Get HPOVApplianceAvailableSecurityMode - HewlettPackard/POSH-HPEOneView GitHub Wiki

HPE OneView 4.10 Library

Get-HPOVApplianceAvailableSecurityMode

Get appliance available security modes.

SYNTAX

Get-HPOVApplianceAvailableSecurityMode[ [-ModeName] <String[]>][ [-ApplianceConnection] <Array>] [<CommonParameters>]

Detailed Description

Use this Cmdlet to get the appliances available security modes and the current mode. Security Modes adjust the allowed security protocols (TLS) and their associated cyphers.

Parameters

-ApplianceConnection <Array>

Aliases [-Appliance]

Specify one or more HPOneView.Appliance.Connection object(s) or Name property value(s).

Default Value: ${Global:ConnectedSessions} | ? Default

Aliases Appliance
Required? False
Position? named
Default value (${Global:ConnectedSessions} | ? Default)
Accept pipeline input? false
Accept wildcard characters?    False

-ModeName <String[]>

The name of the mode to return. Allowed values:

* Legacy
* FIPS
* CNSA

Default: Return all available security modes.

Aliases None
Required? false
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters?    False

<CommonParameters>

This cmdlet supports the common parameters: Verbose, Debug, ErrorAction, ErrorVariable, WarningAction, WarningVariable, OutBuffer, PipelineVariable, and OutVariable. For more information, see about_CommonParameters (http://go.microsoft.com/fwlink/?LinkID=113216)

Input Types

None. You cannot pipe objects to this cmdlet.

Return Values

HPOneView.Appliance.SecurityMode

The available appliance security mode, including which mode is set as the current value.

Examples

 -------------------------- EXAMPLE 1 --------------------------

Get-HPOVApplianceAvailableSecurityMode

Return all available security modes on the appliance.

 -------------------------- EXAMPLE 2 --------------------------

Get-HPOVApplianceAvailableSecurityMode -ModeName CNSA

Return the CNSA available security mode on the appliance.

Related Links


Top
⚠️ **GitHub.com Fallback** ⚠️