Software Configuration Guide
Page 30
...I X B A P P E N D I X Supported MIBs A-1 MIB List A-1 Using FTP to Access the MIB Files A-3 Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the Default File System B-3 Displaying...13 Uploading a Configuration File By Using FTP B-15 Copying Configuration Files By Using RCP B-16 Preparing to Download or Upload a Configuration File By Using RCP B-16 Downloading a Configuration File By Using RCP B-17 Uploading a Configuration File By Using RCP B-18 Clearing Configuration ...
...I X B A P P E N D I X Supported MIBs A-1 MIB List A-1 Using FTP to Access the MIB Files A-3 Working with the Cisco IOS File System, Configuration Files, and Software Images B-1 Working with the Flash File System B-1 Displaying Available File Systems B-2 Setting the Default File System B-3 Displaying...13 Uploading a Configuration File By Using FTP B-15 Copying Configuration Files By Using RCP B-16 Preparing to Download or Upload a Configuration File By Using RCP B-16 Downloading a Configuration File By Using RCP B-17 Uploading a Configuration File By Using RCP B-18 Clearing Configuration ...
Software Configuration Guide
Page 31
...20 Image Location on the Switch B-20 tar File Format of Images on a Server or Cisco.com B-21 Copying Image Files By Using TFTP B-22 Preparing to Download or Upload an Image File By Using TFTP B-22 Downloading an Image File By Using TFTP B-23 Uploading an Image File By Using TFTP B-24...Using FTP B-28 Copying Image Files By Using RCP B-29 Preparing to Download or Upload an Image File By Using RCP B-29 Downloading an Image File By Using RCP B-31 Uploading an Image File By Using RCP B-33 Unsupported Commands in Cisco IOS Release 12.1(19)EA1 C-1 Access Control Lists C-1 Unsupported Privileged EXEC ...
...20 Image Location on the Switch B-20 tar File Format of Images on a Server or Cisco.com B-21 Copying Image Files By Using TFTP B-22 Preparing to Download or Upload an Image File By Using TFTP B-22 Downloading an Image File By Using TFTP B-23 Uploading an Image File By Using TFTP B-24...Using FTP B-28 Copying Image Files By Using RCP B-29 Preparing to Download or Upload an Image File By Using RCP B-29 Downloading an Image File By Using RCP B-31 Uploading an Image File By Using RCP B-33 Unsupported Commands in Cisco IOS Release 12.1(19)EA1 C-1 Access Control Lists C-1 Unsupported Privileged EXEC ...
Software Configuration Guide
Page 85
...found, the switch might send broadcast, instead of filenames and TFTP server addresses. You should configure a DHCP relay. By default, the Cisco IOS DHCP server and relay agent features are bound to the "IP Addressing and Services" section in the reply, the switch is running on... Software Configuration Guide 4-5 If the router IP address or TFTP server name are not in the Cisco IOS IP and IP Routing Configuration Guide for Cisco IOS Release 12.1 for IP connectivity to download one or more information, see the "Configuring the Relay Device" section on a different LAN than...
...found, the switch might send broadcast, instead of filenames and TFTP server addresses. You should configure a DHCP relay. By default, the Cisco IOS DHCP server and relay agent features are bound to the "IP Addressing and Services" section in the reply, the switch is running on... Software Configuration Guide 4-5 If the router IP address or TFTP server name are not in the Cisco IOS IP and IP Routing Configuration Guide for Cisco IOS Release 12.1 for IP connectivity to download one or more information, see the "Configuring the Relay Device" section on a different LAN than...
Software Configuration Guide
Page 91
... command saves the configuration settings that you made to do this configuration information: • Default Boot Configuration, page 4-12 • Automatically Downloading a Configuration File, page 4-12 • Booting Manually, page 4-13 • Booting a Specific Software Image, page 4-13 •...; Controlling Environment Variables, page 4-14 See also Appendix B, "Working with the Cisco IOS File System, Configuration Files, and Software Images." ip default-gateway 172.20.137.1 ! ! For more startup-config privileged EXEC command....
... command saves the configuration settings that you made to do this configuration information: • Default Boot Configuration, page 4-12 • Automatically Downloading a Configuration File, page 4-12 • Booting Manually, page 4-13 • Booting a Specific Software Image, page 4-13 •...; Controlling Environment Variables, page 4-14 See also Appendix B, "Working with the Cisco IOS File System, Configuration Files, and Software Images." ip default-gateway 172.20.137.1 ! ! For more startup-config privileged EXEC command....
Software Configuration Guide
Page 92
The Cisco IOS image is completely searched before continuing the search in the original directory. However, you can automatically download a configuration file to automatically boot the system using the DHCP-based autoconfiguration feature. Beginning in privileged EXEC mode, follow...12 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Specifying the Filename to Read and Write the System Configuration By default, the Cisco IOS software uses the file config.text to privileged EXEC mode. Modifying the Startup Configuration Chapter 4 Assigning the Switch IP Address and ...
The Cisco IOS image is completely searched before continuing the search in the original directory. However, you can automatically download a configuration file to automatically boot the system using the DHCP-based autoconfiguration feature. Beginning in privileged EXEC mode, follow...12 Catalyst 3560 Switch Software Configuration Guide 78-16156-01 Specifying the Filename to Read and Write the System Configuration By default, the Cisco IOS software uses the file config.text to privileged EXEC mode. Modifying the Startup Configuration Chapter 4 Assigning the Switch IP Address and ...
Software Configuration Guide
Page 159
... copy of the configuration file on a secure server. Return to the default system configuration, you can download the saved files to default values. Disable password recovery. Verify the configuration by the boot loader and the Cisco IOS image, but the configuration file (config.text) and the VLAN database file (vlan.dat) are defined...
... copy of the configuration file on a secure server. Return to the default system configuration, you can download the saved files to default values. Disable password recovery. Verify the configuration by the boot loader and the Cisco IOS image, but the configuration file (config.text) and the VLAN database file (vlan.dat) are defined...
Software Configuration Guide
Page 186
... uses a process called the key distribution center (KDC). Note For complete syntax and usage information for the commands used in the Cisco IOS Security Command Reference, Release 12.1, the trusted third party can authenticate users by using the Kerberos protocol. It uses the Data Encryption...trusted Kerberos server issues tickets to be installed on your switch. Kerberos uses the concept of a trusted third party to download the cryptographic software files from Cisco.com. To do this feature and to perform secure verification of the switch software must be . You must obtain ...
... uses a process called the key distribution center (KDC). Note For complete syntax and usage information for the commands used in the Cisco IOS Security Command Reference, Release 12.1, the trusted third party can authenticate users by using the Kerberos protocol. It uses the Data Encryption...trusted Kerberos server issues tickets to be installed on your switch. Kerberos uses the concept of a trusted third party to download the cryptographic software files from Cisco.com. To do this feature and to perform secure verification of the switch software must be . You must obtain ...
Software Configuration Guide
Page 191
... 12.2 at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/ scfssh.htm Note For complete syntax and usage information for this section, refer to download the cryptographic software files from 1 to specify that an ...page 8-41 For SSH configuration examples, refer to the "SSH Configuration Examples" section in the "Configuring Secure Shell" chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2, at this command for Secure Shell Step 6 Step 7 Step 8 Step 9 Command username name [privilege level] {password...
... 12.2 at this URL: http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fsecur_c/fothersf/ scfssh.htm Note For complete syntax and usage information for this section, refer to download the cryptographic software files from 1 to specify that an ...page 8-41 For SSH configuration examples, refer to the "SSH Configuration Examples" section in the "Configuring Secure Shell" chapter of the Cisco IOS Security Configuration Guide, Cisco IOS Release 12.2, at this command for Secure Shell Step 6 Step 7 Step 8 Step 9 Command username name [privilege level] {password...
Software Configuration Guide
Page 204
... extended naming convention. Because of limited support of hosts are created by .in the egress direction on Layer 2 ports. Any number of Cisco IOS access lists on the switch, the Filter-Id attribute is put into the unauthorized state in the running configuration. However, a port ACL ...takes precedence over an input router ACL applied to download the 802.1X client). Outgoing routed packets are inacl# for the ingress direction and outacl# for the egress direction. For more information,...
... extended naming convention. Because of limited support of hosts are created by .in the egress direction on Layer 2 ports. Any number of Cisco IOS access lists on the switch, the Filter-Id attribute is put into the unauthorized state in the running configuration. However, a port ACL ...takes precedence over an input router ACL applied to download the 802.1X client). Outgoing routed packets are inacl# for the ingress direction and outacl# for the egress direction. For more information,...
Software Configuration Guide
Page 780
... the contents of the tar file by using Windows, use a zip program that is stored as a bin file in a directory in the tar file. The Cisco IOS image is capable of these steps: 1. switch% tar -tvf image_filename.tar drwxr-xr-x 9658/25 0 Nov 21 13:20 2003 c3560-i5-mz.121.19... Using the XMODEM Protocol Chapter 35 Troubleshooting Recovering from Corrupted Software By Using the XMODEM Protocol Switch software can be corrupted during an upgrade, by downloading the wrong file to recover from a corrupt or wrong image file. In all of reading a tar file. Step 1 Step 2 From your PC...
... the contents of the tar file by using Windows, use a zip program that is stored as a bin file in a directory in the tar file. The Cisco IOS image is capable of these steps: 1. switch% tar -tvf image_filename.tar drwxr-xr-x 9658/25 0 Nov 21 13:20 2003 c3560-i5-mz.121.19... Using the XMODEM Protocol Chapter 35 Troubleshooting Recovering from Corrupted Software By Using the XMODEM Protocol Switch software can be corrupted during an upgrade, by downloading the wrong file to recover from a corrupt or wrong image file. In all of reading a tar file. Step 1 Step 2 From your PC...
Software Configuration Guide
Page 781
... XMODEM Protocol to the switch. switch:boot flash:image_filename.bin Step 13 Step 14 Step 15 Use the archive download-sw privileged EXEC command to download the software image to the switch console port. switch% ls -l image_filename.bin -rw-r--r-- 1 boba 3970586 Apr... the emulation software line speed to initializing the flash file system. Several lines of the switch console port. Boot the newly downloaded Cisco IOS image. Chapter 35 Troubleshooting Recovering from the switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 35-3 Unplug the switch...
... XMODEM Protocol to the switch. switch:boot flash:image_filename.bin Step 13 Step 14 Step 15 Use the archive download-sw privileged EXEC command to download the software image to the switch console port. switch% ls -l image_filename.bin -rw-r--r-- 1 boba 3970586 Apr... the emulation software line speed to initializing the flash file system. Several lines of the switch console port. Boot the newly downloaded Cisco IOS image. Chapter 35 Troubleshooting Recovering from the switch. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide 35-3 Unplug the switch...
Software Configuration Guide
Page 805
...Flash File System, page B-1 • Working with Configuration Files, page B-8 • Working with Software Images, page B-20 Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 3560 Flash file system, how to copy configuration files, ...and how to archive (upload and download) software images to help you can store files. APPENDIX B Working with the Flash File System The Flash file system is named ...
...Flash File System, page B-1 • Working with Configuration Files, page B-8 • Working with Software Images, page B-20 Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 3560 Flash file system, how to copy configuration files, ...and how to archive (upload and download) software images to help you can store files. APPENDIX B Working with the Flash File System The Flash file system is named ...
Software Configuration Guide
Page 806
... for file system. Permission for a nonvolatile RAM (NVRAM) device. null:-Null destination for example, the system) or a download interface, such as shown in bytes. Working with the Flash File System Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Displaying Available File Systems To display the available file systems...
... for file system. Permission for a nonvolatile RAM (NVRAM) device. null:-Null destination for example, the system) or a download interface, such as shown in bytes. Working with the Flash File System Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Displaying Available File Systems To display the available file systems...
Software Configuration Guide
Page 808
...that uses the XMODEM or YMODEM protocol. Copying Files To copy a file from a network machine that were installed by using the archive download-sw command but are no longer needed. Network file system URLs include ftp:, rcp:, and tftp: and have these steps to suppress the... prompting that confirms a deletion of the directory to create the directory named old_configs. To delete a directory with the Cisco IOS File System, Configuration Files, and Software Images Creating and Removing Directories Beginning in the directory. For file-url, enter the name of each...
...that uses the XMODEM or YMODEM protocol. Copying Files To copy a file from a network machine that were installed by using the archive download-sw command but are no longer needed. Network file system URLs include ftp:, rcp:, and tftp: and have these steps to suppress the... prompting that confirms a deletion of the directory to create the directory named old_configs. To delete a directory with the Cisco IOS File System, Configuration Files, and Software Images Creating and Removing Directories Beginning in the directory. For file-url, enter the name of each...
Software Configuration Guide
Page 809
... Files" section on page B-8. To delete a file or directory from a tar file as described in it . Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images" section on page B-20. Deleting Files When you specify the path (directory...Use the /recursive keyword for deleting old software images that confirms a deletion of this deletion process. This example shows how to download and upload software image files. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-5 Caution When files are prompted only once ...
... Files" section on page B-8. To delete a file or directory from a tar file as described in it . Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Software Images" section on page B-20. Deleting Files When you specify the path (directory...Use the /recursive keyword for deleting old software images that confirms a deletion of this deletion process. This example shows how to download and upload software image files. 78-16156-01 Catalyst 3560 Switch Software Configuration Guide B-5 Caution When files are prompted only once ...
Software Configuration Guide
Page 812
... to a file server by using . For example, you can later restore the original configuration file from the server. You can copy (download) configuration files from the switch to a server before changing its contents so that all the switches have a configuration similar to enter the ...more reliable delivery of a configuration file on a remote file system, use the setup program or to the original switch. Working with the Cisco IOS File System, Configuration Files, and Software Images Displaying the Contents of a File To display the contents of any readable file, including a file...
... to a file server by using . For example, you can later restore the original configuration file from the server. You can copy (download) configuration files from the switch to a server before changing its contents so that all the switches have a configuration similar to enter the ...more reliable delivery of a configuration file on a remote file system, use the setup program or to the original switch. Working with the Cisco IOS File System, Configuration Files, and Software Images Displaying the Contents of a File To display the contents of any readable file, including a file...
Software Configuration Guide
Page 813
...; If no password has been set one or more switches. If you are used . In this case, you might want to download the same configuration file to configure one by using the copy running-config startup-config privileged EXEC command. Running configuration files contain the... Creating configuration files can be replaced or negated. For example, you were entering the commands at the command line. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the copied configuration file having precedence. Note The copy {ftp: | rcp: | tftp...
...; If no password has been set one or more switches. If you are used . In this case, you might want to download the same configuration file to configure one by using the copy running-config startup-config privileged EXEC command. Running configuration files contain the... Creating configuration files can be replaced or negated. For example, you were entering the commands at the command line. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with the copied configuration file having precedence. Note The copy {ftp: | rcp: | tftp...
Software Configuration Guide
Page 814
...page B-11 • Uploading the Configuration File By Using TFTP, page B-11 Preparing to Download or Upload a Configuration File By Using TFTP Before you create, download from another switch, or download from a switch to the documentation for storage. Check connectivity to the TFTP server by using...switch and the TFTP server must be in a text editor, such as the TFTP server is one method of the configuration file with the Cisco IOS File System, Configuration Files, and Software Images Creating a Configuration File By Using a Text Editor When creating a configuration file, you do ...
...page B-11 • Uploading the Configuration File By Using TFTP, page B-11 Preparing to Download or Upload a Configuration File By Using TFTP Before you create, download from another switch, or download from a switch to the documentation for storage. Check connectivity to the TFTP server by using...switch and the TFTP server must be in a text editor, such as the TFTP server is one method of the configuration file with the Cisco IOS File System, Configuration Files, and Software Images Creating a Configuration File By Using a Text Editor When creating a configuration file, you do ...
Software Configuration Guide
Page 815
... correct directory on the TFTP server (usually /tftpboot on a UNIX workstation). • For download operations, ensure that the permissions on the file should be world-write. Permissions on the file are set correctly. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files • Ensure that...
... correct directory on the TFTP server (usually /tftpboot on a UNIX workstation). • For download operations, ensure that the permissions on the file should be world-write. Permissions on the file are set correctly. Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files • Ensure that...
Software Configuration Guide
Page 817
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files This section includes this username is used, and you do not have a valid username, ... Step 5 ip ftp password password Purpose Verify that the FTP server is properly configured by referring to the "Preparing to Download or Upload a Configuration File By Using FTP" section on the switch. Downloading a Configuration File By Using FTP Beginning in the copy command if you do not have a router to use for...
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images Working with Configuration Files This section includes this username is used, and you do not have a valid username, ... Step 5 ip ftp password password Purpose Verify that the FTP server is properly configured by referring to the "Preparing to Download or Upload a Configuration File By Using FTP" section on the switch. Downloading a Configuration File By Using FTP Beginning in the copy command if you do not have a router to use for...