Restoring a Cisco Switch Config from SSH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 8 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:01
a little. Welcome back to infrastructure services. Who is Sai Buri? It will be infected. Friend Darren, Today we're storing a Cisco switch configured from SS Age or Seelye.
00:12
It's going to get started.
00:16
So today we're gonna make her story a fig, SS age or council, Just any seal I sitting.
00:24
So let's go ahead and bring up our boon to T FTP server.
00:29
We're gonna format to configure it to where we can utilize it to where we can just do a copy paste
00:36
so way are still a cessation
00:41
do here
00:44
is I'm gonna do this one. So I see what could fix we have here. So
00:49
do a CEO,
00:53
you know,
00:55
switch for underscore mail.
00:59
Take a look at it here and figure out what lines we need to get rid of. Someone's gonna do control, OK,
01:03
to get rid of
01:07
the ones we don't need here,
01:11
Do so just be cognizant. You'll have to do your critical key. Generate
01:18
again
01:19
for your ssh keys.
01:22
That's fine. These
01:26
we'll do Everything is looking good. So far.
01:30
So the biggest thing here is you want to make sure that it can go line by line and go in and out of the different interfaces. Different, uh,
01:38
difference configuration to pose is so we can do confidence. He here control X y enter cad that file so we can copy paste it here
01:56
so we can do this.
01:57
People copy. It's and
02:01
you can paste it right in. Should go right through
02:07
because you look started.
02:09
It was configured terminal did. No password
02:13
is, uh, Swisher points don't do anything.
02:16
So here is just saying it's already envy. To be transparent
02:22
are caving, seeing CIA goes in and ended archive here it goes out.
02:29
Um,
02:31
it works pretty well.
02:34
Anyway, it really is a symbol is that just the four months could file her config file is to make sure that it can move in and out of those different modes like that.
02:44
Okay, so quiz question for this one. Which of these air considerations that restoring a config through ssh or Seelye and I give you a few seconds?
02:58
Uh, right. Hopefully, the biggest one that you got is D formats. Config Does being pushed C is always a good answer. Never get one wrong with that. B is. You could argue that it is important, but It only takes a few seconds to actually do the pasting
03:14
for that. So it's not as important. What is important and a is very important because if you rss aged and
03:23
and you end up putting an a c 00 n that were blocking you,
03:28
you have to config won't actually go through. So you wanna be cognizant of that when you're building it? Just keep an eye on your A, c l's and
03:36
every two white lines and all that as well.
03:39
But I wasn't today. We just may know restored a config from ssh or Seelye and
03:46
I hope you enjoyed the less today for two CD and next video.
Up Next