Cisco Cisco FirePOWER Appliance 7010
A-4
FireSIGHT System User Guide
Appendix A Importing and Exporting Configurations
Importing Configurations
For information on creating a third-party product mapping, see
•
Third-party vulnerability mappings — To add vulnerability information from a third-party
application to the vulnerability database, you must map the third-party identification string for each
imported vulnerability to any existing Cisco, Bugtraq, or Snort ID. After you create a mapping for
the vulnerability, the mapping works for all vulnerabilities imported to hosts in your network map
and allows impact correlation for those vulnerabilities. For information on creating a third-party
vulnerability mapping, see
application to the vulnerability database, you must map the third-party identification string for each
imported vulnerability to any existing Cisco, Bugtraq, or Snort ID. After you create a mapping for
the vulnerability, the mapping works for all vulnerabilities imported to hosts in your network map
and allows impact correlation for those vulnerabilities. For information on creating a third-party
vulnerability mapping, see
•
Application detectors — When the system analyzes IP traffic, it uses detectors to collect information
about and then identify the commonly used applications running on hosts on your network. You can
export two kinds of detectors: user-defined detectors and individual add-on detectors provided by
Cisco Professional Services. For more information on detectors, see
about and then identify the commonly used applications running on hosts on your network. You can
export two kinds of detectors: user-defined detectors and individual add-on detectors provided by
Cisco Professional Services. For more information on detectors, see
Note
Depending on the number of configurations being exported and the number of objects those
configurations reference, the export process may take several minutes.
configurations reference, the export process may take several minutes.
To export one or more configurations:
Access:
Admin
Step 1
Make sure that the appliance where you are exporting the configurations and the appliance where you
plan to import the configurations are running the same version of the FireSIGHT System. If you are
exporting an intrusion policy (or an access control policy that incorporates an intrusion policy), you must
also make sure that the rule update versions match.
plan to import the configurations are running the same version of the FireSIGHT System. If you are
exporting an intrusion policy (or an access control policy that incorporates an intrusion policy), you must
also make sure that the rule update versions match.
If the versions of the FireSIGHT System (and, if applicable, the rule update versions) do not match, the
import will fail.
import will fail.
Step 2
Select
Systems > Tools > Import/Export
.
The Import/Export page appears, including a list of the configurations on the appliance. Note that
configuration categories with no configurations to export do not appear in this list.
configuration categories with no configurations to export do not appear in this list.
Tip
You can click the collapse icon (
) next to a configuration type to collapse the list of configurations.
Click the expand folder icon (
) next to an configuration type to reveal configurations.
Step 3
Select the check boxes next to the configurations you want to export and click
Export
.
Step 4
Follow your web browser’s prompts to save the exported package to your computer.
Importing Configurations
License:
Any
After you export a configuration from an appliance, you can import it onto a different appliance as long
as that appliance supports it. Note, however, that some imported configurations may not be useful
depending on the type of appliance you are using and on your user role.
as that appliance supports it. Note, however, that some imported configurations may not be useful
depending on the type of appliance you are using and on your user role.
Depending on the type of configuration you are importing, you should keep the following points in mind: