194 Command reference
security
Description
Opens a Security Edit session in which to manage the security database on a switch.
Authority
Admin session. The operands
active
,
history
,
limits
, and
list
are available without an
Admin session.
Syntax
security
active
cancel
clear
edit
history
limits
list
restore
save
Operands
active
Displays the active security set, its groups, and group members. This operand does not require an
Admin session.
cancel
Closes a Security Edit session without saving changes. To open a Security Edit session, use the
edit
operand.
clear
Clears all inactive security sets from the volatile edit copy of the security database. This operand
does not affect the non-volatile security database. However, if you enter the
security clear
command followed by the
security save
command, the non-volatile security database will
be cleared from the switch.
NOTE:
The preferred method for clearing the security database from the switch is the
reset security
command.
edit
Initiates a Security Edit session in which to make changes to the security database. A Security Edit
session enables you to use the
group
and
securityset
commands to create, add, and delete
security sets, groups, and group members. To close a Security Edit session and save changes,
enter the
security save
command. To close a Security Edit session without saving changes,
enter the
security cancel
command.
history
Displays history information about the security database and the active security set, including the
account name that made changes and when those changes were made. This operand does not
require an Admin session.
limits
Displays the current totals and the security database limits for the number of security sets, groups,
members per group, and total members. This operand does not require an Admin session.
list
Displays all security sets, groups, and group members in the security database. This operand
does not require an Admin session.
Summary of Contents for 8/20q
Page 14: ...14 About this guide ...
Page 20: ...20 Command line interface usage ...
Page 24: ...24 User account configuration ...
Page 38: ...38 Network configuration ...
Page 90: ...90 Connection security configuration ...
Page 100: ...100 Device security configuration ...
Page 104: ...104 RADIUS server configuration ...
Page 110: ...110 Event log configuration ...
Page 130: ...130 Simple Network Management Protocol configuration ...
Page 322: ...322 Command reference ...
Page 332: ...332 Index ...