免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 5013 | 回复: 3
打印 上一主题 下一主题

请教,关于Brocade SW200E光纤交换机密码丢失的问题。 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2009-08-06 15:42 |只看该作者 |倒序浏览
请教,关于Brocade SW200E光纤交换机密码丢失的问题,\r\n\r\n之前在配置的时候把密码修改了,没有记住,后来就丢失了,现在不能进去,请问大侠该如何处理?\r\n\r\n谢谢了!

论坛徽章:
0
2 [报告]
发表于 2009-08-06 16:27 |只看该作者
GOOGLE了一个, 你可以试试下面的链接:\r\n\r\nhttp://hi.baidu.com/isno/blog/item/c98cd0136b6bf9045baf530c.html

论坛徽章:
0
3 [报告]
发表于 2009-08-06 16:27 |只看该作者
恢复brocade交换机密码的方法2008-08-29 20:18可以试一下用root口令恢复: \r\nroot/fibranne \r\n如果能登录,使用 passwddefault 命令重置密码。 \r\n\r\n\r\n通过如下方法取得root权限: \r\n1. 连接串口并确定可以显示终端 \r\n2. 重启交换机,在终端上显示“press ESC key within 4 sec….”时,4秒钟内按下ESC键 \r\n3. 会显示一个菜单,选择Command Prompt shell \r\n4. 输入命令:mount -o remount,rw,noatime / \r\n5. 输入命令:mount /dev/hda2 /mnt \r\n6. 输入命令: passwddefault 或 passwd admin(仅重置admin用户密码) \r\n7. reboot -f \r\n\r\n*** 如果第5步失败,则解决方法: \r\nPrintenv \r\n找到“OSRootPartition” 参数, 然后mount第二个partition (通常是 hda2) \r\n\r\n\r\n200E上有人这么做过\r\n\r\n==========================================================\r\nYour service request has been assigned case number RQST00000033003.\r\n\r\nIf the Silkworm 12000 is using FOS v4.1.x or above then please follows the instructions below to recover the passwords.   Please let me know if the 12000 is running FOS v4.0.x release.\r\n\r\n\r\nRecovering the Root Password on Fabric OS v4.1\r\nIf the Boot PROM password is still known, you can use the following procedure to recover the Root\r\npassword on a SilkWorm 3900 or SilkWorm 12000.\r\nNote: This procedure requires accessing the boot prompt, which stops traffic flow through a SilkWorm\r\n3900 until the switch is rebooted. On a SilkWorm 12000, you can recover the Root password without\r\ndisruption to I/O by performing the procedure on the standby CP card.\r\nTo recover the Root password:\r\n1. Connect to the serial port interface of the switch (SW3900)/Standby CP(SW12000)\r\n2. Reboot the switch (SW3900)/Standby CP (SW12000) and press ESC within four seconds after the\r\nmessage \"Press escape within 4 seconds...\" displays. \"Enter Boot PROM interface:\"\r\n3. Enter the Boot PROM password.\r\n4. Enter \"3\" at the prompt to enter the command shell.\r\n5. Enter the printenv command and save the output.\r\n6. Enter the boot command followed by the first memory address after the string OSLoader= obtained\r\nfrom the printenv output and -s\r\nboot <memory address> -s\r\nThe system is coming up, please wait...\r\nChecking system RAM - press any key to stop test\r\nChecking memory address: 01300000\r\nSystem RAM check terminated by keyboard\r\nSystem RAM check complete\r\nPress escape within 4 seconds to enter boot interface.\r\n1) Start system.\r\n2) Recover password.\r\n3) Enter command shell.\r\nOption? 3\r\nPassword:\r\n> printenv\r\nAutoLoad=yes\r\nENET_MAC=006069602BD6\r\nInitTest=MEM()\r\nLoadIdentifiers=IDE w/ XFS;IDE w/ XFS & NFS Root\r\nOSLoader=MEM()0xF0000000;MEM()0xF0800000\r\nOSRootPartition=hda1;hda2\r\nSkipWatchdog=yes\r\n> boot MEM()0xF0000000 -s\r\n.\r\nSteps 7 through 11 are for a SW3900 only, skip to step 12 for SW12000.\r\n7. Enter the following string at the prompt:\r\nmount -o remount,rw,noatime /\r\n8. Enter the following string at the prompt:\r\nmount /dev/hda2 /mnt\r\n9. Enter the passwddefault command with the full path, as follows:\r\n/sbin/passwddefault\r\nThis resets the User, Admin, Factory, and Root passwords to the default values\r\n10. Enter the reboot -f command if the switch is a SW3900.\r\nreboot -f\r\nTraffic flow resumes when the switch finishes rebooting.\r\n11. Log into the SW3900 switch by serial or telnet as Root and set new passwords for all accounts. The\r\nprocess is now complete for the SW3900.\r\n12. From the serial connection to the standby CP card, set the appropriate hostname to the CP. Use \"cp0\"\r\nfor slot 5, and \"cp1\" for slot 6.\r\nhostname cp0\r\n13. Start networking on the standby CP\r\n/etc/init.d/network start\r\n14. Perform one of the following according to which slot the CP card is in:\r\n? If the standby CP card is in slot 5 (CP0), enter \"rsh 10.0.0.6 /sbin/passwddefault\", press\r\nEnter.\r\n? If the standby CP card is in slot 6 (CP1), enter \"rsh 10.0.0.5 /sbin/passwddefault\", press\r\nEnter.\r\n15. Reboot the Standby CP with the command \"reboot -f\"\r\n16. Log into the active CP as admin from a telnet or serial connection, and enter Ctrl + C to bypass the\r\nrequest to modify passwords.\r\n17. Log into either logical switch by serial or telnet as admin and set new passwords for all accounts.\r\n\r\n=========================================================\r\n博科交换机密码重设工具\r\nwindows下的图形化界面的软件,用来重设博科交换机的管理员密码,只要输入博科交换机的IP地址,用户名和密码就可以了,不过版本上只支持 firmware为2.6.0d, 3.0.2g, 4.0.2b的这几个版本。这个软件是从网上找来的,还没有做过测试,哪位朋友用过之后麻烦给个测试结果。\r\n\r\n压缩密码为“www.brocader.cn”\r\n\r\n下载地址:博科交换机密码重设工具

论坛徽章:
0
4 [报告]
发表于 2009-08-07 13:58 |只看该作者
root/fibranne\r\n\r\n这个我试过,非常容易,进去再重设一下就可以了
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP