Chapter 15 Firmware and configuration file maintenance
165
BCM50e Integrated Router Configuration - Advanced
Chapter 17, “Remote Management,” on page 183
for information about
configurations that disallow TFTP and FTP over WAN.
Restore configuration
This section shows you how to restore a previously saved configuration. Note that
this function erases the current configuration before restoring a previous back up
configuration; do not attempt to restore unless you have a backup configuration
file stored on disk.
FTP is the preferred method for restoring your current computer configuration to
your Business Secure Router since FTP is faster. note that you must wait for the
system to automatically restart after the file transfer is complete.
Restore Using FTP
For details about back up using FTP and TFTP, refer to
Binary
Transfer the file in binary mode.
Abort
Stop transfer of the file.
Warning:
Do not interrupt the file transfer process as this can
permanently damage your Business Secure Router.
Table 40
General commands for GUI-based TFTP clients
Command
Description
Summary of Contents for BCM50e
Page 18: ...18 Figures N0115789 ...
Page 22: ...22 Tables N0115789 ...
Page 28: ...28 Preface N0115789 ...
Page 38: ...38 Chapter 1 Getting to know your BCM50e Integrated Router N0115789 ...
Page 44: ...44 Chapter 2 Introducing the SMT N0115789 SMT menus at a glance Figure 6 SMT overview ...
Page 60: ...60 Chapter 4 LAN setup N0115789 ...
Page 82: ...82 Chapter 6 Remote Node setup N0115789 ...
Page 86: ...86 Chapter 7 IP Static Route Setup N0115789 ...
Page 114: ...114 Chapter 9 Network Address Translation NAT N0115789 ...
Page 136: ...136 Chapter 11 Filter configuration N0115789 ...
Page 140: ...140 Chapter 12 SNMP Configuration N0115789 ...
Page 144: ...144 Chapter 13 System security N0115789 ...
Page 172: ...172 Chapter 15 Firmware and configuration file maintenance N0115789 ...
Page 186: ...186 Chapter 17 Remote Management N0115789 ...
Page 206: ...206 Appendix B Triangle Route N0115789 ...
Page 226: ...226 Appendix D PPPoE N0115789 ...
Page 232: ...232 Appendix F N0115789 ...
Page 242: ...242 Appendix G IP subnetting N0115789 ...
Page 304: ...304 Appendix K Log descriptions N0115789 ...
Page 306: ...306 Appendix L Brute force password guessing protection N0115789 ...