CISCO IOS-XE Programmability and Automation Power

Specifications

  • Product Name: Factory Reset Tool
  • Manufacturer: Cisco
  • Model: FR-2000
  • Compatibility: Cisco devices running IOS-XE 17.10 onwards

Prerequisites for Performing a Factory Reset
Make sure you have administrative access to the device and are familiar with IOS CLI commands.

Performing Factory Reset
Follow the steps below to perform a factory reset:

SUMMARY STEPS

  1. Type enable to enter privileged EXEC mode.
  2. Type factory-reset all secure 3-pass to initiate the factory reset process.

Detailed Steps
Step 1: Command or Action enable

Example
Device> enable

Step 2: factory-reset all secure 3-pass

Example
Device# factory-reset all secure 3-pas

Performing Secure Erase
If you need to perform a secure erase, follow the steps below:

“`

Information About Factory Reset, on page 1 · Prerequisites for Performing Factory Reset, on page 1 · Performing Factory Reset, on page 1 · Performing Secure Erase, on page 2


Information About Factory Reset
Factory reset removes all the customer-specific data that has been added to a device since the time of its shipping. The erased data includes configurations, log files, boot variables, core files, and credentials such as Federal Information Processing Standard-related (FIPS-related) keys. The device returns to its default license configuration after a factory reset.

Note The factory reset is performed through an IOS CLI. A copy of the running image is backed up and restored after the reset.

Prerequisites for Performing Factory Reset
· Ensure that all the software images, configurations, and personal data are backed up. · Ensure that there is uninterrupted power supply when the factory reset is in progress. · Ensure that you take a backup of the current image.

Performing Factory Reset

SUMMARY STEPS

1. enable 2. factory-reset all secure 3-pass

Factory Reset 1

Performing Secure Erase

DETAILED STEPS

Step 1

Command or Action enable Example:
Device> enable

Step 2

factory-reset all secure 3-pass Example:
Device# factory-reset all secure 3-pass

Performing Secure Erase

SUMMARY STEPS

1. enable 2. factory-reset all secure

DETAILED STEPS

Step 1

Command or Action enable Example:
Device> enable

Step 2

factory-reset all secure Example:
Device# factory-reset all secure

Factory Reset
Purpose Enables privileged EXEC mode. Enter your password, if prompted.
Removes sensitive data from all the partitions that are currently being cleaned up by the factory-reset all command. From Cisco IOS-XE 17.10 onwards, the following are the three passes to erase data in disk partitions:
· Write 0s · Write 1s · Write a random byte Note The factory reset takes 3 to 6 hours to be completed.


Purpose Enables privileged EXEC mode. Enter your password, if prompted.
Erases all user data and metadata from bootflash. The erase is compliant with the National Institute of Standards and Technology (NIST) standards. Note The erase takes around 5 to10 minutes. You need
to boot a new image from TFTP post the secure erase as the image gets deleted.

Methods
Methods are HTTPS operations (GET/PATCH/POST/DELETE/OPTIONS/PUT) performed on a target
resource. A YANG-formated RPC invokes a particular method on a given resource that pertains to a target
YANG model residing in the RESTCONF server. The uniform resource identifier (URI) acts as a location
identification for a given resource, so that the client RESTCONF method can locate that particular resource
to take an action specified by an HTTPS method or property.
For more information, see RFC 8040 – RESTCONF Protocol
RESTCONF YANG-Patch Support


RESTCONF supports YANG-Patch media type as specified by RFC 8072. A YANG-Patch is an ordered list
of edits that are applied to the target datastore by the RESTCONF server. The YANG Patch operation is
invoked by the RESTCONF client by sending a Patch method request with a representation using either the
media type application/yang-patch+xml or application/yang-patch+json. NETCONF RESTCONF IPv6 Support
Data model interfaces (DMIs) support the use of IPv6 protocol. DMI IPv6 support helps client applications
to communicate with services that use IPv6 addresses. External facing interfaces will provide dual-stack
support; both IPv4 and IPv6.
DMIs are a set of services that facilitate the management of network elements. Application layer protocols
such as, NETCONF and RESTCONF access these DMIs over a network.
If IPv6 addresses are not configured, external-facing applications will continue to listen on IPv6 sockets; but
these sockets will be unreachable.
Converting IOS Commands to XML
In Cisco IOS XE Cupertino 17.7.1 and later releases, you can automatically translate IOS commands into
relevant NETCONF-YANG XML or RESTCONF-JSON request messages. You can analyze the generated
configuration messages and familiarize with the Xpaths used in these messages. The generated configuration
in the structured format can be used to provision other devices in the network; however, this configuration
cannot be modified.
Use the show running-config | format netconf-xml command or the show running-config | format
restconf-json command to translate IOS commands.
If the netconf-xml keyword is selected, the IOS commands are translated into the NETCONF-YANG XML
format, and if the restconf-json keyword is selected, the IOS commands are translated into the
RESTCONF-JSON format.

 

Factory Reset 2

Documents / Resources

CISCO IOS-XE Programmability and Automation Power [pdf] User Guide
IOS-XE Programmability and Automation Power, IOS-XE, Programmability and Automation Power, Automation Power, Power

References

Leave a comment

Your email address will not be published. Required fields are marked *