Solved

Need to set Cisco PIX 506e to Factory Default without knowing any passwords.

Posted on 2007-03-18
3
5,947 Views
Last Modified: 2011-02-12
I have just been made responsible for our network security and have found that the previous person has not documented anything.  I need to reset a Cisco PIX 506e device to factory default, but I have no passwords and no information about its current config.  Once I have this unit configured I can then switch it out for an existing unit which I fear may be incorrectly configured.

Please can somebody help me desperately.
0
Comment
Question by:allenlillie32
3 Comments
 
LVL 29

Accepted Solution

by:
Alan Huseyin Kayahan earned 500 total points
Comment Utility
      First, you have to clear the password of your PIX. For this process, you should enter the monitor mode by pressing ESC during the boot of PIX. You should use CLI (Command line interface) during the process.
     You can reach the CLI with a rollover cable that one end with RJ45 to PIX's console port and the other end serial 9 pin female to your COM1. Then a hyperterminal connection on this, will allow you to see CLI.
      In this process, we will send PIX the password reset file which will run automatically and ask you to reset password or not. But we have to determine the suitable password file fot your PIX. First, you have to determine whic IOS your PIX is running. Then you should download the related password reset file.
     And you need a tftp server, which is a small program that has the capability to send/receive files to/from IOS devices.
    Link below tells the procedure. Skip the "PIX with a floppy"  and read the rest
    http://www.cisco.com/warp/public/110/34.shtml

After resetting the password, enter the privillaged console bye typing enable, then press enter for blanked password. Then type config terminal for entering config mode, then type config factory for PIX to load factory defaults. Type wr mem to write the changes to memory and reload for PIX to restart itself.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

When I upgraded my ASA 8.2 to 8.3, I realized that my nonat statement was failing!   The log showed the following error:     %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows It was caused by the config upgrade, because t…
I recently attended Cisco Live! in Las Vegas, a conference that boasted over 28,000 techies in attendance, and a week of hands-on learning hosted by a solid partner with which Concerto goes to market.  Every year, Cisco displays cutting-edge technol…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now