Symantec 10521146 - Network Security 7120 Administration Manual page 306

Administration guide
Hide thumbs Also See for 10521146 - Network Security 7120:
Table of Contents

Advertisement

306 Advanced configuration
Backing up and restoring
Viewing a configuration file
You can view existing configuration files on compact flash, if available, and on
the node hard drive. You can select the file to view from files on both the
compact flash and the hard drive.
To view a configuration file
1
Do one of the following:
On Devices, right-click the 7100 Series node object whose configuration
you wish to view, then click Configuration > 7100 Series Configuration
> View Configuration File.
On Devices, click Configuration > Node > 7100 Series Configuration >
View Configuration File and choose a node from the pull-down list in
Select Node. Click OK.
2
In View Configuration File, click the file you wish to view and click Open.
3
In Configuration File, view the information and click OK.
Reverting to the original installation
You can cause the 7100 Series to revert to the original manufacturer's
installation if you want to completely reconfigure it. All existing configuration
is erased, and the appliance is ready for initial configuration after this process.
Warning: The Revert to Original Install process will completely remove
Symantec Network Security on the appliance. The node will also be removed
from the topology in the Network Security console.
To revert to the original installation
1
Do one of the following:
On Devices, right-click the 7100 Series node object that you wish to
revert, then click Configuration > 7100 Series Configuration > Revert
to Original Install.
On Devices, click Configuration > Node > 7100 Series Configuration >
Revert to Original Install and choose a node from the pull-down list in
Select Node. Click OK.
2
In Revert to Original Install, read the message and do one of the following:
Click Yes to revert the node.
Click No to abort this process.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network security

Table of Contents