Foundry NetIron Config Change

Posted on 2006-03-21
Last Modified: 2013-12-02

Please can you provide me with the commands required to login and remove a static route from a NetIron 400.  Our network engineer is currently unavailable and this change needs to be done before they return.

The route which needs to be removed is the default route "ip route"

Many Thanks
Question by:john_the_baptist
    LVL 6

    Accepted Solution


    Not used the foundry NetIron 400 before, but at a guess i would go with the 'No' form of the command.


    no ip route

    To login you will need the super-user password. The easiest way would be to go for a direct console connection to the switch using something like Hyper Terminal.
    Once you have connected you will be prompted for a username/password.
    Once you are in, you will either be in USER or EXEC mode, depending on what password you entered.

    if in user mode, type 'enable' (You may be prompted for another password.)

    Switch> enable   (>=user mode)

    Then type 'Config T' to enter configuration mode.

    Switch#config t
    Switch(Config)# no ip route

    that should do the trick!

    Then use the write memory command to save your config.
    LVL 6

    Expert Comment

    P.s If you can't get direct access to the switch then you can always telnet to the device,Providing you know the telnet username and password.


    Author Comment

    Thanks, but what is the write memory command and finally could you give me the command to list the configuration to make sure that it has worked afterwards.  I believe it is something like show runn

    Author Comment

    Sorry, just picked up on "write memory" being the command.

    Many Thanks
    LVL 6

    Expert Comment

    To list the configuration afterwards, use the Show run command.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    The DSL Parameters part of this article is valid and can be considered with any brand of internet router and modem (Dlink, 3com, Alcatel, Usrobotics, Parks), by accessing the configuration interface available by the manufacturer eg: …
    ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now