AR Router Troubleshooting Guide(V200 and V300)

Troubleshooting Cases: Using the RESET or RST Button on an AR Router to Restore Its Default Configuration

Troubleshooting Cases: Using the RESET or RST Button on an AR Router to Restore Its Default Configuration

When incorrect configurations result in a fault (for example, device login failure), you can press the RESET or RST button on the panel to enable the device to use default configurations in a restart.

Press the RESET or RST button for no less than 5s to restart the device with default settings.

  • If you press the RESET or RST button for no longer than 5s, the device restarts without saving the current configurations and uses the original configuration file for the next startup. Therefore, save the configurations before pressing the RESET or RST button.

  • If the device restarts with default configurations, the original configuration file still exists. After you perform configurations, save them to make them take effect. Otherwise, the device still uses default configurations in the next restart.

  • Do not power off the device during the operation. Otherwise, the operation fails and the device uses the original configuration file for the next startup.

  • The silkscreen of the reset button is RESET or RST, for details, see the device.
  • What Can I Do If the Device Cannot Be Restored to Factory Settings After I Press and Hold the RESET/RST Button, You can manually enter and run the undo factory-configuration prohibit command on the CLI to enable the function of restoring factory settings by pressing and holding the RESET button.

Run the display factory-configuration command to display the factory configuration information.

<Huawei> display factory-configuration
#
vlan 1
#
dhcp enable
#
 http secure-server ssl-policy default_policy
 http secure-server enable
 http server permit interface GigabitEthernet0/0/0 Wlan-Radio 0/0/0
#
ssl policy default_policy type server
 pki-realm default
 version tls1.2
 ciphersuite rsa_aes_128_sha256 rsa_aes_256_sha256 rsa_aes_128_cbc_sha ecdhe_rsa_aes128_gcm_sha256 ecdhe_rsa_aes256_gcm_sha384
#
aaa
 authentication-scheme default
 authorization-scheme default
 accounting-scheme default
 local-aaa-user password policy administrator
 domain default
 domain default_admin
 local-user admin password irreversible-cipher $1a$l/ee<QKJ`1$aPb2.&;1m0F.R-CHp_};.,#v)1A_gH=rau~tev,#$
 local-user admin privilege level 15
 local-user admin service-type terminal http
#
interface Vlanif1
 ip address 192.168.1.1 255.255.255.0
 dhcp select interface
#
 snmp-agent trap enable
#
user-interface con 0
 authentication-mode aaa
 user privilege level 15
#
user-interface vty 0
 authentication-mode aaa
 user privilege level 15
#
return
Translation
Favorite
Download
Update Date:2025-08-01
Document ID:EDOC1000079719
Views:4544256
Downloads:17272
Average rating:4.74Points

Digital Signature File

digtal sigature tool