Password Recovery Procedure for the Cisco 806, 826, 827, 828, 831, 836, 837 and 881 Series Routers



Similar documents
Password Recovery Procedure for the Cisco 3600 and 3800 Series Routers

Password Recovery Procedure for the Cisco Catalyst 2948G L3, 4840G, and 4908G L3 Switch Routers

Password Recovery Procedure for the Cisco 2900 Series Integrated Services Router

The Purpose and Use of the Configuration Register on All Cisco Routers

3.1 Connecting to a Router and Basic Configuration

Xmodem Console Download Procedure Using ROMmon

Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.

Loading IOS Image with Xmodem when TFTP is unavailable

Lab 8.4.3b Managing Cisco IOS images with ROMMON and TFTP

Lab Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips

Lab 5.3.9b Managing Router Configuration Files Using TFTP

ROM Monitor. Entering the ROM Monitor APPENDIX

Applicazioni Telematiche

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Objectives. Router as a Computer. Router components and their functions. Router components and their functions

Lab 8.4.3a Managing Cisco IOS Images with TFTP

Table of Contents. Cisco How to Download a Software Image to a Cisco 2600 through TFTP Using the tftpdnld ROMmon Command

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

- Advanced IOS Functions -

Table of Contents. Cisco How to Download a Software Image to a Cisco 2600 via TFTP Using the tftpdnld ROMmon Command

Configuring the Switch with the CLI-Based Setup Program

Basic Configuration of the Cisco Series Internet Router

LAB MANUAL for Computer Network

Basic Router and Switch Instructions (Cisco Devices)

Cisco Router Configuration Basics. Scalable Infrastructure Workshop

Lab Creating a Network Map using CDP Instructor Version 2500

USB Disable for Cisco ISRs Feature Module

Password Recovery Procedure for the Cisco Catalyst Fixed Configuration Layer 2 and Layer 3 Switches

CT5760 Controller and Catalyst 3850 Switch Configuration Example

Lab Advanced Telnet Operations

Digitally Signed Cisco Software

Configuring a Router


Configuring the Switch with the CLI Setup Program

Upgrade de IOS de Router Cisco 1005 a c1005-bny-mz bin

Angelos Stavrou. OF COURSE there is no Magic so lets see show things work in practice...

BRI to PRI Connection Using Data Over Voice

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Using Cisco IOS Software

Lab Introductory Lab 1 - Getting Started and Building Start.txt

Lab 3 Routing Information Protocol (RIPv1) on a Cisco Router Network

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Recover a Router from Corrupted or Missing Software Image

Lab 2 - Basic Router Configuration

Lab Introductory Lab 1 Getting Started and Building Start.txt

Configuring a Cisco 2509-RJ Terminal Router

Lab Load Balancing Across Multiple Paths

Lab: Basic Router Configuration

Lab - Using IOS CLI with Switch MAC Address Tables

HOW TO CONFIGURE CISCO FIREWALL PART I

Configuring a Gateway of Last Resort Using IP Commands

Cisco Configuration Professional Quick Start Guide

Lab Managing the MAC Address Table

Lab Configuring PAT with SDM and Static NAT using Cisco IOS Commands

Lab 8.3.3b Configuring a Remote Router Using SSH

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

Lab Configuring DHCP with SDM and the Cisco IOS CLI

Cisco - Standard Break Key Sequence Combinations During Password Recovery

Lab Configuring OSPF with Loopback Addresses

Basic Software Configuration Using the Cisco IOS Command-Line Interface

PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example

Managing vlan.dat in Cisco Catalyst Switches Running Cisco IOS Software

Router Lab Reference Guide

Skills Assessment Student Training Exam

Introduction to Routing and Packet Forwarding. Routing Protocols and Concepts Chapter 1

Configuring Static and Dynamic NAT Simultaneously

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

Backup and Recovery Procedures

CCNA Exploration Routing Protocols and Concepts Student Lab Manual

CCNA 2 Chapter 5. Managing Cisco IOS Software

Lab Configuring Basic Router Settings with the Cisco IOS CLI

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

LAB Configuring NAT. Objective. Background/Preparation

This techno knowledge paper can help you if: You need to setup a WAN connection between a Patton Router and a NetGuardian.

Connecting to the Firewall Services Module and Managing the Configuration

ICND1 Lab Guide Interconnecting Cisco Networking Devices Part 1 Version: Beta. Labs powered by

Administering the Network Analysis Module. Cisco IOS Software. Logging In to the NAM with Cisco IOS Software CHAPTER

Configuring a Leased Line

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

How to Configure Cisco 2600 Routers

Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Basic Router Configuration Using Cisco Configuration Professional

Installing and Configuring External Flash Memory Cards in Cisco 3600 Series Routers

Course "Netzwerke" LAB 2 Basic Router Configuration

Configuring the Cisco Secure PIX Firewall with a Single Intern

Connecting the DG-102S VoIP Gateway to your network

Sample Configuration Using the ip nat outside source static

How To Install Cisco Asr 9000 Series Router Software On A Mini Mini Mini (Cisco Ios) Router

Cisco 1700 Router Overview

Cisco Router Configuration Tutorial

Lab Configuring the Cisco 2960 Switch

How To Configure InterVLAN Routing on Layer 3 Switches

Table of Contents. Cisco DSL Router Configuration and Troubleshooting Guide

Transferring Files Using HTTP or HTTPS

Consolidated Packages and SubPackages Management

Remote Annex. Quick Start for Windows. Read before installing and using Remote Annex Software Release 4.2

Troubleshooting PIX Device Manager

Transcription:

Password Recovery Procedure for the Cisco 806, 826, 827, 828, 831, 836, 837 and 881 Series Routers Document ID: 12065 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Step by Step Procedure Example of Password Recovery Procedure Related Information Introduction This document describes how to recover the enable password and the enable secret passwords. These passwords protect access to privileged EXEC and configuration modes. The enable password password can be recovered, but the enable secret password is encrypted and must be replaced with a new password. Use the procedure described in this document in order to replace the enable secret password. Note: Refer to Password Recovery Procedure for the Cisco 801, 802, 803, 804, 805, 811, and 813 Series Routers in order to recover a password on the Cisco 801, 802, 803, 804, 805, 811, and 813 Series Routers. Prerequisites Requirements There are no specific requirements for this document. Components Used The information in this document is based on these hardware versions: Cisco 806 Series Router Cisco 826 Series Router Cisco 827 Series Router Cisco 828 Series Router Cisco 831 Series Router Cisco 836 Series Router Cisco 837 Series Router Cisco 881 Series Router The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Related Products Refer to Password Recovery Procedures for information on how to recover passwords for related products. Conventions Refer to Cisco Technical Tips Conventions for information on document conventions. Step by Step Procedure Follow these steps in order to recover your password: 1. Attach a terminal or PC with terminal emulation to the console port of the router. Use these terminal settings: 9600 baud rate No parity 8 data bits 1 stop bit No flow control Refer to these documents for information on how to cable and connect a terminal to the console port or the AUX port: Cabling Guide for Console and AUX Ports Connecting a Terminal to the Console Port on Catalyst Switches Connect a Terminal to Catalyst 2948G L3, 4908G L3, and 4840G Series Switches 2. If you can access the router, type show version at the prompt, and record the configuration register setting. See Example of Password Recovery Procedure in order to view the output of a show version command Note: The configuration register is usually set to 0x2102 or 0x102. If you can no longer access the router (because of a lost login or TACACS password), you can safely assume that your configuration register is set to 0x2102. 3. Use the power switch in order to turn off the router, and then turn the router back on. Important Notes: In order to simulate this step on a Cisco 6400, pull out and then plug in the Node Route Processor (NRP) or Node Switch Processor (NSP) card. In order to simulate this step on a Cisco 6x00 with NI 2, pull out and then plug in the NI 2 card. 4. Press Break on the terminal keyboard within 60 seconds of power up in order to put the router into ROMMON. If the break sequence does not work, refer to Standard Break Key Sequence Combinations During Password Recovery for other key combinations. 5. Type confreg 0x2142 at the rommon 1> prompt in order to boot from Flash. This step bypasses the startup configuration where the passwords are stored. 6. Type reset at the rommon 2> prompt. The router reboots, but ignores the saved configuration.

7. Type no after each setup question, or press Ctrl C in order to skip the initial setup procedure. 8. Type enable at the Router> prompt. You are in enable mode and should see the Router# prompt. 9. Type configure memory or copy startup config running config in order to copy the nonvolatile RAM (NVRAM) into memory. Important: Do not type copy running config startup config or write. These commands erase your startup configuration. 10. Type show running config. The show running config command shows the configuration of the router. In this configuration, the shutdown command appears under all interfaces, which indicates all interfaces are currently shut down. In addition, the passwords (enable password, enable secret, vty, console passwords) are in either an encrypted or unencrypted format. You can reuse unencrypted passwords. You must change encrypted passwords to a new password. 11. Type configure terminal. The hostname(config)# prompt appears. 12. Type enable secret <password> in order to change the enable secret password. For example: hostname(config)#enable secret cisco 13. Issue the no shutdown command on every interface that you use. If you issue a show ip interface brief command, every interface that you want to use should display up up. 14. Type config register <configuration_register_setting>. Where configuration_register_setting is either the value you recorded in step 2 or 0x2102. For example: hostname(config)#config register 0x2102 15. Press Ctrl z or end in order to leave the configuration mode. The hostname# prompt appears. 16. Type write memory or copy running config startup config in order to commit the changes. Example of Password Recovery Procedure This section provides an example of the password recovery procedure. This example was created with a Cisco 2600 Series Router. Even if you do not use a Cisco 2600 Series Router, this output provides an example of what you should experience on your product. Router>enable Password: Password: Password: % Bad secrets Router>show version Image text base: 0x80008088, data base: 0x80C524F8 ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1)

Router uptime is 3 minutes System returned to ROM by abort at PC 0x802D0B60 System image file is "flash:c2600 is mz.120 7.T" cisco 2611 (MPC860) processor (revision 0x202) with 26624K/6144K bytes of memory. Processor board ID JAB031202NK (3878188963) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Basic Rate ISDN software, Version 1.1. 2 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 1 ISDN Basic Rate interface(s) 32K bytes of non volatile configuration memory. 8192K bytes of processor board System flash partition 1 (Read/Write) 8192K bytes of processor board System flash partition 2 (Read/Write) Configuration register is 0x2102 Router>! The router was just powercycled, and during bootup a! break sequence was sent to the router.! *** System received an abort due to Break Key *** signal= 0x3, code= 0x500, context= 0x813ac158 PC = 0x802d0b60, Vector = 0x500, SP = 0x80006030 rommon 1 > confreg 0x2142 You must reset or power cycle for new config to take effect rommon 2 > reset System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) Copyright (c) 1999 by cisco Systems, Inc. TAC:Home:SW:IOS:Specials for info C2600 platform with 32768 Kbytes of main memory program load complete, entry point: 0x80008000, size: 0x6fdb4c Self decompressing the image : ############################### ############################################################## ############################################################## ############################################################## ############################### [OK] Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software Restricted Rights clause at FAR sec. 52.227 19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227 7013. cisco Systems, Inc. 170 West Tasman Drive

San Jose, California 95134 1706 Image text base: 0x80008088, data base: 0x80C524F8 cisco 2611 (MPC860) processor (revision 0x202) with 26624K/6144K bytes of memory. Processor board ID JAB031202NK (3878188963) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Basic Rate ISDN software, Version 1.1. 2 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 1 ISDN Basic Rate interface(s) 32K bytes of non volatile configuration memory. 8192K bytes of processor board System flash partition 1 (Read/Write) 8192K bytes of processor board System flash partition 2 (Read/Write) System Configuration Dialog Would you like to enter the initial configuration dialog? [yes/no]: n Press RETURN to get started! 00:00:19: %LINK 3 UPDOWN: Interface BRI0/0, changed state to up 00:00:19: %LINK 3 UPDOWN: Interface Ethernet0/0, changed state to up 00:00:19: %LINK 3 UPDOWN: Interface Ethernet0/1, changed state to up 00:00:19: %LINK 3 UPDOWN: Interface Serial0/0, 00:00:19: %LINK 3 UPDOWN: Interface Serial0/1, 00:00:20: %LINEPROTO 5 UPDOWN: Line protocol on Interface BRI0/0, 00:00:20: %LINEPROTO 5 UPDOWN: Line protocol on Interface Ethernet0/0, changed state to up Router> 00:00:20: %LINEPROTO 5 UPDOWN: Line protocol on Interface Ethernet0/1, changed state to up 00:00:20: %LINEPROTO 5 UPDOWN: Line protocol on Interface Serial0/0, 00:00:20: %LINEPROTO 5 UPDOWN: Line protocol on Interface Serial0/1, 00:00:50: %SYS 5 RESTART: System restarted 00:00:50: %LINK 5 CHANGED: Interface BRI0/0, 00:00:52: %LINK 5 CHANGED: Interface Ethernet0/0, 00:00:52: %LINK 5 CHANGED: Interface Serial0/0, 00:00:52: %LINK 5 CHANGED: Interface Ethernet0/1, 00:00:52: %LINK 5 CHANGED: Interface Serial0/1, 00:00:53: %LINEPROTO 5 UPDOWN: Line protocol on Interface Ethernet0/0, 00:00:53: %LINEPROTO 5 UPDOWN: Line protocol on Interface Ethernet0/1, Router> Router>enable Router#copy startup config running config

Destination filename [running config]? 1324 bytes copied in 2.35 secs (662 bytes/sec) Router# 00:01:24: %LINEPROTO 5 UPDOWN: Line protocol on Interface BRI0/0:1, 00:01:24: %LINEPROTO 5 UPDOWN: Line protocol on Interface BRI0/0:2, Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#enable secret < password > Router(config)#^Z 00:01:54: %SYS 5 CONFIG_I: Configured from console by console Router#show ip interface brief Interface IP Address OK? Method Status Protocol Ethernet0/0 10.200.40.37 YES TFTP administratively down down Serial0/0 unassigned YES TFTP administratively down down BRI0/0 193.251.121.157 YES unset administratively down down BRI0/0:1 unassigned YES unset administratively down down BRI0/0:2 unassigned YES unset administratively down down Ethernet0/1 unassigned YES TFTP administratively down down Serial0/1 unassigned YES TFTP administratively down down Loopback0 193.251.121.157 YES TFTP up up Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#interface Ethernet0/0 Router(config if)#no shutdown Router(config if)# 00:02:14: %LINK 3 UPDOWN: Interface Ethernet0/0, changed state to up 00:02:15: %LINEPROTO 5 UPDOWN: Line protocol on Interface Ethernet0/0, changed state to up Router(config if)#interface BRI0/0 Router(config if)#no shutdown Router(config if)# 00:02:26: %LINK 3 UPDOWN: Interface BRI0/0:1, 00:02:26: %LINK 3 UPDOWN: Interface BRI0/0:2, 00:02:26: %LINK 3 UPDOWN: Interface BRI0/0, changed state to up 00:02:115964116991: %ISDN 6 LAYER2UP: Layer 2 for Interface BR0/0, TEI 68 changed to up Router(config if)#^z Router# 00:02:35: %SYS 5 CONFIG_I: Configured from console by console Router#copy running config startup config Destination filename [startup config]? Building configuration... [OK] Router#show version Image text base: 0x80008088, data base: 0x80C524F8 ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) Router uptime is 3 minutes System returned to ROM by abort at PC 0x802D0B60 System image file is "flash:c2600 is mz.120 7.T" cisco 2611 (MPC860) processor (revision 0x202) with 26624K/6144K bytes of memory. Processor board ID JAB031202NK (3878188963) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Basic Rate ISDN software, Version 1.1.

2 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 1 ISDN Basic Rate interface(s) 32K bytes of non volatile configuration memory. 8192K bytes of processor board System flash partition 1 (Read/Write) 8192K bytes of processor board System flash partition 2 (Read/Write) Configuration register is 0x2142 Router#configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#config register 0x2102 Router(config)#^Z 00:03:20: %SYS 5 CONFIG_I: Configured from console by console Router#show version Image text base: 0x80008088, data base: 0x80C524F8 ROM: System Bootstrap, Version 11.3(2)XA4, RELEASE SOFTWARE (fc1) Router uptime is 3 minutes System returned to ROM by abort at PC 0x802D0B60 System image file is "flash:c2600 is mz.120 7.T" cisco 2611 (MPC860) processor (revision 0x202) with 26624K/6144K bytes of memory. Processor board ID JAB031202NK (3878188963) M860 processor: part number 0, mask 49 Bridging software. X.25 software, Version 3.0.0. Basic Rate ISDN software, Version 1.1. 2 Ethernet/IEEE 802.3 interface(s) 2 Serial(sync/async) network interface(s) 1 ISDN Basic Rate interface(s) 32K bytes of non volatile configuration memory. 8192K bytes of processor board System flash partition 1 (Read/Write) 8192K bytes of processor board System flash partition 2 (Read/Write) Configuration register is 0x2142 (will be 0x2102 at next reload) Router# Related Information Password Recovery Procedures Cabling Guide for Console and AUX Ports Connecting a Terminal to the Console Port on Catalyst Switches Connect a Terminal to Catalyst 2948G L3, 4908G L3, and 4840G Series Switches Password Recovery Procedure for the Cisco 800 Series Routers Standard Break Key Sequence Combinations During Password Recovery Technical Support Cisco Systems Contacts & Feedback Help Site Map 2012 2013 Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc.

Updated: Jan 04, 2007 Document ID: 12065