Guide to Clean Preload for G4L on SecPoint Penetrator Appliance
1: Download the necessary file
https://vip.secpoint.com/
2: Unpack and set up an FTP server
Unpack the downloaded file and place it on a local FTP server. You can download the free FileZilla server here:
https://filezilla-project.org/download.php?type=server
3: Prepare the FTP server
Place the unpacked Penetrator file in the /img/ directory of your FTP server and create a user with the username preload and password preload.
4: Download the G4L image
https://sourceforge.net/projects/g4l/
5: Burn the G4L image to a USB flash drive
Use Win32DiskImager to burn the G4L image to a USB flash drive.
https://sourceforge.net/projects/win32diskimager/
6: Boot the SecPoint Penetrator Appliance using G4L
Insert the USB flash drive and boot the appliance using G4L.
7: Access the G4L menu
At the prompt, type g4l to open the G4L menu, and set the IP address for the machine.
8: Enter FTP server details
Input the IP address of the FTP server along with the username and password (preload:preload).
9: Select the file
Navigate to the FTP server, and you should see the Penetrator file in the /img/ directory.
10: Start the restore process and select entire sda drive
Choose the restore option and wait. The process typically takes about 45-60 minutes.
11: Reboot the appliance
Once the process is complete, reboot the appliance. It will now have a clean, restored image.
Comments
0 comments
Please sign in to leave a comment.