Home
        ISG 1000 Hardware Installation and
         Contents
1.      Ethernet interfaces ethernetn1 n2 specifies a physical Ethernet interface  Ports are  numbered as follows  1 1 n  four built in 10 100 1000 Mbps ports    2 1 n  top left module   and 3 1 n  top right module         ethernetn1 n2 n3 specifies a sub interface  Sub interfaces are  numbered as follows  1 1 n  four built in 10 100 1000 Mbps ports    2 1 n  top left module   and 3 1 n  top right module  and a logical  interface number    n5               Layer 2 interfaces vlan1 specifies the interface used for VPNs while the device is in  Transparent mode    Tunnel interfaces tunnel n specifies a tunnel interface  Use this interface for VPN traffic    Functional interface mgt specifies an interface bound to the MGT zone  The default IP    address of this interface is 192 168 1 1 24                    NOTE     For either operational mode  we strongly recommend that you change the default  IP address and subnet mask for the mgt interface        26 m Default Device Settings    In Transparent mode  only the mgt and vlan1 interfaces require a new IP address  and subnet mask  Other interfaces must keep the default IP address and subnet  mask settings  0 0 0 0 and 0 0 0 0  respectively   To access the vlan1 interface  you  must change the IP address and subnet mask of vlan  to match the IP address of  your current network     In Route mode  default   you must configure at least two Ethernet interfaces with  new IP addresses and subnet masks     For information on configuring the ope
2.    Security Products    ISG 1000  Hardware Installation and Configuration Guide    Juniper Networks  Inc   1194 North Mathilda Avenue  Sunnyvale  CA 94089   USA   408 745 2000  www juniper net    Part Number  093 1936 000  Revision B    Copyright Notice  Copyright    2008 Juniper Networks  Inc  All rights reserved     Juniper Networks  the Juniper Networks logo  NetScreen  and ScreenOS are registered trademarks of Juniper Networks  Inc  in the United States and  other countries  All other trademarks  service marks  registered trademarks  or registered service marks in this document are the property of Juniper  Networks or their respective owners  All specifications are subject to change without notice  Juniper Networks assumes no responsibility for any  inaccuracies in this document or for any obligation to update information in this document  Juniper Networks reserves the right to change  modify   transfer  or otherwise revise this publication without notice     FCC Statement    The following information is for FCC compliance of Class A devices  This equipment has been tested and found to comply with the limits for a Class A   digital device  pursuant to part 15 of the FCC rules  These limits are designed to provide reasonable protection against harmful interference when the   equipment is operated in a commercial environment  The equipment generates  uses  and can radiate radio frequency energy and  if not installed and   used in accordance with the instruction manual  may 
3.   g  Untrust 3    CI   s Goe  mirii minima E  Trust      au m m    MGT  DMZ LII  rj                               Connecting Ethernet Ports    To establish a high speed connection  connect the provided Ethernet cable from the  Ethernet port marked 1on an ISG 1000 device to the external router  The device  autosenses the correct speed  duplex  and MDI MDIX settings     Connecting a Device toa Network m 23    ISG 1000 Hardware Installation and Configuration Guide    Connecting a Modem Port    You can connect to the untrusted network with an RJ 45 straight through serial  cable and an external modem     Connecting a Device to an Internal Network or a Workstation    An ISG 1000 device contains four Ethernet ports  You can use one or more of these  ports to connect to LANs through switches or hubs  You can also connect one or all  of the ports directly to workstations  eliminating the need for a hub or switch  You  can use either crossover or straight through cables to connect the Ethernet ports to  other devices  See    Default Device Settings    on page 26 for the default  zone to interface bindings     24 m Connecting a Device to a Network    Chapter 3    Configuring a Device    This chapter describes how to connect and configure an ISG 1000 device in your  network  It includes the following sections     m    Default Device Settings    on page 26   m    Accessing a Device    on page 27   m    Basic Device Configuration  on page 29   m  High Availability Configuration  on page 5
4.   page 27     2  At the Login prompt  enter the device serial number     3  At the Password prompt  enter the serial number again  The following message  appears     I    Lost Password Reset     You have initiated a command to reset the device to  factory defaults  clearing all current configuration and settings  Would you like to  continue  y  n     4  Press the y key  The following message appears        Reconfirm Lost Password Reset    If you continue  the entire configuration of the  device will be erased  In addition  a permanent counter will be incremented to  signify that this device has been reset  This is your last chance to cancel this  command  If you proceed  the device will return to factory default configuration   which is  device IP  192 168 1 1  username  netscreen  password  netscreen   Would you like to continue  y  n     5  Press the y key to reset the device     The system now resets and returns to the login prompt  the default login name and  password are both reset to netscreen     40 m Resetting a Device to Factory Defaults    unset all    To use the CLI unset all command  you will need to know the login name and  password  To reset the device to its factory defaults     1  Start a Console session as described in    Using a Console Connection    on  page 27  then log in     2  At the command prompt  enter unset all  The following message is displayed   Erase all system config  are you sure y  n      3  Pressy   4  Enter reset  Press n for the first ques
5.  adjusting for daylight saving time     CLI    set clock  save    The set clock CLI command allows you to manually enter the date and time for the  device     Administrative Access    By default  anyone in your network can manage a device if they know the admin  name and password     To configure the device to be managed only from a specific host on your network   use the WebUI or CLI as follows     WebUI  Configuration    Admin    Permitted IPs  Enter the following  then click Add     IP Address Netmask  ip addr mask    CLI    set admin manager ip ip addr mask  save    Basic Device Configuration m 31    ISG 1000 Installation and Configuration Guide    Hostname and Domain Name    The domain name defines the network or subnetwork to which a device belongs   while the hostname refers to a specific device  The hostname and domain name  together uniquely identify the device in the network     To configure the hostname and domain name on a device  use the WebUI or CLI as  follows     WebUI  Network  gt  DNS  gt  Host  Enter the following  then click Apply     Host Name  hostname  Domain Name  domain_name    CLI    set hostname hostname  set domain domain_name  save    Default Route    The default route is a static route used to direct packets addressed to networks that  are not explicitly listed in the routing table  If a packet arrives at the device with an  address for which the device does not have routing information  the device sends  the packet to the destination specified b
6.  an equipment rack frame that blocks an intake or  exhaust port  Ensure that enclosed racks have fans and louvered sides     m This device exceeds 56 pounds  16 5 kilograms   Take precautions when lifting  and stabilizing the device     m Correct these hazardous conditions before any installation  moist or wet floors   leaks  ungrounded or frayed power cables  or missing safety grounds     Equipment Installation    18 m Before You Begin    The ISG 1000 device fits into a standard 19 inch equipment rack and comes with  two mounting brackets and six screws for front mount or center mount installation     To mount the ISG 1000 device  you need a number 2 phillips screwdriver  not  provided   the two mounting brackets  six screws  provided in the shipping box    and four screws that are compatible with the equipment rack  not provided    When correctly installed  the ISG 1000 device sits level in the equipment rack     To front mount an ISG 1000 device     1  Using three screws  attach one mounting bracket to the front of one side of the  ISG 1000 device     2  Using the remaining three screws  attach the other mounting bracket to the  front of the other side of the device     5  Slide the device into the rack     4  Support the device while you attach the left and right brackets to the rack frame  with the four screws  two on each side  that are compatible with the rack     Figure 6  Front Mount ISG 1000        OOJO  D WOO       To center mount as ISG 1000 device     1  Using th
7.  backup device     Configuring HA Ports    3  Set the HA interface by executing the following command on each device  for  example     set interface ethernet2 1 zone ha  set interface ethernet2 2 zone ha    Master Unit  4  Connect a crossover cable from ethernet1 4 to the switch labeled Switch A     5  Connect an optical cable from ethernet3 4 to the switch labeled Switch B     Backup Unit  6  Connect a crossover cable from ethernet1 4 to the switch labeled Switch C     7  Connect an optical cable from ethernet3 4 to the switch labeled Switch D     Switches    8  Cable together switches A and C  which are connected to the ethernet1 4  ports      9  Cable together switches B and D  which are connected to the ethernet3 4  ports      10  Cable Switch B to the primary router  R1      11  Cable Switch D to the secondary router  R2         NOTE     The switch ports must be defined as 802 1Q trunk ports  and the external routers  must be able to use either Hot Standby Router Protocol  HSRP  or Virtual Router  Redundancy Protocol  VRRP   For the best configuration method  refer to the  documentation for your switch or router        12  Turn the power switch to the ON position for both ISG 1000 devices     High Availability Configuration    m 37    ISG 1000 Installation and Configuration Guide    Restarting the Device    You  whe    may need to restart the device in order to implement new features  such as  n you change between route and transparent mode or when you add new    license
8.  instructions and examples in this document are based on the  functionality of a device running ScreenOS 6 1 0  Your device might function  differently depending on the ScreenOS version you are running  For the latest  device documentation  refer to the Juniper Networks Technical Publications  website at www juniper net techpubs hardware  To see which ScreenOS versions  are currently available for your device  refer to the Juniper Networks Support  website at http   www juniper net customers support               ISG 1000 Hardware Installation and Configuration Guide    Organization    Conventions    This guide contains the following sections     m Chapter 1     Hardware Overview     describes the chassis and components of an  ISG 1000 device     m Chapter 2   Installing and Connecting a Device     describes how to mount and  connect cables and power to an ISG 1000 device     m Chapter 5   Configuring a Device     describes how to configure and manage an  ISG 1000 device and how to perform some basic configuration tasks     m Chapter 4     Servicing the Device     describes service and maintenance  procedures for an ISG 1000 device     m Appendix A     Specifications     provides general device specifications for an  SSG 1000 device     This guide uses the conventions described in the following sections   m    Web User Interface Conventions  on page 6    m    Command Line Interface Conventions  on page 7    Web User Interface Conventions    6 m Organization    The Web user in
9.  keys     The    following sections describe two methods of restarting the device      Restarting the Device with the CLI Reset Command    on page 38       Restarting the Device with the WebUI    on page 38    Restarting the Device with the CLI Reset Command  To restart the device with the CLI reset command     Establish a console session with the device as described in    Using a Console  Connection    on page 28 or    Using Telnet    on page 30     At a Windows workstation  the easiset way of opening a console connection is  to choose Start  gt  Run and enter telnet ip_address     The device prompts you for your login and password    If you have not yet changed the default username and password  enter  netscreen at both the login and password prompts   Use lowercase letters only   The login and password fields are both case sensitive      At the console prompt  enter     reset    The device prompts you to confirm the reset     System reset  are you sure  y  n     Enter Y     The device restarts     Restarting the Device with the WebUI  To restart the device with the WebUI     38 m Restarting the Device    Launch your browser and enter the IP address for the management interface   the default IP address is 192 168 1 1   then press Enter     The WebUI application displays the login prompt    If you have not yet changed the default username and password  enter  netscreen at both the login and password prompts   Use lowercase letters only   The login and password fields are bot
10.  the PSU into one of the power compartments in the back of the device     2  Fasten the PSU to the device by tightening the corner screws into the eyelets on  the PSU sides     3  Remove the hex nut on the grounding screw   4  Place the ground lug on the screw  then tighten the hex nut securely     5  Connect the other end of the grounding lug wire to a grounding point at your  site     6  Loosen the retaining screws on each terminal block     7  Insert the OV DC  positive voltage  return wire into the center COM connector  and the  48V DC power feed wire into either the left or right connector     8  Fasten the screws over the connectors     9  Press the power switch to the ON position     Connecting Interface Cables to a Device  To connect the interface cable to a device   1  Have ready a length of the type of cable used by the interface     2  Insert the cable connector into the cable connector port on the interface  faceplate     3  Arrange the cable as follows to prevent it from dislodging or developing stress  points     a  Secure the cable so that it is not supporting its own weight as it hangs to  the floor     b  Place any excess cable out of the way in a neatly coiled loop     c  Use fasteners to maintain the shape of the cable loops        A WARNING  Certain ports on the device are designed for use as intrabuilding   within the building  interfaces only  Type 2 or Type 4 ports as described in   GR 1089 CORE  Isssue 4  and require isolation from the exposed outside 
11.  then forward  This action  loosens the connector from the transceiver port     4  Gently but firmly pull the clip from the transceiver port     Mini GBIC Transceiver    50 m Cables and Transceivers    To remove a mini GBIC transceiver from an interface module     1  Push in the transceiver release latch  located on the underside of the  transceiver  until it locks into place  disengaging the transceiver  Figure 18      Figure 18  Releasing the Transceiver    v    A    E                       Transceiver      Release Latch    2  Grasp the transceiver at both sides  and pull the transceiver toward you to  remove it from the interface module        To install a mini GBIC transceiver into an interface module  holding the transceiver  with the label face up  insert it into the transceiver slot     Security Modules    Security modules are high performance processing subdevices that increase the  performance of the ISG 1000 for high CPU usage services  such as Intrusion  Detection and Prevention  IDP         T CAUTION  Before you install or remove a security module  make sure the power is  OFF  the power cords are removed  and the device is placed on a stable table        To install or remove a security module     1  Remove the top cover from the device   Remove the three screws located on the  sides and the back of the top cover      2  Insert the security module into an empty slot  starting with the slot closest to  the front     5  After inserting the security module into the sl
12. 5  m    Restarting the Device  on page 38    m    Resetting a Device to Factory Defaults    on page 40       NOTE     After you configure a device and verify connectivity through the remote network   you must register your product at http   www juniper net customers support  so  certain ScreenOS services  such as Deep Inspection Signature Service and  Antivirus  purchased separately   can be activated on the device  After registering  your product  use the WebUI to obtain the subscription for the service  For more  information about registering your product and obtaining subscriptions for  specific services  refer to the Concepts  amp  Examples ScreenOS Reference Guide for  the ScreenOS version running on the device           25    ISG 1000 Installation and Configuration Guide    Default Device Settings    The ISG 1000 device supports a maximum of 20 ports  each of which can serve as a  physical interface  You can also configure Ethernet ports to serve as virtual  logical   interfaces  The interfaces that can be configured on the ISG 1000 device are listed in  the following tables     Table 4  Interface to Zone Binding                            Port Label Interface Zone  Modem serial Untrust  MGT mgt  default IP address is 192 168 1 1 24  MGT   1 ethernet1 1 Null   2 ethernet 1 2 Null   3 ethernet 1 3 Null   4 ethernet 1 4 Null  Interface Modules starting at ethernet2 1 and 3 1 from left to right Null       Table 5  Logical Interface Naming       Interface Type Description  
13. Connection       NOTE     Use a straight through RJ 45 CAT5 serial cable with a male RJ 45 connector to plug  into the Console port on the device        To establish a console connection    1  Plug the female end of the supplied DB 9 adapter into the serial port of your  workstation   Be sure that the DB 9 is inserted properly and secured   Figure 9  shows the type of DB 9 connector that is required     Figure 9  DB 9 Adapter    RJ 45 Jack         RJ 45 Cable    DB 9 Adapter_       2  Plug the male end of the RJ 45 CAT5 serial cable into the Console port on the  ISG 1000   Be sure that the other end of the CAT5 cable is inserted properly and  secured in the DB 9 adapter      Accessing a Device m 27    ISG 1000 Installation and Configuration Guide    Using Telnet    28 m Accessing a Device    3  Launch a serial terminal emulation program on your workstation  The required  settings to launch a console session are as follows     m Baud rate  9600  m Parity  None  m Data bits  8  m Stop bit  1  m Flow Control  None  4  If you have not yet changed the default login for the login name and password   enter netscreen at both the login and password prompts   Use lowercase letters    only  The login and password fields are both case sensitive     For information on how to configure the device with the CLI commands  refer  to the Concepts  amp  Examples ScreenOS Reference Guide     5   Optional  By default  the console times out and terminates automatically after  10 minutes of idle tim
14. MGT Port     The management  MGT  port is a fixed 10 100Base T  interface that provides a dedicated connection for management traffic  It has a  separate IP address and netmask  default is 192 168 1 1 24  and can be  configured with the Web User Interface  WebUI  and the command line  interface  CLI   The MGT port is only to be used for management purposes and  is not capable of routing traffic to other interfaces     The front panel of the ISG 1000 device has two interface module slots  which can  accommodate the following types of interface modules     m 10 100 Mbps  m 10 100 1000 Mbps  m Mini GBIC    The modules are not hot swappable  Your network administrator needs to  determine the kinds of interfaces needed to deploy an ISG 1000 device        NOTE     You can use one 10 100 1000 and one GBIC card in the same ISG 1000 device        10 100 Mbps Interface Module    The four port  FE4  or eight port  FE8  10 100 Mbps interface module is appropriate  for a 10 100Base T LAN  Connect the ports using a crossover cable with RJ 45  connectors     Figure 3  10 100 Mbps Modules             10 100 1000 Mbps Interface Module    The two port  GB2 TX  10 100 1000 Mbps interface module is appropriate for a  10 100 1000 Base T LAN  Connect the ports using a twisted pair cable with RJ 45  connectors     Figure 4  Fixed 2 port 10 100 1000 Mbps Module       Mini GBIC Interface Module    The two port and four port mini GBIC interface modules provide connectivity to  fiber based and copper b
15. On steadily Security module is installed   Off No security module is installed   MOD2 Green On steadily Security module is installed   Off No security module is installed   FLASH Green On steadily PC card is installed in the compact flash slot   Blinking Read write activity is detected   Off Compact flash slot is empty        Port Descriptions    This section explains the purpose and function of the following components   m Ethernet Ports  m Compact Flash Slot    m Management Interfaces    Ethernet Ports    Four built in 10 100 Ethernet ports provide LAN connections to hubs  switches  local  servers  and workstations  You can also designate an Ethernet port for management  traffic  The ports are labeled 1 through 4  For the default zone bindings for each  Ethernet port  see    Interface to Zone Binding    on page 26     When configuring one of the ports  refer to the interface name that corresponds to  the location of the port  From left to right on the front panel  the interface names  for the ports are ethernet1 1 through ethernet1 4    Figure 2 displays the location of the LEDs on each Ethernet port     Figure 2  Activity Link LEDs Location    TXIRX LINK       Table 5 describes the Ethernet port LEDs     Table 3  Ethernet Port LEDs             Name Color Status Description  LINK Green On steadily Port is online   Off Port is offline   TX RX Green Blinking Traffic is passing through  The baud rate is    proportional to the link activity        Off Port might be on but is no
16. Units    This section provides instructions on servicing the power supply units  PSUs   available on an ISG 1000     DC Power Supply Replacement  To replace the DC PSU        A    WARNING  You must shut off current to the DC feed wires leading to the PSU  Also   make sure that the ON OFF switch on the PSU is in the OFF position        I    9     Turn off the current and the PSU    Loosen the three retaining screws on the terminal block    Remove the feed wires    Turn the thumbscrews counterclockwise to release the PSU    Gripping the handle  gently pull out the PSU    Insert the new PSU into the bay    Secure the PSU by tightening the thumbscrews clockwise    Insert the OV DC  positive voltage  return wire into the COM connector and the   48V DC power feed wire into the  48V connector  then ground the wire into the    GND connector     Fasten the screws over the connectors     10  Press the power switch to the ON position     AC Power Supply Replacement  To replace an AC PSU     46 m Power Supply Units    1     2     Press the power switch to the OFF position  Unplug the cord from the PSU     Loosen the thumbscrews on the power supply by turning them  counterclockwise to release the PSU     Lift the handle and pull straight out   Insert the new PSU into the slot     Fasten the PSU to the device by tightening the thumbscrews clockwise     Fan Tray    7  Connect the female end of a standard power cord to the male connector on the  back of the power supply     8  Press the powe
17. ased gigabit Ethernet LANs  Connect the port using  appropriate cable type depending on the specific media used  Use single mode or  multimode optical cable for SX and LX and CAT 5 cable for the 10 100 1000BaseT   See    Interface Media Types for the Mini Gigabit and 10Gigabit XFP Transceivers    on  page 57 for a list of each media type     Figure 5  Two Port and Four Port Mini GBIC Modules       Front Panel m 15    ISG 1000 Hardware Installation and Configuration Guide    Fan Tray    Back Panel    16 m Back Panel    The ISG 1000 device has a single hot swappable three fan tray  which you can  access on the left front side of the chassis        A    WARNING  If a fan stops operating as a result of failure or removal  the device  continues to run  Do not leave the fan tray empty for more than two minutes   otherwise  heat failure or permanent damage could occur        The back panel of the ISG 1000 device contains a single factory installed modular  power supply unit  PSU   The PSU is available for AC or DC use and weighs 1 5  pounds   45 kilograms   The PSU attaches with thumbscrews to allow field  replacement  The POWER LED on the front panel of the ISG 1000 device glows  either green or red  Green indicates correct function  and red indicates PSU failure     The AC PSU faceplate contains a power switch and a male power outlet     The DC PSU faceplate contains a power switch  hex nut  and three DC power  terminal blocks that connect to power cables     Chapter 2    Installi
18. bit Ethernet Cables  ini rv eerie eine es 49  MiniGBIC TransceiVer ienei tn yay deere uli oo Vas ote a its coed eee 50  Security Modules sss erre eroe aste epi ve a e Rien ie 51  Specifications 53  Idiot EUER 55  Electrical ete pe respecte ee niter m po eie eee er EA Ie eS 54  Environmental store a qe red e ede E DR PEE NT n 54  CELICA tude eee cest Ee tee eto e ie tee das eite teer 54  COnDTle LOIS  o eo etos sis eset scott su oeste a idi dl oie eh ae 56  WINGO                                                          59    About This Guide    The Juniper Networks Integrated Security Gateway  ISG  1000 device integrates  firewall  deep inspection  DI   virtual private network  VPN   and traffic  management functionality in a low profile  modular chassis  The ISG 1000 device is  ideal for medium sized central enterprise sites  large regional sites  and security  data centers or server farms     Built around a fourth generation security ASIC  the GigaScreen3  the ISG 1000  device provides for flexible configuration with the following interface options for its  two open slots     m 10 100 Mbps interface module  for 10 100Base T connections  four and eight  ports     m  10 100 1000 Mbps interface module  for 10 100 1000Base T connections  two  ports     m  Mini GBIC interface module  for fiber optic connections  two and four ports     The chassis also has four built in 10 100 1000 ports for a maximum of 20 ports that  can be configured per device        NOTE     The configuration
19. cause harmful interference to radio communications  Operation of this equipment in a residential  area is likely to cause harmful interference  in which case users will be required to correct the interference at their own expense     The following information is for FCC compliance of Class B devices  The equipment described in this manual generates and may radiate radio frequency  energy  If it is not installed in accordance with Juniper Networks    installation instructions  it may cause interference with radio and television reception   This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC  rules  These specifications are designed to provide reasonable protection against such interference in a residential installation  However  there is no  guarantee that interference will not occur in a particular installation     If this equipment does cause harmful interference to radio or television reception  which can be determined by turning the equipment off and on  the user  is encouraged to try to correct the interference by one or more of the following measures       Reorient or relocate the receiving antenna    a Increase the separation between the equipment and receiver    a Consult the dealer or an experienced radio TV technician for help    a Connect the equipment to an outlet on a circuit different from that to which the receiver is connected     Caution  Changes or modifica
20. chassis alarm to sound when a battery fails  fan failed Sets the chassis alarm to sound when a fan fails       power failed Sets the chassis alarm to sound when a power supply fails       temperature Sets the chassis alarm to sound when the temperature goes outside the  acceptable range       To download files from or upload files to the device  use the WebUI or CLI as  follows   WebUI    Configure    Update    ScreenOS Keys or Config File    Select the type of file  you wish to transfer  browse for the file that you wish to upload onto the device   then click Apply     Once you click Apply  the device restarts  This process could take up to several  minutes     CLI  save   software   config   from   flash   slot1 filename   to   flash   slot1 filename      where flash refers to internal flash memory  slot1 refers to the compact flash  slot  and filename is the name of the software or configuration file on the card     High Availability Configuration    The ISG 1000 device does not have dedicated High Availability  HA  interfaces   however  you can cable and configure two ports per device to behave as an HA  interface once the device is running  In an HA configuration  one device is  configured as the primary device and the other is configured as the backup  If the  primary device fails  the backup device takes over as the primary  Any number and  type of interface module port can be used as HA ports  The backup device must  have the same interface modules installed and Scree
21. click    Apply     CLI    set interface mgt manage web  unset interface mgt manage snmp  save    Trust Zone Interface IP Address    The ISG 1000 device can communicate with your protected network through an  interface bound to the Trust zone  To allow an interface to communicate with  internal devices  you must assign it the IP address and subnet mask for your  protected network     To set the ethernet3 1 interface to communicate with your trusted network  use the  WebUI or CLI as follows     WebUI  Network    Interfaces    Edit  for ethernet5 1   Enter the following  then click  Apply     Zone Name  Trust  select   IP Address Netmask  10 250 2 1 16  CLI    set interface ethernet3 1 zone trust  set interface ethernet3 1 ip 10 250 2 1 16  save    Basic Device Configuration m 33    ISG 1000 Installation and Configuration Guide    Untrust Zone Interface IP Address    Policy Configuration    The ISG 1000 device can communicate with external  untrusted  devices through an  interface usually bound to the Untrust zone  To allow an interface to communicate  with external devices  you must assign it a public IP address     To set the ethernet1 1 interface to communicate with external devices  use the  WebUI or CLI as follows     WebUI  Network    Interfaces    Edit  for ethernet1 1   Enter the following  then click  Apply     Zone Name  Untrust  select   IP Address Netmask  172 16 20 1 16    CLI    set interface ethernet1 1 zone untrust   set interface ethernet1 1 ip 172 16 20 1 16  g
22. cribed in  GR 1089 CORE  Isssue 4  and require isolation from the exposed outside plant   OSP  cabling  To comply with NEBS requirements and protect against lightning  surges and commercial power disturbances  the intrabuilding ports must not be  metallically connected to interfaces that connect to the OSP or its wiring  The  intrabuilding ports on the device are suitable for connection to intrabuilding or  unexposed wiring or cabling only  The addition of primary protectors is not  sufficient protection for connecting these interfaces metallically to OSP wiring           CAUTION  To comply with intrabuilding lightning and surge requirements   intrabuilding wiring must be shielded  and the shield for the wiring must be  grounded at both ends        Electrical  Environmental    54 m Electrical    Table 9 shows the environmental specifications for the ISG 1000     Table 9  ISG 1000 Environmental Tolerance       Description Value       Altitude No performance degradation to 10 000 feet  3 048 meters        Relative humidity   Normal operation ensured in relative humidity range of 10 to 90 percent   noncondensing       Temperature Normal operation ensured in temperature range of 32  F  0  C  to 122  F   50  C        Certifications    Table 10 provides the certifications available for the ISG 1000     Table 10  ISG 1000 Certifications       Certification Type Certification Name       NEBS  NEBS Level 5  GR 65 Core  NEBS  Environmental Testing    GR 1089 Core  EMC and Electrical Sa
23. cument  contact Juniper Networks at  techpubs comments juniper net        Chapter 1  Hardware Overview    This chapter provides detailed descriptions of the ISG 1000 chassis and modular  components  It includes the following sections     m    Port and Interface Module Slots    on page 10  m    Front Panel    on page 11    m    Back Panel    on page 16    ISG 1000 Hardware Installation and Configuration Guide    Port and Interface Module Slots    This section describes the location of the built in ports and interface module slots   Refer to Figure 1 for built in port locations and Table 1 for the descriptions of the  ports  interface modules  and cable connectors     Figure 1  Port and Interface Module Locations  Slot 1 Slot 2       e    Juniper          Y     MGT Ethernet       Compact  Flash    Console  Modem    Table 1  ISG 1000 Ports  Interface Modules  and Cable Connector Descriptions       Port Description Connector Speed Protocol       1 4 Enables direct connections to workstations ora   RJ 45 10 100 Mbps Ethernet  LAN connection through a switch or hub  This  connection also allows you to manage the device  through a Telnet session or the WebUI     Autosensing duplex and auto MDI MDIX       Console Enables a serial connection with the system  RJ 45 9600 bps RS 232C serial  Used for terminal emulation connectivity to  launch CLI sessions           Modem Enables a backup RS 232 async serial Internet   RJ 45 9600 bps     115 Kbps RS 232C serial  connection through an exte
24. d 51  Administrative ACCESS  qm etie eet ed e e e a etes te esten 51  Hostname and Domain Name           sssssssssssssss mee een 32  Default ROU Serea e Wo Re td tae eet e de os y da 32  Management Interface IP Address    32  Management Services  Lus fed carditis e ene ERE e een 55  Trust Zone Interface IP Address          sssssssssssssss ee 55  Untrust Zone Interface IP Address           ssssssssssssssss eee 54  Policy  CODfIBUratiORt 35e Ae e pede er ee rere n e UD ee ee td 34  Device Nate aene Rc t oe head vem Ive der t up te eS 55  Bile  TACO aee etd m lu ette eter d e e RN duals 35  High Availability Configuration    eee e eee m 35  Restartng the DEVICE uc cin A cae chy rrt e ed d e D ERR ds 38  Restarting the Device with the CLI Reset Command    38  Restarting the Device with the WebUI            ssssss 38  Resetting a Device to Factory Defaults  isens ionnta a i n e ree 40  Device Serial NuMDE ini ea E EAEE Oc e ver ie A 40  Usa A ee 41  Servicing the Device 43  Reg  ired Tools And Parts  39044 o3 teh lo de Y odos  A em Ach ao A dicet da 44  Intertace Modules tt hue icine o Mut o id Jo cR 44  Remove Interiace Module a 55 alta 44  Insert Intetlace Modulo dicci  n 45  Power Supply URIS asic orbe a n te erae Dee eque Le eI e ae 46  DG Power Supply Replacement s ira ette pede roce ia 46  AC Power Supply Replace tirita ere teens 46  Ii Mb LR 47  FanzTray Filteru eese p Eee e e cid tne ie ere a ve pe e e PH EN 48  Cables and Transceiver S  sent tette tae y re oo ERN 49  Giga
25. des you with  the following features     m Find CSC offerings   http   www juniper net customers support           m Find product documentation   http   www juniper net techpubs     Requesting Technical Support m 7    ISG 1000 Hardware Installation and Configuration Guide    m Find solutions and answer questions using our Knowledge Base     http   kb juniper net        m Download the latest versions of software and review your release notes     http   www juniper net customers csc software        m Search technical bulletins for relevant hardware and software notifications     http   www juniper net alerts        m Join and participate in the Juniper Networks Community Forum     http    www juniper net company communities        m Open a case online in the CSC Case Manager     http    www juniper net customers cm        m To verify service entitlement by product serial number  use our Serial Number  Entitlement  SNE  Tool     https   tools juniper net SerialNumberEntitlementSearch        Opening a Case with JTAC    Feedback    8 m Feedback    You can open a case with JTAC on the Web or by telephone     m Use the Case Manager tool in the CSC at http   www juniper  net customers cm         m Call 1 888 314 JTAC  1 888 314 5822    toll free in USA  Canada  and Mexico      For international or direct dial options in countries without toll free numbers  visit  us at http   www  juniper  net customers support requesting support         If you find any errors or omissions in this do
26. e  To remove the timeout  enter set console timeout 0     6  Once the command prompt is displayed  the device is ready to be configured     See    Basic Device Configuration    on page 29 to complete the initial device  configuration     To establish a Telnet connection   1  Connect your workstation to the MGT port  mgt interface  on the device     2  Ensure that your workstation is configured for DHCP or is statically configured  with an IP address in the 192 168 1 0 24 subnet     3  Start a Telnet client application to the IP address for the mgt interface  the  default IP address is 192 168 1 1   For example  enter telnet 192 168 1 1     The Telnet application displays the login prompt     4  If you have not yet changed the default login for the login name and password   enter netscreen at both the login and password prompts   Use lowercase letters  only  The login and password fields are both case sensitive     5   Optional  By default  the console times out and terminates automatically after  10 minutes of idle time  To remove the timeout  enter set console timeout 0     6  Once the command prompt is displayed  the device is ready to be configured   See    Basic Device Configuration    on page 29 to complete the initial device  configuration     Using Dialup    Each ISG 1000 device provides a modem port that allows you to establish a remote  CLI session using a dialup connection through a 9600 bps modem  Dialing into the  modem establishes a dialup CLI connection  You mus
27. en ues 15  Pa  uelo ist Poeno ee deg 16  Back Pamela ad ie e eet eod 16  Chapter 2 Installing and Connecting a Device 17  Before You Begim ii ere A E teet Ure ere e re n eR oe Pe epe estes 18  Equipment Installation 18  Connecting the POWeT 2  eoe em ee dd 20  AC Power Supply Unlimited etae te dee e tos 20  DCCPOWeESUDDIV UNIT erbe teet ette oe adt ie ceti Moet teense 20  Connecting Interface  Cables to a DEVICE    ib reste nel ort tuo send esto 21  Connecting  a  Device to a NetWOER    icit et et lee tte dest qe te go petes 22  Connecting an ISG 1000 Device to an Untrusted Network                   sss 22  Connecting  Ethernet  BOLTS  eet srt tnt Pete OR de te dete eaten 25  Connectirig a Moderm Portoa merens tette e ir be en ee Pent to 24  Connecting a Device to an Internal Network or a Workstation                  24  Chapter 3 Configuring a Device 25  Default Device  SettlTiBS c cus cette I p te oM eade 0t 26  ACCESSING  a DEVICE  c es sciet eee cs Tate d cL Loss rn ad 27  Using a Console Comme ction   sostenere eee t ee ee 27    Table of Contents m 3    ISG 1000 Hardware Installation and Configuration Guide    4 m Table of Contents    Chapter 4    Appendix A    WSIS Ta a sane aei dst tite edo caes el tenet scale 28  WSIS Dialup MEER 29  Usirigithe WebUl 46 steoan radar ste ote aliens seen a heal 29  B  sic Device CorftgUration   imet age inet liliana 29  Root Admin Name and Password              sssssssssssss 50  Dateand o t erbe t ette teg Poe caa deret et e a ee o Ug P
28. ers    This section provides information on how to connect the cables and transceivers to  some of the interface modules     Gigabit Ethernet Cables  To connect a Gigabit Ethernet cable to a mini GBIC transceiver port     1  If you have not already done so  remove the two plastic fiber protection caps  from the ends of the cable     Cables and Transceivers m 49    ISG 1000 Installation and Configuration Guide    2  Hold the cable connector between your thumb and forefinger  with your thumb  on top and your forefinger underneath   Do not press the release on top of the  connector      3  Slide the connector into the transceiver port until it clicks into place  Because  the fit is close  you might have to apply some force to insert the connector  To  avoid damaging the connector  apply force evenly and gently    To remove the cable from the transceiver port    1  Make sure the transceiver latch is in a secured locked position  the latch is flat  against the front of the transceiver   Otherwise  when you attempt to remove    the cable  the transceiver might come out with the cable still attached     Figure 17  Transceiver Latch    Front Edge  a T    Latch  Latch                                              Transceiver Transceiver  Locked Position Unlocked Position  Latch is fully extended Latch is pressed in    2  Hold the connector between your thumb and forefinger  with your thumb on  top and your forefinger underneath     3  Using your thumb  press the connector release down 
29. et interface ethernet1 1   save    By default  the ISG 1000 device does not allow inbound or outbound traffic or traffic  to or from the DMZ  To permit  or deny  traffic  you must create access policies     To create and save an access policy that permits all kinds of outbound traffic from  any host in your trusted LAN to any device on the untrusted network  use the  WebUI or CLI as follows     WebUI  Policies  gt   From  Trust To  Untrust   gt  New  Enter the following  then click OK     Name  Trust Untrust   Source Address  Any  select   Destination Address  Any  select   Service  Any  select    Action  Permit  select     CLI    set policy from trust to untrust any any any permit  save       CAUTION  Your network might require a more restrictive policy than this sample  policy  This example is not a requirement for initial configuration  For detailed  information about access policies  refer to the Concepts  amp  Examples ScreenOS  Reference Guide        34 m Basic Device Configuration    Device Alarm    File Transferring    The ISG 1000 device allows you to configure the chassis alarm  an audible warning  that sounds when a system fails or a hazardous event occurs     To specify which failures and events trigger the chassis alarm  use the set chassis  audible alarm string CLI command  Table 6 describes the keywords available for  the set chassis CLI command     Table 6  Set Chassis Keywords       Keyword Meaning             all Enables all chassis alarms  battery Sets the 
30. fety for Network  Telecommunications Equipment       Safety CAN CSA C22 2  No  60950 1 05 UL 60950 1  EN 60950 1  IEC 60950 1       EMI FCC class A  CE class A  C Tick  VCCI Class A       a An ISG 1000 or ISG 2000 device can operate without a fan tray filter  however  without the filter  the device does not comply with NEBS standards     Certifications m 55    ISG 1000 Installation and Configuration Guide    Connectors    Figure 19 shows the location of the pins on the RJ 45 connector     Figure 19  RJ 45 Pinouts  12345678    Table 11 lists the RJ 45 connector pinouts     Table 11  RJ 45 Connector Pinouts                               Pin Name 1 0 Description   1 RTS Out O Request To Send   2 DTR Out O Data Terminal Ready  3 TxD O Transmit Data   4 GND NA Chassis Ground   5 GND NA Chassis Ground   6 RxD I Receive Data   7 DSR I Data Set Ready   8 CTS I Clear To Send       56 m Connectors    Figure 20 shows the location of the pins on the DB 9 female connector     Figure 20  DB 9 Female Connector       Table 12 provides the DB 9 connector pinouts     Table 12  DB 9 Connector Pinouts                                  Pin Name 1 0 Description   1 DCD I Carrier Detect   2 RxD I Receive Data   5 TxD O Transmit Data   4 DTR O Data Terminal Ready  5 GND NA Signal Ground   6 DSR I Data Set Ready   7 RTS O Request To Send   8 CTS I Clear To Send   9 RING I Ring Indicator          The Mini Gigabit transceivers are compatible with the IEEE 802 3z Gigabit Ethernet  standard  and the 10Gba
31. filter        48 m Fan Tray Filter    2  Pull the front edge of the filter from the Velcro backing  located on the device  wall     5  Insert a wooden ruler between the filter and the device wall  Figure 15      Figure 15  Loosening the Fan Tray Filter       4  Push the wooden ruler toward the back of the device  gently lifting the filter as  you proceed     5  Once the filter is separated from the Velcro backing  use your fingers to pull the  filter out of the fan tray slot  Figure 16      Figure 16  Removing the Fan Tray Filter       6  Carefully insert a new filter into the device  Use the wooden ruler as an aid to  guide the back edge of the filter to the end of the device wall     7  Once the filter is fully inserted  push the wooden ruler against the surface of the  filter several times to ensure that the filter is secure against the Velcro backing  on the device wall        T CAUTION  Make sure that the filter is secure against the device wall  otherwise  the  filter will tear when you reinstall the fan tray        8  Insert the fan tray into the chassis     9  Secure the fan tray by pushing the fan lever flat against the front panel        NOTE  If the top cover of the device is accessible  you may find it easier to remove the  cover and access the filter from the top of the device           NOTE  An ISG 1000 or ISG 2000 device can operate without a fan tray filter  however   without the filter the device does not comply with NEBS standards        Cables and Transceiv
32. h case sensitive      In the WebUI  choose     Configuration    Update    ScreenOS Keys    Click Reset   An alert box prompts you to confirm that you want to reset the device   Click OK     The device resets  Also  an alert box prompts you to leave your browser open  for a few minutes and then log back into the device     Restarting the Device m 39    ISG 1000 Installation and Configuration Guide    Resetting a Device to Factory Defaults    If you lose the admin password  or you need to clear the configuration of your  device  you can reset the device to its factory default settings  Resetting the device  destroys any existing configurations and restores access to the device        T CAUTION  Resetting the device deletes all existing configuration settings and  disables all existing firewall and VPN services           NOTE  By default  the device recovery feature is enabled  You can disable it by entering  the CLI unset admin device reset command  Also  if the security device is in FIPS  mode  the recovery feature is automatically disabled        You can restore the device to its default settings using one of these methods   m Using the device serial number  m Using the CLI unset all command    The following sections describe how to use these methods to reset the device to its  factory defaults     Device Serial Number  To use the device serial number to reset the device to its factory defaults     1  Start a Console session as described in    Using a Console Connection    on
33. lation and Configuration Guide    m  Untrust Zone Interface IP Address  m Policy Configuration    m Device Alarm    File Transferring    Root Admin Name and Password    The root admin user has complete privileges for configuring an ISG 1000 device  We  recommend that you change the default root admin name and password  both  netscreen  immediately     To change the root admin name and password  use the WebUI or CLI as follows     WebUI    Configuration    Admin    Administrators    Edit  for the Administrator Name  netscreen   Enter the following  then click OK     Administrator Name    Old Password  netscreen  New Password    Confirm New Password        NOTE  Passwords are not displayed in the WebUI        CLI    set admin name name  set admin password pswd str  save    30 m Basic Device Configuration    Date and Time    The time setting on an ISG 1000 device affect events such as the setup of VPN  tunnels  The easiest way to set the date and time on the device is to use the WebUI  to synchronize the device system clock with the workstation clock     To configure the date and time on a device  use the WebUI or CLI as follows     WebUI  1  Configuration    Date Time  Click the Sync Clock with Client button     A pop up message prompts you to specify if you have enabled the daylight  saving time option on your workstation clock     2  Click Yes to synchronize the system clock and adjust it according to  daylight saving time  or click No to synchronize the system clock without 
34. n provides instructions on how to service the interface modules on an  ISG 1000 device     Remove Interface Module    To remove an interface module from a slot        A    WARNING  When removing interface modules  be sure that the power is in the  OFF position        44 m Required Tools and Parts    1  Unscrew the thumbscrews on each side of the interface module   2  With your thumbs  pull the locking levers out   3  Grip the levers  then gently slide the module straight out  Figure 11      4  Ifyou are not reinstalling an interface module into the empty slot  install a  blank faceplate over the slot to maintain proper airflow     Figure 11  Remove Interface Module       Insert Interface Module    To insert an interface module into a module slot           WARNING  When inserting interface modules  be sure that the power is in the OFF  position        1  Align the side edges of the module with the grooves in the side walls of the slot   Figure 12      Figure 12  Insert Interface Module       2  Slide the module in until it is forced to stop     5  With your thumbs  push in the locking levers to secure the module  Figure 15      Figure 13  Lock Interface Module          A WARNING  Pushing the latch before it contacts the ridge on the slot wall sets the  locking tab prematurely and seats the interface module improperly        4  Secure the thumbscrews on each side of the interface module     Interface Modules m 45    ISG 1000 Installation and Configuration Guide    Power Supply 
35. nOS configuration as the  primary device for HA to work correctly  Figure 10 illustrates an example of a basic  way to cable two ISG 1000 devices for HA     High Availability Configuration m 35    ISG 1000 Installation and Configuration Guide       NOTE     We recommend 10 100 1000 Mbps interface or mini GBIC interface modules for  HA ports  You cannot mix mini GBIC and 10 100 1000 Mbps ports as HA ports        For information on configuring HA  refer to the Concepts  amp  Examples ScreenOS  Reference Guide     Figure 10  HA Connection    IP EE EL     P  Untrust Zone E    N    R1       Switch B 802 1Q Trunk Switch D       156 1000 15G 1000    005 rie       BG f crrr ee        primary device        Switch A Switch C    Trust Zone       NOTE     The provided cabling instructions reproduce the configuration shown in Figure 10   however  this is not the only possible HA configuration  In addition  the  instructions assume that all physical ports and interfaces are still at their defaults   If you have changed the port and interface configurations  the instructions might  not work properly        36 m High Availability Configuration    To cable two ISG 1000 security devices together for HA and connect them to the  network     1  Connect a 10 100Base T crossover cable from the preferred HA1 port on the  primary device to the preferred HA1 on the backup device     2  Connect a 10 100Base T crossover cable from the preferred HA2 port on the  primary device to the preferred HA2 on the
36. ng and Connecting a Device    This chapter describes how to install and connect an ISG 1000 device  It includes  the following sections     m    Before You Begin    on page 18  m  Equipment Installation  on page 18  m  Connecting Interface Cables to a Device  on page 21    m  Connecting a Device to a Network  on page 22       NOTE     For safety warnings and instructions  refer to the Juniper Networks Security  Products Safety Guide  The guide warns you about situations that could cause  bodily injury  When working on any equipment  be aware of the hazards involved  with electrical circuitry  and follow standard practices for preventing accidents        17    ISG 1000 Hardware Installation and Configuration Guide    Before You Begin    The location of the device  the layout of the equipment rack  and the security of  your wiring room are crucial for proper device operation        A    WARNING  To prevent abuse and intrusion by unauthorized personnel  install the  ISG 1000 device in a secure environment        Observing the following precautions can prevent shutdowns  equipment failures   and injuries     m Before installation  always check that the power supply unit  PSU  is  disconnected from any power source     m Ensure that the room in which you operate the device has adequate air  circulation and that the room temperature does not exceed 122   F  50   C      m Allow three feet  one meter  of clear space to the front and back of the device     m Do not place the device in
37. nt                            11  OVEL VIEW a beca a Me e dd a aca Rte 35  l  imstaling Modules a aid yee i ds 16  interface Modules 2 dd ete alice tive aes 14  L  A A ce b tectis ts 11  IO SCIM BLOM dde al UC ate eat ead sets dir eite e lcd 29  M  management  through a console e ti 27  through a Telnet connection              ssssssssee 28       through the WebUD eene eeepc Bore em e ts 29  managing   through WeDbUT iret eden sa es A ot ds 38  mini GBIC transceiver  replacing       50       MO ind aem dietarios 29  modules  high  availability cios AA ate 16  DI          M   M       12  FemoVving u td ise Bohn ec eee dete dir e bec gebe re 44  N  NEBS Certifications  ene D eee o tectis 55  NEBS WANO   code ceste ieu Er re tbe os 21  P  power supply unit  PSU   AC replacements ini be pit ebbe reds ele 46  DC repl  cermenta  n iet ha oe dtt 46  OVERVIEW 2 ous te net iat conten  does ve pee ee eo ele qe 16  R  resetting to factory defaults      st mete tte t e 40  restartirig ter deviee    nuce tes t lum gea 38  S  safety guidelifies   eee e RU ie er etie 18  serial Gore ctor   eee eet eee re tette di 29  setting  POLICIES  Hit cA et path bo ga Le d d e de aiae 54  Trast TPL address it e Pepe epe PINE es 55  Untr  st IP address    coe ee ines ert tenes mata 54  Ww  o Gesdauenpticeeozens   eA Caen R 58    Index m 59    ISG 1000 Installation and Configuration Guide    60 m Index    
38. ollowing command means    set the management options for the    ethernet1  the ethernet2  or the ethernet3 interface        set interface   ethernet1   ethernet2   ethernet3   manage       NOTE  When entering a keyword  you only have to type enough letters to identify the  word uniquely  For example  typing set adm u ang j12fmt54 is enough to enter  the command set admin user angel j12fmt54  Although you can use this shortcut  when entering commands  all the commands documented here are presented in  their entirety        Requesting Technical Support    Technical product support is available through the Juniper Networks Technical  Assistance Center  JTAC   If you are a customer with an active J Care or JNASC  support contract  or are covered under warranty  and need postsales technical  support  you can access our tools and resources online or open a case with JTAC     m JTAC policies   For a complete understanding of our JTAC procedures and  policies  review the JTAC User Guide located at  http   www juniper net customers support downloads 710059 pdf        m Product warranties   For product warranty information  visit  http   www juniper net support warranty         m JTAC hours of operation   The JTAC centers have resources available 24 hours a  day  7 days a week  565 days a year     Self Help Online Tools and Resources    For quick and easy problem resolution  Juniper Networks has designed an online  self service portal called the Customer Support Center  CSC  that provi
39. ot  use the insertion extraction  handles to correctly install the module into the slot     Once all of the security modules are installed  replace the cover  install the device in  the rack  connect the power cords  and then turn on the power     Security Modules m 51    ISG 1000 Installation and Configuration Guide    52 m Security Modules    Appendix A    Specifications    Physical    This appendix provides general device specifications for the ISG 1000   m    Physical    on page 53   m    Electrical    on page 54   m    Environmental    on page 54   m  Certifications  on page 54    m  Connectors  on page 56    Table 7provides the physical specifications for the ISG 1000     Table 7  ISG 1000 Physical Specifications             Description Value   Chassis 44 45 cm x 45 82 cm x 15 54 cm  17 5 inches x 17 25 inches x 5 25  dimensions inches    Device weight 16 5 kilograms  36 lbs  with two modules and PSU       Physical    m 53    ISG 1000 Installation and Configuration Guide    Table 8 provides the electrical specifications for the ISG 1000     Table 8  ISG 1000 Electrical Specifications             Item Specification  AC voltage 100   240 VAC     10   AC power 250 watts       AC input frequency 50 60 Hz             DC voltage  48 VDC  DC power 250 watts  Fuse Rating DC PS  10 amps   250 volts  AC PS  56 3 amps   250 volts          WARNING  Certain ports on the device are designed for use as intrabuilding   within the building  interfaces only  Type 2 or Type 4 ports as des
40. plant   OSP  cabling  To comply with NEBS requirements and protect against lightning  surges and commercial power disturbances  the intrabuilding ports must not be  metallically connected to interfaces that connect to the OSP or its wiring  The  intrabuilding ports on the device are suitable for connection to intrabuilding or  unexposed wiring or cabling only  The addition of primary protectors is not  sufficient protection for connecting these interfaces metallically to OSP wiring           T CAUTION  To comply with intrabuilding lightning and surge requirements   intrabuilding wiring must be shielded  and the shield for the wiring must be  grounded at both ends        Connecting Interface Cables to a Device m 21    ISG 1000 Hardware Installation and Configuration Guide    Connecting a Device to a Network    An ISG 1000 device provides firewall and general security for networks when it is  placed between internal networks and the untrusted network  This section  describes the following     m Connecting an ISG 1000 Device to an Untrusted Network    m Connecting a Device to an Internal Network or a Workstation    Connecting an ISG 1000 Device to an Untrusted Network    You can connect your ISG 1000 device to an untrusted network in one of the  following ways     m Connecting Ethernet Ports  m Connecting a Modem Port    The cabling instructions given below reproduce the configuration shown in Figure  8  However  this is not the only possible configuration  In addition  the inst
41. provides the name  color  status  and description of  each device status LED     Table 2  Device LED Descriptions                Name Color Status Description  POWER Green On steadily Device is receiving power   Off Device is not receiving power   Red On steadily Power supply is not functioning correctly   ALARM Red Blinking Self test failure occurred while ScreenOS was starting up     Certain algorithm and ACL failures can cause this     Device alarm blinks once for each software attack        Amber On steadily One of the following failures has occurred   m Power supply is off  m Hardware failure    W Error with software module                                        Off No alarm condition s  present   TEMP Green On steadily Temperature is within 32  F  0 C  to 131  F  55 C    Orange On steadily Temperature is within 152 F  56 C  to 150 F  66 C    Red On steadily Temperature exceeds 150  F  66  C    STATUS   Green On steadily Device is active   Blinking Device is starting   Off Device is off   HA Green On steadily Device is the primary   Amber On steadily Device is the backup   Red On steadily HA is defined  device is not the backup   Off No HA activity is defined     Front Panel m 11    ISG 1000 Hardware Installation and Configuration Guide    12 m Front Panel                                  Name Color Status Description  FAN Green On steadily All fans are functioning properly   Red On steadily One or more fans failed or a fan subdevice is not  receiving power   MODI Green 
42. r switch to the ON position        NOTE     During the one year warranty period  you can obtain a replacement fan tray by  contacting the Juniper Customer Support  After the warranty period  contact the  Juniper Networks Sales department        You need to replace the fan module when a failure occurs  When fan failure occurs   the FAN LED glows red  and the device generates an event alarm and an SNMP trap        WARNING  If a fan stops operating as a result of failure or removal  the device  continues to run  Do not leave the fan tray empty for more than two minutes   otherwise  heat failure or permanent damage can occur        To remove the fan module   1  Pull the fan lever until it is fully extended     2  Grip the sides  then gently slide the assembly straight out  Figure 14         WARNING  Do not remove the fan module while the fans are still spinning        Figure 14  Removing the Fan       3  Insert the new fan tray in the fan bay  then push it straight in     4  Secure the fan tray in place by pushing the fan lever flat against the front panel     Fan Tray m 47    ISG 1000 Installation and Configuration Guide    Fan Tray Filter    Before you replace the fan filter  make sure you have the following tools    m Flashlight or other light source   m 18 inch wooden ruler or at least a 45 centimeter length of wooden dowel  To replace the fan tray filter     1  Remove the fan module     Fan Tray    on page 47         CAUTION  Use caution when removing the fan module and fan 
43. rational modes  refer to the Concepts  amp   Examples ScreenOS Reference Guide     Accessing a Device    You can configure and manage a device in several ways     m Console  The Console port on the device allows you to access the device  through a serial cable connected to your workstation or terminal  To configure  the device  you enter ScreenOS command line interface  CLI  commands on  your terminal or in a terminal emulation program on your workstation     m WebUI  The ScreenOS Web user interface  WebUI  is a graphical interface  available through a browser  To initially use the WebUI  the workstation on  which you run the browser must be on the same subnetwork as the device  You  can also access the WebUI through a secure server using Secure Sockets Layer   SSL  with secure HTTP  HTTPS      m Telnet SSH  Telnet and SSH are applications that allow you to access devices  through an IP network  To configure the device  you enter ScreenOS CLI  commands in a Telnet session from your workstation  For more information   refer to the Concepts  amp  Examples ScreenOS Reference Guide     m Network and Security Manager  NSM   NSM is a Juniper Networks  enterprise level management application that enables you to control and  manage Juniper Networks firewall IPSec VPN devices  For instructions on how  to manage your device with NSM  refer to the Network and Security Manager  documentation at  http   www  juniper net techpubs software management security manager        Using a Console 
44. ree screws  attach one mounting bracket to the middle of one side of  the ISG 1000 device     2  Using the remaining three screws  attach the other mounting bracket to the  middle of the other side of the device     3  Slide the device into the rack     4  Support the device while you attach the left and right brackets to the rack frame  with the four screws  two on each side  that are compatible with the rack     Figure 7  Center Mount ISG 1000    ISG 1000    60 6 crrr           Equipment Installation m 19    ISG 1000 Hardware Installation and Configuration Guide    Connecting the Power    This section provides installation and connection procedures for the power supply  units  PSUs  available for the ISG 1000     AC Power Supply Unit    To install and connect an AC PSU to the ISG 1000   1  Slide the PSU into one of the power compartments in the back of the device     2  Fasten the PSU to the device by tightening the corner screws into the eyelets on  the sides of the PSU     3  Connect the female end of a standard power cord to the male connector on the  back of the PSU     4  Connect the power cord to a standard 100 240 volt power outlet     5  Press the power switch to the ON position     DC Power Supply Unit    20 m Connecting the Power    To install and connect a DC PSU to the ISG 1000        A    WARNING  You must shut off current to the DC feed wires before connecting the  wires to the PSUs  Also  make sure that the ON OFF switch is in the OFF position        1  Slide
45. rnal modem    MGT Provides a dedicated connection for RJ 45 10 100Base T  management traffic    Compact Allows you to download or upload device NA NA   Flash software or configuration file  and to save log  files        Interface Modules                                           FE4 4 port Fast Ethernet RJ 45 10 100Base T   FE8 8 port Fast Ethernet RJ 45 10 100Base T   GB2 TX 2 port Gigabit RJ 45 10 100 1000Base T  GB2 LX 2 port Mini GBIC with LX transceivers LC 1000Base LX   GB2 SX 2 port Mini GBIC with SX transceivers LC 1000Base SX   GB4 TX 4 port Mini GBIC with TX transceivers RJ 45 10 100 1000Base T  GB4 LX 4 port Mini GBIC with LX transceivers LC 1000Base LX   GB4 SX 4 port Mini GBIC with SX transceivers LC 1000Base SX  10GB1 SR LR   1 port 10 Gigabit with XFP transceivers LC 10Gbase SR  10Gbase LR    10 m Port and Interface Module Slots       Front Panel    Device Status LEDs    This section describes the follow elements on the front panel of an ISG 1000 device     m Device Status LEDs    Port Descriptions    Interface Modules    m Fan Tray    The ISG 1000 device status LEDs display information about critical device functions   When the system powers up  the POWER LED changes from off to blinking green   and the STATUS LED changes in the following sequence  red  green  blinking green   Startup takes approximately two minutes  If you want to turn the device off and on  again  we recommend you wait a few seconds between shutting it down and  powering it back up  Table 2 
46. ructions  assume that you have configured all physical ports and interfaces through the  Console port before cabling the device to a network     The ports and interfaces are configured through the Console port as follows     set interface ether1 1 zone dmz   set interface ethernet2 1 zone untrust  set interface ethernet3 8 zone trust  set interface mgt manage   save    22 m Connecting a Device to a Network    To power    To add an ISG 1000 device to your network     1     Connect an RJ 45 straight through cable from the MGT port  the default IP  address is 192 168 1 1 24  to your management workstation     Connect an RJ 45 crossover cable from the first built in 10 100 1000 interface   ethernet1 1  to the DMZ switch  router  or hub     Connect an optical cable from the far left interface of the GBIC module   ethernet2 1  to the external router     Connect an RJ 45 crossover cable from the last 10 100 Ethernet port in the FE8  interface module  ethernet3 8  to the internal switch  router  or hub     Connect the power cable  included  to the ISG 1000 PSU and to a power source     After the ISG 1000 starts up  the POWER  STATUS  and LINK LEDs should light  up as follows     m The POWER LED for each deployed power supply glows green   m The STATUS LED blinks green     m The top LINK LED for each interface blinks green   For more details about  interpreting the Link Status LEDs  see    Interface Modules    on page 14      Figure 8  Basic Network Connection    External Router  Ta  
47. se R transceivers are compatible with the IEEE 802 3ae  standard  Table 13 lists media types and distances for the different types of    interfaces used in the ISG 1000     Table 13  Interface Media Types for the Mini Gigabit and 10Gigabit XFP Transceivers                                     Standard Media Type Maximum Distance  in Meters   1000Base SX 50 125u m multimode fiber 500  50 125u m multimode fiber 550  62 5 125 um multimode fiber 220  62 5 125 u m multimode fiber 275  1000Base LX 50 125u m multimode fiber 550  62 5 125 um multimode fiber 550  9 125 single mode fiber 10 000  100Base TX Category 5 and higher UTP cable 100  10Gbase SR 850nm multimode fiber 26 300  10Gbase LR 1310nm single mode fiber 10 000       Connectors m 57    ISG 1000 Installation and Configuration Guide    58 m Connectors    index    c  cabling  network interfaces    25  power supply    ia tdt tI best op ien 25  chassis alarm configuration               sssssss 55  configuration  admin name and password               ssssssss 30  administrative ACCESS db deut ba tabe fite  Gave ANG tre    sees tetuer bent e iet  default foute    sola  o ee en pre een pe e cad  host and domain name  management services     D  DE Power SUPPLY    ed eter ee ttn tee te tette onn 16  diallpCONNECHO att to phat tp Deep ce 29  F  factory defaults  resetting to    40  fan       G  gigabit Ethernet cable  CONMECUIN Buela te ema and dom 49  GISCONNECHING   cun Ailes inn 50  H  high availability  HA   CAD ha E 35 40  ED so
48. t receiving data        Compact Flash Slot    The compact flash slot enables you to download or upload device software or  configuration files and save log files to a compact flash card     To save files to or from the device  use the following CLI command     save   software   config   from   flash   slot1 filename   to   flash   slot1 filename      where flash is the internal flash memory  slot1 is the compact flash slot  and  filename is the name of the software or configuration file on the compact flash card     Front Panel m 13    ISG 1000 Hardware Installation and Configuration Guide    Interface Modules    14 m Front Panel    Management Interfaces  The ISG 1000 offers three management interfaces     m Console Port     This RJ 45 serial port wired as data circuit terminating  equipment  DCE  that can be used for local administration  Use a  straight through cable when using a terminal connection and a crossover cable  when connecting to another DCE device  An RJ 45 to DB 9 adapter is supplied   See    Connectors    on page 56 for the RJ 45 connector pinouts     m Modem Port     This RJ 45 serial port  wired as data terminal equipment  DTE   that can be connected to a modem to allow remote administration  We do not  recommend using this port for regular remote administration  Use a  straight through cable when connecting to a modem and a crossover cable  when connecting to another DTE device    See    Connectors    on page 56 for the RJ 45 connector pinouts     m 10 100 
49. t use an RJ 45 to DB 9   female to male  serial cable with a null modem adapter        NOTE  The terminal type for dialup sessions must be vt100  For example  in Hilgraeve  HyperTerminal  select Connect  gt  Remote device  gt  vt100 from the Term Type  menu        Using the WebUI   To use the WebUI  the workstation from which you are managing the device must   initially be on the same subnetwork as the device  To access the device with the   WebUI    1  Connect your workstation to the MGT port  mgt interface  on the device    2  Ensure that your workstation is configured for Dynamic Host Configuration  Protocol  DHCP  or is statically configured with an IP address in the  192 168 1 0 24 subnet     3  Launch your browser  enter the IP address for the mgt interface  the default IP  address is 192 168 1 1 24   then press Enter     The WebUI application displays the login prompt    4  If you have not yet changed the default login for the admin name and  password  enter netscreen at both the admin name and password prompts    Use lowercase letters only  The admin name and password fields are both  case sensitive     Basic Device Configuration   This section describes the following basic configuration settings    m Root Admin Name and Password   m Date and Time   m Administrative Access   m Hostname and Domain Name   m Default Route   m Management Interface IP Address    m Management Services    m Trust Zone Interface IP Address    Basic Device Configuration m 29    ISG 1000 Instal
50. terface  WebUI  contains a navigational path and configuration  settings  To enter configuration settings  begin by clicking a menu item in the  navigation tree on the left side of the screen  As you proceed  your navigation path  appears at the top of the screen  with each page separated by angle brackets     The following example shows the WebUI path and parameters for defining an  address     Policy    Policy Elements    Addresses    List    New  Enter the following  then  click OK     Address Name  addr  1   IP Address Domain Name   IP Netmask   select   10 2 2 5 32   Zone  Untrust    To open online Help for configuration settings  click the question mark     in the  upper left of the screen     The navigation tree also provides a Help    Config Guide configuration page to help  you configure security policies and Internet Protocol Security  IPSec   Select an  option from the list and follow the instructions on the page  Click the   character in  the upper left for Online Help on the Config Guide     Command Line Interface Conventions    The following conventions are used to present the syntax of command line  interface  CLI  commands in text and examples     In text  commands are in boldface type and variables are in italic type    In examples    m Variables are in italic type    m Anything inside square brackets     is optional    m Anything inside braces     is required    m If there is more than one choice  each choice is separated by a pipe        For  example  the f
51. tion and y for the second question     Configuration modified  save   y  n  System reset  are you sure  y  n     The system now resets and returns to the login prompt  the default login name and  password are both reset to netscreen     Resetting a Device to Factory Defaults m 41    ISG 1000 Installation and Configuration Guide    42 m Resetting a Device to Factory Defaults    Chapter 4    Servicing the Device    This chapter describes service and maintenance procedures for an ISG 1000 device     It includes the following sections        Required Tools and Parts    on page 44     Interface Modules    on page 44     Power Supply Units    on page 46      Fan Tray    on page 47      Fan Tray Filter    on page 48      Cables and Transceivers    on page 49       Security Modules    on page 51       NOTE     For safety warnings and instructions  refer to the Juniper Networks Security  Products Safety Guide  The guide warns you about situations that could cause  bodily injury  Before working on any equipment  you should be aware of the  hazards involved with electrical circuitry and familiar with standard practices for  preventing accidents        43    ISG 1000 Installation and Configuration Guide    Required Tools and Parts    Interface Modules    To replace some components on an ISG 1000 device  you need the following tools  and parts     m Electrostatic bag or antistatic mat  m Electrostatic discharge  ESD  grounding wrist strap    m Phillips screwdriver  1 8 inch    This sectio
52. tions to this product could void the user s warranty and authority to operate this device     Disclaimer    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED  WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE  IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED  WARRANTY  CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY     Table of Contents    About This Guide 5  OLSaniZatiOn sea BESTEE NEE E OE a adnate oe alk NAO 6  CONVENIO Ss cir pee ie tec ain Ae eae tene A ld ES ey 6  Web  User Interface Conventions eie eterne e nene aa dsc 6  Command Line Interface Conventions           ssssssssss anna nn nnccccncn 7  Requesting Technical Suppoft     au ii e hrec te d e nee eee 7  Self Help Online Tools and Resources             sssssssssssss 7  Opening  Case witht  TAG oi  e eee tet tet re te eerte este 8  Feedback M  EE 8  Chapter 1 Hardware Overview 9  Port and Intertace Module Slots  ere oer rei he genie Bale 10  ErtontP  riel acsi doses eoo DR OR o I E De TR ERO OR e e REOS 11  Device status LEDS   e e t tutte dates de ER edt e 11  Port Descriptions  ta ab 13  Ethernet PoftS  ctum eo dt ab 15  Compact Elashr Slot   ss ese t ett E T e e  15  Management Interfaces  i onnie e petes om Rebels Ee tesis 14  Interface ModQulesct dt rails 14  10 100 Mbps Interface Modulada 14  10 100 1000 Mbps Interface Module    eeeeeeeeeeeeeeeeeeeeeeeeeeeteees 15  MiniGBIC Interface  Moduler de heel ti
53. y the default route     To configure the default route on the device  use the WebUI or CLI as follows     WebUI    Network    Routing    Destination    New  trust vr   Enter the following  then  click OK     IP Address Netmask  0 0 0 0 0 0 0 0  Next Hop  Gateway   select   Interface  ethernet1 1  select   Gateway IP Address  ip addr    CLI    set route 0 0 0 0 0 interface ethernet1 1 gateway ip  addr  save    Management Interface IP Address    The default IP address and subnet mask settings for the mgt interface are  192 168 1 1 and 255 255 255 0  respectively  If you do not want to use this default  IP address  you need to assign a new interface address that matches your current  network  We recommend using the MGT interface exclusively for management     To set the IP address of the MGT port to 10 100 2 185 16  use the WebUI or CLI as  follows     32 m Basic Device Configuration    WebUI    Network  gt  Interfaces  gt  Edit  for mgt   Enter 10 100 2 183 16 in the IP  address and netmask fields  then click Apply     CLI    set interface mgt ip 10 100 2 183 16  save    Management Services    ScreenOS provides services for configuring and managing the device  such as  SNMP  SSL  and SSH  which you can enable for each interface     To configure the management services on the device  use the WebUI or CLI as  follows     WebUI    Network  gt  Interfaces  gt  Edit  for mgt   Under Management Services  select or  clear the management services you want to use on the interface  then 
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
取扱説明書 - M  購買ポータルサイト取扱説明書 (サプライヤ用)  generador  DDL-8700B-7 PRECAUÇÕES DE SEGURANÇA  USER`S MANUAL - Tyconpower.com  37743 SPM DX18_QQ_Manual.indb  ― ラクレア ―  StarBoard プラズマ タイプ (PDF形式、601MB)  LG Optimus L7 II P710 4GB White      Copyright © All rights reserved. 
   Failed to retrieve file