Wednesday, April 20, 2016

Console Login to Sun T-series server

Console login to Sun T-series server

The procedure tested on T-5120 and works like same on most T-series servers.

Connect through serial first and once you have ILOM access, get the ip address and use ssh to login.

Login: root/changeme

Setting the System Clock using the Hardware Clock as reference...
System Clock set. Local time: Wed Apr 20 19:21:38 GMT 2016
Setting up networking...done.
Running ldconfig...done
Setting up IP spoofing protection: rp_filter.
Configuring network interfaces...Internet Systems Consortium DHCP Client V3.0.1
Copyright 2004 Internet Systems Consortium.
All rights reserved.
For info, please visit http://www.isc.org/products/DHCP
eth0: config: auto-negotiation on, 100FDX, 100HDX, 10FDX, 10HDX.
Listening on LPF/eth0/00:21:28:25:54:bb
Sending on   LPF/eth0/00:21:28:25:54:bb
Sending on   Socket/fallback
DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 3
DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 3
DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 4
DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 5
DHCPDISCOVER on eth0 to 255.255.255.255 port 67 interval 6
No DHCPOFFERS received.
No working leases in persistent database - sleeping.
done.
Hostname: sun-con-p02-ilo.
Starting portmap daemon: portmap.
Initializing random number generator...done.
INIT: Entering runlevel: 3
Starting system log daemon: syslogd and klogd.
Starting periodic command scheduler: cron.
Starting IPMI Stack...... Done.
Starting portmap daemon: portmap.
Starting OpenBSD Secure Shell server: sshd.
Starting Servicetags discoverer: stdiscoverer.
Starting Servicetags listener: stlistener.
Starting FRU update program: frutool.
sun-con-p02-ilo login: root
Password:
Waiting for daemons to initialize...
....
Daemons ready
Sun(TM) Integrated Lights Out Manager
Version 2.0.4.26.i

Copyright 2008 Sun Microsystems, Inc. All rights reserved.
Use is subject to license terms.
Third-party software, including font technology, is copyrighted and licensed
from Sun suppliers.
Portions may be derived from Berkeley BSD systems, licensed from U. of CA.
Sun, Sun Microsystems, and the Sun Logo are trademarks or registered trademarks
of Sun Microsystems, Inc. in the U.S. and other countries.
Federal Acquisitions: Commercial Software -- Government Users Subject to
Standard License Terms and Conditions.

Copyright 2008 Sun Microsystems, Inc. Tous droits réservés.
Distribué par des licences qui en restreignent l'utilisation.
Le logiciel détenu par des tiers, et qui comprend la technologie relative
aux polices de caractères, est protégé par un copyright et licencié par
des fournisseurs de Sun.
Des parties de ce produit pourront être dérivées des systèmes Berkeley BSD
licenciés par l'Université de Californie.
Sun, Sun Microsystems, et le logo Sun sont des marques de fabrique ou des
marques déposées de Sun Microsystems, Inc. aux Etats-Unis et dans d'autres pay          s.

Warning: password is set to factory default.

-> show /SP/network/
 /SP/network
    Targets:
    Properties:
        commitpending = (Cannot show property)
        dhcp_server_ip = 192.168.10.1
        ipaddress = 192.168.10.14
        ipdiscovery = dhcp
        ipgateway = 192.168.10.1
        ipnetmask = 255.255.255.0
        macaddress = 00:21:28:25:54:BB
        pendingipaddress = 192.168.10.14
        pendingipdiscovery = dhcp
        pendingipgateway = 192.168.10.1
        pendingipnetmask = 255.255.255.0
        state = enabled
    Commands:
        cd
        set
        show
-> start /SYS
Are you sure you want to start /SYS (y/n)? y
Starting /SYS
-> set /HOST send_break_action=break
Set 'send_break_action' to 'break'
-> start /SP/console
Are you sure you want to start /SP/console (y/n)? y
Serial console started.  To stop, type #.

{0} ok boot -F failsafe

# echo | format
Searching for disks...done

AVAILABLE DISK SELECTIONS:
       0. c1t0d0 <SUN146G cyl 14087 alt 2 hd 24 sec 848>
          /pci@0/pci@0/pci@2/scsi@0/sd@0,0
Specify disk (enter its number): Specify disk (enter its number):
# mount /dev/dsk/c1t0d0s0 /mnt
# ksh
# TERM=vt100; EDITOR=vi; export TERM EDITOR
# cp -p /mnt/etc/shadow /mnt/etc/shadow.04202016
# set -o vi
# cd /mnt/etc
#
# grep root shadow
root:ove9HybeQmA4Y:6445::::::

Edit shadow file and remove the encrypted password.

# vi shadow
root:ove9HybeQmA4Y:6445::::::
root::6445::::::
# grep root shadow
root::6445::::::
# init 6

At login prompt, use root and at password prompt, just press enter to login.

Once you login, create your account and reset root password.


 

No comments:

Post a Comment