Question : Breaking into a 1912 Cisco Switch

Dear experts,

I have inherited an old 1900 switch.  I want to use it on my network and I am being asked for a password.

I also am getting a message for Failed POST test : 4

My question is two fold I guess.

One: How to zero this switch out to start from the beginning to add a password and IP address?

Two: What could be causing the Failed POST and do you know of way to fix the issue?

I appreciate the time and effort.  I will keeping looking on Cisco's site but I am having trouble finding the answer.

Reggie

Answer : Breaking into a 1912 Cisco Switch

hi there

http://www.cisco.com/en/US/products/hw/switches/ps574/products_password_recovery09186a00800a6c79.shtml (this is for the Password recovery)

http://www.cisco.com/en/US/products/hw/switches/ps574/products_installation_and_configuration_guide_chapter09186a008007ec2c.html (this is for the undersanding of failed POST)

here is what they tell us at Cisco:

1. Disconnect the power cord from the rear panel.

2. Press and hold the LED Mode button on the front panel.

3. While holding the LED Mode button, reconnect the power cord.

Release the LED Mode button one or two seconds after the LED above port 1x goes off. You will see the Diagnostic Console Logon screen as shown below:

Cisco Systems Diagnostic Console
Copyright(c) Cisco Systems, Inc. 1999
All rights reserved.


Ethernet Address: 00-E0-1E-7E-B4-40
-------------------------------------------------

Press Enter to continue.

Press Enter to display the Diagnostic Console - Systems Engineering menu.

You will see the following Systems Engineering menu:

Diagnostic Console - Systems Engineering
Operation firmware version: 8.00.00 Status: valid
Boot firmware version: 3.02
[C] Continue with standard system start up
[U] Upgrade operation firmware (XMODEM)
[S] System Debug Interface
Enter Selection:

The bold letters above show the Boot firmware version. In the example shown above, it is 3.02.
Firmware Version 1.10 and Later

Note:  If the shipping date is before June 1997, please refer to the Firmware Version 1.09 and Earlier section of this document, and contact the Cisco Technical Assistance Center (TAC) for password recovery.
Clearing the Password

To clear your password, follow the steps below:

Power-cycle the switch.

After POST completes, the following prompt displays:

Do you wish to clear the passwords? [Y]es or [N]o:

Note: You have ten seconds to respond. If you don't respond within that time, the Management Console Logon screen is automatically displayed. You cannot change this waiting period.

Enter [Y]es to delete the existing password from Nonvolatile RAM (NVRAM).

Note: If you type [N]o, the existing password remains valid.

Assign a password from the switch management interfaces (management console or Command Line Interface (CLI)).
Viewing the Password

For firmware versions between 1.10 and 3.02, you can view the password you are trying to recover (instead of clearing it as described in the previous section).

Access the Diagnostic Console - Systems Engineering menu using the same procedure shown earlier

Disconnect the power cord from the rear panel.

Press and hold the LED Mode button.

While holding the LED Mode button, reconnect the power cord.

Release the LED Mode button one or two seconds after the LED above port 1x goes off.

You will see the following logon screen:

-------------------------------------------------
Cisco Systems Diagnostic Console
Copyright(c) Cisco Systems, Inc. 1999
All rights reserved.
 

Ethernet Address: 00-E0-1E-7E-B4-40
-------------------------------------------------

Press Enter to continue.

Press Enter to display the Diagnostic Console - Systems Engineering menu. You will see the following Systems Engineering menu:

Diagnostic Console - Systems Engineering

Operation firmware version: 8.00.00 Status: valid

Boot firmware version: 3.02

[C] Continue with standard system start up

[U] Upgrade operation firmware (XMODEM)

[S] System Debug Interface

Enter Selection:

Select [S] from the Diagnostic Console - Systems Engineering menu to display the System Debug Interface Menu. You can use this menu to display the factory-installed management console password and to reset the management console RS-232 interface or the entire switch to the factory defaults

Diagnostic Console - System Debug Interface

[G] Generic I/O

[M] Memory (CPU) I/O

[F] Return system to factory defaults

[R] Reset main console RS232 interface to 9600,8,1,N

[V] View Management Console password

[X] Exit to Previous Menu

Enter Selection:

Select [V] from the Diagnostic Console - System Debug Interface menu to display the management console password. The password will be displayed as shown below:

The current management console password is: CISCO

Now you can use the option [X] to return to the Diagnostic Console - Systems Engineering menu, and then use [C] to continue with the standard system startup which will take you to the User Interface menu. If you want to change the password, select the [M] (Modify password) option on the Console Settings menu. The system will ask you to enter the old password, and then the new password.
Firmware Version 1.09 and Earlier

Note: If the shipping date is before June 1997, please gather the information listed in this section, and contact the Cisco Technical Assistance Center (TAC) for password recovery.

Note: This section is also applicable for those Catalyst 2800 switches that do not have the Mode button in their front panel.

To recover your password, follow the steps below:

Contact the Cisco TAC for the factory-installed password. For security reasons, the factory-installed passwords are not made available on the Cisco web site.

Provide the serial number and/or Media Access Control (MAC) address of the switch.

The serial number is usually located on the back of the unit. To obtain the MAC address, remove the cover and read the Ethernet address of the Programmable Read-Only Memory (PROM).
Catalyst 1700, 2100 and 2800

There is no standard password recovery procedure for the Cisco Catalyst 1700, 2100 and 2800 products. If you forget the password, the Cisco device can be accessed by using the factory-installed password. Once you gain access to the device using the factory-installed password, you can change the password to a known password.

Note: This section is also applicable for those Catalyst 2800 switches that do not have the LED Mode button in their front panel

To recover your password, follow the steps below:

For security reasons, the factory-installed passwords are not made available on the Cisco web site. Contact the Cisco TAC for the factory-installed password.

Provide the serial number and/or Media Access Control (MAC) address of the switch.

The serial number is usually located on the back of the unit. To obtain the MAC address, remove the cover and read the Ethernet address of the Programmable Read-Only Memory (PROM).
Random Solutions  
 
programming4us programming4us