ISG 2000 Hardware Installation and Configuration Guide: Security Products
ISG 2000 Hardware Installation and Configuration Guide: Security Products
ISG 2000 Hardware Installation and Configuration Guide: Security Products
ISG 2000
Hardware Installation and Configuration Guide
www.juniper.net
Part Number: 093-1937-000, Revision C
Copyright Notice
Copyright 2008 Juniper Networks, Inc. All rights reserved.
Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper
Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any
inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency
energy. If it is not installed in accordance with Juniper Networks installation instructions, it may cause interference with radio and television reception.
This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC
rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no
guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user
is encouraged to try to correct the interference by one or more of the following measures:
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
Table of Contents
About This Guide
Organization .................................................................................................... 6
Conventions..................................................................................................... 6
Web User Interface Conventions .............................................................. 6
Command Line Interface Conventions ......................................................7
Requesting Technical Support .......................................................................... 7
Self-Help Online Tools and Resources........................................................ 8
Opening a Case with JTAC ......................................................................... 8
Feedback ......................................................................................................... 8
Chapter 1
Hardware Overview
19
Configuring a Device
27
47
Servicing a Device
49
Specifications
63
Physical ......................................................................................................... 63
Electrical ....................................................................................................... 64
Environmental ..............................................................................................65
Certifications ................................................................................................. 65
Connectors .................................................................................................... 65
Index.......................................................................................................................... 69
Table of Contents
NOTE:
10/100 Mbps interface module, for 10/100Base-T connections (four and eight
ports)
Mini-GBIC interface module, for fiber-optic connections (two and four ports)
The configuration instructions and examples in this document are based on the
functionality of a device running ScreenOS 6.1.0. Your device might function
differently depending on the ScreenOS version you are running. For the latest
device documentation, refer to the Juniper Networks Technical Publications
website at www.juniper.net/techpubs/hardware. To see which ScreenOS versions
are currently available for your device, refer to the Juniper Networks Support
website at http://www.juniper.net/customers/support/.
Organization
This guide includes the following sections:
Conventions
This guide uses the document conventions as described in the following sections:
To open online Help for configuration settings, click the question mark (?) in the
upper left of the screen.
Organization
The navigation tree also provides a Help > Config Guide configuration page to help
you configure security policies and Internet Protocol Security (IPSec). Select an
option from the list and follow the instructions on the page. Click the ? character in
the upper left for Online Help on the Config Guide.
If there is more than one choice, each choice is separated by a pipe ( | ). For
example, the following command means set the management options for the
ethernet1, the ethernet2, or the ethernet3 interface:
set interface { ethernet1 | ethernet2 | ethernet3 } manage
NOTE:
When entering a keyword, you only have to type enough letters to identify the
word uniquely. For example, typing set adm u ang j12fmt54 is enough to enter
the command set admin user angel j12fmt54. Although you can use this shortcut
when entering commands, all the commands documented here are presented in
their entirety.
Download the latest versions of software and review your release notes
http://www.juniper.net/customers/csc/software/
To verify service entitlement by product serial number, use our Serial Number
Entitlement (SNE) Tool
https://tools.juniper.net/SerialNumberEntitlementSearch/
Feedback
If you find any errors or omissions in this document, contact Juniper Networks at
[email protected].
Feedback
Chapter 1
Hardware Overview
This chapter provides detailed descriptions of the ISG 2000 device. It includes the
following sections:
Slot 1
Slot 3
Slot 2
Slot 4
Compact
Flash
Console
MGT
Modem
Description
Connector Speed/Protocol
Console
RJ-45
Modem
RJ-45
MGT
RJ-45
10/100Base-T
NA
NA
10
FE4
RJ-45
10/100Base-T
FE8
RJ-45
10/100Base-T
GB2-TX
2-port Gigabit
RJ-45
10/100/1000Base-T
GB2-LX
LC
1000Base-LX
GB2-SX
LC
1000Base-SX
GB4-TX
RJ-45
10/100/1000Base-T
GB4-LX
LC
1000Base-LX
GB4-SX
LC
10GB1-SR/LR
1000Base-SX
10Gbase-SR, 10Gbase-LR
Front Panel
The front panel of the ISG 2000 has the following:
Port Descriptions
Interface Modules
Fan Tray
Color
POWER Green
Status
ALARM
Description
Red
Red
Blinking
Amber
Off
TEMP
STATUS
HA
Green
Orange
Red
Green
Device is starting.
Off
Device is off.
Green
Amber
Red
No HA activity is defined.
Front Panel
11
Name
Color
Status
FAN
Green
Red
Green
MOD1
Off
MOD2
Green
Green
MOD4
Green
FLASH
Front Panel
MOD3
Off
12
Description
Green
Off
Port Descriptions
This section explains the purpose and function of the following components:
Management Interfaces
where flash is the internal flash memory, slot1 is to the compact flash slot, and
filename is the name of the software or configuration file on the compact flash card.
Management Interfaces
The ISG 2000 offers three management interfaces:
Modem Port This RJ-45 serial port, wired as data terminal equipment (DTE)
that can be connected to a modem to allow remote administration. We do not
recommend using this port for regular remote administration. Use a
straight-through cable when connecting to a modem and a crossover cable
when connecting to another DTE device.
See Connectors on page 65 for the RJ-45 connector pinouts.
Front Panel
13
Interface Modules
The front panel of the ISG 2000 device has four interface module slots, which can
accommodate the following types of interface modules:
10/100 Mbps
10/100/1000 Mbps
Mini-GBIC
Color
LINK
Green
TX/RX
NOTE:
Green
Status
Description
On steadily
Port is online.
Off
Port is offline.
Blinking
Off
To change the ALARM LED from red to green while saving the alarm message(s) in
the device, use the clear led alarm CLI command.
TX/RX
LINK
The10/100 Ethernet ports provide LAN connections to hubs, switches, local servers,
and workstations. You can also designate an Ethernet port for management traffic.
14
Front Panel
Front Panel
15
Fan Tray
The ISG 2000 device has a single hot-swappable three-fan tray, which you can
access on the left front side of the chassis.
Back Panel
The ISG 2000 supports two redundant, fault-tolerant, auto-switching power supply
units (PSUs). The PSUs are hot-swappable, so you can remove or replace one
without interrupting device operation.
You can order the ISG 2000 with one or two PSUs: DC or AC. Although the ISG 2000
can run with one PSU, it is advisable to install two. This practice minimizes the
chance of device failure.
CAUTION: Do not mix the PSU types because doing so could seriously damage the
device.
When the ISG 2000 contains two PSUs, they share the power load equally. If one
fails, the other assumes the full load automatically and the device sends a device
alarm. The POWER ON LED on the PSU only displays two colors: green, indicating
that the power supply is functioning correctly, and red, which indicates that the PSU
has failed.
Fan Vent
Thumbscrew
Power Outlet
Power Switch
16
Back Panel
Power Switch
Thumbscrew
Terminal
Blocks
Hex Nut
Back Panel
17
18
Back Panel
Chapter 2
NOTE:
For safety warnings and instructions, refer to the Juniper Networks Safety Guide.
The guide warns you about situations that could cause bodily injury. When
working on any equipment, be aware of the hazards involved with electrical
circuitry, and follow standard practices for preventing accidents.
19
Before installation, always check that the power supply unit (PSU) is
disconnected from any power source.
Ensure that the room in which you operate the device has adequate air
circulation and that the room temperature does not exceed 122 F (50 C).
Allow three feet (one meter) of clear space to the front and back of the device.
This device is heavy. Take precautions when lifting and stabilizing the device in
the rack.
Do not place the device in an equipment rack frame that blocks an intake or
exhaust port. Ensure that enclosed racks have fans and louvered sides.
Correct these hazardous conditions before any installation: moist or wet floors,
leaks, ungrounded or frayed power cables, or missing safety grounds.
Equipment Installation
The ISG 2000 comes with accessories for mounting the device in a standard 19-inch
equipment rack.
Use the following guidelines while configuring your equipment rack:
20
In an enclosed rack with a ventilation fan in the top, equipment higher in the
rack can draw heat from the lower devices. Always provide adequate ventilation
for equipment at the bottom of the rack.
Baffles can isolate exhaust air from intake air. The best placement of the baffles
depends on the airflow patterns in the rack.
Four screws to match the rack (required if the thread size of the screws
provided in the ISG 2000 product package do not fit the thread size of the rack)
NOTE:
Front-Rear Mount
To front-rear mount the ISG 2000, use the rear slide-mount kit, and perform the
following steps:
1. Use the screws to attach the left and right plates to the front of each side of the
ISG 2000 device.
2. Use the screws to attach the rear-mount bracket to the rear-rack posts.
3. With the indented groove that runs the length of each slide facing outward, use
the screws to attach the slides to the middle of each side of the ISG 2000
device.
NOTE:
Depending on the depth of your equipment rack, you can attach the slides along
the length of the sides or extend them over the rear of the device.
4. Slip the slides into the rear-mount brackets.
5. Push the ISG 2000 forward until the left and right plates contact the front rack
posts.
6. Use the screws to attach the left and right plates to the rack.
Figure 7: Front-Rear Mount for ISG 2000
Equipment Installation 21
Center-Mount
To center-mount the ISG 2000:
1. Use the screws to attach the left and right plates to the middle of each side of
the ISG 2000 device.
2. Slide the ISG 2000 in the rack.
3. Use the screws to attach the left and right plates to the rack.
Figure 8: Center-Mount for ISG 2000
NOTE:
Whenever you deploy two PSUs to an ISG 2000 device, connect each to a different
power source. Each PSU is intended to receive power from separate feeds.
6. Press the power switch to the ON position.
NOTE:
22
If there are multiple power supplies in the ISG 2000 and one of them is off, the
ALARM LED on the front panel glows red. This warning indicates that maximum
device reliability requires all installed power supplies to be operational.
WARNING: You must shut off current to the DC feed wires before connecting the
wires to the PSUs. Also, make sure that the ON/OFF switch is in the OFF position.
1. Slide the PSU into one of the power compartments in the back of the device.
2. Fasten the PSU to the device by tightening the corner screws into the eyelets on
the PSU sides.
3. Remove the hex nut on the grounding screw.
4. Place the ground lug on the screw, then tighten the hex nut securely.
5. Connect the other end of the grounding lug wire to a grounding point at your
site.
6. Loosen the retaining screws on each terminal block.
7. Insert the 0V DC (positive voltage) return wire into the center COM connector
and the -48V DC power-feed wire into either the left or right connector.
8. Fasten the screws over the connectors.
9. If you want to install a second PSU, repeat steps 1 through 8.
10. Press the power switch to the ON position.
NOTE:
If there are multiple PSUs in the ISG 2000 device and one of them is off, the
ALARM LED on the front panel glows red. This warning indicates that maximum
device reliability requires all installed PSUs to be operational.
Secure the cable so that it is not supporting its own weight as it hangs to
the floor.
b.
Place any excess cable out of the way in a neatly coiled loop.
c.
23
WARNING: Certain ports on the device are designed for use as intrabuilding
(within-the-building) interfaces only (Type 2 or Type 4 ports as described in
GR-1089-CORE, Isssue 4) and require isolation from the exposed outside plant
(OSP) cabling. To comply with NEBS requirements and protect against lightning
surges and commercial power disturbances, the intrabuilding ports must not be
metallically connected to interfaces that connect to the OSP or its wiring. The
intrabuilding ports on the device are suitable for connection to intrabuilding or
unexposed wiring or cabling only. The addition of primary protectors is not
sufficient protection for connecting these interfaces metallically to OSP wiring.
10/100 Mbps interface module, for 10/100Base-T connections (four and eight
ports)
Mini-GBIC interface module, for fiber-optic connections (two and four ports)
The type of network used by your organization determines the kind of interface
needed to connect the ISG 2000. (For more information about interface modules,
see Interface Modules on page 14.)
The cabling instructions given below reproduce the configuration shown in
Figure 9. However, this is not the only possible configuration. In addition, the
instructions assume that you have configured all physical ports and interfaces
through the Console port before cabling the device to a network. (For fiber-optic
networks, use optical cables for all network connections.)
The ports and interfaces are configured through the Console port as follows:
set interface ether1/1 zone dmz
set interface ethernet2/1 zone untrust
set interface ethernet3/8 zone trust
set interface mgt manage
save
24
NOTE:
Check your switch, router, hub, or computer documentation before you attempt to
add any new device to a LAN, check the documentation to find out if you should
first switch off the power to the device.
2. Connect an optical cable from the Untrust interface (ethernet1/1) to the
external router. You can also connect to the untrusted network remotely using
the Console port with an RJ-45 straight-through serial cable or an external
modem.
3. Connect an optical cable from the DMZ interface (ethernet2/2) to the DMZ
switch, router, or hub.
4. Connect an RJ-45 straight-through cable from the MGT port to a workstation in
the MGT zone (the default IP address is 192.168.1.1/24).
5. Press the power switch to the ON position.
6. After the ISG 2000 starts up, the POWER, STATUS, and LINK LEDs should light
up as follows:
The top LINK LED for each interface blinks green. (For more details about
interpreting the Link Status LEDs, see Interface Modules on page 14.)
Untrust Zone
External Router
Power
Cable
DMZ Switch
PWR
ALARM
TEMP
STATUS
HA
FAN
MOD1
MOD2
MOD3
FLASH
MGT Zone
DMZ LAN
Internal Switch
Trusted LAN
25
26
Chapter 3
Configuring a Device
This chapter describes how to configure an ISG 2000 device in your network. It
includes the following sections:
NOTE:
After you configure a device and verify connectivity through the remote network,
you must register your product at http://www.juniper.net/customers/support/ so
certain ScreenOS services, such as Deep Inspection Signature Service and
Antivirus (purchased separately), can be activated on the device. After registering
your product, use the WebUI to obtain the subscription for the service. For more
information about registering your product and obtaining subscriptions for
specific services, refer to the Concepts & Examples ScreenOS Reference Guide for
the ScreenOS version running on the device.
27
Interface
Zone
MGT
MGT
Console
NA
NA
Modem
serial
Untrust
Interface Modules
Null
Description
Ethernet interfaces
NOTE:
Layer-2 interfaces
vlan1 specifies the interface used for VPNs while the device is in
Transparent mode.
Tunnel interfaces
tunnel.n specifies a tunnel interface. Use this interface for VPN traffic.
Functional interface
We strongly recommend that you change the default IP address and subnet mask
for the mgt interface.
The default IP address and subnet mask settings for ISG 2000 interfaces are 0.0.0.0
and 0.0.0.0, respectively. The exception is the mgt interface, a special interface
used only for device management. The default IP address and subnet mask settings
for the mgt interface are 192.168.1.1 and 255.255.255.0, respectively.
For all operational modes, it is advisable to change the IP address and subnet mask
for the mgt interface and to use this interface exclusively for out-of-band
management.
To access the vlan1 interface in Transparent mode, you must change the IP address
and subnet mask of vlan1 interface to match your current network. In Transparent
mode, only the mgt and vlan1 interfaces can have a new IP address and subnet
mask. All other interfaces must keep their default IP address and subnet mask
settings (0.0.0.0 and 0.0.0.0, respectively). To access the vlan1 interface, you must
change the IP address and subnet mask of vlan1 interface to match the IP address
of your current network.
28
In Route mode (with or without NAT), at least two Ethernet interfaces must have
new IP addresses and subnet masks.
For information on configuring the operational modes, refer to the Concepts &
Examples ScreenOS Reference Guide.
Accessing a Device
You can configure and manage a device in several ways:
Console: The Console port on the device allows you to access the device
through a serial cable connected to your workstation or terminal. To configure
the device, you enter ScreenOS command line interface (CLI) commands on
your terminal or in a terminal-emulation program on your workstation.
Telnet/SSH: Telnet and SSH are applications that allow you to access devices
through an IP network. To configure the device, you enter ScreenOS CLI
commands in a Telnet session from your workstation. For more information,
refer to the Concepts & Examples ScreenOS Reference Guide.
Use a straight-through RJ-45 CAT5 serial cable with a male RJ-45 connector to plug
into the Console port on the device.
To establish a console connection:
1. Plug the female end of the supplied DB-9 adapter into the serial port of your
workstation. (Be sure that the DB-9 is inserted properly and secured.) Figure 10
shows the type of DB-9 connector that is required.
Accessing a Device
29
RJ-45 Cable
DB-9 Adapter
2. Plug the male end of the RJ-45 CAT5 serial cable into the Console port on the
ISG 2000. (Be sure that the other end of the CAT5 cable is inserted properly and
secured in the DB-9 adapter.)
3. Launch a serial terminal-emulation program on your workstation. The required
settings to launch a console session are as follows:
Parity: None
Data bits: 8
Stop bit: 1
4. If you have not yet changed the default login for the login name and password,
enter netscreen at both the login and password prompts. (Use lowercase letters
only. The login and password fields are both case-sensitive)
For information on how to configure the device with the CLI commands, refer
to the Concepts & Examples ScreenOS Reference Guide.
5. (Optional) By default, the console times out and terminates automatically after
10 minutes of idle time. To remove the timeout, enter set console timeout 0.
6. Once the command prompt is displayed, the device is ready to be configured,
See Basic Device Configuration on page 32 to complete the initial device
configuration.
Using Telnet
To establish a Telnet connection:
1. Connect your workstation to the MGT port (mgt interface) on the device.
2. Ensure that your workstation is configured for DHCP or is statically configured
with an IP address in the 192.168.1.0/24 subnet.
3. Start a Telnet client application to the IP address for the mgt interface (the
default IP address is 192.168.1.1). For example, enter telnet 192.168.1.1.
The Telnet application displays the login prompt.
30
Accessing a Device
4. If you have not yet changed the default login for the login name and password,
enter netscreen at both the login and password prompts. (Use lowercase letters
only. The login and password fields are both case-sensitive)
5. (Optional) By default, the console times out and terminates automatically after
10 minutes of idle time. To remove the timeout, enter set console timeout 0.
6. Once the command prompt is displayed, the device is ready to be configured,
See Basic Device Configuration on page 32 to complete the initial device
configuration.
Accessing a Device
31
Using Dialup
Each ISG 2000 device provides a modem port that allows you to establish a remote
CLI session using a dialup connection through a 9600 bps modem. Dialing into the
modem establishes a dialup CLI connection. You must use an RJ-45toDB-9
(female-to-male) serial cable with a null modem adapter.
NOTE:
The terminal type for dialup sessions must be vt100. For example, in Hilgraeve
HyperTerminal, select Connect > Remote device > vt100 from the Term Type
menu.
32
Administrative Access
Default Route
Management Services
Policy Configuration
Device Alarm
File Transfers
33
The set clock CLI command allows you to manually enter the date and time for the
device.
34
Administrative Access
By default, anyone in your network can manage a device if they know the admin
name and password.
To configure the device to be managed only from a specific host on your network,
use the WebUI or CLI as follows:
WebUI
Configuration > Admin > Permitted IPs: Enter the following, then click Add:
IP Address/Netmask: ip_addr/mask
CLI
set admin manager-ip ip_addr/mask
save
CLI
set hostname hostname
set domain domain-name
save
Default Route
The default route is a static route used to direct packets addressed to networks that
are not explicitly listed in the routing table. If a packet arrives at the device with an
address for which the device does not have routing information, the device sends
the packet to the destination specified by the default route.
To configure the default route on the device, use the WebUI or CLI as follows:
WebUI
Network > Routing > Destination > New (trust-vr): Enter the following, then
click OK:
IP Address/Netmask: 0.0.0.0/0.0.0.0
Next Hop
Gateway: (select)
Interface: ethernet1/1 (select)
Gateway IP Address: ip_addr
Basic Device Configuration
35
CLI
set route 0.0.0.0/0 interface ethernet1/1 gateway ip_addr
save
Management Services
ScreenOS provides services for configuring and managing a device, such as SNMP,
SSL, and SSH, which you can enable for each interface.
To configure the management services on the device, use the WebUI or CLI as
follows:
WebUI
Network > Interfaces > Edit (for mgt): Under Management Services, select or
clear the management services you want to use on the interface, then click
Apply.
CLI
set interface mgt manage web
unset interface mgt manage snmp
save
36
CLI
set interface ethernet3/1 zone trust
set interface ethernet3/1 ip 10.250.2.1/16
save
CLI
set interface ethernet1/1 zone untrust
set interface ethernet1/1 ip 172.16.20.1/16
get interface ethernet1/1
save
37
Policy Configuration
By default, the ISG 2000 device does not allow inbound or outbound traffic or traffic
to or from the DMZ. To permit (or deny) traffic, you must create access policies.
CAUTION: Your network might require a more restrictive policy than the example
provided in this guide. This example is not a requirement for initial configuration.
For detailed information about access policies, refer to the Concepts & Examples
ScreenOS Reference Guide.
To create and save an access policy that permits all kinds of outbound traffic from
any host in your trusted LAN to any device on the untrusted network, use the
WebUI or CLI as follows:
WebUI
Policies > (From: Trust To: Untrust) > New: Enter the following, then click OK:
Name: Trust-Untrust
Source Address: Any (select)
Destination Address: Any (select)
Service: Any (select)
Action: Permit (select)
CLI
set policy from trust to untrust any any any permit
save
Device Alarm
The ISG 2000 device allows you to configure the device alarm, an audible warning
that sounds when a device fails or a hazardous event occurs.
To specify which failures and events trigger the device alarm, use the set chassis
audible-alarm string CLI command. Table 6 describes the keywords available for
the set chassis CLI command.
Table 6: Set Chassis Keywords
38
Keyword
Meaning
all
battery
fan-failed
power-failed
temperature
Sets the device alarm to sound when the temperature goes outside the
acceptable range
File Transfers
To download files from or upload files to the device, use the WebUI or CLI as
follows:
WebUI
Configure > Update > ScreenOS/Keys or Config File > Select the type of file
you wish to transfer, browse for the file that you wish to upload onto the device,
then click Apply.
Once you click Apply, the device restarts. This process could take up to several
minutes.
CLI
save { software | config } from { flash | slot1 filename } to { flash | slot1 filename }
where flash refers to internal flash memory, slot1 refers to the compact flash
slot, and filename is the name of the software or configuration file on the card.
NOTE:
We recommend that you use mini-GBIC interface modules when possible. Do not
mix mini-GBIC and 10/100 Mbps ports. If you do not have a mini-GBIC interface
module, you should use at least two 10/100 Mbps interfaces. For more information
about HA configuration, refer to the Concepts & Examples ScreenOS Reference
Guide.
The ISG 2000 supports a maximum port count of 28. If there are eight-port 10/100
modules in each I/O slot, then ports 5 through 8, in slot 4, are disabled. Under this
circumstance, these ports are unavailable for firewall and HA functions.
Untrust Zone
R1
R2
802.1Q Trunk
Switch F
Switch C
HA2
Primary Device
Backup Device
HA1
Switch A
Trusted LAN
Switch B
Switch D
Switch E
DMZ LAN
NOTE:
The provided cabling instructions reproduce the configuration shown in Figure 11;
however, this is not the only possible HA configuration. In addition, the
instructions assume that all physical ports and interfaces are still at their defaults.
If you have changed the port and interface settings, the instructions might not
work properly.
To cable two ISG 2000 security devices together for HA and connect them to the
network:
1. Connect a 10/100Base-T crossover cable from the preferred HA1 port on the
primary device to the preferred HA1 port on the backup device.
2. Connect a 10/100Base-T crossover cable from the preferred HA2 port on the
primary device to the preferred HA2 port on the backup device.
40
Configuring HA Ports
3. Set the HA interface by executing the following command on each device, for
example:
set interface ethernet4/1 zone ha
set interface ethernet4/2 zone ha
Master Unit
4. Connect a crossover cable from ethernet3/8 to Switch A.
5. Connect an optical cable from ethernet2/2 to Switch B.
6. Connect an optical cable from ethernet1/1 to Switch C.
Backup Unit
7. Connect a crossover cable from ethernet3/8 to Switch D.
8. Connect an optical cable from ethernet2/2 to Switch E.
9. Connect an optical cable from ethernet1/1 to Switch F.
Switches
10. Cable together Switch A and Switch D.
11. Cable together Switch B and Switch E.
12. Cable together Switch C and Switch F.
13. Cable Switch C to R1.
14. Cable Switch F to R2.
NOTE:
The switch ports must be defined as 802.1Q trunk ports, and the external routers
must be able to use either Hot Standby Router Protocol (HSRP) or Virtual Router
Redundancy Protocol (VRRP). For the best configuration method, refer to the
documentation for your switch or router.
15. Press the power switch to the ON position for both devices.
4. Enter Y.
The device restarts.
4. Click Reset.
An alert box prompts you to confirm that you want to reset the device.
5. Click OK.
The device resets. Also, an alert box prompts you to leave your browser open
for a few minutes and then log back into the device.
NOTE:
By default, the device recovery feature is enabled. You can disable it by entering
the CLI unset admin device-reset command. Also, if the security device is in FIPS
mode, the recovery feature is automatically disabled.
You can restore the device to its default settings using one of these methods:
The following sections describe how to use these methods to reset the device to its
factory defaults.
44
unset all
To use the CLI unset all command, you will need to know the login name and
password. To reset the device to its factory defaults:
1. Start a Console session as described in Using a Console Connection on
page 29, then log in.
2. At the command prompt, enter unset all. The following message is displayed:
Erase all system config, are you sure y/[n] ?
3. Press y
4. Enter reset. Press n for the first question and y for the second question:
Configuration modified, save? [y]/n
System reset, are you sure? y/[n]
The system now resets and returns to the login prompt; the default login name and
password are both reset to netscreen.
45
46
Chapter 4
NOTE:
47
2. If there is a network-forwarding device between the ISG 2000 and the NSM
server, set a route through that device to the server with the following CLI
command:
set vrouter trust-vr route 0.0.0.0/0 interface ethernet1/1 gateway 1.1.1.2
3. Enable the ISG 2000 for management from NSM. This is enabled by default.
set nsm enable
save
You can now connect to the ISG 2000 device through ethernet1/1 from NSM and
continue configuring the device.
For instructions on how to manage a device with NSM, refer to the Network and
Security Manager documentation at
http://www.juniper.net/techpubs/software/management/security-manager.
48
Chapter 5
Servicing a Device
This chapter describes service and maintenance procedures for your ISG 2000
device. It includes the following sections:
NOTE:
For safety warnings and instructions, refer to the Juniper Networks Safety Guide.
The guide warns you about situations that could cause bodily injury. When
working on any equipment, be aware of the hazards involved with electrical
circuitry, and follow standard practices for preventing accidents.
49
Interface Modules
This section provides instructions on how to service the interface modules on an
ISG 2000 device.
To remove an interface module from a slot:
WARNING: When inserting or removing interface modules, be sure that the power
is in the OFF position.
50
3. Grip the levers, then gently slide the module straight out (see Figure 13).
4. If you are not reinstalling an interface module into the empty slot, install a
blank faceplate over the slot to maintain proper airflow.
Figure 13: Interface Removal
WARNING: When inserting and removing a module in slot 2, take care that the
electromagnetic interference (EMI) fingers located along the top edge of the front
wall of the interface module do not catch on the lower edge of the module above
the module in slot 1.
WARNING: When inserting or removing interface modules, be sure that the power
is in the OFF position.
1. Align the side edges of the module with the grooves in the side walls of the slot
(see Figure 14).
Figure 14: Interface Slot Alignment
WARNING: When inserting and removing a module in slot 2, take care that the
electromagnetic interference (EMI) fingers located along the top edge of the front
wall of the interface module do not catch on the lower edge of the module above
the module in slot 1.
3. With your thumbs, push in the locking levers to secure the module.
Interface Modules
51
CAUTION: If you push the latch before it contacts the ridge on the bay wall, the
locking tab clicks into place prematurely, and you will not be able to properly seat
the interface module.
4. Tighten the thumbscrews on each side of the interface module.
WARNING: Do not mix the PSU types because doing so could seriously damage the
device.
NOTE:
Whenever you deploy two PSUs to an ISG 2000, connect each to a different power
source. Each PSU is intended to receive power from separate feeds.
9. Press the power switch to the ON position.
If both PSUs are installed and either of them is off, the ALARM LED on the front
panel glows red. This warning indicates that maximum device reliability requires
all installed PSUs to be operational.
WARNING: You must shut off current to the DC feed wires before connecting the
wires to the PSUs. Also, make sure that the ON/OFF switch is in the OFF position.
Terminal block
Grounding screw
Grounding wire
3. Connect the other end of the grounding wire to a grounding point at your site.
53
Grounding wire
Positive
voltage
wire
(red)
Negative
voltage
wire
(black)
2. Insert a 0V DC (positive voltage) return wire into the center COM connector and
a -48V DC power-feed wire into either the left or the right connector.
3. Fasten the screws over the connectors.
4. Press the power switch to the ON position.
NOTE:
54
If both PSUs are installed and either of them is off, the ALARM LED on the front
panel glows red. This warning indicates that maximum device reliability requires
all installed PSUs to be operational.
Thumbscrew
Terminal block
Grounding wire
Feed wires
55
Fan Tray
NOTE:
During the one-year warranty period, you can obtain a replacement fan module by
contacting Juniper Networks Technical Support. After the warranty period, contact
the Juniper Networks Sales department.
You only need to replace the fan module when a failure occurs. When this happens,
the FAN LED glows red, and the device generates an event alarm and an SNMP trap.
Figure 19: Fan Module
Fan Front
Fan Module
Fan Lever
WARNING: Do not remove the fan module while the fans are still spinning.
3. Insert the new fan module in the fan bay, then push it straight in.
4. Secure the fan module in place by pushing the fan lever flat against the front
panel.
56
Fan Tray
Fan-Tray Filter
Before you replace the fan-tray filter, make sure you have the following tools:
4. Push the wooden ruler toward the back of the device, gently lifting the filter as
you proceed.
5. Once the filter is separated from the Velcro backing, use your fingers to pull the
filter out of the fan-tray slot (see Figure 22).
Fan-Tray Filter
57
6. Carefully insert a new filter into the device. Use the wooden ruler as an aid to
guide the back edge of the filter to reach the end of the device wall.
7. Once the filter is fully inserted, push the wooden ruler against the surface of the
filter several times to ensure that the filter is secure against the Velcro backing
on the device wall.
CAUTION: Make sure that the filter is secure against the device wall; otherwise, the
filter will tear when you reinstall the fan.
8. Insert the new fan module in the fan bay, then push it straight in.
9. Secure the fan module in place by pushing the fan lever flat against the front
panel.
NOTE:
If the top cover of the device is accessible, you may find it easier to remove the
cover and access the filter from the top of the device.
NOTE:
An ISG 1000 or ISG 2000 device can operate without a fan-tray filter; however,
without the filter the device does not comply with NEBS standards.
3. Slide the connector into the transceiver port until it clicks into place. Because
the fit is close, you might have to apply some force to insert the connector. To
avoid damaging the connector, apply force evenly and gently (see Figure 23).
Figure 23: Sliding the Connector into the Transceiver Port
Latch
Transceiver
Unlocked Position
Latch is pressed in
2. Hold the connector between your thumb and forefinger, with your thumb on
top and your forefinger underneath.
3. Using your thumb, press the connector release down, then forward. This action
loosens the connector from the transceiver port (see Figure 25).
Figure 25: Ejecting the Cable
4. Gently but firmly pull the clip from the transceiver port.
59
Mini-GBIC Transceiver
To remove a mini-GBIC transceiver from an interface module:
1. Push in the transceiver release latch (located on the underside of the
transceiver) until it locks into place, disengaging the transceiver (see Figure 26).
Figure 26: Releasing the Transceiver
Transceiver
Release Latch
2. Grasp the transceiver at both sides, and pull the transceiver toward you to
remove it from the interface module.
To install a mini-GBIC transceiver into an interface module, holding the transceiver
with the label face up, then insert it into the transceiver slot (see Figure 27).
Figure 27: Installing the Transceiver
Security Modules
Security modules are high-performance-processing subdevices that increase the
performance of the ISG 2000 for high CPU-usage services, such as Intrusion
Detection and Prevention (IDP).
CAUTION: Before you install or remove a security module, make sure the power is
OFF, the power cords are removed, and the device is placed on a stable table.
NOTE:
60
Security Modules
For better signal integrity, use slots 3 through 1, placing the first security module
in slot 3. Security Module slots are number Slot 3, Slot 2 and Slot 1 starting from
the back of the device.
Security Modules
61
62
Security Modules
Appendix A
Specifications
This appendix provides general system specifications for the ISG 2000. It includes
the following sections:
Physical on page 63
Electrical on page 64
Environmental on page 65
Certifications on page 65
Connectors on page 65
Physical
Table 7 provides the physical specifications for the ISG 2000.
Table 7: Physical Specifications
Height
Depth
Width
Weight
42 lb (19 kg)
63
Electrical
Table 8 provides the electrical specifications for the ISG 2000.
Table 8: Electrical Specifications
AC voltage
DC voltage
AC power
250 Watts
DC power
250 Watts
AC input frequency
47 - 63 Hz
Fuse rating
WARNING: Certain ports on the device are designed for use as intrabuilding
(within-the-building) interfaces only (Type 2 or Type 4 ports as described in
GR-1089-CORE, Isssue 4) and require isolation from the exposed outside plant
(OSP) cabling. To comply with NEBS requirements and protect against lightning
surges and commercial power disturbances, the intrabuilding ports must not be
metallically connected to interfaces that connect to the OSP or its wiring. The
intrabuilding ports on the device are suitable for connection to intrabuilding or
unexposed wiring or cabling only. The addition of primary protectors is not
sufficient protection for connecting these interfaces metallically to OSP wiring.
64
Environmental
Table 9 provides the environmental specifications for the ISG 2000:
Table 9: Environmental Tolerance
Temperature
Operating
32-113F, 0- 45 C
Humidity
Certifications
Table 10 shows the certifications available for the ISG 2000.
Table 10: ISG 2000 Certifications
Certification Type
Certification Name
NEBSa
NEBS Level 3
GR-63-Core: NEBS, Environmental Testing
GR-1089-Core: EMC and Electrical Safety for Network
Telecommunications Equipment
Safety
EMI
a.An ISG 1000 or ISG 2000 device can operate without a fan-tray filter; however, without the filter
the device does not comply with NEBS standards.
Connectors
Figure 28 shows the location of the pins on the RJ-45 connector.
Figure 28: RJ-45 Pinouts
1 2 3 4 5 6 7 8
65
Name
I/O
Description
RTS Out
Request To Send
DTR Out
TxD
Transmit Data
GND
NA
Chassis Ground
GND
NA
Chassis Ground
RxD
Receive Data
DSR
CTS
Clear To Send
Figure 29 shows the location of the pins on the DB-9 female connector.
Figure 29: DB-9 Female Connector
66
Pin
Name
I/O
Description
DCD
Carrier Detect
RxD
Receive Data
TxD
Transmit Data
DTR
GND
NA
Signal Ground
DSR
RTS
Request To Send
CTS
Clear To Send
RING
Ring Indicator
The mini-Gigabit transceivers are compatible with the IEEE 802.3z Gigabit Ethernet
standard, and the 10Gbase-R transceivers are compatible with the IEEE 802.3ae
standard. Table 13 lists media types and distances for the different types of
interfaces used in the ISG 2000.
Table 13: Interface Media Types for Mini-Gigabit Transceivers and 10Gigabit XFP
Transceivers
Standard
Media Type
1000Base-SX
500
550
220
275
550
550
10,000
1000Base-LX
100Base-TX
100
10Gbase-SR
26-300
10Gbase-LR
10,000
67
68
Index
A
high availability
configuring .........................................................3941
HA LED .....................................................................11
host and domain name configuration .........................35
C
cables, for network interfaces ......................................25
CLI
managing with .........................................................32
session, using dialup ...............................................32
configuration
admin name and password ...................................33
administrative access .............................................35
date and time ..........................................................33
default route.............................................................35
equipment-rack requirements ...............................20
host and domain name ..........................................35
management services .............................................36
console, managing with ................................................29
D
date and time configuration .........................................33
DC power supplies
feed wires, connecting ...........................................54
replacing ...................................................................55
terminal block..........................................................54
default route configuration ...........................................35
dialup connection ..........................................................32
domain and hostname configuration ..........................35
E
equipment-rack configuration requirements..............20
F
factory defaults, resetting to .........................................44
fan
tray ............................................................................16
fan assembly ..................................................................58
FAN LED ..........................................................................12
FLASH LED .....................................................................12
I
IDP
defined ......................................................................47
IDP license key disables DI ....................................47
installing modules ..........................................................16
interface modules ....................................................14, 51
interface modules, removing ........................................50
IP addresses
Trust, setting ............................................................37
Untrust, setting ........................................................37
L
LEDs ................................................................................11
LEDs, after powering off ...............................................53
license keys ....................................................................47
logging on .......................................................................32
M
management
console......................................................................29
services, configuring ...............................................36
Telnet connection ....................................................30
WebUI .......................................................................32
managing
through WebUI ........................................................42
mini-GBIC transceiver, replacing ..................................60
modem............................................................................32
modules
high availability .......................................................16
modules, LEDs ...............................................................12
N
NEBS warning ................................................................24
network interfaces, cabling ..........................................25
69
R
rack mounting ............................................................... 20
front-rear mount ..................................................... 21
mid-mount ............................................................... 22
registration, product ...................................................... 47
remote management session....................................... 32
resetting to factory defaults .......................................... 44
restarting the device...................................................... 42
S
safety guidelines ............................................................ 20
serial connection ........................................................... 32
STATUS LED .................................................................... 11
T
Telnet, managing with .................................................. 30
temperature
environmental guidelines ...................................... 20
TEMP LED ................................................................ 11
terminal block, on DC power supply .......................... 54
Trust IP address, setting................................................ 37
U
Untrust IP address, setting ........................................... 37
W
WebUI, managing with ................................................. 32
WebUI, using .................................................................. 42
70
Index