Have you tried resetting to factory, then connecting via the console port, then in the cli switch to root access commands. There is a document which covers this on the web. I know it's still there and it's for srx300. I'd look for it but I forgot the keywords.
Here is one.
https://supportportal.juniper.net/s/article/SRX-Getting-Started-Configure-Admin-User?language=en_US
Try starting from scratch. Also, in the command structure, it might be an option when done from the console.
- First try the console.
- Then try your way.
------------------------------
Adrian Aguinaga
B.S.C.M. I.T.T. Tech
(Construction Management)
A.A.S. I.T.T. Tech
(Drafting & Design)
------------------------------
Original Message:
Sent: 05-09-2024 15:03
From: Nikolay Semov
Subject: checksum Vs Hash digest
I suspect you'll have to zeroize the system.
------------------------------
Nikolay Semov
Original Message:
Sent: 05-09-2024 09:48
From: ALI ARKAWAZI
Subject: checksum Vs Hash digest
thanks for the reply boss!
is there a command to force SRX to use $9 format hash instead of $8 format?
------------------------------
ALI ARKAWAZI
Original Message:
Sent: 05-08-2024 11:20
From: ALI ARKAWAZI
Subject: checksum Vs Hash digest
Dear Sir,
any reason why SRX 340 with OS 22 generating hash as hmac-sha "$8$aes256-gcm$hmac-sha2-256$100$TfNtKvy8tHI$Zab98cIoV+lVAG0+VzVyEw$o//xWmkmKBTCpC8VEzv9/A$XEMe5cW9cmhuxvdMOpg65g"'
instead of "$9$0k
pls help!
------------------------------
ALI ARKAWAZI
Original Message:
Sent: 08-12-2017 06:30
From: spuluka
Subject: checksum Vs Hash digest
Checksums are an early design just to confirm against transit corruption in communication systems and links. This is a quick simple verification that the links are correctly communicating data. You can selectively modify data and keep checksums passing. But that would not happen by accident in transit. So the original purpose of the checksum still works to detect link problems.
Hashes are more robust and designed to add security to detect mailicious manipulation of data in transit. These are security features and constantly evolving as the threat to data access and manipulation increases.