Cisco 9800 Wireless 2024 – Phase 10 – Upgrading to 17.12.2

Before you begin

1. Clean up the old installation files
install remove inactive

    2. Copy the respective software to a remote file server

    Copy the new image to flash
    westdc9800-1#copy scp:C9800-CL-universalk9.17.12.02.SPA.bin flash:
    Address or name of remote host [10.0.0.4]? 
    Source username [lab]? 
    Source filename [C9800-CL-universalk9.17.12.02.SPA.bin]? 
    Destination filename [C9800-CL-universalk9.17.12.02.SPA.bin]? 
    Password: 
     scp: debug1: fd 3 clearing O_NONBLOCK
     Sending file modes: C0664 1281860293 C9800-CL-universalk9.17.12.02.SPA.bin
    !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
    Verify that the file was copied.
    eastdc9800-1#dir flash:*.bin
    Directory of bootflash:/*.bin
    
    Directory of bootflash:/
    
       16  -rw-  1281860293  Jul 23 2024 17:12:28 -04:00  C9800-CL-universalk9.17.12.02.SPA.bin
    11546681344 bytes total (7336165376 bytes free)
    
    eastdc9800-1#dir bootflash: | i C9800-CL-universalk9.17.12.02.SPA.bin
    16      -rw-       1281860293  Jul 23 2024 17:12:28 -04:00  C9800-CL-universalk9.17.12.02.SPA.bin
    eastdc9800-1#
    Install the software image to flash
    install add file bootflash:C9800-CL-universalk9.17.12.02.SPA.bin activate commit
    Verify that the upgrade was successful on both WLCs

    LA9800-1#install activate
    install_activate: 
    install_activate: Activating IMG
    Following packages shall be activated:
    /bootflash/C9800-CL-mono-universalk9.17.12.05.SPA.pkg
    /bootflash/C9800-CL-rpboot.17.12.05.SPA.pkg
    
    This operation may require a reload of the system. Do you want to proceed? [y/n]y
    
    --- Starting Activate ---
    Performing Activate on all members
    
    NTS: SSH into the WLCs from an “older” version of SecureCRT failed.

    
    Jul 23 22:45:37.416: %SSH-3-NO_MATCH: No matching mac found: client hmac-sha2-512,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64@openssh.com server hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
    Jul 23 22:45:37.416: %SSH-5-SSH2_SESSION: SSH2 Session request from 10.0.14.34 (tty = 0) using crypto cipher '', hmac '' Failed
    Jul 23 22:45:37.417: %SSH-5-SSH2_CLOSE: SSH2 Session from 10.0.14.34 (tty = 0) for user '' using crypto cipher '', hmac '' closed
    Jul 23 22:45:37.610: %SSH-3-NO_MATCH: No matching mac found: client hmac-sha2-512,hmac-sha2-256,hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,umac-64@openssh.com server hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com
    Jul 23 22:45:37.610: %SSH-5-SSH2_SESSION: SSH2 Session request from 10.0.14.34 (tty = 0) using crypto cipher '', hmac '' Failed
    Jul 23 22:45:37.610: %SSH-5-SSH2_CLOSE: SSH2 Session from 10.0.14.34 (tty = 0) for user '' using crypto cipher '', hmac '' closed
    Jul 23 22:45:45.612: %SSH-5-SSH_COMPLIANCE_VIOLATION_HOSTK_ALGO: SSH Host-key Algorithm compliance violation detected.Kindly note that weaker Host-key Algorithm 'ssh-rsa' will be disabled by-default in the upcoming releases.Please configure more stronger Host-Key algorithms to avoid service impact.
    Jul 23 22:45:45.677: %SSH-5-SSH2_SESSION: SSH2 Session request from 10.0.14.34 (tty = 0) using crypto cipher 'aes256-ctr', hmac 'hmac-sha2-256-etm@openssh.com' Succeeded
    

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    This site uses Akismet to reduce spam. Learn how your comment data is processed.