Jump to:navigation, search
Wiki






























De.png
En.png
Fr.png






Managing cloud backups and using them for recovery
Last adaptation to the version: 12.6.1
New:
  • Updated to Redesign of the webinterface
notempty
This article refers to a Resellerpreview

12.4 12.2 11.8.8 11.7 11.6

Access: UTM-IP:Port or UTM-URL:Port
Port as configured at Network / Appliance Settings / Webserver
Default-Port: 11115
i.e.: https://utm.ttt-point.de:11115
Default: https://192.168.175.1:11115
Configuration  Area Cloud-Backup


Redundant Warning

  • In this article, it is strongly emphasized numerous times that the password used to encrypt the backup must be kept carefully.
    Unfortunately, experience teaches us that time and time again this is not considered carefully enough and then a restore fails.
    The employees in support are aware of the problem - but can not solve this: There is no backdoor in our system.


  • Introduction

    In addition to a local backup of the configuration or via the Unified Security Console, UTM offers the possibility to store a backup of the boot configuration on our cloud servers.

  • The communication to our servers is done via a TLS encrypted connection.
  • The cloud backups are only available with the associated license and are encrypted with an individual password.
    Without this password the backup is unusable.
    Securepoint has no possibilities to decrypt the backup.
  • Cloud backups can be created every 22 hours

  • Requirements
    • Installed and licensed UTM
    • Internet access


    Message after update

    Cloud-Backup Passwort setzen UTMuser@firewall.name.fqdnConfiguration management UTM v12.6.1 Konfiguration Cloud Backup Passwort setzen-en.png

  • The password must be noted securely and retrievable.
    Without knowing the password, decrypting the cloud backup is not possible!


    • Login on the administration interface of the firewall (in the delivery state: https://192.168.175.1:11115).
      • If the installation wizard was previously run, the correct IP address must be used
      • Port of the administration interface is 11115 in the default state
    • Configure the cloud backup in the menu Configuration  Area Cloud Backup


    Cloud Backup Configuration

    Caption Description Configuration management UTMuser@firewall.name.fqdn UTM v12.6.1 Konfiguration Cloud-Backup-en.pngCloud-Backup
    Backup Boot Configuration Will backup the current boot configuration of the appliance.
    Set a password Allows to set/change an individual password for the backup to be created.
    Setting a password is mandatory.

    notempty

    The backup is encrypted with this password and can be decrypted exclusively with the password that was set when the respective cloud backup was created.

    notempty

    The Securepoint GmbH has no possibility to decrypt this backup without password!

    notempty

    The password for the cloud backup is not part of the configuration. If a cloud password is set and subsequently a configuration is imported (whether from a local file or from the cloud), new cloud backups are encrypted with the previously set cloud password.

    notempty

    The password must be noted securely and retrievable.
    Without knowing the password, decrypting the cloud backup is not possible!

    Version 12.6.1 Displays the firmware version with which the backup was created.
    When hovering, the currently used local firmware version is also displayed:Cloud-Backup-Version: 12.4.0
    Local Version: 12.4.0
    Regular cloud backup
    Regular cloud backup: On Activated by default
    Daily from: 05 o'clock Time of daily backup
    Import configuration Loads the selected backup into the local configuration manager under the name backup-YYYY-DD-MM_HH:ii:ss , where the time of backup is included in the name.
    Backup plan

    The servers only hold a certain number of configurations. The rotation is done according to the following scheme:

    • the latest 7 backups are kept (first in, first out)
    • after that 4 weekly backups are kept
    • after that 12 monthly backups are kept


    This rotation takes place separately for each license key.

  • Backups older than 12 months will be deleted
  • Delete Deletes the selected backup from the configuration management
    Saves the current setting (activation and time of the backup, not the backup itself!)


    View in Reseller Portal

    Resellerportal Lizenansicht Cloud-Backup-en.png

    In the Securepoint Reseller Portal it is possible to view a list of available backups for a specific license. The information can be found on the detail page of the license (column "Licensee", if you are on the profile page).
    However, a download of the configuration is only possible

    • from an appliance with the corresponding licence key
    • in the Unified Security Console (USC) the license(s) in question can be found in the "Serial numbers" column (see figure opposite).


    Restore after factory settings with cloud backup

    To import the configuration of a cloud backup after a Reset to factory settings the following steps are necessary:
    A previous download of the configuration file is not required, but the UTM needs access to the Internet to access the cloud backups.

    • Login to the admin interface of the UTM (IP address of the UTM with port specification, usually 11115
      Example https://192.168.175.1:11115
    • Updating the firewall name
    • Importing a license file
    • Setting up an Internet connection
    • The cloud backups are assigned via the license.
      Once the UTM has been able to connect to the Securepoint license server, existing backups can be imported to the UTM in the Configuration Cloud Backup menu.
    • The can be used to set the restored version as the future startup version.
    • loads the configuration as the currently used version.


    Restore to a new hardware with cloud backup

    • Make the UTM accessible in the network, open the admin interface and run the basic setup.






























    Integration into the local network

    Adjust IP addresses of the UTM via CLI

    If administration via the CLI is not an issue, the IP adresses can be provided directly to the UTM via CLI
    The monitor and keyboard is connected directly to the UTM.
    The login is done on the console.


    To be able to administer the UTM, the admin interface must be accessed via the IP of the UTM and the port of the admin interface via the interface LAN2.
    In the factory settings, the UTM can be reached via https://192.168.175.1:11115.
    If the IP or the interface cannot be reached from the local network, changes must be made.

    1. Connecting keyboard and monitor directly to the UTM
    2. Log in to the UTM: Username Admin / Password: insecure
    3. the Command Line Interface appears.
    4. change network configuration:
      1. Determine the existing interfaces: interface get
      2. Determine the ID of the IP addresses: interface address get
        LAN2 corresponds to the internal interface through which the admin interface can be reached.
        The ID is needed for changing the IP address in the next step.
      3. Change the interface IPs: interface address set id 1 address 192.168.12.1/24
        system update interface
        (desired IP of the internal network with subnet mask)
      4. Activate an interface: interface address new device LAN1 or A0 address 192.168.x.y/24
        system update interface
    5. Set up administration access:
      In the factory settings, access to the admin interface of the UTM is only possible via the internal interface LAN2. If the admin interface is to be accessible via another interface, the IP of the host (or a net IP with subnet mask) must be released:
      manager new hostlist 192.168.168.0/24
      system update rule
      Here: All hosts in the network 192.168.168.0 (no matter at which interface) can access the admin interface
      Attention: If e.g. the IP 192.168.175.1 is at LAN1 or A0 and the admin interface should be called from a computer in the network at LAN1, the IP 192.168.175.x must be released extra nevertheless.
    Adjust the IP address of your own computer
    The IP address of your own computer is temporarily adapted to the default network of the internal interface of the UTM.

    This is followed by connecting your own computer to interface A1 (the internal interface) of the UTM.

    This is how it works

    Change IP address on Windows
    • Display of network connections:
       r  ncpa.cpl
    • Show status of Ethernet connection with double click
    • Show properties of the interface
    • Show properties of the TCP/IPv4 connection
    • Set IP address:
      • IP address:192.168.175.2
      • Subnet mask:255.255.255.0
      • Default gateway:192.168.175.1 (=Default address of the internal interface of the UTM)
    Step-by-step.png
    IP-change Win Adapter-en.png
    Display of the network interface:
    • Access via desktop display:
      • Click on the network icon in the taskbar next to the clock
      • Click on Network and Internet settings.
      • Click on Change adapter options.
    • Access by command:
      • Windows key  r  ncpa.cpl
    • Double-click on the interface used to display the status of the ethernet connection
    IP-change Win Status Ethernet-en.png
    • In the status click on the button Properties
    IP-change Win Eigenschaften-en.png
    • Select the entry Internet Protocol, Version 4 (TCP/IPv4) in the properties.
    • Click Properties button
    IP-change Win IP statisch-en.png
    • Select entry Use the following IP address:
    • Set IP address:
      • IP address:192.168.175.2
      • Subnet mask:255.255.255.0
      • Default gateway:192.168.175.1 (=Default address of the internal interface of the UTM)











    Change IP address on Linux
    Please refer to the corresponding documentation of the used distribution.

    Examples for Ubunutu:

    • Opening the terminal
    • Identify the name of the interface: ip a
    • Change IP address: (In the example enp0s3 is the interface used: sudo ip address add 192.168.175.2/24 dev enp0s3
    Change IP address on a MAC
    Change IP address on a MAC
    IP-Adresse aendern mac.png
    • Menu System settings / network
    • Configure IPv4: ManuellLink= select in the dropdown menu
    • IP address:192.168.175.2
    • Subnet mask:255.255.255.0
    • Router:192.168.175.1 (=Default address of the internal interface of the UTM)
    • Button:Apply
    notempty
    After finishing the installation wizard and rebooting, the UTM is located in another network.
    For further configuration, the IP address of your own computer must then be changed again.

    Setting the original IP address:

    • Fixed IP Addresses: Enter as described above
    • Enable DHCP:
      • Windows: Properties Internet Protocol Version 4 (TCPIPv4) → select Obtain an IP address automatically
      • Linux: Example for Ubuntu: sudo ip address del 192.168.175.2/24 dev enp0s3
        sudo dhclient enp0s3

        If necessary, refer to the documentation of the distribution used.
      • MAC: coming soon...

    First access

    If not already done, the following connections must be made now physically:

    • Connect interface for the external interface (A0) towards the Internet (modem, router, etc.).
    • Connect the internal interface (A1)
      • with your own computer, if the IP address has been adjusted on it.
      • to the network from which the UTM is to be administered, if the IP address of the UTM has been adjusted.

  • The admin interface is available at port 11115. Access:
    https://192.168.175.1:11115 (Default) or
    https://172.16.0.1:11115, if the IP address of the UTM was changed to 172.16.0.1
  • When the admin interface is called up for the first time, a certificate warning appears in the browser.
    Since the browser doesn't know the certificate of the UTM, a security warning is issued.
    This warning must be ignored.

    UTM v12 Zertifikat-Firefox-en.png
    Message in Firefox: Warning: Potential security risk ahead
    Button Advanced / Accept the risk and continue
    UTM v12 Zertifikat-Chromium-en.png
    Message in Chrome / Chromium: This is not a secure connection. At the end click on Continue to IP address (unsure) .
    UTM v12 Zertifikat-Edge-en.png
    Message in Edge: Your connection isn't private. At the end click on Continue to IP address (unsure) .
    UTM v12 Zertifikat-Safari.png
    Message in Safari:
    Button Show details / Link Open this website













    First registration

    Caption Value Description UTM v12 Admin Login unlicensed-en.png
    Login, UTM not yet licensed
    User admin Login with the default login information of the factory settings: admin
    Password insecure Login with the default login information of the factory settings: insecure
     Login (Admin)
    Agree to license agreement and privacy policy
    Accept The license agreement and privacy policy must be accepted by clicking the button. DAT... UTM Ablehnen Accept UTM v12.6.2 ErsteSchritteAnmeldung Datenschutzerklaerung-en.pngThe privacy policy must be agreed to. LIZ... UTM Ablehnen Accept UTM v12.6.2 ErsteSchritteAnmeldung Lizenzvereinbarung-en.pngThe license agreement must be agreed to.
    Basic configurations
    Firewall name firewall.ttt-point.local An individual firewall name must be assigned.
  • The name should correspond to an FQDN.
  • Basic configurations UTMuser@firewall.name.fqdn License agreement Log out UTM v12.6.2 Grundlegende Einstellungen-en.png
    Basic configurations
    The fields displayed may vary depending on what information is already available on the UTM
    System time yyyy-mm-dd hh-m--ss The system time should be correct. It is compared with other servers, e.g. for user authentication (Kerberos, OTP, etc.). If the deviation is too large, for example, login will not be possible.
    License key Browse... Import valid license.
  • Each license key may only be used once. The UTM is identified via this and various services and configurations are assigned via the license key.
  • Global email address: notempty
    New as of v12.4.4
    admin@ttt-point.de Required information e.g. for the mail connector and the proxy. Also serves as postmaster address for the mail relay.
    Authentication method: notempty
    New as of v12.5.1
    PIN (recommended)Login mask Authentication method for Web sessions via USC
    Der Webession-PIN sichert auch die Benutzung der folgenden Aktionen im Rahmen der USC ab:
    • Neustarten
    • Herunterfahren
    • Werkseinstellungen
    • Einspielen von Cloud-Backups

    Wenn der PIN nicht genutzt wird, sind diese Aktionen nicht aus dem Unified Security Portal aufrufbar.

    PIN: notempty
    New as of v12.5.1
        PIN as additional security for Websessions
    No number sequences or duplications are allowed
      
    Creates a secure PIN
    License agreement Displays the license agreement
    Privacy policy Displays the privacy policy
    Log out Logs off again.
    No settings are saved!
    Complete Completes the login process and opens the Welcome window.
    Welcome
    Basic settings are completed with the welcome dialog. Welcome UTMuser@firewall.name.fqdn Installation wizard Start tour UTM v12.6.2 ErsteSchritteAnmeldung Willkommen Dialog-en.pngWelcome dialog
    Installation wizard Starts the Installation Wizard.
    Start tour Starts a tour that explains the admin interface and menus in 15 steps.
    • Close the welcome dialog with × in the title bar without starting the tour or the installation wizard.
    • New firmware versions may have already been released between production of a UTM and its deployment.
      It is possible that a cloud backup was created with a newer version than what is currently installed on newly deployed hardware. Therefore, it is advisable to check for a Firmware Update before applying a cloud backup to new hardware. Menu Extras Firmware Updates
    • Then proceed as for a Restore to factory settings.



    Notes

  • Without the correct password, it is not possible to restore the saved configuration.
  • The password can be changed during operation without any problems, but then you have to check yourself which configuration was saved with which password.
  • Access to the secured configuration is only possible with exactly this license key and its extensions and the corresponding password.