Jweb SRX
Jweb SRX
Published
2023-07-10
ii
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc.
in the United States and other countries. All other trademarks, service marks, registered marks, or registered service
marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use
with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License
Agreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using such
software, you agree to the terms and conditions of that EULA.
iii
Table of Contents
About This Guide | xxviii
What is J-Web? | 2
Benefits of J-Web | 3
Log in to J-Web | 4
Explore J-Web | 39
Summary | 50
3 Dashboard
J-Web Dashboard | 55
Dashboard Overview | 55
4 Monitor
Network | 62
Monitor Interfaces | 62
Logs | 69
Monitor Session | 69
Monitor Threats | 75
Monitor ATP | 85
Monitor VPN | 90
Statistics | 120
Reports | 129
v
Overview | 130
5 Device Administration
Basic Settings | 144
Operations | 310
RPM | 338
Tools | 353
6 Network
Connectivity—Interfaces | 391
Connectivity—VLAN | 404
Connectivity—PPPoE | 420
Routing—Policies | 570
CoS—Schedulers | 607
Compliance | 715
Configure Captive Portal for Web Authentication and Firewall User Authentication | 753
Overview | 753
Workflow | 754
Step 4: Create Security Zones and Assign Interfaces to the Zones | 765
Step 5: Enable Web or Firewall User Authentication for Captive Portal in the Security Policy | 769
Step 6: Verify the Web Authentication and User Authentication Configuration | 776
Zones/Screens | 785
Services | 816
Schedules | 842
xxi
8 Security Services
Content Security Default Configuration | 854
Step 2a: Configure a URL Pattern List That You Want to Bypass | 874
Step 2b: Categorize the URLs That You Want to Allow | 876
Step 5: Assign the Content Security Policy to a Security Firewall Policy | 881
Allow or Block Websites by Using J-Web Integrated Content Security Web Filtering | 899
Step 2: Categorize the URLs That You Want to Allow or Block | 905
Step 6: Verify That the URLs Are Allowed or Blocked from the Server | 914
ALG | 1013
Use this guide to understand the Junos Web Device Manager, its capabilities, and features.
1 PART
Getting Started | 2
2
CHAPTER 1
Getting Started
IN THIS CHAPTER
Explore J-Web | 39
IN THIS SECTION
What is J-Web? | 2
Benefits of J-Web | 3
What is J-Web?
Juniper Networks SRX Series Firewalls are shipped with the Juniper Networks Junos operating system
(Junos OS) preinstalled.
• Junos OS CLI
The J-Web interface allows you to monitor, configure, troubleshoot, and manage your device by means
of a Web browser enabled with HTTP over Secure Sockets Layer (HTTPS) by default.
3
Benefits of J-Web
• Provides a simple user interface that enables new users to quickly become proficient.
• Enables effective threat management while producing detailed data access and user activity reports.
An action-oriented design enables the network administrator to detect threats across the network as
they occur, quickly block the traffic going to or coming from a specific region, and apply immediate
remedial action with a single click.
• Enables administrators to assess the effectiveness of each firewall rule and quickly identify the
unused rules, which results in better management of the firewall environment.
RELATED DOCUMENTATION
IN THIS SECTION
Log in to J-Web | 4
NOTE: By default, you establish a J-Web session through an HTTPS-enabled Web browser.
Microsoft ended Internet Explorer support in June 2022. Therefore, starting with Junos OS
Release 22.4R1 or later, J-Web UI is not supported in Internet Explorer.
Log in to J-Web
NOTE: This document assumes that you are accessing the device to launch J-Web for the first
time using a factory default configuration. If your SRX Series Firewall is already configured with a
management IP address, you simply point your browser to the device's management address to
access J-Web.
The factory default settings vary between SRX Series Firewalls. In addition, some SRX Series Firewalls
have interface while others use a revenue (network interface) port for Ethernet based management.
When running a factory default configuration SRX 300 and 500 Series devices typically provide DHCP
services on specific network interface ports that are enabled for host management access.
On SRX Series Firewalls with a dedicated management interface, DHCP services may or may not be
present in the factory default. Some devices provide DHCP server functions on the dedicated
management interface (fxp0). When using a device that does not offer DHCP services, for example an
SRX5400, you must ensure the management device has a compatible IP address. This address can be
manually assigned or be allocated by an external DHCP server on the management network.
Table 1 on page 4 provides the factory defaults relating to J-Web access for SRX Series Firewalls. If
your SRX Series Firewall is not listed, refer to the corresponding hardware guide for details on the
factory defaults.
SRX Series Firewall Management DHCP Server Ports DHCP Subnet J-Web Server IP
Interface
Table 1: SRX Series Firewall Factory Defaults Relating to J-Web Access (Continued)
SRX Series Firewall Management DHCP Server Ports DHCP Subnet J-Web Server IP
Interface
1. Connect the appropriate Ethernet network port on your device to the Ethernet port on the
management device (laptop or PC), using an RJ-45 cable. See Table 1 on page 4.
2. If you are using an SRX Series Firewall that provides DHCP services for the management device,
confirm that the management device successfully acquires an IP address from the SRX Series
Firewall. When using an SRX Series Firewall that does not provide DHCP services for the
management device, you must manually configure the management device with a compatible IP
address. See Table 1 on page 4.
3. Open a browser and enter https://<IP address> in the address bar.
Where, <IP address> is the IP address of the SRX Series Firewall.
6
As the device is running a factory default configuration, the J-Web Setup Wizard screen opens. See
Figure 1 on page 6.
Two examples are given to better illustrate the use of the information in Table 1 on page 4:
i. You connect your management PC, which is configured for DHCP address assignment, to
the fxp0 port, or to port ge-0/0/1 through ge-0/0/18.
i. You connect your management PC, which is statically configured with an IP address from
192.168.1.0/24 subnet, to the fxp0 port.
7
NOTE: The static IP address assignment cannot use 192.168.1.1 for fxp0 on the
management subnet as the SRX Series Firewall uses this IP address.
After a successful user login, J-Web opens the Basic settings page.
4. Optional. If you do not want to perform the initial configuration, then:
c. Click OK.
The password is committed to the device and the J-Web login page appears.
d. Enter the username and password again and click Log In.
NOTE: You can choose Device Administration > Reset Configuration through the J-Web
menu to reset and reconfigure the SRX Series Firewall.
Congratulations! Now that you have access to the J-Web interface, you are ready to use J-Web to
configure, manage, and monitor your SRX device.
• Get a quick overview of the J-Web user interface: "Explore J-Web" on page 39
• Use the setup wizard for initial configuration: "The J-Web Setup Wizard" on page 8
• Watch a Learning Bytes video showing J-Web usage on a vSRX Virtual Firewall: SRX J-Web Access
IN THIS SECTION
For information on how to start and access the J-Web user interface, see "Access the J-Web User
Interface" on page 3.
You can choose one of the following setup modes to configure the services gateway:
• Standalone mode—Configure your SRX Series Firewall to operate in a standalone mode. In this mode,
you can configure basic settings such as device credentials, time, management interface, zones and
interfaces, and DNS servers and default gateways.
9
• Cluster (HA) mode—Configure your SRX Series Firewall to operate in a cluster (HA) mode. In the
cluster mode, a pair of devices are connected together and configured to operate like a single node,
providing device, interface, and service level redundancy.
NOTE: You cannot configure Standalone or Passive mode when your device is in the HA
mode.
• Passive (Tap) mode—Configure your SRX Series Firewall to operate in a TAP mode. TAP mode allows
you to passively monitor traffic flows across a network. If IPS is enabled, then the TAP mode inspects
the incoming and outgoing traffic to detect the number of threats.
NOTE: SRX5000 line of devices, SRX4600, and vSRX Virtual Firewall devices do not support
the passive mode configuration.
• Flags any missing required configuration when you attempt to leave a page.
1. Select the configuration mode that you want to setup and click Start.
2. For standalone and passive (Tap) modes, complete the configuration according to the guidelines
provided in Table 3 on page 22.
If you select Cluster (HA) Mode, for the configuration information see "Configure Cluster (HA) Setup"
on page 164.
NOTE: The root password is mandatory in the setup wizard. All other options are optional. In
the passive mode, configuration of the management interface, Tap interface, and services are
mandatory.
3. Review the configuration details. If you want to change the configuration, click Edit Configuration,
else click Finish.
Wait till the configuration is committed. A successful message is displayed once the entire
configuration is committed to the device.
10
NOTE:
• If the commit fails, J-Web displays you the error message received from CLI and you
remain on the wizard’s last page. Check over your configuration and make changes as
necessary so that the commit succeeds.
• For SRX300 line of devices and SRX550M devices in passive mode, an additional message
is displayed about the device reboot if you have enabled Juniper ATP Cloud or Security
Intelligence services. For other SRX devices, the device will not reboot.
4. Read if any instructions are available and then click Open J-Web Login Page.
5. Enter the root username and password and click Log In.
Launch Pad screen appears until the J-Web UI is loaded. See "J-Web: A First Look" on page 40.
Table 2 on page 10 provide details on the configuration parameters used for initial setup.
Hostname SRX-300
Non root user (Admin/super user account) user "lab", password "Sample_psswd_for_doc-only!"
Refer to "Access the J-Web User Interface" on page 3 for information on how to access the J-Web
interface. This example is based on an SRX300. Based on the information in Table 1 on page 4, the
management device is set for DHCP is and is attached to the ge-0/0/1 interface. When running a
factory default configuration, the ge-0/0/1 interface is configured as a DHCP server and assigns an
address to the PC from the 192.168.1.0/24 subnet. To access J-Web in this scenario, you point the
browser to https://192.168.1.1.
1. We begin at the J-Web setup wizard screen. You click on the option for Standalone Mode and then
on the Start button.
12
2. Configure the device name, root user, and non-root (administrator) user login information on the
Device Credentials page.
3. Click Next.
4. Configure the timezone, time source, and in the case of NTP, the desired server(s).
14
5. Click Next.
6. Again, this setup example is based on a SRX 300 series device. This SRX Series Firewall does not
have a dedicated management interface. In many cases, their role in branch offices results in their
being managed remotely through the WAN interface (ge-0/0/0). On larger SRX devices, a dedicated
management interface (fxp0) is provided for attachment to an out-of-band (OOB) management
network. In this example, you configure the ge-0/0/1 interface as a dedicated OOB management
interface.
15
Before continuing, you click on the Access Protocols tab to confirm that HTTPS, SSH, and Ping
(ICMP echo) are permitted on the management interface.
16
7. Click Next.
8. In this example you maintain the factory default security policy. Recall, you can always use J-Web
to later modify all aspects of the configuration, to include security, after you complete the initial
setup.
17
9. Click Next.
10. Configure a public DNS server IP and leave the default gateway fields blank. If desired, you can add
default routes to access other networks that should be reachable over the management interface.
18
The Setup Wizard opens. This page summarizes your configuration. If desired, you use the Edit
Configuration option to make changes.
19
12. When satisfied with the configuration, click on Finish. The Setup Wizard displays a status page to
indicate the initial configuration is being pushed to the SRX device.
20
In a few moments, the Setup Successful page is displayed. Congratulations! Your SRX Series
Firewall is remotely accessible and is ready for ongoing management using the J-Web interface.
21
NOTE: Recall that in this SRX-300 based example the management device is directly
connected to the SRX on the ge-0/0/1 port. You performed initial configuration using a
192.168.1.0/24 address that was assigned by the SRX Series Firewall using DHCP.
Using the setup wizard, you configured the ge-0/0/1 interface as a dedicated management
interface and assigned a static IP address of 10.102.70.89/24. As a result, the ge-0/0/1
interface no longer functions as a DHCP server.
Once the new configuration is activated, you must ensure the management device is
configured with a compatible IP address if it remains directly connected to the ge-0/0/1
interface. You log in back into J-Web using https://10.102.70.89.
Congratulations! You have completed initial setup using J-Web. Keep going by visiting the below links:
• Get a quick overview of the J-Web user interface: "Explore J-Web" on page 39
Field Action
Device Credentials
System Identity
Root Account
SSH for root user Enable this option to allow the root login (to the device) using
SSH.
Admin Account
Field Action
Time Configuration
Time
• Manual > Date and time—Select the date and time (in
MM-DD-YYYY and HH:MM:SS 24-hour format) to
configure the system time manually.
Management Interface
NOTE: If you change the management IP address and click Next, a warning message appears on the Management
Interface page that you need to use the new management IP address to log in to J-Web because you may lose
the connectivity to J-Web.
24
Field Action
NOTE:
IPv4
NOTE: Click email to self to get the newly configured IPv4 or IPv6 address to your inbox. This is useful if you lose
connectivity when you change the management IP address to another network.
Management address Enter a valid IPv4 address for the management interface.
Management subnet mask Enter a subnet mask for the IPv4 address.
Static route Enter an IPv4 address for the static route to route to the
other network devices.
Static route subnet mask Enter a subnet mask for the static route IPv4 address.
25
Field Action
Next hop gateway Enter a valid IPv4 address for the next hop.
IPv6
Management access Enter a valid IPv6 address for the management interface.
Management subnet prefix Enter a subnet prefix length for the IPv6 address.
Static route Enter an IPv6 address for the static route if required to reach
the device through the management interface.
Static route subnet prefix Enter a subnet prefix length for the static route IPv6 address.
Next hop gateway Enter a valid IPv6 address for the next hop.
Access Protocols
NOTE: This option is available for all the ports except fxp0.
Field Action
Security Policy
NOTE: This option is available only for the Standalone mode. For the Passive (Tap) mode, this option is available
under Tap Settings.
From Zone Name of the source zone. In the standalone mode, permits all
traffic from the trust zone.
Zones
—Displays the available trust and untrust zones configuration.
Add Trust Zone Interface Click + to add trust zone interface. For more information on
the fields, see Table 4 on page 32.
Edit Trust Zone Interface Select an interface and click the pencil icon at the right
corner of the table to modify the configuration.
27
Field Action
Delete Trust Zone Interface Select an interface and click the delete icon at the upper-right
corner of the table.
Search Trust Zone Interface Click the search icon at the right corner of the table to
quickly locate a zone or an interface.
Detailed View Trust Zone Interface Hover over the interface name and click the Detailed View
icon to view the zone and interface details.
Zone name View the trust zone name populated from your device factory
default settings.
System services Enable this option for the types of traffic that can reach the
device on a particular interface.
Application tracking Enable this option to collect byte, packet, and duration
statistics for application flows in the specified zone.
28
Field Action
Source identity log Enable this option for the device to log the user identity
information based on the source zone configured in the
security policy.
Add Untrust Zone Interface Click + to add untrust zone interface. For more information
on the fields, see Table 5 on page 38.
Edit Untrust Zone Interface Select an interface and click the pencil icon at the right
corner of the table to modify the configuration.
Delete Untrust Zone Interface Select an interface and click the delete icon at the upper-right
corner of the table.
Search Untrust Zone Interface Click the search icon at the upper-right corner of the table to
quickly locate a zone or an interface.
Detailed View Untrust Zone Interface Hover over the interface name and click the Detailed View
icon to view the zone and interface details.
Zone name View the untrust zone name populated from your device
factory default settings.
Field Action
Application tracking Enable this option to collect byte, packet, and duration
statistics for application flows in the specified zone.
Source identity log Enable this option for the device to log the user identity
information based on the source zone configured in the
security policy.
DNS Servers
DNS server 1 Enter the IPv4 or IPv6 address of the primary DNS.
DNS server 2 Enter the IPv4 or IPv6 address of the secondary DNS.
Default Gateway
Default gateway (IPv4) Enter the IPv4 address of the next possible destination for
any network.
Default gateway (IPv6) Enter the IPv6 address of the next possible destination for
any network.
Tap Settings
NOTE: This option is available only for the Passive (Tap) mode.
Tap Settings
IP-IP tunnel inspection Enable this option for the SRX Series Firewall to inspect pass
through traffic over an IP-IP tunnel.
30
Field Action
GRE tunnel inspection Enable this option for the SRX Series Firewall to inspect pass
through traffic over a GRE tunnel.
From Zone Name of the source zone. In the Tap mode, permits all traffic
from the tap zone.
To Zone Name of the destination zone. In the Tap mode, permits all
traffic from the TAP zone to the TAP zone.
Content Security
Content Security Enable this option for configuring Content Security services.
License Enter Content Security license key and click Install License to
add a new license.
NOTE:
Field Action
• Web Filtering
• Antivirus
• Antispam
IPS
License Enter the license key and click Install License to add a new
license.
IPS signature Click Browse to navigate to the IPS signature package folder
and select it. Click Install to install the selected IPS signature
package.
ATP Cloud
32
Field Action
ATP Cloud Enable this option to use Juniper ATP Cloud services.
Security Intelligence
User Firewall
Field Action
General
33
Field Action
NOTE: This option will be available for only SRX300 line of devices,
SRX550M, and SRX1500 devices. For SRX5000 line of devices,
SRX4100, SRX4200, SRX4600, and vSRX Virtual Firewall devices,
the Type (family) field is not available.
Interfaces Select an interface from the Available column and move it to the
Selected column.
NOTE: This option is available only for the Switching family type.
VLAN
NOTE: This option is available only for the Switching family type.
Field Action
IPv4
IPv4 address Enter a valid IPv4 address for the switching or the routing interface.
IPv6
IPv6 address Enter a valid IPv6 address for the switching or the routing interface.
DHCP local server Enable this option to configure the switch to function as an extended
DHCP local server.
Pool start address Enter the starting IPv4 address of the DHCP server pool address range.
This address must be within the IPv4 network.
Pool end address Enter the ending IPv4 address of the DHCP server pool address range.
This address must be within the IPv4 network.
NOTE: This address must be greater than the address specified in Pool
start address.
Propagate settings from Select an option from the list. Propagation of TCP/IP settings (such as,
DNS and gateway address) received on the device interface acting as
DHCP client.
Field Action
System Services Select system services from the list in the Available column and then
click the right arrow to move it to the Selected column.
• ident-reset—Specify the send back TCP RST IDENT request for port
113.
Field Action
Field Action
Protocols Select protocols from the list in the Available column and then click the
right arrow to move it to the Selected column.
• router-discovery—Router Discovery.
Field Action
General
Address Mode Select an address mode for the interface. The available
options are DHCP Client, PPPoE (PAP), PPPoE (CHAP)
and Static IP.
IPv4
NOTE: This option is available only for the Static IP address mode.
Field Action
IPv6
NOTE: This option is available only for the Static IP address mode.
System Services Select system services from the list in the Available
column and then click the right arrow to move it to the
Selected column.
SEE ALSO
Explore J-Web | 39
Explore J-Web
IN THIS SECTION
Summary | 50
• Launch pad—Displays high level details of the system identification, active users, and interface status.
See Figure 14 on page 41.
• Side pane—Displays subtasks of the Dashboard, Monitor, Device Administration, Network, Security
Policies and Objects, and Security Services tasks currently displayed in the main pane. Click an item
to access it in the main pane.
• Main pane—Location where you monitor, configure, view or generate reports, and administrate the
Juniper Networks device by entering information in text boxes, making selections, and clicking
buttons.
• Device information such as model number, serial number, hostname, software version, system time,
and system up time.
41
The launch pad closes automatically once the application is loaded in the background. You do not have
the option to manually close or refresh the launch pad.
NOTE:
Figure 14 on page 41 shows the launch pad screen and its elements.
Element Description
Element Description
Element Description
The following tabs across the side pane of the J-Web GUI provide workspaces in which an administrator
can perform specific tasks:
• Dashboard—The Dashboard is the main page for J-Web. You can customize the workspace in your
Dashboard by adding widgets from the carousel. The placement of, and settings within, widgets are
45
saved so that anything from device information to firewall event information or from top blocked
viruses to live threat maps can be unique for each user. Once you decide on the widgets that you
want to see, you can minimize the carousel to regain some screen space.
NOTE: By default, the selected widgets are displayed every time you login to J-Web.
• Configure—The highlighted workspace in Figure 17 on page 47 is where all of the SRX Series
Firewall configuration happens. You can configure the following features for managing your network
security:
• Network—Such as connectivity, DHCP, firewall filters, NAT, routing, Class of Services (CoS),
Application QoS, IPsec VPN, manual key VPN, and dynamic VPN.
• Security policies and objects—Such as security policies, zones/screens, zone and global addresses,
services, dynamic applications, application tracking, schedules, and proxy profiles.
• Security services—Such as Content Security, IPS, ALG, ATP, SSL profiles, firewall authentication,
and ICAP redirect.
Element Description
Element Description
Element Description
NOTE: PPPoE and NAT Wizards are available only in the SRX300 line of devices and SRX550M
devices.
Summary
J-Web is a GUI approach that aims to provide a graphical framework to help you visualize and manage
your SRX Series Firewalls more easily.
SEE ALSO
You can add your SRX Series Firewall to Juniper Security Director Cloud from J-Web. After you add the
SRX Series Firewall to the Juniper Security Director Cloud, you can manage your network security using
these devices.
In order for your device to be managed by Juniper Security Director Cloud, ensure the following:
• Your device must have Internet connectivity and access to the Juniper Security Director Cloud portal.
• Before adding, you must open the following ports of your device so that it communicates with
Juniper Security Director Cloud:
• TCP/443 (HTTPS) for Juniper Security Director Cloud portal and Redirect server
• TCP/7804 (NETCONF) for SRX Series Firewall outbound access to Juniper Security Director
Cloud portal
Here’s how you can add your device to Juniper Security Director Cloud from J-Web:
1. Login to J-Web.
2. Click Add Device to Juniper Security Director Cloud located on the upper-right corner of the J-Web
GUI to open the Add Device to Juniper Security Director Cloud page.
3. Select your location from the list and then enter your Juniper Security Director Cloud account email
and password. Then, click Next.
4. Select your organization account name (with administrator permissions) and click Proceed.
The status progress bar is shown until your device is successfully added. During this process, your
device gets added to the Juniper Security Director Cloud and commits the received configuration
from the Cloud API.
A success message is displayed and your device is added to Juniper Security Director Cloud. The label
next to the icon changes from Add Device to Juniper Security Director Cloud to Manged by Juniper
Security Director Cloud and the changed label is grayed out.
NOTE:
53
• When you have logged into the J-Web and remove your device from Juniper Security
Director Cloud, J-Web still displays the status as Manged by Juniper Security Director Cloud.
Log in to J-Web again to see the label changed to Add Device to Juniper Security Director
Cloud.
• If there are any network issues between the SRX Series Firewall and Juniper Security Director
Cloud, J-Web still displays the status as Manged by Juniper Security Director Cloud.
Once added, you can see your device on the Device Management > Devices page when you log into the
Juniper Security Director Cloud portal. You can only delete your device from Juniper Security Director
Cloud and not from the J-Web GUI. To remove the device, select your device on the Devices page and
click the delete icon.
RELATED DOCUMENTATION
Dashboard Overview | 55
3 PART
Dashboard
J-Web Dashboard | 55
55
CHAPTER 2
J-Web Dashboard
IN THIS CHAPTER
Dashboard Overview | 55
Dashboard Overview
IN THIS SECTION
To use the dashboard at the top-level menu, select Dashboard. By default, the Dashboard page displays
all the widget thumbnails.
You can choose any one of the categories to view widgets on your device:
NOTE:
• Starting in Junos OS Release 21.4R1, on-box reports related widgets are removed to speed up
the J-Web UI loading process.
• The Threat Activity pane is not available on SRX5400, SRX5600, and SRX5800 devices.
• For SRX Series Firewalls configured for logical systems, the Logical System Identification and
Logical System Profile panes are displayed when you log in as a user logical system
administrator. These are the only logical system panes available in Dashboard Preferences.
57
• If the rescue configuration is not set, the set rescue configuration link directs you to the
Device Administration > Configuration Management > Rescue page to set the rescue
configuration.
1. Drag the widgets from the palette or thumbnail container to your dashboard.
When you add more widgets on the J-Web Dashboard, you can observe high CPU usage on the
Routing Engine for a short span of time on every refresh. We recommend that you use four widgets
for lower CPU consumption.
2. Mouse over the top of each widget to minimize, refresh, and close by using the respective icons.
NOTE: The dashlet data is refreshed every minute by default. You cannot manually configure
the refresh interval of the dashlet. If the data is not aged in the cache, data loads from the
cache during the dashlet refresh. If the data is aged, it is retrieved from the device during the
next refresh interval cycle.
Table 8 on page 57 provides the dashboard widgets options based on the selected device.
Field Description
System Alarms Provides the received time, severity, description of the alarms and the action to be
taken.
System Identification Provides system details such as serial number of the software, hostname, software
version, BIOS version, system uptime, and system time.
Login Sessions Provides the user credentials, login time, idle time, and host.
File Usage Provides current space requirements for log, temporary, crash, and database files. Click
Maintain to download or delete some or all of these files.
NOTE: File Usage widget supports RE3 line cards for SRX5000 line of devices.
58
Field Description
Resource Utilization Provides a graphical representation of the CPU, memory, and storage used for both
the data and the control planes. The CPU control also shows the load average value
for 1 minute when you mouse over CPU Control.
NOTE: Resource Utilization widget supports RE3 line cards for SRX5000 line of
devices.
Interface: Most Displays top 5 interfaces based on the CLI response; top-count will increase to 10.
Dropped Packets
Security Resources Provides the maximum, configured, and activated number of sessions, firewall/VPN
policies, and IPsec VPNs.
Storage Usage Displays used and available storage and usage information about other system
components.
Logical System Provides the logical system name, the security profile assigned to the logical system,
Identification the software version, and the system time.
Logical System Profile Displays the types of resources that are allocated to the user logical system, the
number of resources used and reserved, and the maximum number of resources
allowed.
Field Description
IPsec VPNs (IKE Peers) Displays status count of IPsec VPN topologies, such as ADVPN Hub and Spoke,
Remote Access, and Site-to-Site/Hub & Spoke.
Click More Details to redirect to the Monitor > Network > IPsec VPN page.
VPN Monitoring Displays the total number of IPsec VPNs (Total VPNs for All VPNs and total remote
users for Remote Access). All VPNs option includes Site to Site, Hub & Spoke, ADVPN
Hub, and ADVPN spoke. Remote Access includes Juniper Secure Connect and NCP
Exclusive Entry Client.
Widget pane also displays the VPNs status with a color code:
Click More Details available on the widget pane to redirect to the Monitor > Network
> IPsec VPN page.
On the widget pane, for the All VPNs option, each configured IPsec VPN is
represented as an individual tunnel icon or box.
On the widget pane, for the Remote Access option, each IKE SAs corresponding to the
configured IPsec VPN is represented as an individual tunnel icon or box. If there are no
IKE SAs for the VPN, then a single box is shown as down.
When you hover over the box, widget displays VPN tunnel details such as Remote
gateway, VPN name, IKE status, IPsec status, local IP, and remote IP. Click More
Details to redirect to the Monitor > Network > IPsec VPN page with the VPN name
filtered.
Zones: Most Bandwidth Displays zones with maximum throughput rate in bytes, sorted by incoming and
By Bytes outgoing bytes.
Zones: Most Dropped Displays firewall zones with maximum number of packet drops, sorted by count.
Packets
60
Field Description
Top Scanned File Displays top scanned files for malware. These files can be executable files, archived
Categories files, or libraries.
4 PART
Monitor
Network | 62
Logs | 69
Statistics | 120
Reports | 129
62
CHAPTER 3
Network
IN THIS CHAPTER
Monitor Interfaces | 62
Monitor Interfaces
Use this page to view general information about all physical and logical interfaces for a device.
Field Description
Show Interfaces Select All or any particular slot to show the interface
details.
Auto Refresh Frequency Indicates the duration of time after which you want the
data on the page to be refreshed automatically.
63
Field Description
RELATED DOCUMENTATION
Monitor Session | 69
You are here: Monitor > Network > DHCP Server Bindings.
Use this page to view information about dynamic and static DHCP leases, conflicts, pools, and statistics.
Table 10 on page 64 describes the fields on the DHCP Server Bindings page.
64
Field Description
DHCP Interface Details Displays the interface on which the DHCP server is configured.
State State of the address binding table on the extended DHCP local server:
• FORCE RENEW—Client has received the FORCE RENEW message from the server.
• INIT—Initial state.
Lease Time Remaining Displays the time (in hours and minutes) at which the lease expires.
DHCP Interface Displays the interface on which the request was received.
RELATED DOCUMENTATION
Use the monitoring functionality to view information of IKE, IPsec configuration, Security Associations
(SA), and Statistics in a tabular format that includes sortable columns. A VPN provides a means by which
remote computers communicate securely across a public WAN such as the Internet. IPsec VPN is a
protocol that consist set of standards used to establish a VPN connection.
Field Description
IPsec Statistics list menu Displays summary of the global IPsec VPN or selected
IPsec VPN statistics.
Clear SA list menu Displays the options Clear All SAs or Clear Selected SA
to clear SAs.
If you choose Clear All SAs, then you can select Clear
All IKE SAs, Clear All IPsec SAs, or Clear All IKE & IPsec
SAs.
Search You can search and filter either the remote gateway or
the VPN name.
Field Description
IPsec Soft Life Displays the soft lifetime (in seconds) which indicates
that the IPsec key management system that the SA is
about to expire.
Field Description
IKE Initiator Cookie Random number, called a cookie, which is sent to the
remote node when the IKE negotiation is triggered.
IKE Responder Cookie Random number generated by the remote node and
sent back to the initiator as a verification that the
packets are received.
Field Description
Peer IKE-ID Displays the IKE IDs for the local or remote devices.
Remote User Displays the remote IKE identity to exchange with the
destination peer to establish communication.
RELATED DOCUMENTATION
Monitor Session | 69
69
CHAPTER 4
Logs
IN THIS CHAPTER
Monitor Session | 69
Monitor Threats | 75
Monitor ATP | 85
Monitor VPN | 90
Monitor Session
Use the monitoring functionality to view the firewall events or sessions that occurred during the time
period specified.
NOTE: Session page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
Field Description
Last Select the time from the list to view the activity that you are most interested in. Once
you select the time, all the data presented in your view refreshes automatically.
You can also use Customize to set a custom date and click Apply to view the specified
session logs.
More • View PCAP Counters—View packet capture (PCAP) counter statistics for unknown
application traffic. Click Clear Counters to reset all the packet capture counters value
of the unknown application traffic to zero.
• Delete PCAP Files—Select this option to permanently delete all the available PCAP
files on your device.
Refresh Click the refresh icon to get the latest session information.
Show Hide Columns The three vertical dots represents this icon.
Export to CSV You can export the session data to a comma-separated value (.csv) file.
Select the three vertical dots on the right-side of the page and then click Export to CSV.
The CSV file is downloaded to your local machine. You can download only maximum of
100 sessions data.
71
Field Description
Filter Criteria Use the filter text box present above the table grid. The search includes the logical
operators as part of the filter string.
NOTE: Starting in Junos OS 23.1R1 Release, J-Web supports the following operators:
• = (equal to)
• AND
• Nested and/or
In the filter text box, when you hover over the icon, it displays an example filter
condition. When you start entering the search string, the icon indicates whether the filter
string is valid or not.
• Source IP
• Destination IP
• Session ID
• Log type
• User
• Application
• Source Zone
• Destination Zone
• Source Country
• Destination Country
72
Field Description
• Source Port
• Destination Port
• Protocol
Save Filter Click Save Filter to save filters after you specify the filtering criteria.
To save a filter:
1. Enter the filter criteria you are looking for in the advanced search box.
3. Enter a name for the filter and click the tick icon to save it.
Hover over the saved filter name to view the query expression. You can delete the saved
filter using the delete icon.
View Details When you hover over the PCAP file, a Detailed View icon appears before the PCAP file.
Click the icon to view the log details on the Detailed Log View page.
Click on the download icon in the Detailed Log View page to download the packet
capture file of an unknown application traffic. The session ID available in the file name
identifies the PCAP file.
NOTE: If the files are not available, the download fails and you will receive an error
message.
PCAP Click on the download icon to download the packet capture (PCAP) file of an unknown
application traffic. The download icon appears only if a packet captured for the session
log type close.
The session ID available in the file name identifies the PCAP file.
NOTE: If the files are not available, the download fails and you will receive an error
message.
73
Field Description
Source IP Displays the source IP address from where the session occurred.
User Displays the username from whom the session log is generated.
Application Displays the application name from which the session logs are generated.
Action Displays the action taken for the event: warning, allow, and block.
NAT Source IP Displays the translated (or natted) source IP address. It can contain an IPv4 or an IPv6
addresses.
NAT Destination IP Displays the translated (also called natted) destination IP address.
74
Field Description
Closure Reason Displays the reason for the log generation. For example, a connection tear down may
have an associated reason such as authentication failed.
Packets From Client Displays the number of packets received from the client.
Bytes From Client Displays the number of bytes received from the client.
Packets From Server Displays the number of packets received from the server.
Bytes From Server Displays the number of bytes received from the server.
Elapsed Time Displays the time elapsed since the last time interval began.
RELATED DOCUMENTATION
Monitor Threats | 75
75
Monitor Threats
Use the monitoring functionality to view the security threats. Threats are defined as any IPS, screen,
security intelligence, antivirus, content filtering, or antispam.
NOTE: Threat page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
Field Description
Last Select the time from the list to view the activity that you are most interested in. Once the
time is selected, all of the data presented in your view is refreshed automatically.
You can also use Customize to set a custom date and click Apply to view the specified
threats.
Refresh Click the refresh icon to get the latest threat information.
Export to CSV You can export the threats data to a comma-separated value (.csv) file.
Select the three vertical dots on the right-side of the page and click Export to CSV. The
CSV file is downloaded to your local machine. You can download only maximum of 100
sessions data.
76
Field Description
Filter Criteria Use the filter text box present above the table grid. The search includes the logical
operators as part of the filter string.
NOTE: Starting in Junos OS 23.1R1 Release, J-Web supports the following operators:
• = (equal to)
• AND
• Nested and/or
In the filter text box, when you hover over the icon, it displays an example filter
condition. When you start entering the search string, the icon indicates whether the filter
string is valid or not.
• Source IP
• Destination IP
• Session ID
• Log type
• User
• Application
• Source Zone
• Destination Zone
• Source Country
• Destination Country
77
Field Description
• Source Port
• Destination Port
• Protocol
Save Filter Click Save Filter to save filters after you specify the filtering criteria.
To save a filter:
1. Enter the filter criteria you are looking for in the advanced search box.
3. Enter a name for the filter and click the tick icon to save it.
Hover over the saved filter name to view the query expression. You can delete the saved
filter using the delete icon.
78
Field Description
View Details When you hover over the PCAP file, a Detailed View icon appears before the PCAP file.
Click the icon to view the log details on the Detailed Log View page.
Click on the download icon on the Detailed Log View page to download the packet
capture file. If the files are not available, the download fails and you will receive an error
message.
NOTE: The download icon will only be available for the IPS attack logs.
To view the packet capture data on the Threats page, ensure that attack logging
notification is enabled. If not:
2. Click the add icon (+) on the upper right side of the Policy page.
4. Click Advanced and select the check box to configure Enable Attack Logging under
Notification.
PCAP Click on the download icon to download the packet capture (PCAP) file of IPS attacks.
NOTE: The download icon appears only for the IPS attack logs.
The PCAP file will be downloaded to your system from the /var/log/pcap/ folder. If the
files are not available, the download fails and you will receive an error message.
Time Displays the time when the threats log was received.
Log Type Displays the threats log type. For example, IPS, Antivirus, Antispam, and so on.
Field Description
Source IP Displays the source IP address from where the threats log occurred.
User Displays the username from whom the threat log is generated.
Application Displays the nested application or application name from which the threats are
generated.
URL Displays the accessed URL name that triggered the event.
Field Description
Policy Displays the policy name that triggered the threats log.
CVE-ID Displays the Common Vulnerabilities and Exposures (CVE) identifiers information for the
threat.
Elapsed Time Displays the time elapsed since the last time interval began.
Packet Log ID Displays the packets ID received before and after the attack for further offline analysis of
attacker behavior.
XFF Displays X-Forwarded-For (XFF) header added to packets by a proxy server that includes
the real IP address of the client making the request.
Argument Displays the arguments that are passed to an event when it is invoked from the threats
log.
Source Name Displays the name of the source from where threat is originated.
Message Type Displays the message type for the threat detected.
81
Field Description
RELATED DOCUMENTATION
Use this page to view information about the Web filtering events based on web filtering policies, filter
options, and grid elements of Web filtering events.
NOTE: Web Filtering page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
Field Description
Last Select the time from the list to view the activity that you are most interested in. Once the
time is selected, all of the data presented in your view is refreshed automatically.
You can also use Customize to set a custom date and click Apply to view the specified
Web filtering event logs.
Refresh Click the refresh icon to get the latest Web filtering event information.
82
Field Description
Export to CSV You can export the Web filtering event data to a comma-separated value (.csv) file.
Select the three vertical dots on the right-side of the page and click Export to CSV. The
CSV file is downloaded to your local machine. You can download only maximum of 100
sessions data.
83
Field Description
Filter Criteria Use the filter text box present above the table grid. The search includes the logical
operators as part of the filter string.
NOTE: Starting in Junos OS 23.1R1 Release, J-Web supports the following operators:
• = (equal to)
• AND
• Nested and/or
In the filter text box, when you hover over the icon, it displays an example filter condition.
When you start entering the search string, the icon indicates whether the filter string is
valid or not.
• Source IP
• Destination IP
• Session ID
• Log type
• User
• Application
• Source Zone
• Destination Zone
• Source Country
• Destination Country
84
Field Description
• Source Port
• Destination Port
Save Filter Click Save Filter to save filters after you specify the filtering criteria.
To save a filter:
1. Enter the filter criteria you are looking for in the advanced search box.
3. Enter a name for the filter and click the tick icon to save it.
Hover over the saved filter name to view the query expression. You can delete the saved
filter using the delete icon.
Time Displays the time when the Web filtering event log was received.
Source Zone Displays the source zone of the Web filtering event.
Source IP Displays the source IP address from where the Web filtering event occurred.
User Displays the username from whom the Web filtering event log is generated.
Destination Zone Displays the destination zone of the Web filtering event.
Field Description
Destination Port Displays the destination port of the Web filtering event.
Application Displays the application name for which the Web filtering event logs are generated.
Action Displays the action taken for the event: deny, permit, or redirect.
Session ID Displays the traffic session ID of the Web filtering event log.
Closure Reason Displays the reason for the Web filtering event log generation closure.
URL Category Risk Displays the Web filtering URL risk level.
URL Displays the accessed URL name that triggered the event.
Obj Displays the object name of the Web filtering event log.
RELATED DOCUMENTATION
Monitor ATP | 85
Monitor ATP
Use the monitoring functionality to view the ATP page. Analyzing the Juniper ATP logs yields
information such as malware name, action taken, infected host, source of an attack, and destination of
an attack.
NOTE: ATP page is available on all the SRX Series Firewalls except the SRX5000 line of devices.
Field Description
Last Select the time from the list to view the activity that you are most interested in. Once the
time is selected, all of the data presented in your view is refreshed automatically.
You can also use Customize to set a custom date and click Apply to view the specified ATP
logs.
Refresh Click the refresh icon to get the latest ATP log information.
Export to CSV You can export the ATP log data to a comma-separated value (.csv) file.
Select the three vertical dots on the right-side of the page and click Export to CSV. The
CSV file is downloaded to your local machine. You can download only maximum of 100
ATP log data.
87
Field Description
Filter Criteria Use the filter text box present above the table grid. The search includes the logical
operators as part of the filter string.
NOTE: Starting in Junos OS 23.1R1 Release, J-Web supports the following operators:
• = (equal to)
• AND
• Nested and/or
In the filter text box, when you hover over the icon, it displays an example filter condition.
When you start entering the search string, the icon indicates whether the filter string is
valid or not.
• Source IP
• Destination IP
• Session ID
• Log type
• User
• Application
• Source Zone
• Destination Zone
• Source Country
• Destination Country
88
Field Description
• Source Port
• Destination Port
• Protocol
Save Filter Click Save Filter to save filters after you specify the filtering criteria.
To save a filter:
1. Enter the filter criteria you are looking for in the advanced search box.
3. Enter a name for the filter and click the tick icon to save it.
Hover over the saved filter name to view the query expression. You can delete the saved
filter using the delete icon.
Time Displays the time when the ATP log was received.
Log Type Displays the ATP log type: Action, Malware event, SMTP action, and IMAP action.
Source IP Displays the source IP address from where the ATP log occurred.
Field Description
Application Displays the application name from which the ATP logs are generated.
Action Displays the action taken from the event: log, permit, and log and permit.
List Hit Displays the number of times the C&C server has attempted to contact hosts on your
network.
URL Displays the accessed URL name that triggered the event.
Sample SHA256 Displays the SHA-256 hash value of the downloaded file.
File Hash Lookup Displays the hash of the file sent for matching against known malware.
File Name Displays the name of the file, including the extension.
Protocol Displays the protocol that the C&C server used to attempt communication.
File Category Displays the type of file. Examples: PDF, executable, document.
Hostname Displays the hostname of device that downloaded the possible malware.
Field Description
RELATED DOCUMENTATION
Monitor VPN | 90
Monitor VPN
Use the monitoring functionality to view comprehensive stream log details of VPN in a tabular format
that includes sortable columns. A VPN provides a means by which remote computers communicate
securely across a public WAN such as the Internet.
NOTE: VPN page is available on all the SRX Series Firewalls except the SRX5000 line of devices.
Field Description
Last Select the time from the list to view the activity that you are most interested in. Once the
time is selected, all of the data presented in your view is refreshed automatically.
You can also use Customize to set a custom date and click Apply to view the specified
VPN events.
Refresh Click the refresh icon at the upper-right corner to display the fresh content.
Export to CSV You can export the VPN data to a comma-separated value (.csv) file.
Select the three vertical dots on the right-side of the page and click Export to CSV. The
CSV file is downloaded to your local machine. You can download only maximum of 100
VPN data.
Filter Criteria Use the filter text box present above the table grid. The search includes the logical
operators as part of the filter string.
NOTE: Starting in Junos OS 23.1R1 Release, J-Web supports the following operators:
• = (equal to)
• AND
• Nested and/or
In the filter text box, when you hover over the icon, it displays an example filter condition.
When you start entering the search string, the icon indicates whether the filter string is
valid or not.
Field Description
Save Filter Click Save Filter to save filters after you specify the filtering criteria.
To save a filter:
1. Enter the filter criteria you are looking for in the advanced search box.
3. Enter a name for the filter and click the tick icon to save it.
Hover over the saved filter name to view the query expression. You can delete the saved
filter using the delete icon.
Time Displays the time when the VPN log was received.
• Bad SPI
• Replay
• PV decryption
• PV encryption
• PV sm keygen
• PV replay
• AUTH fail
• D3P ERR
Interface Name Displays the external interface name for the VPN.
93
Field Description
Source IP Displays the source IP address from where the VPN connection is established.
Sequence Number Displays the sequence number of the packets sent for the VPN event.
RELATED DOCUMENTATION
Use this page to view event details associated with session, content filtering, antispam, antivirus, IPS,
screen, security intelligence, Web filtering, ATP, and VPN.
NOTE: All Events page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
94
Field Description
Last Select the time from the list to view the activity that you are most interested in. Once
the time is selected, all of the data presented in your view is refreshed automatically.
You can also use Customize to set a custom date and click Apply to view the specified
event logs.
Refresh Click the refresh icon to get the latest event information.
Export to CSV You can export the event data to a comma-separated value (.csv) file.
Select the three vertical dots on the right-side of the page and click Export to CSV. The
CSV file is downloaded to your local machine. You can download only maximum of 100
event data.
95
Field Description
Filter Criteria Use the filter text box present above the table grid. The search includes the logical
operators as part of the filter string.
NOTE: Starting in Junos OS 23.1R1 Release, J-Web supports the following operators:
• = (equal to)
• AND
• Nested and/or
In the filter text box, when you hover over the icon, it displays an example filter
condition. When you start entering the search string, the icon indicates whether the
filter string is valid or not.
• Source IP
• Destination IP
• Session ID
• Log type
• User
• Application
• Source Zone
• Destination Zone
• Source Country
• Destination Country
96
Field Description
• Source Port
• Destination Port
• Protocol
Save Filter Click Save Filter to save filters after you specify the filtering criteria.
To save a filter:
1. Enter the filter criteria you are looking for in the advanced search box.
3. Enter a name for the filter and click the tick icon to save it.
Hover over the saved filter name to view the query expression. You can delete the saved
filter using the delete icon.
View Details When you hover over the PCAP file, a Detailed View icon appears before the PCAP file.
Click the icon to view the log details on the Detailed Log View page.
Click on the download icon on the Detailed Log View page to download the packet
capture file. If the files are not available, the download fails and you will receive an error
message.
NOTE: The download icon will only be available for the IPS attack logs and session close
logs.
PCAP Click the download icon to download the packet capture file.
The PCAP file will be downloaded to your system from the /var/log/pcap/ folder. If the
files are not available, the download fails and you will receive an error message.
NOTE: The download icon will only be available for the IPS attack logs and session close
logs.
97
Field Description
Time Displays the time when the event log was received.
Source IP Displays the source IP address from where the event occurred.
Application Displays the application name for which the event logs are generated.
Action Displays the action taken for the event: warning, allow, and block.
NAT Source IP Displays the translated (or natted) source IP address. It can contain IPv4 or IPv6
addresses.
NAT Destination IP Displays the translated (also called natted) destination IP address.
Field Description
User Displays the username from whom the event log is generated.
Closure Reason Displays the reason for the log generation. For example, a connection tear down may
have an associated reason such as authentication failed.
Packets From Client Displays the number of packets received from the client.
Bytes From Client Displays the number of bytes received from the client.
Packets From Server Displays the number of packets received from the server.
Bytes From Server Displays the number of bytes received from the server.
Elapsed Time Displays the time elapsed since the last time interval began.
Message Type Displays the message type for the event detected.
Field Description
CVE-ID Displays the Common Vulnerabilities and Exposures (CVE) identifiers information.
Packet log ID Displays the packets ID received before and after the attack for further offline analysis of
attacker behavior.
XFF Displays the X-Forwarded-For (XFF) header added to packets by a proxy server that
includes the real IP address of the client making the request.
Argument Displays the arguments that are passed from the event log.
Hostname Displays the hostname of device that downloaded the possible malware.
File Category Displays the type of file. Examples: PDF, executable, document.
List Hit Displays the number of times the C&C server has attempted to contact hosts on your
network.
File Hash Lookup Displays the hash of the file sent for matching against known malware.
100
Field Description
Sample SHA256 Displays the SHA-256 hash value of the downloaded file.
File Name Displays the name of the file, including the extension.
URL Displays the accessed URL name that triggered the event.
URL Category Risk Displays the Web filtering URL category risk level.
Source Name Displays the name of the source from where event is originated.
RELATED DOCUMENTATION
Monitor System
NOTE: Starting in Junos OS Release 23.2R1, J-Web supports new System sub-menu under
Monitor menu. This sub-menu is not supported for SRX300 line of Firewalls and SRX550HM
Firewall.
Use this page to view information about system events such as routine operations, failure and error
conditions, and emergency or critical conditions.
Field Description
Show logs of file Select the system log file name to view logs.
Duration Select the time from the list to view the activity that
you are most interested in. Once you select the time,
all the data presented in your view refreshes
automatically.
Field Description
Refresh Click the refresh icon to get the latest system logs
information.
Filter Criteria In the filter text box, when you hover over the icon, it
displays an example filter condition. When you start
entering the search string, the icon indicates whether
the filter string is valid or not.
• Event
• Message
Time Displays the date and time when the log was received.
Detailed View When you hover over the selected system log file, a
Detailed View icon appears before the system log file.
Click the icon to view the log details on the System Log
Details page.
RELATED DOCUMENTATION
Monitor Alarms
Use this page to view the alarms details such as time, severity, type, and descriptions of the alarm.
Field Description
Filter Criteria Enter or select the criteria or parameter on which you want to construct the filter
statement.
Time Displays the date and time that the alarm was registered.
• System—System alarms include FRU detection alarms (power supplies removed, for
instance).
Field Description
Description Displays the brief synopsis of the alarms you want to monitor.
RELATED DOCUMENTATION
CHAPTER 5
IN THIS CHAPTER
IN THIS SECTION
You are here: Monitor > Maps and Charts > Traffic Map.
NOTE: Traffic Map page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
J-Web supports monitoring traffic through a map. Use this page to visualize inbound and outbound
traffic between geographic regions. You can click or hover over the bubble to view more details on the
inbound or outbound traffic. The size of the bubble indicates the session count or the bandwidth
utilization for a traffic. Traffic with unknown geographical IP addresses and private IP addresses are
displayed as question mark icon and lock icon, respectively.
106
NOTE: To view the data on the Traffic Map page, ensure that security logging is enabled. If not,
go to Device Administration > Basic Settings > Security Logging and enable Stream mode Logging
and On-box reporting.
The color code of the bubble indicates the risk associated with the application. Table 20 on page 106
shows the application risk categories and the risk values.
Critical >=5
You can calculate the average risk value using the following formula:
Average risk value for a country = Application risk total / Session count total
Field Descriptions
Table 21 on page 107 displays the fields of the Traffic Map page.
107
Field Description
Inbound Traffic Displays the traffic coming through the device from the source countries.
Outbound Traffic Displays the traffic goes through the device to the destination countries. This is the default
value.
Top Sources Displays the top 10, 20 (default value), or 50 source countries with the following details:
• Risk level—Displays the risk level category. For example, low, critical, unsafe.
Top Destinations Displays the top 10, 20 (default value), or 50 destination countries with the following details:
• Risk level—Displays the risk level category. For example, low, critical, unsafe.
View Data Displays the traffic data for the defined time interval. By default, traffic data for the last five
minutes is displayed. You can select the predefined time interval or click Customize to
customize the time interval by entering date and time.
NOTE: Starting in Junos OS Release 21.4R1, the default duration is changed from Last 1 hour
to Last 5 minutes to speed up the J-Web UI loading process.
108
Field Description
Search Enter the country name for which you want to view the data and click the search icon. You
can view the country flags before the country names. Click on the country name to view its
data.
• Zoom in and out of the page—Click the zoom in (+) and zoom out (–) icons to zoom in and out of the
page.
• Refresh the data on the page—Click the refresh icon available below the zoom out icon.
• Pan the page—Click and drag the mouse to pan the page.
• View country-specific details—Hover over the bubble to view the country specific details.
RELATED DOCUMENTATION
IN THIS SECTION
You are here: Monitor > Maps and Charts > Threats Map.
109
NOTE: Threats Map page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
Use this page to visualize incoming and outgoing threats between geographic regions. You can view
blocked and allowed threat events based on feeds from intrusion prevention systems (IPS), antivirus,
antispam engines, Juniper ATP Cloud, and screen options. You can also click a specific geographical
location to view the event count and the top five inbound and outbound IP addresses.
NOTE: To view the data on the Threats Map (Live) page, ensure that:
• Security logging is enabled. If not, go to Device Administration > Basic Settings > Security
Logging and enable Stream mode Logging.
The threat data is displayed starting from 12:00 AM (midnight) up to the current time (in your time zone)
on that day and is updated every 30 seconds. The current date and time are displayed at the upper right
and a legend is displayed at the lower left of the page.
If a threat occurs when you are viewing the page, an animation shows the country from which the threat
originated (source) and the country in which the threat occurred (destination).
NOTE: Threats with unknown geographical IP addresses and private IP addresses are displayed
as UNKNOWN_COUNTRY.
Field Descriptions
Table 22 on page 110 displays the fields of the Threats Map (Live) page.
110
Field Description
Total Threats Blocked & Displays the total number of threats blocked and allowed. Click the hyperlinked
Allowed number to go to the All Events (Monitor > Logs > All Events) page (filtered view of
the Grid View tab), where you can view more information about the IPS, virus, spam,
Juniper ATP Cloud, and screen events.
Threats Blocked & Displays the total number of threats blocked and allowed by the following categories:
Allowed
• IPS Threats
• Virus
• Spam
• Screen
Top Destination Displays the top five destination countries and the number of threats per country.
Countries
Top Source Countries Displays the top five source countries and the number of threats per country.
Threat Types
The Threats Map page displays blocked and allowed threat events based on feeds from IPS, antivirus,
antispam engines, Juniper ATP Cloud, and screen options. Table 23 on page 111 describes different
types of threats blocked and allowed.
111
Attack Description
IPS threat Intrusion detection and prevention (IDP) attacks detected by the IDP module.
events
The information reported about the attack (displayed on the IPS (Monitor > Logs > Threats page)
includes information about:
The information reported about the attack (displayed on the Antivirus (Monitor > Logs > Threats
page) includes information about:
Spam E-mail spam that is detected based on the blacklist spam e-mails.
The information reported about the attack (displayed on the Antispam (Monitor > Logs > Threats
page) includes information about:
Juniper ATP Events that are detected based on Juniper ATP Cloud policies.
Cloud
The information reported about the attack (displayed on the Screen (Monitor > Logs > ATP page)
includes information about:
Attack Description
The information reported about the attack (displayed on the Screen (Monitor > Logs > Threats
page) includes information about:
• Toggle between updating the data and allowing live updates—Click the Pause icon to stop the page
from updating the threat map data and to stop animations. Click the Play icon to update the page
data and resume animations.
• Zoom in and out of the page—Click the zoom in (+) and zoom out (–) icons to zoom in and out of the
page.
• Pan the page—Click and drag the mouse to pan the page.
• Click a country on the threat map to view threat information specific to that country. A Country-
Name pop-up appears displaying country-specific information.
• Click View Details in the Country-Name pop-up to view additional details. The Country-Name
(Details) panel appears.
Table 24 on page 112 provides more details on the country-specific threat information.
Field Description
Field Description
Number of threat Displays the total number of threat events (inbound and outbound) since midnight for
events Threat Events that country.
since 12:00 am
Inbound (Number of Displays the total number of inbound threats for the country and the IP address and
threat events) the number of events for that IP address for the top five inbound events.
Click View All to view all the destination IP address with threat events count.
Outbound (Number of Displays the total number of outbound threats for the country and the IP address and
threat events) the number of events for that IP address for the top five outbound events.
Click View All to view all the source IP address with threat events count.
Number of threat Displays the total number of threat events (inbound and outbound) since midnight for
events Threat Events that country.
since 12:00 am
114
Field Description
Number of Inbound Displays the total number of inbound threats for the country and the number of
Events inbound threat events for each of the following categories:
• IPS Threats
• Virus
• Spam
• Screen
Click Top 5 IP Addresses (Inbound) to view the IP address and the number of events
for that IP address for the top five inbound events.
Click View All IP Addresses to view all the destination IP addresses and number of
events for that IP address.
NOTE: You can view or select View All IP Addresses only after you click Top 5 IP
Addresses (Inbound).
Number of Outbound Displays the total number of outbound threats for the country and the number of
Events outbound threat events for each of the following categories:
• IPS Threats
• Virus
• Spam
• Screen
Click Top 5 IP Addresses (Outbound) to view the IP address and the number of events
for that IP address for the top five outbound events.
Click View All IP Addresses to view all the source IP addresses and number of events
for that IP address.
NOTE: You can view or select View All IP Addresses only after you click Top 5 IP
Addresses (Outbound).
115
RELATED DOCUMENTATION
Monitor Applications
You are here: Monitor > Maps and Charts > Applications.
Use this page to view information about bandwidth consumption, session establishment, and risks
associated with your applications. Analyzing your network applications yields useful security
management information, such as abnormal applications that can lead to data loss, bandwidth hogging,
time-consuming applications, and personal applications that can elevate business risks.
NOTE: Applications page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
• On-box traffic logging and reporting is enabled. If not, go to Device Administration > Basic
Settings > Security Logging, enable Stream mode Logging and On-box Reporting.
• Logging is enabled for a matching traffic firewall policy. If not, go to Security Policies &
Objects > Security Policies and enable Logging options under Rule Options.
• Application tracking is enabled for a security zone. If not, go to Security Policies & Objects >
Zones/Screens and enable Application Tracking in the Add Zone page.
You can select either the Grid View tab or the Chart View tab to view your data:
• Grid View—View the comprehensive details of applications in a tabular format that includes sortable
columns. You can group the applications using Top users by volume, Top apps by volume, timespan,
username, and so on. The table includes information such as the application name, volume, users and
so on. Table 25 on page 116 describes the fields on the Grid View page.
• Chart View—View a brief summary of all the applications. It shows the top 50 applications
consuming maximum bandwidth in your network. The data is presented graphically as a bubble
graph, heat map, or zoomable bubble graph. Table 26 on page 117 describes the widgets on the
Chart View page.
116
Field Description
Top Users By Volume Top users of the application; sorted by bandwidth consumption.
Top Apps By Volume Top applications, such as Amazon, Facebook, and so on of the network traffic;
sorted by bandwidth consumption.
Top Category By Volume Top category, such as web, infrastructure, and so on of the application; sorted by
bandwidth consumption.
Top Characteristics By Top behavioral characteristics, such as prone to misuse, bandwidth consumer, and
Volume so on of the application.
Time Span Allows you to select a time period. Click Custom to select a preferred date.
Application Name Name of the application, such as Amazon, Facebook, and so on.
Risk Level Risk associated with the application: critical, high, unsafe, moderate, low, and
unknown.
Field Description
Sub-Category Subcategory of the application. For example, social networking, news, and
advertisements.
NOTE: There can be many sub-categories for a single category. For example, if
the Category is Multimedia, it can have sub-categories as Video-streaming and
Audio-streaming and so on.
Field Description
Top 50 Applications Displays the top 50 application consuming maximum bandwidth in your network.
The data is presented graphically as a bubble graph, heat map, or zoomable bubble graph.
Show By Allows you to reorder the bubble graph by bandwidth or by number of sessions from the
drop down.
If Bandwidth is selected, the size of the bubble depends on the bandwidth used. Whereas,
if Number of Session is selected, the size of the bubble depends upon the number of
sessions.
Time Span Allows you to select a time. Click Custom to select a preferred date.
Group By Allows you to group the bubble graph by bandwidth or by number of sessions from the
drop down based on risk or categories.
118
RELATED DOCUMENTATION
Monitor Users
You are here: Monitor > Maps and Charts > Users.
Use this page to view information about top users accessing high bandwidth-consuming applications
and establishing higher number of sessions on your network. Based on this information, network
administrators can control the user by rate-limit a device that is accessing applications which consume
large bandwidth or create maximum traffic.
NOTE: Users page is available on all the SRX Series Firewalls except the SRX5000 line of devices.
You can select either the Grid View tab or the Chart View tab to view your data:
• Grid View—View the comprehensive details of users in a tabular format that includes sortable
columns. You can group the users using Top users by volume, Top apps by volume, timespan,
username etc. The table includes information such as the username, volume, top users by volume
and so on. Table 27 on page 118 describes the fields on the Grid View page.
• Chart View—View a brief summary of all the users. It shows the top 50 users consuming maximum
bandwidth in your network. The data is presented graphically as a bubble graph, heat map, or
zoomable bubble graph. Table 28 on page 119 describes the widgets on the Chart View page.
Field Description
Top Users By Volume Top users of the application; sorted by bandwidth consumption.
Top Apps By Volume Top applications, such as Amazon, Facebook, and so on of the network traffic; sorted by
bandwidth consumption.
Time Span Allows you to select a time period. Click Custom to select a preferred date.
Field Description
Applications All the applications used by a user for the time range.
Field Description
Top 50 Users Displays the top 50 users consuming maximum bandwidth in your network.
The data is presented graphically as a bubble graph, heat map, or zoomable bubble graph.
Show By Allows you to reorder the bubble graph by bandwidth or by number of sessions from the drop
down.
If Bandwidth is selected, the size of the bubble depends on the bandwidth used. Whereas, if
Number of Session is selected, the size of the bubble depends upon the number of sessions.
Time Span Allows you to select a time. Click Custom to select a preferred date.
RELATED DOCUMENTATION
CHAPTER 6
Statistics
IN THIS CHAPTER
Use this page to verify the statistics of advanced-anti-malware sessions and security Intelligence
sessions.
Table 29 on page 120 describes the fields on the Threat Prevention page.
Field Description
Field Description
RELATED DOCUMENTATION
Field Description
Refresh Interval Indicates the duration of time after which you want the data on the page to be refreshed.
(sec)
Refresh Click the refresh icon at the upper-right corner to display the fresh content.
Remote Address IP address of the destination peer with which the local peer communicates.
Initiator Cookie Random number, called a cookie, which is sent to the remote node when the IKE
negotiation is triggered.
Responder Cookie Random number generated by the remote node and sent back to the initiator as a
verification that the packets were received.
NOTE: A cookie is aimed at protecting the computing resources from attack without
spending excessive CPU resources to determine the cookie’s authenticity.
123
Field Description
Mode Negotiation method agreed upon by the two IPsec endpoints, or peers, used to exchange
information. Each exchange type determines the number of messages and the payload
types that are contained in each message. The modes, or exchange types, are:
• Main—The exchange is done with six messages. This mode, or exchange type, encrypts
the payload, protecting the identity of the neighbor. The authentication method used is
displayed: preshared keys or certificate.
• Aggressive—The exchange is done with three messages. This mode, or exchange type,
does not encrypt the payload, leaving the identity of the neighbor unprotected.
RELATED DOCUMENTATION
Use this page to view IPsec statistics and information related to IPsec security associations.
Field Description
Statistics
Refresh interval (sec) Indicates the duration of time after which you want the data on the page to be refreshed.
Refresh Click the refresh icon at the upper-right corner to display the fresh content.
124
Field Description
IPsec Statistics
—Provides details of the IPsec statistics.
Counter Displays the ESP (encrypted and decrypted bytes), AH (input and output), and errors
statistics.
IPsec SA
Algorithm Cryptography scheme used to secure exchanges between peers during the IKE Phase II
negotiations:
SPI Security parameter index (SPI) identifier. A SA is uniquely identified by an SPI. Each entry
includes the name of the VPN, the remote gateway address, the SPIs for each direction,
the encryption and authentication algorithms, and keys. The peer gateways each have
two SAs, one resulting from each of the two phases of negotiation: Phase I and Phase II.
Life The lifetime of the SA, after which it expires, expressed either in seconds or kilobytes.
Monitoring Specifies if VPN-Liveliness Monitoring has been enabled/disabled. Enabled - ' U ',
Disabled- '—'
125
Field Description
RELATED DOCUMENTATION
Domain Name System (DNS) Domain Generation Algorithm (DGA) generates seemingly random domain
names that are used as rendezvous points with potential Command & Control (C&C) servers. DNS DGA
detection uses machine learning models and known pre-computed DGA domain names to provide
domain verdicts, which helps in-line DNS query blocking and sinkholing on SRX Series Firewalls.
Use this page to verify the statistics of DNS sessions, submissions, and ATP latency.
Table 32 on page 125 describes the fields on the DNS Security page.
Field Description
DNS Sessions
Field Description
DNS Submissions
ATP Latency
RELATED DOCUMENTATION
Encrypted Traffic Insights (ETI) detects malicious threats that are hidden in encrypted traffic without
intercepting and decrypting the traffic.
• Monitors network traffic for threats without breaking the encryption of the traffic, thereby adhering
to data privacy laws.
• Erases the need for additional hardware or network changes to set up and manage the network.
• Adds an additional layer of protection beyond traditional information security solutions to help
organizations reduce and manage risk.
Use this page to verify the statistics of ETI sessions and submissions.
Field Description
ETI Sessions
Field Description
ETI Submissions
RELATED DOCUMENTATION
CHAPTER 7
Reports
IN THIS CHAPTER
IN THIS SECTION
Overview | 130
Overview
IN THIS SECTION
Use the Reports menu to generate reports on demand. There are several predefined reports listed in this
page, see Table 34 on page 131. The generated report is displayed in HTML format. You can group
multiple reports and generate a consolidated report.
131
NOTE: Reports page is available on all the SRX Series Firewalls except the SRX5000 line of
devices.
Logical system and tenant support the reports listed in Table 34 on page 131 only for SRX1500,
SRX4100, SRX4200, and SRX4600.
Top Botnet Threats By Source Address via IDP Logs Yes Yes No
Top Botnet Threats by Destination Address via IDP Logs Yes Yes No
133
Top Botnet Threats by Threat Severity via IDP Logs Yes Yes No
Top Malware Threats by Source Address via IDP Logs Yes Yes No
Top Malware Threats by Threat Severity via IDP Logs Yes Yes No
Generate Reports
To generate a report:
1. Click Reports.
NOTE: You can select single or multiple report names or all the predefined report names and
generate a consolidated report. But you cannot generate group and individual reports at the
same time.
3. Complete the configuration according to the guidelines provided in Table 35 on page 134.
A reported is generated. The report includes, the time when it was generated, the table of contents,
and the result (a bar graph, a tabular format, and so on). If there is no data available, the report
shows, No data to display.
Field Action
Show Top Use the up and down arrow to select the number of records to display in the report.
NOTE: It may take a while to generate reports, depending on the device data size.
Time Span Select a predefined time span from the list for the report.
From Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats)
to start the report generation.
NOTE: This option is available when you choose Custom for Time Span.
To Specify a start date and time (in MM/DD/YYYY and HH:MM:SS 12-hour or AM/PM formats)
to stop the report generation.
NOTE: This option is available when you choose Custom for Time Span.
Sorting Options
135
Field Action
Show Details Click the arrow next to Sorting Options and select one of the options from the list:
• Executive Summary
The Threat Assessment report displays a new Filename column in the Malware downloaded by User
table. This column helps to identify the malware filename.
Top Talkers
Top Talkers report contains the following content:
NOTE: IPS Threat Environment report is not supported for tenant users.
Viruses Blocked
Viruses Blocked report contains the following content:
URL Report
URL Report contains the following content:
NOTE: Top IPS Attack Destinations is not supported for tenant users.
NOTE: Top Botnet Threats By Source Address via IDP Logs is not supported for tenant users.
NOTE: Top Botnet Threats by Destination Address via IDP Logs is not supported for tenant
users.
NOTE: Top Botnet Threats by Threat Severity via IDP Logs is not supported for tenant users.
NOTE: Top Malware Threats by Source Address via IDP Logs is not supported for tenant users.
NOTE: Top Malware Threats by Destination Address via IDP Logs is not supported for tenant
users.
NOTE: Top Malware Threats by Threat Severity via IDP Logs is not supported for tenant users.
NOTE: Top Blocked Applications via Webfilter Logs is not supported for tenant users.
NOTE: Top Permitted Application Subcategories by Volume via Webfilter Logs is not supported
for tenant users.
NOTE: Top Permitted Application Subcategories by Count via Webfilter Logs is not supported for
tenant users.
5 PART
Device Administration
Operations | 310
RPM | 338
Tools | 353
CHAPTER 8
Basic Settings
IN THIS CHAPTER
• Save—Saves all the basic settings configuration and returns to the main configuration page.
• Tool tip on the right-side represents different icons for notifications, validation errors, and
successful configuration.
• When you make a configuration change and navigate to a different page without saving it,
a pop-up message is displayed to save the configuration.
• Cancel—Cancels all your entries and returns to the main configuration page.
• Commit—Commits all the basic settings configuration and returns to the main configuration page.
• Expand all—Click the arrow pointing outwards icon to expand all the options.
• Collapse all—Click the arrow pointing inwards to collapse or hide all the options.
Table 36 on page 145 describes the fields on the Basic Settings page.
145
Field Action
System Identity
Field Action
Field Action
Time
Time zone Select the time zone from the list in which the router
resides.
Time source Select an option from the list to set the system time:
148
Field Action
Set the date and time using the calendar pick tool and
time fields.
Device date & time Displays the device date and time.
Current date & time Displays the current date and time.
149
Field Action
Loopback address Enter IP address and subnet for the loopback address.
System Services
FTP Select this option to enable FTP for secure file transfer.
Field Action
Junoscript certificate Select the local certificate for SSL from the list.
HTTPS certificate Specifies the certificate that you want to use to secure
the connection from the HTTPS certificates list when
you enable HTTPs.
PKI certificate Select the PKI certificate for HTTPS from the list.
Local certificate Select the local certificate for HTTPS from the list.
HTTPS port Click up or down arrow to select the TCP ports for
incoming HTTP connections.
151
Field Action
Virtual domain certificates Device certificate configured for a domain which can be
used for J-Web access.
Management URL Enter the URL path for web management access.
Field Action
HTTP port Click top or bottom arrows to select the TCP ports for
incoming HTTP connections.
HTTPS port Click top or bottom arrows to select the TCP ports for
incoming HTTP connections.
153
Field Action
Certificate type Select to specify the certificate that you want to use to
secure the connection from the HTTPS certificates list
when you enable HTTPs for Web API:
• File Path:
• Certificate Key:
REST API Enable this option to allow RPC execution over HTTP(S)
connection.
154
Field Action
Address Click + and enter the IPv4 address for the incoming
connections for HTTP of REST API. Then, click tick
mark to add it.
Field Action
Address Click + and enter the IPv4 address for the incoming
connections for HTTPS of REST API. Then, click tick
mark to add it.
Cipher list Select the Cipher suites in order of your preference and
click on the left arrow or right arrow to add.
Server certificate Select server certificate from the list. See No Link Title
to import a device certificate.
156
Field Action
• Click OK.
Security Logging
Field Action
Transport protocol Select an option from the list to specify the type of
logging transport protocol:
Field Action
Field Action
• Structure
• Standard
• Web
SNMP
160
Field Action
System location Enter any location information for the system (lab name
or rack name, for example).
System name override Specifies the option to override the system hostname.
• Click +.
Trap groups
161
Field Action
• Authentication
• Chassis
• Configuration
• Link
• Remote operations
• RMON alarm
• Routing
• Startup
• CRRP events
Field Action
Health monitoring Enable the option to check the SNMP health monitor
on the device. The health monitor periodically checks
the following key indicators of device health:
Field Action
Redundant PSU
NOTE: SRX380 devices support power supply redundancy for power management.
RELATED DOCUMENTATION
CHAPTER 9
Cluster Management
IN THIS CHAPTER
• Establish a chassis cluster connection between the two units, ensure that you have physical access to
both the devices.
• Your other unit must be on the same hardware and software version as the current unit.
• Note that both units are erased and rebooted, after which all existing data is irretrievable. You have
the option to save a backup copy of your configuration before rebooting.
You are here: Device Administration > Cluster Management > Cluster Configuration.
The Junos OS provides high availability on SRX Series Firewall by using chassis clustering. SRX Series
Firewalls can be configured to operate in cluster mode, where a pair of devices can be connected
together and configured to operate like a single node, providing device, interface, and service level
redundancy.
165
• Active/passive mode: In active/passive mode, transit traffic passes through the primary node while
the backup node is used only in the event of a failure. When a failure occurs, the backup device
becomes primary and takes over all forwarding tasks.
• Active/active mode: In active/active mode, has transit traffic passing through both nodes of the
cluster all of the time.
NOTE: In the J-Web cluster (HA) setup, you can only configure active/passive mode (RG1).
You can set up chassis cluster using a simplified Cluster (HA) Mode wizard when the standalone SRX
Series Firewalls are in factory default. You can also create HA using the same wizard from Device
Administration > Reset Configuration when the devices are already in the network.
NOTE: In the factory default settings, a warning message is displayed in SRX300, SRX320,
SRX320-POE, SRX340, SRX345, and SRX380 devices to disconnect the ports between the two
nodes. This is to avoid displaying the details of the other nodes.
NOTE: For the secondary node to be set up or if the primary and secondary nodes are not
already connected, click Proceed. If you want to set up the primary node, then disconnect
back to back connected ports between the two nodes and click Refresh to reload the
browser.
The Setup Chassis Cluster wizard page appears. This wizard guides you through configuring chassis
cluster on a two-unit cluster.
The welcome page shows the possible chassis cluster connections that you can configure for your
SRX Series Firewall. It shows a graphical representation for primary unit (Node 0) and secondary
unit (Node 1) and guides you to first configure the primary unit (node 0).
2. Select Yes, this is the primary unit (Node 0). to select the unit.
166
NOTE: If you have already configured the primary node settings, then select No, this is the
secondary unit (Node 1) and follow the instructions from Step 8.
3. Click Next.
4. To configure the primary unit, complete the configuration according to the guidelines provided in
Table 37 on page 166.
Table 37: Primary Unit Configuration
System Identity
Node 0 Cluster ID Specifies the number by which a Enter a number from 1 through
cluster is identified. 255. By default, 1 is assigned.
Node 0 Priority Specifies the device priority for Enter a number from 1 through
being elected to be the primary 255. By default, 200 is assigned.
device in the VRRP group.
Node 1 Priority Specifies the device priority for Enter a number from 1 through
being elected to be the primary 255. By default, 100 is assigned.
device in the VRRP group.
Node 0 Host Name Specifies the device host name of By default, host name is assigned.
the node 0. For example, SRX1500-01.
Node 1 Host Name Specifies the device host name of By default, host name is assigned.
the node 1. For example, SRX1500-02.
Allow root user SSH login Allows users to log in to the Enable this option.
device as root through SSH.
Management Interface
IPv4 Address
NOTE: Make a note of the IPv4 address as you need it to access the settings after you commit the
configuration.
167
Node 0 Management IPv4 Specifies the management IPv4 Enter a valid IPv4 address for the
address of node 0. management interface.
Node 0 Subnet Mask Specifies subnet mask for IPv4 Enter a subnet mask for the IPv4
address. address.
Node 1 Management IPv4 Specifies the management IPv4 Enter a valid IPv4 address for the
address of node 1. management interface.
Node 1 Subnet Mask Specifies subnet mask for IPv4 Enter a subnet mask for the IPv4
address. address.
Static Route IP Defines how to route to the Enter an IPv4 address for the
other network devices. static route.
Static Route Subnet Specifies the subnet for the static Enter a subnet mask for the static
route IPv4 address. route IPv4 address.
Next Hop IPv4 Specifies next hop gateway for Enter a valid IPv4 address for the
the IPv4 address. next hop.
Node 0 Management IPv6 Specifies the management IPv6 Enter a valid IPv6 address for the
address of node 0. management interface.
Node 0 Subnet Prefix Specifies subnet prefix for IPv6 Enter a subnet prefix for the IPv6
address. address.
Node 1 Management IPv6 Specifies the management IPv6 Enter a valid IPv6 address for the
address of node 1. management interface.
Node 1 Subnet Prefix Specifies subnet prefix for IPv6 Enter a subnet prefix for the IPv6
address. address.
168
Static Route IPv6 Defines how to route to the Enter an IPv6 address for the
other network devices. static route.
Static Route Subnet Prefix Specifies the subnet prefix for Enter a subnet prefix for the static
the static route IPv6 address. route IPv6 address.
Next Hop IPv6 Specifies next hop gateway for Enter a valid IPv6 address for the
the IPv6 address. next hop.
Device Password
Root Password Specifies root password of the Enter root password if not already
device. configured for the device.
Control Ports
NOTE: This option is available only for SRX5600 and SRX5800 devices.
169
Dual Link Provides redundant link for By default, this option is disabled.
failover.
Once you enable this option, the
following fields appear:
• Link 1
• Node 0 FPC—Select an
option from the list.
• Node 0 Port—Select an
option from the list.
• Node 1 FPC.
• Node 1 Port.
• Link 2 (Optional)
• Node 0 FPC—Select an
option from the list.
• Node 0 Port—Select an
option from the list.
• Node 1 FPC.
• Node 1 Port.
Node 0 FPC Specifies FPC slot number on Select an option from the list.
which to configure the control
port.
Node 0 Port Specifies port number on which Select an option from the list.
to configure the control port.
Node 1 FPC Optional. Specifies FPC slot Select an option from the list.
number on which to configure
the control port.
170
Node 1 Port Optional. Specifies port number Select an option from the list.
on which to configure the control
port.
Save Backup (to client) Saves backup of the current Enable the option to save the
configuration to the client local backup file of your settings.
machine.
5. Click Reboot and Continue to restart the primary unit to configure chassis cluster.
6. After rebooting the primary unit (node 0), connect to the management port of the secondary unit to
switch to the secondary unit.
7. Click Refresh if the management IP address of the secondary unit is same as the existing device
default IP address. If not, open a new browser with the new secondary device IP address.
8. To configure the secondary unit, complete the configuration according to the guidelines provided in
Table 38 on page 170.
Table 38: Secondary Unit Configuration
Device Password
Root Password Specifies root password of the Enter new root password.
device.
Control Ports
NOTE: This option is available only for SRX5600 and SRX5800 devices.
172
Dual Link Provides redundant link for By default, this option is disabled.
failover.
Once you enable dual link option,
the following fields appear:
• Link 1
• Node 0 FPC—Select an
option from the list.
• Node 0 Port—Select an
option from the list.
• Node 1 FPC.
• Node 1 Port.
• Link 2 (Optional)
• Node 0 FPC—Select an
option from the list.
• Node 0 Port—Select an
option from the list.
• Node 1 FPC.
• Node 1 Port.
Node 0 FPC Specifies FPC slot number on Select an option from the list.
which to configure the control
port.
Node 0 Port Specifies port number on which Select an option from the list.
to configure the control port.
Node 1 FPC Optional. Specifies FPC slot Select an option from the list.
number on which to configure
the control port.
173
Node 1 Port Optional. Specifies port number Select an option from the list.
on which to configure the control
port.
Save Backup (to client) Saves backup of the current Enable the option to save the
configuration to the client local backup file of your settings.
machine.
9. Click Reboot and Continue to restart the secondary unit to configure chassis cluster.
10. After rebooting the secondary unit (node 1), launch the J-Web UI using primary unit management
IP address.
11. Navigate to Cluster Management > Cluster (HA) Setup.
The Cluster Wizard page will open and displays the Cluster Status step.
NOTE:
• J-Web uses show chassis cluster status to verify control link status. Number on the link
signifies if it is single (1) or dual links (2).
• If chassis cluster is not connected, then the connection is failed and all possible failure
reasons will be displayed. For information on troubleshooting tips, see Juniper
Knowledge Search.
• You can configure fabric link only after the chassis cluster is formed. For the first time
configuration, the chassis status displays as The fabric ports links is not yet configured.
12. To configure fabric link, complete the configuration according to the guidelines provided in Table 39
on page 174.
Table 39: Fabric Link Configuration
Link 1
Fabric 0 Specifies the fabric port link for Select an interface from the list.
node 0.
Link 2 (Optional)
Fabric 0 Specifies the secondary fabric Select an interface from the list.
port link for node 0.
15. To add redundant Ethernet (reth) interface, click + and complete the configuration according to the
guidelines provided in Table 40 on page 175.
NOTE: You can also use the pencil icon to edit the reth interface and delete icon to delete
the reth interfaces.
RETH Name Specifies the reth interface name. Enter a name for reth
interface.
Node 0 Interfaces Specifies the list of Node 0 interfaces. Select an interface from
the Available column and
move it to the Selected
column.
Advance Settings
LACP Mode Optional. Specifies the LACP mode. Select an option from the
list.
Available options are:
Periodicity Optional. Specifies the interval at which the interfaces Select an option from the
on the remote side of the link transmit link aggregation list.
control protocol data units (PDUs).
VLAN Tagging Optional. Specifies whether or not to enable VLAN Enable this option.
tagging.
Redundancy Group Specifies the number of the redundancy group that the -
reth interface belongs to.
General
Reth Interface Name Specifies the name of the reth Enter a name for the reth
interface. interface.
Logical Interface Unit Specifies the logical interface Enter the logical interface unit.
unit.
177
VLAN ID Optional. Specifies the VLAN ID. Enter the VLAN ID.
IPv4 Address
IPv4 Address Specifies the IPv4 address. Click + and enter a valid IP
address.
Subnet Mask Specifies the subnet mask for Enter a valid subnet mask.
IPv4 address.
Prefix Length Specifies the number of bits set Enter the prefix length.
in the subnet mask.
NOTE:
• With factory default configuration, trust and untrust zones are displayed by default.
• You can edit the security zone, add new zones, and delete the newly added zones. You
will receive an error message while committing if you try to delete a default zone. This is
because, the default zones are referenced in the security policies.
• You can also edit zone description, application tracking, source identity log, interfaces,
system services, protocols, and traffic control options.
178
General Information
Name Specifies the name of the zone. Enter a name for the zone.
Description Specifies a description for the zone. Enter a description for the zone.
Interfaces
Interfaces Specifies the list of reth interfaces available. Select an interface from the
Available column and move it to
the Selected column.
System Services
Except Drops the selected services. Enable this option if you want to
drop the selected services.
Services Specify the types of incoming system service Select a service from the
traffic that can reach the device for all interfaces Available column and move it to
in a zone. the Selected column.
Protocols
Except Drops the selected protocols. Enable this option if you want to
drop the selected protocols.
179
Protocols Specify the types of routing protocol traffic that Select a protocol from the
can reach the device on a per-interface basis. Available column and move it to
the Selected column.
TCP Reset Specifies the device to send a TCP segment with Enable this option.
the RST (reset) flag set to 1 (one) in response to a
TCP segment with any flag other than SYN set
and that does not belong to an existing session.
If you click the Cluster (HA) Setup menu again, a cluster setup success message appears, and you
can click Cluster Configuration to view and edit the chassis cluster configuration.
NOTE: If the chassis cluster configuration fails after you click Finish, then edit the
configuration as required and commit the changes again.
RELATED DOCUMENTATION
IN THIS SECTION
Field Descriptions
Table 43 on page 180 and Table 44 on page 181 describes the fields on the Cluster Configuration page.
Field Description
Field Description
Field Action
Interfaces
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Member Interfaces/IP Displays the member interface name or IP address configured for an interface.
Address
Field Action
Redundancy Group
Gratuitous ARP Count Displays the number of gratuitous ARP requests that a newly elected primary device
in a chassis cluster sends out to announce its presence to the other network devices.
Node Priority Displays the assigned priority for the redundancy group on that node. The eligible
node with the highest priority is elected as primary for the redundant group.
1. Select a node setting that you want to edit on the Cluster Configuration page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Node Settings page appears with editable fields.
Field Description
Node Settings
Field Description
Backup Router Enter the backup router address to be used during failover.
Destination
Click + to add the destination IP address or select an existing IP address and click X to delete it.
Interface
Interface Select an interface available for the router from the list.
NOTE: You can add and edit two interfaces for each fabric link.
Delete Select one or more existing interfaces and click X to delete it.
RELATED DOCUMENTATION
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
Fabric Link
Interface Enter the interface IP address for fabric link 0 and click + to add it.
Interface Enter the interface IP address for fabric link 1 and click + to add it.
Redundant Ethernet
Interface Enter the logical interface. This specifies a logical interface consisting of two physical
Ethernet interfaces, one on each chassis.
Redundancy Group Select one of the redundancy group from the list. Else, enter a redundancy group.
periodic Select an option from list for periodic transmission of LACP packets. The options are fast or
slow.
Field Action
X Select one or more existing redundant Ethernet configurations and click X to delete it.
RELATED DOCUMENTATION
1. Select an existing HA cluster interface that you want to edit on the Cluster Configuration page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit HA Cluster Interface page appears with editable fields. For more information on the options,
see "Add an HA Cluster Interface" on page 183.
3. Click Save to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select one or more existing HA cluster interfaces that you want to edit on the Cluster Configuration
page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the HA cluster interface.
RELATED DOCUMENTATION
Field Action
Allow preemption of Select the check box to allow a node with a better priority to initiate a failover for a
primaryship redundancy group.
NOTE: By default, this feature is disabled. When disabled, a node with a better priority
does not initiate a redundancy group failover (unless some other factor, such as faulty
network connectivity identified for monitored interfaces, causes a failover).
187
Field Action
Gratuitous ARP Count Enter a value. The range is 1 through 16. The default is 4.
This specifies the number of gratuitous Address Resolution Protocol requests that a
newly elected primary sends out on the active redundant Ethernet interface child links
to notify network devices of a change in primary role on the redundant Ethernet
interface links.
node0 priority Enter the node priority number for a redundancy group.
node1 priority Enter the node priority number as 1 for a redundancy group.
Interface Monitor
Weight Enter a value to specify the weight for the interface to be monitored. The range is
from 1 through 125.
IP Monitoring
Weight Enter a value to specify the weight for IP monitoring. The range is 0 through 225.
Threshold Enter a value to specify the global threshold for IP monitoring. The range is 0 through
225.
Retry Count Enter a value to specify the number of retries needed to declare reachability failure.
The range is 5 through 15.
188
Field Action
Retry Interval Enter a value to specify the time interval in seconds between retries. The range is 1
through 30.
Weight Enter a value to specify the weight for the redundancy group interface to be
monitored.
Interface Enter a value to specify the logical interface to monitor this IP address
Secondary IP Address Enter the secondary IP address for monitoring packets on a secondary link.
RELATED DOCUMENTATION
1. Select an existing redundancy group that you want to edit on the Cluster Configuration page.
2. Click the pencil icon available on the upper-right corner of the page.
189
The Edit Redundancy Group page appears with editable fields. For more information on the options,
see "Add a Redundancy Group" on page 186.
3. Click Save to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select one or more existing redundancy groups that you want to edit on the Cluster Configuration
page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the redundancy group.
RELATED DOCUMENTATION
CHAPTER 10
IN THIS CHAPTER
IN THIS SECTION
You are here: Device Administration > Users & Roles > Users.
Using this page, you can configure user details, authentication methods, and passwords.
Field Descriptions
Field Description
User Details
• Add
• Edit
• Delete
Authentication Methods
Authentication Method And Order Enable authentication methods and drag and drop to
change the authentication order. The options available
are:
• Password
• RADIUS Servers
• TACACS+Servers
RADIUS Servers
Field Description
TACACS
Password Settings
NOTE: J-Web interface does not support configuring the number of characters by which the new password
should be different from the existing password.
Range: 1 through 20
Range: 1 through 30
RELATED DOCUMENTATION
Create a User
To add a user:
Field Description
Username Enter a unique name for the user. Do not include spaces, colons, or commas in the
username.
Full Name Enter the user’s full name. If the full name contains spaces, enclose it in quotation
marks. Do not include colons or commas.
Password Enter a login password for the user. The login password must meet the following
criteria:
• You can include most character classes in a password (alphabetic, numeric, and
special characters), except control characters.
Field Description
Role Scope NOTE: This option is only available on the SRX Series Firewalls that support multi-
tenancy.
Tenant Select the tenant profile from the list for which you want to assign the role.
NOTE: This option is only available if you select Tenant in the Role scope field.
Logical System Select the logical system profile from the list for which you want to assign the role.
NOTE: This option is only available if you select Logical System in the Role scope field.
Authentication Methods
Authentication Method Enable authentication methods and drag and drop to change the authentication order.
And Order The options available are:
• Password
• RADIUS Servers
• TACACS+Servers
RADIUS Servers
195
Field Description
1. Click Configure.
• Retry Attempts—Specify the number of times that the server should try to
verify the user’s credentials.
To delete an existing RADIUS server, select it and click the Delete icon.
TACACS
196
Field Description
1. Click Configure.
• Timeout—Specify the amount of time (in seconds) the device should wait for a
response from the server.
To delete an existing TACACS server, select it and click the Delete icon.
Password Settings
NOTE: J-Web interface does not support configuring the number of characters by which the new password
should be different from the existing password.
Minimum Reuse Click up or down arrow to specify the number of old passwords which should not
match the new password.
Range: 1 through 20
Maximum Lifetime Click up or down arrow to specify the duration of a password (in days), where the
password expires after the maximum duration is reached.
Field Description
Minimum Lifetime Click up or down arrow to specify the duration of a password (in days) before the
password can be changed.
Range: 1 through 30
RELATED DOCUMENTATION
Edit a User
To edit a user:
1. Select an existing user profile that you want to edit on the Users page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit User page appears with editable fields. For more information on the options, see "Create a
User" on page 192.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
Delete a User
To delete user(s):
1. Select one or more users that you want to delete from the Users page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the user.
RELATED DOCUMENTATION
IN THIS SECTION
You are here: Device Administration > Users & Roles > Roles.
J-Web supports users’ authentication and authorization based on their roles. When root, tenant, or
logical-system users log in to J-Web, their roles and access permissions determine the J-Web menus
they can access and the tasks they can perform. For logical system and tenant users, the J-Web UI does
not display menus for the restricted features.
Table 50 on page 199 lists the details of the user role type, role scope, and access privilages.
199
Table 50: User Role Type, Role Scope, and Access Privilages
Role Type
NOTE:
Default Users who are assigned with this role scope can view,
configure, and manage root logical systems.
200
Table 50: User Role Type, Role Scope, and Access Privilages (Continued)
Tenant Users who are assigned with this role scope view,
configure, and manage tenant system.
Logical System Users who are assigned with this role scope view,
configure, and manage logical system.
Access Privileges—A user role can be assigned with the access privileges and actions to access J-Web UI menus
and sub-menus.
You can perform the following tasks from the Roles page:
• Associate a role to users. To do this, click Users link available below the Roles page title to directly
navigate to the Users page. Then, click + to add a new user with a role or select the existing user and
click the pencil icon to modify the role. For more information, see "Create a User" on page 192.
• View the details of a role. To do this, select an existing role and follow the available options:
• Hover over to the left of the selected role name and click the Detailed View icon.
• Show or hide columns in the Roles table. To do this, click the Show Hide Columns icon in the top
right corner of the Roles table. Then, select the options you want to view or clear the options you
want to hide on the page.
• Advance search for roles. To do this, use the search text box present above the table grid. The search
includes the logical operators as part of the filter string. In the search text box, when you hover over
the icon, it displays an example filter condition. When you start entering the search string, the icon
indicates whether the filter string is valid or not.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Field Action
Field Action
RELATED DOCUMENTATION
Create a Role
You are here: Device Administration > Users & Roles > Roles.
To create a role:
1. Click the add icon (+) on the upper right side of the Roles page.
The Create Role page appears.
2. Complete the configuration according to the guidelines provided in Table 52 on page 202.
3. Click OK to save the newly added role. If you want to discard your changes, click Cancel.
After you create roles, go to Device Administration > Users & Roles > Users and assign them to users.
Field Action
Field Action
Role scope NOTE: This option is only available on the SRX Series
Firewalls that support multi-tenancy.
Tenant Select the tenant profile from the list for which you
want to assign the role.
Logical System Select the logical system profile from the list for which
you want to assign the role.
Access Privileges Select one or more privilege types (Full Access, Read-
Only Access, or No Access) to assign the role for the
specified actions and menus. A role must have at least
one access privilege.
RELATED DOCUMENTATION
Edit a Role
You are here: Device Administration > Users & Roles > Roles.
To edit a role:
1. Select an existing role that you want to edit on the Roles page.
NOTE: Alternatively, you can right-click on the selected role and select Edit.
2. Click the pencil icon available on the upper right side of the page.
The Edit Role page appears with editable fields. For more information on the options, see "Create a
Role" on page 202.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
Delete a User
To delete user(s):
1. Select one or more users that you want to delete from the Users page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the user.
205
RELATED DOCUMENTATION
CHAPTER 11
IN THIS CHAPTER
IN THIS SECTION
You are here: Device Administration > Multi Tenancy > Resource Profiles.
NOTE: This menu is supported for only SRX4000 line of devices, SRX5000 line of devices and
SRX1500 devices.
You can view Resource profile for logical systems. Resource profiles are mandatory for creating logical
systems.
• View the details of a resource profile—To do this, select the resource profile for which you want to
view the details and follow the available options:
• Mouse over to the left of the selected resource profile and click Detailed View.
• Filter the resource profiles based on select criteria. To do this, select the filter icon at the upper-right
corner of the Resource Profiles table. The columns in the grid change to accept filter options. Type
the filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the resource profiles table. To do this, click the Show Hide Columns icon in
the upper-right corner of the Resource Profiles table and select the options you want to view or
deselect the options you want to hide on the page.
• Advance search for resource profiles. To do this, use the search text box present above the table grid.
The search includes the logical operators as part of the filter string. In the search text box, when you
hover over the icon, it displays an example filter condition. When you start entering the search string,
the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
208
Field Descriptions
Table 53 on page 208 describes the fields on the Resource Profiles page.
Field Description
RELATED DOCUMENTATION
Global Settings
You are here: Device Administration > Multi Tenancy > Resource Profiles.
1. Click the Global Settings on the upper-right corner of the Resource Profiles page.
The Global Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 54 on page 209.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
209
Field Action
CPU Target Specify the targeted CPU utilization allowed for the whole system (0 through 100 percent).
Set a CPU target. You can enable disable this option to set the value. This will be applicable to
all the logical system resource profiles. If you set 50 % here, then none of the profile(s) can
have a value more than this and all the profiles should share this 50% of the CPU.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Resource Profiles.
Field Description
General
210
Field Description
The string must contain an alphanumeric character and can include underscores; no
spaces allowed; 31 characters maximum.
Resource Allocation
nat-pat-portnum Specify the maximum quantity and the reserved quantity of ports for the logical system
as part of its security profile.
dslite-softwire- Specify the number of IPv6 dual-stack lite (DS-Lite) softwire initiators that can connect
initiator to the softwire concentrator configured in either a user logical system or the primary
logical system.
cpu Specify the percentage of CPU utilization that is always available to a logical system.
appfw-rule Specify the number of application firewall rule configurations that a primary
administrator can configure for a primary logical system or user logical system when the
security profile is bound to the logical systems.
nat-interface-port-ol Specify the number of application firewall rule set configurations that a primary
administrator can configure for a primary logical system or user logical system when the
security profile is bound to the logical systems.
nat-rule-referenced- Specify the security NAT interface port overloading the quota of a logical system.
prefix
nat-port-ol-ipnumber Specify the number of NAT port overloading IP number configurations that user logical
system administrators and primary logical system administrators can configure for their
logical systems if the security profile is bound to the logical systems.
211
Field Description
nat-cone-binding Specify the number of NAT cone binding configurations that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
nat-static-rule Specify the number of NAT static rule configurations that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
nat-destination-rule Specify the number of NAT destination rule configurations that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
nat-source-rule Specify the NAT source rule configurations that user logical system administrators and
primary logical system administrators can configure for their logical systems if the
security profile is bound to the logical systems.
nat-nopat-address Specify the number of NAT without port address translation configurations that user
logical system administrators and primary logical system administrators can configure for
their logical systems if the security profile is bound to the logical systems.
nat-pat-address Specify the number of NAT with port address translation (PAT) configurations that user
logical system administrators and primary logical system administrators can configure for
their logical systems if the security profile is bound to the logical systems.
nat-destination-pool Specify the number of NAT destination pool configurations that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
nat-source-pool Specify the NAT source pool configurations that user logical system administrators and
primary logical system administrators can configure for their logical systems if the
security profile is bound to the logical systems.
flow-gate Specify the number of flow gates, also known as pinholes that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
212
Field Description
flow-session Specify the number of flow sessions that user logical system administrators and primary
logical system administrators can configure for their logical systems if the security profile
is bound to the logical systems.
policy Specify the number of security policies with a count that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
scheduler Specify the number of schedulers that user logical system administrators and primary
logical system administrators can configure for their logical systems if the security profile
is bound to the logical systems.
zone Specify the zones that user logical system administrators and primary logical system
administrators can configure for their logical systems if the security profile is bound to
the logical systems.
auth-entry Specify the number of firewall authentication entries that user logical system
administrators and primary logical system administrators can configure for their logical
systems if the security profile is bound to the logical systems.
Reserved A reserved quota that guarantees that the resource amount specified is always available
to the logical system.
Range The minimum and maximum range permitted for each corresponding resource name.
213
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Resource Profiles.
1. Select the existing resource profiles that you want to edit on the Resource Profiles page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Resource Profiles page appears with editable fields. For more information on the options,
see "Add a Resource Profile" on page 209.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Resource Profile.
1. Select the resource profiles that you want to delete on the Resource Profiles page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
214
RELATED DOCUMENTATION
CHAPTER 12
IN THIS CHAPTER
IN THIS SECTION
You are here: Device Administration > Multi Tenancy > Interconnect Ports.
On SRX Series Firewalls, the logical tunnel interface is used to interconnect logical systems. Use this
page to interconnect logical system that serves as an internal virtual private LAN service (VPLS) switch
connecting one logical system on the device to another.
NOTE: This menu is available only for SRX4000 line of devices and SRX5000 line of devices.
• Search for Text in an Interconnect Ports table. See "Search for Text in an Interconnect Ports Table" on
page 224.
Field Descriptions
Table 56 on page 216 describes the fields on the Interconnect ports page.
Field Description
Interface Displays the interface name. Logical interfaces configured under this interface appear
in a collapsible list under the physical interface.
Link Status Displays the operational status of the link. Status can be either Up or Down.
IP Addresses Displays the configured IP addresses. Multiple IP addresses configured on one logical
interface are displayed in a collapsible list under the logical interface.
Encapsulation Displays the mode of encapsulation. Encapsulation is the process of taking data from
one protocol and translating it into another protocol, so the data can continue across
a network. It can from the following points:
• Ethernet
• Frame Relay
• Ethernet VPLS
Ethernet and Frame Relay are used if logical tunnel interfaces connected between
two logical systems. Ethernet VPLS will be used on logical tunnel interface which is
connecting VPLS switch to logical system.
LSYS/Tenant/VPLS Displays the name of the logical system or the name of VPLS Switch.
Switch
217
Field Description
Peer LSYS/VPLS Switch Displays the name of the peer logical system and VPLS Switch.
Type Displays the type for logical interface—Logical System, Tenant, or VPLS Switch.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Interconnect Ports.
Table 57 on page 217 provides guidelines on using the fields on the Create LT Logical Interface page.
Field Description
Local Details
218
Field Description
Type Select a logical interface type from the list. The options available are Logical System, Tenant, and
VPLS Switch.
Logical System This option is available when you select the logical interface type as Logical System.
Select a logical system from the list. If not present in the list, then we need to create a logical
system.
NOTE: Starting from Junos OS 19.1R1, the user interface will auto complete the logical system
names when you type the partial name.
Tenant This option is available when you select the logical interface type as Tenant.
NOTE: Starting from Junos OS 19.1R1, the user interface will auto complete the tenant names
when you type the partial name.
VPLS Switch This option is not available if the logical interface type is VPLS Switch.
Field Description
IPv4 Address NOTE: This option is not available if the logical interface type is VPLS Switch.
• Prefix Length—Enter the prefix length. This specifies the number of bits set in the subnet
mask.
3. Click the tick mark to add the IPv4 address or click X to discard the changes.
1. Select an existing IPv4 address and click the pencil icon at the upper right of the IPv4
Address table.
3. Click the tick mark to add the IPv4 address or click X to discard the changes.
1. Select one or more existing IPv4 addresses and click the delete icon at the upper right of the
IPv4 Address table.
2. Click OK to delete the IPv4 address. If you want to discard the changes, click Cancel.
220
Field Description
IPv6 Address NOTE: This option is not available if the logical interface type is VPLS Switch.
• Prefix Length—Enter the prefix length. This specifies the number of bits set in the subnet
mask.
3. Click the tick mark to add the IPv6 address or click X to discard the changes.
1. Select an existing IPv6 address and click the pencil icon at the upper right of the IPv6
Address table.
3. Click the tick mark to add the IPv6 address or click X to discard the changes.
1. Select one or more existing IPv6 addresses and click the delete icon at the upper right of the
IPv6 Address table.
2. Click OK to delete the IPv6 address. If you want to discard the changes, click Cancel.
Peer Details
Type Select any one of the connection types from the list:
• Logical system
• Tenant
• VPLS Switch
221
Field Description
Logical System This option is available when you select the connection type as Logical System.
Select a logical system from the list. If not present in the list, then we need to create a logical
system.
Tenant This option is available when you select the connection type as Tenant.
VPLS Switch This option is available when you select the connection type as VPLS Switch.
Field Description
IPv4 Address NOTE: This option is not available if the logical interface type is VPLS Switch.
• Prefix Length—Enter the prefix length. This specifies the number of bits set in the subnet
mask.
3. Click the tick mark to add the IPv4 address or click X to discard the changes.
1. Select an existing IPv4 address and click the pencil icon at the upper right of the IPv4
Address table.
3. Click the tick mark to add the IPv4 address or click X to discard the changes.
1. Select one or more existing IPv4 addresses and click the delete icon at the upper right of the
IPv4 Address table.
2. Click OK to delete the IPv4 address. If you want to discard the changes, click Cancel.
223
Field Description
IPv6 Address NOTE: This option is not available if the logical interface type is VPLS Switch.
• Prefix Length—Enter the prefix length. This specifies the number of bits set in the subnet
mask.
3. Click the tick mark to add the IPv6 address or click X to discard the changes.
1. Select an existing IPv6 address and click the pencil icon at the upper right of the IPv6
Address table.
3. Click the tick mark to add the IPv6 address or click X to discard the changes.
1. Select one or more existing IPv6 addresses and click the delete icon at the upper right of the
IPv6 Address table.
2. Click OK to delete the IPv6 address. If you want to discard the changes, click Cancel.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Interconnect Ports.
1. Select an existing logical interface that you want to edit on the Interconnect Ports page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit LT Logical Interface page appears with editable fields. For more information on the fields,
see "Add a LT Logical Interface" on page 217.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Interconnect Ports.
1. Select one or more the logical interfaces that you want to delete on the Interconnect Ports page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the logical interface.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Interconnect Ports.
You can use the search icon in the upper-right corner of the Interconnect Ports page to search for text
containing letters and special characters on that page.
225
1. Click the search icon and enter partial text or full text of the keyword in the search bar.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 13
IN THIS CHAPTER
IN THIS SECTION
You are here: Device Administration > Multi Tenancy > Logical Systems.
NOTE: This menu is supported for only SRX4000 line of devices, SRX5000 line of devices and
SRX1500 devices.
• Search for Text in a logical system table. See "Search Text in Logical Systems Table" on page 240.
• View the details of the logical systems—To do this, select the logical systems for which you want to
view the details and follow the available options:
• Mouse over to the left of the selected tenant and click Detailed View.
• Filter the logical systems based on select criteria. To do this, select the filter icon at the upper-right
corner of the logical systems table. The columns in the grid change to accept filter options. Type the
filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the logical systems table. To do this, click the Show Hide Columns icon in
the upper-right corner of the logical systems table and select the options you want to view or
deselect the options you want to hide on the page.
• Root users can switch to Logical system context. To do this, click Enter LSYS on the upper right of the
table. See Table 59 on page 228.
Field Descriptions
Table 58 on page 227 describes the fields on the Logical Systems page.
Field Description
Field Description
Field Description
Drag and drop a widget to add it to your dashboard. Once widgets are added to the dashboard,
they can be edited, refreshed, or removed by hovering over the widget header and selecting the
option. The manual refresh option must be used to refresh the widget data.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Logical Systems.
Field Description
General Details
Name Enter a logical system name of a selected Resource Profile. Only one Resource Profile
can be selected, per logical system.
The string must contain alphanumeric characters, colons, periods, dashes, and
underscores. No spaces are allowed; maximum length is 63 characters.
Click one:
• Filter icon —Enables you to filter the selected option in the grid.
• Show Hide Column Filter icon—Enables you to show or hide a column in the grid.
The string must contain an alphanumeric character and can include underscores; no
spaces allowed; 31 characters maximum.
Resource Allocation
230
Field Description
Field Description
can configure for their logical systems if the security profile is bound to the logical
systems.
• flow-gate—Specify the number of flow gates, also known as pinholes that user
logical system administrators and primary logical system administrators can
configure for their logical systems if the security profile is bound to the logical
systems.
• policy—Specify the number of security policies with a count that user logical
system administrators and primary logical system administrators can configure for
their logical systems if the security profile is bound to the logical systems.
Field Description
• zone—Specify the zones that user logical system administrators and primary logical
system administrators can configure for their logical systems if the security profile
is bound to the logical systems.
• address-book—Specify the entries in the address book. Address book entries can
include any combination of IPv4 addresses, IPv6 addresses, DNS names, wildcard
addresses, and address range.
Edit Select a resource and click on the pencil icon to edit Reserved and Maximum fields.
Reserved Specify reserved quota that guarantees that the resource amount specified is always
available to the logical system.
IPS Max Sessions Enter maximum number of sessions. Use up and down arrow keys to increase or
decrease the number.
Users
Click one:
Field Description
Create-Edit users
NOTE: LSYS Read Only user can only view the options but cannot modify them.
Password Enter a password for the user which is more than 6 characters but less than 128
characters.
Interfaces
Click One:
General
Field Description
IPV4 Address
Delete Select the IPv4 address and click the delete icon to delete the address.
IPV6 Address
Delete Select the IPv6 address and click the delete icon to delete the address.
Zones
Click One:
General
235
Field Description
Source Identity Log Enable source identity log for this zone.
Interfaces Select an interface from the Available column and move it to Selected column.
Field Description
NOTE: Select the Except check box to allow services other than the selected services.
• ident-reset—Specify the send back TCP RST IDENT request for port 113.
Field Description
Field Description
NOTE: Select the Except check box to allow protocols other than the selected
protocols.
• router-discovery—Router Discovery.
Traffic Control Options Enable this option to send RST for NON-SYN packet not matching TCP session.
239
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Logical Systems.
1. Select the existing logical system profile that you want to edit on the Logical System Profile page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit a Logical System Profile page appears with editable fields. For more information on the
options, see "Add a Logical System" on page 228.
NOTE: Starting in Junos OS 22.3R1 release, you can assign the customized user role to the
logical systems users. To do that:
a. Select an existing logical system profile and click the pencil icon.
c. Select the logical systems customized role from the list in the Role field.
d. Click OK.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Logical Systems.
1. Select the logical system that you want to delete on the Logical System page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Logical Systems.
You can use the search icon in the upper-right corner of a page to search for text containing letters and
special characters on that page.
1. Click the search icon and enter a partial text or full text of the keyword in the search bar and execute.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 14
Multi Tenancy—Tenants
IN THIS CHAPTER
IN THIS SECTION
You are here: Device Administration > Multi Tenancy > Tenants.
You can use this page to add, view, and delete Tenants.
NOTE: This menu is supported for only SRX4000 line of devices, SRX5000 line of devices and
SRX1500 devices.
• Search for Text in a tenants table. See "Search Text in Tenants Table" on page 252.
• View the details of the tenants—To do this, select the tenant for which you want to view the details
and follow the available options:
• Mouse over to the left of the selected tenant and click Detailed View.
• Filter the tenant based on select criteria. To do this, select the filter icon at the upper-right corner of
the tenant table. The columns in the grid change to accept filter options. Type the filter options; the
table displays only the data that fits the filtering criteria.
• Show or hide columns in the tenant table. To do this, click the Show Hide Columns icon in the upper-
right corner of the tenant table and select the options you want to view or deselect the options you
want to hide on the page.
Field Descriptions
Field Description
Users Displays the tenant system admin and users, and its associated permissions.
Routing Instance Displays the routing instance that is explicitly assigned to the tenant system.
243
RELATED DOCUMENTATION
Add a Tenant
You are here: Device Administration > Multi Tenancy > Tenants.
To add a tenant:
Field Description
General Details
Routing Instance By default, the tenant name is taken as the routing instance name.
Configured Resources Displays the resources and its reserved or maximum quantity assigned for this
resource profile.
244
Field Description
Logical Systems/Tenants Displays other logical systems and/or tenants using this resource profile.
Click one:
• Show Hide Column Filter icon—Enables you to show or hide a column in the grid.
User Details
You can define tenant administrators and users.
Click one:
Create-Edit users
Field Description
Role Select an option from the list to specify the role of the user:
• Tenant Administrator
NOTE: Logical system or tenant Read Only user can only view the options but
cannot modify them.
Assign Interfaces
Only one logical interface can be part of one tenant, whereas a tenant can have multiple logical interfaces.
Click One:
General
Field Description
IPV4 Address
Delete Select the IPv4 address and click the delete icon to delete the address.
IPV6 Address
Delete Select the IPv6 address and click the delete icon to delete the address.
Zone Configuration
Click One:
General
Field Description
Source Identity Log Enable source identity log for this zone.
Interfaces Select an interface from the Available column and move it to Selected column.
Field Description
System Services Options Select system services from the following options:
NOTE: Select the Except check box to allow services other than the selected services.
• ident-reset—Specify the send back TCP RST IDENT request for port 113.
Field Description
Field Description
NOTE: Select the Except check box to allow protocols other than the selected
protocols.
• router-discovery—Router Discovery.
Traffic Control Options Enable this option to send RST for NON-SYN packet not matching TCP session.
251
RELATED DOCUMENTATION
Edit a Tenant
You are here: Device Administration > Multi Tenancy > Tenants.
To edit a tenant:
1. Select the existing tenant that you want to edit on the Tenants page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit a Tenant page appears with editable fields. For more information on the options, see "Add a
Tenant" on page 243.
3. Click OK to save the changes.
RELATED DOCUMENTATION
Delete a Tenant
You are here: Device Administration > Multi Tenancy > Tenants.
To delete tenant(s):
1. Select one or more existing tenants that you want to delete on the Tenants page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
252
RELATED DOCUMENTATION
You are here: Device Administration > Multi Tenancy > Tenants.
You can use the search icon in the upper-right corner of a page to search for text containing letters and
special characters on that page.
1. Click the search icon and enter a partial text or full text of the keyword in the search bar and execute.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 15
Certificates Management—Certificates
IN THIS CHAPTER
You are here: Device Administration > Certificate Management > Certificates.
SSL forward proxy ensures secure transmission of data between a client and a server. Before
establishing a secure connection, SSL forward proxy checks certificate authority (CA) certificates to
verify signatures on server certificates. For this reason, a reasonable list of trusted CA certificates is
required to effectively authenticate servers.
• Export a device certificate or CSR from the default location to a specific location in your local
machine. See Export a Device Certificate "Export a Device Certificate" on page 274.
• Create a device certificate or a CA. Click Create available on the upper-right corner of the
Certificates page and select Device Certificates or Certificate Authority.
254
For more information, see "Create a Device Certificate" on page 255 and "Add a Certificate Authority
(CA)" on page 270.
• View the details of a certificate. View the details of a certificate—To do this, select the certificate of
which you want to view the details and follow the available options:
• Mouse over to the left of the selected certificate and click Detailed View.
• Search for text in a certificate table. See "Search Text in the Certificates Table" on page 276.
• Filter the certificates information based on select criteria. To do this, select the filter icon at the
upper-right corner of the table. The columns in the grid change to accept filter options. Type the
filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the Certificates table. To do this, use the Show Hide Columns icon in the
upper-right corner of the page and select the options you want to show or deselect to hide options
on the page.
Table 63 on page 254 provides the details of the fields on the Certificates page.
Field Action
Certificate Chain Displays an ordered list of certificates, containing a certificate chain name. For example,
ROOT CA. This enables receiver to verify that the sender and all CA's are trustworthy.
Issuer Organization Displays the details of the authority that issued the certificate.
255
Field Action
Status Displays whether the status of the certificate is valid, expired, and so on.
Digital Signature Displays the digital signature associated with the certificate.
IN THIS SECTION
You are here: Device Administration > Certificate Management > Certificates.
• Let's Encrypt. See "Create Device Certificate (Let's Encrypt)" on page 256.
• Local Self-Signed. See "Create Device Certificate (Local Self-Signed)" on page 257.
• Externally Generated. See "Load Signed Device Certificate (Externally Generated)" on page 269.
Table 64: Fields on the Create Device Certificate (Let's Encrypt) page
Field Action
CA certificate name Select one of the CA certificate names from the list or
click Add CA certificate to add a new CA Certificate.
For details on adding a CA certificate, see "Add CA
Certificate" on page 270.
Digital signature Select a digital signature from the list. That is,
RSA-1024, RSA-2048, or RSA-4096. By default,
RSA-2048 is selected.
Table 64: Fields on the Create Device Certificate (Let's Encrypt) page (Continued)
Field Action
Auto re-enrollment
Trigger time Set the auto re-enrollment trigger time (in days).
Default is 65 days and maximum trigger time of 85
days is allowed.
Re-generate key pair Enable this option to automatically generate a new key
pair when a device certificate is automatically re-
enrolled.
Domain names Click + to add new domain name that you want to
associate with the certificate. This can be an FQDN
that resolves to an SRX Series Firewall external IP
address. Maximum of domain names allowed is five.
RELATED DOCUMENTATION
3. Complete the configuration according to the guidelines provided in Table 65 on page 258.
4. Click OK to save the changes. If you want to discard your changes, click Cancel instead.
If you click OK, a new CA certificate with the provided configuration is created.
Table 65: Fields on the Create Device Certificate (Local Self-Signed) page
Field Action
Digital signature Select one of the digital signatures from the list. That
is, RSA, DSA, ECDSA, and so on. By default, RSA-2048
is selected.
Organizational unit name Enter the name of the organizational unit that you
want to associate with the certificate.
Organizational name Enter the name of the organization that you want to
associate with this certificate.
Table 65: Fields on the Create Device Certificate (Local Self-Signed) page (Continued)
Field Action
Domain name Enter a domain name that you want to associate with
the certificate.
IPv6 address This option is available for a local certificate. Enter the
IPv6 address of the device.
Advanced
Digest Select the digest from the list that you want to
associate with the local certificate.
RELATED DOCUMENTATION
Field Action
CA certificate name Select one of the CA certificate names from the list or
click Add CA certificate to add a new CA Certificate.
For details on adding a CA certificate, see "Add CA
Certificate" on page 270.
Digital signature Select a digital signature from the list. That is,
RSA-1024, RSA-2048, or RSA-4096. By default,
RSA-2048 is selected.
Enrollment Parameters
Digest Select the digest from the list that you want to
associate with the certificate. The options are: MD-5
Digests or SHA-1 digests.
261
Table 66: Fields on the Create Device Certificate (SCEP) page (Continued)
Field Action
Encryption Select the encryption method from the list for the CA
certificate. The options are: DES Encryption or DES-3
Encryption.
Renew trigger time Set the renew trigger time (in days). Default is 65 days
and maximum is 85 days.
Re-generate key pair Enable this option to automatically generate a new key
pair when a device certificate is automatically re-
enrolled.
Organizational unit name Enter the name of the organizational unit that you
want to associate with the certificate.
Organizational name Enter the name of the organization that you want to
associate with this certificate.
Table 66: Fields on the Create Device Certificate (SCEP) page (Continued)
Field Action
Domain name Enter a domain name that you want to associate with
the certificate.
Advanced
Digest Select the digest from the list. The options are: SHA-1
digests or SHA-256 digests.
RELATED DOCUMENTATION
Field Action
CA certificate name Select a CA certificate name from the list or click Add
CA certificate to add a CA Certificate. For details on
adding a CA certificate, see "Add CA Certificate" on
page 270.
Digital signature Select a digital signature from the list. That is,
RSA-1024, RSA-2048, or RSA-4096. By default,
RSA-2048 is selected.
Auto Re-enrollment
Trigger time Set the auto re-enrollment trigger time (in days).
Default is 65 days and maximum trigger time is 85
days.
Re-generate key pair Enable to automatically generate a new key pair when
a device certificate is automatically re-enrolled.
Domain names Click + to add new domain name that you want to
associate with the certificate. This can be an FQDN
that resolves to an SRX Series Firewall external IP
address. Maximum of domain names allowed is five.
264
RELATED DOCUMENTATION
Field Action
CA certificate name Select a CA certificate name from the list or click Add
CA certificate to add a CA Certificate. For details on
adding a CA certificate, see "Add CA Certificate" on
page 270.
Digital signature Select a digital signature from the list. That is, RSA,
DSA, ECDSA, and so on. By default, RSA-2048 is
selected.
Enrollment Parameters
Table 68: Fields on the Create Device Certificate (CMPv2) page (Continued)
Field Action
Renew trigger time Set the renew trigger time (in days). Default is 65 days
and maximum is 85 days.
Regenerate key pair Enable this option to automatically generate a new key
pair when a device certificate is automatically re-
enrolled.
Organizational unit name Enter the name of the organizational unit that you
want to associate with the certificate.
Organizational name Enter the name of the organization that you want to
associate with this certificate.
266
Table 68: Fields on the Create Device Certificate (CMPv2) page (Continued)
Field Action
Domain name Enter a domain name that you want to associate with
the certificate.
RELATED DOCUMENTATION
Field Action
Digital signature Select a digital signature from the list. That is, RSA,
DSA, ECDSA, and so on. By default, RSA-2048 is
selected.
Organizational unit name Enter the name of the organizational unit that you
want to associate with the certificate.
Organizational name Enter the name of the organization that you want to
associate with this certificate.
Table 69: Fields on the Create Device Certificate (CSR) page (Continued)
Field Action
Domain name Enter a domain name that you want to associate with
the certificate.
Advanced
Digest Select the digest from the list. The options are: SHA-1
digests or SHA-256 digests.
RELATED DOCUMENTATION
Table 70: Fields on the Load Signed Device Certificate (Externally Generated) page
Field Action
Upload device certificate Browse and upload the device certificate that is stored.
Upload private key Browse and upload the device certificate that is stored.
RELATED DOCUMENTATION
IN THIS SECTION
You are here: Device Administration > Certificate Management > Certificates.
• Juniper Bundle. Loads default CA certificates with prefix juniper_bundle_ and suffixed with an auto
incremented value from 1 to 255.
Add CA Certificate
You are here: Device Administration > Certificate Management > Certificates.
To add a CA certificate:
Field Action
Field Action
On connection failure Enable this option to skip the revocation check if the
OCSP responder is not reachable.
Disable responder revocation check Enable this option to disable revocation check for the
CA certificate received in an OCSP response.
Accept unknown status When set to enable, accepts the certificate with
unknown status.
Field Action
CRL refresh interval Enter the time interval (in hours) between CRL
updates.
Disable on download failure Enable this option to override the default behavior and
permit certificate verification even if the CRL fails to
download.
NOTE: This option is applicable only for CRL.
Advanced
Field Action
Proxy profile Select an option from the list. Or to create a new proxy
profile inline:
1. Click Create.
• Connection Type:
3. Click OK.
RELATED DOCUMENTATION
You are here: Device Administration > Certificate Management > Certificates.
To export a device certificate:
NOTE: Once you click Export, CSR certificate gets downloaded automatically on your local
system.
2. Complete the configuration according to the guidelines provided in Table 72 on page 274.
3. Click OK to export the certificate.
Once you save or download the exported file(s), a confirmation message is displayed; if not, an error
message is displayed.
Field Action
RELATED DOCUMENTATION
Edit a CA Certificate
You are here: Device Administration > Certificate Management > Certificates.
To edit a CA certificate:
RELATED DOCUMENTATION
Delete a Certificate
You are here: Device Administration > Certificate Management > Certificates.
To delete a certificate:
RELATED DOCUMENTATION
You are here: Device Administration > Certificate Management > Certificates.
1. Click the search icon in the upper-right corner of the Certificates page.
2. Enter partial text or full text of the keyword in the search bar and click the search icon.
The search results are displayed.
3. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
You are here: Device Administration > Certificate Management > Certificates.
Field Action
CA certificate name Select the CA certificate name from the list that you
want to add.
277
Field Action
Protocol Select the protocol that you want to associate with the
certificate.
Digest Select the digest from the list that you want to
associate with the certificate.
RELATED DOCUMENTATION
Load CA Certificate
You are here: Device Administration > Certificate Management > Certificates.
To load a CA certificate:
278
1. Click Load Certificate available in the status column of the Certificates table.
The Load CA Certificate page appears.
2. Complete the configuration according to the guidelines provided in Table 74 on page 278.
3. Click OK to save the changes. If you want to discard your changes, click Cancel instead.
Field Action
Load CA certificate Select how you want to load the certificate. That is,
manual upload or automatic.
NOTE: Automatic is enabled only if the enrollment URL is configured for the CA certificate.
Protocol Select the protocol from the list that you want to
associate with the CA certificate.
RELATED DOCUMENTATION
Reload CA Certificate
You are here: Device Administration > Certificate Management > Certificates.
To reload a CA certificate:
1. Click Reload Certificate available in the status column of the Certificates table.
The Reload CA Certificate page appears.
2. Complete the configuration according to the guidelines provided in Table 75 on page 279.
3. Click OK to save the changes. If you want to discard your changes, click Cancel instead.
Field Action
Load CA certificate Select how you want to load the certificate. That is,
manual upload or automatic.
NOTE: Automatic is enabled only if the enrollment URL is configured for the CA Certificate.
Protocol Select the protocol from the list that you want to
associate with the CA certificate.
280
Field Action
RELATED DOCUMENTATION
CHAPTER 16
IN THIS CHAPTER
You are here: Device Administration > Certificate Management > Trusted Certificate Authority.
Multiple CA profiles can be grouped in one trusted CA group for a given topology. The CA group can be
used either in SSL or IPsec.
SSL forward proxy ensures secure transmission of data between a client and a server. Before
establishing a secure connection, SSL forward proxy checks certificate authority (CA) certificates to
verify signatures on server certificates. For this reason, a reasonable list of trusted CA certificates is
required to effectively authenticate servers.
• Import a CA group to manually load the CA group. See "Import a Trusted CA Group" on page 282.
• Search for text in a CA group table. See "Search Text in the Certificate Authority Group Table" on
page 285.
• Filter the CA group information based on select criteria. To do this, select the filter icon at the upper-
right corner of the table. The columns in the grid change to accept filter options. Type the filter
options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the CA group table. To do this, use the Show Hide Columns icon in the
upper-right corner of the page and select the options you want to show or deselect to hide options
on the page.
Table 76 on page 282 provides the details of the fields of the Certificate Authority Group Page.
Field Description
Used For Displays whether the CA profile group is used for IPsec VPN or for SSL proxy.
You are here: Device Administration > Certificate Management > Trusted Certificate Authority.
1. Click Import.
The Import Trusted CA Group page appears.
2. Complete the configuration according to the guidelines provided in Table 77 on page 283.
3. Click OK to import the CA group.
You are taken to the Certificate Authority Group page. If the CA group content that you imported is
validated successfully, a confirmation message is displayed; if not, an error message is displayed.
283
After importing a CA profile group, you can use it when you create an SSL proxy.
Field Action
File path for CA Group Click Browse to navigate to the path from where you want to import the CA group.
RELATED DOCUMENTATION
Add a CA Group
You are here: Device Administration > Certificate Management > Trusted Certificate Authority.
To add a CA group:
1. Click +.
The Add CA Group page appears.
2. Complete the configuration according to the guidelines provided in Table 78 on page 284.
3. Click OK to save the changes. If you want to discard your changes, click Cancel instead.
If you click OK, a new CA group with the provided configuration is created.
Field Action
CA Profiles Select a CA profile name from the list in the Available column and then click the right arrow to
move it to the Selected column.
RELATED DOCUMENTATION
Edit a CA Group
You are here: Device Administration > Certificate Management > Trusted Certificate Authority.
To edit a CA group:
1. Select a CA group.
2. Click the pencil icon available on the upper-right corner of the Certificate Authority Group page.
See "Add a CA Group" on page 283 for the options available for editing on the Edit CA Group page.
3. Click OK
RELATED DOCUMENTATION
Delete a CA Group
You are here: Device Administration > Certificate Management > Trusted Certificate Authority.
To delete a CA group:
1. Select a CA group.
2. Click the delete icon available on the upper-right corner of the Certificate Authority Group page.
A confirmation window appears.
3. Click Yes to delete.
RELATED DOCUMENTATION
You are here: Device Administration > Certificate Management > Trusted Certificate Authority.
You can use the search icon in the upper-right corner of a page to search for text containing letters and
special characters on that page.
1. Enter partial text or full text of the keyword in the search bar and click the search icon.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
286
RELATED DOCUMENTATION
CHAPTER 17
License Management
IN THIS CHAPTER
IN THIS SECTION
You can add a new license key, delete one or more license keys, update, or download license keys.
Table 79 on page 288 describes the fields on the License Management page.
288
Field Function
Licenses Needed Displays the number of licenses required for legal use
of the feature. Usage is determined by the
configuration on the device. If a feature is configured
and the license for that feature is not installed, a single
license is needed.
Add License
To add a new license key with the J-Web license manager:
• License File URL—Enter the full URL to the destination file containing the license key.
NOTE: Use this option to send a subscription-based license key entitlement (such as
Content Security) to the Juniper Networks licensing server for authorization. If authorized,
the server downloads the license to the device and activates it.
• License Key—Paste the license key text, in plain-text format, for the license.
NOTE: Use this option to activate a perpetual license directly on the device. (Most feature
licenses are perpetual.)
2. Click OK to add the license key or click Cancel to return to the License Management page.
1. Select the check box of the license or licenses you want to delete.
2. Click Delete.
NOTE: If you have deleted the SRX100 Memory Upgrade license, the device reboots
immediately and comes back up as a low-memory device.
3. Click OK to delete the selected license or licenses or click Cancel to return to the License
Management page.
1. Click Update.
The Update Licenses page appears.
2. Click OK to send license update to LMS.
1. Click Display Keys to view all of the license keys installed on the device.
2. Click Back to return to the License Management page.
290
1. Click Download Keys to download all of the license keys installed on the device to a single file.
2. Select Save it to disk and specify the file to which the license keys are to be written.
RELATED DOCUMENTATION
CHAPTER 18
IN THIS CHAPTER
IN THIS SECTION
Use this page to configure the SRX Series Firewall to install, upload, and automatically download the
updated security packages from the specified URL.
• IPS signatures:
• Install and upload IPS signatures package. See "Install or Upload IPS Signatures Package" on page
295.
• Configure IPS signatures settings. See "IPS Signatures Settings" on page 297.
292
• Application signatures:
• Install an application signature package. See "Install Application Signatures Package" on page 299.
• Configure application signature package install settings. See "Application Signatures Settings" on
page 299.
• URL categories:
• Install an URL category package. See "Install URL Category Package" on page 301.
• Configure URL category package install settings. See "URL Categories Settings" on page 301.
Field Descriptions
Table 80 on page 292 to Table 82 on page 294 describes the fields on the Security Package
Management page.
Field Description
Version Displays the security package version that is currently installed on the device.
• Installed successfully
• Failed
Published Date Displays the security package released date and time.
Detector Displays the detector version number that is currently installed on the device.
Rollback Action Displays the previously installed security package version on the system.
Field Description
View Details Click View Details to learn more about the security package version.
Settings You can configure a proxy server to download and install security package. You can also
schedule an automatic installation of security packages for a later date and time.
Field Description
Version Displays the security package version that is currently installed on the device.
• Installed successfully
• Failed
Published Date Displays the security package released date and time.
294
Field Description
Rollback Action Displays the previously installed security package version on the system.
View Details Click View Details to learn more about the security package version.
Install You can choose to install the selected security package version on the device.
Install Settings You can configure a proxy server to download and install security package. You can also
schedule an automatic installation of security packages for a later date and time.
Field Description
Version Displays the Enhanced Web Filtering (EWF) categories package version that is currently
installed on the device.
• Installed successfully
• Failed
Base Filter Click the base filter name to view the available URL categories.
295
Field Description
Install Settings You can configure a proxy server to download and install EWF categories package. You can also
schedule an automatic installation of EWF categories package for a later date and time.
RELATED DOCUMENTATION
You can choose to install the selected security package version or upload a selected package version to
install it on the device.
NOTE: When using either of the installation methods, you can continue to configure the other
features while the installation is in progress. Once the installation is complete, you will see a
notification on the UI.
1. Select a security package version you want to install and then click Install available at the upper-right
corner of the Latest IPS Signature Package table.
2. Click Install package to install the selected security package version.
The installation status is shown in the Status column of the Installed IPS Signature Package table.
296
1. Click Install available at the upper-right corner of the Latest IPS Signature Package table. Then, select
Upload package.
2. Click Browse to upload a downloaded security package version and then click OK.
The installation starts automatically and the status is shown in the Status column of the Installed IPS
Signature Package table.
a. Go to https://support.juniper.net/support/downloads/.
b. Select All Products from the list and enter the SRX Series model. For example, SRX300.
g. Click the gz link of the package you want to download from the Downloads column.
j. On the Download Software page that appears, the following options are available:
• If you want to download the package on your host machine, click the CLICK HERE link and
save the file to your machine.
• If you want to download the package on your device, copy the URL and install it on the device
using the CLI commands.
297
RELATED DOCUMENTATION
You can configure a proxy server to download and install security package. You can also schedule an
automatic installation of security packages for a later date and time.
1. Click the Settings icon available at the upper-right corner of the Latest IPS Signature Package table.
The Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 83 on page 297.
3. Click OK.
The security package will automatically install in the scheduled interval. The installation status is
shown in the Status column of the Installed IPS Signature Package table.
Field Action
Security Package URL Displays the URL from where the security package is
downloaded. Default URL is https://
signatures.juniper.net/cgi-bin/index.cgi.
Routing Instance Select a routing instance from the list to reach the
proxy server.
Field Action
Proxy profile This is optional. Select a proxy profile from the list. The
proxy profile acts as a proxy server to download the
security package.
Schedule Install
Interval Amount of time (in hours) that the device waits before
updating the security package.
RELATED DOCUMENTATION
You can choose to install the selected security package version on the device.
1. Select a security package version you want to install and then click Install available at the upper-right
corner of the Latest Application Signature Package table.
2. Click Install package to install the selected security package version.
The installation status is shown in the Status column of the Installed Application Signature Package
table.
RELATED DOCUMENTATION
You can configure a proxy server to download and install security package. You can also schedule an
automatic installation of security packages for a later date and time.
1. Click the Settings icon available at the upper-right corner of the Latest Application Signature Package
table.
The Install Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 84 on page 300.
3. Click OK.
The security package will automatically install in the scheduled interval. The installation status is
shown in the Status column of the Installed Application Signature Package table.
300
Field Action
Security Package URL Displays the URL from where the security package is
downloaded. Default URL is https://
signatures.juniper.net/cgi-bin/index.cgi.
Proxy profile This is optional. Select a proxy profile from the list. The
proxy profile acts as a proxy server to download the
security package.
Schedule Install
Interval Amount of time (in hours) that the device waits before
updating the security package.
RELATED DOCUMENTATION
You can choose to install the latest URL category package version to install it on the device.
1. Click Install available at the upper-right corner of the URL Category Package table.
2. Click Install package to install the latest URL category package version.
The installation status is shown in the Status column of the URL Category Package table.
RELATED DOCUMENTATION
You can configure a proxy server to download and install EWF categories package. You can also
schedule an automatic installation of EWF categories package for a later date and time.
1. Click the Settings icon available at the upper-right corner of the URL Category Package table.
The Install Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 85 on page 302.
3. Click OK.
The EWF categories package will automatically install in the scheduled interval. The installation
status is shown in the Status column of the URL Category Package table.
302
Field Action
Security Package URL Displays the URL from where the EWF categories
package is downloaded. Default URL is https://
update.juniper-updates.net/.
Routing Instance Select a routing instance from the list to reach the
proxy server.
Proxy profile This is optional. Select a proxy profile from the list. The
proxy profile acts as a proxy server to download the
EWF categories package.
Schedule Install
Interval Amount of time (in hours) that the device waits before
updating the EWF categories package.
RELATED DOCUMENTATION
CHAPTER 19
ATP Management
IN THIS CHAPTER
• Ensure that you have a Juniper ATP Cloud account with an associated license (free, basic, or
premium) to configure a Juniper ATP Cloud realm. The license controls the features of the Juniper
ATP Cloud. For more information on the Juniper ATP Cloud account, see Registering a Juniper
Advanced Threat Prevention Cloud Account.
• Decide which region the realm you create will cover because you must select a region when you
configure a realm.
• In the CLI mode, configure set security forwarding-process enhanced-services-mode on your SRX300,
SRX320, SRX340, SRX345, and SRX550M devices to open ports and get the device ready to
communicate with ATP cloud.
• ATP cloud requires that both your Routing Engine (control plane) and Packet Forwarding Engine (data
plane) can connect to the Internet.
• ATP cloud requires the following ports to be open on the SRX Series Firewall: 80, 8080, and 443.
You are here: Device Administration > ATP Management > Enrollment.
Use this page to enroll your SRX Series Firewall with Juniper Advanced Threat Prevention Cloud (Juniper
ATP Cloud).
Juniper ATP Cloud is a cloud-based threat identification and prevention solution. It protects your device
from malware and sophisticated cyber threats by inspecting e-mail and web traffic for advanced threats.
305
Juniper ATP Cloud integrates with the SRX Series Firewalls to simplify its deployment and enhance the
anti-threat capabilities of the SRX device.
ATP uses a Junos OS operation (op) script to help you configure your SRX Series Firewall to connect to
the ATP cloud service.
• Downloads and installs certificate authority (CAs) licenses onto your SRX Series Firewall.
• Creates local certificates and enrolls them with the cloud server.
NOTE:
• The list displays the existing proxy profiles that you have created using the Proxy
Profile page (Security Policies & Objects > Proxy Profiles).
• The SRX Series Firewall and Juniper ATP Cloud communicates through the proxy
server if a proxy profile is configured. Otherwise, they directly communicate with each
other.
d. Click OK.
Applying proxy enables the SRX Series Firewall and Juniper ATP Cloud to communicate through
the proxy server.
306
Field Action
Connection Type Select the connection type server from the list that proxy profile uses:
Port Number Select a port number for the proxy profile. Range is 0 to 65535.
NOTE: If there are any existing configuration changes, a message appears for you to
commit the changes and then to proceed with the enrollment process.
c. Click OK.
The SRX Series Firewall enrollment progress, successful message, or any errors will be shown at
the end of the ATP Cloud Enrollment page.
NOTE:
• A new realm is created if you have enabled Create New Realm and then the SRX Series
Firewall is enrolled to Juniper ATP Cloud. If there is any existing enrollment for the
same SRX device, CLI sends the data to Juniper ATP Cloud portal to do the duplicate
validation during the enrollment process. You cannot check for the duplicate validation
through J-Web.
Field Description
Create New Realm By default, this option will be disabled if you have an ATP Cloud account
with an associated license.
Enable this option to add a new realm if you do not have an ATP Cloud
account with an associated license.
Password Enter a unique string at least eight characters long. It must include both
uppercase letters, lowercase letters, and at least one number. It can also
include special characters. No spaces are allowed and you cannot use the
same sequence of characters that are in your e-mail address.
Company Name Enter a company name to enroll into the realm. A company name can
only contain alphanumeric characters, special characters (underscore and
dash).
Realm Enter a name for the security realm. This should be a name that is
meaningful to your organization. A realm name can only contain
alphanumeric characters and the dash symbol. Once created, this name
cannot be changed.
You are here: Device Administration > ATP Management > Diagnostics.
Field Description
Diagnostics
Diagnostics Logs Displays the diagnostic logs for the selected option.
Check Connectivity
Server Details
Connection Plane
Service Plane
Field Description
Other Details
RELATED DOCUMENTATION
CHAPTER 20
Operations
IN THIS CHAPTER
Maintain Files
IN THIS SECTION
Clean Up Files
To maintain files:
• Rotates log files—Indicates all information in the current log files is archived and fresh log files are
created.
311
• Deletes log files in /var/log—Indicates any files that are not currently being written to are deleted.
• Deletes temporary files in /var/tmp—Indicates any files that have not been accessed within two
days are deleted.
• Deletes all crash files in /var/crash—Indicates any core files that the device has written during an
error are deleted.
• Deletes all software images (*.tgz files) in /var/sw/pkg—Indicates any software image copied to
this directory during software upgrades are deleted.
The J-Web interface displays the files that you can delete and the amount of space that will be freed
on the file system.
2. Click one:
Log Files Lists the log files located in the /var/log directory on
the device.
Select an option:
• Delete—Deletes files.
• Download—Downloads files.
Select an option:
• Delete—Deletes files.
• Download—Downloads files.
312
Jailed Temporary Files Lists the jailed temporary files located in the /var/
jail/tmp directory on the device.
Select an option:
• Delete—Deletes files.
• Download—Downloads files.
Old JUNOS Software Lists the software images located in the /var/sw/pkg
(*.tgz files) directory on the device.
Select an option:
• Delete—Deletes files.
• Download—Downloads files.
Crash (Core) File Lists the core files located in the /var/crash directory
on the device.
Select an option:
• Delete—Deletes files.
• Download—Downloads files.
Database Files Lists the database files located in the /var/db directory
on the device.
Select an option:
• Delete—Deletes files.
• Download—Downloads files.
SEE ALSO
You can schedule reboot or halt the system using options such as reboot Immediately, reboot in, reboot
with the system time, or halt immediately.
NOTE: A halted system can only be accessed from the system console port.
1. Complete the configuration according to the guidelines provided in Table 90 on page 313.
Table 90: Reboot Schedule Maintenance Options
Field Action
Reboot in number of minutes Select this option to reboot the device after the
specified number of minutes from the current time.
Reboot when the system time is hour:minute Select this option to reboot the device at the
absolute time that you specify, on the current day.
Select a two-digit hour in 24-hour format and a two-
digit minute.
Field Action
Reboot From Media Choose the boot device from the Reboot From Media
list:
NOTE: This option is not available in SRX4600
device. • internal—Reboots from the internal media
(default).
2. Click Schedule.
Schedules a reboot based on the scheduled configuration.
3. The J-Web interface requests confirmation to perform the reboot or to halt.
Click OK to confirm to reboot or alt the system or click Cancel to return to the Reboot page.
NOTE:
• If the reboot is scheduled to occur immediately, the device reboots. You cannot access J-
Web until the device has restarted and the boot sequence is complete. After the reboot is
complete, refresh the browser window to display the J-Web login page.
• If the reboot is scheduled to occur in the future, the Reboot page displays the time until
reboot. You have the option to cancel the request by clicking Cancel Reboot on the J-Web
interface Reboot page.
• If the device is halted, all software processes stop and you can access the device through
the console port only. Reboot the device by pressing any key on the keyboard.
• If you cannot connect to the device through the console port, shut down the device by
pressing and holding the power button on the front panel until the POWER LED turns off.
After the device has shut down, you can power on the device by pressing the power
button again. The POWER LED lights during startup and remains steadily green when the
device is operating normally.
315
RELATED DOCUMENTATION
You can configure boot devices to replace primary boot device or to act as a backup boot device.
The snapshot process copies the current system software, along with the current and rescue
configurations, to alternate media. Optionally, you can copy only the factory and rescue configurations.
To maintain the system snapshots, you create a snapshot of the running system software and save the
snapshot to an alternate media.
1. Complete the configuration according to the guidelines provided in Table 91 on page 315.
2. Click Snapshot.
Creates a boot device on an alternate media.
3. Click OK to perform the system snapshot to a media or click Cancel to return to the Snapshot page.
Table 91: Snapshot Maintenance Options
Field Function
Target Media Specifies the boot device to copy the snapshot to.
Field Function
Factory Copies only the default files that were loaded on the
internal media when it was shipped from the factory,
plus the rescue configuration if one has been set.
RELATED DOCUMENTATION
CHAPTER 21
Software Management
IN THIS CHAPTER
You are here: Device Administration > Software Management > Upload Package.
You can upload a software package file to the device for installation.
1. Complete the configuration according to the guidelines provided in Table 92 on page 317.
Table 92: Upload Package Maintenance Options
Field Action
Do not save backup Select the check box so that backup copy of the
current Junos OS package is not saved.
318
Field Action
Format and re-partition the media before installation Select the check box to format the internal media
with dual-root partitioning.
NOTE: This option is not available for SRX4600
devices.
RELATED DOCUMENTATION
You are here: Device Administration > Software Management > Install Package.
1. Complete the configuration according to the guidelines provided in Table 93 on page 318.
Table 93: Install Package Maintenance Options
Field Action
ftp://hostname/pathname/package-name
http://hostname/pathname/package-name
319
Field Action
Do not save backup Select the check box so that backup copy of the
current Junos OS package is not saved.
Format and re-partition the media before installation Select the check box to format the internal media
with dual-root partitioning.
RELATED DOCUMENTATION
You are here: Device Administration > Software Management > Rollback.
You can rollback to the previously installed version of the device software.
NOTE: You cannot stop the process once the rollback operation is requested.
320
2. Reboot the device when the rollback process is complete and for the new software to take effect. To
reboot, perform the steps in "Maintain Reboot Schedule" on page 313.
NOTE: To rollback to an earlier version, follow the procedure for upgrading, using the
software image labeled with the appropriate release.
RELATED DOCUMENTATION
CHAPTER 22
Configuration Management
IN THIS CHAPTER
You are here: Device Administration > Configuration Management > Upload.
You can compare two configuration files, download a configuration file to your local system, or roll back
the configuration to any of the previous versions stored on the device.
1. Enter the absolute path and filename in the File to Upload box.
NOTE: You can also click Browse to navigate to the file location and select it.
NOTE: The file configuration replaces the existing configuration and continues the upload and
commit process. If any errors occur when the file is loading or committing, J-Web displays the
error and restores the previous configuration.
RELATED DOCUMENTATION
You are here: Device Administration > Configuration Management > History.
You can view configuration history and database information about users editing the configuration
database.
1. Complete the configuration according to the guidelines provided in Table 94 on page 322.
Table 94: History Maintenance Options
Field Function
Field Function
• autoinstall—Autoinstallation is performed.
Field Function
Field Function
b. Click Compare.
The History page displays the differences between the two configuration files at each hierarchy
level as follows:
• Lines that exist only in the most recent configuration file are displayed in red on the left.
• Lines that exist only in the least recent configuration file are displayed in blue on the right.
326
RELATED DOCUMENTATION
You are here: Device Administration > Configuration Management > Rescue.
If you inadvertently commit a configuration that denies management access, the only recourse may be
to connect the console. Alternatively, you can rescue configuration that allows the management access
to the device.
To load and commit the rescue configuration, press and immediately release the Config button on the
chassis.
Click one:
• Set rescue configuration—Sets the current running configuration as the rescue configuration. Click
OK to confirm or Cancel to return to the Rescue page.
• Delete rescue configuration—Deletes the current rescue configuration. Click OK to confirm or Cancel
to return to the Rescue page.
RELATED DOCUMENTATION
CHAPTER 23
Alarm Management
IN THIS CHAPTER
IN THIS SECTION
You can create a chassis alarm definition by selecting various options such as DS1, Ethernet, and
integrated service, and so on.
1. Enter the information specified in Table 95 on page 328 to create Chassis Alarm Definition.
328
• Ignore
• Red
• Yellow
• None
• Ignore
• Red
• Yellow
• None
• Ignore
• Red
• Yellow
• None
329
• Ignore
• Red
• Yellow
• None
Optical Transport Network Optical channel Data Backward defect indication (odu-bdi)
Unit (OTN ODU)
Payload type mismatch (odu-ptim)
• Ignore
• Red
• Yellow
• None
330
• Ignore
• Red
• Yellow
• None
• Ignore
• Red
• Yellow
• None
331
• Ignore
• Red
• Yellow
• None
332
• Ignore
• Red
• Yellow
• None
1. Click the pencil icon available on the upper-right corner of the Chassis Alarm Definition page.
See Table 95 on page 328 for the options available for editing the Chassis Alarm Definition page.
2. Click OK.
RELATED DOCUMENTATION
IN THIS SECTION
You can enable system login alarm login classes. The configured Login Classes will display system alarms
while logging in.
1. Enter the information specified in Table 96 on page 333 to create System Alarm Configuration.
Table 96: RPM Information Troubleshooting Options
Field Function
Graph Click the Graph link to display the graph (if it is not
already displayed) or to update the graph for a particular
test.
Field Function
Probe Type Type of RPM probe configured for the specified test.
Following are valid probe types:
• http-get
• http-get-metadata
• icmp-ping
• icmp-ping-timestamp
• tcp-ping
• udp-ping
Minimum RTT Shortest round-trip time from the J Series device to the
remote server, as measured over the course of the test.
Maximum RTT Longest round-trip time from the J Series device to the
remote server, as measured over the course of the test.
Average RTT Average round-trip time from the J Series device to the
remote server, as measured over the course of the test.
Standard Deviation RTT Standard deviation of round-trip times from the J Series
device to the remote server, as measured over the
course of the test.
335
Field Function
Probes Sent Total number of probes sent over the course of the test.
Loss Percentage Percentage of probes sent for which a response was not
received.
Earliest Sample System time when the first probe in the sample was
received.
Latest Sample System time when the last probe in the sample was
received.
Standard Deviation Standard deviation of the round-trip times for the 50-
probe sample.
Lowest Value Shortest round-trip time from the device to the remote
server, as measured over the 50-probe sample.
Time of Lowest Sample System time when the lowest value in the 50-probe
sample was received.
Highest Value Longest round-trip time from the J Series device to the
remote server, as measured over the 50-probe sample.
336
Field Function
Time of Highest Sample System time when the highest value in the 50-probe
sample was received.
Earliest Sample System time when the first probe in the sample was
received.
Latest Sample System time when the last probe in the sample was
received.
Standard Deviation Standard deviation of the jitter values for the 50-probe
sample.
Time of Lowest Sample System time when the lowest value in the 50-probe
sample was received.
Time of Highest Sample System time when the highest jitter value in the 50-
probe sample was received.
3. Click Cancel to cancel your entries and returns to the System Alarm Configuration page.
1. Click the pencil icon available on the upper-right corner of the System Alarm Configuration page.
See Table 96 on page 333 for the options available for editing the System Alarm Configuration page.
2. Click OK.
SEE ALSO
CHAPTER 24
RPM
IN THIS CHAPTER
Setup RPM
IN THIS SECTION
Problem | 338
Solution | 338
Problem
Description
You are here: Device Administration > RPM > Setup RPM.
You can configure RPM parameters to monitor real-time performance through the J-Web interface. You
can specify an RPM owner, request information related to probe, hardware timestamp, generates Traps,
and specify a probe server.
Solution
1. Enter the information specified in Table 97 on page 339 to troubleshoot the issue.
Field Function
Probe Owners
Identification
Owner Name Specifies an RPM owner for which one or more RPM tests
are configured. In most implementations, the owner name
identifies a network on which a set of tests is being run (a
particular customer, for example).
Identification
Field Function
Routing Instance Specifies a routing instance over which the probe is sent.
History Size Specifies the number of probe results saved in the probe
history.
Request Information
Probe Type Specifies the type of probe to send as part of the test.
• http-get
• http-get-metadata
• icmp-ping
• icmp-ping-timestamp
• tcp-ping
• udp-ping
Interval Specifies the wait time (in seconds) between each probe
transmission.
Test Interval Specifies the wait time (in seconds) between tests.
Field Function
Probe Count Specifies the total number of probes to be sent for each
test.
Moving Average Size Specifies the number of samples used for a moving
average.
Destination Port Specifies the TCP or UDP port to which probes are sent.
Data Size Specifies the size of the data portion of the ICMP probes.
Data Fill Specifies the contents of the data portion of the ICMP
probes.
Hardware Timestamp
342
Field Function
One Way Hardware Timestamp Specifies the hardware timestamps for one-way
measurements.
• ICMP ping
Successive Lost Probes Specifies the total number of probes that must be lost
successively to trigger a probe failure and generate a
system log message.
Lost Probes Specifies the total number of probes that must be lost to
trigger a probe failure and generate a system log message.
Field Function
Round Trip Time Specifies the total round-trip time (in microseconds), from
the device to the remote server, that triggers a probe
failure and generates a system log message.
Jitter Specifies the total jitter (in microseconds) for a test that
triggers a probe failure and generates a system log
message.
Egress Time Specifies the total one-way time (in microseconds), from
the device to the remote server, that triggers a probe
failure and generates a system log message.
Ingress Time Specifies the total one-way time (in microseconds), from
the remote server to the device, that triggers a probe
failure and generates a system log message.
Jitter Egress Time Specifies the total outbound-time jitter (in microseconds)
for a test that triggers a probe failure and generates a
system log message.
Field Function
Jitter Ingress Time Specifies the total inbound-time jitter (in microseconds) for
a test that triggers a probe failure and generates a system
log message.
Traps
Egress Jitter Exceeded Generates SNMP traps when the threshold for jitter in
outbound time is exceeded.
Egress Standard Deviation Exceeded Generates SNMP traps when the threshold for standard
deviation in outbound times is exceeded.
Field Function
Egress Time Exceeded Generates SNMP traps when the threshold for maximum
outbound time is exceeded.
Ingress Jitter Exceeded Generates SNMP traps when the threshold for jitter in
inbound time is exceeded.
Ingress Standard Deviation Exceeded Generates SNMP traps when the threshold for standard
deviation in inbound times is exceeded.
Ingress Time Exceeded Generates traps when the threshold for maximum inbound
time is exceeded.
Jitter Exceeded Generates traps when the threshold for jitter in round-trip
time is exceeded.
Field Function
Probe Failure Generates traps when the threshold for the number of
successive lost probes is reached.
RTT Exceeded Generates traps when the threshold for maximum round-
trip time is exceeded.
Standard Deviation Exceeded Generates traps when the threshold for standard deviation
in round-trip times is exceeded.
Test Failure Generates traps when the threshold for the total number
of lost probes is reached.
Field Function
Maximum Number of Concurrent Probes Specifies the maximum number of concurrent probes
allowed.
Probe Server
TCP Probe Server Specifies the port on which the device is to receive and
transmit TCP probes.
UDP Probe Server Specifies the port on which the device is to receive and
transmit UDP probes.
RELATED DOCUMENTATION
View RPM
IN THIS SECTION
Problem | 348
Solution | 348
348
Problem
Description
You are here: Device Administration > RPM > View RPM.
You can configure the RPM probes, to view the RPM statistics and to ensure that the device is
configured to receive and transmit TCP and UDP RPM probes on correct ports.
You can view the RPM configuration to verify the following information:
• The RPM probes are functioning and the RPM statistics are within expected values.
• The device is configured to receive and transmit TCP and UDP RPM probes on the correct ports.
In addition to the RPM statistics for each RPM test, the J-Web interface displays the round-trip times
and cumulative jitter graphically. In the graphs, the round-trip time and jitter values are plotted as a
function of the system time. Large spikes in round-trip time or jitter indicate a slower outbound (egress)
or inbound (ingress) time for the probe sent at that particular time.
Solution
Field Function
Graph Click the Graph link to display the graph (if it is not already
displayed) or to update the graph for a particular test.
Field Function
Probe Type Type of RPM probe configured for the specified test.
Following are valid probe types:
• http-get
• http-get-metadata
• icmp-ping
• icmp-ping-timestamp
• tcp-ping
• udp-ping
Minimum RTT Shortest round-trip time from the J Series device to the
remote server, as measured over the course of the test.
Maximum RTT Longest round-trip time from the J Series device to the
remote server, as measured over the course of the test.
Average RTT Average round-trip time from the J Series device to the
remote server, as measured over the course of the test.
Standard Deviation RTT Standard deviation of round-trip times from the J Series
device to the remote server, as measured over the course
of the test.
350
Field Function
Probes Sent Total number of probes sent over the course of the test.
Loss Percentage Percentage of probes sent for which a response was not
received.
Earliest Sample System time when the first probe in the sample was
received.
Latest Sample System time when the last probe in the sample was
received.
Standard Deviation Standard deviation of the round-trip times for the 50-
probe sample.
Lowest Value Shortest round-trip time from the device to the remote
server, as measured over the 50-probe sample.
Time of Lowest Sample System time when the lowest value in the 50-probe
sample was received.
Highest Value Longest round-trip time from the J Series device to the
remote server, as measured over the 50-probe sample.
351
Field Function
Time of Highest Sample System time when the highest value in the 50-probe
sample was received.
Earliest Sample System time when the first probe in the sample was
received.
Latest Sample System time when the last probe in the sample was
received.
Standard Deviation Standard deviation of the jitter values for the 50-probe
sample.
Time of Lowest Sample System time when the lowest value in the 50-probe
sample was received.
Time of Highest Sample System time when the highest jitter value in the 50-probe
sample was received.
352
RELATED DOCUMENTATION
CHAPTER 25
Tools
IN THIS CHAPTER
IN THIS SECTION
The ping diagnostic tool sends a series of ICMP "echo request" packets to the specified remote host.
The receipt of such packets will usually result in the remote host replying with an ICMP "echo response."
Note that some hosts are configured not to respond to ICMP "echo requests," so a lack of responses
does not necessarily represent a connectivity problem. Also, some firewalls block the ICMP packet types
that ping uses, so you may find that you are not able to ping outside your local network.
354
You can ping a host to verify that the host can be reached over the network or not.
1. Enter the information specified in Table 99 on page 354 to troubleshoot the issue.
3. Click Start.
The results of the ping operation are displayed in Table 100 on page 356. If no options are specified,
each ping response is in the following format:
Field Action
Advanced Options
Don't Resolve • To suppress the display of the hop hostnames along t the path, select the check box.
Addresses
• To display the hop hostnames along the path, clear the check box.
Interface From the list, select the interface on which ping requests are sent. If you select any, the
ping requests are sent on all interfaces.
Count From the list, select the number of ping requests to send.
Don't Fragment • To set the don't fragment (DF) bit in the IP header of the ping request packet, select
the check box.
• To clear the DF bit in the IP header of the ping request packet, clear the check box.
355
Field Action
Record Route • To record and display the path of the packet, select the check box.
• To suppress the recording and display of the path of the packet, clear the check box.
Type-of-Service From the list, select the decimal value of the ToS in the IP header of the ping request
packet.
Routing Instance From the list, select the routing instance name for the ping attempt.
Interval From the list, select the interval in seconds, between the transmission of each ping
request.
Packet Size Type the size, in bytes, of the packet. The size can be from 0 through 65468. The device
adds 8 bytes to the size of the ICMP header.
Source Address Type the source IP address of the ping request packet.
Time-to-Live From the list, select the TTL hop count for the ping request packet.
Bypass Routing • To bypass the routing table and send the ping requests to hosts on the specified
interface only, select the check box.
• To route the ping requests using the routing table, clear the check box.
If the routing table is not used, ping requests are sent only to hosts on the interface
specified in the Interface box. If the host is not on that interface, ping responses are
not sent.
356
Field Function
bytes bytes from ip-address • bytes—Size of ping response packet, which is equal to the value you entered
in the Packet Size box, plus 8.
icmp_seq=0 time—Sequence Number field of the ping response packet. You can use this
value to match the ping response to the corresponding ping request.
icmp_seq=number
time=time time—Total time between the sending of the ping request packet and the
receiving of the ping response packet, in milliseconds. This value is also called
round-trip time.
percentage packet loss percentage—Number of ping responses divided by the number of ping requests,
specified as a percentage.
round-trip min/avg/max/ • min-time—Minimum round-trip time (see time=time field in this table).
stddev = min-time/avg-time/
max-time/std-dev ms • avg-time—Average round-trip time.
Field Function
Output = Packet loss of 100 If the device does not receive ping responses from the destination host (the
percent output shows a packet loss of 100 percent), one of the following explanations
might apply:
• There are network connectivity problems between the device and the host.
• The host might be configured with a firewall filter that blocks ICMP echo
requests or ICMP echo responses.
• The size of the ICMP echo request packet exceeds the MTU of a host along
the path.
• The value you selected in the TTL box was less than the number of hops in
the path to the host, in which case the host might reply with an ICMP error
message.
For more information about ICMP, see RFC 792, Internet Control Message
Protocol.
RELATED DOCUMENTATION
IN THIS SECTION
You can send variations of ICMP "echo request" packets to the specified MPLS endpoint.
1. Click the expand icon next to the ping MPLS option you want to use.
2. Enter information specified in Table 101 on page 358 to troubleshoot the issue.
3. Click Start.
The results of the ping operation are displayed in Table 102 on page 361.
Field Action
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
Count From the list, select the number of ping requests to send. The default is 5 requests.
Detailed Output Select the check box to display detailed output rather than brief ping output.
FEC Prefix Type the forwarding equivalence class (FEC) prefix and length of the LSP to ping.
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
Count From the list, select the number of ping requests to send. The default is 5 requests.
359
Field Action
Detailed Output Select the check box to display detailed output rather than brief ping output.
Count From the list, select the number of ping requests to send. The default is 5 requests.
Detailed Output Select the check box to display detailed output rather than brief ping output.
VPN Prefix Type the IP address prefix and length of the VPN to ping.
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
Interface From the list, select the J Series device interface on which ping requests are sent. If you
select any, the ping requests are sent on all interfaces.
(See the interface naming conventions in the Junos OS Interfaces Configuration Guide
for Security Devices.)
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
series device interface.
Count From the list, select the number of ping requests to send. The default is 5 requests.
Detailed Output Select the check box to display detailed output rather than brief ping output.
Layer 2VPN Name Type the name of the Layer 2 VPN to ping.
360
Field Action
Remote Site Identifier Type the remote site identifier of the Layer 2 VPN to ping.
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
Local Site Identifier Type the local site identifier of the Layer 2 VPN to ping.
Count From the list, select the number of ping requests to send. The default is 5 requests.
Detailed Output Select the check box to display detailed output rather than brief ping output.
Interface From the list, select the J Series device interface on which ping requests are sent. If you
select any, the ping requests are sent on all interfaces.
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
Count From the list, select the number of ping requests to send. The default is 5 requests.
Detailed Output Select the check box to display detailed output rather than brief ping output.
Remote Neighbor Type the IP address of the remote neighbor (PE router) within the virtual circuit to ping.
Circuit Identifier Type the virtual circuit identifier for the Layer 2 circuit.
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
361
Field Action
Count From the list, select the number of ping requests to send.
Detailed Output Select the check box to display detailed output rather than brief ping output.
VPN Prefix Type either the LDP FEC prefix and length or the RSVP LSP endpoint address for the LSP
to ping.
Source Address Type the source IP address of the ping request packet—a valid address configured on a J
Series device interface.
Count From the list, select the number of ping requests to send.
Detailed Output Select the check box to display detailed output rather than brief ping output.
Field Function
Period (.) Echo reply was not received within the timeout period.
x Echo reply was received with an error code. Errored packets are not counted in the
received packets count and are accounted for separately.
Field Function
percentage packet loss percentage—Number of ping responses divided by the number of ping requests,
specified as a percentage.
time For Layer 2 circuits only, the number of milliseconds required for the ping packet to
reach the destination. This value is approximate, because the packet has to reach the
Routing Engine.
Output = Packet loss of If the device does not receive ping responses from the destination host (the output
100 percent shows a packet loss of 100 percent), one of the following explanations might apply:
• There are network connectivity problems between the device and the host.
• The host might be configured with a firewall filter that blocks echo requests or
echo responses.
• The size of the echo request packet exceeds the MTU of a host along the path.
• The outbound node at the remote endpoint is not configured to handle MPLS
packets.
RELATED DOCUMENTATION
Troubleshoot Traceroute
IN THIS SECTION
The traceroute diagnostic tool uses a series of packets crafted to elicit an ICMP "time exceeded"
messages from intermediate points in the network between your device and the specified host.
The time-to-live for a packet is decremented each time the packet is routed, so traceroute generally
receives at least one "time exceeded" response from each waypoint. Traceroute starts with a packet with
a time-to-live value of one, and increments the time to live for subsequent packets, thereby constructing
a rudimentary map of the path between hosts.
Use this page to display a list of routers between the device and a specified destination host.
2. Enter information in the Traceroute page as described in Table 103 on page 364.
3. Click Start.
The results of the traceroute operation are displayed in Table 104 on page 365. If no options are
specified, each line of the traceroute display is in the following format:
The device sends a total of three traceroute packets to each router along the path and displays the
round-trip time for each traceroute operation. If the device times out before receiving a Time
Exceeded message, an asterisk (*) is displayed for that round-trip time.
Field Action
Remote Host Type the hostname or IP address of the destination host of the traceroute.
Advanced Options
Don't Resolve • To suppress the display of the hop hostnames along the path, select the check box.
Addresses
• To display the hop hostnames along the path, clear the check box.
Interface From the list, select the interface on which traceroute packets are sent. If you select any,
the traceroute requests are sent on all interfaces.
Time-to-Live From the list, select the time-to-live (TTL) hop count for the traceroute request packet.
Type-of-Service From the list, select the decimal value of the type-of-service (ToS) value to include in the IP
header of the traceroute request packet.
Resolve AS • To display the autonomous system (AS) number of each intermediate hop between the
Numbers device and the destination host, select the check box.
• To suppress the display of the AS number of each intermediate hop between the
device and the destination host, clear the check box.
Routing Instance From the list, select the routing instance name for the ping attempt.
Source Address Type the source IP address of the outgoing traceroute packets.
365
Field Action
Bypass Routing • To bypass the routing table and send the traceroute packets to hosts on the specified
interface only, select the check box.
• To route the traceroute packets by means of the routing table, clear the check box.
If the routing table is not used, traceroute packets are sent only to hosts on the
interface specified in the Interface box. If the host is not on that interface, traceroute
responses are not sent.
Field Function
To suppress the display of the hostname, select the Don't Resolve Addresses check box.
time1 Round-trip time between the sending of the first traceroute packet and the receiving of
the corresponding Time Exceeded packet from that particular router.
time2 Round-trip time between the sending of the second traceroute packet and the receiving
of the corresponding Time Exceeded packet from that particular router.
time3 Round-trip time between the sending of the third traceroute packet and the receiving of
the corresponding Time Exceeded packet from that particular router.
366
Field Function
Output = Complete If the device does not display the complete path to the destination host, one of the
path to the following explanations might apply:
destination host not
displayed • The host is not operational.
• There are network connectivity problems between the device and the host.
• The host, or a router along the path, might be configured to ignore ICMP traceroute
messages.
• The host, or a router along the path, might be configured with a firewall filter that
blocks ICMP traceroute requests or ICMP time exceeded responses.
• The value you selected in the Time Exceeded box was less than the number of hops
in the path to the host. In this case, the host might reply with an ICMP error
message.
For more information about ICMP, see RFC 792, Internet Control Message Protocol.
RELATED DOCUMENTATION
IN THIS SECTION
You can quickly capture and analyze router control traffic on a device.
367
The packet capture diagnostic tool allows inspection of control traffic (not transient traffic). The
summary of each decoded packet is displayed as it is captured. Captured packets are written to a PCAP
file which can be downloaded.
NOTE: Starting in Junos OS Release 19.3R1, J-Web supports RE3 line cards for SRX5000 line of
devices.
1. Enter the information specified in Table 105 on page 367 to troubleshoot the issue.
2. Save the captured packets to a file or specify other advanced options by clicking the expand icon
next to Advanced options.
3. Click Start.
The captured packet headers are decoded and displayed in the Packet Capture display as specified in
Table 106 on page 372.
4. Click one:
• Stop Capturing—Stops capturing the packets and stays on the same page while the decoded
packet headers are being displayed.
Field Description
Field Description
4. Click Add.
369
Field Description
Protocols Matches the protocol for which packets are captured. You
can choose to capture TCP, UDP, or ICMP packets or a
combination of TCP, UDP, and ICMP packets.
2. Click Add.
3. Click Add.
Advanced Options
Absolute TCP Sequence Displays the absolute TCP sequence numbers for the
packet headers.
Field Description
Display ASCII and Hex Displays packet headers in hexadecimal and ASCII
formats.
Field Description
Don't Resolve Addresses Specifies that IP addresses are not to be resolved into
hostnames in the packet headers displayed.
Field Description
Write Packet Capture File Writes the captured packets to a file in PCAP format
in /var/tmp. The files are named with the prefix jweb-pcap
and the extension .pcap.
Field Function
Timestamp Displays the time when the packet was captured. The
timestamp 00:45:40.823971 means 00 hours (12.00 a.m.),
45 minutes, and 40.823971 seconds.
Field Function
19.3R1 Starting in Junos OS Release 19.3R1, J-Web supports RE3 line cards for SRX5000 line of devices.
RELATED DOCUMENTATION
You are here: Device Administration > Tools > Data Plane Packet Capture.
NOTE: This menu is supported for only SRX4600 devices and SRX5000 line of devices.
Starting in Junos OS 23.1R1 Release, you can quickly capture and analyze router data plane traffic on a
device.
374
The packet capture diagnostic tool allows inspection of data plane traffic. The summary of each decoded
packet is displayed as it is captured. Captured packets are written to a PCAP file which can be
downloaded.
Capture the packet information from the operational mode without committing the configurations and
with a minimal impact to the production system. You can define the packet filter to trace the traffic type
based on your requirement.
1. Complete the configuration according to the guidelines provided in Table 107 on page 374.
NOTE: To capture the packet information, you must provide at least one filter option from
either Basic Filter or Source & Destination Filter.
The packet capturing starts, and the Data Plane Packet Capture page becomes read-only. You can
navigate to other pages while the packet capture process is in progress.
The packet capturing stops and the PCAP file is automatically downloaded to your system from
the /var/log/ folder. To view the packet capture file in the J-Web UI, navgate to Device
Administration > Operations > Files and then click Log files.
NOTE:
• You can only request one packet capture at a time, and you must stop each request before
starting another.
• When a count limit is reached, the capture stops. Click Stop Packet Capture to download
the PCAP file.
Field Description
Basic Filter
375
Table 107: Fields on the Data Plane Packet Capture Page (Continued)
Field Description
Logical interface Select a logical interface from the list for the selected
root logical system.
Tenant logical interface Select a logical interface from the list for the selected
tenant.
Logical system interface Select a logical interface from the list for the selected
logical system.
Table 107: Fields on the Data Plane Packet Capture Page (Continued)
Field Description
Source prefix Enter source IPv4 or IPv6 address prefix to filter the
packets.
Additional Options
Packet capture file name Enter a packet capture file name. You can view the
PCAP file using the Wireshark. Default file name is
packet-capture.
Maximum file size Select the maximum size of the packet capture file.
Maximum capture size Select the maximum packet capture length. The packet
truncates if the capture length is more than the
specified length.
Packet limit Select the packet capture limit value. The packet
capture ends when the packets count limit is reached.
RELATED DOCUMENTATION
Access CLI
IN THIS SECTION
IN THIS SECTION
You are here: Device Administration > Tools > CLI Terminal.
The Junos CLI provides a set of commands for monitoring and configuring a routing platform. Use this
page to access Junos OS CLI through J-Web interface.
To access the CLI through the J-Web interface, your management device requires the following features:
• SSH access—Secure shell (SSH) provides a secured method of logging in to the routing platform to
encrypt traffic so that it is not intercepted. If SSH is not enabled on your system, the CLI terminal
page displays an error and provides a link to the Set Up Quick Configuration page where you can
enable SSH.
• JRE installed on the client—Java Runtime Environment (JRE) version 1.4 or later must be installed on
your system to run Java applications. Download the latest JRE version from the Java Software
website http://www.java.com/. Installing JRE installs Java plug-ins, which once installed, load
automatically and transparently to render Java applets.
378
NOTE: The CLI terminal is supported on JRE version 1.4 or later only.
CLI Overview
The Junos OS CLI uses industry-standard tools and utilities to provide a set of commands for monitoring
and configuring a routing platform. You type commands on a line and press Enter to execute them. The
CLI provides online command Help, command completion, and Emacs-style keyboard sequences for
moving around on the command line and scrolling through a buffer of recently executed commands.
The commands in the CLI are organized hierarchically, with commands that perform a similar function
grouped together under the same level. For example, all commands that display information about the
device system and system software are grouped under the show command, and all commands that
display information about the routing table are grouped under the show route command. The
hierarchical organization results in commands that have a regular syntax and provides the following
features that simplify CLI use:
• Consistent command names—Commands that provide the same type of function have the same
name, regardless of the portion of the software they are operating on. For example, all show
commands display software information and statistics, and all clear commands erase various types of
system information.
• Command completion—Command completion for command names (keywords) and command options
is also available at each level of the hierarchy. In the CLI terminal, you can perform one of the
following actions to complete a command:
• Enter a partial command name followed immediately by a question mark (with no intervening
space) to see a list of commands that match the partial name you typed.
• Press the Spacebar to complete a command or option that you have partially typed. If the partially
typed letters begin a string that uniquely identifies a command, the complete command name
appears. Otherwise, a prompt indicates that you have entered an ambiguous command, and the
possible completions are displayed.
The Tab key option is currently not available on the CLI terminal.
• Operational mode—Complete set of commands to control the CLI environment, monitor and
troubleshoot network connectivity, manage the device, and enter configuration mode.
379
For more information about the Junos OS CLI, see the Junos OS CLI User Guide.
RELATED DOCUMENTATION
IN THIS SECTION
NOTE:
• The configuration statements appear in a fixed order irrespective of the order in which you
configured the routing platform. The top of the configuration displays a timestamp indicating
when the configuration was last changed and the current version.
• Each level in the hierarchy is indented to indicate each statement's relative position in the
hierarchy. Each level is generally set off with braces, using an open brace ({) at the beginning
of each hierarchy level and a closing brace (}) at the end. If the statement at a hierarchy level is
empty, the braces are not displayed. Each leaf statement ends with a semicolon (;), as does
the last statement in the hierarchy.
• The indented representation is used when the configuration is displayed or saved as an ASCII
file. However, when you load an ASCII configuration file, the format of the file is not so strict.
380
The braces and semicolons are required, but the indention and use of new lines are not
required in ASCII configuration files.
1. Click one:
• Commit Options > Commit—Commits the configuration and returns to the CLI Viewer page.
RELATED DOCUMENTATION
IN THIS SECTION
You can configure all routing platform services that you can configure from the Junos CLI prompt.
1. Navigate to the hierarchy level you want to edit. Edit the candidate configuration using standard text
editor operations—insert lines (with the Enter key), delete lines, modify, copy, and paste text.
2. Click Commit to load and commit the configuration. This saves the edited configuration, which
replaces the existing configuration. The device checks the configuration for the correct syntax before
381
committing it. If any errors occur when the configuration is loading or committed, they are displayed
and the previous configuration is restored.
3. Click one:
• Commit Options>Commit—Commits the configuration and returns to the CLI Editor page.
NOTE: When you edit the ASCII configuration file, you can add comments of one or more
lines. Comments must precede the statement they are associated with. If you place the
comments in other places in the file, such as on the same line after a statement or on a
separate line following a statement, they are removed when you click Commit. Comments
must begin and end with special characters. For more information, see the Junos OS CLI User
Guide.
RELATED DOCUMENTATION
IN THIS SECTION
1. To edit the configuration on a series of pages of clickable options that step you through the
hierarchy, enter the information specified in Table 108 on page 382. Table 109 on page 383 lists key
J-Web configuration editor tasks and their functions.
382
NOTE: Options changes for each device. For a device, if a feature is not yet configured, you
have the option to first configure the feature. If the feature is already configured, you have
the option to edit or delete the feature on that particular device.
2. Click one:
• Refresh—Refreshes and updates the display with any changes to the configuration made by other
users.
• Commit—Verifies edits and applies them to the current configuration file running on the device.
• Discard—Removes edits applied to, or deletes existing statements or identifiers from, the
candidate configuration.
3. Click one:
Field Description
Click an option:
Field Function
Access Specifies that you can edit or delete access and user
authentication methods to the device. The options
available are:
Accounting options Specifies that you can configure accounting options such as
log data about basic system operations and services on the
device. The option available is:
Chassis Specifies that you can configure alarms and other chassis
properties on the device. The option available is:
Class of service Specifies that you can edit or delete the Class-of-Service
feature. The options available are:
Field Function
Ethernet switching options Specifies that you can configure Ethernet switching options
on the device. The option available is:
Event options Specifies that you can configure diagnostic event policies
and actions associated with each policy. The option
available is:
Multicast snooping options Specifies that you can configure multicast snooping
options. The option available is:
Field Function
Poe Specifies that you can edit or delete Power over Ethernet
options on the device. The options available are:
Policy options Specifies that you can configure routing policies that
control information from routing protocols that the device
imports into its routing table and exports to its neighbors.
The option available is:
Schedulers Specifies that you can determine the day and time when
security policies are in effect. The option available is:
Field Function
Security Specifies that you can edit or delete the rules for the transit
traffic and the actions that need to take place on the traffic
as it passes through the firewall; and to monitor the traffic
attempting to cross from one security zone to another. The
options available are:
Field Function
Vlans Specifies that you can edit or delete a virtual LAN. The
options available are:
Access profile
Advanced
Add new entry Click Add new entry to add a new identifier.
RELATED DOCUMENTATION
CHAPTER 26
Reset Configuration
IN THIS CHAPTER
NOTE: This menu is only available if you have selected Standalone mode when configuring
device factory default settings using the J-Web Setup Wizard.
This page allows you to reset the device configuration and rerun the J-Web Setup Wizard. For details on
using the setup wizard to perform initial configuration on a device with a factory default configuration,
see "Access the J-Web User Interface" on page 3.
RELATED DOCUMENTATION
Network
Connectivity—Interfaces | 391
Connectivity—VLAN | 404
Connectivity—PPPoE | 420
CoS—Schedulers | 607
Compliance | 715
391
CHAPTER 27
Connectivity—Interfaces
IN THIS CHAPTER
IN THIS SECTION
Use this page to view or configure the logical interfaces to switch to L2 or L3 mode. You can view the
interfaces in the ways of interface type, interface state, or zone association.
Field Descriptions
Table 110 on page 392 describes the fields to view interface configuration on the Interfaces page.
NOTE:
• J-Web supports IOC4 line cards for SRX5000 line of devices. You can also view the sub-ports
details configured on any or all ports of the SRX5K-IOC4-MRATE line card.
• J-Web supports Wi–Fi Mini-PIM for SRX320, SRX340, SRX345, and SRX550M devices. The
physical interface for the Wi-Fi Mini-PIM uses the name wl-x/0/0, where x identifies the slot
on the services gateway where the Mini-PIM is installed.
You can also configure the wl-x/0/0 interface when adding a zone at Security Policies &
Objects > Zones/Screens.
Field Action
Filter by Select an option from the list to view the interfaces configuration details. The available options
are:
• Interface Type—Select an option to display the list of interfaces available on the device.
• Interface State—Select an option to display the interfaces state of the device. The options
are:
• Admin Up
• Link Up
• Admin Down
Clear Filter Clears the filter options that you have selected and displays all the interfaces.
Table 110: View Interface Configuration Details on the Interfaces Page (Continued)
Field Action
• MAC limit—Enter the maximum number of MAC addresses learned per interface.
• Action—Select an option from the list for the action taken when MAC limit is reached.
The options available are:
• drop
• drop-and-log
• log
• none
• shutdown
Table 111 on page 394 describes the fields on the Interfaces page.
394
Field Description
Logical interfaces configured under this interface appear in a collapsible list under the
physical interface.
Admin status Displays the administrative status of the interface. Status can be either Up or Down.
Link Status Displays the operational status of the link. Status can be either Up or Down.
Zone Displays the security zone with which this interface is associated.
Logical System/Tenant Display the statistics information for the specified logical system or tenant.
Speed Displays the Interface speed (10 Mbps, 100 Mbps, 1 Gbps, or Auto).
RELATED DOCUMENTATION
1. Select an interface and click + available on the upper-right corner of the Interfaces page.
The Add Interface page appears.
2. Complete the configuration according to the guidelines provided in Table 112 on page 395.
3. Click OK to save the changes. If you want to discard your changes, click Cancel instead.
If you click OK, a new logical interface with the provided configuration is created.
Table 112 on page 395 provides guidelines on using the fields on the Add Interface page.
Field Description
General
• None
• Logical System
• Tenant
NOTE: This option is available when you select the multitenancy type as logical
system.
396
Field Description
NOTE: This option is available when you select the multitenancy type as tenant.
Protocol (family)
IPv4 Address
Enable DHCP Select this option to enable Dynamic Host Configuration Protocol (DHCP).
1. Click +.
• Web Auth—Click Configure and enable the options, Enable Http, Enable
Https, and Redirect to Https. Then, click OK to save changes.
• ARP—Click Edit.
In the ARP Address page, click + and enter the IPv4 Address, MAC Address,
and select Publish.
IPv6 Address
397
Field Description
1. Click +.
Ethernet Switching
Recovery Timeout Enter a period of time in seconds that the interface remains in a disabled state due
to a port error prior to automatic recovery.
VoIP VLAN Select a VLAN name from the list to be sent from the authenticating server to the
IP phone.
Configure Vlan(s) Select a VLAN from the Available column and move it to Selected column using the
right arrow.
398
Field Description
General- ge
Speed Select the speed from the list: 10 Mbps, 100 Mbps, 1 Gbps, or None.
Link Mode Select the link mode from the list: Half Duplex, Full Duplex, and None.
Loopback Select this option if you want the interface to loop back.
Flow Control Select this option to enable flow control, which regulates the flow of packets from
the router to the remote side of the connection.
Enable Per Unit Scheduler Select this option to enable the association of scheduler maps with logical
interfaces.
Enable Vlan Tagging Select this option to enable the reception and transmission of 802.1Q VLAN-
tagged frames on the interface.
Add Click + and enter the MAC address to assign it to the interface.
Field Description
MAC Limit Enter a value for MAC addresses to be associated with a VLAN.
• drop—Drop packets with new source MAC addresses, and do not learn the new
source MAC addresses.
• log—Hold packets with new source MAC addresses, and generate an alarm, an
SNMP trap, or a system log entry.
• none—Forward packets with new source MAC addresses and learn the new
source MAC address.
General- lt
• Ethernet
• Ethernet-VPLS
Field Description
• None
• Logical System
• Tenant
NOTE: This option is available when you select the multitenancy type as logical
system.
NOTE: This option is available when you select the multitenancy type as tenant.
st0
Unnumbered Select this option to fetch interface from which an unnumbered interface borrows
an IPv4 address.
Numbered Select this option to fetch interface from which a numbered interface borrows an
IPv4 or IPv6 address.
Field Description
IPv4 Subnet Mask Enter a subnet mask for the IPv4 address.
IPv6 Subnet Mask Enter a subnet mask for the IPv6 address.
Multipoint
Automatic Select this option to automatically fetch next hop tunnel address.
Manual Click + to add next hop tunnel address and VPN name.
Routing Protocols
• all—Select this option to enable all protocols routing on the routing device.
RELATED DOCUMENTATION
Edit an Interface
To edit an interface:
1. Select an existing interface that you want to edit on the Interfaces page.
2. Click the pencil icon available on the upper-right corner of the page.
The interface options appear with editable fields. For more information on the options, see "Add a
Logical Interface" on page 395.
3. Click OK.
Starting in Junos OS Junos OS 22.3R1 release, you can enable the interface with flexible VLAN tagging
along with native VLAN ID or VLAN tagging for interfaces. To do this:
NOTE: Supported interfaces are GE, XE, AE, WL, and RETH.
2. Click the pencil icon available on the upper right side of the page.
3. In the VLAN tagging type field, select one of the following options:
• None—No action.
• VLAN tagging—Receive and forward single-tag frames, dual-tag frames, or a mixture of single-tag
and dual-tag frames.
4. Click up or down arrow in the Native VLAN ID field to specify the VLAN identifier to associate with
untagged packets received on the physical interface.
NOTE: This option is available only if you choose Flexible VLAN tagging type.
5. Click OK.
RELATED DOCUMENTATION
1. Select a logical interface that you want to delete from the Interfaces page.
2. Click the delete icon available on the upper-right corner of the page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 28
Connectivity—VLAN
IN THIS CHAPTER
IN THIS SECTION
Use this page to view, add, and remove VLAN configuration details.
• Show or hide columns in the VLAN table. To do this, use the Show Hide Columns icon in the upper-
right corner of the page and select the options you want to show or deselect to hide options on the
page.
• Advanced search for a VLAN. To do this, use the search text box present above the table grid. The
search includes the logical operators as part of the filter string. In the search text box, when you
hover over the icon, it displays an example filter condition. When you start entering the search string,
the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 113 on page 405 describes the fields on the VLAN page.
Field Function
Field Function
RELATED DOCUMENTATION
Add a VLAN
To add a VLAN:
Table 114 on page 406 provides guidelines on using the fields on the Add VLAN page.
Field Description
VLAN Details
NOTE: The VLAN text field is disabled when vlan-tagging is not enabled.
407
Field Description
• Single
• Range
VLAN ID Enter a unique identification number for the VLAN from 1 through 4094. If no value is specified,
the default is 1.
• Remove—Select the interface or interfaces that you do not want associated with the VLAN.
Filter
Input Filter To apply an input firewall filter to an interface, select the firewall filter from the list.
Output Filter To apply an output firewall filter to an interface, select the firewall filter from the list.
IPv4 Address
NOTE: This option is available only when you select VLAN ID type as Single.
Field Description
Subnet Enter the range of logical addresses within the address space that is assigned to an organization.
For example, 255.255.255.0.
• Delete—Select the IPv4 address or addresses that you do not want associated with the
VLAN.
IPv6 Address
NOTE: This option is available only when you select VLAN ID type as Single.
RELATED DOCUMENTATION
Edit a VLAN
To edit a VLAN:
1. Select an existing VLAN that you want to edit on the VLAN page.
2. Click the pencil icon available on the upper-right corner of the page.
409
The Edit VLAN page appears with editable fields. For more information on the options, see "Add a
VLAN" on page 406.
3. Click OK to save the changes.
RELATED DOCUMENTATION
Delete a VLAN
To delete a VLAN:
1. Select one or more VLANs that you want to delete on the VLAN page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
1. Select a VLAN.
2. Click Assign Interface on the upper-right corner of the VLAN page.
The Assign Interfaces page appears.
3. Complete the configuration according to the guidelines provided in Table 115 on page 410.
4. Click OK to save the changes. If you want to discard your changes, click Cancel.
410
Field Description
VLAN Name Displays the name of the VLAN for which you want to assign the interface.
Interfaces Select the interfaces in the Available column and use the right arrow to move them to the
Selected column.
VoIP Interfaces Select the VoIP interfaces in the Available column and use the right arrow to move them to the
Selected column.
RELATED DOCUMENTATION
CHAPTER 29
Connectivity—Link Aggregation
IN THIS CHAPTER
IN THIS SECTION
Use this page to view, add, and remove link aggregation configuration details.
• Add Logical Interface. See "Add a Logical Interface to Link Aggregation" on page 414.
412
• Enable/Disable LACP link-protection. To do this, select a link aggregation and click Enable/Disable
available at the upper-right corner of the Link Aggregation table.
• Search for text in a link aggregation table. See "Search for Text in the Link Aggregation Table" on page
418.
• Show or hide columns in the Link Aggregation table. To do this, use the Show Hide Columns icon in
the upper-right corner of the page and select the options you want to show or deselect to hide
options on the page.
Field Descriptions
Table 116 on page 412 describes the fields on the Link Aggregation page.
Field Description
Link Status Displays whether the interface is linked (Up) or not linked (Down).
VLAN ID Displays the Virtual LAN identifier value for IEEE 802.1Q VLAN tags (0.4094).
VLAN Tagging Type Displays whether the interface is enabled with VLAN-tagging, Flexible VLAN Tagging, or
Flexible VLAN Tagging along with native VLAN ID.
413
Field Description
RELATED DOCUMENTATION
Complete the configuration according to the guidelines provided in Table 117 on page 413.
Field Action
General
Device count Enter the device count. By default, J-Web displays the device count as the same number
of created aggregated Ethernet interfaces.
System priority Click the arrow button to select the priority level that you want to associate with the
LAG.
414
Table 117: Fields on the Link Aggregation Global Settings page (Continued)
Field Action
• Non-revertive—Disable the ability to switch to a better priority link (if one is available)
once a link is established as active and collection distribution is enabled.
RELATED DOCUMENTATION
Field Action
General
Field Action
IPv4 Address
IPv6 Address
RELATED DOCUMENTATION
Field Action
General
Name Enter the aggregated interface name. The name should be in aeX format. Where X is a
number.
NOTE: If an aggregated interface already exists, then the field is displayed as read-only.
Interfaces Select the interface available for aggregation and move to Selected column using right
arrow.
NOTE: Only interfaces that are configured with the same speed can be selected together
for a LAG.
NOTE: When you edit from None to VLAN tagging or Flexible VLAN tagging or vice versa,
all the logical interfaces of the selected interface are deleted.
Native VLAN ID VLAN identifier to associate with untagged packets received on the physical interface.
Field Action
LACP mode Select a mode in which Link Aggregation Control Protocol packets are exchanged between
the interfaces. The modes are:
Periodic Select a periodic transmissions of link aggregation control PDUs occur at different
transmission rate. The options available are:
System priority Click the arrow button to select the priority level that you want to associate with the LAG.
NOTE: You can configure only two member links for an aggregated Ethernet interface, that
is, one active and one standby.
• Non-revertive—Disable the ability to switch to a better priority link (if one is available)
once a link is established as active and collection distribution is enabled.
RELATED DOCUMENTATION
1. Select an existing aggregated interface that you want to edit on the Aggregated Interface page.
2. Click the pencil icon available on the upper-right corner of the page.
The edit Aggregated Interface page appears with editable fields. For more information on the
options, see "Add a Link Aggregation" on page 415.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select one or more aggregated interfaces that you want to delete on the Link Aggregation page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You can use the search icon in the upper-right corner of the Link Aggregation page to search for text
containing letters and special characters on that page.
1. Click the search icon and enter partial text or full text of the keyword in the search bar.
The search results are displayed.
419
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 30
Connectivity—PPPoE
IN THIS CHAPTER
Configure PPPoE
NOTE: This menu is available only for SRX300 lines of devices and SRX550M device.
PPPoE connects multiple hosts on an Ethernet LAN to a remote site through a single customer premises
equipment (CPE) device (Juniper Networks device).
Use the configure PPPoE tasks to configure the PPPoE connection. The PPPoE wizard guides you to set
up a PPPoE client over the Ethernet connection.
NOTE: On all branch SRX Series Firewalls, the PPPoE wizard has the following limitations:
• While you use the load and save functionality, the port details are not saved in the client file.
• The Non Wizard connection option cannot be edited or deleted through the wizard. Use the
CLI to edit or delete the connections.
• The PPPoE wizard cannot be loaded from the client file if non-wizard connections share the
same units.
• The PPPoE wizard cannot load the saved file from one platform to another platform.
421
• There is no backward compatibility between PPPoE wizard Phase 2 to PPPoE wizard Phase 1.
As a result, the PPPoE connection from Phase 2 will not be shown in Phase 1 when you
downgrade to an earlier release.
RELATED DOCUMENTATION
Configure VPN
422
CHAPTER 31
Connectivity—Wireless LAN
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Connectivity > Wireless LAN > Settings.
NOTE: Starting in Junos OS Release 20.1R1, J-Web supports SRX380 devices. You can configure
the SRX380 device supported wireless LAN settings.
423
• Create access point radio settings. See "Create an Access Point Radio Setting" on page 426.
• Edit access point radio settings. See "Edit an Access Point Radio Setting" on page 430.
• Delete access point radio settings. See "Delete an Access Point Radio Settings" on page 430.
Field Descriptions
Table 120 on page 423 describes the fields on the Settings page.
Field Description
Release Description
20.1R1 Starting in Junos OS Release 20.1R1, J-Web supports SRX380 devices. You can configure the SRX380
device supported wireless LAN settings.
RELATED DOCUMENTATION
You are here: Network > Connectivity > Wireless LAN > Settings.
Field Action
Basic Settings
Table 121: : Fields on the Create Access Point Configuration Page (Continued)
Field Action
RELATED DOCUMENTATION
You are here: Network > Connectivity > Wireless LAN > Settings.
1. Select an existing access point that you want to edit on the Settings page.
2. Click the pencil icon on the upper-right corner of the page.
The Edit Access Point Configuration page appears with editable fields. For more information on the
options, see "Create an Access Point" on page 424.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Connectivity > Wireless LAN > Settings.
1. Select an existing access point that you want to delete on the Settings page.
2. Click the delete icon on the upper-right corner of the page.
3. Click Yes to delete the access point or click No to retain the access point.
RELATED DOCUMENTATION
You are here: Network > Connectivity > Wireless LAN > Settings.
Table 122: Fields on the Create Access Point Radio Settings Page
Field Action
Radio
Table 122: Fields on the Create Access Point Radio Settings Page (Continued)
Field Action
Table 122: Fields on the Create Access Point Radio Settings Page (Continued)
Field Action
1. Click Add.
Basic Settings:
Security:
Table 122: Fields on the Create Access Point Radio Settings Page (Continued)
Field Action
• Allowed List
MAC Address—Enter a MAC address that you want to allow and click Add to add
the address in the MAC addresses list.
• Deny List
MAC Address—Enter a MAC address that you want to block and click Add to add
the address in the MAC addresses list.
Select the virtual access point and click Edit or Delete icons to edit or remove it.
Channel Number Select a channel number for radio from the list.
Channel Bandwidth Select a channel bandwidth for radio from the list.
Transmit Power Enter a value for radio transmit power using up or down arrows.
430
RELATED DOCUMENTATION
You are here: Network > Connectivity > Wireless LAN > Settings.
1. Select an existing access point radio setting that you want to edit on the Settings page.
2. Click the edit icon on the upper-right corner of the Radio Settings table.
The Edit Access Point Radio Settings page appears with editable fields. For more information on the
options, see "Create an Access Point Radio Setting" on page 426.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Connectivity > Wireless LAN > Settings.
1. Select an existing access point radio setting that you want to delete on the Settings page.
2. Click the delete icon available on the upper-right corner of the Radio Settings table.
3. Click Yes to delete the access point radio settings or click No to retain the access point radio settings.
RELATED DOCUMENTATION
CHAPTER 32
DHCP Client
IN THIS CHAPTER
IN THIS SECTION
Use this page to view, add, and remove link aggregation configuration details.
• Create DHCP client information. See "Add DHCP Client Information" on page 433.
• Delete DHCP client information. See "Delete DHCP Client Information" on page 435.
Field Descriptions
Table 123 on page 433 describes the fields on the DHCP Client page.
433
Field Description
DHCP Client Identifier Displays the name of the client used by the DHCP server to index its database of
address bindings.
Lease Time Displays the time in seconds, to negotiate and exchange DHCP messages.
RELATED DOCUMENTATION
Field Action
Interface Enter the name of the interface on which to configure the DHCP client.
Client Identifier Specifies the name of the client used by the DHCP server to index its database of
address bindings.
• Hexadecimal—Hexadecimal client.
Specifies the number of attempts the router is allowed to retransmit a DHCP packet
fallback.
DHCP Server Address Enter the IPv4 address of the DHCP server.
Specifies the preferred DHCP server that the DHCP clients contact with DHCP
queries.
Specifies the vendor class identity number for the DHCP client.
Update Server Select the check box to enable the propagation of TCP/IP settings on the specified
interface (if it is acting as a DHCP client) to the DHCP server that is configured on the
router.
435
RELATED DOCUMENTATION
1. Select a DHCP Client that you want to delete on the DHCP Client page.
2. Click Delete available on the DHCP Client page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 33
DHCP Server
IN THIS CHAPTER
IN THIS SECTION
Use this page to view, add, and remove DHCP server configuration details.
• Configure DHCP group global settings. See "DHCP Groups Global Settings" on page 443.
Field Descriptions
Table 125 on page 437 describes the fields on the DHCP Server page.
Field Description
Routing Instance Displays the name of the routing instance selected for DHCP server.
DHCP Pools
DHCP Groups
Field Description
Address Range Name Specify the name of the address assignment pool.
Address Range (Low) Specifies the lowest address in the IP address pool range.
Address Range (High) Specifies the highest address in the IP address pool range.
Host Name Specifies the name of the client for the static binding.
RELATED DOCUMENTATION
Table 126 on page 439 describes the Add DHCP Pool Page.
439
Field Action
General
• IP Address—Enter an IP address.
Domain Name Enter the domain name to be assigned to the address pool.
Server Identifier Enter the name of the server identifier to assign to the DHCP client in the address
pool.
Netbios Node Type Select a NetBIOS node type from the list. This is equivalent to DHCP option 46.
Next Server Enter the IP address of the next DHCP server that the clients need to contact.
Specifies the name of the interface on the router through which the resolved
DHCP queries are propagated to the DHCP pool.
Field Action
Boot File Enter the path and filename of the initial boot file to be used by the client.
Boot Server Enter the IP address or hostname of the TFTP server that provides the initial boot
file to the client.
DNS Name Servers Specifies the DNS name to assign to the DHCP client in the address pool.
• Click the pencil icon to edit a selected DNS name in the address pool.
WINS Servers Specifies the WINS servers to assign to the DHCP client in the address pool.
• Click the pencil icon to edit a selected WINS server in the address pool.
Field Action
Gateway Routers Specifies the gateway router to assign client in the address pool.
• Click the pencil icon to edit a selected gateway router in the address pool.
• Code—Type a number.
You can select the DHCP option and click the pencil icon to edit or click X to delete
the DHCP options.
Option-82 Device inserts DHCP option 82 (also known as the DHCP relay agent information
option) information.
Address Range
Click + to add address range. After configuring the attributes, click OK to save the changes.
Selected an address range and click the pencil icon to edit it or click X to delete it.
442
Field Action
Low Enter an IP address that is part of the subnet specified in Address Pool subnet.
High Enter an IP address that is part of the subnet specified in Address Pool Subnet. This
address must be greater than the address specified in Address Range Low.
Static Bindings
Click + to add DHCP static bindings. After configuring the attributes, click OK to save the changes.
Selected a DHCP static binding and click the pencil icon to edit it or click X to delete it.
Host Name Enter the hostname to assign the DHCP client to the MAC address.
Fixed IP Address Enter the fixed address to assign the DHCP client to the MAC address.
RELATED DOCUMENTATION
1. Select an existing DHCP Pool that you want to edit on the DHCP Server page.
2. Click the pencil icon available on the upper-right corner of the DHCP Pools table.
The Edit DHCP Pool page appears. You can edit the network addresses. For more information on the
options, see "Add a DHCP Pool" on page 438.
443
RELATED DOCUMENTATION
1. Select a DHCP Pool that you want to delete on the DHCP Server page.
2. Click the delete icon available on the upper-right corner of the DHCP Pools table.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
1. Click Global Settings available on the upper-right corner of the DHCP Groups table.
The DHCP Global Configuration page appears.
2. Select the options available in the Available column and move them to Selected column using the
arrow to configure the order of the DHCP pool match.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
Table 127 on page 444 describes the fields on the Add DHCP Group.
Field Action
Interfaces Select the interfaces available in the Available column and move them to Selected column
using the right arrow.
RELATED DOCUMENTATION
1. Select an existing DHCP group that you want to edit on the DHCP Server page.
2. Click the pencil icon available on the upper-right corner of the DHCP Groups table.
The Edit DHCP Group page appears with editable fields. For more information on the options, see
"Add a DHCP Group" on page 444.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select a DHCP group that you want to delete on the DHCP Server page.
2. Click the delete icon available on the upper-right corner of the DHCP Groups table.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 34
Firewall Filters—IPv4
IN THIS CHAPTER
IN THIS SECTION
• Add an IPv4 firewall filter. See "Add IPv4 Firewall Filters" on page 447.
Field Descriptions
Table 128 on page 447 describes the fields on the IPv4 page.
447
Field Description
Filter Name Displays the name of the filter and when expanded, lists the terms attached to the filter.
RELATED DOCUMENTATION
1. Complete the configuration according to the guidelines provided in Table 129 on page 448 and Table
130 on page 450.
2. Click Add available in the Add New IPv4 Filter section.
A new IPv4 Firewall Filter is created.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
448
Field Action
• To move an item upward—Locate the item and click the up arrow from the same row.
• To move an item downward—Locate the item and click the down arrow from the same row.
• To delete an item—Locate the item and click the X from the same row.
Filter Name Displays the name of the filter and when expanded, lists the terms attached to the filter.
Displays the match conditions and actions that are set for each term.
• To display the terms added to a filter—Click the plus sign next to the filter name. This also
displays the match conditions and actions set for the term.
• To edit a filter—Click the filter name. To edit a term, click the name of the term.
Search
• To find a specific filter—Enter the name of the filter in the Filter Name box.
• To list all filters with a common prefix or suffix—Use the wildcard character (*) when you
enter the name of the filter. For example, te* lists all filters with a name starting with the
characters te.
449
Table 129: Fields on the Add IPv4 Firewall Filter Page (Continued)
Field Action
• To find a specific term—Enter the name of the term in the Term Name box.
• To list all terms with a common prefix or suffix—Use the wildcard character (*) when typing
the name of the term. For example, ra* lists all terms with a name starting with the
characters ra .
Number of Enter the number of filters or terms to display on one page. Select the number of items to be
Items to displayed on one page.
Display
• To find a specific filter—Enter the name of the filter in the Filter Name box.
• To list all filters with a common prefix or suffix—Use the wildcard character (*) when you
enter the name of the filter. For example, te* lists all filters with a name starting with the
characters te.
• To find a specific term—Enter the name of the term in the Term Name box.
• To list all terms with a common prefix or suffix—Use the wildcard character (*) when typing
the name of the term. For example, ra* lists all terms with a name starting with the
characters ra .
450
Table 129: Fields on the Add IPv4 Firewall Filter Page (Continued)
Field Action
Add Adds a new filter name. Opens the term summary page for this filter allowing you to add new
terms to this filter.
Add Opens the Filter Term page allowing you to define the match conditions and the action for this
term.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter
Field Action
Match Source
451
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Source Address Enter IP source addresses to be included in, or excluded from, the match condition. Allows you
to remove source IP addresses from the match condition.
If you have more than 25 addresses, this field displays a link that allows you to easily scroll
through pages, change the order of addresses, and also search for them.
• Except—To exclude the address from the match condition and then select Add -To include
the address in the match condition.
Source Prefix Enter source prefix lists, which you have already defined, to be included in the match
List condition. Allows you to remove a prefix list from the match condition.
Select an option:
• Add—To include a predefined source prefix list in the match condition, type the prefix list
name.
• Except—To exclude the prefix list from the match condition and then select Add—To include
the prefix list in the match condition.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Source Port Enter the source port type to be included in, or excluded from, the match condition. Allows
you to remove a source port type from the match condition.
NOTE: This match condition does not check the protocol type being used on the port. Make
sure to specify the protocol type (TCP or UDP) match condition in the same term.
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Select the port from the port name list; enter the port name, number, or range and then select
an option.
Match Destination
Destination Enter destination addresses to be included in, or excluded from, the match condition. Allows
Address you to remove a destination IP address from the match condition.
If you have more than 25 addresses, this field displays a link that allows you to easily scroll
through pages, change the order of addresses, and also search for them.
• Except—To exclude the address from the match condition and then select Add—To include
the address in the match condition.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Destination Enter destination prefix lists, which you have already defined, to be included in the match
Prefix List condition. Allows you to remove a prefix list from the match condition.
Select an option:
• Add—To include a predefined destination prefix list, enter the prefix list name.
• Except—To exclude the prefix list from the match condition and then select Add—To include
the prefix list in the match condition.
Destination Enter destination port types to be included in, or excluded from, the match condition. Allows
Port you to remove a destination port type from the match condition.
NOTE: This match condition does not check the protocol type being used on the port. Make
sure to specify the protocol type (TCP or UDP) match condition in the same term.
The options available are:
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Select the port from the port name list; enter the port name, number, or range; and then select
an option.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Address Enter IP addresses to be included in, or excluded from, the match condition for a source or
destination. Allows you to remove an IP address from the match condition.
If you have more than 25 addresses, this field displays a link that allows you to easily scroll
through pages, change the order of addresses and also search for them.
NOTE: This address match condition cannot be specified in conjunction with the source
address or destination address match conditions in the same term.
The options available are:
• Except—To exclude the address from the match condition and then select Add—To include
the address in the match condition.
Prefix List Enter prefix lists, which you have already defined, to be included in the match condition for a
source or destination. Allows you to remove a prefix list from the match condition.
NOTE: This prefix list match condition cannot be specified in conjunction with the source
prefix list or destination prefix list match conditions in the same term.
Select an option:
• Add—To include a predefined destination prefix list, type the prefix list name.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Port Enter a port type to be included in, or excluded from, a match condition for a source or
destination. Allows you to remove a destination port type from the match condition.
NOTE: This match condition does not check the protocol type being used on the port. Make
sure to specify the protocol type (TCP or UDP) match condition in the same term.
Also, this port match condition cannot be specified in conjunction with the source port or
destination port match conditions in the same term.
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Select the port from the port name list; enter the port name, number, or range; and then select
an option.
Match Interface
Interface Enter interfaces to be included in a match condition. Allows you to remove an interface from
the match condition.
Select a name from the interface name list or Enter the interface name and select an option.
456
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Interface Set Enter interface sets, which you have already defined, to be included in a match condition.
Allows you to remove an interface set from the match condition.
Interface Group Enter interface groups, which you have already defined, to be included in, or excluded from, a
match condition. Allows you to remove an interface group from the match condition.
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Matches trailing fragments (all but the first fragment) of a fragmented packet.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
NOTE: This match condition does not verify that the TCP is used on the port. Make sure to
specify the TCP as a match condition in the same term.
NOTE: This match condition does not verify that the TCP is used on the port. Make sure to
specify the TCP as a match condition in the same term.
TCP Flags Enter Transmission Control Protocol flags to be included in the match condition.
NOTE: This match condition does not verify that the TCP is used on the port. Make sure to
specify the TCP as a match condition in the same term.
Protocol Enter IPv4 protocol types to be included in, or excluded from, the match condition. Allows you
to remove an IPv4 protocol type from the match condition.
• Except—To exclude the protocol from the match condition and then select Add—To include
the protocol in the match condition.
Select a protocol name from the list or enter a protocol name or number and then select an
option.
458
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
ICMP Type Select a packet type from the list or enter a packet type name or number and then select an
option.
NOTE: This protocol does not verify that ICMP is used on the port. Make sure to specify an
ICMP type match condition in the same term.
• Except—To exclude the packet type from the match condition and then select.
ICMP Code Select a packet code from the list or enter the packet code as text or a number and select an
option.
NOTE: The ICMP code is dependent on the ICMP type. Make sure to specify an ICMP type
match condition in the same term.
• Except—To exclude the packet type from the match condition and then select
Fragment Enter a fragment offset number or range and then select an option.
Offset
The options available are:
• Except—To exclude the offset from the match condition and then select Add—To include
the offset in the match condition.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Precedence Enter IP precedence to be included in, or excluded from, the match condition. Allows you to
remove an IP precedence entry from the match condition.
• Except—To exclude the precedence from the match condition and then select
DSCP Select DSCP from the list; or enter the DSCP value as a keyword, a decimal integer from 0
through 7, or a binary string; and then select an option.
• Except—To exclude the DSCP from the match condition and then select Add—To include
the DSCP in the match condition.
TTL Enter an IPv4 TTL value by entering a number from 1 through 255 and select an option.
• Except—To exclude the TTL from the match condition and then select Add—To include the
TTL in the match condition .
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Select an option.
• Except—To exclude the packet length from the match condition and then select
Forwarding Specify a forwarding class by selecting a forwarding class from the list or entering a forwarding
Class class, and then select an option.
• Except—To exclude the forwarding class from the match condition and then select
IP Options Enter option by selecting an IP option from the list or entering a text or numeric string
identifying the option, and then select an option.
• Except—To exclude the IP option from the match condition and then select Add—To include
the IP option in the match condition.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
IPsec ESP SPI Enter an ESP SPI value by entering a binary, hexadecimal, or decimal SPI value or range, and
then select an option.
• Except—To exclude the value from the match condition and then select Add—To include the
value in the match condition.
Action
Specifies that no action is performed. By default, a packet is accepted if it meets the match
conditions of the term, and packets that do not match any conditions in the firewall filter are
dropped.
Discards a packet that meets the match conditions of the term. Names a discard collector for
packets.
Reject Select Reject and then select a message type from the reason list.
Rejects a packet that meets the match conditions of the term and returns a rejection message.
Allows you to specify a message type that denotes the reason the packet was rejected.
NOTE: To log and sample rejected packets, specify log and sample action modifiers in
conjunction with this action.
462
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Evaluates a packet with the next term in the filter if the packet meets the match conditions in
this term. This action makes sure that the next term is used for evaluation even when the
packet matches the conditions of a term. When this action is not specified, the filter stops
evaluating the packet after it matches the conditions of a term and takes the associated action.
Routing Accepts a packet that meets the match conditions, and forwards it to the specified routing
Instance instance.
Select Routing Instance and enter the routing instance name in the box next to Routing
Instance.
Action Modifiers
Count Counts the packets passing this term. Allows you to name a counter that is specific to this
filter. This means that every time a packet transits any interface that uses this filter, it
increments the specified counter.
Select Count and enter a 24-character string containing letters, numbers, or hyphens to specify
a counter name.
Table 130: Fields on the Match Criteria for IPv4 Firewall Filter (Continued)
Field Action
Loss Priority Sets the loss priority of the packet. This is the priority of dropping a packet before it is sent,
and it affects the scheduling priority of the packet.
RELATED DOCUMENTATION
CHAPTER 35
Firewall Filters—IPv6
IN THIS CHAPTER
IN THIS SECTION
• Add an IPv6 Firewall Filters. See "Add IPv6 Firewall Filters" on page 465.
Field Descriptions
Field Description
Filter Name Displays the name of the filter and when expanded, lists the terms attached to the filter.
RELATED DOCUMENTATION
1. Complete the configuration according to the guidelines provided in Table 132 on page 466 and Table
133 on page 469.
2. Click Add available in the Add New IPv6 Filter section.
A new IPv6 Firewall Filter is created.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Table 132 on page 466 describes the fields on the Add IPv6 page.
466
Field Action
Filter Name Enter the name of the filter and, when expanded, lists
the terms attached to the filter.
Search
467
Table 132: Fields on the Add IPv6 Firewall Filter Page (Continued)
Field Action
Table 132: Fields on the Add IPv6 Firewall Filter Page (Continued)
Field Action
Filter Name Enter the name of the filter and when expanded, lists
the terms attached to the filter.
Select an option:
Select an option:
Table 132: Fields on the Add IPv6 Firewall Filter Page (Continued)
Field Action
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter
Field Action
Match Source
470
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Source Address Specifies IP source addresses to be included in, or excluded from, the match condition. Allows
you to remove source IP addresses from the match condition.
If you have more than 25 addresses, this field displays a link that allows you to easily scroll
through pages, change the order of addresses, and also search for them.
• Except—To exclude the address from the match condition and then select Add -To include
the address in the match condition.
Source Prefix Specifies source prefix lists, which you have already defined, to be included in the match
List condition. Allows you to remove a prefix list from the match condition.
Select an option:
• Add—To include a predefined source prefix list in the match condition, type the prefix list
name.
Source Port Specifies the source port type to be included in, or excluded from, the match condition. Allows
you to remove a source port type from the match condition.
NOTE: This match condition does not check the protocol type being used on the port. Make
sure to specify the protocol type (TCP or UDP) match condition in the same term.
Select the port from the port name list; enter the port name, number, or range and then select
an option:
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Match Destination
471
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Destination Specifies destination addresses to be included in, or excluded from, the match condition.
Address Allows you to remove a destination IP address from the match condition.
If you have more than 25 addresses, this field displays a link that allows you to easily scroll
through pages, change the order of addresses, and also search for them.
• Except—To exclude the address from the match condition and then select Add—To include
the address in the match condition.
Destination Specifies destination prefix lists, which you have already defined, to be included in the match
Prefix List condition. Allows you to remove a prefix list from the match condition.
Select an option:
• Add—To include a predefined destination prefix list, enter the prefix list name.
Destination Specifies destination port types to be included in, or excluded from, the match condition.
Port Allows you to remove a destination port type from the match condition.
NOTE: This match condition does not check the protocol type being used on the port. Make
sure to specify the protocol type (TCP or UDP) match condition in the same term.
Select the port from the port name list; enter the port name, number, or range; and then select
an option:
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Address Specifies IP addresses to be included in, or excluded from, the match condition for a source or
destination. Allows you to remove an IP address from the match condition.
If you have more than 25 addresses, this field displays a link that allows you to easily scroll
through pages, change the order of addresses and also search for them.
NOTE: This address match condition cannot be specified in conjunction with the source
address or destination address match conditions in the same term.
Enter an IP destination address and prefix length and select an option:
• Except—To exclude the address from the match condition and then select Add—To include
the address in the match condition.
Prefix List Specifies prefix lists, which you have already defined, to be included in the match condition for
a source or destination. Allows you to remove a prefix list from the match condition.
NOTE: This prefix list match condition cannot be specified in conjunction with the source
prefix list or destination prefix list match conditions in the same term.
Select an option:
• Add—To include a predefined destination prefix list, type the prefix list name.
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Port Specifies a port type to be included in, or excluded from, a match condition for a source or
destination. Allows you to remove a destination port type from the match condition.
NOTE: This match condition does not check the protocol type being used on the port. Make
sure to specify the protocol type (TCP or UDP) match condition in the same term.
Also, this port match condition cannot be specified in conjunction with the source port or
destination port match conditions in the same term.
Select the port from the port name list; enter the port name, number, or range; and then select
an option:
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
Match Interface
Interface Specifies interfaces to be included in a match condition. Allows you to remove an interface
from the match condition.
Select a name from the interface name list or Enter the interface name and select an option:
Interface Set Specifies interface sets, which you have already defined, to be included in a match condition.
Allows you to remove an interface set from the match condition.
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Interface Specifies interface groups, which you have already defined, to be included in, or excluded from,
Group a match condition. Allows you to remove an interface group from the match condition.
• Except—To exclude the port from the match condition and then select Add—To include the
port in the match condition.
TCP Matches all Transmission Control Protocol packets other than the first packet of a connection.
Established
NOTE: This match condition does not verify that the TCP is used on the port. Make sure to
specify the TCP as a match condition in the same term.
TCP Initial Matches the first Transmission Control Protocol packet of a connection.
NOTE: This match condition does not verify that the TCP is used on the port. Make sure to
specify the TCP as a match condition in the same term.
TCP Flags Specifies Transmission Control Protocol flags to be included in the match condition.
NOTE: This match condition does not verify that the TCP is used on the port. Make sure to
specify the TCP as a match condition in the same term.
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Next Header Specifies IPv6 protocol types to be included in, or excluded from, the match condition. Allows
you to remove an IPv6 protocol type from the match condition.
Select a protocol name from the list or enter a protocol name or number and then select an
option:
• Except—To exclude the protocol from the match condition and then select Add—To include
the protocol in the match condition.
ICMP Type Specifies ICMP packet types to be included in, or excluded from, the match condition. Allows
you to remove an ICMP packet type from the match condition.
NOTE: This protocol does not verify that ICMP is used on the port. Make sure to specify an
ICMP type match condition in the same term.
Select a packet type from the list or enter a packet type name or number and then select an
option:
• Except—To exclude the packet type from the match condition and then select.
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
ICMP Code Specifies the ICMP code to be included in, or excluded from, the match condition. Allows you
to remove an ICMP code from the match condition.
NOTE: The ICMP code is dependent on the ICMP type. Make sure to specify an ICMP type
match condition in the same term.
Select a packet code from the list or enter the packet code as text or a number and select an
option:
• Except—To exclude the packet type from the match condition and then select
Traffic Class Specifies the traffic class to be included in, or excluded from, the match condition. Allows you
to remove a traffic class value from the match condition.
• Except—To exclude the traffic class from the match condition and then select
Packet Length Specifies the length of received packets, in bytes, to be included in, or excluded from, the
match condition. Allows you to remove a packet length value from the match condition.
Select an option:
• Except—To exclude the packet length from the match condition and then select
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Forwarding Specifies forwarding classes to be included in, or excluded from, the match condition. Allows
Class you to a remove forwarding class entry from the match condition.
Specify a forwarding class by selecting a forwarding class from the list or entering a forwarding
class, and then select an option:
• Except—To exclude the forwarding class from the match condition and then select
Action
Specifies that no action is performed. By default, a packet is accepted if it meets the match
conditions of the term, and packets that do not match any conditions in the firewall filter are
dropped.
Discards a packet that meets the match conditions of the term. Names a discard collector for
packets.
Reject Select Reject and then select a message type from the reason list.
Rejects a packet that meets the match conditions of the term and returns a rejection message.
Allows you to specify a message type that denotes the reason the packet was rejected.
NOTE: To log and sample rejected packets, specify log and sample action modifiers in
conjunction with this action.
478
Table 133: Fields on the Match Criteria for IPv6 Firewall Filter (Continued)
Field Action
Evaluates a packet with the next term in the filter if the packet meets the match conditions in
this term. This action makes sure that the next term is used for evaluation even when the
packet matches the conditions of a term. When this action is not specified, the filter stops
evaluating the packet after it matches the conditions of a term and takes the associated action.
Routing Accepts a packet that meets the match conditions, and forwards it to the specified routing
Instance instance.
Select Routing Instance and enter the routing instance name in the box next to Routing
Instance.
Action Modifiers
Count Counts the packets passing this term. Allows you to name a counter that is specific to this
filter. This means that every time a packet transits any interface that uses this filter, it
increments the specified counter.
Select Count and enter a 24-character string containing letters, numbers, or hyphens to specify
a counter name.
Loss Priority Sets the loss priority of the packet. This is the priority of dropping a packet before it is sent,
and it affects the scheduling priority of the packet.
RELATED DOCUMENTATION
CHAPTER 36
IN THIS CHAPTER
IN THIS SECTION
You are here: You are here: Network > Firewall Filters > Assign To Interfaces.
Field Descriptions
Table 134 on page 481 describes the fields on the Assign Interfaces page.
481
Field Description
Logical Interface Displays the logical interfaces on a router. Allows you to apply IPv4 and IPv6 firewall filters to
Name packets received on the interface and packets transmitted from the interface.
• IPv4 Input Filter—Enter the name of IPv4 filter applied to received packets.
• IPv6 Input Filter—Enter the name of IPv6 filter applied to received packets.
• IPv4 Output Filter—Enter the name of IPv4 filter applied to transmitted packets.
• IPv6 Output Filter—Enter the name of IPv6 filter applied to transmitted packets.
Input Firewall Displays the input firewall filter applied on an interface. This filter evaluates all packets
Filters received on the interface.
Output Firewall Displays the output firewall filter applied on an interface. This filter evaluates all packets
Filters transmitted from the interface.
RELATED DOCUMENTATION
CHAPTER 37
NAT Policies
IN THIS CHAPTER
IN THIS SECTION
Network Address Translation (NAT) is a form of network masquerading where you can hide devices
between the zones or interfaces. A trust zone is a segment of the network where security measures are
applied. It is usually assigned to the internal LAN. An untrust zone is the Internet. NAT modifies the IP
addresses of the packets moving between the trust and untrust zones.
Whenever a packet arrives at the NAT device, the device performs a translation on the packet’s IP
address by rewriting it with an IP address that was specified for external use. After translation, the
packet appears to have originated from the gateway rather than from the original device within the
network. This helps you hide internal IP addresses from the other networks and keep your network
secure.
• View destination NAT rules. For more information on destination NAT, see "About the Destination
Page" on page 502.
• View static NAT rules. For more information on static NAT, see "About the Static Page" on page 508.
Field Descriptions
Table 135 on page 483 describes the fields on the NAT Policies Page.
Field Description
Seq Displays the sequence number of rules in a context. Drag and drop the policies within the
same context to reorder your NAT policy among the existing policies.
Source Ingress Displays the source ingress type. For example: zone, interface, or routing instance.
Source Address Displays the match source address of the NAT policy.
Source Port Displays the match source port of the NAT policy.
Destination Egress Displays the match destination egress type. For example: zone, interface, or routing
instance.
484
Field Description
Destination Address Displays the match destination address of the NAT policy.
Destination Port Displays the match destination port of the NAT policy.
1. Click Create > Source NAT on the upper right-side of the Policies page.
The inline creation fields will appear.
2. Complete the configuration according to the guidelines provided in Table 136 on page 484.
3. Click the tick icon on the right-side of the row once done with the configuration.
Field Description
Source Ingress
485
Field Description
Select Sources
Source ingress Select an option from the list for ingress traffic that originates from inside the network:
type
• Zone
• Interface
• Routing Instance
Zone Select the source zones in the Available column and use the right arrow to move them to
the Selected column.
NOTE: This option is available only if you select source ingress type as Zone.
Interface Select the source interfaces in the Available column and use the right arrow to move them
to the Selected column.
NOTE: This option is available only if you select source ingress type as Interface.
Routing instance Select the source routing instances in the Available column and use the right arrow to
move them to the Selected column.
NOTE: This option is available only if you select source ingress type as Routing Instance.
Addresses Select the source addresses in the Available column and use the right arrow to move them
to the Selected column.
1. Click +.
Field Description
Ports/Port range Click + to enter port number or port range (for example, 1-5) with minimum and maximum
values for source.
To edit a port number or port range, select it and click the pencil icon.
To delete a port number or port range, select it and click the delete icon.
Destination Egress
Select Destination
Destination egress Select an option from the list for outgoing traffic that originates from inside of the device
type network:
• Zone
• Interface
• Routing Instance
Zone Select the destination zones in the Available column and use the right arrow to move them
to the Selected column.
NOTE: This option is available only if you select destination egress type as Zone.
Interface Select the destination interfaces in the Available column and use the right arrow to move
them to the Selected column.
NOTE: This option is available only if you select destination egress type as Interface.
Routing instance Select the destination routing instances in the Available column and use the right arrow to
move them to the Selected column.
NOTE: This option is available only if you select destination egress type as Routing
Instance.
487
Field Description
Addresses Select the destination addresses in the Available column and use the right arrow to move
them to the Selected column.
1. Click +.
Ports/Port range Click + to enter port number or port range (for example, 1-5) with minimum and maximum
values for destination.
To edit a port number or port range, select it and click the pencil icon.
To delete a port number or port range, select it and click the delete icon.
Applications
Select Applications
• Specific—Select the applications in the Available column and use the right arrow to
move them to the Selected column.
Protocols
Select Protocols
488
Field Description
Protocols Select the protocols in the Available column and use the right arrow to move them to the
Selected column.
Add Protocol Click + and enter a protocol number to associate with the NAT policy.
Actions
Actions
Click Add New to create a new source NAT pool. For more information on field options,
see "Create a Source NAT Pool" on page 494.
Persistent Enable this option for mapping all requests from the same internal transport address to the
same reflexive transport address.
489
Field Description
• target-host—All requests from a specific internal IP address and port are mapped to the
same reflexive transport address. An external host can send a packet to an internal host
by sending the packet to the reflexive transport address. The internal host must have
previously sent a packet to the external hosts IP address.
• target-host-port—All requests from a specific internal IP address and port are mapped
to the same reflexive transport address. An external host can send a packet to an
internal host by sending the packet to the reflexive transport address. The internal host
must have previously sent a packet to the external hosts IP address and port.
Inactivity timeout Enter the amount of time that the persistent NAT binding remains in the sites memory
when all the sessions of the binding entry have ended.
Maximum session Enter the maximum number of sessions with which a persistent NAT binding can be
number associated.
RELATED DOCUMENTATION
1. Double-click an existing source NAT that you want to edit on the Policies page.
2. Complete the configuration according to the guidelines provided in "Create a Source NAT" on page
484.
3. Click the tick icon on the right-side of the row once done with the configuration.
RELATED DOCUMENTATION
1. Select one or more source NATs that you want to delete on the Policies page.
2. Click the delete icon available on the upper-right corner of the page.
A confirmation message window appears.
3. Click Yes to delete or click No to retain the source NAT.
RELATED DOCUMENTATION
CHAPTER 38
NAT Pools
IN THIS CHAPTER
IN THIS SECTION
A NAT pool is a set of IP addresses that you can define and use for translation. NAT policies perform
address translation by translating internal IP addresses to the addresses in these pools. Unlike static
NAT, where there is a one-to-one mapping that includes destination IP address translation in one
direction and source IP address translation in the reverse direction, with source NAT, you translate the
original source IP address to an IP address in the address pool. With destination NAT, you translate the
original destination address to an IP address in the address pool.
• Create a source NAT pool. See "Create a Source NAT Pool" on page 494.
• Edit a source NAT pool. See "Edit a Source NAT Pool" on page 498.
• Delete a source NAT pool. See "Delete a Source NAT Pool" on page 499.
• Add a destination NAT pool. See "Add a Destination NAT Pool" on page 499.
• Edit a destination NAT pool. See "Edit a Destination NAT Pool" on page 501.
• Delete a destination NAT pool. See "Delete a Destination NAT Pool" on page 501.
Field Descriptions
Table 137 on page 492 describes the fields on the NAT Pools Page.
Field Description
Pool Type Displays whether the NAT pool is either source or destination.
Proxy ARP/ND Displays the Address Resolution Protocol (ARP) proxy or Neighbor Discovery Protocol (NDP)
proxy for the NAT pool.
Global Options
1. Click the Global Options available on the upper-right corner of the page.
The Global Options page appears.
2. Complete the configuration according to the guidelines provided in Table 138 on page 493.
3. Click OK to save the changes.
Field Action
Persistent address Enable this option to ensure that the same IP address is assigned from the source NAT
pool to a specific host for multiple concurrent sessions.
Port randomization Enable port randomization. The device performs NAT translation choosing the IP address
by round robin, then chooses the port used for that IP address by randomization.
Interface port Enable this option to set the port range for NAT interface overload mapping. It also
overloading allows you to block a specific port from being used in interface overload mapping.
Overloading factor Enter a value for the port overloading capacity for the source NAT interface.
RELATED DOCUMENTATION
1. Click Create > Source NAT Pool on the upper-right corner of the Pools page.
The Create Source NAT Pool page appears.
2. Complete the configuration according to the guidelines provided in Table 139 on page 494.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Table 139 on page 494 describes the fields on the Create Source NAT Pool page.
Field Description
Name Enter a unique string of alphanumeric characters, hyphens and underscores; maximum
length 63-character.
Basic
Table 139: Fields on the Create Source NAT Pool Page (Continued)
Field Description
Pool addresses Select the source NAT pool addresses in the Available column and the use the right arrow
to move them to the Selected column.
1. Click +.
• Pool address type—Select either IP address or address range for the pool.
NOTE: This option is available only when you select IP address as pool address type.
• Start Address—Enter the starting range of IPv4 or IPv6 address for the source NAT
pool.
NOTE: This option is available only when you select Address Range as pool address
type.
• End Address—Enter the ending range of IPv4 or IPv6 address for the source NAT
pool.
NOTE: This option is available only when you select Address Range as pool address
type.
Advanced
Port Translation
496
Table 139: Fields on the Create Source NAT Pool Page (Continued)
Field Description
• No Translation
• Translation with port range—Port range from low to high. Range is 1024 through
65535.
• Translation with port overloading factor—Port overloading capacity for the source NAT
interface.
Shared Address Enable this option to map many-to-one external IP addresses. This increases NAT
resources and improves traffic.
Host address base Enter IPv4 or IPv6 address used as the host address base.
For example, if the host address base is 198.51.100.30 and the NAT pool uses the range
203.0.113.10 to 203.0.113.20, then 198.51.100.30 translates to 203.0.113.10,
198.51.100.31 translates to 203.0.113.11, and so on.
Port range from Enter the lower limit of the port range.
NOTE: This option is available only when you select Translation with port range.
NOTE: This option is available only when you select Translation with port range.
NOTE: This option is available only when you select Translation with port overloading
factor.
497
Table 139: Fields on the Create Source NAT Pool Page (Continued)
Field Description
Address pooling Specifies that multiple internal IP addresses can be mapped to the same external IP
address. Use this option only when the source NAT pool is configured with no port
translation.
Paired Select this option to use in source NAT pools with port translation for applications that
require all sessions associated with one internal IP address to be translated to the same
external IP address for multiple sessions.
NOTE: This option is available only when you enable Address Pooling.
Non-paired Select this option to use in source NAT pools without port translation for assigning IP
addresses using a round-robin fashion.
NOTE: This option is available only when you enable Address Pooling.
Overflow pool type Specify a source pool to use when the current address pool is exhausted:
Utilization Alarm
Upper threshold Enter an upper threshold percentage for pool address utilization at which an SNMP trap is
triggered.
Table 139: Fields on the Create Source NAT Pool Page (Continued)
Field Description
Lower threshold Enter a lower threshold percentage for pool address utilization at which an SNMP trap is
triggered.
NOTE: This option can be set only if you configure the upper threshold value.
RELATED DOCUMENTATION
1. Select an existing source NAT pool that you want to edit on the Pools page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Source NAT Pool page appears with editable fields. For more information on the options,
see "Create a Source NAT Pool" on page 494.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select one or more source NAT pools that you want to delete on the Pools page.
2. Click the delete icon available on the upper-right corner of the page.
A confirmation message window appears.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
1. Click Create > Destination NAT Pool on the upper-right corner of the Pools page.
The Create Destination NAT Pool page appears.
2. Complete the configuration according to the guidelines provided in Table 140 on page 499.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Table 140 on page 499 describes the fields on the Create Destination NAT Pool page.
Field Action
Table 140: Fields on the Create Destination NAT Pool Page (Continued)
Field Action
Pool address type Select one of the following pool address type:
NOTE: This option is available only when you select Address & Port as pool address type.
NOTE: This option is available only when you select Address & Port as pool address type.
Start address Enter starting address (IPv4 or IPv6) of the destination address range.
NOTE: This option is available only when you select Address Range as pool address type.
End address Enter ending address (IPv4 or IPv6) of the destination address range.
NOTE: This option is available only when you select Address Range as pool address type.
RELATED DOCUMENTATION
1. Select an existing destination NAT pool that you want to edit on the Pools page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Destination NAT Pool page appears with editable fields. For more information on the
options, see "Add a Destination NAT Pool" on page 499.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select one or more destination NAT pools that you want to delete on the Pools page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 39
Destination NAT
IN THIS CHAPTER
IN THIS SECTION
• Add a Destination Rule Set. See "Add a Destination Rule Set" on page 504.
• Edit a Destination Rule Set. See "Edit a Destination Rule Set" on page 507.
• Delete a Destination Rule Set. See "Delete a Destination Rule Set" on page 507.
503
Field Descriptions
Table 141 on page 503 describes the fields on the Destination Page.
Field Description
From Displays the destination NAT sort options from which the packets flow.
• Routing Instance
• Zone
• Interface
From Displays the name of the routing instance/zone/interface from which the packets flow.
Rule Displays the name of the rule in the selected destination NAT rule set.
Rule Name Displays the name of the rule in the selected destination NAT rule set.
Field Description
Action Displays the action of the rule in the selected rule set.
Description Displays a description of the rule in the selected destination NAT rule set.
RELATED DOCUMENTATION
Table 142 on page 504 describes the fields on the Add Rule Set page.
Field Action
Field Action
• Routing Instance
• Zone
• Interface
Select the routing instances/zones/interfaces in the Available column and the use the
right arrow to move them to the Selected column.
Add Rule
Match
Source Address Search and select the source addresses in the Available column and the use the right
arrow to move them to the Selected column.
You can also enter a source address in the New text box in the Selected column and click
Add to add the source address to the lower pane of the Selected column.
IP Protocol Enter the protocol name in the text box and click + to add the protocol to the IP Protocol
column.
506
Field Action
Actions Specifies the actions for the destination NAT pool. Select an option:
• No Destination NAT.
Select an option.
Upper Threshold Enter upper threshold at which an SNMP trap is triggered. Session count hit alarm range:
1 through 4294967295
Lower Threshold Enter lower threshold at which an SNMP trap is triggered. Rule session count alarm range:
1 through 4294967295
507
RELATED DOCUMENTATION
1. Select an existing destination rule set that you want to edit on the Destination page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Rule Set page appears with editable fields. For more information on the options, see "Add a
Destination Rule Set" on page 504.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select one or more destination rule sets that you want to delete on Destination page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 40
Static NAT
IN THIS CHAPTER
IN THIS SECTION
• Add a static rule set and rules to it. See "Add a Static Rule Set" on page 510.
• Edit a static rule set and its rules. See "Edit a Static Rule Set" on page 514.
• Delete a static rule set and its rules. See "Delete a Static Rule Set" on page 514.
• Move the rules in the rules table. To do this, select a rule which you want to move and select the
following options according to your choice:
509
• Move to Bottom—Enables you to move the rule to the bottom of the list
Field Descriptions
Table 143 on page 509 describes the fields on the Static page.
Field Description
From Displays the destination NAT sort options from which the packets flow.
• Routing Instance
• Zone
• Interface
From Displays the name of the routing instance, zone, or interface from which the packets
flow.
Rule Displays the name of the rule in the selected static NAT rule set.
Field Description
Rule Name Displays the name of the routing instance, zone, or interface to which the packet flows.
Mapped Port Displays the destination port or port range to allow static NAT to map ports.
Upper Threshold Displays the upper threshold value of the at which an SNMP trap is triggered.
Lower Threshold Displays the lower threshold value of the at which an SNMP trap is triggered.
Description Displays the description of the rule in the selected static NAT rule set.
RELATED DOCUMENTATION
Field Action
• Routing Instance
• Zone
• Interface
Select the routing instances, zones, or interfaces in the Available column and use the right
arrow to move them to the Selected column.
Rules
Rules Specifies the rules added to the selected static rule set.
512
Table 144: Fields on the Add Static Rule Set Page (Continued)
Field Action
• Source Address—Select an IPv4 or IPv6 address from the list or enter the address
and click + to add it.
• Source Port—Enter a port number or port range from low to high and click + to
add it.
• Destination Address—Select IPv4 or IPv6 and then select an address from the list.
NOTE: You can select Translate to ipv4 address if you have selected IPv6 in the
destination address.
513
Table 144: Fields on the Add Static Rule Set Page (Continued)
Field Action
NOTE: This option can be set only if you configure the upper threshold value.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Edit Select an existing rule and click the edit icon at the upper-right corner of the Rules table.
Delete Select an interface and click the delete icon at the upper-right corner of the Rules table.
A confirmation window appears. Click Yes to delete the selected interface or click No to
discard.
RELATED DOCUMENTATION
1. Select an existing static rule set that you want to edit on the Static page.
2. Click the pencil icon available on the upper-right corner of the Static page.
The Edit Static Rule Set page appears with editable fields. For more information on the options, see
"Add a Static Rule Set" on page 510.
NOTE: Alternatively, you can select the rule directly and click the pencil icon available on the
upper-right corner of the Rules table to edit a rule for the selected rule set.
RELATED DOCUMENTATION
1. Select one or more static rules sets that you want to delete on the Static page.
2. Click the delete icon available on the upper-right corner of the page.
A confirmation window appears.
NOTE: Alternatively, you can select the rule directly and click the delete (X) icon available on
the upper-right corner of the Rules table to delete a rule for the selected rule set.
RELATED DOCUMENTATION
CHAPTER 41
IN THIS CHAPTER
IN THIS SECTION
You can add, edit, and delete proxy ARP or proxy ND configurations.
• Launch NAT wizard. To do this, click Launch Wizard option at the upper-right corner of the page. The
NAT wizard leads you through the basic required steps to configure NAT for the SRX Series security
device.
Field Descriptions
Table 145 on page 517 describes the fields on the Proxy ARP/ND Configuration page.
Field Description
RELATED DOCUMENTATION
Field Action
• ge-0/0/0.0
• ge-0/0/2.0
• lo0.0
• vlan0.0
IPv4 Address/Range Enter the source IP address range and the end IP address that the device can be assigned
to.
RELATED DOCUMENTATION
1. Select an existing proxy ARP that you want to edit on the Proxy ARP/ND page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Proxy ARP page appears with editable fields. For more information on the options, see "Add
a Proxy ARP" on page 517.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select one or more proxy ARPs that you want to delete on the Proxy ARP page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
Add a Proxy ND
Field Action
• ge-0/0/0.0
• ge-0/0/1.0
• ge-0/0/3.0
• lo0.0
IPv6 Address/Range Enter the source IPv6 address range and the end IPv6 address that the device can be
assigned to.
RELATED DOCUMENTATION
Edit a Proxy ND
1. Select an existing proxy ND that you want to edit on the Proxy ARP/ND page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Proxy ND page appears with editable fields. For more information on the options, see "Add
a Proxy ND" on page 520.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
Delete a Proxy ND
1. Select one or more proxy NDs that you want to delete on the Proxy ND page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 42
Static Routing
IN THIS CHAPTER
IN THIS SECTION
Use this page to view, add, and remove link aggregation configuration details.
Field Descriptions
Table 148 on page 524 describes the fields on the Static Routing page.
Field Description
Routing Instance Displays the routing instance selected for this route.
RELATED DOCUMENTATION
Field Description
The selected destination routing instance that points to the routing table containing the
tunnel destination address.
NOTE: If you log in as a tenant user, routing instance is not displayed as tenant context
supports only one routing instance.
Subnet mask Enter the subnet mask. For example, 24 bits represents the 255.255.255.0 address.
• +—To add the next-hop, enter the following details and click OK:
• IP Address/IPv6 Address—Enter the IPv4 or IPv6 address based on the selected static
route address type.
• Delete—Select one or more next-hop addresses and click X. Then, click Yes to delete it.
RELATED DOCUMENTATION
1. Select the existing static route that you want to edit on the Static Routing page.
2. Click the pencil icon available on the upper-right corner of the Static Routing page.
The Edit Static Route page appears with editable fields. For more information on the options, see
"Add a Static Route" on page 524.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select the existing static route that you want to delete on the Static Routing page.
2. Click the delete icon available on the upper-right corner of the Static Routing page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 43
RIP Routing
IN THIS CHAPTER
IN THIS SECTION
• Edit RIP global settings. See "Edit RIP Global Settings" on page 531.
• Delete RIP global settings. See "Delete RIP Global Settings" on page 535.
Field Descriptions
Table 150 on page 528 describes the fields on the RIP page.
Field Description
RIP Instances
RELATED DOCUMENTATION
Field Action
General
Routing Instance Select a routing instance from the list to display only the default routing instance or all
routing instances.
Preference Enter the preference of the external routes learned by RIP as compared to those learned
from other routing protocols.
Metric out Enter the metric value to add to routes transmitted to the neighbor.
Update Interval Enter the update time interval to periodically send out routes learned by RIP to neighbors.
Policy
530
Field Action
Import Policy Specifies one or more policies to control which routes learned from an area are used to
generate summary link-state advertisements (LSAs) into other areas.
• Move down arrow—Moves the selected policy down the list of policies.
Export Policy Specifies one or more policies to control which summary LSAs are flooded into an area.
• Move down arrow—Moves the selected policy down the list of policies.
Neighbor
Displays the RIP-enabled interfaces, its port, metric-in, and update interval.
Select the box next to the interface name to enable RIP on an interface.
Click the edit icon to modify one or more selected interfaces settings.
RELATED DOCUMENTATION
1. Select the existing logical system profile that you want to edit on the RIP page.
2. Click the pencil icon available on the upper-right corner of the RIP page.
The Edit page appears with editable fields. For more information on the options, see "Add a RIP
Instance" on page 529.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select the existing logical system profile that you want to delete on the RIP page.
2. Click the delete icon available on the upper-right corner of the RIP page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
1. Click the pencil icon on the upper-right corner of the RIP Global Settings table.
The Edit RIP Global Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 152 on page 532.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
General
• Broadcast
• Multicast
• None
• Version-1
• Both
• None
• Version-1
• Version-2
Route timeout (sec) Enter the route timeout interval value for RIP.
Update interval (sec) Enter the update time interval value to periodically send out routes learned by RIP to
neighbors.
Hold timeout (sec) Enter the hold timeout interval period for which the expired route is retained in the
routing table before being removed.
Metric in Enter the metric-in value to add to incoming routes when advertising into RIP routes that
were learned from other protocols.
533
Table 152: Fields on the Edit RIP Global Settings Page (Continued)
Field Action
RIB Group Select a routing table group to install RIP routes into multiple routing tables.
Message size Enter the number of route entries to be included in every RIP update message.
Check Zero Specifies whether the reserved fields in a RIP packet are set to zero.
Select an option:
• True—Discards version 1 packets that have nonzero values in the reserved fields and
version 2 packets that have nonzero values in the fields that must be zero. This default
behavior implements check-zero the RIP version 1 and version 2 specifications.
• False—Receives RIP version 1 packets with nonzero values in the reserved fields or RIP
version 2 packets with nonzero values in the fields that must be zero. This behavior
violates the specifications in RFC 1058 and RFC 2453.
• Restart time (sec)—Enter the time in seconds for the restart to complete.
• Authentication Type—Select the type of authentication for RIP route queries received
on an interface. The options available are:
• None
• MD5
• Simple
Policy
534
Table 152: Fields on the Edit RIP Global Settings Page (Continued)
Field Action
Import Policy Specifies one or more policies to routes being imported into the local routing device from
the neighbors.
• Move down arrow—Moves the selected policy down the list of policies.
Trace Options
File Name Enter the filename to receive the output of the trace operation.
File Size Enter the maximum size for each trace file.
World-readable Specifies whether or not the trace file can be read by any user or not.
Select an option:
Flags Select one or more flags from the Available Flags column and move it to the Configured
Flags column using the arrow.
RELATED DOCUMENTATION
1. Select an information that you want to delete on the RIP Global settings table.
2. Click the delete icon available on the upper-right corner of the RIP Global settings table.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 44
OSPF Routing
IN THIS CHAPTER
IN THIS SECTION
• Advanced search for an OSPF. To do this, use the search text box present above the table grid. The
search includes the logical operators as part of the filter string. In the search text box, when you
537
hover over the icon, it displays an example filter condition. When you start entering the search string,
the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
• Show or hide columns in the OSPF table. To do this, click the Show Hide Columns icon in the upper-
right corner of the OSPF table and select the options you want to view or deselect the options you
want to hide on the page.
Field Descriptions
Table 153 on page 537 describes the fields on the OSPF page.
Field Description
Version Displays the version of the interface selected (OSPF for IPv4 and OSPFv3 for IPv6).
538
Field Description
RELATED DOCUMENTATION
Add an OSPF
Field Action
Basic Settings
539
Field Action
Routing Instance Select the routing instance from the list or create a new routing instance inline.
1. Click Add.
• General Settings
To search for specific interface, click the search icon and enter partial text or
full text of the keyword in the search bar.
Routing Options
Field Action
Traffic Engineering Enable this option if you want the traffic to be managed or engineered.
Area Details
If you enter an integer, the value is converted to a 32-bit equivalent. For example, if
you enter 3, the value assigned to the area is 0.0.0.3.
541
Field Action
Area Range Displays a range of IP addresses for the summary link state advertisements (LSAs) to
be sent within an area.
Select an option:
a. Click +.
NOTE: For OSPF, enter an IPv4 address and for OSPFv3 enter an IPv6
address.
c. Select Restrict Advertisements of this area range to specify that the routes
contained within a summary must not be displayed.
d. Select Enforce exact match for advertisements of this area range to specify
that the summary of a route must be advertised only when an exact match is
made within the configured summary range.
e. Click OK.
The Edit Area Range Form page appears with editable fields.
542
Field Action
Virtual Link Select whether you want the virtual link to be established. If you select virtual link to
be created, then enter the Neighbor ID and Transit area. Transit area is the area that
NOTE: This option is has virtual link connecting two or more ABRs attached to this area.
applicable for area zero
and it is not applicable
for non-zero area.
543
Field Action
Interface Details
Select Interface Select one or more interfaces to associate with the routing instance from the
Available column and move it to the Selected column using arrow.
Interface type Specifies the interfaces to be associated with the OSPF configuration.
• None—No interface.
• p2mp—Point-to-multipoint interface.
• p2p—Point-to-point interface.
Interface Metric Type the metric that you want for measuring the interface.
NOTE: You can enable this option only if Secondary option is disabled and vice-versa.
Advanced
544
Field Action
Bidirectional Forward Enable this option for the bidirectional forward detection (BFD) protocol version that
Detection you want to detect.
• BFD Version—Select the bidirectional forward detection version form the list:
IPsec security Select a number of one of the security associations from the list.
association
By default, no security keys are configured.
NOTE: You can configure this option only if Secondary option is disabled and vice-
versa.
Link protection Enable this option. Creates a backup loop-free alternate path to the primary next hop
for all destination routes that traverse the protected interface.
NOTE: You can either enable Link protection or Node Link protection at a time. For
example, if you enable Link protection, then Node Link protection is automatically
disabled.
Node Link protection Enable this option. Creates an alternate loop-free path to the primary next hop for all
destination routes that traverse a protected interface.
NOTE: You can either enable Link protection or Node Link protection at a time. For
example, if you enable Link protection, then Node Link protection is automatically
disabled.
545
Field Action
Secondary Enable this option. Specifies an interface to belong to another OSPF area.
NOTE: You can enable this option only if Passive Mode is disabled and IPsec security
association is not configured and vice-versa.
• simplepassword
The MD5 key values can be from 1 through 16 characters long. Characters can
include ASCII strings. If you include spaces, enclose all characters in quotation
marks (“ ”).
Advanced Settings
Policy
NOTE: This option is not available for tenant users.
546
Field Action
Import Policy Specifies one or more policies to control which routes learned from an area are used
to generate summary link-state advertisements (LSAs) into other areas.
Export Policy Specifies one or more policies to control which summary LSAs are flooded into an
area.
Trace Options
File Name Enter the name of the file to receive the output of the trace operation.
File Size Enter the maximum size for each trace file.
World Readable Enable this option to allow any user to read the file.
Disable this option to prevent all users from reading the file.
547
Field Action
Select one or more flags in the Available column and move them to the Selected
column using the right arrow.
RELATED DOCUMENTATION
Edit an OSPF
1. Select an existing OSPF routing that you want to edit on the OSPF page.
2. Click the pencil icon available on the upper-right corner of the OSPF page.
The Create OSPF page appears with editable fields. For more information on the options, see "Add
an OSPF" on page 538.
3. Click OK to save the changes.
RELATED DOCUMENTATION
Delete an OSPF
1. Select an existing OSPF routing that you want to delete on the OSPF page.
548
2. Click the delete icon available on the upper-right corner of the OSPF page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 45
BGP Routing
IN THIS CHAPTER
IN THIS SECTION
• Disable group information. To do this, select an existing group information and click Disable.
• Disable global information. To do this, select an existing global information and click Disable.
Field Descriptions
Table 155 on page 550 describes the fields on the BGP page.
Field Description
Routing Instance Select routing instances from the list. Example: default or all routing instances.
NOTE: If you log in as a tenant user, Routing Instance, Import Policy, and
Export Policy are not displayed.
551
Field Description
NOTE: If you log in as a tenant user, Routing Instance, Import Policy, and
Export Policy are not displayed.
Global Information
The global information values corresponding to the routing instance that you selected will be displayed in the
Global Information section. Based on the routing instance that you select, the values in the Global information.
Edit Edits the Global settings which lists the following fields. See "Edit Global
Information" on page 559.
552
Field Description
RELATED DOCUMENTATION
Field Action
General
ASN Specifies the unique numeric identifier of the AS in which the routing device is
configured.
If you enter an integer, the value is converted to a 32-bit equivalent. For example, if you
enter 3, the value assigned to the AS is 0.0.0.3.
Field Action
Cluster Id Enter the IPv6 or IPv4 address to be used as the cluster identifier.
The cluster identifier is used by the route reflector cluster in an internal BGP group.
Description Enter the text description for the global, group, or neighbor configuration.
Advertise Inactive Select the check box to enable advertising of inactive routes.
Routes
Neighbors
555
Field Action
a. Click +.
• All
• IPv4
• IPv6
c. Enter the following details if you select IPv4 in the Addresses field:
d. Enter the following details if you select IPv6 in the Addresses field:
• Prefix—Enter the prefix length using up and down arrows for the IPv6 address.
b. Click the pencil icon to edit the selected dynamic neighbor address.
b. Click the delete icon (X) to delete the selected dynamic neighbor address.
556
Field Action
a. Click +.
• Preference—Enter the preference value for an external route. The route with
the highest local preference value is preferred.
• Description—Enter a description.
• Passive—Select the check box to enable the device to be passive. The routing
device will wait for the peer to issue an open request before a message is sent.
Field Action
b. Click the pencil icon to edit the selected static neighbor address.
b. Click the delete icon (X) to delete the selected static neighbor address.
Policies Tab
558
Field Action
Import Policy Specifies one or more routing policies for routes being imported into the routing table
from BGP.
Export Policy Specifies one or more policies to routes being exported from the routing table into BGP.
RELATED DOCUMENTATION
1. Select an existing BGP group that you want to edit on the BGP page.
2. Click the pencil icon available on the upper-right corner of the BGP page.
559
The Edit a Group page appears with editable fields. For more information on the fields, see "Add a
BGP Group" on page 553.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select an existing BGP group that you want to delete on the BGP page.
2. Click the delete icon available on the upper-right corner of the BGP page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
1. Select an existing global information that you want to edit on the BGP page.
2. Click the pencil icon available on the upper-right corner of the Global Information table.
The Edit Global Settings page appears.
3. Complete the configuration according to the guidelines provided in Table 157 on page 560.
4. Click OK to save the changes.
560
Field Action
General
Field Action
a. Click +.
a. Select an existing member ASN value and click the pencil icon.
Advance Options
Keep Route Specifies whether routes learned from a BGP peer must be retained in the routing
table even if they contain an AS number that was exported from the local AS.
TCP MSS Enter the maximum segment size (MSS) for the TCP connection.
Field Action
Remove Private ASN Select the check box to enable removal of private ASNs.
• Stale Routes Time—Enter the maximum time that stale routes are kept during
restart.
Multihop Specifies the maximum time-to-live (TTL) value for the TTL in the IP header of BGP
packets.
Policies Tab
NOTE: If you log in as a tenant user, Policy tab is not displayed.
563
Field Action
Import Policy Applies one or more policies to routes being imported into the local routing device
from the neighbors.
Export Policy Specifies one or more policies to control which summary LSAs are flooded into an
area.
File Name Enter the name of the file to receive the output of the trace operation.
File Size Enter the maximum size for each trace file.
564
Field Action
World Readable Specifies whether the trace file can be read by any user.
Select an option:
Flags Select one or more flags from the Available Flags column and move it to the
Configured Flags column using the arrow.
RELATED DOCUMENTATION
CHAPTER 46
Routing Instances
IN THIS CHAPTER
IN THIS SECTION
• Show or hide columns in the Routing Instance table. To do this, use the Show Hide Columns icon in
the upper-right corner of the page and select the options you want to show or deselect to hide
options on the page.
• Advance search for a routing instance. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 158 on page 566 describes the fields on the Routing Instances page.
Field Description
Assigned Interfaces Displays the selected interfaces assigned to the routing instance.
RELATED DOCUMENTATION
Field Description
General Settings
Name Enter a unique name for the routing instance that contains a corresponding IP unicast table; no
special characters are allowed and the keyword default cannot be used.
Description Enter a description for the routing instance. We recommend that you enter a maximum of 255
characters.
Instance Type Select the type of routing instance from the list:
• VPLS—This instance is applicable only for root or super admin. This option will not be
applicable for LSYS admin. Interfaces with Encapsulation Ethernet-VPLS will be listed when
VPLS instance type is selected.
568
Field Description
Interfaces Select interfaces from the Available column and move it to the Selected column using the arrow.
This is used to validate that all the interfaces of the selected zone(s) must belong to the same
routing instance.
RELATED DOCUMENTATION
1. Select a routing instance that you want to edit on the Routing Instances page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Routing Instance page appears with editable fields. For more information on the fields, see
"Add a Routing Instance" on page 567.
NOTE: As the Instance Type field is not editable, you can delete the existing routing instance
and create a new one with the required routing instance type.
RELATED DOCUMENTATION
1. Select one or more routing instance that you want to delete on the Routing Instances page.
2. Click the delete icon available on the upper-right corner of the page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 47
Routing—Policies
IN THIS CHAPTER
IN THIS SECTION
Field Descriptions
Table 160 on page 571 describes the fields on the Policies page.
Field Description
RELATED DOCUMENTATION
Global Options
1. Select an existing configuration that you want to edit on the Global Options page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Global Options page appears. You can modify any previous changes done. For more
information on the options, see Table 161 on page 572.
3. Click OK to save the changes.
Field Action
Members
1. Click +.
Click the pencil icon to edit the IP address. You can click X to delete the IP address.
573
Field Action
As Path
Click the pencil icon to edit the As path. You can click X to delete the As path.
BGP Community
Click the pencil icon to edit the As path. You can click X to delete the As path.
RELATED DOCUMENTATION
Add a Policy
To add a policy:
If you click OK, a new policy is added with the provided configuration.
Field Description
Add Term
Source
Field Description
Interface Specifies the name or IP address of one or more routing device interfaces. Do not use this
qualifier with protocols that are not interface-specific, such as internal BGP (IBGP).
1. To add an interface
2. To add an IP address
b. Click X.
Field Description
Prefix List Specifies a named list of IP addresses. You can specify an exact match with incoming routes.
a. Click +.
b. Click X.
Protocol Specifies the name of the protocol from which the route was learned or to which the route is
being advertised.
1. To add a protocol:
a. Click +.
2. To delete a protocol:
b. Click X.
Field Description
1. To add a policy:
a. Click +.
2. To delete a policy:
b. Click X.
More Options
BGP Origin Select a value from the list to specify the origin of the AS path information.
Field Description
1. To add an As path:
a. Click +.
2. To delete an As path:
b. Click X.
Field Description
1. To add a community:
a. Click +.
2. To delete a community:
b. Click X.
Destination
Family Select a value for address family protocol from the list.
Field Description
Interface Specifies the name or IP address of one or more routing device interfaces. Do not use this
qualifier with protocols that are not interface-specific, such as internal BGP (IBGP).
1. To add an interface:
2. To add an IP address:
b. Click X.
Field Description
Protocol Specifies the name of the protocol from which the route was learned or to which the route is
being advertised.
1. To add a protocol:
a. Click +.
2. To delete a protocol:
b. Click X.
1. To add a policy:
a. Click +.
2. To delete a policy:
b. Click X.
Field Description
Action
Specifies that any action that is intrinsic to the protocol is overridden. This action is also non
terminating so that various policy terms can be evaluated before the policy is terminated.
Specifies the default control action if a match occurs, and there are no further terms in the
current routing policy.
Specifies a priority for prefixes included in an OSPF import policy. Prefixes learned through
OSPF are installed in the routing table based on the priority assigned to the prefixes.
Affixes an AS number at the beginning of the AS path. AS numbers are added after the local
AS number has been added to the path. This action adds an AS number to AS sequences only,
not to AS sets. If the existing AS path begins with a confederation sequence or set, the
affixed AS number is placed within a confederation sequence. Otherwise, the affixed AS
number is placed with a non confederation sequence.
583
Field Description
Extracts the last AS number in the existing AS path and affixes that AS number to the
beginning of the AS path n times, where n is a number from 1 through 32. The AS number
is added before the local AS number has been added to the path. This action adds AS
numbers to AS sequences only, not to AS sets. If the existing AS path begins with a
confederation sequence or set, the affixed AS numbers are placed within a confederation
sequence. Otherwise, the affixed AS numbers are placed within a non confederation
sequence. This option is typically used in non-IBGP export policies.
Changes the metric (MED) value by the specified negative or positive offset. This action is
useful only in an external BGP (EBGP) export policy.
Field Description
Specifies the tag value. The tag action sets the 32-bit tag field in OSPF external link-state
advertisement (LSA) packets.
Specifies the class-of-service parameters to be applied to routes installed into the routing
table.
Specifies that the value entered here maintains the packet counts for a route passing
through your network, based on the source address.
Specifies the value entered here maintains packet counts for a route passing through your
network, based on the destination address in the packet.
Specifies that the value of queue number entered here maintains packet counts for a
route passing through your network, based on the internal queue number assigned in the
packet.
RELATED DOCUMENTATION
Clone a Policy
To clone a policy:
1. Select a policy that you want to clone and select Clone from the More link.
The Clone Policy page appears with editable fields. For more information on the fields, see "Add a
Policy" on page 573.
2. Click OK to save the changes. If you want to discard your changes, click Cancel.
RELATED DOCUMENTATION
Edit a Policy
To edit a policy:
RELATED DOCUMENTATION
Delete a Policy
1. Select one or more policies that you want to delete from the Policies page.
2. Click the delete icon available on the upper-right corner of the Policies page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
Test a Policy
To test a policy:
RELATED DOCUMENTATION
CHAPTER 48
Routing—Forwarding Mode
IN THIS CHAPTER
IN THIS SECTION
Field Descriptions
Table 163 on page 588 describes the fields on the Forwarding Mode page.
Once the configuration is complete, click Save to save the changes or click Cancel to discard the
changes.
588
Field Description
Family IPv6 Supports IPv6 protocol traffic, including Routing Information Protocol for IPv6
(RIPng).
• None
NOTE: For SRX5000 line of devices, only drop and flow-based options are
available.
• packet-based
• flow-based
• packet-based
589
CHAPTER 49
CoS—Value Aliases
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Value Aliases.
Use this page to view, add, and remove value aliases details.
• Add a code point alias. See "Add a Code Point Alias" on page 590.
• Edit a code point alias. See "Edit a Code Point Alias" on page 591.
• Delete a code point alias. See "Delete a Code Point Alias" on page 592.
590
Field Descriptions
Table 164 on page 590 describes the fields on the Value Alias page.
Field Description
Alias name Displays the name given to CoS values. For example, af11 or be.
• DSCP—Defines aliases for Differentiated Services code point (DSCP) for IPv4 values. You can
refer to these aliases when you configure classes and define classifiers.
• DSCP-IPv6—Defines aliases for DSCP IPv6 values. You can refer to these aliases when you
configure classes and define classifiers.
• EXP—Defines aliases for MPLS experimental (EXP) bits. You can map MPLS EXP bits to the
device forwarding classes.
• inet-precedence—Defines aliases for IPv4 precedence values. Precedence values are modified
in the IPv4 TOS field and mapped to values that correspond to levels of service.
CoS Value Displays the CoS value for which an alias is defined.
bits
NOTE: Changing this value alters the behavior of all classifiers that refer to this alias.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Value Aliases.
Field Description
Code point name Enter a name for the CoS point alias.
Code point type Select a code point type from the list.
Code point value bits Select a COS value for which an alias is defined.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Value Aliases.
1. Select a code point alias that you want to edit on the Value Aliases page.
2. Click the pencil icon available on the upper-right corner of the Value Aliases page.
The Code Point options appears with editable fields. For more information on the options, see "Add a
Code Point Alias" on page 590.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Value Aliases.
1. Select a code point alias that you want to delete on the Value Aliases page.
2. Click the delete icon available on the upper-right corner of the Value Aliases page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 50
CoS—Forwarding Classes
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Forwarding Classes.
Field Descriptions
Table 166 on page 594 describes the fields on the Forwarding Classes page.
Field Description
Forwarding class name Displays the forwarding class name assigned to the internal queue number.
Queue number Displays the internal queue numbers to which forwarding classes are assigned.
By default, if a packet is not classified, it is assigned to the class associated with queue
0. You can have more than one forwarding class assigned to a queue number.
Queue characteristics Displays the queue characteristics, for example, video or voice.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Forwarding Classes.
Field Description
Queue number Select the internal queue number to which a forwarding class is assigned.
Forwarding class name Enter the forwarding class name assigned to the internal queue number.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Forwarding Classes.
1. Select an existing forwarding class that you want to edit on the Forwarding Classes page.
2. Click the pencil icon available on the upper-right corner of the Forwarding Classes page.
The Edit Forwarding Class options appears with editable fields. For more information on the options,
see "Add a Forwarding Class" on page 594 for options available for editing.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Forwarding Classes.
1. Select an existing forwarding class that you want to delete on the Forwarding Classes page.
596
2. Click the delete icon available on the upper-right corner of the Forwarding Classes page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 51
CoS Classifiers
IN THIS CHAPTER
IN THIS SECTION
Use this page to view, add, and delete Classifier Page configuration.
Field Descriptions
Table 168 on page 598 describes the fields on the Classifiers page.
Field Description
NOTE: This option is not available on SRX4000 lines of devices and SRX5000 lines of
devices.
• ieee-802.1—IEEE-802.1 classifier
• ieee-802.1ad—IEEE-802.1ad classifier
Details of classifiers
Incoming code point Displays CoS values and the aliases to which the forwarding class and loss priority are
mapped.
Forwarding class Displays forwarding class names that are assigned to specific CoS values and aliases of a
name classifier.
Loss priority Displays loss priorities that are assigned to specific CoS values and aliases of a classifier.
599
RELATED DOCUMENTATION
Add a Classifier
To add a classifier:
Field Description
NOTE: This option is not available on SRX4000 lines of devices and SRX5000 lines of
devices.
• ieee-802.1—IEEE-802.1 classifier
• ieee-802.1ad—IEEE-802.1ad classifier
Field Description
Code point Select the CoS value in bits and the alias of a classifier from the list.
Forwarding class Select the forwarding class for the specified CoS value and alias from the list.
Loss priority Select the loss priority for the specified CoS value and alias from the list.
RELATED DOCUMENTATION
Edit a Classifier
To edit a classifier:
1. Select an existing classifier configuration that you want to edit on the Classifiers page.
2. Click the pencil icon available on the upper-right corner of the Classifiers page.
The Edit Classifiers page appears with editable fields. For more information on the options, see "Add
a Classifier" on page 599.
3. Click OK to save the changes.
601
RELATED DOCUMENTATION
Delete a Classifier
To delete a classifier:
RELATED DOCUMENTATION
CHAPTER 52
CoS—Rewrite Rules
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Rewrite Rules.
Field Descriptions
Table 170 on page 603 describes the fields on the Rewrite Rules page.
Field Description
Egress/Outgoing Code point Displays the CoS values and aliases that a specific rewrite rule has set for a
specific forwarding class and loss priority.
Forwarding class name Displays the forwarding classes associated with a specific rewrite rule.
Loss priority Displays the loss priority values associated with a specific rewrite rule.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Rewrite Rules.
Field Action
Rewrite rule type Select a rewrite rule type from the list.
NOTE: This option is not available on SRX4000 lines of devices and SRX5000 lines of
devices.
• dscp-ipv6—Defines the Differentiated Services code point rewrite rule for IPv6.
NOTE: This option is not available on SRX4000 lines of devices and SRX5000 lines of
devices.
Click one:
Field Action
Forwarding class Select the forwarding class of the rewrite rule from the list.
Loss priority Select the loss priority of the rewrite rule from the list.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Rewrite Rules.
1. Select an existing rule configuration you want to edit on the Rewrite Rules page.
2. Click the pencil icon available on the upper-right corner of the Rewrite Rules page.
The Edit Rewrite Rule page appears with editable fields. For more information on the options, see
"Add a Rewrite Rule" on page 603.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Rewrite Rules.
1. Select an existing rule configuration you want to delete on the Rewrite Rules page.
606
2. Click the delete icon available on the upper-right corner of the Rewrite Rules page.
A confirmation window appears.
3. Click Yes to delete or click No to retain the previous configuration.
RELATED DOCUMENTATION
CHAPTER 53
CoS—Schedulers
IN THIS CHAPTER
IN THIS SECTION
Use this page to add, edit or delete configuration of schedulers and enable or disable global settings.
Field Descriptions
Table 172 on page 608 describes the fields on the Schedulers page.
Field Description
Enable Non Strict Priority Applies non-strict priority policy to all the schedulers.
Schedulers Configuration
Scheduler priority Displays the scheduler transmission priority, which determines the order in which an
output interface transmits traffic from the queues.
Details of scheduler
RELATED DOCUMENTATION
Add a Scheduler
To add a scheduler:
2. Complete the configuration according to the guidelines provided in Table 173 on page 609.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
• percent—Percentage of the total buffer. Select and type an integer from 1 through 100.
• rate—Shaping rate as an absolute number of bits per second. Select and type an integer
from 3200 through 160,000,000,000 bits per second.
• percent—Shaping rate as a percentage. Select and type an integer from 0 through 100.
610
Field Action
• rate—Transmit rate. Select and type an integer from 3200 through 160,000,000,000 bits
per second.
RELATED DOCUMENTATION
Edit a Scheduler
To edit a scheduler:
1. Select an existing scheduler that you want to edit on the Schedulers page.
2. Click the pencil icon available on the upper-right corner of the Schedulers page.
The Edit Scheduler appears with editable fields. For more information on the options, see "Add a
Scheduler" on page 608.
3. Click OK to save the changes.
RELATED DOCUMENTATION
Delete a Scheduler
To delete a scheduler:
1. Select an existing scheduler that you want to delete on the Schedulers page.
2. Click the delete icon available on the upper-right corner of the Schedulers page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 54
CoS—Scheduler Maps
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Scheduler Maps.
Field Descriptions
Table 174 on page 613 describes the fields on the Scheduler Maps page.
Field Description
Scheduler map name Displays the names of defined scheduler maps. Scheduler maps link schedulers to
forwarding classes.
Forwarding classes Displays the forwarding classes assigned for each map.
Details of Schedulers
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Scheduler Maps.
Field Action
Specifies no service profile. Loss priority is typically not carried in a CoS value.
Specifies end-to-end service with low loss, low latency, low jitter, and assured
bandwidth.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Scheduler Maps.
1. Select an existing scheduler map that you want to edit on the Schedulers page.
2. Click the pencil icon available on the upper-right corner of the Schedulers page.
The Edit Scheduler Map page appears with editable fields. For more information on the options, see
"Add a Scheduler Map" on page 613.
3. Click OK to save the changes.
615
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Scheduler Maps.
1. Select an existing scheduler map that you want to delete on the Schedulers page.
2. Click the delete icon available on the upper-right corner of the Schedulers page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 55
CoS—Drop Profile
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Drop Profile.
Field Descriptions
Table 176 on page 617 describes the fields on the Drop Profile page.
Field Description
Drop profile name Displays the configured random early detection (RED) drop profile names.
Profile type Displays whether a RED drop profile type is interpolated or segmented.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Drop Profile.
Field Action
Field Action
Interpolated Select the option to specify whether the value pairs are interpolated to produce a smooth
profile.
Segmented Select the option to specify whether the value pairs are represented by line fragments,
which connect each data point on the graph to produce a segmented profile.
1. Click +.
• Fill Level—Enter a percentage value for queue buffer fullness for the X-coordinate.
For example, 95.
• Drop Probability—Enter a percentage value for drop probability for the Y-coordinate.
For example, 85.
1. Select the existing data point and click the pencil icon.
To delete a data point, select the existing data point and click the delete (X) icon. Then, click
Yes to delete it.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Drop Profile.
1. Select an existing drop profile that you want to edit on the Drop Profile page.
2. Click the pencil icon available on the upper-right corner of the Drop Profile page.
The Edit Drop Profile page appears with editable fields. For more information on the options, see
"Add a Drop Profile" on page 617.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Drop Profile.
1. Select an existing drop profile that you want to delete on the Drop Profile page.
2. Click the delete icon available on the upper-right corner of the Drop Profile page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 56
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Virtual Channel Groups.
NOTE: This menu is not available for SRX4000 line of devices and SRX5000 line of devices.
Field Descriptions
Table 178 on page 621 describes the fields on the Virtual Channel Groups page.
Field Description
Virtual Channel Group Name Displays the name of defined virtual channel groups.
Scheduler Map Displays the scheduler map assigned to a particular virtual channel.
Shaping Rate Displays the shaping rate configured for a virtual channel.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Virtual Channel Groups.
NOTE: This menu is not available for SRX4000 line of devices and SRX5000 line of devices.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
Virtual Channel Select a predefined name from the list or enter a new virtual channel name.
Name
Specifies a predefined scheduler map to assign to a virtual channel. The scheduler maps
associate schedulers with forwarding classes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Virtual Channel Groups.
623
NOTE: This menu is not available for SRX4000 line of devices and SRX5000 line of devices.
1. Click on the existing virtual channel name that you want to edit on the Virtual Channel Groups page.
The Virtual Channel Information page appears with editable fields. For more information on the
options, see "Add a Virtual Channel" on page 621.
2. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Virtual Channel Groups.
NOTE: This menu is not available for SRX4000 line of devices and SRX5000 line of devices.
1. Select an existing virtual channel name that you want to delete on the Virtual Channel Groups page.
2. Click Delete on the Virtual Channel Groups page.
RELATED DOCUMENTATION
CHAPTER 57
CoS—Assign To Interface
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > Class of Service(CoS) > Assign To Interface.
Field Descriptions
Table 180 on page 625 describes the fields on the Assign To Interface page.
Field Description
Scheduler map Displays the predefined scheduler maps for the physical interface.
Virtual channel group Displays the virtual channel groups assigned to a particular interface.
Rewrite rule[dscp,dscpv6,exp,inet] Displays the rewrite rules assigned to a particular interface—for example,
information about Differentiated Services Code Point (DSCP and DSCPv6),
EXP, and IPv4 (inet precedence) rewrite rules.
RELATED DOCUMENTATION
Edit a Port
You are here: Network > Class of Service(CoS) > Assign To Interface.
To edit a port:
1. Select an existing port profile that you want to edit on the Assign To Interface page.
2. The Edit page appears with editable fields. For more information on the options, see Table 181 on
page 626.
3. Click OK to save the changes.
Field Action
Select the scheduler map Select Select the scheduler map and select a value from the list.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Assign To Interface.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
Virtual channel group Select a virtual channel group from the list.
Classifiers
Specifies the Differentiated Services Code Point of the classifier type assigned to a
particular interface.
Specifies the Differentiated Services Code Point version 6 of the classifier type assigned
to a particular interface.
inet precedence Select an IPv4 precedence classifier value from the list.
Rewrite rules
Specifies the Differentiated Services Code Point of the rewrite rule type assigned to a
particular interface
628
Field Action
Specifies the Differentiated Services Code Point version 6 of the rewrite rule type
assigned to a particular interface.
inet precedence Select an IPv4 precedence rewrite rule value from the list.
Specifies the IPv4 precedence rewrite rule type assigned to a particular interface.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Assign To Interface.
1. Select an existing logical interface that you want to edit on the Logical Interface page.
2. Click the pencil icon available on the upper-right corner of the Logical Interface page.
The Edit Logical Interface page appears with editable fields. For more information on the options, see
"Add a Logical Interface" on page 626.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > Class of Service(CoS) > Assign To Interface.
1. Select an existing logical interface that you want to delete on the Logical Interface page.
2. Click the delete icon available on the upper-right corner of the Logical Interface page.
A confirmation window appears.
3. Click Yes to delete or click No.
RELATED DOCUMENTATION
CHAPTER 58
Application QoS
IN THIS CHAPTER
IN THIS SECTION
Application quality of service (AppQoS) provides the ability to prioritize and meter application traffic to
provide better service to business-critical or high-priority application traffic.
The AppQoS feature expands the capability of Junos OS class of service (CoS) to include marking DSCP
values based on Layer-7 application types, honoring application-based traffic through loss priority
631
settings, and controlling transfer rates on egress Physical Interface Cards (PICs) based on Layer-7
application types.
Use this page to add, edit, clone, and delete an AppQoS profile and a rate limiter profile.
• Add an AppQoS profile. See "Add an Application QoS Profile" on page 633.
• Edit an AppQoS profile. See "Edit an Application QoS Profile" on page 635.
• Clone an AppQoS profile. See "Clone an Application QoS Profile" on page 635.
• Delete AppQoS profile. See "Delete an Application QoS Profile" on page 636.
• Add a rate limiter profile. See "Add a Rate Limiter Profile" on page 636.
• Edit a rate limiter profile. See "Edit a Rate Limiter Profile" on page 637.
• Clone a rate limiter profile. See "Clone a Rate Limiter Profile" on page 638.
• Delete rate limiter profile. See "Delete a Rate Limiter Profile" on page 638.
• Show or hide columns in the AppQoS Profile or Rate Limiter Profile table. To do this, click Show Hide
Columns icon in the upper-right corner of the page and select the columns you want to display or
deselect to hide columns on the page.
• Advanced search for an AppQoS or rate limiter profile. To do this, use the search text box present
above the table grid. The search includes the logical operators as part of the filter string. An example
filter condition is displayed in the search text box when you hover over the Search icon. When you
start entering the search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace to delete a character of the search string.
632
Field Descriptions
Table 183 on page 632 describes the fields on the Application QoS page.
Field Description
AppQoS Profile
Traffic Direction Displays whether the traffic direction is client-to-server and server-to-client.
NOTE: If the same rate limiter profile is associated with client-to-server and server-
to-client traffic, then Both status will be displayed.
Maximum Bandwidth Displays the maximum bandwidth (in Mbps) to be transmitted for the rate limiter.
Maximum Burst Size Displays maximum burst size (in MB) to be transferred in a single burst or time-
slice.
Associated AppQoS Profile Displays the AppQoS profile name associated with the rate limiter profile.
633
Field Action
Name Enter a name for the AppQoS profile. The name must be a string beginning with a letter or
underscore and consisting of letters, numbers, dashes and underscores, and length should
be maximum 53 characters.
Rate Limiter
Traffic Direction
Client to Server Select a rate limiter from the list to be associated with client-to-server traffic for this
application.
Click Add New to add a new rate limiter profile. For more information on creating a new
rate limiter, see "Add a Rate Limiter Profile" on page 636.
Server to Client Select a rate limiter from the list to be associated with server-to-client traffic for this
application.
Click Add New to add a new rate limiter profile. For fields information, see "Add a Rate
Limiter Profile" on page 636.
634
Field Action
Action Select one of the following actions to configure the AppQoS rules:
NOTE: This option is not supported for SRX4600 and SRX5000 line of devices.
QoS Marking
DSCP Select an option from the list to mark Differentiated Services code point (DSCP) alias or bit
map with matching applications to establish the output queue.
Forwarding Class Select an option from the list to mark the AppQoS class with matching applications.
Click Add New to add a new forwarding class. For more information in adding a new
forwarding class, see Table 185 on page 634.
NOTE: Add New is not supported for the logical systems and tenants. You can only select
the predefined value.
Packet Loss Select an option from the list to mark loss priority with matching applications.
Priority
Possible values are none, high, low, medium-high, and medium-low. A high loss priority
means that there is an 80% chance of packet loss in congestion.
Field Action
Queue Number Enter an output queue number to associate with the forwarding class.
Range is 0 through 7.
635
Field Action
Priority Select the forwarding class queuing priority from the list.
RELATED DOCUMENTATION
1. Select an existing AppQoS profile that you want to edit on the Application QoS page.
2. Click the pencil icon available on the upper right-side of the page.
The Edit AppQoS Profile page appears with editable fields. For more information on editing the fields,
see "Add an Application QoS Profile" on page 633.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select an existing AppQoS profile that you want to clone on the Application QoS page.
2. Click More > Clone available on the upper right-side of the page.
The Clone AppQoS Profile page appears with editable fields. For more information on editing the
fields, see "Add an Application QoS Profile" on page 633.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select one or more AppQoS profiles that you want to delete on the Application QoS page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete the selected AppQoS profiles or click No to retain the profiles.
RELATED DOCUMENTATION
Field Action
Name Enter a name for the rate limiter profile. It is applied in AppQoS rules to share device
resources based on quality-of-service requirements.
Name must be a string beginning with a letter or underscore and consisting of letters,
numbers, dashes and underscores and length should be maximum 63 characters.
Maximum Enter the maximum bandwidth to be transmitted in Mbps, for this rate limiter. You can
Bandwidth provision up to 10240 Mbps of bandwidth among multiple rate limiters to share the resource
proportionally.
Maximum Burst Enter the maximum burst size (in MB) to be transferred in a single burst or time-slice. This
Size limit ensures that a high-priority transmission does not keep a lower priority transmission
from transmitting.
RELATED DOCUMENTATION
1. Select an existing rate limiter profile that you want to edit on the Application QoS page.
2. Click the pencil icon available on the upper right-side of the page.
The Edit Rate Limiter Profile page appears with editable fields. For more information on editing the
fields, see "Add a Rate Limiter Profile" on page 636.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select an existing rate limiter profile that you want to clone on the Application QoS page.
2. Click More > Clone available on the upper right-side of the page.
The Clone Rate Limiter Profile page appears with editable fields. For more information on editing the
fields, see "Add a Rate Limiter Profile" on page 636.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
1. Select one or more rate limiter profiles that you want to delete on the Application QoS page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete rate limiter profiles or click No to retain the profiles.
RELATED DOCUMENTATION
CHAPTER 59
IPsec VPN
IN THIS CHAPTER
IN THIS SECTION
A VPN is a private network that uses a public network to connect two or more remote sites. Instead of
using dedicated connections between networks, VPNs use virtual connections routed (tunneled)
through public networks. IPsec VPN is a protocol, consists of set of standards used to establish a VPN
connection. Use this page to configure IPsec VPN.
• Configure IPsec VPN global settings. See "IPsec VPN Global Settings" on page 643.
• Create a remote access VPN. See "Create a Remote Access VPN—Juniper Secure Connect" on page
663 and "Create a Remote Access VPN—NCP Exclusive Client" on page 685.
• Edit an IPsec VPN configuration. See "Edit an IPsec VPN" on page 698.
• Delete an IPsec VPN configuration. See "Delete an IPsec VPN" on page 699.
• Show or hide columns in the IPsec VPN table. To do this, click the Show Hide Columns icon in the
upper-right corner of the page and select the columns you want to display or deselect to hide
columns on the page.
• Advance search for an IPsec VPN. To do this, use the search text box present above the table grid.
The search includes the logical operators as part of the filter string. An example filter condition is
displayed in the search text box when you hover over the Search icon. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and choose a valid operator for your advanced search.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace to delete a character of the search string.
Field Descriptions
Table 187 on page 641 describes the fields on the IPsec VPN page.
Field Description
Field Description
IKE Status Displays the Phase I Internet Key Exchange (IKE) status.
• Site to Site VPN—Connects two sites in an organization together and allows secure
communications between the sites.
The options available are Remote Access VPN (Juniper Secure Connect) and Remote
Access VPN (NCP Exclusive Client).
• Other topologies which are displayed and you cannot add or edit are:
• Dynamic VPN—The dynamic VPN feature simplifies remote access by enabling users
to create IPsec VPN tunnels without having to manually configure settings on their
PCs or laptops. This feature is supported on SRX300, SRX320, SRX340, SRX345, and
SRX550HM devices.
Dead Peer Displays if the dead peer detection (DPD) is enabled or disabled.
Detection
Routing Mode Displays the name of the routing mode to send traffic to the IPsec VPN.
Connection Displays the connection profile in the FQDN or FQDN/Realm format if configured. If not
Profile configured, the field displays as external-IP/VPN-Name.
RELATED DOCUMENTATION
IN THIS SECTION
Use this page to view or add the VPN global configuration details. Click Global Settings on the IPsec
VPN page.
Field Descriptions
Table 188 on page 643 describes the fields on the Global Settings page.
Field Description
General
IKE - Respond to Enable this option if you want the device to respond to IPsec packets with invalid IPsec
bad-spi Security Parameter Index (SPI) values.
Max Responses Enter a value from 1 through 30 to respond to invalid SPI values per gateway. The default
is 5. This option is available when Response Bad SPI is selected.
IPsec VPN Monitor Enable this option if you want the device to monitor VPN liveliness.
Options
644
Field Description
Interval (seconds) Enter a value from 2 through 3600 seconds after which Internet Control Message Protocol
(ICMP) requests are sent to the peer.
Threshold Enter a value from 1 through 65,536 to specify the number of consecutive unsuccessful
pings before the peer is declared unreachable.
• This option is available when at least one Juniper Secure Connect VPN is created.
SSL VPN Tunnel Enable this option to track Encapsulated Security Payload (ESP) tunnels.
tracking
645
Field Description
NOTE: This option displays associated IPsec VPNs when at least one Juniper Secure
Connect VPN is created.
1. Click +.
a. Click Add.
• Click OK.
c. Click OK.
3. Click OK.
To edit an SSL termination profile, select the profile you want to edit and click on the
pencil icon.
646
Field Description
To delete an SSL termination profile, select the profile you want to delete and click on the
delete icon.
Internal SA
Internal SA Keys Enter the encryption key. You must ensure that the manual encryption key is in ASCII text
and 24 characters long; otherwise, the configuration will result in a commit failure.
NOTE: This option is available only for SRX5000 line of devices, SRX4100, SRX4200,
SRX4600 devices, and vSRX Virtual Firewall.
RELATED DOCUMENTATION
1. Click Create VPN and select Site to Site on the upper-right corner of the IPsec VPN page.
The Create Site to Site VPN page appears.
2. Complete the configuration according to the guidelines provided in Table 189 on page 647 through
Table 194 on page 657.
The VPN connectivity will change from grey to blue line in the topology to show that the
configuration is complete.
3. Click Save to save the changes.
If you want to discard your changes, click Cancel.
647
Field Action
Routing Mode Select the routing mode to which this VPN will be
associated:
• Static Routing
Field Action
Authentication Method Select an authentication method from the list that the
device uses to authenticate the source of Internet Key
Exchange (IKE) messages:
Field Action
Local Gateway Displays the local gateway icon in the topology. Click
the icon to configure the local gateway.
Field Action
IKE and IPsec Settings Configure the custom IKE or IPsec proposal and the
custom IPsec proposal with recommended algorithms
or values.
NOTE:
Field Action
Field Action
External IP Address Enter the peer IPv4 or IPv6 address. You can create
one primary peer network with up to four backups.
Protected Networks When you select a routing mode, lists all the global
address(es).
• Static Routing:
Add Click +.
Field Action
Field Action
Gateway is behind NAT Enable this option when the local gateway is behind a
NAT device.
Field Action
External Interface Select an outgoing interface from the list for IKE
negotiations.
Tunnel Interface Select an interface from the list to bind it to the tunnel
interface (route-based VPN).
Field Action
Tunnel Interface Passive Enable this option to bypass traffic of the usual active
IP checks.
BGP Group Type Select the type of BGP peer group from the list:
Field Action
Import Policies Select one or more routing policies from the list to
routes being imported into the routing table from BGP.
Export Policies Select one or more policies from the list to routes
being exported from the routing table into BGP.
Trusted CA/Group Select the certificate authority (CA) profile from list to
associate it with the local certificate.
Field Action
Pre-shared Key Enter the value of the preshared key. The key can be
one of the following:
• hexadecimal—Hexadecimal key.
Zone Select a security zone from the list that will be used as
a source zone in the firewall policy.
Global Address Select the addresses from the Available column and
then click the right arrow to move it to the Selected
column.
Field Action
Zone Select a zone for the logical interface from the list to
use as a source zone in the firewall policy.
IPv4
NOTE: This option is available only if you select routing mode as Dynamic Routing - OSPF or BGP.
IPv6
NOTE: This option is available only if you select routing mode as Dynamic Routing - OSPF or BGP.
Subnet Prefix Enter a subnet mask for the network range. Once
entered, the value is validated.
Field Action
IKE Settings
658
Field Action
IKE Version Select the required IKE version, either v1 or v2 to negotiate dynamic security
associations (SAs) for IPsec.
IKE Mode Select the IKE policy mode from the list:
• aggressive—Take half the number of messages of main mode, has less negotiation
power, and does not provide identity protection.
• main—Use six messages, in three peer-to-peer exchanges, to establish the IKE SA.
These three steps include the IKE SA negotiation, a Diffie-Hellman exchange, and
authentication of the peer. Also provides identity protection.
Authentication Select the authentication algorithm from the list. For example, hmac-md5-96—Produces
Algorithm a 128-bit digest and hmac-sha1-96—Produces a 160-bit digest.
NOTE: This option is available when the encryption algorithm is not gcm.
DH group A Diffie-Hellman (DH) exchange allows participants to generate a shared secret value.
Select the appropriate DH group from the list. Default value is group19.
Lifetime Seconds Select a lifetime of an IKE security association (SA). Default: 28,800 seconds. Range: 180
through 86,400 seconds.
Dead Peer Detection Enable this option to send dead peer detection requests regardless of whether there is
outgoing IPsec traffic to the peer.
659
Field Action
• optimized—Send probes only when there is outgoing traffic and no incoming data
traffic - RFC3706 (default mode).
DPD Interval Select an interval in seconds to send dead peer detection messages. The default interval
is 10 seconds. Range is 2 to 60 seconds.
DPD Threshold Select a number from 1 to 5 to set the failure DPD threshold.
This specifies the maximum number of times the DPD messages must be sent when
there is no response from the peer. The default number of transmissions is 5 times.
IKEv2 Re- Configure the reauthentication frequency to trigger a new IKEv2 reauthentication.
authentication
IKEv2 Re-fragment Select the maximum size, in bytes, of an IKEv2 message before it is split into fragments.
Size
The size applies to both IPv4 and IPv6 messages. Range: 570 to 1320 bytes.
Field Action
NAT-T Enable this option for IPsec traffic to pass through a NAT device.
NAT-T is an IKE phase 1 algorithm that is used when trying to establish a VPN
connection between two gateway devices, where there is a NAT device in front of one of
the SRX Series Firewalls.
NAT Keep Alive Select appropriate keepalive interval in seconds. Range: 1 to 300.
If the VPN is expected to have large periods of inactivity, you can configure keepalive
values to generate artificial traffic to keep the session active on the NAT devices.
IPsec Settings
Protocol Select either Encapsulation Security Protocol (ESP) or Authentication Header (AH)
protocol from the list to establish VPN. Default value is ESP.
Authentication Select the IPsec authentication algorithm from the list. For example, hmac-md5-96—
Algorithm Produces a 128-bit digest and hmac-sha1-96—Produces a 160-bit digest.
NOTE: This option is available when the encryption algorithm is not gcm.
Perfect Forward Select Perfect Forward Secrecy (PFS) from the list. The device uses this method to
Secrecy generate the encryption key. Default value is group19.
PFS generates each new encryption key independently from the previous key. The higher
numbered groups provide more security, but require more processing time.
NOTE: group15, group16, and group21 support only the SRX5000 line of devices with
an SPC3 card and junos-ike package installed.
Lifetime Seconds Select the lifetime (in seconds) of an IPsec security association (SA). When the SA
expires, it is replaced by a new SA and security parameter index (SPI) or terminated.
Default is 3,600 seconds. Range: 180 through 86,400 seconds.
661
Field Action
Lifetime Kilobytes Select the lifetime (in kilobytes) of an IPsec SA. Default is 128kb. Range: 64 through
4294967294.
Establish Tunnel Enable this option to establish the IPsec tunnel. IKE is activated immediately (default
value) after a VPN is configured and the configuration changes are committed.
Advanced Configuration
NOTE: This option is not available for Traffic Selectors routing mode.
Destination IP Enter the destination of the Internet Control Message Protocol (ICMP) pings. The device
uses the peer's gateway address by default.
NOTE: This option is not available for Traffic Selectors routing mode.
Optimized Enable this option for the VPN object. If enabled, the SRX Series Firewall only sends
ICMP echo requests (pings) when there is outgoing traffic and no incoming traffic from
the configured peer through the VPN tunnel. If there is incoming traffic through the VPN
tunnel, the SRX Series Firewall considers the tunnel to be active and does not send pings
to the peer.
NOTE: This option is not available for Traffic Selectors routing mode.
Source Interface Select the source interface for ICMP requests from the list. If no source interface is
specified, the device automatically uses the local tunnel endpoint interface.
NOTE: This option is not available for Traffic Selectors routing mode.
Verify-path Enable this option to verify the IPsec datapath before the secure tunnel (st0) interface is
activated and route(s) associated with the interface are installed in the Junos OS
forwarding table.
NOTE: This option is not available for Traffic Selectors routing mode.
662
Field Action
Destination IP Enter the destination IP address. Original, untranslated IP address of the peer tunnel
endpoint that is behind a NAT device. This IP address must not be the NAT translated IP
address. This option is required if the peer tunnel endpoint is behind a NAT device. The
verify-path ICMP request is sent to this IP address so that the peer can generate an
ICMP response.
NOTE: This option is not available for Traffic Selectors routing mode.
Packet size Enter the size of the packet that is used to verify an IPsec datapath before the st0
interface is brought up. Range: 64 to 1350 bytes. Default value is 64 bytes.
NOTE: This option is not available for Traffic Selectors routing mode.
Anti Replay IPsec protects against VPN attack by using a sequence of numbers built into the IPsec
packet—the system does not accept a packet with the same sequence number.
This option is enabled by default. The Anti-Replay checks the sequence numbers and
enforce the check, rather than just ignoring the sequence numbers.
Disable Anti-Replay if there is an error with the IPsec mechanism that results in out-of-
order packets, which prevents proper functionality.
Install Interval Select the maximum number of seconds to allow for the installation of a rekeyed
outbound security association (SA) on the device. Select a value from 1 to 10.
Idle Time Select the idle time interval. The sessions and their corresponding translations time out
after a certain period of time if no traffic is received. Range is 60 to 999999 seconds.
DF Bit Select how the device handles the Don't Fragment (DF) bit in the outer header:
• clear—Clear (disable) the DF bit from the outer header. This is the default.
Field Action
Copy Outer DSCP This option enabled by default. This enables copying of Differentiated Services Code
Point (DSCP) (outer DSCP+ECN) from the outer IP header encrypted packet to the inner
IP header plain text message on the decryption path. Enabling this feature, after IPsec
decryption, clear text packets can follow the inner CoS (DSCP+ECN) rules.
RELATED DOCUMENTATION
Juniper Secure Connect is Juniper’s client-based SSL-VPN solution that offers secure connectivity for
your network resources.
Juniper Secure Connect provides secure remote access for the users to connect to the corporate
networks and resources remotely using the Internet. Juniper Secure Connect downloads the
configuration from SRX Services devices and chooses the most effective transport protocols during
connection establishment to deliver a great administrator and user experience.
1. Choose Create VPN > Remote Access > Juniper Secure Connect on the upper right-side of the IPsec
VPN page.
The Create Remote Access (Juniper Secure Connect) page appears.
NOTE: Starting in Junos OS Release 23.2R1, when you create or edit the Juniper Secure
Connect VPNs, the ike-user-type is group-ike-id if the Junos-ike package is already installed.
664
This helps to enable you with the multi device access. This is not supported for SRX300 line
of Firewalls and SRX550HM Firewall.
2. Complete the configuration according to the guidelines provided in Table 195 on page 664 through
Table 200 on page 681.
The VPN connectivity will change from grey to blue line in the topology to show that the
configuration is complete.
3. Click Save to complete Secure Connect VPN Configuration and associated policy if you have selected
the auto policy creation option.
If you want to discard your changes, click Cancel.
Table 195: Fields on the Create Remote Access (Juniper Secure Connect) Page
Field Action
Table 195: Fields on the Create Remote Access (Juniper Secure Connect) Page (Continued)
Field Action
Authentication Method Select an authentication method from the list that the
device uses to authenticate the source of Internet Key
Exchange (IKE) messages:
Table 195: Fields on the Create Remote Access (Juniper Secure Connect) Page (Continued)
Field Action
Remote User Displays the remote user icon in the topology. Click the
icon to configure the Juniper Secure Connect client
settings.
NOTE:
Starting in Junos OS 23.1R1 Release, J-Web displays
the remote user in FQDN or FQDN/Realm format if
connection profile is configured. If not configured, J-
Web displays the external interface IP (for default
profile) or external interface IP/VPN-Name (for non-
default profile).
Local Gateway Displays the local gateway icon in the topology. Click
the icon to configure the local gateway.
Table 195: Fields on the Create Remote Access (Juniper Secure Connect) Page (Continued)
Field Action
IKE and IPsec Settings Configure the custom IKE or IPsec proposal and the
custom IPsec proposal with recommended algorithms
or values.
NOTE:
Field Action
Default Profile Enable this option to use the configured VPN name as
remote access default profile.
NOTE:
Field Action
Connection Mode Select one of the following options from the list to
establish the Juniper Secure Connect client
connection:
Field Action
Dead Peer Detection Enable the dead peer detection (DPD) option to allow
the Juniper Secure Connect client to detect if the SRX
Series Firewall is reachable.
DPD Interval Enter the amount of time that the peer waits for traffic
from its destination peer before sending a dead-peer-
detection (DPD) request packet. The Range is 2
through 60 seconds and default is 60 seconds.
Field Action
Pin Req Per Connection Enable this option to enter the certificate pin on very
connection.
Domain Name Enter the system domain name on to which the Users
Machine logs.
671
Field Action
Mode Select one of the following options from the list to log
on to Windows domain.
Disconnect at Logoff Enable this option to shut down the connection when
the system switches to hibernation or standby mode.
When the system resumes from hibernation or standby
mode the connection has to be re-established.
Flush Credential at Logoff Enable this option to delete username and password
from the cache. You must reenter the username and
password.
Lead Time Duration Enter the lead time duration to initialize time between
network logon and domain logon.
Field Action
Auto Dialog Open Enable this option to select whether a dialog should
open automatically for connection establishment to a
remote domain.
Field Action
Field Action
Field Action
Gateway is behind NAT Enable this option when the local gateway is behind a
NAT device.
675
Field Action
NAT IP Address Enter the public (NAT) IP address of the SRX Series
Firewall.
External Interface Select an outgoing interface from the list for which the
client will connect to.
Field Action
NOTE:
Tunnel Interface Select an interface from the list for the client to
connect to.
Field Action
Pre-shared Key Enter one of the following values of the preshared key:
• hexadecimal—Hexadecimal key.
Field Action
SSL VPN Profile Select the SSL VPN Profile from the list that will be
used to terminate the remote access connections.
1. Click Add.
a. Click Add.
• Click OK.
c. Click OK.
3. Click OK.
679
Field Action
Zone Select a security zone from the list that will be used as
a source zone in the firewall policy.
Global Address Select the addresses from the Available column and
then click the right arrow to move it to the Selected
column.
Field Action
Field Action
Field Action
Name Enter a name for the global address. The name must be a unique string that must begin with an
alphanumeric character and can include colons, periods, dashes, and underscores; no spaces
allowed; 63-character maximum.
681
Field Action
IPv4
Field Action
IKE Settings
NOTE: The following parameters are generated automatically and are not displayed in the J-Web UI:
• If the authentication method is Pre-Shared Key, the IKE version is v1, ike-user-type is shared-ike-id, and mode
is Aggressive.
• If the authentication method is Certificate Based, the IKE version is v2, ike-user-type is shared-ike-id, and
mode is Main.
• Starting in Junos OS Release 23.2R1, the ike-user-type is group-ike-id. This helps to enable you with the multi
device access. You can edit and save the existing VPN to convert to group-ike-id.
This is not supported for SRX300 line of Firewalls and SRX550HM Firewall.
Encryption Algorithm Select the appropriate encryption mechanism from the list.
Authentication Algorithm Select the authentication algorithm from the list. For example, SHA 256-bit.
Field Action
Lifetime Seconds Select a lifetime duration (in seconds) of an IKE security association (SA).
Dead Peer Detection Enable this option to send dead peer detection requests regardless of whether there
is outgoing IPsec traffic to the peer.
• optimized—Send probes only when there is outgoing traffic and no incoming data
traffic - RFC3706 (default mode).
DPD Interval Select an interval (in seconds) to send dead peer detection messages. The default
interval is 10 seconds. Range is 2 to 60 seconds.
DPD Threshold Select a number from 1 to 5 to set the failure DPD threshold.
This specifies the maximum number of times the DPD messages must be sent when
there is no response from the peer. The default number of transmissions is 5 times.
NAT-T Enable this option for IPsec traffic to pass through a NAT device.
NAT-T is an IKE phase 1 algorithm that is used when trying to establish a VPN
connection between two gateway devices, where there is a NAT device in front of
one of the SRX Series Firewalls.
NAT Keep Alive Select appropriate keepalive interval in seconds. Range: 1 to 300.
If the VPN is expected to have large periods of inactivity, you can configure keepalive
values to generate artificial traffic to keep the session active on the NAT devices.
683
Field Action
IKE Connection Limit Enter the number of concurrent connections that the VPN profile supports.
When the maximum number of connections is reached, no more remote access user
(VPN) endpoints attempting to access an IPsec VPN can begin Internet Key Exchange
(IKE) negotiations.
IKEv2 Fragmentation This option is enabled by default. IKEv2 fragmentation splits a large IKEv2 message
into a set of smaller ones so that there is no fragmentation at the IP level.
Fragmentation takes place before the original message is encrypted and
authenticated, so that each fragment is separately encrypted and authenticated.
IKEv2 Fragment Size Select the maximum size, in bytes, of an IKEv2 message before it is split into
fragments.
IPsec Settings
NOTE: The authentication method is Pre-Shared Key or Certificate Based, it automatically generates protocol as
ESP.
Encryption Algorithm Select the encryption method. Default value is AES-GCM 256-bit.
Authentication Algorithm Select the IPsec authentication algorithm from the list. For example, HMAC-
SHA-256-128.
NOTE: This option is available when the encryption algorithm is not gcm.
684
Field Action
Perfect Forward Secrecy Select Perfect Forward Secrecy (PFS) from the list. The device uses this method to
generate the encryption key. Default value is group19.
PFS generates each new encryption key independently from the previous key. The
higher numbered groups provide more security, but require more processing time.
NOTE: group15, group16, and group21 support only the SRX5000 line of devices
with an SPC3 card and junos-ike package installed.
Lifetime Seconds Select the lifetime (in seconds) of an IPsec security association (SA). When the SA
expires, it is replaced by a new SA and security parameter index (SPI) or terminated.
Default is 3,600 seconds. Range: 180 through 86,400 seconds.
Lifetime Kilobytes Select the lifetime (in kilobytes) of an IPsec SA. Default is 256kb. Range: 64 through
4294967294.
Advanced Configuration
Anti Replay IPsec protects against VPN attack by using a sequence of numbers built into the
IPsec packet—the system does not accept a packet with the same sequence number.
This option is enabled by default. The Anti-Replay checks the sequence numbers and
enforce the check, rather than just ignoring the sequence numbers.
Disable Anti-Replay if there is an error with the IPsec mechanism that results in out-
of-order packets, which prevents proper functionality.
Install Interval Select the maximum number of seconds to allow for the installation of a rekeyed
outbound security association (SA) on the device. Select a value from 1 to 10
seconds.
Idle Time Select the idle time interval. The sessions and their corresponding translations time
out after a certain period of time if no traffic is received. Range is 60 to 999999
seconds.
685
Field Action
DF Bit Select how the device handles the Don't Fragment (DF) bit in the outer header:
• clear—Clear (disable) the DF bit from the outer header. This is the default.
Copy Outer DSCP This option enabled by default. This enables copying of Differentiated Services Code
Point (DSCP) (outer DSCP+ECN) from the outer IP header encrypted packet to the
inner IP header plain text message on the decryption path. Enabling this feature,
after IPsec decryption, clear text packets can follow the inner CoS (DSCP+ECN)
rules.
RELATED DOCUMENTATION
The NCP Exclusive Remote Access Client is part of the NCP Exclusive Remote Access solution for
Juniper SRX Series Gateways. The VPN client is only available with NCP Exclusive Remote Access
Management. Use the NCP Exclusive Client to establish secure, IPsec-based data links from any location
when connected with SRX Series Gateways.
1. Choose Create VPN > Remote Access > NCP Exclusive Client on the upper right-side of the IPsec
VPN page.
The Create Remote Access (NCP Exclusive Client) page appears.
686
2. Complete the configuration according to the guidelines provided in Table 201 on page 686 through
Table 205 on page 694.
The VPN connectivity will change from grey to blue line in the topology to show that the
configuration is complete.
3. Click Save to save the changes.
If you want to discard your changes, click Cancel.
Table 201: Fields on the Create Remote Access (NCP Exclusive Client) Page
Field Action
Authentication Method Select an authentication method from the list that the
device uses to authenticate the source of Internet Key
Exchange (IKE) messages:
Table 201: Fields on the Create Remote Access (NCP Exclusive Client) Page (Continued)
Field Action
Local Gateway Displays the local gateway icon in the topology. Click
the icon to configure the local gateway.
Table 201: Fields on the Create Remote Access (NCP Exclusive Client) Page (Continued)
Field Action
IKE and IPsec Settings Configure the custom IKE or IPsec proposal and the
custom IPsec proposal with recommended algorithms
or values.
NOTE:
Field Action
Gateway is behind NAT Enable this option when the local gateway is behind a
NAT device.
NAT IP Address Enter the public (NAT) IP address of the SRX Series
Firewall.
Field Action
External Interface Select an outgoing interface from the list for which the
client will connect to.
Tunnel Interface Select an interface from the list for the client to
connect to.
Pre-shared Key Enter one of the following values of the preshared key:
• hexadecimal—Hexadecimal key.
Field Action
Field Action
SSL VPN Profile Select the SSL VPN Profile from the list that will be
used to terminate the remote access connections.
1. Click Add.
a. Click Add.
• Click OK.
c. Click OK.
3. Click OK.
692
Field Action
Zone Select a security zone from the list that will be used as
a source zone in the firewall policy.
Global Address Select the addresses from the Available column and
then click the right arrow to move it to the Selected
column.
Field Action
Field Action
Field Action
Name Enter a name for the global address. The name must be a unique string that must begin with an
alphanumeric character and can include colons, periods, dashes, and underscores; no spaces
allowed; 63-character maximum.
694
Field Action
IPv4
Field Action
IKE Settings
NOTE: The following parameters are generated automatically and are not displayed in the J-Web UI:
• If the authentication method is Pre-Shared Key, the IKE version is 1, ike-user-type is shared-ike-id, and mode
is Aggressive.
• If the authentication method is Certificate Based, the IKE version is 2, ike-user-type is group-ike-id, and mode
is Main.
Encryption Algorithm Select the appropriate encryption mechanism from the list.
Authentication Algorithm Select the authentication algorithm from the list. For example, SHA 256-bit.
Lifetime Seconds Select a lifetime duration (in seconds) of an IKE security association (SA).
Field Action
Dead Peer Detection Enable this option to send dead peer detection requests regardless of whether there
is outgoing IPsec traffic to the peer.
• optimized—Send probes only when there is outgoing traffic and no incoming data
traffic - RFC3706 (default mode).
DPD Interval Select an interval (in seconds) to send dead peer detection messages. The default
interval is 10 seconds. Range is 2 to 60 seconds.
DPD Threshold Select a number from 1 to 5 to set the failure DPD threshold.
This specifies the maximum number of times the DPD messages must be sent when
there is no response from the peer. The default number of transmissions is 5 times.
NAT-T Enable this option for IPsec traffic to pass through a NAT device.
NAT-T is an IKE phase 1 algorithm that is used when trying to establish a VPN
connection between two gateway devices, where there is a NAT device in front of
one of the SRX Series Firewalls.
NAT Keep Alive Select appropriate keepalive interval in seconds. Range: 1 to 300.
If the VPN is expected to have large periods of inactivity, you can configure keepalive
values to generate artificial traffic to keep the session active on the NAT devices.
696
Field Action
IKE Connection Limit Enter the number of concurrent connections that the VPN profile supports.
When the maximum number of connections is reached, no more remote access user
(VPN) endpoints attempting to access an IPsec VPN can begin Internet Key Exchange
(IKE) negotiations.
IKEv2 Fragmentation This option is enabled by default. IKEv2 fragmentation splits a large IKEv2 message
into a set of smaller ones so that there is no fragmentation at the IP level.
Fragmentation takes place before the original message is encrypted and
authenticated, so that each fragment is separately encrypted and authenticated.
IKEv2 Fragment Size Select the maximum size, in bytes, of an IKEv2 message before it is split into
fragments.
IPsec Settings
Encryption Algorithm Select the encryption method. Default value is AES-GCM 256-bit.
Authentication Algorithm Select the IPsec authentication algorithm from the list. For example, HMAC-
SHA-256-128.
NOTE: This option is available when the encryption algorithm is not gcm.
697
Field Action
Perfect Forward Secrecy Select Perfect Forward Secrecy (PFS) from the list. The device uses this method to
generate the encryption key. Default value is group19.
PFS generates each new encryption key independently from the previous key. The
higher numbered groups provide more security, but require more processing time.
NOTE: group15, group16, and group21 support only the SRX5000 line of devices
with an SPC3 card and junos-ike package installed.
Lifetime Seconds Select the lifetime (in seconds) of an IPsec security association (SA). When the SA
expires, it is replaced by a new SA and security parameter index (SPI) or terminated.
Default is 3,600 seconds. Range: 180 through 86,400 seconds.
Lifetime Kilobytes Select the lifetime (in kilobytes) of an IPsec SA. Default is 256kb. Range: 64 through
4294967294.
Advanced Configuration
Anti Replay IPsec protects against VPN attack by using a sequence of numbers built into the
IPsec packet—the system does not accept a packet with the same sequence number.
This option is enabled by default. The Anti-Replay checks the sequence numbers and
enforce the check, rather than just ignoring the sequence numbers.
Disable Anti-Replay if there is an error with the IPsec mechanism that results in out-
of-order packets, which prevents proper functionality.
Install Interval Select the maximum number of seconds to allow for the installation of a rekeyed
outbound security association (SA) on the device. Select a value from 1 to 10.
Idle Time Select the idle time interval. The sessions and their corresponding translations time
out after a certain period of time if no traffic is received. Range is 60 to 999999
seconds.
698
Field Action
DF Bit Select how the device handles the Don't Fragment (DF) bit in the outer header:
• clear—Clear (disable) the DF bit from the outer header. This is the default.
Copy Outer DSCP This option enabled by default. This enables copying of Differentiated Services Code
Point (DSCP) (outer DSCP+ECN) from the outer IP header encrypted packet to the
inner IP header plain text message on the decryption path. Enabling this feature,
after IPsec decryption, clear text packets can follow the inner CoS (DSCP+ECN)
rules.
RELATED DOCUMENTATION
• Site-to-Site VPN
NOTE:
• When the IKE status is up and if you edit the IPsec VPN, the topology diagram is shown in
green.
• All local gateway protected networks will form traffic selectors with all remote gateway
protected networks and vice-versa.
1. Select an existing IPsec VPN configuration that you want to edit on the IPsec VPN page.
2. Click the pencil icon available on the upper right-side of the page.
The edit page for the selected IPsec VPN page appears with editable fields. You can modify any
previous changes done to Site-to-Site VPN, Remote Access VPN (Juniper Secure Connect), and
Remote Access VPN (NCP Exclusive Client).
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
NOTE:
• During edit, Auto-create Firewall Policy and Gateway behind NAT options are not supported.
Gateway behind NAT is supported only for remote access VPN.
• The Source NAT Traffic option is only supported when creating remote access VPN. During
edit, this option is not supported.
• For Site-to-Site VPN, when the routing mode is Traffic Selector, the traffic selector creates the
complete mesh between the local and remote addresses.
RELATED DOCUMENTATION
1. Select existing an IPsec VPN configuration(s) that you want to delete on the IPsec VPN page.
2. Click the delete icon available on the upper-right corner of the page.
The Confirm Delete window appears.
NOTE:
• For Site-to-Site VPN, only the associated IPsec VPN routing configuration such as static
route or OSPF is deleted.
• Remote Access VPN default profile will be deleted only if the deleting VPN is configured
as default profile. You need to configure the default profile under VPN > IPsec VPN >
Global Settings > Remote Access VPN.
RELATED DOCUMENTATION
CHAPTER 60
IN THIS CHAPTER
IN THIS SECTION
You are here: Network > VPN > Manual Key VPN.
• Add a manual key VPN. See "Add a Manual Key VPN" on page 702.
• Edit a manual key VPN. See "Edit a Manual Key VPN" on page 705.
• Delete a manual key VPN. See "Delete a Manual Key VPN" on page 706.
702
Field Descriptions
Table 206 on page 702 describes the fields on the Manual Key VPN page.
Field Description
Bind Interface Displays the tunnel interface to which the route-based VPN is bound.
RELATED DOCUMENTATION
You are here: Network > VPN > Manual Key VPN.
1. Click + available on the upper-right corner of the Manual Key VPN page.
The Add Manual Key VPN page appears.
2. Complete the configuration according to the guidelines provided in Table 207 on page 703.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
703
Field Action
VPN Name Enter the VPN name for the IPsec tunnel.
Protocol Select an option from the list to specify the types of protocols available for
configuration:
• ESP
• AH
Bind to tunnel interface Select an interface from the list to which the route-based VPN is bound.
Do not fragment bit Select an option from the list to specify how the device handles the DF bit in the outer
header.
• clear—Clear (disable) the DF bit from the outer header. This is the default.
Table 207: Fields on the Manual Key VPN Configuration Page (Continued)
Field Action
Optimized Select the check box to enable optimization for the device to use traffic patterns as
evidence of peer liveliness. If enabled, ICMP requests are suppressed. This feature is
disabled by default.
Source Interface Enter a source interface for ICMP requests (VPN monitoring “hellos”). If no source
interface is specified, the device automatically uses the local tunnel endpoint interface.
Key Values
Authentication
Algorithm Specifies the hash algorithm that authenticates packet data. Select a hash algorithm
from the list:
• hmac-sha-256-128
ASCII Text Select the ASCII Text option, and enter the key in the appropriate format.
Hexadecimal Select the Hexadecimal option, and enter the key in the appropriate format.
Encryption
Encryption Specifies the supported Internet Key Exchange (IKE) proposals. Select an option from
the list:
Table 207: Fields on the Manual Key VPN Configuration Page (Continued)
Field Action
ASCII Text Enable this option and enter the key in the appropriate format.
Hexadecimal Enable this option and enter the key in the appropriate format.
RELATED DOCUMENTATION
You are here: Network > VPN > Manual Key VPN.
1. Select the existing manual key VPN that you want to edit on the Manual Key VPN page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit a Manual Key VPN page appears with editable fields. For more information on the options,
see "Add a Manual Key VPN" on page 702.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Network > VPN > Manual Key VPN.
1. Select a manual key VPN that you want to delete on the Manual Key VPN page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 61
Dynamic VPN
IN THIS CHAPTER
IN THIS SECTION
You can view and add, edit, or delete dynamic VPN global configuration options.
NOTE: This menu is available only for SRX300 line of devices and SRX550M devices.
• Launch VPN wizard. To do this, click Launch Wizard available on the upper right corner of the
Dynamic VPN table. Follow the guided steps to configure the VPN wizard.
Field Descriptions
Table 208 on page 708 describes the fields on the Dynamic VPN page.
Field Description
Access Profile Select a previously created access profile from the list displayed in Global Settings.
Specify the access profile to use for Extended Authentication for remote users trying to
download the Access Manager.
NOTE: This Access Profile option does not control authentication for VPN sessions. For
more information, see Add a Gateway and Add a VPN.
Client VPNs Create a client configuration for the dynamic VPN feature.
User Enter an username. Specifies the list of users who can use this client configuration.
IPsec VPN Select a previously configured IKE AutoKey configuration from the list.
709
Field Description
Remote Protected Enter an IP address and netmask of a resource behind the firewall. Traffic to the specified
Resources resource will go through the VPN tunnel and therefore will be protected by the firewall’s
security policies.
RELATED DOCUMENTATION
Global Settings
1. Click Global Settings available on the upper-right corner of the Resource Profiles page.
The DVPN - Global Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 209 on page 709.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
Access Profile Select an access profile from the list to use for Extended Authentication for remote
users trying to download the Access Manager.
Field Action
Network Address Enter the network prefix for the address pool for IPv4 or IPv6 addresses.
Address Ranges
Lower Limit Enter the lower boundary for the IPv4 or IPv6 address range.
High Limit Enter the upper boundary for the IPv4 or IPv6 address range.
XAUTH Attributes
RELATED DOCUMENTATION
IPsec Template
1. Click IPsec Template available on the upper-right corner of the Dynamic VPN page.
The DVPN IPsec Template page appears.
2. Complete the configuration according to the guidelines provided in Table 210 on page 711.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
RELATED DOCUMENTATION
Field Action
Access Users
Local Users in Profile Specifies the list of users who can use this client
configuration.
Users in DVPN Specifies the list of users copied from the local users in
profile or the newly added users.
Field Action
Remote Protected Resources Enter an IP address and net mask and click +. Specifies
the IP address and net mask of a resource behind the
firewall. Traffic to the specified resource will go
through the VPN tunnel and therefore will be
protected by the firewall’s security policies.
Remote Exceptions Enter an IP address and net mask and click +. Specifies
the IP address and net mask of exceptions to the
remote protected resources list.
RELATED DOCUMENTATION
1. Select the existing a dynamic VPN settings policy that you want to edit on the Dynamic VPN page.
2. Click the pencil icon available on the upper-right corner of the page.
714
The Edit DVPN page appears with editable fields. For more information on the options, see "Add a
Dynamic VPN" on page 712.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select a dynamic VPN policy that you want to delete on the Dynamic VPN page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 62
Compliance
IN THIS CHAPTER
NOTE: Starting in Junos OS Release 23.2R1, J-Web supports new Compliance sub-menu under
Network menu. This sub-menu is not supported for SRX300 line of Firewalls and SRX550HM
Firewall.
Create compliance rules for users in the SRX Series Firewall to validate application version, OS version,
hostname, domain, workgroup, and action. When a user initiates a connection, the SRX Series Firewall
validates the request using the compliance rules. Once validated, the Juniper Secure Connect application
connects to the SRX Series Firewall through a VPN tunnel to gain access to the networks protected
resources.
• Click More available on the upper-right corner of the Compliance page or right-click on the
compliance rule to do the following:
• View the details of a pre-logon compliance rule. To do this, select an existing rule and follow the
available options:
• Show or hide columns in the Compliance table. To do this, use the Show Hide Columns icon in the
upper-right corner of the page and select the options you want to show or deselect to hide options
on the page.
• Advanced search for compliance rule. To do this, use the search text box present above the table grid.
The search includes the logical operators as part of the filter string. An example filter condition is
displayed in the search text box when you hover over the Search icon. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace to delete a character of the search string.
Table 212 on page 716 provides the details of the fields on the Compliance page.
Field Description
Field Description
NOTE: Starting in Junos OS Release 23.2R1, J-Web supports new Compliance sub-menu under
Network menu. This sub-menu is not supported for SRX300 line of Firewalls and SRX550HM
Firewall.
a. Click More available above the table grid or right-click on the compliance rule term to do the
following:
b. Create pre-logon compliance rule terms. See Table 213 on page 718 for more information.
e. Show or hide columns in the Terms table. To do this, use the Show Hide Columns present above
the table grid and select the options you want to show or deselect to hide options on the page.
4. Click OK to save the changes. If you want to discard your changes, click Cancel.
If you click OK, a new pre-logon compliance with the provided configuration is created.
Fields Description
Fields Description
a. Click +.
a. Click +.
Fields Description
a. Click +.
a. Click +.
Fields Description
a. Click +.
a. Click +.
Fields Description
RELATED DOCUMENTATION
NOTE: Starting in Junos OS Release 23.2R1, J-Web supports new Compliance sub-menu under
Network menu. This sub-menu is not supported for SRX300 line of Firewalls and SRX550HM
Firewall.
1. Select the pre-logon compliance that you want to edit on the Compliance page.
2. Click the edit icon available on the upper-right corner of the Compliance page.
The Edit Pre-Logon Compliance page appears.
3. Select the term that you want to edit.
The Edit Term page appears with editable fields. For more information on the options, see Table 213
on page 718.
4. Click the tick icon to accept the changes. If you want to discard, click X.
RELATED DOCUMENTATION
NOTE: Starting in Junos OS Release 23.2R1, J-Web supports new Compliance sub-menu under
Network menu. This sub-menu is not supported for SRX300 line of Firewalls and SRX550HM
Firewall.
1. Select the pre-logon compliance that you want to delete on the Compliance page.
2. Click the delete icon available on the upper-right corner of the Compliance page.
"Create Pre-Logon Compliance" on page 717
A confirmation window appears.
3. Click Yes to delete.
RELATED DOCUMENTATION
Zones/Screens | 785
Services | 816
Schedules | 842
CHAPTER 63
Security Policies
IN THIS CHAPTER
Configure Captive Portal for Web Authentication and Firewall User Authentication | 753
IN THIS SECTION
You are here: Security Policies & Objects > Security Policies.
Use this page to get a high-level view of your firewall policy rules settings. The security policy applies
the security rules to the transit traffic within a context (from-zone to to-zone). The traffic is classified by
matching its source and destination zones, the source and destination addresses, and the application
that the traffic carries in its protocol headers with the policy database in the data plane.
Using a global policy, you can regulate traffic with addresses and applications, regardless of their security
zones, by referencing user-defined addresses or the predefined address “any.” These addresses can span
multiple security zones.
727
• Drag and drop the rules within a zone context. To do this, select the rule you want to place in a
different sequence number within a zone context, drag and drop it using the cursor.
NOTE: If you drag and drop a rule outside the zone context, J-Web will display a warning
message that you cannot move the rule into another zone context.
• Advanced search for policy rule. To do this, use the search text box present above the table grid. The
search includes the logical operators as part of the filter string. An example filter condition is
displayed in the search text box when you hover over the Search icon. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace to delete a character of the search string.
1. Logical operators:
When you search for the matching characters of Junos, such as, jun, un, nos, and os, the result
displays all the matched objects but without junos prefix. For example, if the configured dynamic
application is junos:01NET, the search for dynamic applications with jun characters display only
01NET.
When you add or edit a rule, click Save to save the configuration. To search for this saved
configuration, you must wait for the device to synchronize the configuration.
• Show or hide columns in the policy rule table. To do this, click Show Hide Columns icon in the upper-
right corner of the policy rule table and select the columns you want to display or deselect the
columns you want to hide on the page.
Field Description
Alternatively, you can right-click on the selected rule and select Create Rule Before.
NOTE:
• When you create a new rule, it inherits the name, source zone, and destination zone same
as parent (selected) rule. Source address and destination address will be any and the action
will be Deny.
• For global policy, source zone and destination zone will not be available.
Alternatively, you can right-click on the selected rule and select Create Rule After.
NOTE:
• When you create a new rule, it inherits the name, source zone, and destination zone same
as parent (selected) rule. Source address and destination address will be any and the action
will be Deny.
• For global policy, source zone and destination zone will not be available.
Clone Clones or copies the selected firewall policy configuration and enables you to update the details of
the rule.
Clear All Clears the selection of those rules that are selected.
730
Field Descriptions
Table 215 on page 730 describes the fields on the Security Policies page.
• For logical systems and tenants, the URL Categories option will not be displayed.
Field Description
You can hover over the name column to view the rule name and its description.
Source Zone Displays the source zone that is specified in the zone pair for the rule.
Source Address Displays the name of the source address or address set for the rule.
Destination Zone Displays the destination zone that is specified in the zone pair for the rule.
Destination Address Displays the name of the destination address or address set for the rule.
Dynamic Application Displays the dynamic application names for match criteria in application firewall rule set.
Field Description
Services Displays the type of service for the destination of the rule.
URL Category Displays the URL category that you want to match criteria for web filtering category.
Action Displays the actions that need to take place on the traffic as it passes through the firewall.
Advanced Security Displays the security option that apply for this rule.
Rule Options Displays the rule option while permitting the traffic.
Schedule Displays the scheduler details that allow a policy to be activated for a specified duration.
You can define schedulers for a single (nonrecurrent) or recurrent time slot within which a
policy is active.
RELATED DOCUMENTATION
Global Options
You are here: Security Policies & Objects > Security Policies.
1. Click Global Options available on the upper-right corner of the Security Policies page.
The Global Options page appears.
2. Complete the configuration according to the guidelines provided in Table 216 on page 732.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Table 216 on page 732 describes the fields on the Global Options page.
732
Field Action
Session Timeout
ICMP Enter the timeout value for ICMP sessions ranging from 4 through 86400 seconds.
ICMP6 Enter the timeout value for ICMP6 sessions ranging from 4 through 86400 seconds.
OSPF Enter the timeout value for OSPF sessions ranging from 4 through 86400 seconds.
TCP Enter the timeout value for TCP sessions ranging from 4 through 86400 seconds.
UDP Enter the timeout value for UDP sessions ranging from 4 through 86400 seconds.
Others Enter the timeout value for other sessions ranging from 4 through 86400 seconds.
Logging
Session Initiate Enable this option to start logging at the beginning of a session.
Session Close Enable this option to start logging at the closure of a session.
NOTE: Configuring session-close logging ensures that the SRX Series Firewall
generates the security logs if a flow is unable to leave the pre-id-default-policy.
Flow
Field Action
Early Ageout Enter a value from 1 through 65,535 seconds. The default value is 20 seconds.
Specifies the amount of time before the device aggressively ages out a session from its
session table.
Low watermark Enter a value from 0 through 100 percent. The default value is 100 percent.
Specifies the percentage of session table capacity at which the aggressive aging-out
process ends.
High watermark Enter a value from 0 through 100 percent. The default value is 100 percent.
Specifies the percentage of session table capacity at which the aggressive aging-out
process begins.
SYN Flood Protection Enable this option to defend against SYN attacks.
TCP MSS
All TCP Packets Enter a maximum segment size value from 64 through 65,535 to override all TCP
packets for network traffic.
Packets entering IPsec Enter a maximum segment size value from 64 through 65,535 bytes to override all
Tunnel packets entering an IPsec tunnel. The default value is 1320 bytes.
GRE Packets entering Enter a maximum segment size value from 64 through 65,535 bytes to override all
IPsec Tunnel generic routing encapsulation packets entering an IPsec tunnel. The default value is
1320 bytes.
734
Field Action
GRE Packets exiting Enter a maximum segment size value from 64 through 65,535 bytes to override all
IPsec Tunnel generic routing encapsulation packets exiting an IPsec tunnel. The default value is
1320 bytes.
TCP Session
Sequence number By default, this option is enabled to check sequence numbers in TCP segments during
check stateful inspections. The device monitors the sequence numbers in TCP segments.
SYN flag check By default, this option is enabled to check the TCP SYN bit before creating a session.
The device checks that the SYN bit is set in the first packet of a session. If it is not set,
the device drops the packet.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Security Policies.
NOTE: To reference the Content Security policies and the AppQoS profiles in a security policy
rules, create Content Security polices and AppQoS profiles before creating or editing security
policy rules if required. To create Content Security policies, go to Security Services > Content
Security > Content Security Policies and to create AppQoS profiles, go to Network > Application
QoS.
3. Click the tick icon on the upper right of the row once done with the configuration.
NOTE: Scroll back the horizontal bar if the inline tick and the cancel icons are not available
when creating a new rule.
4. Click Save to save the changes or click Discard to discard the changes.
NOTE: You must perform Step 3 and Step 4 before performing any further actions in the J-
Web UI.
Field Action
Global Policy Enable this option to specify that the policy defined is a global policy and zones are not
required.
736
Field Action
1. Click +.
• Zone—Select the source zone from the list to which you want the rule to be
associated.
NOTE:
• You can select the IP feeds to define the matching criteria for a policy. Also,
you can view source type (Address, Address group, Wild card, Range, IP
feeds) in the new Type column.
• Feeds are only displayed if you have enrolled to Juniper ATP Cloud. You can
also download the feeds using the command, request services security-
intelligence download.
To select a specific address or IP feed, select the addresses or IP feeds from the
Available column and then click the right arrow to move it to the Selected
column. You can select Exclude Selected to exclude only the selected address
from the list.
To create a new address, click +. The Create Address page appears. For more
information on fields, see Table 218 on page 746.
• Source identity—Select the user identity from the Available column and then click
the right arrow to move it to the Selected column.
• Source identity feed—You can select user identity threat feed to define the
matching criteria for a policy.
Select the user identity threat feed from the Available column and then click the
right arrow to move it to the Selected column.
737
Field Action
Maximum user identity threat feed count is 1024. That is, sum of source identity
feed and destination identity feed per policy.
NOTE: Feeds are only displayed if you have enrolled to Juniper ATP Cloud. You
can also download the feeds using the command, request services security-
intelligence download.
738
Field Action
1. Click +.
• Zone—Select the destination zone from the list to which you want the rule to be
associated.
NOTE:
• You can select the IP feeds to define the matching criteria for a policy. Also,
you can view source type (Address, Address group, Wild card, Range, IP
feeds) in the new Type column.
• Feeds are only displayed if you have enrolled to Juniper ATP Cloud. You can
also download the feeds using the command, request services security-
intelligence download.
To select a specific address or IP feed, select the addresses or IP feeds from the
Available column and then click the right arrow to move it to the Selected
column. You can select Exclude Selected to exclude only the selected address
from the list.
To create a new address, click +. For more information on fields, see Table 218 on
page 746.
To select a specific application, select the application from the Available column
and then click the right arrow to move it to the Selected column.
NOTE: The select all check box is only available when you search for specific
dynamic applications.
739
Field Action
NOTE: For logical systems, you cannot create a dynamic application inline.
To select a specific service, select the service from the Available column and then
click the right arrow to move it to the Selected column.
To create a new service, click +. The Create Service page appears. For more
information on fields, see Table 219 on page 747.
• URL category—Select any, Specific, or None to match criteria for a web filtering
category.
To select a specific URL category, select the URL category from the Available
column and then click the right arrow to move it to the Selected column.
NOTE: This option is not available for logical systems and tenants.
• Destination identity feed—You can select user identity threat feed to define the
matching criteria for a policy.
Select the user identity threat feed from the Available column and then click the
right arrow to move it to the Selected column.
Maximum user identity threat feed count is 1024. That is, sum of source identity
feed and destination identity feed per policy.
NOTE: Feeds are only displayed if you have enrolled to Juniper ATP Cloud. You
can also download the feeds using the command, request services security-
intelligence download.
• Deny—Block and drop the packet, but do not send notification back to the source.
• Reject—Block and drop the packet and send a notice to the source host.
740
Field Action
Advanced Services
Click +. The Select Advanced Services page appears.
NOTE:
• You can configure only the SSL Proxy and Redirect Profile options.
• You can configure only the SSL Proxy option if the dynamic application is None.
• Advanced Security option is not supported for logical systems and tenants.
• For logical systems, only IPS, IPS policy, Content Security, threat prevention policy, ICAP redirect profile,
and AppQOS options are supported.
• For tenant systems, only threat prevention policy and AppQOS are supported.
SSL proxy Select the SSL proxy policy to associate with this rule from the list.
Content Security Select the Content Security policy you want to associate with this rule from the list. The
list displays all the Content Security policies available.
If you want to create a new Content Security policy, click Add New. The Create a
Content Security Policy page appears. For more information on creating a new Content
Security policy, see "Create a Content Security Policy" on page 948.
Threat prevention Select the configured threat prevention policy from the list.
policy
ICAP redirect profile Select the configured ICAP redirect profile name from the list.
741
Field Action
AAMW Select an anti-malware profile from the list that you want to associate with the security
policy.
NOTE: Starting in Junos OS 22.2R1 Release, you can associate an anti-malware profile
with the security polices.
SecIntel profile group Select a SecIntel profile group from the list that you want to associate with the security
policy.
NOTE: Starting in Junos OS 22.2R1 Release, you can associate a SecIntel profile group
with the security polices.
IPsec VPN Select the IPsec VPN tunnel from the list.
NOTE: If you select Dynamic applications in the destination, IPsec VPN option is not
supported.
Pair policy name Enter the name of the policy with the same IPsec VPN in the opposite direction to
create a pair policy.
NOTE: If you select Dynamic applications in the destination, Pair Policy Name option is
not supported.
Application QoS Select the configured AppQoS profile from the list.
profile
If you want to create a new AppQoS profile, click Add New. The Add AppQoS Profile
page appears. For more information on creating a new AppQoS profile, see "Add an
Application QoS Profile" on page 633.
742
Field Action
Threat profiling Starting in Juons OS Release 21.4R1, you can enable this option to generate threat
profiling feeds.
NOTE: Feeds are only displayed if you have enrolled to Juniper ATP Cloud. You can also
download the feeds using the command, request services security-intelligence
download.
You can add source and destination addresses, and source and destination identities to
the threat feeds. After the feeds are generated, you can configure other security policies
to use the feeds to match designated traffic and perform policy actions.
• Add source IP to feed—Select the threat feed from the list to add it to the source IP
address.
• Add source identity to feed—Select the threat feed from the list to add it to the
source user identity.
• Add destination IP to feed—Select the threat feed from the list to add it to the
destination IP address.
• Add destination identity to feed—Select the threat feed from the list to add it to the
destination user identity.
Packet capture Enable to capture unknown application traffic specific to a security policy rule.
By default, this option is disabled. Once enabled, you can view the packet capture
(PCAP) file details or download the PCAP file on the Monitor > Log > Sessions page.
Rule Options
Click on Rule Options. The SELECT RULE OPTIONS page appears.
Logging
Session initiate Enable this option to log an event when a session is created.
Session close Enable this option to log an event when the session closes.
743
Field Action
Count Enable this option to collect statistics of the number of packets, bytes, and sessions that
pass through the firewall with this policy.
NOTE: Alarm threshold fields are disabled if Enable Count is not enabled.
Authentication
NOTE:
• If you select Dynamic applications in the destination, Authentication option is not supported.
• This option is not supported for logical systems and tenant systems.
Push auth entry to Enable this option to push authentication entries from firewall authentication, that are
JIMS in auth-success state, to Juniper Identity Management Server (JIMS). This will enable
the SRX Series Firewall to query JIMS to get IP/user mapping and device information.
This is not a mandatory option. You can select it when at least one domain is configured
on local Active Directory or configure identity management.
Type Select the firewall authentication type from the list. The options available are: None,
Pass-through, User-firewall, and Web-authentication.
NOTE: This option is not supported if you select the authentication type as Web-
authentication.
Client name Enter the client username or client user group name.
NOTE: This option is not supported if you select the authentication type as User-
firewall.
Domain Select a domain name that must be in a client name from the list.
NOTE: This option is supported only if you select the authentication type as User-
firewall.
744
Field Action
Web redirect (http) Enable this option to redirect HTTP requests to the device’s internal webserver by
sending a redirect HTTP response to the client system to reconnect to the webserver
for user authentication.
NOTE: This option is not supported if you select the authentication type as Web-
authentication.
Captive portal Enable this option to redirect a client HTTP or HTTPS request to the internal HTTPS
webserver of the device. The HTTPS client requests are redirected when SSL
termination profile is configured.
NOTE: This option is not supported if you select the authentication type as Web-
authentication.
Interface Select an interface for the webserver where the client HTTP or HTTPS request is
redirected.
NOTE: You cannot edit this once the policy is created. To edit the interface, go to
Network > Connectivity > Interfaces.
IPv4 address Enter IPv4 address of the webserver where the client HTTP or HTTPS request is
redirected.
NOTE: You cannot edit this once the policy is created. To edit the interface, go to
Network > Connectivity > Interfaces.
745
Field Action
SSL termination Select an SSL termination profile from the list which contains the SSL terminated
profile connection settings. SSL termination is a process where the SRX Series Firewall acts as
an SSL proxy server, terminates the SSL session from the client.
1. Click Add.
Auth only browser Enable this option to drop non-browser HTTP traffic to allow for captive portal to be
presented to unauthenticated users who request access using a browser.
NOTE: This option is not supported if you select the authentication type as Web-
authentication.
User agents Enter a user-agent value which is used to verify that the user’s browser traffic is HTTP/
HTTPS traffic.
NOTE: This option is not supported if you select the authentication type as Web-
authentication.
Advanced Settings
Destination address Select the action to be taken on a destination address translation from the list. The
translation options available are: None, Drop Translated, and Drop Untranslated.
746
Field Action
Redirect options Select a redirect action from the list. The options available are: None, Redirect Wx, and
Reverse Redirect Wx.
Sequence number Enable or disable checking of sequence numbers in TCP segments during stateful
check inspections at policy rule level. By default, the check happens at the global level. To
avoid commit failure, turn off Sequence number check under Global Options > Flow >
TCP Session.
SYN flag check Enable or disable the checking of the TCP SYN bit before creating a session at policy
rule level. By default, the check happens at the global level. To avoid commit failure, turn
off SYN flag check under Global Options > Flow > TCP Session.
Schedule
Schedule Click Schedule and select one of the configured schedules from the list.
To add a new schedule, click Add New Schedule. The Add New Schedule page appears.
For more information on creating a new schedule, see Table 220 on page 749.
Field Action
Name Enter a name for the address. The name must be a unique string that must begin with an
alphanumeric character and can include colons, periods, dashes, and underscores; no spaces
allowed; 63-character maximum.
IPv4
Field Action
IPv6
Field Action
Global Settings
Application protocol Select an option from the list for application protocol.
Source port Select an option from the list for source port.
Destination port Select an option from the list for destination port.
ICMP type Select an option from the list for ICMP message type.
ICMP code Select an option from the list for ICMP message code.
748
Field Action
The format of the value must be W or X-Y. Where, W, X, and Y are integers between 0
and 65535.
Inactivity timeout Select an option from the list for application specific inactivity timeout.
Terms
Click +. The Create Term page appears.
Source port Select an option from the list for source port.
Destination port Select an option from the list for destination port.
ICMP type Select an option from the list for ICMP message type.
ICMP code Select an option from the list for ICMP message code.
749
Field Action
NOTE: The format of the value must be W or X-Y. Where, W, X, and Y are integers
between 0 and 65535.
Inactivity timeout Select an option from the list for application specific inactivity timeout.
Field Action
• Never
• Daily
• Weekly
All Day Enable this option to schedule an event for an entire day.
This option is available only for Never and Daily repeat type schedule.
Start date Select the schedule start date in the YYYY-MM-DD format.
Field Action
Stop date Select the schedule stop date in the YYYY-MM-DD format.
Start time Enter the start time for the schedule in HH:MM:SS 24 hours format.
Stop time Enter the end time for the schedule in HH:MM:SS 24 hours format.
Repeat on Select the days and time on which you want to repeat the schedule.
• All day—Enable this option for the event to run for the entire day.
Field Action
• Schedule Never Stops—Schedule can be active forever (recurrent), but only as specified by
the daily or weekly schedule.
• Schedule Specify Window—Schedule can be active during a single time slot, as specified
by a start date and a stop date.
This option is available only for Daily and Weekly repeat type schedule.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Security Policies.
To clone a rule:
1. Select a rule that you want to clone on the Security Policies page.
2. Click More > Clone available on the upper right-side of the page.
The Security Policies page appears with inline editable fields. For more information on editing the
fields, see "Add a Rule to a Security Policy" on page 734.
3. Click OK to save the changes or click Cancel to discard the changes.
A cloned rule is created for the selected rule. By default, the name of the cloned rule is in the format:
<rule name>_clone.
752
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Security Policies.
To edit a rule:
1. Select an existing rule configuration that you want to edit on the Security Policies page.
2. Click the pencil icon available on the upper right-side of the page.
The Security Policies page appears with inline editable fields. For more information on editing the
fields, see "Add a Rule to a Security Policy" on page 734.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Security Policies.
To delete a rule:
1. Select one or more rules that you want to delete on the Security Policies page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete the rules or click No to retain the rules.
RELATED DOCUMENTATION
Overview
What Is Captive Portal?
Captive portal is a method of authenticating devices that need to connect to a network. On an SRX
Series Firewalls, you can enable captive portal to redirect Web browser requests to a login page that
prompts you to enter your username and password. After successful authentication, you can proceed
with the original page request and subsequent network access.
With a Web authentication method, you point a browser to an IP address on a device that is enabled for
Web authentication. This action initiates an HTTPS session on the IP address that hosts the Web
authentication feature on the device. The device then prompts you to enter your username and
password, and the result is cached on the device. When the traffic later encounters a Web
authentication policy, your access is allowed or denied based on the previous Web authentication
results.
You can use other authentication methods as well, but we will not cover those methods in this
document. However, we describe each of those methods in brief:
754
• Pass-through with web-redirect—When using this authentication method for HTTPS client requests,
you can use the web-redirect feature to direct your requests to the device's internal webserver. The
webserver sends a redirect HTTPS response to the client system, directing it to reconnect to the
webserver for user authentication. The interface that the client’s request arrives at is the interface on
which the redirect response is sent.
A firewall user is a network user who must provide a username and password for authentication when
initiating a connection across the firewall. Junos OS enables administrators to restrict or to permit
firewall users’ access to protected resources (in different zones) behind a firewall based on their source
IP address and other credentials. After defining the firewall users, you can create a policy that requires
the users to authenticate using one of the three authentication methods (Web, pass-through, or pass-
through with web-redirect).
Workflow
IN THIS SECTION
Scope | 754
Scope
In this sample topology, you’ll use J-Web on the SRX Series Firewall to do the following tasks:
NOTE: The values used to configure the sample topology are only examples.
Step Action
1 Create a logical interface on ge-0/0/3, assign it the IP address 203.0.113.35, and enable Web
authentication.
NOTE: In this example, the firewall user system IP address is 203.0.113.12, which is in the same subnet as
203.0.113.0/24.
4 Create an untrust (UT_ZONE) and a trust (T_ZONE) zones and assign the ge-0/0/3 and ge-0/0/2
interfaces, respectively.
5 Configure captive portal for Web authentication and firewall user authentication in the security policy
rules (FWAUTH-RULE).
756
(Continued)
Step Action
• For firewall user authentication, you’ll successfully authenticate using https://203.0.113.35 and then
get redirected to https://192.0.2.1 for accessing the HTTPS server.
• The values used to configure the sample topology are only examples. You can change any details
necessary to match your network configuration.
• Ensure that the SRX Series Firewall you use in this example runs Junos OS Release 21.4R1 or later.
• Ensure that your device has the required certificates installed to allow authentication. In this
example, we'll use cert1, a self-signed certificate.
NOTE: You’ll use the same IP address for enabling captive portal.
You are here (in the J-Web UI): Network > Connectivity > Interfaces
To create a logical interface for an untrust zone and to enable Web authentication:
757
1. Select ge-0/0/3 and then select Create > Logical Interface on the upper-right corner of the Interfaces
page.
The Add Logical Interface for ge-0/0/3.0 page appears.
Field Action
IPv4 Address / DHCP Select the check box to enable the IPv4 Address/
DHCP configuration.
758
(Continued)
Field Action
IPv4 Address Select IPv4 Address. Then, click + and enter the
following details:
• Web Auth:
a. Click Configure.
1. Select ge-0/0/2 and then select Create > Logical Interface on the upper-right corner of the Interfaces
page.
Field Action
IPv4 Address / DHCP Select the check box to enable the IPv4 Address/
DHCP configuration.
b. Click +.
f. ARP—Leave as is.
761
Good job! You’ve created a logical interface on ge-0/0/2 with IP address 192.0.2.1 for the HTTPS
server.
4. Click Commit (at the right-side of the top banner) and select Commit configuration to commit the
changes now.
You can also choose to commit all configuration changes at once, at the end of "Step 5: Enable Web
or Firewall User Authentication for Captive Portal in the Security Policy" on page 769.
762
You are here (in the J-Web UI): Security Services > Firewall Authentication > Access Profile
1. Click the add icon (+) on the upper-right corner of the Access Profile page.
The Create Access Profile page appears.
2. Specify the following details:
Field Action
You can select an address pool from the list. You can also add a new address pool by
clicking Create Address Pool and providing the required values.
Authentication
b. Click + and enter the following details on the Create Local Authentication User
page:
Authentication Order
(Continued)
Field Action
You can also choose to commit all configuration changes at once, at the end of "Step 5: Enable Web
or Firewall User Authentication for Captive Portal in the Security Policy" on page 769.
You are here (in the J-Web UI): Security Services > Firewall Authentication > Authentication Settings
• Default Profile—Select FWAUTH from the list. The security policies use this profile to
authenticate users.
• Success—Type Authentication Success as the message to be displayed for users who log in
successfully.
3. (Optional) To upload a customized logo:
NOTE: For a good logo, the image must be in the .gif format and the resolution must be
172x65.
The uploaded image will now appear on the captive portal login page or the Web authentication
login page.
4. Click Save on the upper-right corner of the Authentication Settings page to save the changes.
Congratulations! You've successfully saved your Web authentication settings.
5. Click Commit (at the right-side of the top banner) and select Commit configuration to commit the
changes now.
765
You can also choose to commit all configuration changes at once, at the end of "Step 5: Enable Web
or Firewall User Authentication for Captive Portal in the Security Policy" on page 769.
You are here (in the J-Web UI): Security Policies & Objects > Zones/Screens
To create UT_ZONE (untrust zone) and T_ZONE (trust zone) and to assign the defined interfaces to the
zones:
1. Click the add icon (+) on the upper-right corner of the Zone List page.
The Add Zone page appears.
2. Specify the following details:
Field Action
Main
(Continued)
Field Action
Interfaces • For UT_ZONE, select ge-0/0/3.0 from the Available column and click the right
arrow to move it to the Selected column.
• For T_ZONE, select ge-0/0/2.0 from the Available column and click the right
arrow to move it to the Selected column.
767
Available Services Select all from the Available Services column and click the right arrow to move
it to the Selected column.
768
(Continued)
Available Protocols Select all from the Available Protocols column and click the right arrow to move
it to the Selected column.
769
You can also choose to commit all configuration changes at once, at the end of "Step 5: Enable Web
or Firewall User Authentication for Captive Portal in the Security Policy" on page 769.
Step 5: Enable Web or Firewall User Authentication for Captive Portal in the Security
Policy
We’ll now enable captive portal in the security policy rules to redirect a client HTTPS request to the
internal HTTPS server of the device.
You are here (in the J-Web UI): Security Policies & Objects > Security Policies
1. Click the add icon (+) on the upper-right corner of the Security Policies page.
770
Field Action
Rule Name
Source Zone
(Continued)
Field Action
a. Zone—Select UT_ZONE from the list to which you want the rule to be
associated.
c. Source identity:
Destination Zone
(Continued)
Field Action
a. Zone—Select T_ZONE from the list to which you want the rule to be associated.
d. Services—Select Any.
Rule Options
(Continued)
Field Action
NOTE: Use this • Push auth entry to JIMS—By default, this option is disabled. Leave as is.
configuration for Web
authentication only. • Type—Select Web-authentication from the list.
(Continued)
Field Action
NOTE: Use this • Push auth entry to JIMS—By default, this option is disabled. Leave as is.
configuration for
firewall user • Type—Select User-firewall from the list.
authentication only.
• Access profile—Select FWAUTH from the list.
• Domain—Leave as is.
• SSL Termination Profile—Select SSL_termination (cert1) from the list for SSL
termination support service. Acting as an SSL proxy server, the SRX Series
Firewall uses the SSL termination process to terminate the client's SSL session.
(Continued)
Field Action
on the right-side of the row after you're done with the configuration.
NOTE: Slide the horizontal bar backward if the inline tick and cancel icons are not available
when creating a new rule.
776
4. Click Save on the upper-right corner of the Security Policies page to save changes.
5. Click Commit (at the right side of the top banner) and select Commit configuration.
The successful-commit message appears.
Congratulations! You've successfully committed your configuration changes. You are all set with the
Web or firewall user authentication policy.
IN THIS SECTION
Purpose | 776
Action | 777
Purpose
The final step! Let’s see whether your configuration works for a firewall user:
• For Web authentication, you’ll successfully authenticate using https://203.0.113.35. This is the same
IPv4 address that you configured in "Step 1: Create a Logical Interface and Enable Web
Authentication" on page 756.
• For firewall user authentication, you’ll successfully authenticate using https://203.0.113.35 and then
get redirected to https://192.0.2.1 for accessing the HTTPS server. These are the same IPv4
777
addresses that you configured in "Step 1: Create a Logical Interface and Enable Web Authentication"
on page 756.
Action
• Username—FWClient1
• Password—$ABC123
Congratulations! You are successfully authenticated. You can also see the success message
Authentication Success that you configured.
778
3. Click Close.
• Username—FWClient1
• Password—$ABC123
What's Next
To keep going, visit the J-Web for SRX Series Documentation page in the Juniper TechLibrary.
780
CHAPTER 64
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Policies & Objects > Metadata Streaming Policy.
Configure a security metadata streaming policy on SRX Series Firewalls to send a network traffic
metadata and connection patterns to Juniper ATP Cloud. Using DNS, a metadata streaming profile
protects and defends your network from advanced threats. You must assign the metadata streaming
profile to the metadata streaming policy. For more information on the metadata streaming profile, see
"About the Metadata Streaming Profile Page" on page 1024. After configuring the metadata streaming
policy, assign it to the security policy at zone-level.
Domain Name System (DNS) Domain Generation Algorithm (DGA) generates seemingly random domain
names that are used as rendezvous points with potential C&C servers. DNS DGA detection uses
machine learning models as well as known pre-computed DGA domain names to provides domain
verdicts, which helps in-line DNS query blocking and sinkholing on SRX Series Firewalls.
781
Encrypted Traffic Insights (ETI) detects malicious threats that are hidden in encrypted traffic without
intercepting and decrypting the traffic.
• Provide all SRX Series Firewalls with a SaaS-based, high-performance, and low-overhead solution.
• SRX can detect and act on Domain Name System (DNS) without any sensors.
• Create a metadata streaming policy. See "Create a Metadata Streaming Policy" on page 782.
• Edit a metadata streaming policy. See "Edit a Metadata Streaming Policy" on page 783.
• Delete a metadata streaming policy. See "Delete a Metadata Streaming Policy" on page 784.
• Show or hide columns in the Metadata Streaming Policy table. To do this, use the Show Hide
Columns icon in the upper-right corner of the page and select the options to show or deselect to
hide options on the page.
• Advanced search for metadata streaming policies. To do this, use the search text box present above
the table grid. The search includes the logical operators as part of the filter string. In the search text
box, when you hover over the icon, it displays an example filter condition. When you start entering
the search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator to perform the advanced search
operation.
NOTE: Press Spacebar to add an AND operator or an OR operator to the search string.
Press backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 221 on page 782 describes the fields on the Metadata Streaming Policy page.
Field Description
Source Zone Displays the name of the source zone associated with
the metadata streaming policy.
Metadata Streaming Profile Displays the name of the metadata streaming profile
associated with the metadata streaming policy.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Metadata Streaming Policy.
Create a metadata streaming policy to associate a metadata streaming profile with the zone-level.
1. Click + available on the upper-right corner of the Metadata Streaming Policy page.
The inline editable fields will appear.
2. Complete the configuration according to the guidelines provided in Table 222 on page 783.
3. Click the tick icon on the upper right of the row once done with the configuration.
783
Field Action
Source Zone Select a source zone from the list to associate it with
the metadata streaming policy.
Metadata Streaming Profile Select a metadata streaming profile from the list to
associate it with the zone-level.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Metadata Streaming Policy.
1. Select an existing policy configuration to edit on the Metadata Streaming Policy page.
2. Click the pencil icon available on the upper-right corner of the page.
The Metadata Streaming Policy page opens with inline editable fields. For more information on
editing the fields, see "Create a Metadata Streaming Policy" on page 782.
3. Click the tick icon on the upper right of the row to save the edited configuration.
784
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Metadata Streaming Policy.
RELATED DOCUMENTATION
CHAPTER 65
Zones/Screens
IN THIS CHAPTER
IN THIS SECTION
Field Descriptions
Field Description
Zone List
Screen List
Field Description
RELATED DOCUMENTATION
Add a Zone
To add a zone:
Field Action
Main
Application Select the check box to enable application tracking support for the zone.
Tracking
788
Field Action
Source Identity Select the check box to enable it to trigger user identity logging when that zone is used as
Log the source zone (from-zone) in a security policy.
Specifies that when the reset feature is enabled, the system sends a TCP segment with
the RESET flag set when traffic arrives. This does not match an existing session and does
not have the Synchronize flag set.
NOTE: If you have already configured screens, the list shows the screen names and
allows you to select or delete a screen.
Interfaces Select interfaces from the Available column and move it to the Selected column using the
arrow to include in the security zone.
Starting in Junos OS Release 19.4R1, J-Web supports Wi–Fi Mini-PIM for SRX320, SRX340,
SRX345, and SRX550M devices. The physical interface for the Wi-Fi Mini-PIM uses the
name wl-x/0/0, where x identifies the slot on the services gateway where the Mini-PIM is
installed.
Protocols Specifies the protocols that permit inbound traffic of the selected type to be transmitted to
hosts within the zone.
Select the protocols from the Available column and move it to the Selected column using
the right arrow.
NOTE: To deselect protocols, select the protocols in the Selected column and then use the
left arrow to move them to the Available column.
789
Field Action
Services Specifies the interface services that permit inbound traffic of the selected type to be
transmitted to hosts within the zone.
Select the services from the Available column and move it to the Selected column using the
right arrow.
NOTE: To deselect services, select the services in the Selected column and then use the left
arrow to move them to the Available column.
Interface Services Specifies the interfaced services that permit inbound traffic from the selected interface to
be transmitted to hosts within the zone.
Select the interface services from the Available column and move it to the Selected column
using the right arrow. Select all to permit all interface services.
NOTE: If you select multiple interfaces, the existing interface services and protocols are
cleared and are applied to the selected interfaces.
Interface Specifies the interfaced protocols that permit inbound traffic from the selected interface to
Protocols be transmitted to hosts within the zone.
Select the interface protocols from the Available column and move it to the Selected
column using the right arrow. Select all to permit all interface protocols.
RELATED DOCUMENTATION
Edit a Zone
To edit a zone:
1. Select an existing zone configuration that you want to edit on the Zones/Screens page.
2. Click the pencil icon available on the upper-right corner of the Zone List page.
The Edit Zone page appears with editable fields. For more information on the options, see "Add a
Zone" on page 787.
3. Click OK to save the changes.
RELATED DOCUMENTATION
Delete a Zone
To delete a zone:
RELATED DOCUMENTATION
Add a Screen
To add a screen:
791
Table 225 on page 791 describes the fields on the Add Screen page.
Field Action
Main
Specifies that you can enable IP address spoofing. IP spoofing is when a false source
address is inserted in the packet header to make the packet appear to come from a trusted
source.
Specifies the number of ICMP address sweeps. An IP address sweep can occur with the
intent of triggering responses from active hosts.
NOTE: If a remote host sends ICMP traffic to 10 addresses within this interval, an IP
address sweep attack is flagged and further ICMP packets from the remote host are
rejected.
Range: 1000 through 1000000 microseconds. The default value is 5000 microseconds.
792
Field Action
Specifies the number of TCP port scans. The purpose of this attack is to scan the available
services in the hopes that at least one port will respond, thus identifying a service to target.
NOTE: If a remote host scans 10 ports within this interval, a port scan attack is flagged and
further packets from the remote host are rejected.
Range: 1000 through 1000000 microseconds. The default value is 5000 microseconds.
MS-Windows WinNuke attack protection—Select the check box to enable this feature.
Defense
NOTE: WinNuke is a DoS attack targeting any computer on the Internet running Windows
operating system.
• Malformed IPv6—Select this check box to enable the IPv6 malformed header intrusion
detection service (IDS) option.
• Malformed ICMPv6—Select this check box to enable the ICMPv6 malformed IDS
option.
Denial of Service
Field Action
Large size ICMP Select the check box to enable this feature.
packet protection
NOTE: The range is from 1 through 250000 sessions. The default value is 512 sessions.
Anomalies
794
Field Action
• Bad option—Select the check box to specify the number of bad options counter.
• Security—Select the check box to enable the method for hosts to send security.
• Unknown protocol—Select the check box to enable the IP address with security option.
• Strict source route—Select the check box to enable the complete route list for a packet
to take on its journey from source to destination.
Specifies the number of IP addresses of the devices set at the source that an IP
transmission is allowed to take on its way to its destination.
• Timestamp—Select the check box to enable the time recorded (in UTC) when each
network device receives the packet during its trip from the point of origin to its
destination.
• Stream—Select the check box to enable a method for the 16-bit SATNET stream
identifier to be carried through networks that do not support streaming.
• Loose source route—Select the check box to enable a partial route list for a packet to
take on its journey from source to destination.
• Record route—Select the check box to enable that IP addresses of network devices
along the path that the IP packet travels can be recorded.
795
Field Action
• SYN Fragment Protection—Select the check box to enable the number of TCP SYN
fragments.
• SYN and FIN Flags Set Protection—Select the check box to enable the number of TCP
SYN and FIN flags.
NOTE: When you enable this option, Junos OS checks if the SYN and FIN flags are set
in TCP headers. If it discovers such a header, it drops the packet.
• FIN Flag Without ACK Flag Set Protection—Select the check box to enable the number
of TCP FIN flags set without an ACK flag set.
• TCP Packet Without Flag Set Protection—Select the check box to enable the number of
TCP headers without flags set.
NOTE: A normal TCP segment header has at least one flag control set.
Flood Defense
Limit sessions from Enter the range within which the sessions are limited from the same source IP.
the same source
Range: 1 through 50000 sessions.
Limit sessions from Enter the range within which the sessions are limited from the same destination IP. The
the same range is from 1 through 50000 sessions.
destination
Range: 1 through 8000000 sessions per second. The default value is 128 sessions.
ICMP flood Select the check box to enable the Internet Control Message Protocol (ICMP) flood
protection counter.
NOTE: An ICMP flood typically occurs when ICMP echo requests use all resources in
responding, such that valid network traffic can no longer be processed.
Field Action
UDP flood Select the check box to enable the User Datagram Protocol (UDP) flood counter.
protection
NOTE: UDP flooding occurs when an attacker sends IP packets containing UDP datagrams
to slow system resources, such that valid connections can no longer be handled.
NOTE: Range: 1 through 100000 session. The default value is 1000 sessions.
797
Field Action
NOTE: You can select the IP address and click X to delete it.
5. Select the allowlist name in the UDP Allowlist page that you associated with the group
of IP addresses that you entered in the Add Allowlist window from the Available column
and move it to the Selected column using the right arrow.
NOTE:
• The UDP Allowlist option is enabled only if you select UDP flood protection.
• The allowlist that you created in the UDP Allowlist window will be available in the TCP
Allowlist window also for selection.
To edit an allowlist in the UDP Allowlist page, select the allowlist name and click on the
pencil icon.
To delete an allowlist in the UDP Allowlist page, select the allowlist name and click on the
delete icon.
SYN flood Select the check box to enable all the threshold and ager timeout options.
protection
Specifies that SYN flooding occurs when a host becomes so overwhelmed by SYN
segments initiating incomplete connection requests that it can no longer process legitimate
connection requests.
798
Field Action
NOTE: You can select the IP address and click X to delete it.
5. Select the allowlist name in the TCP Allowlist page that you associated with the group
of IP addresses that you entered in the Add Allowlist window from the Available column
and move it to the Selected column using the right arrow.
NOTE:
• The TCP Allowlist option is enabled only if you select SYN flood protection.
• The allowlist that you created in the TCP allowlist window will be available in the UDP
Allowlist window also for selection.
To edit a allowlist in the TCP Allowlist page, select the allowlist name and click on the
pencil icon.
To delete a allowlist in the TCP Allowlist page, select the allowlist name and click on the
delete icon.
Attack threshold Enter a value to specify the number of SYN packets per second required to trigger the SYN
proxy mechanism.
NOTE: Range: 1 through 1000000 proxied requests per second. The default attack
threshold value is 625 pps.
799
Field Action
Alarm threshold Enter a value to specify the number of half-complete proxy connections per second at
which the device makes entries in the event alarm log.
NOTE: Range: 1 through 1000000 segments per second. The default alarm threshold value
is 250 pps.
Source threshold Enter a value to specify the number of SYN segments received per second from a single
source IP address (regardless of the destination IP address and port number), before the
device begins dropping connection requests from that source.
NOTE: Range: 4 through 1000000 segments per second. The default source threshold
value is 25 pps.
Destination Enter a value to specify the number of SYN segments received per second for a single
threshold destination IP address before the device begins dropping connection requests to that
destination. If a protected host runs multiple services, you might want to set a threshold
based only on destination IP address, regardless of the destination port number.
NOTE: Range: 4 through 1000000 segments per second. The default destination threshold
value is 0 pps.
Ager timeout Enter a value to specify the maximum length of time before a half-completed connection is
dropped from the queue. You can decrease the timeout value until you see any
connections dropped during normal traffic conditions.
Field Action
• Destination header—Select an option from the list and enter the value and click + to
add it.
Routing header Select the check box to enable the IPv6 routing header screen option.
ESP header Select the check box to enable the IPv6 Encapsulating Security Payload header screen
option.
No-Next header Select the check box to enable the IPv6 no next header screen option.
Mobility header Select the check box to enable the IPv6 mobility header screen option.
Fragment header Select the check box to enable the IPv6 fragment header screen option.
AH header Select the check box to enable the IPv6 Authentication Header screen option.
Shim6 header Select the check box to enable the IPv6 shim header screen option.
HIP header Select the check box to enable the IPv6 Host Identify Protocol header screen option.
Customer Defined Enter a value to define the type of header range and click + to add it.
Header Type
Range: 0 through 255.
Field Action
IPv6 ext header Enter a value to set the number of IPv6 extension headers that can pass through the
limit screen.
Apply to Zones
Apply to Zones Select zones from the Available column and move them to the Selected column using the
right arrow.
RELATED DOCUMENTATION
Edit a Screen
To edit a screen:
1. Select an existing screen that you want to edit on the Zones/Screens page.
2. Click the pencil icon available on the upper-right corner of the Screen List page.
The Edit Screen page appears with editable fields. For more information on the options, see "Add a
Screen" on page 790.
3. Click OK to save the changes.
RELATED DOCUMENTATION
Delete a Screen
To delete a screen:
RELATED DOCUMENTATION
CHAPTER 66
Zone Addresses
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Policies & Objects > Zone Addresses.
• Add addresses or address sets. See "Add Zone Addresses" on page 805.
• Edit addresses or address sets. See "Edit Zone Addresses" on page 808.
• Delete addresses or address sets. See "Delete Zone Addresses" on page 808.
804
• Clone addresses or address sets. See "Clone Zone Addresses" on page 807.
• View the details of addresses or address sets—To do this, select the address or address set for which
you want to view the details and follow the available options:
• Click the detailed view icon available to the left of the selected address or address set.
• Deselect the selected address or address set. To do this, click More and select Clear All Selections.
• Search text in the Addresses table. See "Search Text in a Zone Addresses Table" on page 808.
• Show or hide columns in the Web filtering profiles table. To do this, click the Show Hide Columns
icon in the upper-right corner of the Web filtering profiles table and select the options you want to
view or deselect the options you want to hide on the page.
Field Descriptions
Table 226 on page 804 describes the fields on the Zone Addresses page.
Field Description
Addresses
Address Sets
Zone Displays the zone name to which the address set is applied.
805
Field Description
Address List Displays the preexisting addresses that should be included from the address set.
Address Set List Displays the preexisting addresses that should be included from the list.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Zone Addresses.
Field Action
Object Type Select an option from the list: Address or Address Group.
806
Field Action
Zone Select a zone from the list to which the address is applied.
Type Select an option from the list: Host, Range, or DNS host.
The string must include alphanumeric characters, periods, dashes, no spaces are allowed
and must end with an alphanumeric character.
NOTE: This option is available if you have selected DNS Host type.
Address Sets Displays the address set name. Select the address set.
Create Address Set Enter the address set name and click + to add the address set in the Address Sets.
NOTE: This option is available if you have selected Address Group for Object type.
807
Field Action
NOTE: This option is available if you have selected Address Group for Object type.
Address List Specifies which of the preexisting addresses should be included or excluded from the
address set.
Select the addresses from the list in the Available column and then click the right arrow to
move it to the Selected column.
NOTE: This option is available if you have selected Address Group for Object type.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Zone Addresses.
1. Select an existing zone address or address set that you want to clone and select Clone from the More
link.
2. Click the pencil icon available on the upper-right corner of the Zone Addresses page.
The Clone Addresses page appears with editable fields. For more information on the options, see
"Add Zone Addresses" on page 805.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Zone Addresses.
1. Select an existing zone address or address set that you want to edit on the Zone Addresses page.
2. Click the pencil icon available on the upper-right corner of the Zone Addresses page.
The Edit Addresses page appears with editable fields. For more information on the options, see "Add
Zone Addresses" on page 805.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Zone Addresses.
1. Select a zone address or address set that you want to delete on the Zone Addresses page.
2. Click the delete icon available on the upper-right corner of the Zone Addresses page.
A confirmation window appears.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Zone Addresses.
You can use the search icon in the upper-right corner of the Zone Addresses page to search for text
containing letters and special characters on that page.
809
1. Click the search icon and enter partial text or full text of the keyword in the search bar.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 67
Global Addresses
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Policies & Objects > Global Addresses.
Use this page to configure global address books for security policies.
• Upgrade the old zone-based address book to global address books. To do this, click Upgrade available
on the right-side corner of the Global Addresses table. Click Yes to proceed with the upgrade to
global address books and click OK.
Field Descriptions
Table 228 on page 811 describes the fields on the Global Addresses Page.
Field Description
Attached Zone Displays the name of the zone that is attached to the address book.
The global address book is available by default to all security zones. You do not
need to attach a security zone to the global address book.
Address/Address-Set Name Displays the addresses and address sets associated with the selected address
book.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Global Addresses.
Field Action
Attach Zones You can select more than one zone from the list for one address book.
NOTE: Ensure that each zone has only one address book attached to it. If there is more than
one address book attached to a zone, you will get the following error when you commit the
configuration.
Security zone must be unique in address books.
Addresses
813
Field Action
+ To add an address:
• Address Type—Select one of the following address types from the list:
• IP Address
• Wildcard Address
• Domain Name
• Ranged Address
1. Select an existing address and click the pencil icon available on the upper-right corner of
the Addresses table.
Delete Select an existing address and click the delete icon available on the upper-right corner of the
Addresses table to delete it.
Address Set
814
Field Action
• Address List—Select the address from the list in the Available column and then click
the right arrow to move it to the Selected column.
Specifies which of the preexisting addresses should be included or excluded from the
address set.
• Address Set List—Select the address sets from the list in the Available column and then
click the right arrow to move it to the Selected column.
Specifies which of the preexisting address sets should be included or excluded from
the list.
1. Select an existing address and click the pencil icon available on the upper-right corner of
the Address Set table.
Delete Select an existing address set and click the delete icon available on the upper-right corner of
the Address Set table to delete it.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Global Addresses.
1. Select an existing address book that you want to edit on the Global Addresses page.
2. Click the pencil icon available on the upper-right corner of the Global Addresses page.
The Edit Address Book page appears with editable fields. For more information on the options, see
"Add an Address Book" on page 811.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Global Addresses.
1. Select an existing address book that you want to delete on the Global Addresses page.
2. Click the delete icon available on the upper-right corner of the Global Addresses page.
A confirmation window appears.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 68
Services
IN THIS CHAPTER
IN THIS SECTION
Field Descriptions
Table 230 on page 817 describes the fields on the Services Page.
Field Description
Custom-Applications
Pre-defined Applications
Field Description
Application Group
RELATED DOCUMENTATION
Field Action
Global
Destination Port Select a custom destination port identifier from the list.
Source Port Select a custom source port identifier from the list.
Specifies the length of time (in seconds) that the application is inactive before it
times out.
Match ICMP message code Select an Internet Control Message Protocol (ICMP) message code value from the
list.
Match ICMP message type Select an Internet Control Message Protocol message type value from the list.
Terms
820
Field Action
Add Click +.
Specifies the Application Layer Gateway (ALG) for the application protocol.
Specifies the length of time (in seconds) that the application is inactive before it
times out.
Match ICMP message code Select an ICMP message code value from the list.
Match ICMP message type Select an ICMP message type value from the list.
Edit Select a term and click the pencil icon at the right corner of the table to modify the
configuration.
821
Field Action
Delete Select a term and click the delete (X) icon at the right corner of the table to delete
the selected term.
RELATED DOCUMENTATION
RELATED DOCUMENTATION
RELATED DOCUMENTATION
Field Action
Table 232: Fields on the Add New Application Set Page (Continued)
Field Action
Application Using the right arrow, select values from Applications out of this set and move them to
Applications in this set.
NOTE:
• Enter the application name in the search box and press Enter to search for the required
application.
• Click Clear to remove the selected applications from the list of Applications in this set
column.
Application Group Using the right arrow, select values from Application groups out of this group and move
them to Application groups in this group.
NOTE:
• Enter the application name in the search box and press Enter to search for the required
application.
• Click Clear to remove the selected applications from the list of Application groups in this
group column.
RELATED DOCUMENTATION
RELATED DOCUMENTATION
RELATED DOCUMENTATION
CHAPTER 69
Dynamic Applications
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Policies & Objects > Dynamic Applications.
Use this page to create, modify, clone, and delete application signature groups. You can view the details
of predefined application signatures that are already downloaded.
All enabled and disabled application signatures on the device are displayed in a grid format. A message
Once a new custom application signature is created or modified, the configuration is committed immediately to the
device. is displayed at the top of the page.
826
A status message is displayed just above the grid. It shows the version number of the installed
application, the latest version available, and whether you have downloaded or installed an application
package.
NOTE: If you successfully download an application package, the Install button is displayed. If you
successfully install a downloaded application package, an Uninstall button is displayed.
• Create application signatures group. See "Add Application Signatures Group" on page 837.
• Search text in an application signature. See "Search Text in an Application Signatures Table" on page
839.
• View the details of application signatures—To do this, select the application signature for which you
want to view the details and follow the available options:
• Right-click on the selected application signature profile and select Detailed View.
• Mouse over to the left of the selected application signature and click Detailed View.
• Filter the application signatures based on select criteria. To do this, select the filter icon at the upper-
right corner of the application signatures table. The columns in the grid change to accept filter
options. Type the filter options; the table displays only the data that fits the filtering criteria.
827
• Show or hide columns in the application signature profiles table. To do this, click the Show Hide
Columns icon in the upper-right corner of the application signatures table and select the options you
want to view or deselect the options you want to hide on the page.
• More—Clone an existing application signature package, create group, or configure the page to show a
detailed view.
Field Descriptions
Table 233 on page 827 describes the fields on the Application Signatures page.
Field Description
Predefined or Custom Displays the predefined or custom application signatures and settings that are
configured on your device.
RELATED DOCUMENTATION
Global Settings
You are here: Security Policies & Objects > Dynamic Applications.
1. Click the Global Settings on the upper-right corner of the Application Signatures page.
The Global Settings page appears.
2. Complete the configuration according to the guidelines provided in Table 234 on page 828.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
General
Custom Application Byte Select the byte limit in the range 0 through 10000. This helps in understanding when
Limit to stop the identification of custom applications.
Micro Applications Enable micro-application detection in application identification and then use them as
matching criteria in a security policy.
Application Cache Enable this option to save the mapping between an application type and the
corresponding destination IP address, destination port, protocol type, and service.
829
Field Action
Security Services Enable this option for security services, such as security policies, application firewall
(AppFW), Juniper ATP Cloud, IDP, and Content Security.
Miscellaneous Services Enable this option for miscellaneous services, such as APBR and AppTrack.
Cache entry timeout Enter the timeout value in seconds for the application system cache (ASC) entries.
Packet Capture
Global packet capture Enable packet capture globally to capture all unknown application traffic.
You can also enable this option specific to a security policy at the rule level. For
more information, see "Add a Rule to a Security Policy" on page 734.
Aggressive mode Enable to capture all traffic before AppID classifies the applications. In this mode, the
system captures all application traffic regardless of the application system cache
(ASC) entry. Packet capture starts for the first packet of the first session.
Exclude inconclusive Disable packet capture of inconclusive traffic. This option is available when you
traffic enable the Aggressive mode option.
This option disables the packet capture for the following sessions:
• Sessions not classified even though they reach the maximum packet capture
limit.
If you do not configure this option, by default, the system captures packets for
inconclusive sessions.
Advanced
Field Action
Maximum bytes Maximum number of TCP bytes per session. For TCP sessions, the count includes
the actual payload data length and excludes IP/TCP headers for the maximum bytes
limit.
Maximum files Maximum number of unique packet capture files to create before the oldest file is
overwritten by a new file created.
Maximum storage Maximum disk space (bytes) that can be used in the Routing Engine for packet
capture files.
Maximum memory Maximum memory limit for deep packet inspection (DPI).
Packet capture interval Timeout value in minutes to avoid repetitive capture of same traffic. After this
interval, the system continues to capture newer packet details for unknown
applications until the capture limit is reached.
Repeat traffic capture Number of repetitive captures of same traffic. Use this option to limit the number of
times the same traffic can be repeatedly captured before the cache entry times out.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Dynamic Applications.
1. Click Create > Signature on the upper-right corner of the Dynamic Applications page.
The Create Application Signatures page appears.
2. Complete the configuration according to the guidelines provided in Table 235 on page 831.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
Field Action
• High
• Low
By default, the priority for the custom application is set to Low. This allows a predefined
application to take precedence. If you want to override a predefined application, you
must set the priority to High.
• IP Protocol Mapping
• Address Mapping
• L7 Signature
• ICMP Type—Select the numeric value of an ICMP type. The type identifies the ICMP
message, such as Unassigned or Destination Unreachable.
• Select the numeric value of an ICMP code. The code field provides further
information (such as RFCs) about the associated type field.
IP Protocol Mapping Select the numeric value of an ICMP type. The type identifies the ICMP message, such
as Unassigned or Destination Unreachable.
Field Action
1. Click Add.
• TCP Port range—Enter the TCP port range for the application.
• UDP Port Range—Enter the UDP port range for the application.
2. Click the pencil icon at the upper-right corner of the Address Mapping table. Then,
edit the address mapping and click OK.
3. To delete an existing Address Mapping, select it and click the delete icon or right-
click on it and click Delete.
L7 Signature
Cacheable Set this option to True only when L7 signatures are configured in a custom signature.
This option is not supported for address-based, IP protocol-based, and ICMP-based
custom application signatures.
Add L7 Signature Click Add L7 Signature list and select an option from the following:
• Over HTTP
• Over SSL
• Over TCP
• Over UDP
Field Action
Add Signature
Over Protocol Displays the signature that matches the application protocol.
Example: HTTP
Signature Name Enter a unique name that is a string of alphanumeric characters, colons, periods, dashes,
and underscores. No spaces are allowed and the maximum length is 63 characters.
Range is 0-65535.
Add Members
Custom signatures can contain multiple members that define attributes of an application. The supported member
name range is m01 through m15.
Context (Over HTTP) Select the service-specific context from the following list:
• http-get-url-parsed-param-parsed
• http-header-content-type
• http-header-cookie
• http-header-host
• http-header-user-agent
• http-post-url-parsed-param-parsed
• http-post-variable-parsed
• http-url-parsed
• http-url-parsed-param-parsed
835
Field Action
Direction Select the direction of the packet flow to match the signature:
• any—The direction of the packet flow can either be from the client-side to the
server-side or from the server-side to the client-side.
Depth Enter the maximum number of bytes to check for context match. Use the byte limit for
AppID to identify custom application pattern for applications running over TCP or UDP
or Layer 7 applications.
Range is 1 through 8000. The Depth is set to 1000 by default, if not explicitly
configured.
Pattern Enter the deterministic finite automaton (DFA) pattern matched the context. The DFA
pattern specifies the pattern to be matched for the signature. The maximum length is
128.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Dynamic Applications.
1. Select the application signature profile that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected application signature profile and
select Clone.
The Clone Application Signature page appears with editable fields. For more information on the
fields, see "Add Application Signatures" on page 831.
2. Click OK to save the changes. If you want to discard your changes, click Cancel.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Dynamic Applications.
1. Click Create > Signature Group on the upper-right corner of the Dynamic Applications page. You can
also click More and select Create Group.
The Create Application Signature Group page appears.
2. Complete the configuration according to the guidelines provided in Table 236 on page 837.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
Group Enter the add or remove applications associated with the application signature group.
Members
Click one of the following options:
• Delete—Select an existing application signature group that you want to delete and click the
delete icon available at the upper right of the application signature group table.
• Detailed View—Hover over the application signature group name and click the Detailed
View icon to view the signature group.
You can also click More and select Detailed View for the selected signature group.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Dynamic Applications.
1. Select an existing application signature that you want to edit on the Dynamic Applications page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Application Signatures page appears with editable fields. For more information on the
options, see "Add Application Signatures" on page 831.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Dynamic Applications.
1. Select an application signature that you want to delete on the Dynamic Applications page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Dynamic Applications.
You can use the search icon in the upper-right corner of the Dynamic Applications page to search for
text containing letters and special characters on that page.
1. Click the search icon and enter partial text or full text of the keyword in the search bar.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 70
Application Tracking
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Policies & Objects > Application Tracking.
Field Description
1. Complete the configuration according to the guidelines provided in Table 237 on page 840.
Table 237 on page 840 describes the fields on the Application Tracking page.
Field Description
Field Description
• Delay logging first session—Enables you to specify the length of time that must
pass before the first log message is created. The default is 1 minute.
First Update Interval Use the up/down arrow to set the interval time.
(min)
Session Update Use the up/down arrow to set the interval time.
Interval (min)
• To disable application tracking, select the zone and then click the left arrow to
move the zone back into the available list.
RELATED DOCUMENTATION
CHAPTER 71
Schedules
IN THIS CHAPTER
IN THIS SECTION
• View the details of schedules—To do this, select the schedule for which you want to view the details
and follow the available options:
• Mouse over to the left of the selected custom object and click Detailed View.
• Deselect the selected schedules. To do this, click More and select Clear All Selections.
• Search text in the Schedules table. See "Search Text in Schedules Table" on page 847.
• Show or hide columns in the Schedules table. To do this, click the Show Hide Columns icon in the
upper-right corner of the Schedules table and select the options you want to view or deselect the
options you want to hide on the page.
Field Descriptions
Table 238 on page 843 describes the fields on the Schedules Page.
Field Description
Start Date Displays the start date for the first day.
End Date Displays the stop date for the first day.
Second Start Date Displays the start date for the second day.
Second End Date Displays the stop date for the second day.
Schedules On expanding, displays the days of the schedule, exclusion days if any, and the start and end
time of the schedule.
844
RELATED DOCUMENTATION
Add a Schedule
To add a schedule:
Field Action
General
Dates
Start Date Select the start date for the first day from the calendar and select the time in AM, PM, or 24
ours format.
Stop Date Select the stop date for the first day from the calendar and select the time in AM, PM, or 24
ours format.
Second Start Date Select the start date for the second day from the calendar and select the time in AM, PM, or
24 ours format.
Second End Date Select the stop date for the second day from the calendar and select the time in AM, PM, or
24 ours format.
845
Field Action
Time Ranges
Time Ranges Select the check box to specify the time range.
Daily Options 1. Click on the day to specify the time for a particular day.
NOTE: Click Specify the same time for all days to configure the same time options to all
days.
• Start Time—Enter the first day start time in HH:MM:SS and select AM, PM, or 24
hours format.
• End Time—Enter the first day end time first day in HH:MM:SS and select AM, PM,
or 24 hours format.
• Second Start Time—Click + and enter the second day start time in HH:MM:SS,
and then select AM, PM, or 24 hours format.
• Second End Time—Enter the second day end time in HH:MM:SS and select AM,
PM, or 24 hours format.
NOTE: Click X to delete the second day start and end time.
RELATED DOCUMENTATION
Clone a Schedule
To clone a schedule:
1. Select a schedule that you want to clone and select Clone from the More link.
The Clone Schedule page appears with editable fields. For more information on the fields, see "Add a
Schedule" on page 844.
NOTE: Alternatively, you can right-click on the selected schedule and select Clone.
2. Click OK to save the changes. If you want to discard your changes, click Cancel.
RELATED DOCUMENTATION
Edit a Schedule
To edit a schedule:
1. Select an existing schedule that you want to edit on the Schedules page.
2. Click the pencil icon available on the upper-right corner of the Schedules page.
The Edit Schedules page appears with editable fields. For more information on the options, see "Add
a Schedule" on page 844.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
Delete a Schedule
To delete a schedule:
RELATED DOCUMENTATION
You can use the search icon in the upper-right corner of the Schedules page to search for text containing
letters and special characters on that page.
1. Click the search icon and enter partial text or full text of the keyword in the search bar.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 72
Proxy Profiles
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Policies & Objects > Proxy Profiles.
• Filter the proxy profile based on select criteria. To do this, select the filter icon at the upper-right
corner of the Proxy Profiles table. The columns in the grid change to accept filter options. Type the
filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the Proxy Profiles table. To do this, click the Show Hide Columns icon in the
upper-right corner of the Proxy Profiles table and select the options you want to view or deselect the
options you want to hide on the page.
• Advanced search for proxy profiles. To do this, use the search text box present above the table grid.
The search includes the logical operators as part of the filter string. In the search text box, when you
hover over the icon, it displays an example filter condition. When you start entering the search string,
the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 240 on page 849 describes the fields on the Proxy Profiles Page.
Field Description
Server IP / Host Name Displays the connection type used by the proxy profile.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Proxy Profiles.
Table 241 on page 850 describes the fields on the Create Proxy Profile Page.
Field Action
Connection Type Select the type of connection used by the proxy profile:
Port Number Enter the port number used by the proxy profile.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Proxy Profiles.
1. Select an existing proxy profile that you want to edit on the Proxy Profiles page.
2. Click the pencil icon available on the upper-right corner of the Proxy Profiles page.
The Edit Proxy Profile page appears with editable fields. For more information on the options, see
"Add a Proxy Profile" on page 850.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Policies & Objects > Proxy Profiles.
1. Select a proxy profile that you want to delete on the Proxy Profiles page.
2. Click the delete icon available on the upper-right corner of the Proxy Profiles page.
A confirmation window appears.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
Security Services
ALG | 1013
CHAPTER 73
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Content Security > Default Configuration.
The Default Configuration page describes the security features of Content Security.
This default configuration will be used, if there are multiple Content Security policies present in the
potential list. The global configuration will be used till the exact match is found in the potential list.
The following security features are parts of Content Security default configuration:
• Antivirus—Antivirus is an in-the-cloud antivirus solution. The virus pattern and malware database are
located on external servers maintained by Sophos (Sophos Extensible List) servers.
• Web Filtering—Web filtering lets you to manage Internet usage by preventing access to inappropriate
Web content.
• Content Filtering—This feature blocks or permits certain types of traffic based on the MIME type, file
extension, protocol command, and embedded object type.
• View the collapsed or expanded details of the Content Security default configuration options. To do
this, select any one of the Content Security default configurations and click Expand All or Collapse All
available on the upper-right corner of the page.
Field Descriptions
Table 242 on page 855 describes the fields on the Default Configuration page.
Field Function
Anti-Virus Displays the configured antivirus. You can edit the configured
antivirus.
Web Filtering Displays the configured Web filtering. You can edit the
configured web filtering.
Anti-Spam Displays the configured antispam. You can edit the configured
antispam.
Content Filtering Displays the configured content filtering. You can edit the
configured content filtering.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Default Configuration.
You can edit all of the following Content Security default configurations:
• Antivirus
• Web filtering
• Antispam
• Content filtering
NOTE: Starting in Junos OS 23.3R1 Release, J-Web supports Juniper NextGen Web Filtering.
1. Select any of the existing Content Security default configurations that you want to edit on the
Default Configuration page.
2. Click the pencil icon available on the upper-right corner of the page.
The edit page for the selected default configuration appears with editable fields. You can modify any
previous changes done to Antivirus, Web Filtering, Antispam, and Content Filtering.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Default Configuration.
You can delete all of the following Content Security default configurations:
• Antivirus
• Web filtering
857
• Antispam
• Content filtering
1. Select any of the existing Content Security default configurations that you want to delete on the
Default Configuration page.
2. Click the delete icon available on the upper-right corner of the page.
The Confirm Delete window appears.
NOTE: You can only delete the configured data and not the junos-default configuration.
1. Click Delete All Default Configurations available on the upper-right corner of the page.
NOTE: You can only delete the configured data and not the junos-default configuration.
RELATED DOCUMENTATION
CHAPTER 74
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Content Security > Antivirus Profiles.
• View the details of an antivirus profile—To do this, select the antivirus profile for which you want to
view the details and follow the available options:
• Mouse over to the left of the selected antivirus profile and click Detailed View.
• Advanced search for antivirus profiles. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
• Filter the antivirus profiles based on select criteria. To do this, select the filter icon at the upper-right
corner of the antivirus profiles table. The columns in the grid change to accept filter options. Type the
filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the antivirus profiles table. To do this, click the Show Hide Columns icon in
the upper-right corner of the antivirus profiles table and select the options you want to view or
deselect the options you want to hide on the page.
Field Descriptions
Table 243 on page 860 describes the fields on the Antivirus Profiles page.
860
Field Function
Default Action Displays the default fallback action taken when the antivirus
system encounters errors.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antivirus Profiles.
Field Function
General
URL Allowlist Select the customized object from the list for a given category
that are to be bypassed for scanning.
MIME Allowlist
862
Field Function
3. Click OK.
Exception MIME Allowlist Select an exception MIME allowlist from the list.
Click Create New MIME list to create and add a MIME pattern
list inline.
863
Field Function
Fallback Options
Fallback options are used when the antivirus system experiences errors and must fall back to one of the
previously configured actions to either deny (block) or permit the object.
Engine Error Select Block or Log and Permit to specify whether the scan
engine should be blocked (default) or logged and permitted if it
is not ready during certain processes. For example, while the
signature database is loading.
Trickling Timeout Select Block or Log and Permit to specify whether the time
taken to scan should be blocked (default) or logged and
permitted if the scan process exceeds the timeout setting in the
antivirus profile.
Out of Resources Select Block or Log and Permit to specify whether the resource
constraints should be blocked (default) or logged and permitted
if the error is received during virus scanning.
Decompress Layer Select Block or Log and Permit to specify whether the number
of layers of nested compressed files that the internal antivirus
scanner can decompress before the execution of the virus scan.
The default action is Block.
Too many Requests Select an option to specify whether the number of messages
should be blocked (default) or logged and permitted if the
messages received concurrently exceeds the device limits.
Default Action Select a default action to take when an error occurs; Block or
Log and Permit.
864
Field Function
Notification Options
Use the notification options to configure a method of notifying the user when a fallback occurs or a virus is
detected.
Fallback Deny
Notify Mail Sender Select this option to configure e-mail notifications to notify the
administrator about the errors returned by either the scan
engine or the scan manager when a fallback action occurs.
Notification Type Select None, Protocol, or Message from the list to specify the
type of notification sent when a fallback option of deny is
triggered.
Custom Message Subject Enter the subject line text for your custom message for the
fallback deny notification.
Custom Message Enter the customized message text for the fallback deny
notification.
Fallback Non-Deny
Notify Mail Recipient Select this option to configure E-mail notifications to notify the
recipient when a fallback e-mail option without a deny action is
triggered.
Custom Message Subject Enter the subject line for your custom message for the fallback
non-deny notification.
Field Function
Custom Message Enter the customized message text for the fallback non-deny
notification.
Virus Detection
Notify Mail Sender Select this option to configure E-mail notifications to notify the
administrator when a virus is detected.
Custom Message Subject Enter the subject line text for your custom message for the
virus detection notification.
Custom Message Enter the customized message text for the virus detection
notification.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antivirus Profiles.
1. Select an antivirus profile that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected antivirus profile and select Clone.
The Clone Antivirus Profiles page appears with editable fields. For more information on the options,
see "Add an Antivirus Profile" on page 860.
2. Click OK to save the changes.
A cloned antivirus profile is created for the selected antivirus profile. By default, the name of the
cloned antivirus profile is in the format: <Antivirus profile name>_clone.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antivirus Profiles.
1. Select an existing antivirus profile that you want to edit on the Antivirus Profiles page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Antivirus Profiles page appears with editable fields. For more information on the options,
see "Add an Antivirus Profile" on page 860.
NOTE: Alternatively, you can right-click on the selected antivirus profile and select Edit
Antivirus Profiles.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antivirus Profiles.
1. Select an antivirus profile that you want to delete on the Antivirus Profiles page.
2. Click the delete icon available on the upper-right corner of the page.
NOTE: Alternatively, you can right-click on the selected antivirus profile and select Delete
Antivirus Profiles.
RELATED DOCUMENTATION
Learn about Content Security antivirus protection Content Security Antivirus Overview | 868
and how to configure Content Security antivirus to Benefits of Content Security Antivirus | 869
prevent virus attacks on SRX Series Firewalls by
using J-Web. The Content Security antivirus feature
on the SRX Series Firewall scans network traffic to
868
You must always ensure that the antivirus software and virus pattern database are up to date.
• In Junos CLI commands, we continue to use the legacy term UTM for content security.
The on-device antivirus is an on-box solution. The on-device antivirus scan engine scans the data by
accessing the virus pattern database that is locally stored on the device. It provides a full file-based
antivirus scanning function that is available through a separately licensed subscription service.
869
NOTE:
• The on-device Express or Kaspersky scan engine is not supported from Junos OS Release
15.1X49-D10 onwards; however, it is still applicable for Junos OS Release 12.3X48.
• Starting in Junos OS Release 18.4R1, SRX Series Firewalls support the Avira on-device
antivirus scanning engine.
• Avira on-device antivirus scanning engine is not supported on SRX300, SRX320, SRX340,
SRX345, SRX380, and SRX550 HM devices.
Sophos antivirus is an in-the-cloud antivirus solution. The virus pattern and malware database is
located on external servers maintained by Sophos (Sophos Extensible List) servers. The Sophos
antivirus scanner also uses a local internal cache to maintain query responses from the external list
server. We offer the Sophos antivirus scanning as a less CPU-intensive alternative to the full file-
based antivirus feature.
• Scans the application traffic locally without connecting to the Internet server to query whether
the application traffic has virus.
• Minimizes processing delays because the pattern database is locally stored and the scan engine is
on-device.
• Avoids downloading and maintaining large pattern databases on the Juniper device because the
virus pattern and malware database is located on external servers maintained by Sophos.
• Improves lookup performance because the Sophos antivirus scanner uses a local internal cache to
maintain query responses from the external list server.
• Effectively prevents malicious content from reaching the endpoint client or server through the use
of the Uniform Resource Identifier (URI) checking functionality.
870
Antivirus Workflow
IN THIS SECTION
Scope | 870
Topology | 871
Video | 871
Scope
Juniper Web (J-Web) Device Manager supports the Content Security antivirus solution on SRX Series
Firewalls. In this example, you’ll use Sophos antivirus protection to do the following:
1. Scan HTTP and FTP traffic from a server (10.102.70.89) to your computer for virus attacks.
2. Define a custom message Virus Found! to be displayed when a virus is found while scanning the
traffic.
NOTE: Assumption is that you must be able to route to the example URLs.
• Install a Sophos antivirus license. See the Installation and Upgrade Guide, Licensing Administration
Guide, and Licensing Guide.
• Ensure that the SRX Series Firewall you use in this example runs Junos OS Release 22.2R1.
• In Junos CLI commands, we continue to use the legacy term UTM for content security.
871
Topology
The topology used in this example comprises a PC connected to a Content Security-enabled SRX Series
Firewall that has access to the Internet and a server. You'll use J-Web to scan the HTTP and FTP
requests sent to the server with this simple setup. You’ll then use Sophos antivirus protection to prevent
virus attacks from the Internet to your PC.
Video
See the following video to learn how to configure Content Security antivirus using J-Web.
Step Action
Here, you first define the default engine as Sophos in Default Configuration.
872
(Continued)
Step Action
Here, you define the URL pattern list (allowlist) of URLs or addresses that will be bypassed by
antivirus scanning. After you create the URL pattern list, you will create a custom URL category
list and add the pattern list to it.
After the default configuration, you define the parameters that will be used for virus scanning in
the feature profile.
NOTE: You must configure DNS servers before creating the antivirus profiles.
To configureDNS servers, go to Device Administration > Basic Settings > System Identity > DNS
servers.
Step 4 Create a Content Security policy for Sophos antivirus and apply the antivirus feature profile to the
Content Security policy.
Here, you use a Content Security policy to bind a set of protocols (for example, HTTP) to the
Sophos Content Security feature profile. You can scan other protocols as well by creating different
profiles or adding other protocols to the profile, such as imap-profile, pop3-profile, and smtp-
profile.
Step 5 Create a security policy for Sophos antivirus and assign the Content Security policy to the security
policy.
Here, you use the security firewall and feature profile settings to scan the traffic from the trust
zone (trust) to the untrust zone (Internet).
Step 6 Access a URL from the allowlist URL (http://10.102.70.89) and try to download a test virus file
(eicar.txt) which is made available on the 10.102.70.89 server.
In this step, you'll set up Sophos Engine as the default engine type.
1. On the Anti-Virus tab, click the edit icon (pencil) to edit the default configuration.
The Anti Virus page appears. See .
2. Complete the tasks listed in the Action column in Table 245 on page 873.
Table 245: Default Configuration Settings
Field Action
MIME Whitelist
IN THIS SECTION
Step 2a: Configure a URL Pattern List That You Want to Bypass | 874
Step 2b: Categorize the URLs That You Want to Allow | 876
Step 2a: Configure a URL Pattern List That You Want to Bypass
In this step, you define a URL pattern list (safelist) of URLs or addresses that will be bypassed by
antivirus scanning.
You are here (in the J-Web UI): Security Services > Content Security > Custom Objects.
Field Action
NOTE: Use a string beginning with a letter or underscore and consisting of alphanumeric characters
and special characters such as dashes and underscores. You can use a maximum of 29 characters.
b. Type http://10.102.70.89.
.
875
You'll now assign the created URL pattern to a URL category list. The category list defines the action of
mapping. For example, the Safelist category should be permitted.
You are here: Security Services > Content Security > Custom Objects.
To categorize URLs:
Field Action
Name Type av-url as the URL category list name for the safelisted URL pattern.
NOTE: Use a string beginning with a letter or underscore and consisting of alphanumeric
characters and special characters such as dashes and underscores. You can use a maximum of
59 characters.
URL Patterns Select the URL pattern value av-url-pattern from the Available column and click the right
arrow to move the URL pattern values to the Selected column. By doing this, you associate
the URL pattern value av-url-pattern with the URL category list av-url.
877
In this step, you’ll create a new Content Security antivirus profile, refer the created URL objects
(patterns and categories) to the profile, and specify the notification details.
Field Action
General
Fallback Options
Notification Options
Field Action
3. Click Finish. Review the summary of the configuration and click OK to save your configuration.
4. Click Close after you see a successful-configuration message.
Good job! Here's the result of your configuration:
You are here: Security Services > Content Security > Content Security Policies.
2. Complete the tasks listed in the Action column in Table 249 on page 881:
Table 249: Create Content Security Policies Settings
Field Action
General
Name Type av-policy as the name of the Content Security policy and click Next.
Antivirus
FTP Download Select av-profile from the list and click Next till end of the page.
3. Click Finish. Review the summary of the configuration and click OK to save the changes.
4. Click Close after you see a successful-configuration message.
Almost there! Here's the result of your configuration:
You haven’t yet assigned the Content Security configurations to the security policy from the trust zone
to the Internet zone. Filtering actions are taken only after you assign the Content Security policy to
security policy rules that act as the match criteria.
NOTE: When the security policy rules are permitted, the SRX Series Firewall:
1. Intercepts an HTTP connection and extracts each URL (in the HTTP request) or IP address.
NOTE: For an HTTPS connection, antivirus is supported through SSL forward proxy.
2. Searches for URLs in the user-configured safelist under Antivirus (Security Services > Content
Security > Default Configuration). Then, if the URL is in the user-configured safelist, the
device permits the URL.
3. Allows or blocks the URL (if a category is not configured) based on the default action
configured in the antivirus profile.
You are here: Security Policies & Objects > Security Policies.
Field Action
General
Rule Name Type av-security-policy as the security policy rule name. This rule allows the URLs in the
av-url category list.
Rule Description Enter a description for the security policy rule and click Next.
883
Field Action
d. Click OK
e. Click OK
c. Click OK
NOTE: Navigate to Security Policies & Objects > Zones/Screens to create zones. Creating
zones is outside the scope of this documentation.
to save changes.
Good job! Here's the result of your configuration:
884
4. Click the commit icon (at the right side of the top banner) and select Commit.
The successful-commit message appears.
Congratulations! We’re now ready to scan the traffic for virus attacks.
IN THIS SECTION
Purpose | 884
Action | 884
Purpose
Verify that your configured Content Security antivirus is preventing virus attacks from the Internet
server and allowing traffic from the Allowlist server.
Action
2. Using the PC, send a FTP request to the 10.102.70.89 server to download the eicar.txt file. The
eicar.txt file is a test virus file which is made available on the 10.102.70.89 server.
885
Sorry! The SRX Series Firewall has blocked downloading the file and sent you a custom block
message ***Antivirus Alert***- Virus Found!.
Here is an example output when you try to download the eicar.txt file and the SRX device sends a
virus alert:
Here is an example of the anti-virus statistics output when you find a threat:
[edit]
root@srx> show security utm anti-virus statistics
UTM Anti Virus statistics:
Intelligent-prescreening passed: 0
MIME-whitelist passed: 0
URL-whitelist passed: 1
Session abort: 0
Scan Request:
Fallback:
Log-and-Permit Block Permit
Engine not ready: 0 0 0
Out of resources: 0 0 0
Timeout: 0 0 0
886
What’s Next?
Monitor Content Security In J-Web, go to Monitor > Security Services > Content Security > Anti Virus.
antivirus details and statistics
• Viruses Blocked
NOTE: You can't generate more than one report at the same time.
A reported is generated.
You configure the following Content Security configurations at the [edit security utm] hierarchy level.
887
custom-objects {
url-pattern {
av-url-pattern {
value http://10.102.70.89 ;
}
}
custom-url-category {
av-url {
value av-url-pattern;
}
}
}
Creating the antivirus profile at the [edit security utm] hierarchy level:
default-configuration {
anti-virus {
type sophos-engine;
}
}
feature-profile {
anti-virus {
profile UTM-LB-AV {
notification-options {
virus-detection {
type message;
notify-mail-sender;
custom-message “Virus-Found!”;
custom-message-subject “***Antivirus Alert***”;
}
}
}
}
}
888
utm-policy av-policy {
anti-virus {
http-profile av-profile;
ftp {
upload-profile av-profile;
download-profile av-profile;
}
}
}
Creating rules for a security policy at the [edit security policies] hierarchy level.:
CHAPTER 75
IN THIS CHAPTER
Allow or Block Websites by Using J-Web Integrated Content Security Web Filtering | 899
IN THIS SECTION
You are here: Security Services > Content Security > Web Filtering Profiles.
Use this page to manage Internet usage by preventing access to inappropriate Web content.
A Web filtering profile defines a set of permissions and actions to take based on Web connections
predefined by website categories. In addition, you can create custom URL categories and URL pattern
lists during this process.
For an example use case, see Allow or Block Websites by Using J-Web Integrated Content Security Web
Filtering.
890
• Add a Web filtering profile. See "Add a Web Filtering Profile" on page 891.
• Edit a Web filtering profile. See "Edit a Web Filtering Profile" on page 898.
• Clone a Web filtering profile. See "Clone a Web Filtering Profile" on page 897.
• Delete a Web filtering profile. See "Delete a Web Filtering Profile" on page 899.
• Filter the Web filtering profiles based on select criteria. To do this, select the filter icon at the upper-
right corner of the Web filtering profiles table. The columns in the grid change to accept filter
options. Type the filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the Web filtering profiles table. To do this, click the Show Hide Columns
icon in the upper-right corner of the Web filtering profiles table and select the columns you want to
view or deselect the columns you want to hide on the page.
• View the details of a Web filtering profile—To do this, select the Web filtering profile for which you
want to view the details and follow the available options:
• Right-click on the selected Web filtering profile and select Detailed View.
• Mouse over to the left of the selected Web filtering profile and click Detailed View.
• Advanced search for Web filtering profiles. To do this, use the search text box present above the
table grid. The search includes the logical operators as part of the filter string. An example filter
condition is displayed in the search text box when you hover over the Search icon. When you start
entering the search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace to delete a character of the search string.
Field Descriptions
Table 251 on page 891 describes the fields on the Web filtering page.
Field Action
Profile type Displays the type of profile based on the filtering type selected.
Default action Displays the default action to be taken for the web filtering profile.
Timeout Displays the time interval to wait before the connection to the server is closed.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Web Filtering Profiles.
1. Click + available on the upper-right corner of the Web Filtering Profiles page.
The Create Web Filtering Profiles page appears.
2. Complete the configuration according to the guidelines provided in Table 252 on page 892 through
Table 254 on page 896.
3. Click Finish to save the changes or click Back to go to the previous tab. If you want to discard your
changes, click Cancel.
If you click Finish, a new web filtering profile is created.
892
Field Action
Timeout Enter a timeout value to wait for a response from the Websense server.
• Juniper Enhanced—Specifies that the Juniper Enhanced Web filtering intercepts the HTTP
and the HTTPS requests and sends the HTTP URL or the HTTPS source IP to the
Websense ThreatSeeker Cloud (TSC).
• Websense Redirect—Specifies that the Web filtering module intercepts an HTTP request.
The URL in the request is then sent to the external Websense server which makes a
permit or a deny decision.
• Local—Specifies that the Web filtering module intercepts URLs and makes a permit or
deny decision locally.
Safe search Enable a safe search solution to ensure that the embedded objects such as images on the
URLs received from the search engines are safe and that no undesirable content is returned
to the client.
NOTE: This option is available only for the Juniper Enhanced engine type. By default, this
option is enabled.
Account Enter the user account associated with the Websense Web filtering profile.
NOTE: This option is available only for the Websense Redirect engine type.
NOTE: This option is available only for the Websense Redirect engine type.
893
Field Action
Port Enter the port number for communicating with the Websense server.
NOTE: This option is available only for the Websense Redirect engine type.
Sockets Enter the number of sockets used for communication between the client and the server.
NOTE: This option is available only for the Websense Redirect engine type.
Custom Block Specify the redirect URL or a custom message to be sent when HTTP requests are blocked.
Message/URL
Maximum length is 512 characters.
Custom Define a custom message to allow or deny access to a blocked site based on a user response
Quarantine to the message.
Message
Maximum length is 512 characters.
NOTE: This option is available only for the Juniper Enhanced and the Local engine types.
Base Filter Select a predefined base filter, which has default actions for all categories, for Web filtering.
NOTE: This option is available only for the Juniper Enhanced engine type.
894
Field Action
Apply actions To apply actions that the device must take for the selected category:
• Action—Select an action for the URL category from the list. The options are Permit, Log
and Permit, Block or Quarantine.
NOTE:
• Type—Select an option from the list. The options are Redirect URL or User
Message.
• Content—Enter a content for the custom message list. The maximum length is 512
characters.
Field Action
1. Click +.
2. Select one or more predefined and custom URL categories to apply to the list.
The Name column displays the list of URL categories to choose from.
Click the search icon in the upper-right corner of the table to search for any particular URL
category in the list.
• Action—Select an action for the URL category from the list. The options available are
Permit, Log and Permit, Block, and Quarantine.
NOTE:
4. Click OK to save the changes. If you want to discard your changes, click Cancel.
Delete Select a URL category that you want to delete and click the delete icon in the upper-right corner
of the table
Search Click the search icon in the upper-right corner of the table and the URL category you want to
search.
Field Action
Custom Displays the respective custom messages for the URL categories.
message
Field Action
Global Select to choose the action you want to take for each reputation level.
Reputation
URLs can be processed using their reputation score if there is no category available.
Actions
Very Safe Select an option from the list for the device must take appropriate action if the site reputation
reaches the % score that is defined by you.
NOTE: If you have not defined the percentage, the default score is 90 through 100.
The options are Permit, Log and Permit, Block, and Quarantine.
Moderately Safe Select an option from the list for the device must take appropriate action if the site reputation
reaches the % score that is defined by you.
NOTE: If you have not defined the percentage, the default score is 80 through 89.
The options are Permit, Log and Permit, Block, and Quarantine.
Fairly Safe Select an option from the list for the device must take appropriate action if the site reputation
reaches the % score that is defined by you.
NOTE: If you have not defined the percentage, the default score is 70 through 79.
The options are Permit, Log and Permit, Block, and Quarantine.
897
Field Action
Suspicious Select an option from the list for the device must take appropriate action if the site reputation
reaches the % score that is defined by you.
NOTE: If you have not defined the percentage, the default score is 60 through 69.
The options are Permit, Log and Permit, Block, and Quarantine.
Harmful Select an option from the list for the device must take appropriate action if the site reputation
reaches the % score that is defined by you.
NOTE: If you have not defined the percentage, the default score is 50 through 59.
The options are Permit, Log and Permit, Block, and Quarantine.
Default Action Select an option from the list for the actions to be taken for URL categories with no assigned
action and for uncategorized URLs.
The options are Permit, Log and Permit, Block, and Quarantine.
Fallback Action Select an option from the list. The options are Log and Permit and Block.
Use this option when the ThreatSeeker Websense Cloud servers are unreachable. A timeout
occurs for requests to ThreatSeeker Cloud.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Web Filtering Profiles.
1. Select a Web filtering profile that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected Web filtering profile and select Clone.
The Clone Web Filtering Profiles page appears with editable fields. For more information on the
options, see "Add a Web Filtering Profile" on page 891.
2. Click OK to save the changes.
A cloned Web filtering profile is created for the selected Web filtering profile. By default, the name of
the cloned Web filtering profile is in the format: <Web filtering profile name>_clone.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Web Filtering Profiles.
1. Select a Web filtering profile that you want to edit on the Web Filtering page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Web Filtering Profiles page appears with editable fields. For more information on the
options, see "Add a Web Filtering Profile" on page 891.
3. Click OK to save the changes or click Cancel to discard the changes.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Web Filtering Profiles.
1. Select one or more Web filtering profiles that you want to delete from the Web Filtering page.
2. Click the delete icon available on the upper-right corner of the page.
A confirmation window appears.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
Learn about Web filtering and how to filter URLs on Content Security URL Filtering
Content Security-enabled SRX Series Firewalls by Overview | 900
using J-Web. Web filtering helps you to allow or Benefits of Content Security Web
block access to the Web and to monitor your Filtering | 901
network traffic.
Web Filtering Workflow | 901
Here's an example of a typical situation where a user of office network has access to a website blocked:
On the Web browser, the user types www.game.co.uk, a popular gaming site. The user receives a
message such as Access Denied or The Website is blocked. Display of such a message means that your
organization has inserted a filter for the gaming websites, and you can’t access the site from your
workplace.
Juniper Web (J-Web) Device Manager supports Content Security Web filtering on SRX Series Firewalls.
• In Junos CLI commands, we continue to use the legacy term UTM for content security.
In J-Web, a Web filtering profile defines a set of permissions and actions based on Web connections
predefined by website categories. You can also create custom URL categories and URL pattern lists for a
Web filtering profile.
901
NOTE: You cannot inspect URLs within e-mails using J-Web Content Security Web filtering.
• Enables you to define your own lists of allowed sites (allowlist) or blocked sites (blocklist) for
which you want to enforce a policy.
• Is the most powerful integrated filtering method and includes a granular list of URL categories,
support for Google Safe Search, and a reputation engine.
• Enables you to redirect users from a blocked URL to a user-defined URL rather than simply
preventing user access to the blocked URL.
IN THIS SECTION
Scope | 902
Topology | 903
Scope
1. Create your own custom URL pattern lists and URL categories.
2. Create a Web filtering profile using the Local engine type. Here, you define your own URL categories,
which can be allowed sites (allowlist) or blocked sites (blocklist) that are evaluated on the SRX Series
Firewall. All URLs added for blocked sites are denied, while all URLs added for allowed sites are
permitted.
3. Block inappropriate gaming websites and allow suitable websites (for example, www.juniper.net).
4. Define a custom message to display when users attempt to access gaming websites.
NOTE: Web filtering and URL filtering have the same meaning. We’ll use the term Web filtering
throughout our example.
• We assume that your device is set with the basic configuration. If not, see Configure Setup Wizard.
• You do not need a license to configure the Web filtering profile if you use the Local engine type. This
is because you will be responsible for defining your own URL pattern lists and URL categories.
• You need a valid license (wf_key_websense_ewf) if you want to try the Juniper Enhanced engine
type for the Web filtering profile. Redirect Web filtering does not need a license.
• Ensure that the SRX Series Firewall you use in this example runs Junos OS Release 22.2R1 and later.
• In Junos CLI commands, we continue to use the legacy term UTM for content security.
903
Topology
In this topology, we have a PC connected to a Content Security-enabled SRX Series Firewall that has
access to the Internet. Let's use J-Web to filter the HTTP/HTTPS requests sent to the Internet using this
simple setup.
You are here (in the J-Web UI): Security Services > Content Security > Custom Objects.
To list URLs:
Field Action
NOTE: Use a string beginning with a letter or underscore and consisting of alphanumeric characters
and special characters such as dashes and underscores. The maximum length is 29 characters.
You are here: Security Services > Content Security > Custom Objects.
To categorize URLs:
Field Action
Name Type the URL category list name as good-sites for the allowed-sites URL pattern or stop-sites
for the blocked-sites URL pattern.
NOTE: Use a string beginning with a letter or underscore and consisting of alphanumeric
characters and special characters such as dashes and underscores. The maximum length is 59
characters.
URL Patterns a. Select the URL pattern values allowed-sites or blocked-sites from the Available column to
associate the URL pattern values with the URL categories good-sites or stop-sites,
respectively.
b. Click the right arrow to move the URL pattern values to the Selected column.
906
You are here: Security Services > Content Security > Web Filtering Profiles.
Field Action
General
Timeout Type 30 (in seconds) to wait for a response from the Local engine.
Engine type Select the Local engine type for Web filtering. Click Next.
URL Categories
+ Click the add icon to open the Select URL Categories window.
Action Select Log and Permit for the good-sites category from the list.
3. Click Finish. Review the summary of the configuration and click OK to save changes.
Good job! Here's the result of your configuration:
You are here: Security Services > Content Security > Content Security Policies.
Field Action
Click Next and then click Next to skip the Antivirus configuration.
HTTP Select wf-local from the list and click Next till the end of the workflow.
3. Click Finish. Review the summary of the configuration and click OK to save changes.
Almost there! Here's the result of your configuration:
You are here: Security Services > Content Security > Default Configuration > Web Filtering.
5. Click the edit icon to modify the default web filterng policy.
The Web Filtering page appears.
6. Complete the tasks listed in the Action column in the following table:
910
Field Action
Type Select Juniper Local from the list to configure the use
of the local Content Security filtering datadbase.
URL Blocklist Select stop-sites from the list to link to the list of
URLs that are not allowed (blocked).
URL Allowlist Select good-sites from the list to link to the list of
URLs that are allowed.
Custom Block Message Enter Juniper Web Filtering has been set to block this
site.
Almost there! Here's the result of your Content Security default Web filtering configuration.
Good news! You’re done with Content Security Web filtering configuration.
NOTE: When the security policy rules are permitted, the SRX Series Firewall:
1. Intercepts an HTTP/HTTPS connection and extracts each URL (in the HTTP/HTTPS request)
or IP address.
NOTE: For an HTTPS connection, Web filtering is supported through SSL forward
proxy.
912
2. Searches for URLs in the user-configured blocklist or allowlist under Web Filtering (Security
Services > Content Security > Default Configuration). Then, if the URL is in the:
3. Checks the user-defined categories and blocks or allows the URL based on the user-specified
action for the category.
4. Allows or blocks the URL (if a category is not configured) based on the default action
configured in the Web filtering profile.
You are here: Security Policies & Objects > Security Policies.
Field Action
Rule Name Type wf-local-policy for the security policy allowing the good-sites category and
denying the stop-sites category.
d. Click OK
913
Field Action
f. Click OK
c. Click OK
NOTE: Navigate to Security Policies & Objects > Zones/Screens to create zones. Creating
zones is outside the scope of this documentation.
NOTE: Scroll back the horizontal bar if the inline tick and cancel icons are not available when
creating a new rule.
4. Click the commit icon (at the right side of the top banner) and select Commit.
The successful-commit message appears.
Step 6: Verify That the URLs Are Allowed or Blocked from the Server
Let’s verify that our configurations and security policy work fine with the defined URLs in the topology:
• If you enter www.gematsu.com and www.game.co.uk, the SRX Series Firewall should block the URLs
and send the configured blocked site message.
NOTE: Most sites use HTTPS. The blocked site messge is only seen for HTTP sites. For
HTTPS, you can expect a Secure Connection Failed error message, such as An error occurred
during a connection to <blocked-siteurl> PR_CONNECT_RESET_ERROR.
• If you enter www.juniper.net and www.google.com, the SRX Series Firewall should allow the URLs
with their homepage displayed.
915
What’s Next
Monitor Content Security Web filtering In J-Web, go to Monitor > Security Services > Content Security >
information and statistics. Web Filtering.
Generate and view reports on URLs allowed In J-Web, go to Reports. Generate reports for Threat Assessment
and blocked. Reports and Top Blocked Applications via Webfilter logs.
Learn more about Content Security features. Content Security User Guide
You configure the following Content Security configurations at the [edit security utm] hierarchy level.
custom-objects {
url-pattern {
blocked-sites {
value [ http://*.gematsu..com http://*.game.co.uk];
916
}
allowed-sites {
value [ http://*.juniper.net http://*.google.com];
}
}
custom-url-category {
good-sites {
value allowed-sites;
}
stop-sites {
value blocked-sites;
}
}
}
default-configuration {
web-filtering {
url-whitelist good-sites;
url-blacklist stop-sites;
type juniper-local;
juniper-local {
default block;
custom-block-message "Juniper Web Filtering has been set to block this
site.";
fallback-settings {
default log-and-permit;
server-connectivity log-and-permit;
timeout log-and-permit;
too-many-requests log-and-permit;
}
}
}
}
feature-profile {
web-filtering {
juniper-local {
profile wf-local {
category {
917
stop-sites {
action block;
}
good-sites {
action log-and-permit;
}
}
timeout 30;
}
}
}
}
utm-policy wf-custom-policy {
web-filtering {
http-profile wf-local;
}
}
You configure the security policy rules at the [edit security policies] hierarchy level.
CHAPTER 76
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Content Security > Antispam Profiles.
Use the Antispam Profiles page to view and manage antispam profiles. An antispam profile is used to
examine transmitted e-mail messages to identify e-mail spam by using a constantly updated spam block
list.
• View the details of an antispam profile—To do this, select the antispam profile for which you want to
view the details and follow the available options:
• Mouse over to the left of the selected antispam profile and click Detailed View.
• Advanced search for antispam profiles. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
• Filter the antispam profiles based on select criteria. To do this, select the filter icon at the upper-right
corner of the antispam profiles table. The columns in the grid change to accept filter options. Type
the filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the antispam profiles table. To do this, click the Show Hide Columns icon in
the upper-right corner of the antispam profiles table and select the options you want to view or
deselect the options you want to hide on the page.
Field Descriptions
Table 256 on page 920 describes the fields on the Antispam Profiles page.
920
Field Description
Sophos Blocklist Indicates whether Sophos Blocklist is enabled (server-based filtering) or disabled (local
filtering).
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antispam Profiles.
Field Action
General Information
Sophos Blocklist Enable this option to use server-based spam filtering. By default, this option is enabled.
NOTE: If you disable this option, then local spam filtering is used.
Action
Default Action Select an option to be taken when a spam message is detected. The options available are:
• Tag E-Mail Subject Line—Adds a custom string at the beginning of the subject of the e-
mail.
Custom Tag Enter a custom string for identifying a message as spam. By default, the device uses
***SPAM***.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antispam Profiles.
922
1. Select an antispam profile that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected antispam profile and select Clone.
The Clone Antispam Profiles page appears with editable fields. For more information on the fields,
see "Add an Antispam Profile" on page 920.
2. Click OK to save the changes.
A cloned antispam profile is created for the selected antispam profile. By default, the name of the
cloned antispam profile is in the format: <Antispam profile name>_clone.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antispam Profiles.
1. Select an existing antispam profile that you want to edit on the Antispam Profiles page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Antispam Profiles page appears. You can modify any previous changes done to Sophos
Blocklist, Default Action, and Custom Tag for the selected antispam profile. For more information on
the options, see "Add an Antispam Profile" on page 920.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Antispam Profiles.
1. Select one or more antispam profiles that you want to delete on the Antispam Profiles page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 77
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Content Security > Content Filtering Profiles.
• Add a content filtering profile. See "Add a Content Filtering Profile" on page 926.
• Clone a content filtering profile. See "Clone a Content Filtering Profile" on page 930
• Edit a content filtering profile. See "Edit a Content Filtering Profile" on page 931.
925
• Delete a content filtering profile. See "Delete a Content Filtering Profile" on page 932.
• View the details of a content filtering profile—To do this, select the content filtering profile for which
you want to view the details and follow the available options:
• Right-click on the selected content filtering profile and select Detailed View.
• Mouse over to the left of the selected content filtering profile and click Detailed View.
• Advanced search for content filtering profiles. To do this, use the search text box present above the
table grid. The search includes the logical operators as part of the filter string. In the search text box,
when you hover over the icon, it displays an example filter condition. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
• Filter the content filtering profiles based on select criteria. To do this, select the filter icon at the
upper-right corner of the content filtering profiles table. The columns in the grid change to accept
filter options. Type the filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the content filtering profiles table. To do this, click the Show Hide Columns
icon in the upper-right corner of the content filtering profiles table and select the options you want
to view or deselect the options you want to hide on the page.
Field Descriptions
Table 258 on page 926 describes the fields on the Content Filtering Profiles page.
926
Field Description
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Filtering Profiles.
Field Action
Notification Options
Notification Mail Select the Notify Mail Sender check box to send an e-mail when a virus is detected and a
Sender content block is triggered.
Notification Type Select the None, Protocol Only, or Message options from the list to specify the type of
notification sent when a content block is triggered.
Custom Specifies the customized message text for the content-block notification.
Notification
Enter the text for this custom notification message (if you are using one).
Message
Protocol Commands
928
Table 259: Fields on the Create Content Filtering Profiles Page (Continued)
Field Action
Command Block Select the protocol command name to be blocked from the list. By blocking certain
List commands, traffic can be controlled on the protocol command level.
To create a protocol command inline and add it to the command block list:
You can use a string beginning with an alphabet or underscore and consisting of
alphanumeric characters, special characters such as dashes and underscores. The
maximum length is 29 characters.
• Values—Click + and enter a value in the value list and click the tick mark.
To delete any value list, select the value and click on the delete icon.
3. Click OK.
A new protocol command is created and added to the command block list.
Command Permit Select the protocol command name to be permitted from the list.
List
Click Create Protocol Command to create a protocol command inline and add it to the
permitted list.
Content Types
929
Table 259: Fields on the Create Content Filtering Profiles Page (Continued)
Field Action
• ActiveX
• HTTP Cookie
• Java Applet
• ZIP files
File Extensions
Extension Block Select an extension from the list that you want to block.
List
To create a file extension inline and add it to the extension block list:
You can use a string beginning with an alphabet or underscore and consisting of
alphanumeric characters, special characters such as dashes and underscores. The
maximum length is 29 characters.
• Values—Select one or more values in the Available Column and move it to the
Selected Column using the right arrow.
3. Click OK.
A new file extension is created and added to the extension block list.
MIME Types
930
Table 259: Fields on the Create Content Filtering Profiles Page (Continued)
Field Action
MIME Block List Select the MIME type from the list.
To create a MIME list inline and add it to the MIME block list:
You can use a string beginning with an alphabet or underscore and consisting of
alphanumeric characters, special characters such as dashes and underscores. The
maximum length is 40 characters.
• Values—Click + and enter a value in the value list and click the tick mark.
To delete any value list, select the value and click on the delete icon.
3. Click OK.
A new MIME list is created and added to the MIME block list.
MIME Permit List Select the MIME type from the list.
Click Create MIME List to create a MIME list inline and add it to the MIME permit list.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Filtering Profiles.
1. Select a content filtering profile that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected content filtering profile and select
Clone.
The Clone Content Filtering Profiles page appears with editable fields. For more information on the
fields, see "Add a Content Filtering Profile" on page 926.
2. Click OK to save the changes.
A cloned content filtering profile is created for the selected content filtering profile. By default, the
name of the cloned content filtering profile is in the format: <Content filtering profile name>_clone.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Filtering Profiles.
1. Select an existing content filtering profile that you want to edit on the Content Filtering profiles page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Content Filtering Profiles page appears with editable fields. For more information on the
options, see "Add a Content Filtering Profile" on page 926.
NOTE: Alternatively, you can right-click on the selected content filtering profile and select
Edit Profile.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Filtering Profiles.
1. Select a content filtering profile that you want to delete on the Content Filtering Profiles page.
2. Click the delete icon available on the upper-right corner of the page.
NOTE: Alternatively, you can right-click on the selected content filtering profile and select
Delete Profile.
RELATED DOCUMENTATION
CHAPTER 78
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Content Security > Custom Objects.
Use the Custom Objects page to define your own objects for URL filtering, antivirus filtering, and
content filtering.
934
• Add a MIME pattern list. See "Add a MIME Pattern List" on page 936.
• Add a file extension list. See "Add a File Extension List" on page 938.
• Add a protocol command list. See "Add a Protocol Command List" on page 938.
• Add an URL pattern list. See "Add a URL Pattern List" on page 939.
• Add an URL category list. See "Add a URL Category List" on page 940.
• Add a custom message list. See "Add a Custom Message List" on page 942.
• View the details of custom objects—To do this, select the custom object for which you want to view
the details and follow the available options:
• Mouse over to the left of the selected custom object and click Detailed View.
• Filter the custom objects based on select criteria. To do this, select the filter icon at the upper-right
corner of the custom objects table. The columns in the grid change to accept filter options. Type the
filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the custom objects table. To do this, click the Show Hide Columns icon in
the upper-right corner of the custom objects table and select the options you want to view or
deselect the options you want to hide on the page.
• Advance search for custom objects. To do this, use the search text box present above the table grid.
The search includes the logical operators as part of the filter string. In the search text box, when you
hover over the icon, it displays an example filter condition. When you start entering the search string,
the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
935
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 260 on page 935 describes the fields on the Custom Objects page.
Field Description
Field Description
Value Displays only the predefined URL categories from the SurfControl server. You can also
configure URLs. The URLs configured in the URL pattern list are displayed here.
Name Displays the name of the custom message that you have created.
Type Displays the type of custom message. The options are Redirect-URL or User Message.
Content Displays the content of the custom message. It is either a user message or a URL to
which you will be redirected.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
Field Action
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 40 characters.
1. Click +.
• The first string beginning with a letter or number and consisting of alphanumeric characters,
underscores and dashes. Dashes cannot be shown continuously in the string.
• The second string can be null or begin with a letter or number and consisting of alphanumeric
characters, underscores, dashes, dots and pluses. Dashes, dots, and pluses cannot be shown
continuously in the string.
If you want to delete any MIME pattern values, select the value and click the delete icon.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
Field Action
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 29 characters.
Value Select values from the list in the Available column to associate it with the file extension name and then
click the right arrow to move it to the Selected column.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
Field Action
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 29 characters.
1. Click +.
If you want to delete any protocol command values, select the value and click the delete icon.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
4. Click OK to save the changes. If you want to discard your changes, click Cancel.
Field Action
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 29 characters.
1. Click +.
If you want to delete any URL pattern values, select the value and click the delete icon.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
Table 265 on page 941 provides guidelines on using the fields on the Add URL Category List page.
Field Action
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 59 characters.
Value Select values from the list in the Available column to associate it with the URL category list name and
then click the right arrow to move it to the Selected column.
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 29 characters.
6. Optional. If you want to delete any URL pattern values, select the value and click the delete icon.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
Field Action
You can use a string beginning with a letter or underscore and consisting of alphanumeric characters,
special characters such as dashes and underscores. The maximum length is 59 characters.
• User Message—Specifies that website access has been blocked by an organization's access policy.
Content Enter content of the custom message; maximum length is 1024 characters. It is either a user message
or a URL to which you will be redirected.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
1. Right-click any of the custom objects and select Clone. You can also select Clone from the More link.
The clone page for the selected custom object appears with editable fields.
2. Make the required changes in the editable fields.
3. Click OK to save the changes.
A cloned custom object is created for the selected custom objects. By default, the name of the
cloned custom objects is in the format: <custom objects name>_clone.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
944
1. Select any of the existing custom objects that you want to edit on the Custom Objects page.
2. Click the pencil icon available on the upper-right corner of the page.
The edit page for the selected custom object appears with editable fields. You can modify the
parameters of the custom object as required.
3. Click OK to save the changes. If you want to discard your changes, click Cancel.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Custom Objects.
1. Select any of the existing custom objects that you want to delete from the Custom Objects page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the selected custom object.
RELATED DOCUMENTATION
CHAPTER 79
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Content Security > Content Security Policies.
• Create a Content Security policy. See "Create a Content Security Policy" on page 948.
• Clone a Content Security policy. See "Clone a Content Security Policy" on page 951.
• Edit a Content Security policy. See "Edit a Content Security Policy" on page 952.
947
• Delete a Content Security policy. See "Delete a Content Security Policy" on page 952.
• View the details of a Content Security policy—To do this, select the Content Security policy for which
you want to view the details and select any of the following options:
• Right-click on the selected Content Security policy and select Detailed View.
• Mouse over to the left of the selected Content Security policy and click Detailed View.
• Advanced search for Content Security policy. To do this, use the search text box present above the
table grid. The search includes the logical operators as part of the filter string. In the search text box,
when you hover over the icon, it displays an example filter condition. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
• Show or hide columns in the Content Security Policies table. To do this, click the Show Hide Columns
icon in the upper-right corner of the Content Security policies table and select the options you want
to view or deselect the options you want to hide on the page.
Field Descriptions
Table 267 on page 948 describes the fields on the Content Security Policies page.
948
Field Description
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Security Policies.
Field Action
General—General Information
Apply to all protocols Select the check box to apply the default profile to all protocols such as HTTP, FTP,
IMAP, SMTP, and POP3.
If you do not select the check box, you can apply different profiles to different
protocols.
HTTP Select an option from the list to specify the Content Security policy for the HTTP
protocol to be scanned.
FTP Upload Select an option from the list to specify the Content Security policy for the FTP protocol
to be scanned.
FTP Download Select an option from the list to specify the Content Security policy for the FTP protocol
to be scanned.
IMAP Select an option from the list to specify the Content Security policy for the IMAP
protocol to be scanned.
SMTP Select an option from the list to specify the Content Security policy for the SMTP
protocol to be scanned.
POP3 Select an option from the list to specify the Content Security policy for the POP3
protocol to be scanned.
Create Another Profile Click Create Another Profile to create an antivirus profile inline. For more information
on the fields, see "Add an Antivirus Profile" on page 860.
Table 268: Fields on the Create a Content Security Policy Page (Continued)
Field Action
HTTP Select an option from the list to specify the Content Security policy for the HTTP
protocol to be scanned.
Create Another Profile Click Create Another Profile to create Web filtering profile inline. For more information
on the fields, see "Add a Web Filtering Profile" on page 891.
SMTP profile Select an option from the list to specify the Content Security policy for the SMTP
protocol to be scanned.
Create Another Profile Click Create Another Profile to create antispam profile inline. For more information on
the fields, see "Add an Antispam Profile" on page 920.
Apply to all protocols Select the check box to apply the default profile to all protocols such as HTTP, FTP,
IMAP, SMTP, and POP3.
If you do not select the check box, you can apply different profiles to different
protocols.
HTTP Select an option from the list to specify the Content Security policy for the HTTP
protocol to be scanned.
FTP Upload Select an option from the list to specify the Content Security policy for the FTP protocol
to be scanned.
FTP Download Select an option from the list to specify the Content Security policy for the FTP protocol
to be scanned.
IMAP Select an option from the list to specify the Content Security policy for the IMAP
protocol to be scanned.
951
Table 268: Fields on the Create a Content Security Policy Page (Continued)
Field Action
SMTP Select an option from the list to specify the Content Security policy for the SMTP
protocol to be scanned.
POP3 Select an option from the list to specify the Content Security policy for the POP3
protocol to be scanned.
Create Another Profile Click Create Another Profile to create content filtering Profile inline. For more
information on the fields, see "Add a Content Filtering Profile" on page 926.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Security Policies.
1. Select a Content Security policy that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected Content Security policy and select
Clone.
The Clone Content Security Policies page appears with editable fields. For more information on the
fields, see "Create a Content Security Policy" on page 948.
2. Click OK to save the changes.
952
A cloned Content Security policy is created for the selected Content Security policy. By default, the
name of the cloned Content Security policy is in the format: <Content Security policy name>_clone.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Security Policies.
1. Select an existing Content Security policy that you want to edit on the Content Security Policies
page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Content Security Policies page appears with editable fields. For more information on the
options, see "Create a Content Security Policy" on page 948.
NOTE: Alternatively, you can right-click on the selected Content Security policy and select
Edit Policy.
RELATED DOCUMENTATION
You are here: Security Services > Content Security > Content Security Policies.
1. Select a Content Security policy that you want to delete on the Content Security Policies page.
2. Click the delete icon available on the upper-right corner of the page.
NOTE: Alternatively, you can right-click on the selected Content Security policy and select
Delete Policy.
RELATED DOCUMENTATION
CHAPTER 80
IPS Policies
IN THIS CHAPTER
IN THIS SECTION
An intrusion prevention system (IPS) policy defines how your device handles the network traffic. It
allows you to enforce various attack detection and prevention techniques on traffic traversing your
network. You can define policy rules to match a section of traffic based on a zone, network, and
application, and then take active or passive preventive actions on that traffic.
955
• Import predefined policies. See "Import IPS Predefined Policies" on page 956.
• Set an IPS policy as default policy. To do this, select an existing IPS policy and click More > Set
Default.
NOTE: IPS policies that are created by root users in root-logical-system are not displayed in
security profile advanced settings if you have logged in as a logical system user.
• Add rules to the IPS policy. See "Add Rules to an IPS Policy" on page 959.
• Edit an IPS policy rule. See "Edit an IPS Policy Rule" on page 969.
• Delete an IPS policy rule. See "Delete an IPS Policy Rule" on page 970.
1. Click the search icon in the upper-right corner of the IPS Policies table.
2. Enter the policy name that you want to find and click the search icon.
• Show or hide columns in the IPS Policies table. To do this, click the Show Hide Columns icon in the
upper-right corner of the IPS Policies table and select the options you want to view or deselect the
options you want to hide on the page.
Field Descriptions
Table 269 on page 956 describes the fields on the IPS Policies page.
956
Field Description
Rules Displays the number of rules that are configured for the policy or allows you to add new
rules to the policy.
NOTE: This option is not available for logical systems and tenants.
RELATED DOCUMENTATION
The predefined policies are templates which can be used as a guideline. Each template is set of rules of a
specific rulebase type that you can clone and then update to meet your needs. Use this page to import
the IPS predefined policies.
NOTE: This option is not available for logical systems and tenants.
1. Click Import Predefined Policies at the upper-right corner of the IPS Policies page.
The Import Predefined Policies page appears.
2. Select the predefined policy templates from the Available column that you want to import.
3. Click on the right arrow to move the selected predefined policy templates to the Selected column.
957
4. Click OK.
The imported predefined policy template are displayed in the IPS Policies page.
RELATED DOCUMENTATION
RELATED DOCUMENTATION
1. Select an IPS policy that you want to clone and click More > Clone on the upper-right corner of the
IPS Policies page.
The Clone IPS Policy page appears with the editable name field. By default, the clone name will show
as <IPS policy name>_clone.
2. Click OK to save the changes. If you want to discard your changes, click Cancel.
You can see the cloned IPS policy on the IPS Policies page. You can edit the rules of the cloned IPS
policy. For more information on the IPS policy and its rules, see "Add an IPS Policy" on page 957 and
"Add Rules to an IPS Policy" on page 959.
RELATED DOCUMENTATION
1. Select an existing IPS policy that you want to edit on the IPS Policies page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit IPS Policy page appears with editable fields. For more information on the options, see "Add
an IPS Policy" on page 957.
NOTE: Alternatively, you can right-click on the selected IPS policy and select Edit.
RELATED DOCUMENTATION
1. Select an IPS policy that you want to delete on the IPS Policies page.
2. Click the delete icon available on the upper-right corner of the page.
NOTE: Alternatively, you can right-click on the selected IPS policy and select Delete.
RELATED DOCUMENTATION
NOTE: You can only add rules for the custom IPS policies.
960
1. Click Add Rules or on the rule number available next to the column of your IPS policy name.
The IPS Rules page appears.
2. Click + on the upper-right corner of the IPS Rules or Exempt Rules page.
The IPS Rules or Exempt Rules page with the inline editable fields will appear.
3. Complete the configuration according to the guidelines provided in Table 270 on page 960.
4. Click the tick icon on the right-side of the row once done with the configuration.
Once you configure the IPS policy rules, you can associate the IPS policy with the security policy.
Field Action
Rule Name Enter the rule name for the IPS policy.
Network Criteria
Sources
Source zone Select a source zone to be associated with the IPS policy:
• Specific—Select a source zone from the list where network traffic originates.
Source addresses Select a source address to be associated with the IPS policy:
Select the addresses from the Available column and then click the right arrow to
move it to the Selected column. You can select Exclude Selected to exclude only
the selected address from the list.
Destinations
961
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
Destination zone Select a destination zone to be associated with the IPS policy:
• Specific—Select a destination zone from the list to which network traffic is sent.
Destination addresses Select a destination address to be associated with the IPS policy:
Select the addresses from the Available column and then click the right arrow to
move it to the Selected column. You can select Exclude Selected to exclude only
the selected address from the list.
IPS Signatures
Add Select predefined or custom signatures from the list to add it to the IPS policy rules.
Delete Select the IPS signatures you do not want to add to the IPS policy rules and click the
delete icon.
Category Displays the predefined attack or attack groups categories. For example, App, HTTP,
and LDAP.
Severity Displays the attack severity level that the signature reports.
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
Recommended Action Displays the specified action taken from the device when it detects an attack. For
example, ignore and drop.
View by View and select the desired predefined attacks or attack groups and click OK to add
it to the selected IPS policy.
Show or Hide Columns Use the Show Hide Columns icon in the upper-right corner of the page and select the
options you want to show or deselect to hide options on the page.
Name Displays name of the predefined attack objects or attack object group.
Category Displays the predefined attack or attack groups categories. For example, App, HTTP,
and LDAP.
Severity Displays the attack severity level that the signature reports.
Recommended Displays the added predefined attacks recommended by Juniper Networks to the
dynamic attack group.
Recommended Action Displays the specified action taken from the device when it detects an attack. For
example, ignore and drop.
Performance Displays a performance filter (fast, normal, slow, and unknown) to add attack objects
based on the performance level that is vulnerable to the attack.
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
View by View and select the desired custom attacks, static groups, or dynamic groups and
click OK to add it to the selected IPS policy.
Severity Displays the attack severity level that the signature reports.
Recommended Action Displays the specified action taken from the device when it detects an attack. For
example, ignore and drop.
Group Members Displays the name of the attack object or group attack object. The members can be
predefined attacks, predefined attack groups, custom attacks, or custom dynamic
groups.
Attack Prefix Displays prefix match for attack names. For example: HTTP:*
Severity Displays the attack severity level that the signature reports.
964
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
Category Displays the dynamic attack groups categories. For example, App, HTTP, and LDAP.
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
• No Action—No action is taken. Use this action when you want to only generate
logs for some traffic.
• Drop Packet—Drops a matching packet before it can reach its destination but
does not close the connection. Use this action to drop packets for attacks in
traffic that is prone to spoofing, such as UDP traffic. Dropping a connection for
such traffic could result in a denial of service that prevents you from receiving
traffic from a legitimate source-IP address.
• Close Client—Closes the connection and sends an RST packet to the client but
not to the server.
• Close Server—Closes the connection and sends an RST packet to the server but
not to the client.
• Close Client & Server—Closes the connection and sends an RST packet to both
the client and the server.
Options
Log Attacks Enable the log attacks to create a log record that appears in the log viewer.
966
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
Log Packets Enable the log packets to capture the packets received before and after the attack for
further offline analysis of attacker behavior.
Advanced
NOTE: This option is not available for exempt rules.
Threat Profiling
NOTE: Feeds are only displayed if you have enrolled to Juniper ATP Cloud. You can also download the feeds
using the command, request services security-intelligence download.
Add attacker to feed Select from the list to add the attackers IP addresses to the feed to configure IPS rule
with threat profiles.
Add target to feed Select from the list to add the target IP addresses to the feed to configure IPS rule
with threat profiles.
Notifications
Packets before Enter the number of packets processed before the attack is captured.
Packets after Enter the number of packets processed after the attack is captured.
Post window timeout Enter the time limit for capturing post-attack packets for a session. No packet
capture is conducted after the timeout has expired.
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
Alert Flag Enable this option to set an alert flag in the Alert column of the Log Viewer for the
matching log record.
IP Actions
Action Specifies the action that IPS takes against future connections that use the same IP
address.
• Notify—Don't take any action on future traffic but log the event.
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
IP Target Configure how the traffic should be matched to the configured IP actions.
• Service—For TCP and UDP, match traffic based on the source IP address, source
port, destination IP address, and destination port of the attack traffic.
• Source zone—Match traffic based on the source zone of the attack traffic.
• Source zone address—Match traffic based on the source zone and source IP
address of the attack traffic.
Refresh timeout Enable refresh of the IP action timeout (that you specify in the Timeout field) if
future traffic matches the configured IP actions.
Timeout Specifies the number of seconds the IP action should remain effective before new
sessions are initiated within that specified timeout value.
Enter the timeout value, in seconds. The maximum value is 65,535 seconds. Default
is 300 seconds.
Log IP-Action hits Enable to log information about the IP action against the traffic that matches a rule.
By default, this setting is disabled.
Log IP-Action rule Enable to generate an event when the IP action filter is triggered. By default, this
creation setting is disabled.
Rule Modifiers
969
Table 270: Fields on the IPS Rules or Exempt Rules Page (Continued)
Field Action
Severity override Severity level (None, Critical, Info, Major, Minor, Warning) to override the inherited
attack severity in the rules. The most dangerous level is critical, which attempts to
crash your server or gain control of your network. Informational level is least
dangerous and is used by network administrators to find flaws in their security
systems.
Terminal matching Enable to mark an IPS rule as terminal. When a terminal rule is matched, the device
stops matching for the remaining rules in that IPS policy.
RELATED DOCUMENTATION
1. Click on the existing IPS policy rule on the IPS Policies page.
The IPS Rules page appears.
2. Select the IPS or exempt rules you want to edit.
3. Click the pencil icon available on the upper-right corner of the page.
Editable fields on the IPS Rules or Exempt Rules page appears.
NOTE: Alternatively, you can right-click on the selected IPS policy and select Edit.
970
4. Edit the required options and click the tick icon on the right-side of the row once done with the
configuration.
For more information on the rules options, see "Add Rules to an IPS Policy" on page 959.
RELATED DOCUMENTATION
1. Click on the existing IPS policy rule on the IPS Policies page.
The IPS Rules page appears.
2. Select the IPS or exempt rules you want to delete.
3. Click the delete icon available on the upper-right corner of the page.
4. Click Yes to delete or click No to retain the rule.
RELATED DOCUMENTATION
CHAPTER 81
IPS Signatures
IN THIS CHAPTER
IN THIS SECTION
The intrusion prevention system (IPS) compares traffic against signatures of known threats and blocks
traffic when a threat is detected. Network intrusions are attacks on, or other misuses of, network
resources. To detect such activity, IPS uses signatures. A signature specifies the types of network
intrusions that the device should detect and report. Whenever a traffic pattern matches a signature, IPS
triggers the alarm and blocks the traffic from reaching its destination. One of the key components of IPS
is the signature database. It contains definitions of different objects that is used in defining IPS policy
rules, such as attack objects, application signature objects, and service objects.
972
You can group the attack objects to keep IPS policies organized and manageable. An attack object group
can contain one or more types of attack objects. Junos OS supports the following three types of attack
groups:
• Dynamic group—Contains attack objects that meets the specified matching criteria. During a
signature update, dynamic group membership is automatically updated based on the matching
criteria for that group. For example, you can dynamically group the attacks that are related to a
specific application using dynamic attack group filters.
• Static group—Contains a list of attacks that are specified in the attack definition.
• Associate IPS signatures to IPS policies. To do this, click IPS Policies link available below the IPS
Signatures page title to directly navigate to the IPS Policies page. Then, click Add rules to assign the
IPS signature to a specific policy. For more information, see "Add Rules to an IPS Policy" on page 959.
• View the list of IPS signature predefined attacks or attack groups. To do this, click the PREDEFINED
tab and select Predefined Attacks or Predefined Attack Group from the View by list.
• View the details of a predefined IPS signature. To do this, select an existing IPS signature on the
PREDEFINED tab and follow the available options:
• Hover over to the left of the selected IPS signature name and click the Detailed View icon.
• View the custom signatures of custom attacks, static groups, or dynamic groups. To do this, click the
CUSTOM tab and select Custom Attacks, Static Groups, or Dynamic Groups from the View by list.
• Import snort rules to convert them as custom attacks. See "Import Snort Rules" on page 976.
• Create IPS signature custom attacks. See "Create a Custom IPS Signature" on page 977.
• Create IPS signature static groups. See "Create IPS Signature Static Groups" on page 993.
• Create IPS signature dynamic groups. See "Create IPS Signature Dynamic Group" on page 996.
• View the details of an IPS signature for custom attacks, static groups, and dynamic groups. To do this,
select an existing IPS signature, static group, or dynamic group on the CUSTOM tab and follow the
available options:
973
• Hover over to the left of the selected IPS signature and click Detailed View.
• Show or hide columns in the Predefined table. To do this, click the Show Hide Columns icon in the
upper-right corner of the Predefined table. Then, select the options you want to view or clear the
options you want to hide on the page.
• Advanced search for predefined or custom IPS signatures. To do this, use the search text box present
above the table grid. The search includes the logical operators as part of the filter string. In the search
text box, when you hover over the icon, it displays an example filter condition. When you start
entering the search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press spacebar to add an AND operator or OR operator to the search string.
Predefined signatures support only the AND operator. Press backspace at any time when
typing a search criteria to delete only one character.
Field Descriptions
Table 271 on page 974 and Table 272 on page 975 describes the fields on the IPS Signatures page.
974
Field Description
Severity Displays the severity level of the attack that the signature will report.
Attack Type Displays if the type of attack object is signature, anomaly, or chain.
Recommended Indicates whether the attack objects are recommended by Juniper (True) or not (False).
Recommended Action Displays the action or actions taken when the monitored traffic matches the attack
objects specified in the IPS rules.
False Positive Displays the frequency or frequencies with which the attack produces a false positive on
your network.
Direction Displays the traffic direction or traffic directions for which the attack is detected. For
example, client to server.
Service Displays the protocol, service, or list of both protocol and services that the attack uses
to enter your network.
975
Field Description
Severity Displays the severity level of the attack that the signature will report.
Attack Type Displays if the type of attack object is signature, anomaly, or chain.
Recommended Action Displays the action taken when the monitored traffic matches the attack objects
specified in the IPS rules.
Group Members Displays the IPS signatures or IPS signature dynamic groups that are part of the IPS
static group.
Attack Prefix Displays the value or values for attack name prefix match.
Severity Displays the severity level or severity levels of the attack that the signature will report.
Attack Type Displays if the type of attack object is signature, anomaly, or chain.
Field Description
Direction Displays the traffic direction or traffic directions for which the attack is detected. For
example, client to server.
Attack Excluded Displays the excluded attack or attacks that are part of the database updates.
File Type Displays the attack file type or file types that are used as a dynamic group filter.
False Positive Displays the frequency or frequencies with which the attack produces a false positive on
your network.
Recommended Indicates whether the attack objects are recommended by Juniper (True) or not (False).
Service Displays the protocol, service, or list of protocols and services that the attack uses to
enter your network.
Vendor Displays the vendor or product that the attack belongs to.
Vulnerability Type Displays the attack vulnerability type or vulnerability types that are used as a dynamic
group filter.
Performance Performance impact filter or filters used for the dynamic group.
CVSS Score Displays the Common Vulnerability Scoring System (CVSS) score or scores that is used
as a dynamic group filter.
Age of attack Displays the age of the attack (in years) that is used as a dynamic group filter.
Snort is an open-source intrusion prevention system (IPS) and help detect malicious attacks. You can
convert the Snort IPS rules into Juniper IPS custom attack signatures using the Juniper Integration of
977
Snort Tool (JIST). By default, Junos OS includes the JIST. The tool supports Snort version 2 and version 3
rules.
NOTE: This option is only available if you have selected Custom Attacks in the View by list.
The Custom Signatures page lists the converted custom attack signatures. The unconverted rules and
error log files are downloaded automatically.
RELATED DOCUMENTATION
Create custom attack objects to detect a known or unknown attack for protecting your network.
3. Complete the configuration according to the guidelines provided from Table 273 on page 978 to
Table 276 on page 986.
4. Click OK to save the changes. If you want to discard your changes, click Cancel.
You are returned to the Custom Signatures page and displays the custom signatures that you
successfully created.
Field Action
General
Field Action
Recommended action Select an action from the list to perform when the
device detects an attack:
Field Action
Severity Select a severity from the list that matches the attack
object severity on your network:
• Peer-to-Peer (P2P)
• Disrupt a service.
Detection Filter
981
Field Action
Time count Set the number of times that the attack object must
detect an attack within the specified scope. The
detection occurs before the device determines if or not
the attack object matches the attack.
Time scope Select the scope from the list within which the count
occurs:
Time interval Enter the maximum time interval between any two
instances of a time-binding custom attack.
Signature
982
Field Action
Attack type Select one of the following attack type from the list:
Field Action
Context Select an attack context from the list which defines the
location of the signature where IPS should look for the
attack in a specific Application Layer protocol.
Protocol binding Select a protocol from the list that the attack uses to
enter your network.
983
Field Action
Protocol number Set the transport layer protocol number which allows
IPS to match the attack to it.
Program number Set the remote procedure call (RPC) program number
which allows to match the attack to it.
Field Action
Direction Select the traffic direction from the list for which the
attack is detected:
Content
For example:
Field Action
Field Action
Test anomaly Select a protocol anomaly test condition from the list
to be checked.
Direction Select a traffic direction from the list for which the
attack is detected:
Field Action
Protocol binding Select a protocol from the list that the attack uses to
enter your network.
987
Field Action
Protocol Number Set the transport layer protocol number which allows
IPS to match the attack to it.
Program Number Set the remote procedure call (RPC) program number
which allows to match the attack to it.
Field Action
Chain order expressions Select a Boolean expression that defines the condition
for the individual members of a chain attack that will
decide if the chain attack is hit:
Add signatures
Edit (pencil icon) Select an existing signature that you want to edit. Click
the edit (pencil) icon, make the required changes, and
click OK.
989
Field Action
Delete (trash can icon) Select an existing signature that you want to delete.
Click the delete (trash can) icon and click Yes.
Context Select the attack context from the list which defines
the location of the signature where IPS should look for
the attack in a specific Application Layer protocol.
Direction Select a traffic direction from the list for which the
attack is detected:
Content
Field Action
Field Action
Add anomaly
Edit (pencil icon) Select an existing anomaly that you want to edit. Click
the edit (pencil) icon, make the required changes, and
click OK.
Delete (trash can icon) Select an existing anomaly that you want to delete.
Click the delete (trash can) icon and click Yes.
992
Field Action
Direction Select a traffic direction from the list for which the
attack is detected:
RELATED DOCUMENTATION
Create static groups for better manageability because you can group different types of signatures into
one entity.
Field Action
Group Members
Predefined Attack Groups Select one or more predefined attack groups and click
OK to add predefined attack groups to the static group.
994
Field Action
Three vertical dots Click the Show Hide Columns icon, then select options
to view or clear the options to hide on the page.
Advanced Search 1. Enter the search string in the search text box
present above the table grid.
Custom Signatures
• Custom Attacks
• Static Groups
• Dynamic Groups
Custom Attacks Select one or more custom attacks and click OK to add
custom attacks to the static group.
995
Field Action
Static Groups Select one or more static groups and click OK to add
static groups to the static group.
Three vertical dots Click the Show Hide Columns icon, then select options
to view or clear the options to hide on the page.
Advanced Search 1. Enter the search string in the search text box
present above the table grid.
RELATED DOCUMENTATION
Create a dynamic attack group to select its members based on the specified filters in the group. The list
of attacks is updated (added or removed) automatically when a new signature database is used.
Field Action
Filter Criteria
Attack prefix Select one or more values from the list for the attack
name prefix match.
997
Field Action
Severity Select one or more severity values from the list to add
attack objects based on the attack severity levels
(critical, info, major, minor, or warning).
Service Select one or more service values from the list to add
attack objects based on the attack service. For
example, BGP, FTP, and HTTP.
Category Select one or more category values from the list to add
attack objects based on the category.
Field Action
Field Action
False positives Select one or more false positives value from the list:
Attack type Select Anomaly or Signature attack type from the list. If
you choose None, no action will be taken.
Field Action
CVSS score Select Greater than or Less than from the list to specify
the Common Vulnerability Scoring System (CVSS) score
of the attack.
Greater than Set to match the CVSS score greater than the value
specified.
Range: 0 through 10
Less than Set to match the CVSS score lesser than the value
specified.
Range: 0 through 10
Age of attack Select Greater than or Less than from the list to specify
the age of the attack.
File type Select the file type from the list that the attack targets.
For example, HTML and PDF.
Vulnerability type Select the vulnerability type for IPS from the list that
indicates which applications are weak and can be
manipulated. The vulnerability type is reported for
fixing these vulnerabilities.
1001
Field Action
1. Click +.
RELATED DOCUMENTATION
You can clone both the predefined and the custom IPS signatures.
3. Click More > Clone on the upper-right corner of the Predefined Signatures page.
The Clone Predefined Group Details page appears.
4. Edit the required fields and click OK.
The cloned signature is displayed on the Predefined Signatures page.
NOTE: By default, the name of the cloned signature is in the <Signature name>_clone format.
2. Select an existing custom IPS signature, static group, or dynamic group that you want to clone.
3. Click More > Clone on the upper-right corner of the Custom Signatures page.
The Clone <Custom Attack or Static Group or Dynamic Group> page appears.
NOTE: By default, the name of the cloned signature is in the <Signature name>_clone format.
RELATED DOCUMENTATION
You can edit a custom IPS signature, static group, or dynamic group.
NOTE: When editing a dynamic group, click Preview Filtered Signatures at the bottom of the
page to view the list of filtered signatures.
NOTE: You cannot edit the name of the custom IPS signature, static group, or dynamic group.
RELATED DOCUMENTATION
You can delete one or more custom IPS signature, static group, or dynamic group.
2. Select one or more existing custom IPS signatures, static groups, or dynamic groups that you want to
delete on the Custom Signatures page.
NOTE: Alternatively, you can right-click on the selected name and select Delete.
3. Click the delete icon on the upper-right corner of the Custom Signatures page.
4. Click Yes to delete or click No to retain the existing custom IPS signatures, static groups, or dynamic
groups.
RELATED DOCUMENTATION
CHAPTER 82
IPS Sensor
IN THIS CHAPTER
IN THIS SECTION
You can configure sensor settings to limit the number of sessions running application identification and
also to limit memory usage for application identification.
Field Descriptions
Table 279 on page 1005 describes the fields on the Sensor page.
Field Description
Packet Capture
Local Storage Enable this option to store the PCAP file locally (/var/log/pcap/idp/) on the SRX
Series Firewall.
1006
Field Description
Maximum files Enter or select the maximum number of unique packet capture files to create before
the oldest file is overwritten by a newly created file.
Storage limit Enter or select the maximum disk space (Megabytes) that can be used in the Routing
Engine for packet capture files.
External Server Enable this option to send the PCAP file to an external server.
IP Address Enter the external server IPv4 address that captures the packet.
Port Enter or select the port number of the server for SRX Series Firewalls to send the
packet capture object.
Source Address Enter the source IPv4 address for the carrier TCP or UDP packet.
Field Description
• Signature Severity—Select the severity level of the attack from the list that the
signature will report for IDP processing. The available options are minor, major,
and critical.
NOTE: Click Clear All to clear all the selected severity values.
• CPU Threshold (%)—Enter the value of CPU usage threshold percentage for
intelligent inspection.
• CPU Tolerance (%)—Enter the value of CPU usage tolerance percentage for
intelligent inspection.
Field Description
Advanced Settings
Protection Mode Select an option to specify the inspection parameters for efficient inspection of traffic
in the device. The options available are:
Exception Handling
Drop On Limit Enable this option to specify the dropped connections on exceeding resource limits.
Drop On Failover Enable this option to specify the dropped traffic on HA failover sessions.
Drop If No Policy Enable this option to specify all the dropped traffic till IDP policy gets loaded.
Loaded
IDP Flow
Log Errors Enable this option to specify if the flow errors have to be logged.
Flow FIFO Max Size Enter a value to specify the maximum FIFO size.
Field Description
Hash Table Size Enter a value to specify the hash table size.
Max Timers Poll Ticks Enter a value to specify the maximum amount of time at which the timer ticks at a
regular interval.
Reject Timeout Enter a value to specify the amount of time in milliseconds within which a response
must be received.
Global
Enable All Qmodules Select an option from the list to specify all the qmodules of the global rulebase IDP
security policy are enabled.
Enable Packet Pool Select an option from the list to specify the packet pool is enabled to be used when
the current pool is exhausted.
Policy Lookup Cache Select an option from the list to specify the cache is enabled to accelerate IDP policy
lookup.
Memory Limit Percent Enter a value to specify the limit IDP memory usage at this percent of available
memory.
HTTP X-Forwarded When you enable this option, during traffic flow, IDP saves the source IP addresses
(IPv4 or IPv6) from the contexts of HTTP traffic, and displays it in the attack logs.
IPS
Detect Shellcode Select an option from the list to specify if shellcode detection has to be applied.
1010
Field Description
Ignore Regular Select an option from the list to specify if the sensor has to bypass DFA and PCRE
Expression matching.
Process Ignore Server- Select an option from the list to specify if the sensor has to bypass IPS processing for
to-Client server-to-client flows.
Process Override Select an option from the list to specify if the sensor has to execute protocol
decoders even without an IDP policy.
Process Port Enter an integer to specify a port on which the sensor executes protocol decoders.
IPS FIFO Max Size Enter an integer to specify the maximum allocated size of the IPS FIFO.
Minimum Log Supercade Enter an integer to specify the minimum number of logs to trigger the signature
hierarchy feature.
Log
Cache Size Enter a value to specify the size in bytes for each user’s log cache.
Disable Suppression Enable this option to specify if the log suppression has to be disabled.
Include Destination Select an option from the list to specify if combine log records for events with a
Address matching source address.
Max Logs Operate Enter a value to specify the maximum number of logs on which log suppression can
operate. Range is 255 through 65536.
1011
Field Description
Max Time Report Enter a value to specify the time (seconds) after which suppressed logs will be
reported. IDP reports suppressed logs after 5 seconds by default.
Start Log Enter a value to specify the number of log occurrences after which log suppression
begins. Log suppression begins with the first occurrence by default.
Reassembler
Ignore Memory Select an option from the list to specify if the user has to allow per-flow memory to
Overflow go out of limit.
Ignore Reassembly Select an option from the list to specify if the user has to allow per-flow reassembly
Memory Overflow memory to go out of limit.
Ignore Reassembly Enable this option to specify the TCP reassembler to ignore the global reassembly
Overflow overflow to prevent the dropping of application traffic.
Max Flow Memory Enter an integer to specify the maximum per-flow memory for TCP reassembly in
kilobytes.
Max Packet Memory Enter an integer to specify the maximum packet memory for TCP reassembly in
kilobytes.
Max Synacks Queued Enter an integer to specify the maximum limit for queuing Syn/Ack packets with
different SEQ numbers.
Range: 0 through 5
Packet Log
1012
Field Description
Max Sessions Enter an integer to specify the maximum number of sessions actively conducting pre-
attack packet captures on a device at one time.
Total Memory Enter an integer to specify the maximum amount of memory to be allocated to packet
capture for the device.
Detectors—Click +.
The Detector window opens up and enter the following field details.
Protocol Select the name of the protocol from the list to enable or disable the detector.
Tunable Name Select the name of the specific tunable parameter from the list to enable or disable
the protocol detector for each of the services.
Tunable Value Enter the protocol value of the specific tunable parameter to enable or disable the
protocol detector for each of the services.
Range: 0 to 4294967295
RELATED DOCUMENTATION
CHAPTER 83
ALG
IN THIS CHAPTER
IN THIS SECTION
Field Descriptions
Table 280 on page 1013 describes the fields on the ALG page.
Once the configuration is complete, click OK to save the changes or click Reset to revert back the
changes.
Field Description
Main
1014
Field Description
Enable PPTP Select the check box to enable the Point-to-Point Tunneling Protocol (PPTP) for ALG.
PPTP is a Layer 2 protocol that tunnels PPP data across TCP/IP networks. The PPTP client is
freely available on Windows systems and is widely deployed for building VPNs.
Enable RSH Select the check box to enable RSH for ALG.
The RSH ALG handles TCP packets destined for port 514 and processes the RSH port
command. The RSH ALG performs NAT on the port in the port command and opens gates as
necessary.
Enable RTSP Select the check box to enable the Real-Time Streaming Protocol (RTSP) for ALG.
Enable SQL Select the check box to enable Structured Query Language (SQL) for ALG.
The SQLNET ALG processes SQL TNS response frames from the server side. It parses the
packet and looks for the (HOST=ipaddress), (PORT=port) pattern and performs NAT and gate
opening on the client side for the TCP data channel.
Enable TALK Select the check box to enable the TALK protocol for ALG.
The TALK protocol uses UDP port 517 and port 518 for control-channel connections. The
talk program consists of a server and a client. The server handles client notifications and
helps to establish talk sessions. There are two types of talk servers: ntalk and talkd. The TALK
ALG processes packets of both ntalk and talkd formats. It also performs NAT and gate
opening as necessary.
Enable TFTP Select the check box to enable the Trivial File Transfer Protocol (TFTP) for ALG.
The TFTP ALG processes TFTP packets that initiate a request and opens a gate to allow
return packets from the reverse direction to the port that sends the request.
DNS
Enable DNS Select the check box to enable the domain name system (DNS) for ALG.
The DNS ALG monitors DNS query and reply packets and closes the session if the DNS flag
indicates the packet is a reply message.
1015
Field Description
Enable Oversize Select the check box to enable oversize message drop.
message drop.
FTP
Enable FTP Select the check box to enable the File Transfer Protocol (FTP) for ALG.
The FTP ALG monitors PORT, PASV, and 227 commands. It performs Network Address
Translation (NAT) on IP/port in the message and gate opening on the device as necessary.
The FTP ALG supports FTP put and FTP get command blocking. When FTP_NO_PUT or
FTP_NO_GET is set in the policy, the FTP ALG sends back a blocking command and closes
the associated opened gate when it detects an FTP STOR or FTP RETR command.
Enable allow Select the check box to allow any mismatch in IP address.
mismatch IP
address
Enable FTPs Select the check box to enable secure FTP and FTP SSL protocols.
Extension
H323
1016
Field Description
Enable H323 Select the check box to enable the H.323 ALG.
Application Specify the security screens for the H.323 protocol ALG.
Screen
Enter the following details:
Limits the rate per second at which remote access server (RAS) requests to the
gatekeeper are processed. Messages exceeding the threshold are dropped. This feature is
disabled by default.
• Enable Permit NAT Applied—Select the check box to specify how unidentified H.323
(unsupported) messages are handled by the device.
This statement applies only to received packets identified as supported VoIP packets.
If a packet cannot be identified, it is always dropped. If a packet is identified as a
supported protocol, the message is forwarded without processing.
• Enable Permit Routed—Select the check box to specify that unknown messages be
allowed to pass if the session is in route mode.
Sessions in transparent mode are treated as though they are in route mode.
The VoIP rewrite rules modifies the appropriate class of service (CoS) bits in an outgoing
packet through Differentiated Services Code Point (DSCP) mechanism that improves the
VoIP quality in a congested network.
1017
Field Description
• Timeout For Endpoint—Enter a timeout value in seconds for entries in the NAT table.
• Enable Permit Media From Any Source Port—Select this option to allow media traffic
from any port number.
IKE-ESP
ESP Session Select the ESP timeout session from 60 to 2400 seconds.
Timeout (sec)
ALG State Select the ALG state time out from 180 to 86400 sec.
Timeout (Sec)
MGCP
Enable MGCP Select the check box to enable the Media Gateway Control Protocol (MGCP).
Inactive Media Select a value to specify the maximum amount of time that the temporary openings in the
Timeout firewall (pinholes) remain open for media if no activity is detected. range is from 10 through
2,550 seconds.
Specifies the maximum time (in seconds) a call can remain active without any media (RTP or
RTCP) traffic within a group. Each time an RTP or RTCP packet occurs within a call, this
timeout resets. When the period of inactivity exceeds this setting, the temporary openings
(pinholes) in the firewall MGCP ALG opened for media are closed. The default setting is 120
seconds; the range is from 10 to 2550 seconds. Note that, upon timeout, while resources for
media (sessions and pinholes) are removed, the call is not terminated.
1018
Field Description
Limits the rate per second at which message requests to the Media Gateway are
processed. Messages exceeding the threshold are dropped by the Media Gateway
Control Protocol (MGCP). This feature is disabled by default.
Limits the number of new connection requests allowed per Media Gateway (MG) per
second. Messages exceeding the ALG.
• Enable Permit NAT Applied—Select the check box to specify how unidentified MGCP
messages are handled by the Juniper Networks device.
Specifies that unknown messages be allowed to pass if the session is in route mode.
(Sessions in transparent mode are treated as route mode.)
1019
Field Description
DSCP Code Specifies a code-point alias or bit set to apply to a forwarding class for a rewrite rule.
Rewrite
Code Point—Enter a six-bit DSCP code point value.
MSRPC
Provides a method for a program running on one host to call procedures in a program
running on another host. Because of the large number of RPC services and the need to
broadcast, the transport address of an RPC service is dynamically negotiated based on the
service program's Universal Unique IDentifier (UUID). The specific UUID is mapped to a
transport address.
Map Entry Select the map entry timeout session from 5 to 4320 minutes.
Timeout (min)
SCCP
Enable SCCP Select the check box to enable the Skinny Client Control Protocol.
Field Description
This statement applies only to received packets identified as supported VoIP packets. If a
packet cannot be identified, it is always dropped. If a packet is identified as a supported
protocol, the message is forwarded without processing.
Specifies that unknown messages be allowed to pass if the session is in route mode.
(Sessions in transparent mode are treated as though they are in route mode.)
SIP
Enable SIP Select the check box to enable Session Initiation Protocol (SIP).
Enable Retain Select the check box to enable whether the device frees media resources for a SIP, even
Hold Resource when a media stream is placed on hold.
By default, media stream resources are released when the media stream is held.
Field Description
Specifies the INVITE transaction timeout at the proxy, in minutes; the default is 3. Because
the SIP ALG is in the middle, instead of using the INVITE transaction timer value B (which is
(64 * T1) = 32 seconds), the SIP ALG gets its timer value from the proxy.
Specifies the maximum time a message remains in the network. The default is 5 seconds; the
range is 5 through 10 seconds. Because many SIP timers scale with the T4-Interval (as
described in RFC 3261), when you change the value of the T4-Interval timer, those SIP
timers also are adjusted.
Specifies the round-trip time estimate, in seconds, of a transaction between endpoints. The
default is 500 milliseconds. Because many SIP timers scale with the T1-Interval (as described
in RFC 3261), when you change the value of the T1-Interval timer, those SIP timers also are
adjusted.
1022
Field Description
This statement applies only to received packets identified as supported VoIP packets. If a
packet cannot be identified, it is always dropped. If a packet is identified as a supported
protocol, the message is forwarded without processing.
• Enable Permit Routed—Select the check box to enable to allow unknown messages to
pass if the session is in route mode. (Sessions in transparent mode are treated as route
mode.)
Protect Options • SIP Invite Attack Table Entry Timeout—Enter a value from 1 through 3,600 seconds.
Specifies the time (in seconds) to make an attack table entry for each INVITE, which is
listed in the application screen.
• Enable Attack Protection—Select one of the options: All Servers, Selected Servers, or
None.
Protects servers against INVITE attacks. Configures the SIP application screen to protect
the server at some or all destination IP addresses against INVITE attacks.
When you select Selected Servers, enter the destination IP address and click +. You can
select the destination IP address and click X to delete it.
SUNRPC
Because of the large number of RPC services and the need to broadcast, the transport
address of an RPC service is dynamically negotiated based on the service's program number
and version number. Several binding protocols are defined for mapping the RPC program
number and version number to a transport address.
1023
Field Description
Map Entry Select the map entry timeout session from 5 to 4320 minutes.
Timeout
1024
CHAPTER 84
IN THIS CHAPTER
IN THIS SECTION
You can create a metadata streaming profile and assign it to a meatadata sreaming policy to protect and
defend your network from advanced threats using DNS.
• Associate the created metadata streaming profiles with metadata streaming policies. To do this:
1. Click Metadata Streaming Policy link under the Metadata Streaming Profile page title to directly
navigate to the Metadata Streaming Policy page.
2. Click + to add a new metadata streaming policy configuration or click the pencil icon to edit an
existing policy configuration.
1025
3. Select the metadata streaming profile under Metadata Streaming Profile to a specific policy
configuration. For more information on assigning the metadata streaming profile to a metadata
streaming policy, see "Create a Metadata Streaming Policy" on page 782.
• Create a metadata streaming profile. See "Create a Metadata Streaming Profile" on page 1027.
• Edit a metadata streaming profile. See "Edit a Metadata Streaming Profile" on page 1030.
• Delete a metadata streaming profile. See "Delete a Metadata Streaming Profile" on page 1030.
• Show or hide columns in the Metadata Streaming Profile table. To do this, use the Show Hide
Columns icon in the upper-right corner of the page and select the options to show or deselect to
hide options on the page.
• Advanced search for metadata streaming profiles. To do this, use the search text box present above
the table grid. The search includes the logical operators as part of the filter string. In the search text
box, when you hover over the icon, it displays an example filter condition. When you start entering
the search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator to perform the advanced search
operation.
NOTE: Press Spacebar to add an AND operator or an OR operator to the search string.
Press backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 281 on page 1026 describes the fields on the Metadata Streaming Profile page.
1026
Field Description
DGA Detection Displays the action and logs that the SRX Series
Firewall will take when a DGA-based attack is detected
on DNS packets.
Tunnel Detection Displays the action and logs that the SRX Series
Firewall will take when a DNS tunneling is detected.
Encrypted Traffic Insights Displays the action and logs that the SRX Series
Firewall will take when a malicious threats are
detected.
RELATED DOCUMENTATION
Configure the settings for filtering DNS requests for allowed and disallowed domains.
1. Click DNS Filter on the upper-right corner of the Metadata Streaming Profile page.
The DNS Filter page opens.
2. Complete the configuration according to the guidelines provided in Table 282 on page 1027.
3. Click OK to save the changes. To discard your changes, click Cancel.
1027
Field Action
Allowlist Allowlist logs the DNS request and allows the access.
a. Click +.
a. Click +.
RELATED DOCUMENTATION
Create a metadata streaming profile to protect and defend your network from advanced threats using
DNS.
Field Action
DGA detection
Action Select an action that the SRX Series Firewall will take
when a detection is made:
Tunnel detection
1029
Table 283: Fields on the Create Metadata Streaming Profile Page (Continued)
Field Action
Action Select an action that the SRX Series Firewall will take
when a detection is made:
Encrypted Traffic Insights (ETI) Enable to detect malicious threats that are hidden in
encrypted traffic without intercepting and decrypting
the traffic.
RELATED DOCUMENTATION
1. Select an existing metadata streaming profile to edit on the Metadata Streaming Profile page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Metadata Streaming Profile page opens with editable fields. For more information on the
options, see "Create a Metadata Streaming Profile" on page 1027.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select one or more metadata streaming profiles to delete on the Metadata Streaming Profile page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete the profile or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 85
ATP Anti-malware
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Advanced Threat Prevention > Anti-malware.
SRX Series Firewalls use intelligence provided by Juniper Advanced Threat Prevention Cloud (Juniper
ATP Cloud) to remediate malicious content using security policies. If configured, security policies block
the content before it is delivered to the destination address.
The anti-malware profile defines the content to scan for any malware and the action to be taken when
malware is detected. Juniper ATP Cloud uses a pipeline approach to analyzing and detecting malware. If
an analysis reveals that the file is malware, it is not necessary to continue the pipeline to further examine
the malware.
1. Click Security Policies under the Anti-malware page title to directly navigate to the Security
Policies page.
2. Click + to add a new rule or click the pencil icon to edit an existing rule.
3. Select the anti-malware profile under Advance Services to a specific policy. For more information,
see "Add a Rule to a Security Policy" on page 734.
The Clone Anti-malware Profile page opens with editable fields. For more information on the
options, see "Create an Anti-malware Profile" on page 1033.
• Show or hide columns in the Anti-malware table. To do this, use the Show Hide Columns icon in the
upper-right corner of the page, and select the options to show or deselect to hide options on the
page.
• Advanced search for anti-malware profile. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu opens.
2. Select a value from the list and then select a valid operator to perform the advanced search
operation.
NOTE: Press Spacebar to add an AND operator or an OR operator to the search string.
Press backspace at any point of time while entering a search criteria, only one character is
deleted.
1033
Field Descriptions
Table 284 on page 1033 describes the fields on the Anti-malware page.
Field Description
You are here: Security Services > Advanced Threat Prevention > Anti-malware.
Configure the anti-malware profiles for SRX Series Firewall. The profile lets you define which files to
send to the cloud for inspection and the action to be taken when malware is detected.
Field Action
Protocols
1035
Field Action
Field Action
Field Action
Fallback Actions
Global fallback action Select None, Permit, or Block action from the list to
permit or block the file regardless of its threat level.
Logs Enable this option to add the event to the log file.
1038
Field Action
Field Action
Additional Logging
Files under verdict threshold Enable this option to create a system log entry when
the file verdict number is less than the threshold.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > Anti-malware.
The Edit Anti-malware Profile page opens with editable fields. For more information on the options,
see "Create an Anti-malware Profile" on page 1033.
Alternatively, you can right-click on the selected anti-malware profile and select Edit.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > Anti-malware.
RELATED DOCUMENTATION
CHAPTER 86
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
Juniper Networks Security Intelligence (SecIntel) provides carefully curated and verified threat
intelligence from industry-leading threat feeds to SRX Series Firewalls. This enables blocking malicious
and unwanted traffic such as Command and Control (C&C) communications, GeoIP, Attacker IPs, and
1042
more with minimum latency. SecIntel delivers real-time threat intelligence by enabling automatic and
responsive traffic filtering.
Configure SecIntel profiles to work with security intelligence feeds, such as C&C, DNS, and infected
hosts. The Security Intelligence process is responsible for downloading the security intelligence feeds
and parsing from the feed connector or ATP Cloud feed server. Anything that matches these scores is
considered malware or an infected host.
• View the list of C&C, DNS, and infected hosts profiles. To do this, select All, Command & Control,
DNS, or Infected Hosts from the View by list.
• Create a C&C profile. See "Create a Command and Control Profile" on page 1045.
• Edit a C&C profile. See "Edit a Command and Control Profile" on page 1048.
• Delete a C&C profile. See "Delete a Command and Control Profile" on page 1048.
• Create an infected hosts profile. See "Create an Infected Hosts Profile" on page 1052.
• Edit an infected hosts profile. See "Edit an Infected Hosts Profile" on page 1054.
• Delete an infected hosts profile. See "Delete an Infected Hosts Profile" on page 1055.
1. Select an existing C&C, DNS, or an infected hosts profile to clone from the SecIntel Profiles page.
The Clone <Command & Control, DNS, or Infected Hosts> Profile page opens with editable fields.
• Show or hide columns in the SecIntel Profiles table. To do this, use the Show Hide Columns icon in
the upper-right corner of the page, and select the options to show or deselect to hide options on the
page.
• Advanced search for SecIntel profiles. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
1043
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator to perform the advanced search
operation.
NOTE: Press Spacebar to add an AND operator or an OR operator to the search string.
Press backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 286 on page 1043 describes the fields on the SecIntel Profiles page.
Field Description
Feeds Displays the feeds that are associated with the C&C,
DNS, or infected hosts profile.
Block Action Displays the notification action taken with the block
action. For example, Redirect URL, Redirect Message,
and Sinkhole.
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
Configure DNS sinkhole to identify and block DNS requests for the disallowed domains by resolving the
domains to a sinkhole server or by rejecting the DNS requests.
Field Action
DNS response TTL Enter Time-to-live (TTL) value in seconds to send the
DNS response after taking the DNS sinkhole action.
Server response error code Select a DNS response error code from the list that
must be sent for bad domains for server query type:
Field Action
Text response error code Select a DNS response error code from the list that
must be sent for bad domains for text query type.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
Create a Command and Control (C&C) profile to provide information on C&C servers that have
attempted to contact and compromise hosts on your network. A C&C server is a centralized computer
that issues commands to botnets of compromised networks of computers and receives reports back
from them.
1. Click Create > Command & Control on the upper-right corner of the SecIntel Profiles page.
The Create Command & Control Profile page opens.
2. Complete the configuration according to the guidelines provided in Table 288 on page 1046.
3. Click OK to save the changes. To discard your changes, click Cancel.
Once you create the C&C profile, you can associate it with the SecIntel profile groups.
1046
Table 288: Fields on the Create Command & Control Profile page
Field Action
Default action for all feeds Drag the slider to change the action to be taken for
all the feed types. Actions are Permit (1 - 4), Log
(5-6), and Block (7 - 10).
Log will have the permit action and also logs the
event.
c. Click OK.
1047
Table 288: Fields on the Create Command & Control Profile page (Continued)
Field Action
Block action Select one of the following block actions from the
list:
Close session options Select one of the following options from the list:
None, Redirect URL, Redirect message, or File.
Upload file Click Browse to select and upload a file. This file is
used to send to the users when connections are
closed.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
NOTE: You can edit only the C&C profiles created in J-Web.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
NOTE: Ensure that selected profiles are not mapped to the SecIntel profile groups.
2. Click the delete icon on the upper-right corner of the SecIntel Profile page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
Create a DNS profile to configure feeds and threat score to list the domains that are known to be
connected to malicious activity.
1. Click Create > DNS on the upper-right corner of the SecIntel Profiles page.
The Create DNS Profile page opens.
2. Complete the configuration according to the guidelines provided in Table 289 on page 1049.
3. Click OK to save the changes. To discard your changes, click Cancel.
Once you create the DNS profile, you can associate it with the SecIntel profile groups.
Field Action
Default action for all feeds Drag the slider to change the action to be taken for
all the feed types. Actions are Permit (1 - 4), Log
(5-6), and Block (7 - 10).
Log will have the permit action and also logs the
event.
1050
Field Action
c. Click OK.
Block action Select one of the following block actions from the
list:
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
1051
NOTE: You can edit only the DNS profiles created in J-Web.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
NOTE: Ensure that selected profiles are not mapped to the SecIntel profile groups.
2. Click the delete icon on the upper-right corner of the SecIntel Profile page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
Create an infected hosts profile to configure feeds and threat score to list the IP address or IP subnet of
the compromised host. Infected hosts indicate local devices that are potentially compromised because
they appear to be part of a C&C network or exhibit other symptoms.
1. Click Create > Infected Hosts on the upper-right corner of the SecIntel Profiles page.
The Create Infected Hosts Profile page opens.
2. Complete the configuration according to the guidelines provided in Table 290 on page 1052.
3. Click OK to save the changes. To discard your changes, click Cancel.
Once you create the infected hosts profile, you can associate it with the SecIntel profile groups.
Field Action
Default action for all feeds Drag the slider to change the action to be taken for
all the feed types. Actions are Permit (1 - 4), Log
(5-6), and Block (7 - 10).
Log will have the permit action and also logs the
event.
1053
Table 290: Fields on the Create Infected Hosts Profile Page (Continued)
Field Action
c. Click OK.
Block action Select one of the following block actions from the
list:
Close session options Select one of the following options from the list:
None, Redirect URL, Redirect message, or File.
Table 290: Fields on the Create Infected Hosts Profile Page (Continued)
Field Action
Upload file Click Browse to select and upload a file. This file is
used to send to the users when connections are
closed.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
NOTE: You can edit only the infected hosts profiles created in J-Web.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profiles.
NOTE: Ensure that selected profiles are not mapped to the SecIntel profile groups.
2. Click the delete icon on the upper-right corner of the SecIntel Profile page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 87
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profile Groups.
Configure a SecIntel profile group to add SecIntel profiles, such as C&C, DNS, and infected hosts. Once
created, you can assign this group to the security policy.
1. Click Security Policies under the SecIntel Profile Groups page title to directly navigate to the
Security Policies page.
2. Click + to add a new rule or click the pencil icon to edit an existing rule.
1057
3. Select the SecIntel profile group under Advance Services to a specific policy. For more
information, see "Add a Rule to a Security Policy" on page 734.
• Create a SecIntel profile group. See "Create a SecIntel Profile Group" on page 1058.
• Edit a SecIntel profile group. See "Edit a SecIntel Profile Group" on page 1060.
• Delete a SecIntel profile group. See "Delete a SecIntel Profile Group" on page 1060.
The Clone SecIntel Profile Group page opens with editable fields. For more information on the
options, see "Create a SecIntel Profile Group" on page 1058.
• Show or hide columns in the SecIntel Profile Groups table. To do this, use the Show Hide Columns
icon in the upper-right corner of the page and select the options to show or deselect to hide options
on the page.
• Advanced search for SecIntel profile groups. To do this, use the search text box present above the
table grid. The search includes the logical operators as part of the filter string. In the search text box,
when you hover over the icon, it displays an example filter condition. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or an OR operator to the search string.
Press backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 291 on page 1058 describes the fields on the SecIntel Profile Groups page.
1058
Field Description
Command & Control Displays the C&C profile that you have associated with
the SecIntel profile group.
DNS Displays the DNS profile that you have associated with
the SecIntel profile group.
Infected Hosts Displays the infected hosts profile that you have
associated with the SecIntel profile group.
You are here: Security Services > Advanced Threat Prevention > SecIntel Profile Groups.
Create a SecIntel profile group with SecIntel profiles, such as C&C, DNS, and infected hosts. Once
created, you can assign this group to the security policy.
Field Action
Command & Control Select a C&C profile from the list to associate with
the SecIntel profile group.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profile Groups.
Alternatively, you can right-click on the selected SecIntel profile group and select Edit.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > Advanced Threat Prevention > SecIntel Profile Groups.
RELATED DOCUMENTATION
CHAPTER 88
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > SSL Profiles > SSL Initiation.
• Add an SSL initiation profile. See "Add an SSL Initiation Profile" on page 1063.
• Edit an SSL initiation profile. See "Edit an SSL Initiation Profile" on page 1066.
• Delete SSL initiation profile. See "Delete SSL Initiation Profile" on page 1067.
1062
• Show or hide columns in the SSL Initiation Profile table. To do this, use the Show Hide Columns icon
in the upper-right corner of the page and select the options you want to show or deselect to hide
options on the page.
• Advance search for SSL initiation profile. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 293 on page 1062 describes the fields on the SSL Initiation Profile page.
Field Description
Flow Tracing Displays whether flow trace is enabled or disabled for troubleshooting policy-
related issues.
Field Description
Preferred Cipher Displays the preferred cipher which the SSH server uses to perform encryption
and decryption function.
Server Authentication Failure Displays the action that will be performed if errors are encountered during the
server certificate verification process (such as CA signature verification failure,
self-signed certificates, and certificate expiry).
Certificate Revocation Displays the criterion for certificate revocation for the SSL initiation profile.
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Initiation.
Field Action
General Information
Certificate
1065
Table 294: Fields on the Create SSL Initiation Profile Page (Continued)
Field Action
• None
• SSLRP_Automation_Cert_2
• SSLFP_Automation_Cert_1
• SSLRP_Automation_Cert_1
• SSLFP_Automation_Cert_2
• SSL2
Actions
Table 294: Fields on the Create SSL Initiation Profile Page (Continued)
Field Action
Action Select an action from the list if CRL info is not present:
• None
• Allow
• Drop
Hold Instruction Code Select Ignore if you want to keep the instruction code
on hold for this profile.
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Initiation.
1. Select the existing SSL initiation profile that you want to edit on the SSL Initiation Profile page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit an SSL Initiation Profile page appears with editable fields. For more information on the
options, see "Add an SSL Initiation Profile" on page 1063.
3. Click OK to save the changes.
1067
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Initiation.
1. Select an SSL initiation profile that you want to delete on the SSL Initiation Profile page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 89
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > SSL Profiles > SSL Proxy.
You can create, add, edit, and delete SSL proxy or global policy configurations.
• Configure global policy. To do this, click Global Config at the upper-right corner of the table and enter
the session cache timeout in seconds.
• Add an SSL proxy profile. See "Add an SSL Proxy Profile" on page 1071.
• Edit na SSL proxy profile. See "Edit an SSL Proxy Profile" on page 1078.
1069
• Delete SSL proxy profile. See "Delete a SSL Proxy Profile" on page 1078.
• Clone an SSL proxy profile. See "Clone an SSL Proxy Profile" on page 1077.
• View the details of an SSL proxy profile—To do this, select the SSL proxy profile for which you want
to view the details and follow the available options:
• Right-click on the selected SSL proxy profile and select Detailed View.
• Mouse over to the left of the selected SSL proxy profile and click Detailed View.
• Deselect the selected SSL proxy profiles. To do this, click More and select Clear All Selections.
• Show or hide columns in the SSL Proxy Profiles table. To do this, click the Show Hide Columns icon in
the upper-right corner of the custom objects table and select the options you want to view or
deselect the options you want to hide on the page.
• Advance search for SSL proxy profiles. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 295 on page 1070 describes the fields on the SSL Proxy page.
1070
Field Description
Protection Type Displays the type of protection the profile provides. One is
client protection and the other one is server protection.
Client protection is for SSL forward proxy and server
protection is for reverse proxy.
Preferred Cipher Displays the category of the profile depending on their key
strength.
Custom Cipher Displays the custom cipher which the SSH server uses to
perform encryption and decryption function.
Exempted Addresses Displays the addresses to whitelists that bypass SSL forward
proxy processing.
Server Auth Failure Displays the action that will be performed if errors are
encountered during the server certificate verification process
(such as CA signature verification failure, self-signed
certificates, and certificate expiry).
MAC Address Displays the MAC address associated with the VLAN.
1071
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Proxy.
Field Action
General Information
Table 296: Fields on the Create SSL Proxy Profile Page (Continued)
Field Action
Custom Ciphers Specifies the set of ciphers the SSH server can use to
perform encryption and decryption functions. If this
option is not configured, the server accepts any
supported suite that is available.
7. rsa-export-with-rc4-40-md5—RSA-export, 40-bit
RC4, MD5 hash
8. rsa-export-with-des40-cbc-sha—RSA-export, 40-
bit DES/CBC, SHA hash
9. rsa-with-aes-256-gcm-sha384—RSA, 256-bit
AES/GCM, SHA384 hash
13. ecdhe-rsa-with-aes-256-gcm-sha384—ECDHE,
RSA, 256-bit AES/GCM, SHA384 hash
1073
Table 296: Fields on the Create SSL Proxy Profile Page (Continued)
Field Action
15. ecdhe-rsa-with-aes-256-cbc-sha384—ECDHE,
RSA, 256-bit AES/CBC, SHA384 hash
16. ecdhe-rsa-with-aes-3des-ede-cbc-sha—ECDHE,
RSA, 3DES, EDE/CBC, SHA hash
17. ecdhe-rsa-with-aes-128-gcm-sha256—ECDHE,
RSA, 128-bit AES/GCM, SHA256 hash
19. ecdhe-rsa-with-aes-128-cbc-sha256—ECDHE,
RSA, 128-bit AES/CBC, SHA256 hash
Flow Trace Select the check box to enable flow trace for
troubleshooting policy-related issues. Else leave it
blank.
Table 296: Fields on the Create SSL Proxy Profile Page (Continued)
Field Action
Trusted Certificate Authorities Select the trusted CA that are available on the device
from the following options: All, None, Select specific.
Actions
1075
Table 296: Fields on the Create SSL Proxy Profile Page (Continued)
Field Action
Server Auth Failure Select the check box to ignore server authentication
completely.
Session Resumption Select the check box if you do not want session
resumption.
Table 296: Fields on the Create SSL Proxy Profile Page (Continued)
Field Action
Certificate Revocation Select the check box if you want to revoke the
certificate.
If CRL info not present Specifies if you want to allow or drop if CRL info is not
present.
Hold Instruction Code Select Ignore if you want to keep the instruction code
on hold.
Table 296: Fields on the Create SSL Proxy Profile Page (Continued)
Field Action
Only after Security Policies Enforcement Select the check box to enable forwarding the copy of
the decrypted traffic to the external mirror traffic
collector after enforcing the Layer 7 security services
through a security policy.
MAC Address Enter the MAC address of the external mirror traffic
collector port.
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Proxy.
1. Select an SSL Proxy profile that you want to clone and select Clone from the More link.
NOTE: Alternatively, you can right-click on the selected SSL Proxy profile and select Clone.
The Clone SSL Proxy Profile page appears with editable fields. For more information on the options,
see "Add an SSL Proxy Profile" on page 1071.
1078
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Proxy.
1. Select the existing SSL proxy profile that you want to edit on the SSL Proxy Profile page.
2. Click the pencil icon available on the upper-right corner of the page.
The Update SSL Initiation Profile page appears with editable fields. For more information on the
options, see "Add an SSL Proxy Profile" on page 1071.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > SSL Profiles > SSL Proxy.
1. Select one or more SSL proxy profiles that you want to delete on the SSL Proxy page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
1079
RELATED DOCUMENTATION
CHAPTER 90
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Firewall Authentication > Access Profile.
Use this page to configure Access Profile. Access profiles enable you to define the authentication and
accounting servers and their priorities.
• View the details of the Access profile—To do this, select the Access profile for which you want to
view the details and follow the available options:
• Mouse over to the left of the selected Access profiles and click Detailed View.
• Show or hide columns in the Access Profile table. To do this, click Show Hide Columns icon in the
upper-right corner of the Access Profiles table and select the columns you want to display or
deselect the columns you want to hide on the page.
• Advance search for Access profile. To do this, use the search text box present above the table grid.
The search includes the logical operators as part of the filter string. An example filter condition is
displayed in the search text box when you hover over the Search icon. When you start entering the
search string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace to delete a character of the search string.
Field Descriptions
Table 297 on page 1081 describes the fields on the Access Profile page.
Field Description
Field Description
Order 1 Shows the order in which Junos OS tries different authentication methods when verifying that
a client can access the devices.
Order 2 Shows the next authentication method if the authentication method included in the
authentication order option is not available, or if the authentication is available but returns a
reject response.
Local Users Displays the usernames that are created for accessing the application.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Access Profile.
Field Description
Access Profile Enter a name for the access profile. The name must be a unique string of alphanumeric
Name characters, colons, periods, dashes, and underscores. Maximum length is 64 characters.
Address Select an address pool from the list that can be used by different client applications.
Assignment
Click Create Address Pool to add a new address pool. For more information on creating a
new address pool, see "Add an Address Pool" on page 1092.
NOTE: If you have selected an address pool in Address Assignment, you need not assign an
address pool for LDAP while creating allowed groups.
Authentication
1. Click +.
To edit, select the local authentication user configuration and click the pencil icon.
To delete, select the local authentication user configuration and click the delete icon.
1084
Field Description
1. Click +.
• Retry—Enter the number of retries that a device can attempt to contact a RADIUS
server.
• Routing Instance—Select the routing instance from the list for managing the routing
instance.
• Timeout—Enter the amount of time that the local device waits to receive a response
from a RADIUS authentication server.
To edit, select the RADIUS server configuration and click the pencil icon.
To delete, select the RADIUS server configuration and click the delete icon.
1085
Field Description
1. Click +.
• Retry—Enter the number of retries that a device can attempt to contact an LDAP
server.
• Routing Instance—Select the routing instance from the list for managing the routing
instance.
• Timeout—Enter the amount of time that the local device waits to receive a response
from an LDAP authentication server.
To edit, select the LDAP server configuration and click the pencil icon.
To delete, select the LDAP server configuration and click the delete icon.
LDAP Options
Base Enter the base distinguished name that defines user’s basic properties.
Distinguished
For example, in the base distinguished name o=juniper, c=us, where c stands for country,
Name
and o for organization.
1086
Field Description
Revert Interval Specifies the amount of time that elapses before the primary server is contacted if a backup
server is being used.
• Search—Indicates that a search is used to get a user's LDAP DN. The search is performed
based on the search filter and the search text typed in by the user during authentication.
Common Name Enter a common name identifier used as a prefix for the username during the assembly of
the users distinguished name.
This option is available when you select Assemble LDAP option type.
Search Filter Enter the name of the filter to find the users LDAP distinguished name.
This option is available when you select Search LDAP option type.
Admin Search Enable this option to perform an LDAP administrator search. By default, the search is an
anonymous search.
This option is available when you select Search LDAP option type.
Distinguished Enter the distinguished name of an administrative user. The distinguished name is used in
Name the bind for performing the LDAP search.
Field Description
Allowed groups NOTE: Starting in Junos OS Release 23.2R1, J-Web supports Allowed Groups option for
Access Profile page. This option is not supported for SRX300 line of Firewalls and
SRX550HM Firewall.
Configure groups that are allowed to sign in. Users can configure maximum of 32 groups and
group lists are limited to 255 bytes.
The order in which the membership attribute is received from the LDAP server determines
how a user is associated with the configured (allowed) groups. To match the user, the first
group in the list received from the LDAP server that matches any of the configured groups is
used.
Any user who is a member of more than one group can obtain resources from either group,
depending on the order of the LDAP server's response. To ensure that the user is assigned
the intended resource with certainty, it is recommended that the user belong to only one
group.
3. Select an address pool from the list. If you want to create a new address pool, click
Create Address Pool. See "Add an Address Pool" on page 1092.
NOTE: This step is optional if you have already selected an address pool in the Address
Assignment option.
4. Click the tick icon to save changes. If you want to discard changes, click X instead.
You can also edit and delete allowed groups using the edit icon and delete icon respectively.
Authentication Order
1088
Field Description
• LDAP—Use LDAP. The SRX Series Firewall uses this protocol to get user and group
information necessary to implement the integrated user firewall feature.
If RADIUS servers fail to respond or return a reject response, try local authentication,
because it is explicitly configured in the authentication order.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Access Profile.
1. Select an existing access profile that you want to edit on the Access Profile page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Access Profiles page appears with editable fields. For more information on editing the fields,
see "Add an Access Profile" on page 1082.
3. Click OK to save the changes or click Cancel to discard the changes.
1089
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Access Profile.
1. Select an access profile that you want to delete on the Access Profiles page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete access profiles or click No to retain access profiles.
RELATED DOCUMENTATION
CHAPTER 91
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Firewall Authentication > Address Pools.
• Search for Text in an Address Pools table. See "Search for Text in an Address Pools Table" on page
1094.
• View the details of an address pool—To do this, select the address pool for which you want to view
the details and follow the available options:
• Mouse over to the left of the selected address pool and click Action_Detail_View.
• Filter the address pool based on select criteria. To do this, select the filter icon at the upper-right
corner of the address pool table. The columns in the grid change to accept filter options. Type the
filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the address pool table. To do this, use the Show Hide Columns icon in the
upper-right corner of the page and select the options you want to show or deselect to hide options
on the page.
Field Descriptions
Table 299 on page 1091 describes the fields on the Address Pools page.
Field Description
Network Address Specifies the network address used by the address pool.
Field Description
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Address Pools.
Field Description
General
XAUTH Attributes
1093
Field Description
Address Ranges
Add Click + to add a new address range for the address pool.
Delete Click the delete icon to delete the address range for the address pool.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Address Pools.
1094
1. Select an existing address pool that you want to edit on the Address Pools page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit Address Pool page appears with editable fields. For more information on the options, see
"Add an Address Pool" on page 1092.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Address Pools.
1. Select an address pool that you want to delete on the Address Pools page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Address Pools.
1095
You can use the search icon in the upper-right corner of the Address Pools page to search for text
containing letters and special characters on that page.
1. Click the search icon and enter partial text or full text of the keyword in the search bar.
The search results are displayed.
2. Click X next to a search keyword or click Clear All to clear the search results.
RELATED DOCUMENTATION
CHAPTER 92
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Firewall Authentication > Authentication Settings.
Use this page to configure firewall authentication. You can click the arrow pointing outwards icon to
expand all the options or click the arrow pointing inwards to collapse or hide all the options.
To edit this page, configure minimum one access profile under Security Services > Firewall
Authentication > Access Profile.
Field Description
1. Complete the configuration according to the guidelines provided in Table 301 on page 1097.
Table 301 on page 1097 describes the fields on the Firewall Authentication page.
1097
Field Description
Pass-through Settings
Default Profile Select a profile from the list that the policies use to authenticate users.
FTP Banners
Login Displays the login prompt for users logging in using FTP.
Success Displays a successful login prompt for users logging in using FTP.
Fail Displays failed login prompt for users logging in using FTP.
Telnet Banners
Login Displays the login prompt for users logging in using telnet.
Success Displays a successful login prompt for users logging in using telnet.
Fail Displays failed login prompt for users logging in using telnet.
HTTP Banner
Login Displays the login prompt for users logging in using HTTP.
1098
Field Description
Success Displays a successful login prompt for users logging in using HTTP.
Fail Displays failed login prompt for users logging in using HTTP.
Web-auth-settings
Default Profile Select a profile that the policies use to authenticate users.
Success Displays a successful login prompt for users logging in using Web authentication banner.
Logo File Indicates an image to be chosen for the Web authentication logo.
NOTE: For the good logo image, the image format must be in .gif and the resolution must be
172x65.
Browse Click the button to navigate to the logo image on the user's local disk.
RELATED DOCUMENTATION
CHAPTER 93
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Firewall Authentication > UAC Settings.
Field Description
1. Complete the configuration according to the guidelines provided in Table 302 on page 1099.
Table 302 on page 1099 describes the fields on the UAC Setting page.
Field Description
Global Settings
1100
Field Description
Certificate Determines whether server certificate verification is required when initiating a connection
Verification between a device and an Access Control Service in a UAC configuration.
Interval Specifies the value in seconds that the device should expect to receive a heartbeat signal
from the IC Series device.
Test Only Mode Allows all traffic and log enforcement result.
Timeout Specifies (in seconds) that the device should wait to get a heartbeat response from an IC
Series UAC Appliance.
Timeout Action Specifies the action to be performed when a timeout occurs and the device cannot
connect to an Infranet Enforcer.
Infranet Controller
1101
Field Description
CA Profiles Select a CA from the list in the CA Profiles column and then click the right arrow to move
them to the Selected column.
NOTE: To deselect a CA, select the CA in the Selected column and then click the left
arrow to move them to the CA Profiles column.
Port Specifies the port number to be associated with this Infranet Controller for data traffic.
Server Certificate Enter the server certificate subject name of the Infranet Controller certificate to match.
Subject
Captive Portal
Captive Portal Specifies the preconfigured security policy for captive portal on the Junos OS Enforcer.
Field Description
Redirect URL Enter the URL to which the captive portal should be directed.
RELATED DOCUMENTATION
CHAPTER 94
IN THIS CHAPTER
You are here: Security Services > Firewall Authentication > Active Directory.
Table 303 on page 1103 describes the fields on the Active Directory page.
Field Description
General Information
General
No on Demand Enable the manual on-demand probing of a domain PC as an alternate method for the
Probe SRX Series Firewall to retrieve address-to-user mapping information.
Timeout
1104
Field Description
Authentication Entry Set the timeout to 0 to avoid having the user's entry being removed from the
Timeout authentication table after the timeout.
NOTE: When a user is no longer active, a timer is started for that user’s entry in the
Active Directory authentication table. When the time is up, the user’s entry is removed
from the table. Entries in the table remain active as long as there are sessions associated
with the entry.
To disable timeout, set the interval to zero. The range is 10 through 1440 minutes.
WMI Timeout Enter the number of seconds that the domain PC has to respond to the SRX Series
Firewall’s query through Windows Management Instrumentation (WMI) or Distributed
Component Object Module (DCOM).
If no response is received from the domain PC within the wmi-timeoutinterval, the probe
fails and the system either creates an invalid authentication entry or updates the existing
authentication entry as invalid. If an authentication table entry already exists for the
probed IP address, and no response is received from the domain PC within the wmi-
timeout interval, the probe fails and that entry is deleted from the table.
Invalid Enter a value. The range is 10 through 1440 minutes. When a user is no longer active, a
Authentication Entry timer is started for that user’s entry in the Active Directory authentication table. When
Timeout the time is up, the user’s entry is removed from the table.
If this value is not configured, all the invalid auth entry from Active Directory will use the
default value as 30 minutes.
Firewall Enter a value. The range is 10 through 1440 minutes. This is the firewall authentication
Authentication fallback time. Set the timeout to 0 to avoid having the user's entry being removed from
Forced Timeout the authentication table after the timeout.
Filter
1105
Field Description
Click + to create a new IP address and add it as either include or exclude from
monitoring.
Click the Delete icon to delete a new IP address and add it as either include or exclude
from monitoring.
Click + to create a new IP address and add it as either include or exclude from
monitoring.
Click the Delete icon to delete a new IP address and add it as either include or exclude
from monitoring.
Domain Settings
NOTE:
• Starting in Junos OS Release 19.2R1, for SRX4200, SRX1500, SRX550M, and vSRX
Virtual Firewall devices, and for the SRX5000 and SRX3000 lines of devices, you can
configure the integrated user firewall in a maximum of two domains. For the other
SRX Series Firewalls, you can create only one domain.
You can select the pencil icon to edit the domain or select delete icon to delete the
domain.
General
Field Description
Username Enter the password for the Active Directory account password.
Password Enter the username for the Active Directory account name.
The range for the password is 1 through 128 characters. Example: A$BC123
Domain Controller(s)
• Domain Controller Name—Enter the domain controller name. Name can range from 1
through 64 characters.
• Port—Enter the port number of the LDAP server. If no port number is specified, the
system uses port 389 for plaintext or port 636 for encrypted text.
Username Enter the username of the LDAP account. If no username is specified, the system will use
the configured domain controller’s username.
1107
Field Description
Password Enter the password for the account. If no password is specified, the system uses the
configured domain controller’s password.
Use SSL Enable Secure Sockets Layer (SSL) to ensure secure transmission with the LDAP server.
Disabled by default, then the password is sent in plaintext.
Authentication Enable this option to specify the algorithm used while the SRX Series Firewall
Algorithm communicates with the LDAP server. By default, simple is selected to configure
simple(plaintext) authentication mode.
IP User Mapping
Event Log Scanning Enter the scanning interval at which the SRX Series Firewall scans the event log on the
Interval domain controller. The range is 5 through 60 seconds.
Initial Event Log Enter the time of the earliest event log on the domain controller that the SRX Series
TimeSpan Firewall will initially scan. This scan applies to the initial deployment only. After WMIC
and the user identification start working, the SRX Series Firewall scans only the latest
event log.
Release Description
19.2R1 Starting in Junos OS Release 19.2R1, for SRX4200, SRX1500, SRX550M, and vSRX Virtual Firewall
devices, and for the SRX5000 and SRX3000 lines of devices, you can configure the integrated user
firewall in a maximum of two domains. For the other SRX Series Firewalls, you can create only one
domain.
RELATED DOCUMENTATION
CHAPTER 95
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Firewall Authentication > Local Authentication.
• Create a local auth entry. See "Add a Local Authentication Entry" on page 1110.
• Delete a local auth entry. See "Delete a Local Authentication Entry" on page 1111.
• Clear all the local auth entry. To do this, select the local auth entries you want to clear and click Clear
All at the upper-right corner of the table.
1110
Field Descriptions
Table 304 on page 1110 describes the fields on the Local Auth page.
Field Description
Filter by Displays the local authentication configuration based on the selected filter.
Search Select the filter you want and enter your inputs based on the filter type. Then, click the search icon
to display the output based on your selected filter.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Local Authentication.
Field Action
Role List Enter roles for the local authentication entry. Enter the role and click + to add a role.
To delete a role, select the role and click the delete (X) icon.
To edit a role, hover over the role name and click the pencil icon.
NOTE: You can configure only maximum of 200 roles for a local authentication entry.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > Local Authentication.
1. Select a local authentication entry that you want to delete on the Local Authentication page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 96
IN THIS CHAPTER
You are here: Security Services > Firewall Authentication > Authentication Priority.
Table 306 on page 1112 describes the fields on the Authentication Priority page.
Field Description
Enable local authentication Select the Enable local authentication check box to enable local authentication.
Enable unified access Select the check box to enable UAC authentication.
control
1113
Field Description
Enable active directory Select the check box to enable UAC authentication.
Reset Click Reset to set the priority values and enable options to the default
configuration.
RELATED DOCUMENTATION
CHAPTER 97
Firewall Authentication—JIMS
IN THIS CHAPTER
IN THIS SECTION
You are here: Security Services > Firewall Authentication > JIMS.
You can add, edit or delete a Juniper Identity Management Services (JIMS) profile. You can also view the
connection status of this SRX Series Firewall with the JIMS.
• Add a Juniper Identity Management Service profile. See "Add a Juniper Identity Management Service
Profile" on page 1115.
• Edit a Juniper Identity Management Service profile. See "Edit a Juniper Identity Management Service
Profile" on page 1119.
1115
• Delete a Juniper Identity Management Service profile. See "Delete a Juniper Identity Management
Service Profile" on page 1120.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > JIMS.
Table 307: Fields on the Configure Juniper Identity Management Service Profile Page
Field Action
General Information
Connection Type Select a connection type from the list. The options
available are: HTTPS and HTTP.
Table 307: Fields on the Configure Juniper Identity Management Service Profile Page (Continued)
Field Action
Primary CA Certificate file upload Enables you to locate and upload the CA certificate.
Primary CA Certificate file path Enter a file path of the primary CA certificate.
Primary Client Secret Enter a password which enables you to access the
primary identity management server.
Secondary Juniper Identity Management Service Enables a secondary JIMS server, its IP address, CA
Server certificate, client ID, and client secret.
Table 307: Fields on the Configure Juniper Identity Management Service Profile Page (Continued)
Field Action
Token API Enter the token API to specify the path of the URL for
acquiring access token.
Default is ’oauth_token/oauth’.
Query API Enter the path where the URL for querying user
identities is located. Default is ‘user_query/v2’.
Advanced Settings
Batch Query
Item Per Batch Specifies the maximum number of items in one batch
query.
Query Interval Specifies the interval for querying the newly generated
user identities.
IP Query
Query Delay Time Specifies the time delay to send individual IP query.
Table 307: Fields on the Configure Juniper Identity Management Service Profile Page (Continued)
Field Action
Authentication Timeout
Authentication Entry Timeout Enter the value in minutes. The value range is 0 or
10~1440 (minutes). 0 means no need for a timeout. the
default value is 60.
Invalid Authentication Entry Timeout Enter the value in minutes. The value range is 0 or
10~1440 (minutes). 0 means no need for a timeout. the
default value is 60.
Filter
NOTE: You can select address set with maximum of 20 IP addresses and address set with wild card addresses.
Include IP Address Book Select an IP address book from the predefined address
book in which an address set must be selected as IP
filter.
Exclude IP Address Book Select an IP address book that you want identity
management profile to exclude.
1119
Table 307: Fields on the Configure Juniper Identity Management Service Profile Page (Continued)
Field Action
Exclude IP Address Set Select the predefined address set that you want
identity management profile to exclude.
Filter to Domain Enter one or more active directory domains, to the SRX
Series Firewall. You can specify up to twenty domain
names for the filter.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > JIMS.
1. Select the existing JIMS profile that you want to edit on the Juniper Identity Management Service
page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit a Juniper Identity Management Service Profile page appears with editable fields. For more
information on the options, see "Add a Juniper Identity Management Service Profile" on page 1115.
3. Click OK to save the changes.
RELATED DOCUMENTATION
You are here: Security Services > Firewall Authentication > JIMS.
1. Click the delete icon available on the upper-right corner of the Juniper Identity Management Service
page.
2. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION
CHAPTER 98
ICAP Redirect
IN THIS CHAPTER
IN THIS SECTION
• Create an ICAP redirect profile. See "Add an ICAP Redirect Profile" on page 1123.
• Edit an ICAP redirect profile. See "Edit an ICAP Redirect Profile" on page 1126.
• Delete an ICAP redirect profile. See "Delete ICAP Redirect Profile" on page 1126.
1122
• Filter the ICAP redirect profiles based on select criteria. To do this, select the filter icon at the upper-
right corner of the ICAP redirect profiles table. The columns in the grid change to accept filter
options. Type the filter options; the table displays only the data that fits the filtering criteria.
• Show or hide columns in the ICAP redirect profiles table. To do this, click the Show Hide Columns
icon in the upper-right corner of the ICAP redirect profiles table and select the options you want to
view or deselect the options you want to hide on the page.
• Advance search for ICAP redirect profiles. To do this, use the search text box present above the table
grid. The search includes the logical operators as part of the filter string. In the search text box, when
you hover over the icon, it displays an example filter condition. When you start entering the search
string, the icon indicates whether the filter string is valid or not.
Based on your input, a list of items from the filter context menu appears.
2. Select a value from the list and then select a valid operator based on which you want to perform
the advanced search operation.
NOTE: Press Spacebar to add an AND operator or OR operator to the search string. Press
backspace at any point of time while entering a search criteria, only one character is
deleted.
Field Descriptions
Table 308 on page 1122 describes the fields on the ICAP Redirect Profile page.
Field Description
Field Description
Fallback Option Specifies the request timeout action when the request is sent to the server.
RELATED DOCUMENTATION
Field Action
Name Enter a unique ICAP Service profile name. The string must contain alphanumeric
characters, colons, periods, dashes, and underscores. No spaces are allowed; maximum
length is 63 characters.
Timeout Enter the server response timeout in milliseconds. The range is between 100 milliseconds
to 50000 milliseconds.
1124
Table 309: Fields on the Create ICAP Redirect Profile Page (Continued)
Field Action
ICAP Server
You can configure ICAP Redirection server by the following options:
Add—Create an ICAP Redirect server. Enter information as specified in Table 310 on page 1124.
Edit—Edit an ICAP Redirect server configuration. Enter information as specified in Table 310 on page 1124.
Fallback Option
Timeout Action Select the timeout action from the list. The available options are: None, Permit, Log Permit,
and Block.
Connectivity Action Select the connectivity action from the list that the request cannot be sent out due to
connection issues.
Default Action Select a default action from the list to be taken when there are scenarios other than the
above two mentioned ones.
Field Action
The string must contain alphanumeric characters, colons, periods, dashes, and
underscores. No spaces are allowed; maximum length is 63 characters.
Table 310: Fields on the Create ICAP Redirect Server Page (Continued)
Field Action
Host Enter the host name or host IP address depending on what host type you choose.
Port Specifies the port in the server. This is the server listening post and the default port will be
reached according to protocol defined.
Authentication
Based on the Credential Type that you choose, enter the ASCII string or Base64 string.
URL
Request MOD Enter the reqmod uri that can be configured for ICAP server only.
Response MOD Enter the respmod uri that can be configured for ICAP server only.
Routing Instance Specifies the virtual router that is used for launching.
SSL Initiation Profile Select an SSL initiation profile from the list.
RELATED DOCUMENTATION
1. Select the existing ICAP redirect profile that you want to edit on the ICAP Redirect page.
2. Click the pencil icon available on the upper-right corner of the page.
The Edit ICAP Redirect Profile page appears with editable fields. For more information on the
options, see "Add an ICAP Redirect Profile" on page 1123.
3. Click OK to save the changes.
RELATED DOCUMENTATION
1. Select one or more ICAP redirect profile that you want to delete on the ICAP Redirect page.
2. Click the delete icon available on the upper-right corner of the page.
3. Click Yes to delete or click No to retain the profile.
RELATED DOCUMENTATION