Mailing List Archive

password break on fast iron 2
Hello all,

We just got a Fast iron2 as part of a Cisco package we brought in. My
Technician is not able to break the password on this system. I Googled it
and looked thru the archives with little success...is there a simple way to
break the password? Also wondering if there is even any market for
these...this one has (1) F18GMR and (3) F124E's. Maybe we skip the password
break and toss this in the dumpster??????

TIA



Michael Carter
Major Account Manager
Alta Technologies, Inc
763-475-5327 (direct)
800-546-2582 (Ext. 327)
763-475-5331 (fax)
AIM mikec at alta
mike.c@altatechnologies.com
www.altatechnologies.com
SUN CISCO RS/6000 HP-UX OVERLAND STORAGE
JNI EMULEX Qlogic
password break on fast iron 2 [ In reply to ]
On Tue, Sep 28, 2004 at 12:06:18PM -0500, Mike Carter wrote:
> Hello all,
>
> We just got a Fast iron2 as part of a Cisco package we brought in. My
> Technician is not able to break the password on this system. I Googled it
> and looked thru the archives with little success...is there a simple way to
> break the password? Also wondering if there is even any market for
> these...this one has (1) F18GMR and (3) F124E's. Maybe we skip the password
> break and toss this in the dumpster??????

If it's like the ServerIron there's a procedure that's similar to the
Cisco one - power-cycle, break into the boot process by hitting enter
on the serial console, put in a not-so-secret secret command to make it
boot with no enable password, and then set a new password once you're
back in enable mode.

We don't have any Fastirons here, but the Foundry products in general
are pretty good. Not intending to start a war here, but I'd say
they're better than a lot of Cisco products when you weigh
price/performance.

-- Clifton

--
Clifton Royston -- cliftonr@tikitechnologies.com
Tiki Technologies Lead Programmer/Software Architect
Did you ever fly a kite in bed? Did you ever walk with ten cats on your head?
Did you ever milk this kind of cow? Well we can do it. We know how.
If you never did, you should. These things are fun, and fun is good.
-- Dr. Seuss
password break on fast iron 2 [ In reply to ]
I'll take it if yer giving it away :)

To break the password you need to send a break sequence to the console on
bootup and then at the boot prompt issue the no password command to boot up
without a password set.

-Brent


At 10:06 AM 9/28/2004, Mike Carter wrote:
>Hello all,
>
>We just got a Fast iron2 as part of a Cisco package we brought in. My
>Technician is not able to break the password on this system. I Googled it
>and looked thru the archives with little success...is there a simple way to
>break the password? Also wondering if there is even any market for
>these...this one has (1) F18GMR and (3) F124E's. Maybe we skip the password
>break and toss this in the dumpster??????
>
>TIA
>
>
>
>Michael Carter
>Major Account Manager
>Alta Technologies, Inc
>763-475-5327 (direct)
>800-546-2582 (Ext. 327)
>763-475-5331 (fax)
>AIM mikec at alta
>mike.c@altatechnologies.com
>www.altatechnologies.com
>SUN CISCO RS/6000 HP-UX OVERLAND STORAGE
>JNI EMULEX Qlogic
>
>
>_______________________________________________
>foundry-nsp mailing list
>foundry-nsp@puck.nether.net
>http://puck.nether.net/mailman/listinfo/foundry-nsp
password break on fast iron 2 [ In reply to ]
: We just got a Fast iron2 as part of a Cisco package we brought in. My
: Technician is not able to break the password on this system. I Googled it
: and looked thru the archives with little success...is there a simple way to
: break the password? Also wondering if there is even any market for


From:
http://www.foundrynet.com/services/documentation/security/Security.html


Recovery from a lost password requires direct access to the serial port
and a system reset. NOTE: You can perform this procedure only from the
CLI.

1. Start a CLI session over the serial interface to the device.
2. Reboot the device.
3. At the initial boot prompt at system startup, enter b to enter the
boot monitor mode.
4. Enter no password at the prompt. (You cannot abbreviate this
command.) This command will cause the device to bypass the system
password check.
5. Enter boot system flash primary at the prompt.
6. After the console prompt reappears, assign a new password.

scott