Linksys NSS2000 Cisco NSS2000 Series Network Storage System Administration Gui - Page 139

HH.MM.SS.NN.DD.YY.tar.gz where HH = hour, MM=minute, SS=second, Restore

Page 139 highlights

Maintaining the NSS Restoring a Configuration File 7 STEP 5 Click Restore. A list of saved configuration files appear. Each saved configuration file is named according to the time and date it was saved. The naming format is: HH.MM.SS.NN.DD.YY.tar.gz where HH = hour, MM=minute, SS=second, NN=month, DD=day, and YY=year. STEP 6 Set Restore Volume Encryption Password depending on whether you want to include the encryption keys for the encrypted volumes in the restore. The NSS configuration backup includes a backup of the encryption header for all the encrypted volumes (the encryption header contains an encrypted version of the encryption key used to encrypt the volume data. Including it in the configuration backup does not decrease the security of the encryption because this same header would be available to any attacker with physical access to the system). You can choose to restore these keys or not, depending on the reason you are doing the restore. If the encryption header on an encrypted volume becomes corrupted, restoring the header may allow you to unlock the volume. Also, if you have forgotten the password, you can restore the encryption header. This lets you revert to the volume password as it was when the configuration file was saved. STEP 7 Click Full Restore for the configuration file you want to restore. STEP 8 Close the Web browser. After a few minutes the system reboots. STEP 9 Check the Power LED on the front of the chassis. The Power LED goes to a solid green when the reboot completes. STEP 10 Log back into the configuration interface. You need to unlock any encrypted volumes to make them available for storage purposes. Cisco Small Business NSS2000 Series Administration Guide 131

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186

Maintaining the NSS
Restoring a Configuration File
Cisco Small Business NSS2000 Series Administration Guide
131
7
STEP 5
Click
Restore
.
A list of saved configuration files appear. Each saved configuration file is
named according to the time and date it was saved. The naming format is:
HH.MM.SS.NN.DD.YY.tar.gz where HH = hour, MM=minute, SS=second,
NN=month, DD=day, and YY=year.
STEP 6
Set
Restore Volume Encryption Password
depending on whether you want to
include the encryption keys for the encrypted volumes in the restore. The NSS
configuration backup includes a backup of the encryption header for all the
encrypted volumes (the encryption header contains an encrypted version of the
encryption key used to encrypt the volume data. Including it in the configuration
backup does not decrease the security of the encryption because this same
header would be available to any attacker with physical access to the system).
You can choose to restore these keys or not, depending on the reason you are
doing the restore. If the encryption header on an encrypted volume becomes
corrupted, restoring the header may allow you to unlock the volume. Also, if you
have forgotten the password, you can restore the encryption header. This lets you
revert to the volume password as it was when the configuration file was saved.
STEP 7
Click
Full Restore
for the configuration file you want to restore.
STEP 8
Close the Web browser.
After a few minutes the system reboots.
STEP 9
Check the
Power
LED on the front of the chassis. The
Power
LED goes to a solid
green when the reboot completes.
STEP 10
Log back into the configuration interface. You need to unlock any encrypted
volumes to make them available for storage purposes.