THIS FIELD NOTICE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTY OF MERCHANTABILITY. YOUR USE OF THE INFORMATION ON THE FIELD NOTICE OR MATERIALS LINKED FROM THE FIELD NOTICE IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS FIELD NOTICE AT ANY TIME.
Revision | Publish Date | Comments |
---|---|---|
1.0 |
11-Jan-16 |
Initial Release |
10.0 |
28-Nov-17 |
Migration to new field notice system |
10.1 |
13-Dec-17 |
fixing migration of PIDs and MDF tags |
10.2 |
23-May-18 |
Fixed Broken Image Links |
10.3 |
07-Dec-18 |
Updated the Image Link |
Affected Product ID | Comments |
---|---|
UCSC-BASE-M2-C460= |
Part Alternate |
UCSC-BASE-M2-C460 |
|
UCSC-C220-M3S |
|
UCSC-C220-M3S= |
Part Alternate |
UCSC-C220-M3L= |
Part Alternate |
UCSC-C240-M3L |
|
UCSC-C240-M3S |
|
UCSC-C240-M3S= |
Part Alternate |
UCSC-C240-M3L= |
Part Alternate |
UCSC-C22-M3S |
|
UCSC-C22-M3S= |
Part Alternate |
UCSC-C24-M3S |
|
UCSC-C24-M3S= |
Part Alternate |
UCSC-C22-M3L |
|
UCSC-C22-M3L= |
Part Alternate |
UCSC-C420-M3 |
|
UCSC-C240-M3S2 |
|
UCSC-C240-M3S2= |
Part Alternate |
MXE-3500-V3-K9 |
|
SNS-3415-K9 |
|
SNS-3495-K9 |
|
UCSC-C220-M3SBE |
|
UCSC-C420-M3= |
Part Alternate |
MDE-1125-K9 |
|
MDE-3125-K9= |
Part Alternate |
MDE-1125-K9= |
Part Alternate |
MDE-3125-K9 |
|
N1K-1110-S |
|
N1K-1110-X |
|
CSM4-UCS2-50-K9 |
|
NGA3240-K9 |
|
N1K-1110-S= |
Part Alternate |
N1K-1110-X= |
Part Alternate |
MXE-3500-V3-K9= |
Part Alternate |
TCS-C220-5RP-K9 |
|
TCS-SMB-C220-K9 |
|
TCS-C220-5RP-K9= |
Part Alternate |
CPS-UCS-2RU-K9= |
Part Alternate |
CPS-UCS-2RU-K9 |
|
CPS-UCS-1RU-K9= |
Part Alternate |
CPS-UCS-1RU-K9 |
|
UCSC-C460-M4= |
Part Alternate |
UCSC-C460-M4 |
|
CTI-CE1K-BDL-K9 |
|
EXPWY-CE1K-BDL-K9 |
|
CAAPL-CSPC-L-V1-K9 |
|
EXPWY-CE1K-BDL-K9= |
Part Alternate |
CTI-CE1K-BDL-K9= |
Part Alternate |
UCSC-C220-M4L |
|
UCSC-C220-M4S |
|
UCSC-C220-M4L= |
Part Alternate |
UCSC-C220-M4S= |
Part Alternate |
UCSC-C240-M4L |
|
UCSC-C240-M4S2 |
|
UCSC-C240-M4SX |
|
UCSC-C240-M4S |
|
UCSC-C240-M4SX= |
Part Alternate |
UCSC-C240-M4S= |
Part Alternate |
UCSC-C240-M4S2= |
Part Alternate |
UCSC-C240-M4L= |
Part Alternate |
APIC-SERVER-L1 |
|
APIC-SERVER-M1 |
|
APIC-SERVER-L1= |
Part Alternate |
APIC-SERVER-M1= |
Part Alternate |
TG5000-K9 |
|
TG5500-K9 |
|
UCSC-C240-M4SNEBS= |
Part Alternate |
UCSC-C240-M4SNEBS |
Defect ID | Headline |
---|---|
CSCux71901 | [DOC] Rack Server Documentation on Default CIMC Password Cisco1234 |
A number of C-Series servers have shipped to customers with a non-standard default password which prevents access to the Cisco Integrated Management Controller (CIMC) unless the configured password is provided.
Systems manufactured between November 17, 2015 and January 6, 2016 were produced with a different default password.
Customers might not be able to log in to their C-Series servers with the published default admin password "password" since this has been changed to "Cisco1234" for these systems. Customers should access the CIMC interface with this combination "admin":"Cisco1234" and set the password back to the default or a customer desired password.
Workaround #1(Recommended)
Log in to the system with this alternate password "Cisco1234" and change it to a known password.
Workaround #2
Connect crash cart to the system. Power the system on and use the F8 menu in order to reset the CIMC to factory defaults or change the admin password:
Workaround #3
Note: This workaround assumes that the CIMC is online and the IP address is known.
This solution is for customers who used DHCP to IP the CIMC(s). Use XML API in order to log in to one or more system and change the password. A sample script is provided:
Import-Module CiscoImcPs $multiimc = Set-ImcPowerToolConfiguration -SupportMultipleDefaultImc $true
# The tool prompts the user to enter IP addresses when run.
$imclist = Read-Host "Enter Cisco IMC IP or list of IMC IPs separated by commas" [array]$imclist = ($imclist.split(",")).trim() $user = 'admin'
# The non-standard password is on the next line (update as needed).
$pass = ConvertTo-SecureString -String "Cisco1234" -AsPlainText -Force $cred = New-Object -TypeName System.Management.Automation.PSCredential -ArgumentList $user, $pass $out = Connect-Imc -Credential $cred $imclist
# The password on the next line is the new password for this user.
$newpass = "password" Get-ImcLocalUser -Id 1 | Set-ImcLocalUser -Pwd $newpass -Force | Out-GridView $out = Disconnect-Imc
If you require further assistance, or if you have any further questions regarding this field notice, please contact the Cisco Systems Technical Assistance Center (TAC) by one of the following methods:
Cisco Notification Service—Set up a profile to receive email updates about reliability, safety, network security, and end-of-sale issues for the Cisco products you specify.