Trying to copy running to startup config on PIX

Posted on 2004-10-12
Medium Priority
Last Modified: 2013-11-16
I am trying to copy running config to startup config on a PIX.

I am typing

pixfirewall# copy running-config startup-config

And getting this back.  Is my syntax wrong again?

Usage:  copy capture:<capture-name> tftp://<location>/<pathname> [pcap]
        copy http[s]://[<user>:<password>@]<location>[:<port>]/<pathname>
                flash[:[image | pdm]]
        copy tftp[:[[//location][/pathname]]] flash[:[image | pdm]]
Question by:chadd25
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
LVL 57

Accepted Solution

Pete Long earned 2000 total points
ID: 12287436

write mem
LVL 57

Expert Comment

by:Pete Long
ID: 12287483
write command syntax

User Access Verification

Type help or '?' for a list of available commands.
Password: *****
MPCTPIX# write /?
Usage:  write erase|floppy|mem|terminal|standby
        write net [<tftp_ip>]:<filename>


Author Comment

ID: 12287524
Write mem does work.  Does that essentially do the same as copy running-config startup-config?
LVL 57

Expert Comment

by:Pete Long
ID: 12287621
exactly the same - on old router configs using old IOS's this command works, even in some new routers the old commands still work, but for some reason they kept it on the PIX IOS onstead of the "copy run start" that most Cisco-ites are used to these days

another command to write down is

 write net <ip address>:run

to back up to a TFTP server (use 3C deamon to back up all your configs using this command, then you can restore the firewall in seconds if it goes down :)
And thanQ


Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
Let’s face it: one of the reasons your organization chose a SaaS solution (whether Microsoft Dynamics 365, Netsuite or SAP) is that it is subscription-based. The upkeep is done. Or so you think.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Suggested Courses

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question