05-20-2021 10:34 AM
I have a 9200L I am trying to upgrade the IOS on. Initially it wouldn't boot into IOS at all and I have to boot from ROMMON using the USB stick, so I know it works, but once I get into IOS it won't recognize it. usbflash0: and usbflash1: aren't options for dir or copy commands
05-20-2021 10:47 AM - edited 05-20-2021 10:48 AM
Get any 16GB USB and formatted FAT 32 and use it.
when you plug the USB, do you see any Logs ?
type dir see what device name for USB
switch: dev
switch: set
switch: dir usbflash0:
05-20-2021 10:59 AM
I don't see any logs regarding USB, and no USB devices show up under
I am at the switch# prompt, I had no problems with the USB in ROMMON and I was able to boot from it into IOS, but once I'm in IOS I can't see the USB anymore
05-20-2021 11:26 AM
I am at the switch# prompt, I had no problems with the USB in ROMMON and I was able to boot from it into IOS, but once I'm in IOS I can't see the USB anymore
you mean when you are ROMMON you able to view USB, once it booted normal you can not view USB ?
Once booted and you are # prompt
remove USB, and re-insert and post below information :
#dir
# show version
# show logg
05-20-2021 12:21 PM
Hopefully this has what you need. I removed some identifiable information as well as bunch of redundant radius logs (the switch is offline so it complains it can't talk to radius a lot)
switch#dir
Directory of flash:/
32386 -rw- 2131 May 20 2021 13:44:25 -05:00 boothelper.log
32393 -rw- 616 May 20 2021 13:45:28 -05:00 vlan.dat
56673 drwx 4096 May 20 2021 11:11:01 -05:00 .installer
32387 -rw- 851 May 20 2021 13:44:05 -05:00 bootloader_evt_handle.log
56674 drwx 4096 Jan 18 2020 04:51:53 -06:00 core
64769 drwx 4096 May 20 2021 11:13:05 -05:00 .prst_sync
80961 drwx 4096 May 20 2021 10:54:01 -05:00 .rollback_timer
56677 drwx 4096 May 20 2021 09:38:00 -05:00 tech_support
56678 drwx 4096 May 20 2021 13:44:23 -05:00 dc_profile_dir
32395 -rw- 34 Oct 1 2020 19:45:59 -05:00 pnp-tech-time
32389 -rw- 132108 May 20 2021 13:44:38 -05:00 memleak.tcl
105251 drwx 4096 Jan 18 2020 02:02:26 -06:00 .dbpersist
32391 -rw- 862 May 20 2021 13:45:48 -05:00 rdope_out.txt
32392 -rw- 89 May 20 2021 13:45:45 -05:00 rdope.log
32398 -rw- 2097152 May 20 2021 14:01:39 -05:00 nvram_config
32394 -rw- 2097152 May 20 2021 14:01:39 -05:00 nvram_config_bkup
56680 drwx 4096 Jan 18 2020 04:51:33 -06:00 onep
32396 -rw- 72539 Oct 1 2020 19:46:08 -05:00 pnp-tech-discovery-summary
32399 drwx 4096 May 20 2021 13:45:31 -05:00 license_evlog
32404 -rw- 0 May 20 2021 13:45:48 -05:00 dope_hist
56700 -rw- 299574284 Jan 18 2020 04:54:06 -06:00 cat9k_lite-rpbase.16.09.04.SPA.pkg
56703 -rw- 35549545 Jan 18 2020 04:54:39 -06:00 cat9k_lite-rpboot.16.09.04.SPA.pkg
56701 -rw- 3101708 Jan 18 2020 04:54:06 -06:00 cat9k_lite-srdriver.16.09.04.SPA.pkg
56702 -rw- 7586824 Jan 18 2020 04:54:06 -06:00 cat9k_lite-webui.16.09.04.SPA.pkg
32388 -rw- 140 May 20 2021 11:43:59 -05:00 boothelper.log.old
32397 -rw- 345746125 Oct 1 2020 16:56:14 -05:00 cat9k_lite_iosxe.16.09.05.SPA.bin
56716 -rw- 299742220 May 20 2021 10:49:21 -05:00 cat9k_lite-rpbase.16.09.05.SPA.pkg
56719 -rw- 35546813 May 20 2021 10:50:09 -05:00 cat9k_lite-rpboot.16.09.05.SPA.pkg
56717 -rw- 3109900 May 20 2021 10:49:21 -05:00 cat9k_lite-srdriver.16.09.05.SPA.pkg
56718 -rw- 7590920 May 20 2021 10:49:21 -05:00 cat9k_lite-webui.16.09.05.SPA.pkg
32400 -rw- 4877 Oct 1 2020 18:20:14 -05:00 cat9k_lite_iosxe.16.09.05.SPA.conf
97156 -rw- 4877 Oct 1 2020 21:11:21 -05:00 cat9k_lite_iosxe.16.09.05.SPA.1.conf
56715 -rw- 4877 May 20 2021 10:50:09 -05:00 packages.conf
switch#sh ver
1956839424 bytes total (808042496 bytes free)
Cisco IOS XE Software, Version 16.12.04
Cisco IOS Software [Gibraltar], Catalyst L3 Switch Software (CAT9K_LITE_IOSXE), Version 16.12.4, RELEASE SOFTWARE (fc5)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2020 by Cisco Systems, Inc.
Compiled Thu 09-Jul-20 19:31 by mcpre
Cisco IOS-XE software, Copyright (c) 2005-2020 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
ROM: IOS-XE ROMMON
BOOTLDR: System Bootstrap, Version 16.12.1r [FC6], RELEASE SOFTWARE (P)
switch uptime is 19 minutes
Uptime for this control processor is 21 minutes
System returned to ROM by Power Failure or Unknown at 13:37:58 CDT Thu May 20 2021
System image file is "usbflash0:\cat9k_lite_iosxe.16.12.04.SPA.bin"
Last reload reason: Power Failure or Unknown
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
Technology Package License Information:
------------------------------------------------------------------------------
Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------------------
network-essentials Smart License network-essentials
dna-essentials Subscription Smart License dna-essentials
Smart Licensing Status: REGISTERED/AUTHORIZED
cisco C9200L-48P-4G (ARM64) processor with 521022K/3071K bytes of memory.
Processor board ID JAD240305AU
3 Virtual Ethernet interfaces
52 Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
2015204K bytes of physical memory.
819200K bytes of Crash Files at crashinfo:.
1941504K bytes of Flash at flash:.
0K bytes of WebUI ODM Files at webui:.
Base Ethernet MAC Address : 4c:e1:76:b2:5b:00
Motherboard Assembly Number : 73-18365-07
Motherboard Serial Number : JAD240305AU
Model Revision Number : H0
Motherboard Revision Number : A0
Model Number : C9200L-48P-4G
System Serial Number : JAD240305AU
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
* 1 52 C9200L-48P-4G 16.12.4 CAT9K_LITE_IOSXE BUNDLE
switch#sh logg
Syslog logging: enabled (0 messages dropped, 2 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)
No Active Message Discriminator.
No Inactive Message Discriminator.
Console logging: level emergencies, 0 messages logged, xml disabled,
filtering disabled
Monitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabled
Buffer logging: level informational, 247 messages logged, xml disabled,
filtering disabled
Exception Logging: size (4096 bytes)
Count and timestamp logging messages: disabled
File logging: disabled
Persistent logging: disabled
No active filter modules.
Trap logging: level informational, 251 message lines logged
Logging to n.n.n.n (udp port 514, audit disabled,
link up),
250 message lines logged,
0 message lines rate-limited,
0 message lines dropped-by-MD,
xml disabled, sequence number disabled
filtering disabled
Logging Source-Interface: VRF Name:
Log Buffer (5000000 bytes):
*May 20 18:45:12.944: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is allowed
*May 20 18:45:15.907: %SMART_LIC-6-AGENT_READY: Smart Agent for Licensing is initialized
*May 20 18:45:15.907: %SMART_LIC-6-AGENT_ENABLED: Smart Agent for Licensing is enabled
*May 20 18:45:15.909: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is allowed
*May 20 18:45:18.863: %SMART_LIC-6-HA_ROLE_CHANGED: Smart Agent HA role changed to Active.
*May 20 18:45:20.465: %CRYPTO-4-AUDITWARN: Encryption audit check could not be performed
*May 20 18:45:20.650: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
*May 20 18:45:21.082: %LINK-3-UPDOWN: Interface Lsmpi10/3, changed state to up
*May 20 18:45:21.106: %LINK-3-UPDOWN: Interface EOBC10/1, changed state to up
*May 20 18:45:21.716: %HMANRP-6-HMAN_IOS_CHANNEL_INFO: HMAN-IOS channel event for switch 1: EMP_RELAY: Channel UP!
*May 20 18:45:21.741: %LINK-3-UPDOWN: Interface GigabitEthernet0/0, changed state to down
*May 20 18:45:21.761: %LINK-5-CHANGED: Interface Bluetooth0/4, changed state to administratively down
*May 20 18:45:21.761: %LINK-3-UPDOWN: Interface LIIN10/2, changed state to up
*May 20 18:45:22.200: %LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi10/3, changed state to up
*May 20 18:45:22.200: %LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC10/1, changed state to up
*May 20 18:44:58.442: %STACKMGR-6-STACK_LINK_CHANGE: Switch 1 R0/0: stack_mgr: Stack port 1 on Switch 1 is nocable
*May 20 18:44:58.442: %STACKMGR-6-STACK_LINK_CHANGE: Switch 1 R0/0: stack_mgr: Stack port 2 on Switch 1 is down
*May 20 18:44:58.447: %STACKMGR-6-STACK_LINK_CHANGE: Switch 1 R0/0: stack_mgr: Stack port 2 on Switch 1 is nocable
*May 20 18:44:59.047: %STACKMGR-4-SWITCH_ADDED: Switch 1 R0/0: stack_mgr: Switch 1 has been added to the stack.
*May 20 18:45:02.297: %STACKMGR-4-SWITCH_ADDED: Switch 1 R0/0: stack_mgr: Switch 1 has been added to the stack.
*May 20 18:45:04.304: %STACKMGR-4-SWITCH_ADDED: Switch 1 R0/0: stack_mgr: Switch 1 has been added to the stack.
*May 20 18:45:04.304: %STACKMGR-6-ACTIVE_ELECTED: Switch 1 R0/0: stack_mgr: Switch 1 has been elected ACTIVE.
*May 20 18:45:11.869: %TDLDB-6-DBPERSIST_OPERATION_INFO: Switch 1 R0/0: repm: Cancelled restore operation and is intended - DB: /tmp/rp/tdldb/0/DMI_STATE_DB, Reason: DB base pointer mismatched
*May 20 18:45:22.359: %HMANRP-6-EMP_NO_ELECTION_INFO: Could not elect active EMP switch, setting emp active switch to 0: EMP_RELAY: Could not elect switch with mgmt port UP
*May 20 18:45:22.841: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/0, changed state to down
*May 20 18:45:22.841: %LINEPROTO-5-UPDOWN: Line protocol on Interface Bluetooth0/4, changed state to down
*May 20 18:45:22.841: %LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN10/2, changed state to up
*May 20 18:45:23.104: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0
*May 20 18:45:23.164: %IOSXE_MGMTVRF-6-CREATE_SUCCESS_INFO: Management vrf Mgmt-vrf created with ID 1, ipv4 table-id 0x1, ipv6 table-id 0x1E000001
*May 20 18:45:23.206: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0
*May 20 18:45:23.219: %IOSXE_MGMTVRF-6-CREATE_SUCCESS_INFO: Management vrf Mgmt-vrf created with ID 1, ipv4 table-id 0x1, ipv6 table-id 0x1E000001
*May 20 18:45:23.220: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0
*May 20 18:45:23.496: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Base was enabled by Default
*May 20 18:45:24.230: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down
*May 20 18:45:24.234: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named SLA-KeyPair has been generated or imported by crypto config
*May 20 18:45:24.249: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named SLA-KeyPair2 has been generated or imported by crypto config
*May 20 18:45:24 UTC: %SYS-5-LOG_CONFIG_CHANGE: Buffer logging: level informational, xml disabled, filtering disabled, size (5000000)
*May 20 18:45:24 UTC: %SYS-5-LOG_CONFIG_CHANGE: Console logging: level emergencies, xml disabled, filtering disabled
*May 20 12:45:24 CST: %SYS-6-CLOCKUPDATE: System clock has been updated from 18:45:24 UTC Thu May 20 2021 to 12:45:24 CST Thu May 20 2021, configured from console by vty0.
*May 20 13:45:24 CDT: %SYS-6-CLOCKUPDATE: System clock has been updated from 12:45:24 CST Thu May 20 2021 to 13:45:24 CDT Thu May 20 2021, configured from console by vty0.
*May 20 13:45:25 CDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan657, changed state to down
*May 20 13:45:26 CDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: TP-self-signed-1824091435 created succesfully
*May 20 13:45:26 CDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: SLA-TrustPoint created succesfully
*May 20 13:45:28 CDT: %SYS-5-CONFIG_I: Configured from memory by console
*May 20 13:45:28 CDT: %SYS-5-CONFIG_P: Configured programmatically by process CPP MQC QoS Policy manager from console as vty1
*May 20 13:45:28 CDT: %PLATFORM_FEP-1-FRU_PS_SIGNAL_OK: Switch 1: signal on power supply A is restored
*May 20 13:45:28 CDT: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan624, changed state to down
*May 20 13:45:28 CDT: %LINK-5-CHANGED: Interface GigabitEthernet0/0, changed state to administratively down
*May 20 13:45:29 CDT: %LINK-5-CHANGED: Interface Vlan1, changed state to administratively down
*May 20 13:45:30 CDT: %SSH-5-ENABLED: SSH 1.99 has been enabled
*May 20 13:45:31 CDT: %SYS-5-RESTART: System restarted --
*May 20 13:45:31 CDT: %SNMP-5-COLDSTART: SNMP agent on host switch is undergoing a cold start
*May 20 13:45:36 CDT: %PNP-6-PNP_DISCOVERY_STOPPED: PnP Discovery stopped (Startup Config Present)
*May 20 13:45:40 CDT: %PKI-4-TRUSTPOOL_CERTIFICATE_SAVE_CHANGE: Downloaded Trustpool certificates present prior to image upgrade should be re-downloaded.Issue 'crypto pki trustpool import url <url>' to re-download the certificates.
*May 20 13:45:41 CDT: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is OFF
*May 20 13:45:41 CDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI created succesfully
*May 20 13:45:41 CDT: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named CISCO_IDEVID_SUDI has been generated or imported by pki-sudi
*May 20 13:45:41 CDT: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI0 created succesfully
*May 20 13:45:41 CDT: %PKI-2-NON_AUTHORITATIVE_CLOCK: PKI functions can not be initialized until an authoritative time source, like NTP, can be obtained.
*May 20 13:46:07 CDT: %PKI-6-CONFIGAUTOSAVE: Running configuration saved to NVRAM
*May 20 14:01:34 CDT: %SYS-6-BOOTTIME: Time taken to reboot after reload = 1416 seconds
*May 20 14:03:00 CDT: %SEC_LOGIN-5-LOGIN_SUCCESS: Login Success [user: admin] [Source: LOCAL] [localport: 0] at 14:03:00 CDT Thu May 20 2021
*May 20 14:04:37 CDT: %SYS-5-CONFIG_I: Configured from console by admin on console
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide