Coexistence of multiple configuration files, Startup with the configuration file, Saving the current running configuration – H3C Technologies H3C SecPath F1000-E User Manual
Page 177: Introduction, Encrypting a configuration file
2
Coexistence of Multiple Configuration Files
The device can save multiple configuration files on its storage medium. You can save the configuration
used in different networking environments as different configuration files. In this case, when the device
moves between these networking environments, you just need to specify the corresponding configuration
file as the startup configuration file to be used at the next startup of the device and restart the device, so
that the device can adapt to the network rapidly, saving the configuration workload.
Startup with the Configuration File
The device takes the following steps when it starts up:
1.
If you have specified a startup configuration file to be used at the next startup, and this file exists,
the device starts up with this startup configuration file.
2.
If the specified startup configuration file does not exist, the device starts up with null configuration.
Saving the Current Running Configuration
Introduction
To make configuration changes take effect at the next startup of the device, you can save the running
configuration to the startup configuration file to be used at the next startup before the device reboots.
Complete these tasks to save the current configuration:
Task Remarks
Encrypting a Configuration File
Optional
Modes in Saving the Configuration
Required
Encrypting a Configuration File
Configuration file encryption enables you to encrypt a configuration file before saving it by using the
save command. To read the encrypted configuration file, you must decrypt it with a legal key, thus
protecting the configuration file. Two kinds of keys are supported to encrypt a configuration file. You can
select either of them according to your application environment:
•
Private key: A configuration file encrypted by this kind of key can be decrypted and recognized
only by the local device.
•
Public key: A configuration file encrypted by this kind of key can be decrypted and recognized by
all devices supporting this feature.
Follow the steps below to enable configuration file encryption:
To do…
Use the command…
Remarks
Enter system view
system-view
—