Apparently, starting with ScreenOS 2.6.1 (which is currently in beta, ready
for release in about a month), password recovery (or "Asset Recovery" as
Netscreen likes to call it) will finally be possible for the end-user to
perform.
>From the 2.6.1 beta test notes:
* Asset Recovery - This feature will reset the device to
factory defaults settings. The configurations will be lost, but access to
the device will be restored. To perform this operation, you need a console
connection.
>From what I've been told, the current procedure (for which you have to send
the unit in...) involves a "special" ScreenOS image you load by TFTP (after
breaking out of the boot routing on the console), similar to when doing a
ScreenOS recovery.
Because of this, I guess you will be able to recover any older device with a
2.6.1 ScreenOS image, but this is wild suspicion, I'll be able to test it as
soon as I get my hands on 2.6.1b1.
Urs
> ----------
> From: Eric Robinson[SMTP:[EMAIL PROTECTED]]
> Sent: Thursday, June 07, 2001 3:15 AM
> To: [EMAIL PROTECTED]
> Subject: NetScreen 10 Password
>
> I have the opportunity to purchase a NetScreen 10 for what I think was is
> great price -- $1,000.00. The only problem is that the previous owner does
> not remember the password. Has anyone heard of a way to reset the
> passwords
> on these things without sending them back to NetScreen? (Also, if the
> price
> is not as good as I thought, please wave me off before I make a mistake
> I'll
> regret.)
>
> Thanks!
>
> --Eric
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Zachary Uram
> Sent: Wednesday, June 06, 2001 3:37 PM
> To: Irony
> Cc: [EMAIL PROTECTED]
> Subject: Re: This is a must read document. It will freak you out
>
>
> that site is unreachable
> tried accessing it from several different ISPs at different times
> in past 2 weeks.
>
> On Wed, 6 Jun 2001, Irony wrote:
>
> > - From time to time a "must read" document is published. Steve Gibson,
> > author of ShieldsUp! and one of the gurus of Windows security lived
> > through a major distributed denial of service attack and traced the
> > attackers. He wrote an extremely readable tutorial on it. It's long,
> > and worth every minute. Just one of his many interesting tidbits:
> > Windows 2000 and XP, unlike their predecessors, have enormous capacity
> > to generate malicious Internet traffic with spoofed IP addresses.
> > http://grc.com/dos/grcdos.htm
> > -
> > [To unsubscribe, send mail to [EMAIL PROTECTED] with
> > "unsubscribe firewalls" in the body of the message.]
> >
>
>
> [EMAIL PROTECTED]
> "Blessed are those who have not seen and yet have faith." - John 20:29
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]