Backing Up and Restoring the System
613
To back up the current configuration file named
configuration
and reset
the WX switch to the factory default configuration, type the following
commands:
WX1200#
copy configuration tftp://10.1.1.1/backupcfg
success: sent 365 bytes in 0.401 seconds [ 910 bytes/sec]
WX1200#
clear boot config
success: Reset boot config to factory defaults.
WX1200#
reset system force
...... rebooting ......
The
reset system force
command reboots the switch. The
force
option
immediately restarts the system and reboots. If you do not use the
force
option, the command first compares the running configuration to the
configuration file. If the files do not match, MSS does not restart the WX
switch but instead displays a message advising you to either save the
configuration changes or use the
force
option.
Backing Up and
Restoring the
System
MSS has commands that enable you to easily backup and restore WX
system and user files:
backup system
[
tftp:/
ip-addr
/
]
filename
[
all
|
critical
]
restore system
[
tftp:/
ip-addr
/
]
filename
[
all
|
critical
]
[
force
]
The
backup
command creates an archive in Unix
tape archive
(
tar
)
format.
The
restore
command unzips an archive created by the
backup
command and copies the files from the archive onto the switch. If a file in
the archive has a counterpart on the switch, the archive version of the file
replaces the file on the switch. The
restore
command does not delete
files that do not have counterparts in the archive. For example, the
command does not completely replace the user files area. Instead, files in
the archive are added to the user files area. A file in the user area is
replaced only if the archive contains a file with the same name.
You can create or unzip an archive located on a TFTP server or in the
switch’s nonvolatile storage. If you specify a TFTP server as part of the
filename with the
backup
command, the archive is copied directly to the
TFTP server and not stored locally on the switch.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...