2010年12月7日星期二

通过scp备份Juniper ScreenOS防火墙配置

netscreen-> get system
Product Name: NetScreen-2000
Serial Number: 00XX0620060000XX, Control Number: 00000000
Hardware Version: 3010(0)-(04), FPGA checksum: 00000000, VLAN1 IP (0.0.0.0)
Software Version: 6.0.0r2.0, Type: Firewall+VPN
OS Loader Version: 1.1.5
Compiled by build_master at: Sat Jul 21 23:24:31 PDT 2007
Base Mac: 0010.dbbf.0c80
File Name: default (screenos_image), Checksum: 9b3bb5db
, Total Memory: 2048MB
先在ScreenOS设备启用SCP:
netscree->set scp enable
以下是一个 SCP 客户端命令的范例,该命令将配置文件从 NetScreen 设备 ( 管理员名称是 netscreen, IP 地址是
10.1.1.1 ) 的闪存中复制到客户端系统的ns_sys_config_backup文件中:
SuSe9:~ # scp netscreen@10.1.1.1:ns_sys_config ns_sys_config_bakcup
The authenticity of host '10.1.1.1 (10.1.1.1)' can't be established.
DSA key fingerprint is 5d:a3:00:47:ab:7d:12:2e:ac:d3:fe:85:ee:70:e6:4c.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '10.1.1.1' (DSA) to the list of known hosts.
netscreen@10.1.1.1's password:
ns_sys_config                           100%  194KB  64.8KB/s   00:03
SuSe9:~ # ls -l ns_sys_config_bakcup-rw-r--r--  1 root root 198913 2008-05-14 17:28 ns_sys_config_bakcup
netscreen-> get file    flash:/$NSBOOT$.BIN              16880510
    flash:/envar.rec                      162
    flash:/license.key                    725
    flash:/ns_sys_config                24318
    flash:/prngseed.bin                    32
    flash:/policy.gz.v                  14514
    flash:/detector2.so                610255

没有评论:

发表评论