Ready. Set. Let’s go!
Set up your Security Director with these high-level steps and start managing your SRX Series devices.
Use a device discovery profile to find a device and synchronize it with the Junos Space Network Management Platform database.
To configure a device discovery profile:
The Device Discovery page appears.
The Create Discovery Profile page appears.
Discover devices with the device discovery profile you just created.
To run a device discovery profile:
The Device Discovery page appears.
To enable the Logging and Reporting module for log collection across multiple SRX Series devices:
You can set up Log Collectors in both the VM and JA2500 appliance. You can configure Log Collector as an All in One node or integrated node for small-scale deployments. For easy scaling, begin with a single Log Receiver node and Log Storage node, and incrementally add Log Storage nodes as your needs expand. You can add a maximum of one Log Receiver node and three Log Storage nodes.
For a VM environment and a JA2500 deployments, a single OVA image is used to deploy the All in One, Log Receiver, and Log Storage nodes. The image presents a configuration script after you log in. Select the appropriate memory and CPU configuration values for the role of the VM.
Note: Starting in Junos Space Security Director Release 17.2, for distributed deployment, you can add only Log Receiver node in Security Director and cannot add Log Storage node.
Note: For details on deploying and configuring JSA, see Juniper Secure Analytics documentation.
Create addresses to use in Firewall, NAT, IPS, and VPN services and apply them to the corresponding SRX Series devices.
To create an address:
To configure, publish, and update a firewall or a NAT policy:
The Create Policy page appears.
Create IPsec VPNs to securely communicate among remote computers across a public WAN such as the Internet. To configure, publish, and update an IPsec VPN:
To manage intrusion prevention system (IPS) or application firewall policies, you must download the signature database, install it to a device, create an IPS or application firewall policy, and then publish and update them to a device.
Use the Signature Database page to download and install the signature database to security devices.
To download the signature database configuration:
The Signature Download Settings page appears.
Select Run now to download the signature database immediately.
Select Schedule at a later time to set the signature database to automatically download at a specified time.
The downloaded signatures and configuration details are saved in the System domain.
To install the signature database:
The Install Signatures page appears. You can view the summary of the active signature database version, which will be installed on your device.
Select Run now to install the signature database immediately.
Select Schedule at a later time to set the signature database to automatically install at specified time.
If there is no Internet connection to download the package, perform an offline update of the signature database files by downloading the latest signature version from the following location and store it on your local system: https://services.netscreen.com/space/2/latest/latest-space-update.zip.
To configure an application firewall policy, you must create a policy and then add rules to it. To create an application firewall policy:
The Create Application Firewall Policy page appears.
A new application firewall policy is created.
Use IPS policy templates to create IPS policies. Juniper Networks provides predefined policy templates that you can use as a starting point to create your own policies. To customize these templates to work on your network, select your own source and destination addresses and choose the IPS actions that reflect your security needs. You can modify the template either by using the Advance option in the IPS Policy page or cloning the template.
To create an IPS policy template:
The Create IPS Policy Template page appears.
A new IPS policy template with your configurations is created.
You can now use this policy template in IPS policies.
Create IPS policies to enforce various attack detection and prevention techniques on traffic traversing your network.
To configure an IPS policy:
The Create IPS Policy page appears.
You can enable an IPS or application firewall policy for a firewall group policy to scrutinize all of the bits contained within packets to look for both known and unknown attacks.
To apply an IPS or application firewall policy on a firewall group policy:
The Firewall Policies page appears.
The Create Rule page appears.
Action—Set this field to Permit to permit the traffic using the type of firewall authentication you applied to the policy.
IPS—Set this field to On.
App Firewall—Select the application firewall policy from the list.
SSL proxy is enabled as an application service within a security policy. You can specify the traffic that you want the SSL proxy enabled on as match criteria and then specify the SSL proxy profile to be applied to the traffic.
To create an SSL forward proxy profile:
The Create SSL Forward Proxy Profiles page appears.
Note: If none of the services (AppFW, IDP, or AppTrack) are configured, then SSL proxy services are bypassed even if an SSL proxy profile is attached to a firewall policy.
Use the Unified Threat Management (UTM) policy page to configure UTM policies. UTM consolidates several security features into one device to protect against multiple threat types.
To configure, publish, and update the UTM policy:
The Create UTM Policies wizard appears.
Antispam— Examine transmitted e-mail messages to identify e-mail spam over SMTP.
Antivirus—Inspect files transmitted over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) to determine if the files exchanged are known malicious files, similar to how desktop antivirus software scans files for the same purpose.
Content filtering—Block or permit certain types of traffic over several protocols (HTTP, FTP upload and download, IMAP, SMTP, and POP3) based on the MIME type, file extension, protocol command, and embedded object type.
Web Filtering—Manage Internet usage by preventing access to inappropriate Web content over HTTP.
Device—Configure UTM global options for a device. The device profile refers to the antispam, antivirus, and Web filtering profiles.
Policy Enforcer provides centralized, integrated management of all your security devices (both physical and virtual), allowing you to combine threat intelligence from different solutions and act on that intelligence from one management point. Using Policy Enforcer and the intelligence feeds it offers through Sky ATP, you can create threat prevention policies that provide monitoring and actionable intelligence for threat types such as known malware, command and control servers, infected hosts, and Geo IP-based server data.
To use Policy Enforcer, you must do the following:
Policy Enforcer is delivered as an OVA package to be deployed inside your VMware ESX network. As with other Juniper Networks virtual appliances, Policy Enforcer requires either a VMware ESX server version 4.0 or later or a VMware ESXi server version 4.0 or later.
Note: Detailed instructions for downloading Policy Enforcer and creating your policy enforcer virtual machine are provided in the Policy Enforcer Administration Guide and in the Security Director Help Center.
Note: If you are using Sky ATP without Policy Enforcer (SDSN) or Cloud Feeds only, you must still download Policy Enforcer and create a policy enforcer virtual machine. A Sky ATP license and a Sky ATP account are also needed for all threat prevention types (Sky ATP with SDSN, Sky ATP, and Cloud feeds only). If you do not have a Sky ATP license, contact your local sales office or Juniper Networks partner to place an order for a Sky ATP premium or basic license.
You must assign or reassign policies to different domains when it is first configured and whenever you want to implement a change. You can assign only one policy at a time to a domain. Security Director validates the domain assignment. If the assignment is not acceptable, a warning message is displayed.
To assign a policy to a domain:
The Assign <Policy-Name> to Domain page appears.
Note: <Policy-Name> is the name of the policy that you are assigning to a domain.
A policy is assigned to a domain and you can now use the policy.
After you create and verify security policies, you can publish these policies to make them ready to be updated to the security devices. The Publish workflow provides the ability to save and publish different services to be updated at a later time to the appropriate firewalls (during the down time).
To publish and update a policy:
Note: You can search for a specific device by entering the search criteria in the search field. You can search the devices by their name and IP address.
Do one of the following:
Select Run now to publish or update the policy immediately.
Select Schedule at a later time to schedule and publish the policy later.
Note: Use the publish work flow to save and publish different services to be updated at a later time. Administrators can review their firewall, VPN, and NAT policies before updating the device. Verify and tweak your security configurations before updating them to the device by viewing the CLI and XML version of the configuration in the Publish workflow.
Security Director allows you to import firewall, NAT, and IPS policies from a device. All objects supported by Security Director are imported during the policy import process.
To import a device configuration to Security Director:
The Import Configuration page appears.
Note: Every time you import a policy, Security Director creates a new policy. You will see conflicts when policies have same names but different definitions.
Security Director displays a summary of the configuration changes.
The summary report will be downloaded as a PDF file.
Note: Click Download Summary to download the summary report. The summary report is downloaded as a PDF file.