Juniper QFX5100-48T
Start the console session.
Plug in serial cable to console port of device from PC COM1 port
Open PuTTY and select "Serial" connection type, leave baud rate (Speed) and other settings as default.
Plug power into device and if a power button exists, turn it on.
Select the boot option that erases configuration.
Press Esc when prompted then use the up/down arrow keys to highlight the Junos Recovery option and press Enter:
Press Esc for boot options
Now booting : SSD0 : TS16DSTDE1500
GNU GRUB version 0.97 (623K lower / 3131132K upper memory)
+-------------------------------------------------------------------------+
| Junos |
| Junos Debug |
| Junos Recovery |
| |
| |
| |
| |
| |
| |
| |
| |
| |
+-------------------------------------------------------------------------+
Use the ^ and v keys to select which entry is highlighted.
Press enter to boot the selected OS, 'e' to edit the
commands before booting, 'a' to modify the kernel arguments
before booting, or 'c' for a command-line.
When prompted to Select a recovery image type the number for the highest version listed then type y to confirm that, and y twice more to confirm formatting each of the data and config disks:
+------------------------------------------+
| Junos Recovery |
+------------------------------------------+
Selected Junos instance 0
-------------------------------------------------
Current : jinstall-qfx-5-18.4R2.7-202109170833.img
Previous : jinstall-qfx-5-18.1R3.3-202109161702.img
-------------------------------------------------
Select an image for recovery or cancel to continue:
Select a recovery image:
1) jinstall-qfx-5-18.1R3.3-202109161702.img
2) jinstall-qfx-5-18.4R2.7-202109170833.img
3) cancel
Pick an option[1-3]:2
Do you really want to recover to
jinstall-qfx-5-18.4R2.7-202109170833.img
Please confirm[y/n]:y
Recovering Junos image
Reverting to jinstall-qfx-5-18.4R2.7-202109170833.img
This may take some time ...
Recovery of Junos image completed.
-------------------------------------------------
Modified Junos configuration:
-------------------------------------------------
Current : jinstall-qfx-5-18.4R2.7-202109170833.img
Previous : jinstall-qfx-5-18.1R3.3-202109161702.img
-------------------------------------------------
Do you want to format Junos data disk?[y/n]y
Formatting Junos data disk.
This may take some time ...
Formatting of Junos data disk completed.
Do you want to format Junos config disk?[y/n]y
Formatting Junos config disk.
This may take some time ...
Formatting of Junos config disk completed.
Further output will include generating public/private key pairs:
Generating public/private rsa1 key pair.
Your identification has been saved in /config/ssh_host_key.
Your public key has been saved in /config/ssh_host_key.pub.
The key fingerprint is:
SHA256:vsl8CQsOqqzcF/PU5NvzXB7jVGpoFeuki2yhYL8LmRQ root@
The key's randomart image is:
+---[RSA1 2048]---+
| |
| |
| E . |
| . . o |
| . S + .|
| .++=.o. * ..|
| . +O+.+oo+ += |
|o o ..=+=+=.o= o|
|++ .. B=o +o o |
+----[SHA256]-----+
Generating DSA key /root/.ssh/ssh_host_dsa_key
Generated SSH key file /config/ssh_host_dsa_key.pub with fingerprint SHA256:ge89aSdN0gbmWH8HAB3mThIk5Ulik+tR7TrtTcPj/hc
Generating public/private dsa key pair.
Your identification has been saved in /config/ssh_host_dsa_key.
Your public key has been saved in /config/ssh_host_dsa_key.pub.
The key fingerprint is:
SHA256:ge89aSdN0gbmWH8HAB3mThIk5Ulik+tR7TrtTcPj/hc root@
The key's randomart image is:
+---[DSA 1024]----+
| =+*++. |
| o.*.=o. |
| . .oB.o . |
| .o* B. . |
| .S.oo*.. .|
| ...o*..=E |
| . *oo+ o.|
| . +. o .|
| ...o|
+----[SHA256]-----+
Generating RSA2 key /root/.ssh/ssh_host_rsa_key
Generated SSH key file /config/ssh_host_rsa_key.pub with fingerprint SHA256:sdhu1f31V0Qo4R54wEQK+2ZeglMOpBlExxG3BszlTZc
Generating public/private rsa key pair.
Your identification has been saved in /config/ssh_host_rsa_key.
Your public key has been saved in /config/ssh_host_rsa_key.pub.
The key fingerprint is:
SHA256:sdhu1f31V0Qo4R54wEQK+2ZeglMOpBlExxG3BszlTZc root@
The key's randomart image is:
+---[RSA 2048]----+
| o++B+o+= oo ..|
| *+* =.=E .. |
| o o B o +. .|
| X o + o . |
| + S o o . o|
| * + .+|
| + +|
| . .|
| |
+----[SHA256]-----+
Generating ECDSA key /root/.ssh/ssh_host_ecdsa_key
Generated SSH key file /config/ssh_host_ecdsa_key.pub with fingerprint SHA256:uKFJ3Dlzpk558CwcPM478swIBKArWtrGJjg94v7b3lM
Generating public/private ecdsa key pair.
Your identification has been saved in /config/ssh_host_ecdsa_key.
Your public key has been saved in /config/ssh_host_ecdsa_key.pub.
The key fingerprint is:
SHA256:uKFJ3Dlzpk558CwcPM478swIBKArWtrGJjg94v7b3lM root@
The key's randomart image is:
+---[ECDSA 256]---+
|. |
|o |
|o |
| o . o o |
|o o o % S |
|+B . * / E |
|B O o X = |
|.* oo*o= |
|.o.o+=*o. |
+----[SHA256]-----+
Generating ED25519 key /root/.ssh/ssh_host_ed25519_key
Generated SSH key file /config/ssh_host_ed25519_key.pub with fingerprint SHA256:Pa4PpyeFsC9wvi5CfWpz3i7ZHsKGmYQ1u7334qRlEb4
Generating public/private ed25519 key pair.
Your identification has been saved in /config/ssh_host_ed25519_key.
Your public key has been saved in /config/ssh_host_ed25519_key.pub.
The key fingerprint is:
SHA256:Pa4PpyeFsC9wvi5CfWpz3i7ZHsKGmYQ1u7334qRlEb4 root@
The key's randomart image is:
+--[ED25519 256]--+
| |
| |
| o . |
| o o.. o |
| ..o oS.o |
| ..oB+ .+.. |
| . =*=+E.o |
| . =.*O**. |
| o **OB*o |
+----[SHA256]-----+
- Try checking for any licenses.
At the login: prompt type root then press Enter by itself when prompted for Terminal type? [vt100] which will bring you to the root@:RE:0% prompt:
Amnesiac (ttyd0)
login: root
Apr 5 03:58:11 login: login_getclass: unknown class 'junos-login-defaults'
--- JUNOS 18.4R2.7 built 2019-06-27 08:41:44 UTC
Terminal type? [vt100]
root@:RE:0%
Type cli to get to the root> prompt then type the show system license command, though the subsytem for that may not be running:
root@:RE:0% cli
Apr 5 03:58:21 cli: login_getclass: unknown class 'j-idle-timeout'
{master:0}
root> show system license
error: the license-service subsystem is not running
{master:0}
root>
Copy all the output from the session into your records.
Right-click PuTTY's titlebar, from that dropdown menu click on "Copy All to Clipboard"
Open the file of record certifying the deconfiguration of this device and use CTRL V to paste all the output from PuTTY into that file. Formatting the text with a fixed-width font helps it look more readable.
End the session.
Close PuTTy.