I have a IDS 4215 that was installed and configured by that we purchased the company that we purchased the equipmnent from. My problem is that no one seems to know the device credentials. all the info that i have seen so far for password recovery operate under the basis of knowledge of either an admin account or the service account. In my case i was never privy to either as i was not here during the initial configuration. Can any one help me to solve today's predicament?
If you don't care about the current configuration and don't mind reconfiguring from scratch then there is a very easy solution.
Connect to the console port of the sensor.
Power the sensor Off and back On.
During bootup there will be a Grub menu that popsup providing you with 2 options.
The first option boots the application partition.
The second option boots the recovery partition.
By default it will boot the application partition if nothing is entered after a few seconds.
During those few seconds you can interupt the process and select the 2nd boot option.
This will boot the recovery partition which will re-image the application partitions with completely new files and in the process reset the cisco user password back to the default "cisco" password.
This will also erase almost all of the rest of the sensor configuration.
If you need to know the current configuration and don't want to do the re-image, then try contacting Cisco TAC. They may have another option for breaking into the boot process and resetting the password.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :