zoukankan      html  css  js  c++  java
  • ASA5510 Password recovery

    2012-04-09 07:55 ASA5510恢复密码在网上找到这段

    Step 1  Connect to the security appliance console port according to the

    Step 2  Power off the security appliance, and then power it on.
    Step 3  During the startup messages, press the Escape key when prompted to enter ROMMON.
    Step 4  To set the security appliance to ignore the startup configuration at reload, enter the following command:
         rommon #1> confreg
         The security appliance displays the current configuration register value, and asks if       you want to change the value:
         Current Configuration Register: 0x00000011
         Configuration Summary:
         boot TFTP image, boot default image from Flash on netboot failure
         Do you wish to change this configuration? y/n [n]:
    Step 5  Record your current configuration register value, so you can restore it later.
    Step 6  At the prompt, enter Y to change the value.
         The security appliance prompts you for new values.
    Step 7  Accept the default values for all settings, except for the “disable system      configuration?” value; at that prompt, enter Y.
    Step 8  Reload the security appliance by entering the following command:
         rommon #2> boot
         The security appliance loads a default configuration instead of the startup     configuration.
    Step 9  Enter privileged EXEC mode by entering the following command:
         hostname> enable
    Step 10  When prompted for the password, press Return.
         The password is blank.
    Step 11  Load the startup configuration by entering the following command:
         hostname# copy startup-config running-config
    Step 12  Enter global configuration mode by entering the following command:
         hostname# configure terminal
    Step 13  Change the passwords in the configuration by entering the following commands, as      necessary:
         hostname(config)# password password
         hostname(config)# enable password password
         hostname(config)# username name password password
    Step 14  Change the configuration register to load the startup configuration at the next reload      by entering the following command:
         hostname(config)# config-register value
         Where value is the configuration register value you noted in Step 5. 0x1 is the default      configuration register. For more information about the configuration register, see the      Cisco Security Appliance Command Reference.
    Step 15  Save the new passwords to the startup configuration by entering the following command:
          hostname(config)# copy running-config startup-config

    我的具体做法如下:

    Booting system, please wait…

    ########此时按ESC键

    CISCO SYSTEMS

    Embedded BIOS Version 1.0(11)5 08/28/08 15:11:51.82

    Low Memory: 631 KB

    High Memory: 1024 MB

    PCI Device Table.

    Bus Dev Func VendID DevID Class Irq

    00 00 00 8086 2578 Host Bridge

    00 01 00 8086 2579 PCI-to-PCI Bridge

    00 03 00 8086 257B PCI-to-PCI Bridge

    00 1C 00 8086 25AE PCI-to-PCI Bridge

    00 1D 00 8086 25A9 Serial Bus 11

    00 1D 01 8086 25AA Serial Bus 10

    00 1D 04 8086 25AB System

    00 1D 05 8086 25AC IRQ Controller

    00 1D 07 8086 25AD Serial Bus 9

    00 1E 00 8086 244E PCI-to-PCI Bridge

    00 1F 00 8086 25A1 ISA Bridge

    00 1F 02 8086 25A3 IDE Controller 11

    00 1F 03 8086 25A4 Serial Bus 5

    00 1F 05 8086 25A6 Audio 5

    02 01 00 8086 1075 Ethernet 11

    03 01 00 177D 0003 Encrypt/Decrypt 9

    03 02 00 8086 1079 Ethernet 9

    03 02 01 8086 1079 Ethernet 9

    03 03 00 8086 1079 Ethernet 9

    03 03 01 8086 1079 Ethernet 9

    04 02 00 8086 1209 Ethernet 11

    04 03 00 8086 1209 Ethernet 5

    Evaluating BIOS Options …

    Invalid Key: 001B

    Launch BIOS Extension to setup ROMMON

    Cisco Systems ROMMON Version (1.0(11)5) #0: Thu Aug 28 15:23:50 PDT 2008

    Platform ASA5510

    Management0/0

    Ethernet auto negotiation timed out.

    Interface-4 Link Not Established (check cable).

    Default Interface number-4 Not Up

    Use ? for help.

    rommon #0> confreg

    Current Configuration Register: 0x00002000

    Configuration Summary:

    boot ROMMON

    load ROMMON if netboot fails

    Do you wish to change this configuration? y/n [n]:y

    enable boot to ROMMON prompt? y/n [n]:y

    select specific Flash image index? y/n [n]: y

    enter Flash image index [1->7]: 1 #此处我没有弄懂什么意思

    disable system configuration? y/n [n]: y

    go to ROMMON prompt if netboot fails? y/n [n]:y

    enable passing NVRAM file specs in auto-boot mode? y/n [n]:y

    disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:y

    Current Configuration Register: 0x00112042

    Configuration Summary:

    boot ROMMON, boot command will load index-1 image from Flash

    ignore system configuration

    load ROMMON if netboot fails

    pass NVRAM file specs in auto-bootloader mode

    display of BREAK or ESC key prompt during auto-boot disabled

    Update Config Register (0x112042) in NVRAM…

    rommon #1>boot

    Launching BootLoader…

    Default configuration file contains 1 entry.

    Boot mode is 1. Default entry is 1.

    Searching / for images to boot.

    Loading /asa842-k8.bin… Booting…

    Platform ASA5510

    Loading…

    IO memory blocks requested from bigphys 32bit: 13008

    dosfsck 2.11, 12 Mar 2005, FAT32, LFN

    Starting check/repair pass.

    Starting verification pass.

    /dev/hda1: 134 files, 6278/62462 clusters

    dosfsck(/dev/hda1) returned 0

    Processor memory 868220928, Reserved memory: 62914560

    Total SSMs found: 0

    Total NICs found: 7

    mcwa i82557 Ethernet at irq 11 MAC: 5475.d0d4.9506

    mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001

    i82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002

    i82546GB rev03 Ethernet @ irq09 dev 2 index 03 MAC: 5475.d0d4.9505

    i82546GB rev03 Ethernet @ irq09 dev 2 index 02 MAC: 5475.d0d4.9504

    i82546GB rev03 Ethernet @ irq09 dev 3 index 01 MAC: 5475.d0d4.9503

    i82546GB rev03 Ethernet @ irq09 dev 3 index 00 MAC: 5475.d0d4.9502

    Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)

                             Boot microcode        : CN1000-MC-BOOT-2.00 
    
                             SSL/IKE microcode     : CNLite-MC-SSLm-PLUS-2.03
    
                             IPSec microcode       : CNlite-MC-IPSECm-MAIN-2.06
    

    Verify the activation-key, it might take a while…

    Running Permanent Activation Key: 0xe30ae376 0x68468285 0x04808d74 0xac70ec70 0x070600aa

    Licensed features for this platform:

    Maximum Physical Interfaces : Unlimited perpetual

    Maximum VLANs : 50 perpetual

    Inside Hosts : Unlimited perpetual

    Failover : Disabled perpetual

    VPN-DES : Enabled perpetual

    VPN-3DES-AES : Enabled perpetual

    Security Contexts : 0 perpetual

    GTP/GPRS : Disabled perpetual

    AnyConnect Premium Peers : 2 perpetual

    AnyConnect Essentials : Disabled perpetual

    Other VPN Peers : 250 perpetual

    Total VPN Peers : 250 perpetual

    Shared License : Disabled perpetual

    AnyConnect for Mobile : Disabled perpetual

    AnyConnect for Cisco VPN Phone : Disabled perpetual

    Advanced Endpoint Assessment : Disabled perpetual

    UC Phone Proxy Sessions : 2 perpetual

    Total UC Proxy Sessions : 2 perpetual

    Botnet Traffic Filter : Disabled perpetual

    Intercompany Media Engine : Disabled perpetual

    This platform has a Base license.

    Cisco Adaptive Security Appliance Software Version 8.4(2)

    ****************************** Warning *******************************

    This product contains cryptographic features and is

    subject to United States and local country laws

    governing, import, export, transfer, and use.

    Delivery of Cisco cryptographic products does not

    imply third-party authority to import, export,

    distribute, or use encryption. Importers, exporters,

    distributors and users are responsible for compliance

    with U.S. and local country laws. By using this

    product you agree to comply with applicable laws and

    regulations. If you are unable to comply with U.S.

    and local laws, return the enclosed items immediately.

    A summary of U.S. laws governing Cisco cryptographic

    products may be found at:

    http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

    If you require further assistance please contact us by

    sending email to export@cisco.com.

    ******************************* Warning *******************************

    Copyright © 1996-2011 by Cisco Systems, Inc.

                Restricted Rights Legend
    

    Use, duplication, or disclosure by the Government is

    subject to restrictions as set forth in subparagraph

    © of the Commercial Computer Software - Restricted

    Rights clause at FAR sec. 52.227-19 and subparagraph

    © (1) (ii) of the Rights in Technical Data and Computer

    Software clause at DFARS sec. 252.227-7013.

                Cisco Systems, Inc.
    
                170 West Tasman Drive
    
                San Jose, California 95134-1706
    

    Ignoring startup configuration as instructed by configuration register.

    INFO: MIGRATION - Saving the startup errors to file ‘flash:upgrade_startup_errors_201204081335.log’

    Type help or ‘?’ for a list of available commands.

    ciscoasa> en

    Password: #此处直接回车

    ciscoasa#

    ciscoasa#copy startup-config running-config

    Destination filename [running-config]?#直接回车 con

    %Error opening system:con (No such file or directory)

    ciscoasa# copy startup-config running-config

    Destination filename [running-config]? configure terminal

    %Error opening system:configure (No such file or directory)

    ciscoasa# copy startup-config running-config

    Destination filename [running-config]? y

    %Error opening system:y (No such file or directory)

    ciscoasa# copy ?

    /noconfirm Do not prompt for confirmation

    /pcap Raw packet capture dump

    capture: Copyout capture buffer

    disk0: Copy from disk0: file system

    disk1: Copy from disk1: file system

    flash: Copy from flash: file system

    ftp: Copy from ftp: file system

    http: Copy from http: file system

    https: Copy from https: file system

    running-config Copy from current system configuration

    smb: Copy from smb: file system

    startup-config Copy from startup configuration

    system: Copy from system: file system

    tftp: Copy from tftp: file system

    ciscoasa# copy str

    ciscoasa# copy sta

    ciscoasa# copy startup-config ru

    ciscoasa# copy startup-config running-config

    Destination filename [running-config]? ?

    Cryptochecksum (unchanged): 2e44c71d a824ed25 7a3273d9 e8a3e089

    5026 bytes copied in 0.270 secs

    ciscoasa# copy startup-config running-config

    Destination filename [running-config]?

    WARNING: found duplicate element

    WARNING: <101> found duplicate element

    …WARNING: Policy map global_policy is already configured as a service policy

    Cryptochecksum (unchanged): 2e44c71d a824ed25 7a3273d9 e8a3e089

    5026 bytes copied in 0.190 secs

    ciscoasa# con

    ciscoasa# configure te

    ciscoasa#configure terminal

    ciscoasa(config)# pas

    ciscoasa(config)# passw?

    configure mode commands/options:

    passwd password

    ciscoasa(config)# passwo

    ciscoasa(config)# password wxlccsu

    ciscoasa(config)# en

    ciscoasa(config)# ena

    ciscoasa(config)# enable pa

    ciscoasa(config)# enable password pa

    ciscoasa(config)#enable password wxlccsu

    ciscoasa(config)# con

    ciscoasa(config)# conf

    ciscoasa(config)# config-

    ciscoasa(config)# config-register

    ciscoasa(config)# config-register 0x01 #此处如果没有改的话就是0X01

    ciscoasa(config)# co

    ciscoasa(config)# cop

    ciscoasa(config)# copy ru

    ciscoasa(config)# copy running-config sta

    ciscoasa(config)# copy running-config startup-config

    Source filename [running-config]? ####此处直接回车

    Cryptochecksum: b06d7497 13c8a9ce f9c4a96e 6bfc157a

    5481 bytes copied in 3.290 secs (1827 bytes/sec)

    ciscoasa(config)# end

    ciscoasa# reboot

  • 相关阅读:
    spring cloud 专题二(spring cloud 入门搭建 之 微服务搭建和注册)
    spring cloud 专题一 (spring cloud 入门搭建 之 Eureka注册中心搭建)
    mysql存储过程查询结果循环遍历 判断 赋值 游标等基本操作
    Jquery datatable 动态隐藏列(根据有无值)
    spring boot无法启动,或者正常启动之后无法访问报404的解决办法
    通过js给网页加上水印背景
    jdk动态代理原理
    关于loadrunner使用web_add_header添加HTTP信息头(比如Content-Type,token等)和使用
    IP路由及静态路由配置
    安装ie时,报:此安装不支持您的操作系统的当前语言
  • 原文地址:https://www.cnblogs.com/cyrusxx/p/12562868.html
Copyright © 2011-2022 走看看