Your cart is currently empty!
Most Cisco routers and switches ship with well-known default usernames like “admin” or “cisco” and management IPs such as 192.168.1.1 or 192.168.1.254. However, many enterprise models—including the latest Catalyst and Nexus switches—have no default login credentials and require setup via console on first boot for security. Only a few series (like Catalyst 1200/1300) still use “cisco/cisco” with 192.168.1.254, and even these force a password change at initial login.

Below is a comprehensive table of Cisco default usernames, passwords, and management IPs for popular models—plus practical advice on recovery, configuration, and best practices for network security.
Cisco Switch Default Password, and Management IP Address List
Note: Many Cisco enterprise switches (especially Catalyst 9000 series) now ship with no default password and require creating a user during the initial setup wizard. The following defaults are for legacy and SMB models that still use factory credentials.Cisco Catalyst & Nexus Switches Default Password
|
Series / Model 4319_e7a6ac-9a> |
Default Username 4319_1936ae-d6> |
Default Password 4319_34b96b-23> |
Default Management IP 4319_99e400-68> |
Notes 4319_8ee992-50> |
|---|---|---|---|---|
|
Catalyst 2960X (WS-C2960X-24PS-L) 4319_d6e625-25> |
cisco 4319_7fa372-d6> |
cisco 4319_13de02-65> |
None 4319_0d9248-e5> |
IOS 15.x, change immediately 4319_d19633-4d> |
|
Catalyst 3750X (WS-C3750X-48P-L) 4319_4fd98b-08> |
cisco 4319_505006-f5> |
cisco 4319_896487-cd> |
None 4319_37f95a-d4> |
Some require enable secret 4319_26bc5f-68> |
|
Catalyst 3850 (WS-C3850-24P-S) 4319_7de3a7-5b> |
none 4319_51257e-3b> |
none 4319_08f2df-fc> |
None 4319_de60a3-6b> |
Requires user setup wizard 4319_9bd0ff-e4> |
|
Catalyst 9300 (C9300-24P-E) 4319_67b377-01> |
none 4319_b6ea64-72> |
none 4319_203b4d-f7> |
None 4319_b73a28-66> |
Setup wizard required 4319_0a7cc5-a9> |
|
Catalyst 9500 (C9500-24Y4C) 4319_43039b-3e> |
none 4319_3c37d7-39> |
none 4319_f9f957-d0> |
None 4319_2200a1-c2> |
Managed via mgmt0 4319_f03e59-03> |
|
Nexus 9300 (N9K-C93180YC-EX) 4319_619b59-74> |
admin 4319_58eb7f-25> |
admin 4319_4e3034-72> |
mgmt0 DHCP/Static 4319_520ddf-a1> |
NX-OS defaults 4319_f3407f-54> |
List of Default Cisco Passwords & Other Info
|
Model 4319_e44ed4-1d> |
Default Username 4319_dc2a0d-93> |
Default Password 4319_2ccc3f-6e> |
Default Management IP 4319_311423-6c> |
|---|---|---|---|
|
DPC2320 4319_f47bc9-c9> |
[none] 4319_02823f-c7> |
[none] 4319_14f462-00> |
192.168.0.1 4319_29ea4a-63> |
|
ESW-520-24-K9 4319_4645f5-05> |
cisco 4319_0b4aa1-a9> |
cisco 4319_c34677-8f> |
192.168.10.2 4319_7f3076-dc> |
|
ESW-520-24P-K9 4319_687490-3c> |
cisco 4319_b89738-b8> |
cisco 4319_def789-80> |
192.168.10.2 4319_6506e5-e0> |
|
ESW-520-48-K9 4319_d2b325-92> |
cisco 4319_540e1e-88> |
cisco 4319_8a5ea0-d8> |
192.168.10.2 4319_8a2673-03> |
|
ESW-520-48P-K9 4319_77d30d-f4> |
cisco 4319_ee4354-41> |
cisco 4319_df4749-f4> |
192.168.10.2 4319_dcbed1-b0> |
|
ESW-520-8P-K9 4319_7836d0-f1> |
cisco 4319_ee3be9-57> |
cisco 4319_37c94c-94> |
192.168.10.2 4319_d33bf8-f0> |
|
ESW-540-24-K9 4319_dbeca3-d7> |
cisco 4319_072dac-79> |
cisco 4319_9850f2-ac> |
192.168.10.2 4319_11a842-a9> |
|
ESW-540-24P-K9 4319_f1d5b3-79> |
cisco 4319_26ea65-43> |
cisco 4319_fc5fc1-6b> |
192.168.10.2 4319_61bc99-ce> |
|
ESW-540-48-K9 4319_8a6a62-64> |
cisco 4319_8eabeb-d2> |
cisco 4319_89ca0b-31> |
192.168.10.2 4319_d023f9-75> |
|
ESW-540-8P-K9 4319_a511b2-e6> |
cisco 4319_f843f6-f5> |
cisco 4319_e1f5ee-fa> |
192.168.10.2 4319_0f2b54-b0> |
|
RV016 4319_68127d-c2> |
admin 4319_2bc16a-79> |
admin 4319_e1f4db-13> |
192.168.1.1 4319_91bb00-a7> |
|
RV042 4319_6a8147-4b> |
admin 4319_d71f92-b0> |
admin 4319_7de6fa-b5> |
192.168.1.1 4319_4875e1-d3> |
|
RV042G 4319_ce5aa4-af> |
admin 4319_0930fb-78> |
admin 4319_331ac5-18> |
192.168.1.1 4319_7c0423-32> |
|
RV082 4319_9eda49-a1> |
admin 4319_6df4c3-72> |
admin 4319_5f84e8-c3> |
192.168.1.1 4319_e6e028-84> |
|
RV110W 4319_ba0416-bc> |
cisco 4319_d652e1-99> |
cisco 4319_af62c1-18> |
192.168.1.1 4319_e317ed-5c> |
|
RV120W 4319_aeffc6-09> |
admin 4319_50c8ee-72> |
admin 4319_816524-f7> |
192.168.1.1 4319_d9b12f-f5> |
|
RV130 4319_50312d-df> |
cisco 4319_fdd313-38> |
cisco 4319_6257bc-49> |
192.168.1.1 4319_d4b9f1-74> |
|
RV130W 4319_450e11-2e> |
cisco 4319_2192eb-20> |
cisco 4319_ff04bc-6b> |
192.168.1.1 4319_93ad8a-27> |
|
RV132W 4319_c50183-b0> |
cisco 4319_d2e16d-c8> |
cisco 4319_8dddbc-04> |
192.168.1.1 4319_8db7b8-cb> |
|
RV134W 4319_e35119-5c> |
cisco 4319_a0f8ec-f0> |
cisco 4319_a8b9cd-13> |
192.168.1.1 4319_90702a-df> |
|
RV180 4319_46db5b-9f> |
cisco 4319_985899-d7> |
cisco 4319_3699c7-3b> |
192.168.1.1 4319_233034-da> |
|
RV180W 4319_aa1b94-97> |
cisco 4319_445e2f-25> |
cisco 4319_151780-df> |
192.168.1.1 4319_73c276-0c> |
|
RV215W 4319_faa7f7-7b> |
cisco 4319_4c7190-7d> |
cisco 4319_2404e2-8b> |
192.168.1.1 4319_a6cb80-31> |
|
RV220W 4319_1e5e46-d1> |
cisco 4319_af8f5c-87> |
cisco 4319_9aefe9-a9> |
192.168.1.1 4319_a4c802-fb> |
|
RV320 4319_f3973a-ab> |
cisco 4319_afbd77-22> |
cisco 4319_821ab2-c6> |
192.168.1.1 4319_17dea3-4e> |
|
RV325 4319_14a8ca-a3> |
cisco 4319_343575-e5> |
cisco 4319_535544-e2> |
192.168.1.1 4319_64306e-c6> |
|
RV340 4319_865305-26> |
cisco 4319_ff63a4-48> |
cisco 4319_fbee26-e6> |
192.168.1.1 4319_40b5c5-af> |
|
RV340W 4319_67c70a-f8> |
cisco 4319_8f4195-55> |
cisco 4319_a2131a-89> |
192.168.1.1 4319_b3162f-e8> |
|
RV345 4319_1fcbcf-79> |
cisco 4319_c4527d-d9> |
cisco 4319_db3300-09> |
192.168.1.1 4319_ea3d8d-ec> |
|
RVL200 4319_761269-c4> |
admin 4319_1a51b3-04> |
admin 4319_b97d0f-1a> |
192.168.1.1 4319_85c843-4f> |
|
RVS4000 4319_4ccb3b-74> |
admin 4319_a819d5-a9> |
admin 4319_7f27cc-3d> |
192.168.1.1 4319_08d72b-cc> |
|
SF200-48 4319_0a1d13-32> |
cisco 4319_b8d125-d7> |
cisco 4319_04b47a-0e> |
192.168.1.254 4319_bd9e55-e3> |
|
SF300-08 4319_511412-4a> |
cisco 4319_4e9e6a-0b> |
cisco 4319_9b0df0-7f> |
192.168.1.254 4319_5f4e58-75> |
|
SF300-24 4319_3950f7-52> |
cisco 4319_f2705c-4a> |
cisco 4319_23b900-80> |
192.168.1.254 4319_42dc58-e1> |
|
SF300-24P 4319_a12385-15> |
cisco 4319_152ac4-0c> |
cisco 4319_6823b9-1c> |
192.168.1.254 4319_4051e9-d7> |
|
SF300-48 4319_a1d364-2b> |
cisco 4319_72dda3-74> |
cisco 4319_ffefa2-26> |
192.168.1.254 4319_30c394-75> |
|
SF300-48P 4319_ffc3e3-b3> |
cisco 4319_6d8799-e9> |
cisco 4319_e8b743-0d> |
192.168.1.254 4319_699be2-f0> |
|
SF302-08 4319_734891-bc> |
cisco 4319_f3d147-dc> |
cisco 4319_92a641-0d> |
192.168.1.254 4319_345472-11> |
|
SF302-08MP 4319_fc67ce-62> |
cisco 4319_fe14c3-c2> |
cisco 4319_e34d87-e4> |
192.168.1.254 4319_f33137-31> |
|
SF302-08P 4319_a4e73d-8e> |
cisco 4319_e7d83b-b0> |
cisco 4319_9e1728-8d> |
192.168.1.254 4319_3e09a3-c1> |
|
SFE1000P 4319_b120af-1e> |
admin 4319_5116ec-dc> |
[none] 4319_2892e9-c9> |
DHCP1 4319_799518-fe> |
|
SFE2000 4319_e7a4eb-1f> |
admin 4319_f8c3dd-80> |
admin 4319_9370f4-4a> |
192.168.1.254 4319_6f6201-98> |
|
SFE2000P 4319_002dc0-47> |
admin 4319_a5325f-8f> |
admin 4319_48d845-a4> |
192.168.1.254 4319_e90560-f2> |
|
SFE2010 4319_5e6468-a7> |
admin 4319_3191dd-0a> |
admin 4319_6bee77-83> |
192.168.1.254 4319_7071b6-ac> |
|
SFE2010P 4319_61543d-c0> |
admin 4319_1298fc-95> |
admin 4319_2502dc-f3> |
192.168.1.254 4319_63103a-ae> |
|
SG200-08 4319_a5e578-e7> |
cisco 4319_3d0607-c6> |
cisco 4319_5d2091-b3> |
192.168.1.254 4319_393484-42> |
|
SG200-08P 4319_df66ed-85> |
cisco 4319_900950-af> |
cisco 4319_77751e-de> |
192.168.1.254 4319_5afea2-39> |
|
SG200-26 4319_272ffe-39> |
cisco 4319_977ec3-db> |
cisco 4319_71f918-e3> |
192.168.1.254 4319_bf67ec-ff> |
|
SG200-50 4319_2c6f40-a1> |
cisco 4319_d50df5-0b> |
cisco 4319_c513c1-b3> |
192.168.1.254 4319_0c79f7-c0> |
|
SG300-10 4319_401bb3-83> |
cisco 4319_365d00-59> |
cisco 4319_f6e534-6a> |
192.168.1.254 4319_5744df-b7> |
|
SG300-10MP 4319_206157-57> |
cisco 4319_19405a-ef> |
cisco 4319_34f0ed-2f> |
192.168.1.254 4319_b3320e-0f> |
|
SG300-10P 4319_fb3e6d-a9> |
cisco 4319_f3b66d-d7> |
cisco 4319_f649ed-4b> |
192.168.1.254 4319_140c7c-f2> |
|
SG300-20 4319_ba4f74-25> |
cisco 4319_6d1428-ae> |
cisco 4319_18bfb0-64> |
192.168.1.254 4319_67e914-90> |
|
SG300-28 4319_de64e2-d9> |
cisco 4319_b3d6b2-6d> |
cisco 4319_d9fb13-a6> |
192.168.1.254 4319_8d6131-e6> |
|
SG300-28P 4319_1fab8e-89> |
cisco 4319_ad0dbe-36> |
cisco 4319_4bc266-d2> |
192.168.1.254 4319_693f32-e8> |
|
SG300-52 4319_a22c88-38> |
cisco 4319_c38d48-1c> |
cisco 4319_1c78d0-58> |
192.168.1.254 4319_e7de2f-92> |
|
SG500-28 4319_f15c9e-4b> |
cisco 4319_5970b5-05> |
cisco 4319_e93ec5-95> |
192.168.1.254 4319_72c6f1-2d> |
|
SG500-52 4319_d70ff1-e0> |
cisco 4319_58a743-c6> |
cisco 4319_2a3d7e-00> |
192.168.1.254 4319_1743dc-20> |
|
SGE2000 4319_1d16ad-c3> |
admin 4319_a4534d-af> |
admin 4319_856de6-60> |
192.168.1.254 4319_4e0056-51> |
|
SGE2000P 4319_9cfbb7-40> |
admin 4319_07453d-41> |
admin 4319_740cf7-fe> |
192.168.1.254 4319_eb66d9-ec> |
|
SGE2010 4319_17bf2b-ed> |
admin 4319_23388e-1a> |
admin 4319_b99b22-ba> |
192.168.1.254 4319_9b8ff3-59> |
|
SGE2010P 4319_725662-e2> |
admin 4319_58ae4e-aa> |
admin 4319_e78d22-27> |
192.168.1.254 4319_4aa061-5e> |
|
SLM2005 4319_65c32b-cf> |
admin 4319_50a226-51> |
admin 4319_77bb9a-6b> |
192.168.1.254 4319_6da3c4-68> |
|
SLM2008 4319_2102bc-3f> |
admin 4319_93d88e-4d> |
admin 4319_c13d81-84> |
192.168.1.254 4319_8c1cc5-96> |
|
SLM2024 4319_80f20c-8e> |
admin 4319_e0f2dc-cf> |
admin 4319_27cf3c-e7> |
192.168.1.254 4319_9e6e38-90> |
|
SLM2048 4319_8fb424-d0> |
admin 4319_5ea03d-42> |
admin 4319_9e2705-20> |
192.168.1.254 4319_02a097-f5> |
|
SLM224G 4319_394056-8b> |
admin 4319_0d3190-df> |
admin 4319_34e0cc-9d> |
192.168.1.254 4319_917b40-fb> |
|
SLM224G4PS 4319_5b059a-fd> |
admin 4319_8251b5-d2> |
admin 4319_d88dd2-71> |
192.168.1.254 4319_97320c-86> |
|
SLM224G4S 4319_639d54-c7> |
admin 4319_e2ba91-41> |
admin 4319_81b5a5-ce> |
192.168.1.254 4319_1fbc18-b5> |
|
SLM224P 4319_e92cd5-fb> |
admin 4319_4b1364-f0> |
admin 4319_cdd7d0-2b> |
192.168.1.254 4319_210268-27> |
|
SLM248G 4319_c746b0-a6> |
admin 4319_7255bc-24> |
admin 4319_890ccc-a6> |
192.168.1.254 4319_125680-93> |
|
SLM248G4PS 4319_18a1ed-e7> |
admin 4319_e0d52d-79> |
admin 4319_795bc3-db> |
192.168.1.254 4319_8ed757-fd> |
|
SLM248G4S 4319_5af234-d4> |
admin 4319_a83cd4-af> |
admin 4319_d3e144-64> |
192.168.1.254 4319_4fb1b0-8c> |
|
SLM248P 4319_b9a1fb-b9> |
admin 4319_77830e-63> |
admin 4319_ec47cc-75> |
192.168.1.254 4319_c7454d-5e> |
|
SPA2102 4319_a98a27-26> |
admin 4319_e68223-d3> |
[none] 4319_ae68c0-7a> |
192.168.0.1 4319_70a440-bd> |
|
SPA3102 4319_9ea05d-f3> |
admin 4319_11eb95-44> |
[none] 4319_5861de-2e> |
192.168.0.1 4319_a573b0-f3> |
|
SPA8000 4319_dadf2b-a4> |
admin 4319_3f86f9-cd> |
[none] 4319_0a0893-c7> |
192.168.0.1 4319_612ac6-fc> |
|
SPA8800 4319_84b634-59> |
admin 4319_1607be-e0> |
[none] 4319_9aa695-75> |
192.168.0.1 4319_110f1b-dd> |
|
SRP520 4319_0ba603-79> |
admin 4319_c2a21e-78> |
admin 4319_348225-4e> |
192.168.15.1 4319_2a5e33-12> |
|
SRP520-U 4319_4286cd-62> |
admin 4319_e26228-0f> |
admin 4319_de45ec-de> |
192.168.15.1 4319_3c4d6e-99> |
|
SRW2008 4319_e08f3a-73> |
admin 4319_0723e8-e0> |
[none] 4319_aa1a93-dc> |
192.168.1.254 4319_bd47f6-5c> |
|
SRW2008MP 4319_0142df-cb> |
admin 4319_2acfae-e0> |
[none] 4319_823d06-7b> |
192.168.1.254 4319_22a487-81> |
|
SRW2008P 4319_b3edae-90> |
admin 4319_6a3b3b-c2> |
[none] 4319_5e997a-46> |
192.168.1.254 4319_5e60f1-fa> |
|
SRW2016 4319_21b429-0b> |
admin 4319_cc8241-61> |
[none] 4319_6c61fc-b9> |
192.168.1.254 4319_ec6deb-d6> |
|
SRW2024 4319_4ccae9-35> |
admin 4319_9c01d0-68> |
[none] 4319_ad2396-d9> |
192.168.1.254 4319_1e277b-dc> |
|
SRW2024P 4319_6943a5-55> |
admin 4319_7a1599-c9> |
[none] 4319_ae65c1-5d> |
192.168.1.254 4319_b5c67b-00> |
|
SRW2048 4319_d834ff-43> |
admin 4319_4b4aa5-05> |
[none] 4319_334273-2f> |
192.168.1.254 4319_7b2ab0-7e> |
|
SRW208 4319_a27340-8b> |
admin 4319_aa6358-c6> |
[none] 4319_89eb33-89> |
192.168.1.254 4319_31dc8f-6e> |
|
SRW208G 4319_d4727f-35> |
admin 4319_d2933b-3f> |
[none] 4319_822306-8e> |
192.168.1.254 4319_dcc5a6-c1> |
|
SRW208L 4319_89e882-b1> |
admin 4319_e7e307-c1> |
[none] 4319_dfc8f3-69> |
192.168.1.254 4319_55f583-44> |
|
SRW208MP 4319_9d0f0d-aa> |
admin 4319_73bcbb-17> |
[none] 4319_5cd0cf-57> |
192.168.1.254 4319_3412c6-39> |
|
SRW208P 4319_396e7e-ae> |
admin 4319_dc77ca-90> |
[none] 4319_8cbe9b-e3> |
192.168.1.254 4319_feaa6a-10> |
|
SRW224G4 4319_517353-89> |
admin 4319_f3d307-48> |
[none] 4319_0b7bbd-98> |
192.168.1.254 4319_c02273-05> |
|
SRW224G4P 4319_72697f-5d> |
admin 4319_4ab58a-12> |
[none] 4319_7cf2db-65> |
192.168.1.254 4319_851573-b6> |
|
SRW224P 4319_dbeb65-69> |
admin 4319_c979ab-3b> |
[none] 4319_66354e-83> |
192.168.1.254 4319_5ef33a-93> |
|
SRW248G4 4319_45a44d-fa> |
admin 4319_9cda53-8f> |
[none] 4319_9d073e-11> |
192.168.1.254 4319_1eb2cf-44> |
|
SRW248G4P 4319_2093e9-2d> |
admin 4319_7ea9bb-57> |
[none] 4319_c77d6e-90> |
192.168.1.254 4319_16b160-ec> |
|
Valet (M10) 4319_e2decb-e8> |
admin 4319_8aea5d-6d> |
admin 4319_91ab9f-a9> |
192.168.1.1 4319_075bde-a4> |
|
Valet Plus (M20) 4319_5d7890-a9> |
admin 4319_40949d-51> |
admin 4319_48d207-15> |
192.168.1.1 4319_2c1bd1-6b> |
|
WRP400 4319_83dea9-b4> |
admin 4319_388169-4a> |
admin 4319_067e49-1e> |
192.168.15.1 4319_ff13c8-58> |
|
WRV200 4319_b829b7-5d> |
admin 4319_0fdb9a-42> |
admin 4319_4e486c-7b> |
192.168.1.1 4319_49604e-d4> |
|
WRV210 4319_22182c-26> |
admin 4319_ce1119-da> |
admin 4319_ba3d87-10> |
192.168.1.1 4319_12362f-17> |
|
WRV54G 4319_1c6832-1d> |
admin 4319_a879ba-fd> |
admin 4319_0d4d6a-3f> |
192.168.1.1 4319_fd5dc3-a6> |
|
WRVS4400N 4319_841919-1c> |
admin 4319_85c5d1-2d> |
admin 4319_03dd04-89> |
192.168.1.1 4319_6fb677-3f> |
Important Note
- For Catalyst 9000 series and modern IOS XE devices: no default credentials. You must create a local admin account during first boot.
- Always change factory defaults immediately to prevent unauthorized access.
How to Change Cisco Switch Default Password
- Enter Global Configuration Mode:
Switch> enable
Switch# configure terminal
- Create a Local Admin User:
Switch(config)# username admin privilege 15 secret StrongP@ssw0rd!
- Set Enable Secret Password:
Switch(config)# enable secret NewEnablePass123
- Verify Configuration:
Switch# show run | include username
Switch# show run | include enable secret
How to Reset the Password on a Cisco Switch (Step-by-Step)
Preparation
- Console cable and terminal software (9600 baud, no flow control)
- Physical access to the switch
Step-by-Step Password Recovery Process
- Power cycle the switch.
- Unplug and replug the power cable.
- Interrupt the boot sequence.
- As soon as the switch begins to boot, press and hold the
Modebutton (for Catalyst 2960/3850/9300, etc.) OR - For CLI: Send a break signal (Ctrl+Break) in your terminal window right after power-on.
- As soon as the switch begins to boot, press and hold the
- Enter ROMMON or Switch: prompt.
- On many models, you will see a
switch:prompt (orrommon>for routers/Nexus).
- On many models, you will see a
- Initialize flash file system.
switch: flash_init - Load the startup configuration into memory (if needed).
switch: load_helper switch: dir flash: - Rename or delete the configuration files.
switch: rename flash:config.textflash:config.oldswitch: delete flash:config.textswitch: delete flash:vlan.dat # (optional, resets VLAN info) - Reboot the switch.
switch: boot - Enter privileged EXEC mode (no password required).
Switch> enable - Copy the old config back (to recover interfaces and settings).
Switch# copy flash:config.old running-config - Reset the enable/console password.
Switch# configure terminalSwitch(config)# enable secret NEWPASSWORDSwitch(config)# username admin privilege 15 secret NEWADMINPASSSwitch(config)# exit - Restore startup config and normal boot.
Switch# write memorySwitch# reload(or)Switch# copy running-config startup-config - (If you changed the config register for routers, restore default register)
Switch(config)# config-register 0x2102
Quick Reference Flow
- Power cycle → Interrupt boot → Enter ROMMON/switch: prompt
flash_init→rename/delete config.textboot→enable→copy config.old running-config- Set new passwords
- Save & reload
Security Best Practices for Cisco Switch Password
- Use Strong Passwords: At least 12 characters, mix of upper/lowercase, numbers, and symbols.
- Enable SSH Instead of Telnet:
Switch(config)# line vty 0 4
Switch(config-line)# transport input ssh
- Implement AAA (Authentication, Authorization, Accounting):
Switch(config)# aaa new-model
Switch(config)# aaa authentication login default local
- Regularly Audit Configurations: Use scripts or Ansible to verify password policies.
- Set Login Banners for Legal Notice:
Switch(config)# banner motd #Unauthorized access prohibited!#
Automating Password Management
For enterprises managing dozens of Cisco switches, automation is critical, use Ansible or Python management Cisco Password:
- Ansible Example Playbook:
- hosts: cisco_switches
gather_facts: no
tasks:
- name: Update admin password
ios_user:
name: admin
configured_password: StrongP@ss2025!
privilege: 15
- Python Netmiko Script:
from netmiko import ConnectHandler
device = {
'device_type': 'cisco_ios',
'host': '192.168.1.1',
'username': 'admin',
'password': 'oldpass'
}
net_connect = ConnectHandler(**device)
net_connect.send_config_set([
'username admin privilege 15 secret NewP@ssw0rd!'
])
net_connect.save_config()
FAQ
-
What is the default password for Cisco switch
Most Cisco switches either use
ciscoas the default password, or have no password set by default (especially newer Catalyst models, which require creating a user at first login). -
What is the default username and password for Cisco switch?
For many Cisco switches, the default username is
ciscooradminand the default password isciscooradmin. Modern Catalyst 9000 series do not have a default; you must set credentials during the initial setup. -
How do I reset a Cisco switch to factory default without password?
To reset a Cisco switch without knowing the password, use the console cable to interrupt the boot process, set the config register to
0x2142, reload, and erase the startup configuration. This bypasses the saved passwords. -
How do I reset a Cisco 3850 switch to factory default without password?
Power-cycle the switch, hold the
Modebutton until the SYST LED blinks, then use the console to runflash_init, deleteconfig.textandvlan.dat, and reload. The switch will boot without user/password protection. -
What should I do after logging in with the default password?
Immediately create a strong, unique admin password, enable SSH, and set up AAA authentication to enhance security.
-
How can I check the current username and password configuration on a Cisco switch?
show running-config | include username
resources
Cisco Catalyst 9300 Series Switches