06-03-2022 01:29 PM
We are currently backing up FMC and FTD's daily and have been for about 3 years. Fortunately, we've not had to restore due to a failure, but we have done restores just to check things out. We would like to go through the entire process in a lab where we can restore and then simulate some actual traffic and verify everything works. We have some VMs that can be used, but given there are no available physical FTD's, we're planning on using FTDv's. I've found several backup and restore documents on Cisco's website, but I've not seen anything that deals with validation or testing that everything is working as expected. We'd like to have absolutely no doubts that everything is working as it should. Can anyone provide some guidance on restore validation? Thank you.
Solved! Go to Solution.
06-03-2022 02:51 PM - edited 06-03-2022 02:54 PM
@ABaker94985 we have done a restore of FTD2140 Managed by FMC.
Background. We were hitting a bug CSCvn29443 the work around was to reimage the HA-Pair of FTD2140 (prior FTD image was 6.3 and post FTD image 6.5.x where as the FMC running version 6.7.x). once the reimage was done and FTD was added on the FMC. the restore config file of FTD6.3 was pushed to FTD6.5. all went good (pushing deployment went good no issues) however, remember routing tables (For example if you using static routes) They do not push in deployment from the restore backup. you have to manually define again the static routes and push the police. Our client is heavily based vpn tunnel on that site no issues. however if you use Cert for vpn or for anyconnect. Just export the identity certificate and manually restore the identity cert in a fresh install FTD. rest object object group acl all good. Hope this will help you.
06-03-2022 07:15 PM
06-06-2022 06:22 AM
06-03-2022 02:51 PM - edited 06-03-2022 02:54 PM
@ABaker94985 we have done a restore of FTD2140 Managed by FMC.
Background. We were hitting a bug CSCvn29443 the work around was to reimage the HA-Pair of FTD2140 (prior FTD image was 6.3 and post FTD image 6.5.x where as the FMC running version 6.7.x). once the reimage was done and FTD was added on the FMC. the restore config file of FTD6.3 was pushed to FTD6.5. all went good (pushing deployment went good no issues) however, remember routing tables (For example if you using static routes) They do not push in deployment from the restore backup. you have to manually define again the static routes and push the police. Our client is heavily based vpn tunnel on that site no issues. however if you use Cert for vpn or for anyconnect. Just export the identity certificate and manually restore the identity cert in a fresh install FTD. rest object object group acl all good. Hope this will help you.
06-03-2022 07:15 PM
06-06-2022 06:22 AM
Thank you. Both posts were very useful.
06-06-2022 06:33 AM
Just to Add what I have said. you still need to add your FTD (new one) in NAT section and on the platform setting doing this it will save your time.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide