Adaptec iSA1500 User Guide - Page 173

enable all | name_list, info

Page 173 highlights

Using CLI enable all | name_list Enable the connections listed in the name_list list so they can now be used. If all is used, every connection will be enabled. info Show information about the known connections. If the name_list list is supplied, information about just those connections will be shown; otherwise information about all the connections will be shown. If the connection is not established, the information about the Local end will be omitted and the Remote end address will be blank for dynamic and opportunistic connections. The subnet line will only be shown for network connections list [[up | down] [enabled | disabled] [dynamic | host | network | opportunistic] [psk | rsa | x509] [interface_list] List all of the connections if there are no filters. Otherwise list connections depending on their type, whether they are enabled, up and the policy they have. If multiple filters are given, only those connections which satisfy all of the filters will be listed. The contents of the Remote end column will depend on the type of connection. ipsec policy parameters The parameters are used by the create and some other commands. They control how the keys and certificates are retrieved from remote servers. rsa remote_host username [password password] location [name name] Use File Transfer Protocol (FTP) to import an RSA key from the remote server defined by the ip_host parameter remote_host. username is the name used to log onto the server and location is the full pathname of the key's public file. Usually the CLI will prompt for the password, although it can be given as the value for the optional password parameter. The local name of the key will normally be derived from the location value but this can be overridden by the name parameter. 8-34

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

8-34
Using CLI
enable all |
name_list
Enable the connections listed in the
name_list
list so they can
now be used. If
all
is used, every connection will be enabled.
info
Show information about the known connections. If the
name_list
list is supplied, information about just those connections will be
shown; otherwise information about all the connections will be
shown.
If the connection is not established, the information about the
Local end will be omitted and the Remote end address will be
blank for dynamic and opportunistic connections. The subnet line
will only be shown for network connections
list [[up | down] [enabled | disabled] [dynamic | host | network |
opportunistic] [psk | rsa | x509] [
interface_list
]
List all of the connections if there are no filters. Otherwise list
connections depending on their type, whether they are enabled, up
and the policy they have. If multiple filters are given, only those
connections which satisfy all of the filters will be listed.
The contents of the Remote end column will depend on the type of
connection.
ipsec policy parameters
The parameters are used by the create and some other commands.
They control how the keys and certificates are retrieved from
remote servers.
rsa
remote_host username
[password
password
]
location
[name
name
]
Use File Transfer Protocol (FTP) to import an RSA key from the
remote server defined by the
ip_host
parameter
remote_host.
username
is the name used to log onto the server and
location
is the full pathname of the key's public file. Usually the CLI will
prompt for the password, although it can be given as the value for
the optional
password
parameter. The local name of the key will
normally be derived from the
location
value but this can be
overridden by the
name
parameter.