Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Loading new configuration from flash on 3845 router

Posted on 2011-03-24
3
Medium Priority
?
458 Views
Last Modified: 2012-05-11
I have a router in our lab that the Customer provided a 64MB flash with new configurations. I recovered the password on the current version. Now, that password does not work with the new flash card installed. If I recover the password a second time, do the steps change to insure that the new config copy over?  would I change the copy startup to running  step to copy flash (name of file) to startup?

BTW - I enrolled myself (out of pocket) for the CCNA Boot Camp next week!
0
Comment
Question by:scooch66
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 35210276
>do the steps change to insure that the new config copy over?
Yes

>would I change the copy startup to running  step to copy flash (name of file) to startup?
Normally one of the password recovery steps is to save the current config (with the new password).

>I enrolled myself (out of pocket) for the CCNA Boot Camp next week!
Password recovery isn't covered in the courseware. So unless your instructor "value adds" that topic, it won't be covered.
0
 

Author Comment

by:scooch66
ID: 35210543
the password recovery is simple enough. my concern is making sure the config on the flash copy over to the NVRAM @ some point during the process....if I am on 0x2142 during the password recovery steps, when do i go back to 0x2102 to copy flash to startup config?
0
 
LVL 50

Accepted Solution

by:
Don Johnston earned 400 total points
ID: 35210841
When you've finished setting the new password and re-enabled the interfaces.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
Great sound, comfort and fit, excellent build quality, versatility, compatibility. These are just some of the many reasons for choosing a headset from Sennheiser.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question