Password Recovery for Cisco’s ASA 5505 Adaptive Security Appliance.

457

This blog will discuss how to reset the password on Cisco’s ASA 5505 Adaptive Security Appliance.  First I will assume you are using Cisco’s gudie for recovering your password located at http://www.cisco.com/en/US/docs/security/asa/asa71/configuration/guide/trouble.pdf .  Start at page 7 entited “Performing password Recovery for the ASA 5500 Series Adaptive Security Appliance.

I won’t copy what’s in Cisco’s guide but I’ll add the following:

1.  Below is what steps 4 – 8 actually look like on Cisco’s ASA 5505:

rommon #1> confreg

Current Configuration Register: 0x00000000

Configuration Summary:

boot ROMMON

Do you wish to change this configuration? y/n [n]: y

enable boot to ROMMON prompt? y/n [n]:

enable TFTP netboot? y/n [n]:

enable Flash boot? y/n [n]:

select specific Flash image index? y/n [n]:

disable system configuration? y/n [n]: y

go to ROMMON prompt if netboot fails? y/n [n]:

enable passing NVRAM file specs in auto-boot mode? y/n [n]:

disable display of BREAK or ESC key prompt during auto-boot? y/n [n]:

Current Configuration Register: 0x00000040

Configuration Summary:

boot ROMMON

ignore system configuration

Update Config Register (0x40) in NVRAM…

rommon #2>

Next reload the ASA by typing boot.

rommon #2> boot

Launching BootLoader…

Default configuration file contains 1 entry.

Searching / for images to boot.

Loading /asa722-k8.bin… Booting…

#############################################################################################################################################################################################################################################

256MB RAM

Total SSMs found: 0

Total NICs found: 10

88E6095 rev 2 Gigabit Ethernet @ index 09 MAC:

88E6095 rev 2 Ethernet @ index 08 MAC:

88E6095 rev 2 Ethernet @ index 07 MAC:

88E6095 rev 2 Ethernet @ index 06 MAC:

88E6095 rev 2 Ethernet @ index 05 MAC: 

88E6095 rev 2 Ethernet @ index 04 MAC: 

88E6095 rev 2 Ethernet @ index 03 MAC: 

88E6095 rev 2 Ethernet @ index 02 MAC: 

88E6095 rev 2 Ethernet @ index 01 MAC: 

y88acs06 rev16 Gigabit Ethernet @ index 00 MAC:

Licensed features for this platform:

Maximum Physical Interfaces : 8

VLANs : 3, DMZ Restricted

Inside Hosts : 10

Failover : Disabled

VPN-DES : Enabled

VPN-3DES-AES : Enabled

VPN Peers : 10

WebVPN Peers : 2

Dual ISPs : Disabled

VLAN Trunk Ports : 0

This platform has a Base license.

Encryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0)

Boot microcode : #CNlite-MC-Boot-Cisco-1.2

SSL/IKE microcode: #CNlite-MC-IPSEC-Admin-3.03

IPSec microcode : #CNlite-MC-IPSECm-MAIN-2.04

————————————————————————–

. .

| |

||| |||

.|| ||. .|| ||.

.:||| | |||:..:||| | |||:.

C i s c o S y s t e m s

————————————————————————–

Cisco Adaptive Security Appliance Software Version )

 

****************************** Warning *******************************

This product contains cryptographic features and is

subject to United States and local country laws

governing, import, export, transfer, and use.

Delivery of Cisco cryptographic products does not

imply third-party authority to import, export,

distribute, or use encryption. Importers, exporters,

distributors and users are responsible for compliance

with U.S. and local country laws. By using this

product you agree to comply with applicable laws and

regulations. If you are unable to comply with U.S.

and local laws, return the enclosed items immediately.

A summary of U.S. laws governing Cisco cryptographic

products may be found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by

sending email to
This e-mail address is being protected from spambots. You need JavaScript enabled to view it
.

******************************* Warning *******************************

Copyright (c) 1996-2006 by Cisco Systems, Inc.

Restricted Rights Legend

Use, duplication, or disclosure by the Government is

subject to restrictions as set forth in subparagraph

(c) of the Commercial Computer Software – Restricted

Rights clause at FAR sec. 52.227-19 and subparagraph

(c) (1) (ii) of the Rights in Technical Data and Computer

Software clause at DFARS sec. 252.227-7013.

Cisco Systems, Inc.

170 West Tasman Drive

San Jose, California 95134-1706

Ignoring startup configuration as instructed by configuration register.

INFO: Converting to disk0:/

Type help or ‘?’ for a list of available commands.

ciscoasa>

2.  You should follow steps 9 – 12 exactly as in Cisco’s guide.

3.  I would like to add to Cisco’s step 13.  Cisco uses the command “password password” which should actually be “passwd password”.

4.  Cisco’s step 14 is where the fun begins!  Cisco says to type the command “config-register value” where value is the number you recorded in step 5.  THIS IS WRONG WRONG WRONG!!!!!.   If you follow Cisco’s step 14 and then step 15, yes you will have successfully reset your password, but if you reboot your ASA or loose power your ASA will stop at the ROMMON prompt (i.e. rommon #1>).  Instead, in step 14 you should type “config-register 0x10011″ and then precede to step 15.  Then, if you ever reboot you ASA or loose power, it should fully reboot and not be stuck at the rommon #1> prompt.

Hope this helps and happy routing/firewalling!