62
Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 530-015643-01 Security Products SSG 140 Hardware Installation and Configuration Guide

SSG 140 Hardware Installation and Configuration Guide

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SSG 140 Hardware Installation and Configuration Guide

Security Products

SSG 140 Hardware Installation and Configuration Guide

Juniper Networks, Inc.

1194 North Mathilda Avenue

Sunnyvale, CA 94089

USA

408-745-2000

www.juniper.net

Part Number: 530-015643-01

Page 2: SSG 140 Hardware Installation and Configuration Guide

2

Copyright Notice

Copyright © 2006 Juniper Networks, Inc. All rights reserved.

Juniper Networks and the Juniper Networks logo are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

FCC Statement

The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.

The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed in accordance with Juniper Network’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.

If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

Reorient or relocate the receiving antenna.

Increase the separation between the equipment and receiver.

Consult the dealer or an experienced radio/TV technician for help.

Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.

Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.

Disclaimer

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.

Page 3: SSG 140 Hardware Installation and Configuration Guide

Table of Contents

About This Guide 5Organization ....................................................................................................6WebUI Conventions .........................................................................................6CLI Conventions...............................................................................................7Obtaining Documentation and Technical Support ............................................8

Chapter 1 Hardware Overview 9Port and Power Connectors ...........................................................................10Front Panel ....................................................................................................11

Device Status LEDs..................................................................................11Port Descriptions .....................................................................................12

Ethernet Ports ...................................................................................12Console Port .....................................................................................13AUX Port...........................................................................................13

Reset Pinhole...........................................................................................13USB Port ..................................................................................................14

Back Panel .....................................................................................................15Physical Interface Module Descriptions ...................................................15Power Switch...........................................................................................17AC Power Appliance Inlet ........................................................................17Fuse Cover...............................................................................................17

Chapter 2 Installing and Connecting the Device 19Before You Begin ...........................................................................................20Equipment Installation ...................................................................................20Connecting Interface Cables to the Device .....................................................22Connecting AC Power to the Device...............................................................22Powering the Device On and Off....................................................................22Connecting the Device to a Network ..............................................................23

Connecting an SSG 140 Device to an Untrusted Network ........................23Connecting Ethernet Ports ................................................................24Connecting Serial (AUX/Console) Ports..............................................24

Connecting PIMs......................................................................................24Connecting the Device to an Internal Network or a Workstation .............25

Chapter 3 Configuring the Device 27Accessing the Device......................................................................................28

Using a Console Connection ....................................................................28Using the WebUI .....................................................................................29Using Telnet ............................................................................................30

Default Device Settings ..................................................................................30Basic Device Configuration ............................................................................32

Root Admin Name and Password ............................................................32

Table of Contents 3

Page 4: SSG 140 Hardware Installation and Configuration Guide

4

SSG 140 Series Hardware Installation and Configuration Guide

Date and Time.........................................................................................33Administrative Access .............................................................................33Management Services..............................................................................33Hostname and Domain Name .................................................................34Domain Name System Server..................................................................34Default Route...........................................................................................35Ethernet0/0 Interface IP Address .............................................................35

PIM Configuration ..........................................................................................35ISDN Interface .........................................................................................36T1 Interface .............................................................................................36E1 Interface .............................................................................................37Serial WAN Interface ...............................................................................38

Basic Firewall Protections ..............................................................................39Verifying External Connectivity......................................................................40Resetting the Device to Factory Defaults ........................................................40

Chapter 4 Servicing the Device 43Tools and Parts Required ...............................................................................43Replacing a Physical Interface Module ...........................................................44

Removing a Blank Faceplate....................................................................44Removing a Physical Interface Module ....................................................44Installing a Physical Interface Module......................................................45

Upgrading Memory ........................................................................................46Replacing the Fuse .........................................................................................48

Appendix A Specifications A-51SSG 140 Physical Specifications .....................................................................52Electrical Specifications..................................................................................52Environmental Tolerance ...............................................................................52Certifications..................................................................................................52

Safety ......................................................................................................52EMC Emissions........................................................................................53EMC Immunity ........................................................................................53European Telecommunications Standards Institute .................................54T1 Interface .............................................................................................54

Connectors.....................................................................................................54

Appendix B Initial Configuration Wizard B-55

Index..........................................................................................................................IX-I

Table of Contents

Page 5: SSG 140 Hardware Installation and Configuration Guide

About This Guide

The Juniper Networks Secure Services Gateway (SSG) 140 device is an integrated router and firewall platform that provides Internet Protocol Security (IPSec) virtual private network (VPN) and firewall services for small- and medium-sized companies and enterprise branch and remote offices.

The SSG 140 supports support universal serial bus (USB) storage and four physical interface modules (PIM) slots that can hold T1, E1, ISDN, and Serial wide area network (WAN) PIMs. The SSG 140 also provides protocol conversions between local area networks (LANs) and WANs.

NOTE: The configuration instructions and examples in this document are based on the functionality of a device running ScreenOS 5.4. Your device might function differently depending on the ScreenOS version you are running. For the latest device documentation, refer to the Juniper Networks Technical Publications website at http://www.juniper.net/techpubs/hardware. To see which ScreenOS versions are currently available for your device, refer to the Juniper Networks Support website at http://www.juniper.net/customers/support/.

5

Page 6: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

6

Organization

This guide contains the following sections:

Chapter 1, “Hardware Overview” describes the chassis and components of the SSG 140 device.

Chapter 2, “Installing and Connecting the Device” describes how to mount an SSG 140 device in a standard 19-inch equipment rack and how to connect cables and power to the device.

Chapter 3, “Configuring the Device” describes how to configure and manage an SSG 140 device and how to perform some basic configuration tasks.

Chapter 4, “Servicing the Device” describes service and maintenance procedures for the SSG 140 device.

Appendix A, “Specifications” provides general specifications for the SSG 140 device.

Appendix B, “Initial Configuration Wizard” provides detailed information about using the Initial configuration Wizard (ICW) for the SSG 140 device.

WebUI Conventions

To perform a task with the WebUI, you first navigate to the appropriate dialog box, where you then define objects and set parameters. A chevron ( > ) shows the navigational sequence through the WebUI, which you follow by clicking menu options and links. The set of instructions for each task is divided into navigational path and configuration settings.

The following figure lists the path to the address configuration dialog box with the following sample configuration settings:

Objects > Addresses > List > New: Enter the following, then click OK:

Address Name: addr_1IP Address/Domain Name:

IP/Netmask: (select), 10.2.2.5/32Zone: Untrust

Organization

Page 7: SSG 140 Hardware Installation and Configuration Guide

About This Guide

Figure 1: Navigational Path and Configuration Settings

CLI Conventions

The following conventions are used to present the syntax of CLI commands in examples and in text.

In examples:

Anything inside square brackets [ ] is optional.

Anything inside braces { } is required.

If there is more than one choice, each choice is separated by a pipe ( | ). For example:

set interface { ethernet1 | ethernet2 | ethernet3 } manage

means “set the management options for the ethernet1, the ethernet2, or the ethernet3 interface.”

Variables are in italic type:

set admin user name1 password xyz

In text:

Commands are in boldface type.

Variables are in italic type.

NOTE: When entering a keyword, you need to type only enough letters to identify the word uniquely. For example, typing set adm u kath j12fmt54 is enough to enter the command set admin user kathleen j12fmt54. Although you can use this shortcut when entering commands, all the commands documented here are presented in their entirety.

CLI Conventions 7

Page 8: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

8

Obtaining Documentation and Technical Support

To obtain technical documentation for any Juniper Networks product, visit www.juniper.net/techpubs/.

For technical support, open a support case using the Case Manager link at http://www.juniper.net/support/ or call 1-888-314-JTAC (within the United States) or 1-408-745-9500 (outside the United States).

If you find any errors or omissions in this document, please contact us at the following email address:

[email protected]

Obtaining Documentation and Technical Support

Page 9: SSG 140 Hardware Installation and Configuration Guide

Chapter 1

Hardware Overview

This chapter provides detailed descriptions of the SSG 140 chassis and its components. It contains the following sections:

“Port and Power Connectors” on page 10

“Front Panel” on page 11

“Back Panel” on page 15

9

Page 10: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

10

Port and Power Connectors

This section describes and displays the location of the built-in ports and power connector.

Figure 2: Built-in Ports and Power Connector Locations

Table 1: SSG 140 Ports and Power Connector

POWER HA PIM1 PIM3

STATUS ALARM PIM2 PIM4 RESETCONSOLEUSB AUX 10/100 10/100/1000

0/0 0/1 0/2 0/3

TX/RX TX/RX TX/RX TX/RXLINK LINK LINK LINK

0/4 0/5 0/6 0/7

TX/RX TX/RX TX/RX TX/RXLINK LINK LINK LINK

0/8

TX/RX LINK

0/9

TX/RX LINK

SSG 140

USB PortConsole Port

AUX Port 10/100 Ethernet Ports

10/100/1000 Ethernet Ports

Front

E1

PORT 0

STATUS

PORT 1

STATUS

E1

PORT 0

STATUS

PORT 1

STATUS

I

O

AC Power Appliance InletBack

Port Description Connector Speed/Protocol

0/0-0/7 Enables direct connections to workstations or a LAN connection through a switch or hub. This connection also allows you to manage the device through a Telnet session or the WebUI.

RJ-45 10/100 Mbps Ethernet

Autosensing duplex and auto MDI/MDIX

0/8-0/9 Enables direct connections to workstations or a LAN connection through a switch or hub. This connection also allows you to manage the device through a Telnet session or the WebUI.

RJ-45 10/100/1000 Mbps Ethernet

Autosensing duplex and auto MDI/MDIX

USB Enables a 1.1 USB connection with the device. N/A 12M (full speed) or 1.5M (low speed)

Console Enables a serial connection with the device. Used for terminal-emulation connectivity to launch CLI sessions.

RJ-45 9600 bps/RS-232C serial

AUX Enables a backup RS-232 async serial Internet connection through an external modem.

RJ-45 9600 bps — 115 Kbps/RS-232C serial

PIM

T1 Enables connection of a T1 line to the untrusted network.

RJ-48 1.544 Mbps (full-time slots)

E1 Enables connection of an E1 line to the untrusted network.

RJ-48 2.048 Mbps (full-time slots)

ISDN Enables connection of an ISDN line to the untrusted network.

RJ-45 B-channels at 64 Kbps

Leased line at 128 Kbps

Serial Provides full-duplex, synchronous data transmission over serial links.

DB-60 8 Mbps

Power

AC Power appliance inlet

Accepts the supplied AC power cord. N/A 90-264 VAC 50-60 Hz

Port and Power Connectors

Page 11: SSG 140 Hardware Installation and Configuration Guide

Front Panel

This section describes the following elements on the front panel of an SSG 140 device:

Device Status LEDs

Port Descriptions

Reset Pinhole

USB Port

Figure 3: SSG 140 Front Panel

Device Status LEDsThe device status LEDs display information about critical device functions. When the device powers up, the POWER LED changes from off to green and the STATUS LED changes from off to blinking green. Startup takes approximately one minute to complete. If you want to turn the device off and on again, we recommend you wait a few seconds between shutting it down and powering it back up. Table 2 provides the name, color, status, and description of each device status LED.

Table 2: Status LED Descriptions

POWER HA PIM1 PIM3

STATUS ALARM PIM2 PIM4 RESETCONSOLEUSB AUX 10/100 10/100/1000

0/0 0/1 0/2 0/3

TX/RX TX/RX TX/RX TX/RXLINK LINK LINK LINK

0/4 0/5 0/6 0/7

TX/RX TX/RX TX/RX TX/RXLINK LINK LINK LINK

0/8

TX/RX LINK

0/9

TX/RX LINK

SSG 140

Device Status LEDs

USB Port

Reset Pinhole Console Port

AUX Port10/100 Ethernet Ports

10/100/1000 Ethernet Ports

Name Color Status Description

POWER Green On steadily Power is functioning correctly.

Off Device is not receiving power.

STATUS Green Off Device is powered off or is starting up.

Blinking Normal operation.

Front Panel 11

Page 12: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

12

Port DescriptionsThis section explains the purpose and function of the following:

Ethernet Ports

Console Port

AUX Port

Ethernet PortsEight 10/100 Fast Ethernet ports provide LAN connections to hubs, switches, local servers, and workstations. You can also designate an Ethernet port for management traffic. The ports are labeled 0/0 through 0/7. For the default zone bindings for each Ethernet port, see “Default Device Settings” on page 30.

The SSG 140 device also has two 10/100/1000 Gigabit Ethernet ports (copper) to provide connectivity to Gigabit Ethernet LANs. The Gigabit ports are labeled 0/8 and 0/9.

When configuring one of the ports, reference the interface name that corresponds to the location of the port. From left to right on the front panel, the interface names for the ports are ethernet0/0 through ethernet0/9.

Figure 4 displays the location of the LEDs on each Ethernet port.

ALARM Red On steadily Critical alarm:

Failure of hardware component or software module.

Firewall attacks detected.

Amber On steadily Major alarm:

Low memory (less than 10% remaining).

High CPU utilization (more than 90% in use).

Session full.

Maximum number of VPN tunnels reached.

HA status changed or redundant group member not found.

Off No alarms.

HA (High Availability)

Green On steadily Unit is the primary (master) device.

Amber On steadily Unit is the secondary (backup) device.

Off High availability not enabled.

PIM (1-4) Green On steadily PIM is ready for activity.

Blinking Traffic is present.

Off PIM is not present or is installed incorrectly.

Name Color Status Description

Front Panel

Page 13: SSG 140 Hardware Installation and Configuration Guide

Figure 4: Ethernet port LEDs

Table 3 describes the LAN port LEDs.

Table 3: LAN Port LEDs

Console PortThe Console port is an RJ-45 serial port wired as Data Communications Equipment (DCE) that can be used for local administration. An RJ-45 to DB-9 adapter is supplied.

See Connectors on page 54 for the Console port connector pinouts.

AUX PortThe auxiliary (AUX) port is an RJ-45 serial port wired as a Data Terminal Equipment (DTE) that can be connected to a modem to allow remote administration. We do not recommend using this port for regular remote administration. The AUX port is typically assigned to be the backup serial interface. The baud rate is adjustable from 9600 bps to 115200 bps and requires hardware flow control.

See “Connectors” on page 54 for the AUX port connector pinouts.

Reset PinholeThe reset pinhole is a button that resets the device to its original default settings. To use this button, insert a stiff wire (such as a straightened paper clip) into the pinhole. See “Resetting the Device to Factory Defaults” on page 40 for more information.

Function Color State Description

LINK Green On steadily

Off

Port is online

Port is offline

TX/RX Green Blinking

Off

Traffic is passing through. The data rate is proportional to the TX/RX activity

Port might be on but is not receiving data

LINKTX/RX

WARNING: Because resetting the device restores it to the original default configuration, any new configuration settings are lost, and the firewall and all VPN services become inoperative. We recommend that you save the device configuration before resetting the device with the reset pinhole.

Front Panel 13

Page 14: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

14

USB PortThe USB port on the front panel of an SSG 140 device accepts a universal serial bus (USB) storage device or USB storage device adapter with a compact-flash disk installed, as defined in the CompactFlash Specification published by the CompactFlash Association. When the USB storage device is installed and configured, it automatically acts as a secondary boot device if the primary compact-flash disk fails on startup.

The USB port allows file transfers such as device configurations, user certifications, and update version images between an external USB storage device and the internal flash storage located in the security device. The USB port supports USB 1.1 specification at either low speed (1.5M) or full speed (12M) file transfer.

To transfer files between the USB storage device and an SSG 140, perform the following steps:

1. Insert the USB storage device into the USB port on the security device.

2. Save the files from the USB storage device to the internal flash storage on the device with the save {software | config | image-key} from usb filename to flash CLI command.

3. Before removing the USB storage device, stop the USB port with the exec usb stop CLI command.

4. Remove the USB storage device.

If you want to delete a file from the USB storage device, use the delete file usb:/filename CLI command.

If you want to view the saved file information on the USB storage device or internal flash storage, use the get file CLI command.

Front Panel

Page 15: SSG 140 Hardware Installation and Configuration Guide

Back Panel

This section describes the following elements on the back panel of an SSG 140 device:

Physical Interface Module Descriptions

Power Switch

The back panel of the SSG 140 device contains four back panel slots for user-installable physical Interface Modules (PIMs) and a power switch.

Figure 5: Back Panel of an SSG 140 Device

Physical Interface Module DescriptionsPhysical interface modules (PIMs) allow you to connect an SSG 140 device to geographically dispersed networks. These networks can be privately owned, but they more typically include public or shared networks. Table 4 describes the PIMs supported by the SSG 140 device. Table 5 describes the meaning of the PIM LED states.

Table 4: SSG 140 PIMs

Table 5: PIM LED States on the SSG 140

E1

PORT 0

STATUS

PORT 1

STATUS

E1

PORT 0

STATUS

PORT 1

STATUS

I

O

PIM Slot 1

PIM Slot 2

PIM Slot 3

PIM Slot 4

Power Panel

Type Description

ISDN Provides connection to a single ISDN line.

T1 Provides connection to T1 or fractional T1 network media types.

E1 Provides connection to E1 or fractional E1 network media types.

Sync Serial Provides full-duplex, synchronous data transmission at up to 8 Mbps over serial links.

Type Name Color State Description

ISDN STATUS Green On steadily Online with no alarms or failures.

Red On steadily Active with a local alarm; device has detected a failure.

CH B1 Green On steadily Indicates that B-Channel 1 is active

Off Indicates that B-Channel 1 is not active

CH B2 Green On steadily Indicates that B-Channel 2 is active

Off Indicates that B-Channel 2 is not active

Back Panel 15

Page 16: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

16

Figure 6: SSG 140 PIMs

Table 6 lists the cables that you can order from Juniper Networks to connect to a port on the serial PIM. The device to which you are connecting and the serial interface type determine which cable you need.

T1/E1 STATUS Green On steadily Online with no alarms or failures.

Red On steadily Active with a local alarm; device has detected a failure.

Sync Serial STATUS Green On steadily Online with no alarms or failures.

Red On steadily Active with a local alarm; device has detected a failure.

Type Name Color State Description

CAUTION: PIMs are not hot-swappable. You must install them in the back panel slots before powering on the device.

ISDN

T1

E1

Synch Serial

Back Panel

Page 17: SSG 140 Hardware Installation and Configuration Guide

Table 6: Juniper Serial Cables

Power SwitchThe power switch is located on the right side of the back panel, as shown in Figure 7. You use the power switch to power the SSG 140 device on and off. When you power on the device, ScreenOS boots up as the power supply completes its startup sequence.

Figure 7: Power Switch, AC Power Appliance Inlet, and Fuse Cover

AC Power Appliance InletThe AC power appliance inlet is located on the right side of the back panel, as shown in Figure 7. You use the AC power appliance inlet to connect the SSG 140 device to an AC power source using the supplied AC power cord.

Fuse CoverThe fuse cover is located on the right side of the back panel, as shown in Figure 7. To change the fuse, see “Replacing the Fuse” on page 48.

Product Number Interface Type Length (in feet) Connector Type

JX-CBL-EIA530-DCE EIA 530 (DCE) 10 feet Female

JX-CBL-EIA530-DTE EIA 530 (DTE) 10 feet Male

JX-CBL-RS232-DCE RS-232 (DCE) 10 feet Female

JX-CBL-RS232-DTE RS-232 (DTE) 10 feet Male

JX-CBL-RS449-DCE RS-449 (DCE) 10 feet Female

JX-CBL-RS449-DTE RS-449 (DTE) 10 feet Male

JX-CBL-V35-DCE V.35 (DCE) 10 feet Female

JX-CBL-V35-DTE V.35 (DTE) 10 feet Male

JX-CBL-X21-DCE X.21 (DCE) 10 feet Female

JX-CBL-X21-DTE X.21 (DTE) 10 feet Male

Power Switch

AC Power Appliance Inlet

Fuse Cover

Back Panel 17

Page 18: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

18

Back Panel
Page 19: SSG 140 Hardware Installation and Configuration Guide

Chapter 2

Installing and Connecting the Device

This chapter describes how to install an SSG 140 device in a standard 19-inch equipment rack and how to connect cables and power to the device. Topics in this chapter include:

“Before You Begin” on page 20

“Equipment Installation” on page 20

“Connecting Interface Cables to the Device” on page 22

“Connecting AC Power to the Device” on page 22

“Powering the Device On and Off” on page 22

“Connecting the Device to a Network” on page 23

NOTE: For safety warnings and instructions, please refer to the Juniper Networks Security Products Safety Guide. Before working on any equipment, you should be aware of the hazards involved with electrical circuitry and should be familiar with standard practices for preventing accidents.

19

Page 20: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

20

Before You Begin

The location of the chassis, the layout of the equipment rack, and the security of your wiring room are crucial for proper device operation.

Observing the following precautions can prevent shutdowns, equipment failures, and injuries:

Before installation, always check that the power supply is disconnected from any power source.

Ensure that the room in which you operate the device has adequate air circulation and that the room temperature does not exceed 104° F (40° C).

Allow 3 feet (1 meter) of clear space to the front and back of the device.

Do not place the device in an equipment rack frame that blocks the air vents on the sides of the chassis. Ensure that enclosed racks have fans and louvered sides.

Correct these hazardous conditions before any installation: moist or wet floors, leaks, ungrounded or frayed power cables, or missing safety grounds.

Equipment Installation

You can mount the SSG 140 device into a standard 19-inch equipment rack.

To mount the SSG 140 device, you must have the following items:

Mounting brackets (provided)

Number-2 phillips head screwdriver (not provided)

Four sheet-metal screws that are compatible with the equipment rack (not provided)

To install an SSG 140 device into a rack, perform the following steps:

1. Attach the left and right mounting brackets to the front of each side of the chassis as shown in Figure 8.

CAUTION: To prevent abuse and intrusion by unauthorized personnel, install the SSG 140 device in a secure environment.

NOTE: If you are installing multiple devices in one rack, install the lowest one first and proceed upward in the rack.

Before You Begin

Page 21: SSG 140 Hardware Installation and Configuration Guide

Figure 8: Attaching the rack mount brackets

2. Grasp the sides of the device, lift the device, then position it in the rack. When correctly positioned, the device sits level in the equipment rack.

3. Align the bottom hole in each mounting bracket with a hole in each rack rail, making sure the chassis is level.

4. Install a mounting screw into each of the two aligned holes. Use a number-2 phillips screwdriver to tighten the screws.

Figure 9: Rack Installation

5. Install the remaining screws in each mounting bracket.

6. Verify that the mounting screws on one side of the rack are aligned with the mounting screws on the opposite side and that the device is level.

Equipment Installation 21

Page 22: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

22

Connecting Interface Cables to the Device

To connect the interface cable to a device, perform the following steps:

1. Have ready a length of the type of cable used by the interface.

2. Insert the cable connector into the cable connector port on the interface faceplate.

3. Arrange the cable as follows to prevent it from dislodging or developing stress points:

a. Secure the cable so that it is not supporting its own weight as it hangs to the floor.

b. Place excess cable out of the way in a neatly coiled loop.

c. Use fasteners to maintain the shape of cable loops.

Connecting AC Power to the Device

The AC power cord shipped with the device connects the device to earth ground when plugged into an AC grounding-type power outlet. The device must be connected to earth ground during normal operation.

To connect power to the device, plug one end of the AC power cord into the AC power appliance inlet on the back panel of the device and plug the other end into an AC power source.

Powering the Device On and Off

To power on the SSG 140 device, press the AC power switch on the rear panel to the on position.

ScreenOS boots as the power supply completes its startup sequence. The Power LED lights during startup and remains on steadily when the device is operating normally.

To power off the SSG 140 device, press the power switch to the off position.

NOTE: See “Connecting the Device to a Network” on page 23 for information on how to connect the device to your network.

WARNING: We recommend using a surge protector for the power connection.

Connecting Interface Cables to the Device

Page 23: SSG 140 Hardware Installation and Configuration Guide

Connecting the Device to a Network

An SSG 140 device provides firewall and general security for networks when it is placed between internal networks and the untrusted network. This section describes the following:

Connecting an SSG 140 Device to an Untrusted Network

Connecting the Device to an Internal Network or a Workstation

Connecting an SSG 140 Device to an Untrusted NetworkYou can connect your SSG 140 device to an untrusted network in one of the following ways:

Connecting Ethernet Ports

Connecting Serial (AUX/Console) Ports

Connecting PIMs

Figure 10 shows basic network cabling connections for an SSG 140 device. The built-in 10/100 Fast Ethernet ports are cabled as follows:

The port labeled 0/0 (ethernet0/0 interface) is connected to a switch that connects workstations on the Trusted LAN.

The port labeled 0/1 (ethernet0/1 interface) is connected to a switch that connects workstations on the DMZ LAN; the remaining ports are not connected.

The port labeled 0/2 (ethernet0/2 interface) is connected to the Untrust zone.

The Console port is connected to a serial terminal for management access.

Figure 10: Basic Cable Connections for an SSG 140 Device

Trust Zone

Untrust Zone

ethernet 0/0

Console

DMZ

ethernet 0/2

ethernet 0/1

Connecting the Device to a Network 23

Page 24: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

24

Connecting Ethernet PortsTo establish a high-speed connection, connect the provided Ethernet cable from the Ethernet port marked 0/0 on an SSG 140 device to the external router. The device autosenses the correct speed, duplex, and MDI/MDIX settings.

Connecting Serial (AUX/Console) PortsYou can connect to the untrusted network with an RJ-45 straight-through serial cable and an external modem.

Connecting PIMsThis section explains how to connect the device PIMs to an untrusted network.

To connect the PIMs to a device, perform the following steps:

1. Have ready a length of the type of cable used by the interface.

2. Insert the cable connector into the cable-connector port on the interface faceplate.

3. Arrange the cable as follows to prevent it from dislodging or developing stress points:

a. Secure the cable so that it is not supporting its own weight as it hangs to the floor.

b. Place any excess cable out of the way in a neatly coiled loop.

c. Use fasteners to maintain the shape of the cable loops.

To configure the PIMs, see “PIM Configuration” on page 35.

WARNING: Make sure that you do not inadvertently connect the Console, AUX, or Ethernet ports on the device to the telephone outlet.

WARNING: To reduce the risk of fire, use only 26 AWG or larger UL listed or CSA certified telecommunication line cord.

NOTE:For ISDN U interface support, an external NT-1 device is required.

Connecting the Device to a Network

Page 25: SSG 140 Hardware Installation and Configuration Guide

Connecting the Device to an Internal Network or a WorkstationYou can connect your local area network (LAN) or workstation with the Ethernet interfaces.

An SSG 140 device contains ten Ethernet ports. You can use one or more of these ports to connect to LANs through switches or hubs. You can also connect one or all of the ports directly to workstations, eliminating the need for a hub or switch. You can use either crossover or straight-through cables to connect the Ethernet ports to other devices. See “Default Device Settings” on page 30 for the default zone-to-interface bindings.

Connecting the Device to a Network 25

Page 26: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

26

Connecting the Device to a Network
Page 27: SSG 140 Hardware Installation and Configuration Guide

Chapter 3

Configuring the Device

ScreenOS software is preinstalled on the SSG 140 device. When the device is powered on, it is ready to be configured. While the device has a default factory configuration that allows you to initially connect to the device, you need to perform further configuration for your specific network requirements.

This chapter contains the following sections:

“Accessing the Device” on this page

“Default Device Settings” on page 30

“Basic Device Configuration” on page 32

“PIM Configuration” on page 35

“Basic Firewall Protections” on page 39

“Verifying External Connectivity” on page 40

“Resetting the Device to Factory Defaults” on page 40

NOTE: After you configure a device and verify connectivity through the remote network, you must register your product at www.juniper.net/support/ so certain ScreenOS services, such as Deep Inspection Signature Service and Anti-virus (purchased separately), can be activated on the device. After registering your product, use the WebUI to obtain the subscription for the service. For more information about registering your product and obtaining subscriptions for specific services, refer to the Concepts & Examples ScreenOS Reference Guide for the ScreenOS version running on the device.

27

Page 28: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

28

Accessing the Device

You can configure and manage a device in several ways:

Console: The Console port on the device allows you to access the device through a serial cable connected to your workstation or terminal. To configure the device, you enter ScreenOS command line interface (CLI) commands on your terminal or in a terminal-emulation program on your workstation.

WebUI: The ScreenOS Web User Interface (WebUI) is a graphical interface available through a browser. To initially use the WebUI, the workstation on which you run the browser must be on the same subnetwork as the device. You can also access the WebUI through a secure server using Secure Sockets Layer (SSL) with secure HTTP (S-HTTP).

Telnet/SSH: Telnet and SSH are applications that allows you to access devices through an IP network. To configure the device, you enter ScreenOS CLI commands in a Telnet session from your workstation. For more information, refer to the Administration volume of the Concepts & Examples ScreenOS Reference Guide.

NetScreen-Security Manager: NetScreen-Security Manager is a Juniper Networks enterprise-level management application that enables you to control and manage Juniper Networks firewall/IPSec VPN devices. For instructions on how to manage your device with NetScreen-Security Manager, refer to the NetScreen-Security Manager Administrator’s Guide.

Using a Console Connection

To establish a console connection, perform the following steps:

1. Plug the female end of the supplied DB-9 adapter into the serial port of your workstation. (Be sure that the DB-9 is inserted properly and secured.) Figure 11 shows the type of DB-9 connector that is needed.

Figure 11: DB-9 Adapter

NOTE: Use a straight-through RJ-45 CAT5 serial cable with a male RJ-45 connector to plug into the Console port on the device.

RJ-45 jack

DB-9 adapter

RJ-45 cable

Accessing the Device

Page 29: SSG 140 Hardware Installation and Configuration Guide

2. Plug the male end of the RJ-45 CAT5 serial cable into the Console port on the SSG 140. (Be sure that the other end of the CAT5 cable is inserted properly and secured in the DB-9 adapter.)

3. Launch a serial terminal-emulation program on your workstation. The required settings for the console session are:

Baud rate: 9600

Parity: None

Data bits: 8

Stop bit: 1

Flow Control: None

4. If you have not yet changed the default login for the admin name and password, enter netscreen at both the login and password prompts. (Use lowercase letters only. The login and password fields are both case-sensitive.)

For information on how to configure the device with the CLI commands, refer to the Concepts & Examples ScreenOS Reference Guide.

5. (Optional) By default, the console times out and terminates automatically after 10 minutes of idle time. To remove the timeout, enter set console timeout 0.

Using the WebUITo use the WebUI, the workstation from which you are managing the device must initially be on the same subnetwork as the device. To access the device with the WebUI, perform the following steps:

1. Connect your workstation to the 0/0 port (ethernet 0/0 interface in the Trust zone) on the device.

2. Ensure that your workstation is configured for Dynamic Host Configuration Protocol (DHCP) or is statically configured with an IP address in the 192.168.1.0/24 subnet.

3. Launch your browser, enter the IP address for the ethernet0/0 interface (the default IP address is 192.168.1.1/24), then press Enter.

NOTE: When the device is accessed through the WebUI the first time, the Initial Configuration Wizard (ICW) appears. If you decide to use the ICW to configure your device, see “Initial Configuration Wizard” on page 55.

Accessing the Device 29

Page 30: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

30

The WebUI application displays the login prompt as shown in Figure 12.

Figure 12: WebUI Login Prompt

4. If you have not yet changed the default login for the admin name and password, enter netscreen at both the admin name and password prompts. (Use lowercase letters only. The login and password fields are both case-sensitive.)

Using TelnetTo establish a Telnet connection, perform the following steps:

1. Connect your workstation to the 0/0 port (ethernet0/0 interface) on the device.

2. Ensure that your workstation is configured for DHCP or is statically configured with an IP address in the 192.168.1.0/24 subnet.

3. Start a Telnet client application to the IP address for the ethernet0/0 interface (the default IP address is 192.168.1.1). For example, enter telnet 192.168.1.1.

The Telnet application displays the login prompt.

4. If you have not yet changed the default admin name and password, enter netscreen at both the login and password prompts. (Use lowercase letters only. The login and password fields are both case-sensitive.)

5. (Optional) By default, the console times out and terminates automatically after 10 minutes of idle time. To remove the timeout, enter set console timeout 0.

Default Device Settings

This section describes the default settings and operation of an SSG 140 device.

Table 7 describes the default zone bindings for ports on the device.

The cable connections shown in Figure 10 on page 23 use the default settings of some of the ports.

Default Device Settings

Page 31: SSG 140 Hardware Installation and Configuration Guide

Table 7: Default Port and Zone Bindings for an SSG 140 Device

Note that the ethernet0/0 interface has the default IP address 192.168.1.1/24 and is configured for management services. If you connect the 0/0 port on the SSG 140 device to a workstation, you can configure the device from a workstation in the 192.168.1.1/24 subnetwork using a management service such as Telnet. You can change the default IP address on the ethernet0/0 interface to match the addresses on your LAN.

Port Label Interface Zone

10/100 Ethernet ports:

0/0 (default IP address is 192.168.1.1/24) ethernet0/0 Trust

0/1 ethernet0/1 DMZ

0/2 ethernet0/2 Untrust

0/3 ethernet0/3 Null

0/4 ethernet0/4 Null

0/5 ethernet0/5 Null

0/6 ethernet0/6 Null

0/7 ethernet0/7 Null

10/100/1000 Gigabit Ethernet ports:

0/8 ethernet0/8 Null

0/9 ethernet0/9 Null

WAN PIM ports: (x = PIM slot, 1 through 4)

ISDN bri(x/0) Untrust

T1 serial(x/0) Untrust

E1 serial(x/0) Untrust

Serial serial(x/0) Untrust

Default Device Settings 31

Page 32: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

32

Basic Device Configuration

This section describes the basic configurations that you need to perform to allow the SSG 140 device to connect LAN users to a remote network. For more detailed information about ScreenOS features and how to configure them, see the Concepts & Examples ScreenOS Reference Guide.

This section describes the following basic configuration settings:

Root Admin Name and Password

Date and Time

Administrative Access

Management Services

Hostname and Domain Name

Domain Name System Server

Default Route

Ethernet0/0 Interface IP Address

Root Admin Name and PasswordThe root admin user has complete privileges for configuring an SSG 140 device. We recommend that you change the default root admin name and password (both netscreen) immediately.

To change the root admin name and password, use the WebUI or CLI as follows:

WebUI

Configuration > Admin > Administrators > Edit (for the netscreen administrator name value): Enter the following, then click OK:

Administrator Name:Old Password: netscreenNew Password:Confirm New Password:

CLI

set admin name nameset admin password pswd_strsave

NOTE: Passwords are not displayed in the WebUI.

Basic Device Configuration

Page 33: SSG 140 Hardware Installation and Configuration Guide

Date and TimeThe time set on an SSG 140 device affects events such as the setup of VPN tunnels. The easiest way to set the date and time on the device is to use the WebUI to synchronize the device system clock with the workstation clock.

To configure the date and time on a device, use the WebUI or CLI as follows:

WebUI

1. Configuration > Date/Time: Click the Sync Clock with Client button.

A pop-up message prompts you to specify if you have enabled the daylight saving time option on your workstation clock.

2. Click Yes to synchronize the system clock and adjust it according to daylight saving time, or click No to synchronize the system clock without adjusting for daylight saving time.

You can also use the set clock CLI command in a Telnet or Console session to manually enter the date and time for the device.

Administrative AccessBy default, anyone in your network can manage a device if they know the login and password.

To configure the device to be managed only from a specific host on your network, use the WebUI or CLI as follows:

WebUI

Configuration > Admin > Permitted IPs: Enter the following, then click Add:

IP Address/Netmask: ip_addr/mask

CLI

set admin manager-ip ip_addr/masksave

Management ServicesScreenOS provides services for configuring and managing the device, such as SNMP, SSL, and SSH, which you can enable on a per-interface basis.

To configure the management services on the device, use the WebUI or CLI as follows:

WebUI

Network > Interfaces > List > Edit (for ethernet0/0): Under Management Services, select or clear the management services you want to use on the interface, then click Apply.

Basic Device Configuration 33

Page 34: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

34

CLI

set interface ethernet0/0 manage webunset interface ethernet0/0 manage snmpsave

Hostname and Domain NameThe domain name defines the network or subnetwork that the device belongs to, while the hostname refers to a specific device. The hostname and domain name together uniquely identify the device in the network.

To configure the hostname and domain name on a device, use the WebUI or CLI as follows:

WebUI

Network > DNS > Host: Enter the following, then click Apply:

Host Name: nameDomain Name: name

CLI

set hostname nameset domain namesave

Domain Name System ServerThe Domain Name System (DNS) server on the network maintains a database for resolving hostnames and IP addresses. The SSG 140 device accesses the configured DNS servers to resolve hostnames. In ScreenOS, you configure the IP addresses for the primary and secondary DNS servers and the time of the day at which the device performs a DNS refresh.

WebUI

Network > DNS > Host: Enter the following, then click Apply:

Primary DNS Server: ip_addrSecondary DNS Server: ip_addrDNS Refresh: (select)

Every Day at: time

CLI

set dns host name ip_addrset dns host name ip_addrset dns host schedule timesave

Basic Device Configuration

Page 35: SSG 140 Hardware Installation and Configuration Guide

Default RouteThe default route is a static route used to direct packets addressed to networks that are not explicitly listed in the routing table. If a packet arrives at the device with an address for which the device does not have routing information, the device sends the packet to the destination specified by the default route.

To configure the default route on the device, use the WebUI or CLI as follows:

WebUI

Network > Routing > Destination > New (trust-vr): Enter the following, then click OK:

IP Address/Netmask: 0.0.0.0/0.0.0.0Next Hop

Gateway: (select)Interface: ethernet0/0 (select)Gateway IP Address: ip_addr

CLIset route 0.0.0.0/0 interface ethernet0/0 gateway ip_addrsave

Ethernet0/0 Interface IP AddressYou can change the default IP address of the ethernet0/0 interface to match addresses that already exist on your Trusted LAN.

WebUI

Network > Interfaces > Edit (for ethernet0/0): Enter the following, then click OK:

IP Address/Netmask: ip_addr/mask

CLI

set interface ethernet0/0 ip ip_addr/masksave

PIM Configuration

This section explains how to configure the following physical interface modules (PIMs):

ISDN Interface

T1 Interface

E1 Interface

Serial WAN Interface

PIM Configuration 35

Page 36: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

36

ISDN InterfaceIntegrated Services Digital Network (ISDN) is a set of standards for digital transmission over different media created by the Consultative Committee for International Telegraphy and Telephone (CCITT) and International Telecommunications Union (ITU). As a dial-on-demand service, it has fast call setup and low latency as well as the ability to carry high-quality voice, data, and video transmissions. ISDN is also a circuit-switched service that can be used on both multipoint and point-to-point connections. ISDN provides a service router with a multilink Point-to-Point Protocol (PPP) connection for network interfaces. The ISDN interface is usually configured as the backup interface of the Ethernet interface to access external networks.

To configure the ISDN interface, use the WebUI or CLI as follows:

WebUI

Network > Interfaces > List > Edit (bri1/0): Enter or select the following, then click OK:

BRI Mode: Dial Using BRIPrimary Number: 123456WAN Encapsulation: PPPPPP Profile: isdnprofile

CLI

set interface bri1/0 dialer-enableset interface bri1/0 primary-number "123456"set interface bri1/0 encap pppset interface bri1/0 ppp profile isdnprofilesave

To configure the ISDN interface as the backup interface, see “PIM Configuration” on page 35.

For more information on how to configure the ISDN interface, refer to the Concepts & Examples ScreenOS Reference Guide.

T1 InterfaceThe T1 interface is a basic Physical Layer protocol used by the Digital Signal level 1 (DS-1) multiplexing method in North America. A T1 interface operates at a bit-rate of 1.544 Mbps or speeds up to 24 DS0 channels.

The devices support the following T1 DS-1 standards:

ANSI TI.107, TI.102

GR 499-core, GR 253-core

AT&T Pub 54014

ITU G.751, G.703

PIM Configuration

Page 37: SSG 140 Hardware Installation and Configuration Guide

To configure the T1 PIM, use the WebUI or CLI as follows:

WebUI

Network > Interfaces > List > Edit (serial1/0): Enter or select the following, then click OK:

WAN Configure: main linkWAN Encapsulation: cisco-hdlcClick ApplyFixed IP: (select)

IP Address/Netmask 172.18.1.1/24

CLI

set interface serial1/0 encap cisco-hdlcset interface serial1/0 ip 172.18.1.1/24

For information on how to configure the T1 interface, refer to the Concepts & Examples ScreenOS Reference Guide.

E1 InterfaceThe E1 interface is a standard wide area network (WAN) digital communications format designed to operate over copper facilities at a rate of 2.048 Mbps. Widely used outside North America, E1 is a basic time-division multiplexing scheme used to carry digital circuits.

The devices support the following E1 standards:

ITU-T G.703

ITU-T G.751

ITU-T G.775

To configure the E1 PIM, use the WebUI or CLI as follows:

WebUI

Network > Interfaces > List > Edit (serial1/0): Enter or select the following, then click OK:

WAN Configure: main linkWAN Encapsulation: PPPBinding a PPP Profile: junipertestClick ApplyFixed IP: (select)

IP Address/Netmask 172.18.1.1/24

CLI

set interface serial1/0 encapsulation pppset ppp profile “junipertest” static-ipset ppp profile “junipertest” auth type chapset ppp profile “junipertest” auth local-name “juniper”set ppp profile “junipertest” auth secret “password”set interface serial1/0 ppp profile “junipertest”set interface serial1/0 ip 172.18.1.1/24

PIM Configuration 37

Page 38: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

38

set user “server” type wanset user “server” password “server”

For information on how to configure the E1 interface, refer to the Concepts & Examples ScreenOS Reference Guide.

Serial WAN InterfaceSerial WAN links provide bidirectional links that require very few control signals. In a basic serial setup, the data communications equipment (DCE) is responsible for establishing, maintaining, and terminating a connection. A modem is a typical DCE device. A serial cable connects the DCE to a telephony network where, ultimately, a link is established with data terminal equipment (DTE). DTE is typically where a link terminates.

SSG 140 series serial WAN PIMs support the following serial standards:

TIA/EIA 530

V.35

X.21

RS-232

RS-449

To configure serial interface characteristics, use the WebUI or CLI:

WebUI

Network > Interfaces > List > Edit (WAN Interface) > WAN: Select the following, then click Apply:

DTE OptionsSelect your options

CLI

set interface interface serial-options dte-options { ... }save

For more information on how to configure the ISDN interface, refer to the Concepts & Examples ScreenOS Reference Guide.

PIM Configuration

Page 39: SSG 140 Hardware Installation and Configuration Guide

Basic Firewall Protections

The devices are configured with a default policy that permits workstations in the Trust zone of your network to access any resource in the Untrust security zone, while outside computers are not allowed to access or start sessions with your workstations. You can configure policies that direct the device to permit outside computers to start specific kinds of sessions with your computers. For information about creating or modifying policies, refer to the Concepts & Examples ScreenOS Reference Guide.

The SSG 140 device provides various detection methods and defense mechanisms to combat probes and attacks aimed at compromising or harming a network or network resource:

ScreenOS SCREEN options secure a zone by inspecting, and then allowing or denying, all connection attempts that require crossing an interface to that zone. For example, you can apply port-scan protection on the Untrust zone to stop a source from a remote network from trying to identify services to target for further attacks.

The device applies firewall policies, which can contain content-filtering and Intrusion Detection and Prevention (IDP) components, to the traffic that passes the SCREEN filters from one zone to another. By default, no traffic is permitted to pass through the device from one zone to another. To permit traffic to cross the device from one zone to another, you must create a policy that overrides the default behavior.

To set ScreenOS SCREEN options for a zone, use the WebUI or CLI as follows:

WebUI

Screening > Screen: Select the zone to which the options apply. Select the SCREEN options that you want, then click Apply:

CLI

set zone zone screen optionsave

For more information about configuring the network-security options available in ScreenOS, refer to the Concepts & Examples ScreenOS Reference Guide.

Basic Firewall Protections 39

Page 40: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

40

Verifying External Connectivity

To verify that workstations in your network can access resources on the Internet, start a browser from any workstation in the network and enter the following URL: www.juniper.net.

Resetting the Device to Factory Defaults

If you lose the admin password, you can reset the device to its default settings. This action destroys any existing configurations but restores access to the device.

You can restore the device to its default settings in one of the following ways:

Using a Console connection. For further information, refer to the Concepts & Examples ScreenOS Reference Guide.

Using the reset pinhole on the back panel of the device, as described in the next section.

You can reset the device and restore the factory default settings by pressing the reset pinhole. To perform this operation, you need to either view the device status LEDs on the front panel or start a Console session as described in “Using a Console Connection” on page 28.

To use the reset pinhole to reset and restore the default settings, perform the following steps:

1. Locate the reset pinhole on the front panel.

2. Using a thin, firm wire (such as a paperclip), push the pinhole for four to six seconds and then release.

The STATUS LED blinks red. A message on the console states that erasure of the configuration has started and the device sends an SNMP/SYSLOG alert.

3. Wait for one to two seconds.

After the first reset, the STATUS LED blinks green; the device is now waiting for the second reset. The Console message now states that the device is waiting for a second confirmation.

4. Push the reset pinhole again for four to six seconds.

The Console message verifies the second reset. The STATUS LED glows red for one-half second and then returns to the blinking green state.

The device then resets to its original factory settings. When the device resets, the STATUS LED glows red for one-half second and then glows green. The console displays device-startup messages. The device generates SNMP and SYSLOG alerts to configured SYSLOG or SNMP trap hosts.

WARNING: Resetting the device deletes all existing configuration settings and disables all existing firewall and VPN services.

Verifying External Connectivity

Page 41: SSG 140 Hardware Installation and Configuration Guide

After the device has rebooted, the console displays the login prompt for the device. The STATUS LED blinks green. The login for the admin name and password is netscreen.

If you do not follow the complete sequence, the reset process cancels without any configuration change and the console message states that the erasure of the configuration is aborted. The STATUS LED returns to blinking green. If the device did not reset, an SNMP alert is sent to confirm the failure.

Resetting the Device to Factory Defaults 41

Page 42: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

42

Resetting the Device to Factory Defaults
Page 43: SSG 140 Hardware Installation and Configuration Guide

Chapter 4

Servicing the Device

This chapter describes service and maintenance procedures for the SSG 140 device. It includes the following topics:

“Tools and Parts Required” on this page

“Replacing a Physical Interface Module” on page 44

“Upgrading Memory” on page 46

“Replacing the Fuse” on page 48

Tools and Parts Required

To replace a component on an SSG 140 device, you need the following tools and parts:

Electrostatic bag or antistatic mat

Electrostatic discharge grounding wrist strap

Flat tip screwdriver, 1/8 inch

Number-2 phillips screwdriver

NOTE: For safety warnings and instructions, refer to the Juniper Networks Security Products Safety Guide. The instructions in the guide warn you about situations that could cause bodily injury. Before working on any equipment, you should be aware of the hazards involved with electrical circuitry and should be familiar with standard practices for preventing accidents.

Tools and Parts Required 43

Page 44: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

44

Replacing a Physical Interface Module

The SSG 140 device has four slots in the back panel for WAN PIMs. SSG 140 PIMs are field installable and replaceable. The SSG 140 device must be powered off before PIMs are removed or installed.

Removing a Blank FaceplateTo maintain proper airflow through the device, blank faceplates should remain over slots that do not contain PIMs. Do not remove blank faceplates unless you are installing a PIM in the empty slot.

To remove a blank faceplate, perform the following steps:

1. Attach an ESD grounding strap to your bare wrist, and connect the strap to the ESD point on the chassis or to an outside ESD point if the device is disconnected from earth ground.

2. Switch off the power switch on the back of the device. Verify that the POWER LED turns off.

3. Loosen and remove the screws on each side of the faceplate using a number-2 phillips screwdriver.

4. Remove the faceplate.

Removing a Physical Interface ModuleThe PIMs are installed in the back panel of the SSG 140 device. A PIM weighs less than 1 pound (0.5 kilogram).

To remove a PIM, perform the following steps:

1. Place an electrostatic bag or antistatic mat on a flat, stable surface on which you intend to place the PIM.

2. Attach an ESD grounding strap to your bare wrist, and connect the strap to an ESD point.

3. Power off the device. Verify that the POWER LED turns off.

4. Label the cables connected to the PIM so that you can later reconnect each cable to the correct PIM.

5. Disconnect the cables from the PIM.

WARNING: Make sure the power is off to the device when removing PIMs. PIMs are not hot-swappable.

WARNING: Make sure the power is off to the device when removing PIMs. PIMs are not hot-swappable.

Replacing a Physical Interface Module

Page 45: SSG 140 Hardware Installation and Configuration Guide

6. If necessary, arrange the cables to prevent them from dislodging or developing stress points:

Secure the cable so that it is not supporting its own weight as it hangs to the floor.

Place excess cable out of the way in a neatly coiled loop.

Use fasteners to maintain the shape of cable loops.

7. Loosen the captive screws on each side of the PIM using a 1/8-inch slotted screwdriver.

8. Grasp the handles on each side of the PIM, and slide the PIM out of the device. Place it in the electrostatic bag or on the antistatic mat.

Figure 13: Removing/Installing a Physical Interface Module

9. If you are not reinstalling a PIM into the empty slot, install a blank PIM faceplate over the slot to maintain proper airflow.

Installing a Physical Interface Module

To install a PIM, perform the following steps:

1. Attach an ESD grounding strap to your bare wrist, and connect the strap to an ESD point.

2. Power off the device. Verify that the POWER LED turns off.

WARNING: Make sure the power is off to the device when installing PIMs. PIMs are not hot-swappable.

Replacing a Physical Interface Module 45

Page 46: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

46

3. Grasp the handles on each side of the PIM faceplate, and align the notches in the connector at the rear of the PIM with the notches in the PIM slot in the device. Then slide the PIM in until it lodges firmly in the device.

4. Tighten the screws on each side of the PIM using a 1/8-inch slotted screwdriver.

5. Insert the appropriate cables into the cable connectors on the PIM.

6. If necessary, arrange the cables to prevent them from dislodging or developing stress points:

Secure the cable so that it is not supporting its own weight as it hangs to the floor.

Place excess cable out of the way in a neatly coiled loop.

Use fasteners to maintain the shape of cable loops.

7. Power on the device. Verify that the POWER LED lights steadily after you press the power button.

8. Verify that the PIM status LED lights steadily green to confirm that the PIM is online.

Upgrading Memory

You can upgrade an SSG 140 device that has 256 MB of memory to 512 MB by replacing the 256 MB memory module with a 512 MB memory module. Ask your Juniper reseller for kit SSG-100-MEM-512.

To determine the amount of memory, use the get sys CLI command. The command response shows the amount of memory installed.

To upgrade the memory on an SSG 140 device, perform the following steps:

1. Attach an ESD grounding strap to your bare wrist, and connect the strap to an ESD point.

CAUTION: Slide the PIM straight into the slot to avoid damaging the components on the PIM.

NOTE: The SSG 140 device must have 512 MB of memory installed to run the following ScreenOS Unified Threat Management (UTM) features:

Anti-virus

Anti-Spam

URL filtering

Intrusion Prevention System (IPS)

Upgrading Memory

Page 47: SSG 140 Hardware Installation and Configuration Guide

2. Power off the device. Verify that the POWER LED turns off.

3. Remove the device from its rack mount.

4. Use a number-2 phillips screwdriver to remove the screws securing the rack mount brackets to the sides of the unit (four screws per side).

5. Use a number-2 phillips screwdriver to remove the six countersunk screws located along the bottom edge of the side of the unit (three screws per side).

6. Use a number-2 phillips screwdriver to remove the countersunk screws located at each end of the front panel of the unit (two screws).

7. Grip the cover and slide it forward about 1/2-inch (13mm).

8. Lift the cover off and remove it.

9. Locate the memory module slot as shown in Figure 14.

Figure 14: Memory Module Slot

10. Release the 256 MB memory module by pressing your thumbs downward on the locking tabs on each side of the module so that the tabs swivel away from it.

11. Grip the long edge of the memory module and slide it out. Set it aside.

Memory module slot

Front

Rear

Upgrading Memory 47

Page 48: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

48

Figure 15: Releasing and removing the memory module

12. Insert the 512 MB memory module into the slot from which you removed the 256 MB memory module. Exerting even pressure with both thumbs upon the upper edge of the module, press the module downward until the locking tabs click into position.

13. To replace the top panel on the chassis, set the rear edge of the top panel into the groove that runs along the top rear edge of the chassis. Then lower the top panel onto the chassis.

14. Slide the top panel back 1/2-inch (13mm).

15. Use the number-2 phillips screwdriver to replace and tighten the screws you removed earlier, securing the top panel to the chassis.

16. Use the number-2 phillips screwdriver to replace and tighten the screws securing the rack mount brackets to the sides of the chassis.

17. Replace the SSG 140 in the equipment rack.

Replacing the Fuse

The SSG 140 device uses a 6.3 Amp fast acting fuse rated for 250 Volts.

To replace a failed fuse on the SSG 140 device, perform the following steps:

1. Take the device off-line, turn the power switch OFF, and disconnect the power cable.

2. Using a flat tip screwdriver, separate the lid of the external fuse cover from the surface of the power outlet.

Replacing the Fuse

Page 49: SSG 140 Hardware Installation and Configuration Guide

Figure 16: Removing the Fuse

3. Manually remove the fuse assembly from the device.

4. To replace the fuse assembly, enter the new fuse into the opening and slide it in until the fuse clicks into place.

5. Replace the power cable and turn the device power switch ON. Reconnect the network cables.

I

I

Replacing the Fuse 49

Page 50: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

50

Replacing the Fuse
Page 51: SSG 140 Hardware Installation and Configuration Guide

Appendix A

Specifications

This appendix provides general specifications for the SSG 140 device. It contains the following sections:

“SSG 140 Physical Specifications” on page 52

“Electrical Specifications” on page 52

“Environmental Tolerance” on page 52

“Certifications” on page 52

“Connectors” on page 54

51

Page 52: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

52

SSG 140 Physical Specifications

Table 8: SSG 140 Physical Specifications

Electrical Specifications

Table 9: SSG 140 AC Electrical Specifications

Environmental Tolerance

Table 10: SSG 140 Environmental Tolerance

Certifications

SafetyCAN/CSA-C22.2 No. 60950-1-03/UL 60950-1 Safety of Information Technology Equipment

EN 60950-1 Safety of Information Technology Equipment

EN 60825-1 Safety of Laser Products - Part 1

Description Value

Chassis dimensions

1.75 inches (4.4 cm) high

17.5 inches (44.4 cm) wide—18.9 in. (48 cm) wide with mounting brackets attached

15 inches (38.1 cm) deep—plus 0.5 in. (1.27 cm) of hardware that protrudes from the chassis front

Device weight Minimum configuration (no PIMs): 10.2 lbs (4.6 kg)

Maximum configuration (four PIMs): 11.7 lbs (5.3 kg)

Item Specification

AC input voltage Operating range: 90 to 264 VAC

AC input line frequency 50 or 60 Hz

AC device current rating 1.8A

Description Value

Altitude No performance degradation to 6560 ft (2000 m)

Relative humidity Normal operation ensured in relative humidity range of 5% to 90%, noncondensing

Temperature Normal operation ensured in temperature range of 32°F (0°C) to 104°F (40°C)

Non-operating storage temperature in shipping carton: -40°F (-40°C) to 158°F (70°C)

Maximum thermal output

580 BTU/hour (170 W)

SSG 140 Physical Specifications

Page 53: SSG 140 Hardware Installation and Configuration Guide

EMC EmissionsFCC Part 15 Class B (USA)

EN 55022 Class B (Europe, Australia, New Zealand)

VCCI Class B (Japan)

BSMI Class B (Taiwan)

EMC ImmunityEN 55024

EN-61000-3-2 Power Line Harmonics

EN-61000-3-3 Voltage Fluctuations and Flicker

EN-61000-4-2 ESD

EN-61000-4-3 Radiated Immunity

EN-61000-4-4 EFT

EN-61000-4-5 Surge

Certifications 53

Page 54: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

54

EN-61000-4-6 Low Frequency Common Immunity

EN-61000-4-11 Voltage Dips and Sags

European Telecommunications Standards InstituteEuropean Telecommunications Standards Institute (ETSI) EN-300386-2: Telecommunication Network Equipment. Electromagnetic Compatibility Requirements (equipment category other than telecommunication centers)

T1 InterfaceFCC Part 68 - TIA 968

Industry Canada CS-03

UL 60950-1 -Evaluated to applicable requirements for TNV-1 circuit

Connectors

Table 11 lists the RJ-45 connector pinouts for the console and AUX ports:

Table 11: Console and Aux Port Connector Pinouts

Pin Name I/O Description DB-9

1 RTS Out O Request To Send 8

2 DTR Out O Data Terminal Ready 6

3 TxD O Transmit Data 2

4 GND N/A Chassis Ground 5

5 GND N/A Chassis Ground 5

6 RxD I Receive Data 3

7 DSR I Data Set Ready 4

8 CTS I Clear To Send 7

Connectors

Page 55: SSG 140 Hardware Installation and Configuration Guide

Appendix B

Initial Configuration Wizard

This appendix provides detailed information about the Initial Configuration Wizard (ICW) for an SSG 140 device.

After you have physically connected your device to the network, you can use the ICW to configure the interfaces that are installed on your device.

This section describes the following ICW windows:

1. Rapid Deployment Window on page 56

2. Administrator Login Window on page 56

3. Physical Ethernet Interface Window on page 57

4. Untrust Zone Window on page 57

5. Other Interface IP Address Window on page 58

6. Physical Ethernet DHCP Interface Window on page 59

7. Confirmation Window on page 60

55

Page 56: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

56

1. Rapid Deployment Window

Figure 17: Rapid Deployment Window

If your network uses NetScreen-Security Manager, you can use a Rapid Deployment configlet to automatically configure the device. Obtain a configlet from your Security Manager administrator, select the Yes option, select the Load Configlet from: option, browse to the file location, then click Next. The configlet sets up the device for you.

If you want to bypass the configuration wizard and go directly to the WebUI, select the last option, then click Next.

If you are not using a configlet to configure the device and want to use the configuration wizard, select the first option, then click Next. The ICW welcome screen appears. Click Next. The Administrator Login Window appears.

2. Administrator Login WindowEnter a new administrator login name and password, then Click Next.

Figure 18: Admin Login Window

Page 57: SSG 140 Hardware Installation and Configuration Guide

3. Physical Ethernet Interface WindowOn the interface-to-zone bindings screen, you set the interface to which you want to bind the Untrust security zone. Ethernet0/0 is prebound to the Trust security zone. Ethernet0/1 is bound to the DMZ security zone but is optional. Ethernet0/2 is bound to the Untrust zone.

Figure 19: Physical Ethernet Interface Window

After binding an interface to a zone, you can configure the interface. Depending on which interfaces you have installed on your device, mini PIM-specific configuration windows are displayed. To continue configuring your device with the ICW, click Next.

4. Untrust Zone WindowThe Untrust zone interface can have a static IP address or a dynamic IP address assigned via DHCP. Insert the desired information, then click Next.

Figure 20: Untrust Zone Window

57

Page 58: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

58

Table 12: Field Descriptions for Ethernet0/0 Interface

5. Other Interface IP Address WindowUse this screen to configure an IP address and a netmask for the Trust and DMZ interfaces.

Figure 21: Other Interface IP address Window

Field Description

Dynamic IP via DHCP Enables the device to receive an IP address for the Untrust zone interface from an ISP.

Dynamic IP via PPPoE Enables the device to act as a PPPoE client, receiving an IP address for the Untrust zone interface from an ISP. Enter the username and password assigned by the ISP.

Static IP Assigns a unique and fixed IP address to the Untrust zone interface. Enter the Untrust zone interface IP, Netmask, and gateway.

Page 59: SSG 140 Hardware Installation and Configuration Guide

6. Physical Ethernet DHCP Interface WindowSelect Yes to enable your device to assign IP addresses to your wired network via DHCP. Enter the IP address range that you want your device to assign to clients using your network, then click Next.

Figure 22: Ethernet0/0 Interface Window

59

Page 60: SSG 140 Hardware Installation and Configuration Guide

SSG 140 Series Hardware Installation and Configuration Guide

60

7. Confirmation WindowConfirm your device configuration and change as needed. Click Next to save, reboot the device, and run the configuration.

Figure 23: Confirmation Window

After the device reboots with the saved system configuration, the WebUI login prompt appears. For information on how to access the device using the WebUI, refer to “Using the WebUI” on page 29.

Page 61: SSG 140 Hardware Installation and Configuration Guide

Index

Aalarm LED.......................................................................11

Bback panel components................................................15basic network cabling ...................................................23

Ccables

basic network connections ....................................23connecting ...............................................................22serial ...................................................................16, 24

certifications...................................................................52configuration

admin name and password ...................................32administrative access .............................................33basic..........................................................................32date and time ..........................................................33default route.............................................................35DNS server ...............................................................34E1 PIM ......................................................................37ethernet0/0 IP address ...........................................35host and domain name ..........................................34ISDN PIM..................................................................36management services.............................................33T1 PIM ......................................................................37USB ...........................................................................14

connecting cables ....................................................22, 23connecting power supplies...........................................22connector pinouts..........................................................54

Ddefault IP address ..........................................................31default port and zone bindings ....................................30device dimensions.........................................................52device weight .................................................................52dimensions of device ....................................................52DNS server......................................................................34

Eelectrical specifications.................................................52EMC certifications..........................................................53emissions certifications ................................................53environmental specifications .......................................52equipment rack installation..........................................20

ethernet0/0 interface IP address..................................35

Ffaceplate, removing .......................................................44

HHA LED ...........................................................................11

Iimmunity certifications.................................................53installation

before you begin .....................................................20connecting cables....................................................22connecting power....................................................22equipment rack .......................................................20

installing a PIM...............................................................45

JJuniper serial cables.......................................................16

LLAN port LEDs................................................................13LED dashboard...............................................................11

descriptions..............................................................11LEDs

activity link on Ethernet ports ...............................12LAN ports .................................................................13

Mmemory, upgrading .......................................................46

Nnetwork cabling, basic ..................................................23

PPIMs

installing ...................................................................45removing ..................................................................44replacing...................................................................44WAN..........................................................................15

pinouts, connector .........................................................54power LED ......................................................................11power supplies

connecting................................................................22

Index IX-I

Page 62: SSG 140 Hardware Installation and Configuration Guide

IX-II

SSG 500 Series Hardware Installation and Configuration Guide

power switch.................................................................. 17

Rremoving a PIM ............................................................. 44removing faceplate........................................................ 44replacing PIMs ............................................................... 44reset pinhole, using ....................................................... 40

Ssafety certifications ....................................................... 52serial cables.................................................................... 16status LED ...................................................................... 11

Uupgrading memory ....................................................... 46

WWAN PIMs....................................................................... 15weight of device............................................................. 52

Zzones, default bindings ................................................. 30

Index