Guide de référence des commandes NetBackup™

Last Published:
Product(s): NetBackup (11.0.0.1)
  1. Introduction
    1.  
      A propos des commandes de NetBackup
    2.  
      Navigation dans les niveaux de menu
    3.  
      Conventions des commandes NetBackup
    4.  
      Remarques sur les commandes de NetBackup Media Manager
    5.  
      Mises à jour IPv6
  2. Annexe A. Commandes NetBackup
    1.  
      acsd
    2.  
      backupdbtrace
    3.  
      backuptrace
    4.  
      bmrc
    5.  
      bmrconfig
    6.  
      bmrepadm
    7.  
      bmrprep
    8.  
      bmrs
    9.  
      bmrsrtadm
    10.  
      bp
    11.  
      bparchive
    12.  
      bpbackup
    13.  
      bpbackupdb
    14.  
      bpcatarc
    15.  
      bpcatlist
    16.  
      bpcatres
    17.  
      bpcatrm
    18.  
      bpcd
    19.  
      bpchangeprimary
    20.  
      bpcleanrestore
    21.  
      bpclient
    22.  
      bpclimagelist
    23.  
      bpclntcmd
    24.  
      bpclusterutil
    25.  
      bpcompatd
    26.  
      bpconfig
    27.  
      bpdbjobs
    28.  
      bpdbm
    29.  
      bpdgclone
    30.  
      bpdown
    31.  
      bpduplicate
    32.  
      bperror
    33.  
      bpexpdate
    34.  
      bpfis
    35.  
      bpflist
    36.  
      bpgetconfig
    37.  
      bpgetdebuglog
    38.  
      bpimage
    39.  
      bpimagelist
    40.  
      bpimmedia
    41.  
      bpimport
    42.  
      bpinst
    43.  
      bpkeyfile
    44.  
      bpkeyutil
    45.  
      bplabel
    46.  
      bplist
    47.  
      bpmedia
    48.  
      bpmedialist
    49.  
      bpminlicense
    50.  
      bpnbat
    51.  
      bpnbaz
    52.  
      bppficorr
    53.  
      bpplcatdrinfo
    54.  
      bpplclients
    55.  
      bppldelete
    56.  
      bpplinclude
    57.  
      bpplinfo
    58.  
      bppllist
    59.  
      bpplsched
    60.  
      bpplschedrep
    61.  
      bpplschedwin
    62.  
      bppolicynew
    63.  
      bpps
    64.  
      bprd
    65.  
      bprecover
    66.  
      bprestore
    67.  
      bpretlevel
    68.  
      bpschedule
    69.  
      bpschedulerep
    70.  
      bpsetconfig
    71.  
      bpstsinfo
    72.  
      bpstuadd
    73.  
      bpstudel
    74.  
      bpstulist
    75.  
      bpsturep
    76.  
      bptestbpcd
    77.  
      bptestnetconn
    78.  
      bpup
    79.  
      bpverify
    80.  
      cat_convert
    81.  
      cat_export
    82.  
      cat_import
    83.  
      configureCerts
    84.  
      configureMQ
    85.  
      configureWebServerCerts
    86.  
      create_nbdb
    87.  
      csconfig cldinstance
    88.  
      csconfig cldprovider
    89.  
      csconfig meter
    90.  
      csconfig reinitialize
    91.  
      csconfig throttle
    92.  
      duplicatetrace
    93.  
      importtrace
    94.  
      jbpSA
    95.  
      jnbSA
    96.  
      ltid
    97.  
      mklogdir
    98.  
      msdpcldutil
    99.  
      msdpimgutil
    100.  
      nbauditreport
    101.  
      nbcallhomeproxyconfig
    102.  
      nbcatsync
    103.  
      NBCC
    104.  
      NBCCR
    105.  
      nbcertcmd
    106.  
      nbcertupdater
    107.  
      nbcldutil
    108.  
      nbcmdrun
    109.  
      nbcomponentupdate
    110.  
      nbcplogs
    111.  
      nbcredkeyutil
    112.  
      nbdb_admin
    113.  
      nbdb_backup
    114.  
      nbdb_move
    115.  
      nbdb_ping
    116.  
      nbdb_backup
    117.  
      nbdb_move
    118.  
      nbdb2adutl
    119.  
      nbdb_restore
    120.  
      nbdbms_start_stop
    121.  
      nbdc
    122.  
      nbdecommission
    123.  
      nbdelete
    124.  
      nbdeployutil
    125.  
      nbdevconfig
    126.  
      nbdevquery
    127.  
      nbdiscover
    128.  
      nbdna
    129.  
      nbemm
    130.  
      nbemmcmd
    131.  
      nbepicfile
    132.  
      nbfindfile
    133.  
      nbfirescan
    134.  
      nbfp
    135.  
      nbftadm
    136.  
      nbftconfig
    137.  
      nbgetconfig
    138.  
      nbhba
    139.  
      nbholdutil
    140.  
      nbhostidentity
    141.  
      nbhostmgmt
    142.  
      nbhsmcmd
    143.  
      nbhypervtool
    144.  
      nbidpcmd
    145.  
      nbimageshare
    146.  
      nbinstallcmd
    147.  
      nbjm
    148.  
      nbkmiputil
    149.  
      nbkmscmd
    150.  
      nbkmsutil
    151.  
      nblogparser
    152.  
      nbmariadb
    153.  
      nbmysql
    154.  
      nbmlb
    155.  
      nborair
    156.  
      nboracmd
    157.  
      nbpem
    158.  
      nbpemreq
    159.  
      nbmariadb
    160.  
      nbmlb
    161.  
      nbperfchk
    162.  
      nbpgsql
    163.  
      nbplupgrade
    164.  
      nbrb
    165.  
      nbrbutil
    166.  
      nbreplicate
    167.  
      nbrepo
    168.  
      nbrestorevm
    169.  
      nbseccmd
    170.  
      nbserviceusercmd
    171.  
      nbsetconfig
    172.  
      nbshvault
    173.  
      nbsmartdiag
    174.  
      nbsnapimport
    175.  
      nbsnapreplicate
    176.  
      nbsqlcmd
    177.  
      nbsqlite
    178.  
      nbstl
    179.  
      nbstlutil
    180.  
      nbstop
    181.  
      nbsu
    182.  
      nbsvrgrp
    183.  
      netbackup_deployment_insights
    184.  
      resilient_clients
    185.  
      restoretrace
    186.  
      stopltid
    187.  
      tiermover
    188.  
      tldd
    189.  
      tldcd
    190.  
      tpautoconf
    191.  
      tpclean
    192.  
      tpconfig
    193.  
      tpext
    194.  
      tpreq
    195.  
      tpunmount
    196.  
      verifytrace
    197.  
      vltadm
    198.  
      vltcontainers
    199.  
      vlteject
    200.  
      vltinject
    201.  
      vltoffsitemedia
    202.  
      vltopmenu
    203.  
      vltrun
    204.  
      vmadd
    205.  
      vmchange
    206.  
      vmcheckxxx
    207.  
      vmd
    208.  
      vmdelete
    209.  
      vmoprcmd
    210.  
      vmphyinv
    211.  
      vmpool
    212.  
      vmquery
    213.  
      vmrule
    214.  
      vmupdate
    215.  
      vnetd
    216.  
      vssat
    217.  
      vwcp_manage
    218.  
      vxlogcfg
    219.  
      vxlogmgr
    220.  
      vxlogview
    221.  
      W2KOption

Nom

nbseccmd — run the NetBackup Security Configuration service utility

Synopsis

nbseccmd -disableMPA

nbseccmd -drpkgpassphrase

nbseccmd -getNBKeysize [-server master_server_name] [-json]

nbseccmd -getpassphraseconstraints [-workflow | -w NetBackup workflow type] [-json]

nbseccmd -getsecurityconfig [[-autoaddhostmapping] | [-insecurecommunication] | [-dteglobalmode] | [-dtemediamode -mediaserver media_server_name] | [-externalcertidentity] | [-auditretentionperiod]] [-masterserver master_server_name]

nbseccmd -nbcaList [-state value] [-json]

nbseccmd -nbcaMigrate -initiateMigration | -i -keysize key_value -activateNewCA | -a -completeMigration | -c -decommissionCA | -d -fingerprint certificate_fingerprint -summary | -s -hostsPendingTrustPropagation | -pt -syncMigrationDB | -S -hostsPendingRenewal | -pr [-reason description_for_auditing] [-json] [-force] [-quiet]

nbseccmd -resetMFA -userinfo domainType:domainName:userName

nbseccmd -setpassphraseconstraints [-workflow | -w NetBackup workflow type] [-lowercase | -l minimum required lowercase characters] [-uppercase | -u minimum required uppercase characters] [-specialcharacter | -s minimum required special characters] [-digit | -d minimum required digits] [-minlength | -ml minimum required passphrase length]

nbseccmd -setsecurityconfig [[[-autoaddhostmapping | -insecurecommunication] off|on] | [-dteglobalmode 0|1|2] | [-dtemediamode off|on -mediaserver media_server_name}] | [-externalcertidentity dn|cn] | [-auditretentionperiod number_of_days]] [-masterserver master_server_name]

nbseccmd -setuptrustedmaster -add | -update | -remove -masterserver master_server_name -remotemasterserver remote_master_server [-domainname domain_name] [-username username] -fpfile filename

nbseccmd -setuptrustedmaster - add | -update | -remove -info answer_file

nbseccmd -disableLoginAnomalyDetection

nbseccmd -help

 

On UNIX systems, the directory path to this command is /usr/openv/netbackup/bin/admincmd/

On Windows systems, the directory path to this command is install_path\NetBackup\bin\admincmd\

DESCRIPTION

Use the nbseccmd command to establish trust relationships among various primary servers or to change the security configuration of the source primary server.

You must have root or administrator permissions to use this command if NetBackup Access Control (NBAC) is enabled.

Remarque :

If the source or the target primary server version is NetBackup 8.0 or earlier, please refer to the NetBackup Commands Guide for 8.0 or earlier. The command underwent a number of changes for NetBackup 8.1.

OPTIONS

-activatenewca | -a

Use this option to activate the new NetBackup CA that can start issuing NetBackup certificates going forward.

-auditretentionperiod number_of_days

Specifies the number of days to retain user actions for the audit report. If no retention period is indicated, the default audit retention period is 90 days. A value of 0 (zero) indicates that the records are never purged. The value for the auditretentionperiod option must be either 0 or more than 27.

If multiperson authorization is enabled for security properties operation, a ticket is generated. This ticket, when approved, sets the specified audit retention period.

-autoaddhostmapping [on|off]

Use this option to manage the addition of host ID to the host name or the IP addresses that the primary server automatically detects.

Hosts may have multiple host names or IP addresses associated with them. For successful communication among hosts, all relevant host names and IP addresses must be mapped to the respective host IDs. During communication, NetBackup may detect new host names or IP addresses with respect to a host ID.

When you use the -getsecurityconfig, the option takes no parameters, and reports the current setting for the -autoaddhostmapping value.

When you used the -setsecurityconfig option, this option enables or disables automatic host mapping. Use the on parameter to automatically map the host ID to the host name or the IP addresses detected. Disable this action with the off parameter.

If multiperson authorization is enabled for security properties operation and this option is used with the -setsecurityconfig option, a ticket is generated. This ticket, when approved, sets the specified security configuration attribute.

-completeMigration | -c

Use this option to complete the NetBackup CA migration process that cleans up the migration status on the primary server.

-decommissionCA | -d

Use this option to decommission the NetBackup CA with the given fingerprint.

-digit | -d

Specifies the minimum number of digits that are supposed to be in the passphrase.

-disableLoginAnomalyDetection

Disables the log on anomaly detection for all domain users. Only privileged users such as root or administrator can disable the log on anomaly detection.

-disableMPA

Use this option to disable multi-person authorization for all operations.

-domainname domain_name

Specifies the domain to which the user that is specified in -username belongs. You are prompted to enter a password to validate the credentials of the remote primary server host.

The -domainname option is mandatory for a target primary server that uses NetBackup certificates.

-drpkgpassphrase

The -drpkgpassphrase option is used to specify the passphrase that is used to encrypt disaster recovery packages. If a passphrase already exists, it is overwritten.

Remarque :

You must set the passphrase for successful catalog backups. Failure to set the passphrase results in failed catalog backups.

The disaster recovery package stores the identity of the NetBackup primary server and is created during each catalog backup.

These packages are encrypted with the passphrase that you specify here. You must provide this passphrase when you reinstall NetBackup on the primary server after a disaster.

Before using this command, you must run the bpnbat command to log on:

bpnbat -login -loginType WEB

When you set the passphrase, please note:

  • If you have not set the passphrase constraints using the -setpassphraseconstraints option, the passphrase must contain a minimum of eight characters and a maximum of 1024 characters. If the passphrase constraints are set, ensure that all those constraints are met.

  • The existing passphrase and the new passphrase must be different.

  • You must be an authorized user with administrator or root privileges to run the nbseccmd -drpkgpassphrase command.

  • Only the characters that are listed are supported for the passphrase:

    • White spaces

    • Uppercase and lowercase characters (A to Z, a to z)

    • Numbers (0 to 9)

    • The special characters shown: ~ ! @ # $ % ^ & * ( ) _ + - = ` { } [ ] | : ; ' " , . / ? < >

    Attention :

    If you enter an unsupported character, you may face issues during disaster recovery package restore. The passphrase may not be validated and you may not be able to restore the disaster recovery package.

-dteglobalmode 0|1|2

Specifies the data-in-transit encryption mode that is to be set at the global level. The -dteglobalmode option can have the following values:

  • 0 or PREFERRED_OFF: Specifies that the data-in-transit encryption is disabled in the NetBackup domain. Change the NetBackup client setting to override this value.

  • 1 or PREFERRED_ON: Specifies that the data-in-transit encryption is enabled only for NetBackup 9.1 and later clients. Change the NetBackup client setting to override this value.

  • 2 or ENFORCED: Specifies that the data-in-transit encryption is enforced if the NetBackup client setting is either Automatic or On. With this option selected, jobs fail for the NetBackup clients that have the data-in-transit encryption set to Off and for the hosts earlier than 9.1. By default, data-in-transit encryption for NetBackup 9.1 clients is set to Off. For NetBackup 10.0 and later clients data-in-transit encryption is set to Automatic.

If multiperson authorization is enabled for security properties operation and this option is used with the -setsecurityconfig option, a ticket is generated. This ticket, when approved, sets the specified security configuration attribute.

If multifactor authentication is configured for your user account, NetBackup may prompt you to reauthenticate yourself before you perform the -setsecurityconfig operation with the -dteglobalmode option. Reauthenticate yourself by entering the one-time password that is displayed in the authenticator application on your smart device.

-dtemediamode off|on -mediaserver media_server_name

Use this option to disable DTE for a particular media server that is involved in a data transfer job. You can change or view the DTE media server settings with the nbseccmd command on the primary server.

-externalcertidentity dn|cn

Use this option to change the unique certificate identification attribute for external CA-signed certificate. If the option is set to dn, the complete distinguished name of the certificate is treated as a unique attribute. If the option is set to cn, only the common name of the certificate is treated as a unique identification attribute.

If multiperson authorization is enabled for security properties operation and this option is used with the -setsecurityconfig option, a ticket is generated. This ticket, when approved, sets the specified security configuration attribute.

-fingerprint certificate_fingerprint

Specifies the fingerprint of the NetBackup CA that needs to be decommissioned. Use this option with -decommissionCA. The fingerprint can be of SHA-1 or SHA-256 algorithm.

-fpfile filename

This option accepts the root certificate fingerprint information that is required for validating the root certificate of the remote primary server. You can store the fingerprint details in a text file.

-force

Suppresses the confirmation prompts. The -force option skips the check for the hosts awaiting trust propagation or certificate renewal. The -force option activates the new CA and completes the migration. Use this option with -completeMigration and -activatenewCA.

-getNBKeysize master_server_name

Retrieves the key size for the NetBackup CA for the given primary server.

-getpassphraseconstraints workflow

Retrieves the passphrase constraints for a specific workflow. Lists the passphrase constraints for all workflows if the workflow is not specified.

-getsecurityconfig -autoaddhostmapping | -insecurecommunication | externalcertidentity | -auditretentionperiod

Use this option to get the security configuration information for NetBackup. When you use the -autoaddhostmapping option, you get the value for the -autoaddhostmapping option. When you use the -insecurecommunication option, you get the value for the -insecurecommunication option. When you use the -externalcertidentity option, you get the value for the -externalcertidentity option. When you use the -auditretentionperiod option, you get the value for -auditretentionperiod option.

-hostsPendingRenewal | -pr

Use this option to retrieve the list of hosts that require certificate renewal.

-hostspendingtrustpropagation | -pt

Use this option to retrieve the list of hosts that do not have the required CA certificates in their trust stores.

-info answerfile

The -info option accepts the information that is required for setting up a trusted primary server. The information is stored in an answer file, which is a text file. It contains the following entries:

masterserver:
remotemasterserver:
trusttype:
domainname:
username:
password:
token:
fpfile:

The password is optional in the answer file. If you do not provide a password, you are prompted for the password when you run the command.

Remarque :

The trusttype value is valid only for primary servers at version 8.0 and earlier. Possible values for trusttype are mutualtrust, remoteonly, and localonly. The trusttype of localonly does not require a domain name or user credentials.

The entries in your answer file must match the format that is shown in the example.

Example sample file:

masterserver:testmaster1
remotemasterserver:testmaster2
trusttype:mutualtrust
domainname:testdomain
username:Administrator
password:abc123
-initiateMigration | -i

Use this option to initiate the NetBackup certificate authority (CA) migration. It sets up a new CA for NetBackup with the specified certificate key size. The new CA runs in a stand-by mode until the CA is activated or the migration status moves to ACTIVATED.

This operation does not change the root CA.

Before initiating the CA migration, confirm that you do not have media servers with NetBackup versions 8.1.2.1 or earlier that are configured as cloud storage servers. Backups on these media servers fail.

-insecurecommunication [on | off]

Use this option to manage insecure communication within your NetBackup environment. The on parameter enables insecure communication with all NetBackup hosts that are present in the NetBackup environment. Disable insecure communication with the off parameter.

Cohesity implemented new security features in 8.1 which are not present in NetBackup 8.0 and earlier. NetBackup communicates with 8.0 and earlier hosts insecurely. For increased security, upgrade all your hosts to the current version of NetBackup, and then use this option with the on parameter. This action ensures that only secure communication is possible between NetBackup hosts.

If multiperson authorization is enabled for security properties operation and this option is used with the -setsecurityconfig option, a ticket is generated. This ticket, when approved, sets the specified security configuration attribute.

-json

Prints the data in JSON format on a single line.

-keysize key_value

Use this option with the -initiateMigration option to specify the certificate key size for a new NetBackup CA that you want to set up. The key size must be one of the sizes shown: 2048, 4096, or 8192.

Attention :

You should carefully choose the key size for your environment. Choosing a large key size may reduce performance. You should consider all factors to determine the correct key size for your environment.

-lowercase | -l

Specifies the minimum number of lowercase characters that are supposed to be in the passphrase.

-masterserver master_server_name

Specifies the name of the primary server that the user has logged into. Auto Image Replication uses this name for the current primary server or the source primary server.

-minlength | -ml

Specifies the minimum required length of the passphrase.

-nbcamigrate

Migrates the existing NetBackup CA to a new one.

-nbcaList

Use this option to list the NetBackup CAs in your NetBackup domain.

-resetMFA

Reset multifactor authentication (MFA) of a specific NetBackup user. After the reset, the user can reconfigure multifactor authentication, if required. Only privileged users such as root or administrator can reset multifactor authentication for other NetBackup users.

-quiet

Suppresses the prompt message to proceed further. You can use this option with the -initiateMigration option.

-reason description_for_auditing

Specifies the reason that is stored in the audit record for this operation.

-remotemasterserver remote_master_server

Specifies the name of the remote primary server with whom the trust is to be established. Auto Image Replication uses this name for the target primary server.

-remoteonly | -localonly | -mutualtrust

Specifies the way that a trust must be established. Either the local primary (source) trusts the remote primary (target) or vice versa. If neither of these options is specified, a two-way trust (-mutualtrust) is established.

-setpassphraseconstraints

Sets the passphrase constraints for a specific NetBackup workflow. For example disaster recovery (DR) package.

-setsecurityconfig -autoaddhostmapping | -insecurecommunication | externalcertidentity | -auditretentionperiod number_of_days

Use this option to set the security configuration information for NetBackup. When you use the -autoaddhostmapping option, you set the behavior for the addition of host names and IP addresses. When you use the -insecurecommunication option, you set the behavior for secure communication. When you use the -externalcertidentity option, you set the behavior for unique external certificate identification attribute. When you use the -auditretentionperiod number_of_days option, you specify how long audit records are retained for the audit report.

If multiperson authorization is enabled for security properties operation and -setsecurityconfig option is used with any of the above four options, a ticket is generated. This ticket, when approved, sets the specified security configuration attribute.

If multifactor authentication is configured for your user account, NetBackup may prompt you to reauthenticate yourself before you perform the -setsecurityconfig operation with any of the previous four options. Reauthenticate yourself by entering the one-time password that is displayed in the authenticator application on your smart device.

-setuptrustedmaster -add | -update | -remove

Add, update, or remove inter-domain trust across primary servers. To update a trust relationship, run the -update option on both the source and the target server. Both servers must be on version 8.1. or later. You must use the -update option if after you establish a trust, you upgrade the source or the target primary server to version 8.1 or later. To remove a trusted primary server, the domain, user name, and password are not required.

You can update the trust with external certificate to the trust with NetBackup certificate and vice versa.

You must run the bpnbat command to remove a trusted primary before you can use the -setuptrustedmaster option. Log on locally on the primary server you want to remove and use the bpnbat command as shown: bpnbat -login -loginType WEB

The user that is specified during the bpnbat -login -loginType WEB operation should have permissions equivalent to the Default Security Administrator role in NetBackup RBAC.

To remove the trust that is added using an external certificate, you do not need to run the bpnbat -login command.

If your user account is configured for multifactor authentication on the target host, append the appropriate one-time password to the password.

The NetBackup risk engine detects system anomalies and sends alerts, which lets you take action before a security threat occurs. If your target primary server is configured to detect unusual user sign ins while adding or updating a trusted primary server, a multiperson authorization ticket is created for your setup trust master request. You receive a message similar to the message shown. Refer to the NetBackup Security and Encryption Guide for details on configuration options.

For security reasons, your sign in attempt is placed on hold and a multiperson authorization ticket (ID XX) is opened. Once a security admin approves the ticket, you will be automatically signed in. Alternatively, you can cancel your sign in attempt by pressing CTRL+C.

In this case, the NetBackup administrator of the target primary server must approve the sign in request. Once approved, the trust is established. You can also press Control+C to cancel the trust setup. If you try to establish the trust again, the request may be delayed until the NetBackup administrator of target primary server approves it.

specialcharacter | -s

Specifies the minimum number of special characters that are supposed to be in the passphrase.

-state value

Use this option with the -nbcaList option to retrieve NetBackup CAs of a particular state, for example: ACTIVE, ABANDONED, or DECOMMISSIONED. Use comma-separated states to filter the result with more than one state.

-summary

Retrieves the NetBackup CA migration information. It shows the current NetBackup CA migration status and the fingerprint of the current certificate-issuing NetBackup CA.

-syncMigrationDB | -S

Updates the CA migration database with the current NetBackup CA certificate details.

-uppercase | -u

Specifies the minimum number of uppercase characters that are supposed to be in the passphrase.

-userinfo domainType:domainName:userName

Information of the user for whom you want to reset multifactor authentication. Specify domain type (such as NT, VX, or UNIXPWD), domain name, and username. If the domain type is unixpwd, the domain name can be blank (unixpwd::username). In case of other domain types, the domain name must be provided.

-username username

Specifies the logon user name of the remote primary server host. This option is used with the -domainname option. You are prompted to enter a password to validate the credentials of the remote primary server host. If you specify only the domain name, you are prompted to enter the Authorization Token of the remote primary server.

The -username option is mandatory for the target primary server that uses NetBackup certificate.

-workflow | -w

Specifies the NetBackup workflow for which you want to set a passphrase. For example to set a passphrase for DR package, the value of the -workflow option should be set to DR_PKG.

EXAMPLES

Example 1 - Set up a trusted primary server using user credentials.

nbseccmd -setuptrustedmaster -add -masterserver testmaster1
-remotemasterserver testmaster2 -domainname testdomain -username 
Administrator
Password:******

The SHA1 fingerprint of root certificate is 
C7:87:7F:9D:13:B4:67:F6:D9:65:F4:95:EC:DC:D4:50:8C:20:18:BF.

Are you sure you want to continue using this certificate ? (y/n): y

The validation of root certificate fingerprint is successful.
CA certificate stored successfully from server testmaster2.
testdomain.com.
Host certificate received successfully from server testmaster2.
testdomain.com.
Trusted master operation successful.

Example 2 - Set up a trusted primary server using authentication token.

nbseccmd -setuptrustedmaster -add -masterserver testmaster1
-remotemasterserver testmaster2 -domainname testdomain
Authorization Token:***** 
The SHA1 fingerprint of root certificate is 
C7:87:7F:9D:13:B4:67:F6:D9:65:F4:95:EC:DC:D4:50:8C:20:18:BF.
Are you sure you want to continue using this certificate ? (y/n): y
The validation of root certificate fingerprint is successful.
CA certificate stored successfully from server testmaster2.
testdomain.com.
Host certificate received successfully from server testmaster2.
testdomain.com.
Trusted master operation successful.

Example 3 - Set up a trusted primary server using -fpfile.

nbseccmd -setuptrustedmaster -add -masterserver testmaster1
-remotemasterserver testmaster2 -domainname testdomain -username 
Administrator
-fpfile C:\fp_file

Password:******

The validation of root certificate fingerprint is successful.
CA certificate stored successfully from server testmaster2.
testdomain.com.
Host certificate received successfully from server testmaster2.
testdomain.com.
Trusted master operation successful.

Example 4 - Set up a trusted primary server using an answer file.

nbseccmd -setuptrustedmaster -add -info C:\nbseccmd_answerfile.txt

The validation of root certificate fingerprint is successful.
CA certificate stored successfully from server testmaster2.
testdomain.com.
Host certificate received successfully from server testmaster2.
testdomain.com.
Trusted master operation successful.

Example 5 - Update trust after you upgrade both the source and the primary server to version 8.1 and later.

-setuptrustedmaster -update -masterserver testmaster1 -remotemasterserver 
testmaster2
Authorization Token:
Authenticity of root certificate cannot be established.
The SHA1 fingerprint of root certificate is finger_print_details
Are you sure you want to continue using this certificate ? (y/n): y
The validation of root certificate fingerprint is successful.
CA certificate stored successfully from server testmaster2.
Host certificate received successfully from server testmaster2.
Trusted master operation successful

Example 6 - Remove a trusted primary server.

-setuptrustedmaster -remove -masterserver testmaster2 -remotemasterserver 
testmaster1

Certificate revoke request processed successfully.
Trusted master operation successful

Example 7 - Setup a trusted primary server using target primary servers credential and the target primary server detects an unusual login.

nbseccmd -setuptrustedmaster -add -remotemasterserver primary.server.
netbackup.com -domainname unixpwd -username XYZ 

Password:******* 

NetBackup CA certificate is successfully stored from the primary server 
test01.domain.com. 

For security reasons, your sign in attempt is placed on hold and a 
multiperson authorization ticket (ID 7) is opened. 

Once a security admin approves the ticket, you will be automatically 
signed in. Alternatively, you can cancel your sign in attempt by 
pressing CTRL+C. 

Your sign in request is approved by the administrator. 

Host certificate received successfully from server test01.domain.com. 

The trust setup operation using NetBackup certificate is successful. 

Trusted primary operation successful