Cisco 3850 downgrade from 16.6 to 3.7.5E
TEST-3850#request platform software package install switch all file flash:cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.bin new
--- Starting install local lock acquisition on switch 1 ---
Finished install local lock acquisition on switch 1
Expanding image file: flash:cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.bin
[1]: Expanding file
[1]: Finished expanding all-in-one software package in switch 1
SUCCESS: Finished expanding all-in-one software package.
[1]: Performing install
SUCCESS: install finished
[1]: install package(s) on switch 1
--- Starting list of software package changes ---
Old files list:
Removed cat3k_caa-guestshell.16.06.02.SPA.pkg
Removed cat3k_caa-rpbase.16.06.02.SPA.pkg
Removed cat3k_caa-rpcore.16.06.02.SPA.pkg
Removed cat3k_caa-srdriver.16.06.02.SPA.pkg
Removed cat3k_caa-webui.16.06.02.SPA.pkg
New files list:
Added cat3k_caa-base.SPA.03.07.05E.pkg
Added cat3k_caa-drivers.SPA.03.07.05E.pkg
Added cat3k_caa-infra.SPA.03.07.05E.pkg
Added cat3k_caa-iosd-universalk9.SPA.152-3.E5.pkg
Added cat3k_caa-platform.SPA.03.07.05E.pkg
Added cat3k_caa-wcm.SPA.10.3.150.0.pkg
Finished list of software package changes
SUCCESS: Software provisioned. New software will load on reboot.
[1]: Finished install successful on switch 1
Checking status of install on [1]
[1]: Finished install in switch 1
SUCCESS: Finished install: Success on [1]
TEST-3850#
TEST-3850#
TEST-3850#
TEST-3850#sh ver
Cisco IOS XE Software, Version 16.06.02
Cisco IOS Software [Everest], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 16.6.2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Wed 01-Nov-17 04:27 by mcpre
Cisco IOS-XE software, Copyright (c) 2005-2017 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
ROM: IOS-XE ROMMON
BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 4.68, RELEASE SOFTWARE (P)
TEST-3850 uptime is 1 hour, 24 minutes
Uptime for this control processor is 1 hour, 28 minutes
System returned to ROM by Power Failure
System image file is "flash:packages.conf"
Last reload reason: Power Failure
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
Technology Package License Information:
-----------------------------------------------------------------
Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
lanbasek9 Permanent lanbasek9
cisco WS-C3850-48P (MIPS) processor (revision X0) with 853402K/6147K bytes of memory.
Processor board ID FCW1943D1AG
1 Virtual Ethernet interface
52 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of WebUI ODM Files at webui:.
Base Ethernet MAC Address : 18:8b:45:4f:c8:00
Motherboard Assembly Number : 73-15800-07
Motherboard Serial Number : FOC19432LAD
Model Revision Number : X0
Motherboard Revision Number : B0
Model Number : WS-C3850-48P
System Serial Number : FCW1943D1AG
Switch Ports Model SW Version SW Image Mode
------ ----- ----- ---------- ---------- ----
* 1 56 WS-C3850-48P 16.6.2 CAT3K_CAA-UNIVERSALK9 INSTALL
Configuration register is 0x102
TEST-3850#dir
Directory of flash:/
7747 -rw- 2097152 Apr 3 2018 02:54:46 -07:00 nvram_config
7748 -rw- 1096 Apr 3 2018 01:33:09 -07:00 vlan.dat
7746 -rw- 35460 Dec 29 2015 09:51:12 -08:00 startup-config
7749 -rw- 298 Mar 19 2018 03:29:03 -07:00 eem_script.py
7751 drwx 4096 Apr 3 2018 01:29:10 -07:00 .installer
30983 -rw- 16181884 Jan 19 2018 03:04:22 -08:00 cat3k_caa-webui.16.06.02.SPA.pkg
54210 drwx 4096 Oct 4 2016 08:11:27 -07:00 vman_fdb
7760 drwx 4096 Mar 19 2018 05:18:27 -07:00 onep
7757 -rw- 76 Apr 3 2018 01:29:55 -07:00 boothelper.log
7750 -rw- 0 Apr 3 2018 02:56:38 -07:00 .onreboot
7772 -rw- 82000420 Apr 3 2018 02:55:04 -07:00 cat3k_caa-base.SPA.03.07.05E.pkg
7770 -rw- 1236 Apr 3 2018 02:56:20 -07:00 packages.conf
7765 -rw- 5663420 Apr 3 2018 02:55:01 -07:00 cat3k_caa-drivers.SPA.03.07.05E.pkg
30979 -rw- 19167872 Jan 19 2018 03:04:06 -08:00 cat3k_caa-guestshell.16.06.02.SPA.pkg
30980 -rw- 27906419 Jan 19 2018 03:04:06 -08:00 cat3k_caa-rpbase.16.06.02.SPA.pkg
30981 -rw- 331268728 Jan 19 2018 03:04:16 -08:00 cat3k_caa-rpcore.16.06.02.SPA.pkg
30982 -rw- 15323776 Jan 19 2018 03:04:22 -08:00 cat3k_caa-srdriver.16.06.02.SPA.pkg
7752 -rw- 222 Apr 3 2018 01:29:35 -07:00 bootloader_evt_handle.log
7753 drwx 4096 Jan 19 2018 03:18:26 -08:00 core
7754 drwx 4096 Jan 19 2018 03:10:47 -08:00 .prst_sync
15493 drwx 4096 Jan 19 2018 03:10:50 -08:00 .rollback_timer
7769 -rw- 36965384 Apr 3 2018 02:55:03 -07:00 cat3k_caa-infra.SPA.03.07.05E.pkg
7767 -rw- 46449984 Apr 3 2018 02:55:03 -07:00 cat3k_caa-iosd-universalk9.SPA.152-3.E5.pkg
38723 drwx 4096 Oct 4 2016 08:11:27 -07:00 virtual-instance
61954 drwx 4096 Apr 3 2018 01:29:52 -07:00 dc_profile_dir
61956 drwx 4096 Oct 4 2016 08:12:56 -07:00 wnweb_store
15494 drwx 4096 Jan 19 2018 03:22:46 -08:00 gs_script
7756 -rw- 98869 Apr 3 2018 01:30:13 -07:00 memleak.tcl
7759 -rw- 2097152 Apr 3 2018 02:54:46 -07:00 nvram_config_bkup
7768 -rw- 28959628 Apr 3 2018 02:55:03 -07:00 cat3k_caa-platform.SPA.03.07.05E.pkg
7771 -rw- 1236 Apr 3 2018 02:55:51 -07:00 cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.conf
7766 -rw- 128574272 Apr 3 2018 02:55:02 -07:00 cat3k_caa-wcm.SPA.10.3.150.0.pkg
7764 -rw- 4754 Apr 3 2018 02:56:20 -07:00 packages.conf.00-
1621966848 bytes total (718438400 bytes free)
TEST-3850#reload
Chassis 1 reloading, reason - Reload command
Apr 3 02:58:04.867 FP0/0: %PMAN-5-EXITACTI ON: Process manager is exiting: reload fp action requested
Apr 3 02:58:08.779 RP0/0: %PMAN-5-EXITACTION: Process manager is exiting: process exi
octeon_wdt: WDT device closed unexpectedly. WDT will not stop!
reboot: Restarting system
Booting...
Interface GE 0 link down***ERROR: PHY link is down
The "IP_ADDR" environment variable is not set.
Getting rest of image
Reading full image into memory...Check base package header ...: done = 16384
Getting rest of image
Reading full image into memory....done
Reading full base package into memory...: done = 82000420
Bundle Image
--------------------------------------
Kernel Address : 0x5377734c
Kernel Size : 0x3fb255/4174421
Initramfs Address : 0x53b725a4
Initramfs Size : 0xd47c7e/13925502
Compression Format: .mzip
Bootable image at @ ram:0x5377734c
Bootable image segment 0 address range [0x81100000, 0x820b0000] is in range [0x80180000, 0x90000000].
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 623
Loading Linux kernel with entry point 0x816734a0 ...
Bootloader: Done loading app on core_mask: 0xf
### Launching Linux Kernel (flags = 0x5)
All packages are Digitally Signed
Starting System Services
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=4,mode=600,ptmxmode=000 0 0
FIPS(NGWC): Flash Key Check : Begin
FIPS(NGWC): Flash Key Check : End, Not Found, FIPS Mode Not Enabled
Front-end Microcode IMG MGR: found 4 microcode images for 1 device.
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_0
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_1
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_2
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_3
Front-end Microcode IMG MGR: Preparing to program device microcode...
Front-end Microcode IMG MGR: Preparing to program device[0]...594412 bytes.
Front-end Microcode IMG MGR: Programming device 0...rwRrrrrrrw..0%...............................................................................................................10%..............................................................................................................20%..............................................................................................................30%..............................................................................................................40%..............................................................................................................50%...............................................................................................................60%..............................................................................................................70%..............................................................................................................80%..............................................................................................................90%..............................................................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0]...393110 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%.........................................................................10%........................................................................20%..........................................................................30%........................................................................40%........................................................................50%..........................................................................60%.........................................................................70%..........................................................................80%........................................................................90%........................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0]...25166 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%....10%....20%......30%...40%......50%....60%......70%...80%......90%....100%w
Front-end M▒
Booting...
Interface GE 0 link down***ERROR: PHY link is down
The "IP_ADDR" environment variable is not set.
Getting rest of image
Reading full image into memory...Check base package header ...: done = 16384
Getting rest of image
Reading full image into memory....done
Reading full base package into memory...: done = 82000420
Bundle Image
--------------------------------------
Kernel Address : 0x5377734c
Kernel Size : 0x3fb255/4174421
Initramfs Address : 0x53b725a4
Initramfs Size : 0xd47c7e/13925502
Compression Format: .mzip
Bootable image at @ ram:0x5377734c
Bootable image segment 0 address range [0x81100000, 0x820b0000] is in range [0x80180000, 0x90000000].
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 623
Loading Linux kernel with entry point 0x816734a0 ...
Bootloader: Done loading app on core_mask: 0xf
### Launching Linux Kernel (flags = 0x5)
All packages are Digitally Signed
Starting System Services
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=4,mode=600,ptmxmode=000 0 0
FIPS(NGWC): Flash Key Check : Begin
FIPS(NGWC): Flash Key Check : End, Not Found, FIPS Mode Not Enabled
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.07.05E RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Fri 10-Feb-17 07:59 by prod_rel_team
Cisco IOS-XE software, Copyright (c) 2005-2015 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.
(http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
FIPS: Flash Key Check : Begin
FIPS: Flash Key Check : End, Not Found, FIPS Mode Not Enabled
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
cisco WS-C3850-48P (MIPS) processor with 4194304K bytes of physical memory.
Processor board ID FCW1943D1AG
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of Dummy USB Flash at usbflash0:.
0K bytes of at webui:.
Base Ethernet MAC Address : 18:8b:45:4f:c8:00
Motherboard Assembly Number : 73-15800-07
Motherboard Serial Number : FOC19432LAD
Model Revision Number : X0
Motherboard Revision Number : B0
Model Number : WS-C3850-48P
System Serial Number : FCW1943D1AG
no platform punt-keepalive disable-kernel-core
^
% Invalid input detected at '^' marker.
hw-switch switch 1 logging onboard message
^
% Invalid input detected at '^' marker.
iox
^
% Invalid input detected at '^' marker.
control-plane
^
% Invalid input detected at '^' marker.
service-policy input system-cpp-policy
^
% Invalid input detected at '^' marker.
Press RETURN to get started!