Dell S50V Switch User Manual


  Open as PDF
of 1262
 
Force10 Service Agent | 353
Per-recipient, you have a choice of sending FTSA E-mails in clear text or with PGP5 encryption. Messages
to the default recipient are configured for encryption using a public encryption key, as shown in
Figure 16-2.
Create a PGP5 encryption key
Provide Administrator Contact Information
Dell Force10 recommends that you provide administrator contact information so that it can be included in
Type 3 or greater E-mails.
Step Task Command Command Mode
1 Copy the encryption key file to the
internal flash. The key
Force10DefaultPublicKey for the
default recipient is packed with FTOS,
so enable encryption for it, proceed to
Step 3.
copy source-path/file flash://
keyfilename
EXEC Privilege
2 Specify the key with which E-mails to
the recipient will be encrypted.
keyadd keyfilename
CALLHOME<SERVER-LABEL>
3 Encrypt E-mails to the recipient.
encrypt
CALLHOME<SERVER-LABEL>
Step Task
1 Use a PGP5-compatible program such as PGP or GnuPG to generate the public or private key. The user name that
you choose in the program will be the one that you use in the server command.
2 Export the public key to a file.
Task Command Command Mode
Provide the postal service mailing address at which the network
administrator can be contacted.
contact-address
CALLHOME
Provide the E-mail address at which the network administrator can be
contacted.
contact-email
CALLHOME
Provide the name of the network administrator to be contacted upon an
FTSA trigger event.
contact-name
CALLHOME
Include a memo in FTSA messages.
contact-notes
CALLHOME
Provide the phone number of the network administrator to be contacted
upon an FTSA trigger event.
contact-phone
CALLHOME
Note: The contact fields may contain any character, however, be aware that FTSA generates all messages are
XML format, for example <contact-name> </contact-name>, so non-alphanumeric characters might create XML
errors.