3Com Switch 8800 Advanced Software V5 Configuration Guide

82
TFTP CONFIGURATION
When configuring TFTP, go to these sections for information you are interested in:
“TFTP Overview” on page 1045
“Configuring the TFTP Client” on page 1045
“Displaying and Maintaining the TFTP Client” on page 1047
“TFTP Client Configuration Examples” on page 1047
TFTP Overview The trivial file transfer protocol (TFTP) provides functions similar to those provided
by FTP, but it is not as complex as FTP in interactive access interface and
authentication. Therefore, it is more suitable where complex interaction is not
needed between client and server.
TFTP uses the UDP service for data delivery. In TFTP, file transfer is initiated by the
client.
In a normal file downloading process, the client sends a read request to the TFTP
server, receives data from the server, and then sends the acknowledgement to the
server.
In a normal file uploading process, the client sends a write request to the TFTP
server, sends data to the server, and receives the acknowledgement from the
server.
TFTP transfers files in two modes: binary for programming files and ASCII for text
files.
n
Only the TFTP client service is available with your device at present.
Configuring the TFTP
Client
When a device acts as a TFTP client, you can upload files on the device to a TFTP
server and download files from the TFTP server to the local device. You can use
either of the following ways to download files:
Normal download: The device writes the obtained files to the storage device
directly. In this way, the original system file will be overwritten and if file
download fails (for example, due to network disconnection), the device cannot
start up normally because the original system file has been deleted.
Secure download: The device saves the obtained files to its memory and does
not write them to the storage device until all user files are obtained. In this way,
if file download fails (for example, due to network disconnection), the device
can still start up because the original system file is not overwritten. This mode is
securer but consumes more memory.