Solved

Cisco ACS re-imaging with CIMC

Posted on 2016-10-13
2
63 Views
Last Modified: 2016-10-17
The Cisco 3415 ACS appliances came pre-loaded with 5.8 and I need to re-image to 5.4. Looking at the documentation below it looks like the two main options involve CIMC or installing from USB. Can I enable CIMC from serial console port connection? Or is KVM access required?
The devices are at a distant location and the less need for remote hands the easier it all is.

http://www.cisco.com/c/en/us/td/docs/net_mgmt/cisco_secure_access_control_system/5-4/installation/guide/csacs_book/csacs_ovr_ucs.html

Or is there a means to entirely downgrade the device via the management GUI, console or SSH connection that does not require CIMC?

Thank you.
0
Comment
Question by:amigan_99
2 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 41843430
You can enable CIMC by connecting the port to a network running DHCP.  The CIMC interface will obtain an IP then you can web-browse to the CIMC and do everything you need from there.  You'll be able to mount the ACS ISO via remote KVM through the browser.
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 41847254
Thanks much Craig.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Each year, investment in cloud platforms grows more than 20% (https://www.immun.io/hubfs/Immunio_2016/Content/Marketing/Cloud-Security-Report-2016.pdf?submissionGuid=a8d80a00-6fee-4b85-81db-a4e28f681762) as an increasing number of companies begin to…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question