Users
User Management Configuration Page Options
- Select Configure>System Properties>User Management in the J-Web user interface if you are using SRX5400, SRX5600, or
SRX5800 platform.
Or
Select Configure>Device Setup>Basic Settings>User Management in the J-Web user interface.
The User Management configuration page appears.
- (Junos OS Release 19.1R1 and later releases) Select Configure>Users>User Management in the J-Web user interface.
The User Management configuration page appears. Table 118 explains the contents of this page.
- Click one:
Save—Saves all the user management configuration and returns to the main configuration page.
Commit Options>Commit—Commits the configuration and returns to the main configuration page.
Cancel—Cancels all your entries and returns to the main configuration page.
Table 118: User Management Configuration Details
Field | Function | Action |
---|---|---|
User Details | ||
User Details | Provides the users details to the device’s local database. The options available are:
| Select an option: To add a new user, click Add. Then enter the details specified below and click OK.
|
Authentication Methods | ||
Authentication Method And Order | Specifies the authentication method the device should use to authenticate users. The options available are:
| Enable authentication methods and drag and drop to change the authentication order. |
RADIUS Servers | ||
RADIUS Servers | Specifies the details of RADIUS servers. | Click Configure. To add a new RADIUS server, click +. Then enter the details specified below and click OK.
|
TACACS | ||
TACACS Servers | Specifies the details of TACACS servers. | Click Configure. To add a new TACACS server, click +. Then enter the details specified below and click OK.
|
Password Settings Note:
| ||
Minimum Reuse | Specifies the minimum number of old passwords which should not be same as the new password. | Starting in Junos OS Release 19.1R1, this Minimum Reuse option is supported. Click top or bottom arrow to specify the minimum number of old passwords that you want to use. Range: 1-20. |
Maximum Lifetime | Specifies the maximum password lifetime. | Starting in Junos OS Release 19.1R1, this Maximum Lifetime option is supported. Click top or bottom arrow to specify the maximum lifetime of your password in days. Range: 30-365. |
Minimum Lifetime | Specifies the minimum password lifetime. | Starting in Junos OS Release 19.1R1, this Minimum Lifetime option is supported. Click top or bottom arrow to specify the minimum lifetime of your password in days. Range: 1-30. |
Access Profiles Configuration Page Options
- Select Configure>Access>Access Profiles in
the J-Web user interface if you are using SRX5400, SRX5600, or SRX5800
platforms.
Or
Select Configure>Authentication>Access Profiles in the J-Web user interface.
The Access Profiles configuration page appears.
- (Junos OS Release 19.1R1 and later releases) Select Configure>Users>Access Profile in the J-Web user interface.
The Access Profiles configuration page appears.
- Click one:
Add or +—Adds a new or duplicate access profile configuration. Enter information as specified in Table 119.
Edit or /—Edits a selected access profile configuration.
Delete or X—Deletes the selected access profile configuration.
Search Icon—Enables you to search a firewall policy or rule from the grid.
Table 119: Add Access Profile Configuration Details
Field | Function | Action |
---|---|---|
General Settings | ||
Access Profile Name | Specifies the name of the access profile. | Enter a unique string of alphanumeric characters, colons, periods, dashes, and underscores. Maximum length is 64 characters. |
Authentication Order | ||
Order 1 | Configures the order in which the user tries different authentication methods during login. For each login attempt, the method for authentication starts with the first one, until the password matches. | Select one or more of the following authentication method:
|
Order 2 | Configures the next authentication method if the authentication method included in the authentication order option is not available, or if the authentication is available but returns a reject response. | Select the authentication method from the list and click Next. |
Password | ||
Address Assignment | Specifies the address pool used by the access profile. | Select an address pool from the list. Click + to create the password using the address pool and enter the following details:
|
LDAP | ||
LDAP | Configures the LDAP server for authentication. | Click + to add LDAP server, enter the following details, and click OK:
|
LDAP Options | ||
Base Distinguished Name | Specifies the base distinguished name that defines the user. | Enter thebase distinguished name. |
Revert Interval | Specifies the amount of time that elapses before the primary server is contacted if a backup server is being used. | Use top/bottom arrows to provide the revert interval. Range is 60-4294967295. |
Additional Details | ||
Assemble | Specifies that a user’s LDAP distinguished name (DN) is assembled through the use of a common name identifier, the username, and base distinguished name. | Enable the assemble option. |
Common Name | Specifies the common name identifier used as a prefix for the username during the assembly of the users distinguished name. | Enter a common name identifier. |
Search | Specifies that a users LDAP distinguished name is assembled through the use of a common name identifier, a username, and a base distinguished name. | Enable the search option. |
Firewall Authentication Configuration Page Options
- Select Configure>Access>FW Authentication in
the J-Web user interface if you are using SRX5400, SRX5600, or SRX5800
platforms.
Or
Select Configure>Authentication>FW Authentication in the J-Web user interface.
The Firewall Authentication configuration page appears. Table 120 explains the contents of this page.
- (Junos OS Release 19.1R1 and later releases) Select Configure>Users>FW Authentication in the J-Web user interface.
The Firewall Authentication configuration page appears. Table 120 explains the contents of this page.
- Click one:
OK/Save—Saves the configuration and returns to the main configuration page.
Commit Options>Commit—Commits the configuration and returns to the main configuration page.
Reset—Resets your entries and returns to the main configuration page.
Cancel—Cancels your entries and returns to the main configuration page.
Table 120: Add Firewall Authentication Configuration Details
Field | Function | Action |
---|---|---|
Pass-through Settings | ||
Default Profile | Specifies the profile that the policies use to authenticate users. The options available are:
| Select an option. |
HTTP Banner | ||
Login | Displays the login prompt for users logging in using HTTP. | – |
Failed | Displays failed login prompt for users logging in using HTTP. | – |
Success | Displays a successful login prompt for users logging in using HTTP. | – |
FTP Banners | ||
Login | Displays the login prompt for users logging in using FTP. | – |
Failed | Displays failed login prompt for users logging in using FTP. | – |
Success | Displays a successful login prompt for users logging in using FTP. | – |
Telnet Banners | ||
Login | Displays the login prompt for users logging in using telnet. | – |
Failed | Displays failed login prompt for users logging in using telnet. | – |
Success | Displays a successful login prompt for users logging in using telnet. | – |
Web-auth-settings | ||
Default Profile | Specifies the profile that the policies use to authenticate users. The options available are:
| Select an option. |
Banner Success | Displays a successful login prompt for users logging in using Web authentication banner. | – |
Web-auth logo upload | ||
Logo image | Indicates an image to be chosen for the Web authentication logo. Note: For the good logo image, the image format must be in .gif and the resolution must be 172x65. | – |
Browse | Navigates to the available logo image on the user's local disk. | Navigate to the logo image. |
Upload File | Uploads the image. | Click the button to upload the image. |
Restore Juniper logo | Restores the default Juniper Networks logo. | Click the button to restore the Juniper Networks logo. |
UAC Settings Configuration Page Options
- Select Configure>Authentication>UAC Settings in the J-Web user interface if you are using SRX5400, SRX5600, or
SRX5800 platforms.
Or
Select Configure>Authentication>UAC Settings in the J-Web user interface.
The UAC Settings configuration page appears.
- (Junos OS Release 19.1R1 and later releases) Select Configure>Users>UAC Settings in the J-Web user interface.
The UAC Settings configuration page appears. Table 121 explains the contents of this page.
- Click one:
Add or +—Adds a new Infranet Controller. Enter information as specified in Table 121.
Edit or /—Edits the selected Infranet Controller configuration.
Delete or X—Deletes the selected Infranet Controller configuration.
- Click one:
OK/Save—Saves the configuration and returns to the main configuration page.
Actions>Commit—Commits the configuration and returns to the main configuration page.
Cancel—Cancels your entries and returns to the main configuration page.
Table 121: Infranet Controller Configuration Details
Field | Function | Action |
---|---|---|
Global Settings | ||
Certificate Verification | Determines whether server certificate verification is required when initiating a connection between a device and an Access Control Service in a UAC configuration. | Select the following options from the list:
|
Interval | Specifies the value in seconds that the device should expect to receive a heartbeat signal from the IC Series device. | Enter the heartbeat interval in seconds. Range: 1 through 9999. |
Test Only Mode | Allows all traffic and log enforcement result. | Enable the Test Only Mode option. |
Timeout | Specifies (in seconds) that the device should wait to get a heartbeat response from an IC Series UAC Appliance. | Enter the timeout in seconds. Range: 2 through 10000. |
Timeout Action | Specifies the action to be performed when a timeout occurs and the device cannot connect to an Infranet Enforcer. | Select the timeout action. |
Infranet Controller | ||
Name | Specifies the name of the Infranet Controller. | Enter a name for the Infranet Controller. |
IP address | Specifies an IP address for the Infranet Controller. | Enter an IP address for the Infranet Controller. |
Interface | Specifies the interface used for the Infranet Controller. | Select an interface. |
Password | Specifies the password to use for the Infranet Controller. | Enter the password. |
CA Profiles | Specifies the preferred CA to use for the Infranet Controller. If no value is specified, then no certificate request is sent (although incoming certificates are still accepted). | Select a CA from the list in the CA Profiles column and then click the right arrow to move them to the Selected column. Note: To deselect a CA, select the CA in the Selected column and then click the left arrow to move them to the CA Profiles column. |
Port | Specifies the port number to be associated with this Infranet Controller for data traffic. | Enter a value from 1 through 65,535. |
Server Certificate Subject | Specifies the subject name of the Infranet Controller certificate to match. | Enter the server certificate subject name. |
Captive Portal | ||
Captive Portal | Specifies the preconfigured security policy for captive portal on the Junos OS Enforcer. | Click + to add a captive portal. |
Name | Specifies the name of the captive portal. | Enter a name for the captive portal. |
Redirect Traffic | Specifies a traffic type to be redirected. | Select a traffic type. |
Redirect URL | Specifies a URL to which the traffic should be redirected. | Enter the URL to which the captive portal should be directed. |