Cisco switch password configuration and clearing Cisco switch password configuration 1. set console password> enable # configure trminal (confing) # line console 0 secure console port ① (config-line) # password (cisco) Secure password (config-line) # login logs must not be small. console Password settings complete exit 2: set the global password enadle # configure terminal ② (config) # enable secret (class) login Password (config) # login global password settings complete exit www.2cto.com 3. set the remote login password enable # config terminal (config) # line vty 0 4 (0 4 is the port) ③ (config-line) # password (class) login Password (config-lline) # login Exit 4. Save the preceding Settings> enadle # copy running-config strat-config. crack the password of the Cisco switch. The hacker connects the console port of the switch to the terminal or the PC simulation terminal. Use a direct connection without Modem to connect the serial port of the PC to the console port of the switch. Supervisor needs to unplug the power first. Because there is no switch on the Cisco switch, we can only unplug the power. Next we need to press and hold the MODE button, and then plug in the power and other port indicators to kill and release supervisor to initialize flash.> Flash_init plugin rename the configuration file containing the password.> Rename flash: config. text flash: config. old restart start the switch.> Boot www.2cto.com into privileged mode.> Enable
When the instance is started, the password is ignored. # Rename flash: config. old flash: config. text upload copy configuration file to the current system. # Copy flash: config. text system: running-config ← modify the password. # Configure terminal # enable secret to save the configuration. # Write the password settings and password cracking commands.