Cisco ASA 5520 密码恢复
发表于:2024-11-27 作者:千家信息网编辑
千家信息网最后更新 2024年11月27日,开机按ESCrommon #0> confregCurrent Configuration Register: 0x00000001Configuration Summary: boot defaul
千家信息网最后更新 2024年11月27日Cisco ASA 5520 密码恢复开机按ESCrommon #0> confreg
Current Configuration Register: 0x00000001Configuration Summary: boot default p_w_picpath from Flash
Do you wish to change this configuration? y/n [n]: nenable boot to ROMMON prompt? y/n [n]: yselect specific Flash p_w_picpath index? y/n [n]: ndisable system configuration? y/n [n]: ygo to ROMMON prompt if netboot fails? y/n [n]: enable passing NVRAM file specs in auto-boot mode? y/n [n]: disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:
Current Configuration Register: 0x00000040Configuration Summary: boot ROMMON ignore system configuration
Update Config Register (0x40) in NVRAM...
rommon #1> confreg 0x41
Update Config Register (0x41) in NVRAM...
rommon #2> bootLaunching BootLoader...Boot configuration file contains 1 entry.
Loading disk0:/asa803-k8.bin... Booting...Loading...
Processor memory 417705984, Reserved memory: 41943040 (DSOs: 0 + kernel: 41943040)Guest RAM start: 0xc7000080Guest RAM end: 0xdd400000Guest RAM brk: 0xc7001000
IO memory 79241216 bytesIO memory start: 0xc2401000IO memory end: 0xc6f93000
Total SSMs found: 0
Total NICs found: 7mcwa i82557 Ethernet at irq 11 MAC: 001e.f737.0569mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001i82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 00 MAC: 001e.f737.056ai82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 01 MAC: 001e.f737.056bi82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 02 MAC: 001e.f737.056ci82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 03 MAC: 001e.f737.056di82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002
Licensed features for this platform:Maximum Physical Interfaces : Unlimited Maximum VLANs : 150 Inside Hosts : Unlimited Failover : Active/Active×××-DES : Enabled ×××-3DES-AES : Enabled Security Contexts : 2 GTP/GPRS : Disabled ××× Peers : 750 Web××× Peers : 2 AnyConnect for Mobile : Disabled AnyConnect for Linksys phone : Disabled Advanced Endpoint Assessment : Disabled
This platform has an ASA 5520 ××× Plus license.
Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0) Boot microcode : CN1000-MC-BOOT-2.00 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.01 IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04 -------------------------------------------------------------------------- . . | | ||| ||| .|| ||. .|| ||. .:||| | |||:..:||| | |||:. C i s c o S y s t e m s --------------------------------------------------------------------------
Cisco Adaptive Security Appliance Software Version 8.0(3)
****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning *******************************
Copyright (c) 1996-2007 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Ignoring startup configuration as instructed by configuration register.INFO: Converting to disk0:/Type help or '?' for a list of available commands.ciscoasa> ciscoasa> enPassword: ciscoasa# copy sciscoasa# copy starciscoasa# copy startup-config runciscoasa# copy startup-config running-config
Destination filename [running-config]?
.Cryptochecksum (unchanged): d4f2d753 f96427a3 67a15e11 75266b9c
2562 bytes copied in 3.680 secs (854 bytes/sec)ShanDong# ShanDong# config tShanDong(config)# passShanDong(config)# passwo ShanDong(config)# passworShanDong(config)# passwd ShanDong(config)# passwd asa5520ShanDong(config)# enShanDong(config)# enabShanDong(config)# enable pasShanDong(config)# enable password asa5520ShanDong(config)# usShanDong(config)# usernaShanDong(config)# username ShanDong(config)# username ShanDong(config)# username bowei paShanDong(config)# username bowei password asa5520ShanDong(config)# ShanDong(config)# ShanDong(config)# config-ShanDong(config)# config-register 0x11ShanDong(config)# copyShanDong(config)# copy runShanDong(config)# copy running-config st ShanDong(config)# copy running-config startup-config
Source filename [running-config]? Cryptochecksum: c3cfc9da f515c77d 0fcdbce3 bf164968
2613 bytes copied in 3.370 secs (871 bytes/sec)ShanDong(config)# ShanDong(config)#
Current Configuration Register: 0x00000001Configuration Summary: boot default p_w_picpath from Flash
Do you wish to change this configuration? y/n [n]: nenable boot to ROMMON prompt? y/n [n]: yselect specific Flash p_w_picpath index? y/n [n]: ndisable system configuration? y/n [n]: ygo to ROMMON prompt if netboot fails? y/n [n]: enable passing NVRAM file specs in auto-boot mode? y/n [n]: disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:
Current Configuration Register: 0x00000040Configuration Summary: boot ROMMON ignore system configuration
Update Config Register (0x40) in NVRAM...
rommon #1> confreg 0x41
Update Config Register (0x41) in NVRAM...
rommon #2> bootLaunching BootLoader...Boot configuration file contains 1 entry.
Loading disk0:/asa803-k8.bin... Booting...Loading...
Processor memory 417705984, Reserved memory: 41943040 (DSOs: 0 + kernel: 41943040)Guest RAM start: 0xc7000080Guest RAM end: 0xdd400000Guest RAM brk: 0xc7001000
IO memory 79241216 bytesIO memory start: 0xc2401000IO memory end: 0xc6f93000
Total SSMs found: 0
Total NICs found: 7mcwa i82557 Ethernet at irq 11 MAC: 001e.f737.0569mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001i82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 00 MAC: 001e.f737.056ai82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 01 MAC: 001e.f737.056bi82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 02 MAC: 001e.f737.056ci82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 03 MAC: 001e.f737.056di82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002
Licensed features for this platform:Maximum Physical Interfaces : Unlimited Maximum VLANs : 150 Inside Hosts : Unlimited Failover : Active/Active×××-DES : Enabled ×××-3DES-AES : Enabled Security Contexts : 2 GTP/GPRS : Disabled ××× Peers : 750 Web××× Peers : 2 AnyConnect for Mobile : Disabled AnyConnect for Linksys phone : Disabled Advanced Endpoint Assessment : Disabled
This platform has an ASA 5520 ××× Plus license.
Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0) Boot microcode : CN1000-MC-BOOT-2.00 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.01 IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04 -------------------------------------------------------------------------- . . | | ||| ||| .|| ||. .|| ||. .:||| | |||:..:||| | |||:. C i s c o S y s t e m s --------------------------------------------------------------------------
Cisco Adaptive Security Appliance Software Version 8.0(3)
****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning *******************************
Copyright (c) 1996-2007 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Ignoring startup configuration as instructed by configuration register.INFO: Converting to disk0:/Type help or '?' for a list of available commands.ciscoasa> ciscoasa> enPassword: ciscoasa# copy sciscoasa# copy starciscoasa# copy startup-config runciscoasa# copy startup-config running-config
Destination filename [running-config]?
.Cryptochecksum (unchanged): d4f2d753 f96427a3 67a15e11 75266b9c
2562 bytes copied in 3.680 secs (854 bytes/sec)ShanDong# ShanDong# config tShanDong(config)# passShanDong(config)# passwo ShanDong(config)# passworShanDong(config)# passwd ShanDong(config)# passwd asa5520ShanDong(config)# enShanDong(config)# enabShanDong(config)# enable pasShanDong(config)# enable password asa5520ShanDong(config)# usShanDong(config)# usernaShanDong(config)# username ShanDong(config)# username ShanDong(config)# username bowei paShanDong(config)# username bowei password asa5520ShanDong(config)# ShanDong(config)# ShanDong(config)# config-ShanDong(config)# config-register 0x11ShanDong(config)# copyShanDong(config)# copy runShanDong(config)# copy running-config st ShanDong(config)# copy running-config startup-config
Source filename [running-config]? Cryptochecksum: c3cfc9da f515c77d 0fcdbce3 bf164968
2613 bytes copied in 3.370 secs (871 bytes/sec)ShanDong(config)# ShanDong(config)#
U.S.
密码
数据库的安全要保护哪些东西
数据库安全各自的含义是什么
生产安全数据库录入
数据库的安全性及管理
数据库安全策略包含哪些
海淀数据库安全审计系统
建立农村房屋安全信息数据库
易用的数据库客户端支持安全管理
连接数据库失败ssl安全错误
数据库的锁怎样保障安全
铜陵互联网视频系统服务器
淄博app软件开发的前景
中国网络安全产业发展规划
闵行区服务器回收
游戏关闭服务器后可以退款吗
怎么修改数据库数据保存时间
网络安全执法检查工作通知
服务器噪音很大吗
如何访问net数据库
信息系统网络安全运维业务需求
合肥星晟网络技术有限公司
网络安全威胁国家安全的案例
扫ip服务器
数据库乐观锁失效
梦幻西游怎样删除角色所在服务器
oledb连接数据库
数据库软件的开发流程
宝山区软件开发中心
湖南上智网络技术有限公司
大部分数据库遵循
北京百卓网络技术有限公司
服务器管理配置过程
网络安全知识竞赛形式
兰山农商银行网络安全专项治理
网络安全法保存记录
苏州 软件开发工程师
vb6数据库开发案例程序代码
网络技术支撑是做什么的
软件开发中测试是干什么的
区网络安全与信息化讲话