HP 6125XLG R2306-HP 6125XLG Blade Switch Fundamentals Command Reference - Page 133

configuration replace file, Default, Views, Predefined user roles, Parameters, Usage guidelines

Page 133 highlights

undo configuration encrypt Default Views Configuration encryption is disabled. The running configuration is saved to a configuration file without encryption. System view Predefined user roles network-admin Parameters private-key: Encrypts configuration with a private key. Only the encrypting device can decrypt the encrypted configuration file. public-key: Encrypts configuration with a public key. Any device running the same software version as the encrypting device can decrypt the encrypted configuration file. Usage guidelines Configuration encryption enables the device to automatically encrypt a configuration file when saving the running configuration to the file. Do not move or copy a private-key-encrypted configuration file between IRF member devices. Doing so can cause a decryption failure, because the member devices use different private keys. Examples # Enable the public-key method for configuration encryption. system-view [Sysname] configuration encrypt public-key configuration replace file Use configuration replace file to perform configuration rollback. Syntax configuration replace file filename Views System view Predefined user roles network-admin Parameters filename: Specifies the name of the replacement configuration file for configuration rollback. Usage guidelines To replace the running configuration with the configuration in a configuration file without rebooting the device, use the configuration rollback function. This function helps you revert to a previous configuration state or adapt the running configuration to different network environments. To ensure a successful configuration rollback: 126

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221

126
undo configuration encrypt
Default
Configuration encryption is disabled. The running configuration is saved to a configuration file without
encryption.
Views
System view
Predefined user roles
network-admin
Parameters
private-key
: Encrypts configuration with a private key. Only the encrypting device can decrypt the
encrypted configuration file.
public-key
: Encrypts configuration with a public key. Any device running the same software version as
the encrypting device can decrypt the encrypted configuration file.
Usage guidelines
Configuration encryption enables the device to automatically encrypt a configuration file when saving
the running configuration to the file.
Do not move or copy a private-key-encrypted configuration file between IRF member devices. Doing so
can cause a decryption failure, because the member devices use different private keys.
Examples
# Enable the public-key method for configuration encryption.
<Sysname> system-view
[Sysname] configuration encrypt public-key
configuration replace file
Use
configuration replace file
to perform configuration rollback.
Syntax
configuration replace file
filename
Views
System view
Predefined user roles
network-admin
Parameters
filename
: Specifies the name of the replacement configuration file for configuration rollback.
Usage guidelines
To replace the running configuration with the configuration in a configuration file without rebooting the
device, use the configuration rollback function. This function helps you revert to a previous configuration
state or adapt the running configuration to different network environments.
To ensure a successful configuration rollback: