Vulnerability Assessment Scanning and Penetration Testing by VSS, LLC.
Home


Search:


Juniper SRX300 Services Gateway Enterprise Router Firewall Junos + Power Adapter For Sale


Juniper SRX300 Services Gateway Enterprise Router Firewall Junos + Power Adapter
When you click on links to various merchants on this site and make a purchase, this can result in this site earning a commission. Affiliate programs and affiliations include, but are not limited to, the eBay Partner Network.

Buy Now

Juniper SRX300 Services Gateway Enterprise Router Firewall Junos + Power Adapter:
$159.00

You are viewing aJuniper SRX300 Services Gateway Enterprise Router Firewall Junos + Power Adapter. This unit is in very good shape, tested and guaranteed working. I have 5 listed here in this fixed price sale. Please see the Console Session data below. If you have any questions please do not hesitat to contact me. Thanks for viewing my listing!
Listing Includes:
1 xJuniper SRX300 Services Gateway Enterprise Router Firewall Junos + Power Adapter
Console Session:
SRX_300 board revision major:1, minor:8, serial #: CV4416AF0674OCTEON CN7020-AAP pass 1.2, Core clock: 1200 MHz, IO clock: 600 MHz, DDR clock: 667 MHz (1334 Mhz DDR)Base DRAM address used by u-boot: 0x10fc00000, size: 0x400000DRAM: 4 GiBClearing DRAM...... doneUsing default environment
SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiBFound valid SPI bootloader at offset: 0x90000, size: 1481840 bytesU-Boot 2013.07-JNPR-3.1 (Build time: May 03 2016 - 23:50:19)
Using DRAM size from environment: 4096 MBytescheckboard siegeSATA0: not availableSATA1: not availableSATA BIST STATUS = 0x0SRX_300 board revision major:1, minor:8, serial #: CV4416AF0674OCTEON CN7020-AAP pass 1.2, Core clock: 1200 MHz, IO clock: 600 MHz, DDR clock: 667 MHz (1334 Mhz DDR)Base DRAM address used by u-boot: 0x10f000000, size: 0x1000000DRAM: 4 GiBClearing DRAM...... doneSF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiBPCIe: Port 0 link active, 1 lanes, speed gen2PCIe: Link timeout on port 1, probably the slot is emptyPCIe: Port 2 not in PCIe mode, skippingNet: octeth0Interface 0 has 1 ports (SGMII)Type the command \'usb start\' to scan for USB storage devices.
Boot Media: eUSB usbFound TPM SLB9660 TT 1.2 by InfineonTPM initializedHit any key to stop autoboot: 0SF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiBSF: 1048576 bytes 0x200000 Read: OK## Starting application at 0x8f0000a0 ...Consoles: U-Boot consoleFound compatible API, ver. 3.1USB1:Starting the controllerUSB XHCI 1.00scanning bus 1 for devices... 2 USB Device(s) foundUSB0:Starting the controllerUSB XHCI 1.00scanning bus 0 for devices... 1 USB Device(s) found scanning usb for storage devices... 1 Storage Device(s) found
FreeBSD/MIPS U-Boot bootstrap loader, Revision 2.8(Tue Feb 10 00:32:30 PST 2015)Memory: 4096MBSF: Detected MX25L6405D with page size 256 Bytes, erase size 64 KiB, total 8 MiB[0]Booting from eUSB slice 1Loading /boot/defaults/loader.conf/kernel data=0xb817f4+0x151638 syms=[0x4+0x9de30+0x4+0xeb463]Hit [Enter] to boot immediately, or space bar for command prompt.Booting [/kernel]...Kernel entry at 0x801000c0 ...init regular consolePrimary ICache: Sets 16 Size 128 Asso 39Primary DCache: Sets 8 Size 128 Asso 32Secondary DCache: Sets 1024 Size 128 Asso 4CIU_FUSE 0x3/0x3GDB: debug ports: uartGDB: current port: uartKDB: debugger backends: ddb gdbKDB: current backend: ddbkld_map_v: 0x8ff80000, kld_map_p: 0x0Running in PARTITIONED TLB MODECopyright (c) 1996-2016, Juniper Networks, Inc.All rights reserved.Copyright (c) 1992-2007 The FreeBSD Project.Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994 The Regents of the University of California. All rights reserved.FreeBSD is a registered trademark of The FreeBSD Foundation.JUNOS 15.1X49-D60.7 #0: 2016-09-13 22:27:47 UTC can\'t re-use a leaf (debug)!JUNOS 15.1X49-D60.7 #0: 2016-09-13 22:27:47 UTC memory = 4294967296 (4194304K bytes)avail memory = 2621882368 (2500MB)FreeBSD/SMP: Multiprocessor System Detected: 2 CPUsSecurity policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)Security policy loaded: Junos MAC/veriexec (mac_veriexec)Security policy loaded: JUNOS MAC/pcap (mac_pcap)MAC/veriexec fingerprint module loaded: SHA256MAC/veriexec fingerprint module loaded: SHA1netisr_init: !debug_mpsafenet, forcing maxthreads from 2 to 1cpu0 on motherboard: CAVIUM\'s OCTEON 70XX/71XX CPU Rev. 0.2 with no FPU implemented L1 Cache: I size 78kb(128 line), D size 32kb(128 line), thirty two way. L2 Cache: Size 512kb, 4 wayobio0 on motherboarduart0: <Octeon-16550 channel 0> on obio0uart0: console (9600,n,8,1)twsi0 on obio0set clock 0x58xhci0: <Cavium Octeon 7xxx xHCI Host Driver> on obio0usb0: <USB bus for xHCI Controller> on xhci0usb0: USB revision 3.0uhub0: vendor 0x0000 XHCI root hub, class 9/0, rev 3.00/1.00, addr 1uhub0: 2 ports with 2 removable, self poweredxhci1: <Cavium Octeon 7xxx xHCI Host Driver> on obio0usb1: <USB bus for xHCI Controller> on xhci1usb1: USB revision 3.0uhub1: vendor 0x0000 XHCI root hub, class 9/0, rev 3.00/1.00, addr 1uhub1: 2 ports with 2 removable, self poweredcpld0 on obio0pcib0: <Cavium on-chip PCIe HOST bridge> on obio0Disabling Octeon big bar supportpcib0: Initialized controllerpci0: <PCI bus> on pcib0pci0: <network, ethernet> at device 0.0 (no driver attached)pci0: <network, ethernet> at device 0.1 (no driver attached)gblmem0 on obio0octpkt0: <Octeon RGMII> on obio0cfi0: <Macronix MX25L64 - 8MB> on obio0cfi1: <Macronix MX25L64 - 8MB> on obio0umass0: ATP Electronics ATP CG eUSB, rev 2.00/11.00, addr 2Timecounter \"mips\" frequency 1200000000 Hz quality 0Registered AMT tunnel Encap with UDP Tunnel!Loading Redundant LT driver###PCB Group initialized for udppcbgroup###PCB Group initialized for tcppcbgroupKernel thread \"wkupdaemon\" (pid 47) exited prematurely.da0 at umass-sim0 bus 0 target 0 lun 0da0: <ATP ATP CG eUSB 1100> Fixed Direct Access SCSI-4 deviceda0: 40.000MB/s transfersda0: 7672MB (15712256 512 byte sectors: 255H 63S/T 978C)Trying to mount root from ufs:/dev/da0s1aWARNING: / was not properly dismountedMFSINIT: Initialising MFSROOTWARNING: / was not properly dismountedProcess-1 beginning MFSROOT initialization...Creating MFSROOT.../dev/md0: 20.0MB (40956 sectors) block size 16384, fragment size 2048 using 4 cylinder groups of 5.00MB, 320 blks, 640 inodes.super-block backups (for fsck -b #) at:32, 10272, 20512, 30752Populating MFSROOT...Creating symlinks...Setting up mounts...Continuing boot from MFSROOT...Attaching /cf/packages/junos via /dev/mdctl...Mounted junos package on /dev/md1...OWARNING: R/W mount of /cf/var denied. Filesystem is not clean - run fsckmount: /dev/bo0s3f : Operation not permittedchflags: /var/packages/*: No such file or directoryumount: /dev/bo0s3f: unknown file systemAutomatic reboot in progress...** /dev/da0s1a (NO WRITE)** Last Mounted on /** Root file system** Phase 1 - Check Blocks and Sizes** Phase 2 - Check Pathnames** Phase 3 - Check Connectivity** Phase 4 - Check Reference Counts** Phase 5 - Check Cyl groups164 files, 122044 used, 1142310 free (54 frags, 142782 blocks, 0.0% fragmentation)mount reload of \'/\' failed: Operation not supported
Verified junos signed by PackageProductionEc_2016 method ECDSA256+SHA256Verified jboot signed by PackageProductionEc_2016 method ECDSA256+SHA256Verified junos-15.1X49-D60.7-domestic signed by PackageProductionEc_2016 method ECDSA256+SHA256Checking integrity of BSD labels: s1: Passed s2: Passed s3: Passed s4: Passed** /dev/bo0s3e** Last Mounted on /config** Phase 1 - Check Blocks and Sizes** Phase 2 - Check Pathnames** Phase 3 - Check Connectivity** Phase 4 - Check Reference Counts** Phase 5 - Check Cyl groups11 files, 19 used, 94757 free (13 frags, 11843 blocks, 0.0% fragmentation)
***** FILE SYSTEM MARKED CLEAN ******* /dev/bo0s3f** Last Mounted on /cf/var** Phase 1 - Check Blocks and Sizes** Phase 2 - Check Pathnames** Phase 3 - Check Connectivity** Phase 4 - Check Reference CountsUNREF FILE I=117843 OWNER=0 MODE=100644SIZE=0 MTIME=Nov 18 23:04 2017CLEAR? yes
** Phase 5 - Check Cyl groupsFREE BLK COUNT(S) WRONG IN SUPERBLKSALVAGE? yes
SUMMARY INFORMATION BADSALVAGE? yes
BLK(S) MISSING IN BIT MAPSSALVAGE? yes
404 files, 30045 used, 1079168 free (240 frags, 134866 blocks, 0.0% fragmentation)
***** FILE SYSTEM MARKED CLEAN *****
***** FILE SYSTEM WAS MODIFIED *****Checking integrity of licenses:Checking integrity of configuration: rescue.conf.gz: PassedLoading configuration ...hw.re.gres_sync_other: 0 -> 1mgd: Running FIPS Self-testsveriexec: no fingerprint for file=\'/sbin/kats/cannot-exec\' fsid=76 fileid=2400460 gen=1 uid=0 pid=849mgd: FITime and ticks drifted too much, resetting synchronization...Network security daemon:Network security daemon: security daemon: <message>Interfaces are changed from no mode to switch mode. L2 global mode is changed from transparent mode to switching mode. Please use the command request system reboot on current node or all nodes in case of HA cluster!</message>Network security daemon: </xnm:warning>Non-existant dump device /dev/bo0s1bmgd: commit completeln: /var/chroot/rest-api/web-api: Read-only file systemSetting initial options: .Starting optional daemons: usbd.Doing initial network setup:.Initial interface configuration:additional daemons: eventd.Non-existant dump device /dev/bo0s1bAdditional routing options:kern.module_path: /boot//kernel;/boot/modules -> netpfe drv: ifpfed_dialer ipsecIPsec: Initialized Security Association Processing.kld kats kl.Doing additional network setup: ipv6_security=YES.Starting final network daemons:.setting ldconfig path: /usr/lib /opt/libstarting standard daemons: cron.Initial rc.mips initialization:.Local package initialization:.starting local daemons:set cores for group accesshw.re.gres_sync_other: 1 -> 0.kern.securelevel: -1 -> 1Creating JAIL MFS partition...JAIL MFS partition createdBoot media /dev/da0 has dual root support** /dev/da0s2aFILE SYSTEM CLEAN; SKIPPING CHECKSclean, 1146327 free (87 frags, 143280 blocks, 0.0% fragmentation)chassis.ko loaded Loading JUNOS chassis chassis startup time 0.000000Wed Oct 16 11:47:18 EDT 2019OOOOOOsrx-ACCOUNT (ttyu0)
login:
Buy Now

Other Related Items:



Related Items:

Juniper Networks SRX300 Firewall Security Router Switch WAN 8-Port Rev. 09 picture

Juniper Networks SRX300 Firewall Security Router Switch WAN 8-Port Rev. 09

$119.95



New Juniper SRX300-RMK0 Rack Mount Kit #69 picture

New Juniper SRX300-RMK0 Rack Mount Kit #69

$99.99



Juniper Networks SRX300 6-Port Security Services Gateway Firewall Switch picture

Juniper Networks SRX300 6-Port Security Services Gateway Firewall Switch

$324.99




VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.