No system configuration is required to use the factory reset command. Use the command with all options enabled. To delete all necessary data before shipping to RMA, configure secure erase using the below command:Įxample: switch(config)# factory-reset In case of failure, reboot and bring up fex and initiate secure erase If you configure secure erase of fex, the factory reset is initiated and fex configuration will be removed.įex secure erase to be monitored using fex console. The top of rack switches and supervisor modules returns to the loader prompt.Įnd of row switch modules will be in a powered down state. If the factory-reset command is issued through a session, the session is not restored after the completion of the factory reset process.
#Cisco switch management software#
Software patches, if installed on the device, will not be restored after the Secure Erase operation. TOR mode after the secure erase operation. If secure erase is done in FEX mode, a switch will boot in Guidelines and Limitations for Secure EraseįX3 or FX3S or FX3P switches are supported in TOR and FEX mode.
#Cisco switch management software upgrade#
Prerequisites for Performing Secure EraseĮnsure that all the software images, configurations, and personal data are backed up before performing the secure erase operation.Įnsure that there is an uninterrupted power supply when the process is in progress.Įnsure that neither In-Service Software Upgrade (ISSU) nor In-Service Software Downgrade (ISSD) is in progress before starting The device clears all its environment variables including the MAC_ADDRESS and the SERIAL_NUMBER which are required to locate and load the software. The device reloads to perform a factory reset which results in the switch entering the power down mode. Secure Erase feature will not erase content in External storage. Recovering the compromised device - If the key material or credentials that are stored on a device is compromised, reset theĭevice to factory configuration, and then reconfigure the device. Return Material Authorization (RMA) for a device - If you must return a device to Cisco for RMA, remove all the customer-specificĭata before obtaining an RMA certificate for the device. The Secure Erase process is used in the following two scenarios: Well as a potential target for data thefts. These areas can have customer-specific information such as details regarding network architecture, and design as
In conditions of product removal due to Return Merchandise Authorization (RMA), or upgrade or replacement, or system end-of-life.Ĭisco Nexus 3548 switches consume storage to conserve system software images, switch configuration, software logs, and operational Secure Erase is an operation to remove all the identifiable customer information on Cisco NX-OS devices
Prerequisites for Performing Secure Erase.