Cisco ASA 5520 密码恢复
发表于:2025-12-04 作者:千家信息网编辑
千家信息网最后更新 2025年12月04日,开机按ESCrommon #0> confregCurrent Configuration Register: 0x00000001Configuration Summary: boot defaul
千家信息网最后更新 2025年12月04日Cisco ASA 5520 密码恢复开机按ESCrommon #0> confreg
Current Configuration Register: 0x00000001Configuration Summary: boot default p_w_picpath from Flash
Do you wish to change this configuration? y/n [n]: nenable boot to ROMMON prompt? y/n [n]: yselect specific Flash p_w_picpath index? y/n [n]: ndisable system configuration? y/n [n]: ygo to ROMMON prompt if netboot fails? y/n [n]: enable passing NVRAM file specs in auto-boot mode? y/n [n]: disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:
Current Configuration Register: 0x00000040Configuration Summary: boot ROMMON ignore system configuration
Update Config Register (0x40) in NVRAM...
rommon #1> confreg 0x41
Update Config Register (0x41) in NVRAM...
rommon #2> bootLaunching BootLoader...Boot configuration file contains 1 entry.
Loading disk0:/asa803-k8.bin... Booting...Loading...
Processor memory 417705984, Reserved memory: 41943040 (DSOs: 0 + kernel: 41943040)Guest RAM start: 0xc7000080Guest RAM end: 0xdd400000Guest RAM brk: 0xc7001000
IO memory 79241216 bytesIO memory start: 0xc2401000IO memory end: 0xc6f93000
Total SSMs found: 0
Total NICs found: 7mcwa i82557 Ethernet at irq 11 MAC: 001e.f737.0569mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001i82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 00 MAC: 001e.f737.056ai82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 01 MAC: 001e.f737.056bi82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 02 MAC: 001e.f737.056ci82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 03 MAC: 001e.f737.056di82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002
Licensed features for this platform:Maximum Physical Interfaces : Unlimited Maximum VLANs : 150 Inside Hosts : Unlimited Failover : Active/Active×××-DES : Enabled ×××-3DES-AES : Enabled Security Contexts : 2 GTP/GPRS : Disabled ××× Peers : 750 Web××× Peers : 2 AnyConnect for Mobile : Disabled AnyConnect for Linksys phone : Disabled Advanced Endpoint Assessment : Disabled
This platform has an ASA 5520 ××× Plus license.
Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0) Boot microcode : CN1000-MC-BOOT-2.00 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.01 IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04 -------------------------------------------------------------------------- . . | | ||| ||| .|| ||. .|| ||. .:||| | |||:..:||| | |||:. C i s c o S y s t e m s --------------------------------------------------------------------------
Cisco Adaptive Security Appliance Software Version 8.0(3)
****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning *******************************
Copyright (c) 1996-2007 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Ignoring startup configuration as instructed by configuration register.INFO: Converting to disk0:/Type help or '?' for a list of available commands.ciscoasa> ciscoasa> enPassword: ciscoasa# copy sciscoasa# copy starciscoasa# copy startup-config runciscoasa# copy startup-config running-config
Destination filename [running-config]?
.Cryptochecksum (unchanged): d4f2d753 f96427a3 67a15e11 75266b9c
2562 bytes copied in 3.680 secs (854 bytes/sec)ShanDong# ShanDong# config tShanDong(config)# passShanDong(config)# passwo ShanDong(config)# passworShanDong(config)# passwd ShanDong(config)# passwd asa5520ShanDong(config)# enShanDong(config)# enabShanDong(config)# enable pasShanDong(config)# enable password asa5520ShanDong(config)# usShanDong(config)# usernaShanDong(config)# username ShanDong(config)# username ShanDong(config)# username bowei paShanDong(config)# username bowei password asa5520ShanDong(config)# ShanDong(config)# ShanDong(config)# config-ShanDong(config)# config-register 0x11ShanDong(config)# copyShanDong(config)# copy runShanDong(config)# copy running-config st ShanDong(config)# copy running-config startup-config
Source filename [running-config]? Cryptochecksum: c3cfc9da f515c77d 0fcdbce3 bf164968
2613 bytes copied in 3.370 secs (871 bytes/sec)ShanDong(config)# ShanDong(config)#
Current Configuration Register: 0x00000001Configuration Summary: boot default p_w_picpath from Flash
Do you wish to change this configuration? y/n [n]: nenable boot to ROMMON prompt? y/n [n]: yselect specific Flash p_w_picpath index? y/n [n]: ndisable system configuration? y/n [n]: ygo to ROMMON prompt if netboot fails? y/n [n]: enable passing NVRAM file specs in auto-boot mode? y/n [n]: disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:
Current Configuration Register: 0x00000040Configuration Summary: boot ROMMON ignore system configuration
Update Config Register (0x40) in NVRAM...
rommon #1> confreg 0x41
Update Config Register (0x41) in NVRAM...
rommon #2> bootLaunching BootLoader...Boot configuration file contains 1 entry.
Loading disk0:/asa803-k8.bin... Booting...Loading...
Processor memory 417705984, Reserved memory: 41943040 (DSOs: 0 + kernel: 41943040)Guest RAM start: 0xc7000080Guest RAM end: 0xdd400000Guest RAM brk: 0xc7001000
IO memory 79241216 bytesIO memory start: 0xc2401000IO memory end: 0xc6f93000
Total SSMs found: 0
Total NICs found: 7mcwa i82557 Ethernet at irq 11 MAC: 001e.f737.0569mcwa i82557 Ethernet at irq 5 MAC: 0000.0001.0001i82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 00 MAC: 001e.f737.056ai82546GB rev03 Gigabit Ethernet @ irq09 dev 3 index 01 MAC: 001e.f737.056bi82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 02 MAC: 001e.f737.056ci82546GB rev03 Gigabit Ethernet @ irq09 dev 2 index 03 MAC: 001e.f737.056di82547GI rev00 Gigabit Ethernet @ irq11 dev 1 index 05 MAC: 0000.0001.0002
Licensed features for this platform:Maximum Physical Interfaces : Unlimited Maximum VLANs : 150 Inside Hosts : Unlimited Failover : Active/Active×××-DES : Enabled ×××-3DES-AES : Enabled Security Contexts : 2 GTP/GPRS : Disabled ××× Peers : 750 Web××× Peers : 2 AnyConnect for Mobile : Disabled AnyConnect for Linksys phone : Disabled Advanced Endpoint Assessment : Disabled
This platform has an ASA 5520 ××× Plus license.
Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0) Boot microcode : CN1000-MC-BOOT-2.00 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.01 IPSec microcode : CNlite-MC-IPSECm-MAIN-2.04 -------------------------------------------------------------------------- . . | | ||| ||| .|| ||. .|| ||. .:||| | |||:..:||| | |||:. C i s c o S y s t e m s --------------------------------------------------------------------------
Cisco Adaptive Security Appliance Software Version 8.0(3)
****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning *******************************
Copyright (c) 1996-2007 by Cisco Systems, Inc.
Restricted Rights Legend
Use, duplication, or disclosure by the Government issubject to restrictions as set forth in subparagraph(c) of the Commercial Computer Software - RestrictedRights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical Data and ComputerSoftware clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706
Ignoring startup configuration as instructed by configuration register.INFO: Converting to disk0:/Type help or '?' for a list of available commands.ciscoasa> ciscoasa> enPassword: ciscoasa# copy sciscoasa# copy starciscoasa# copy startup-config runciscoasa# copy startup-config running-config
Destination filename [running-config]?
.Cryptochecksum (unchanged): d4f2d753 f96427a3 67a15e11 75266b9c
2562 bytes copied in 3.680 secs (854 bytes/sec)ShanDong# ShanDong# config tShanDong(config)# passShanDong(config)# passwo ShanDong(config)# passworShanDong(config)# passwd ShanDong(config)# passwd asa5520ShanDong(config)# enShanDong(config)# enabShanDong(config)# enable pasShanDong(config)# enable password asa5520ShanDong(config)# usShanDong(config)# usernaShanDong(config)# username ShanDong(config)# username ShanDong(config)# username bowei paShanDong(config)# username bowei password asa5520ShanDong(config)# ShanDong(config)# ShanDong(config)# config-ShanDong(config)# config-register 0x11ShanDong(config)# copyShanDong(config)# copy runShanDong(config)# copy running-config st ShanDong(config)# copy running-config startup-config
Source filename [running-config]? Cryptochecksum: c3cfc9da f515c77d 0fcdbce3 bf164968
2613 bytes copied in 3.370 secs (871 bytes/sec)ShanDong(config)# ShanDong(config)#
U.S.
密码
数据库的安全要保护哪些东西
数据库安全各自的含义是什么
生产安全数据库录入
数据库的安全性及管理
数据库安全策略包含哪些
海淀数据库安全审计系统
建立农村房屋安全信息数据库
易用的数据库客户端支持安全管理
连接数据库失败ssl安全错误
数据库的锁怎样保障安全
郑州指动网络技术有限公司
xshll查询数据库
视频点播需要多少带宽的服务器
互联网数据库怎么选
fast虚拟服务器
服务器机架安装
杜青林 凤凰网 数据库
软件开发的神话
网络安全激励方面
益阳市南县软件开发合同律师
怎么复制计算出的数据库
洛阳锦游网络技术有限公司官网
tbc怀旧服五区服务器排行
国外光谱数据库
个人电脑设置成服务器
倔强吉他谱软件开发
服务器被黑客入侵剪断网线
吕海波数据库
国家网络安全周宣传片
药明康德软件开发
服务器机架安装
服务器性能分析工具
服务器带外管理地址配置
创建服务器的主机关机后
李华华贵阳市网络安全协会
魔兽 60年代 数据库
松江区特定软件开发服务商有哪些
服务器运行中怎么看硬盘是否损坏
四川星天地网络安全技术
java存入数据库