Edit General Settings
The General section of the Device page displays the settings described in the table below.
Field |
Description |
---|---|
Name |
The display name of the device on the management center. |
Transfer Packets |
This displays whether or not the managed device sends packet data with the events to the management center. |
Mode |
The displays the mode of the management interface for the device: routed or transparent. |
Compliance Mode |
This displays the security certifications compliance for a device. Valid values are CC, UCAPL and None. |
Performance Profile |
This displays the core allocation performance profile for the device, as configured in the platform settings policy. |
TLS Crypto Acceleration: |
Shows whether TLS crypto acceleration is enabled or disabled. |
Device Configuration |
Lets you copy, export, or import a configuration. See Copy a Configuration to Another Device and Export and Import the Device Configuration. |
OnBoarding Method |
Shows whether the device was registered using a registration key or using the serial number (zero-touch provisioning). |
Procedure
Step 1 |
Choose . |
Step 2 |
Next to the device you want to modify, click Edit (). |
Step 3 |
Click Device. |
Step 4 |
In the General section, click Edit (). |
Step 5 |
For Device Configuration actions, see Copy a Configuration to Another Device and Export and Import the Device Configuration. |
Step 6 |
Click Deploy. |
What to do next
-
Deploy configuration changes.
Copy a Configuration to Another Device
Before you begin
Confirm that:
-
The source and destination threat defense devices are the same model and are running the same version of the software.
-
The source is either a standalone Secure Firewall Threat Defense device or a Secure Firewall Threat Defense high availability pair.
-
The destination device is a standalone threat defense device.
-
The source and destination threat defense devices have the same number of physical interfaces.
-
The source and destination threat defense devices are in the same firewall mode - routed or transparent.
-
The source and destination threat defense devices are in the same security certifications compliance mode.
-
The source and destination threat defense devices are in the same domain.
-
Configuration deployment is not in progress on either the source or the destination threat defense devices.
Procedure
Step 1 |
Choose . |
Step 2 |
Next to the device you want to modify, click Edit (). |
Step 3 |
Click Device. |
Step 4 |
In the General section, do one of the following:
|
Step 5 |
(Optional) Check Include shared policies configuration check box to copy policies. Shared policies like AC policy, NAT, Platform Settings and FlexConfig policies can be shared across multiple devices. |
Step 6 |
Click OK. You can monitor the status of the copy device configuration task on Tasks in the Message Center. |
Warning |
When you have completed the copy device configuration task, you cannot revert the target device to its original configuration. |
Export and Import the Device Configuration
You can export all of the the device-specific configuration configurable on the Device pages, including:
-
Interfaces
-
Inline Sets
-
Routing
-
DHCP
-
VTEP
-
Associated objects
You can then import the saved configuration for the same device in the following use cases:
-
Moving the device to a different management center—First unregister the device from the original management center, then add the device to the new management center. Then you can import the saved configuration.
-
Restore an old configuration—If you deployed changes that negatively impacted the operation of the device, you can import a backup copy of a known working configuration to restore a previous operational state.
-
Reregistering a device—If you unregister a device from the management center, but then want to add it back, you can import the saved configuration.
See the following guidelines:
-
You can only import the configuration to the same device (the UUID must match). You cannot import a configuration to a different device, even if it is the same model.
-
Do not change the version running on the device between exporting and importing; the version must match.
-
If an object doesn't exist, it will be created. If an object exists, but the value is different, see below:
Table 2. Object Import Action Scenario
Import Action
Object exists with the same name and value.
Reuse existing objects.
Object exists with the same name but different value.
Network and Port objects: Create object overrides for this device. See Object Overrides.
Interface objects: Create new objects. For example, if both the type (security zone or interface group) and the interface type (routed or switched, for example) do not match, then a new object is created.
All other objects: Reuse existing objects even though the values are different.
Object doesn't exist.
Create new object.s
Procedure
Step 1 |
Choose . |
Step 2 |
Next to the device you want to edit, click Edit (). |
Step 3 |
Click Device. |
Step 4 |
Export the configuration. |
Step 5 |
Import the configuration. |