Solved

Password recovery, Command authorization failed.

Posted on 2004-08-19
3
1,226 Views
Last Modified: 2008-01-09
I got a 2610 router and trying to do a password recovery.  I recycle the router and do a CTRL-Break on it, then I do a confreg 0x2142
Next, I do ENABLE
Then, I do copy star run
From there, I'm at the Privleged Mode and should be able to do configure terminal, so I can clear out the enable password.  This is what happens.


CATHKMR01R1#conf t
Command authorization failed.

CATHKMR01R1#

Why is this?  Is there anyway besides clearing out the startup config to recovery the password?  I don't want to clear out my current config that's in there now.
0
Comment
Question by:Pentrix2
  • 2
3 Comments
 
LVL 50

Accepted Solution

by:
Don Johnston earned 500 total points
ID: 11840061
Looks like the startup config that you're copying to running config contains Tacacs configuration commands. Without the username/password setup on the Tacacs server, you won't be able to do much.

Either get a username/password, or don't load the startup-config.

-Don
0
 
LVL 9

Author Comment

by:Pentrix2
ID: 11840086
You're absolutely correct, it does have a TACACS server on it.  I'll just have to clear out the startup config then.  Thanks donjohnston!!
0
 
LVL 50

Expert Comment

by:Don Johnston
ID: 11846672
It just occured to me that there is a way to recover the configuration...

Once you've used the password recovery process to get into priviliged mode, get an ethernet interface configured. Setup a TFTP server off the ethernet interface and issue a "copy startup tftp". Once the file is on the TFTP server, open it and remove the TACACS commands, save it and then copy it back to NVRAM (copy tftp start).

-Don
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

We've been using the Cisco/Linksys RV042 for years as: - an internet Gateway - a site-to-site VPN device - a leased line site-to-site subnet-to-subnet interface (And, here I'm assuming that any RV0xx behaves the same way as an RV042.  So that's …
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now