
Chapter 4
| System Management Commands
File Management
– 123 –
◆
The destination file name should not contain slashes (\ or /), and the maximum
length for file names is 32 characters for files on the switch or 127 characters for
files on the server. (Valid characters: A-Z, a-z, 0-9, “.”, “-”)
◆
The switch supports only two operation code files, but the maximum number
of user-defined configuration files is 16.
◆
You can use “Factory_Default_Config.cfg” as the source to copy from the
factory default configuration file, but you cannot use it as the destination.
◆
To replace the startup configuration, you must use
startup-config
as the
destination.
◆
The Boot ROM and Loader cannot be uploaded or downloaded from the FTP/
TFTP server. You must follow the instructions in the release notes for new
firmware, or contact your distributor for help.
◆
For information on specifying an https-certificate, see “Replacing the Default
Secure-site Certificate” in the
Web Management Guide
. For information on
configuring the switch to use HTTPS for a secure connection, see the ip http
secure-server command.
◆
When logging into an FTP server, the interface prompts for a user name and
password configured on the remote server. Note that “anonymous” is set as the
default user name.
◆
The reload command will not be accepted during copy operations to flash
memory.
Example
The following example shows how to download new firmware from a TFTP server:
Console#copy tftp file
TFTP server ip address: 10.1.0.19
Choose file type:
1. config: 2. opcode: 2
Source file name: m360.bix
Destination file name: m360.bix
\Write to FLASH Programming.
-Write to FLASH finish.
Success.
Console#
The following example shows how to upload the configuration settings to a file on
the TFTP server:
Console#copy file tftp
Choose file type:
1. config: 2. opcode: 1
Source file name: startup
TFTP server ip address: 10.1.0.99
Summary of Contents for ECS4120-28F
Page 36: ...Contents 36...
Page 38: ...Figures 38...
Page 46: ...Section I Getting Started 46...
Page 70: ...Chapter 1 Initial Switch Configuration Setting the System Clock 70...
Page 86: ...Chapter 2 Using the Command Line Interface CLI Command Groups 86...
Page 202: ...Chapter 5 SNMP Commands Additional Trap Commands 202...
Page 210: ...Chapter 6 Remote Monitoring Commands 210...
Page 216: ...Chapter 7 Flow Sampling Commands 216...
Page 278: ...Chapter 8 Authentication Commands PPPoE Intermediate Agent 278...
Page 360: ...Chapter 9 General Security Measures Port based Traffic Segmentation 360...
Page 384: ...Chapter 10 Access Control Lists ACL Information 384...
Page 424: ...Chapter 11 Interface Commands Power Savings 424...
Page 446: ...Chapter 13 Power over Ethernet Commands 446...
Page 456: ...Chapter 14 Port Mirroring Commands RSPAN Mirroring Commands 456...
Page 488: ...Chapter 17 UniDirectional Link Detection Commands 488...
Page 494: ...Chapter 18 Address Table Commands 494...
Page 554: ...Chapter 20 ERPS Commands 554...
Page 620: ...Chapter 22 Class of Service Commands Priority Commands Layer 3 and 4 620...
Page 638: ...Chapter 23 Quality of Service Commands 638...
Page 772: ...Chapter 25 LLDP Commands 772...
Page 814: ...Chapter 26 CFM Commands Delay Measure Operations 814...
Page 836: ...Chapter 28 Domain Name Service Commands 836...
Page 848: ...Chapter 29 DHCP Commands DHCP Relay Option 82 848...
Page 902: ...Section III Appendices 902...
Page 916: ...Glossary 916...
Page 926: ...CLI Commands 926...
Page 937: ......
Page 938: ...E092017 CS R02...