Here's my read on this, based on what passes for information on the Cisco
web site and as found in the last chapter of CCIE Exam Cram
0x3942 = 0011 1001 0100 0010
counting from right to left, and starting with zero, the bit in the #1
position indicates boot to rommon, bit 6 causes the router to ignore the
startup config in NVRAM, bit 8 disables the break sequence, bits 11 and 12
set the console port speed, in this case to 2400, and bit 13 instructs the
router to boot from ROM if flash will not boot.
Any other observations?
So my nemesis appears to have been quite purposeful in his actions. Screw up
the console speed so only gibberish appears, disable the break sequence, and
boot to rommon. Because of the gibberish, one does not know one is in
rommon. (Although I am not sure that disabling the break sequence ended up
accomplishing anything. Once the port speed issue was cleared, I was right
where I needed to be) My favorite remains changing the host name to rommon>
that one I consider the most imaginative of the hacks. However, the config
mem command gets the job done.
So everything ends up being for the best. I have heard that the successful
CCIE candidate will know the fundamentals of disaster recovery inside out.
Chuck
-----Original Message-----
From: ElephantChild [mailto:[EMAIL PROTECTED]]
Sent: Monday, January 08, 2001 4:55 PM
To: Chuck Larrieu
Cc: Cisco Mail List; CCIE_Lab Groupstudy List
Subject: Re: Troubleshooting 102 - "password recovery"
On Sun, 7 Jan 2001, Chuck Larrieu wrote:
> Extra credit - with a configuration register setting of 0x3942, what was
> happening at boot time?
OTTOMH, the xxx4 means "ignore configuration stored in NVRAM when
booting", and the 2 in 3xxx means either "keep break active after the
first 60 seconds," or more likely "don't keep it active."
--
"Airplane travel is nature's way of making you look like your passport
photo." --- Al Gore
_________________________________
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]