Cisco ASA 5525-X

  1. Start the console session.

    Plug in serial cable to device from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug power into device and if a power button exists, turn it on.
  2. Access the Rommon prompt.

    Press the Break or Esc key when prompted. Example output:
    Booting from ROMMON Cisco Systems ROMMON Version (2.1(9)8) #1: Wed Oct 26 17:14:40 PDT 2011 Use BREAK or ESC to interrupt boot. Use SPACE to begin boot immediately. Boot interrupted. Management0/0 Link is DOWN MAC Address: 24e9.b391.c2d8 Use ? for help. rommon #0>
    TIP: If your keyboard does not have a Break key, in PuTTY right-click the titlebar for the dropdown menu -> Special Command -> Break.
  3. Bypass any configured login.

    Type the confreg command followed by a string value instruction to ignore the current configuration when booting up:
    rommon #0> confreg 0x41 Update Config Register (0x41) in NVRAM...
    Type the reset command:
    rommon #1> reset Cisco BIOS Version:9B2C109A Build Date:05/15/2013 16:34:44 CPU Type: Intel(R) Xeon(R) CPU X3430 @ 2.40GHz, 2394 MHz Total Memory:8192 MB(DDR3 1333) System memory:624 KB, Extended Memory:3573 MB
    The boot process should bring you to the ciscoasa>  prompt:
    Ignoring startup configuration as instructed by configuration register. INFO: Power-On Self-Test in process. ....................................................................... INFO: Power-On Self-Test complete. INFO: Starting HW-DRBG health test... INFO: HW-DRBG health test passed. INFO: Starting SW-DRBG health test... INFO: SW-DRBG health test passed. Type help or '?' for a list of available commands. ciscoasa>
  4. Erase any log files, vlan data and all configuration settings.

    Type the enable command to enter privileged command mode. The default password you get prompted for is either blank (just press Enter) or Cisco:
    ciscoasa> enable Password: ciscoasa#
    Type the dir command, then the del command with * where necessary to match multiple filenames listed:
    ciscoasa#dir Directory of disk0:/ 1 -rw- 66895008 Jan 28 2012 23:57:50 +00:00 asa924-8-smp-k8.bin 2 -rw- 2903 Jan 29 2012 00:07:52 +00:00 upgrade_startup_errors_202110110046.log 3 -rw- 4781 Jan 29 2012 00:08:02 +00:00 vlan.dat 256507904 bytes total (189605212 bytes free) ciscoasa# del vlan.dat Delete filename [vlan.dat]? Delete disk0:/vlan.dat? [confirm]y ciscoasa# del *.log Delete filename [*.log]? Delete disk0:/upgrade_startup_errors_202110110046.log? [confirm]y
    Type the write erase command, and confirm with y:
    ciscoasa# write erase Erase configuration in flash memory? [confirm]y[OK]
  5. Optionally list any license keys and the services they enable.

    Type the show activation-key command:
    ciscoasa# show activation-key Serial Number: FCH17467T6D Running Permanent Activation Key: 0x8730cd7c 0xcc9d6ce4 0xf5934d84 0xf940f8d4 0x011dddaa Licensed features for this platform: Maximum Physical Interfaces : Unlimited perpetual Maximum VLANs : 200 perpetual Inside Hosts : Unlimited perpetual Failover : Active/Active perpetual Encryption-DES : Enabled perpetual Encryption-3DES-AES : Enabled perpetual Security Contexts : 2 perpetual Carrier : Disabled perpetual AnyConnect Premium Peers : 2 perpetual AnyConnect Essentials : 750 perpetual Other VPN Peers : 750 perpetual Total VPN Peers : 750 perpetual AnyConnect for Mobile : Enabled perpetual AnyConnect for Cisco VPN Phone : Disabled perpetual Advanced Endpoint Assessment : Disabled perpetual Shared License : Enabled perpetual Total TLS Proxy Sessions : 2 perpetual Botnet Traffic Filter : Disabled perpetual IPS Module : Enabled perpetual Cluster : Enabled perpetual Cluster Members : 2 perpetual This platform has an ASA5525 VPN Premium license. Failover cluster licensed features for this platform: Maximum Physical Interfaces : Unlimited perpetual Maximum VLANs : 200 perpetual Inside Hosts : Unlimited perpetual Failover : Active/Active perpetual Encryption-DES : Enabled perpetual Encryption-3DES-AES : Enabled perpetual Security Contexts : 4 perpetual Carrier : Disabled perpetual AnyConnect Premium Peers : 4 perpetual AnyConnect Essentials : 750 perpetual Other VPN Peers : 750 perpetual Total VPN Peers : 750 perpetual AnyConnect for Mobile : Enabled perpetual AnyConnect for Cisco VPN Phone : Disabled perpetual Advanced Endpoint Assessment : Disabled perpetual Shared License : Enabled perpetual Total TLS Proxy Sessions : 4 perpetual Botnet Traffic Filter : Disabled perpetual IPS Module : Enabled perpetual Cluster : Enabled perpetual This platform has an ASA5525 VPN Premium license. The flash permanent activation key is the SAME as the running permanent key.
  6. Reboot the device and set it back to normal mode.

    Type the reload command and confirm with y:
    ciscoasa# reload Proceed with reload? [confirm]y *** *** --- START GRACEFUL SHUTDOWN --- Shutting down isakmp Shutting down sw-module Shutting down License Controller Shutting down File system *** *** --- SHUTDOWN NOW --- Process shutdown finished Rebooting... (status 0x9) .. INIT: Sending processes the TERM signal Deconfiguring network interfaces... done. Sending all processes the TERM signal... Sending all processes the KILL signal... Deactivating swap... Unmounting local filesystems... Rebooting...
    Send the router a Break command again as done in step 2, then at the rommon prompt type the confreg command followed by a different string value instruction to no longer ignore the configuration:
    rommon #0> confreg 0x01 Update Config Register (0x1) in NVRAM...
    Lastly type the reset command:
    rommon #1> reset
  7. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  8. End the session.

    Turn off/unplug the device and close PuTTy.