Skip to main content

10.2.2 Restoring XSCF Settings Information


10.2.2 Restoring XSCF Settings Information
This section describes the procedure for restoring the XSCF settings information that was saved on a USB device in "9.1.2 Saving XSCF Settings Information."
To restore the XSCF settings information, use the restoreconfig command.
This section describes the command examples that restore the XSCF settings information (file name: system.cfg) saved in a USB device or HTTPS server.
For details, see "10.10 Saving/Restoring XSCF Settings Information" in the Fujitsu SPARC M12 and Fujitsu M10/SPARC M10 System Operation and Administration Guide.
Restoring the information from a USB device
XSCF> restoreconfig -v -V file:///media/usb_msd/system.cfg
initiating file transfer from 'file:///media/usb_msd/system.cfg' ... transfer from 'file:///media/usb_msd/system.cfg' to '/ssd/transferred_file.bin'
* Closing connection #0
done
file decoding done.
Configuration backup created on Thu Nov 17 07:28:33 2016
from system 'model_name' with serial number 'serial_number', version '0001'
validating backup configuration data
*** You will need to power-cycle the entire system after
this operation is completed
*** The system data are overwrited in the backup data.
*** Do you want to restore this configuration to your system? [y/n]:y ← (*1)
obtaining lock ... done
requesting XSCF reboot to perform restore ... requested
XSCF>
*1 Enter "y" to restore the XSCF settings information. The XSCF is automatically rebooted to apply the restored setting information to the firmware.
Restoring the information from an HTTPS server
XSCF> restoreconfig -v -V -u user_name https://https_server/system.cfg
initiating file transfer from 'https://https_server/system.cfg' ... transfer from 'https://https_server/system.cfg' to '/ssd/transferred_file.bin'
Password: ← (*1)

* About to connect() to https_server port 443 (#0)
* Trying https_server... * connected
* Connected to https_server (https_server_ip) port 443 (#0)
* Initializing NSS with certpath: /etc/pki/nssdb
* CAfile: /etc/pki/tls/certs/ca-bundle.crt
CApath: none
* Remote Certificate has expired.
* SSL certificate verify ok.
* SSL connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA
* Server certificate:
* subject: E=root@localhost.localdomain,CN=localhost.localdomain,OU=SomeOrganizationalUnit,O=SomeOrganization,L=SomeCity,ST=SomeState,C=--
* start date: Jun 03 12:34:49 2011 GMT
* expire date: Jun 02 12:34:49 2012 GMT
* common name: localhost.localdomain
* issuer: E=root@localhost.localdomain,CN=localhost.localdomain,OU=SomeOrganizationalUnit,O=SomeOrganization,L=SomeCity,ST=SomeState,C=--
* Server auth using Basic with user 'user_name'
< HTTP/1.1 200 OK
< Date: Mon, 24 Oct 2016 02:28:46 GMT
< Server: Apache/2.2.3 (CentOS)
< Last-Modified: Mon, 24 Oct 2016 02:21:16 GMT
< ETag: "108887c-34a3a-be73f00"
< Accept-Ranges: bytes
< Content-Length: 215610
< Connection: close
< Content-Type: text/plain; charset=UTF-8
<
* Closing connection #0
done

file decoding done.
Configuration backup created on Mon Oct 24 11:21:03 2016
from system 'model_name' with serial number 'server_serial', version '0001'
validating backup configuration data
*** You will need to power-cycle the entire system after
this operation is completed
*** The system data are overwrited in the backup data.
*** Do you want to restore this configuration to your system? [y/n]:y
obtaining lock ... done
requesting XSCF reboot to perform restore ...

requested
XSCF>
*1 Enter the login password of the HTTPS server.