06-23-2019 03:45 PM
Issue 1: a student has wiped all data from the Cisco 4221 device, boots into rommon all the time
here is the issues
rommon 2 > boot bootflash:isr4200-universalk9_ias.16.11.01a.SPA.bin Located isr4200-universalk9_ias.16.11.01a.SPA.bin ################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################### Package header rev 3 structure detected IsoSize = 511098880 Calculating SHA-1 hash...Validate package: SHA-1 hash: calculated 7E3D1143:F9D6B768:461DD45F:7BB5A324:859C90EF expected 7E3D1143:F9D6B768:461DD45F:7BB5A324:859C90EF RSA Signed RELEASE Image Signature Verification Successful. Image validated Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Cisco IOS Software [Gibraltar], ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9_IAS-M), Version 16.11.1a, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2019 by Cisco Systems, Inc. Compiled Fri 12-Apr-19 00:13 by mcpre This software version supports only Smart Licensing as the software licensing mechanism. PLEASE READ THE FOLLOWING TERMS CAREFULLY. INSTALLING THE LICENSE OR LICENSE KEY PROVIDED FOR ANY CISCO SOFTWARE PRODUCT, PRODUCT FEATURE, AND/OR SUBSEQUENTLY PROVIDED SOFTWARE FEATURES (COLLECTIVELY, THE "SOFTWARE"), AND/OR USING SUCH SOFTWARE CONSTITUTES YOUR FULL ACCEPTANCE OF THE FOLLOWING TERMS. YOU MUST NOT PROCEED FURTHER IF YOU ARE NOT WILLING TO BE BOUND BY ALL THE TERMS SET FORTH HEREIN. Your use of the Software is subject to the Cisco End User License Agreement (EULA) and any relevant supplemental terms (SEULA) found at http://www.cisco.com/c/en/us/about/legal/cloud-and-software/software-terms.html. You hereby acknowledge and agree that certain Software and/or features are licensed for a particular term, that the license to such Software and/or features is valid only for the applicable term and that such Software and/or features may be shut down or otherwise terminated by Cisco after expiration of the applicable license term (e.g., 90-day trial period). Cisco reserves the right to terminate any such Software feature electronically or by any other means available. While Cisco may provide alerts, it is your sole responsibility to monitor your usage of any such term Software feature to ensure that your systems and networks are prepared for a shutdown of the Software feature. cisco ISR4221/K9 (1RU) processor with 1777948K/3071K bytes of memory. Processor board ID FGL224190DA 2 Gigabit Ethernet interfaces 32768K bytes of non-volatile configuration memory. 4194304K bytes of physical memory. 6598655K bytes of flash memory at bootflash:. 15295488K bytes of USB flash at usb0:. 0K bytes of WebUI ODM Files at webui:. %INIT: waited 0 seconds for NVRAM to be available WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type%Warning:Use P2P interface for routemap setinterface clause Exception to IOS Thread: Frame pointer 0x7FC1C1446350, PC = 0x7FC276457117 UNIX-EXT-SIGNAL: Segmentation fault(11), Process = Init -Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 iosd_shr_m_uk9_ias_SANET_Core_crb:7FC27629F000+1B8117 :55619F42B000+5E3C269 iosd_shr_m_uk9_ias_AAA_Core_crb:7FC274BFB000+82AA98 Fastpath Thread backtrace: -Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 c:7FC20C038000+EE073 Packet Thread backtrace: -Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 c:7FC20C038000+EE073 prelib:7FC27316F000+3ADF prelib:7FC27316F000+3ADF Auxiliary Thread backtrace: -Traceback= 1#01cfbdbeef5ece58a9e06faad23d1b08 pthread:7FC20A3A9000+D1C5 RAX = 0000000000000000 RBX = 00007FC1C9EAF418 RCX = 00000000DFFFFEFF RDX = 0000000000000000 RSP = 00007FC1C1446350 RBP = 00007FC1C1446A10 RSI = 0000000000000001 RDI = 0000000000000000 R8 = 00007FC20CB42108 R9 = 0000000002000000 R10 = 0000000000000007 R11 = 00007FC20C8A1970 R12 = 8000000000000000 R13 = 8000000000000000 R14 = 7FFFFFFFFFFFFFFF R15 = 80007FC1C1446350 RFL = 0000000000010246 RIP = 00007FC276457117 CS = 0033 FS = 0000 GS = 0000 ST0 = 0000 0000000000000000 ST1 = 0000 0000000000000000 ST2 = 0000 0000000000000000 ST3 = 0000 0000000000000000 ST4 = 0000 0000000000000000 ST5 = 0000 0000000000000000 ST6 = 401D BA1FFC1C00000000 ST7 = 4003 B000000000000000 X87CW = 037F X87SW = 0000 X87TG = 0000 X87OP = 055D X87IP = 00007FC20C0E4124 X87DP = 00007FC1C1445ED8 XMM0 = 00000000000000000000000000000000 XMM1 = 00000000000000000000000000000000 XMM2 = 00000000000000000000000000000000 XMM3 = 00000000000000000000000000000000 XMM4 = 00000000FF0000000000000000000000 XMM5 = 6D6D617261705F687475616265775F74 XMM6 = 730074726F705F73707474685F70616D XMM7 = 00000000000000000000000000000000 XMM8 = A97CD39E6A88B3A3C56CD089B4FB16C3 XMM9 = 00000008000000080000000800000008 XMM10 = 0000000C0000000C0000000C0000000C XMM11 = 00000010000000100000001000000010 XMM12 = 00000000000000000000000000000000 XMM13 = 000000FF000000FF000000FF000000FF XMM14 = 000000FF000000FF000000FF00000080 XMM15 = C25F78CB5585DFFF8189448BF7703726 MXCSR = 00001FA0 Writing crashinfo to bootflash:crashinfo_RP_00_00_20190623-223308-UTC Buffered messages: Queued messages: *Jun 23 22:33:11.674: %SYS-3-LOGGER_FLUSHING: System pausing to ensure console debugging output. *Jun 23 22:32:49.947: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowed *Jun 23 22:32:50.768: %ISR_THROUGHPUT-6-LEVEL: Throughput level has been set to 35000 kbps *Jun 23 22:32:53.671: %IOSD_INFRA-6-IFS_DEVICE_OIR: Device usb0 addedesg switch eventq crimson DB not initialized *Jun 23 22:32:55.023: %SMART_LIC-6-AGENT_READY: Smart Agent for Licensing is initialized *Jun 23 22:32:55.023: %SMART_LIC-6-AGENT_ENABLED: Smart Agent for Licensing is enabled *Jun 23 22:32:55.023: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowed *Jun 23 22:33:01.154: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan *Jun 23 22:33:02.020: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up *Jun 23 22:33:02.021: %LINK-3-UPDOWN: Interface EOBC0, changed state to up *Jun 23 22:33:02.022: %LINK-3-UPDOWN: Interface LIIN0, changed state to up *Jun 23 22:33:02.259: %SMART_LIC-6-HA_ROLE_CHANGED: Smart Agent HA role changed to Active. *Jun 23 22:31:46.229: %CMRP_PFU-6-FANASSY_INSERTED: R0/0: cmand: Fan Assembly is inserted. *Jun 23 22:31:46.280: %CMRP-3-PFU_INITIALIZATION: R0/0: cmand: The RP has failed to initialize a Power Supply/Fan module controller because the idprom is empty for slot 2 *Jun 23 22:31:46.229: %CMRP_PFU-6-FANASSY_INSERTED: F0: cmand: Fan Assembly is inserted. *Jun 23 22:31:46.280: %CMRP-3-PFU_INITIALIZATION: F0: cmand: The RP has failed to initialize a Power Supply/Fan module controller because the idprom is empty for slot 2 *Jun 23 22:31:46.229: %CMRP_PFU-6-FANASSY_INSERTED: SIP0: cmand: Fan Assembly is inserted. *Jun 23 22:31:46.280: %CMRP-3-PFU_INITIALIZATION: SIP0: cmand: The RP has failed to initialize a Power Supply/Fan module controller because the idprom is empty for slot 2 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329170.841:93): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329170.841:93): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329170.841:93): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:50.844: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329170.841:94): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329171.902:95): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329171.902:95): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.907: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329171.902:95): avc: denied { getattr } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.907: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.904: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { read } for pid=13785 comm="linux_iosd-imag" name="bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:51.907: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329171.902:96): avc: denied { open } for pid=13785 comm="linux_iosd-imag" path="/dev/bootflash3" dev="devtmpfs" ino=11495 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:32:55.946: %CMLIB-6-THROUGHPUT_VALUE: R0/0: cmand: Throughput license found, throughput set to 35000 kbps *Jun 23 22:32:55.946: %CMLIB-6-THROUGHPUT_VALUE: F0: cmand: Throughput license found, throughput set to 35000 kbps *Jun 23 22:32:55.946: %CMLIB-6-THROUGHPUT_VALUE: SIP0: cmand: Throughput license found, throughput set to 35000 kbps *Jun 23 22:33:02.174: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329182.171:97): avc: denied { getattr } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { write } for pid=26279 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_*Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: R0/0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { open } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:02.174: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329182.171:97): avc: denied { getattr } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { write } for pid=26279 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:02.174: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329182.171:97): avc: denied { getattr } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { write } for pid=26279 comm="linux_iosd-imag" name="bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: SIP0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { open } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:03.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up *Jun 23 22:33:03.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up *Jun 23 22:33:03.063: %LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up *Jun 23 22:33:02.175: %SELINUX-3-MISMATCH: F0: audispd: type=AVC msg=audit(1561329182.171:98): avc: denied { open } for pid=26279 comm="linux_iosd-imag" path="/dev/bootflash2" dev="devtmpfs" ino=11494 scontext=system_u:system_r:polaris_iosd_t:s0 tcontext=system_u:object_r:fixed_disk_device_t:s0 tclass=blk_file permissive=1 *Jun 23 22:33:03.605: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Base was enabled by Default *Jun 23 22:33:07.491: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-1584976319 has been generated or imported by crypto config *Jun 23 22:33:07.605: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type *Jun 23 22:33:07.700: %AAA-5-USER_RESET: User admin failed attempts reset by vty0 *Jun 23 22:33:07.702: %AAAA-4-CLI_DEPRECATED: WARNING: Command has been added to the configuration using a type 0 password. However, type 0 passwords will soon be deprecated. Migrate to a supported password type *Jun 23 22:33:08.010: %SYS-5-CONFIG_I: Configured from memory by console *Jun 23 22:33:08.046: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled *Jun 23 22:33:08.059: %SPA_OIR-6-OFFLINECARD: SPA (ISR4221-2x1GE) offline in subslot 0/0 *Jun 23 22:33:08.295: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0 *Jun 23 22:33:08.295: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0 *Jun 23 22:33:08.384: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 0 *Jun 23 22:33:08.467: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0 IOSD RP: 1 messages not written to btrace log fileJun 23 22:33:48.316: %PMAN-3-PROCHOLDDOWN: R0/0: The process linux_iosd-image has been helddown (rc 139) Jun 23 22:33:48.701: %PMAN-0-PROCFAILCRIT: R0/0: pvp: A critical process linux_iosd_image has failed (rc 139) Jun 23 22:33:51.098: %PMAN-5-EXITACTION: R0/0: pvp: Process manager Initializing Hardware ... Checking for PCIe device presence...done System integrity status: 0x610 Rom image verified correctly System Bootstrap, Version 16.7(3r), RELEASE SOFTWARE Copyright (c) 1994-2017 by cisco Systems, Inc. Current image running: Boot ROM0 Last reset cause: LocalSoft ISR4221/K9 platform with 4194304 Kbytes of main memory
06-23-2019 06:20 PM
Hi,
You could be hitting a software bug
Have you tried another IOS version like isr4200-universalk9_ias.16.09.03.SPA.bin?
Thanks
John
06-23-2019 11:37 PM
Hi,
This seems like your software image is having a bug so change the image and try again.
Regards,
Deepak Kumar
06-23-2019 11:46 PM
06-24-2019 12:05 AM
fixed it now by upgrading Rommon and Suggestions above
how to stop is looping back into Rommon after it reboots
06-24-2019 12:30 AM
Set the boot variable :
dir
note the image file in the flash - and location of the file
config t
boot system flash bootflash:isr-XXXXXXXXXXX.SPA.bin <<-- make sure you change the correct bin file name here
end
wr
test and advise
06-24-2019 12:40 AM
Hi,
Set the boot variable to fix this issue.
config t
boot system flash bootflash:XXXXXXXXXXX.bin <<-- XXXXXXXXX is the ISO file name with file extension.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide