

Once in we can erase the saved config (or just reset the password if you want the config) reset the configuration register to it’s original value, and reboot the appliance – simple! The appliance then boots with a minimal basic configuration, and crucially for our needs, bypasses the unknown passwords allowing us in to reconfigure it. We then change the configuration register, to force the appliance to ignore it’s saved config. In brief, this process involves booting the appliance, and then interrupting the boot process part way through. Although, as the configuration that’s already there was of no use to me, I just removed the config entirely. So, I needed a way to get into the ASA, and reset the password. So I had a perfectly functional firewall, but no way to reconfigure it to my needs. The scenario: I recently acquired a used ASA 5510 from another internal department, but the login details had been lost along the way. This post is part of a series on configuring Cisco ASA 5510 firewalls

Please browse our website to see what we offer – thanks, and enjoy the blog We cover Derby and Derbyshire, Nottingham and Nottinghamshire mainly, but do also have clients further afield. When we come across issues that would be useful to others we “try” to post the answers on our website –. We spend all of our time with clients, helping them to make good decisions about their IT. Binary Royale is an IT consultancy company based in the East Midlands.
