BackBox Features
The simple way to Backup and Restore device configuration
Centralized Management for all Security and Network Device Configuration Backup BackBox centralizes all Security and Network device backups into a single application with a real-time Dashboard.

This single overview of the infrastructure saves time and eliminates the need to track individual devices and multiple management systems.

BackBox is fully automated and non-intrusive, no agents required and no network configuration changes are required to perform fully configuration backups.

Backbox Map
Multi-Tenant and Virtual SitesBackBox now support addition of Virtual sites where an administrator can only see their assigned devices.

This will enable both MSPs and Enterprises to have a single BackBox installation and have different users/customers managing their own infrastructure backups and devices.
  • Virtual Sites
  • Role Based Administration
  • LDAP, RADIUS and SSH Key Support
  • Authentication Templates


Backbox Map
Multi-Vendor SupportBackBox supports over 60 of the leading Security and Networking vendors.

In addition, BackBox can be easily customized to support virtually any other device that is connected to the network.

3com A10  Networks Accesslayer Algosec Allot Communications
Aruba Astaro Audio Codes Avaya Avocent
Barracuda Bluecoat Brocade Centerity Checkpoint
Cisco Citrix Clear Swift Crossbeam Dell
D-link Enterasys Extreme Networks F5 FireEye
Firemon Forescout Fortinet Hp Networking Huawei
Imperva Imprevata Infoblox IronPort Juniper
Linux McAfee Microsoft NetApp Netgear
Nokia/Checkpoint Nortel Paloalto Perle PineApp
Proofpoint Radware Riverbed RSA Security Safenet
Sense Skybox Security Sonicwall Stonesoft Symantec
Trendmicro Tufin Vmware Watchguard Websense
Dynamic InventoryBackBox automatically (using the backup schedule) will also pull dynamic inventory information from the devices.

BackBox will report on Hardware information (CPUs, RAM, Storage), Appliance information (Model and type), License information and more.
  • Refresh data with every backup
  • Customizable Fields
  • Full infrastructure Report by type of Device
Name IP Version Model CPU Type RAM Disk %
CheckPoint Management Server 192.168.10.250 R75.40 Smart-1 25 Quad Core 5520 2048MB 85%
CheckPoint Cluster Node 1 192.168.10.1 R75.40 UTM 12400 25 Dual Core 5520 2048MB 55%
CheckPoint Cluster Node 2 192.168.10.2 R75.40 UTM 12400 25 Dual Core 5520 2048MB 40%
Cisco_3760 172.25.11.26 IOS 12.4 Catalyst 3760

128MB  
DNS Server 172.26.14.12 CentOS 5.4 CentOS 5.4 Dual XEON 4096MB 67%
Automatic RecoveryAutomatic Recovery

When a device needs to be replaced or a configuration restored, BackBox can be used in order to minimize the recovery time.

Single-Click recovery allows the BackBox administrator to push a recent backup file to the device and automatically run the recovery procedure.

BackBox also includes, step-by-step Disaster Recovery procedures to allow ease of use if a manual recovery process if preferred.



Backbox Map
Distributed Architecture

In version 3.0 BackBox introduces an option to distribute the BackBox architecture.

BackBox can now be installed on multiple communicating systems and have a separate Management and Agent systems.

The BackBox Management System enforces the operational tasks (backup, recovery, inventory etc.) to the BackBox Agent and collects both the status information and the Backup Configuration files into a single management system.

The BackBox Agent System executes the required task assigned to it by the BackBox Management System and synchronizes the information.

This architecture eliminates the need for multiple Firewall rules while attempting to Backup remote devices and it enables data redundancy between the Management and Agent systems.

Backbox Map
Device ManagementBackBox enables the administrator to gain direct access to the management interface of the device.

This capability allows opening either a CLI or a Web Interface directly to the device from the BackBox Web Interface.

In addition, BackBox ships with many pre-configured commands that can be used with a single-click in order to get the response from the remote devices.

The pre-configured commands can be customized per device by the administrator.

  • CLI Access to the Device
  • HTTP/s Popup based on IP and Port
  • Pre-Configured Commands
  • Full Audit Log
  • Authentication Required
  • Fully Customizable


Backbox Map
Backup Verification
  • MD5 Checksum
  • For all files generated on remove devices, BackBox will include an MD5 Checksum command for critical files.
    This allows a BackBox administrator user to verify the integrity of a file before restoring it to the device.

  • File Size
  • BackBox can be configured to expect a certain file size range.
    This will cause files that differ in size - either too small or too large to raise the suspected flag

  • File Content
  • For any ASCII based configuration, BackBox can be configured to look for any string or text within the file.
    This string can be set to appear anywhere within the file, or it can be configured to be found on specific lines.

  • File Corruption
  • The most common issue with unusable backup file is a corrupted archive. BackBox by default will collect any archive and open it up to make sure that it is not corrupted.
    This mechanism will also work for tar.gz archives

Additional Features
  • Virtual Appliance
  • 64bit Linux Based OS
  • Distributed Architecture
  • Built-in Dynamic Firewall
  • Credential and Configuration File Encryption
  • Self-Backup and Automatic Remote Storage
  • Full Auditing
  • IP Based Access Control
  • Secure Access to Devices
  • NAT Support
  • Fully Customizable


Backbox Map
888 alvarion audiocodes bank-hapoalimbezeq cellcom click-software coca-cola dimension-datahot-mobile mellanoxradware
Copyright © 2010 BACKBOX - All rights reserved - Website developed by VIRTUALPROD.COM