Managing Security Contexts
depends on your location. When you are in the system execution space, the running configuration
consists only of the system configuration; when you are in a context, the running configuration consists
only of that context. For example, you cannot view all running configurations (system plus all contexts)
by entering the show running-config command. Only the current configuration displays.
To change between the system execution space and a context, or between contexts, see the following
commands:
•
•
Managing Security Contexts
This section describes how to manage security contexts, and includes the following topics:
•
•
•
•
•
Removing a Security Context
You can only remove a context by editing the system configuration. You cannot remove the current
admin context, unless you remove all contexts using the clear context command.
If you use failover, there is a delay between when you remove the context on the active unit and when
Note
the context is removed on the standby unit. You might see an error message indicating that the number
of interfaces on the active and standby units are not consistent; this error is temporary and can be
ignored.
Use the following commands for removing contexts:
•
•
Cisco Security Appliance Command Line Configuration Guide
6-12
To change to a context, enter the following command:
hostname# changeto context name
The prompt changes to the following:
hostname/name#
To change to the system execution space, enter the following command:
hostname/admin# changeto system
The prompt changes to the following:
hostname#
Removing a Security Context, page 6-12
Changing the Admin Context, page 6-13
Changing the Security Context URL, page 6-13
Reloading a Security Context, page 6-14
Monitoring Security Contexts, page 6-15
To remove a single context, enter the following command in the system execution space:
hostname(config)# no context name
All context commands are also removed.
To remove all contexts (including the admin context), enter the following command in the system
execution space:
Chapter 6
Adding and Managing Security Contexts
OL-10088-01