Have you tried just tftp/ftp'ing the proper image to the flash then setting the boot image? "boot system disk0:/asa704-k8.bin" (or whatever) and rebooting? I am pretty sure that the "upgrade/downgrade" procedure is only necessary when going to/from 6.x and 7.x. As long as you are staying in the 7.x code train, you should be fine. If not, I have a couple of old 515E's that I could test with if this doesnt do the trick.
Yes, you are right. I have tried the downgrade command and the PIX doesn't allow me to do that. It gave me a message saying that the downgrade command is only for version 7 to version 6. The thing is, the flash memory is not enough to hold both 7.2(2) and 7.0(4). From what I know, the IOS will be loaded onto the RAM once it's running. In the case, can i delete 7.2(2) and copy over 7.0(4) then perform a reload? Will it cause the PIX to crash?
If you are SURE you can get a copy of the 7.0(4) code on there before it is rebooted you can. The pix will load the OS into memory when it boots, therefore, you can delete the 7.2(2) image from flash, then copy the 7.0(4) image to flash, set the boot statement and reboot. If this was a router, I would say that unless you feel like copying an image via xmodem, I wouldnt risk it, however a cool feature of the PIX is that it is smart enough to be able to get itself on network and boot off of the TFTP server. If you dont have a local copy to boot from you can boot into monitor mode, configure your interface addressing and tell it what tftp server to boot the image from. Once you have done this, you can format the flash and copy the proper image to the pix and reboot. The exact step-by-step procedures of booting from tftp can be found here:
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :