![Juniper SSG 20-WLA Hardware Installation And Configuration Manual Download Page 47](http://html1.mh-extra.com/html/juniper/ssg-20-wla/ssg-20-wla_hardware-installation-and-configuration-manual_2032391047.webp)
Basic Firewall Protections
37
The V.92 Modem Interface
The V.92 interface provides an internal modem to establish a PPP connection to an
ISP. You can configure the serial interface as a primary or backup interface, which is
used in case of interface failover.
To configure the V.92 interface, do either of the following:
WebUI
Network > Interfaces > Edit (for serial1/0) > Modem: Enter the following,
click
OK
:
Modem Name: mod1
Init String: AT&FS7=255S32=6
Status: Enable (select)
Inactivity Timeout: 20
CLI
set interface serial1/0 modem idle-time 20
set interface serial1/0 modem settings mod1 init-strings AT&FS7=255S32=6
set interface serial1/0 modem settings mod1 active
For information on how to configure the V.92 modem interface, refer to the
Concepts & Examples ScreenOS Reference Guide
.
Basic Firewall Protections
The devices are configured with a default policy that permits workstations in the
Trust zone of your network to access any resource in the Untrust security zone,
while outside computers are not allowed to access or start sessions with your
workstations. You can configure policies that direct the device to permit outside
computers to start specific kinds of sessions with your computers. For information
about creating or modifying policies, refer to the
Concepts and Examples ScreenOS
Reference Guide
.
The SSG 20 device provides various detection methods and defense mechanisms to
combat probes and attacks aimed at compromising or harming a network or
network resource:
ScreenOS SCREEN options secure a zone by inspecting, and then allowing or
denying, all connection attempts that require crossing an interface to that zone.
For example, you can apply port scan protection on the Untrust zone to stop a
source from an remote network from trying to identify services to target for
further attacks.
The device applies firewall policies, which can contain content filtering and
intrusion detection and prevention (IDP) components, to the traffic that passes
the SCREEN filters from one zone to another. By default, no traffic is permitted
to pass through the device from one zone to another. To permit traffic to cross
the device from one zone to another, you must create a policy that overrides the
default behavior.
NOTE:
The V.92 interface does not work in transparent mode.
Summary of Contents for SSG 20-WLA
Page 5: ...Table of Contents Table of Contents v Index IX 1...
Page 6: ...vi Table of Contents SSG 20 Hardware Installation and Configuration Guide...
Page 20: ...SSG 20 Hardware Installation and Configuration Guide 10 Back Panel...
Page 50: ...SSG 20 Hardware Installation and Configuration Guide 40 Reset the Device to Factory Defaults...
Page 56: ...SSG 20 Hardware Installation and Configuration Guide 46 Memory Upgrade...
Page 60: ...SSG 20 Hardware Installation and Configuration Guide IV Connectors...
Page 80: ...SSG 20 Hardware Installation and Configuration Guide XX...
Page 82: ...2 Index SSG 20 Hardware Installation and Configuration Guide...