How to add IOS image in GNS3 0.8.6 on Ubuntu 14.04

How to use IOS image in Gns3 0.8.6 on Linux:

This is a basic article related to Gns3 in which I ll show you that how you can add different IOS images of routers and switches in gns3 version 0.8.6 for performing different routing labs and switching labs.

1. Open “IOS images and Hypercvisors” for edit menu.

2. browse for the image file in Image file and select the platform like 1700, 2600 or 3600 according to your IOS, then select the Model of your Cisco router. Click save for saving IOS.

3. For using this IOS into Gns3 typologies click on router symbol in upper left corner of GNS3 and  drag the desire router IOS on dashboard. Similarly you can use switches and qemu host IOS in same way.

Download Cisco 1700 series router IOS for Gns3

Gns3 IOS image of Cisco 1700 series:

You can download 1700 series router IOS for Gns3 from here and can use it for your GNS3 for performing different gns3 labs for learning purposes.

The Cisco 1700 Series Modular Access Router are ideal for LAN and small networks, you can build a fast, reliable, and secure Internet and network access through these routers.
Please notes that you can use these IOS Image only in Gns3 topologies, in other scenarios these images may not work.

IF this not work for you then you can try the following one...!

How to decoding or get a level 7 (enable secret) password on Cisco Router | services password-encryption

How to convert the Cisco enable secret password into plain text:

This article is only for learning purposes in which I ll show you that how you can decode a Cisco enable secret password into clear text. When the "password-encryption service" is enabled on a router or switch, then the “show running config” command will shows an encrypted password using a hash algorithm as shown in figure that will hide your real password.

You can revert this password with different utilities or using some on-line websites.

So let's start by setting up a password in the clear text:

R1 (config) # line console 0
R1 (config-line) # password Ci$co
R1 (config-line) # login
R1 (config-line) # exit

Of course, the password appears in clear text in the running-config ...

Now you can encrypt this password using password-encryption service", you can use the following command for this purpose:

R1 (config) # services password-encryption
The password is now encrypted and therefore unreadable in the configuration ...

If you want to decode the password, you can use following website that offers this feature:

you can put the hash in type 7 hash field and then click on reverse and you are done.