71Chapter 7 Configuration file handlingChapter contentsIntroduction..........................................................................................................................................................72Understanding configuration files ...................................................................................................................72Factory configuration ............................................................................................................................................74Configuration file handling task list.......................................................................................................................74Copying configurations within the local memory ............................................................................................75Replacing the startup configuration with a configuration from Flash memory ................................................76Copying configurations to and from a remote storage location .......................................................................78Replacing the startup configuration with a configuration downloaded from TFTP server ...............................79Displaying configuration file information .......................................................................................................80Modifying the running configuration at the CLI ............................................................................................80Modifying the running configuration offline ...................................................................................................81Deleting a specified configuration ...................................................................................................................83Encrypted file download .................................................................................................................................83Encrypted Configuration Download .........................................................................................................84Use Cases ..................................................................................................................................................84