Step 1 Establish a console connection to the device and open a terminal session./ j0 R- l7 K. c+ t
" Y( t S% Q8 h8 g/ k
Step 2 Reboot the device.8 x0 q: L/ O1 D: a8 D& b
- w7 f& ^% Q4 `6 \+ c& o. iWhile the device is rebooting, watch for the following prompt, then press Enter when you see it:/ A; l5 t1 Q5 ]! v J% D
6 g/ ]& a# U/ v: l. K
Cisco WAAS boot:hit RETURN to set boot flags:0009# K8 v2 t$ \0 e. b2 X: j$ K
1 ^% O% l: y. q; _Step 3 When prompted to enter bootflags, enter the following value: 0x8000. Q1 V+ P' X* K
) |" g" K6 D% |3 p& P0 u3 W2 [
For example:
9 J1 M- E3 n. D1 \- K" c' v. I; v/ v$ e
+ C! ]2 O2 P7 W( X7 L Available boot flags (enter the sum of the desired flags):
, W E" w+ Z" W; a3 b. S, r 0x4000 - bypass nvram config
2 _! G4 U" Z4 h 0x8000 - disable login security
3 h6 h0 I* L. F. L % r, `) _/ M% W* C: z9 _
[CE boot - enter bootflags]:0x8000
: ~5 [% Q5 W7 C8 P# {- b You have entered boot flags = 0x80001 y" p0 ?: g( r3 u$ C# O& v% G
Boot with these flags? [yes]:yes% P% c8 ^4 b" W: w; Y
4 v R a3 W/ [
[Display output omitted]
5 ?( U7 N2 q8 ]7 k8 J b+ G5 y- Y Setting the configuration flags to 0x8000 lets you into the system, bypassing all
( o) Z3 g: o1 o" K# p, _( Q- Ssecurity. Setting the configuration flags field to 0x4000 lets you bypass the NVRAM
; ?# v# Y* T5 B. c; a" gconfiguration.* g+ l5 V8 J7 Z4 M* o+ m( q. O
5 u, r) r( C5 q* U& V* B
Step 4 When the device completes the boot sequence, you are prompted to enter the username to access the CLI. Enter the default administrator username (admin).2 j1 e5 `' E, H9 h1 i, } G
; z( e2 t1 g2 X. c1 z. t4 }
Cisco WAE Console- w& W& s5 O/ a: ~; r! J q
4 L1 p# q! C( D: n% `$ a Username: admin7 k! C' m3 _4 a& A
1 D P" I' d% o3 E3 Y& @( q
Step 5 When you see the CLI prompt, set the password for the user using the username password command in global configuration mode.
. |2 R" m) a1 D& @) n$ D x, R! I7 G2 H* P1 w% X, H% B. ]. d
WAE# configure
* Z/ d& r0 Y/ D" J% | WAE(config)# username admin password 0 password
2 a; C6 i* u( T7 M( A' S8 w) e: Y# h' b5 S" ^
You can specify that the password be either clear text or encrypted., q" D* i/ Q" h, _! j
( F- g7 A4 z1 @6 ^
/ e; Z- e# {4 D8 v6 U* S& O: GNote Do not set the user ID (uid).
, M6 v( o; { {3 {/ J! }5 x [# f
2 }: K) l! S$ F0 cStep 6 Save the configuration change by using the write memory command in EXEC mode.0 s/ G: Q* w; {3 n
! Q8 C5 h) X+ A, u6 b! v( A2 n6 l
WAE(config)# exit
6 i: e( ^, h- ~, N' i WAE# write memory; A0 A' x$ i+ P& }5 x$ n6 Y2 U. Z; Y
$ _) k9 a. t5 `Step 7 (Optional) Reboot your device by using the reload command.
! \! G* X# }5 G% s& d9 g# ?+ M" A$ u1 c3 D- U
WAE# reload+ ~9 _% ?& c/ s' k+ V
6 l4 n! T# b2 J) [' P; qRebooting is optional; however, you might want to reboot to ensure that the boot flags are reset, and to ensure that subsequent console administrator logins do not bypass the password check.$ Y( ` P- s# X0 \' N' o/ h, }
: F( @# O1 |0 Q: D; Z# w
5 v; r" R- H6 u% c' ^Note In WAAS software, the bootflags are reset to 0x0 on every reboot. |