Guided Setup is the most efficient way to complete your Sky ATP with Juniper Security configuration.
The Sky ATP Configuration type you select on the Policy Enforcer Settings page determines the guided setup process. Guided setup provides all the configuration items you need for your chosen type. See Sky ATP Configuration Type Overview for details on each configuration type.
Before you begin the guided setup process, you must enter the IP address and login credentials for the policy enforcer virtual machine on the Policy Enforcer Settings page. If you haven’t yet done that, go to Administration > Policy Enforcer > Settings and enter the necessary information. See Policy Enforcer Settings for more information.
A Sky ATP license and account are needed for all Sky ATP Configuration Types. (Sky ATP with Juniper Connected Security, Sky ATP, and Cloud Feeds only). If you do not have a Sky ATP license, contact your local sales office or Juniper Networks partner to place an order for a Sky ATP premium or basic license. If you do not have a Sky ATP account, when you configure Sky ATP, you are redirected to the Sky ATP server to create one. Please obtain a license before you try to create a Sky ATP account. Refer to Obtaining a Sky ATP License for instructions on obtaining a Sky ATP license.
There are some concepts you should understand before you begin the configuration. It is recommended you read about them here in advance. Policy Enforcer Configuration Concepts.
The Guided Setup process offers the following steps for configuring Sky ATP with Juniper Connected Security threat prevention.
The Threat Prevention Policy Setup page appears as shown in Figure 141.
Figure 141: Threat Presentation Guided Setup
The guided setup takes you through the various configuration, the first being Tenants, as shown in Figure 142.
The Secure Fabric page appears.
Note In Policy Enforcer Release 20.1R1, only MX series devices support LSYS and VRF. Also, only root-logical system is supported. All the sites of a realm are either with tenants or without tenants.
Figure 142: Threat Prevention Configuration
Sites—A site is a collection of network devices participating in threat prevention. Using quick setup, you can create your own site, but note that a device can only belong to one site and you must remove it from the any other site where it is used to use it elsewhere. For more information, see Creating Secure Fabric and Sites.
Click Add Devices in the Device Name column or in the IP address column to add devices to a site. Using the check boxes in the device list, you should indicate which devices are firewalls or switches. Policy Enforcer needs to know which devices are firewalls so they can be enrolled in Sky ATP realms and receive feed downloads.
Note Firewall devices are automatically enrolled with Sky ATP as part of this step. No manual enrollment is required.
Once configured, policy enforcement groups are located under Configure > Shared Objects. A policy enforcement groups has the following fields:
Name and Description.
Group Type—IP Address, Subnet, or Location
Endpoint—IP addresses included in the group
Username and Password—These are credentials you must provide, obtained through your Sky ATP account.
Realm—This is the name of the realm you are creating.
If a realm is already created with a site assigned, all devices in a site are listed under the Devices in Site(s) column that includes EX Series, SRX Series, all enforcement points and devices that are originally from a realm . Devices that are marked as perimeter firewall devices are listed under the Perimeter Firewall column.
Once configured, threat prevention policies are located under Configure > Threat Prevention > Policies. A policy has the following fields:
Name and Description.
Profiles—The type of threat this policy manages:
C&C Server (Command and Control Server)—A C&C server is a centralized computer that issues commands to botnets (compromised networks of computers) and receives reports back from them. A C&C profile would provide information on C&C servers that have attempted to contact and compromise hosts on your network. Information such as IP address, threat level, and country of origin are gathered.
Infected Host—An infected host profile would provide information on compromised hosts and their associated threat levels. Host information includes IP address, threat level, blocked status, when the threat was seen, command and control hits, and malware detections.
Malware—A malware profile would provide information on files downloaded by hosts and found to be suspicious based on known signatures or URLs. The filename, file type, signature, date and time of download, download host, URL, and file verdict are gathered.
Logging—All traffic is logged by default. Use the pulldown to narrow the types of traffic to be logged.
Group—Once your policy is created, it is applied to the policy enforcement group.
Name and Description
Countries—Select the check box beside the countries in the Available list and click the > icon to move them to the Selected list. The countries in the Selected list will be included in the policy and action will be taken according to their threat level.
Block Traffic—Choose what traffic to block from the selected countries. Incoming traffic, Outgoing traffic, or Incoming and Outgoing traffic.