Performing Factory Reset
This document outlines the process of performing a factory reset on Cisco devices, detailing the necessary prerequisites, potential limitations, and the step-by-step procedure.
Prerequisites for Performing Factory Reset
- Ensure all software images, configurations, and personal data are backed up before initiating the Factory Reset operation.
- Verify the device is in standalone mode, as Factory Reset is only supported in this configuration. For modular chassis in high availability mode, the reset is applied per supervisor.
- Ensure an uninterrupted power supply throughout the reset process.
- Back up the current image before starting the Factory Reset.
- Confirm that neither In-Service Software Upgrade (ISSU) nor In-Service Software Downgrade (ISSD) is in progress before commencing the Factory Reset.
Limitations for Performing Factory Reset
- Software patches installed on the switch will not be restored after the Factory Reset.
- If the Factory Reset command is issued via a vty session, the session will not be restored upon completion of the process.
Information About Factory Reset
Factory Reset removes all customer-specific data added to the device since its shipment. This includes configurations, log files, boot variables, core files, and credentials such as FIPS-related keys.
The following table details the data erased and retained during the Factory Reset process:
Data Erased | Data Retained |
---|---|
All Cisco IOS images, including the current boot image | Data from Remote field-replaceable units (FRUs) |
Crash information and logs | Value of the configuration register |
User data, and startup and running configuration | Contents of USB |
Credentials like FIPS-related keys | Credentials like Secure Unique Device Identifier (SUDI) certificates, Public key infrastructure (PKI) keys |
Onboard Failure Logging (OBFL) logs | |
ROMMON variables added by the user |
The Factory Reset process is applicable in two scenarios:
- Return Material Authorization (RMA) for a device: When returning a device to Cisco for RMA, all customer-specific data must be removed before obtaining an RMA certificate.
- Recovering a compromised device: If key material or credentials on a device are compromised, the device can be reset to its factory configuration and then reconfigured.
The device reloads to execute the Factory Reset. This reload results in the device entering ROMMON mode. After the reset is complete, the Cisco IOS image can be loaded via USB or TFTP.
How to Perform Factory Reset
Procedure
Command or Action | Purpose |
---|---|
enable Example: Device> enable | Enables privileged EXEC mode. Enter your password if prompted. |
factory-reset {all | config | boot-vars} Example: Device# factory-reset all | Use the command with all options enabled. No system configuration is required. This command erases all content from NVRAM, all Cisco IOS images (including the current boot image), boot variables, startup and running configuration data, and user data. The option config resets startup configurations. The option boot-vars resets user-added boot variables. After successful completion, the device reboots and stops in ROMMON mode. |
Feature History and Information for Factory Reset
Release | Feature Information |
---|---|
Cisco IOS XE Fuji 16.9.2 | This feature was introduced. |