Solved

Taking backup config and flast of cisco router 2600

Posted on 2013-01-20
4
570 Views
Last Modified: 2013-01-29
hi experts,

i am new to this cisco networking. I purchased 2 routers of 2600 model and I was reading a book of how to backup the routers.

1. I installed the tftp server on my lab laptop. I pluged my console cable to the router and ran the hyperterminal. please note that there is no configuration on the router yet.

2. I tool an ethernet cable - straight and connected to the E0/1 port of the router to the laptop. I put a static ip on my laptop 172.16.1.100 SM 255.255.0.0

3. I did no shut on E0/1 interface of the router and also put the IP address 172.16.1.1 255.255.0.0.

for some reason from the laptop I can pint 172.16.1.1 but from the router session I can not pint the laptop IP 172.16.1.100. I get ping rate of 0%.

The COPY TFTP STARTUP-CONFIG --> gives me an error that it can not open.

Thanks,
0
Comment
Question by:Zak
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 14

Assisted Solution

by:JAN PAKULA
JAN PAKULA earned 250 total points
ID: 38799273
switch of your firewall or open up ports

check open ports with

cmd
netstat -an

JAN MA CCNA
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 250 total points
ID: 38799571
Agree with Jan. Typically if you can ping the router from the pc, but not the other way around, it is usually because of the firewall on the PC. Same reason it will not let tftp work.
0
 

Expert Comment

by:charlescheese
ID: 38800209
Windows Firewall or any HIPS is preventing the pings from being replied. Temporarily disable those.
0
 

Author Comment

by:Zak
ID: 38803604
ok i will try it.
0

Featured Post

Do you have a plan for Continuity?

It's inevitable. People leave organizations creating a gap in your service. That's where Percona comes in.

See how Pepper.com relies on Percona to:
-Manage their database
-Guarantee data safety and protection
-Provide database expertise that is available for any situation

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Is your computer hacked? learn how to detect and delete malware in your PC
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question