[134830] in North American Network Operators' Group
Fw: Cisco Sanitization
daemon@ATHENA.MIT.EDU (Greg Whynott)
Wed Jan 12 09:48:47 2011
From: Greg Whynott <Greg.Whynott@oicr.on.ca>
To: "'nanog@nanog.org'" <nanog@nanog.org>
Date: Wed, 12 Jan 2011 09:48:40 -0500
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
V
----- Original Message -----
From: Greg Whynott
Sent: Wednesday, January 12, 2011 09:46 AM
To: 'Timothy.Green@ManTech.com' <Timothy.Green@ManTech.com>
Subject: Re: Cisco Sanitization
Replace the flash cards. If you are really concerned about information bei=
ng disclosed, formatting/deleting files will not destroy the data and it p=
robably can be recovered. Or take the flash cards and scrub them from a p=
c.
G
----- Original Message -----
From: Green, Timothy [mailto:Timothy.Green@ManTech.com]
Sent: Wednesday, January 12, 2011 09:41 AM
To: nanog@nanog.org <nanog@nanog.org>
Subject: Cisco Sanitization
Hey all!
I'm currently creating a sanitization guide for all my hardware. When I go=
t to my Cisco devices I noticed there are numerous ways to reset them back =
to the default and clear the NVRAM. Does anyone have a guide that includes=
sanitization information for all Cisco devices(at least switches, routers,=
IDS's, and ASA 5500 Series) so I don't have to recreate the wheel?
Thanks,
Tim
--
This message and any attachments may contain confidential and/or privileged=
information for the sole use of the intended recipient. Any review or dist=
ribution by anyone other than the person for whom it was originally intende=
d is strictly prohibited. If you have received this message in error, pleas=
e contact the sender and delete all copies. Opinions, conclusions or other =
information contained in this message may not be that of the organization.