
SSG 140 Series Hardware Installation and Configuration Guide
30
PIM Configuration
To configure a bridge group:
WebUI
Network > Interfaces > List > Edit (bgroup0) > Bind Port: Select
ethernet0/3
,
ethernet0/4
, and
ethernet0/5
, then click
Apply
.
>Basic: Enter the following, then click
Apply
:
Zone Name: DMZ (select)
IP Address/Netmask: 10.0.0.1/24
CLI
set interface bgroup0/0 port ethernet0/3
set interface bgroup0/0 port ethernet0/4
set interface bgroup0/0 port ethernet0/5
set interface bgroup0/0 zone DMZ
set interface bgroup0/0 ip 10.0.0.1/24
save
If you want to bind an Ethernet interface to a bgroup, you must first make sure that
the interface is in the Null security zone. Unsetting the interface that is in a bgroup
places the interface in the Null security zone. Once assigned to the Null security
zone, the Ethernet interface can be bound to a security zone and assigned a
different IP address.
PIM Configuration
To configure the interfaces on physical interface modules (PIMs), refer to the
PIM
and Mini-PIM Installation and Configuration Guide
.
Basic Firewall Protections
The devices are configured with a default policy that permits workstations in the
Trust zone of your network to access any resource in the Untrust security zone,
while outside computers are not allowed to access or start sessions with your
workstations. You can configure policies that direct the device to permit outside
computers to start specific kinds of sessions with your computers. For information
about creating or modifying policies, refer to the
Concepts & Examples ScreenOS
Reference Guide.
SSG 140 devices provide various detection methods and defense mechanisms to
combat probes and attacks aimed at compromising or harming a network or
network resource:
ScreenOS Screen options secure a zone by inspecting, and then allowing or
denying, all connection attempts that require crossing an interface to that zone.
For example, you can apply port-scan protection on the Untrust zone to stop a
source from a remote network from trying to identify services to target for
further attacks.