Expiring Today—Celebrate National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Nexus copy command question

Posted on 2014-10-22
1
Medium Priority
?
208 Views
Last Modified: 2014-11-23
Hi Everybody,

In searching Cisco's website for a solution to copy the .bin files on a Nexus 5020 to my TFTP server, I found the following article (see below) and have a question re: the syntax.  
*****************************************************************************************************

switch# copy ftp: bootflash:
Enter source filename: n5000-uk9-kickstart.5.0.2.N2.1.bin
Warning: There is already a file existing with this name. Do you want to
overwrite (y/n)?[n] y

Enter vrf (If no input, current vrf 'default' is considered): management
Enter hostname for the ftp server: 172.1.1.10
Enter username: xxx
Password:
***** Transfer of file Completed Successfully *****
Note: Boot variable kickstart is set to
bootflash:/n5000-uk9-kickstart.5.0.2.N2.1.bin


*****************************************************************************************************

I seem to be misunderstanding the command :     Warning: There is already a file existing with this name. Do you want to overwrite (y/n)?[n] y

If I am copying the file from the Nexus to my tftp server, then why would I be prompted to confirm whether or not I want to overwrite the .bin file located on my Nexus 5020?

Thanks,

R
0
Comment
Question by:rotarypwr
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 6

Accepted Solution

by:
Wylie Bayes earned 1000 total points
ID: 40398364
Because you are doing it wrong.

You need to do "copy bootflash: tftp:" to copy from the cisco device to the tftp server.  If you wanted to copy an image from the tftp server, to the Cisco device, it would be "copy tftp: bootflash:" or just flash: in most cases.

Always remember  copy <source> <destination> .
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
In this article, we’ll look at how to deploy ProxySQL.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question