Cisco Cisco IPS 4255 Sensor
38
Release Notes for Cisco Intrusion Prevention System 7.0(1)E3
OL-18483-01
Caveats
Troubleshooting Password Recovery
To troubleshoot password recovery, pay attention to the following:
•
You cannot determine whether password recovery has been disabled in the sensor configuration
from the ROMMON prompt, GRUB menu, switch CLI, or router CLI. If password recovery is
attempted, it always appears to succeed. If it has been disabled, the password is not reset to cisco.
The only option is to reimage the sensor.
from the ROMMON prompt, GRUB menu, switch CLI, or router CLI. If password recovery is
attempted, it always appears to succeed. If it has been disabled, the password is not reset to cisco.
The only option is to reimage the sensor.
•
You can disable password recovery in the host configuration. For the platforms that use external
mechanisms, such as the AIM IPS and the NME IPS bootloader, ROMMON, and the maintenance
partition for the IDSM2, although you can run commands to clear the password, if password
recovery is disabled in the IPS, the IPS detects that password recovery is not allowed and rejects the
external request.
mechanisms, such as the AIM IPS and the NME IPS bootloader, ROMMON, and the maintenance
partition for the IDSM2, although you can run commands to clear the password, if password
recovery is disabled in the IPS, the IPS detects that password recovery is not allowed and rejects the
external request.
•
To check the state of password recovery, use the show settings | include password command.
•
When performing password recovery on the IDSM2, you see the following message:
Upgrading
will wipe out the contents on the storage media
. You can ignore this message. Only the
password is reset when you use the specified password recovery image.
For More Information
•
For more information on reimaging sensors, refer to
•
For the procedure for disabling password recovery, see
.
•
For the procedure for verifying the state of password recovery, see
Caveats
This section lists the resolved and known caveats, and contains the following topics:
•
•
Resolved Caveats
The following known issues have been resolved in the 7.0(1)E3 release:
•
CSCsj40623—4260/4270 quad copper hw bypass has problems linking < 1000Mbps
•
CSCsq51372—IPS:6.1.1 Iplogging out of file descriptors warning should be summarized
•
CSCsu24412—Cisco.com update leaves open https connection
•
CSCsu88701—correct checking for SigEventList NULL error message
•
CSCsv49498—ASA loses connectivity with the SSM (IPS)
•
CSCsv66660—sensorApp abort during database hashtree expire
•
CSCsv75021—event-count and alert-interval does not work correctly
•
CSCsv80568—Tuning sig 1610.0 locks up the SSM
•
CSCsw14574—smbadvanced abort in processdecodedtcpmessage