Solved

Nortel Tasman SR 1002 reset

Posted on 2013-01-23
6
1,295 Views
Last Modified: 2013-01-25
Greetings!
We have two Nortal (Tasman) SR 1002 routers, and no access to the logins due to 'employment changes' at our company.  I am looking for direction as to resetting the two units to a factory reset.  Can I use the AUX port in the rear and terminal into the units?  At this point, we just need to get these reset so we can change the settings as we do not have the logins.

Thanks1
0
Comment
Question by:tyrrellica
  • 3
  • 2
6 Comments
 
LVL 21

Assisted Solution

by:Rick_O_Shay
Rick_O_Shay earned 250 total points
ID: 38815084
It has been a while since I have been near Nortel routers but I don't think there is a reset to default button.

I also don't remember if you can remove the flash card from those, but if you can, if you delete the system.cfg file from the flash card, then at the next boot it will be back to factory defaults.

If you can get that far the default username and password are:
Username: admin
Password: setup
0
 
LVL 62

Accepted Solution

by:
☠ MASQ ☠ earned 250 total points
ID: 38815400
There are four ways to restore factory default configuration settings. Remember to reboot the router after performing any of the following procedures.
• Clear the contents of the system.cfg file
clear cfg_file system.cfg
• Delete the system.cfg file
rm system.cfg
• Rename and remove the system.cfg file
copy system.cfg system.bk
• Restore factory defaults
system reset-to-factory

After performing any of the above options, the system.cfg file no longer exists. Subsequently, a "file not found" error message is displayed upon rebooting the Secure Router. This message will not impact operation, and it should be ignored.

http://downloads.avaya.com/css/P8/documents/100121838

Alternatively if you have a console connection setup restart the router and send "Enter" as it boots - that should get you into the config OS, type "?" for a list of commands although I think "X" followed by Enter should prompt you to confirm a reset.


Edit: As Rick_O_Shay previously posted here (!) :)
0
 
LVL 21

Expert Comment

by:Rick_O_Shay
ID: 38815456
Thanks MASQUERAID, looks like your memory is better than mine.
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 

Author Closing Comment

by:tyrrellica
ID: 38819932
Thanks guys!  Is it just a typical console cable do you recall?
0
 
LVL 21

Expert Comment

by:Rick_O_Shay
ID: 38820023
The manual shows it as a straight through db-9 to db-9

Avaya-to-Terminal Console Cable (DB-9)
Avaya      Signal                   Direction Workstation
DCE                                                       DTE
Pin                                                       Pin
1       data carrier detect                <—             1
2       transmit data                      —>             2
3       receive data                      <—             3
4       data terminal ready       —>             4
5       signal ground                    <—>             5
6       data set ready                     <—             6
7       request to send               —>             7
8       clear to send                     <—             8
9       not used                                         9
0
 

Author Comment

by:tyrrellica
ID: 38820307
Cool, thanks Rick!
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now