failsafe acccount default username and password

  • 0
  • 1
  • Question
  • Updated 3 years ago
Hi all,

what is the default username and password of failsafe account. I have x440 switch. I forget the admin password. also when I access to bootroom I can't find the "config none command"

please advise how I can recover my access to this switch

Thanks in advance
Husam
Photo of Husam

Husam

  • 1,272 Points 1k badge 2x thumb

Posted 3 years ago

  • 0
  • 1
Photo of Burak Kale

Burak Kale

  • 280 Points 250 badge 2x thumb
Hi;

If the device has different version of bootrom , config none command may not work. You can try installing different version of bootrom. There is a link below in the community about this.

Regards,

Burak.

----

In switch is running with bootrom 2.0.2.1, config none command may not work.

In this case, you have to download new software from bootrom.

1) TFTP server should be connected to mgmt port

2) To configure Ip address " configip ipaddress <ipaddress/mask> gateway <ipaddress>

3) type via CLI: download image <ipaddress> <filename>

{NOTE: ipaddress is TFTP server; filename is XOS image being downloaded}.


https://community.extremenetworks.com/extreme/topics/how_do_you_reset_a_summit_x450a_24t_to_factory_...


Photo of Zelnosky, Kevin

Zelnosky, Kevin, Employee

  • 1,124 Points 1k badge 2x thumb
Also, there is no "default" Username and Password for a failsafe account.  The failsafe account is configured by the user, so if this has not been done there will be no failsafe account.

Like Burak stated above, your best bet is to upgrade the bootrom and do config none to be able to TFTP your old config off and zero out the password (that is if you care about keeping the old config).
Photo of Brandon Clay

Brandon Clay, Escalation Support Engineer

  • 13,280 Points 10k badge 2x thumb
There is one more option, and that is to create an autoexec.xsf file to create a temp account to login with. Then you can use this account to login, delete the account with the unknown password, and then create it again with a known password.

You can find a knowledge article describing this here.