8/20q Fibre Channel Switch command line interface guide 195
restore
Restores the volatile security database with the contents of the non-volatile security database. If
the
AutoSave
parameter is
False
, you can use this operand to revert changes to the volatile
security database that were propagated from another switch in the fabric through security set
activation or merging fabrics. See
Table 31
for information about the
AutoSave
parameter.
save
Saves the changes that have been made to the security database during a Security Edit session.
Changes you make to any security set will not take effect until you activate that security set. For
information about activating a security set, see the
securityset
command.
Examples
The following is an example of the
security active
command:
8/20q FC Switch #> security active
Active Security Information
SecuritySet Group GroupMember
----------- ----- -----------
alpha
group1 (ISL)
10:00:00:00:00:10:21:16
Authentication Chap
Primary Hash MD5
Primary Secret ********
Secondary Hash SHA-1
Secondary Secret ********
Binding 0
10:00:00:00:00:10:21:17
Authentication Chap
Primary Hash MD5
Primary Secret ********
Secondary Hash SHA-1
Secondary Secret ********
Binding 0
The following is an example of the
security history
command:
8/20q FC Switch #> security history
Active Database Information
---------------------------
SecuritySetLastActivated/DeactivatedBy Remote
SecuritySetLastActivated/DeactivatedOn day month date time year
Database Checksum 00000000
Inactive Database Information
-----------------------------
ConfigurationLastEditedBy admin@IB-session11
ConfigurationLastEditedOn day month date time year
Database Checksum 00007558
The following is an example of the
security limits
command:
8/20q FC Switch #> security limits
Security Attribute Maximum Current [Name]
------------------ ------- ------- ------
MaxSecuritySets 4 1
MaxGroups 16 2
MaxTotalMembers 1000 19
MaxMembersPerGroup 1000
4 group1
15 group2
Summary of Contents for 8/20q
Page 14: ...14 About this guide ...
Page 20: ...20 Command line interface usage ...
Page 24: ...24 User account configuration ...
Page 38: ...38 Network configuration ...
Page 90: ...90 Connection security configuration ...
Page 100: ...100 Device security configuration ...
Page 104: ...104 RADIUS server configuration ...
Page 110: ...110 Event log configuration ...
Page 130: ...130 Simple Network Management Protocol configuration ...
Page 322: ...322 Command reference ...
Page 332: ...332 Index ...