75
Chapter 6 Configuration file handling
Chapter contents
Introduction..........................................................................................................................................................76
Understanding configuration files ...................................................................................................................76
Factory configuration ............................................................................................................................................78
Configuration file handling task list.......................................................................................................................78
Copying configurations within the local memory ............................................................................................79
Replacing the startup configuration with a configuration from Flash memory ................................................80
Copying configurations to and from a remote storage location ........................................................................81
Replacing the startup configuration with a configuration downloaded from TFTP server ...............................82
Displaying configuration file information .......................................................................................................82
Modifying the running configuration at the CLI .............................................................................................83
Modifying the running configuration offline ...................................................................................................84
Deleting a specified configuration ...................................................................................................................85
Encrypted file download .................................................................................................................................86
Encrypted Configuration Download .........................................................................................................86
Use Cases ..................................................................................................................................................87