免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 2250 | 回复: 0
打印 上一主题 下一主题

思科设备密码恢复 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2006-04-16 11:51 |只看该作者 |倒序浏览

1.     cisco 5000 ATMLANE MOUdle 口令恢复

Password Recovery Procedure
for the Catalyst 5000 ATM LANE Module
 
Description
This document describes the password recovery procedure for the Cisco Catalyst 5000 ATM LAN emulation (LANE) module
(WS-X5153/5154/5155/5156/5157/5158/5166).
Step-by-Step Procedure
In order to recover a password, you must download a recovery image onto the ATM module that will erase the contents of nonvolatile RAM (NVRAM).
1.        Before you start, make sure you have the ATM module recovery image and the original or latest ATM module image. To get this image, establish an FTP session to ftp.cisco.com and log in as c5k_atmp. Use your email address as the password. Enter the get atm_911.cbi command.
2.        Download the ATM module recovery image on the Catalyst 5000 supervisor console by typing:
download host atm_911.cbi atm mod_num
3.        Wait for the module online message. At this time, the password is disabled and the NVRAM on the ATM module is erased. Reboot the Catalyst 5000.
If you wish to save your original configuration without the password, continue with step 4 below. Otherwise, to enter a new configuration, skip to step 5.
4.        Enter the session ATM slot # command. Then, on the ATM module, type:
enable (you will not be prompted for a password)
write memory
exit
This will save your configuration, but without the enable password.
5.        To enter a new configuration, download the original ATM image by typing:
download filename
6.        Once you receive the module online message, you may session to the ATM module and enable without a password.
2.     Cisco 6000 MAFC口令恢复
Password Recovery Procedure for the Cisco Catalyst 6000 MSFC
Description
This document describes the password recovery procedure for the Cisco Catalyst 6000 Multilayer Switch Feature Card (MSFC).
 
Step-by-Step Procedure
1.        Attach a terminal or PC with terminal emulation to the console port of the switch.
Use the following terminal settings: 9600 baud, no parity, 8 data bits, 1 stop bit
2.        Type show module to determine the MSFC card on which to do password recovery.
The MSFC module is in slot 15 or 16.
3.        Reset the MSFC module you want to do password recovery on.
Use the reset command to do this.
4.        Wait 5 seconds and then connect to the MSFC console using the switch console command.
5.        After seeing the message "Connected to Router", issue a break sequence.
The break key is a unique sequence that will break the MSFC into rommon. If this does not work, please refer to the
break sequence page
.
The MSFC will boot to a rommon> prompt.
6.        Type confreg 0x42 at the rommon> prompt to configure the MSFC to boot without its configuration.
7.        Display the current software in bootflash by issuing the dir bootflash: command and record the current software version.
8.        Boot the system with the boot bootflash: command.
NOTE : Do NOT boot the system using the c6msfc-boot image. Doing so will result in loss of configuration after the password recovery process.
9.        After the system boots, answer "No" to all the set-up questions or press Ctrl-C to skip the initial set-up procedure.
10.     Type enable at the Router> prompt. This will put you in enable mode and you will see the Router# prompt.
11.     Type config mem or copy startup-config running-config to copy the nonvolatile RAM (NVRAM) into memory.
This is a crucial step. DO NOT save the configuration (do not use write term or copy running-config startup-config)
12.     Type write terminal or show running-config.
At this point, you should see the full configuration with the unknown enable password or enable secret. All other interfaces are shut down.
13.     Type configure terminal to make the necessary changes.
The prompt is now hostname(config)#
14.     Type enable secret . Replace  with your password.
15.     Use the no shutdown command on interfaces that are being used.
If you use the show ip interface brief command, every interface that you want to use should be up.
16.     Type config-register 0x2102
17.     Press Ctrl-Z to leave the configuration mode. The prompt is now hostname#
18.     Type write memory or copy running-config startup-config to commit the changes.
 
Example of a Password Recovery on the Catalyst 6000 MSFC Module
 
Example of a Password Recovery on the Catalyst 6000 MSFC Moduleswitch (enable) show moduleMod Slot Ports Module-Type               Model               Status--- ---- ----- ------------------------- ------------------- --------1   1    2     1000BaseX Supervisor      WS-X6K-SUP1A-2GE    ok15  1    1     Multilayer Switch Feature WS-F6K-MSFC         ok3   3    48    10/100BaseTX Ethernet     WS-X6248-RJ-45      ok4   4    8     1000BaseX Ethernet        WS-X6408-GBIC       ok5   5    2     MM OC-12 ATM              WS-X6101-OC12-MMF   ok Mod Module-Name         Serial-Num--- ------------------- -----------1                       SAD0342313315                      SAD034145633                       SAD032427374                       SAD032201525                       SAD03433465 Mod MAC-Address(es)                        Hw     Fw         Sw--- -------------------------------------- ------ ---------- -----------------1   00-30-96-2a-2a-9e to 00-30-96-2a-2a-9f 1.0    5.2(1)     5.4(3)    00-30-96-2a-2a-9c to 00-30-96-2a-2a-9d    00-50-3e-9f-20-00 to 00-50-3e-9f-23-ff15  00-30-96-2a-2a-a0 to 00-30-96-2a-2a-df 1.2    12.1(1)E,  12.1(1)E,3   00-50-f0-af-24-d0 to 00-50-f0-af-24-ff 1.1    4.2(0.24)V 5.4(3)4   00-d0-58-e9-d0-f0 to 00-d0-58-e9-d0-f7 2.1    4.2(0.24)V 5.4(3)5   00-d0-bc-ef-03-68 to 00-d0-bc-ef-03-87 1.0    12.0(5)XS, 12.0(5)XS, Mod Sub-Type                Sub-Model           Sub-Serial  Sub-Hw--- ----------------------- ------------------- ----------- ------1   L3 Switching Engine     WS-F6K-PFC          SAD03424837 1.0 switch(enable) reset 15Unsaved configuration on module 15 will be lostDo you want to continue (y/n) [n]? y2000 Jun 23 06:36:59 %SYS-5-MOD_RESET:Module 15 reset from Console//Resetting module 15... switch(enable) switch console Trying Router-15...Connected to Router-15.Type ^C^C^C to switch back...  (A break-sequence has been sent here)  monitor: command "boot" aborted due to user interruptrommon 1 > confreg 0x42 You must reset or power cycle for new config to take effectrommon 2 > dir bootflash:          File size           Checksum   File name   1606784 bytes (0x188480)   0xe58d8560    c6msfc-boot-mz.120-7.XE1    8998276 bytes (0x894d84)   0x1476de9    c6msfc-jsv-mz.121-1.E.binrommon 3 > boot bootflash:c6msfc-jsv-mz.121-1.E.bin Self decompressing the image : ############################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################################## [OK]

           Restricted Rights LegendUse, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.             Cisco Systems, Inc.           170 West Tasman Drive           San Jose, California 95134-1706  Cisco Internetwork Operating System Software IOS (tm) MSFC Software (C6MSFC-JSV-M), Version 12.1(1)E, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)Copyright (c) 1986-2000 by cisco Systems, Inc.Compiled Fri 24-Mar-00 13:57 by kpmaImage text-base: 0x60008900, data-base: 0x6146A000  Cisco Cat6k-MSFC (R5000) processor with 57344K/8192K bytes of memory.Processor board ID SAD03414563R5000 CPU at 200Mhz, Implementation 35, Rev 2.1, 512KB L2 CacheLast reset from power-onBridging software.X.25 software, Version 3.0.0.SuperLAT software (copyright 1990 by Meridian Technology Corp).TN3270 Emulation software.123K bytes of non-volatile configuration memory.4096K bytes of packet SRAM memory. 16384K bytes of Flash internal SIMM (Sector size 256K).    --- System Configuration Dialog ---  Would you like to enter the initial configuration dialog? [yes/no]:  (ctrl-C pressed) Press RETURN to get started! Module online.Cisco Internetwork Operating System Software IOS (tm) MSFC Software (C6MSFC-JSV-M), Version 12.1(1)E, EARLY DEPLOYMENT RELEASE SOFTWARE (fc1)Copyright (c) 1986-2000 by cisco Systems, Inc.Compiled Fri 24-Mar-00 13:57 by kpmaRouter>enableRouter#Router#copy startup-config running-configDestination filename [running-config]? 1153 bytes copied in 0.236 secsmsfc-switch#configure terminalEnter configuration commands, one per line.  End with CNTL/Z. msfc-switch(config)#enable secret Ciscomsfc-switch(config)#config-register 0x2102msfc-switch(config)#^Zmsfc-switch#show ip interface briefInterface                  IP-Address      OK? Method Status                ProtocolEOBC0/6                    127.0.0.12      YES unset  up                    up      Vlan10                     10.1.1.2        YES TFTP   administratively down down    Vlan20                     10.1.2.2        YES TFTP   administratively down down    Vlan30                     10.1.3.2        YES TFTP   administratively down down    Vlan40                     10.1.4.2        YES TFTP   administratively down down    Vlan50                     10.1.5.2        YES TFTP   administratively down down    msfc-switch#configure terminalEnter configuration commands, one per line.  End with CNTL/Z.msfc-switch(config)#interface vlan10msfc-switch(config-if)#no shutdownmsfc-switch(config-if)#^Zmsfc-switch#00:02:16: %SYS-5-CONFIG_I: Configured from console by consolemsfc-switch#write memoryBuilding configuration...[OK]msfc-switch#  
3.     cisco cache egine 2050
Password Recovery Procedure
for the Cisco Cache Engine 2050
Description
This document describes the administration password recovery procedure for the Cisco Cache Engine 2050.
Note: Your configuration is lost after performing this password recovery. It is not possible to keep your configuration when recovering a lost administrative password.
Step-by-Step Procedure
1.        Establish a console connection to the Cisco Cache Engine and reload the device or type reboot at the command line. While the Cache Engine is rebooting, press any key to interrupt the low level configuration countdown.
2.        Enter the basic configuration menu. Use:
a dash (-) to go to the previous field
the Enter key to go to the next field
3.        Press Enter five times until the "Replace admin pw" field is displayed.
4.        Enter the new administrative password and press Enter. The next field is "Repeat admin pw".
5.        Enter the same password once again and press Enter.
6.        At the prompt: "Is this basic configuration acceptable?", type "y" for yes.
  Example of Password Recovery on a Cisco Cache Engine 2050
The following example shows password recovery on a Cisco Cache Engine 2050:
!-- The Cache Engine has just been rebooted --!   Cisco Cache Engine hard disk bootstrap Version: 1.0 Copyright (c) 1997 Cisco Systems, Inc. Creation date: Sep 10 1997, 16:51:59    Loading system image...1209816 + 40080 + 74600836 nTarget Name: vxTarget User: target Attaching network interface lo0... done. NFS client support not included. Loading symbol table from /ata0/vxWorks.sym ...done  System restarted at GMT: FRI JUL 07 17:37:44 2000  Basic configuration file is complete h Press any key to OVERRIDE basic low-level configuration... !--- From the moment this line appears, you have 10 seconds to press any key  5 override selected...   Use '-' to step back,  to accept a non-blank value as given. You must accept or provide values for all configuration prompts.        Config Version [                     1]:           IP Address [          172.17.241.7]:           IP Netmask [         255.255.255.0]:      Default Gateway [          172.17.241.1]:     Wccp Home Router [         172.17.241.32]:     Replace admin pw [                      ]: cisco      Repeat admin pw [                      ]: cisco           Cache Name [               megaton]:           Group Name [                 cisco]:        GMT Date/Time [   2000/07/07 17:38:27]:      Config Register [            0x10000001]:  Is this basic configuration acceptable ? (n,y) [n]: y  Basic low-level configuration accepted. Attaching network interface fei0... done. Media bandwidth: 10 Mb/s half-duplex  -> There are 15 partitions. Revision string is /ata0/1_7_5.dir Found a valid fargo.cfg. This must be a good version Starting message server. Waiting for message server. Started server on port 1024 Message server started. Syslog host not configured. Started server on port 8001 Started Stat Collector. DNS not configured. Static routes not configured Initializing Url Filtering Initialized Url Filtering - filtering disabled Starting WCCP on 172.17.241.32 Started server on port 80 Added 2000 threads to ready queue  Browse to 172.17.241.7:8001 to manage this machine. Browse to 172.17.241.7:8001 to manage this machine. Browse to 172.17.241.7:8001 to manage this machine. Icp Initialized   

4.cisco cache engine500
for the Cisco Cache Engine 500
  Description
This document describes the administration password recovery procedure for the Cisco Cache Engine 500.
Note: Your configuration is lost after perfoming this password recovery. It is not possible to keep your configuration when recovering a lost administrative password.
  Step-by-Step Procedure
1.        Establish a console connection to the Cache Engine and reload the device or type reload or reboot at the command line. While the Cache Engine is rebooting, press any key to interrupt the low level configuration countdown.
2.        At the prompt, type p to display the configuration menu.
3.        At the prompt, type c to enter the configuration mode. Use:
a period (.) to clear a field
a dash (-) to go to the previous field
the Enter key to go to the next field
^D to quit
4.        Press Enter nine times until the field flags are displayed.
5.        Enter the value 0x4000 at the prompt and press Enter. This flag will allow the cache engine to bypass the nonvolatile RAM (NVRAM) configuration.
6.        Type @ to reboot the Cache Engine. At this point, the Cache Engine is not password-protected.
7.        To configure a new password, type configure terminal to enter the configuration mode.
8.        Type user modify username admin password cisco to make "cisco" the new password.
9.        Type write or copy running startup to commit the changes.
10.     Reload the Cache Engine.
11.     To set the flags back to their original value of 0x0, repeat steps 3 and 4 and enter 0x0 in the field flags.
  Example of Password Recovery on a Cisco Cache Engine 500
The following example shows password recovery on a Cisco Cache Engine 500:
ce500#reload System configuration has been modified. Save?[yes]: y  Building configuration.... . [OK] Proceed with reload?[confirm]  Proceed with clean WCCP shutdown?[confirm]  Existing connections =     0 Press ^C to skip clean WCCP shutdown and reload Waiting (113 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (107 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (100 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (93 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (87 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (80 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (73 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (67 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (60 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (53 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (47 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (40 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (33 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (27 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload Waiting (21 seconds) for WCCP shutdown. Press ^C to skip shutdown and reload  303949 bytes copying bootagent boot start: 0x7fee000 starting new system - entry 0x8010 0x43d2200 (tCallback2): NCR810_   Press any key to stop auto-boot... g5 [CE500 Series]: p   boot device (flash,net) [               flash]:                    flags [                   0]:  [CE500 Series]: c  '.' = clear field;  '-' = go to previous field;  ^D = quit   boot device (flash,net) [               flash]:                file name [                    ]:         cache IP address [                    ]:          IP network mask [                    ]:        server IP address [                    ]:       gateway IP address [                    ]:  protocol (rcp,ftp,tftp) [                    ]:                 username [                    ]:                 password [                    ]:                    flags [                   0]: 0x4000   . . [CE500 Series]: @   boot device (flash,net) [               flash]:                    flags [              0x4000]:  Starting at 0x108000...  #!ImageInfo # #    +------------------------------+ #    |   CISCO Cache Engine image   | #    +------------------------------+ # SUPPORTED_PRODUCTS=CE505,CE550 UNCOMPRESSED_CKSUM=0x8ac40561 UNCOMPRESSED_SIZE=0x2ae678 COMPRESSED_CKSUM=0x33dca183 COMPRESSED_SIZE=0x121c6b #  Self decompressing the image : ###################################################################################### [OK] Launching the image, please wait... .................. Console IO Initialized Host Name: bootHost User: admin Attaching network interface lo0... done.  Restricted Rights LegendUse, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013.             Cisco Systems, Inc.            170 West Tasman Drive            San Jose, California 95134-1706  Cisco Cache Engine Copyright (c) 1986-2000 by Cisco Systems, Inc. Software Release: CE ver 2.10 (Build: FCS  04/05/00) Compiled: 16:53:37 Apr  5 2000 by morlee Image text-base 0x108000, data_base 0x3926c4  System restarted by Reload The system has been up for 7 seconds. System booted from "flash"  SVCINIT - phase complete Initializing SCSI interface... Initializing SCSI controller... Configuring SCSI peripherals... ID LUN VendorID    ProductID     Rev. Type  Blocks  BlkSize pScsiPhysDev -- --- -------- ---------------- ---- ---- -------- ------- ------------  0  0  QUANTUM  VIKING II 9.1SCA 5520   0  17836668    512    0x008c0458  1  0  QUANTUM  VIKING II 9.1SCA 5520   0  17836668    512    0x008bf04c  DEVINIT - phase complete FSINIT - phase complete aBypassing NVRAM Configuration... ---------------------------------------------------------------------- "admin" super-user account is NOT password protected SECURITY ALERT: Please password protect the above super-user accounts! ---------------------------------------------------------------------- CONF - phase complete NTP: Waiting (2 minutes) for network initialization SNMP: Waiting (2 minutes) for network initialization Mon Jul 10 05:07:19 2000: * Warning *: No ip name-servers have been configured   http incoming proxy, http object url-validation and dns-cache   require an ip name-server START - phase complete  cepro#configure terminalEnter configuration commands, one per line. End with CNTL/Z  cepro(config)#user modify username admin password cisco Operation successful cepro(config)#exit cepro#write Building configuration.... . [OK] cepro#reload Proceed with reload?[confirm]  303949 bytes copying bootagent boot start: 0x7fee000 starting new system - entry 0x8010 0x43d22   Press any key to stop auto-boot... h [CE500 Series]: c  '.' = clear field;  '-' = go to previous field;  ^D = quit   boot device (flash,net) [               flash]:                file name [                    ]:         cache IP address [                    ]:          IP network mask [                    ]:        server IP address [                    ]:       gateway IP address [                    ]:  protocol (rcp,ftp,tftp) [                    ]:                 username [                    ]:                 password [                    ]:                    flags [              0x4000]: 0x0  . . [CE500 Series]: @   boot device (flash,net) [               flash]:                    flags [                   0]:  Starting at 0x108000...  #!ImageInfo # #    +------------------------------+ #    |   CISCO Cache Engine image   | #    +------------------------------+ # SUPPORTED_PRODUCTS=CE505,CE550 UNCOMPRESSED_CKSUM=0x8ac40561 UNCOMPRESSED_SIZE=0x2ae678 COMPRESSED_CKSUM=0x33dca183 COMPRESSED_SIZE=0x121c6b #  Self decompressing the image : ###################################################################################### [OK] Launching the image, please wait... .................. Console IO Initialized Host Name: bootHost User: admin Attaching network interface lo0... done.                Restricted Rights Legend  Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013.             Cisco Systems, Inc.            170 West Tasman Drive            San Jose, California 95134-1706  Cisco Cache Engine Copyright (c) 1986-2000 by Cisco Systems, Inc. Software Release: CE ver 2.10 (Build: FCS  04/05/00) Compiled: 16:53:37 Apr  5 2000 by morlee Image text-base 0x108000, data_base 0x3926c4  System restarted by Reload The system has been up for 7 seconds. System booted from "flash"    SVCINIT - phase complete Initializing SCSI interface... Initializing SCSI controller... Configuring SCSI peripherals... ID LUN VendorID    ProductID     Rev. Type  Blocks  BlkSize pScsiPhysDev -- --- -------- ---------------- ---- ---- -------- ------- ------------  0  0  QUANTUM  VIKING II 9.1SCA 5520   0  17836668    512    0x008c0458  1  0  QUANTUM  VIKING II 9.1SCA 5520   0  17836668    512    0x008bf04c  DEVINIT - phase complete FSINIT - phase complete acConfiguring from NVRAM... ---------------------------------------------------------------------- All super-user accounts are password protected ---------------------------------------------------------------------- CONF - phase complete NTP: Waiting (2 minutes) for network initialization SNMP: Waiting (2 minutes) for network initialization Mon Jul 10 05:08:53 2000: * Warning *: No ip name-servers have been configured   http incoming proxy, http object url-validation and dns-cache   require an ip name-server START - phase complete  Username: admin Password:         !--- The password is now cisco cepro#  
5.Cisco LANE-MPOA 口令恢复
Password Recovery Procedure
for LANE/MPOA Modules
  Description
This document describes the password recovery procedure for the following Local Area Network Emulation (LANE) and Multiprotocol over Asynchronous Transfer Mode (MPOA) modules:
WS-X5161
WS-X5162
WS-X5165
WS-X5167
WS-X5168
Note: Before you can use this method to erase the Nonvolatile Random Access Memory (NVRAM) configuration, you must have a separate console connected to the LANE/MPOA board. Carrying out this password recovery procedure via a session on supervisor will not work since it produces displays only after Cisco IOS® Software comes up (whereas you need to access in the programmable read-only memory (ROM) at boot time itself).
  Step-by-Step Procedure
1.        Issue the reset command from supervisor for the LANE/MPOA board. A programmable ROM boot message appears on the console.
2.        When you see the following line, hit the ESC key:
Hit ESC key within 3 seconds to enter SOFT-JUMPER config menu.
This displays the Soft Jumper Configuration menu, which displays or modifies the soft jumpers of the board. The IOS software uses these jumpers to determine the mode and other debug functionalities.
3.        Choose option 2, the Modify Jumper Configuration menu item.  You do not need to press Enter when selecting from this menu.
This option displays information for every jumper and asks if you want to change the jumper configuration.  
4.        Answer n to all questions until you see the following line :
DMON jumper .................Disabled. Want to change (y/n/q/e/d)?
5.        Type e to enable debug monitor mode.  
You can now see that the debug monitor jumper is ENABLED.
6.        Quit the menu by typing q.
The programmable ROM boot continues with the startup.
7.        Reset the LANE/MPOA board again from the supervisor. The LANE/MPOA console shows that the programmable read-only memory goes into debug monitor mode, displaying DMON> as a prompt.
8.        Enter the debug monitor mwl command (multiple write of long words). You do not need to press Enter.
The monitor asks for the start address, count and data. Enter the following data (again, you do not need to press Enter):
DMON:> mwlStart Addr? 20000000 Count? 0006ffff Data? ffffffff
This erases the NVRAM configurations.
Note: The count value should not exceed 6ffff. If you type in the wrong value, you can quit this mwl command at any moment by typing q. Please also note that the Backspace key does not work on this monitor.
9.        Type q or f to debug the monitor. This takes you through the usual boot programmable read-only memory path.
10.     When you see the following message, quickly hit the ESC key:
Hit ESC key within 3 seconds to enter SOFT-JUMPER config menu.
This displays the Soft Jumper Configuration menu.
11.     Choose option 2 to disable the debug monitor jumper.  
As in step 4 above, keep entering n until you see the debug monitor jumper information line.
12.     Type d to disable the jumper.
13.     Type q to quit the menu. The LANE/MPOA board boots to the Cisco IOS prompt as usual but it does not have a configuration in NVRAM. You can now reconfigure it as needed.
6.cisco pix
Password Recovery Procedure
for PIX
Description
This document describes how to recover a PIX password for PIX software releases through 5.1.
The PIX Password Lockout Utility is based on the PIX software release you are running.
 
In addition to the required files listed in the next section, you will need the following items to follow the password recovery procedure:
A PC
A working serial terminal or terminal emulator
Approximately 10 minutes of PIX and network downtime
Required Files
Note: If you are a registered user and have logged in, you can download the files here. If you are not a registered user, please open a case with the Technical Assistance Center (TAC) to obtain the files.
The PIX Password Lockout Utility, which includes the following files:
rawrite.exe>
One of the following files:
nppix.bin (4.3 and earlier releases)
np44.bin (4.4 release)
np50.bin (5.0 release)
np51.bin (5.1 release)
Step-by-Step Procedure
PIX with a Floppy Drive
1.        Execute the rawrite.exe file on your PC and answer the questions on the screen.
  
2.        Install a serial terminal or a PC with terminal emulation software on the PIX console port.
  
3.        Verify that you have a connection with the PIX, and that characters are going from the terminal to the PIX, and from the PIX to the terminal.
Note: Because you are locked out, you will see only a password prompt.

4.        Insert the PIX Password Lockout Utility disk into the floppy drive of the PIX.
  
5.        Push the Reset button on the front of the PIX. The PIX will reboot from the floppy and print the message below:
Erasing Flash Password. Please eject diskette and reboot.
6.        Eject the disk and press the Reset button. You will now be able to log in without a password. When you are prompted for a password, press Return.
  
7.        Create a password with the passwd command, and save your configuration.
 
PIX without a Floppy Drive
1.        Install a serial terminal or a PC with terminal emulation software on the PIX console port.
  
2.        Verify that you have a connection with the PIX, and that characters are going from the terminal to the PIX, and from the PIX to the terminal.
Note: Because you are locked out, you will see only a password prompt.
3.        Immediately after you power on the PIX Firewall and the startup messages appear, send a BREAK character or press the Esc (Escape) key. The monitor> prompt is displayed. If needed, enter a question mark (?) to list the available commands.
4.        Use the interface command to specify which interface the ping traffic should use. If the PIX 515 has only two interfaces, the monitor command defaults to the inside interface.
5.        Use the address command to specify the IP address of the PIX Firewall's interface.
6.        Use the server command to specify the IP address of the remote server.
7.        Use the file command to specify the filename of the PIX password recovery file. For example, np51.bin.
8.        If needed, enter the gateway command to specify the IP address of a router gateway through which the server is accessible.
9.        If needed, use the ping command to verify accessibility. If this command fails, fix access to the server before continuing.
10.     Use the tftp command to start the download.
11.     As the password recovery file loads, the following message is displayed:
Do you wish to erase the passwords? [yn] y
Passwords have been erased.

12.     Create a password with the passwd command, and save your configuration.
7.cisco secure IDS Sensor
Password Recovery Procedure
for the Cisco Secure IDS (formerly NetRanger®) Sensor
Description
This document describes how to recover a password on a Cisco Secure IDS Sensor workstation.
Required Files
The Solaris 2.6 Device Configuration Assistant disk (boot disk).
You can download the files from the Sun support web site.
The Solaris 2.6 for Intel (x86) CD-ROM
Console access to the workstation.
Step-by-Step Procedure
1.        Insert the boot disk.
2.        Insert the CD in the CD-ROM drive.
3.        Turn off the workstation, wait ten seconds, and turn it on.
The system boots from the boot disk, and after some configuration, the initial Configuration Assistant screen is displayed.
4.        Press F3 to do a partial scan of the system for boot devices.
When the scan is finished, a list of devices is displayed.
5.        Make sure the CD-ROM device appears in the list of devices, and then press F2 to continue.
A screen displays a list of boot devices.
6.        Select the CD-ROM drive, and then press the space bar.
You should see an "X" next to the CD-ROM device.
7.        Press F2 to continue.
The workstation is now booting from the CD-ROM.
8.        On the screen for selecting a type of install, choose Option 2, Jumpstart.
The system continues booting.
9.        At the prompt to select a language, choose Option 0 for English.
10.     At the next screen for languages, choose Option 0 again for English ANSI.
The system continues to boot and the Solaris Installation screen appears.
11.     Press and hold the Control key and type C to stop the installation script and allow you access to the prompt.
12.     Type mount -F ufs /dev/dsk/c0t0d0s0 /mnt.
The "/" partition is now mounted at the "/mnt" mount point. From here you can edit the "/etc/shadow" file and remove the root password.
13.     Type cd /mnt/etc.
14.     Set the shell environment so you can read data correctly.
A.      Type TERM=ansi.
B.       Type export TERM.
15.     Type vi shadow.
You are now in the shadow file and can remove the password. The entry should be
root:gNyqp8ohdfxPI:10598::::::
where the ":" is a field separator and the encrypted password is the second field.
16.     Delete the second field. For example:
root:gNyqp8ohdfxPI:10598::::::
would be changed to
root::10598::::::.
This removes the password for the root user.
17.     Type :wq! to write and quit the file.
18.     Remove the disk and CD-ROM from the drives.
19.     Type init 6 to reboot the system.
20.     Type root at the login: prompt and then press Enter.
21.     Press Enter at the password prompt.
You are now logged in to the Cisco Secure IDS Sensor.
8.Ciscolightstream2020口令的恢复
for the LightStream 2020
 
Description
This document describes the password recovery procedure for the LightStream 2020.
The following procedure erases your current password and allows you to specify a new one. All other configurations will remain the same.
Note: It is not possible to recover an old password.
Step-by-Step Procedure
To recover a password, for instance if you cannot access the root account:
Type `. to get a Test and Control System (TCS) hub prompt.
user name:`.
TCS HUB
At the TCS hub prompt, use reset and connect to reset the NP card.
Note: Be prepared to press Enter at the prompt, as shown below.
TCS HUB     reset 1
TCS HUB     connect 1
Memory Autosizing...(32Meg)...Done
Clearing 32Meg Memory...Done
NP1 POST Version 0.220 Nov 23 1994
NP1 POST SUMMARY:
----------------
0 Tests Failed
System will boot in 5 seconds: hit to interrupt.
Press Enter now.
Choose option 5 to boot the system for a single-user:
Network Processor bootstrap(version 1.3: Sep 13 1993)
1 - Boot ATM switch application
2 - Begin full installation with boot from floppy disk
3 - List contents of hard disk root directory
4 - List contents of floppy disk root directory
5 - Boot system single-user
6 - Escape to full set of bootstrap options
7 - Extended help
Option> 5
booting: drive:0, partition:0, kernel:"lynx.os", flags:0x4100
Resetting SCSI bus
Kernel linked for 0xea010000
LOAD AT 0x10000
483328+49152+262564[+62796+51901]
TOTAL SIZE: 909744 at 0x1001c
START AT 0x10020
NP memory size: 32 MB
ILACC: EEPROM enet addr:8:0:8:0:ae:61, Silicon Rev:0x5, IB:0xea1dfce0
virtual console: IB: 0xea1dfe68
NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000
LynxOS/68040-MVME167 Version 2.1.0
Copyright 1992 Lynx Real-Time Systems Inc.
All rights reserved.
LynxOS release 2.1.0, level 1: NP-LynxOS #112: compiled Nov 08 1994 19:49:33
Single-user boot
At the single-user prompt, change to the etc directory:
single-user$ cd etc
Using vi, or a similar editor, remove the encrypted password fields (marked with ^^^) for each account in the passwd file:
single-user$ vi passwd
From
root:I4ecBSBzgWj8Y:0:0::/:/bin/bash
^^^^^^^^^^^^^
fldsup:QcK54TedA2I/M:1:0::/usr/fldsup:/bin/bash
^^^^^^^^^^^^^
npadmin:YkMkeWw12RSsk:2:0::/usr/npadmin:/bin/bash
^^^^^^^^^^^^^
oper:3rAfI240uTh/M:3:0::/usr/oper:/bin/bash
^^^^^^^^^^^^^
To
root::0:0:/:/bin/bash
fldsup::1:0::/usr/fldsup:/bin/bash
npadmin::2:0::/usr/npadmin:/bin/bash
oper::3:0::/usr/oper:/bin/bash
Verify the changes:
single-user$ more passwd
root::0:0:/:/bin/bash
fldsup::1:0::/usr/fldsup:/bin/bash
npadmin::2:0::/usr/npadmin:/bin/bash
oper::3:0::/usr/oper:/bin/bash
If the changes look satisfactory, then log out:
single-user$ logout
Note: Do not type `. , as this will corrupt the password file and take you back to the start of the process.
LynxOS Startup: m
fsck /dev/sd0a
(all sizes and block numbers in decimal)
(file system creation time is Thu Apr 27 11:27:01 1995)
checking used files
recovering orphaned files
putting orphaned files in /lost+found
making free block list
making free inode list
* fixed link count inode 1 was 20 is 21
46124 free blocks 3262 free inodes
*** FILE SYSTEM /dev/sd0a WAS MODIFIED ***
*** reboot -d IF /dev/sd0a IS MOUNTED! ***
REBOOTING!
**** LynxOS [rebooted by /bin/reboot] is down ****
Memory Autosizing...(32Meg)...Done
Clearing 32Meg Memory...Done
NP1 POST Version 0.220 Nov 23 1994
NP1 POST SUMMARY:
----------------
0 Tests Failed
booting: drive:0, partition:0, kernel:"lynx.os", flags:0x5104
Resetting SCSI bus
Kernel linked for 0xea010000
LOAD AT 0x10000
483328+49152+262564[+62796+51901]
TOTAL SIZE: 909744 at 0x1001c
START AT 0x10020
NP memory size: 32 MB
ILACC: EEPROM enet addr:8:0:8:0:ae:61, Silicon Rev:0x5, IB:0xea1dfce0
virtual console: IB: 0xea1dfe68
NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000
LynxOS/68040-MVME167 Version 2.1.0
Copyright 1992 Lynx Real-Time Systems Inc.
All rights reserved.
LynxOS release 2.1.0, level 1: NP-LynxOS #112: compiled Nov 08 1994 19:49:33
Single-user boot
single-user$
Type `. to get a TCS hub prompt:
single-user$ `.
TCS HUB
Reset the NP card:
TCS HUB reset 1
TCS HUB connect 1
Memory Autosizing...(32Meg)...Done
Clearing 32Meg Memory...Done
NP1 POST Version 0.220 Nov 23 1994
NP1 POST SUMMARY:
----------------
0 Tests Failed
System will boot in 5 seconds: hit to interrupt. /* Don't hit RETURN */
System will boot in 4 seconds: hit to interrupt.
System will boot in 3 seconds: hit to interrupt.
System will boot in 2 seconds: hit to interrupt.
System will boot in 1 seconds: hit to interrupt.
booting: drive:0, partition:0, kernel:"lynx.os", flags:0x4108
Resetting SCSI bus
Kernel linked for 0xea010000
LOAD AT 0x10000
483328+49152+262564[+62796+51901]
TOTAL SIZE: 909744 at 0x1001c
START AT 0x10020
NP memory size: 32 MB
ILACC: EEPROM enet addr:8:0:8:0:ae:61, Silicon Rev:0x5, IB:0xea1dfce0
virtual console: IB: 0xea1dfe68
NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000
LynxOS/68040-MVME167 Version 2.1.0
Copyright 1992 Lynx Real-Time Systems Inc.
All rights reserved.
LynxOS release 2.1.0, level 1: NP-LynxOS #112: compiled Nov 08 1994 19:49:33
LynxOS Startup: ma
fsck /dev/sd0a
(all sizes and block numbers in decimal)
(file system creation time is Thu Apr 27 18:27:01 1995)
checking used files
recovering orphaned files
making free block list
making free inode list
46124 free blocks 3262 free inodes
fsck /dev/sd0b
(all sizes and block numbers in decimal)
(file system creation time is Thu Apr 27 18:27:22 1995)
checking used files
recovering orphaned files
making free block list
making free inode list
43086 free blocks 3532 free inodes
fsck /dev/sd0c
(all sizes and block numbers in decimal)
(file system creation time is Thu Apr 27 18:27:43 1995)
checking used files
recovering orphaned files
making free block list
making free inode list
31519 free blocks 3612 free inodes
fsck /dev/sd0d
(all sizes and block numbers in decimal)
(file system creation time is Thu Apr 27 18:28:01 1995)
recovering orphaned files
making free block list
making free inode list
65132 free blocks 4367 free inodes
Mounting all filesystems
You can now see the password installation prompt. Provide new passwords for each account as necessary:
The following accounts do not have passwords:
root fldsup npadmin oper
Install a password on the root account? (y/n) [y] y
Changing password for root
Enter new password:
Retype new password:
Install a password on the fldsup account? (y/n) [y] y
Changing password for fldsup
Enter new password:
Retype new password:
Install a password on the npadmin account? (y/n) [y] y
Changing password for npadmin
Enter new password:
Retype new password:
Install a password on the oper account? (y/n) [y] y
Changing password for oper
Enter new password:
Retype new password:
Starting VM system ... Virtual Memory Engaged!
inetd started
Starting crond ...
Initializing the switch hardware interface ...
Using switch A, cards are NOT synchronized, fast cutover is supported
PCP version: 0x410, CMP version: 0x12, FSU version 0x109
Starting the switch software
LightStream 2020 Version 2.0.6
Copyright 1993 LightStream Corp. All rights reserved.
Portions copyright 1992 by Lynx Real-Time Systems Inc., 1983 by the Regents
of the University of California, 1988 and 1990 by Paul Vixie, and 1991 by
SNMP Research Inc.
This software contains unpublished proprietary and trade secret information
of LightStream Corp.
LightStream 2020 Software provided to the U.S. Government is subject to the
notices on the software and on the LightStream user documentation copyright
page.
PROGRAM: cbuf: (ls2_0) compiled Nov 08 1994 @ 23:33:35 [pid:50]
Login as root and check the new password:
user name: root
password:
This completes the LightStream 2020 password recovery procedure.

9.ciscolocaldirector
Description
This document describes how to recover a password for the Local Director.
  Prerequisites
To carry out this password recovery procedure, you need the following items:
A PC with MS-DOS.
A formatted 1.44 MB floppy disk.
You also need to have access to the Local Director Password Utility, which includes the following files:
rawrite.exe

ldunlock.bin

  Step-by-Step Procedure
1.        Copy both files listed above into the same directory and go to this directory.
2.        Execute the rawrite.exe file on your PC.
3.        At the Enter Source File Name prompt, type ld_unlock.bin.
4.        At the Destination Drive prompt, type the drive letter for your floppy disk drive.
5.        Insert a formatted 1.44 MB floppy disk into this drive. The image file will be copied onto the disk.
6.        Remove the disk and insert it into the Local Director's floppy disk drive. You will now see the following message:
PIX Bios V2.7
Booting Floppy
...................................Execing flop
FAST Floppy loader version 1.09
Reading floppy image........Done
32MB RAM
Flash=i28F020
unlock 1.1
Copyright (c) 1996 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is subject to restrictions
as set forth in subparagraph(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights
in Technical Data and Computer Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
unlock 1.1: removing password from configuration
reading config, erasing config, writing config, done.
Password cleared -- remove floppy and reboot.
7.        Reboot the Local Director.
8.        Remove the disk and reboot the Local Director again.
10.Cisco交换机口令的恢复
Password Recovery Procedure
 
Description
This document describes how to recover a password for the Local Director.
  Prerequisites
To carry out this password recovery procedure, you need the following items:
A PC with MS-DOS.
A formatted 1.44 MB floppy disk.
You also need to have access to the Local Director Password Utility, which includes the following files:
rawrite.exe

ldunlock.bin

  Step-by-Step Procedure
1.        Copy both files listed above into the same directory and go to this directory.
2.        Execute the rawrite.exe file on your PC.
3.        At the Enter Source File Name prompt, type ld_unlock.bin.
4.        At the Destination Drive prompt, type the drive letter for your floppy disk drive.
5.        Insert a formatted 1.44 MB floppy disk into this drive. The image file will be copied onto the disk.
6.        Remove the disk and insert it into the Local Director's floppy disk drive. You will now see the following message:
7.                  PIX Bios V2.78.                  Booting Floppy9.                  ...................................Execing flopFAST Floppy loader version 1.09 Reading floppy image........Done 32MB RAM Flash=i28F020 unlock 1.1 Copyright (c) 1996 by Cisco Systems, Inc. Restricted Rights LegendUse, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 unlock 1.1: removing password from configuration reading config, erasing config, writing config, done. Password cleared -- remove floppy and reboot.
10.     Reboot the Local Director.
11.     Remove the disk and reboot the Local Director again.
11.Cisco交换机口令的恢复1600
Password Recovery Procedure
for the Cisco Catalyst 1600
Description
This document describes how to recover a password on a Cisco Catalyst 1600.
Step-by-Step Procedure
1.        Push and hold the Reset button on the switch until the LCD display shows "erasing mgmt passwd."
2.        Release the Reset button.
The switch resets and has no password.
12.Cisco交换机口令的恢复1700190021002800
Password Recovery Procedure
for the Cisco Catalyst 1700, 1900, 2100, 2800, and 2820
   Description
This document describes the password recovery procedure for the following Cisco products:
Cisco Catalyst 1700
Cisco Catalyst 1900
Cisco Catalyst 2100
Cisco Catalyst 2800
Cisco Catalyst 2820
   Step-by-Step Procedure
Check the boot firmware version number from the Systems Engineering menu.
Firmware Version 1.10 and Later
Clearing the Password
1.        Power-cycle the switch.
After POST completes, the following prompt displays:
Do you wish to clear the passwords? [Y]es or [N]o:
Note: You have ten seconds to respond. If you don't respond within that time, the Management Console Logon screen displays. You cannot change this waiting period.
2.        Enter [Y]es to delete the existing password from nonvolatile RAM (NVRAM).
Note: If you type [N]o, the existing password remains valid.
3.        Assign a password from the switch management interfaces (management console or command line interface (CLI)).
Viewing the Password
For firmware versions between 1.10 and 3.02, you can view the password you are trying to recover (instead of clearing it as described in the previous section).
1.        Access the diagnostic console.
a.        Press and hold the Mode button.
b.        Power-cycle the switch.
c.        Release the Mode button one or two seconds after the LED above port 1x goes off.
You will see the following logon screen:
-------------------------------------------------
Cisco Systems Diagnostic Console
Copyright(c) Cisco Systems, Inc. 1999
All rights reserved.

Ethernet Address: 00-E0-1E-7E-B4-40
-------------------------------------------------
d.        Press Enter to continue.
2.        Press Enter and select the [S] option on the Diagnostic Console - Systems Engineering Menu, and then select the [V] option on the Diagnostic Console - System Debug Interface Menu to display the management console password.
3.        If you want to change the password, select the [M] option on the Console Settings Menu.
13.Cisco交换机口令的恢复1800
Password Recovery Procedure
for the Cisco Catalyst 1800
Description
This document describes how to recover a password on a Cisco Catalyst 1800.
Step-by-Step Procedure
1.        Locate the two small black buttons mounted side by side on the red holding device inside the left cover of the switch.
The button located nearest the front of the switch is the NMI button.
2.        Boot the router.
3.        At the prompt for the password, press the NMI button five times.
The switch reloads and the password resets to its default value of "public."
14.Cisco交换机口令的恢复3000
Password Recovery Procedure
for the Catalyst 2600, 3000, 3100, and 3200
  Description
This document describes the password recovery procedure for the Catalyst 2600, 3000, 3100, and 3200.
  Step-by-Step Procedure
1.        Press the SysReq button on the switch (next to the Reset button).
Caution: When you clear nonvolatile RAM (NVRAM), the password is cleared but all configuration parameters are also reset to their default values. This means losing all options previously configured on the switch.
2.        Move the arrow key to clear NVRAM.
3.        Press Return.
The system reboots and no password is required.
15.Cisco交换机口令的恢复3500 xl 2900xl
Password Recovery Procedure
for the Catalyst 2900-XL and 3500-XL

Description
This document describes the password recovery procedure for the Cisco Catalyst 2900-XL and the Cisco Catalyst 3500-XL.
Step-by-Step Procedure
1.        Attach a terminal or PC with terminal emulation to the console port of the switch. Use the following terminal settings:
9600 baud rate
No parity
8 data bits
No stop bit
2.        Unplug the power cable.
3.        Hold down the mode button while reconnecting the power cord to the switch. You can release the mode button a second or two after the LED above port 1x is no longer illuminated.
The following instructions appear:
The system has been interrupted prior to initializing the flash file system.
The following commands will initialize the flash file system, and finish loading
the operating system software:
     
flash_init
load_helper
boot
4.        Type flash_init.
5.        Type load_helper.
6.        Type dir flash:.
The switch file system is displayed:
Directory of flash:
2 -rwx 843947 Mar 01 1993 00:02:18 C2900XL-h-mz-112.8-SA
4 drwx   3776 Mar 01 1993 01:23:24 html
66 -rwx    130 Jan 01 1970 00:01:19 env_vars
68 -rwx 1296   Mar 01 1993 06:55:51 config.text
1728000 bytes total (456704 bytes free)
7.        Type rename flash:config.text flash:config.old to rename the configuration file.
This file contains the password definition.
8.        Type boot to boot the system.
9.        Enter N at the prompt to start the Setup program, Continue with the configuration dialog? [yes/no] : N
10.     At the switch prompt type en to turn on enable mode.
11.     Type rename flash:config.old flash:config.text to rename the configuration file with its original name.
12.     Copy the configuration file into memory.
Switch# copy flash:config.text system:running-config
Source filename [config.text]? (press Return)
Destination filename [running-config]? (press Return)     
The configuration file is now reloaded.
13.     Change the password.
switch#config terminal
switch(config)#enable password Cisco
14.     Write the running configuration to the configuration file.
switch(config)#write mem
16.Cisco交换机口令的恢复3900
Password Recovery Procedure
for the Cisco Catalyst 3900
Description
This document describes the password recovery procedure for the Cisco Catalyst 3900.
Step-by-Step Procedure
Caution: A download of the main image is forced when you press SysReq for more than five seconds.
1.        Press SysReq on the switch (next to the Reset button).
2.        On the System Request menu, select Clear the System Password.
This clears only the system password. All other configuration parameters are saved in non-volatile RAM (NVRAM) and are retained.
17.Cisco交换机口令的恢复5000
Creating Passwords and Resetting Lost Passwords on the Catalyst 5000 Series Supervisor Engines
 
This document describes how to create passwords and recover lost passwords on all types of Catalyst 5000 Supervisor Engines.
To create the examples in this document, we used the following equipment:
A terminal.
A console cable suitable for the Supervisor Engine in the switch.
One Catalyst 5000 switch in a lab environment with cleared configurations.
1 This document was written in an isolated lab environment. Make certain that you understand the potential impact of any command on your network before using it.
2 The clear config all command was entered on each switch to ensure that they have default configurations.
Conventions
Command descriptions use the following conventions:
Vertical bars ( | ) separate alternative, mutually exclusive, arguments.
Square brackets ([ ]) typically indicate optional arguments.
Braces ({ }) indicate a required argument.
Braces within square brackets contain arguments that are required ([{ }]) choice within optional arguments.
Boldface indicates commands and keywords that are entered literally as shown.
Italics indicate arguments for which you supply values.
Contents
 
Creating and Changing Passwords

Tasks That Will Be Performed

Step-by-Step

Resetting Lost Passwords

Tasks That Will Be Performed

Step-by-Step

Command Summary

  Creating and Changing Passwords
Catalyst switches support two user modes: user and privileged. The user mode allows the user to enter commands that cannot affect the operational status of the switch. The privileged mode grants the user access to all commands on the switch. Each mode has a separate password. If a user mode password has been set up, the password will be required whenever a user attempts to access the switch via a terminal on the console port or a Telnet connection. If a privileged mode password has been set up, it will be required whenever a user enters the enable command at the user mode command prompt. After the user has successfully entered privileged mode, the command prompt on the switch has "(enable)" added to it.
Generally, passwords should be a mix of uppercase and lowercase letters and at least one number. Eight characters is generally considered sufficient for a secure password. A good example is "BlueSky3". Always consult your corporate security policies before configuring any passwords. Passwords should be changed frequently.
For environments that require a higher level of security, Catalyst switches also support TACACS and Radius authentication. TACACS and Radius support secure password authentication (passwords are not passed in clear text) and logging of commands entered at the command line of the switch. See the Catalyst documentation for more information on configuring these protocols.
 
Tasks That Will Be Performed
1.        
Connect a terminal to the switch.

2.        
Enter a user mode password.

3.        
Enter a privileged mode password.

4.        
Quit the current console session.

5.        
Test the new passwords.

 
Step-by-Step
Step 1. Connect a terminal to the console port of the switch. See Connecting a Terminal to the Catalyst 5000 if you do not know how to do this.
Step 2. Start a user mode console session by pressing the Enter key in your terminal emulation software. You should be prompted for a password. The default user mode password is the Enter key. Press the Enter key when prompted.
Step 3. Go into privileged mode by entering the enable command. The default privileged mode password is the Enter key. Press the Enter key when prompted.
Step 4. Set the user mode password with the setpassword command. (An example password is "BlueSky3".) Press the Enter key when prompted for the old password.

Console> (enable) set password
Enter old password:
Enter new password:
Retype new password:
Password changed.
Console> (enable)

Step 5. Set the privileged mode password with the set enablepass command. (An example password is "RedBird2".) Press the Enter key when prompted for the old password.

Console> (enable) set enablepass
Enter old password:
Enter new password:
Retype new password:
Password changed.
Console> (enable)

Step 6. Terminate your current session by entering the quit command. Then test your new passwords.

Console> (enable) quit
Session Disconnected...
Cisco Systems Console           Mon Aug 30 1999, 09:55:58
Enter password:
Console>
Console> enable
Enter password:
Console> (enable)

   Resetting Lost Passwords
To recover lost passwords, turn the switch off and on again. After the system boots, you will have a 30-second window where the passwords will be returned to the default of the Enter key. You will be able to change the passwords from a management terminal on the console port using the set password and set enablepass commands. When you are prompted to enter the old passwords, press the Enter key, then follow the prompts.
Your original configuration with your new passwords will be in place after you finish this procedure.
 
Tasks That Will Be Performed
1.        
Connect a terminal to the switch.

2.        
Power cycle the switch.

3.        
Create new (temporary) user and privileged mode passwords.

4.        
Create secure passwords.

 
Note: To ensure that you can change both passwords within 30 seconds, make the new passwords a single character. You can change them to something more secure after the 30-second period is over.
 
Step-by-Step
Step 1. Connect a terminal to the console port of the switch.
Step 2. Power cycle the switch.
Step 3. After the Running System Diagnostics Message appears, perform the following steps as quickly as possible:
Press the Enter key to start a user mode session.
Press the Enter key when prompted for a user mode password.
Go into privileged mode by entering the {en}able command.
Press the Enter key when prompted for privileged mode a password.
The following output shows this procedure. Keystrokes that are not usually shown are given here for clarity.
Boot image: bootflash:A-sup3.5-1-1
Downloading epld sram device please wait ...
Programming successful for Altera 10K50 SRAM EPLD
Running System Diagnostics from this Supervisor (Module 1)
This may take up to 2 minutes....please wait [Enter]
Cisco Systems Console
Enter password:[Enter]
Console> en[Enter]
Enter password:[Enter]
Console> (enable)
Step 4. Perform the following steps as quickly as possible:
Set the user mode password to "a" with the setpass command.
Set the privileged mode password to "a" with the set enablep command.
The following output shows this procedure on a switch. Keystrokes that are not usually shown are given here for clarity.
Console> (enable) set pass[Enter]
Enter old password:[Enter]
Enter new password:a[Enter]
Retype new password:a[Enter]
Password changed.
Console> (enable) set enablep[Enter]
Enter old password:[Enter]
Enter new password:a[Enter]
Retype new password:a[Enter]
Password changed.
Console> (enable)
If you are only able to change the user mode password during the 30-second period, you will have to power cycle the switch again to change the privileged mode password.
Step 7. Proceed to the
beginning
of this document to create more secure passwords.
   Command Summary
 
Syntax:
set password
As used in
this document:
set pass
Syntax:
set enablepass
As used in
this document:
set enablep

18.2000, 2500, 3000, 4000, AccessPro
Password Recovery Procedure
for the Catalyst 1200, 2900, 2926, 4000, 5000, 5500, 6000
Contents

[/url]

 
Description
This document describes the password recovery procedure for the following Cisco products:
Catalyst 1200
Catalyst 2900
Catalyst 2926
Catalyst 4000
Catalyst 5000
Catalyst 5500
Catalyst 6000
   Step-by-Step Procedure
1.        Attach a terminal or PC with terminal emulation to the console port of the switch. Use the following terminal settings:
9600 baud rate
no parity
8 data bits
1 stop bit
2.        Turn off the switch and then turn it on.
Important You must complete steps 3 through 7 within 30 seconds after you turn the switch off and on and the first time you see the password prompt.
3.        Press Enter at the password prompt to enter a null password.
4.        Type enable at the prompt to enter enable mode.
5.        Press Enter at the password prompt to enter a null password.
6.        Change the password using the
[url=http://bluestudy1998.nease.net/jbpz/huifu/#33449]set password

command or the
set enablepass
command.
7.        Press Enter at the prompt to enter the old password.
      set password
Use the set password command to change the login password on the CLI.
 
set password
Syntax Description
This command has no arguments or keywords.
Default
The default configuration has no password configured.
Command Type
Switch command.
Command Mode
Privileged.
Usage Guideline
The command prompts you for the old password. If the password you enter is valid, you are prompted to enter a new password and to verify the new password. A zero-length password is allowed by pressing Return.
Example
This example shows how to set an initial password:
Console> (enable) set password
Enter old password:
Enter new password:
Retype new password:
Password changed.
Console> (enable)

      set enablepass
Use the set enablepass command to change the password for the privileged level of the CLI.
 
set enablepass
Syntax Description
This command has no arguments or keywords.
Default
The default configuration has no enable password configured.
Command Type
Switch command.
Command Mode
Privileged.
Usage Guideline
The command prompts you for the old password. If the password you enter is valid, you are prompted to enter a new password and to verify the new password. A zero-length password is allowed.
Example
This example shows how to establish a new password:
Console> (enable) set enablepass
Enter old password:
Enter new password:
Retype new password:
Password changed.
Console> (enable)
   Sample Output of a Password Recovery Procedure
Console>en
Enter password:
Sorry
Console>
!--- The switch is being power cycled.
!
System Bootstrap, Version 5.2(1)CSX
Copyright (c) 1994-1999 by cisco Systems, Inc.
c6k_sup1 processor with 65536 Kbytes of main memory
Autoboot executing command: "boot bootflash:cat6000-sup.5-3-3-CSX.bin"
Uncompressing file: #####################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
##########################################################
System Power On Diagnostics
DRAM Size ....................64 MB
Testing DRAM..................Passed
Verifying Text segment .......Passed
NVRAM Size ...................512 KB
Saving NVRAM .................Done
Testing NVRAM ................Passed
Restoring NVRAM ..............Done
Level2 Cache .................Present
Testing Level2 Cache .........Passed
System Power On Diagnostics Complete
Boot image: bootflash:cat6000-sup.5-3-3-CSX.bin
Running System Diagnostics from this Supervisor (Module 1)
This may take up to 2 minutes....please wait
Cisco Systems Console
NTP: Previous SW using local time...
Enter password: (press Enter)
2000 Jan 09 23:09:27 %SYS-1-SYS_NORMPWRMGMT:System in normal power management operation
2000 Jan 09 23:09:27 %SYS-5-MOD_PWRON:Module 3 powered up
2000 Jan 09 23:09:27 %SYS-5-MOD_PWRON:Module 4 powered up
2000 Jan 09 23:09:34 %SYS-5-MOD_OK:Module 1 is online
Console> en
Enter password: (press Enter)
Console> (enable) set password
Enter old password: (press Enter)
Enter new password: (type your new password)
Retype new password: (type your new password)
Password changed.
Console> (enable) set enablepass
Enter old password: (press Enter)
Enter new password: (type your new password)
Retype new password: (type your new password)
Password changed.
Console> (enable)
19.7000 (RP), AGS, IGS, STS-10x
Password Recovery Procedure
for the Catalyst 1200, 2900, 2926, 4000, 5000, 5500, 6000
Contents

[/url]

 
Description
This document describes the password recovery procedure for the following Cisco products:
Catalyst 1200
Catalyst 2900
Catalyst 2926
Catalyst 4000
Catalyst 5000
Catalyst 5500
Catalyst 6000
   Step-by-Step Procedure
1.        Attach a terminal or PC with terminal emulation to the console port of the switch. Use the following terminal settings:
9600 baud rate
no parity
8 data bits
1 stop bit
2.        Turn off the switch and then turn it on.
Important You must complete steps 3 through 7 within 30 seconds after you turn the switch off and on and the first time you see the password prompt.
3.        Press Enter at the password prompt to enter a null password.
4.        Type enable at the prompt to enter enable mode.
5.        Press Enter at the password prompt to enter a null password.
6.        Change the password using the
[url=http://bluestudy1998.nease.net/jbpz/huifu/#33449]set password

command or the
set enablepass
command.
7.        Press Enter at the prompt to enter the old password.
      set password
Use the set password command to change the login password on the CLI.
 
set password
Syntax Description
This command has no arguments or keywords.
Default
The default configuration has no password configured.
Command Type
Switch command.
Command Mode
Privileged.
Usage Guideline
The command prompts you for the old password. If the password you enter is valid, you are prompted to enter a new password and to verify the new password. A zero-length password is allowed by pressing Return.
Example
This example shows how to set an initial password:
Console> (enable) set password
Enter old password:
Enter new password:
Retype new password:
Password changed.
Console> (enable)

      set enablepass
Use the set enablepass command to change the password for the privileged level of the CLI.
 
set enablepass
Syntax Description
This command has no arguments or keywords.
Default
The default configuration has no enable password configured.
Command Type
Switch command.
Command Mode
Privileged.
Usage Guideline
The command prompts you for the old password. If the password you enter is valid, you are prompted to enter a new password and to verify the new password. A zero-length password is allowed.
Example
This example shows how to establish a new password:
Console> (enable) set enablepass
Enter old password:
Enter new password:
Retype new password:
Password changed.
Console> (enable)
   Sample Output of a Password Recovery Procedure
Console>en
Enter password:
Sorry
Console>
!--- The switch is being power cycled.
!
System Bootstrap, Version 5.2(1)CSX
Copyright (c) 1994-1999 by cisco Systems, Inc.
c6k_sup1 processor with 65536 Kbytes of main memory
Autoboot executing command: "boot bootflash:cat6000-sup.5-3-3-CSX.bin"
Uncompressing file: #####################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
#########################################################################
##########################################################
System Power On Diagnostics
DRAM Size ....................64 MB
Testing DRAM..................Passed
Verifying Text segment .......Passed
NVRAM Size ...................512 KB
Saving NVRAM .................Done
Testing NVRAM ................Passed
Restoring NVRAM ..............Done
Level2 Cache .................Present
Testing Level2 Cache .........Passed
System Power On Diagnostics Complete
Boot image: bootflash:cat6000-sup.5-3-3-CSX.bin
Running System Diagnostics from this Supervisor (Module 1)
This may take up to 2 minutes....please wait
Cisco Systems Console
NTP: Previous SW using local time...
Enter password: (press Enter)
2000 Jan 09 23:09:27 %SYS-1-SYS_NORMPWRMGMT:System in normal power management operation
2000 Jan 09 23:09:27 %SYS-5-MOD_PWRON:Module 3 powered up
2000 Jan 09 23:09:27 %SYS-5-MOD_PWRON:Module 4 powered up
2000 Jan 09 23:09:34 %SYS-5-MOD_OK:Module 1 is online
Console> en
Enter password: (press Enter)
Console> (enable) set password
Enter old password: (press Enter)
Enter new password: (type your new password)
Retype new password: (type your new password)
Password changed.
Console> (enable) set enablepass
Enter old password: (press Enter)
Enter new password: (type your new password)
Retype new password: (type your new password)
Password changed.
Console> (enable)
20.Cisco路由器口令恢复1020
Password Recovery Procedure
for the Cisco 1020 Router
Description
This document describes how to recover a password on a Cisco 1020 router.
Since the Cisco 1020 router is often not physically secured, to perform a password recovery you must call Cisco Systems or your distribution channel and provide a Cisco 1020 router generated challenge. Using the override program, the support representative can provide a one-time password you can use to enter enable mode.
Notes:
Overrides can be done only from the console.
Press Return at the password prompt if the enable password is not set.
Step-by-Step Procedure
1.        From the console, log in to the Cisco 1020 router with username enable and password override.
The 1020 prints a challenge.
2.        Provide the support representative with the challenge.
The challenge is used to provide the response.
3.        On the 1020 console, log in with username enable and use the response as the password.
You're now in enable mode.
4.        Type wr t to see the existing password or type conf t to change the password.
21.Cisco路由器口令恢复600
Cisco 600 Series Password Recovery
 
The steps below describe how to recover a password on the Cisco 600 series of routers.
 
Step 1: Enter RMON mode.
To do this, follow the steps below:
1.        Connect your PC to the console port of the router.
2.        Set your Terminal Access Program (such as HyperTerminal in Windows) to the following settings:
§         Baud rate: 38400 bps recommended (standard 9600 bps possible)
§         Data bits: 8
§         Parity: None
§         Stop bits: 1
§         Flow control: None
3.        Power cycle the router (turn the router off, then on using the router's power switch)
4.        As soon as you see the Hello! prompt, type Ctrl-C.
5.        You are now in RMON mode.
 
Step 2: If you need to save the configuration file, execute the following command:
db fef80030 100
This command prints the configuration to the screen. The last number indicates the number of bytes to display. Use a value of 100 bytes or more for the number of bytes to display.
Note: You must use the enable password command for the password to display encrypted during password recovery.
 
Step 3: Look for your encrypted password.
The text of the password will be altered by two letters. For example, using the key a = c, b = d, c = e, and so on, the password "cisco" would be "agqam".
 
Step 4: (This step is optional.) Erase the current configuration.
An example is shown below:
=>es 6 Erasing sector 00000006...Sector erased =>rb Hello!CBOS v2.0.1.01
Note: This step reboots a Cisco 600 series router with no configuration. You will need to redo the configuration and then use the write command to save the changes to NVRAM.
 
Step: 5: Reboot the router.
An example is shown below:
rb


22.Cisco路由器口令恢复700
Password Recovery for Cisco 700 Series Routers
This document describes the procedure for performing password recovery on Cisco 750/760 series routers using the NVRAM erase code (750erase.hex or 760erase.hex). Choose the appropriate Terminal Emulation Package (Windows95 and Windows3.1x instruction are included).
1.        Power cycle the router. While it is booting up, press the ESC key a couple of times. This will put the unit into a software load mode. The unit will respond with the following prompts:
2.            Ready to upload new firmware into flash. Baud (1=19.2K, 2=2400, 3=38.4K, 9=9600)?
3.        Select the baud rate for the transfer (in this example 9600 is chosen). The unit will respond with the following prompt.
4.            Begin ascii upload at 8n1/9600 baud.
5.        Start the ascii file transfer of the image, 750erase.hex for the 750 series or 760erase.hex for the 760 series. These files are not interchangeable. This file must be treated as a text file for loading into the unit via the console port. At 9600, the transfer takes approximately 12 minutes. While the transfer is occuring, the LINE LED will be flashing rapidly. When the transfer is complete the unit will respond with the following prompts and then reboot itself:
6.     Firmware transfer successful.7.     Now writing firmware into FLASH, standby ...8.     Firmware upload complete.9.     Erase Version of 750/760 firmware This will erase all configured parameters10.  ERASING NVRAM...11.  (reboots itself)12.  Ready to upload new firmware into flash.13.        Baud (1=19.2K, 2=2400, 3=38.4K, 9=9600)?14.        At this point, reload the original software repeating step 2.
Procedure for performing a text/ascii transfer using Windows95 Hyperterminal
1.        Choose Properties from the File Menu
2.        Choose Settings Tab
3.        Choose ASCII Setup Button
4.        Make sure that both "Line Delay" and "Character Delay" are set to zero.
5.        Make sure that "Send line ends with line feeds is check marked".
6.        Click the OK Button on both screens.
7.        Close Hyperterminal and then restart it.
8.        Choose Send Text File... from the Transfer menu.
9.        Locate file (may have to change Files of Type to All Files) and highlight it.
10.     Click the OK Button.
The file is now being transferred to the unit...there may not be any indication that the file is transferring except for the LINE LED on the front of the unit. While the transfer is occuring, the LINE LED will be flashing rapidly on the front of the unit.
Procedure for performing a text/ascii transfer using Windows Terminal
1.        Choose Text Transfers... from the Settings Menu.
2.        Make sure that "Standard Flow Control" is chosen.
3.        Click the OK Button.
4.        Choose Send Text File... from the Transfer Menu.
5.        Locate file (may have to change List Files of Type to All Files) and highlight it.
6.        Make sure that neither Append LF nor Strip LF are check marked.
7.        Click the OK Button.
The file is now being transferred to the unit...there may not be any indication that the file is transferring except for the LINE LED on the front of the unit. While the transfer is occuring, the LINE LED will be flashing rapidly on the front of the unit.
23.Cisco路由器口令恢复7000
Password Recovery Procedure
for the Cisco 7000
Description
This document describes the password recovery procedure for the Cisco 7000.
Step-by-Step Procedure
1.        Use the show version command to determine if the processor in your router is an RP or an RSP7000.
2.        If the processor is an RP, use the password recovery procedure for the Cisco 2500.
If the processor is an RSP7000, use the password recovery procedure for the Cisco 1600.
Sample Output of a show version Command on a 7000 With an RP Module
Router#sh vers
Cisco Internetwork Operating System Software
IOS (tm) 7000 Software (C7000-JS-M), Version 11.2(21), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Wed 15-Dec-99 23:44 by ccai
Image text-base: 0x00001000, data-base: 0x008F86E8

ROM: System Bootstrap, Version 11.2(3), SOFTWARE
ROM: 7000 Software (C7000-AJSV-M), Version 11.2(3), RELEASE SOFTWARE (fc2)

Router uptime is 1 hour, 38 minutes
System restarted by power-on at 15:19:36 MEST Tue Apr 25 2000
System image file is "c7000-js-mz_112-21.bin", booted via tftp from 172.17.240.250

cisco RP1 (68040) processor (revision C0) with 65536K bytes of memory.
Processor board ID 0025A50A
G.703/E1 software, Version 1.0.
SuperLAT software copyright 1990 by Meridian Technology Corp).
Bridging software.
X.25 software, Version 2.0, NET2, BFE and GOSIP compliant.
TN3270 Emulation software.
1 Switch Processor
1 EIP controller (6 Ethernet).
1 TRIP controller (4 Token Ring).
1 AIP controller (1 ATM).
6 Ethernet/IEEE 802.3 interface(s)
4 Token Ring/IEEE 802.5 interface(s)
1 ATM network interface(s)
128K bytes of non-volatile configuration memory.
4096K bytes of flash memory sized on embedded flash.

Configuration register is 0x2102
Sample Output of a show version Command on a 7000 With an RSP7000 Module
Router#sh vers
Cisco Internetwork Operating System Software
IOS (tm) RSP Software (RSP-DSV-M), Version 12.0(8.0.1)T,  MAINTENANCE
INTERIM SOFTWARE
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Sat 13-Nov-99 13:54 by ccai
Image text-base: 0x60010908, data-base: 0x61090000
ROM: System Bootstrap, Version 5.3(9) [mkamson 9], RELEASE SOFTWARE (fc2)
BOOTFLASH: RSP Software (RSP-BOOT-M), Version 12.0(3), RELEASE SOFTWARE
(fc1)
Router uptime is 5 days, 10 minutes
System returned to ROM by reload at 14:17:10 MEST Tue Apr 18 2000
System image file is "tftp://172.17.240.250/rsp-dsv-mz.120-8.0.1.T"
cisco RSP7000 (R4700) processor with 65536K/2072K bytes of memory.
R4700 CPU at 100Mhz, Implementation 33, Rev 1.0
Last reset from power-on
G.703/E1 software, Version 1.0.
G.703/JT2 software, Version 1.0.
X.25 software, Version 3.0.0.
Bridging software.
1 EIP controller (4 Ethernet).
1 FSIP controller (8 Serial).
4 Ethernet/IEEE 802.3 interface(s)
8 Serial network interface(s)
125K bytes of non-volatile configuration memory.

16384K bytes of Flash PCMCIA card at slot 0 (Sector size 128K).
8192K bytes of Flash internal SIMM (Sector size 256K).
Configuration register is 0x2102
24.Cisco路由器口令恢复800
Password Recovery Procedure
for the Cisco 800
 
  Description
This document describes the password recovery procedure for the Cisco 800.
    Step-by-Step Procedure
1.        Attach a terminal or PC with terminal emulation to the console port of the router. Use the following terminal settings:
9600 baud rate
No parity
8 data bits
1 stop bit
The required console cable specifications are described in Cabling Guide for RJ-45 Console and AUX Ports (Cisco's 1000 series, 2500 series, and AS5100).
2.        Type show version and record the setting of the configuration register. Click
here
to see output of a show version command.
The configuration register setting is usually 0x2102 or 0x102.
3.        Using the switch, turn off the router and then turn it on.
4.        Press Break on the terminal keyboard within 60 seconds of the powerup to put the router into ROMMON.
If the break sequence doesn't work, see Possible Key Combinations for Break Sequence During Password Recovery for other key combinations.
5.        Type set ios-conf = 142 at the boot# prompt.
If Flash is intact, the best setting is 0x42.
If the Flash is not installed or is erased, use the 0x41 setting. Note that with this setting you can view or erase the configuration but cannot change the password.
6.        Type boot at the boot#> prompt to initialize the router.
The router reboots but ignores its saved configuration.
7.        Type no after each setup question or press Ctrl-C to skip the initial setup procedure.
8.        Type enable at the Router> prompt.
You'll be in enable mode and see the Router# prompt.
9.        Important Type config mem or copy start running to copy the nonvolatile RAM (NVRAM) into memory. Do not type config term.
10.     Type wr term or show running.
The show running and wr term commands show the configuration of the router. In this configuration you see under all the interfaces the shutdown command, which means all interfaces are currently shutdown. Also, you can see the passwords either in encrypted or unencrypted format.
11.     Type config term and make the changes.
The prompt is now hostname(config)#.
12.     Type enable secret .
13.     Issue the no shutdown command on every interface that is used. If you issue a show ip interface brief command, every interface that you want to use should be "up up".
14.     Type config-register 0x2102, or the value you recorded in step 2.
15.     Press Ctrl-z to leave the configuration mode.
The prompt is now hostname#.
16.     Type write mem or copy running startup to commit the changes.
Router>show version
Cisco Internetwork Operating System Software
IOS (tm) C800 Software (C800-Y6-MW), Version 12.1(1), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Tue 14-Mar-00 16:01 by cmong
Image text-base: 0x000EA000, data-base: 0x005D3000
ROM: TinyROM version 1.0(3)
Router uptime is 2 days, 3 hours, 8 minutes
System returned to ROM by power-on
System image file is "flash:c800-y6-mw.121-1"
Cisco C801 (MPC850) processor (revision 0) with 51428K bytes of virtual memory.
Processor board ID JAD03050229
CPU part number 33
Bridging software.
Basic Rate ISDN software, Version 1.1.
1 Ethernet/IEEE 802.3 interface(s)
1 ISDN Basic Rate interface(s)
12M bytes of physical memory (DRAM)
8K bytes of non-volatile configuration memory
8M bytes of flash on board (4M from flash card)
Configuration register is 0x2102
!--- The router was just powercycled and during
bootup a break sequence was sent to the router.
TinyROM version 1.0(3)
Fri Apr 30 18:22:12 1999
Copyright (c) 1998-1999 by cisco Systems, Inc.
All rights reserved.
POST ......... OK. 12MB DRAM, 8MB Flash.
boot# set ios-conf = 142
boot# boot
Booting "c800-y6-mw.121-1" ...,
        Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
      cisco Systems, Inc.
      170 West Tasman Drive
      San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) C800 Software (C800-Y6-MW), Version
12.1(1), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Tue 14-Mar-00 16:01 by cmong
Image text-base: 0x000EA000, data-base: 0x005D3000
Cisco C801 (MPC850) processor (revision 0) with 51428K bytes of virtual memory.
Processor board ID JAD03050229
CPU part number 33
Bridging software.
Basic Rate ISDN software, Version 1.1.
1 Ethernet/IEEE 802.3 interface(s)
1 ISDN Basic Rate interface(s)
12M bytes of physical memory (DRAM)
8K bytes of non-volatile configuration memory
8M bytes of flash on board (4M from flash card)
    --- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: n
Press RETURN to get started! (press Enter)
00:01:45: %SYS-5-RESTART: System restarted --
Cisco Internetwork Operating System Software
IOS (tm) C800 Software (C800-Y6-MW), Version 12.1(1), RELEASE SOFTWARE (fc1)
Copyright (c) 1986-2000 by cisco Systems, Inc.
Compiled Tue 14-Mar-00 16:01 cmong
00:01:45: %LINK-5-CHANGED: Interface BRI0, changed state to administratively down
00:01:45: %LINK-5-CHANGED: Interface Ethernet0, changed state to administratively down
00:01:46: %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0, changed state to down
00:01:46: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to down
Router>en
Router#copy start run
Destination filename [running-config]? (press Enter)
2010 bytes copied in 32.120 secs (62 bytes/sec)
Router#
Router#
00:02:53: %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:1, changed state to down
00:02:53: %LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0:2, changed state to down
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#enable secret cisco
Router(config)#
00:03:39: %SYS-5-CONFIG_I: Configured from console by console
Router#sh ip int brief
Interface   IP-Address      OK?    Method   Status                 Protocol
BRI0        unassigned      YES    TFTP     administratively down  down
BRI0:1      unassigned      YES    unset    administratively down  down
BRI0:2      unassigned      YES    unset    administratively down  down
Dialer0     unassigned      YES    TFTP     up                     up
Dialer1     192.168.32.1    YES    TFTP     up                     up
Ethernet0   10.200.40.65    YES    TFTP     administratively down  down
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int e 0
Router(config-if)#no shut
Router(config-if)#
00:04:02: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up
00:04:03: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet0, changed state to up
Router(config)#config-reg 0x2102
Router(config)#^Z
Router#
00:04:36: %SYS-5-CONFIG_I: Configured from console by console
Router#write mem
25.Cisco路由器口令恢复cs500
Password Recovery Procedure
for the Cisco cs500 Communication Server
Description
This document describes how to recover a password on a Cisco cs500 communication server.
The Cisco cs500 does not have a console port so to recover a password you must erase the configuration then configure the server again.
Step-by-Step Procedure
1.        Unplug the Cisco cs500 server.
2.        Press and hold the DEFAULT button on the front of the chassis.
3.        Turn on the server.
The OK and LAN LEDs blink on and off.
4.        When the OK and LAN LEDs blink off (after about 15 seconds), release the DEFAULT button.
The 500-CS enters setup mode in about two to ten minutes.
5.        Configure the server.



本文来自ChinaUnix博客,如果查看原文请点:http://blog.chinaunix.net/u/6482/showart_100544.html
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP