- play_arrow Fast Track: Initial Installation
- play_arrow Overview
- play_arrow Site Planning, Preparation, and Specifications
- play_arrow Maintain Components
- play_arrow Troubleshoot Hardware
- play_arrow Contact Customer Support and Return the Chassis or Components
- play_arrow Safety and Compliance Information
Configure Junos OS on the SRX4700
We ship the SRX4700 Firewall with preinstalled Junos OS, which is ready to be configured when you power on the device. You can use the J-Web GUI, Juniper® Security Director (on-prem), Juniper® Security Director Cloud, Secure ZTP, or CLI to perform the initial configuration.
Configure the SRX4700 Using J-Web
The J-Web interface is a Web-based graphical interface that allows you to operate a firewall without commands.
Follow the instructions in Access the J-Web User Interface to how to start and access the J-Web user interface and The J-Web Setup Wizard to configure your device.
Configure the SRX4700 using Juniper® Security Director Cloud
Juniper® Security Director Cloud is a cloud-based software-as-a-solution (SaaS) portal that helps you securely migrate your network to a Secure Access Service Edge (SASE) architecture.
Follow the instructions in the Juniper Security Director Cloud Quick Start guide to configure your device.
Configure the SRX4700 using Secure ZTP
Secure ZTP is highly automated, you can conveniently and securely set up and configure your device in your network with little manual work.
Follow the instructions in the Secure ZTP guide to configure your device.
Configure Root Authentication and the Management Interface from the CLI
You must perform the initial configuration of the device through the console port.
Gather the following information before configuring the device:
Root authentication
IP address of the management interface
Default route
To configure root authentication and the management interface:
Factory-Default Configuration of the SRX4700
Your firewall comes configured with a factory-default configuration. The default configuration includes the following security configuration:
Two security zones are created: trust and untrust.
A security policy is created that permits outbound traffic from the trust zone to the untrust zone.
Source Network Address Translation (NAT) is configured on the trust zone.
If the current active configuration fails, you can use the load
factory-default
command to revert to the factory-default
configuration.