EasyManua.ls Logo

Patton electronics SmartNode Series - Configuration File Handling

Default Icon
655 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
75
Chapter 6 Configuration file handling
Chapter contents
Introduction..........................................................................................................................................................76
Understanding configuration files ...................................................................................................................76
Factory configuration ............................................................................................................................................78
Configuration file handling task list.......................................................................................................................78
Copying configurations within the local memory ............................................................................................79
Replacing the startup configuration with a configuration from Flash memory ................................................80
Copying configurations to and from a remote storage location ........................................................................81
Replacing the startup configuration with a configuration downloaded from TFTP server ...............................82
Displaying configuration file information .......................................................................................................82
Modifying the running configuration at the CLI .............................................................................................83
Modifying the running configuration offline ...................................................................................................84
Deleting a specified configuration ...................................................................................................................85
Encrypted file download .................................................................................................................................86
Encrypted Configuration Download .........................................................................................................86
Use Cases ..................................................................................................................................................87

Table of Contents