
Flex System FC3171 8 Gb SAN Switch Command Line Interface User’s Guide Flex System FC3171 8 Gb SAN Switch Command Line Interface User’s Guide Note: Before using this information and the product it supports, read the general information in “Notices” on page 391. First Edition, April 2015 © Copyright Lenovo 2015. LIMITED AND RESTRICTED RIGHTS NOTICE: If data or software is delivered pursuant a General Services Administration “GSA” contract, use, reproduction, or disclosure is subject to restrictions set forth in Contract No. GS-35F-05925. Contents Chapter 1. Lenovo Flex System FC3171 8 Gb SAN Switch . 1 Related documentation . 1 Notices and statements in this document . 3 Chapter 2. Command line interface usage . 5 Logging in to the switch . 6 Opening and closing an Admin session . 7 Entering commands. 7 Getting help . 7 Setting page breaks . 8 Creating a support file. 9 Downloading and uploading files. 10 Chapter 3. User account configuration . 13 Displaying user account information . 14 Creating user accounts . 15 Modifying user accounts and passwords. 15 Chapter 4. Network and fabric configuration . 17 Displaying the Ethernet network configuration . 17 Displaying name server information . 18 Configuring the Ethernet port . 19 IPv4 configuration . 19 IPv6 configuration . 20 DNS server configuration . 21 Verifying a switch in the network . 22 Verifying and tracing Fibre Channel connections . 22 Managing IP security. 23 IP security concepts . 24 Legacy and Strict security . 24 Security policies and associations . 24 IKE peers and policies . 25 Public key infrastructure . 25 Displaying IP security information . 25 Policy and association information . 25 IKE peer and policy information . 26 Public key infrastructure information . 27 IP security configuration history . 27 IP security configuration limits . 28 Managing the security policy database. 28 Creating a policy. 29 Deleting a policy. 29 Modifying a user-defined policy . 30 Renaming a user-defined policy . 31 Copying a policy. 31 © Copyright Lenovo 2015 v Managing the security association database . 31 Creating an association . 32 Deleting an association . 32 Modifying a user-defined association . 33 Renaming a user-defined association . 34 Copying an association . 34 Managing IKE peers . ..
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages420 Page
-
File Size-