80-17
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter80 Managing Software and Configurations
Backing Up and Restoring Configurations, Images, and Profiles (Single Mode)
Step2 Use the crypto ca import command to import the local CA PKCS12 file to create the
LOCAL-CA-SERVER trustpoint and to restore the keypair.
crypto ca import LOCAL-CA-SERVER pkcs12 <passphrase> (paste the pkcs12
base64 data here)
Note Be sure to use the exact name “LOCAL-CA-SERVER” for this step.
Step3 If the LOCAL-CA-SERVER directory does not exist, you need to create it by entering mkdir
LOCAL-CA-SERVER.
Step4 Copy the local CA files into the LOCAL-CA-SERVER directory.
copy ftp://10.10.1.1/CA-backup/LOCAL-CA-SERVER.ser
disk0:/LOCAL-CA-SERVER/
copy ftp://10.10.1.1/CA-backup/LOCAL-CA-SERVER.cdb
disk0:/LOCAL-CA-SERVER/
copy ftp://10.10.1.1/CA-backup/LOCAL-CA-SERVER.udb
disk0:/LOCAL-CA-SERVER/
copy ftp://10.10.1.1/CA-backup/LOCAL-CA-SERVER.crl
disk0:/LOCAL-CA-SERVER/
copy ftp://10.10.1.1/CA-backup/LOCAL-CA-SERVER.p12
disk0:/LOCAL-CA-SERVER/
Step5 Enter the crypto ca server command to enable the local CA server.
crypto ca server
no shutdown
Step6 Enter the show crypto ca server command to check that the local CA server is up and running.
Step7 Save the configuration.
Restoring Configurations
You can specify configurations and images to restore from a zip file on your local computer.
Before proceeding, note these other restrictions:
The zip file that you restore must be created by choosing the Tools > Backup Configurations option.
If you performed the backup with the master passphrase enabled, then you will need that master
passphrase in order to restore the running configuration, start-up configuration, and VPN pre-shared
keys from the backup you created. If you do not know the master passphrase for the ASA, those
items will not be restored during the restore process. See the “Configuring the Master Passphrase”
section on page 17-4 for more information on master passphrases.
If you specified a certificate passphrase during the backup, you will be asked to provide that
passphrase in order to restore the certificates. The default passphrase is cisco.
The DAP configuration may depend on a specific running configuration, URL list, and CSD
configuration.
The CSD configuration may depend on the version of the CSD image.