Thats because it probably loaded the non ciscoview catos because that is the one that is first in the boot statement and would be loaded if available. If you wanted the other to load you would have change your boot statement and or delete the non CV image . Just do a "show version " to see which image is active..
lets say that i am uploading the new image, but didn't delete the old image & also i havn't changed the boot statement, so it will boot with the old image isn't? also if i go on ROMMON prompt(using control+break key) & there if i issue a command "boot bootflash:cat6000−sup2cvk8.7−3−2.bin" it will boot the new image, so it won't be a probz isn't?
the reason why i wanted to ask about this is, i don't have any PCMCIA card for testing the new image, so i thought if i du it in this way, i can check the new CatOS iamge thatz why.
If something happens wrong you can anytime manully boot the switch from old image from rommon which you planned for new image and once switch is up you can change the boot statement pointing back to old image.
But you can very well change the boot statement from rommon prompt.
There are some set of commnds like
set --> This commnd will show you the boot variables
BOOT=bootflash: --> This command will be used to set the boot statement in rommon prompt
sync --> This command will be used to sve your changes in rommon prompt
To know more about the rommon commands chceck this link
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...