164
Chapter 15 Firmware and configuration file maintenance
N0115789
5
Use the TFTP client (see the example below) to transfer files between the
Business Secure Router and the computer. The file name for the configuration
file is “rom-0” (rom-zero, not capital o).
TFTP command example
The following is an example TFTP command:
tftp [-i] host get rom-0 config.rom
where “i” specifies binary image transfer mode (use this mode when transferring
binary files), “host” is the Business Secure Router IP address, “get” transfers the
file source on the Business Secure Router (rom-0, name of the configuration file
on the Business Secure Router) to the file destination on the computer and
renames it config.rom.
GUI-based TFTP clients
describes some of the fields that appear in GUI-based TFTP clients.
Note:
Telnet connection must be active and the SMT must be in CI
mode before and during the TFTP transfer. For details on TFTP
commands (see
“TFTP command example” on page 164
documentation of your TFTP client program. For UNIX, use “get” to
transfer from the Business Secure Router to the computer and “binary”
to set binary transfer mode.
Table 40
General commands for GUI-based TFTP clients
Command
Description
Host
Enter the IP address of the Business Secure Router. 192.168.1.1 is the
Business Secure Router’s default IP address when shipped.
Send/Fetch
Use Send to upload the file to the Business Secure Router and Fetch to
back up the file on your computer.
Local File
Enter the path and name of the firmware file (*.bin extension) or
configuration file (*.rom extension) on your computer.
Remote File This is the filename on the Business Secure Router. The filename for the
firmware is “ras” and for the configuration file, is “rom-0”.
Summary of Contents for BCM50e
Page 18: ...18 Figures N0115789 ...
Page 22: ...22 Tables N0115789 ...
Page 28: ...28 Preface N0115789 ...
Page 38: ...38 Chapter 1 Getting to know your BCM50e Integrated Router N0115789 ...
Page 44: ...44 Chapter 2 Introducing the SMT N0115789 SMT menus at a glance Figure 6 SMT overview ...
Page 60: ...60 Chapter 4 LAN setup N0115789 ...
Page 82: ...82 Chapter 6 Remote Node setup N0115789 ...
Page 86: ...86 Chapter 7 IP Static Route Setup N0115789 ...
Page 114: ...114 Chapter 9 Network Address Translation NAT N0115789 ...
Page 136: ...136 Chapter 11 Filter configuration N0115789 ...
Page 140: ...140 Chapter 12 SNMP Configuration N0115789 ...
Page 144: ...144 Chapter 13 System security N0115789 ...
Page 172: ...172 Chapter 15 Firmware and configuration file maintenance N0115789 ...
Page 186: ...186 Chapter 17 Remote Management N0115789 ...
Page 206: ...206 Appendix B Triangle Route N0115789 ...
Page 226: ...226 Appendix D PPPoE N0115789 ...
Page 232: ...232 Appendix F N0115789 ...
Page 242: ...242 Appendix G IP subnetting N0115789 ...
Page 304: ...304 Appendix K Log descriptions N0115789 ...
Page 306: ...306 Appendix L Brute force password guessing protection N0115789 ...