Apparently, starting with ScreenOS 2.6.1 (which is currently in beta, ready
for release in about a month), password recovery (or "Asset Recovery" as
Netscreen likes to call it) will finally be possible for the end-user to
perform.

>From the 2.6.1 beta test notes:

        *       Asset Recovery - This feature will reset the device to
factory defaults settings. The configurations will be lost, but access to
the device will be restored.  To perform this operation, you need a console
connection.

>From what I've been told, the current procedure (for which you have to send
the unit in...) involves a "special" ScreenOS image you load by TFTP (after
breaking out of the boot routing on the console), similar to when doing a
ScreenOS recovery.
Because of this, I guess you will be able to recover any older device with a
2.6.1 ScreenOS image, but this is wild suspicion, I'll be able to test it as
soon as I get my hands on 2.6.1b1.

Urs


> ----------
> From:         Eric Robinson[SMTP:[EMAIL PROTECTED]]
> Sent:         Thursday, June 07, 2001 3:15 AM
> To:   [EMAIL PROTECTED]
> Subject:      NetScreen 10 Password
> 
> I have the opportunity to purchase a NetScreen 10 for what I think was is
> great price -- $1,000.00. The only problem is that the previous owner does
> not remember the password. Has anyone heard of a way to reset the
> passwords
> on these things without sending them back to NetScreen? (Also, if the
> price
> is not as good as I thought, please wave me off before I make a mistake
> I'll
> regret.)
> 
> Thanks!
> 
> --Eric
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Zachary Uram
> Sent: Wednesday, June 06, 2001 3:37 PM
> To: Irony
> Cc: [EMAIL PROTECTED]
> Subject: Re: This is a must read document. It will freak you out
> 
> 
> that site is unreachable
> tried accessing it from several different ISPs at different times
> in past 2 weeks.
> 
> On Wed, 6 Jun 2001, Irony wrote:
> 
> > - From time to time a "must read" document is published. Steve Gibson,
> > author of ShieldsUp! and one of the gurus of Windows security lived
> > through a major distributed denial of service attack and traced the
> > attackers. He wrote an extremely readable tutorial on it.  It's long,
> > and worth every minute.  Just one of his many interesting tidbits:
> > Windows 2000 and XP, unlike their predecessors, have enormous capacity
> > to generate malicious Internet traffic with spoofed IP addresses.
> > http://grc.com/dos/grcdos.htm
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> >
> 
> 
> [EMAIL PROTECTED]
> "Blessed are those who have not seen and yet have faith." - John 20:29
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to