Cisco ASA 5520 密碼恢復
開機按ESC
rommon #0> confreg
Current Configuration Register: 0x00000001
Configuration Summary:
boot default p_w_picpath from Flash
Do you wish to change this configuration? y/n [n]: n
enable boot to ROMMON prompt? y/n [n]: y
select specific Flash p_w_picpath index? y/n [n]: n
disable system configuration? y/n [n]: y
go to ROMMON prompt if netboot fails? y/n [n]:
enable passing NVRAM file specs in auto-boot mode? y/n [n]:
disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:
Current Configuration Register: 0x00000040
Configuration Summary:
boot ROMMON
ignore system configuration
Update Config Register (0x40) in NVRAM...
rommon #1> confreg 0x41
Update Config Register (0x41) in NVRAM...
rommon #2> boot
Launching BootLoader...
Boot configuration file contains 1 entry.
Loading disk0:/asa803-k8.bin... Booting...
Loading...
Processor memory 417705984, Reserved memory: 41943040 (DSOs: 0 + kernel: 41943040)
Guest RAM start: 0xc7000080
Guest RAM end: 0xdd400000
Guest RAM brk: 0xc7001000
IO memory 79241216 bytes
IO memory start: 0xc2401000
IO memory end: 0xc6f93000
Total SSMs found: 0
Total NICs found: 7
mcwa i82557 Ethernet at irq 11 MAC: 001e.f737.0569
mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001
i82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 00 MAC: 001e.f737.056a
i82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 01 MAC: 001e.f737.056b
i82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 02 MAC: 001e.f737.056c
i82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 03 MAC: 001e.f737.056d
i82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited
Maximum VLANs : 150
Inside Hosts : Unlimited
Failover : Active/Active
×××-DES : Enabled
×××-3DES-AES : Enabled
Security Contexts : 2
GTP/GPRS : Disabled
××× Peers : 750
Web××× Peers : 2
AnyConnect for Mobile : Disabled
AnyConnect for Linksys phone : Disabled
Advanced Endpoint Assessment : Disabled
This platform has an ASA 5520 ××× Plus license.
Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)
Boot microcode : CN1000-MC-BOOT-2.00
SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.01
IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04
--------------------------------------------------------------------------
. .
| |
||| |||
.|| ||. .|| ||.
.:||| | |||:..:||| | |||:.
C i s c o S y s t e m s
--------------------------------------------------------------------------
Cisco Adaptive Security Appliance Software Version 8.0(3)
****************************** Warning *******************************
This product contains cryptographic features and is
subject to United States and local country laws
governing, import, export, transfer, and use.
Delivery of Cisco cryptographic products does not
imply third-party authority to import, export,
distribute, or use encryption. Importers, exporters,
distributors and users are responsible for compliance
with U.S. and local country laws. By using this
product you agree to comply with applicable laws and
regulations. If you are unable to comply with U.S.
and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic
products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by
sending email to export@cisco.com.
******************************* Warning *******************************
Copyright (c) 1996-2007 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Ignoring startup configuration as instructed by configuration register.
INFO: Converting to disk0:/
Type help or '?' for a list of available commands.
ciscoasa>
ciscoasa> en
Password:
ciscoasa# copy s
ciscoasa# copy star
ciscoasa# copy startup-config run
ciscoasa# copy startup-config running-config
Destination filename [running-config]?
.
Cryptochecksum (unchanged): d4f2d753 f96427a3 67a15e11 75266b9c
2562 bytes copied in 3.680 secs (854 bytes/sec)
ShanDong#
ShanDong# config t
ShanDong(config)# pass
ShanDong(config)# passwo
ShanDong(config)# passwor
ShanDong(config)# passwd
ShanDong(config)# passwd asa5520
ShanDong(config)# en
ShanDong(config)# enab
ShanDong(config)# enable pas
ShanDong(config)# enable password asa5520
ShanDong(config)# us
ShanDong(config)# userna
ShanDong(config)# username
ShanDong(config)# username
ShanDong(config)# username bowei pa
ShanDong(config)# username bowei password asa5520
ShanDong(config)#
ShanDong(config)#
ShanDong(config)# config-
ShanDong(config)# config-register 0x11
ShanDong(config)# copy
ShanDong(config)# copy run
ShanDong(config)# copy running-config st
ShanDong(config)# copy running-config startup-config
Source filename [running-config]?
Cryptochecksum: c3cfc9da f515c77d 0fcdbce3 bf164968
2613 bytes copied in 3.370 secs (871 bytes/sec)
ShanDong(config)#
ShanDong(config)#