Question about Network Security & Firewall Devices
i m using aip ssm 10 asa5520, now i forget the password and tryed to recover the password of module using command "hw-module module 1 password recovery" but getting the message that software not supported.
ios ver of ips is 5.1
please guide me
The following password recovery options exist:
If another Administrator account exists, the other Administrator can change the password.
If a Service account exists, you can log in to the service account and switch to user root using the command su - root.
Use the password command to change the CLI Administrator account's password.
For example, if the Administrator username is "adminu," the command is password adminu. You are prompted to enter the new password twice.
You can also reimage the sensor using either the recovery partition or a system image file. This will default the device.
Posted on May 09, 2008
Hw-module module 1 password-reset
Posted on Jun 28, 2010
Tips for a great answer:
Feb 04, 2011 | Cisco ASA 5505 Firewall
it should only set the password on the router
Unfortunately, there is no way to recover a lost or forgotten password from a router or access point; you will need to reset the device to factory defaults. However, once the device is reset to factory defaults, you can use the default username ("admin") and password (either "password" or "1234" depending on your router) to reconfigure your router settings.
if there a small hole in the front or back of the router push a hair pin in to reset to factory settings
hope this helps
Jan 02, 2011 | NetGear ProSafe FVG318 (606449041668)...
This drop is usually seen when a port is not configured correctly. This drop is incremented when a packet cannot be successfully forwarded within switch ports as a result of the default or user configured switch port settings. The following configurations are the likely reasons for this drop:
•The security appliance is connected to another Cisco device that has Ethernet keepalives. For example, Cisco IOS software uses Ethernet loopback packets to ensure interface health. This packet is not intended to be received by any other device; the health is ensured just by being able to send the packet. These types of packets are dropped at the switch port, and the counter increments.
•The VLAN only has one physical interface, but the DEST of the packet does not match the MAC address of the VLAN, and it is not the broadcast address
Throubleshoot these and see if any of them apply to you. Thank you for choosing fixya.com.
Dec 04, 2010 | Cisco (ASA-SSM-AIP-20-K9=) Firewall
Apr 09, 2010 | SonicWALL TZ 170 SP Firewall
Aug 11, 2009 | Cisco ASA 5520 Firewall
Aug 07, 2009 | Cisco Network Security & Firewall Devices
Jul 05, 2009 | Network Security & Firewall Devices
Jun 15, 2009 | Nokia IP 350 Firewall
Nov 28, 2008 | Cisco ASA 5520 Firewall
Aug 13, 2016 | HP Color LaserJet CP6015dn Printer
2,541 people viewed this question
Usually answered in minutes!