Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Password Recovery

Posted on 2008-06-17
2
Medium Priority
?
1,807 Views
Last Modified: 2008-06-17
I recently aquired a 4506 with all the module. When I powered it up it went through all the boot up sequences and passed and then prompted me for a username and password. Since I didn't know what these were I decided to reset the passwords in order to get in.
When I go through the password recovery procedure per cisco document #21229 I get as far as issuing the "show running-config" command and I get a "authorization failed" error from that point forward.

Switch>enable
Switch#configure memory

Uncompressed configuration from 7582 bytes to 37341 bytes
505CPW-AMC-7-ASW1#show running-config
% Authorization failed.

505CPW-AMC-7-ASW1#write terminal
% Authorization failed.
0
Comment
Question by:dtadmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Expert Comment

by:Melaleuca
ID: 21807327
I looks like they had AAA setup, and aaa authorization commands enabled. so i would say don't load the config from start to run and just start a new. unless you need the config then tftp the config over to a tftp server.
0
 
LVL 5

Accepted Solution

by:
rslqld earned 2000 total points
ID: 21807509
Console in and hit 'pause/break' key during boot.
When you get the 'romon' prompt type 'confreg 0x2142' then power cycle the router. This will cause it to ignore startup configuration.
Once you're in you can do a 'sh start' which will give you the existing config. Take from it what you need and start from scratch.

NOTE: Before you try to save any configuration, in configure terminal mode run 'configuration-register 0x2102' otherwise nothing will take hold.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are two basic ways to configure a static route for Cisco IOS devices. I've written this article to highlight a case study comparing the configuration of a static route using the next-hop IP and the configuration of a static route using an outg…
WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question