{"id":206,"date":"2007-06-04T07:11:12","date_gmt":"2007-06-04T03:11:12","guid":{"rendered":"http:\/\/mudji.net\/press\/?p=206"},"modified":"2021-06-11T21:58:11","modified_gmt":"2021-06-11T17:58:11","slug":"password-recovery-procedure-for-the-cisco-1700-2600-3600-etc","status":"publish","type":"post","link":"https:\/\/mudji.net\/press\/?p=206","title":{"rendered":"Password Recovery Procedure for the Cisco 1700, 2600, 3600, etc"},"content":{"rendered":"<p>This document describes the procedure for recovering <strong>enable password<\/strong> or <strong>enable secret<\/strong> passwords. These passwords are used to protect access to privileged EXEC and configuration modes. The <strong>enable password<\/strong> password can be recovered, but the <strong>enable secret<\/strong> password is encrypted and can only be replaced with a new password using the procedure below.<\/p>\n<p>This password recovery procedure can also be used for the following products:<\/p>\n<p>    * Cisco 806<br \/>\n    * Cisco 827<br \/>\n    * Cisco uBR900<br \/>\n    * Cisco 1003<br \/>\n    * Cisco 1004<br \/>\n    * Cisco 1005<br \/>\n    * Cisco 1400<br \/>\n    * Cisco 1600<br \/>\n    * Cisco 1700<br \/>\n    * Cisco 2600<br \/>\n    * Cisco 3600<br \/>\n    * Cisco 4500<br \/>\n    * Cisco 4700<br \/>\n    * Cisco AS5x00<br \/>\n    * Cisco 6&#215;00<br \/>\n    * Cisco 7000 (RSP7000)<br \/>\n    * Cisco 7100<br \/>\n    * Cisco 7200<br \/>\n    * Cisco 7500<br \/>\n    * Cisco uBR7100<br \/>\n    * Cisco uBR7200<br \/>\n    * Cisco uBR10000<br \/>\n    * Cisco 12000<br \/>\n    * Cisco LS1010<br \/>\n    * Catalyst 2948G-L3<br \/>\n    * Catalyst 4840G<br \/>\n    * Catalyst 4908G-L3<br \/>\n    * Catalyst 5500 (RSM)<br \/>\n    * Catalyst 8510-CSR<br \/>\n    * Catalyst 8510-MSR<br \/>\n    * Catalyst 8540-CSR<br \/>\n    * Catalyst 8540-MSR<br \/>\n    * Cisco MC3810<br \/>\n    * Cisco NI-2<br \/>\n    * Cisco VG200 Analog Gateway<br \/>\n    * Route Processor Module<\/p>\n<p><strong>Step-by-Step Procedure<\/strong><br \/>\n<!--more--><br \/>\nFollow this procedure to recover the <strong>enable password<\/strong> or<strong> enable secret<\/strong> passwords.<\/p>\n<p>1. Attach a terminal or PC with terminal emulation to the console port of the router. Use the following terminal settings:<\/p>\n<blockquote><p>          9600 baud rate<br \/>\n          No parity<br \/>\n          8 data bits<br \/>\n          1 stop bit<br \/>\n          No flow control<\/p><\/blockquote>\n<p>2. If you still have access to the router, type <strong>show version<\/strong> and record the setting of the configuration register; it is usually 0x2102 or 0x102. Click here to see the output of a show version command.<\/p>\n<p>3. If you don&#8217;t have access to the router (because of a lost login or tacacs password), you can safely consider that your configuration register is set to 0x2102.<\/p>\n<p>4. Using the power switch, turn off the router and then turn it back on.<br \/>\n      <strong>Important:<\/strong> To simulate step 4 on a Cisco 6400, pull out and then replace the Node Route Processor (NRP) or Node Switch Processor (NSP) card.<br \/>\n      To simulate step 4 on a Cisco 6&#215;00 using NI-2, pull out and then replace the NI-2 card.<\/p>\n<p>5. Press <strong>Break <\/strong>on the terminal keyboard within 60 seconds of the power-up to put the router into ROMMON.<br \/>\n      If the break sequence doesn&#8217;t work, see Standard Break Key Sequence Combinations During Password Recovery for other key combinations.<\/p>\n<p>6. Type <strong>confreg 0x2142<\/strong> at the rommon 1> prompt to boot from Flash without loading the startup configuration from the nonvolatile RAM (NVRAM).<\/p>\n<p>7. Type <strong>reset<\/strong> at the rommon 2> prompt.<br \/>\n    The router reboots but ignores its saved configuration.<\/p>\n<p>8. Type <strong>no<\/strong> after each setup question or press <strong>Ctrl-C<\/strong> to skip the initial setup procedure.<\/p>\n<p>9. Type <strong>enable<\/strong> at the Router> prompt.<br \/>\n      This puts you in enable mode where you can see the Router# prompt.<\/p>\n<p>10. <strong>Important:<\/strong> Type <strong>configure memory<\/strong> or <strong>copy startup-config running-config <\/strong>to copy the NVRAM into memory. Do not type <strong>configure terminal<\/strong> or <strong>copy running-config startup-config<\/strong> or <strong>write memory<\/strong>. This erases the router configuration stored in the NVRAM.<\/p>\n<p>11. Type <strong>write terminal<\/strong> or <strong>show running-config.<\/strong><br \/>\n      The <strong>show running-config<\/strong> and <strong>write terminal <\/strong>commands show the configuration of the router. In this configuration, you see under all the interfaces the <strong>shutdown<\/strong> command, which means all interfaces are currently shutdown. Also, you can see the passwords (enable password, enable secret, vty, console passwords, and so on) either in encrypted or unencrypted format. The unencrypted passwords can be re-used; the encrypted ones have to be replaced with new passwords.<\/p>\n<p>12. Type <strong>configure terminal<\/strong> and make the changes.<br \/>\n      The prompt is now hostname(config)#.<\/p>\n<p>13. Type <strong>enable secret < password ><\/strong> to change the <strong>enable secret<\/strong> password, for example.<\/p>\n<p>14. Issue the <strong>no shutdown<\/strong> command on every interface that is used. If you issue a <strong>show ip interface brief <\/strong>command, once you exit the configuration mode (Ctrl-z), every interface that you want to use should be &#8220;up up&#8221;.<\/p>\n<p>15. Type <strong>config-register 0x2102<\/strong>, or the value you recorded in step 2. This makes the router load the startup configuration from the NVRAM during the next reload.<\/p>\n<p>16. Press <strong>Ctrl-z<\/strong> or <strong>End<\/strong> to leave the configuration mode.<br \/>\n      The prompt is now hostname#.<\/p>\n<p>17. Type <strong>write memory<\/strong> or <strong>copy running-config startup-config<\/strong> to commit the changes.<\/p>\n<p><strong>Sample Output<\/strong><br \/>\nThe sample output shown here is the result of the password recovery procedure on a Cisco 4700 Series Router. Even if you are not using a 4700 router, this example should be almost exactly what you experience on your device.<\/p>\n<blockquote><p>Router><strong>enable<\/strong><\/p>\n<p>Password:<\/p>\n<p>Password:<\/p>\n<p>Password:<\/p>\n<p>% Bad secrets<\/p>\n<p>Router><strong>show version <\/strong><br \/>\nCisco Internetwork Operating System Software<br \/>\nIOS &#8482; 4500 Software (C4500-IS-M), Version 12.2(10b), RELEASE SOFTWARE (fc1)<br \/>\nCopyright (c) 1986-2002 by cisco Systems, Inc.<br \/>\nCompiled Thu 11-Jul-02 17:29 by pwade<br \/>\nImage text-base: 0x60008948, data-base: 0x60C74000<\/p>\n<p>ROM: System Bootstrap, Version 5.2(7b) [mkamson 7b], RELEASE SOFTWARE (fc1)<\/p>\n<p>     BOOTLDR: 4500 Software (C4500-BOOT-M), Version 11.3(10),<br \/>\n     RELEASE SOFTWARE (fc1)<\/p>\n<p>Router uptime is 0 minutes<\/p>\n<p>     System returned to ROMby reload at 17:34:58 UTC Tue Aug 1 1995<\/p>\n<p>     System image file is &#8220;flash:c4500-is-mz.122-10b.bin&#8221;<\/p>\n<p>cisco 4700 (R4K) processor (revision B) with 32768K\/16384K bytes of memory.<\/p>\n<p>     Processor board ID 02169303<\/p>\n<p>     R4600 CPU at 133Mhz, Implementation 32, Rev 2.0, 512KB L2 Cache<\/p>\n<p>     G.703\/E1 software, Version 1.0.<\/p>\n<p>     Bridging software.<\/p>\n<p>     X.25 software, Version 3.0.0.<\/p>\n<p>     6 Ethernet\/IEEE 802.3 interface(s)<\/p>\n<p>     8 Serial network interface(s)<\/p>\n<p>     128K bytes of non-volatile configuration memory.<\/p>\n<p>     8192K bytes of processor board System flash (Read\/Write)<\/p>\n<p>     4096K bytes of processor board Boot flash (Read\/Write)<\/p>\n<p>Configuration register is <strong>0x2102<\/strong><\/p>\n<p>Router><\/p>\n<p><strong>!&#8212; The router was just powercycled and during bootup a<br \/>\n!&#8212;break sequence was sent to the router.<\/strong><\/p>\n<p>!<\/p>\n<p>     monitor: command &#8220;cisco2-C4500&#8221; aborted due to user interrupt<\/p>\n<p>     ><\/p>\n<p>     ><strong>confreg 0x2142<\/strong><\/p>\n<p>     You must reset or power cycle for new config to take effect<\/p>\n<p>     ><strong>reset<\/strong><\/p>\n<p>System Bootstrap, Version 5.2(7b) [mkamson 7b], RELEASE SOFTWARE (fc1)<\/p>\n<p>     Copyright (c) 1995 by cisco Systems, Inc.<\/p>\n<p>     C4500 processor with 32768 Kbytes of main memory<\/p>\n<p>Self decompressing the image : ##################################<\/p>\n<p>#######################################################<\/p>\n<p>#################################      [OK]<\/p>\n<p>     program load complete, entrypt: 0x80008000, size: 0x6a6b30<\/p>\n<p>     Self decompressing the image : ################################<\/p>\n<p>#################################### [OK]<\/p>\n<p> Restricted Rights Legend<\/p>\n<p>&#8230;&#8230;.<\/p>\n<p>< ...snip><\/p>\n<p>&#8230;&#8230;<\/p>\n<p>     &#8212; System Configuration Dialog &#8212;<\/p>\n<p>Would you like to enter the initial configuration dialog?[yes\/no]:n<\/p>\n<p>Press RETURN to get started!<\/p>\n<p>00:00:05: %LINK-3-UPDOWN: Interface Serial0, changed state to down<br \/>\n&#8230;&#8230; < ..snip><\/p>\n<p>     00:01:29: %LINK-5-CHANGED: Interface Ethernet5, changed state to<br \/>\n       administratively down<\/p>\n<p>Router><\/p>\n<p>     Router><strong>enable<\/strong><br \/>\n     Router#<strong>copy startup-config running-config<\/strong><br \/>\n     Destination filename [running-config]?<\/p>\n<p>     1012 bytes copied in 0.276 secs (3667 bytes\/sec) <\/p>\n<p>     Router#<strong>show running-config<\/strong><br \/>\n     Building configuration&#8230;<br \/>\n     Current configuration : 1084 bytes<br \/>\n          !<br \/>\n          version 12.2<br \/>\n          service timestamps debug uptime<br \/>\n          service timestamps log uptime<br \/>\n          no service password-encryption<br \/>\n          !<br \/>\n          hostname Router<br \/>\n          !<br \/>\n          <strong>enable secret 5 $1$uQ7K$rfZtMRsWsFagqsW4\/9K0b1<\/strong><\/p>\n<p>    <strong> !&#8212; Since the password is encrypted, we need to replace<br \/>\n     !&#8212; the password with the new one.<\/strong><\/p>\n<p>     !<br \/>\n     ip subnet-zero<br \/>\n     !<br \/>\n     !<br \/>\n     !<br \/>\n     !<br \/>\n     interface Ethernet0<br \/>\n     ip address 10.10.10.1 255.0.0.0<br \/>\n     media-type 10BaseT<br \/>\n     !<br \/>\n     interface Ethernet1<br \/>\n     no ip address<br \/>\n     shutdown<br \/>\n     media-type 10BaseT<br \/>\n     !<br \/>\n     Ouput Omitted<br \/>\n     !<br \/>\n     interface Serial0<br \/>\n     ip address 172.16.1.1 255.255.0.0<br \/>\n     !<br \/>\n     Ouput Omitted<br \/>\n     !<br \/>\n     ip classless<br \/>\n     no ip http server<br \/>\n     ip pim bidir-enable<br \/>\n     !<br \/>\n     !<br \/>\n     line con 0<br \/>\n     line aux 0<br \/>\n     line vty 0 4<br \/>\n     login<br \/>\n     !<br \/>\n     end<\/p>\n<p>Router#<strong>configure terminal<\/strong><\/p>\n<p>     Enter configuration commands, one per line. End with CNTL\/Z.<\/p>\n<p>     Router(config)#<strong>enable secret < password > [Choose a strong password with at least one capital letter, one number, and one special character.]<\/strong><\/p>\n<p>     Router(config)#<strong>^Z <\/strong><\/p>\n<p>     00:05:23: %SYS-5-CONFIG_I: Configured from console by console<\/p>\n<p> Router#<strong>show ip interface brief<\/strong><\/p>\n<p>&#8230;< ...output omitted><\/p>\n<p>Router#<\/p>\n<p>     Router#<strong>configure terminal<\/strong><\/p>\n<p>     Enter configuration commands, one per line. End with CNTL\/Z. <\/p>\n<p>     Router(config)#<strong>interface ethernet 0 <\/strong><\/p>\n<p>     Router(config-if)#<strong>no shutdown<\/strong><\/p>\n<p>     Router(config-if)#<\/p>\n<p>     00:08:06: %LINK-3-UPDOWN: Interface Ethernet0, changed state to up <\/p>\n<p>     Router(config-if)#<strong>^Z<\/strong><\/p>\n<p>     Router#<\/p>\n<p>     00:09:21: %SYS-5-CONFIG_I: Configured from console by console<\/p>\n<p>     Router#<\/p>\n<p>     Router# <\/p>\n<p>     Router#<strong>copy running-config startup-config<\/strong><\/p>\n<p>     Destination filename [startup-config]?<\/p>\n<p>     Building configuration&#8230;<\/p>\n<p>     [OK]<\/p>\n<p>Router#<strong>show version<\/strong><br \/>\nCisco Internetwork Operating System Software<br \/>\nIOS &#8482; 4500 Software (C4500-IS-M), Version 12.2(10b), RELEASE SOFTWARE (fc1)<br \/>\nCopyright (c) 1986-2002 by cisco Systems, Inc.<br \/>\nCompiled Thu 11-Jul-02 17:29 by pwade<br \/>\nImage text-base: 0x60008948, data-base: 0x60C74000<\/p>\n<p>ROM: System Bootstrap, Version 5.2(7b) [mkamson 7b], RELEASE SOFTWARE (fc1)<\/p>\n<p>BOOTLDR: 4500 Software (C4500-BOOT-M), Version 11.3(10), RELEASE SOFTWARE(fc1)<br \/>\nRouter uptime is 10 minutes<\/p>\n<p>&#8230;&#8230;< ..snip><\/p>\n<p>&#8230;&#8230;<\/p>\n<p>     8192K bytes of processor board System flash (Read\/Write)<\/p>\n<p>     4096K bytes of processor board Boot flash (Read\/Write)<\/p>\n<p>Configuration register is <strong>0x2142<\/strong><\/p>\n<p>Router#<strong>configure terminal<\/strong><br \/>\nEnter configuration commands, one per line.  End with CNTL\/Z.<br \/>\nRouter(config)#<strong>config-register 0x2102<\/strong><br \/>\nRouter(config)#<strong>^Z<\/strong><br \/>\nRouter#<strong>show version<\/strong><br \/>\nCisco Internetwork Operating System Software<br \/>\nIOS &#8482; 4500 Software (C4500-IS-M), Version 12.2(10b), RELEASE SOFTWARE (fc1)<br \/>\nCopyright (c) 1986-2002 by cisco Systems, Inc.<br \/>\nCompiled Thu 11-Jul-02 17:29 by pwade<br \/>\nImage text-base: 0x60008948, data-base: 0x60C74000<\/p>\n<p>ROM: System Bootstrap, Version 5.2(7b) [mkamson 7b], RELEASE SOFTWARE (fc1)<\/p>\n<p>BOOTLDR: 4500 Software (C4500-BOOT-M), Version 11.3(10), RELEASE SOFTWARE (fc1)<\/p>\n<p>     Router uptime is 11 minutes<\/p>\n<p>&#8230;&#8230;.< ..snip><\/p>\n<p>&#8230;&#8230;<\/p>\n<p>     00:11:02: %SYS-5-CONFIG_I: Configured from console 4096K bytes of processor board<br \/>\n       Boot flash (Read\/Write)<\/p>\n<p>Configuration register is 0x2142 (will be <strong>0x2102<\/strong> at next reload)<\/p><\/blockquote>\n<p><em>Source: cisco.com<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This document describes the procedure for recovering enable password or enable secret passwords. These passwords are used to protect access to privileged EXEC and configuration modes. The enable password password &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/mudji.net\/press\/index.php?rest_route=\/wp\/v2\/posts\/206"}],"collection":[{"href":"https:\/\/mudji.net\/press\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mudji.net\/press\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mudji.net\/press\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mudji.net\/press\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=206"}],"version-history":[{"count":1,"href":"https:\/\/mudji.net\/press\/index.php?rest_route=\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":493,"href":"https:\/\/mudji.net\/press\/index.php?rest_route=\/wp\/v2\/posts\/206\/revisions\/493"}],"wp:attachment":[{"href":"https:\/\/mudji.net\/press\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mudji.net\/press\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mudji.net\/press\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}