Booting from ROMMON Cisco Systems ROMMON Version (2.1(9)8) #1: Wed Oct 26 17:14:40 PDT 2011 Management0/0 Link is DOWN MAC Address: a8b4.5603.14ce Use ? for help. rommon #0> confreg 0x41 Update Config Register (0x41) in NVRAM... rommon #1> confreg Current Configuration Register: 0x00000041 Configuration Summary: boot default image from Flash ignore system configuration Do you wish to change this configuration? y/n [n]: y enable boot to ROMMON prompt? y/n [n]: enable TFTP netboot? y/n [n]: enable Flash boot? y/n [n]: select specific Flash image index? y/n [n]: disable system configuration? y/n [n]: y go to ROMMON prompt if netboot fails? y/n [n]: enable passing NVRAM file specs in auto-boot mode? y/n [n]: disable display of BREAK or ESC key prompt during auto-boot? y/n [n]: Current Configuration Register: 0x00000040 Configuration Summary: boot ROMMON ignore system configuration Update Config Register (0x40) in NVRAM... rommon #2> boot Launching BootLoader... Boot configuration file contains 1 entry. Loading disk0:/os.img... Booting... Platform ASA5525 Loading... IO memory blocks requested from bigphys 32bit: 56314 INIT: version 2.88 booting Starting udev Configuring network interfaces... done. Populating dev cache Found device serial number FCH223874XV. Found USB flash drive /dev/sdb Found hard drive(s): /dev/sda fsck from util-linux 2.23.2 dosfsck 2.11, 12 Mar 2005, FAT32, LFN There are differences between boot sector and its backup. Differences: (offset:original/backup) 65:01/00 Not automatically fixing this. /dev/sdb1: 43 files, 25818/2011044 clusters ============================================== Use ESC to interrupt boot and launch boot CLI. Use SPACE to launch Cisco FTD immediately. Cisco FTD launch in 0 seconds ... Running on saleenb Mounting disk partitions ... verify_fsic(start) Running file integrity checks... FIPS mode is disabled. Skip verifying file integrity Initializing Threat Defense ... [ OK ] Starting system log daemon... [ OK ] Flushing all current IPv4 rules and user defined chains: ...success Clearing all current IPv4 rules and user defined chains: ...success Applying iptables firewall rules: Flushing chain `PREROUTING' Flushing chain `INPUT' Flushing chain `FORWARD' Flushing chain `OUTPUT' Flushing chain `POSTROUTING' Flushing chain `INPUT' Flushing chain `FORWARD' Flushing chain `OUTPUT' Applying rules successed Flushing all current IPv6 rules and user defined chains: ...success Clearing all current IPv6 rules and user defined chains: ...success Applying ip6tables firewall rules: Flushing chain `PREROUTING' Flushing chain `INPUT' Flushing chain `FORWARD' Flushing chain `OUTPUT' Flushing chain `POSTROUTING' Flushing chain `INPUT' Flushing chain `FORWARD' Flushing chain `OUTPUT' Applying rules successed Starting nscd... mkdir: created directory '/var/run/nscd' [ OK ] Starting , please wait......complete. Configuring NTP... [ OK ] IPMI over LAN not active fatattr: can't open '/mnt/disk0/.private2': No such file or directory fatattr: can't open '/mnt/disk0/.ngfw': No such file or directory Not reconfigurating [ OK ] Starting xinetd: Wed Jan 9 09:23:21 UTC 2019 Starting MySQL... Pinging mysql Pinging mysql, try 1 Found mysql is running Running initializeObjects... Stopping MySQL... Killing mysqld with pid 3098 Wait for mysqld to exit\c done Wed Jan 9 09:23:25 UTC 2019 Starting sfifd... [ OK ] Starting Cisco ASA5525-X Threat Defense, please wait...No PM running! ...started. INIT: Starting system message bus: dbus. Starting OpenBSD Secure Shell server: sshd done. Starting Advanced Configuration and Power Interface daemon: acpid. Starting crond: OK Jan 09 09:23:28 ciscoasa SF-IMS[3289]: [3289] init script:system [INFO] pmmon Setting affinity to 1... pid 3285's current affinity list: 0-3 pid 3285's new affinity list: 1 Jan 09 09:23:28 ciscoasa SF-IMS[3291]: [3291] init script:system [INFO] pmmon The Process Manager is not running... Jan 09 09:23:28 ciscoasa SF-IMS[3292]: [3292] init script:system [INFO] pmmon Starting the Process Manager... Jan 09 09:23:28 ciscoasa SF-IMS[3293]: [3293] pm:pm [INFO] Using model number 75G ciscoasa login: IO Memory Nodes: 1 IO Memory Per Node: 230686720 bytes Global Reserve Memory Per Node: 692060160 bytes Nodes=1 LCMB: got 230686720 bytes on numa-id=0, phys=0x16a000000, virt=0x2aaaaae00000 LCMB: HEAP-CACHE POOL got 689963008 bytes on numa-id=0, virt=0x2aaab8a00000 LCMB: HEAP-CACHE POOL got 2097152 bytes on numa-id=0, virt=0x2aaae1c00000 Processor memory: 4426879538 POST started... POST finished, result is 0 (hint: 1 means it failed) Compiled on Mon 04-Sep-17 13:16 PDT by builders ciscoasa login: Total NICs found: 13 i82574L rev00 Gigabit Ethernet @ irq10 dev 0 index 08 MAC: a8b4.5603.14d2 i82574L rev00 Gigabit Ethernet @ irq10 dev 0 index 07 MAC: a8b4.5603.14d6 i82574L rev00 Gigabit Ethernet @ irq05 dev 0 index 06 MAC: a8b4.5603.14d1 i82574L rev00 Gigabit Ethernet @ irq05 dev 0 index 05 MAC: a8b4.5603.14d5 ci82574L rev00 Gigabit Ethernet @ irq10 dev 0 index 04 MAC: a8b4.5603.14d0 i82574L rev00 Gigabit Ethernet @ irq10 dev 0 index 03 MAC: a8b4.5603.14d4 i82574L rev00 Gigabit Ethernet @ irq05 dev 0 index 02 MAC: a8b4.5603.14cf i82574L rev00 Gigabit Ethernet @ isirq05 dev 0 index 01 MAC: a8b4.5603.14d3 i82574L rev00 Gigabit Ethernet @ irq11 dev 0 index 00 MAC: a8b4.5603.14ce en_vtun rev00 Backplane Control Interface @ index 09 MAC: 0000.0001.0001 en_vtun rev00 Backplane Int-Mgmt Interface @ index 10 MAC: 000co0.0001.0003 en_vtun rev00 Backplane Ext-Mgmt Interface @ index 11 MAC: 0000.0000.0000 en_vtun rev00 Backplane Tap Interface @ index 12 MAC: 0000.0100.0001 Password: WARNING: Attribute already exists in the dictionary. Encryption hardware device : Cisco ASA Crypto on-board accelerator (revision 0x1) Boot microcode : CNPx-MC-BOOT-2.00 SSL/IKE microcode : CNPx-MC-SSL-SB-PLUS-0005 IPSec microcode : CNPx-MC-IPSEC-MAIN-0026 Login incorrect ciscoasa login: Password: ****************************** Warning ******************************* This product contains cryptographic features and is subject to United States and local country laws governing, import, export, transfer, and use. Delivery of Cisco cryptographic products does not imply third-party authority to import, export, distribute, or use encryption. Importers, exporters, distributors and users are responsible for compliance with U.S. and local country laws. By using this product you agree to comply with applicable laws and regulations. If you are unable to comply with U.S. and local laws, return the enclosed items immediately. A summary of U.S. laws governing Cisco cryptographic products may be found at: http://www.cisco.com/wwl/export/crypto/tool/stqrg.html If you require further assistance please contact us by sending email to export@cisco.com. ******************************* Warning ******************************* Copyright (c) 1996-2016 by Cisco Systems, Inc. Restricted Rights Legend Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) of the Commercial Computer Software - Restricted Rights clause at FAR sec. 52.227-19 and subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS sec. 252.227-7013. Cisco Systems, Inc. 170 West Tasman Drive San Jose, California 95134-1706 Ignoring startup configuration as instructed by configuration register. INFO: Power-On Self-Test in process. ....................................................................... INFO: Power-On Self-Test complete. INFO: Starting HW-DRBG health test... INFO: HW-DRBG health test passed. INFO: Starting SW-DRBG health test... INFO: SW-DRBG health test passed. User enable_1 logged in to firepower Logins over the last 1 days: 1. Failed logins since the last login: 0. Login incorrect ciscoasa login: Password: Login incorrect ciscoasa login: admin Password: Login incorrect ciscoasa login: Password: Login incorrec firepower login: firepower login: admin Password: Login incorrect