Vro password recovery:
1. Enter show version in user mode and write down the original value of the configuration register. For example, 0X2102
2. Turn off the vro power, connect the vro to the vswitch using the console line, and open the Super Terminal.
3. Power on the vro and press the Break Key within 60 seconds to enable the vrommon mode.
4. Enter confreg 0x2142 in rommon 1>, boot from Flash, but do not load the configuration file
5. Enter reset in rommon2>, the router restarts, and ignore the configuration file to save.
6. enter no to skip the dialog mode.
7. Enter enable in user mode to enter privileged Mode
8. Input copy startup-config running-config to copy the configuration file from NVRAM to the memory.
9. Enter show run to view unencrypted passwords.
10. Enter configure terminal to enter global mode.
11. Enter enable secret to change the password. You can also change the telnet password in vty line mode.
12. Go to each interface and enter no shutdown to enable each interface.
13. Enter config-register 0x2102 to restore the configuration register value and exit global mode to privileged mode.
14. Enter copy running-config startup-config to save the configuration file to NVRAM. Modified
Vswitch password recovery:
⒈ Connects the console port of the vswitch to the terminal or the PC simulation terminal. Use a direct connection without Modem to connect the serial port of the PC to the console port of the switch.
⒉ First press the mode key on the switch panel, and then turn on the power.
⒊ Initialize flash.
> Flash_init
⒋ Rename the configuration file containing password.
> Rename flash: config. text flash: config. old <BR>
⒌ Start the vswitch.
> Boot
Secret enters the privileged mode.
> Enable
When the instance is started, the password is ignored.
# Rename flash: config. old flash: config. text
Copy the configuration file to the current system.
# Copy flash: config. text system: running-config
Modify the password.
# Configure terminal
# Enable secret
⒑ Save the configuration.
# Write