AB291A Fabric Clustering System Support Guide (12-port Switch), April 2004

Table Of Contents
HP 12-Port 4X Fabric Copper Switch Commands
Administrative Commands
Appendix B
253
Command Modes:
Privileged-execute mode.
Privilege Level:
Unrestricted read-write user.
Usage Guidelines:
You may download image and configuration files from an FTP server to the system chassis. You may also
upload log and configuration files from the system chassis to an FTP server.
Download image files to upgrade system firmware and download configuration files to quickly replicate a
desired configuration. Upload configuration and log files to maintain backups and troubleshoot the system.
Image files require additional processing. After they have been copied onto the system chassis, image files
must be installed before they can be used to initialize the system.
After configuration files are downloaded to the system chassis, they may be specified in the configure
boot-config command and used the next time the system is booted.
The File Transfer Protocol (FTP is used to copy data to and from a remote host. As such, part of the copy
command requires you to include your network user name and password, as well as the host DNS name or IP
address.
The copy and show logging commands are the only CLI commands which recognize <Ctrl>-c. You may enter
<Ctrl>-c during the uploading/downloading process to terminate file transfer in the event network transfer
hangs.
NOTE You can only download image and configuration files. Log files cannot be downloaded. You can
only upload configuration and log files. System-image data cannot be uploaded.
Examples:
HP-IB# copy
ftp://root:infini@15.13.113.96/tmp/HP-AB291A-Release-1.1.3hp-build020.img
image:HP-AB291A-Release-1.1.3hp-build020.img
operation completed successfully
HP-IB#
Table B-61 copy Command Argument Descriptions
Argument Description
usr Network user name for executing the FTP command on the specified
host. The user name is always followed by a colon (:).
passwd Network password for executing the FTP command on the specified
host. The password is always followed by the “at” character (@). A
password is sent as-is, without encryption, to the target host, however,
the system and connected hosts should be protected behind a firewall.
host IP address or DNS name of the remote host system. The host is always
followed by a colon (:).