18.2 Using the Enhanced Configuration Export

You can export all of your certificates, trusted root files, rewriter.cfg, and all files in sys:\etc\custom to the .nas file. Sys:\etc\custom is meant for custom rewriter configuration use. The behavior of the export command is controlled by the following set export ? commands.

 syntax1: set export certificate = <no|yes|auto>
            - enables / disables the export of certificates into
              the NAS file.
                  - no  = disable
                  - yes = enable, take the certificates from the 
                          backup dir
                  - auto= enable, export the certs to the backup, 
                          then include
 syntax2: set export trustedroot = <no|yes>
            - enables / disables the export of trusted roots
              the NAS file.
                  - no  = disable
                  - yes = enable, take the trustedroots from SYS:
 syntax3: set export password = <password>
            - sets the password for the certificates export in case
              auto is enabled.
             

This password is not exported to the .nas file.

Certificates and trusted roots were not included as defaults in previous versions; however, the sys:etc\proxy\rewriter.cfg and all files in sys:etc\custom are now included. This allows you to export your entire configuration in a single, convenient location inside one file.

This setting is not available from the Proxy Administration Tool. It is stored in the .nas file.

IMPORTANT:If you export a .nas file from a machine that has a trusted root configured on the Access Control tab, the .nas environment does not work when you restore the file. To prevent this issue, do not export the current.nas file unless you set the export trustedroot=yes and make it the default setting.

Importing an iChain 2.2 .nas File

If you import an iChain 2.2 .nas file that contains password management servlet information to an iChain 2.3 server, the password information might be lost because the SNMP files change. If this occurs, you need to reboot.

You can import iChain 2.3 .nas files with the same information , and the password information is not lost.

18.2.1 File Format

The .nas file format is shown as follows:

# iChain(r) Configuration file
#
# Build: iChain 2.3 (2.3.222d)
# Date:  Wed Dec 10 12:10:29 MST 2003
# File:  abc.nas
#
# ====================== WARNING ======================
#  This file contains security sensitive information!
#  - LDAP usernames and passwords
#  - Certificates
#  - Trusted roots
#  - IP addresses and infrastructure information
#
#      PLEASE TREAT THIS FILE WITH EXTREME CAUTION
#
# ====================== WARNING ======================
#
clear accelerator
.  
.        
.        < All kinds of settings - as before >
.
.
set export certificate=auto
set export trustedroot=on
.
.
.        < All kinds of settings - as before >
.
set prompt=$G
.
.
.        < All kinds of settings - as before > 
.
restore initialize
restore begin \etc\proxy\rewriter.cfg
restore end
#
# This section contains the Trusted roots of the iChain server
# They will be restored and automatically active.
#
restore trustedroot begin 175TR 1285 FF1A9CC1
*8G0CG205XCG273fe030YX0YY0vY0K5UY5ma9EGKDQpGiN7ODGgH1C(NLxeKY0XA8Gj069CgcK8cA4l
*8GXutj0XX05510G9Dn1wG0O623L0ah0pHJlIRdXRk9RwXRK9RFkRXCAWZH1n1FG0j623L0aA0p6lKG
*8GYIgiIbtIfJ8GU0Nj9Go9Gn9oL9nL9qn9GGGQN1jn9oG9no9Ln9tq9nGAGQ9GD8nw8GO063GLaxLY
*8G30hp2HlRIdRXkR9wRXKR9FRkXPCWIZ18nF8Gj063GLa0Ap26gIibItfHJGW2X92G0j619gYc8cgO
*8Gadct0jX0XX0504320XF10GW2X0AYW2X0X0hjO2pnpR5pjaSTW5a)tmErI)4pgnj4NoMZE5W2mhN)
*8G5ShtZS3eOy2wDaWDf)o0TOiTqkpj09hUOsrXRejhTYXJE5p5hOOXMEesXO1Hl9Giy2qZL0Qa(Z7T
*8G6QKzuBYqyuY44jY3GZrcbC(2TBDT8(eEE)rjhlRgMZHP0xlyJqhJul)UedWqemUphhd4KloHffmL
*8GdxoX03e)243AYeXIAJuc(spCeKZ7Wl6Y1QN4gohgPOQ4YQlR1BxaBMyU)rGfRn9Jjs5WD)h9jVaL
*8Ge0r9k9eIlngyMCBVP6JTNHycDlplnUZpCHEVXns2cVsZ8Ae6kc7dIMgPHD(iY2UJELhKb(ALVwtP
*8G9OO3aqPLQTc8OZVCJJCNBVIGBrI3Bza(nmY7cl9WeHwbgY03jfNndgWISB0Y30X05X3W2Y1IG16P
*8GAW2Y1kG0A623L0Tk0a30aX1XG0C623L1TZ0a58G3WWX1XG0F623L0Tp0XX00a15G03X7XV8GkC2n
*8Gh063GLT0FX0X00aa03Y0X6CG26XF06hS0cG8Xdcu8tX09a0XX0X04a25XRCG25XN0aY0X00XX0Ie
*8GCuVp2TERFsR5CPCWJJ5R3rRI9RKvAW1RKKRI9RYrRK5B8KPjf2sZReKRKm9QlBlaR5sR5CRFmkv3
*8GjR5IBEkRFsR5CPCER3FPjlRI5RmFRp9RKFRIvBlXRKKRI9RYrRK5PplR35RIKRXKRKIQpVPsnN88
*8Gk9GEReKPjGW2XL800wX0X08Ge8G60YX0XY2Xc8Ge8G60YX0XY0XA0YXT9X0wX0X08Ge8G60YXjIy
*8GF0XY2Xc8Ge8G60YX0XY0XA0YXT9Y06Y0XO0XXzV3W2X5a0GuY0XY0YY70V0YX0030j0WW0000LDX
*8Gm00000000000003940W00000000010G1OG0mY0X00YeV)V)VV)VV)VV0XX00Y0a6(G)H8G1OGMGv
*8GH0mY0X00YeV)V)VV)VV)VV0XX00Y0a6(G)L8XGuY0XY0YY70V0YX0030j0GW0000000000000G1H
*8GI00003920W00000000010G1OG0mY0X00YeV)V)VV)VV)VV0XX00Y0a5UY5naG1OG0mY0X00Yezuh
*8GpV)V)VV)VV)VV0XX00Y0a5UY5raYHEGGiY0XY0YY70V0YX0030j0dWV)VV)VV)VV)VV)VV039IuD
*8GK40W)VV)VV)VVvVG1IG0mY0X00YeV)V)VV)VV)VV0XXvVG1IG0mY0X00YeV)V)VV)VV)VV0XXw8W
*8GrvVG0j619gYc8dct0jX0X50504320XX00HLbvm6OvcVUmXAc1O5KnAqTrHIcVHB1iNibnh19i9PS
*8GseY5l6bU0kz(moySMuItkin6BdPofyqxZePj1EVUk0kVUZxPmz23XEDqInRmaZlKE7jyV7At89Dn
*8GNUAvTF9QOBjvkUdapNaXVZIWgI(fzzwXDLmkjT)NF4iwBltC8iroTkO0HjcV9CqgDVNja6lTBlNx
*8GOZca4AGM29sN6dQ1WzCS5xDW0sX)fA71YV4AEHuEz8KAJ8xQmh)Y(W65X)VabCzi3)K10VanPxEm
*8GvKbE8gFdJtuBXikGS)xty2FloG(6U606UO0X9zoObodaWB)bioyL4sQ8(FnTgepr2X77jSOYFiez
*8bwneQ)87kOhe0TZ1huqdYiZdJ492lHWB0pOmOwTHAXbi8P6lNGEbhD4m0w0ORh
restore trustedroot end
apply

18.2.2 New Commands

The .nas file has the following new commands:

restore trustedroot begin name size crc
data
.
.
.
restore trusted root end

and

restore trustedroot begin name size crc data
.
.
.
restore trusted root end

and

restore certificate begin name size crcdata
.
.
.
data
restore certificate end

Also updated are:

restore begin filenamedata...**BLANK_LINE**
.
data
restore end

where **BLANK_LINE** is inserted when a blank line is found. This is a limitation of the parser.

The certificate and trusted root data are protected by a double CRC (cyclic redundancy code). A CRC is calculated on a line-by-line basis, as well as on the entire file. If either of the CRCs do not match, or the resulting file size does not match, the file is not restored to its original location. In such a case, the old file is left in place.

The trusted root is restored to sys:\ and is available for immediate use. The certificate date is restored to the backup directory on the sys: volume and is not immediately active so that it does not overwrite active certificates. It can be restored either by using the Proxy Administration Tool in the Certificate Maintenance tab, or by using the following instructions as outlined in the .nas file if the server contains a certificate:

#
# This section contains the Certificates of the iChain server.
# *.pfx files will be restored to the backup directory.
# To activate them you need to restore the certificates using
# the certificate restore option on the certificate menu.
#
# If you want to automate this process, please include the
# following commands after the last “Restore Certificate End”                               
# command, before the apply. (without the “#”)
#
# add certificate name <name> 
# set certificate name <name> target=disk, action=restore,
#     action=<password>
#
# where <name> is the name of the certificate
# and <password> is the certificate password.
# Repeat this for every certificate in the list.
#
# WARNING: In that case, anyone can dupe your server.
#          This is a security risk!!!
#

WARNING:This allows automated staging setups or lab setups. If you use this feature in production environments, you must guard this file since it contains all information needed to clone your iChain server.

The Get EXPORT PASSWORD command is not exported to the .nas file for security reasons.

18.2.3 Using a Comment Specifier in NAS Files

You can use the pound sign (#) and semi-colon (;) to start a comment line in the file. Anything containing these characters is ignored, except if they are specified between a restore certificate|trustedroot begin and restore |certificate|trustedroot end specifier.