Exporting and Importing an Access Gateway Configuration

You can export an existing Access Gateway configuration and its dependent policies, and then import this configuration to a new server. This feature is especially useful for deployments that set up configurations in a staging environment, test and validate the configuration, then want to deploy the configuration on new hardware that exists in the production environment.

Important Points:

  • The export feature is not a backup tool. This feature handles configuration information applicable to all members of a cluster, and network IP addresses and DNS names are filtered out during the import. The server-specific information that is filtered out is the information you set specifically for each member in a cluster. If you want a copy of all configuration information, including server-specific information, you need to perform a backup. See Back Up and Restore.

  • The export feature is not an upgrade tool. You cannot export a configuration from one version of Access Manager and import it into a newer version of Access Manager.

  • If your Access Gateway is not a member of a cluster and you have configured it to use multiple IP addresses, the export feature filters out multiple IP addresses and uses only eth0. You need to use the backup utility to save this type of information. If you need to reinstall the machine, leave Access Gateway configuration in Administration Console and reinstall Access Gateway. If you use the same IP address for Access Gateway, it imports into Administration Console and inherits the configuration.

When exporting the file, you can select to password-protect the file, which encrypts the file. If you are using the exported file to move an Access Gateway from a staging area to a production area and you need to change the names of the proxy services and DNS names from a staging name to a production area and you need to change the names of the proxy services and DNS names from a staging name to a production name, do not select to encrypt the file. You need a simple text file so you can search and replace these names. If you select not to encrypt the file, remember that the file contains sensitive information and protect it accordingly.

The following sections explain this process: