Contents
xxi
CHAPTER 9
R
EADING CISCO DISCOVERY PROTOCOL (CDP) PACKETS ........................... 9-1
ENABLING INTERCEPTION OF CDP PACKETS ...............................................................................................9-1
D
ISPLAYING CDP INFORMATION ..................................................................................................................9-1
D
ISPLAYING NEIGHBORS .......................................................................................................................9-2
D
ISPLAYING CDP ENTRIES ...................................................................................................................9-3
D
ISPLAYING CDP STATISTICS ...............................................................................................................9-3
C
LEARING CDP INFORMATION ....................................................................................................................9-3
CHAPTER 10
U
PDATING SOFTWARE IMAGES AND CONFIGURATION FILES ....................... 10-1
DETERMINING THE SOFTWARE VERSIONS INSTALLED AND RUNNING ON A DEVICE .......................................10-1
D
ETERMINING THE FLASH IMAGE VERSION RUNNING ON THE DEVICE ...................................................10-1
D
ETERMINING THE BOOT IMAGE VERSION RUNNING ON THE DEVICE ....................................................10-2
D
ETERMINING THE IMAGE VERSIONS INSTALLED IN FLASH MEMORY .....................................................10-2
I
MAGE FILE TYPES ....................................................................................................................................10-2
U
PGRADING SOFTWARE ............................................................................................................................10-2
U
PGRADING THE BOOT CODE .............................................................................................................10-3
U
PGRADING THE FLASH CODE ............................................................................................................10-3
U
SING SNMP TO UPGRADE SOFTWARE ....................................................................................................10-4
U
PGRADING A CHASSIS MODULE’S MANAGEMENT PROCESSOR ...........................................................10-4
C
HANGING THE BLOCK SIZE FOR TFTP FILE TRANSFERS ..........................................................................10-5
R
EBOOTING ..............................................................................................................................................10-5
L
OADING AND SAVING CONFIGURATION FILES ............................................................................................10-7
R
EPLACING THE STARTUP CONFIGURATION WITH THE RUNNING CONFIGURATION .................................10-7
R
EPLACING THE RUNNING CONFIGURATION WITH THE STARTUP CONFIGURATION .................................10-7
L
OGGING CHANGES TO THE STARTUP-CONFIG FILE ............................................................................10-8
C
OPYING A CONFIGURATION FILE TO OR FROM A TFTP SERVER .........................................................10-8
D
YNAMIC CONFIGURATION LOADING ...................................................................................................10-9
M
AXIMUM FILE SIZES FOR STARTUP-CONFIG FILE AND RUNNING-CONFIG ..........................................10-11
U
SING SNMP TO SAVE AND LOAD CONFIGURATION INFORMATION .....................................................10-12
E
RASING IMAGE AND CONFIGURATION FILES .....................................................................................10-13
S
CHEDULING A SYSTEM RELOAD .............................................................................................................10-13
R
ELOADING AT A SPECIFIC TIME .......................................................................................................10-13
R
ELOADING AFTER A SPECIFIC AMOUNT OF TIME ..............................................................................10-13
D
ISPLAYING THE AMOUNT OF TIME REMAINING BEFORE A SCHEDULED RELOAD .................................10-14
C
ANCELING A SCHEDULED RELOAD ..................................................................................................10-14
D
IAGNOSTIC ERROR CODES AND REMEDIES FOR TFTP TRANSFERS ........................................................10-14
APPENDIX A
U
SING SYSLOG ...........................................................................................A-1
OVERVIEW ................................................................................................................................................. A-1
D
ISPLAYING SYSLOG MESSAGES ................................................................................................................ A-2
C
ONFIGURING THE SYSLOG SERVICE ......................................................................................................... A-3
D
ISPLAYING THE SYSLOG CONFIGURATION ........................................................................................... A-3