免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 4919 | 回复: 9
打印 上一主题 下一主题

有人知道恢复Brocade 3800 的admin口令吗? [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2008-04-22 09:26 |只看该作者 |倒序浏览
求助,修改Brocade 3800 设置,忘了管理员口令了,求怎样恢复Brocade 3800 的admin口令?谢谢!

论坛徽章:
0
2 [报告]
发表于 2008-04-22 09:38 |只看该作者
出厂的用户:admin,密码:password。如果没有改过就是这个了。

论坛徽章:
0
3 [报告]
发表于 2008-04-22 10:56 |只看该作者
改过了,用这个进不了啦,不知道还有其它用户和口令可以进吗?

论坛徽章:
0
4 [报告]
发表于 2008-04-22 13:31 |只看该作者
其他用户就是factory模式下的了,作为用户是不知道密码的,只有厂商的工程师知道。想不起来能不能改密码了。

论坛徽章:
0
5 [报告]
发表于 2008-05-08 08:37 |只看该作者
可以试一下用root口令恢复:\r\nroot/fibranne\r\n如果能登录,使用 passwddefault 命令重置密码。\r\n\r\n
通过如下方法取得root权限:\r\n1. 连接串口并确定可以显示终端\r\n2. 重启交换机,在终端上显示“press ESC key within 4 sec….”时,4秒钟内按下ESC键\r\n3. 会显示一个菜单,选择Command Prompt shell \r\n4. 输入命令:mount -o remount,rw,noatime /\r\n5. 输入命令:mount /dev/hda2 /mnt\r\n6. 输入命令: passwddefault 或 passwd admin(仅重置admin用户密码)\r\n7. reboot -f\r\n \r\n*** 如果第5步失败,则解决方法:\r\nPrintenv\r\n找到“OSRootPartition” 参数, 然后mount第二个partition (通常是 hda2)
\r\n200E上有人这么做过

论坛徽章:
0
6 [报告]
发表于 2008-05-27 00:58 |只看该作者
和linux一样,进单用户模式改;)

论坛徽章:
0
7 [报告]
发表于 2008-05-27 01:02 |只看该作者
或者如果知道root密码的话\r\n用root登录\r\n然后passwd修改admin的密码

论坛徽章:
0
8 [报告]
发表于 2008-08-18 11:05 |只看该作者
Your service request has been assigned case number RQST00000033003.\r\n\r\nIf the Silkworm 12000 is using FOS v4.1.x or above then please follows the instructions below to recover the passwords.  Please let me know if the 12000 is running FOS v4.0.x release.\r\n\r\n\r\nRecovering the Root Password on Fabric OS v4.1\r\nIf the Boot PROM password is still known, you can use the following procedure to recover the Root\r\npassword on a SilkWorm 3900 or SilkWorm 12000.\r\nNote: This procedure requires accessing the boot prompt, which stops traffic flow through a SilkWorm\r\n3900 until the switch is rebooted. On a SilkWorm 12000, you can recover the Root password without\r\ndisruption to I/O by performing the procedure on the standby CP card.\r\nTo recover the Root password:\r\n1. Connect to the serial port interface of the switch (SW3900)/Standby CP(SW12000)\r\n2. Reboot the switch (SW3900)/Standby CP (SW12000) and press ESC within four seconds after the\r\nmessage \"Press escape within 4 seconds...\" displays. \"Enter Boot PROM interface:\"\r\n3. Enter the Boot PROM password.\r\n4. Enter \"3\" at the prompt to enter the command shell.\r\n5. Enter the printenv command and save the output.\r\n6. Enter the boot command followed by the first memory address after the string OSLoader= obtained\r\nfrom the printenv output and -s\r\nboot <memory address> -s\r\nThe system is coming up, please wait...\r\nChecking system RAM - press any key to stop test\r\nChecking memory address: 01300000\r\nSystem RAM check terminated by keyboard\r\nSystem RAM check complete\r\nPress escape within 4 seconds to enter boot interface.\r\n1) Start system.\r\n2) Recover password.\r\n3) Enter command shell.\r\nOption? 3\r\nPassword:\r\n> printenv\r\nAutoLoad=yes\r\nENET_MAC=006069602BD6\r\nInitTest=MEM()\r\nLoadIdentifiers=IDE w/ XFS;IDE w/ XFS & NFS Root\r\nOSLoader=MEM()0xF0000000;MEM()0xF0800000\r\nOSRootPartition=hda1;hda2\r\nSkipWatchdog=yes\r\n> boot MEM()0xF0000000 -s\r\n.\r\nSteps 7 through 11 are for a SW3900 only, skip to step 12 for SW12000.\r\n7. Enter the following string at the prompt:\r\nmount -o remount,rw,noatime /\r\n8. Enter the following string at the prompt:\r\nmount /dev/hda2 /mnt\r\n9. Enter the passwddefault command with the full path, as follows:\r\n/sbin/passwddefault\r\nThis resets the User, Admin, Factory, and Root passwords to the default values\r\n10. Enter the reboot -f command if the switch is a SW3900.\r\nreboot -f\r\nTraffic flow resumes when the switch finishes rebooting.\r\n11. Log into the SW3900 switch by serial or telnet as Root and set new passwords for all accounts. The\r\nprocess is now complete for the SW3900.\r\n12. From the serial connection to the standby CP card, set the appropriate hostname to the CP. Use \"cp0\"\r\nfor slot 5, and \"cp1\" for slot 6.\r\nhostname cp0\r\n13. Start networking on the standby CP\r\n/etc/init.d/network start\r\n14. Perform one of the following according to which slot the CP card is in:\r\n? If the standby CP card is in slot 5 (CP0), enter \"rsh 10.0.0.6 /sbin/passwddefault\", press\r\nEnter.\r\n? If the standby CP card is in slot 6 (CP1), enter \"rsh 10.0.0.5 /sbin/passwddefault\", press\r\nEnter.\r\n15. Reboot the Standby CP with the command \"reboot -f\"\r\n16. Log into the active CP as admin from a telnet or serial connection, and enter Ctrl + C to bypass the\r\nrequest to modify passwords.\r\n17. Log into either logical switch by serial or telnet as admin and set new passwords for all accounts.

论坛徽章:
0
9 [报告]
发表于 2008-08-18 11:07 |只看该作者
曾经碰到这个问题,工程师转发给我,折腾了几次,没搞定就放弃了.

论坛徽章:
0
10 [报告]
发表于 2008-08-18 14:21 |只看该作者
ms恢复的用到的指令很熟悉
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP