User Manual

Table Of Contents
Software: The system software image, which is saved in one of two flash sectors
called images (image1 and image2). The active image stores the active copy,
while the other image stores a second copy. The device boots and runs from the
active image. If the active image is corrupted, the system automatically boots from
the nonactive image. This is a safety feature for faults occurring during the boot
upgrade process. This is the default setting.
Text Configuration: A text-based configuration file enables you to edit a
configured text file (startup-config) offline as needed. The most common
usage of text-based configuration is to upload a working configuration from a
device, edit it offline to personalize it for another similar device (for example,
change the device name or IP address), and download it to that device.
SSH-2 RSA Key PEM File: An SSH-2 Rivest-Shamir-Adelman (RSA) key file (PEM
Encoded).
SSH-2 DSA Key PEM File: An SSH-2 Digital Signature Algorithm (DSA) key file
(PEM Encoded).
SSL Trusted Root Certificate PEM File: An SSL Trusted Root Certificate file (PEM
Encoded).
SSL Server Certificate PEM File: An SSL Server Certificate file (PEM Encoded) to
the device.
SSL DH Weak Encryption Parameter PEM File: An SSL Diffie-Hellman Weak
Encryption Parameter File (PEM Encoded) to the device.
SSL DH Strong Encryption Parameter PEM File: An SSL Diffie-Hellman Strong
Encryption Parameter File (PEM Encoded) to the device.
Script File: A text-based configuration script file. You must use the command-line
interface (CLI) to configure, validate, and activate the script.
CLI Banner: The CLI banner contains the text to be displayed on the CLI before
the login prompt.
IAS Users: The Internal Authentication Server (IAS) users database file. The IAS
user database stores a list of user name and (optional) password values for local
port-based user authentication.
Factory Default Configuration: The factory default configuration file is a
text-based file with the stored factory default configuration.
Public Key Configuration: The public key file used for configuration script
validation.
Public Key Image: The public key file used for code image validation.
Application: Files for an application.
Tech Support Commands File: A file with tech support commands.
7.
If the selection from the File Type menu is Software, the Image Name menu displays
and you must select the software image that must be downloaded to the switch:
Image1: Select image1 to upload image1.
Image2: Select image2 to upload image2.
Main User Manual745Maintenance and
Troubleshooting
AV Line of Fully Managed Switches M4250 Series Main User Manual