- play_arrow Login Classes and Login Settings
- play_arrow User Accounts
- play_arrow Trusted Platform Module
- play_arrow User Authentication
- play_arrow Remote Access Management
- play_arrow Access Control
- Access Control Authentication Methods
- Preventing Unauthorized Access to EX Series Switches Using Unattended Mode for U-Boot
- Preventing Unauthorized Access to EX Series Switches Using Unattended Mode for U-Boot
- RADIUS Server Configuration for Authentication
- RADIUS over TLS (RADSEC)
- 802.1X Authentication
- MAC RADIUS Authentication
- Service-Type Attribute and Jumbo Frame Handling Overview
- 802.1X and RADIUS Accounting
- Example: Setting Up 802.1X for Single-Supplicant or Multiple-Supplicant Configurations on an EX Series Switch
- Example: Setting Up 802.1X in Conference Rooms to Provide Internet Access to Corporate Visitors on an EX Series Switch
- Interfaces Enabled for 802.1X or MAC RADIUS Authentication
- Static MAC Bypass of 802.1X and MAC RADIUS Authentication
- Configuring PEAP for MAC RADIUS Authentication
- Captive Portal Authentication
- Flexible Authentication Order on EX Series Switches
- Server Fail Fallback and Authentication
- Authentication Session Timeout
- Central Web Authentication
- Dynamic VLAN Assignment for Colorless Ports
- VoIP on EX Series Switches
- play_arrow Configuring IEEE 802.1x Port-Based Network Access Control
- play_arrow Configuring IEEE 802.1x Port-Based Network Access Control in Enhanced LAN Mode
- 802.1X for MX Series Routers in Enhanced LAN Mode Overview
- Understanding 802.1X and LLDP and LLDP-MED on MX Series Routers in Enhanced LAN Mode
- Understanding 802.1X and RADIUS Accounting on MX Series Routers in Enhanced LAN Mode
- Understanding 802.1X and VoIP on MX Series Routers in Enhanced LAN Mode
- Understanding Guest VLANs for 802.1X on MX Series Routers in Enhanced LAN Mode
- Understanding Dynamic VLANs for 802.1X on MX Series Routers in Enhanced LAN Mode
- Understanding Server Fail Fallback and Authentication on MX Series Routers in Enhanced LAN Mode
- Configuring 802.1X RADIUS Accounting on MX Series Routers in Enhanced LAN Mode
- Configuring 802.1X Interface Settings on MX Series Routers in Enhanced LAN Mode
- Configuring LLDP-MED on MX Series Routers in Enhanced LAN Mode
- Configuring LLDP on MX Series Routers in Enhanced LAN Mode
- Configuring Server Fail Fallback on MX Series Routers in Enhanced LAN Mode
- Understanding Captive Portal Authentication on the MX Series Routers
- Understanding Authentication Session Timeout on MX Series Routers
- Authentication Process Flow for MX Series Routers in Enhanced LAN Mode
- Specifying RADIUS Server Connections on an MX Series Router in Enhanced LAN Mode
- Configuring Captive Portal Authentication on MX Series Routers in Enhanced LAN Mode
- Designing a Captive Portal Authentication Login Page on an MX Series Router
- Configuring Static MAC Bypass of Authentication on MX Series Routers in Enhanced LAN Mode
- Controlling Authentication Session Timeouts on an MX Series Router in Enhanced LAN Mode
- Configuring MAC RADIUS Authentication on MX Series Routers in Enhanced LAN Mode
- Example: Configuring MAC RADIUS Authentication on an MX Series Router
- Example: Setting Up Captive Portal Authentication on an MX Series Router
- Example: Connecting a RADIUS Server for 802.1X to an MX Series Router
- Example: Setting Up 802.1X in Conference Rooms to Provide Internet Access to Corporate Visitors on an MX Series Router
- Example: Configuring Static MAC Bypass of Authentication on an MX Series Router
- Example: Applying Firewall Filters to Multiple Supplicants on Interfaces Enabled for 802.1X or MAC RADIUS Authentication on MX Series Routers
- play_arrow Device Discovery
- play_arrow Domain Name Security
- play_arrow Permission Flags
- access
- access-control
- admin
- admin-control
- all
- clear
- configure
- control
- field
- firewall
- firewall-control
- floppy
- flow-tap
- flow-tap-control
- flow-tap-operation
- idp-profiler-operation
- interface
- interface-control
- maintenance
- network
- pgcp-session-mirroring
- pgcp-session-mirroring-control
- reset
- rollback
- routing
- routing-control
- secret
- secret-control
- security
- security-control
- shell
- snmp
- snmp-control
- system
- system-control
- trace
- trace-control
- view
- view-configuration
- play_arrow Configuration Statements and Operational Commands
Recover a Root Password
If you forget the root password, you can use the password recovery procedure to reset the root password.
You cannot perform root password recovery if you configure the console port as insecure.
After you configure the console port as insecure, if a user tries to perform a password recovery operation by booting in single-user mode, the device prompts for the root password. Additionally, if a user boots in CLI recovery mode, the operation is not allowed. Thus, only a user who knows the root password is able to log in. For more information, see Configuration Guidelines for Securing Console Port Access.
How to Recover the Root Password for Junos OS
If you forget the root password for the router, you can use the password recovery procedure to reset the root password.
Before you begin, note the following:
You need console access to recover the root password.
Video 1: How to Recover the Root Password in Junos OS
To recover the root password:
How to Recover the Root Password on Junos OS with Upgraded FreeBSD
If you forget the root password for a device running Junos OS with Upgraded FreeBSD, you can use the password recovery procedure to reset the root password.
For the list of Junos OS devices with upgraded FreeBSD, see Junos kernel upgrade to FreeBSD 10+
Video 2: How to Recover the Root Password in Junos OS with Upg...
You need console access to recover the root password.
To recover the root password:
How to Recover the Root Password on Switches
Problem
Description
If you forget the root password for a switch, use the password recovery procedure to reset the root password.
Before you begin, note the following:
You need physical access to the switch to recover the root password.
For a video on recovering the root password for routers, see Recovering the Root Password on Routers. The procedure is similar for switches.
Solution
To recover the root password:
Power off your switch by unplugging the power cord or turning off the power at the wall switch.
Insert one end of the Ethernet cable into the serial port on the management device and connect the other end to the console port on the back of the switch. See Figure 1.
Figure 1: Connecting to the Console Port on the EX Series SwitchOn the management device, start your asynchronous terminal emulation application (such as Microsoft Windows Hyperterminal). Then, select the appropriate COM port to use (for example, COM1).
Configure the port settings as follows:
Bits per second: 9600
Data bits: 8
Parity: None
Stop bits: 1
Flow control: None
Power on your switch by plugging in the power cord or turning on the power at the wall switch.
When the following prompt appears, press the Spacebar to access the switch's bootstrap loader command prompt.
content_copy zoom_out_mapHit [Enter] to boot immediately, or space bar for command prompt. Booting [kernel] in 1 second...
Note:If the switch is in unattended mode for U-Boot, access to the bootstrap loader command prompt is blocked. If the root password is lost, you must reset the switch to the factory default configuration using the LCD panel.
At the following prompt, type
boot -s
to start up the system in single-user mode:content_copy zoom_out_maploader> boot -s
At the following prompt, type
recovery
to start the root password recovery procedure:content_copy zoom_out_mapEnter full path name of shell or ’recovery’ for root password recovery or RETURN for /bin/sh: recovery
A series of messages describe consistency checks, mounting of filesystems, and initialization and checkout of management services. Then the CLI prompt appears.
Enter configuration mode in the CLI:
content_copy zoom_out_mapuser@switch> configure
Set the root password.
content_copy zoom_out_mapuser@switch# set system root-authentication plain-text-password
At the following prompt, enter the new root password:
content_copy zoom_out_mapNew password: password
At the second prompt, reenter the new root password.
content_copy zoom_out_mapRetype new password: password
After you finish configuring the device, commit the configuration.
content_copy zoom_out_maproot@switch# commit commit complete
Exit configuration mode in the CLI.
content_copy zoom_out_maproot@switch# exit
Exit operational mode in the CLI.
content_copy zoom_out_maproot@switch> exit
At the prompt, enter
y
to reboot the switch.content_copy zoom_out_mapReboot the system? [y/n] y