BackBox User Guide
BackBox User Guide
Version 5
R 8 2017
2
Table of Contents
CHAPTER 1. INTRODUCTION ............................................................................ 21
FEATURES ................................................................................................................................ 21
PREREQUISITES.......................................................................................................................... 23
INSTALLING BACKBOX................................................................................................................. 24
LOGGING IN.............................................................................................................................. 26
DELETING A REPORT................................................................................................................... 40
Acknowledge .................................................................................................................... 68
Disable .............................................................................................................................. 69
CHAPTER 9. DEVICES........................................................................................ 81
DEVICES SCREEN........................................................................................................................ 81
LICENSES................................................................................................................................ 126
Username............................................................................................................................. 140
Connect..................................................................................................................................... 147
Getlastline................................................................................................................................. 147
Trim........................................................................................................................................... 147
Carriage..................................................................................................................................... 149
INDEX ..............................................................................................................170
List of Figures
FIGURE 1: INSTALLATION SCREEN ...................................................................................................... 24
FIGURE 47: EDIT TASK CONFIGURATION DIALOG BOX DISPLAYING ADD ACCESS ......................................... 59
FIGURE 48: EDIT TASK CONFIGURATION DIALOG BOX DISPLAYING TASK COMMANDS ................................. 60
FIGURE 84: COMPARE BACKUPS SCREEN WITH FILE COMPARISON RESULT ................................................ 86
FIGURE 85: COMPARE SCREEN SHOWING EXCLUDED LINE IN GREY AND EXPORT OPTIONS ........................... 87
FIGURE 86: DEVICE DETAILS SCREEN DISPLAYING DEVICE DETAILS TAB .................................................... 88
FIGURE 102: PROCESS OF CREATING AND RUNNING COMMAND SCRIPTS ............................................... 101
FIGURE 105: TERMINAL SCREEN WITH MULTIPLE DEVICES CONNECTED ................................................. 103
FIGURE 130: DATE AND TIME SCREEN NTP VIEW ........................................................................... 123
FIGURE 151: INVENTORY SECTION OF THE DYNAMIC FIELDS TAB .......................................................... 141
FIGURE 152: EXAMPLE OF SCRIPTING TAB ON THE CUSTOMIZE OPTION CONFIGURATION SCREEN ............... 143
FIGURE 156: ENTERING THE TERMINAL LENGTH COMMAND IN THE CONDITIONS DIALOG BOX ................... 147
BackBox Users Manual
19
FIGURE 157: USING THE GETLASTLINE COMMAND TO TRIM THE BACKUP FILE ......................................... 147
FIGURE 158: TRIMMING THE OUTPUT AND SAVING IT TO VAR WITH THE TRIM COMMAND ....................... 148
FIGURE 159: IF THE CONDITION IS TRUE, JUMP TO LINE 63 OF THE SCRIPT ............................................. 149
FIGURE 160: ADVANCED OPTIONS FOR CONFIGURING THE CHECK SIZE COMMAND .................................. 150
FIGURE 161: ADVANCED OPTIONS FOR CONFIGURING THE FIND TEXT COMMAND ................................... 151
FIGURE 162: ADVANCED OPTIONS FOR CONFIGURING THE ARCHIVE CONTAINS COMMAND....................... 152
FIGURE 167: SAMPLE RESULTS OPTION CONFIGURATION FOR TELNET COMMAND ................................... 155
FIGURE 169: FIELDS IN THE INVENTORY AREA OF THE DYNAMIC FIELDS TAB............................................ 157
FIGURE 172: THIS SETTING WILL OUTPUT THE RESULTS TO %%CUSTOM_FIELD1%% .............................. 158
FIGURE 173: SAMPLE RESTORE SCRIPT FOR COPYING A FILE TO A REMOTE LOCATION............................... 159
FIGURE 176: HEALTH CHECK SCRIPT CONFIGURATION DIALOG BOX ...................................................... 160
FIGURE 177: DYNAMIC FIELDS TAB FOR HEALTH CHECK SCRIPTS .......................................................... 161
List of Tables
BackBox Users Manual
20
The intuitive dashboard displays all devices, networking, and security applications in a
single view, while highlighting a device that has failed or that has not been recently
backed up.
BackBoxs unique multi-check engine ensures backups have run successfully. It also
verifies that all saved configurations meet the criteria needed for successful restoration
if any backup fails to run or is not completed successfully.
FEATURES
Chapters 1-3 explain the basics of the system, including installation and getting
started.
TYPOGRAPHICAL CONVENTIONS
In this users manual, the following typographical conventions are used:
Chapter 2. INSTALLATION
This chapter outlines the system requirements and prerequisites necessary to run
BackBox. It also provides instructions for installing the system.
SYSTEM REQUIREMENTS
The following are the minimum hardware requirements:
PREREQUISITES
Static IP address
DNS server IP address (and DNS suffix)
IP address of SMTP server (and routing/SMTP access between the BackBox
server and the SMTP server)
INSTALLING BACKBOX
To install BackBox:
1. Insert the CD in the drive. The Installation screen appears.
3. Specify the TCP/ IP settings and click OK. If you specify Manual configuration the
following screen appears:
Note: If Dynamic configuration is selected then the BackBox Access screen appears.
See Figure 4.
4. In the Manual TCP/IP screen enter the IPv4 and /or the IPv6 address and prefix.
Enter the Gateway and Name Server. Click OK. The BackBox Access screen
appears:
LOGGING IN
To login to BackBox:
1. In your web browser, enter the IP address or host name in one of the following
formats:
https://<BackBox_IP_or_Hostname>
The Login screen is displayed:
2. Enter your BackBox Username and Password and press Enter. The following
default values appear:
Username: admin
Password: "password" (default supplied with system)
At the top left of the screen are displayed the time and date. On the right side (not
shown here) are an Alerts button as well as buttons for Username, Help and
Logout. Clicking the Alerts button displays the Notification Alerts screen. (The
button is high-lighted when there are indeed notification alerts.) Clicking on Help
displays BackBox Online Help.
The left side of the screen displays the Sidebar that provides easy navigation to any
screen in the system.
Button Description
Button Description
Button Description
You can easily configure the System Status screen by clicking the screens Enable
Edit Mode button in the upper left corner of the screen. After clicking the button,
the following three buttons appear: .
To add widgets to the screen, click the Add New Widget button and select the
desired widgets listed in the Add New Widget box:
You can select up to 17 widgets (see the table below for a summary and explanation of
the widgets).
After selecting the desired widgets, click Close. The widgets now appear on the
System Status screen. While in Edit mode, you can further customize the display by
using the buttons at the top of each widget: Change Widget Location, Collapse
Widget, or Remove Widget .
At the upper left of the System Status screen are the following buttons:
Add New Widget, Save Changes, and Undo Changes .
Clicking on any status on the widget display, takes you to the Devices screen and
displays a list of devices for that status.
Display Description
Display Description
Display Description
The Reports screen displays a list of reports that were created. You can add new
reports as well as edit and delete existing reports. See the chapter on Reports for
explanations of each type of report.
At the right of each table is the Columns button . Clicking the Columns button
displays a list of columns to choose from. Select the columns you want to display in
the table and click outside the list to return to the table.
Getting Started BackBox Users Manual
36
You can change the width of a column by placing your mouse cursor at the right side
of the columns head and dragging the column guide right or left to widen or narrow
the width; for example, in the following screen, the Notification column will be altered
by dragging:
You can also reposition columns by pressing on an empty space in a columns head
and dragging the entire column right or left.
SORTING A TABLE
You can sort tables by any column by clicking the Sort button located at the right
side of the head of the column by which you want to sort; a menu like the following is
displayed:
For a quick sort, just click the columns name at the top of the column: clicking the
name toggles between Ascending and Descending sort orders.
For some tables, BackBox also enables you to group multiple rows into one row
according to selected criteria. To group rows, click the Sort button in the head of
the column by which you want to group the rows, to display a menu as in the
following screen:
By clicking Group in the above example, the tables rows with identical vendors will
be collapsed into single rows; each row indicates how many items have been grouped,
like this:
By using the features to display and sort columns and to group rows, you can create
easy to read tables that give you the data you need.
FILTERING TABLES
You can filter any table in a BackBox screen. To filter a table, click the Filter Results
button at the upper right of the screen, which displays a Filter box over each
column of the table. You can also filter for more than one value. The following
example shows a table with the filter value Cisco in the Vendor column and
Successful in the Status column:
Chapter 4. REPORTS
BackBox enables you to generate reports that provide information about your devices
and the statuses of the backups, using all the data available in the BackBox system.
You can either use BackBoxs wide range of predefined report types, or you can
create your own customized reports. For either kind of report you can specify
scheduling and notification.
To display reports that have already been generated, on the Sidebar, click
Dashboard, then click Reports:
EDITING A REPORT
You can change report parameters using the Edit button .
To edit a report:
1. In the list of reports select a report and click the Edit button . The New
Report Configuration dialog box appears with the details for the selected report.
2. Edit the appropriate fields.
3. Click Save.
DELETING A REPORT
To delete a report:
Reports BackBox Users Manual
41
1. In the Report Types list, select the report to delete and click the Delete button
. A prompt appears requesting confirmation.
2. Click Yes.
USERS REPORT
The Users Report displays information on the system users including: username, full
name, E-mail address, role, whether they are able to receive notifications, type (local
or external) and the site to which they have been assigned.
LICENSE REPORT
The License Report displays information on the types of licenses, simple or complex,
for devices throughout the system.
SCHEDULES REPORT
The Backup Jobs Report displays a summary of the backups and provides information
on backup status as well as scheduling, next execution, and notification method.
The Device Groups Report displays a list of device groups and the number of devices
in each group, as well as information about each device in the group.
The Device Details Report provides details such as: device name, IP address, device
type (Firewall, Switch, etc.), assigned group, assigned jobs, and health. The health of
the device is indicated by colored text indicating Scheduled or Not scheduled. The
report also displays the average backup size, and the site.
The Device Backup Status Report shows the backup status of devices in the system.
The report displays the following: device name, IP address, last backup date, last
backup status (Success, Failure, or Suspected Failure), the date of the last successful
backup, status of the last device backup, the date of the last successful backup, and
status, which is the overall percentage of Successful, Failed and Suspected backups.
The report also displays a graph that shows the number of successful group backups,
failed group backups, and suspected group backups.
The Device Backup Status Hidden IP Addresses Report displays the backup status
of devices with hidden IP addresses.
The Device Backup Status - Failed Report displays a list of failed device backups
along with information on the last successful backup.
The Device Backup Status - By Type Report shows the backup status of device types
in the system. The report shows the device name, IP address, last backup date, last
backup status (Failed, Suspected, or Successful), the date of the last successful
backup, and status, which is the overall percentage of successful, suspected, and failed
backups.
For each device type, the report also displays a graph which shows the number of
successful, suspected, and failed backups.
The Device Backup Status Report - By Group shows the backup status of device
groups in the system. The report shows the status of the last backup (green for
Success, red for Failure, yellow for Suspected), the date of the last successful backup,
the site, and the percentage of devices in the group which have been successfully
backed up. The report also displays a graph which shows the number of successful,
failed, and suspected group backups.
INVENTORY REPORT
The Harmonization Failed Report displays the devices that failed the harmonization
test.
The Device Health Report shows the results of health checks for specified devices.
The checks that have been scheduled for each device are displayed along with
information about check status and failure reason.
The Device Health Failed Checks Report displays a list of device-scheduled health
checks that failed to complete.
2. Click the Add button to display the Custom Report Configuration screen:
3. Click the default name of the report, empty, type a name for the report and click
the Confirm button to save the name.
4. For each of the square areas displayed on the report, select the type of information
that you want to display: Text, Image, Graph, Table, or Separator.
Text and Image options enable you to type text and upload images from your
computer. Graph and Table enable you to include a wide range of data from the
BackBox system (for Graph, you can select Pie or Bar). The Separator option
inserts a horizontal line to separate between rows.
5. You can exchange the position of boxed areas by dragging them. To add another
row of boxed areas, click the Add Row button . To remove an empty row, click
the Remove Row button . To discard changes, click the Discard Changes
button .To remove a box, click the Cancel button in the upper right corner of
the box.
While designing your report, you can gain a schematic overview of the design by
inspecting the Layout Preview at the right of the screen:
6. After finishing the layout of your customized report type, click Save. The report
type now appears in the Report Types list under Customized.
Chapter 5. BACKUPS
Clicking Backups on the Sidebar displays the Backup Jobs screen. The screen lists
all the backup operations that have been defined in the system, as well as when they
are scheduled to run, the current status of the backup, and other relevant information.
Clicking on Queue displays the current jobs in the backup queue. Clicking on History
displays the backup history of each device in the system.
Field/Button Function
Schedule Displays the schedule that has been configured for the
backup. To create a Schedule, see the chapter on
Schedules.
Next Execution Displays the date and time of the next scheduled
backup, providing the job is enabled.
Field/Button Function
Field Description
Name Type a name that identifies the new backup.
Site Select the name of the site to which the device is assigned.
If the site is locked to an agent, you cannot run a backup
from Global. Sites can be locked to an agent in the Agent
screen, which is located under Settings in the Sidebar.
Schedule Select a schedule for the backup. You can create a new
schedule by clicking the Add Schedule button next to the
Schedule list, or select a schedule from the list. For further
details, see the
Backup jobs will run according to the schedule that you assigned them. Their next
execution is displayed on the Backup Jobs screen. However, you can run a backup
immediately by selecting a backup job and clicking the Run Now button .
A job can be removed from the queue, or stopped if currently running, by clicking the
Terminate button displayed in the jobs Terminate column. To terminate all the jobs in
the queue, double-click the Terminate All button .
Note: Due to the significance of terminating a backup job, you must double-click the
Terminate All button as opposed to a single click for most other functions.
You can filter backup jobs listed on the Backup History screen. Clicking the Filter
Results button at the top right of the screen displays filter boxes at the top of each
column: Device Name, IP, Date, and Status columns. To filter the backup jobs listed
on the Backup History screen, type a value into the filter box by which you want to
filter the table. To remove the filter, click the filter boxes Cancel button . To
remove the display of the filter boxes, click the Filter Results button again.
For any backup, clicking on the View Log button in the Log column displays a
backup trail log that you can download.
Chapter 6. TASKS
Tasks enables you to automate routine tasks to be performed on various devices within
your system. You can create and schedule tasks such as changing passwords and
permissions, maintenance tasks such as deleting, copying, or moving data, powering
devices on or off, and many others. You can also specify conditions that restrict or
trigger the tasks to be performed.
HOW IT WORKS
The Task Configuration screen displays a list of previously configured tasks and
enables you to configure new tasks. A task can include any sequence of commands (a
script) that the device normally responds to when using the command line. By writing
a script, you are actually writing a series of commands that will be executed as if you
were at the command line. The Task Configuration screen helps you to write the
script by enabling you to select commands from a simple dialog box as explained
below. Writing scripts and examples of scripts are presented in more detail in the
chapter on Writing Command Scripts.
After saving the task, you can then use the Task Jobs screen to assign the task to
various devices and determine when the task is executed (see Assigning Tasks to
Devices and Scheduling Task Execution).
2. Type a Name for the Task and click Save. The task now appears in the list of tasks
in the Task Configuration screen, where you can edit it and write a script as
shown in the next section, Creating a Task Script.
Figure 47: Edit Task Configuration Dialog Box displaying Add Access
Figure 48: Edit Task Configuration Dialog Box Displaying Task Commands
The dialog box enables you to change the order of command execution by
dragging the commands Reorder button up or down. You can also specify
indicators for the commands execution by clicking the Results Options button
in the commands Results field or the Status button in the Status field. For an
explanation of Timeout and other fields, see the chapter on Writing Command
Scripts.
5. To add a new command to the script, click the Add button . The Conditions
dialog box appears:
6. Select the type of command (Internal, Local, Remote, or Verification), type the
exact command in the Command field and use the remaining fields as desired. For
details on these fields, as well as examples on writing command scripts, see the
chapter on Writing Command Scripts.
The Task Jobs screen displays a list of tasks, the number of devices to which the task
has been assigned and other information. The following fields and buttons are
displayed:
Tasks BackBox Users Manual
62
Field/Button Description
Name Name which identifies the task job.
Next Execution The date and time of the next execution of the task.
Status Enabled/Disabled
You can also use the Filter button to display the filter boxes by which to filter
the Device list.
For information on creating schedules and notifications, see the chapters on
Schedules, and Notifications.
9. Click Save , or Save and Run .
For each device to which the task is assigned, the screen displays the device name,
device IP, date, duration (how long the device has been running the task), and status of
the job (for example, Running). To terminate a task job for a specific device, click the
button in the Terminate column for that device. To terminate all task jobs in the queue,
double-click the Terminate All button .
You can download a log of the history by clicking the View Log button in the Log
column for the device.
2. Drag a file from your computer to the Upload File Box in the center, or
alternately, click on the Upload File Box and select a file to upload.
3. Add a description, select an agent, and click Save .
2. Edit the Description and Agents fields as desired, and click Save .
You can also write and upload additional scripts if required. For additional
information on writing scripts see the chapter on Writing Command Scripts.
The severity of the failure (Critical or Warning ) is displayed along with the
device name and IP address. The Alert column displays the event that caused the
failure.
In addition, the Health Checks Alerts screen displays a row of buttons with the
following functions:
CHECK LOG
The Check Log button displays a downloadable Trail Log for the selected
Health Checks alert, like this:
CHECK INFORMATION
ACKNOWLEDGE
DISABLE
The Disable button lets you disable a selected health check for a selected
device.
Note: Clicking the Disable button removes the alert from the Health Checks
Alerts screen.
DISABLE ALL
The Disable All button lets you disable a selected health check from all of
the devices that are running it.
QUEUE SCREEN
The Health Checks Queue screen displays all health checks that have been scheduled
to run. For each device to which a health check has been assigned, the screen displays
the device name, device IP, check name, duration (how long the device has been
running the check), and status of the check (for example: Running):
To terminate a health check for a specific device, click the button in the Terminate
column for that device. To terminate all health checks in the Queue, double-click the
Terminate All button .
In the Enable Health Checks dialog box, click the Add Devices button to
display a list of devices. Select the devices whose health you want to check and
click Add . The selected devices appear in the Enable Health Checks
screen. Click Save .
2. Choose a signature, which is the name of the health check. Signatures specify the
type of health check that the system will run on the device. Each signature checks
a specific device parameter. The signatures for the type of device are listed under
check name.
3. Choose a device whose health you want to check in the Device Name list. There
are four buttons under this area that enable you to the do the following:
You can also click the Run Interval button to display a dialog box that
enables you to specify the frequency with which the health check will run.
You can use the Dynamic Fields button to specify additional fields to
control the execution of the health check.
Chapter 8. HARMONIZATION
BackBox enables you to run harmonization signatures (tests) to test whether particular
devices conform to a set of rules. The harmonization rules are stored as signatures
which are contained in templates and sections listed in the Harmonization
Configuration screen.
The Harmonization button in the Sidebar displays screens that enable you to do the
following:
Table 6: Harmonization Screens
You can add a new harmonization template to contain harmonization sections and
signatures.
2. In the Add Harmonization dialog box, select a site, type a harmonization name
and click Save.
To add a signature, add at least one section to a template. (Sections are logical
containers for which you can create signatures and are contained in a template.)
1. To add a section to a template listed in the Harmonization Configuration screen,
click the template to which you want to add the section. A list of existing sections
appears, like this:
2. Click the Add button to display the Add Harmonization Section dialog
box:
3. Select a site and type a name for the section. The Harmonization field will display
the name of the template to which the category belongs.
4. Click Save. The section is now displayed on the Harmonization Configuration
screen.
You can edit the name and the site of an existing Harmonization Template or Section.
Select the Template or Section you want to edit and click the Edit button . Make
the changes in the relevant fields and click Save.
1. In the Harmonization Configuration screen, click the template and then the
section to which you want to add the signature and click the Add button .
The Available Harmonization Signatures screen appears:
2. Select the Signatures you want to add to the Section and click Save. The
Signatures are now displayed under the Section on the Harmonization
Configuration screen.
2. Type a name for the signature and click Save. The signature is displayed on the
Harmonization Signatures screen. To add dynamic fields and commands to the
signature, see Editing Harmonization Signatures, below.
After you have created a new signature, you can specify dynamic fields and
commands for it.
1. On the Harmonization Signatures screen, select the signature that you want to
edit and click the Edit button . The Signature Configuration dialog box
appears with the name of the signature:
The screen shows how many devices are running the job, along with the specified
schedule and notification. Furthermore, the screen displays whether the job will
attempt remediation, its next execution, and the status of the job: Scheduled or
Unscheduled.
Note: If you selected Run Now for the job, the screen will display the job as
Scheduled , even though the Next Execution field displays Not Scheduled.
You can also select a job in the list and use the buttons at the top of the screen: Edit,
Delete, or, Run Now.
Once you have created a harmonization template, you can schedule and run the
templates signatures on selected devices.
2. Type a name and description for the job in the appropriate fields.
3. In the Notifications list, select a notification method, or click the Add
Notification button or Edit Notification button to add a new notification
method or edit an existing one. For more information on notifications, see the
chapter on Notifications.
4. In the Harmonization list, select a template.
5. In the Section list, select the section whose signatures you want to run, or choose
Select All. BackBox will run all the signatures contained in the selected sections.
6. Select a site and a schedule (you can also create or edit an existing schedule for
the job by clicking the Add Schedule button or Edit Schedule button ).
7. To run the harmonization job once, select the Run Once On: option
and specify the date and time when you want the job to run.
8. If you want the job to run the remediation commands for the template (defined in
the Signature Configuration dialog box), select Remediation.
9. To add devices that will run the harmonization job, click the Add Devices button
above and to the left of the Devices list. The Add Devices dialog box appears:
10. Click the devices on which you want to run the harmonization job and click Add
.
11. In the New Harmonization Job Configuration screen, click Save or
Save and Run . The new job appears on the Harmonization Jobs screen
and will be run at the time you specified.
The Harmonization Queue screen displays the device name and its IP, the signature
name, the date and duration of the harmonization job, and its current status (running,
pending, or enqueued). It also enables you to view the jobs log in real time. In
addition, you can terminate selected harmonization jobs, or terminate all
harmonization jobs:
To terminate a job in the queue, click the Terminate button for the
job.
To terminate all the harmonization jobs for all devices in the queue, click the
Terminate All button at the top of the screen.
In the Status column, the screen also shows whether the device successfully ran the
harmonization job or failed. If the device failed to run the job, the reason for failure is
stated.
You can also click on a jobs Log button to display and download a detailed log of
the jobs and their status.
Chapter 9. DEVICES
Backups can be done on a single device or on a group of devices at the same time.
DEVICES SCREEN
To display the Devices screen, on the Sidebar click Devices:
Fields Description
Name The name given to the device.
Checks Whether health checks have been enabled for the device.
Site The site to which the device is assigned. When the site is
locked to an agent, you cannot run a backup job from Global.
Fields Description
Type The type of device (Switch, Firewall, etc.).
The Devices screen also displays buttons that enable you to perform the following
tasks:
Table 8: Devices Toolbar Buttons
Buttons Description
Add a device for backup.
Delete a device.
The Devices Table Legend provides a key to understanding the status icons in the
Status column on the Devices screen:
The Devices screens Discovery button enables you to search for all devices
within a specified IP range. Once a list of devices is generated, you can then add
selected devices to BackBox.
2. Use the Start IP and End IP fields to specify the range of IP addresses you are
searching for.
3. Click the SNMP Credentials button to display the SNMP Details dialog
box:
4. Because devices are discovered by sending out SNMP messages, you need to
configure SNMP details here. Click the Add button or Edit button to
add or edit SNMP details:
5. In the Credential Set Name and Description fields, type a name for the credentials,
and a short description. Click the SNMP Version field and select the appropriate
SNMP version. After selecting a version, the appropriate fields appear. Fill in the
remaining fields that appear and click Save. The Credential Set Name for the
SNMP details appears now in the SNMP Details dialog box.
6. Close the SNMP Details dialog box to return to the Discovery dialog box.
7. Click the Scan Now button . A list of devices within the specified IP range
is displayed. To stop the scan, click the Stop Scan button . To clear the list
of devices, click the Clear List button .
8. To add a device to BackBox, select the device and click the Add to BackBox
button .
Devices BackBox Users Manual
85
COMPARING BACKUPS
BackBox enables you to compare backup files, line by line. This enables you to
identify where backups have added or deleted lines, etc.
To compare backups:
1. In the Devices screen, click the Compare button at the top of the screen.
The Compare Backups dialog box appears:
All the devices with backup files in the BackBox system appear in both the left
and right columns.
2. In the left column, click a device and its subfolder. In the subfolder, click the
backup file that you want to compare. The selected backup file will be highlighted
in blue and a message above the Compare button appears, indicating that
the file will be compared.
3. Follow the same procedure for the right column. The selected backup file will be
highlighted in blue and a message below the Compare button appears,
indicating that the file will be compared.
For example, in the left column you may want to select a txt file that was
generated at a certain date and time. In the right column, you might select the
same file that was generated for the same device at a later date and time.
The Compare Backups dialog box records your selections like this:
4. Click the Compare button . The Compare screen appears, listing each line
of both backups, like this:
If the backup files are identical, an additional message is displayed informing you of
this.
If the backup files are not identical, you can scroll through the lines of the backup files
and note the differences. Additions, deletions, and changes are highlighted by color as
indicated by the colored buttons at the top of the screen.
Additionally, you can click the buttons above to view the changed lines.
Moreover, you can export the comparison as a CSV or PDF, by clicking the Columns
button .
Figure 85: Compare Screen Showing Excluded Line in Grey and Export Options
To display the details of an individual device listed on the Devices screen, click a
device name in the list. The Device Details screen appears with the device name,
displaying the following tabs: Device Details, Device History, Harmonization,
Health Checks, and Inventory. The Device Details screen default to the Device
Details tab.
The Device Details tab displays information about the device. You can edit the details,
then click Save to save the details, or click Apply and Run to immediately apply the
device details and backup information. Depending on the device, some, or all the
fields in the following table appear:
Table 9: Device Details Fields and Buttons
Field/Button Description
Device Name Name of the device
Clear SSH This button clears the SSH key for authorization.
Field/Button Description
Group The group of devices to which the device is assigned for
backup.
RETENTION BUTTON
Click the Retention button to specify how many days backups and other
files are retained. Clicking Retention displays two options:
Devices BackBox Users Manual
90
Backups
Retention Policy
The Backups option enables you to type the number of days you want the backup to be
retained.
Retention Policy enables you to edit the retention policy for backups and other files.
Select the Retention Policy option and click the Edit button next to it. The
Retention Policy dialog box for the device appears:
The Device History tab lists all the backups performed on the device. The details
displayed include the type (of backup), date (when the backup was performed), the file
size (of the backup), status (success, failure, etc. of the backup) log (of the backup),
failure reason (in case the backup failed), and comment (in the Comment column, you
can type a short comment).
You can view a detailed log of each backup by clicking the View Log button in the
Log column. The Backup Trail Log screen appears:
The Device History screen also displays buttons that enable you to restore a
configuration from those listed, or perform other actions as detailed in the following
table:
HARMONIZATION TAB
The Harmonization tab displays the scheduled harmonization tests for the device:
For each harmonization test the following is displayed: section name, signature name,
the status of the harmonization, the failure reason (in case of failure), and the log of
the harmonization test. You can enable/disable harmonization tests for the device from
the Harmonization tab.
The Health Checks tab displays a list of health checks (issues) for which the device is
checked. The details displayed include:
Name of the health checks (that were run for the device, like Too many open
files or License Expired)
Date (the date and time of the health check)
Status of the health check (Success, Suspected, Failure)
Failure reason
View Log option (enables you to view a downloadable trail log)
Interval (the time of periodic health checks)
Info (information for troubleshooting).
This tab only appears if there are health checks configured for the device.
INVENTORY TAB
The Inventory tab displays additional information about the device. These fields can
display information on CPU, memory, and many other items that are relevant to the
device.
You add fields to the Inventory tab in the Inventory Section of the Dynamic Fields
tab. See Understanding the Inventory Section in the Customize chapter. You can then
Devices BackBox Users Manual
94
write a script on the Inventory tab in Customize to populate the fields with the
appropriate information (see Inventory Tab). Here is an example of the information
that you might have on the Inventory tab:
2. Add the device name, the device IP address, and the group to which you want to
assign the device and click Next . The second dialog box appears:
3. Complete the Vendor, Product, Version, and Backup Type fields, and click Next
. The third dialog box appears:
5. Click in the Backup Job field to select a backup job and, optionally, check Enable
Health Checks or Enable Harmonization.
6. For other than Global setting, check the Backup Retention field.
Note: Leave unchecked for Global settings.
If you choose Backup Retention, two additional fields are displayed: one for the
number of days that backups are retained, and one for choosing backups or setting
retention policy.
7. Indicate the number of days that backups are retained, or select Retention Policy
and click the Edit button to set a new retention policy.
8. Click Add Device or Add & Run Device .
DELETING A DEVICE
To delete a Device:
1. On the Devices screen, select the device to be deleted.
2. Click the Delete button . The Delete Device dialog box appears requesting
confirmation.
3. Click Yes.
The Device Groups screen displays the device group name, together with information
on how many devices are included in the group, when the group was created and when
it was last modified:
2. Specify a name for the new group, and, optionally, a short description. In the Site
field, select the site to which you want to assign the group.
3. In the list, select the devices according to name, IP address, or vendor that you
want to add to the group and click Save.
4. The group is created with the specified devices.
To edit a Device Group, on the Device Groups screen, click a device group in the list
to display the Device Group dialog box. Edit the group details you want to change
and click Save.
IP ADDRESS MANAGEMENT
The IP Address Management screen displays a list of segments that contain IP
addresses. You can create segments, add an IP to a segment, or edit/delete a segment.
You can also synchronize existing devices into segments.
ADDING A SEGMENT
Specify a name, description, IP address, subnet mask, and site for the segment and
click Save.
ADDING AN IP TO A SEGMENT
2. In the From Address and To Address fields, type addresses that define the range of
addresses that you want to add to the segment.
3. Click the Scan Range button . The addresses that fall within the specified
range are displayed.
4. Select the addresses that you want to add to the segment, and click Add .
You can find specific addresses by using the search boxes that appear above the
list of addresses.
Alternatively, click Add All Resolved Addresses to Segment.
You can select the Hide Rows of Existing Addresses in Segment option to
facilitate viewing the available addresses only.
To edit or delete a segment, select the segment, and click the Edit button / Delete
button .
After creating the segments, you can synchronize existing devices into the segments,
by clicking the Sync Existing Devices into Segments button
.
Once you have created a toolbox and configured commands for it, the toolbox is listed
on the Terminal screen in Access. The Terminal screen enables you to connect to a
device, open a terminal, select a toolbox, and run the commands that you have
configured for the toolbox by selecting them and sending them to the terminal.
To connect to devices:
1. On the Sidebar, click Access; the Terminal screen is displayed by default.
2. Click the Devices tab; a list of devices is displayed:
3. Select devices to which you want to connect by clicking in the column to the left
of the device.
4. Select the method of connection: SSH, Telnet, or RDP.
5. Edit the Port if desired by clicking the port number, and using the
Increment/Decrement button that appears to specify another port and click the
Submit button .
6. Click the Connect button ; a name is displayed at the top of the screen for
each device that you selected. Clicking the device name displays the terminal for
that device. You can run scripts on more than one device by clicking from device
to device:
5. Click a toolbox to display its commands. Some toolboxes have sections called
Categories. Click the Category to display its commands:
6. To run a command, on the devices terminal, click the command and right-click
to display the following menu:
7. Click Send; the command appears on the terminal display and is executed.
You can edit the name of the toolbox, as well as add commands or sections to it.
Sections, called Categories help organize commands.
2. Select a category and type a name for the category, or select a command and type
a name for the command as well as the code of the command.
3. Click Save.
CLONING A TOOLBOX
To clone a toolbox:
1. Right-click the toolbox and click Clone. The Clone Toolbox dialog box appears.
2. Edit the name of the clone as desired and click Save. The cloned toolbox appears
in the list of toolboxes on the Terminal screen.
DELETING A TOOLBOX
To delete a toolbox:
1. Right-click the toolbox you want to delete and click Delete. A Delete prompt
appears.
2. Click Yes.
EDITING COMMANDS
To edit a command:
1. Right-click the command you want to edit and click Edit. A dialog box with the
name of the command appears:
2. Edit the commands name, or the commands code and click Save.
DELETING A COMMAND
To delete a command:
1. Right-click the command you want to delete and click Delete. A Delete prompt
appears.
2. Click Yes.
The Schedules screen displays the name given to the particular schedule, the
description, the assigned site, the date the schedule was created, when it was last
modified, and whether it is in use or not .
2. Fill in the fields and specify the interval and time for the new schedule and click
Save.
Schedules BackBox Users Manual
108
DELETING A SCHEDULE
To delete one or more schedules:
1. Select the schedule(s) you wish to delete.
2. Click the Delete button . A prompt appears requesting confirmation.
3. Click Yes.
Field Description
ADDING A NOTIFICATION
To add a notification:
1. On the Jobs Notifications screen, click the Add button . The New
Notification Configuration dialog box appears:
Field Description
Name Name of the notification
Field Description
The site to which the notification will be
Site
available.
EDITING A NOTIFICATION
To edit a notification in the list, select the notification and click the Edit button
to display the notifications dialog box. Edit the settings and click Save.
DELETING A NOTIFICATION
To delete a notification, select the notification you want to delete and click the Delete
button .
TESTING A NOTIFICATION
Clicking the Test button in a notifications dialog box, enables you to send a
test notification to the specified recipients.
AUTHENTICATION TEMPLATES
BackBox allows you to create templates for authenticating users to access the system,
and specify their level of access. For example, some users have complete access to the
system while others are restricted to certain notifications or devices. Some may be
able to modify reports and notifications, while others are only allowed to receive them.
2. Complete the fields as detailed in the following table and click Save.
Field Description
Name The name given to the template
AUTHENTICATION SERVERS
BACKBOX USERS
All authorized BackBox users must authenticate themselves to access the system.
Specific information about users must be detected for the system to recognize them
and their level of access.
The BackBox Users screen is where the users pertinent identifying information is
entered, including E-mail, password, the specific authorizations they have been
granted, and whether they are authorized to receive notifications. To display the
BackBox Users screen, on the Sidebar, click Authentication, then click BackBox
Users.
The BackBox Users screen displays a list of users with BackBox access, along with
their usernames, E-mails, sites, roles, whether they receive notification, and type (i.e.
local, notification, RADIUS, and LDAP). The administrator can add, edit, and delete
users.
Table 14: BackBox Users Fields
Field Description
Name Name of the user
2. Select a type, and specify a name, user name, password, confirm password, and an
E-mail address.
3. Specify whether the user is to receive system alerts by clicking the Receive
System Alerts button .
4. Select a notification type: Details or Summery.
5. Select a role. For example: Administrator.
6. Select a site by clicking the the Sites field to display a list of available sites.
EDITING A USER
To edit a user, in the BackBox Users screen, click the username to display the Edit
User dialog box for that user and edit the fields. Click Save.
USER ROLES
The User Roles screen enables you to create a user role, such as Administrator, and
configure permissions for the role. Permissions can be configured for each part of the
BackBox system. For example, you can configure a role so that someone with that
role can add or edit a device, or delete a backup, etc.
To display the User Roles screen, from the Sidebar, click Authentication, then click
User Roles:
To add a new role, click the Add button . The New Role Configuration dialog
box appears:
In the New Role Configuration dialog box, check the permissions for the role and
click Save.
Authentication BackBox Users Manual
118
EDITING A ROLE
To edit a role, on the User Roles screen, select the role you want to edit and click the
Edit button to display the Edit Role dialog box. Edit the relevant fields and click
Save.
DELETING A ROLE
To delete a role, on the User Roles screen, select the role and click the Delete button
.
To add a new operating system user, in the Operating System Users screen, click the
Add button . The Add OS (Operating System) User dialog box appears:
To edit an operating system user, in the Operating System Users screen, select the
operating system user you want to edit and click the Edit button . The Edit OS
User dialog box appears. Edit the fields and click Save.
To delete an operating system user, in the Operating System Users screen, select the
user you want to delete and click the Delete button . A prompt appears
requesting confirmation. Click Yes.
The following table provides an overview of the screens accessible from Settings.
Table 15: Settings Screens
Screen Description
Interfaces Displays the interfaces which define the connections to the
devices in the system and whether the link is up or down.
They are used in routing entry definitions.
DNS Displays the DNS settings which specify the location of the
domain name servers.
Date and Time Displays the fields where the date and time are set. The time
can be set as Static or NTP.
Alerts Displays the fields for setting alert protocols. There are three
different protocols: SNMP, SMTP, and Syslog.
Access Rules Displays the settings that controls the local Firewall of the
BackBox server. This determines which IP address can
access the web interfaces and the CLI interfaces.
System Logs Displays a detailed log of each users activity while in the
system.
INTERFACES
Interfaces displays basic network information. When the Status button is green, it
indicates the link is up; when it is red , the link is down.
Settings BackBox Users Manual
121
EDITING AN INTERFACE
You can edit the interface by selecting the interface you want to edit and clicking the
Edit button . You can edit the IP address, subnet mask and other settings as shown
here:
ROUTING
To display the Routing settings, click Routing:
To add a route, on the Routing screen, click the Add button . The New Route
Configuration dialog box appears:
To edit a route, on the Routing screen, select the route you want to edit and click the
Edit button . Edit the fields and click Save.
DELETING A ROUTE
To delete a route:
In the list of routes, select the route you want to delete and click the Delete button
. You are prompted to confirm the delete. Click Yes.
DNS
On the DNS screen you can define primary, secondary, and tertiary settings as well as
a domain name.
Note: The tab defaults to the NTP (Network Time Protocol) view. Click the Static
button to view the current date, place, and time.
ALERTS
The Alerts screen enables the administrator to create the following alert protocols:
SMTP, SNMP monitoring, SNMP traps, Syslog, and HTTP:
Note: The SNMP monitoring and SNMP traps have three versions to choose from: v1,
v2c, or v3. Each version has different fields to be completed.
Complete the appropriate fields in the desired protocol and click Save.
ADMINISTRATION
The administrator uses the Administration screen to add and edit general settings,
perform maintenance tasks, implement customizations such as uploading a logo, and
create clusters of devices:
Field Description
Settings Tab Basic settings of the servers properties
Backup Retention Can be set for either the number of days or the
number of backups a backup is to remain on the
server before being deleted.
Field Description
Upgrade to New Uploads and installs a new version of BackBox.
Version
The SNMP trap receiver will initiate backup for the device that sent the trap. It will
only do so for traps that contain certain text which can be modified in the
configuration table.
2. Click the Add button to display the SNMP Trap Receiver Message field.
3. Type the text for the SNMP trap receiver and click the Submit button , or the
Cancel button to delete the text. To delete text that has already been submitted,
click the Delete button .
4. To add additional receivers, click the Add button again.
LICENSES
The License screen enables uploading a license and displays information about the
current license. The fields are populated when the license is uploaded.
ACCESS RULES
The Access screen allows the administrator to control the local Firewall of the
BackBox server. This determines which IP address/network can access BackBox via
SSH, the web interfaces, or the CLI interfaces.
To edit the Access settings, click an entry to display the following dialog box:
SITES
A site is a logical partition which contains devices, device groups, templates, or
backup instructions. It is a mechanism used by the Global administrator to delegate
administration of all aspects of the BackBox application to local servers. These local
servers are managed by site administrators who control the configuration,
notifications, and backup jobs. Creating sites is an efficient and effective way to help
organize and manage the devices and backups in larger and more complex
installations.
Sites help users know what devices they are authorized to access. Sites can be
assigned based on the combination of geographic location, device type, and whatever
other criteria the Global administrator decides.
For each site, the Sites screen displays site information, including: site name, and
number of devices, users, retention (how long backups are retained), simple and
complex backups, health checks, and harmonizations.
ADDING A SITE
1. On the Sites screen, click the Add button to display the New Site
Configuration dialog box:
2. Type a name for the site, fill in the appropriate fields, and click Save. The new site
is displayed in the list.
EDITING A SITE
1. On the Sites screen, in the list of sites, click the site whose settings you want to
change and click the Edit button .
2. Make the relevant changes and click Save.
DELETING A SITE
1. On the Sites screen, select the sites that you want to delete and click the Delete
button . A prompt appears requesting confirmation.
2. Click Yes to confirm.
AGENTS
Agents are used to manage the backups when there are larger installations with
multiple servers. On the Sidebar, under Settings, click Agents. The Agents screen
appears:
ADDING AN AGENT
1. On the Agents screen, click the Add button . The New Agent Configuration
dialog box appears.
2. Fill in the agents name, IP address, password, and site, and click Save.
EDITING AN AGENT
You can edit the details of an agent, as well as the agents OS users.
1. On the Agents screen, in the list of agents, click the agent whose settings you
want to change and click the Edit button .
2. Make the relevant changes and click Save.
CLEANING AN AGENT
You can clean an agent from older backup files that may exist, because the agent was
connected to another server (the older backup files will be deleted).
1. To clean an agent, on the Agents screen, select the agent you want to clean and
click the Edit button .
2. In the agents dialog box click the Clean button .
DELETING AN AGENT
1. On the Agents screen, select the agent to be deleted.
2. Click the Delete button . A prompt requesting confirmation appears.
3. Click Yes.
UPGRADING AN AGENT
You can upgrade an agent to a new version by clicking the Upgrade button .
SYSTEM LOGS
BackBox allows administrators to audit each user who accesses the system. The
program keeps a detailed log of each action performed in the system, as well the
object of the action.
The log details each time a user logs-in, adds, updates, or deletes. It also records the
objects of these actions such as devices, backup jobs, time and date, etc.
For example, if a device group is changed, the log will show which user made the
change, what the change was, when it was done and whether the change was
successful.
To access the System Logs screen, on the Sidebar, click System Logs:
The System Logs screen displays three types of logs: Auditing, Messages, and Vsftpd.
These are explained in the following sections.
AUDITING
The basic auditing information for a log is displayed in the Audit Log screen.
To open the Audit Log screen, in the System Logs screen, click the View Log button
in the View column of the Auditing row. The Audit Log screen appears:
The Filter button at the top right enables you to filter the log using any of the
following criteria: timestamp, user, screen, action, object, and notes.
Criterion Description
Timestamp Date and time
Action You can filter for the following actions: Login, Add,
Update, Delete
Notes Success/Failure
On some of the items displayed on the Audit Log, there is more detailed log
information available. To view the additional log details, click the View Change
button at the end of the row. The Audit Details Log screen appears:
MESSAGES
The Messages shows a trail log from the BackBox operating system
(/var/log/messages).
Settings BackBox Users Manual
133
To open the Messages Trail Log screen, in the System Logs screen, click the View
Log button in the View column of the Messages row. The Trail Log screen
appears:
You can download message logs to your computer by clicking the Download Log
button at the end of the Messages row.
VSFTPD
To open the VSFTPDs Trail Log, on the System Logs screen, click the View Log
button in the View column of the VSFTPD row. The VSFTPD Trail Log appears:
You can download the VSFTPD log by clicking the Download Log button at the
end of the VSFTPD row.
Besides enabling you to write scripts, the Customize screen also allows you to
customize lists that appear in other BackBox screens.
In the Product list, you can also use the Preferences button to display the
Preferences screen for that item. For example, the following screen appears for a
certain switch:
The Product Preferences screen enables you to select a license type: Simple or
Complex. Customized products are by default a complex type. You can also customize
the product type which is used in other screens for grouping items. Select a product
from the list, or use the Add, Edit, and Delete buttons to add, edit, or delete a
product.
Items that appear in the Version list are based on your vendor and product selections.
Use the Add, Edit, and Delete buttons to modify the list.
TOOLBOX CONFIGURATION
Use the Customize screen to configure a toolbox. This toolbox will contain the option
that enables you to write command scripts which you can use in the devices terminal.
Note:
To display the terminal of a device, on the Sidebar, click Access: The Terminal
screen appears. Select a device and click the Connect button on the Terminal
screen. After you write backup scripts and/or other scripts for restore, health checks,
etc. you can push them to the device while in the devices terminal. For more
information, see the chapter on Access.
First you need to configure a toolbox by giving it a name. Once the toolbox is
configured, select a vendor, product, and version for which the toolbox will apply.
Lastly, select and configure an option for the toolbox (i.e., write the command scripts
for it.)
To create a toolbox:
1. At the top of the Customize screen, click the Configure button . The
Toolbox Configuration dialog box appears:
2. In the Toolbox Configuration dialog box, click the Add button . The Add
Toolbox dialog box appears:
Customize BackBox Users Manual
136
To display the Option Configuration screen, on the Sidebar, click Customize. The
Customize screen appears. Select the vendor, product, and version, and in the Option
box, select the option you want to edit or click the Add Option button to create a
new option. In either case, the Option Configuration screen appears:
(In the above example, the screen is named tip2 because this is the name of the option
that we created. See below.)
Note: Although, by default, all daemons run on the BackBox server, the
communications via these ports are closed by default.
4. If desired, select the Is default checkbox. Selecting this checkbox causes the
configured option to be selected by default when a user configures a backup or
other task for this device.
5. To add a HTML page for restoring or configuring a device, use the Add Restore
HTML Page button , or the Add Configuration HTML Page button .
Note: The contents of these pages are displayed when users click the How to
Configure button or the How to Restore button in the Device
Details tab for the device (accessed on the Devices screen). The How to Restore
document should explain how to manually restore the device, while the How to
Configure document should explain all the prerequisites for the backup to work.
You can format these documents by using the buttons on the ribbon at the top of
the screen or by clicking the View HTML button and inserting standard HTML
code. Click Finish.
6. When a backup finishes as an ASCII file, BackBox automatically compares it to
the previous backup file. However, you may want to exclude some lines from the
comparison, such as the timestamp. To do this, on the Compare Exceptions tab,
click the Add button and type any text that you want BackBox to ignore
when comparing the backup. You can also use the Impport button to
import a file. Clicking the Export button enables you to export the
exceptions.
Instructions on how to complete the other tabs on the Option Configuration screen,
are contained in the following sections.
The Option Configuration screens Dynamic Fields tab enables you to define fields
that appear on the Device Details tab for a device listed in the Devices screen. The tab
contains two sections:
Dynamic Fields section in the upper part of the tab
Inventory section in the lower part of the tab (you may need to scroll the tab to
display this part).
This section displays a list of fields that are typically used on the Device Details tab,
such as: Authentication, Username, etc. For each field in the Field Label column, you
can choose the options of the following columns:
Table 19: Options Columns of Dynamic Fields
Hide Command The field will not appear in the Backup log.
Free Text Displays the text that will appear as the name of the
field on the screen.
Default Value A default value will appear in the field when the
screen is displayed. This is optional.
Following is a description of the fields and their variables. Backup scripts can make
use of the contents of these fields through using the variables as noted.
AUTHENTICATION
Determines whether this device will be enabled to use with authentication templates.
The default action is that they will, and that the authentication will be mandatory. If an
authentication template is chosen, the Username / Password / etc. fields that are
irrelevant will be hidden. For example:
AUTHENTICATION TEMPLATES
When Use Templates is selected in the Authentication list, it displays a list of
authentication templates to select from.
SERVER IP
Displays a list of IP addresses of the BackBox server. These IP addresses will be used
by BackBox, to determine the IP address to which to send the file.
Variable: %%SERVER_IP%%
USERNAME
Displays a field for the Username login to the remote device.
Variable: %%USER%%
PASSWORD
Displays a field for the Password login to the remote device.
Variable: %%PASSWORD%%
EXTRA PASSWORD
Displays a field for the Extra Password (expert mode, enable mode, priv mode, su,
etc.) to the remote device.
Variable: %%SU_PASSWORD%%
USERNAME 2
Sometimes a device will need a dual login. This field is for the second username to
log-in to the remote device.
Variable: %%COMMAND_USER%%
PASSWORD 2
Sometime a device will need a dual login. This will display a field for the second user
password to the remote device.
Variable: %%COMMAND_PASSWORD%%
SNMP VERSION
Displays a field for the SNMP version login to the remote device.
Variable: %%SNMP_VERSION%%
Variable: %%SNMP_COMMUNITY%%
PORT
Displays a field for the communication port to the remote device.
Variable: %%PORT%%
Note: In this field, the free text value will be configured as the default value, and the
label is hard-coded to the port.
Variable: %%CUSTOM_1%%
CLUSTER NODE IP
Some devices may be part of a cluster. This field displays a field for the cluster node
IP.
The Inventory section of the Dynamic Fields tab is in the lower part of the tab (scroll
down) and looks like this:
This section enables you to create fields for the devices Inventory tab in the Devices
screen. To create a field for the devices Inventory tab, click the Add button .
The new Inventory field is added to the list of field labels. In the Free Text column,
type a name for the field and click the Submit button . After clicking Save, the
fields will be displayed on the Inventory tab for the device in the Devices screen.
Variables: To access the contents of any of the Inventory fields in backup command
scripts, use the variables %%Custom_Field1%%, %%Custom_Field2%%, etc., and
not the name given in Free Text.
The scripting tabs enable you to write and edit scripts for a variety of actions. You can
add a sequence of commands that will be executed, line by line. (The Health Checks
tab is a little different and first requires that you create a health check before you can
add commands to it.)
Note: Commands on the Connect tab and the Inventory tab can only be initiated if
called by a command on the Backup tab as explained in the relevant sections below.
Customize BackBox Users Manual
142
Clicking the Add button on a scripting tabs toolbar, or clicking on the large
Add icon in the middle of the tabs screen, displays the Conditions dialog box, in
which you can configure the command and its parameters. Clicking Save returns you
to the Option Configuration screen, which now displays information on your
configuration, including such items as the type of command, description, timeout, the
message that the command generates upon execution or failure (Result Option), etc.
For details see the next section, Writing Command Scripts .
The last column displayed for each command is the Order of the command. This refers
to its place in the sequence in which commands will be executed on the tab. You can
reorder the sequence by simply dragging the sequence number in the Order column up
or down in the command list. The sequence number automatically changes to reflect
the new ordering of commands.
Figure 152: Example of Scripting Tab on the Customize Option Configuration Screen
Regardless of which command script you are writing, you configure commands in the
Conditions dialog box that is displayed when you click the Add button in any tab
meant to contain a list of commands; for example, the Harmonization tab in a
Harmonization template, or the Backup tab in Customize. The Conditions dialog
box looks like this:
8. In the Wait for box, specify a character or string that indicates the selected status:
Success, Suspect, or Failure.
9. In the Error Message box, type the message that will be displayed to the user when
the status occurs. Click Save to return to the Prompt dialog box. The prompt is
now displayed in the Prompt dialog box. Click Save to return to the Conditions
dialog box.
10. Under Conditions Operator, and Advanced Options, select the appropriate settings
see the next section Command and Command Type for details.
Note: The Advanced Options fields are different for verification commands as
discussed in the section on Verification Commands.
11. Click Save; the command now appears in the list of commands, on the tab to
which you added it.
See Command and Command Type below for details.
A more detailed discussion and examples of how to write commands for the various
types is provided below.
REMOTE COMMANDS
Remote commands use a standard syntax that is used by Linux (while connecting to
BackBox) or by the device itself (after connecting to the remote device). An example
of a Remote command is the Cisco Terminal Length command for example, adding
the command terminal length 0 in the Conditions dialog box would display the entire
output (such as configuration) without any user interaction.
Figure 156: Entering the Terminal Length Command in the Conditions Dialog Box
INTERNAL COMMANDS
Internal commands are specific to BackBox and perform various backup tasks. They
consist of the following:
CONNECT
Causes all commands on the Connect tab to execute. Once they are all performed, the
script will continue as usual. In this case, the Connect tab acts as a function which is
called by the Connect command. For an understanding of the Connect tab, see
Connect Tab below.
GETLASTLINE
Looks at the last line of output from the remote device. You can use this command to
trim the backup file so that it excludes the prompt. To do this you would use the
variable %%CURRENT_PROMPT%% to save the backup file. For example, entering
getlastline %%CURRENT_PROMPT%% in the command box would save the backup file
to the variable %%CURRENT_PROMPT%% and trim the file so that the prompt is
excluded:
Figure 157: Using the Getlastline Command to Trim the Backup File
TRIM
Cleans unwanted characters from the output file. For example, sometimes when
saving the output of a command to a variable, a line break character (invisible) will be
added. By trimming the variable, it will be cleaned of the unwanted characters.
For example, the following trims the output file and saves it to the variable VAR:
Figure 158: Trimming the Output and Saving It to VAR with the Trim Command
GOTOLINE
Implements a simple looping mechanism within a script. For example, the following
would cause the script to jump to line 63 if a specified condition is true:
INVENTORY
Causes all the commands on the Inventory tab to execute. In this case, Inventory tab
acts as a function that is called by the inventory command.
DECRYPT
Backup files are kept encrypted (if configured so) on the BackBox server. You use the
decrypt command to decrypt the files (which is usually done when restoring). The
command decrypts all files within the backup directory, and copies them into the
%%DEFAULT_BACKUP_LOCATION%% directory.
CARRIAGE
Some devices use a non-standard terminal connection. In rare cases, they use a
different character for the carriage return, or for the new line character. In that case,
you can run the carriage command with the ASCII number of the character, which will
ensure that it functions as the carriage return until the end of the current session.
BACKUP
Enables you to call the backup commands configured on the Backup tab. This enables
calling the backup commands from inside a script.
RESTORE
Enables you to call the restore commands configured on the Restore tab. This enables
calling the restore commands from inside a script.
Writing Command Scripts BackBox Users Manual
150
STRIP
Enables you to strip characters from a string. This works like the trim command (see
Trim), but enables you to remove multiple characters if desired. For example, the
following removes the characters $ and #:
12 3%4 56
LOCAL COMMANDS
These are standard scripting commands that are disconnected from the remote
commands session, which allows you to run commands simultaneously both on
BackBox and the remote device. Local commands are the same as the remote
commands but on a parallel SSH session.
Note: The local prompt on BackBox is BBP. This is designed to distinguish the
BackBox shell from the remote device shell. Usually local commands will have the
Result Option of BBP for a successful command.
VERIFICATION COMMANDS
These are built-in commands that are used to verify that the backup files generated by
BackBox are valid, and sane. There are three verification mechanisms within the
verification commands: Check Size, Find Text, and Archive Contains.
CHECK SIZE
Verifies that a specific file is within a backup range. Command, Timeout, or Result
options are not required. When this command is selected in the Conditions dialog
box, the following Advanced Options are displayed:
Figure 160: Advanced Options for Configuring the Check Size Command
If size of file The full path of the file being verified. Usually the path is:
%%DEFAULT_BACKUP_LOCATION%%/<filename>.
In Range / Not in Range Determines if the file size must be in the set Min/Max range.
Min size/Max size Sets the lower and upper limits of the file size. The units can
be selected: Bytes - Terra Bytes.
Error Message The message informing the user whether or not the file meets
the verification limits.
FIND TEXT
Makes sure that a specific string is found within a text based file. Command, Timeout,
or Result options are not required. When this command is selected in the Conditions
dialog box, the following Advanced Options are displayed:
Figure 161: Advanced Options for Configuring the Find Text Command
In File The full path of the file being verified. Usually the path is:
%%DEFAULT_BACKUP_LOCATION%%/<filename>
From line Sets the line numbers in which the string should be found.
To line If From Line is blank, BackBox searches from the beginning
of the file.
If To Line is blank, BackBox searches to the end of the file.
Error Message The message informing the user whether or not the text string
was found.
ARCHIVE CONTAINS
Makes sure that a specific file is contained in an archived file. Command, Timeout, or
Result options are not required. When this command is selected in the Add
Command dialog box, the following Advanced Options are displayed:
Figure 162: Advanced Options for Configuring the Archive Contains Command
Error message The message informing the user whether or not the filename
was found in the archive.
CONDITIONS
The Conditions Operator area in the Conditions dialog box enables you to add
conditions that control the execution of a command. These are equivalent to If
statements in a program and involve writing variables whose values can be evaluated
by BackBox. For example, the following are conditions for a specified command:
In the above example, the command will be executed only if both Condition 1 AND
Condition 2 are evaluated as true. In this case, a variable called VERSION must be
greater than 4.5 AND a variable called MODEL must be equal to the string GM.
Operators can be either AND or OR. Variables can be evaluated as related to a
numerical or string value according to the following:
Writing Command Scripts BackBox Users Manual
153
ADVANCED OPTIONS
For all commands, except when the Verification command type is selected, the
following Advanced Options area is displayed on the Conditions dialog box:
SLEEP FOR
This adds a specified number of seconds after the command has run, and before
waiting for the Result Options.
HIDE OUTPUT
SAVE TO
Saves the output of a command to a variable or a file. When you select this option, a
box appears enabling you to specify the variable or file to which to save.
If Save to Variable is selected, you can specify the name of a variable, and the variable
will be created on the fly. It is recommended to use the following for a variable name:
%%VARIABLE_NAME%%.
If Save to File is selected, you can select either Overwrite File or Append to File. If
you select Overwrite File, the specified file will overwrite the file that you selected.
Selecting Append to File will append the output to the end of the selected file.
SET STATUS
Normally, you set the status of the command in the Result Options . However, in some
cases, you may want to set the status of the operation regardless of the outcome of the
command. In this case, you can select the Set Status option and specify the status and
error message in the boxes that appear. For Advanced Options for Verification
Commands, see Verification Commands.
CONNECT TAB
Connect commands are commands that run on the BackBox CLI (Command Line
Interface) in order to connect to the remote device. These commands will only start
running when a Connect command is executed on the Backup tab.
These commands are separated from the regular backup commands due to the
following:
Sometimes you might need to connect to the devices more than once during
the backup process.
Scripts other than the Backup script might also need to connect to the remote
device (Inventory script, Restore script, Toolbox, etc.).
Thus, the Connect tab acts as a function or method whose command sequence can be
called by other scripts.
EXAMPLE
This example illustrates a typical telnet connection to a remote device. The first
command enables you to telnet to the IP of the device. The variable %%HOST%%
automatically takes the IP of the device. Note that a 60 second timeout delay was set.
The Results Options for the command specifies that if user or username is
received within that time, the command is successful and the system proceeds to the
next command as shown in the following:
BACKUP TAB
You use the Backup tab to write customized Backup scripts that you can edit and
revise as desired. Like all scripting tabs, you can add and delete commands, revise the
criteria for success or failure of a command and easily reorder commands.
EXAMPLE
Note that the script starts with an internal Connect command that starts the connection
to the remote device by calling the Connect script on the Connect tab. This is typical
when pulling backups from a remote device.
The next command is another internal command, Getlastline, which is saved into the
special variable name %%CURRENT_PROMPT%%. This will make sure that when any
file is saved, the prompt will be automatically trimmed from the file. This will also tell
BackBox what the prompt looks like, so it can later be used in Result Options for
other commands.
The third command is a specific Cisco command, which in this case will make sure
that if any configuration is displayed, the output will be completely displayed on the
screen without any user interaction. Note that since this is a remote command, a
timeout has been assigned (60 seconds).
The fourth command displays the configuration on the screen, and saves it in a file in
the BackBox default backup directory. Note that since this command can take longer,
the timeout has been increased to 600 seconds.
The fifth command is an internal Inventory command that starts the script on the
Inventory tab. For details on Inventory scripts, see the Inventory Tab section below.
Lastly, a verification command, Check Size, checks the size of the file to make sure
that it is not too small and contains some configuration. It also checks for an upper
size limit to make sure that the file is sane.
INVENTORY TAB
The Inventory tab is for creating scripts that draw information from, or populate
fields on, the Inventory tab for a device (see Device Screen: Inventory Tab).
For the Inventory commands to work, you must first create Inventory fields for the
devices Inventory tab. You do this by using the Inventory section of the Option
Configuration screens Dynamic Fields tab in Customize (see Using the Dynamic
Writing Command Scripts BackBox Users Manual
157
Fields Tab, and Understanding the Inventory Section). Here is the logic of this
process:
When you create a field using the Dynamic Fields tabs Inventory area, you create a
label for the field as well as a variable that will hold the value of the field. The
variables are hard coded as %%Custom Field 1%%, %%Custom Field 2%%,
etc., like this:
Figure 169: Fields in the Inventory Area of the Dynamic Fields Tab
To cause a command to populate a field with information, you must save the
commands output to the corresponding variable name.
EXAMPLE
Assume that you created the following custom fields in the Inventory area of the
Dynamic Fields tab:
Those fields now appear on the Inventory tab in the Device screen for that device.
Now, suppose that you want to populate those fields with information. You can do so
by writing a script consisting of the following commands on the Inventory tab like
this:
All these commands save their output to their respective custom variable, like this:
This, in turn, populates the respective fields on the devices Inventory tab on the
Device screen.
RESTORE TAB
The Restore tab enable you to write scripts that restore the device to the currently
selected configuration. These scripts use the same commands and features as the
Backup scripts. To run the script, choose the Restore button in the Device
History tab for the device (see the Device History Tab).
Restore scripts usually begin with an internal command called decrypt, to make sure
that, in case the files are encrypted, they will be decrypted (see Internal Commands).
Subsequently, a new directory that holds the configuration files should be created. To
access it in the script, you can use the same variable as in the backup script, i.e.,
%%DEFAULT_BACKUP_LOCATION%%.
EXAMPLE
Below is a Restore script that copies a configuration file back to the remote location:
Figure 173: Sample Restore Script for Copying a File to a Remote Location
Notes
1 The full path used for the scp command above is this:
scp %%DEFAULT_BACKUP_LOCATION%%/configuration_backup.conf
-P %%PORT%% %%USER%%@%%HOST%%:fgt_restore_config
where %%HOST%% is the variable containing the Host IP, and %%USER%% is the
variable containing the username.
2 The Results Options for the scp command was set for Wait for assword
Success, where the P is omitted so that it can be either upper or lower case.
3 For the scp command, in Advanced Options, the output of the command is
saved to the variable %%SCP_CONNECT_RESPONSE%%. This is done to help
determine whether this is the first time connecting to the device.
4 The Yes command runs only on condition that this is the first time as specified
in conditions:
The health checks for a device can be selected and run from the devices Health
Checks tab which is accessible from the Devices screen when you click on a device in
the list.
2. Type a name for the health check and click the Save & Edit button. The Health
Check Configuration dialog box appears with the name of the health check in the
title-bar:
3. Edit the name and description as desired and set the default interval for how often
the health check should run.
4. In the Severity Alerts list, select the alerts that the check should trigger. You can
select Critical, All or None. If you select All, the alert will include the following
alerts: Success, Warning (suspect), Critical (failed).
Writing Command Scripts BackBox Users Manual
161
5. Use the Commands, Dynamic Fields, and Check Information tabs to write the
script and create the health check as explained in the sections below.
You write Health Check scripts the same way you write other scripts such as a Backup
script. The following sections provide additional information.
The Health Checks Dynamic Fields tab enables you to create dynamic fields similar
to those created for the Device Details screen (see Using the Dynamic Fields Tab)
with the following differences:
You can configure the variable name as desired.
You can specify that the field is locked. In that case, the user will not be able
to modify its value.
To add a Dynamic field, click the Add button and fill in the fields. After you save the
field specifications, the fields appear in the list of fields as shown above. You can
click on a field in the list and edit it just like those in the other parts of the Option
Configuration screen.
Second command: Sets the result to Critical on condition that the value of the variable
is greater or less than the value configured for the condition. For information on how
to configure conditions for commands see Conditions.
Third command: Sets the results to Warning on condition that the value of the variable
is greater or less than the value configured for the condition. This assumes that the
previous command did not detect a Critical state.
The Check Information tab provides an HTML Editor that enables you to write
detailed information about the health check. The information will appear when you
click the Information button in the Info column for the health check on the Devices
screens Health Checks tab for a device. Here is an example of information written
for a health check:
5. On the Name and Location pane, in the Name field, specify "BackBox" or
any other name, and click Next.
164
6. On the Storage pane, select the data store that you want BackBox to
reside on and click Next.
8. On the Guest Operating System pane, select Linux and in the Version
box, select CentOS 4/5/6 (64-bit) and click Next.
9. On the CPU pane, make sure that the Total number of cores is at least 4,
and click Next.
For more specific details, consult the Sizing document.
10. On the Memory pane, for Memory Size, specify a minimum of 4096MB.
For more specific details, please consult the Sizing document.
11. On the Network pane, select the E1000 network adapter and click Next.
12. On the SCSI Controller pane, select LSI Logic Parallel and click Next.
13. On the Select a Disk pane, select Create a new virtual disk and click Next.
14. On the Create a Disk pane, select a Disk provisioning option and location.
Note that the Minimum disk size for BackBox is 40 GB.
15. On the Advanced Options pane, in the Virtual Device Node list choose
SCSI (0:0) and click Next.
16. On the Ready to Complete pane, select Edit the virtual machine settings
before completion and click Continue.
INDEX
A Backup ................................................... 28
Audit Details Log window ................ 132 Checks Tab ........................................... 159
B Conditions........................................ 152
Inventory Commands Tab ............... 156 Dynamic Fields Tab .............................. 138
Option Configuration Screen ........... 136 Encrypt Backup Files ............................ 124
Dashboard tab........................................ 28 F
TCP/IP VMWare