198 Using the CLI
Special System Files
The following special filenames are used to refer to special virtual system files,
which are under control of the system and may not be removed or added.
These file names are reserved and may not be used as user-defined files.
When the user copies a local source file into one of these special files and the
source file has an attached file description, it also is copied as the file
description for the special file.
backup-config
— This file refers to the backup configuration file.
running-config
— This file refers to the configuration file currently active
in the system. It is possible to copy the running-config image to a backup-
config file or to the startup-config file.
startup-config
— This file refers to the special configuration image stored
in flash memory which is loaded when the system next reboots. The user
may copy a particular configuration file (remote or local) to this special file
name and reboot the system to force it to use a particular configuration.
image1 & image2
— These files refer to software images. One of these will
be loaded when the system next reboots. Either image1 or image2 can be
chosen for the next reboot using the command
boot system.
CLI prevents the user from accidentally copying a configuration image onto a
software image and vice versa.
Management Interface Security
This section describes the minimum set of management interface security
measures implemented by the CLI. Management interface security consists
of user account management, user access control and remote network/host
access controls.
CLI through Telnet, SSH, Serial Interfaces
The CLI is accessible through a local serial interface, the service port (out-of-
band interface), or in-band interfaces. Since the serial interface requires a
physical connection for access, it is used if all else fails. The serial interface is
the only interface from which the user may access the Easy Setup Wizard. It
is the only interface that the user can access if the remote authentication
servers are down and the user has not configured the system to revert to local
managed accounts.
The following rules and specifications apply to these interfaces:
2CSPC4.XCT-SWUM2XX1.book Page 198 Monday, October 3, 2011 11:05 AM