Dell PowerEdge M805 User Manual

Page 109

Advertising
background image

Using the CLI

71

To use the copy command, the user specifies the source file and the destination file. For example,
copy tftp://remotehost/pub/backupfile backup-config copies a file from the remote TFTP server to a
local backup configuration file. In this case, if the local configuration file does not exist, then it is
created by the command. If it does exist, it is overwritten. If there is not enough space on the local
file system to accommodate the file, an error is flagged.

Refer to the copy command description in the Layer 2 commands section of the guide for
command details.

Referencing External/Internal File systems

Configuration or software images are copied to or retrieved from remote file systems using TFTP
and XMODEM protocols.

tftp://server-name/path/filename —identifies a file on a remote file system accessible
through the server-name. Trivial file transfer protocol is a simplified FTP and uses a UDP
port instead of TCP and does not have password protection.

xmodem: filename —identifies the file available on the XMODEM connection.

Special System Files

The following special filenames are used to refer to special virtual system files, which are under
control of the system and may not be removed or added. These file names are reserved and may not
be used as user-defined files. When the user copies a local source file into one of these special files
and the source file has an attached file description, it also is copied as the file description for the
special file.

backup-config—This file refers to the backup configuration file.

running-config—This file refers to the configuration file currently active in the system. It
is possible to copy the running-config image to a backup-config file or to the startup-
config file.

startup-config—This file refers to the special configuration image stored in flash memory
which is loaded when the system next reboots. The user may copy a particular
configuration file (remote or local) to this special file name and reboot the system to
force it to use a particular configuration.

image1 & image2 - These files refer to software images. One of these will be loaded when
the system next reboots. Either image1 or image2 can be chosen for the next reboot using
the command boot system.

CLI prevents the user from accidentally copying a configuration image onto a software image and
vice versa.

Management Interface Security

This section describes the minimum set of management interface security measures implemented
by the CLI. Management interface security consists of user account management, user access
control and remote network/host access controls.

Advertising