6-55
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
6






Configuring

Virtual

Contexts
Using
the

Configuration

Checkpoint

and

Rollback

Service


Comparing
a

Checkpoint

to

the

Running

Configuration,
page
6-58
Creating
a

Configuration

Checkpoint
You
can

create

a

configuration

checkpoint

for

a

specific

context.

The

ACE

supports

a

maximum

of

10
checkpoints
for

each

context.
Assumption
This
topic

assumes

the

following:


Make
sure

that

the

current

running

configuration

is
stable
and

is

the

configuration
that
you

want

to
make
as

a

checkpoint.

If

you

change

your

mind

after

creating

the

checkpoint,

you

can

delete

it

(see
the
“Deleting

a

Configuration

Checkpoint”

section

on

page

6-56 ).


The
ACE-Admin,

ANM-Admin,

and

Org-Admin

predefined

roles

have

access

to
the
configuration
checkpoint
function.


A
custom

role

defined
with
the

task

ANM

Inventory

>

Virtual
Context/Create

or

ANM

Inventory

>
Virtual
Context/Modify

has

t

he

required

privileges

t

o

create

a

co

nfiguration

checkpoint.


A
checkpoint
will
not

include
the
SSL

keys/certificates,

probe

scripts,

and

licenses.


Adding
a

checkpoint

from

an

ACE

context

directly

will

not

trigger

an

autosynchronzation

on

ANM
for
that

context.
Procedure
Step
1
Choose
Config
>

Devices

>

context

>

System

>

Checkpoints.
The
Checkpoints

table

ap

pears.
For
descriptions

of

t

he

checkpoints,

see

Ta

b

l

e


6-10 .
Step
2
In
the

Checkpoints

table,
click
the
Create
Checkpoint

button.
The
Create

Checkpoint

di

alog

box

appears.
Step
3
In
the
Checkpoint

Name

field

of

the

Create

Checkpoint

di

alog

box,

specify
a
unique
identifier

for

t

he
checkpoint.
Enter
a

text

string

with

no

spaces

and

a

maximum

of

25

alphanumeric

characters.
If
the

checkpoint

already

exists,

you

are

prompted

to

use

a

different

name.
Step
4
Do
one

of

the

following:


Click
OK
to

save

your

configuration

checkpoint.
You
return

to

the

Checkpoints

table
and
the

new
checkpoint
appears

i

n

the

t

able.
Ta
b

l

e


6-10
Checkpoints
Table
Field
Description
Name
Unique
identifier

of

the

checkpoint.
Size
(In

Bytes)
Size
of

the

configuration

checkpoint,

shown

in

bytes.
Date
(Created

On)
Date
that

the

configuration

checkpoint

was

created.