• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 269
  • Last Modified:

Transfer settings from cisco 851 to 881w

Is it okay to transfer settings from Cisco 851 to Cisco 881w? What's the process? If you have a link please post. I will be doing this for a client and I do not know the IOS versions.
  • 3
  • 3
2 Solutions
Your best bet is the take the startup configuation of both routers and using a diff tool see what the differences of the configs are. Then manually copy the configuration section by section the the appropriate places on the new router. The reason for this is that some interface naming conventions may be different, as well as on router being a wireless router too.
bobox00Author Commented:
I have copied both router configs into text files, and now wieveing them side by side in notepad. In the router configs, there is a part that says "Crypto pki trustpoint TP-self-signed..." the certificate numbers and key numbers are different. Should I copy this section over?

old router:
crypto pki trustpoint TP-self-signed-3945127485
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-3945127485
 revocation-check none
 rsakeypair TP-self-signed-3945127485

New router:
crypto pki trustpoint TP-self-signed-2230267329
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-2230267329
 revocation-check none
 rsakeypair TP-self-signed-2230267329

Below the section described above, there is another section that says "Crypto pki certificate chain..." the numbers and alphabets in this section is also different for the routers. Should I copy this over as well?

Old router:
crypto pki certificate chain TP-self-signed-3945127485
 certificate self-signed 01
  30820254 308201BD A0030201 02020101 300D0609 2A864886 F70D0101

  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D

  69666963 6174652D 33393435 31323734 3835301E 170D3130 30333131

  34375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504

  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33

  32373438 3530819F 300D0609 2A864886 F70D0101 01050003 818D0030

  8100BF59 0AE7E207 27205A9D CE0259E1 FBA8BEF7 31DC8492 DF659783

  F6F26DD4 4C0CCBFC E7A69218 824E9DA1 7DEFA716 CA3A0707 513F7D1B

  2FCD39DB 2FC459D7 47F7A391 5D9585C5 B2488C14 3B5D97BF 5C6001F5

  4B8AF9C1 3EDE499E E5E2FE0F 41D3133F 90AA67F0 8FAFB70F 2DA81A00

  8D290203 010001A3 7C307A30 0F060355 1D130101 FF040530 030101FF

  551D1104 20301E82 1C70616C 6174696E 652E6575 726F7065 616E7365

  652E6F72 67301F06 03551D23 04183016 80141E32 FED10366 CFF1CC1A

  6AA07558 48BD301D 0603551D 0E041604 141E32FE D10366CF F1CC1A2E

  A0755848 BD300D06 092A8648 86F70D01 01040500 03818100 5B19A526

  DE4D210B 4B7AA1FC EC997708 E4CDBA91 0C0AE669 AA542D20 018559F5

  F00B2280 CD0DC884 5876E125 1A0679EF B2CB5A66 EFAC985A 3B924F45

  1790B6E1 51A68174 AB5F1C3F 3F426F1F 88B62319 F6DCB2C3 2A9DF011

  B38DF1C7 179509F3 81A464A9 044BD1DE 0526BBA0 16E38A45
username admin privilege 15 secret 5 $1$qH.G$QVP0UufYZTiAD74BF3FDL1

New router:
crypto pki certificate chain TP-self-signed-2230267329
 certificate self-signed 01
  3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 32323330 32363733 3239301E 170D3133 30373133 30313136
  35335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 32333032
  36373332 3930819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100B420 110D2484 9E0BB3C5 AF01373F 38FFE5CF 624DAA33 1F811AE7 5E28ECD5
  7CC5CDE1 2E523003 9613AE8F 65B5098D 33455414 FF7F3872 DEC85821 D13DCE7F
  9F32AF4A FB2FD376 FCB84437 A822BDFE 007B3FC4 BF5629AB F0D3E6C2 A0052812
  F7BC0DE2 F8FBE838 20A6E705 27ADCD9E 80106560 503942E8 F1915B52 499546E6
  80990203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
  551D2304 18301680 14825F53 B55CDA65 76A2C66A 176BF745 2F6EC893 8A301D06
  03551D0E 04160414 825F53B5 5CDA6576 A2C66A17 6BF7452F 6EC8938A 300D0609
  2A864886 F70D0101 05050003 81810032 BCF753C8 52ACD672 A7E2C896 AC3BADE6
  C136164B AE745A47 976897B2 E6AF5503 D1EE72AF 7ACEE275 D6C4EF2D 61C42451
  2D0A5CC4 CDA99068 E2130FF1 58940A44 1C6244D9 65AC9BFB 64C7E031 5B48C0F8
  7BCB91AC 1123A060 D0E210BA D0716E29 3E94C206 33249051 E020805A C76FE908
  3DD29CF7 8E63DF13 F815CAC3 213710
ip cef
No, you want to generate a new key.

conf t
crypto key generate rsa modulus 1024

1024 is the bit size, but you can make it more if you want such as 2048.
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

Any update?
bobox00Author Commented:
I did not generate a new key and the router replacement failed. Will generate a new key and try the swap another time
bobox00Author Commented:

Featured Post

[Webinar] Kill tickets & tabs using PowerShell

Are you tired of cycling through the same browser tabs everyday to close the same repetitive tickets? In this webinar JumpCloud will show how you can leverage RESTful APIs to build your own PowerShell modules to kill tickets & tabs using the PowerShell command Invoke-RestMethod.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now