You're using the upgrade command, but in this instance its a patch so you need to use the patch command to load the specific patch
1. Download the patch onto a ftp server. Use the binary mode to download, not
ASCII. Verify that your local file MD5 checksum matches the one listed on CCO.
No modifications to the file are necessary after downloading. The file does not
2. Login to the NAM CLI as the user root.
3. Run the patch command and specify the correct patch file URL. Use the
command "patch help" for the syntax of this command.
Note 1: If you see an error message such as "Verification Failed, the patch
you are trying to apply is not valid or not compatible with the release" it
might be caused by an incorrect system-time setting on the NAM and/or
Supervisor. Adjust the system-time on the Supervisor or configure the NAM
to use NTP and try the patch command again.
Note 2: Sometimes during the "Stopping services" part of applying the
patch, a status of "FAILED" may appear instead of "OK". For example, "FAILED"
might appear when stopping the config_monitor process. This message is not a
problem as long as the message "Patch applied successfully" message
eventually appears. Reboot the NAM if this occurs.
4. The NAM will reboot and come up to a login prompt.
5. To see whether the patch is installed correctly, type the command
"show patches" in the NAM CLI.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...