Solved

show running-config or show tac?

Posted on 2008-06-22
7
1,353 Views
Last Modified: 2010-05-05
hey all,

i want to get the cisco configuration file which one is better? in terms of the completeness..
show running-config or show tac?
0
Comment
Question by:kecoak
7 Comments
 
LVL 2

Expert Comment

by:Taurus042
ID: 21844811
Haven't heard of the command "show tac" but I also haven't run any PIX newer than 6.3.

I have always used write terminal (which is the same as show running-config) and have never had any problems restoring a config.
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 21844820
Ive no Idea what sho tac does?

But the most complere config will be shown with a

more system:running-config

command :)
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 21844823
the command above shows the shared secrets etc that are usually blanked out :)
0
What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 57

Expert Comment

by:Pete Long
ID: 21844855
>>i want to get the cisco configuration file which one is better

Though re-reading your question, are you simply trying to back the config up? if so see my website here http://www.petenetlive.com/Tech/Firewalls/Cisco/backuprestore.htm
0
 
LVL 28

Accepted Solution

by:
Jan Springer earned 500 total points
ID: 21845762
The command is "show tech".  You don't need this for backup.  This is specifically for trouble-shooting problems.

Make sure that any changes that have been made are committed by typing:
  copy run start

Then do a "show start" to get the complete config.
0
 
LVL 3

Expert Comment

by:AugustTen
ID: 21847970
Hi, you should use 'sh running-config all' to list the complete configuration, including default settings.
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 32644503
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Suggested Solutions

Cisco Pix/ASA hairpinning The term, hairpinning, comes from the fact that the traffic comes from one source into a router or similar device, makes a U-turn, and goes back the same way it came. Visualize this and you will see something that looks …
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now