About Backup and Restore
The ability to recover from a disaster is an essential part of any system maintenance plan. As part of your disaster recovery plan, we recommend that you perform periodic backups to a secure remote location.
On-Demand Backups
You can perform on-demand backups for the management center and many threat defense devices from the management center.
For more information, see Backing Up Management Centers or Managed Devices.
Scheduled Backups
You can use the scheduler on management center to automate backups. You can also schedule remote device backups from the management center.
The management center setup process schedules weekly configuration-only backups, to be stored locally. This is not a substitute for full off-site backups—after initial setup finishes, you should review your scheduled tasks and adjust them to fit your organization's needs.
For more information, see Scheduled Backups.
Storing Backup Files
You can store backups locally. However, we recommend you back up management centers and managed devices to a secure remote location by mounting an NFS, SMB, or SSHFS network volume as remote storage. After you do this, all subsequent backups are copied to that volume, but you can still use the management center to manage them.
For more information, see Remote Storage Device and Manage Backups and Remote Storage.
Restoring the Management Center and Managed Devices
You restore the management center from the Backup Management page. You must use the threat defense CLI to restore threat defense devices, except for the ISA 3000 zero-touch restore, which uses an SD card and the reset button.
For more information, see Restoring Management Centers and Managed Devices.
What Is Backed Up?
Management Center backups can include:
-
Configurations.
All configurations you can set on the management center web interface are included in a configuration backup, with the exception of remote storage and audit log server certificate settings. In a multidomain deployment, you must back up configurations. You cannot back up events or TID data only.
-
Events.
Event backups include all events in the management center database. However, management center event backups do not include intrusion event review status. Restored intrusion events do not appear on Reviewed Events pages.
-
Threat Intelligence Director (TID) data.
For more information, see About Backing Up and Restoring threat intelligence director Data in the Cisco Secure Firewall Management Center Device Configuration Guide.
Device backups are always configuration-only.
What Is Restored?
Restoring configurations overwrites all backed-up configurations, with very few exceptions. On the management center, restoring events and TID data overwrites all existing events and TID data, with the exception of intrusion events.
Make sure you understand and plan for the following:
-
You cannot restore what is not backed up.
Management Center configuration backups do not include remote storage and audit log server certificate settings, so you must reconfigure these after restore. Also, because management center event backups do not include intrusion event review status, restored intrusion events do not appear on Reviewed Events pages.
-
Restoring fails VPN certificates.
The threat defense restore process removes VPN certificates and all VPN configurations from threat defense devices, including certificates added after the backup was taken. After you restore the threat defense device, you must re-add/re-enroll all VPN certificates, and redeploy the device.
-
Restoring to a configured management center — instead of factory-fresh or reimaged — merges intrusion events and file lists.
The management center event restore process does not overwrite intrusion events. Instead, the intrusion events in the backup are added to the database. To avoid duplicates, delete existing intrusion events before you restore.
The management center configuration restore process does not overwrite clean and custom detection file lists used by malware defense. Instead, it merges existing file lists with the file lists in the backup. To replace file lists, delete existing file lists before you restore.