8/20q Fibre Channel Switch command line interface guide
31
IP security configuration history
To display the IP security configuration history, enter the
ipsec history
command to display a record
of policy and association modifications, as shown in the following example:
8/20q FC Switch #> ipsec history
IPsec Database History
----------------------
ConfigurationLastEditedBy johndoe@OB-session5
ConfigurationLastEditedOn Sat Mar 8 07:14:36 2008
Active Database Checksum 00000144
Inactive Database Checksum 00000385
History includes the following information:
•
Time of the most recent activation and the user account that performed it
•
Time of the most recent modification to the IP security configuration and the user account that made it
•
Checksum for the active and inactive databases
IP security configuration limits
To display a summary of the objects in the IP security configuration and their maximum limits, enter the
ipsec limits
command, as shown in the following example:
8/20q FC Switch #> ipsec limits
Configured (saved) IPsec Information
IPsec Attribute Maximum Current
--------------- ------- -------
MaxConfiguredSAs 512 0
MaxConfiguredSPs 128 0
In an Ipsec Edit session, the
ipsec limits
command displays the number of both configured
associations and policies, plus those created in the edit session but not yet saved.
Managing the security policy database
The security policy database is made up of user-defined policies and dynamic policies (policies created by
the switch). In addition to creating a policy, you can delete, modify, rename, and copy user-defined
policies. Dynamic policies can only be copied.
•
Creating a policy
, page 32
•
Deleting a policy
, page 32
•
Modifying a user-defined policy
, page 33
•
Renaming a user-defined policy
, page 34
•
Copying a policy
, page 34
Summary of Contents for 8/20q
Page 14: ...14 About this guide ...
Page 20: ...20 Command line interface usage ...
Page 24: ...24 User account configuration ...
Page 38: ...38 Network configuration ...
Page 90: ...90 Connection security configuration ...
Page 100: ...100 Device security configuration ...
Page 104: ...104 RADIUS server configuration ...
Page 110: ...110 Event log configuration ...
Page 130: ...130 Simple Network Management Protocol configuration ...
Page 322: ...322 Command reference ...
Page 332: ...332 Index ...