Restoring a Cisco Switch Config from SSH

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
2 hours 8 minutes
Difficulty
Intermediate
CEU/CPE
2
Video Transcription
00:01
a little. Welcome back to infrastructure services. Who is Sai Buri? It will be infected. Friend Darren, Today we're storing a Cisco switch configured from SS Age or Seelye.
00:12
It's going to get started.
00:16
So today we're gonna make her story a fig, SS age or council, Just any seal I sitting.
00:24
So let's go ahead and bring up our boon to T FTP server.
00:29
We're gonna format to configure it to where we can utilize it to where we can just do a copy paste
00:36
so way are still a cessation
00:41
do here
00:44
is I'm gonna do this one. So I see what could fix we have here. So
00:49
do a CEO,
00:53
you know,
00:55
switch for underscore mail.
00:59
Take a look at it here and figure out what lines we need to get rid of. Someone's gonna do control, OK,
01:03
to get rid of
01:07
the ones we don't need here,
01:11
Do so just be cognizant. You'll have to do your critical key. Generate
01:18
again
01:19
for your ssh keys.
01:22
That's fine. These
01:26
we'll do Everything is looking good. So far.
01:30
So the biggest thing here is you want to make sure that it can go line by line and go in and out of the different interfaces. Different, uh,
01:38
difference configuration to pose is so we can do confidence. He here control X y enter cad that file so we can copy paste it here
01:56
so we can do this.
01:57
People copy. It's and
02:01
you can paste it right in. Should go right through
02:07
because you look started.
02:09
It was configured terminal did. No password
02:13
is, uh, Swisher points don't do anything.
02:16
So here is just saying it's already envy. To be transparent
02:22
are caving, seeing CIA goes in and ended archive here it goes out.
02:29
Um,
02:31
it works pretty well.
02:34
Anyway, it really is a symbol is that just the four months could file her config file is to make sure that it can move in and out of those different modes like that.
02:44
Okay, so quiz question for this one. Which of these air considerations that restoring a config through ssh or Seelye and I give you a few seconds?
02:58
Uh, right. Hopefully, the biggest one that you got is D formats. Config Does being pushed C is always a good answer. Never get one wrong with that. B is. You could argue that it is important, but It only takes a few seconds to actually do the pasting
03:14
for that. So it's not as important. What is important and a is very important because if you rss aged and
03:23
and you end up putting an a c 00 n that were blocking you,
03:28
you have to config won't actually go through. So you wanna be cognizant of that when you're building it? Just keep an eye on your A, c l's and
03:36
every two white lines and all that as well.
03:39
But I wasn't today. We just may know restored a config from ssh or Seelye and
03:46
I hope you enjoyed the less today for two CD and next video.
Up Next
Infrastructure Services

This Intermediate networking course will look at some of the more advanced tasks required to maintain a network. We will cover network tunneling, upgrading Cisco IOS to fix patches so we can avoid exploits, and other network troubleshooting tasks.

Instructed By