How Do I Save an ACL Before Modifing a Cisco Switch?

Posted on 2009-12-18
Last Modified: 2012-05-08
How Do I Save an ACL Before Modifing a Cisco Switch?  I have a model 3560.  I want to open the SMTP on a few ports for internal email routing, but first, I want to save the config and the ACL.
Question by:jmarkh68
    LVL 2

    Expert Comment

    you have to setup an tftp server and then you can send it with the command:

    write net
    LVL 2

    Assisted Solution

    you could also use the command:

    show config

    and then copy paste the output to textfile.
    LVL 5

    Expert Comment

    You should also archive switch and router configs regularly anyway.

    Kiwi Cattools does this.

    You just need to set up a login for the program and it will automagically archive configs and list changes on a schedule you define.
    LVL 34

    Accepted Solution


    I advise to do the following:

    sh access-list

    and it shows lines with number
    you able to put command for example:

    sh access-lists
    Extended IP access list 110
        10 permit tcp any eq 1723 any
        20 permit tcp any eq www any

    conf t
    ip access-list externded 110
     15  permit tcp any eq 161 any

    LVL 7

    Assisted Solution

    if you don't make any other changes to the switch you can save the whole config to flash and if you want to revert back, use the  to that config. So:

    save the config to flash:
    Switch1#copy run flash          
    Destination filename [running-config]?

    4929 bytes copied in 0.990 secs (4979 bytes/sec)
    then change your acl

    if you want to revert back:
    Switch1#config replace flash:/running-config
    This will apply all necessary additions and deletions
    to replace the current running configuration with the
    contents of the specified configuration file, which is
    assumed to be a complete configuration, not a partial
    configuration. Enter Y if you are sure you want to proceed. ? [no]: y
    Total number of passes: 0
    Rollback Done

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Suggested Solutions

    Title # Comments Views Activity
    Nexus qos question 2 52
    About the "macro description cisco-switch" 2 43
    VLAN between switches 4 74
    L2/L3 Switch configuration 4 94
    The worst thing when starting a new job is when the previous Network Administrator left behind no documentation. How do you get into the devices? If you've been in this situation or just accidently mistyped your password, this article will hopefully…
    I see many questions here on Experts Exchange regarding switch port configurations and trunks. This article is meant for beginners in the subject to help to get basic knowledge about Virtual Local Area Network (VLAN (…
    Need more eyes on your posted question? Go ahead and follow the quick steps in this video to learn how to Request Attention to your question. *Log into your Experts Exchange account *Find the question you want to Request Attention for *Go to the e…
    Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

    732 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now