亚洲av成人无遮挡网站在线观看,少妇性bbb搡bbb爽爽爽,亚洲av日韩精品久久久久久,兔费看少妇性l交大片免费,无码少妇一区二区三区

  免費注冊 查看新帖 |

Chinaunix

  平臺 論壇 博客 文庫
最近訪問板塊 發(fā)新帖
查看: 5020 | 回復: 3
打印 上一主題 下一主題

請教,關(guān)于Brocade SW200E光纖交換機密碼丟失的問題。 [復制鏈接]

論壇徽章:
0
跳轉(zhuǎn)到指定樓層
1 [收藏(0)] [報告]
發(fā)表于 2009-08-06 15:42 |只看該作者 |倒序瀏覽
請教,關(guān)于Brocade SW200E光纖交換機密碼丟失的問題,\r\n\r\n之前在配置的時候把密碼修改了,沒有記住,后來就丟失了,現(xiàn)在不能進去,請問大俠該如何處理?\r\n\r\n謝謝了!

論壇徽章:
0
2 [報告]
發(fā)表于 2009-08-06 16:27 |只看該作者
GOOGLE了一個, 你可以試試下面的鏈接:\r\n\r\nhttp://hi.baidu.com/isno/blog/item/c98cd0136b6bf9045baf530c.html

論壇徽章:
0
3 [報告]
發(fā)表于 2009-08-06 16:27 |只看該作者
恢復brocade交換機密碼的方法2008-08-29 20:18可以試一下用root口令恢復: \r\nroot/fibranne \r\n如果能登錄,使用 passwddefault 命令重置密碼。 \r\n\r\n\r\n通過如下方法取得root權(quán)限: \r\n1. 連接串口并確定可以顯示終端 \r\n2. 重啟交換機,在終端上顯示“press ESC key within 4 sec….”時,4秒鐘內(nèi)按下ESC鍵 \r\n3. 會顯示一個菜單,選擇Command Prompt shell \r\n4. 輸入命令:mount -o remount,rw,noatime / \r\n5. 輸入命令:mount /dev/hda2 /mnt \r\n6. 輸入命令: passwddefault 或 passwd admin(僅重置admin用戶密碼) \r\n7. reboot -f \r\n\r\n*** 如果第5步失敗,則解決方法: \r\nPrintenv \r\n找到“OSRootPartition” 參數(shù), 然后mount第二個partition (通常是 hda2) \r\n\r\n\r\n200E上有人這么做過\r\n\r\n==========================================================\r\nYour service request has been assigned case number RQST00000033003.\r\n\r\nIf the Silkworm 12000 is using FOS v4.1.x or above then please follows the instructions below to recover the passwords.   Please let me know if the 12000 is running FOS v4.0.x release.\r\n\r\n\r\nRecovering the Root Password on Fabric OS v4.1\r\nIf the Boot PROM password is still known, you can use the following procedure to recover the Root\r\npassword on a SilkWorm 3900 or SilkWorm 12000.\r\nNote: This procedure requires accessing the boot prompt, which stops traffic flow through a SilkWorm\r\n3900 until the switch is rebooted. On a SilkWorm 12000, you can recover the Root password without\r\ndisruption to I/O by performing the procedure on the standby CP card.\r\nTo recover the Root password:\r\n1. Connect to the serial port interface of the switch (SW3900)/Standby CP(SW12000)\r\n2. Reboot the switch (SW3900)/Standby CP (SW12000) and press ESC within four seconds after the\r\nmessage \"Press escape within 4 seconds...\" displays. \"Enter Boot PROM interface:\"\r\n3. Enter the Boot PROM password.\r\n4. Enter \"3\" at the prompt to enter the command shell.\r\n5. Enter the printenv command and save the output.\r\n6. Enter the boot command followed by the first memory address after the string OSLoader= obtained\r\nfrom the printenv output and -s\r\nboot <memory address> -s\r\nThe system is coming up, please wait...\r\nChecking system RAM - press any key to stop test\r\nChecking memory address: 01300000\r\nSystem RAM check terminated by keyboard\r\nSystem RAM check complete\r\nPress escape within 4 seconds to enter boot interface.\r\n1) Start system.\r\n2) Recover password.\r\n3) Enter command shell.\r\nOption? 3\r\nPassword:\r\n> printenv\r\nAutoLoad=yes\r\nENET_MAC=006069602BD6\r\nInitTest=MEM()\r\nLoadIdentifiers=IDE w/ XFS;IDE w/ XFS & NFS Root\r\nOSLoader=MEM()0xF0000000;MEM()0xF0800000\r\nOSRootPartition=hda1;hda2\r\nSkipWatchdog=yes\r\n> boot MEM()0xF0000000 -s\r\n.\r\nSteps 7 through 11 are for a SW3900 only, skip to step 12 for SW12000.\r\n7. Enter the following string at the prompt:\r\nmount -o remount,rw,noatime /\r\n8. Enter the following string at the prompt:\r\nmount /dev/hda2 /mnt\r\n9. Enter the passwddefault command with the full path, as follows:\r\n/sbin/passwddefault\r\nThis resets the User, Admin, Factory, and Root passwords to the default values\r\n10. Enter the reboot -f command if the switch is a SW3900.\r\nreboot -f\r\nTraffic flow resumes when the switch finishes rebooting.\r\n11. Log into the SW3900 switch by serial or telnet as Root and set new passwords for all accounts. The\r\nprocess is now complete for the SW3900.\r\n12. From the serial connection to the standby CP card, set the appropriate hostname to the CP. Use \"cp0\"\r\nfor slot 5, and \"cp1\" for slot 6.\r\nhostname cp0\r\n13. Start networking on the standby CP\r\n/etc/init.d/network start\r\n14. Perform one of the following according to which slot the CP card is in:\r\n? If the standby CP card is in slot 5 (CP0), enter \"rsh 10.0.0.6 /sbin/passwddefault\", press\r\nEnter.\r\n? If the standby CP card is in slot 6 (CP1), enter \"rsh 10.0.0.5 /sbin/passwddefault\", press\r\nEnter.\r\n15. Reboot the Standby CP with the command \"reboot -f\"\r\n16. Log into the active CP as admin from a telnet or serial connection, and enter Ctrl + C to bypass the\r\nrequest to modify passwords.\r\n17. Log into either logical switch by serial or telnet as admin and set new passwords for all accounts.\r\n\r\n=========================================================\r\n博科交換機密碼重設工具\r\nwindows下的圖形化界面的軟件,用來重設博科交換機的管理員密碼,只要輸入博科交換機的IP地址,用戶名和密碼就可以了,不過版本上只支持 firmware為2.6.0d, 3.0.2g, 4.0.2b的這幾個版本。這個軟件是從網(wǎng)上找來的,還沒有做過測試,哪位朋友用過之后麻煩給個測試結(jié)果。\r\n\r\n壓縮密碼為“www.brocader.cn”\r\n\r\n下載地址:博科交換機密碼重設工具

論壇徽章:
0
4 [報告]
發(fā)表于 2009-08-07 13:58 |只看該作者
root/fibranne\r\n\r\n這個我試過,非常容易,進去再重設一下就可以了
您需要登錄后才可以回帖 登錄 | 注冊

本版積分規(guī)則 發(fā)表回復

  

北京盛拓優(yōu)訊信息技術(shù)有限公司. 版權(quán)所有 京ICP備16024965號-6 北京市公安局海淀分局網(wǎng)監(jiān)中心備案編號:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年舉報專區(qū)
中國互聯(lián)網(wǎng)協(xié)會會員  聯(lián)系我們:huangweiwei@itpub.net
感謝所有關(guān)心和支持過ChinaUnix的朋友們 轉(zhuǎn)載本站內(nèi)容請注明原作者名及出處

清除 Cookies - ChinaUnix - Archiver - WAP - TOP