From: Kevin Baumgartner (kbaumgar@xxxxxxxxx)
Date: Tue Sep 19 2000 - 17:49:39 GMT-3
This may not be what you are trying to do but I have done this with a
Unix machine. So telnet to the router's console port through a commserver
with the port number. ie. telnet <commserver ip address> <vty port #>.
Then see if you get a response back from the router. Now power off
router.
Wait a few seconds and then type ctrl ]
Will respond with telnet>
type send brk
This will send a telnet break to the commserver that will be sent to the
router console port. And the router will go into rom mode.
Then do the normal password recovery.
Kevin
At 02:50 PM 9/19/00 -0700, you wrote:
>Hi all. I checked the archives before I ask here. Has anyone been able
>to break into a router that they reverse telet to? I can break into
>the access server fine on a WIn NT 4.0 using terminal, but cannot break
>into the reverse telnet router.
>
>
>Tip for lab testers.
>
>If you have a high end router like the 36xx connected to a 3926 tr
>switch, be careful. Even though the tr interface indicates up/up.
>Compare the duplex settings on the router port and the switch port. I
>encountered a duplex mis match that preventing me from pinging across
>the tr ring to another router. This is despite the up/up state on the
>port. THe router was half duplex, the switch port was auto-full. I
>hard coded it to half duplex and was able to ping away. In addition,
>the routr interface would not come up until I configured the port for
>early token relase (16 meg only). At least under 11.1 it is not on be
>default.
>--
>
>
>
>Mark Salmon
>Cisco Systems Inc
>8735 W. Higgins Road
>Suite 300
>Chicago IL 60631
>Phone:773-695-8235
>Pager:800-365-4578
>email: masalmon@cisco.com
>Empowering The Internet Generation.
>
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 08:24:58 GMT-3