Solved

How to use SCP to transfer NX-OS image to Cisco Nexus 7K device.

Posted on 2015-02-17
2
2,987 Views
Last Modified: 2015-02-25
I tried TFTP and it kept timing out on the image file, the kickstart image transferred successfully, but was on 35mb where the system image file is 435mb. I wanted to try SCP, but can’t find any examples of how to use it for transferring a Cisco Nexus image.

Does the SCP work like TFTP in that I would start a SCP server and then place the files in the SCP directory and then do a

                  copy  scp://xxx.xxx.15.110/n7000-s2-dk9.6.2.12.bin bootflash:

Where xxx.xxx.15.110 would be the ip of the SCP server? I have turned on the SCP feature on the Nexus 7K device. I have securefx which supposedly works using SCP, but I have not been able to figure out how to use it for SCP.

I have looked a documentation from Cisco for using a SCP server, but still can't figure it out.

Need help?

Thank you,
0
Comment
Question by:dsterling
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 42

Assisted Solution

by:kevinhsieh
kevinhsieh earned 250 total points
ID: 40615927
I don't have a Nexus switch, but you may be able to use a SCP client like WinSCP to connect to your switch and upload it that way.

I personally have setup a regular anonymous FTP server on my workstation for uploading IOS images.
0
 
LVL 22

Accepted Solution

by:
eeRoot earned 250 total points
ID: 40617793
SCP will require a username and password when you set up the SCP server.  But aside from that, it works like TFTP.

If you don't have any luck with Securefx, try this one from SolarWinds.

http://www.solarwinds.com/products/freetools/free_tftp_server.aspx
0

Featured Post

Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses
Course of the Month11 days, 9 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question