Cisco Systems 2955 Switch User Manual


 
B-8
Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide
OL-10101-02
Appendix B Working with the Cisco IOS File System, Configuration Files, and Software Images
Working with Configuration Files
To use the configuration file for another switch. For example, you might add another switch to your
network and want it to have a configuration similar to the original switch. By copying the file to the
new switch, you can change the relevant parts rather than recreating the whole file.
To load the same configuration commands on all the switches in your network so that all the
switches have similar configurations.
You can copy (upload) configuration files from the switch to a file server by using TFTP, FTP, or RCP.
You might perform this task to back up a current configuration file to a server before changing its
contents so that you can later restore the original configuration file from the server.
The protocol that you use depends on which type of server you are using. The FTP and RCP transport
mechanisms provide faster performance and more reliable delivery of data than TFTP. These
improvements are possible because FTP and RCP are built on and use the TCP/IP stack, which is
connection-oriented.
This section includes this information:
Guidelines for Creating and Using Configuration Files, page B-8
Configuration File Types and Location, page B-9
Creating a Configuration File By Using a Text Editor, page B-9
Copying Configuration Files By Using TFTP, page B-9
Copying Configuration Files By Using FTP, page B-11
Copying Configuration Files By Using RCP, page B-14
Clearing Configuration Information, page B-17
Guidelines for Creating and Using Configuration Files
Creating configuration files can aid in your switch configuration. Configuration files can contain some
or all of the commands needed to configure one or more switches. For example, you might want to
download the same configuration file to several switches that have the same hardware configuration.
Use these guidelines when creating a configuration file:
We recommend that you connect through the port when using configuration files to configure the
switch. If you configure the switch from a Telnet session, IP addresses are not changed, and ports
and modules are not disabled.
If no passwords have been set on the switch, you must set them on each switch by entering the
enable secret secret-password global configuration command. Enter a blank line for this command.
The password is saved in the configuration file as clear text.
If passwords already exist, you cannot enter the enable secret secret-password global configuration
command in the file because the password verification will fail. If you enter a password in the
configuration file, the switch mistakenly attempts to execute the passwords as commands as it
executes the file.
Note The copy {ftp: | rcp: | tftp:} system:running-config privileged EXEC command loads the
configuration files on the switch as if you were entering the commands at the command line. The switch
does not erase the existing running configuration before adding the commands. If a command in the
copied configuration file replaces a command in the existing configuration file, the existing command is
erased. For example, if the copied configuration file contains a different IP address in a particular
command than the existing configuration, the IP address in the copied configuration is used. However,
some commands in the existing configuration might not be replaced or negated. In this case, the resulting