<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: RFS6000 lost admin password but SNMP works, possible to reset password? in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24951#M2300</link>
    <description>Yes, it is possible.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# snmpwalk -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x 1.3.6.1.4.1.388.50.1.3.19.5.1&lt;/STRONG&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.1.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = STRING: "admin"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.4.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = STRING: "superuser"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.5.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;where 172.16.x.x = ip address of WiNG controller&lt;BR /&gt;&lt;BR /&gt;so we can see one user with superuser role, admin = 5 char in OID&lt;BR /&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.1.7.100.101.102.97.117.108.116.5.97.100.109.105.110&lt;BR /&gt;where 100.101.102.97.117.108 = "default" in ascii, 5 = number of char in username and 97.100.109.105.110 = "admin" decimal number in ascii table&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;#&amp;nbsp;snmpset -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.5.97.100.109.105.110 s 80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98&lt;/STRONG&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = STRING: "80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98"&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;now for user "admin" password is = mysuperpassword&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;but if username is not default "admin" we need to make different string, not "80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98​"&lt;BR /&gt;&lt;BR /&gt;how to:&lt;BR /&gt;jump to any WiNG box (like VX9000_DEMO) and make user&lt;BR /&gt;vx9000-EA2320~&amp;gt;&lt;STRONG&gt;en&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320~#&lt;STRONG&gt;configure terminal&lt;/STRONG&gt;&lt;BR /&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;vx9000-EA2320(config)~#&lt;STRONG&gt;management-policy default&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;show context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user admin password 1 80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98 role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;user another password 0 mysuperpassword2 role superuser access all&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;no user admin&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;comm wr&lt;/STRONG&gt;&lt;BR /&gt;[OK]&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;sh context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user another password 1 c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07 role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;&lt;BR /&gt;now we have c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07&lt;BR /&gt;for user "another" and password "mysuperpassword2"&lt;BR /&gt;&lt;BR /&gt;change password for test&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;user another password 0 anotherpassword role superuser access all&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;comm wr&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;sh context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user another password 1 &lt;STRONG&gt;0acde8d461c979b40dedb7169e06119c7774a1df23ca292aaea195562aa09365&lt;/STRONG&gt; role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# snmpwalk -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x 1.3.6.1.4.1.388.50.1.3.19.5.1&lt;/STRONG&gt; &lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.1.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = STRING: "another"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.4.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = STRING: "superuser"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.5.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;change password over snmp&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# snmpset -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 s c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07&lt;/STRONG&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = STRING: "c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07"&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;now for user "another" password is = mysuperpassword2&lt;BR /&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;sh context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user another password 1 &lt;SPAN style="font-size: 14pt; color: #ff0000;"&gt;c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07 &lt;/SPAN&gt;role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;​​</description>
    <pubDate>Wed, 23 Mar 2022 10:13:00 GMT</pubDate>
    <dc:creator>alexx</dc:creator>
    <dc:date>2022-03-23T10:13:00Z</dc:date>
    <item>
      <title>RFS6000 lost admin password but SNMP works, possible to reset password?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24947#M2296</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
Client has lost their RFS6000 password, but I've determined that SNMPv3 access is working.  Is it possible to reset the admin password this way, if so, what SNMP element needs to be updated?&lt;BR /&gt;
&lt;BR /&gt;
Thanks!&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 21 Jun 2017 20:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24947#M2296</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-21T20:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: RFS6000 lost admin password but SNMP works, possible to reset password?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24948#M2297</link>
      <description>Hello Andrew,&lt;BR /&gt;
&lt;BR /&gt;
If lost, the password may only be reset from CLI either by using a temp password or via the console port using the reset/FactoryDefault credentials. &lt;BR /&gt;
&lt;BR /&gt;
In both cases, when a controller password is reset the config will be lost. &lt;BR /&gt;
&lt;BR /&gt;
Thank you,&lt;BR /&gt;
&lt;BR /&gt;
Chris</description>
      <pubDate>Wed, 21 Jun 2017 20:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24948#M2297</guid>
      <dc:creator>Christoph_S</dc:creator>
      <dc:date>2017-06-21T20:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: RFS6000 lost admin password but SNMP works, possible to reset password?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24949#M2298</link>
      <description>Hello Andrew,&lt;BR /&gt;
      What version is the RFS6000 currently running? Once I have this, I can check the RFS6000 MIB for that release and see if there is an OID to reset the admin password.  &lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Chris Frazee</description>
      <pubDate>Wed, 28 Jun 2017 00:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24949#M2298</guid>
      <dc:creator>Christopher_Fra</dc:creator>
      <dc:date>2017-06-28T00:00:00Z</dc:date>
    </item>
    <item>
      <title>RE: RFS6000 lost admin password but SNMP works, possible to reset password?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24950#M2299</link>
      <description>Version is 5.5.2.&lt;BR /&gt;
&lt;BR /&gt;
The MIB value  wingCfgMgmtAdminPassword OID  .1.3.6.1.4.1.388.50.1.3.19.5.1.3 looks promising, but when written doesn't work as expected.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 28 Jun 2017 00:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24950#M2299</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-28T00:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: RFS6000 lost admin password but SNMP works, possible to reset password?</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24951#M2300</link>
      <description>Yes, it is possible.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# snmpwalk -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x 1.3.6.1.4.1.388.50.1.3.19.5.1&lt;/STRONG&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.1.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = STRING: "admin"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.4.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = STRING: "superuser"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.5.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;where 172.16.x.x = ip address of WiNG controller&lt;BR /&gt;&lt;BR /&gt;so we can see one user with superuser role, admin = 5 char in OID&lt;BR /&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.1.7.100.101.102.97.117.108.116.5.97.100.109.105.110&lt;BR /&gt;where 100.101.102.97.117.108 = "default" in ascii, 5 = number of char in username and 97.100.109.105.110 = "admin" decimal number in ascii table&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;#&amp;nbsp;snmpset -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.5.97.100.109.105.110 s 80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98&lt;/STRONG&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.5.97.100.109.105.110 = STRING: "80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98"&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;now for user "admin" password is = mysuperpassword&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;but if username is not default "admin" we need to make different string, not "80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98​"&lt;BR /&gt;&lt;BR /&gt;how to:&lt;BR /&gt;jump to any WiNG box (like VX9000_DEMO) and make user&lt;BR /&gt;vx9000-EA2320~&amp;gt;&lt;STRONG&gt;en&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320~#&lt;STRONG&gt;configure terminal&lt;/STRONG&gt;&lt;BR /&gt;Enter configuration commands, one per line. End with CNTL/Z.&lt;BR /&gt;vx9000-EA2320(config)~#&lt;STRONG&gt;management-policy default&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;show context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user admin password 1 80111d5fb243dd3b462fe831ae667f48cec2bbca02f3175aeacfc513c733ac98 role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;user another password 0 mysuperpassword2 role superuser access all&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;no user admin&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;comm wr&lt;/STRONG&gt;&lt;BR /&gt;[OK]&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;sh context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user another password 1 c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07 role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;&lt;BR /&gt;now we have c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07&lt;BR /&gt;for user "another" and password "mysuperpassword2"&lt;BR /&gt;&lt;BR /&gt;change password for test&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;user another password 0 anotherpassword role superuser access all&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;comm wr&lt;/STRONG&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;sh context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user another password 1 &lt;STRONG&gt;0acde8d461c979b40dedb7169e06119c7774a1df23ca292aaea195562aa09365&lt;/STRONG&gt; role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# snmpwalk -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x 1.3.6.1.4.1.388.50.1.3.19.5.1&lt;/STRONG&gt; &lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.1.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = STRING: "another"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.4.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = STRING: "superuser"&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.5.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = ""&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;change password over snmp&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;# snmpset -v3 -l authPriv -u snmpmanager -a MD5 -A admin123 -x DES -X admin123 172.16.x.x iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 s c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07&lt;/STRONG&gt;&lt;BR /&gt;&lt;CODE&gt;iso.3.6.1.4.1.388.50.1.3.19.5.1.3.7.100.101.102.97.117.108.116.7.97.110.111.116.104.101.114 = STRING: "c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07"&lt;/CODE&gt;&lt;BR /&gt;&lt;BR /&gt;now for user "another" password is = mysuperpassword2&lt;BR /&gt;&lt;BR /&gt;vx9000-EA2320(config-management-policy-default)~#&lt;STRONG&gt;sh context&lt;/STRONG&gt;&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;rest-server&lt;BR /&gt;ssh&lt;BR /&gt;user another password 1 &lt;SPAN style="font-size: 14pt; color: #ff0000;"&gt;c49fb4f1ca6c15ef7ca6fea316180cfd965d7a8cad8bb251853613bfce396d07 &lt;/SPAN&gt;role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;idle-session-timeout 4320&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;​​</description>
      <pubDate>Wed, 23 Mar 2022 10:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/rfs6000-lost-admin-password-but-snmp-works-possible-to-reset/m-p/24951#M2300</guid>
      <dc:creator>alexx</dc:creator>
      <dc:date>2022-03-23T10:13:00Z</dc:date>
    </item>
  </channel>
</rss>

