I am not sure if this is the right forum to raise this problem.
I Need some advice on flash file system.
Consider a situation where there are 3 files in flash Two files in flash are with same name (say xyz.bin) and the third is having a different name (say abc.bin). The router has booted from abc.bin. Out of the other two files one is having an invalid checksum. Also in sh flash command, the file with invalid checksum is having the 2nd entry and 3rd entry is the file with correct checksum. What will happen if the entry in boot system IOS command is changed to xyz.bin. i.e :
there are two image files in the flash.one is the image with invalid checksum.I couldn't delete this invalid image.because once I try to delete it,it says there is no image with this name.When reloading the image again,I see the new image twice,the valid checksum and the invalid checksum.When I try to boot from the new image,it couldn^t not find.
how can I delete this image with invalid checksum?
There is an other way to get around this problem. Copy your good bin's to a tftp server. Then delete flash. Then copy back your good files.
To come back to your first question. Your box will boot the first file in flash. If you specify boot system flash, it will do an attempt to boot that image. If it fails, it moves back to the default as I described earlier.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...