Legal Disclaimer: The resource assets in this website may include abbreviated and/or legacy terminology for HPE Aruba Networking products. See www.arubanetworks.com for current and complete HPE Aruba Networking product lines and names.
Back up and Restore System Data
HPE Aruba Networking Central On-Premises supports taking a back up of system information. The following methods are provided to take a backup:
-
Immediate backup
-
Scheduled backup
The backup consists of HPE Aruba Networking Central On-Premises application, HPE GreenLake Account Home settings, and its associated data like inventory, device information, licenses, authentication configuration, RBAC users and corresponding configurations, monitoring, reporting, report configuration, reports, visual maps, audit trail, group configuration, events, sites, labels, and alerts data.
For the limitation regarding the backup and restore operation on DR-enabled clusters, see Backup and Restore Data in DR Cluster.
Important Points to Note
- Use a Linux-based external backup server such as Ubuntu, CentOS, or RHEL.
- Use the SCP Secure Copy Protocol. SCP is a network protocol that supports file transfers between hosts on a network. protocol because it is faster than SFTP Secure File Transfer Protocol. SFTP is a network protocol that allows file access, file transfer, and file management functions over a secure connection. at transferring files, especially on the high latency networks.
- SCP and SFTP user must have the shell access to perform backup and restore operations.
- Before taking a data backup, you must have a file server configured and ready to save the files. HPE Aruba Networking Central On-Premises supports the following Ciphers, MAC Media Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. , and kexAlgorithms for SCP or SFTP transfers:
- Ciphers:
- SSH Secure Shell. SSH is a network protocol that provides secure access to a remote device. /SCP—aes128-cbc, aes256-cbc, aes128-ctr, aes256-ctr, aes128-gcm@openssh.com, aes256-gcm@openssh.com
TLS Transport Layer Security. TLS is a cryptographic protocol that provides communication security over the Internet. TLS encrypts the segments of network connections above the Transport Layer by using asymmetric cryptography for key exchange, symmetric encryption for privacy, and message authentication codes for message integrity. —ECDHE-RSA Rivest, Shamir, Adleman. RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet. -AES128-GCM-SHA256, ECDHE-ECDSA-AES128-GCM-SHA256, ECDHE-RSA-AES256-GCM-SHA384, ECDHE-ECDSA-AES256-GCM-SHA384, DHE-RSA-AES128-GCM-SHA256, DHE-RSAAES256-GCM-SHA384, ECDHE-RSA-AES128-SHA256, ECDHE-ECDSA-AES128-SHA256, ECDHE-RSA-AES256-SHA384, ECDHE-ECDSA-AES256-SHA384, DHE-RSA-AES128-SHA256, DHE-RSA-AES256-SHA256, AES256-GCM-SHA384, AES128-GCM-SHA256, AES256-SHA256, AES128-SHA256
- MAC—hmac-sha2-256, hmac-sha2-512
- KexAlgorithm—ecdh-sha2-nistp256, ecdh-sha2-nistp384, ecdh-sha2-nistp521
- Ciphers:
- Backup consumes large amounts of space (up to 5 terabytes). Ensure that you have sufficient space for a successful backup operation.
- The restore operation deletes any configuration applied before the restore. It also deletes and replaces device variables with the backup that is being restored.
- For restore operation, make sure that you provide the file path that you used for backup and select the appropriate backup file version.
- During backup and restore operation, consider the IO system alert as normal because of the intense read and write operation carried out on the file system.
- During backup and restore operation, some operations are not allowed and the message All system operations will be disabled till the active system operation is complete is displayed. For more information, see System Operations.
- When the restore operation is in progress, HPE Aruba Networking Central On-Premises WebUI is temporarily unavailable until the restore operation is completed.
For more information on different types of backup and restore operations, see the following topics: