1018
Working with the Cisco IOS File System, Configuration Files, and Software Images
Working with Software Images
Note:
Instead of using the
copy
privileged EXEC command or the
archive tar
privileged EXEC command, we recommend
using the
archive download-sw
and
archive upload-sw
privileged EXEC commands to download and upload software
image files.
Preparing to Download or Upload an Image File By Using FTP
You can copy images files to or from an FTP server.
The FTP protocol requires a client to send a remote username and password on each FTP request to a server. When you
copy an image file from the switch to a server by using FTP, the Cisco IOS software sends the first valid username in this
list:
The username specified in the
archive download-sw
or
archive upload-sw
privileged EXEC command if a
username is specified.
The username set by the
ip
ftp username
username
global configuration command if the command is configured.
Anonymous.
The switch sends the first valid password in this list:
The password specified in the
archive download-sw
or
archive upload-sw
privileged EXEC command if a
password is specified.
The password set by the
ip ftp password
password
global configuration command if the command is configured.
The switch forms a password named
. The variable
username
is the username
associated with the current session,
switchname
is the configured hostname, and
domain
is the domain of the
switch.
The username and password must be associated with an account on the FTP server. If you are writing to the server, the
FTP server must be properly configured to accept the FTP write request from you.
Use the
ip ftp username
and
ip ftp password
commands to specify a username and password for all copies. Include
the username in the
archive download-sw
or
archive upload-sw
privileged EXEC command if you want to specify a
username only for that operation.
If the server has a directory structure, the image file is written to or copied from the directory associated with the
username on the server. For example, if the image file resides in the home directory of a user on the server, specify that
user's name as the remote username.
Before you begin downloading or uploading an image file by using FTP, do these tasks:
Ensure that the switch has a route to the FTP server. The switch and the FTP server must be in the same subnetwork
if you do not have a router to route traffic between subnets. Check connectivity to the FTP server by using the
ping
command.
If you are accessing the switch through the console or a Telnet session and you do not have a valid username, make
sure that the current FTP username is the one that you want to use for the FTP download. You can enter the
show
users
privileged EXEC command to view the valid username. If you do not want to use this username, create a new
FTP username by using the
ip ftp username
username
global configuration command. This new name will be used
during all archive operations. The new username is stored in NVRAM. If you are accessing the switch through a Telnet
session and you have a valid username, this username is used, and you do not need to set the FTP username. Include
the username in the
archive download-sw
or
archive upload-sw
privileged EXEC command if you want to specify
a username for that operation only.
When you upload an image file to the FTP server, it must be properly configured to accept the write request from
the user on the switch.
For more information, see the documentation for your FTP server.
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...