564
C
HAPTER
20: F
ILE
M
ANAGEMENT
C
OMMANDS
backup
Creates an archive of WX system files and optionally, user file, in Unix
tape archive
(
tar
) format.
Syntax
backup system
[tftp:/ip-addr/]filename [all |
critical]
Defaults
— All.
Access
— Enabled.
History
—.
Usage
— You can create an archive located on a TFTP server or in the
switch’s nonvolatile storage. If you specify a TFTP server as part of the
filename, the archive is copied directly to the TFTP server and not stored
locally on the switch.
Use the
critical
option if you want to back up or restore only the
system-critical files required to operate and communicate with the
switch. Use the
all
option if you also want to back up or restore WebAAA
pages, backup configuration files, image files, and any other files stored
in the user files area of nonvolatile storage.
The maximum supported file size is 32 MB. If the file size of the tarball is
too large, delete unnecessary files (such as unneeded copies of system
image files) and try again, or use the
critical
option instead of the
all
option.
Neither option archives image files or any other files listed in the
Boot
section of
dir
command output. The
all
option archives image files only if
they are present in the user files area.
Archive files created by the
all
option are larger than files created by the
critical
option. The file size depends on the files in the user area, and the
file can be quite large if the user area contains image files.
System Backup
and Restore
backup
on page 564
restore
on page 583
Table 102
File Management Commands by Usage (continued)
Type
Command
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...