Step 1 Establish a console connection to the device and open a terminal session./ C& U# P5 [; r# k N9 Q' K
3 w. R- ]/ `. B4 Y
Step 2 Reboot the device.; g" i6 w# h$ B0 |, c9 @, Y# x0 q
5 {7 K* q, ] l$ K: |While the device is rebooting, watch for the following prompt, then press Enter when you see it:
/ }" H0 `" W B! A5 x# M
. `/ @6 y8 H6 w# K7 t0 W" x Cisco WAAS boot:hit RETURN to set boot flags:0009) c! ?7 r% v' L( m! l3 I
' K8 M$ `4 K2 h1 W: EStep 3 When prompted to enter bootflags, enter the following value: 0x8000
6 \, u9 q. Z# K6 H# ^
5 k1 Z, }# p+ J2 w$ t7 BFor example:
1 d* F( Q; w2 i: f! y, B7 q5 X1 ^2 m6 m/ y4 I0 m! n* e: Q6 W
Available boot flags (enter the sum of the desired flags):
7 A* W/ G' m2 ]! f- |& n0 t 0x4000 - bypass nvram config) y) E$ l3 m% r1 U, t
0x8000 - disable login security3 h9 D8 g# G L3 g6 n& g5 P
7 c% a5 o0 k2 N( G3 s+ E' u9 h7 G [CE boot - enter bootflags]:0x8000- y1 b1 r* p4 l- q
You have entered boot flags = 0x8000) [4 \' K9 X( N2 }) A
Boot with these flags? [yes]:yes9 {+ g( H6 ~- z- d6 g6 Q+ z* i
7 f2 |6 k: F3 @5 ` w [Display output omitted]
0 L/ ?0 F7 G+ n) z: \" T2 N Setting the configuration flags to 0x8000 lets you into the system, bypassing all T a R! v0 Y8 X% g
security. Setting the configuration flags field to 0x4000 lets you bypass the NVRAM 8 c) e9 y* d; r |2 R! |
configuration.9 U0 A# @" |5 W$ X5 s
6 N+ t+ L" d1 c4 n
Step 4 When the device completes the boot sequence, you are prompted to enter the username to access the CLI. Enter the default administrator username (admin).
2 k" }5 C5 D2 s% c8 ?
7 M4 A# j7 j! Y0 ]' r; ~ Cisco WAE Console
( A2 x' z$ A5 v5 d: {
$ q" e1 e; P2 f Username: admin! r3 @" m( q- S" D- r+ _8 {1 ]) I
8 a1 w# A( M7 R* T) E8 f' t2 E
Step 5 When you see the CLI prompt, set the password for the user using the username password command in global configuration mode.
# m! u9 ]8 ]3 a" n1 R7 |6 u2 T, D
WAE# configure. L' G! {9 B% p6 j& F+ B
WAE(config)# username admin password 0 password, z6 m' x5 x7 T; i/ x- E% r9 w
# g$ y/ U" R) x) V2 K$ W$ OYou can specify that the password be either clear text or encrypted.- ]) f1 ~+ B. D _8 s" m4 q( K
! B! o3 {$ {5 z' V. g/ Z; G( `
5 u9 X `" i. @8 ]: U! {
Note Do not set the user ID (uid).
: ~! `( z" ]0 p o( P3 h9 Y, W! X& ?& l8 d3 e
Step 6 Save the configuration change by using the write memory command in EXEC mode.% ?& B. _* e( v- w1 z
$ R( G' _0 ~% X/ `+ Y
WAE(config)# exit
n0 Z- q. M* W/ F" k WAE# write memory
: `* O# M" ^3 l0 Q. g, X/ E
) J; v( A9 }$ T! h: IStep 7 (Optional) Reboot your device by using the reload command.
8 l/ ]* n5 j$ b- [, f; p* o
1 p/ N$ c" [/ F8 G# V- t WAE# reload+ U- ?2 \: [) a4 B8 |9 f) [9 G
+ H- `/ L( D4 E- M% t( a2 Z( ]
Rebooting is optional; however, you might want to reboot to ensure that the boot flags are reset, and to ensure that subsequent console administrator logins do not bypass the password check.
3 b( E6 v* {! ~9 Y t7 y- n) P2 ? Z" T% \+ o" n" o9 @5 k: K% Z
Z; P4 d5 R, I" E9 H- k, D# T
Note In WAAS software, the bootflags are reset to 0x0 on every reboot. |