cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
298
Views
0
Helpful
1
Replies

AIM-CUE will not load new software package

Michael Durham
Level 4
Level 4

My AIM-CUE quit working because somehow the software became corrupt.  I was able to locate the full package (several versions) and have tried to load it onto the AIM card by following the directions provided by Cisco's site: http://www.cisco.com/c/en/us/support/docs/voice-unified-communications/unity-express/69303-cue-install-upgrade-guide.html

Here is my config:

ServicesEngine boot-loader> show config                                        
IP addr:                192.168.2.2
Netmask:                255.255.255.0
TFTP server :           192.168.69.140
GW IP addr:             192.168.2.1
Default boot:           disk
Bootloader Version:     2.1.14
Default Helper-file:    cue-installer.aim.7.4.1
Default BIOS:           primary
Default bootloader:     primary
Default cpu throttle:   No Throttle

My TFTP server is 192.168.69.140 and I can ping it from the AIC-CUE module

Ping 192.168.69.140

Sending 5, 32 byte ICMP Echos to 192.168.69.140:

!!!!!

Success rate is 100% (5/5)

 

But all I get is the following and it keeps trying to boot:

ServicesEngine boot-loader> boot helper                                        

nw_boot: 0 cue-installer.aim.7.3.1

Me: 192.168.2.2, Server: 192.168.69.140, Gateway: 192.168.2.1

Loading cue-installer.aim.7.3.1

Dbg: Final image size: 11744636

Debug: bl_sz: 96160

Debug: cisco_bl_sz: 59994

0x0000007f 0x00000045 0x0000004c 0x00000046 0x00000001 0x00000001 0x00000001 0x

00000000 0x00000000 0x00000000

cisco_cl_addr: 0x10019c0

Debug: bl_sz: 96160

Debug: cisco_bl_sz: 59994

0x0000007f 0x00000045 0x0000004c 0x00000046 0x00000001 0x00000001 0x00000001 0x

00000000 0x00000000 0x00000000

loader_addr: 0x1200000

Cisco BootLoader start

verify_netboot_img

found signature

Found bootable

img_start: b sig_len: 172 sig_start: N

bl_sz: 96160

Cisco_bl_sz: 59994

after buf_len: 4384

after KEY_InitMem

reading key: 0

reading key: 1

reading key: 2

reading key: 3

reading key: 4

reading key: 5

after aesop_RSA_keyarray_read

in verifysignature_md5, MD5 hash generated now, str format:hexmd5:6f6f83c48c707fadcceac857773931d4

Verifying signature now...

calling RSA decrypt now

mem ptr: 0 704 832 968 1040 1172 1184 1196 1208 1220 1228 1244 1268 1284 1300 1316 1332 1344 1360 1384 1400 1664 1804 2080 2224 2364 2880 3396 3660 3924 4188 RSA decrypt returned:4294967295

verifysignature_md5, Orig MD5 hash generated during encryption:ÌWÜWooƒÄŒp­ÌêÈWw91Ô

calling RSA decrypt now

mem ptr: 0 704 832 968 1040 1172 1184 1196 1208 1220 1228 1244 1268 1284 1300 1316 1332 1344 1360 1384 1400 1664 1804 2080 2224 2364 2880 3396 3660 3924 4188 RSA decrypt returned:4294967295

verifysignature_md5, Orig MD5 hash generated during encryption:ÌWÜWooƒÄŒp­ÌêÈWw91Ô

calling RSA decrypt now

mem ptr: 0 704 832 968 1040 1172 1184 1196 1208 1220 1228 1244 1268 1284 1300 1316 1332 1344 1360 1384 1400 1664 1804 2080 2224 2364 2880 3396 3660 3924 4188 RSA decrypt returned:4294967295

verifysignature_md5, Orig MD5 hash generated during encryption:ÌWÜWooƒÄŒp­ÌêÈWw91Ô

calling RSA decrypt now

mem ptr: 0 704 832 968 1040 1172 1184 1196 1208 1220 1228 1240 1260 1276 1288 1304 1320 1332 1348 1368 1380 1644 1784 2060 2204 2344 2860 3376 3640 3904 4168 RSA decrypt returned:4294967295

verifysignature_md5, Orig MD5 hash generated during encryption:ÌWÜWooƒÄŒp­ÌêÈWw91Ô

calling RSA decrypt now

mem ptr: 0 704 832 968 1040 1172 1184 1196 1208 1220 1228 1244 1268 1284 1300 1316 1332 1344 1360 1384 1400 1664 1804 2080 2224 2364 2880 3396 3660 3924 4188 RSA decrypt returned:4294967295

verifysignature_md5, Orig MD5 hash generated during encryption:ÌWÜWooƒÄŒp­ÌêÈWw91Ô

calling RSA decrypt now

mem ptr: 0 704 832 968 1040 1172 1184 1196 1208 1220 1228 1244 1268 1284 1300 1316 1332 1344 1360 1384 1400 1664 1804 2080 2224 2364 2880 3396 3660 3924 4188 RSA decrypt returned:4294967295

verifysignature_md5, Orig MD5 hash generated during encryption:ÌWÜWooƒÄŒp­ÌêÈWw91Ô

signatures do not match...

Invalid signature !!

Corrupted netboot image  detected

CISCO_BL: boot_image: 0x1200000ÿ

Initializing memory.  Please wait. ...

*Jan 19 23:58:36.655: %LINEPROTO-5-UPDOWN: Line protocol on Interface Service-Engine0/0, changed state to down

Trying to reset Service Module Service-Engine0/0

 256 MB SDRAM detected

BIOS Version: Cisco SE-AIM 01.02

BIOS Build date: 08/14/03

System Now Booting ...[BOOT-ASM]

 

Please enter '***' to change boot configuration:

Initializing memory.  Please wait. ... 256 MB SDRAM detected

BIOS Version: Cisco SE-AIM 01.02

BIOS Build date: 08/14/03

System Now Booting ...[BOOT-ASM]

 

Please enter '***' to change boot configuration:

*Jan 19 23:59:16.655: %LINEPROTO-5-UPDOWN: Line protocol on Interface Service-Engine0/0, changed state to upFound disk 0

found 1 drives

root cmd : root (hd0,0)

 Filesystem type unknown, partition type 0x6

kf: a1 : /bzImage root=/dev/hda1 ro plat=aim

kf: a2 : /bzImage root=/dev/hda1 ro plat=aim

in grub_open: /bzImage root=/dev/hda1 ro plat=aim

 kernel_func: kt: 0

Unable to load image

in boot func: kt: 0

Unable to boot imageÿ

 

Any ideas as to what I am doing worng?

1 Reply 1

Michael Durham
Level 4
Level 4

PLEASE, I still need help with this.