To be honest compact flash is compact flash as long as you use the correct type . We have seen cisco gear come in with flash made by San-disk . The ones you buy in the computer store for $50 will cost you a lot more if ordered thru cisco , if you have some problem they just won't support you if say you have a box that keeps hanging . Use a compact flash II and format it before using it .
Have you tried if the "undelete" command works in rommon?. With undelete you can recover files that are marked as deleted. You need to discover the file index with dir sup-bootflash:, but i don't know if this command works in rommon.
Yeah unfortunetly you have a problem if you have no bootable image in sup-bootflash or a external flashcard . Hopefully you have a spare 6500 around or in production you can copy from .
Not sure what options you have available in rommon . do a ? and see if you have any copy or tftp commands , if so maybe you can get an image on your pc and tftp or copy it onto bootflash? Really donn't know what rommon commands are available and there isn't a whole lot of info on rommon commands on CCO.
You can also copy the image you want onto the compact flash card from a 2800 router. The router will complain that it isn't in a system format but if you ignore it and request it to copy it will copy from your tftp server anyways. I popped it in back into the 6500 and booted from Rommon and I'm back in business.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...