返回顶部
Juniper networks SRX300 ACアダプタ付き、動作確認済み、初期化済み拍卖
  • {$data['title']拍卖
  • {$data['title']拍卖
  • {$data['title']拍卖
  • {$data['title']拍卖
X
Juniper networks SRX300 ACアダプタ付き、動作確認済み、初期化済み
{$data['title']拍卖 {$data['title']拍卖 {$data['title']拍卖 {$data['title']拍卖
收藏该商品
Juniper networks SRX300 ACアダプタ付き、動作確認済み、初期化済み
商品编号:k1201996323 【浏览原始网页】
当前价:RMB 302
加价单位:250日元
日  元:
出价:1
商品件数:1
商品成色:其他
日本邮费:买家承担
可否退货:不可以
开始时间:2025-10-14 14:04:12
结束时间:2025-10-16 18:03:57
自动延长:有可能
提早结束:有可能
划词翻译上线,鼠标选择文字自动翻译,翻译内容仅供参考,如有疑问请咨询小觅翻译。
Juniper networks SRX300 ACアダプタ付き、動作確認済み、初期化済み

 テストログは下記の内容をご確認ください。


*
*     Juniper SRX300
*       S/N : CV2918AF0439
*
*       Factory reset by "request system zeroize"

*       Login ID : root      PW : none
*       
*
*      % cli
*

 
root> request system ?
Possible completions:
  autorecovery         Manage autorecovery information
  certificate          Manage X509 certificates
  commit               Perform commit related operations
  configuration        Request operation on system configuration
  decrypt              Decrypt a $8$ or $9$-encrypted password
  download             Manage downloads
  firmware             Upgrade or downgrade firmware
  halt                 Halt the system
  health               Online diagnostic request
  license              Manage feature licenses
  logout               Forcibly end user's CLI login session
  power-off            Power off the software on RE
  process              Request operation on system process
  reboot               Reboot the system
  scripts              Manage scripts (commit, op, event)
  services             Request service applications information
  set-encryption-key   Set EEPROM stored encryption key
  snapshot             Archive data and executable areas
  software             Perform system software extension or upgrade
  storage              Request operation on system storage
  subscriber-management  Request Subscriber management action
  zeroize              Erase all data, including configuration and log files
root> request system zeroize ?
Possible completions:
  <[Enter]>            Execute this command
  local                Zeroize just this Routing Engine
  media                Overwrite media
  |                    Pipe through a command
root> request system zeroize
warning: System will be rebooted and may not boot without configuration
Erase all data, including configuration and log files? [yes,no] (no) yes

warning: zeroizing re0
Sep 24 01:48:15 init: trousers (PID 1864) terminate signal 15 sent
Sep 24 01:48:15 init: jsrp-service (PID 1866) terminate signal 15 sent
Sep 24 01:48:15 init: network-security (PID 1867) terminate signal 15 sent
Sep 24 01:48:15 init: ftp-inet-process (PID 1868) terminate signal 15 sent
Sep 24 01:48:15 init: pki-service (PID 1869) terminate signal 15 sent
Sep 24 01:48:15 init: web-management (PID 1870) terminate signal 15 sent
Sep 24 01:48:15 init: application-identification (PID 1872) terminate signal 15 sent
Sep 24 01:48:15 init: application-security (PID 1873) terminate signal 15 sent
Sep 24 01:48:15 init: idp-policy (PID 1874) terminate signal 15 sent
Sep 24 01:48:15 init: phone-home-client (PID 1875) terminate signal 15 sent
Sep 24 01:48:15 init: security-intelligence (PID 1876) terminate signal 15 sent
Sep 24 01:48:15 init: advanced-anti-malware (PID 1877) terminate signal 15 sent
Sep 24 01:48:15 init: network-security-trace (PID 1878) terminate signal 15 sent
Sep 24 01:48:15 init: security-log (PID 1879) terminate signal 15 sent
Sep 24 01:48:15 init: utmd (PID 1880) terminate signal 15 sent
Sep 24 01:48:15 init: ntpd-service (PID 1881) terminate signal 15 sent
Sep 24 01:48:15 init: system-health-management (PID 1882) terminate signal 15 sent
Sep 24 01:48:15 init: simple-mail-client-service (PID 1883) terminate signal 15 sentSep 24 01:48:19 init: jnx-wmicd-service (PID 1884) exited with status=0 Normal Exit
Sep 24 01:48:19 init: bslockd (PID 1822) exited with status=0 Normal Exit
Sep 24 01:48:19 init: watchdog (PID 1821) exited with status=0 Normal Exit
SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSWaiting (max 60 seconds) for system process `vnlru' to stop...done
Waiting (max 60 seconds) for system process `vnlru_mem' to stop...done
Waiting (max 60 seconds) for system process `bufdaemon' to stop...done
Waiting (max 60 seconds) for system process `syncer' to stop...
Syncing disks, vnodes remaining...0 0 0 done

syncing disks... All buffers synced.
Uptime: 6m15s
Rebooting...
cpu_reset: Stopping other CPUs


SPI stage 1 bootloader (Build time: Mar  3 2018 - 20:32:11)


U-Boot 2013.07-JNPR-3.6 (Build time: Mar 03 2018 - 20:32:12)

SRX_300 board revision major:1, minor:12, serial #: CV2918AF0439
OCTEON CN7020-AAP pass 1.2, Core clock: 1200 MHz, IO clock: 600 MHz, DDR clock: 667 MHz (1334 Mhz DDR)
DRAM: 4 GiB
Clearing DRAM...... done
Using default environment

SF: Detected SF with page size 256 Bytes, erase size 64 KiB, total 8 MiB


U-Boot 2013.07-JNPR-3.6 (Build time: Mar 03 2018 - 20:34:17)

Using DRAM size from environment: 4096 MBytes
SATA0: not available
SATA1: not available
SATA BIST STATUS = 0x0
SRX_300 board revision major:1, minor:12, serial #: CV2918AF0439
OCTEON CN7020-AAP pass 1.2, Core clock: 1200 MHz, IO clock: 600 MHz, DDR clock: 667 MHz (1334 Mhz DDR)
DRAM: 4 GiB
Clearing DRAM...... done
SF: Detected SF with page size 256 Bytes, erase size 64 KiB, total 8 MiB
PCIe: Port 0 link active, 1 lanes, speed gen2
PCIe: Link timeout on port 1, probably the slot is empty
PCIe: Port 2 not in PCIe mode, skipping
Net:   octeth0
Interface 0 has 1 ports (SGMII)
Type the command 'usb start' to scan for USB storage devices.

Boot Media: eUSB usb
Found TPM SLB9660 TT 1.2 by Infineon
TPM initialized
Hit any key to stop autoboot:  0
SF: Detected SF with page size 256 Bytes, erase size 64 KiB, total 8 MiB
SF: 1048576 bytes Read: OK
## Starting application ...
Consoles: U-Boot console
Found compatible API, ver. 3.6
USB1:
Starting the controller
USB XHCI 1.00
scanning bus 1 for devices... 2 USB Device(s) found
USB0:
Starting the controller
USB XHCI 1.00
scanning bus 0 for devices... 1 USB Device(s) found
       scanning usb for storage devices... 1 Storage Device(s) found

FreeBSD/MIPS U-Boot bootstrap loader, Revision 2.10
(slt-builder@svl-junos-pool87.juniper.net, Sun Mar  4 10:30:52 PST 2018)
Memory: 4096MB
SF: Detected SF with page size 256 Bytes, erase size 64 KiB, total 8 MiB
[0]Booting from eUSB slice 1
Loading /boot/defaults/loader.conf
/kernel data=0xba1ec0+0x152c60 syms=[0x4+0xa0a30+0x4+0xf0706]


Hit [Enter] to boot immediately, or space bar for command prompt.
Booting [/kernel]...
Kernel entry at 0x801000c0 ...
init regular console
Primary ICache: Sets 16 Size 128 Asso 39
Primary DCache: Sets 8 Size 128 Asso 32
Secondary DCache: Sets 1024 Size 128 Asso 4
CIU_FUSE 0x3/0x3
GDB: debug ports: uart
GDB: current port: uart
KDB: debugger backends: ddb gdb
KDB: current backend: ddb
kld_map_v: 0x8ff80000, kld_map_p: 0x0
Running in PARTITIONED TLB MODE
Copyright (c) 1996-2018, Juniper Networks, Inc.
All rights reserved.
Copyright (c) 1992-2007 The FreeBSD Project.
Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
        The Regents of the University of California. All rights reserved.
FreeBSD is a registered trademark of The FreeBSD Foundation.
JUNOS 15.1X49-D150.2 #0: 2018-09-19 17:44:55 UTC
    builder@monarth.juniper.net:/volume/build/junos/15.1/service/15.1X49-D150.2/obj/octeon/junos/bsd/kernels/JSRXNLE/kernel
can't re-use a leaf (perf_mon)!
can't re-use a leaf (threshold)!
can't re-use a leaf (debug)!
JUNOS 15.1X49-D150.2 #0: 2018-09-19 17:44:55 UTC
    builder@monarth.juniper.net:/volume/build/junos/15.1/service/15.1X49-D150.2/obj/octeon/junos/bsd/kernels/JSRXNLE/kernel
real memory  = 4294967296 (4194304K bytes)
avail memory = 2621882368 (2500MB)
FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs
Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
Security policy loaded: Junos MAC/veriexec (mac_veriexec)
Security policy loaded: JUNOS MAC/pcap (mac_pcap)
MAC/veriexec fingerprint module loaded: SHA1
MAC/veriexec fingerprint module loaded: SHA256
netisr_init: !debug_mpsafenet, forcing maxthreads from 2 to 1
cpu0 on motherboard
: CAVIUM's OCTEON 70XX/71XX CPU Rev. 0.2 with no FPU implemented
        L1 Cache: I size 78kb(128 line), D size 32kb(128 line), thirty two way.
        L2 Cache: Size 512kb, 4 way
obio0 on motherboard
uart0: <Octeon-16550 channel 0> on obio0
uart0: console (9600,n,8,1)
twsi0 on obio0
set clock 0x31
xhci0: <Cavium Octeon 7xxx xHCI Host Driver> on obio0
usb0: <USB bus for xHCI Controller> on xhci0
usb0: USB revision 3.0
uhub0: vendor 0x0000 XHCI root hub, class 9/0, rev 3.00/1.00, addr 1
uhub0: 2 ports with 2 removable, self powered
xhci1: <Cavium Octeon 7xxx xHCI Host Driver> on obio0
usb1: <USB bus for xHCI Controller> on xhci1
usb1: USB revision 3.0
uhub1: vendor 0x0000 XHCI root hub, class 9/0, rev 3.00/1.00, addr 1
uhub1: 2 ports with 2 removable, self powered
cpld0 on obio0
pcib0: <Cavium on-chip PCIe HOST bridge> on obio0
Disabling Octeon big bar support
pcib0: Initialized controller
pci0: <PCI bus> on pcib0
pci0: <network, ethernet> at device 0.0 (no driver attached)
pci0: <network, ethernet> at device 0.1 (no driver attached)
gblmem0 on obio0
octpkt0: <Octeon RGMII> on obio0
cfi0: <Macronix MX25L64 - 8MB> on obio0
cfi1: <Macronix MX25L64 - 8MB> on obio0
umass0: ATP Electronics ATP CG eUSB, rev 2.00/11.00, addr 2
Timecounter "mips" frequency 1200000000 Hz quality 0
Registered AMT tunnel Encap with UDP Tunnel!
 Loading Redundant LT driver
###PCB Group initialized for udppcbgroup
###PCB Group initialized for tcppcbgroup
da0 at umass-sim0 bus 0 target 0 lun 0
da0: <ATP ATP CG eUSB 1100> Fixed Direct Access SCSI-4 device
da0: 40.000MB/s transfers
da0: 7672MB (15712256 512 byte sectors: 255H 63S/T 978C)
Kernel thread "wkupdaemon" (pid 51) exited prematurely.
Trying to mount root from ufs:/dev/da0s1a
WARNING: / was not properly dismounted
MFSINIT: Initialising MFSROOT
WARNING: / was not properly dismounted
Process-1 beginning MFSROOT initialization...
Creating MFSROOT...
/dev/md0: 20.0MB (40956 sectors) block size 16384, fragment size 2048
        using 4 cylinder groups of 5.00MB, 320 blks, 640 inodes.
super-block backups (for fsck -b #) at:
 32, 10272, 20512, 30752
Populating MFSROOT...
Creating symlinks...
Setting up mounts...
Continuing boot from MFSROOT...
Attaching /cf/packages/junos via /dev/mdctl...
Mounted junos package on /dev/md1...
S
Automatic reboot in progress...
Verified jboot signed by PackageProductionEc_2018 method ECDSA256+SHA256
Verified junos signed by PackageProductionEc_2018 method ECDSA256+SHA256
Verified junos-15.1X49-D150.2-domestic signed by PackageProductionEc_2018 method ECDSA256+SHA256
Checking integrity of BSD labels:
  s1: Passed
  s2: Passed
  s3: Passed
  s4: Passed
** /dev/bo0s3e
FILE SYSTEM CLEAN; SKIPPING CHECKS
clean, 94771 free (27 frags, 11843 blocks, 0.0% fragmentation)
** /dev/bo0s3f
FILE SYSTEM CLEAN; SKIPPING CHECKS
clean, 1095956 free (212 frags, 136968 blocks, 0.0% fragmentation)
Checking integrity of licenses:
ERROR: juniper.conf.gz or juniper.conf.gz.jc does not exist

LPC bus driver
lpcbus0 on cpld0
tpm0: <Trusted Platform Module> on lpcbus0
tpm: IFX SLB 9660 TT 1.2 rev 0x10
hw.re.gres_sync_other: 0 -> 1
Loading configuration ...
mgd: error: Cannot open configuration file: /config/juniper.conf
mgd: warning: activating factory configuration
mgd: Running FIPS Self-tests
veriexec: no fingerprint for file='/sbin/kats/cannot-exec' fsid=76 fileid=2474188 gen=1 uid=0 pid=953
mgd: Time and ticks drifted too much, resetting synchronization...
Generating RSA key /etc/ssh/ssh_host_key
Generating public/private rsa1 key pair.
Your identification has been saved in /etc/ssh/ssh_host_key.
Your public key has been saved in /etc/ssh/ssh_host_key.pub.
The key fingerprint is:
SHA256:LUIuBW1nnY9LTjK9XdmIr1F7HrK3LgLP3pHHRo+AXh4 root@
The key's randomart image is:
+---[RSA1 2048]---+
|    ..   . .     |
|     .o o o      |
|     .oo . o . + |
|     +  o.=.o = .|
|    . o S*o+E+ o |
|     . . ++oo+*oo|
|          = .=+*o|
|           +oo+..|
|          ....+o.|
+----[SHA256]-----+
Generating DSA key /etc/ssh/ssh_host_dsa_key
Generating public/private dsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_dsa_key.
Your public key has been saved in /etc/ssh/ssh_host_dsa_key.pub.
The key fingerprint is:
SHA256:0rMGuq/8kbkIjXvTr4TkVHD2RgUStW6KULZVZY/lZOE root@
The key's randomart image is:
+---[DSA 1024]----+
|    . =o=++ =.   |
|     + = o O     |
|    o o + . E    |
|   o + +         |
|  . + o S        |
|   B + B o       |
|  o *.* o        |
|   +o+.+         |
|  ..===o.        |
+----[SHA256]-----+
Generating RSA2 key /etc/ssh/ssh_host_rsa_key
Generating public/private rsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_rsa_key.
Your public key has been saved in /etc/ssh/ssh_host_rsa_key.pub.
The key fingerprint is:
SHA256:yIUlf5yNXn9v+dByWuXuAoxPA4ZER4fo3q4oWPMEEik root@
The key's randomart image is:
+---[RSA 2048]----+
|   .  ..ooo..    |
|E o    =oo.=     |
| . .  .oo.= o    |
|  . .. oooo. .   |
|   . .o.So.+  . o|
|    o . . o =  ++|
|   o +   . o oo.B|
|  . . ..  . . .O.|
|     .. ..    .o+|
+----[SHA256]-----+
Generating ECDSA key /etc/ssh/ssh_host_ecdsa_key
Generating public/private ecdsa key pair.
Your identification has been saved in /etc/ssh/ssh_host_ecdsa_key.
Your public key has been saved in /etc/ssh/ssh_host_ecdsa_key.pub.
The key fingerprint is:
SHA256:0iqQ+CTvujpyNRJOfMGQTqfvMhQQVogv0Vb+lXuwiJM root@
The key's randomart image is:
+---[ECDSA 256]---+
|o++*.            |
|=.=.+    .       |
| O o..  +        |
|..O..+ + +       |
|o++=E + S .      |
| =+.+. o .       |
| .o+...          |
|o.+ ..           |
|*=.o             |
+----[SHA256]-----+
Generating ED25519 key /etc/ssh/ssh_host_ed25519_key
Generating public/private ed25519 key pair.
Your identification has been saved in /etc/ssh/ssh_host_ed25519_key.
Your public key has been saved in /etc/ssh/ssh_host_ed25519_key.pub.
The key fingerprint is:
SHA256:x0BuzXy00VFsU4n2Wx48sZnCY0AIWpnqaGx0jxVxTXE root@
The key's randomart image is:
+--[ED25519 256]--+
|       +*.=++Eo+=|
|      o*.= +.=.+o|
|     .. = + * o.*|
|   . o o o . = O.|
|  o + + S o . o.=|
|   = o . .     ..|
|  o              |
|                 |
|                 |
+----[SHA256]-----+
mgd: commit complete
Setting initial options: .
Starting optional daemons:  usbd.
Doing initial network setup:
.
Initial interface configuration:
additional daemons: eventd.
hw.re.gres_sync_other: 1 -> 0
Additional routing options:kern.module_path: /boot//kernel;/boot/modules -> /boot/modules;/cryptosoft0: <software crypto> on motherboard
IPsec: Initialized Security Association Processing.
modules/ifpf kld kats kldkldload: can't load kats.ko: File exists
.
Doing additional network setup:.
Starting final network daemons:.
setting ldconfig path: /usr/lib /opt/lib
starting standard daemons: cron.
Initial rc.mips initialization:.
Local package initialization:.
starting local daemons:set cores for group access
.
kern.securelevel: -1 -> 1
Creating JAIL MFS partition...
JAIL MFS partition created
Boot media /dev/da0 has dual root support
** /dev/da0s2a
FILE SYSTEM CLEAN; SKIPPING CHECKS
clean, 1139336 free (72 frags, 142408 blocks, 0.0% fragmentation)
 chassis.ko loaded Loading JUNOS chassis module
chassis_init_hw_chassis_startup_time: chassis startup time 0.000000
Wed Sep 24 01:53:08 UTC 2025

Amnesiac (ttyu0)

login: root

--- JUNOS 15.1X49-D150.2 built 2018-09-19 17:44:55 UTC
%
%
% cli
root> show version
Model: srx300
Junos: 15.1X49-D150.2
JUNOS Software Release [15.1X49-D150.2]

root>

root> show system license
License usage:
                                 Licenses     Licenses    Licenses    Expiry
  Feature name                       used    installed      needed
  dynamic-vpn                           0            2           0    permanent
  remote-access-ipsec-vpn-client        0            2           0    permanent

Licenses installed: none

root> show configuration | display set
set version 15.1X49-D150.2
set system autoinstallation traceoptions level verbose
set system autoinstallation traceoptions flag all
set system autoinstallation interfaces ge-0/0/0 bootp
set system autoinstallation interfaces ge-0/0/7 bootp
set system name-server 8.8.8.8
set system name-server 8.8.4.4
set system services ssh
set system services netconf ssh
set system services dhcp-local-server group jdhcp-group interface irb.0
set system services web-management https system-generated-certificate
set system syslog archive size 100k
set system syslog archive files 3
set system syslog user * any emergency
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system max-configurations-on-flash 5
set system max-configuration-rollbacks 5
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set system phone-home server https://redirect.juniper.net
set system phone-home rfc-complaint
set security log mode stream
set security log report
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security nat source rule-set trust-to-untrust from zone trust
set security nat source rule-set trust-to-untrust to zone untrust
set security nat source rule-set trust-to-untrust rule source-nat-rule match source-address 0.0.0.0/0
set security nat source rule-set trust-to-untrust rule source-nat-rule then source-nat interface
set security policies from-zone trust to-zone trust policy trust-to-trust match source-address any
set security policies from-zone trust to-zone trust policy trust-to-trust match destination-address any
set security policies from-zone trust to-zone trust policy trust-to-trust match application any
set security policies from-zone trust to-zone trust policy trust-to-trust then permit
set security policies from-zone trust to-zone untrust policy trust-to-untrust match source-address any
set security policies from-zone trust to-zone untrust policy trust-to-untrust match destination-address any
set security policies from-zone trust to-zone untrust policy trust-to-untrust match application any
set security policies from-zone trust to-zone untrust policy trust-to-untrust then permit
set security zones security-zone trust host-inbound-traffic system-services all
set security zones security-zone trust host-inbound-traffic protocols all
set security zones security-zone trust interfaces irb.0
set security zones security-zone untrust screen untrust-screen
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services dhcp
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services tftp
set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services https
set security zones security-zone untrust interfaces ge-0/0/7.0 host-inbound-traffic system-services dhcp
set security zones security-zone untrust interfaces ge-0/0/7.0 host-inbound-traffic system-services tftp
set interfaces ge-0/0/0 unit 0 family inet
set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces ge-0/0/4 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces ge-0/0/5 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces ge-0/0/6 unit 0 family ethernet-switching vlan members vlan-trust
set interfaces ge-0/0/7 unit 0 family inet
set interfaces irb unit 0 family inet address 192.168.1.1/24
set protocols l2-learning global-mode switching
set protocols rstp interface all
set access address-assignment pool junosDHCPPool family inet network 192.168.1.0/24
set access address-assignment pool junosDHCPPool family inet range junosRange low 192.168.1.2
set access address-assignment pool junosDHCPPool family inet range junosRange high 192.168.1.254
set access address-assignment pool junosDHCPPool family inet dhcp-attributes router 192.168.1.1
set access address-assignment pool junosDHCPPool family inet dhcp-attributes propagate-settings ge-0/0/0.0
set vlans vlan-trust vlan-id 3
set vlans vlan-trust l3-interface irb.0

root>

root> show chassis hardware
Hardware inventory:
Item             Version  Part number  Serial number     Description
Chassis                                CV2918AF0439      SRX300
Routing Engine   REV 0x12 650-065039   CV2918AF0439      RE-SRX300
FPC 0                                                    FPC
  PIC 0                                                  6xGE,2xGE SFP Base PIC
Power Supply 0

root>

root> request system configuration rescue save

root>

■ 保証期間: NC/NRでお願いします。
■ 発送方法: 佐川/ヤマト運輸(運送会社のご指定はできません。)
■送料について:梱包資材の費用や配送業者に持ち込む際に発生する交通費などが含まれていますので、ご了承下さい。

[重要]多数商品を落札する場合は、システム上のまとめ取引申請を行って下さい。
   お支払い後の取引メッセージで同梱申請は固くお断り致します。
   支払い過剰の送料は返金出来かねます。必ずご確認の上で料金を支払い下さい。
   落札者側の地域間違いの場合も同様ですので、ご注意願います。

■ 入札前にご確認ください
    * 上記以外のチェックは行なっておりません。その他詳細はすべて未確認です。
    * 電話応対は不可です。取引ナビ及び質問欄でご連絡ください。
    * 多忙な為、リアルタイムの返答はできかねますので余裕をもっての投稿・質問をお願い致します
    * 質問落札後の対応は営業時間(平日9:00~17:00)内になります。
    * 落札物到着後のサポート・使用方法の問合せにはお答えする事は出来ません
    * 当方も別業者さんから譲られたものなので詳しい事情、パスワード及び分解痕跡などの確認することはできません。
    * 連絡事項がある場合、受領後48時間以内に取引ナビでご連絡お願いします。
    * 現状の状態を分かりやすく表記するようにしておりますが、程度の基準相違や表記しきれない部分もあります。神経質な方は入札をご遠慮ください。
    * 中古品につきましては、可能な限り清掃し出品しておりますが、ヨゴレ等が多少残っている場合もあります。予めご了承ください。
    * 中古品につきましては、画像は特別な記載がない限り「現品」です。画像にて状態をご確認ください。
    * ジャンク、現状品、保証なし商品については、いかなる場合(万一のスペック記載違い含む)においても保証・返品・クレーム対象外でお願いします。
    * ジャンク扱い商品については、記載の瑕疵が悪化する、または記載の瑕疵に起因し記載以外の瑕疵が発生する可能性もあります。
    * 落札して頂いた後全く連絡か取れない方か多く、イタズラ入札が多発しております。申し訳ありませんが、新規さまの方のご入札はご遠慮いただいております。ご入札頂きましても削除させていただく場合がありますので、ご了承下さい。

正在加载数据,请稍后……

卖家信息
温馨提示:

三島 成人
5447 13
不是
神奈川県
51买JP提醒
常见问题

出价竞拍

本   品   现   价:6000.00日元(RMB301.20元)
本次加价至少为:250日元
出 价 金 额: 日元
出 价 件 数:
折合人民币: 0元
 
温馨提示:本品商家好评为5447,差评为13,供参考使用,出价成功后不能弃标,弃标要扣除弃标费用。

预约出价

本   品   现   价:6000.00日元(RMB301.20元)
本次加价至少为:250日元
为避免被人恶意抬价,您出的价格会在结束前十五分钟由系统进行出价,也为您节省了宝贵的时间
出 价 金 额:  日元
出 价 件 数:
折合人民币: 0元
 
温馨提示:本品商家好评为5447,差评为13,供参考使用,出价成功后不能弃标,弃标要扣除弃标费用。

直接购买

本次直接购买价为:0日元(RMB0元)
直购价: 日元
出价件数:
 
温馨提示:本品商家好评为5447,差评为13,供参考使用,出价成功后不能弃标,弃标要扣除弃标费用。

会员等级说明

查看详细>> 您需要升级保证金后方可出价竞拍
关闭
前去升级保证金