0% found this document useful (0 votes)
21 views5 pages

Bit 15 Set

Uploaded by

Arif Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views5 pages

Bit 15 Set

Uploaded by

Arif Hasan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

Output with Bit-15 set:

System configuration has been modified. Save? [yes/no]: y


Building configuration...

[OK]
Proceed with reload? [confirm]

System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)


Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2006 by cisco Systems, Inc.

Initializing memory for ECC


.

Clearing lower 16K memory for cache initialization


Clearing bss
Reading monitor variables from NVRAM
Init Rommon Upgrade NVRAM Vars
Init Rommon Upgrade start
Enabling interrupts
Initializing cache
Cache Initialization Done
Reading cookie
Initializing main memory 10000000
Sizing NVRAM
Sizing NVRAM Done c2811 platform with 262144 Kbytes of main memory
Main memory is configured to 64 bit mode with ECC enabled

Readonly ROMMON initialized


program load complete, entry point: 0x8000f000, size: 0xcb80
program load complete, entry point: 0x8000f000, size: 0xcb80

program load complete, entry point: 0x8000f000, size: 0x416a574


Stack pointer : 0x8FFFFF80
monstack : 0x8000EFC0
monra : 0xBFC016EC
edata : 0x800281A0
start : 0x800281A0
magic : 0xFEEDFACE
memsize : 0x10000000
uncomp_size : 0x0A27BFC0
comp_size : 0x041513C0
STACK_BYTES : 0x00008000
COPY_CODE_BUF : 0x00000800
_end : 0x80053EA0
comp_checksum : 0x8FDC0700
comp_checksum : 0x8FDC0700
uncomp_checksum : 0xF06C9B7C
Self decompressing the image :
###################################################################################
###################################################################################
###################################################################################
###################################################################################
###################################################################################
###################################################################################
###################################################################################
###################################################################################
###################################################################################
############################################# [OK]
Source elf_hdr->e_shnum = 0x0000000E
Setting up to copy ELF section 0x00000001
to image_info section 0x00000000
sh_name = 0x0000000B
sh_type = 0x00000001
sh_flags = 0x00000007
sh_addr = 0x8000F000
sh_offset = 0x00000060
sh_size = 0x062D1000
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000020
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000002
to image_info section 0x00000001
sh_name = 0x00000011
sh_type = 0x00000001
sh_flags = 0x00000006
sh_addr = 0x862E0000
sh_offset = 0x062D1060
sh_size = 0x000055BC
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000003
to image_info section 0x00000002
sh_name = 0x00000015
sh_type = 0x00000001
sh_flags = 0x00000006
sh_addr = 0x862E55BC
sh_offset = 0x062D661C
sh_size = 0x0001AA44
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000001
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000004
to image_info section 0x00000003
sh_name = 0x0000001C
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x86300000
sh_offset = 0x062F1060
sh_size = 0x028C74A0
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000005
to image_info section 0x00000004
sh_name = 0x00000024
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x88BC74A0
sh_offset = 0x08BB8500
sh_size = 0x0013A4F0
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000006
to image_info section 0x00000005
sh_name = 0x0000002E
sh_type = 0x00000001
sh_flags = 0x00000002
sh_addr = 0x88D01990
sh_offset = 0x08CF29F0
sh_size = 0x0000006C
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000004
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000007
to image_info section 0x00000006
sh_name = 0x00000038
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x88D019FC
sh_offset = 0x08CF2A5C
sh_size = 0x00B9D964
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000008
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000008
to image_info section 0x00000007
sh_name = 0x0000003E
sh_type = 0x00000001
sh_flags = 0x00000003
sh_addr = 0x8989F360
sh_offset = 0x098903C0
sh_size = 0x00000020
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000001
sh_entsize = 0x00000000
Setting up to copy ELF section 0x00000009
to image_info section 0x00000008
sh_name = 0x00000045
sh_type = 0x00000001
sh_flags = 0x10000003
sh_addr = 0x8989F380
sh_offset = 0x098903E0
sh_size = 0x00001320
sh_link = 0x00000000
sh_info = 0x00000000
sh_addralign = 0x00000010
sh_entsize = 0x00000000
cpu type : 0x00000007
uncomp_size : 0x0A27BFC0
monstack : 0x8000EFC0

image_info.entry_point = 0x80019F80
image_info.section_count = 0x00000009
image_info.monstack = 0x8000EFC0
image_info.monra = 0xBFC016EC
image_info.param0 = 0x00000002
image_info.param1 = 0x00000000
image_info.param2 = 0x8000C508
image_info.param3 = 0x8000F000
Section Index = 0x00000000
source = 0x80054000
dest = 0x80019F80
bytes = 0x062D1000
Section Index = 0x00000001
source = 0x86325000
dest = 0x862EAF80
bytes = 0x000055BC
Section Index = 0x00000002
source = 0x8632A5BC
dest = 0x862F053C
bytes = 0x0001AA44
Section Index = 0x00000003
source = 0x86345000
dest = 0x8630AF80
bytes = 0x028C74A0
Section Index = 0x00000004
source = 0x88C0C4A0
dest = 0x88BD2420
bytes = 0x0013A4F0
Section Index = 0x00000005
source = 0x88D46990
dest = 0x88D0C910
bytes = 0x0000006C
Section Index = 0x00000006
source = 0x88D469FC
dest = 0x88D0C97C
bytes = 0x00B9D964
Section Index = 0x00000007
source = 0x898E4360
dest = 0x898AA2E0
bytes = 0x00000020
Section Index = 0x00000008
source = 0x898E4380
dest = 0x898AA300
bytes = 0x00001320

Smart Init is enabled


smart init is sizing iomem
ID MEMORY_REQ TYPE
0003E7 0X00474800 C2811 Mainboard
000024 0X00019A40 Four port Async/Sync
000056 0X000C2800 4-port FE Switch HWIC
0X00264050 Onboard VPN
0X000021B8 Onboard USB
0X002C29F0 public buffer pools
0X00211000 public particle pools
-----------------------------------------------
TOTAL: 0X00C8A638

If any of the above Memory Requirements are


"UNKNOWN", you may be using an unsupported
configuration or there is a software problem and
system operation may be compromised.
Rounded IOMEM up to: 14Mb.
Using 5 percent iomem. [14Mb/256Mb]

Restricted Rights Legend

Use, duplication, or disclosure by the Government is


subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

cisco Systems, Inc.


170 West Tasman Drive
San Jose, California 95134-1706

Cisco IOS Software, 2800 Software (C2800NM-ADVENTERPRISEK9-M), Version 15.3(3)XB12,


RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2013 by Cisco Systems, Inc.
Compiled Tue 19-Nov-13 02:16 by prod_rel_team

This product contains cryptographic features and is subject to United


States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to


export@cisco.com.

Installed image archive


Cisco 2811 (revision 1.0) with 247808K/14336K bytes of memory.
Processor board ID FTX1214A3DM
6 FastEthernet interfaces
4 Low-speed serial(sync/async) interfaces
1 Virtual Private Network (VPN) Module
DRAM configuration is 64 bits wide with parity enabled.
239K bytes of non-volatile configuration memory.
250880K bytes of ATA CompactFlash (Read/Write)

--- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]:

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy