Cisco 9800 Wireless 2024 – Phase 10 – Upgrading to 17.12.2

Before you begin

Clean up the old installation files
install remove inactive
Copy the new image to flash
westdc9800-1#copy scp:C9800-CL-universalk9.17.12.02.SPA.bin flash:
Address or name of remote host [10.0.0.4]? 
Source username [lab]? 
Source filename [C9800-CL-universalk9.17.12.02.SPA.bin]? 
Destination filename [C9800-CL-universalk9.17.12.02.SPA.bin]? 
Password: 
 scp: debug1: fd 3 clearing O_NONBLOCK
 Sending file modes: C0664 1281860293 C9800-CL-universalk9.17.12.02.SPA.bin
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Verify that the file was copied.
eastdc9800-1#dir flash:*.bin
Directory of bootflash:/*.bin

Directory of bootflash:/

   16  -rw-  1281860293  Jul 23 2024 17:12:28 -04:00  C9800-CL-universalk9.17.12.02.SPA.bin
11546681344 bytes total (7336165376 bytes free)

eastdc9800-1#dir bootflash: | i C9800-CL-universalk9.17.12.02.SPA.bin
16      -rw-       1281860293  Jul 23 2024 17:12:28 -04:00  C9800-CL-universalk9.17.12.02.SPA.bin
eastdc9800-1#
Install the software image to flash
install add file bootflash:C9800-CL-universalk9.17.12.02.SPA.bin activate commit
Verify that the upgrade was successful on both WLCs

NTS: SSH into the WLCs from an “older” version of SecureCRT failed.


Jul 23 22:45:37.416: %SSH-3-NO_MATCH: No matching mac found: client hmac-sha2-512,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64@openssh.com server hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
Jul 23 22:45:37.416: %SSH-5-SSH2_SESSION: SSH2 Session request from 10.0.14.34 (tty = 0) using crypto cipher '', hmac '' Failed
Jul 23 22:45:37.417: %SSH-5-SSH2_CLOSE: SSH2 Session from 10.0.14.34 (tty = 0) for user '' using crypto cipher '', hmac '' closed
Jul 23 22:45:37.610: %SSH-3-NO_MATCH: No matching mac found: client hmac-sha2-512,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64@openssh.com server hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
Jul 23 22:45:37.610: %SSH-5-SSH2_SESSION: SSH2 Session request from 10.0.14.34 (tty = 0) using crypto cipher '', hmac '' Failed
Jul 23 22:45:37.610: %SSH-5-SSH2_CLOSE: SSH2 Session from 10.0.14.34 (tty = 0) for user '' using crypto cipher '', hmac '' closed
Jul 23 22:45:45.612: %SSH-5-SSH_COMPLIANCE_VIOLATION_HOSTK_ALGO: SSH Host-key Algorithm compliance violation detected.Kindly note that weaker Host-key Algorithm 'ssh-rsa' will be disabled by-default in the upcoming releases.Please configure more stronger Host-Key algorithms to avoid service impact.
Jul 23 22:45:45.677: %SSH-5-SSH2_SESSION: SSH2 Session request from 10.0.14.34 (tty = 0) using crypto cipher 'aes256-ctr', hmac 'hmac-sha2-256-etm@openssh.com' Succeeded

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.