...
- Limitations and prerequisites
- input the source and target gateways details
- Pre-Backup Validations (for example, if the target gateway is available at this point - check if the firmware levels are identical)
- Secure-Backup of the source gateway
- Removal of the source gateway from DPOD (optional)
- A second set of validations
- Secure-Restore to the target device