Cuando copiamos la IOS de un router utilizando VRF, debemos utilizar la interface fuente correspondiente a la VRF a utilizar, ademas el nombre y la password debe ser especificada.
Ejemplo en un equipo Cisco9500
C9500#show run interf vlan 9
!
interface Vlan9
description Red Internet
ip vrf forwarding Internet
ip address 2.2.2.2 255.255.255.240
end
C9500#configure terminal
C9500(config)#ip ftp source-interface Vlan9
C9500(config)#ip ftp username Gfuentes
C9500(config)#ip ftp password C1sC0$
C9500#
C9500#copy ftp: flash:
Address or name of remote host []? 1.1.1.1 /* IP ADD del servidor FTP /*
Source filename []? cat9k_iosxe.17.03.03.SPA.bin
Destination filename [cat9k_iosxe.17.03.03.SPA.bin]?
Accessing ftp://200.68.6.62/cat9k_iosxe.17.03.03.SPA.bin...
Loading cat9k_iosxe.17.03.03.SPA.bin !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 901741775/4096 bytes]
901741775 bytes copied in 654.829 secs (1377065 bytes/sec)
C9500#
Validar la correcta instalacion de la nueva IOS
C9500#verify flash:cat9k_iosxe.17.03.03.SPA.bin
Verifying file integrity of flash:cat9k_iosxe.17.03.03.SPA.bin...........................................................................................................................................................................................................................................................................................................................................................................
Embedded Hash SHA1 : 86144E8D88FE3DC09924989F6D54614CD760F70A
Computed Hash SHA1 : 86144E8D88FE3DC09924989F6D54614CD760F70A
Starting image verification
Hash Computation: 100%Done!
Computed Hash SHA2: d86bccd824544cac29ae634be6e4d394
a05a0d9cdd7d9d0b569cfa4083a5394d
3ceca89a6562b2f4c91814066314b0f3
d96f36e07c44ab35433e7a8286f61d69
Embedded Hash SHA2: d86bccd824544cac29ae634be6e4d394
a05a0d9cdd7d9d0b569cfa4083a5394d
3ceca89a6562b2f4c91814066314b0f3
d96f36e07c44ab35433e7a8286f61d69
Digital signature successfully verified in file flash:cat9k_iosxe.17.03.03.SPA.bin
No hay comentarios.:
Publicar un comentario