BIG-IQ® Security uses snapshots to protect the working-configuration set of the Security module. Thus, at any time, you can back up, restore, and deploy the BIG-IQ working configuration to a specific configuration state, or deploy a specific set of working configuration edits back to a BIG-IP® device. You can also compare one snapshot to another, or compare a snapshot to the BIG-IQ working configuration.
The Snapshots panel displays a list of imported snapshots. The system uses a naming convention that begins with Import and is followed by the self IP address or the management IP address, depending on how the device was discovered. You can also add snapshots through the New Snapshot panel and name the snapshot according to your own convention.
To display only those objects related to a specific snapshot, hover over the snapshot and when the gear icon appears, click it. Then, you can select Properties to display properties or Show Only Related Objects to filter by snapshot.
|Name||Type a name for the snapshot.|
|Description||Type a description (optional) that will assist in remembering the reason for the snapshot.|
Differences are listed by: name (name of the shared object), type (type of object), change (added, modified, deleted), and device (blank unless the type is firewall).
You can restore the working configuration using a selected snapshot as input. This process does not delete any shared objects that might have been added since the snapshot was taken.
Snapshots require special consideration in high-availability (HA) configurations. For example, a scenario can occur where both peers think they are in the active state due to a disruption in communication or some other error condition.
If you take a snapshot when the system is in this condition, the snapshot Properties screen will display a message saying that the snapshot was taken when the peer device was unreachable.
When the peers are re-paired and re-synched, the snapshot will appear on both peers and both Properties screens will display the error message.
We recommend that you not attempt to restore such snapshots. The restore will likely fail and if it does not, the resulting configuration is unpredictable.