3COM in a very strange way to maintain the equipment they sold, that is the backdoor password, any of the following passwords are the highest permissions, you can set the device freely.
Corebuilder 6000/2500-username:debug password:synnet
Corebuilder 3500 (Version 1.0)-Username:debug password:synnet
Corebuilder 7000-username:tech Password:tech
Superstack II Switch 2200-username:debug password:synnet
Superstack II Switch 2700-username:tech Password:tech
Bay networks seems to feel that 3com is a good way to add a backdoor password "netics" to their 350 (and perhaps other models), something that has not been reported in the Accelar product line.
In addition to the switch, 3com also added the default password to the Access server, the username is "adm" and the password is blank.
In extreme cases, this can be used as a means of restoring passwords.
Fork to open some topic, I am using Nortel (Bay) switch, accidentally found almost all of the bay products have hidden mode, 350/450 is a click Ctrl-h or BACKSPACE key, you can enter the hidden Menu.
On Accelar 1100/1200, enter sh h and you'll see a list of some hidden commands, including a
Privilige command, you must have a RWA user login to execute later, after execution, you can enter a privileged mode,
The prompt also becomes *, and then you can enter "shell" to enter a special environment, see Help, are some debugging functions,
Oh, very interesting, I hope someone can continue to dig down. Http://go1.163.com/~watchsea/otherswi.htm