HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Command Reference - Page 127

undelete, the existing file is overwritten. If you enter

Page 127 highlights

Usage guidelines The digest can be used to verify the integrity of the file. For example, you can use this command to calculate the digest of a software image file and compare it with that provided on the HP website to verify whether the file has been tampered with. Examples # Use the SHA-256 algorithm to calculate the digest of file system.bin. sha256sum system.bin SHA256 digest: 0851e0139f2770e87d01ee8c2995ca9e59a8f5f4062e99af14b141b1a36ca152 undelete Use undelete to restore a file from the recycle bin. Syntax undelete file-url Views User view Predefined user roles network-admin Parameters file-url: Specifies the name of the file to be restored, case insensitive. Usage guidelines If another file that has the same name exists in the directory, the system prompts you about whether to overwrite the existing file. If you enter Y, the existing file is overwritten. If you enter N, the command is not executed. Examples # Restore the copy.cfg file, which was moved from the flash: directory to the recycle bin. undelete copy.cfg Undelete flash:/copy.cfg?[Y/N]:y File flash:/copy.cfg undeleted. # Restore the startup.cfg file, which was moved from the flash:/seclog directory to the recycle bin: • Method 1 undelete seclog/startup.cfg Undelete flash:/seclog/startup.cfg?[Y/N]:y File flash:/seclog/startup.cfg undeleted. • Method 2 cd seclog undelete startup.cfg Undelete flash:/seclog/startup.cfg?[Y/N]:y File flash:/seclog/startup.cfg undeleted. 120

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221

120
Usage guidelines
The digest can be used to verify the integrity of the file. For example, you can use this command to
calculate the digest of a software image file and compare it with that provided on the HP website to verify
whether the file has been tampered with.
Examples
# Use the SHA-256 algorithm to calculate the digest of file
system.bin
.
<Sysname> sha256sum system.bin
SHA256 digest:
0851e0139f2770e87d01ee8c2995ca9e59a8f5f4062e99af14b141b1a36ca152
undelete
Use
undelete
to restore a file from the recycle bin.
Syntax
undelete
file
-
url
Views
User view
Predefined user roles
network-admin
Parameters
file-url
: Specifies the name of the file to be restored, case insensitive.
Usage guidelines
If another file that has the same name exists in the directory, the system prompts you about whether to
overwrite the existing file. If you enter
Y
, the existing file is overwritten. If you enter
N
, the command is not
executed.
Examples
# Restore the
copy.cfg
file, which was moved from the
flash:
directory to the recycle bin.
<Sysname>undelete copy.cfg
Undelete flash:/copy.cfg?[Y/N]:y
File flash:/copy.cfg undeleted.
# Restore the
startup.cfg
file, which was moved from the
flash:/seclog
directory to the recycle bin:
Method 1
<Sysname>undelete seclog/startup.cfg
Undelete flash:/seclog/startup.cfg?[Y/N]:y
File flash:/seclog/startup.cfg undeleted.
<Sysname>
Method 2
<Sysname> cd seclog
<Sysname> undelete startup.cfg
Undelete flash:/seclog/startup.cfg?[Y/N]:y
File flash:/seclog/startup.cfg undeleted.