ASA5510 Password recovery

2012-04-09 07:55 ASA5510恢复密码在网上找到这段

Step 1  Connect to the security appliance console port according to the

Step 2  Power off the security appliance, and then power it on.
Step 3  During the startup messages, press the Escape key when prompted to enter ROMMON.
Step 4  To set the security appliance to ignore the startup configuration at reload, enter the following command:
     rommon #1> confreg
     The security appliance displays the current configuration register value, and asks if       you want to change the value:
     Current Configuration Register: 0x00000011
     Configuration Summary:
     boot TFTP image, boot default image from Flash on netboot failure
     Do you wish to change this configuration? y/n [n]:
Step 5  Record your current configuration register value, so you can restore it later.
Step 6  At the prompt, enter Y to change the value.
     The security appliance prompts you for new values.
Step 7  Accept the default values for all settings, except for the “disable system      configuration?” value; at that prompt, enter Y.
Step 8  Reload the security appliance by entering the following command:
     rommon #2> boot
     The security appliance loads a default configuration instead of the startup     configuration.
Step 9  Enter privileged EXEC mode by entering the following command:
     hostname> enable
Step 10  When prompted for the password, press Return.
     The password is blank.
Step 11  Load the startup configuration by entering the following command:
     hostname# copy startup-config running-config
Step 12  Enter global configuration mode by entering the following command:
     hostname# configure terminal
Step 13  Change the passwords in the configuration by entering the following commands, as      necessary:
     hostname(config)# password password
     hostname(config)# enable password password
     hostname(config)# username name password password
Step 14  Change the configuration register to load the startup configuration at the next reload      by entering the following command:
     hostname(config)# config-register value
     Where value is the configuration register value you noted in Step 5. 0x1 is the default      configuration register. For more information about the configuration register, see the      Cisco Security Appliance Command Reference.
Step 15  Save the new passwords to the startup configuration by entering the following command:
      hostname(config)# copy running-config startup-config

我的具体做法如下:

Booting system, please wait…

########此时按ESC键

CISCO SYSTEMS

Embedded BIOS Version 1.0(11)5 08/28/08 15:11:51.82

Low Memory: 631 KB

High Memory: 1024 MB

PCI Device Table.

Bus Dev Func VendID DevID Class Irq

00 00 00 8086 2578 Host Bridge

00 01 00 8086 2579 PCI-to-PCI Bridge

00 03 00 8086 257B PCI-to-PCI Bridge

00 1C 00 8086 25AE PCI-to-PCI Bridge

00 1D 00 8086 25A9 Serial Bus 11

00 1D 01 8086 25AA Serial Bus 10

00 1D 04 8086 25AB System

00 1D 05 8086 25AC IRQ Controller

00 1D 07 8086 25AD Serial Bus 9

00 1E 00 8086 244E PCI-to-PCI Bridge

00 1F 00 8086 25A1 ISA Bridge

00 1F 02 8086 25A3 IDE Controller 11

00 1F 03 8086 25A4 Serial Bus 5

00 1F 05 8086 25A6 Audio 5

02 01 00 8086 1075 Ethernet 11

03 01 00 177D 0003 Encrypt/Decrypt 9

03 02 00 8086 1079 Ethernet 9

03 02 01 8086 1079 Ethernet 9

03 03 00 8086 1079 Ethernet 9

03 03 01 8086 1079 Ethernet 9

04 02 00 8086 1209 Ethernet 11

04 03 00 8086 1209 Ethernet 5

Evaluating BIOS Options …

Invalid Key: 001B

Launch BIOS Extension to setup ROMMON

Cisco Systems ROMMON Version (1.0(11)5) #0: Thu Aug 28 15:23:50 PDT 2008

Platform ASA5510

Management0/0

Ethernet auto negotiation timed out.

Interface-4 Link Not Established (check cable).

Default Interface number-4 Not Up

Use ? for help.

rommon #0> confreg

Current Configuration Register: 0x00002000

Configuration Summary:

boot ROMMON

load ROMMON if netboot fails

Do you wish to change this configuration? y/n [n]:y

enable boot to ROMMON prompt? y/n [n]:y

select specific Flash image index? y/n [n]: y

enter Flash image index [1->7]: 1 #此处我没有弄懂什么意思

disable system configuration? y/n [n]: y

go to ROMMON prompt if netboot fails? y/n [n]:y

enable passing NVRAM file specs in auto-boot mode? y/n [n]:y

disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:y

Current Configuration Register: 0x00112042

Configuration Summary:

boot ROMMON, boot command will load index-1 image from Flash

ignore system configuration

load ROMMON if netboot fails

pass NVRAM file specs in auto-bootloader mode

display of BREAK or ESC key prompt during auto-boot disabled

Update Config Register (0x112042) in NVRAM…

rommon #1>boot

Launching BootLoader…

Default configuration file contains 1 entry.

Boot mode is 1. Default entry is 1.

Searching / for images to boot.

Loading /asa842-k8.bin… Booting…

Platform ASA5510

Loading…

IO memory blocks requested from bigphys 32bit: 13008

dosfsck 2.11, 12 Mar 2005, FAT32, LFN

Starting check/repair pass.

Starting verification pass.

/dev/hda1: 134 files, 6278/62462 clusters

dosfsck(/dev/hda1) returned 0

Processor memory 868220928, Reserved memory: 62914560

Total SSMs found: 0

Total NICs found: 7

mcwa i82557 Ethernet at irq 11 MAC: 5475.d0d4.9506

mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001

i82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002

i82546GB rev03 Ethernet @ irq09 dev 2 index 03 MAC: 5475.d0d4.9505

i82546GB rev03 Ethernet @ irq09 dev 2 index 02 MAC: 5475.d0d4.9504

i82546GB rev03 Ethernet @ irq09 dev 3 index 01 MAC: 5475.d0d4.9503

i82546GB rev03 Ethernet @ irq09 dev 3 index 00 MAC: 5475.d0d4.9502

Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)

                         Boot microcode        : CN1000-MC-BOOT-2.00 

                         SSL/IKE microcode     : CNLite-MC-SSLm-PLUS-2.03

                         IPSec microcode       : CNlite-MC-IPSECm-MAIN-2.06

Verify the activation-key, it might take a while…

Running Permanent Activation Key: 0xe30ae376 0x68468285 0x04808d74 0xac70ec70 0x070600aa

Licensed features for this platform:

Maximum Physical Interfaces : Unlimited perpetual

Maximum VLANs : 50 perpetual

Inside Hosts : Unlimited perpetual

Failover : Disabled perpetual

VPN-DES : Enabled perpetual

VPN-3DES-AES : Enabled perpetual

Security Contexts : 0 perpetual

GTP/GPRS : Disabled perpetual

AnyConnect Premium Peers : 2 perpetual

AnyConnect Essentials : Disabled perpetual

Other VPN Peers : 250 perpetual

Total VPN Peers : 250 perpetual

Shared License : Disabled perpetual

AnyConnect for Mobile : Disabled perpetual

AnyConnect for Cisco VPN Phone : Disabled perpetual

Advanced Endpoint Assessment : Disabled perpetual

UC Phone Proxy Sessions : 2 perpetual

Total UC Proxy Sessions : 2 perpetual

Botnet Traffic Filter : Disabled perpetual

Intercompany Media Engine : Disabled perpetual

This platform has a Base license.

Cisco Adaptive Security Appliance Software Version 8.4(2)

****************************** Warning *******************************

This product contains cryptographic features and is

subject to United States and local country laws

governing, import, export, transfer, and use.

Delivery of Cisco cryptographic products does not

imply third-party authority to import, export,

distribute, or use encryption. Importers, exporters,

distributors and users are responsible for compliance

with U.S. and local country laws. By using this

product you agree to comply with applicable laws and

regulations. If you are unable to comply with U.S.

and local laws, return the enclosed items immediately.

A summary of U.S. laws governing Cisco cryptographic

products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by

sending email to export@cisco.com.

******************************* Warning *******************************

Copyright © 1996-2011 by Cisco Systems, Inc.

            Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

© of the Commercial Computer Software - Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

© (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

            Cisco Systems, Inc.

            170 West Tasman Drive

            San Jose, California 95134-1706

Ignoring startup configuration as instructed by configuration register.

INFO: MIGRATION - Saving the startup errors to file ‘flash:upgrade_startup_errors_201204081335.log’

Type help or ‘?’ for a list of available commands.

ciscoasa> en

Password: #此处直接回车

ciscoasa#

ciscoasa#copy startup-config running-config

Destination filename [running-config]?#直接回车 con

%Error opening system:con (No such file or directory)

ciscoasa# copy startup-config running-config

Destination filename [running-config]? configure terminal

%Error opening system:configure (No such file or directory)

ciscoasa# copy startup-config running-config

Destination filename [running-config]? y

%Error opening system:y (No such file or directory)

ciscoasa# copy ?

/noconfirm Do not prompt for confirmation

/pcap Raw packet capture dump

capture: Copyout capture buffer

disk0: Copy from disk0: file system

disk1: Copy from disk1: file system

flash: Copy from flash: file system

ftp: Copy from ftp: file system

http: Copy from http: file system

https: Copy from https: file system

running-config Copy from current system configuration

smb: Copy from smb: file system

startup-config Copy from startup configuration

system: Copy from system: file system

tftp: Copy from tftp: file system

ciscoasa# copy str

ciscoasa# copy sta

ciscoasa# copy startup-config ru

ciscoasa# copy startup-config running-config

Destination filename [running-config]? ?

Cryptochecksum (unchanged): 2e44c71d a824ed25 7a3273d9 e8a3e089

5026 bytes copied in 0.270 secs

ciscoasa# copy startup-config running-config

Destination filename [running-config]?

WARNING: found duplicate element

WARNING: <101> found duplicate element

…WARNING: Policy map global_policy is already configured as a service policy

Cryptochecksum (unchanged): 2e44c71d a824ed25 7a3273d9 e8a3e089

5026 bytes copied in 0.190 secs

ciscoasa# con

ciscoasa# configure te

ciscoasa#configure terminal

ciscoasa(config)# pas

ciscoasa(config)# passw?

configure mode commands/options:

passwd password

ciscoasa(config)# passwo

ciscoasa(config)# password wxlccsu

ciscoasa(config)# en

ciscoasa(config)# ena

ciscoasa(config)# enable pa

ciscoasa(config)# enable password pa

ciscoasa(config)#enable password wxlccsu

ciscoasa(config)# con

ciscoasa(config)# conf

ciscoasa(config)# config-

ciscoasa(config)# config-register

ciscoasa(config)# config-register 0x01 #此处如果没有改的话就是0X01

ciscoasa(config)# co

ciscoasa(config)# cop

ciscoasa(config)# copy ru

ciscoasa(config)# copy running-config sta

ciscoasa(config)# copy running-config startup-config

Source filename [running-config]? ####此处直接回车

Cryptochecksum: b06d7497 13c8a9ce f9c4a96e 6bfc157a

5481 bytes copied in 3.290 secs (1827 bytes/sec)

ciscoasa(config)# end

ciscoasa# reboot

原文地址:https://www.cnblogs.com/cyrusxx/p/12562868.html