Solved

Unable to login to Nexus 1000v Switch after deployment

Posted on 2011-09-23
3
1,126 Views
Last Modified: 2012-08-14
Unable to login to newly deployed Nexus 1000v switch.  Password was written down during successful installation using OVF Template.  When trying to login using Console in vSphere I get an error message, "Login incorrect".  I am 100% sure, I have the right password that I supplied during the installation.  I am not sure what the username may be.  I have been trying to use the username, "admin".  Need assistance in logging into the switch.  Switch is not in production.
0
Comment
Question by:VFS-User
  • 2
3 Comments
 
LVL 6

Expert Comment

by:jgibbar
ID: 36587445
Here are the Cisco Instructions for password recovery for a 1000v:

http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/pw_recovery/n1000v_pwd_recover.html

As for why it is failing now, how is aaa setup on the switch? Can you post a scrubbed config?
0
 

Accepted Solution

by:
VFS-User earned 0 total points
ID: 36587547
I ended up deleting the VSM from disk and re-deploying.  I was able to login after the re-deployment.
0
 

Author Closing Comment

by:VFS-User
ID: 36715247
I ended up deleting the VSM from disk and re-deploying.  I was able to login after the re-deployment.  I tried the password recovery steps but did not work for me.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now