HP 8/20q HP StorageWorks 8/20q Fibre Channel Switch Command Line Interface Gui - Page 170

command afterwards to save your changes. Dynamic policies cannot be renamed.

Page 170 highlights

rename [policy_old] [policy_new] Renames the policy given by [policy_old] to the policy given by [policy_new]. You must enter the ipsec save command afterwards to save your changes. Dynamic policies cannot be renamed. Examples The following is an example of the ipsec policy create command: 8/20q FC Switch #> admin start 8/20q FC Switch (admin) #> ipsec edit 8/20q FC Switch (admin-ipsec) #> ipsec policy create h2h-sh-sp A list of attributes with formatting will follow. Enter a value or simply press the ENTER key to skip specifying a value. If you wish to terminate this process before reaching the end of the list press 'q' or 'Q' and the ENTER key to do so. Required attributes are preceded by an asterisk. Value (press ENTER to not specify value, 'q' to quit): Description (string value, 0-127 bytes) : Host-to-host: switch->host *SourceAddress (IPv4, IPv6 or hostname/[PrefixLength]) : fe80::2c0:ddff:fe03:d4c1 SourcePort (decimal value, 1-65535) : *DestinationAddress (IPv4, IPv6 or hostname/[PrefixLength]) : fe80::250:daff:feb7:9d02 DestinationPort (decimal value, 1-65535) : *Protocol (decimal value, or keyword) Allowed keywords icmp, icmp6, ip4, tcp, udp or any : any *Direction (1=in, 2=out) : 2 Priority (value, -2147483647 to +214783647) : *Action (1=discard, 2=none, 3=ipsec) : 3 *ProtectionDesired (select one, transport-mode only) 1=ah Authentication Header 2=esp Encapsulating Security Payload 3=both : 2 *espRuleLevel (1=default, 2=use, 3=require) : 3 The security policy has been created. This configuration must be saved with the 'ipsec save' command before it can take effect, or to discard this configuration use the 'ipsec cancel' command. See also ipsec, page 160 ipsec association, page 162 ipsec list, page 165 170 Command Reference

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330

170
Command Reference
rename [policy_old] [policy_new]
Renames the policy given by [policy_old] to the policy given by [policy_new]. You must enter the
ipsec save
command afterwards to save your changes. Dynamic policies cannot be renamed.
Examples
The following is an example of the
ipsec policy create
command:
8/20q FC Switch #> admin start
8/20q FC Switch (admin) #> ipsec edit
8/20q FC Switch (admin-ipsec) #> ipsec policy create h2h-sh-sp
A list of attributes with formatting will follow.
Enter a value or simply press the ENTER key to skip specifying a value.
If you wish to terminate this process before reaching the end of the list
press 'q' or 'Q' and the ENTER key to do so.
Required attributes are preceded by an asterisk.
Value (press ENTER to not specify value, 'q' to quit):
Description
(string value, 0-127 bytes)
:
Host-to-host: switch->host
*SourceAddress
(IPv4, IPv6 or hostname/[PrefixLength])
:
fe80::2c0:ddff:fe03:d4c1
SourcePort
(decimal value, 1-65535)
:
*DestinationAddress (IPv4, IPv6 or hostname/[PrefixLength])
:
fe80::250:daff:feb7:9d02
DestinationPort
(decimal value, 1-65535)
:
*Protocol
(decimal value, or keyword)
Allowed keywords
icmp, icmp6, ip4, tcp, udp or any
:
any
*Direction
(1=in, 2=out)
:
2
Priority
(value, -2147483647 to +214783647)
:
*Action
(1=discard, 2=none, 3=ipsec)
:
3
*ProtectionDesired
(select one, transport-mode only)
1=ah
Authentication Header
2=esp
Encapsulating Security Payload
3=both
:
2
*espRuleLevel
(1=default, 2=use, 3=require)
:
3
The security policy has been created.
This configuration must be saved with the 'ipsec save' command
before it can take effect, or to discard this configuration
use the 'ipsec cancel' command.
See also
ipsec
, page 160
ipsec association
, page 162
ipsec list
, page 165