![background image](http://html1.mh-extra.com/html/patton-electronics/smartnode-series/smartnode-series_software-configuration-manual_4048643075.webp)
75
Chapter 6
Configuration file handling
Chapter contents
Introduction
..........................................................................................................................................................76
Understanding configuration files
...................................................................................................................76
Factory configuration
............................................................................................................................................78
Configuration file handling task list
.......................................................................................................................78
Copying configurations within the local memory
............................................................................................79
Replacing the startup configuration with a configuration from Flash memory
................................................80
Copying configurations to and from a remote storage location
........................................................................81
Replacing the startup configuration with a configuration downloaded from TFTP server
...............................82
Displaying configuration file information
.......................................................................................................82
Modifying the running configuration at the CLI
.............................................................................................83
Modifying the running configuration offline
...................................................................................................84
Deleting a specified configuration
...................................................................................................................85
Encrypted file download
.................................................................................................................................86
Encrypted Configuration Download
.........................................................................................................86
Use Cases
..................................................................................................................................................87