Solved

Security Device Manager Cisco Router 2811

Posted on 2014-07-19
3
349 Views
Last Modified: 2014-07-25
From the website i got this info:
SDM (Security Device Manager) allows you to configure and manage your router via the use of a GUI. Please find the steps below :

1)Download the SDM-Vxx.zip file from Cisco's website.
2)Ensure that you have the sdmconfig*.cfg file within your routers flash for your version of router. You can confirm this by using the command `show flash`.

1) I tried to find SDM from cisco website but unable to find SDM, where I can download this file?

2) from the info (website) i did not see any file that resemble  sdmconfig*.cfg see the attachment , why should I do?
router-2811-v1.JPG
0
Comment
Question by:jamesbondky
  • 2
3 Comments
 
LVL 19

Accepted Solution

by:
Patricksr1972 earned 500 total points
ID: 40207162
Hi

If you have a Cisco login, just go to https://sso.cisco.com/autho/forms/CDClogin.html and login, download the SDM of choice.
If no account, just create one and login.
0
 

Author Comment

by:jamesbondky
ID: 40213384
would you be to answer option 2?
0
 
LVL 19

Expert Comment

by:Patricksr1972
ID: 40220000
Sdmconfig*.cfg when available in flash is a config that is needed if you want to factory-default the router.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

New Server 172.16.200.2  was moved from behind Router R2 f0/1 to behind router R1 int f/01 and has now address 172.16.100.2. But we want users still to be able to connected to it by old IP. How to do it ? We can used destination NAT (DNAT).  In DNAT…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now