Each Option 43 settings is different for Cisco, Ruckus or Ubiquity.
result: option 43 hex 0104c0a80001
Connect the serial console breakout adapter cable to the AP Ethernet port and your PC/Laptop
Power on the AP and get into apboot mode. You’ll see the option to go into AP boot mode when the AP is booting.
From the apboot prompt, enter the following commands
apboot> reset or boot
#write erase all
Switch will be factory defaulted. All the configuration and databases will be deleted. Press ‘y’ to proceed : y
Do you really want to restart the system(y/n): y
There are 3 methods of restoring system defaults.
Restoring Factory Defaults:
This option will reset all system settings, including the Setup Console password. To restore factory defaults, use the following CLI command:
SGOS# restore-defaults factory-defaultsRetaining Console Settings:
This option will retain settings like console username and password, front panel pin number, console enable password, SSH host keys, keyrings used by secure console services, RIP configurations, IP address, MTU size, TCP round trip time, and static routes. To restore defaults while retaining console settings, use the following CLI command:
SGOS# restore-defaults keep-consoleRestoring Defaults through the Management Console:
If you restore defaults through the Management Console, you will lose most settings because there is no “keep console” option. To restore defaults through the Management Console, select Maintenance > General, click the Restore button, then click OK to confirm.
System configuration has been modified. Save? [yes/no]: n
Proceed with reload? [confirm]
VLAN Name Status Ports
—- ——————————– ——— ——————————-
1 default active Fa0/1, Fa0/2, Fa0/3, Fa0/4
Fa0/5, Fa0/6, Fa0/7, Fa0/8
Fa0/9, Fa0/10, Fa0/11, Fa0/12
Fa0/13, Fa0/14, Fa0/15, Fa0/16
Fa0/17, Fa0/18, Fa0/19, Fa0/20
Fa0/21, Fa0/22, Fa0/23, Fa0/24
10 OFFICE active
20 VOICE active
30 GUEST active
50 SERVERS active
100 MGMT active
200 TRANS active
900 NATIVE active
999 UNUSED active
1002 fddi-default act/unsup
1003 token-ring-default act/unsup
1004 fddinet-default act/unsup
1005 trnet-default act/unsup
(config)# configure factory-default 192.168.2.1 255.255.255.0
You must reset or power cycle for new config to take effect
rommon 2 > reset
Proceed with reload? [confirm]Cyberoam:
If you forget Web and Console password, type RESET as password in console
Please read this carefully:
You are about to reset the system back to factory default configuration.
* The new CLI password will be ‘admin’.
* All network interfaces will get up with the factory default configuration.
* Appliance registration will NOT be affected by this.
* Other firmware’s configuration will NOT be affected by this.
* Post reset, this will reboot the system.
1. Reset configuration
2. Reset configuration and signatures
3. Reset configuration, signatures and reports
Select Menu Number [0-3]: 1F5:
You may occasionally need to remove the current BIG-IP configuration and restore the system to the factory default setting. To do so, you can use the tmsh load sys config default command. The tmsh load sys config default command saves the currently-running configuration to the /var/local/scf/backup.scf file, and then loads the /defaults/defaults.scf file to restore the configuration to factory default settings.
Note: The tmsh load sys config default command retains certain configuration elements such as those that are necessary to maintain basic administrative functionality.
When you restore the BIG-IP configuration to factory default settings, the system performs the following tasks:
Removes all BIG-IP local traffic configuration objects
Removes all BIG-IP network configuration objects
Removes all non-system maintenance user accounts
Retains the management IP address
Removes system maintenance user account passwords (root and admin)
Retains the BIG-IP license file
Retains files in the /shared partition
Retains manually-modified bigdb database variables
To restore the BIG-IP configuration to the factory default setting, perform the following procedure.
Restoring the BIG-IP configuration to the factory default setting
Impact of procedure: This procedure removes all BIG-IP local traffic and network configuration objects.
(tmos)#load sys ucs test.ucs no-license
# execute factoryreset
To restore the factory default configuration using the console, execute the erase startup-config command from the console command prompt.
root@host# load factory-default
root@host# set system root-authentication plain-text-password
root@host# commit and-quit
root@host> request system rebootMikrotik[admin@MikroTik] >/system reset-configurationMikrotik:
[admin@MikroTik] >/system reset-configurationPaloAlto:
1. Connect Console cable (9600,8,n,1) to Console port
2. Power on or reboot device
3. During the boot sequence, the screen should look like this
4. Type maint to enter maintenance mode.
5. In maintenance mode, this should appear on the screen:
6. Press enter and this menu should appear
7. Select Factory Reset and press enter:
1. set your pc ip to 192.168.168.20 and connect ethernet cable to LAN
2. Unfold a paperclip and insert the end of the object into the hole where the reset button resides. The hole is located on the back of the appliance, usually positioned by the power switch or indicator lights.
Push and hold the reset button for 10 seconds, then navigate to http://192.168.168.168 in a web browser to reconfigure the appliance
Click the boot icon by “Current Firmware with Factory Default Settings” to restore the SonicWALL to its original configuration.
If the web-based configuration page prompts you to log in to the appliance, enter “admin” (without the quotations) into the Username field and “password” (without the quotations) into the Password field
Please login using console with a serial cable (e.g. you must be infront of the controller):
Login : password
1. Connect Console cable
2. Reboot the router and press the Break key to interrupt the boot sequence.
For break key sequences
|Software||Platform||Operating System||Try This|
|Hyperterminal||IBM Compatible||Windows XP||Ctrl-Break|
|Hyperterminal||IBM Compatible||Windows 2000||Ctrl-Break|
|Hyperterminal||IBM Compatible||Windows 98||Ctrl-Break|
|Hyperterminal (version 595160)||IBM Compatible||Windows 95||Ctrl-F6-Break|
|MicroPhone Pro||IBM Compatible||Windows||Ctrl-Break|
|Minicom||IBM Compatible||Linux||Ctrl-a f|
|ProComm Plus||IBM Compatible||DOS or Windows||Alt-b|
|Telnet||N/A||N/A||Ctrl-], then type send brk|
|Telnet to Cisco||IBM Compatible||N/A||Ctrl-]|
|Tip||Sun Workstation||UNIX||Ctrl-], then Break or Ctrl-c|
|VT 100 Emulation||Data General||N/A||F16|
|Windows NT||IBM Compatible||Windows||Break-F5|
|Shift-6 Shift-4 Shift-b (^$B)|
|N/A||Break-Out Box||N/A||Connect pin 2 (X-mit) to +V for half a second|
|Cisco to aux port||N/A||Control-Shft-6, then b|
rommon 1 > confreg 0x2142
You must reset or power cycle for new config to take effect
rommon 2 > reset
4. Change the password
Type no after each setup question, or press Ctrl-C in order to skip the initial setup procedure
Router# copy startup-config running-config
Destination filename [running-config]? (hit enter)
Router# configure terminal
Router(config)# enable password cisco
Router(config)# enable secret cisco
Router(config)# line console 0
Router(config-line)# password cisco
Router(config)# username cisco privilege 15 secret cisco
Router(config)# config-register 0x2102
Router# copy running-config startup-config
Destination filename [startup-config]? (hit enter)
Netscaler MPX / VPX
Now from time to time you might come by this, you have a customer which has a Netscaler setup and they have forgotten the password for the device. What do you do ?
If you have a MPX you need to connect to the device using a serial cable and use for instance Putty to connect to the serial port. If you have an VPX you just need to open the console. Now when the device boots you need to press CTRL + C now on the VPX it is simple the boot menu appears
Then you just press 4 and go into single user mode. On the MPX we have to press CTRL + C simultaneously as well when the following appears in the console
Press [Ctrl-C] for command prompt, or any other key to boot immediately.
Booting [kernel] in 2 seconds…
Now to start the MPX in single-user mode you have to type either boot –s or reboot — -s torestart in single user mode. When you are in single user mode the console will look like this.
Next we have to mount the flash device since this is where the config file resides. Now on different devices this flash device has different nameshttp://support.citrix.com/article/CTX121853
For VPX this device is called /dev/ad0s1a
So first we have to check disk consistency first before we can mount the device.
fsck /dev/da0s1a (This checks disk consistency)
mount/dev/da0s1a/flash (This mounts the drive under the folder /flash )
df –l (List the devices and where they are mounted)
Next we need to change directory to the flash drive where the config file is located.
cd /flash/nsconfig from there
Next we use a grep command to create a new config file but without the line which contains the passoword string.
grep –v “set system user nsroot” ns.conf > new.conf
Next we need to rename the current config to another name
mv ns.conf old.ns.conf
mv new.conf ns.conf
After this is done we have a new config file without the password for nsroot and we can reboot.
At the boot screen, you will see “SYSLINUX 4.02 … Boot:”, write to the next “menu.c32”
Secondly, you can see a blue window. Move to “xe-serial” and press “tab”
Now, you can read command line start with “mboot.c32…..”. You have to change this part of the line “xencons=hvc console=hvc0” and write “console= ttySO,115200n8 single”.
And press “Enter”, the server continue the starting process.
Then you can see the command line interface, write “passwd” to change your root password
1. Connect Console cable and launch putty
2. Power on Cyberoam and continously press Enter until you see CRLoader
You are navigated to CRLoader screen. Go to Option 0 – CRLoader and Press Enter
Select Option 2 – Troubleshoot
Select Option 1 – Reset console password
This would reset the admin user password. Press “Ok” to continue
Select Option 5 – Reboot. This will reboot the appliance
Once Cyberoam is rebooted, Enter the Default Password as “admin” and then CLI access will be available
1. When booted press e
2. Change i.e
1. Press Clear hole for 10s
Once you release the “Clear” button, only the password protection will be removed. All other configuration settings will remain intact, and the switch will not reboot
If you would like to disable the clear password button on the front of the HP Procurve switch then enter the following
Switch(config)# no front-panel-security password-clear
You will also notice the reset button next to the clear button. To disable this button enter the following.
Switch(config)# no front-panel-security factory-reset
Both buttons are now disabled.If you would like to enable these buttons again, do so with the commands below.
Switch(config)# front-panel-security password-clear
Switch(config)# front-panel-security factory-reset
Switch(config)# show front-panel-securityJuniper:
1. Connect your Console cable with settings 9600/8/N/1
2. Power on the device and watch the screen for the line:
Hit [Enter] to boot immediately, or space bar for command prompt.
When you see that line, hit the SPACE BAR and you will receive an OK prompt.
3. At the OK prompt, you want to the system into single user mode by issuing the command
5. The system will then boot and run a recovery script and place you in at the > prompt
Reboot the system? [y/n] yRuckus:
Press Hard Reset hole in the back of AP for >12s
If you have a saved ZoneDirector backup or debug log, contact Ruckus Tech Support, who may be able to decipher the admin password from your files. Ruckus Technical Support will need to validate you are the legal administrator of the device before doing this.
-Download Live CD from
or Ubuntu Desktop
1. Insert the CD or ISO
2. Boot ESXi from either CD above
In Dell is by pressing F2 on boot
If your ESXi is under VMWare Workstation, then click VM > Power > Power On to BIOS
3. if you using Ubuntu, click Try Ubuntu instead of Install Ubuntu.
If you using Kali Linux, you can see desktop right away
4. open Terminal
#mount /dev/sda5 /mnt
#cp /mnt/stage.tgz /tmp
#tar xzf state.tgz
#tar xzf local.tgz
this is just example
#tar czf local.tgz etc
#tar czf state.tgz local.tgz
#cp state.tgz /mnt
remove the cd
Now you can login using vSphere client as root without password