Cisco switch start in Rommon mode after power outage

Posted on 2011-10-21
Last Modified: 2012-05-12
We have a cisco catalyst 4506 with Supervisor Engine II (WS-4013+). After power outage, the switch always start in Rommon mode.

Configuration register is 0X2102, system image file is "bootflash:cat4000-i9s-mz.122-18.EW3.bin". (show version)

we want to it always start in normal mode. What should i do?

many thanks,
Question by:BaoZiDeJia
    LVL 10

    Expert Comment

    It sounds like your flash memory took some damage.  is the card replaceable/

    Author Comment

    Sorry I'm new in this part, so just want to provide more information to you:

    #dir bootflash:
    Directory of bootflash:/

        1  -rwx    10322612  Sep 22 2006 04:38:36 +10:00  cat4000-i9s-mz.122-18.EW3.bin
        6  -rwx    12405740  Nov 24 2010 15:39:52 +10:00  cat4000-i9s-mz.122-25.EWA14.bin

    27262976 bytes total (3812960 bytes free)

    #show bootvar
    BOOT variable = cat4000-i9s-mz.122-25.EWA14.bin,1
    CONFIG_FILE variable does not exist
    BOOTLDR variable does not exist
    Configuration register is 0x2102

    Does it mean my flash memory card is damaged?

    LVL 10

    Expert Comment

    Could possibly be.  You can save the config to a new flash card .

    Author Comment


    Just realised we have two boot images in our flash card, and now we running use the first one (old one).

    Do you know how to delete the old image from flash, keep the new one there. Also will not lose our configurations.

    Could you please tell me the exactly steps, because i checked online and many people delete old one and a new one doesn't work as well. But I need to fix it before Monday.

    Many thanks!

    LVL 10

    Accepted Solution

    Your best bet is to back up your configurations to a text file.  if you use putty to connect to the swtich, the enable logging.  You can also set up a TFTP server (solarwinds has a free one) and backup the config to your workstation or a server.  I would upload the latest image for your switch, then remove the oldest, and boot from the newest.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    David Varnum recently wrote up his impressions of PRTG, based on a presentation by my colleague Christian at Tech Field Day at VMworld in Barcelona. Thanks David, for your detailed and honest evaluation!
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    26 Experts available now in Live!

    Get 1:1 Help Now