Unlike typical Linux servers where you can append init=/bin/bash to the kernel boot line, F5’s proprietary TMOS (Traffic Management Operating System) requires a specific procedure using the and the boot manager . Prerequisite: This method requires physical or out-of-band (iLO/iDRAC/IPMI) console access to the device. It will not work over SSH. Method 1: The Standard Recovery (SINGLE User Mode) This is the safest method and works for BIG-IP versions 11.x through 17.x. Step 1: Access the Console & Reboot Connect via serial console. If the device is running, issue the command:
If you booted into "single" user mode, the mcpd (Management Control Process) likely did not start. After logging in normally with your new password, run: F5 Recover Root Password
chroot /mnt/sysimage Now reset the password: Unlike typical Linux servers where you can append
passwd root Exit the chroot, unmount, and reboot. Remember to remove the ISO from the virtual drive. Important Post-Recovery Considerations Resetting the password is only half the battle. You must also handle the configuration database . Method 1: The Standard Recovery (SINGLE User Mode)
For F5 administrators, losing the root password to a BIG-IP device (whether physical appliance or virtual edition) can feel like being locked out of your own data center. Fortunately, F5 provides a well-documented, albeit physically demanding, backdoor recovery process.
mount -o remount,rw / Type passwd and enter your new root password twice: