Transferring Files Using HTTP or HTTPS



Similar documents
Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway

Terminal Services Overview

System Message Logging

Cisco IronPort Encryption Appliance Release Notes

L2TP Dial-Out Load Balancing and Redundancy

Cisco Unified Attendant Console Backup and Restore Guide

Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix

Constraining IP Multicast in a Switched Ethernet Network

Cisco Unified Wireless IP Phone 7925G Accessory Guide

Cisco Unified Wireless IP Phone 7925G Accessory Guide

Release Notes for Cisco IronPort Security Plug-in 7.1

Cisco Director Class SAN Planning and Design Service

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.

Release Notes for Cisco Support Tools Release 2.4(1)

HTTP 1.1 Web Server and Client

PCI Compliance: Improve Payment Security

Cisco Network Planning Solution Documentation Guide and Supplemental License Agreement

Release Notes for Cisco IronPort Security Plug-in 7.2

Connecting Cisco Serial High-Speed WAN Interface Cards

Cisco Registered Envelope Recipient Guide

Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network

Cisco Data Center Business Continuity Planning Service

Basic Software Configuration Using the Cisco IOS Command-Line Interface

Upgrading to the Cisco ubr7246vxr Universal Broadband Router

Cipher Suites and WEP

Cisco Unified Reporting Administration Guide

Configuring the SA 500 for Active Directory Authentication of VPN Clients 2. Establishing a SSL VPN Connection By Using a Different Port Number 35

Cisco Aironet Dual Band MIMO Low Profile Ceiling Mount Antenna (AIR-ANT2451NV-R)

Accessibility Guidelines for Cisco Unified Contact Center Management Portal

Cisco Unified Computing Virtualization Services

Image Verification. Finding Feature Information. Restrictions for Image Verification

Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix

Cisco Data Center Virtualization Assessment Service

Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements

Authentication on the Cisco IronPort Web Security Appliance

Implementation Note for NetFlow Collectors

Installation and Configuration Guide Cisco Unified CRM Connector for SAP

Cisco Data Center Architecture Assessment Service

RADIUS Server Load Balancing

Cisco Unified Contact Center Express Port Utilization Guide

Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers

User Guide for Cisco Unified MeetingPlace Web Conferencing

Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service

Hardware and System Software Specification for Cisco Unified Web and Interaction Manager

Disaster Recovery System Administration Guide for Cisco Unified Presence Server Release 1.0(3)

Collaboration: Know Your Enthusiasts and Laggards

Cisco Unified CME B-ACD and Tcl Call-Handling Applications

Firewall Authentication Proxy for FTP and Telnet Sessions

Cisco IronPort Hosted and Hybrid Hosted Security Services

Medical Data Exchange A New Approach to Healthcare Interoperability

Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix

Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix

White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange)

BGP Multipath Load Sharing for Both ebgp and ibgp in an MPLS-VPN

Enabling and Monitoring NetFlow on Subinterfaces

How To Create A Security Solution For Retail Banking

FXO, FXS, and E&M Voice Interface Card Support on Cisco 1700 Series Routers

Installation Guide for Cisco Unified ICM/Contact Center Enterprise and Hosted Release 9.0(1)

Release Notes for the Cisco WAN Modeling Tools, Release Patch 1

Calling Name Delivery (CNAM)

Cisco Smart Services for Small and Medium Business: Solutions for Your Success

Cisco Virtual Desktop Infrastructure Planning and Design Service

Cisco Registered Envelope Recipient Guide

Controlling Access to a Virtual Terminal Line

Cisco Registered Envelope Service 4.4 Recipient Guide

How to Register, Start, and Access a Cisco Online Exam

Configuring Secure Socket Layer HTTP

Cisco Registered Envelope Service 4.3 Recipient Guide

End of Sale/End of Life Report Tool Usage Notes for CiscoWorks NCM 1.6

Best Practices for Monitoring Cisco Unity Devices with Cisco Unified Operations Manager

Data Center Infrastructure Design Guide 2.1 Readme File

Cisco Smar t Busines s Communications System IP Phone Por tfolio

Cisco Wide Area Application Services Optimizes Application Delivery from the Cloud

Configuring a Load-Balancing Scheme

Cisco Aironet 5-GHz MIMO 6-dBi Patch Antenna (AIR-ANT5160NP-R)

Encrypted Preshared Key

Flow-Based per Port-Channel Load Balancing

Firewall Stateful Inspection of ICMP

FIPS Level 1 Security Policy for Cisco Secure ACS FIPS Module

Integrating CAD with Thin Client and Virtual Desktop Environments

Cisco Router and Security Device Manager File Management

Cisco Small Business Solutions for Insurance Agencies.

Danish Train Operator Gets Customer Service Back On Track

Cisco Cloud Security: Choosing the Right Security Deployment

Network Security Baseline

Cisco Aironet 5-dBi Omnidirectional Antenna (AIR-ANT2450V-N)

Cisco IOS Flexible NetFlow Overview

Cisco Small Form-Factor Pluggable Modules for Gigabit Ethernet Applications

InformaCast Virtual Appliance Basic Paging

DHCP Server Port-Based Address Allocation

Securing Manufacturing Computing and Controller Assets

Cause Codes and Debug Values

Cisco Unified Contact Center Express Installation Guide

How To Install A Cisco Cisco Cs (Windows) On A Hard Drive With A Harddrive (Windows 3.3) On An External Hard Drive (Windows 2003) On Your Computer (Windows 2007)

ADMINISTRATION GUIDE Cisco Small Business

Cisco Unified CallConnector for Microsoft Office Troubleshooting Guide

Cisco IPICS Dispatch Console User Guide

Analog Channel Re-Creation Using the Digital Service Access Node

Firewall Support for SIP

Connecting to the Firewall Services Module and Managing the Configuration

Transcription:

Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device and a remote HTTP server using the HTTP or HTTP Secure (HTTPS) protocol. HTTP and HTTPS can now be specified as the targets and source locations in Cisco IOS command-line interface (CLI) commands that use file system prefixes such as the copy command. Finding Feature Information For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information for Transferring Files Using HTTP or HTTPS section on page 14. Use Cisco Feature Navigator to find information about platform support and Cisco IOS, and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required. Contents Prerequisites for Transferring Files Using HTTP or HTTPs, page 2 Restrictions for Transferring Files Using HTTP or HTTPs, page 2 Information About File Transfers Using HTTP or HTTPs, page 2 How to Transfer Files Using HTTP or HTTPs, page 2 Configuration Examples for the File Transfer Using HTTP or HTTPs, page 10 Additional References, page 11 Feature Information for Transferring Files Using HTTP or HTTPS, page 14 Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA

Prerequisites for Transferring Files Using HTTP or HTTPs Transferring Files Using HTTP or HTTPS Prerequisites for Transferring Files Using HTTP or HTTPs To copy files to or from a remote HTTP server, your system must support the HTTP client feature, which is integrated in most Cisco IOS software images. The HTTP client is enabled by default. To determine if the HTTP client is supported on your system, issue the show ip http client all command. If you are able to execute the command, the HTTP client is supported. Commands exist for the optional configuration of the embedded HTTP client and for the HTTPS client, but the default configuration is sufficient for using the File Transfer Using HTTP or HTTPS feature. For information on configuring optional HTTP or HTTPS client characteristics, see the Related Documents section on page 12. Restrictions for Transferring Files Using HTTP or HTTPs Existing limitations to the copy command, such as no network-to-network copies, are in effect for the File Transfer Using HTTP or HTTPS feature. Note The copy command in Cisco IOS Release 12.4T does not work in conjunction with older versions of the Apache server software. The Apache server software must be upgraded to version 2.0.49 or later in order to use the copy command. Information About File Transfers Using HTTP or HTTPs To transfer files using HTTP or HTTPS, you should understand the following concept: The File Transfer Using HTTP or HTTPs feature provides the capability to copy files, such as Cisco IOS image files, core files, configuration files, log files, scripts, and so on, to and from a remote server and your local routing device using the Cisco IOS copy command and command-line interface. The HTTP copy operation works in the same way as copying from other remote file systems, such as FTP or TFTP. The HTTP copy operation can use the embedded HTTPS client for HTTP Secure transfers, providing secure and authenticated file transfers within the context of a public key infrastructure (PKI). How to Transfer Files Using HTTP or HTTPs This section contains the following procedures: Configuring HTTP Connection Characteristics for File Transfers, page 3 (as required) Downloading a File from a Remote Server Using HTTP or HTTPs, page 5 (required) Uploading a File to a Remote Server Using HTTP or HTTPS, page 7 (required) Maintaining and Monitoring File Transfers Using HTTP, page 9 (optional) Note To use the File Transfer Using HTTP feature, you may need to specify a username and password for the HTTP connections for those servers that require a username and password to connect. Commands are also available to specify custom connection characteristics, although default settings can be used. The feature also offers commands to monitor and maintain connections and files. 2

Transferring Files Using HTTP or HTTPS How to Transfer Files Using HTTP or HTTPs Configuring HTTP Connection Characteristics for File Transfers SUMMARY STEPS Default values are provided for HTTP File transfers. The following task is used to customize the connection characteristics for your network to specify a username and password, connection preferences, a remote proxy server, and the source interface to be used. 1. enable 2. configure terminal 3. ip http client connection {forceclose idle timeout seconds timeout seconds} 4. ip http client username username 5. ip http client password password 6. ip http client proxy-server {proxy-name ip-address} [proxy-port port-number] 7. ip http client source-interface interface-id 8. do copy running-config startup-config 9. end 3

How to Transfer Files Using HTTP or HTTPs Transferring Files Using HTTP or HTTPS DETAILED STEPS Step 1 Step 2 Command or Action enable Router> enable configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Router# configure terminal Step 3 ip http client connection {forceclose idle timeout seconds timeout seconds} Step 4 Step 5 Router(config)# ip http client connection timeout 15 ip http client username username Router(config)# ip http client username user1 ip http client password password Router(config)# ip http client password letmein Configures characteristics for HTTP client connections to a remote HTTP server for all file transfers: forceclose Disables the default persistent connection. idle timeout seconds Sets the period of time allowed for an idle connection, in a range from 1 to 60 seconds. Default timeout is 30 seconds. timeout seconds Sets the maximum time the HTTP client waits for a connection, in a range from 1 to 60 seconds. Default is 10 seconds. Specifies the username to be used for HTTP client connections that require user authentication. Note You can also specify the username on the CLI when you issue the copy command, in which case the username entered overrides the username entered with this command. See the Downloading a File from a Remote Server Using HTTP or HTTPs: Example section on page 10 for an example. Specifies the password to be used for HTTP client connections that require user authentication. Note You can also specify the password on the CLI when you issue the copy command, in which case the password entered overrides the password entered with this command. See the Downloading a File from a Remote Server Using HTTP or HTTPs: Example section on page 10 for an example. 4

Transferring Files Using HTTP or HTTPS How to Transfer Files Using HTTP or HTTPs Step 6 ip http client proxy-server {proxy-name ip-address} [proxy-port port-number] Step 7 Command or Action Router(config)# ip http client proxy-server edge2 proxy-port 29 ip http client source-interface interface-id Purpose Configures the HTTP client to connect to a remote proxy server for HTTP file system client connections. The optional proxy-port port-number keyword and argument specify the proxy port number on the remote proxy server. Specifies the interface for the source address in all HTTP client connections. Step 8 Step 9 Router(config)# ip http client source-interface Ethernet 0/1 do copy running-config startup-config Router(config)# do copy running-config startup-config end Router(config)# end Router# (Optional) Saves the running configuration as the startup configuration file. The do command allows you to execute privileged EXEC mode commands from global configuration mode. Ends your configuration session and returns the CLI to user EXEC mode. Downloading a File from a Remote Server Using HTTP or HTTPs SUMMARY STEPS Perform this task to download a file from a remote HTTP server using HTTP or HTTPs. The copy command helps you to copy any file from a source to a destination. 1. enable 2. copy [/erase] [/noverify] http://remote-source-url local-destination-url or copy https://remote-source-url local-destination-url 5

How to Transfer Files Using HTTP or HTTPs Transferring Files Using HTTP or HTTPS DETAILED STEPS Step 1 Step 2 Command or Action enable Router> enable copy [/erase] [/noverify] http://remote-source-url local-destination-url or copy https://remote-source-url local-destination-url Router# copy http://user1:mypassword@209.165.202.129:808 0/image_files/c7200-i-mx flash:c7200-i-mx Router# copy copy https://user1:mypassword@209.165.202.129:80 80/image_files/c7200-i-mx flash:c7200-i-mx Purpose Enables privileged EXEC mode. Enter your password if prompted. Copies a file from a remote web server to a local file system using HTTP or HTTPS. /erase Erases the local destination file system before copying. This option is provided on Class B file system platforms with limited memory to allow an easy way to clear local flash memory space. /noverify If the file being copied is an image file, this keyword disables the automatic image verification that occurs after an image is copied. The remote-source-url argument is the location URL (or alias) from which to get the file to be copied, in standard Cisco IOS file system HTTP syntax as follows: http://[[username:password]@] {hostname host-ip}[/filepath]/filename Note The optional username and password arguments can be used to log in to an HTTP server that requires user authentication, in place of configuring the ip http client username and ip http client password global configuration commands to specify these authentication strings. The local-destination-url is the location URL (or alias) to put the copied file, in standard Cisco IOS file system syntax as follows: filesystem:[/filepath][/filename] Note For more information on URL syntax when you use the copy command, see the Additional References section on page 11. 6

Transferring Files Using HTTP or HTTPS How to Transfer Files Using HTTP or HTTPs Troubleshooting Tips If file transfers from a remote web server fail, verify the following: Your router has an active connection to the Internet. The correct path and filename have been specified. The remote server requires a username and password. The remote server has a nonstandard communications port configured. (The default port for HTTP is 80; the default port for HTTPS is 443.) The CLI returns error messages to help you determine the cause of a failed copy request. Additional information on the copy process can be displayed with the debug ip http client all command. Uploading a File to a Remote Server Using HTTP or HTTPS Perform this task to upload a file to a remote HTTP server using HTTP or HTTPS. SUMMARY STEPS 1. enable 2. copy [/erase] [/noverify] local-source-url http://remote-destination-url or copy local-source-url https://remote-destination-url 7

How to Transfer Files Using HTTP or HTTPs Transferring Files Using HTTP or HTTPS DETAILED STEPS Step 1 Step 2 Command or Action enable Router> enable copy [/erase] [/noverify] local-source-url http://remote-destination-url or copy local-source-url https://remote-destination-url Router# http://user1:mypassword@209.165. 202.129:8080/image_files/c7200-i-mx_backup Router# copy flash:c7200-i-mx http://user1:mypassword@209.165. 202.129:8080/image_files/c7200-i-mx_backup Purpose Enables privileged EXEC mode. Enter your password if prompted. Copies a file from a local file system to a remote web server using HTTP or HTTPS. /erase Erases the local destination file system before copying. This option is provided on Class B file system platforms with limited memory to allow an easy way to clear local flash memory space. /noverify If the file being copied is an image file, this keyword disables the automatic image verification that occurs after an image is copied. The local-source-url argument is the location URL (or alias) from which to get the file to be copied, in standard Cisco IOS file system syntax as follows: http://[[username:password]@] {hostname host-ip}[/filepath]/filename Note The optional username and password arguments can be used to log in to an HTTP server that requires user authentication, in place of configuring the ip http client username and ip http client password global configuration commands to specify these authentication strings. The remote-destination-url is the URL (or alias) to put the copied file, in standard Cisco IOS file system syntax, as follows: filesystem:[/filepath][/filename] Note For more information on URL syntax when you use the copy command, see the Additional References section on page 11. Troubleshooting Tips If file transfers from a remote web server fail, verify the following: Your router has an active connection to the Internet. The correct path and filename have been specified. The remote server requires a username and password. The remote server has a nonstandard communications port configured. (The default port for HTTP is 80; the default port for HTTPS is 443.) The CLI returns error messages to help you determine the cause of a failed copy request. Additional information on the copy process can be displayed with the debug ip http client all command. 8

Transferring Files Using HTTP or HTTPS How to Transfer Files Using HTTP or HTTPs Maintaining and Monitoring File Transfers Using HTTP SUMMARY STEPS DETAILED STEPS Perform this task to maintain and monitor HTTP connections. Steps 2 through 4 can be performed in any order. 1. enable 2. show ip http client connection 3. show ip http client history 4. show ip http client session-module Step 1 Step 2 Command or Action enable Router> enable show ip http client connection Purpose Enables privileged EXEC mode. Enter your password if prompted. Displays details about active HTTP client connections. Step 3 Router# show ip http client connection show ip http client history Displays the last 20 URLs accessed by the HTTP client. Step 4 Router# show ip http client history show ip http client session-module Router# show ip http client session-module Displays details about about sessions (applications) that have registered with the HTTP client. 9

Configuration Examples for the File Transfer Using HTTP or HTTPs Transferring Files Using HTTP or HTTPS Configuration Examples for the File Transfer Using HTTP or HTTPs This section provides the following configuration examples: Configuring HTTP Connection Characteristics for File Transfers: Example, page 10 Downloading a File from a Remote Server Using HTTP or HTTPs: Example, page 10 Uploading a File from Flash to the Remote HTTP Server: Example, page 10 Uploading a File from Flash to the Remote HTTP Server: Example, page 10 Downloading a File from the Remote HTTP Server to Flash Memory: Example, page 11 Configuring HTTP Connection Characteristics for File Transfers: Example The following example shows how to configure the HTTP password and username for connection to a remote server that authenticates all users. The example also shows how to configure the connection for a 20-second idle connection period. The maximum time the HTTP client waits for a connection remains at the default 10 seconds. Router(config)# ip http client connection idle timeout 20 Router(config)# ip http client password Secret Router(config)# ip http client username User1 Router(config)# do show running-config include ip http client Downloading a File from a Remote Server Using HTTP or HTTPs: Example The following example shows how to configure the file c7200-i-mx is copied from a remote server to flash memory using HTTP. This example also shows how to enter a username and password from the command line for an HTTP server that authenticates users. Router# copy http://user1:mypassword@209.165.202.129:8080/image_files/c7200-i-mx flash:c7200-i-mx Uploading a File from Flash to the Remote HTTP Server: Example The following example shows how to copy a file from flash memory to the remote HTTP server. The example shows the prompts and displays that can be expected from transferring a file using the copy privileged EXEC command. Router# copy flash:c7200-js-mz.ell2 http://172.19.209.190/user1/c7200-js-mz.ell2 Address or name of remote host [172.19.209.190]? Destination filename [user1/c7200-js-mz.ell2]? Storing http://172.19.209.190/user1/c7200-js-mz.ell2!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 10

Transferring Files Using HTTP or HTTPS Additional References!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! 17571956 bytes copied in 57.144 secs (307503 bytes/sec) Downloading a File from the Remote HTTP Server to Flash Memory: Example The following example shows how to copy a file from the remote HTTP server to the flash memory. The example shows the prompts and displays that can be expected from transferring a file using the copy privileged EXEC command. Router# copy http://172.19.209.190/user1/c7200-i-mz.test flash:c7200-i-mz.test Destination filename [c7200-i-mz.test]? Loading http://172.19.209.190/user1/c7200-i-mz.test!!!!!... 11272788 bytes copied in 527.104 secs (21386 bytes/sec) Uploading a File to a Remote Server Using HTTP or HTTPs The following example shows how to copy a file to the remote server using HTTP or HTTPs. router#copy flash: http: Source filename []? running-config Address or name of remote host []? 10.1.102.1 Destination filename [pilot-confg]?file1... Additional References The following sections provide information related to transferring files using HTTP or HTTPS. 11

Additional References Transferring Files Using HTTP or HTTPS Related Documents Related Topic Document Title Secure HTTP communications HTTPS HTTP Server and Client with SSL 3.0 Cisco IOS embedded web server HTTP 1.1 Web Server and Client Cisco IOS embedded web client HTTP 1.1 Client Network Management Commands: complete command Cisco IOS Network Management Command Reference syntax, command mode, command history, defaults, usage guidelines, and examples Configuration Fundamentals Commands: complete command syntax, command mode, command history, defaults, usage guidelines, and examples Cisco IOS Configuration Fundamentals Command Reference Standards Standards No new of modified standards are supported by this feature, and support for existing standards has not been modified by this feature. Title MIBs MIBs None MIBs Link To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: http://www.cisco.com/go/mibs RFCs RFCs RFC 2616 RFC 2617 Title Hypertext Transfer Protocol -- HTTP/1.1, R. Fielding, et al. HTTP Authentication: Basic and Digest Access Authentication, J. Franks, et al. 12

Transferring Files Using HTTP or HTTPS Additional References Technical Assistance Description The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. Link http://www.cisco.com/techsupport 13

Feature Information for Transferring Files Using HTTP or HTTPS Transferring Files Using HTTP or HTTPS Feature Information for Transferring Files Using HTTP or HTTPS Table 1 lists the features in this module and provides links to specific configuration information. Only features that were introduced or modified in Cisco IOS Release 12.2(1) or later appear in the table. Not all commands may be available in your Cisco IOS software release. For details on when support for specific commands was introduced, see the command reference documents. Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/fn. An account on Cisco.com is not required. Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature. Table 1 Feature Information for Transferring Files Using HTTP or HTTPS Feature Name Releases Feature Information File Download Using HTTP 12.3(2)T The File Download Using HTTP feature allows you to copy files from an HTTP server to a Cisco IOS software-based platform. The following section provides information about this feature: Downloading a File from a Remote Server Using HTTP or HTTPs, page 5 File Upload Using HTTP 12.3(7)T The following section provides information about this feature: Uploading a File to a Remote Server Using HTTP or HTTPS section on page 7 File Transfer Using HTTP 12.3(7)T The File Transfer Using HTTP feature provides the capability to copy files, such as Cisco IOS image files, core files, configuration files, log files, and scripts to and from a remote server and your local routing device using the Cisco IOS copy command and command-line interface. The HTTP copy operation works in the same way as copying from other remote file systems, such as FTP or TFTP. This feature provides support for copying files from a Cisco IOS software-based platform to an HTTP server, using either HTTP or HTTPs. The following sections provide information about this feature: Information About File Transfers Using HTTP or HTTPs section on page 2 How to Transfer Files Using HTTP or HTTPs section on page 2 14

Transferring Files Using HTTP or HTTPS Feature Information for Transferring Files Using HTTP or HTTPS CCDE, CCSI, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco Nurse Connect, Cisco Stackpower, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iphone, iquick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0903R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. 2005 2009 Cisco Systems, Inc. All rights reserved. 15

Feature Information for Transferring Files Using HTTP or HTTPS Transferring Files Using HTTP or HTTPS 16