I bought a 1721 router from pac bell "staged" and bundled with aT1. If i change the en password and do "write mem", "reload", the password goes back to the old one, why?. Does reload mean reload from a stored image? can this router store an image? If i do show config i get "no such command". In fact the show command is tottaly unreconagized. is this normal, or did pac bell load an image and disable some commands? If they loaded an image can i kill it (do i want to kill it)? They did not include a configuration guide like what came with my pix, or i would not be asking such dumb questions! I searched cisco online.. after 2 hours of searching and testing im here writing to you! thanks for the help
After changing the enable password, write mem should update the saved config in NVRAM. You could try 'copy run start' as well in case 'write mem' isn't working for some reason. Reload will reload the router and load the config stored in NVRAM usually, unless the config-register is set to not load the config from NVRAM. At the bottom of the 'show version' output there will be a line that saids what the config-register is. What does that say? If it's something other then 0x2102 change it to 0x2102 and see if it comes up fine.
On reload, does the router perform like it was 'staged' to function or not?
What is the prompt on the router? If it's router-boot or rommon then the config-register may be incorrect.
Here is a show version, the show command only works from the en, and not after config t is entered. How can i get rid of the "image" looks like script at the end of the config appears to be what i thought was the image.
Using 1690 out of 29688 bytes
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
enable secret 5 XXXXXXXXXX
enable password XXXXXXXXX
modemcap entry line
description TO LOCAL LAN
ip address 192.168.100.2 255.255.255.0
ip nat inside
description PB CKT 40HCGS991156_OO1PT
ip address 220.127.116.11 255.255.255.240
ip nat outside
service-module t1 timeslots 1-24
ip nat pool webaccess 18.104.22.168 22.214.171.124 netmask 255.255.255.240
ip nat inside source list 1 pool webaccess
ip route 0.0.0.0 0.0.0.0 126.96.36.199
no ip http server
access-list 1 permit 192.168.100.0 0.0.0.255
banner motd ^CC
East Bay Restaurant Supply
This system is for authorized use only. Individuals using this
computer system without authority, or in excess of their
authority, are subject to having all of their activities on this
system monitored and recorded by system personnel. In the course
of monitoring individuals improperly using this system, or in the
course of system maintenance, the activities of authorized users
may be monitored, Anyone using this system expressly consents to
such monitoring and is advised that if such monitoring reveals
possible evidence of criminal activity, system personnel may
provide evidence of such monitoring to law enforcement officials.
Hi everyone, I would like to thank you in advance for any help you can provide a newcomer like myself!
Im studying the 100-105 book by Odom and am currently on the topic of Port security. I purchased a used 2960 and I'm trying to follow a...
While deploying a number of 18xx/2802/3802 model access points (APs), which run AP-COS as their operating platform. It can be observed on some occasions that while many of their access points were able to join the fabric WLC withou...
I am going to design and build an LAN network under a tunnel underground with long distance between the switches.
I will have 2 Catalyst switches and 8 Industrial IE3000, and they will be connected with fiber.
For now I am planning on use Layer-2 s...