Help Center User GuideGetting StartedFAQ
 
X
User Guide
Getting Started
FAQ
Contents  

Table of Contents

About the Documentation
Documentation and Release Notes
Documentation Conventions
Documentation Feedback
Requesting Technical Support
Overview
Introduction
Unified Administration and Customer Portal Overview
Customer Portal Overview
Switching the Tenant Scope
Accessing Customer Portal
Setting Up Your Network with Customer Portal
Changing the Password on First Login
Changing the Customer Portal Password
Resetting the Password
Extending the User Login Session
Dashboard
Using the Dashboard
About the Customer Portal Dashboard
Managing Objects
Sorting Objects
Viewing Object Details
Searching for Text in an Object Data Table
Monitoring the Customer Portal
Monitoring Security Alerts and Alarms
About the Monitor Overview Page
Alerts Overview
About the Generated Alerts Page
About the Alert Definitions Page
Managing Security Alerts Definitions
Creating Security Alert Definitions
Editing, Cloning, and Deleting Security Alert Definitions
Editing Security Alert Definitions
Cloning Security Alert Definitions
Deleting Security Alert Definitions
About the Alarms Page
Monitoring Security and Device Events
About the All Security Events Page
About the Firewall Events Page
About the Web Filtering Events Page
About the IPsec VPNs Events Page
About the Content Filtering Events Page
About the Antispam Events Page
About the Antivirus Events Page
About the IPS Events Page
About the Device Events Page
About the Screen Events Page
Monitoring SD-WAN Events
SD-WAN Events Overview
About the SD-WAN Events Page
Monitoring Applications
About the SLA Performance of a Single Tenant Page
Viewing the SLA Performance of a Site
SLA Not Met by SLA Profiles
Applications SLA Performance by Throughput
SLA Performance for ALL
Viewing the SLA Performance of an Application or Application Group
Application Visibility Overview
About the Application Visibility Page
Selecting Devices
Monitoring Threats
About the Threats Map (Live) Page
Monitoring Jobs
About the Jobs Page
Editing and Deleting Scheduled Jobs
Editing Scheduled Jobs
Deleting Scheduled Jobs
Viewing Job Details
Retrying a Failed Job on Devices
Managing Resources
Managing Devices
Multidepartment CPE Device Support
About the Devices Page
Performing Return Material Authorization (RMA) for a Single-CPE Device
Performing Return Material Authorization (RMA) for Dual-CPE Devices
Performing RMA for an NFX Cluster
Performing RMA for an SRX Cluster
Granting RMA for a Device
Granting RMA for a Single-CPE Device
Granting RMA for a Dual-CPE Device
Granting RMA for an SRX Device within an SRX Cluster
Managing a Single CPE Device
Rebooting a CPE Device
Managing Device Images
Device Images Overview
About the Device Images Page
Deleting Device Images
Managing Configuration
Configuring Network Services in a Distributed Deployment
Network Service Overview
About the Network Services Page
About the Service Overview Page
About the Service Instances Page
Configuring VNF Properties
vSRX VNF Configuration Settings
LxCIPtable VNF Configuration Settings
Cisco CSR-1000v VNF Configuration Settings
Riverbed Steelhead VNF Configuration Settings
Managing Firewall Policies
Firewall Policy Overview
About the Firewall Policy Page
Creating Firewall Policy Intents
Editing, Cloning, and Deleting Firewall Policy Intents
Editing Firewall Policy Intents
Cloning Firewall Policy Intents
Deleting Firewall Policy Intents
Selecting Firewall Source
Adding an End Point as Firewall Source
Selecting Firewall Source Using Abbreviations
Selecting a Firewall Source from the End Points Panel
Creating and Selecting a Firewall Source from the End Points Panel
Creating Addresses from Source
Selecting Firewall Destination
Adding an End Point as Firewall Destination
Selecting Firewall Destination Using Abbreviations
Selecting a Firewall Destination from the End Points Panel
Creating and Selecting a Firewall Destination from the End Points Panel
Creating Addresses from Destination
Firewall Policy Examples
Firewall Policy Schedules Overview
About the Firewall Policy Schedules Page
Creating Schedules
Editing, Cloning, and Deleting Schedules
Editing Schedules
Cloning Schedules
Deleting Schedules
Unified Threat Management
UTM Overview
Configuring UTM Settings
About the UTM Profiles Page
Creating UTM Profiles
Editing, Cloning, and Deleting UTM Profiles
Editing UTM Profiles
Cloning UTM Profiles
Deleting UTM Profiles
About the Web Filtering Profiles Page
Creating Web Filtering Profiles
Editing, Cloning, and Deleting Web Filtering Profiles
Editing Web Filtering Profiles
Cloning Web Filtering Profiles
Deleting Web Filtering Profiles
About the Antivirus Profiles Page
Creating Antivirus Profiles
Editing, Cloning, and Deleting Antivirus Profiles
Editing Antivirus Profiles
Cloning Antivirus Profiles
Deleting Antivirus Profiles
About the Antispam Profiles Page
Creating Antispam Profiles
Editing, Cloning, and Deleting Antispam Profiles
Editing Antispam Profiles
Cloning Antispam Profiles
Deleting Antispam Profiles
About the Content Filtering Profiles Page
Creating Content Filtering Profiles
Editing, Cloning, and Deleting Content Filtering Profiles
Editing Content Filtering Profiles
Cloning Content Filtering Profiles
Deleting Content Filtering Profiles
About the URL Patterns Page
Creating URL Patterns
Editing, Cloning, and Deleting URL Patterns
Editing URL Patterns
Cloning URL Patterns
Deleting URL Patterns
About the URL Categories Page
Creating URL Categories
Editing, Cloning, and Deleting URL Categories
Editing URL Categories
Cloning URL Categories
Deleting URL Categories
Managing SD-WAN
SLA Profiles and SD-WAN Policies Overview
About the SD-WAN Policy Page
Creating SD-WAN Policy Intents
Editing and Deleting SD-WAN Policy Intents
Editing SD-WAN Policy Intents
Deleting SD-WAN Policy Intents
About the Application SLA Profiles Page
Creating SLA Profiles
Editing and Deleting SLA Profiles
Editing an SLA Profile
Deleting SLA Profiles
Managing NAT Policies
NAT Policies Overview
About the NAT Policies Page
Creating NAT Policies
Editing and Deleting NAT Policies
Editing NAT Policies
Deleting NAT Policies
About the Single NAT Policy Page
Creating NAT Policy Rules
Editing, Cloning, and Deleting NAT Policy Rules
Editing NAT Policy Rules
Cloning NAT Policy Rules
Deleting NAT Policy Rules
Deploying NAT Policy Rules
Selecting NAT Source
Adding an Endpoint as NAT Source
Selecting Interfaces when GWR Resides Inside an NFX Box
Selecting NAT Source Using Abbreviations
Selecting a NAT Source from the End Points Panel
Creating and Selecting a NAT Source from the End Points Panel
Creating Addresses from Source Field
Selecting NAT Destination
Adding an Endpoint as NAT Destination
Selecting Interfaces when GWR Resides Inside an NFX Box
Selecting NAT Destination Using Abbreviations
Selecting a NAT Destination from the End Points Panel
Creating and Selecting a NAT Destination from the End Points Panel
Creating Addresses from Destination Field
Creating Services from Destination Field
NAT Pools Overview
About the NAT Pools Page
Creating NAT Pools
Editing, Cloning, and Deleting NAT Pools
Editing NAT Pools
Cloning NAT Pools
Deleting NAT Pools
Managing SSL Proxies
SSL Forward Proxy Overview
About the SSL Proxy Policy Page
Creating SSL Proxy Policy Intents
Editing, Cloning, and Deleting SSL Proxy Policy Intents
Editing SSL Proxy Policy Intents
Cloning SSL Proxy Policy Intents
Deleting SSL Proxy Policy Intents
Understanding How SSL Proxy Policy Intents Are Applied
About the SSL Proxy Profiles Page
Creating SSL Forward Proxy Profiles
Editing, Cloning, and Deleting SSL Forward Proxy Profiles
Editing SSL Forward Proxy Profiles
Cloning SSL Forward Proxy Profiles
Deleting SSL Forward Proxy Profiles
Configuring and Deploying an SSL Forward Proxy Policy
Managing Shared Objects
Addresses and Address Groups Overview
About the Addresses Page
Creating Addresses or Address Groups
Editing, Cloning, and Deleting Addresses and Address Groups
Editing Addresses and Address Groups
Cloning Addresses and Address Groups
Deleting Addresses and Address Groups
Services and Service Groups Overview
About the Services Page
Creating Services and Service Groups
Creating Protocols
Editing and Deleting Protocols
Editing Protocols
Deleting Protocols
Editing, Cloning, and Deleting Services and Service Groups
Editing Services and Service Groups
Cloning Services or Service Groups
Deleting Services and Service Groups
Application Signatures Overview
About the Application Signatures Page
Creating Application Signature Groups
Editing, Cloning, and Deleting Application Signature Groups
Editing Application Signature Groups
Cloning Application Signature Groups
Deleting Application Signature Groups
About the Departments Page
Creating a Department
Modifying a Department
Deleting a Department
Managing Deployments
Deploying Policies Overview
About the Deployments Page
Using the Deployment Icon to Deploy Policies
Deploying Policies
Managing Sites and Site Groups
Managing Sites
About the Sites Page
Local Breakout Overview
Multihoming Overview
Device Redundancy Support Overview
Upgrading Sites Overview
Creating Spoke Sites for Hybrid WAN Deployment
Creating Local Service Edge Sites for Hybrid WAN Deployment
Creating Regional Service Edge Sites for Hybrid WAN Deployment
Creating On-Premise Hub Sites for SD-WAN Deployment
Creating On-Premise Spoke Sites for SD-WAN Deployment
Creating Cloud Hub Sites for SD-WAN Deployment
Creating Cloud Spoke Sites for SD-WAN Deployment
Provisioning a Cloud Spoke Site in AWS VPC
Add a Cloud Spoke Site
Configure the Cloud Spoke Site
Download the Cloud Formation Template
Provision the Device on AWS Server
Activate the Device
Importing Multiple Sites
Managing a Single Site
Configuring a Single Site
Upgrading Sites
Upgrading a Site
Upgrading Sites in Bulk
Managing LAN Segments on a Tenant Site
Creating LAN Segments
Deploying a LAN Segment
Reassigning a LAN Segment to a Department
Deleting LAN Segments
Activating a CPE Device
Activating Dual CPE Devices (Device Redundancy)
Viewing the History of Tenant Device Activation Logs
Configuring VRFs and PNE Details for a Site in a Centralized Deployment
Managing Site Groups
About the Site Groups Page
Creating Site Groups
Viewing Reports
Security Reports
Reports Overview
About the Security Report Definitions Page
Performing Different Actions on Reports
About the Security Generated Reports Page
Creating Log Report Definition
Creating Bandwidth Report Definition
Editing and Deleting Log Report Definitions
Editing the Log Report Definition
Deleting Log Report Definitions
Editing and Deleting Bandwidth Report Definitions
Editing the Bandwidth Report Definition
Deleting Bandwidth Report Definitions
SD-WAN Reports
About the SD-WAN Report Definitions Page
Editing and Deleting SD-WAN Report Definitions
Editing the SD-WAN Report Definition
Deleting SD-WAN Report Definitions
Creating SD-WAN Tenant Performance Report Definition
Creating SD-WAN Site Performance Report Definition
About the SD-WAN Generated Reports Page
Administration
Managing Tenant Users
Role-Based Access Control Overview
About the Tenant Users Page
Adding Tenant Users
Editing and Deleting Tenant Users
Editing Tenant Users
Deleting Tenant Users
Resetting the Password for Tenant Users
Managing Audit Logs
Audit Logs Overview
About the Audit Logs Page
Viewing the Details of an Audit Log
Exporting Audit Logs
Managing Tenant User Roles
Roles Overview
About the Tenant Roles Page
Adding User-Defined Roles for Tenant Users
Editing, Cloning, and Deleting User-Defined Roles for Tenant Users
Editing Roles
Cloning Roles
Deleting Roles
Access Privileges for Role Scopes (Service Provider, Tenant, and Operating Company)
Licenses
About the Licenses Page
Signature Database
Signature Database Overview
About the Active Database Page
Installing Signatures
Managing Certificates
Certificates Overview
About the Certificates Page
Importing a Certificate
Installing and Uninstalling Certificates
Installing a Certificate
Uninstalling a Certificate
About the VPN Authentication Page
Managing Juniper Identity Management Service
Juniper Identity Management Service Overview
About the Identity Management Page
Configuring CSO and JIMS Connection
Configuring JIMS for an SRX Device
Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit