Guide to Clean Preload for G4L on SecPoint Penetrator Appliance
 
1: Download the necessary file
https://vip.secpoint.com/
2: Unpack and set up an FTP server
Unpack the downloaded file and place it on a local FTP server. You can download the free FileZilla server here:
https://filezilla-project.org/download.php?type=server
 
3: Prepare the FTP server
Place the unpacked Penetrator file in the /img/ directory of your FTP server and create a user with the username preload and password preload.
 
4: Download the G4L image
https://sourceforge.net/projects/g4l/
 
5: Burn the G4L image to a USB flash drive
Use Win32DiskImager to burn the G4L image to a USB flash drive.
https://sourceforge.net/projects/win32diskimager/
 
6: Boot the SecPoint Penetrator Appliance using G4L
Insert the USB flash drive and boot the appliance using G4L.
 
7: Access the G4L menu
At the prompt, type g4l to open the G4L menu, and set the IP address for the machine.
 
8: Enter FTP server details
Input the IP address of the FTP server along with the username and password (preload:preload).
 
9: Select the file
Navigate to the FTP server, and you should see the Penetrator file in the /img/ directory.
 
10: Start the restore process and select entire sda drive
Choose the restore option and wait. The process typically takes about 45-60 minutes.
 
11: Reboot the appliance
Once the process is complete, reboot the appliance. It will now have a clean, restored image.
Comments
0 comments
Please sign in to leave a comment.