- 论坛徽章:
- 0
|
Your service request has been assigned case number RQST00000033003.
If the Silkworm 12000 is using FOS v4.1.x or above then please follows the instructions below to recover the passwords. Please let me know if the 12000 is running FOS v4.0.x release.
Recovering the Root Password on Fabric OS v4.1
If the Boot PROM password is still known, you can use the following procedure to recover the Root
password on a SilkWorm 3900 or SilkWorm 12000.
Note: This procedure requires accessing the boot prompt, which stops traffic flow through a SilkWorm
3900 until the switch is rebooted. On a SilkWorm 12000, you can recover the Root password without
disruption to I/O by performing the procedure on the standby CP card.
To recover the Root password:
1. Connect to the serial port interface of the switch (SW3900)/Standby CP(SW12000)
2. Reboot the switch (SW3900)/Standby CP (SW12000) and press ESC within four seconds after the
message "Press escape within 4 seconds..." displays. "Enter Boot PROM interface:"
3. Enter the Boot PROM password.
4. Enter "3" at the prompt to enter the command shell.
5. Enter the printenv command and save the output.
6. Enter the boot command followed by the first memory address after the string OSLoader= obtained
from the printenv output and -s
boot <memory address> -s
The system is coming up, please wait...
Checking system RAM - press any key to stop test
Checking memory address: 01300000
System RAM check terminated by keyboard
System RAM check complete
Press escape within 4 seconds to enter boot interface.
1) Start system.
2) Recover password.
3) Enter command shell.
Option? 3
Password:
> printenv
AutoLoad=yes
ENET_MAC=006069602BD6
InitTest=MEM()
LoadIdentifiers=IDE w/ XFS;IDE w/ XFS & NFS Root
OSLoader=MEM()0xF0000000;MEM()0xF0800000
OSRootPartition=hda1;hda2
SkipWatchdog=yes
> boot MEM()0xF0000000 -s
.
Steps 7 through 11 are for a SW3900 only, skip to step 12 for SW12000.
7. Enter the following string at the prompt:
mount -o remount,rw,noatime /
8. Enter the following string at the prompt:
mount /dev/hda2 /mnt
9. Enter the passwddefault command with the full path, as follows:
/sbin/passwddefault
This resets the User, Admin, Factory, and Root passwords to the default values
10. Enter the reboot -f command if the switch is a SW3900.
reboot -f
Traffic flow resumes when the switch finishes rebooting.
11. Log into the SW3900 switch by serial or telnet as Root and set new passwords for all accounts. The
process is now complete for the SW3900.
12. From the serial connection to the standby CP card, set the appropriate hostname to the CP. Use "cp0"
for slot 5, and "cp1" for slot 6.
hostname cp0
13. Start networking on the standby CP
/etc/init.d/network start
14. Perform one of the following according to which slot the CP card is in:
? If the standby CP card is in slot 5 (CP0), enter "rsh 10.0.0.6 /sbin/passwddefault", press
Enter.
? If the standby CP card is in slot 6 (CP1), enter "rsh 10.0.0.5 /sbin/passwddefault", press
Enter.
15. Reboot the Standby CP with the command "reboot -f"
16. Log into the active CP as admin from a telnet or serial connection, and enter Ctrl + C to bypass the
request to modify passwords.
17. Log into either logical switch by serial or telnet as admin and set new passwords for all accounts. |
|