable password. • User/Pass/Ena (Telnet) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 66. 2.52. Cisco FWSM Pre-requirements: • Enable routing between the Cisco device and the backup device. • Enable Telnet access (for Telnet backup), from the backup device to the Cisco device. • Enable SSH access (for SSH backup), from the backup device to the Cisco device. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select FWSM, from the drop-down list. • Version: Select the relevant version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Possible options: • Pass/Ena (Telnet) – need Password and Enable password. • User/Pass/Ena (SSH) – need Username, Password and Enable password. • User/Pass/Ena (Telnet) – need Username, Password and Enable password. • Username: Put here the username to access the Cisco device (if exists). • Password: Put here the password to access the Cisco device. • Enable Password: Put here the Cisco “enable” password (if exist on the remote server). • Prompt after password: Change this value only if it is different than the prompt written. • Prompt after Enable password: Change this value only if it is different than the prompt written. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 67. 2.53. Cisco IronPort Mail Pre-requirements: • Enable routing between the Cisco IronPort and the backup device. • Enable FTP from the IronPort mail console. • Enable FTP access from the backup device to the Cisco IronPort • Enable SSH bi-directional from the backup device to the Cisco IronPort. • Enable HTTPS access from the backup device to the Cisco IronPort (for Backup HTTPS only) Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select IronPort Mail, from the drop-down list. • Version: Select version, from the drop-down list. • Backup type: Select a backup type, from the drop-down list. Available options: • Backup (SSH) – backup the current XML configuration file • Backup (HTTPS) – backup the current XML configuration file • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.
  • 68. 2.54. Cisco IronPort Management Pre-requirements: • Enable routing between the Cisco IronPort and the backup device. • Enable FTP from the IronPort mail console. • Enable FTP access from the backup device to the Cisco IronPort • Enable SSH bi-directional from the backup device to the Cisco IronPort. Backup configuration instructions: 1. From the BackBox upper pane, click on Devices -> click on Add -> fill in the following details: • Device Name: Put here a name to recognize the device. • IP: Put here the IP address of the remote device to backup. • Group: Select from the device groups drop-down list (Optional field). • Vendor: Select Cisco, from the drop-down list. • Product: Select IronPort Management, from the drop-down list. • Version: Select version, from the drop-down list. • Backup type: Select Backup (SSH), from the drop-down list. • Username: Put here “admin”. • Password: Put here the password for the “admin” account on the remote server/device. • Port: Change this value only if it is different than the port written. 2. Click on Save.