Upgrade - Guide Juniper SSG
Upgrade - Guide Juniper SSG
Upgrade Guide
Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. All other trademarks, service marks, registered trademarks, or registered service marks in this document are the property of Juniper
Networks or their respective owners. All specifications are subject to change without notice. Juniper Networks assumes no responsibility for any
inaccuracies in this document or for any obligation to update information in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
FCC Statement
The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. The equipment generates, uses, and can radiate radio-frequency energy and, if not installed and
used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential
area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency
energy. If it is not installed in accordance with Juniper Networks’ installation instructions, it may cause interference with radio and television reception.
This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC
rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no
guarantee that interference will not occur in a particular installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user
is encouraged to try to correct the interference by one or more of the following measures:
Connect the equipment to an outlet on a circuit different from that to which the receiver is connected.
Caution: Changes or modifications to this product could void the user's warranty and authority to operate this device.
Disclaimer
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED
WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED
WARRANTY, CONTACT YOUR JUNIPER NETWORKS REPRESENTATIVE FOR A COPY.
2
Table of Contents
About This Guide 5
Conventions..................................................................................................... 5
Web User Interface Conventions ............................................................... 5
Command Line Interface Conventions....................................................... 6
Naming Conventions and Character Types ................................................ 6
Requesting Technical Support .......................................................................... 7
Self-Help Online Tools and Resources........................................................ 7
Opening a Case with JTAC ......................................................................... 8
Document Feedback ........................................................................................ 8
.................................................................................................................. 8
Table of Contents 3
ScreenOS 6.1.0 Upgrade Guide
4 Table of Contents
About This Guide
This guide contains procedures for upgrading existing firmware to ScreenOS 6.1.0.
Conventions
This guide uses the conventions described in the following sections:
The following example shows the WebUI path and parameters for defining an
address:
Policy > Policy Elements > Addresses > List > New: Enter the following
information, then click OK:
To open online Help for configuration settings, click on the question mark (?) in the
upper left of the screen.
The navigation tree also provides a Help > Config Guide configuration page to help
you configure security policies and Internet Protocol Security (IPSec). Select an
option from the list, and follow the instructions on the page. Click the ? character in
the upper left for online Help on the Config Guide.
Conventions 5
ScreenOS 6.1.0 Upgrade Guide
In text, commands are in boldface type and variables are in italic type.
In examples:
If there is more than one choice, each choice is separated by a pipe ( | ). For
example, the following command means “set the management options for the
ethernet1, the ethernet2, or the ethernet3 interface”:
NOTE: When entering a keyword, you only have to type enough letters to identify the
word uniquely. Typing set adm u whee j12fmt54 will enter the command set
admin user wheezer j12fmt54. However, all the commands documented in this
guide are presented in their entirety.
If a name string includes one or more spaces, the entire string must be
enclosed within double quotes; for example:
Any leading spaces or trailing text within a set of double quotes are trimmed;
for example, “ local LAN ” becomes “local LAN”.
6 Conventions
About This Guide
NOTE: A console connection supports only SBCS. The WebUI supports both SBCS and
MBCS, depending on the character sets that your browser supports.
Download the latest versions of software and review your release notes—
http://www.juniper.net/customers/csc/software/
To verify service entitlement by product serial number, use our Serial Number
Entitlement (SNE) Tool—
https://tools.juniper.net/SerialNumberEntitlementSearch/
Document Feedback
If you find any errors or omissions in this document, contact Juniper Networks at
[email protected].
8 Document Feedback
ScreenOS Upgrade Procedures
This guide contains procedures for upgrading existing firmware to ScreenOS 6.1.0.
Before you upgrade a security device, you must have the most recent ScreenOS
firmware stored on your local drive. Depending on the platform and the firmware
your security device is currently running, you also might need intermediate (or
step-up) firmware, new boot-loader firmware, or both. Figure 1 illustrates the
various firmware upgrade paths to ScreenOS 6.1.0.
9
ScreenOS 6.1.0 Upgrade Guide
Table 1 lists the recommended upgrade path to ScreenOS 6.1.0 based on device
model and firmware version. For example, if you are running ScreenOS 4.0 on a
NetScreen-5000 Series, you need to upgrade to ScreenOS 5.4r8 or later before
upgrading to ScreenOS 6.1.0. Table 1 also lists boot-loader upgrade
recommendations for each ScreenOS platform.
NOTE: For the SSG 500/500M and SSG 300M Series devices, we strongly recommend that
you upgrade the boot loader. For other devices, we recommend that you try to
upgrade and if you run into issues, then upgrade your boot loader.
Upgrade Recommendation
Platform Intermediate Firmware (Boot-Loader Filename)
ISG 1000 5.4r8 or later Load1000v102
ISG 1000-IDP 5.4r8 or later Load1000v102
ISG 2000 5.4r8 or later Load2000v116
ISG 2000-IDP 5.4r8 or later Load2000v116
NetScreen-5000 Series using 5000-M2 5.4r8 or later Load5000v103
NS-5000-8G2 See the Caution following Table 1.
NS-5000-2XGE
NetScreen-5000 Series using 5000-M3 6.1r1 or later Load5000v103
NS-5000-8G2G4
SSG 5 5.4r8 or later Loadssg5ssg20v132
SSG 20 5.4r8 or later Loadssg5ssg20v132
SSG 140 5.4r8 or later Loadssg140v324
SSG 320M 6.0r1 or later Loadssg300v306
SSG 350M 6.0r1 or later Loadssg300v306
SSG 520 5.4r8 or later Loadssg500v105
SSG 550 5.4r8 or later Loadssg500v105
SSG 520M 5.4r8 or later Loadssg500v105
SSG 550M 5.4r8 or later Loadssg500v105
10
ScreenOS Upgrade Procedures
Device-Specific Requirements
The NetScreen-5400 device supports two million sessions (the default) in version
6.1.0. When upgrading from 5.4 or 6.0r1 to 6.1 or 6.0r2, make sure your device has
a minimum of 450 MB of free memory. One million sessions requires
approximately 340 MB of memory.
NOTE: You can upgrade some security devices locally or remotely, but we recommend
that you perform the upgrade of a security device at the device location.
You can use any of the following methods to upgrade a security device:
WebUI
CLI
Boot loader
Network access to the security device from a computer that has a browser
New ScreenOS firmware (downloaded from the Juniper Networks Web site and
saved locally)
NOTE: After upgrading from a previous release of ScreenOS to ScreenOS 6.1, you might
need to either clear the cookies in your Web browser or press the default Help Link
Path button in the WebUI, located in Configuration>Admin>Management.
Because of cookies set when managing a device, you might receive the prior
version of the Help files when selecting WebUI online Help.
TFTP server installed locally and to which the security device has access
New ScreenOS firmware (downloaded from the Juniper Networks Web site and
saved to a local TFTP server directory)
Device-Specific Requirements 11
ScreenOS 6.1.0 Upgrade Guide
To upgrade through the boot loader, you must have the following access:
TFTP server installed locally that has an IP address in the same subnet as the
security device (255.255.255.0)
Ethernet connection from a computer to the security device (to transfer data,
namely from a local TFTP server)
Console connection from the computer to the security device (to manage the
device)
Figure 2 illustrates the three different ways by which you can upgrade a security
device.
Internet
Via serial
Serial Console
9600,8 N, 1
Via serial
Serial Console
9600, 8 , N, 1
TFTP server
TFTP Server
Via Telnet or
Telnet , SSH
SSH
TFTP server
TFTP Server
Via Wthe
ebUI
WebUI using a browser
Method 1—upgrading the boot loader, and then upgrading the firmware
Method 2—upgrading the boot loader and, after rebooting, using the boot
loader to upgrade the firmware
You can view the boot-loader version for ISG and NS-5000 Series devices by
entering the get envar command. For SSG devices, reboot the device by using the
console connection, and then checking the boot messages.
Method 1
The devices for which you upgrade the boot loader, and then upgrade the firmware
are as follows:
NOTE: For these devices, you only need to upgrade the boot loader if after you try to
upgrade the firmware, you run into issues.
The sample procedure shows the boot loader upgrade steps for an ISG 2000.
SSG 320M, SSG 350M, SSG 520, SSG 520M, SSG 550, SSG 550M
NOTE: For these devices, you should upgrade the boot loader to the latest version.
The sample procedure shows the boot loader upgrade steps for an SSG 500
device.
ISG 2000
To upgrade the boot loader for an ISG 2000 device to v1.1.6:
1. Download the boot loader from the Juniper Networks support site.
2. Save and extract the boot loader zip file and put it in the root directory of your
TFTP server.
4. Make an Ethernet connection from the device hosting the TFTP server to the
MGT port on the ISG 2000 and a serial connection from your workstation to the
console port on the ISG 2000.
5. Restart the ISG 2000 by entering the reset command. When prompted to
confirm the command, press y. The following system output appears:
7. Enter the filename for the boot loader software you want to load (for example,
enter load200v116.d.S), the IP address of the ISG 2000, and the IP address of
your TFTP server. The following system output appears:
8. Press Enter to load the file. The following system output appears:
You have completed the upgrade of the boot loader and can now proceed to
“Downloading New Firmware” on page 18.
SSG 500
To upgrade the boot loader for an SSG 500 device to v1.0.5:
1. Download the boot loader from the Juniper Networks support site.
2. Save and extract the boot loader zip file and put it in the root directory of your
TFTP server.
4. Make an Ethernet connection from the device hosting the TFTP server to the
MGT port on the SSG 500 and a serial connection from your workstation to the
console port on the SSG 500.
5. Restart the SSG 500 by entering the reset command. When prompted to
confirm the command, press y. The following system output appears:
7. Enter the filename for the boot loader software you want to load (for example,
enter loadssg500v105), the IP address of the SSG 500, and the IP address of
your TFTP server. The following system output appears:
8. Press Enter to load the file. The following system output appears:
You have completed the upgrade of the boot loader and can now proceed to
“Downloading New Firmware” on page 18.
Method 2
The devices for which you upgrade the boot loader and, after rebooting, use the
boot loader to upgrade the firmware are as follows:
NOTE: For these devices, you only need to upgrade the boot loader if after you try to
upgrade the firmware, you run into issues.
The sample procedure shows the boot loader upgrade steps for an SSG 140
device.
1. Download the boot loader from the Juniper Networks support site.
2. Save and extract the upgrade zip file and put it in the root directory of your
TFTP server.
4. Make an Ethernet connection from the device hosting the TFTP server to the
MGT port on the SSG 140 and a serial connection from your workstation to the
console port on the SSG 140.
5. Restart the SSG 140 by entering the reset command. When prompted to
confirm the command, press y. The following system output appears:
6. At this point, press any key to run the loader. The following system output
appears:
7. Press Enter to load the file. The following system output appears:
8. At this point, when prompted to save to on-board flash disk, press n. (Because
the boot loader upgrade is a one-time operation, you do not need to save it to
on-board flash.) The following system output appears:
9. At this point, when prompted to run the downloaded device image, press y. The
following system output appears:
Start loading...
.............
Done.
**********************************************************
* ============================================== *
* (c)1997-2006 Juniper Networks, Inc. *
* All Rights Reserved *
* *
* ---------------------------------------------- *
* SSG140 Boot Loader Version: 3.2.x *
* Compile Date: Dec 5 2007; Time: 13:45:25 *
* *
* !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! *
* ! ! *
* ! Please don't power off during update. ! *
* ! Otherwise, the system can not boot again. ! *
* ! ! *
* !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! *
* *
* *** DON'T POWER OFF DURING BOOT LOADER UPDATE *** *
* *** DON'T POWER OFF DURING BOOT LOADER UPDATE *** *
* *** DON'T POWER OFF DURING BOOT LOADER UPDATE *** *
* *
**********************************************************
10. At this point, when prompted to answer whether you want to update the boot
loader, press y. The following system output appears:
Update Boot
Loader......................................................................................................
Done
You have completed the upgrade of the boot loader. The system will reboot and you
can now proceed to “Downloading New Firmware” on page 18.
NOTE: Before you begin a security device upgrade, you must have the most recent
ScreenOS firmware. Check Table 1 on page 10 to make sure you have the required
intermediate software, if any.
b. In the table of software download versions, locate the device for which you
want to download software and click the version you want.
c. In the Software tab (under Package), click the upgrade link. For some
devices, you need to click the management module link before you can
access the Software tab.
2. Click Save, then navigate to the location where you want to save the firmware
zip file.
NOTE: Before loading the firmware, you must unzip the file.
You must save the firmware onto the computer from which you want to
perform the upgrade.
If you want to upgrade the security device using the WebUI, save the firmware
anywhere on the computer.
If you want to upgrade the security device using the CLI, save the firmware in
the root TFTP server directory on the computer. If you do not have a TFTP
server installed on your computer, then you can download one from the
Internet. If no TFTP server is available, then you must use the WebUI to load the
new firmware onto the security device.
CAUTION: Before upgrading a security device, save the existing configuration file to
avoid losing any data.
a. Go to Configuration > Update > Config File, and then click Save To File.
The File Download dialog box appears.
b. Click Save.
c. Navigate to the location where you want to save the configuration file
(cfg.txt), and then click Save.
c. Click Apply.
NOTE: This process takes some time. Do not click Cancel or the upgrade will fail. If you
do click Cancel and the upgrade fails, power off the device, then power it on
again. Restart the upgrade procedure beginning with Step 3.
d. Click OK to continue.
e. Log into the security device. You can verify the version of the security
device ScreenOS firmware in the Device Information section of the WebUI
page.
c. Click Apply.
d. Click OK to continue.
5. Log into the security device. You can verify the version of the security device
ScreenOS firmware in the Device Information section of the WebUI page.
1. Make sure you have the new ScreenOS firmware (or the intermediate firmware,
if required) in the TFTP root directory. For information on obtaining the new
firmware, see “Downloading New Firmware” on page 18.
2. Run the TFTP server on your computer by double-clicking the TFTP server
application. You can minimize this window, but it must be active in the
background.
3. Log into the security device using an application such as Telnet or SSH (or
HyperTerminal if connected directly through the console port). Log in as the
root admin or an admin with read-write privileges.
5. Enter the following command on the security device and specify the filename
of the firmware (if you are installing intermediate firmware, specify the
filename of the intermediate firmware):
NOTE: If this upgrade requires intermediate firmware and you have not already upgraded
to that firmware, enter the intermediate firmware filename when entering this
command.
6. Reset the security device when the upgrade is complete. Run the reset
command and enter y at the prompt to reset the device.
7. Wait a few minutes, and then log into the security device again.
8. Use the get system command to verify the version of the security device
ScreenOS firmware.
a. Using a serial cable, connect the serial port on your computer to the
console port on the security device (refer to your hardware manual for
console settings). This connection, in combination with a terminal
application, enables you to manage the security device.
2. Make sure you have the new ScreenOS firmware stored in the TFTP server
directory on your computer. For information on obtaining the new firmware,
see “Downloading New Firmware” on page 18.
3. Run the TFTP server on your computer by double-clicking the TFTP server
application. You can minimize this window, but it must be active in the
background.
4. Log into the security device using a terminal emulator such as HyperTerminal.
Log in as the root admin or an admin with read-write privileges.
6. Press any key on your computer when you see “Hit any key to run loader” or
“Hit any key to load new firmware” on the console display. This interrupts the
startup process.
NOTE: If you do not interrupt the security device in time, it loads the firmware saved in
flash memory.
7. Enter the filename of the ScreenOS firmware that you want to load at the Boot
File Name prompt.
If you enter slot1: before the specified filename, then the loader reads the
specified file from the external compact flash or memory card. If you do not
enter slot1: before the filename, then the file is downloaded from the TFTP
server. If the security device does not support a compact flash card, then an
error message is displayed and the console prompts you to reenter the
filename.
8. Enter an IP address that is on the same subnet as the TFTP server at the Self IP
Address prompt.
9. Enter the IP address of the TFTP server at the TFTP IP Address prompt.
NOTE: The self IP address and TFTP IP address must be in the same subnet; otherwise,
the TFTP loader rejects the self IP address and then prompts you to reenter it.
The procedures apply only to firmware upgrades, and assume that the devices are
identical and that there are no hardware changes. If there is any hardware change,
you should consult the corresponding hardware guide for each platform.
CAUTION: Before upgrading a security device, save the existing configuration file to
avoid losing any data.
WARNING: Do not power off your security device while it is upgrading to new
firmware. Doing so could permanently damage the device.
1. Go to Configuration > Update > Config File, and then click Save to
File.
2. Click Save in the File Download dialog box.
3. Navigate to the location where you want to save the configuration file
(cfg.txt), and then click Save.
f. Click Apply.
g. Click OK to continue.
h. Verify the version of the ScreenOS firmware, by logging into the security
device and locating the Device Information section of the WebUI page.
d. Run the TFTP server on your computer by double-clicking the TFTP server
application.
f. Enter the reset command when the upgrade is complete, and then enter y
at the prompt to reset the device.
g. Wait a few minutes, and then log into the security device.
h. Enter the get system command to verify the version of the security device
ScreenOS firmware.
2. Manually fail over the primary device to the backup device (CLI only).
b. Issue one of the following CLI commands. The command that you need to
run depends on whether or not the preempt option is enabled on the
primary device.
Either command forces the primary device to step down and the backup
device to immediately assume the primary device role.
1. Go to Configuration > Update > Config File, and then click Save to
File.
2. Click Save in the File Download dialog box.
3. Navigate to the location where you want to save the configuration file
(cfg.txt), and then click Save.
f. Click Apply.
g. Click OK to continue.
h. Verify the version of the ScreenOS firmware, by logging into the security
device and locating the Device Information section of the WebUI page.
d. Run the TFTP server on your computer by double-clicking the TFTP server
application.
f. Reset the security device when the upgrade is complete. Run the reset
command and enter y at the prompt to reset the device.
g. Wait a few minutes, and then log into the security device again. You can
verify the security device ScreenOS firmware version by using the get
system command.
5. Manually fail over the primary device to the backup device (CLI only).
Either command forces the primary device to step down and the backup
device to immediately assume the primary device role.
Before you begin, see “Requirements for Upgrading Device Firmware” on page 11.
Also make sure you download the ScreenOS 6.1.0 firmware (and intermediate
firmware, if required).
WARNING: Do not power off your security device while it is upgrading to new
firmware. Doing so could permanently damage the device.
b. Issue one of the following CLI commands. The command you need to run
depends on whether or not the preempt option is enabled on the master
device.
1. Go to Configuration > Update > Config File, and then click Save to
File.
2. Click Save in the File Download dialog box.
3. Navigate to the location where you want to save the configuration file
(cfg.txt), and then click Save.
f. Click Apply.
g. Click OK to continue.
h. Verify the version of the ScreenOS firmware, by logging into the security
device and locating the Device Information section of the WebUI page.
d. Run the TFTP server on your computer by double-clicking the TFTP server
application.
f. Reset the security device when the upgrade is complete. Run the reset
command and enter y at the prompt to reset the device.
g. Wait a few minutes, and then log into the security device again. You can
verify the security device ScreenOS firmware version by using the get
system command.
At this point, device B is the primary device for both VSD 0 and 1, and
device A is backup for both VSD 0 and 1.
1. Go to Configuration > Update > Config File, and then click Save to
File.
2. Click Save in the File Download dialog box.
3. Navigate to the location where you want to save the configuration file
(cfg.txt), and then click Save.
f. Click Apply.
g. Click OK to continue.
h. Verify the version of the ScreenOS firmware, by logging into the security
device and locating the Device Information section of the WebUI page.
d. Run the TFTP server on your computer by double-clicking the TFTP server
application.
f. Reset the security device when the upgrade is complete. Run the reset
command, and then enter y at the prompt to reset the device.
g. Wait a few minutes, and then log into the security device again. You can
verify the security device ScreenOS firmware version by using the get
system command.
Now device A is the primary device for VSD 0 and the backup for VSD 1,
and device B is the primary device for VSD 1 and the backup for VSD 0.
In ScreenOS 5.3.0 and later, some of the previous global settings are now
configured from within a profile context. For example, global commands such as
timeout and max-decompress-layer are no longer global; they are now set within
the profile for each protocol. Commands such as max-content-size and max-msgs,
which configure the embedded scan manager, are global and are now set using the
set av scan-mgr command.
When you upgrade to ScreenOS 5.3.0 or later, a scan manager profile named
scan-mgr is automatically generated to migrate the global scan-mgr commands.
The scan-mgr profile runs the following commands:
Table 2 shows the updated commands in ScreenOS 6.1.0. Updated commands are
now entered from within a policy context.
www.update.juniper-updates.net/AV/SSG5_SSG20/
www.update.juniper-updates.net/AV/SSG100/
www.update.juniper-updates.net/AV/SSG500/
www.update.juniper-updates.net/AV/SSG300/
If you have upgraded your ScreenOS release, you might want to check that the
pattern update URL has been modified by using the get av scan-mgr command. For
example: