Factory Reset
A factory reset deletes all customer-specific data stored on a device and restores the device to its original configuration as it was at the time of shipping. This process erases configurations, log files, boot variables, core files, and credentials, including Federal Information Processing Standard (FIPS)-related keys. The data erasure performed during a factory reset aligns with the clear method defined in NIST Special Publication 800-88 Revision 1.
When do you need to do factory reset
You need to perform factory reset in the following scenarios
-
Return Material Authorization (RMA) for a device
If you need to return a device to Cisco for RMA, remove all the customer-specific data before obtaining an RMA certificate for the device.
-
Recovering a compromised device
If the key material or credentials that are stored on a device are compromised, reset the device to the factory configuration, and then reconfigure the device.
What happens during a factory reset
-
During a factory reset, the device reloads and enters ROMMON mode.
After the factory reset, the device removes all its environment variables, including the MAC_ADDRESS and the SERIAL_NUMBER variables, which are required to locate and load the software.
-
Perform a reset in ROMmon mode to automatically set the environment variables.
The BAUD rate environment variable returns to its default value after a factory reset. Make sure that the BAUD rate and the console speed are the same at all times. Otherwise, the console becomes unresponsive. -
After the system reset in ROMmon mode is complete, add the Cisco IOS XE either through an USB or TFTP.
The following table provides details about the data that is erased and retained during the factory reset process:
Data erased |
Data retained |
---|---|
All Cisco IOS XE images, including the current boot image |
Data from remote field-replaceable units (FRUs) |
Crash information and logs |
Value of the configuration register. |
User data, startup and running configuration, and contents of removable storage devices, such as Serial Advanced Technology Attachment (SATA), Solid State Drive (SSD), or USB |
— |
Credentials such as FIPS-related keys |
Credentials such as Secure Unique Device Identifier (SUDI) certificates, and public key infrastructure (PKI) keys. |
Onboard Failure Logging (OBFL) logs |
— |
ROMmon variables added by a user. |
— |
Licenses |
— |