Cisco Cisco IPS 4255 Sensor
34
Release Notes for Cisco Intrusion Prevention System 6.1(1)E2
OL-19696-01
Caveats
Troubleshooting Password Recovery
To troubleshoot password recovery, pay attention to the following:
•
You cannot determine whether password recovery has been disabled in the sensor configuration
from the ROMMON prompt, GRUB menu, switch CLI, or router CLI. If password recovery is
attempted, it always appears to succeed. If it has been disabled, the password is not reset to cisco.
The only option is to reimage the sensor.
from the ROMMON prompt, GRUB menu, switch CLI, or router CLI. If password recovery is
attempted, it always appears to succeed. If it has been disabled, the password is not reset to cisco.
The only option is to reimage the sensor.
•
You can disable password recovery in the host configuration. For the platforms that use external
mechanisms, such as the AIM IPS bootloader, ROMMON, and the maintenance partition for
IDSM2, although you can run commands to clear the password, if password recovery is disabled in
the IPS, the IPS detects that password recovery is not allowed and rejects the external request.
mechanisms, such as the AIM IPS bootloader, ROMMON, and the maintenance partition for
IDSM2, although you can run commands to clear the password, if password recovery is disabled in
the IPS, the IPS detects that password recovery is not allowed and rejects the external request.
•
To check the state of password recovery, use the show settings | include password command.
•
When performing password recovery on IDSM2, you see the following message:
Upgrading will
wipe out the contents on the storage media
. You can ignore this message. Only the password
is reset when you use the specified password recovery image.
For More Information
•
For more information on reimaging sensors, refer to
•
For the procedure for disabling password recovery, see
.
•
For the procedure for verifying the state of password recovery, see
Caveats
This section describes the Bug Toolkit, lists the resolved and known caveats, and contains the following
topics:
topics:
•
•
•
•
Bug Toolkit
For the most complete and up-to-date list of caveats, use the Bug Toolkit to refer to the caveat release
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those
groups with new defect alerts.
note. You can use the Bug Toolkit to search for known bugs based on software version, feature set, and
keywords. The resulting matrix shows when each bug was integrated, or fixed if applicable. It also lets
you save the results of a search in Bug Groups, and also create persistent Alert Agents that can feed those
groups with new defect alerts.
Note
You must be logged in to Cisco.com to access the Bug Toolkit.
If you are a registered Cisco.com user, you can view the Bug Toolkit at this URL: