EasyManua.ls Logo

Avaya 4526FX - Backup Configuration File

Avaya 4526FX
362 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
successfully at
load on boot.
7. Failed command (ACG_CMD_ERR)
The message describes the situation in which a command from the ASCII
Configuration File failed.
The failed command text line number will be in the
message. In the case that the cause of the error is one of the following, the cause
will also be in the message: “Invalid input detected”, “Ambiguous command”,
“Incomplete command”, “Permission denied”, “Not allowed on slave”. In other
words, if one of these messages is displayed in the CLI, it will be in the
ASCII_CMD_ERR message.
Note:
In
some
cases, the ASCII file download is programmed to stop when the first error
is found. Therefore, only this error will be logged.
Example error message:
Type Unit Time
Idx
Src Message
----
I
----
1
------------
00:00:09:33
------
21
---------------
ASCII failed at
line 4. Invalid
input detected.
Backup configuration file
When the switch writes a configuration file to FLASH, the switch writes to the primary
configuration block, updates the CRC16 checksum in the multi configuration area, and then
saves the information to the auxiliary configuration block. This prevents the corruption of the
configuration file if power failure occurs during the write process.
When you boot the switch, if the switch detects corruption in the primary configuration file
(checksum mismatch), the switch sends a message to the system log. The switch then
attempts to load the secondary configuration file from the auxiliary configuration block if the
checksum
is correct, and then sends a message to the system log. If both primary and auxiliary
configurations blocks are corrupted, the switch resets the settings to default and sends a
message to the system log.
The auxiliary configuration block is a mirror of the active configuration block. The backup
configuration feature is transparent to the user.
You can check the system log for messages if you suspect corruption in a configuration file.
Backup configuration file
Configuration — System April 2011 51

Table of Contents

Related product manuals