cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4733
Views
0
Helpful
11
Replies

procedure to upgrade ios in Cisco 9407 running SVL Chassis

kick534
Level 1
Level 1

Hello,

 

I need to know the procedure to upgrade ios image in Cisco 9407 running SVL Chassis.

already two 9407 core switches  up and running with SVL and DAD.

1) Now both switches are logical one so need upgrade in one switch only please advice

old version :

Cisco IOS Software [Fuji], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 16.9.2, RELEASE SOFTWARE (fc4)

 

Need Up to upgrade with :

Cisco IOS XE Fuji 16.9.4

 

Thanks

1 Accepted Solution

Accepted Solutions

Hello kick534,

SSO = Stateful Switchover is the name of the most efficient redundancy protocol spoken by the two supervisors between them over the SVL bundle.

SSO supports only two supervisors ( a pair) and allows to have an hot standby supervisor: the standby supervisor can take the role of active supervisor in a very short time as it is synchronized with the current active on the following aspects:

- configuration file

- L2 control protocols STP, VTP and so on

- L3 routing table

- L3 routing protocols active and what neighbors are alive for each protocol (which BGP sessions are alive for BGP)

- CAM table contents

- ARP table contents

- CEF adjacency table

- CEF FIB table

- state of linecards and state of ports in each linecard.

 

SSO is required to perform an In Service Software upgrade ISSU.

So SSO must be enabled and operational

You can check with

show redundancy

 

NSF = Non Stop Forwarding is a feature that uses SSO and attempts to perform a supervisor switchover with minimal loss of user traffic.

Actually the NSF uses different techniques called graceful restart that have different implementations in routing protocols like OSPF, EIGRP and BGP to hide the switchover from the network.

The NSF / graceful restart capable device have two supervisors and a forwarding plane indipendent from supervisors.

The OSPF/EIGRP neighbors wil act as NSF aware helpers hiding the supervisor swithcover from the rest of the network.

For OSPF the device performing switchover is considered as alive for a period of time (the grace period for example 180 seconds) even if after the sending of the special graceful restart LSA no OSPF hellos are received.

Traffic can be routed to the device under switchover because of indipendency of the forwarding plane (CEF table stored on linecards for example).

 

Both SSO and NSF are required to perform an ISSU.

In addition to this the current IOS XE and the target IOS XE image must be "near" enough that do not require firmware upgrade on linecards or ROMMON update.

 

Edit:

from your show version we see the following line:

>> System image file is "bootflash:packages.conf"

 

So your current IOS XE is not using a single .bin file as we were used with IOS, but it using packages that are listed in the packages.conf file.

So to make a backup of your current IOS XE installation you should copy to a TFTP server the following files:

52 27034568 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-cc_srdriver.16.09.02.SPA.pkg
53 81007556 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-espbase.16.09.02.SPA.pkg
54 1647556 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-guestshell.16.09.02.SPA.pkg
55 423424960 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-rpbase.16.09.02.SPA.pkg
56 33273323 Apr 19 2019 10:40:16.0000000000 +00:00 cat9k-rpboot.16.09.02.SPA.pkg
57 28881860 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-sipbase.16.09.02.SPA.pkg
58 54854592 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-sipspa.16.09.02.SPA.pkg
59 34788292 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-srdriver.16.09.02.SPA.pkg
60 15836096 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-webui.16.09.02.SPA.pkg
61 9152 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-wlc.16.09.02.SPA.pkg
62 7554 Apr 19 2019 10:40:16.0000000000 +00:00 packages.conf

 

I would also copy to TFTP server the vlan.dat file for safety.

 

Now, the so called Install mode refers on how IOS XE is installed used in your switch. It is not related to the licenses.

 

Edit2:

IOS XE can be installed in two ways: bundle mode and install mode.

the bundle mode uses a single .bin file, the install mode uses the packages file and the packages.conf provisioning file.

for reference see the following link

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/system_management/configuration_guide/b_sm_3se_3850_cg/b_sm_3se_3850_cg_chapter_010100.html

 

Your switch is already running in install mode.

Perform all the checks with

show redundancy

show redundancy states

show cef states

 

to verify SSO and NSF are operational.

Then you can follow the ISSU procedure on pag. 43.

 

IMPORTANT WARNING:

On pag 44 of the document provided by BB it says ISSU is supported over SVL pair. You can use two different procedures to perform ISSU.

 

A limitation is that you cannot perform ISSU from 16.9.x to 16.10.x

 

Hope to help

Giuseppe

 

View solution in original post

11 Replies 11

thank for reply,

 

can you please provide me info where is the ios image below, because its showing pkg files first i want take backup for old ios image

 

#Switch#show flash:
-#- --length-- ---------date/time--------- path
2 4096 Sep 03 2019 18:26:52.0000000000 +00:00 .installer
3 4096 Apr 19 2019 15:08:34.0000000000 +00:00 .installer/issu_crash
4 4096 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback
5 117 Apr 19 2019 10:41:25.0000000000 +00:00 .installer/rollback/rollback_points.txt
6 4096 Apr 19 2019 10:41:21.0000000000 +00:00 .installer/rollback/rb_points
7 4096 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback/rb_points/0
8 6648 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback/rb_points/0/packages.conf
9 0 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback/rb_points/0/bundle_mode
10 10 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback/rb_points/0/patch.sta
11 13 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback/rb_points/0/bootdir
12 598 Apr 19 2019 10:39:06.0000000000 +00:00 .installer/rollback/rb_points/0/pkginfo
13 4096 Apr 19 2019 10:41:25.0000000000 +00:00 .installer/rollback/rb_points/1
14 7554 Apr 19 2019 10:41:21.0000000000 +00:00 .installer/rollback/rb_points/1/packages.conf
--More--   15 10 Apr 19 2019 10:41:21.0000000000 +00:00 .installer/rollback/rb_points/1/bootdir
16 598 Apr 19 2019 10:41:25.0000000000 +00:00 .installer/rollback/rb_points/1/pkginfo
17 10 Apr 19 2019 10:41:25.0000000000 +00:00 .installer/rollback/rb_points/1/patch.sta
18 0 Apr 19 2019 10:39:31.0000000000 +00:00 .installer/.install_add_pkg_list.prev.txt
19 629 Apr 19 2019 10:40:30.0000000000 +00:00 .installer/install_add_oper.log
20 5 Apr 19 2019 10:41:21.0000000000 +00:00 .installer/install_global_trans_lock
21 10 Apr 19 2019 10:41:21.0000000000 +00:00 .installer/install_state
22 1554 Sep 03 2019 18:26:53.0000000000 +00:00 bootloader_evt_handle.log
23 4096 Jun 01 2019 22:26:16.0000000000 +00:00 core
24 4096 Apr 19 2019 15:08:32.0000000000 +00:00 core/modules
25 4096 Apr 19 2019 10:41:21.0000000000 +00:00 .rollback_timer
26 4096 Apr 19 2019 15:08:34.0000000000 +00:00 gs_script
27 4096 Apr 19 2019 15:08:34.0000000000 +00:00 tech_support
28 2324 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/multicast.tcl
29 890 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/platform-fabric-vrf-ipv4.tcl
30 913 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/platform-fabric-vrf-ipv6.tcl
--More--   31 26638 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/platform-fabric-vrf-source.tcl
32 519 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/platform-fabric.tcl
33 1548 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/platform_evpn_vxlan.tcl
34 18261 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/unicast.tcl
35 336 Sep 03 2019 18:27:09.0000000000 +00:00 tech_support/utils.tcl
36 162 Sep 03 2019 18:27:10.0000000000 +00:00 boothelper.log
37 123888 Sep 03 2019 18:27:34.0000000000 +00:00 memleak.tcl
38 4096 Apr 19 2019 15:09:11.0000000000 +00:00 onep
39 4096 Apr 19 2019 15:09:11.0000000000 +00:00 onep/apps-cli
40 4096 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh
41 965 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh/ssh_host_key
42 630 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh/ssh_host_key.pub
43 1675 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh/ssh_host_rsa_key
44 382 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh/ssh_host_rsa_key.pub
45 668 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh/ssh_host_dsa_key
46 590 Apr 12 2019 18:02:55.0000000000 +00:00 .ssh/ssh_host_dsa_key.pub
47 4096 Sep 01 2019 23:38:47.0000000000 +00:00 .prst_sync
48 33554432 Sep 03 2019 19:29:50.0000000000 +00:00 nvram_config
49 242 Sep 03 2019 18:40:51.0000000000 +00:00 smart_overall_health.log
50 112 Sep 01 2019 20:28:24.0000000000 +00:00 .ngmod_chassis_prd
--More--   51 556 Sep 02 2019 00:59:12.0000000000 +00:00 vlan.dat
52 27034568 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-cc_srdriver.16.09.02.SPA.pkg
53 81007556 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-espbase.16.09.02.SPA.pkg
54 1647556 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-guestshell.16.09.02.SPA.pkg
55 423424960 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-rpbase.16.09.02.SPA.pkg
56 33273323 Apr 19 2019 10:40:16.0000000000 +00:00 cat9k-rpboot.16.09.02.SPA.pkg
57 28881860 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-sipbase.16.09.02.SPA.pkg
58 54854592 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-sipspa.16.09.02.SPA.pkg
59 34788292 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-srdriver.16.09.02.SPA.pkg
60 15836096 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-webui.16.09.02.SPA.pkg
61 9152 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-wlc.16.09.02.SPA.pkg
62 7554 Apr 19 2019 10:40:16.0000000000 +00:00 packages.conf
9257340928 bytes available (735514624 bytes used)

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

hello Mr. balaji

last discussion not received any text.

i need to know the .bin file of ios in comment

Can you post output of below command from switch.

 

dir

show verion 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

actually i only take show flash and show ver only

 

#Switch#show ver
Cisco IOS XE Software, Version 16.09.02
Cisco IOS Software [Fuji], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 16.9.2, RELEASE SOFTWARE (fc4)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2018 by Cisco Systems, Inc.
Compiled Mon 05-Nov-18 19:32 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2018 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: IOS-XE ROMMON
BOOTLDR: System Bootstrap, Version 16.6.2r[FC1], RELEASE SOFTWARE (P)

Switch uptime is 1 hour, 29 minutes
--More--  Uptime for this control processor is 1 hour, 32 minutes
System returned to ROM by PowerOn at 23:33:28 UTC Sun Sep 1 2019
System image file is "bootflash:packages.conf"
Last reload reason: PowerOn

 

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


--More--  Technology Package License Information:

------------------------------------------------------------------------------
Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------------------
network-advantage Smart License network-advantage
dna-advantage Subscription Smart License dna-advantage


Smart Licensing Status: UNREGISTERED/EVAL MODE

cisco C9407R (X86) processor (revision V01) with 1942217K/6147K bytes of memory.
Processor board ID
1 Virtual Ethernet interface
192 Gigabit Ethernet interfaces
112 Ten Gigabit Ethernet interfaces
4 Forty Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
15956812K bytes of physical memory.
10444800K bytes of Bootflash at bootflash:.
10444800K bytes of Bootflash at bootflash-2-0:.
--More--  1638400K bytes of Crash Files at crashinfo:.
1638400K bytes of Crash Files at crashinfo-2-0:.
2147483647K bytes of SATA hard disk at disk0:.
2147483647K bytes of SATA hard disk at disk0-2-0:.
0K bytes of WebUI ODM Files at webui:.

Base Ethernet MAC Address :
Motherboard Assembly Number : 4AAE
Motherboard Serial Number :
Model Revision Number : V02
Motherboard Revision Number : 1
Model Number : C9407R
System Serial Number :

Switch 02
---------
Base Ethernet MAC Address:
Motherboard Assembly Number: 4AAE
Motherboard Serial Number:
Model Revision Number: V02
Motherboard Revision Number: 1
Model Number: C9407R
System Serial Number:
--More--  
Configuration register is 0x102

if you dir you can see the .bin file in bootflash

 

#dir

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Thank for your reply,

i will check that , regarding to below :

 

Prerequisites for Performing ISSU :

The following prerequisites apply for performing ISSU:

• The active switch must have access to the new IOS XE image or pre-load it into flash. ( already uploaded new image in switch )

• The switch must be running in install mode.( where to the switch in Install Mode  because show ver not showing in which mode in show licenses showing evaluation mode)

• Non-Stop Forwarding(NSF)must be enabled :

Device(config)#redundancy

Device(config-red)#modesso

Device(config-red)#end

Device#

Please explain

Hello kick534,

SSO = Stateful Switchover is the name of the most efficient redundancy protocol spoken by the two supervisors between them over the SVL bundle.

SSO supports only two supervisors ( a pair) and allows to have an hot standby supervisor: the standby supervisor can take the role of active supervisor in a very short time as it is synchronized with the current active on the following aspects:

- configuration file

- L2 control protocols STP, VTP and so on

- L3 routing table

- L3 routing protocols active and what neighbors are alive for each protocol (which BGP sessions are alive for BGP)

- CAM table contents

- ARP table contents

- CEF adjacency table

- CEF FIB table

- state of linecards and state of ports in each linecard.

 

SSO is required to perform an In Service Software upgrade ISSU.

So SSO must be enabled and operational

You can check with

show redundancy

 

NSF = Non Stop Forwarding is a feature that uses SSO and attempts to perform a supervisor switchover with minimal loss of user traffic.

Actually the NSF uses different techniques called graceful restart that have different implementations in routing protocols like OSPF, EIGRP and BGP to hide the switchover from the network.

The NSF / graceful restart capable device have two supervisors and a forwarding plane indipendent from supervisors.

The OSPF/EIGRP neighbors wil act as NSF aware helpers hiding the supervisor swithcover from the rest of the network.

For OSPF the device performing switchover is considered as alive for a period of time (the grace period for example 180 seconds) even if after the sending of the special graceful restart LSA no OSPF hellos are received.

Traffic can be routed to the device under switchover because of indipendency of the forwarding plane (CEF table stored on linecards for example).

 

Both SSO and NSF are required to perform an ISSU.

In addition to this the current IOS XE and the target IOS XE image must be "near" enough that do not require firmware upgrade on linecards or ROMMON update.

 

Edit:

from your show version we see the following line:

>> System image file is "bootflash:packages.conf"

 

So your current IOS XE is not using a single .bin file as we were used with IOS, but it using packages that are listed in the packages.conf file.

So to make a backup of your current IOS XE installation you should copy to a TFTP server the following files:

52 27034568 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-cc_srdriver.16.09.02.SPA.pkg
53 81007556 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-espbase.16.09.02.SPA.pkg
54 1647556 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-guestshell.16.09.02.SPA.pkg
55 423424960 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-rpbase.16.09.02.SPA.pkg
56 33273323 Apr 19 2019 10:40:16.0000000000 +00:00 cat9k-rpboot.16.09.02.SPA.pkg
57 28881860 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-sipbase.16.09.02.SPA.pkg
58 54854592 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-sipspa.16.09.02.SPA.pkg
59 34788292 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-srdriver.16.09.02.SPA.pkg
60 15836096 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-webui.16.09.02.SPA.pkg
61 9152 Apr 19 2019 10:40:00.0000000000 +00:00 cat9k-wlc.16.09.02.SPA.pkg
62 7554 Apr 19 2019 10:40:16.0000000000 +00:00 packages.conf

 

I would also copy to TFTP server the vlan.dat file for safety.

 

Now, the so called Install mode refers on how IOS XE is installed used in your switch. It is not related to the licenses.

 

Edit2:

IOS XE can be installed in two ways: bundle mode and install mode.

the bundle mode uses a single .bin file, the install mode uses the packages file and the packages.conf provisioning file.

for reference see the following link

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3850/software/release/3se/system_management/configuration_guide/b_sm_3se_3850_cg/b_sm_3se_3850_cg_chapter_010100.html

 

Your switch is already running in install mode.

Perform all the checks with

show redundancy

show redundancy states

show cef states

 

to verify SSO and NSF are operational.

Then you can follow the ISSU procedure on pag. 43.

 

IMPORTANT WARNING:

On pag 44 of the document provided by BB it says ISSU is supported over SVL pair. You can use two different procedures to perform ISSU.

 

A limitation is that you cannot perform ISSU from 16.9.x to 16.10.x

 

Hope to help

Giuseppe

 

Thank you so much sir for your explanation, i will try with below procedure and get back to you.

@Giuseppe Larosa @balaji.bandi 

 

Thank you for your support to solve my issue:

 

what i understand :

When the switch is running in installed mode, this line displays the name and location of the booted Cisco IOS XE provisioning file, typically flash:packages.conf.

When the switch is running in bundle mode, this line displays the name and location of the booted Cisco IOS XE bundle file.

 

Once again Thanks a lot....

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card