Download This Guide
New and Changed Features
This section describes the new features and enhancements to existing features in Junos Space Security Director Release 17.1.
- VMWare NSX Integration—VMware
NSX is network virtualization product by VMware. It integrates with
vCenter and provides users the ability to create and manage logical
networks without modifying the underlying physical network. NSX supports
Distributed Firewall architecture. The VMWare distributed firewall
currently supports only the basic firewall features such as Layer
2, Layer 3, and Layer 4. It does not provide advanced Layer 4 to Layer
7 security services which are critical to provide complete protection
in a Software Defined Data Center (SDDC) environment.
You can now add the vSRX Virtual Services Gateway as a partner security service in the VMware NSX environment. The vSRX works in conjunction with Junos Space Security Director and VMware NSX Manager to deliver a complete and integrated virtual security solution for your SDDC environment. The vSRX provides advanced security services, including IPS and application control and visibility services through AppSecure.
- Custom Application Signatures—Application Identification supports defining your own custom
application signatures and signature groups. Custom application signatures
are unique to your environment and are not part of the predefined
application package when you install them into the device. The custom
application signatures are pushed to the device when you publish or
update and subsequently, you can use them in the application firewall
policy rules only.
You can import the custom application signatures from a device and also push the created custom application signatures to a device, by using the publish and update workflow. The custom application signatures are supported in Junos OS Release 15.1X49.D40 and later.
- Packet Capture—You can
now use the Packet Capture tool to download the packets captured by
the SRX Series devices corresponding to attacks and analyze these
packets externally using tools such as Wireshark, tcpdump, tshark,
and so on. The Packet Capture tool captures the data packet and helps
you analyze the network traffic and troubleshoot network problems.
The packet capture tool captures real-time data packets traveling
over the network for monitoring and logging purposes. You must configure
the SRX Series device to send the attack packets to the Junos Space
Network Management Platform.
Based on the pre-configured set of rules, SRX Series devices classify the packets as normal or an attack. When there is an attack, SRX Series device sends the attack packets to the Junos Space Network Management Platform which runs a load balancer bound with a virtual IP. You must configure the SRX Series devices with the virtual IP as the destination for forwarding captured packets. Junos Space Network Management Platform receives those packets and stores them. You can view the attack information and download packets that constitute the attack from the Security Director application.
Note: Packet Capture is applicable only for IPS packets.
- Captive Portal Support for Unauthenticated
Browser Users—The SRX Series device now presents
the user with a captive portal interface to allow the user to authenticate,
when a user requests access to an SRX Series protected resource, using
an HTTP or HTTPS browser.
Junos Space Security Director supports Auth Only Browser and Auth User Agent parameters to give you high control over how HTTP or HTTPS traffic is handled.
- IKE Path Fragmentation—IKEv2 message fragmentation now allows IKEv2 to operate in environments where IP fragments might be blocked and peers would not be able to establish an IPsec security association (SA). The IKEv2 fragmentation splits a large IKEv2 message into a set of smaller ones so that there is no fragmentation at the IP level.
- Advanced User Identities Query Support—You can query for an advanced user identities from Juniper
Identity Management Service (JIMS). JIMS provides a robust and scalable
user identification and IP address mapping implementation that includes
endpoint context and machine ID. JIMS collects advanced user identities
from different authentication sources for SRX Series devices.
Junos Space Security Director is used to push the JIMS configuration to SRX Series devices to help them query JIMS to obtain IP address or user mapping and device information. SRX Series devices generate the authentication entries for user firewall. However, SRX firewall authentication can also push the authentication entries to JIMS.
- SSL Forward Proxy-New Cipher Support—The Elliptic Curve DHE (ECDHE) cipher suits are supported
to enable the perfect forward secrecy on SSL forward proxy. The SSL
forward proxy still uses RSA for authentication. However, it uses
EC Diffie-Hellman ephemeral key exchange to agree on a shared secret.
Supported ECDHE Cipher Suits are:
- ECDHE-RSA-WITH-AES-256-GCM-SHA384
- ECDHE-RSA-WITH-AES-256-CBC-SHA384
- ECDHE-RSA-WITH-AES-256-CBC-SHA
- ECDHE-RSA-WITH-AES-3DES-EDE-CBC-SHA
- ECDHE-RSA-WITH-AES-128-GCM-SHA256
- ECDHE-RSA-WITH-AES-128-CBC-SHA256
- ECDHE-RSA-WITH-AES-128-CBC-SHA
- Change Control Workflow—The
Change Control workflow allows you to request an approval for a change
to a firewall or a NAT policy. The system tracks dependencies across
change requests and makes these dependencies and change requests visible
to the firewall administrator.
- Provides a direct correlation between a change ticket ID and its details and the associated firewall or NAT policy.
- The policies that are modified within an activity (or configuration session) are locked from being modified within other activities. This prevents conflicting changes that could make a policy unstable. In addition, the changes you make within an activity are visible only within the activity. Other users see only the last approved committed configurations, unless they view your activity before you close it.
- All the activities are tracked within the workflow. You can use this information to determine what changes were made and who made the changes.
- Allows you to approve and deploy the change requests to the network irrespective of the order in which they are created.
- Reporting Enhancements—The
following predefined reports are added:
- Antivirus—Displays a consolidated report on all antivirus events statistics.
- URL Report—Displays a consolidated report on all the URL events statistics.
- Application and User Usage—Displays a report on the bandwidth usage statistics by applications and users.
- Threat Report—Displays the statistics related to top threats identified through IDP, Antivirus, Antispam, Screen, and Device Authentication failure events.
- Additional Dashboard Widgets—The following new dashboard widgets are available:
- Application Top Application by Volume—Displays top applications based on volume or bandwidth.
- IP Top Source IPs by Volume—Displays top source IP addresses of the network traffic by volume or bandwidth.
- IP Top Spams By Source IPs—Displays top source IP addresses for spams.
- Web Filtering Top Blocked Websites—Displays blocked websites, sorted by count.
- Virus Top Blocked—Displays blocked viruses, sorted by count.
- IP Top Source IPs by Sessions—Displays top source IP addresses of the network traffic by sessions.