Binary Royale is an IT consultancy company based in the East Midlands. We spend all of our time with clients, helping them to make good decisions about their IT. When we come across issues that would be useful to others we “try” to post the answers on our website – www.binaryroyale.com . We cover Derby and Derbyshire, Nottingham and Nottinghamshire mainly, but do also have clients further afield. Please browse our website to see what we offer – thanks, and enjoy the blog
This post is part of a series on configuring Cisco ASA 5510 firewalls
The scenario: I recently acquired a used ASA 5510 from another internal department, but the login details had been lost along the way. So I had a perfectly functional firewall, but no way to reconfigure it to my needs. So, I needed a way to get into the ASA, and reset the password. Although, as the configuration that’s already there was of no use to me, I just removed the config entirely.
In brief, this process involves booting the appliance, and then interrupting the boot process part way through. We then change the configuration register, to force the appliance to ignore it’s saved config. The appliance then boots with a minimal basic configuration, and crucially for our needs, bypasses the unknown passwords allowing us in to reconfigure it. Once in we can erase the saved config (or just reset the password if you want the config) reset the configuration register to it’s original value, and reboot the appliance – simple!
- Connect your console cable and make sure you can see the command prompt for the ASA – even if you can’t log in. You will need to stop the boot process early on, so you don’t want to be messing about trying to get the console to work while it’s booting, or you’ll miss your prompt, and have to start again.
- Power cycle the appliance – flick the power switch on the front off and on again.
- Watch the boot progress, and when prompted, press Esc to interrupt the boot and enter ROM Monitor mode. you should now see the rommon prompt:
- Enter the confreg command to view the current Configuration Register setting:
rommon #0> confreg
- The appliance will most probably have the default Configuration Register setting of 0×01. Answer no when it asks you if you want to change the Configuration Register setting.
- Change the Configuration Register to 0×41, which causes the appliance to bypass its saved config at boot:
rommon #1> confreg 0×41
- Reboot the appliance with the boot command:
rommon #2> boot
- The appliance bypasses its startup configuration. When it finishes booting, you should see the default prompt:
- Enter the enable command to enter Privileged Mode. The default password is blank, so when the appliance prompts you for a password, simply press return:
- Erase the startup config by issuing the write erase command:
ciscoasa# write erase
- Enter Configuration Mode:
ciscoasa# configure terminal
- Reset the Configuration Register to the default of 0×01:
ciscoasa(config)# config-register 0×01
- Exit from Configuration mode:
- Verify the Configuration Register settings by issuing the Show Version command:
ciscoasa# show version
- At the bottom of the output, you should see the Configuration Register settings: Configuration register is 0×41 (will be 0×1 at next reload)
- Save the settings by issuing the write command:
- Reboot the appliance:
- When the appliance reboots, it will have a basic factory default configuration, with a blank password.
You can now proceed to configure the firewall as necessary.