Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Limitations and prerequisites
  2. input the source and target gateways details
  3. Pre-Backup Validations (for example, if the target gateway is available at this point - check if the firmware levels are identical)
  4. Secure-Backup of the source gateway
  5. Removal of the source gateway from DPOD (optional)
  6. A second set of validations 
  7. Secure-Restore to the target device

...