Solved

How to use SCP to transfer NX-OS image to Cisco Nexus 7K device.

Posted on 2015-02-17
2
2,299 Views
Last Modified: 2015-02-25
I tried TFTP and it kept timing out on the image file, the kickstart image transferred successfully, but was on 35mb where the system image file is 435mb. I wanted to try SCP, but can’t find any examples of how to use it for transferring a Cisco Nexus image.

Does the SCP work like TFTP in that I would start a SCP server and then place the files in the SCP directory and then do a

                  copy  scp://xxx.xxx.15.110/n7000-s2-dk9.6.2.12.bin bootflash:

Where xxx.xxx.15.110 would be the ip of the SCP server? I have turned on the SCP feature on the Nexus 7K device. I have securefx which supposedly works using SCP, but I have not been able to figure out how to use it for SCP.

I have looked a documentation from Cisco for using a SCP server, but still can't figure it out.

Need help?

Thank you,
0
Comment
Question by:dsterling
2 Comments
 
LVL 42

Assisted Solution

by:kevinhsieh
kevinhsieh earned 250 total points
ID: 40615927
I don't have a Nexus switch, but you may be able to use a SCP client like WinSCP to connect to your switch and upload it that way.

I personally have setup a regular anonymous FTP server on my workstation for uploading IOS images.
0
 
LVL 22

Accepted Solution

by:
eeRoot earned 250 total points
ID: 40617793
SCP will require a username and password when you set up the SCP server.  But aside from that, it works like TFTP.

If you don't have any luck with Securefx, try this one from SolarWinds.

http://www.solarwinds.com/products/freetools/free_tftp_server.aspx
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question