Configure Setup Wizard
You are here: Device Administration > Reset Configuration.
Using the Setup wizard, you can perform step-by-step configuration of a services gateway that can securely pass traffic.
You can also configure the setup modes in the factory default settings. Connect your management device (laptop or PC) to the SRX Series Firewall in factory default settings, the J-Web Setup wizard will appear. For more information on the Setup wizard in the factory default settings, see Start J-Web.
You can choose one of the following setup modes to configure the services gateway:
Click Cancel to exit the mode selection window.
Standalone mode—Configure your SRX Series device to operate in a standalone mode. In this mode, you can configure basic settings such as device credentials, time, management interface, zones and interfaces, and DNS servers and default gateways.
Cluster (HA) mode—Configure your SRX Series device to operate in a cluster (HA) mode. In the cluster mode, a pair of devices are connected together and configured to operate like a single node, providing device, interface, and service level redundancy.
Note:You cannot configure Standalone or Passive mode when your device is in the HA mode.
Passive (Tap) mode—Configure your SRX Series device to operate in a TAP mode. TAP mode allows you to passively monitor traffic flows across a network. If IPS is enabled, then the TAP mode inspects the incoming and outgoing traffic to detect the number of threats.
Note:SRX5000 line of devices, SRX4600, and vSRX devices does not support the passive mode configuration.
To help guide you through the process, the wizard:
Determines which configuration tasks to present to you based on your selections.
Flags any missing required configuration when you attempt to leave a page.
To configure SRX Series Firewalls using the J-Web Setup wizard:
Field |
Action |
---|---|
Device Credentials | |
System Identity | |
Device name |
Enter a hostname. You can use alphanumeric characters, special characters such as the underscore (_), the hyphen (-), or the period (.); the maximum length is 255 characters. |
Root Account | |
Username |
Displays the root user. Note:
We recommend that you do not use root user account as a best practice to manage your devices. |
Password |
Enter a password. You can use alphanumeric characters and special characters; the minimum length is six characters. |
SSH for root user |
Enable this option to allow the root login (to the device) using SSH. |
Admin Account | |
Username |
Enter the admin username to manage the device. |
Password |
Enter the admin password. |
Time | |
Time | |
Time zone |
Select a time zone from the list. |
Time source |
Select either NTP server, computer time, or Manual to configure the system time:
|
Management Interface | |
Management Interface Note:
If you change the management IP address and click Next, a warning message appears on the Management Interface page that you need to use the new management IP address to log in to J-Web because you may lose the connectivity to J-Web. |
|
Management interface |
Select an interface from the list. If fxp0 port is your device’s management port, then the fxp0 port is displayed. You can change it as required or you can select None and proceed to the next page. Note:
|
IPv4 Note:
Click email to self to get the newly configured IPv4 or IPv6 address to your inbox. This is useful if you lose connectivity when you change the management IP address to another network. |
|
Management address |
Enter a valid IPv4 address for the management interface. Note:
If fxp0 port is your device’s management port, then the fxp0 port’s default IP address is displayed. You can change it if required. |
Management subnet mask |
Enter a subnet mask for the IPv4 address. If you have changed the management address, use the new IP address to access J-Web. |
Static route |
Enter an IPv4 address for the static route to route to the other network devices. |
Static route subnet mask |
Enter a subnet mask for the static route IPv4 address. |
Next hop gateway |
Enter a valid IPv4 address for the next hop. |
IPv6 | |
Management access |
Enter a valid IPv6 address for the management interface. |
Management subnet prefix |
Enter a subnet prefix length for the IPv6 address. |
Static route |
Enter an IPv6 address for the static route if required to reach the device through the management interface. |
Static route subnet prefix |
Enter a subnet prefix length for the static route IPv6 address. |
Next hop gateway |
Enter a valid IPv6 address for the next hop. |
Access Protocols Note:
This option is available for all the ports except fxp0. |
|
HTTPS |
This option is enabled by default. |
SSH |
This option is enabled by default. |
Ping |
Enable this option for ping service. |
DHCP |
Enable this option for DHCP service. |
NETCONF |
Enable this option for NETCONF service. |
Zones & Interfaces | |
Security Policy Note:
This option is available only for the Standalone mode. For the Passive (Tap) mode, this option is available under Tap Settings. |
|
From Zone |
Name of the source zone. In the standalone mode, permits all traffic from the trust zone. |
To Zone |
Name of the destination zone. In standalone mode, permits all traffic from the trust zone to the untrust zone. |
Source |
Name of the source address (not the IP address) of a policy. |
Destination |
Name of the destination address. |
Application |
Name of a preconfigured or custom application of the policy match. |
Action |
Action taken when a match occurs as specified in the policy. |
Zones —Displays the available trust and untrust zones configuration. |
|
Trust Zone Interfaces Note:
This option is available only for the Standalone mode. |
|
Add Trust Zone Interface |
Click + to add trust zone interface. For more information on the fields, see Table 2. |
Edit Trust Zone Interface |
Select an interface and click the pencil icon at the right corner of the table to modify the configuration. |
Delete Trust Zone Interface |
Select an interface and click the delete icon at the top right corner of the table. A confirmation window appears. Click Yes to delete the selected interface or click No to discard. |
Search Trust Zone Interface |
Click the search icon at the right corner of the table to quickly locate a zone or an interface. |
Detailed View Trust Zone Interface |
Hover over the interface name and click the Detailed View icon to view the zone and interface details. |
Trust Zone Interfaces—Zone Level Settings | |
Zone name |
View the trust zone name populated from your device factory default settings. Note:
For standalone mode, trust and untrust zones are created by default even if these zones are not available in the factory default settings. |
Description |
Enter the description for trust zone. |
System services |
Enable this option for the types of traffic that can reach the device on a particular interface. By default, this option is enabled. You can disable if required. |
Protocols |
Enable this option to configure the device to perform stateful network traffic filtering on network packets using network traffic protocols (for example, TCP and UDP). By default, this option is enabled. You can disable if required. |
Application tracking |
Enable this option to collect byte, packet, and duration statistics for application flows in the specified zone. |
Source identity log |
Enable this option for the device to log the user identity information based on the source zone configured in the security policy. |
Untrust Zone Interfaces | |
Add Untrust Zone Interface |
Click + to add untrust zone interface. For more information on the fields, see Table 3. |
Edit Untrust Zone Interface |
Select an interface and click the pencil icon at the right corner of the table to modify the configuration. |
Delete Untrust Zone Interface |
Select an interface and click the delete icon at the top right corner of the table. A confirmation window appears. Click Yes to delete the selected interface or click No to discard. |
Search Untrust Zone Interface |
Click the search icon at the right corner of the table to quickly locate a zone or an interface. |
Detailed View Untrust Zone Interface |
Hover over the interface name and click the Detailed View icon to view the zone and interface details. |
Untrust Zone Interfaces—Zone Level Settings | |
Zone name |
View the untrust zone name populated from your device factory default settings. Note:
For standalone mode, trust and untrust zones are created by default even if these zones are not available in the factory default settings. |
Description |
Enter the description for untrust zone. |
Application tracking |
Enable this option to collect byte, packet, and duration statistics for application flows in the specified zone. |
Source identity log |
Enable this option for the device to log the user identity information based on the source zone configured in the security policy. |
DNS Servers & Default Gateways | |
DNS Servers | |
DNS server 1 |
Enter the IPv4 or IPv6 address of the primary DNS. |
DNS server 2 |
Enter the IPv4 or IPv6 address of the secondary DNS. |
Default Gateway | |
Default gateway (IPv4) |
Enter the IPv4 address of the next possible destination for any network. |
Default gateway (IPv6) |
Enter the IPv6 address of the next possible destination for any network. |
Tap Settings Note:
This option is available only for the Passive (Tap) mode. |
|
Tap Settings | |
Tap interface |
Select the interface from the list. |
IP-IP tunnel inspection |
Enable this option for the SRX Series device to inspect pass through traffic over an IP-IP tunnel. |
GRE tunnel inspection |
Enable this option for the SRX Series device to inspect pass through traffic over a GRE tunnel. |
Security Policy
& Advanced Services Note:
Your device must have internet connectivity to use IPS, Web filtering, Juniper ATP Cloud, and Security threat intelligence services. |
|
From Zone |
Name of the source zone. In the Tap mode, permits all traffic from the tap zone. |
To Zone |
Name of the destination zone. In the Tap mode, permits all traffic from the TAP zone to the TAP zone. |
Source |
Name of the source address (not the IP address) of a policy. |
Destination |
Name of the destination address. |
Application |
Name of a preconfigured or custom application of the policy match. |
Action |
Action taken when a match occurs as specified in the policy. |
UTM | |
UTM |
Enable this option for configuring UTM services. |
License |
Enter UTM license key and click Install License to add a new license. Note:
|
UTM type |
Select an option to configure UTM features:
|
Web filtering type |
Select an option:
|
IPS | |
IPS |
Enable this option to install the IPS signatures. |
License |
Enter the license key and click Install License to add a new license. Note:
The installation process may take few minutes. |
IPS signature |
Click Browse to navigate to the IPS signature package folder and select it. Click Install to install the selected IPS signature package. Note:
You can download the IPS signature offline package at https://support.juniper.net/support/downloads/. |
ATP Cloud | |
ATP Cloud |
Enable this option to use Juniper ATP Cloud services. Note:
After the Juniper ATP Cloud configuration is pushed, only the SRX300 line of devices and SRX550M devices are rebooted. Your device must have internet connectivity to enable Juniper ATP Cloud enrollment process through J-Web. |
Security Intelligence | |
Security intelligence |
Enable this option to use Security intelligence services. Note:
After the Security Intelligence configuration is pushed, only the SRX300 line of devices and SRX550M devices are rebooted. Your device must have internet connectivity to enable Juniper ATP Cloud enrollment process through J-Web. |
User Firewall | |
User Firewall |
Enable this option to use user firewall services. |
Domain name |
Enter a domain name for Active Directory. |
Domain controller |
Enter domain controller IP address. |
Username |
Enter a username for administrator privilege. |
Password |
Enter a password for administrator privilege. |
Field |
Action |
---|---|
General | |
Type (family) |
|
Interfaces |
Select an interface from the Available column and move it to the Selected column. Note:
This option is available only for the Switching family type. |
VLAN Note:
This option is available only for the Switching family type. |
|
Name |
Enter a unique name for the VLAN. |
VLAN ID |
Enter the VLAN ID. |
IPv4 | |
IPv4 address |
Enter a valid IPv4 address for the switching or the routing interface. |
Subnet mask |
Enter a subnet mask for the IPv4 address. |
IPv6 | |
IPv6 address |
Enter a valid IPv6 address for the switching or the routing interface. |
Subnet prefix |
Enter a subnet prefix for the IPv6 address. |
DHCP Local Server | |
DHCP local server |
Enable this option to configure the switch to function as an extended DHCP local server. |
Pool name |
Enter the DHCP pool name. |
Pool start address |
Enter the starting IPv4 address of the DHCP server pool address range. This address must be within the IPv4 network. |
Pool end address |
Enter the ending IPv4 address of the DHCP server pool address range. This address must be within the IPv4 network. Note:
This address must be greater than the address specified in Pool start address. |
Propagate settings from |
Select an option from the list. Propagation of TCP/IP settings (such as, DNS and gateway address) received on the device interface acting as DHCP client. |
Services & Protocols | |
System Services |
Select system services from the list in the Available column and then click the right arrow to move it to the Selected column. The available options are:
|
Protocols |
Select protocols from the list in the Available column and then click the right arrow to move it to the Selected column. The available options are:
|
Field |
Action |
---|---|
General | |
Interface |
Select an interface from the list. |
Interface unit |
Enter the interface unit value. |
VLAN ID |
Enter the VLAN ID. Note:
VLAN ID is mandatory if the interface unit is higher than zero. |
Description |
Enter the description for the interface. |
Address Mode |
Select an address mode for the interface. The available options are DHCP Client, PPPoE (PAP), PPPoE (CHAP) and Static IP. Note:
PPPoE (PAP) and PPPoE (CHAP) are not supported for SRX5000 line of devices and if any of the devices are in passive mode. |
Username |
Enter a username for PPPoE (PAP) or PPPoE (CHAP) authentication. |
Password |
Enter a password for PPPoE (PAP) or PPPoE (CHAP) authentication. |
IPv4 Note:
This option is available only for the Static IP address mode. |
|
IPv4 Address |
Enter a valid IPv4 address for the interface. |
Subnet Mask |
Enter a subnet mask for the IPv4 address. |
IPv6 Note:
This option is available only for the Static IP address mode. |
|
IPv6 Address |
Enter a valid IPv6 address for the interface. |
Subnet Prefix |
Enter a subnet prefix for the IPv6 address. |
Services & Protocols | |
System Services |
Select system services from the list in the Available column and then click the right arrow to move it to the Selected column. |
Protocols |
Select protocols from the list in the Available column and then click the right arrow to move it to the Selected column. |