📜 ⬆️ ⬇️

We continue to update iOS

It often happens that the same equipment is placed on one site. And in order to update IOS faster, I use the following trick.

I first update the border router, after which I tell it that it performs the role of a tftp server and ask to publish the latest IOS under the IOS.bin alias.

RTR001#conf t
RTR001(config)#ip tftp source-interface FastEthernet0/1.10
RTR001#conf t
RTR001(config)#ip tftp source-interface FastEthernet0/1.10
I declare the interface FastEthernet0 / 1.10 to be the source for tftp
RTR001(config)#tftp-server flash:c2800nm-adventerprisek9_ivs_li-mz.124-24.T1.bin alias IOS.bin
RTR001(config)#^Z
RTR001#


We need the alias in order to copy from the far router, we do not enter long names:

RTR002#copy tftp flash:
Address or name of remote host []? 10.10.10.1
Source filename []? ios.bin
Destination filename [ios.bin]?
%Warning:There is a file already existing with this name
Do you want to over write? [confirm]
RTR002#copy tftp flash:
Address or name of remote host []? 10.10.10.1
Source filename []? ios.bin
Destination filename [ios.bin]?
%Warning:There is a file already existing with this name
Do you want to over write? [confirm]
there is already such a file on the flash drive, we need to confirm the desire to replace it with a more different file.
Accessing tftp://10.10.10.1/ios.bin...
Loading ios.bin from 10.10.10.1 (via Tunnel1): !!!!!!!!!!!!!!!!!!!!!!!!
[ ]
!!!!!!!!!!!!!!!!!!!!!!!! [OK - 59971380 bytes]


Then we send the router to reboot
')
RTR002#reload
Verifying file integrity of flash:/ios.bin................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
[ ]
..............................................................................................................
..............................................................................................................
..............................................................................................................
..............................................................................................................
Done!
Embedded Hash MD5 : 564526F4D154F7BEC08F89309A633AE9
Computed Hash MD5 : 564526F4D154F7BEC08F89309A633AE9
CCO Hash MD5 : E8FAB98A72C1516538DA7686F8404FCF
Signature Verified

Proceed with reload? [confirm]


After the reboot, it remains to log in and check if everything is good with us:

RTR002#sho ver | inc bin
System image file is "flash:ios.bin"
RTR002#

Source: https://habr.com/ru/post/71129/


All Articles