Help Center User GuideGetting StartedFAQRelease Notes
 
X
User Guide
Getting Started
FAQ
Release Notes
Contents  

List of Figures

Figure 1: Security Director Access and Log in

Figure 2: Banner

Figure 3: Junos Space Platform Link

Figure 4: Search Utility

Figure 5: Domain Switcher

Figure 6: Notification Center

Figure 7: User Functions Menu

Figure 8: Help Button

Figure 9: Multiple Character Search

Figure 10: Single Character Search

Figure 11: Partial Name Search with Single Character Replacement

Figure 12: Global Search

Figure 13: ILP Search

Figure 14: Column Search

Figure 15: Column Search-Example1

Figure 16: Column Search-Example 2

Figure 17: Column Search-Example 3

Figure 18: Item Selector Search

Figure 19: Search with Delimiter

Figure 20: Search Without Delimiter

Figure 21: Refresh Search Index

Figure 22: Security Director Dashboard Tab

Figure 23: Security Director Monitor Tab

Figure 24: Security Director Devices Tab

Figure 25: Security Director Configure Tab

Figure 26: Security Director Reports Tab

Figure 27: Security Director Administration Tab

Figure 28: Configuration Update Preview

Figure 29: Overview Page

Figure 30: Monitored Tunnels

Figure 31: Devices Page

Figure 32: LSYS and VRF Instance Support

Figure 33: vSRX, Security Director, and VMware NSX Integration Workflow

Figure 34: Service Instances Page

Figure 35: Create a New Security Group Page

Figure 36: Add NSX Manager Page

Figure 37: NSX Managers Page

Figure 38: Register Security Service Page

Figure 39: Service Definitions Page

Figure 40: vSphere Web Client Service Manager Page

Figure 41: Add Static IP Pool Page

Figure 42: Deploy Network and Security Services Page

Figure 43: Select Storage and Management Network Page

Figure 44: Security Groups Page

Figure 45: Virtual Machines Page

Figure 46: Firewall Policy Rules Page

Figure 47: NSX Security Groups Page

Figure 48: Firewall Page

Figure 49: Security Devices Page

Figure 50: Policy Lookup

Figure 51: SSL Inspection on an Existing SRX Series Device

Figure 52: SSL Proxy on an Encrypted Payload

Figure 53: UTM Components

Figure 54: APBR Flow Diagram

Figure 55: Topology of NSX Integration with Policy Enforcer

Figure 56: VMWare vCenter BGP Configuration

Figure 57: SDSN_BLOCK Security Tag

Figure 58: Define Dynamic Membership Page

Figure 59: Adding NSX Manager Page

Figure 60: Guided Setup Page

Figure 61: New Firewall Rule Page

Figure 62: Apply Policy to SG Page

Figure 63: Email Management Overview

Figure 64: Variable Address Usage

Figure 65: Hierarchy of Zone Set, Zones, and Zone Members

Figure 66: Basic Zone Topology

Figure 67: Change Control Workflow Configuration

Figure 68: Confirm Change Control Workflow

Figure 69: Create Change Request Page

Figure 70: Change Requests Page

Figure 71: Approve Request Page

Figure 72: Deny Request Page

Figure 73: Update Change Request Page

Figure 74: Comparing Traditional SRX Customers to Policy Enforcer Customers

Figure 75: Perimeter-Defined Security Model

Figure 76: Policy Enforcer and Juniper Connected Security

Figure 77: Sky ATP Components

Figure 78: Components of the Policy Enforcer Deployment Model

Figure 79: Blocking an Infected Endpoint

Figure 80: Tracking Infected Endpoint Movement

Figure 81: Third-Party Switch Support

Figure 82: Defining the Basic Network Configuration Settings

Figure 83: Prompt for Configuring the NTP Servers

Figure 84: Configuring the NTP Servers

Figure 85: Changing the Root Password

Figure 86: Reviewing and Changing Your Configuration Settings

Figure 87: Reviewing Your Configuration Settings

Figure 88: Defining the Basic Network Configuration Settings

Figure 89: Prompt for Configuring the NTP Servers

Figure 90: Configuring the NTP Servers

Figure 91: Changing the Root Password

Figure 92: Reviewing and Changing Your Configuration Settings

Figure 93: Reviewing Your Configuration Settings

Figure 94: Deletion Failed Warning

Figure 95: Detailed View Page

Figure 96: DEX Accounts Page

Figure 97: Add Property-General Pane Page

Figure 98: DEX Properties Page

Figure 99: Add IP Range Page

Figure 100: DEX Security Settings Page

Figure 101: Web API User Settings Page

Figure 102: Web API Client IPs Page

Figure 103: Edit Connector Page

Figure 104: Edit Connector - Network Details Page

Figure 105: ForeScout Connector - Configuration Tab

Figure 106: Host Information

Figure 107: ClearPass API Client Operator Profile Minimum Privileges

Figure 108: ClearPass Edit API Client

Figure 109: ClearPass Edit Attribute

Figure 110: ClearPass Enforcement Profile: Quarantine

Figure 111: ClearPass Enforcement Profile: Terminate

Figure 112: ClearPass Enforcement Policy

Figure 113: Cisco ISE: Enable Policy Sets Mode

Figure 114: Cisco ISE: Create Admin User and Assign to Admin Groups

Figure 115: Cisco ISE: Enable ERS

Figure 116: Cisco ISE: Network Device Profiles List

Figure 117: Cisco ISE: Network Device Profile, Enable RADIUS

Figure 118: Cisco ISE: Configure Change of Authorization (CoA)

Figure 119: Sample Configuration for Juniper EX

Figure 120: Cisco ISE: Add Attribute sdsnEpStatus

Figure 121: Cisco ISE: Verify Attribute

Figure 122: Cisco ISE: Configure Simple Conditions, Match Expression

Figure 123: Cisco ISE: Configure Simple Conditions, Match Expression

Figure 124: Cisco ISE: Configure Authorization Profiles

Figure 125: Cisco ISE: Configure Authorization Profiles

Figure 126: Cisco ISE: Local Exception Rules, Example

Figure 127: RADIUS Return Attributes for Quarantine-Host

Figure 128: RADIUS Return Attributes for Clear-Quarantine

Figure 129: Pulse Secure Templates Page

Figure 130: Pulse Secure - New Policy Page

Figure 131: Pulse Secure - Policies Configure Page

Figure 132: Pulse Secure - New Client Page

Figure 133: Create Connector Page

Figure 134: Create Connector Network Details Page

Figure 135: Connectors Page

Figure 136: Pulse Secure Events Page

Figure 137: Infected Hosts Reports Page

Figure 138: Debug Log Monitoring Page

Figure 139: Policy Enforcer Settings Page

Figure 140: Sky ATP Hosts Page

Figure 141: Threat Presentation Guided Setup

Figure 142: Threat Prevention Configuration

Figure 143: Deploy Policy Enforcer OVF File 1

Figure 144: Deploy Policy Enforcer OVF File 2

Figure 145: Policy Enforcer Configuration Summary

Figure 146: Spotlight Secure: Add Information Source

Figure 147: Spotlight Secure: Create Security Intelligence Profile

Figure 148: Spotlight Secure: Create Profile

Figure 149: Spotlight Secure: Create Security Intelligence Policy

Figure 150: Spotlight Secure: Apply Security Intelligence Policy to Firewall Policy

Figure 151: Policy Enforcer: Create Threat Prevention Policy

Figure 152: Policy Enforcer: Create Threat Prevention Policy, Select Threat Score and Logging

Figure 153: Policy Enforcer: Apply Threat Prevention Policy to Firewall Policy

Figure 154: Policy Enforcer: Update Firewall Policy

Figure 155: Spotlight Secure: Add Information Source

Figure 156: Spotlight Secure: Configure Custom File Upload

Figure 157: Spotlight Secure: Enter Server Login for Custom File Upload

Figure 158: Spotlight Secure: Select Custom Feed in Dynamic Address Group

Figure 159: Spotlight Secure: Select Dynamic Address in Security Policy

Figure 160: Spotlight Secure: Edit Global Whitelist or Blacklist

Figure 161: Policy Enforcer: Configure Custom Feed

Figure 162: Policy Enforcer: Upload Custom File

Figure 163: Policy Enforcer: Use Dynamic Addresses in Firewall Policy

Figure 164: Spotlight Secure: Create Geo IP with Dynamic Address Group

Figure 165: Spotlight Secure: Use Geo IP in Firewall Policy

Figure 166: Policy Enforcer: Create Geo IP

Figure 167: Policy Enforcer: Use Geo IP in the Firewall Policy

Figure 168: Security Director Domains

Figure 169: Security Director Roles

Figure 170: Security Director Users

Figure 171: D1 Domain Addresses

Figure 172: D2 Domain Addresses

Figure 173: Security Director Domain References

Figure 174: Change Password

Figure 175: High-Level Device Import Workflow

Help us to improve. Rate this article.
Feedback Received. Thank You!

Ask questions in TechWiki

Check documentation in TechLibrary

Rating by you:      
X

Additional Comments

800 characters remaining

May we contact you if necessary?

Name:
Email:

Need product assistance? Contact Juniper Support

Submit