Dell PowerConnect 8024 Cli Reference Manual page 133

Cli reference guide
Hide thumbs Also See for PowerConnect 8024:
Table of Contents

Advertisement

To use the copy command, the user specifies the source file and the destination file. For
tftp://remotehost/pub/backupfile backup-config
example, copy
TFTP server to a local backup configuration file. In this case, if the local configuration file does
not exist, then it is created by the command. If it does exist, it is overwritten. If there is not
enough space on the local file system to accommodate the file, an error is flagged.
Refer to the copy command description in the Layer 2 commands section of the guide for
command details.
Referencing External/Internal File systems
Configuration or software images are copied to or retrieved from remote file systems using
TFTP, XMODEM, FTP, SCP, and SFTP protocols.
tftp://server-name/path/filename — identifies a file on a remote file system accessible
through the server-name. Trivial file transfer protocol is a simplified FTP and uses a UDP port
instead of TCP and does not have password protection.
xmodem: filename — identifies the file available on the XMODEM connection.
Special System Files
The following special filenames are used to refer to special virtual system files, which are under
control of the system and may not be removed or added. These file names are reserved and may
not be used as user-defined files. When the user copies a local source file into one of these
special files and the source file has an attached file description, it also is copied as the file
description for the special file.
backup-config — This file refers to the backup configuration file.
running-config — This file refers to the configuration file currently active in the system. It is
possible to copy the running-config image to a backup-config file or to the startup-config file.
startup-config — This file refers to the special configuration image stored in flash memory
which is loaded when the system next reboots. The user may copy a particular configuration
file (remote or local) to this special file name and reboot the system to force it to use a
particular configuration.
image1 & image2 — These files refer to software images. One of these will be loaded when
the system next reboots. Either image1 or image2 can be chosen for the next reboot using the
command boot system.
CLI prevents the user from accidentally copying a configuration image onto a software image
and vice versa.
Management Interface Security
This section describes the minimum set of management interface security measures
implemented by the CLI. Management interface security consists of user account management,
user access control and remote network/host access controls.
copies a file from the remote
Using the CLI
133

Advertisement

Table of Contents
loading

Table of Contents