Goline Logo

News

  • Route RPKI validation April 1st, 2022
    RPKI is a security framework by which network owners can validate and secure the critical route updates or Border Gateway Protocol (BGP) announcements between public Internet networks. BGP is essentially the central nervous system of the Internet and one of its fundamental building blocks. The main function of BGP is to facilitate efficient routing between Autonomous Systems (AS), by building and maintaining the Internet routing table. The Internet routing table is effectively the navigation system of the Internet and without it, traffic would be unable to flow between its constituent networks. Unfortunately, routing equipment alone cannot distinguish between legitimate and malicious routing announcements,...
  • RIPE – Atlas Anchor February 17th, 2022
    We have become an even more integral part of the RIPE Atlas project by hosting an anchor, a device that allows for latency analysis of traffic between autonomous systems.https://atlas.ripe.net/probes/7073/RIPE Atlas anchors play an integral role in the RIPE Atlas network by acting both as enhanced RIPE Atlas probes with more measurement capacity, as well as regional measurement targets within the greater RIPE Atlas network. Anchors are able to perform many more measurements than a regular RIPE Atlas probe, and the large amount of data they collect is made available to everyone. In addition, anchors act as powerful targets that can...
  • MANRS June 20th, 2020
    GOLINE firmly believes in initiatives to protect networks, improve security and resilience of the global routing system. Therefore we decided to support the MANRS project and join as participants.Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors. Requirements for Participation Please read the full MANRS Actions document before applying. You can become a participant if you meet these requirements: You (or your company) support...

Firmware Update/Recovery Cisco switch 2960

Paolo Caparrelli Cisco 22 June 2022

Aggiorna il firmware con la versione Web based dev manager e sostituisce il vecchio firmware.

#Copia via scp
archive download-sw /imageonly /overwrite scp://cisco:stabio2010@192.168.222.5/c2960x-universalk9-tar.152-4.E6.tar
#Copia via tftp
archive download-sw /imageonly /overwrite tftp://tftp/c2960-lanbasek9-tar.122-55.SE9.tar
#Oppure via USB
archive download-sw /imageonly /overwrite usbflash0:/c2960x-universalk9-tar.152-2.E4.tar


In caso di cambiamento da IP Base a IP Service aggiungere /allow-feature-upgrade


Per verificare:

# sh boot
BOOT path-list      : flash:/c2960-lanbasek9-mz.122-55.SE9/c2960-lanbasek9-mz.122-55.SE9.bin
Config file         : flash:/config.text
Private Config file : flash:/private-config.text
Enable Break        : no
Manual Boot         : no
Allow Dev Key         : yes
HELPER path-list    :
Auto upgrade        : yes
Auto upgrade path   :
NVRAM/Config file
      buffer size:   65536
Timeout for Config
          Download:    0 seconds
Config Download
       via DHCP:       disabled (next boot: disabled)
#

 

Aggiornamnto manuale di Switch Catalyst in stack con file .bin

Step-by-Step Instructions
Step 1 – Download the .bin Image

Step 2 – Verify the Available Memory
You can verify the available memory in the Flash file system of both switches individually

Step 3 – Copy the Images to the Flash File System
Copy the .bin image from the TFTP server to the Flash file system of both switches.

Switch#copy tftp: flash1:
Address or name of remote host [172.22.1.165]?
Source filename [c3750-advipservicesk9-mz.122-25.SEE2]? c3750-advipservicesk9-
.122-25.SEE2.bin
Destination filename [c3750-advipservicesk9-mz.122-25.SEE2.bin]?
Accessing tftp://172.22.1.165/c3750-advipservicesk9-mz.122-25.SEE2.bin…
Loading c3750-advipservicesk9-mz.122-25.SEE2.bin from 172.22.1.165 (via Vlan1)
!— Output is truncated.
[OK – 8172194 bytes]
172194 bytes copied in 203.718 secs (40115 bytes/sec)


Switch#copy tftp: flash2:
Address or name of remote host [172.22.1.165]?
Source filename [c3750-advipservicesk9-mz.122-25.SEE2.bin]?
Destination filename [c3750-advipservicesk9-mz.122-25.SEE2.bin]?
Accessing tftp://172.22.1.165/c3750-advipservicesk9-mz.122-25.SEE2.bin…
Loading c3750-advipservicesk9-mz.122-25.SEE2.bin from 172.22.1.165 (via Vlan1):
!— Output is truncated
[OK – 8172194 bytes]

8172194 bytes copied in 186.655 secs (43782 bytes/sec)

Step 4 – Configure the Boot Variable
Configure the boot variable to boot the switch with the newly copied IOS:

Switch(config)#boot system switch all flash:/
c3750-advipservicesk9-mz.122-25.SEE2.bin
Switch(config)#exit
Switch#write memory

Step 5 – Verify Before the Reload
Verify the boot variable:

Switch#show boot
BOOT path-list : flash:/c3750-advipservicesk9-mz.122-25.SEE2.bin

 —————————————————————————————-
RECOVERY – format flash and reload firmware

Cancellare tutto il contenuto della flash. Questa operazione ci mette circa 15 minuti.
format flash

Initialize the flash:
switch: flash_init

Initialize the management interface:
switch: mgmt_init

Then assign an IP address to the management interface:
switch: set IP_ADDR 192.168.222.155/255.255.252.0
switch: set DEFAULT_ROUTER 192.168.223.254

Then configure your TFTP server to have an IP on the same subnet and connect it to the management interface of the switch 

Now to tell the switch to retrieve the firmware image:
switch: copy tftp://192.168.222.6/c2960x-universalk9-mz.152-5b.E.bin flash:c2960x-universalk9-mz.152-5b.E.bin
Se la copia non dovesse partire reinizializzare l'interfaccia mgmt 
switch: mgmt_init

Set boot image:
switch: boot flash:c2960x-universalk9-mz.152-5b.E.bin

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x