Juniper QFX5100-48T

  1. Start the console session.

    Plug in serial cable to console port of device from PC COM1 port
    Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
    Plug power into device and if a power button exists, turn it on.
  2. Select the boot option that erases configuration.

    Press Esc when prompted then use the up/down arrow keys to highlight the Junos Recovery option and press Enter:
    Press Esc for boot options Now booting : SSD0 : TS16DSTDE1500 GNU GRUB version 0.97 (623K lower / 3131132K upper memory) +-------------------------------------------------------------------------+ | Junos | | Junos Debug | | Junos Recovery | | | | | | | | | | | | | | | | | | | +-------------------------------------------------------------------------+ Use the ^ and v keys to select which entry is highlighted. Press enter to boot the selected OS, 'e' to edit the commands before booting, 'a' to modify the kernel arguments before booting, or 'c' for a command-line.
    When prompted to Select a recovery image type the number for the highest version listed then type y to confirm that, and y twice more to confirm formatting each of the data and config disks:
    +------------------------------------------+ | Junos Recovery | +------------------------------------------+ Selected Junos instance 0 ------------------------------------------------- Current : jinstall-qfx-5-18.4R2.7-202109170833.img Previous : jinstall-qfx-5-18.1R3.3-202109161702.img ------------------------------------------------- Select an image for recovery or cancel to continue: Select a recovery image: 1) jinstall-qfx-5-18.1R3.3-202109161702.img 2) jinstall-qfx-5-18.4R2.7-202109170833.img 3) cancel Pick an option[1-3]:2 Do you really want to recover to jinstall-qfx-5-18.4R2.7-202109170833.img Please confirm[y/n]:y Recovering Junos image Reverting to jinstall-qfx-5-18.4R2.7-202109170833.img This may take some time ... Recovery of Junos image completed. ------------------------------------------------- Modified Junos configuration: ------------------------------------------------- Current : jinstall-qfx-5-18.4R2.7-202109170833.img Previous : jinstall-qfx-5-18.1R3.3-202109161702.img ------------------------------------------------- Do you want to format Junos data disk?[y/n]y Formatting Junos data disk. This may take some time ... Formatting of Junos data disk completed. Do you want to format Junos config disk?[y/n]y Formatting Junos config disk. This may take some time ... Formatting of Junos config disk completed.
    Further output will include generating public/private key pairs:
    Generating public/private rsa1 key pair. Your identification has been saved in /config/ssh_host_key. Your public key has been saved in /config/ssh_host_key.pub. The key fingerprint is: SHA256:vsl8CQsOqqzcF/PU5NvzXB7jVGpoFeuki2yhYL8LmRQ root@ The key's randomart image is: +---[RSA1 2048]---+ | | | | | E . | | . . o | | . S + .| | .++=.o. * ..| | . +O+.+oo+ += | |o o ..=+=+=.o= o| |++ .. B=o +o o | +----[SHA256]-----+ Generating DSA key /root/.ssh/ssh_host_dsa_key Generated SSH key file /config/ssh_host_dsa_key.pub with fingerprint SHA256:ge89aSdN0gbmWH8HAB3mThIk5Ulik+tR7TrtTcPj/hc Generating public/private dsa key pair. Your identification has been saved in /config/ssh_host_dsa_key. Your public key has been saved in /config/ssh_host_dsa_key.pub. The key fingerprint is: SHA256:ge89aSdN0gbmWH8HAB3mThIk5Ulik+tR7TrtTcPj/hc root@ The key's randomart image is: +---[DSA 1024]----+ | =+*++. | | o.*.=o. | | . .oB.o . | | .o* B. . | | .S.oo*.. .| | ...o*..=E | | . *oo+ o.| | . +. o .| | ...o| +----[SHA256]-----+ Generating RSA2 key /root/.ssh/ssh_host_rsa_key Generated SSH key file /config/ssh_host_rsa_key.pub with fingerprint SHA256:sdhu1f31V0Qo4R54wEQK+2ZeglMOpBlExxG3BszlTZc Generating public/private rsa key pair. Your identification has been saved in /config/ssh_host_rsa_key. Your public key has been saved in /config/ssh_host_rsa_key.pub. The key fingerprint is: SHA256:sdhu1f31V0Qo4R54wEQK+2ZeglMOpBlExxG3BszlTZc root@ The key's randomart image is: +---[RSA 2048]----+ | o++B+o+= oo ..| | *+* =.=E .. | | o o B o +. .| | X o + o . | | + S o o . o| | * + .+| | + +| | . .| | | +----[SHA256]-----+ Generating ECDSA key /root/.ssh/ssh_host_ecdsa_key Generated SSH key file /config/ssh_host_ecdsa_key.pub with fingerprint SHA256:uKFJ3Dlzpk558CwcPM478swIBKArWtrGJjg94v7b3lM Generating public/private ecdsa key pair. Your identification has been saved in /config/ssh_host_ecdsa_key. Your public key has been saved in /config/ssh_host_ecdsa_key.pub. The key fingerprint is: SHA256:uKFJ3Dlzpk558CwcPM478swIBKArWtrGJjg94v7b3lM root@ The key's randomart image is: +---[ECDSA 256]---+ |. | |o | |o | | o . o o | |o o o % S | |+B . * / E | |B O o X = | |.* oo*o= | |.o.o+=*o. | +----[SHA256]-----+ Generating ED25519 key /root/.ssh/ssh_host_ed25519_key Generated SSH key file /config/ssh_host_ed25519_key.pub with fingerprint SHA256:Pa4PpyeFsC9wvi5CfWpz3i7ZHsKGmYQ1u7334qRlEb4 Generating public/private ed25519 key pair. Your identification has been saved in /config/ssh_host_ed25519_key. Your public key has been saved in /config/ssh_host_ed25519_key.pub. The key fingerprint is: SHA256:Pa4PpyeFsC9wvi5CfWpz3i7ZHsKGmYQ1u7334qRlEb4 root@ The key's randomart image is: +--[ED25519 256]--+ | | | | | o . | | o o.. o | | ..o oS.o | | ..oB+ .+.. | | . =*=+E.o | | . =.*O**. | | o **OB*o | +----[SHA256]-----+
  3. Try checking for any licenses.
    At the login:  prompt type root then press Enter by itself when prompted for Terminal type? [vt100] which will bring you to the root@:RE:0%  prompt:
    Amnesiac (ttyd0) login: root Apr 5 03:58:11 login: login_getclass: unknown class 'junos-login-defaults' --- JUNOS 18.4R2.7 built 2019-06-27 08:41:44 UTC Terminal type? [vt100] root@:RE:0%
    Type cli to get to the root>  prompt then type the show system license command, though the subsytem for that may not be running:
    root@:RE:0% cli Apr 5 03:58:21 cli: login_getclass: unknown class 'j-idle-timeout' {master:0} root> show system license error: the license-service subsystem is not running {master:0} root>
  4. Copy all the output from the session into your records.

    Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
    Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
  5. End the session.

    Close PuTTy.