Step 2: Up and Running
Now that you’ve successfully logged in to CSO, let’s use CSO’s intuitive GUI to do the initial configuration.
When in doubt, hover over the ? (Help) icon displayed next to the page title or fields on the CSO GUI to know more about a page or a field on the page.
Prepare to Deploy SD-WAN or NGFW Services (Service Provider Administrators)
Before a tenant administrator can deploy SD-WAN or NGFW (security services), a Service Provider (SP) administrator must configure SMTP settings; download the signature database; upload the device image; add points of presence, OAM provider hub devices, tenants, and CSO licenses.
Configure SMTP Settings
Download the Signature Database
Upload a Device Image
To upload a device image for the device:
Add a Point of Presence
Applies only to SD-WAN services.
In CSO, a POP refers to a location where one or more provider hub devices are located. Therefore, you must add at least one POP that you can assign provider hub devices to.
Add an OAM Provider Hub Device
Applies only to SD-WAN services.
Create an OAM provider hub and include the point of presence (POP), which you created in the previous step, in it.
For SD-WAN Advanced, we recommend that you configure a minimum of two OAM-capable provider hubs to provide redundancy in the OAM network.
Before you add the provider hub, check the cable connections, review the NAT and firewall ports and protocols, and check the Junos OS version of the enterprise hub device, as explained in Supported Devices for SD-WAN, and Ports and Protocols to Open.
To add a provider hub device:
Add Tenants
Add CSO Licenses
To maintain a record of CSO licenses purchased by tenants or operating companies (OpCos), users with the SP Administrator role (or users with the necessary access privileges) can add the CSO license for a tenant or an OpCo from the CSO Licenses page.
To add a CSO license:
Deploy the SD-WAN Service (Tenant Administrator)
To deploy the SD-WAN Advanced service, you'll need to add an enterprise hub site or a provider hub site, and a branch site. These tasks are optional for the SD-WAN Essentials service.
Starting in Release 6.0.0, CSO supports IPv6 in the underlay.
Before you begin:
Ensure that the Encapsulating Security Payload (ESP) protocol traffic is allowed on the network.
Ensure that Network Address Translation (NAT) and firewall ports are open on the network. Here are the ports that must be open for your CPE device:
Device Model
NAT/Firewall Ports
CPE WAN Link Ports (minimum one port; maximum four ports)
SRX4100 and SRX4200
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
xe-0/0/0
throughxe-0/0/7
SRX4600
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
xe-1/1/0
throughxe-1/1/7
et-1/0/0
throughet-1/0/3
SRX300, SRX320, and vSRX
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
throughge-0/0/7
SRX340 and SRX345
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
throughge-0/0/15
SRX380
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
ge-0/0/2
throughge-0/0/15
xe-0/0/16
throughxe-0/0/19
SRX550M
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
throughge-0/0/9
NFX250
50, 51, 443, 500 or 4500, 514 or 3514, 2216, 7804
ge-0/0/10
,ge-0/0/11
,xe-0/0/12
, andxe-0/0/13
NFX150
50, 51, 443, 500 or 4500, 514 or 3514, 7804
heth0
throughheth5
For provider hubs, ensure that the following ports and protocols are open on the network:
Device Model
Ports and Protocols
Hardware Documentation Links
SRX1500
IP Protocol 50
IP Protocol 51
TCP and UDP Ports 53 (for DNS)
UDP Port 123 (for NTP)
TCP Port 443
UDP Port 500
UDP Port 4500
SRX4100
SRX4200
SRX4600
IP Protocol 50
IP Protocol 51
TCP and UDP Ports 53 (for DNS)
UDP Port 123 (for NTP)
TCP Port 443
UDP Port 500
UDP Port 4500
vSRX
IP Protocol 50
IP Protocol 51
TCP and UDP Ports 53 (for DNS)
UDP Port 123 (for NTP)
TCP Port 443
UDP Port 500
UDP Port 4500
Add Provider Hub Sites
To add one or more provider hub sites:
Add an Enterprise Hub Site
If you intend to use an existing Juniper Networks provider hub site, adding an enterprise hub site is optional.
Add an SD-WAN Branch Site
Upload and Push the Device License
Install the Signature Database
The signature database contains intrusion detection prevention (IDP) and intrusion prevention system (IPS) signature definitions of predefined attack objects and groups. CSO uses IDP and IPS signatures to detect known attack patterns and protocol anomalies within the network traffic. You'll need to install the signature database on one or more of your network devices. Juniper Networks downloads this database to CSO.
Here’s how to install the signature database:
Add and Deploy a Firewall Policy
A firewall policy enforces rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. You can deploy a firewall policy to all sites or specific sites.
Here’s how to add and deploy a firewall policy:
Deploy SD-WAN Policy Intents
If your SD-WAN Essentials service deployment doesn't involve hubs, you need to:
Create a Local Breakout (Underlay) profile. See Adding Breakout Profiles.
Create an SD-WAN policy intent specifying the source and application (Any), and the breakout profile. See Creating SD-WAN Policy Intents.
SD-WAN policy intents optimize how the network uses WAN links and distributes traffic. CSO provides predefined SD-WAN policy intents for tenants.
Here’s how to deploy an SD-WAN policy intent:
Deploy the NGFW or Security Services (Tenant Administrator)
Before you add an NGFW (Security Services) site:
Ensure that the required ports are open on the network. Here are the ports that must be open for your NGFW device:
Device Model
NAT/Firewall
SRX3xx, SRX550M, SRX1500, SRX4100, and SRX4200
443, 500 or 4500, 514 or 3514, 6514, 7804, 8060 (needed if using PKI authentication to validate CRL)
Note:When you configure the SRX Series device, ensure that you configure either the first port (
ge-0/0/0
) or the last port (ge-0/0/7
orge-0/0/15
based on the model) for Internet connectivity.
Add an NGFW (Security Services) Site
Upload and Push the Device License
Install the Signature Database
The signature database contains intrusion detection prevention (IDP) and intrusion prevention system (IPS) signature definitions of predefined attack objects and groups. CSO uses IDP and IPS signatures to detect known attack patterns and protocol anomalies within the network traffic. You'll need to install the signature database on one or more of your network devices. Juniper Networks downloads this database to CSO.
Add and Deploy a Firewall Policy
A firewall policy enforces rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. You can deploy a firewall policy to all sites or specific sites.