Skip to main content

FOS Password recovery (Brocade Fabric OS Switch Password recovery procedure)

Password recovery using root account
If you have access to the root account, you can reset the passwords on the switch to default. This
feature is available for all currently supported versions of the Fabric OS.

Follow the below steps to reset any account password from the root account.

1. Open a CLI session (serial or telnet for an unsecured system and sectelnet for a secure system)
to the switch.
2. Log in as root.
3. At the prompt, enter the passwddefault command as shown below:
switch:root> passwddefault
4. Follow the prompts to reset the password for the selected account. For example:
switch:root> passwddefault

All account passwords have been successfully set to factory default.
Once the passwords have been reset, log into the switch as admin, and modify your default
passwords. Make sure to keep a hardcopy of your switch passwords in a secure location. The
default passwords for Fabric OS switches are:

Root fibranne
Adminpassword
Userpassword

Password recovery using the boot PROM interface
NOTE
There are two boot ROM environments, the original ““440”” processor types and the newer Freescale
processor type (uses U-Boot). In addition to this, the Linux kernel was originally maintained on
separate hardware chips (uses the references to MEM()0xF00000000 and was used on older
products). Newer products place the kernel on the compact flash and this is a reference to
ATA()0xb689f type structures. We also moved to a new boot environment with the newer products.

We have the following types of combinations:

1. Password recovery using the MEM()0xF0000000 (and original boot ROM):
•• Brocade 3250, 3850, 3900, 4100, 12000, 24000, 48000
2. Password recovery using the ATA()0xa64g (and original boot ROM):
•• Brocade 200E, 4900, 5000, 7500, 7600
3. Password recovery using the ATA()0xa64g (and new U-Boot ROM):
Fabric OS Password Recovery Notes 3
53-1000114-02 Rev. A
Password recovery on Fabric v4.x, v5.x, and v6.x 1
DRAFT: BROCADE CONFIDENTIAL
•• Brocade 300, 5100, 5300, DCX, DCX-4S, BES

NOTE
This procedure is disruptive to traffic on the 3250, 3850, 3900 and 4100 switches, because it
requires you to reboot the switch; traffic resumes after the switch is rebooted. On a Brocade 12000,
24000, or 48000 director, you can reset the passwords without disruption by performing this
procedure on the standby CP.
NOTE
If you are attempting to recover passwords for Fabric OS v4.4.0, you must review ““Password recovery
for Fabric OS v4.4.0”” on page 6 prior to beginning this procedure.

Password recovery procedure: quick reference

1. hit escape during reboot
2. choose option: 3
3. printenv
4. boot ATA()0x77588 -s
Choose first option under OSLoader
5. mount -o remount,rw,noatime /
6. mount /dev/hda1 /mnt
Choose second partition under OSRootPartition
7. /sbin/passwddefault

8. reboot -f

Detailed procedure

If you know the Boot PROM password or none was set on your system, use this procedure to reset the passwords to default values on the switch or director. The current Fabric OS level of the switch or director must be v4.1 or greater.

1. Connect to the serial console port of the switch (3250, 3850, 3900 or 4100) or the standby CP of a director ( 12000, 24000, or 48000). Use the hashow command to see which CP is active and which is standby.

2. Enter the reboot command.
3. Press ESC at the message ““Press escape within 4 seconds...”” The Boot PROM menu is
displayed with the following options:
•• Start system
Used to reboot the system.

•• Recover password.

Comments

  1. i have a problem someone can help .I have a solaris 11 i want to install some packages like apptrace but error appeared
    ************ "Unable to contact any configured publishers.
    This is likely a network configuration problem.
    Framework stall:
    URL: 'http://pkg.oracle.com/solaris/release'. (happened 4 times)"************

    ReplyDelete

Post a Comment

Popular posts from this blog

memory error detect XSCF uboot

If you see something like this when you poweron you server: memory error detect 80000008, address 000002d0 data 55555555 -> fbefaaaa capture_data hi fbefaaaa lo deadbeef ecc 1b1b capture_attributes 01113001 address 000002d0 memory error detect 80000008, address 000002d4 data aaaaaaaa -> deadbeef capture_data hi fbefaaaa lo deadbeef ecc 1b1b capture_attributes 01113001 address 000002d4 memXSCF uboot  01070000  (Feb  8 2008 - 11:12:19) XSCF uboot  01070000  (Feb  8 2008 - 11:12:19) SCF board boot factor = 7180     DDR Real size: 256 MB     DDR: 224 MB Than your XSCF card is broked. Replace it with new one. After that it will ask you for enter chassis number - located at front of the server XSCF promt to enter your chasses number ( is a S/N of your server ): Please input the chassis serial number : XXXXXXX 1:PANEL Please select the number : 1 Restoring data from PANEL to XSCF#0. Please wait for several minutes ... setdefaults : XSCF clear : start ......

SPARC OBP cheatsheet

Boot PROM Basics Boot PROM(programmable read only memory): It is a firmware (also known as the monitor program) provides: 1. basic hardware testing & initialization before booting. 2. contains a user interface that provide access to many important functions. 3. enables the system to boot from wide range of devices. It controls the system operation before the kernel becomes available. It provides a user interface and firmware utility commands known as FORTH command set. These commands include the boot commands, the diagnostic commands & the commands for modifying the default configuration. Command to determine the version of the Open Boot PROM on the system: # /usr/platform/'uname -m'/sbin/prtdiag -v (output omitted) System PROM revisions: ---------------------- OBP 4.16.4 2004/12/18 05:21 Sun Blade 1500 (Silver) OBDIAG 4.16.4.2004/12/18 05:21 # prtconf -v OBP 4.16.4 2004/12/18 05:21 Open Boot Architectures Standards: It is based on IEEE standard #1275, accord