- 论坛徽章:
- 0
|
Your service request has been assigned case number RQST00000033003.\r\n\r\nIf the Silkworm 12000 is using FOS v4.1.x or above then please follows the instructions below to recover the passwords. Please let me know if the 12000 is running FOS v4.0.x release.\r\n\r\n\r\nRecovering the Root Password on Fabric OS v4.1\r\nIf the Boot PROM password is still known, you can use the following procedure to recover the Root\r\npassword on a SilkWorm 3900 or SilkWorm 12000.\r\nNote: This procedure requires accessing the boot prompt, which stops traffic flow through a SilkWorm\r\n3900 until the switch is rebooted. On a SilkWorm 12000, you can recover the Root password without\r\ndisruption to I/O by performing the procedure on the standby CP card.\r\nTo recover the Root password:\r\n1. Connect to the serial port interface of the switch (SW3900)/Standby CP(SW12000)\r\n2. Reboot the switch (SW3900)/Standby CP (SW12000) and press ESC within four seconds after the\r\nmessage \"Press escape within 4 seconds...\" displays. \"Enter Boot PROM interface:\"\r\n3. Enter the Boot PROM password.\r\n4. Enter \"3\" at the prompt to enter the command shell.\r\n5. Enter the printenv command and save the output.\r\n6. Enter the boot command followed by the first memory address after the string OSLoader= obtained\r\nfrom the printenv output and -s\r\nboot <memory address> -s\r\nThe system is coming up, please wait...\r\nChecking system RAM - press any key to stop test\r\nChecking memory address: 01300000\r\nSystem RAM check terminated by keyboard\r\nSystem RAM check complete\r\nPress escape within 4 seconds to enter boot interface.\r\n1) Start system.\r\n2) Recover password.\r\n3) Enter command shell.\r\nOption? 3\r\nPassword:\r\n> printenv\r\nAutoLoad=yes\r\nENET_MAC=006069602BD6\r\nInitTest=MEM()\r\nLoadIdentifiers=IDE w/ XFS;IDE w/ XFS & NFS Root\r\nOSLoader=MEM()0xF0000000;MEM()0xF0800000\r\nOSRootPartition=hda1;hda2\r\nSkipWatchdog=yes\r\n> boot MEM()0xF0000000 -s\r\n.\r\nSteps 7 through 11 are for a SW3900 only, skip to step 12 for SW12000.\r\n7. Enter the following string at the prompt:\r\nmount -o remount,rw,noatime /\r\n8. Enter the following string at the prompt:\r\nmount /dev/hda2 /mnt\r\n9. Enter the passwddefault command with the full path, as follows:\r\n/sbin/passwddefault\r\nThis resets the User, Admin, Factory, and Root passwords to the default values\r\n10. Enter the reboot -f command if the switch is a SW3900.\r\nreboot -f\r\nTraffic flow resumes when the switch finishes rebooting.\r\n11. Log into the SW3900 switch by serial or telnet as Root and set new passwords for all accounts. The\r\nprocess is now complete for the SW3900.\r\n12. From the serial connection to the standby CP card, set the appropriate hostname to the CP. Use \"cp0\"\r\nfor slot 5, and \"cp1\" for slot 6.\r\nhostname cp0\r\n13. Start networking on the standby CP\r\n/etc/init.d/network start\r\n14. Perform one of the following according to which slot the CP card is in:\r\n? If the standby CP card is in slot 5 (CP0), enter \"rsh 10.0.0.6 /sbin/passwddefault\", press\r\nEnter.\r\n? If the standby CP card is in slot 6 (CP1), enter \"rsh 10.0.0.5 /sbin/passwddefault\", press\r\nEnter.\r\n15. Reboot the Standby CP with the command \"reboot -f\"\r\n16. Log into the active CP as admin from a telnet or serial connection, and enter Ctrl + C to bypass the\r\nrequest to modify passwords.\r\n17. Log into either logical switch by serial or telnet as admin and set new passwords for all accounts. |
|