Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Install Application Signatures Package

A predefined application signature package is a dynamically loadable module that provides application classification functionality and associated protocol attributes. It is hosted on an external server and can be downloaded as a package and installed on the device. For more information, see the following topics:

Understanding the Junos OS Application Package Installation

Juniper Networks regularly updates the predefined application signature package database and makes it available to subscribers on the Juniper Networks website. This package includes signature definitions of known application objects that can be used to identify applications for tracking, firewall policies, quality-of-service prioritization, and Intrusion Detection and Prevention (IDP). The database contains application objects such as FTP, DNS, Facebook, Kazaa, and many instant messenger programs.

You need to download and install the application signature package before configuring application services. Use one of the following options:

  • If you have IDP enabled and plan to use application identification, you can continue to run the IDP signature database download. See Downloading and Installing the Junos OS Application Signature Package As Part of the IDP Security Package.

    If you have an IDP-enabled device and plan to use application identification, we recommend that you download only the IDP signature database. This will avoid having two versions of the application database, which could become out of sync.

  • If you do not have IDP enabled and plan to use application identification, download and install the application signature database. See Downloading and Installing the Junos OS Application Signature Package Manually or Example: Scheduling the Application Signature Package Updates.

    Note:

    When you upgrade or downgrade an application signature package, an error message is displayed if there is any mismatch of application IDs (unique ID number of an application signature) between proto bundles and these applications are configured in AppFW and AppQoS rules.

    Example:

    As a workaround, disable the AppFW and AppQoS rules before upgrading or downgrading an application signature package. You can reenable AppFW and AppQoS rules once the upgrade or downgrade procedure is complete.

    Note:

    On all security devices, J-Web pages for AppSecure Services are preliminary. We recommend using the CLI for configuration of AppSecure features.

Upgrade to Next-Generation Application Identification

Security devices installed with Junos OS builds with legacy application identification include legacy application identification security packages. When you upgrade these devices with more recent releases, the next-generation application identification security package is installed along with the default protocol bundle. The device is automatically upgraded to next-generation application identification.

Note the following about next-generation application identification security package:

  • The next-generation application identification security package introduces incremental updates to the legacy application identification package. You are not required to remove or uninstall any existing applications.

  • Applications from earlier Junos OS versions may have new aliases in later versions. Existing configurations will still function, but logs and related information will reflect the updated names. Use the show services application-identification application detail new-application-name command to get the details of the applications.

  • When you upgrade Junos OS, you can include the validate or no-validate options with the request system software add command. Because the existing features, which are not part of next-generation application identification, are deprecated, incompatibility issues are not seen.

  • Next-generation application identification eliminates the generation of new nested applications and treats existing nested applications as normal applications. In addition, next-generation application identification does not support custom applications or custom application groups. Existing configurations involving any nested applications, custom applications, or custom application groups are ignored with warning messages.

Downloading and Installing the Junos OS Application Signature Package Manually

This example shows how to download the application signature package, create a policy, and identify it as the active policy.

Requirements

Before you begin:

  • Ensure that your security device has a connection to the Internet to download security package updates.

    Note:

    DNS must be set up because you need to resolve the name of the update server.

  • Ensure that you have the required licenses. See Platform-Specific License SupportJuniper Licensing Guide. Refer to the product Data Sheets at SRX Series Services Gateways for details, or contact your Juniper Account Team or Juniper Partner.

This example uses the following hardware and software components:

  • An SRX Series device

  • Junos OS Release 12.1X47-D10

Overview

Juniper Networks regularly updates the predefined application signature package database and makes it available on the Juniper Networks website. This package includes application objects that can be used in Intrusion Detection and Prevention (IDP), application firewall policy, and AppTrack to match traffic.

When you upgrade to Junos OS Release 21.1 and later from Junos OS Release 20.4 and earlier versions, we recommend you also update the application identification signature database.

Configuration

CLI Quick Configuration

CLI quick configuration is not available for this example because manual intervention is required during the configuration.

Downloading and Installing Application Identification

Step-by-Step Procedure
  1. Download the application package.

    Download retrieves the application package from the Juniper Networks security website https://signatures.juniper.net/cgi-bin/index.cgi.

    You can also download a specific version of the application package or download the application package from the specific location by using the following options:

    • To download a specific version of the application package:

    • To change the download URL for the application package from configuration mode:

      If you change the download URL and you want to keep that change, make sure you commit the configuration.
  2. Check the download status.

    You can also use the system log to view the result of the download.

  3. Install the application package.

    The application package is installed in the application signature database on the device.

  4. Check the installation status of the application package.

    The command output displays information about the downloaded and installed versions of the application package and protocol bundle.

    • To view the installation status:

    • To view the protocol bundle status:

      It is possible that an application signature was removed from the newer version of an application signature database. If this signature is used in an existing application firewall policy on your device, the installation of the new database will fail. An installation status message identifies the signature that is no longer valid. To update the database successfully, remove all references to the deleted signature from your existing policies and groups, and rerun the install command.

Verification

Confirm that the configuration is working properly.

Verifying the Application Identification Status

Purpose

Verify that the application identification configuration is working properly.

Action

From operational mode, enter the show services application-identification status command.

Meaning

The Status: Enabled field shows that application identification is enabled on the device.

Downloading and Installing the Junos OS Application Signature Package As Part of the IDP Security Package

You can download and install application signatures through intrusion detection and prevention (IDP) security packages.

This example shows how to enhance security by downloading and installing the IDP signatures and application signature package. In this case, both IDP signature pack and application signature pack are downloaded with a single command.

Requirements

Before you begin:

  • Ensure that your SRX Series Firewall has a connection to the Internet to download security package updates.

    Note:

    DNS must be set up because you need to resolve the name of the update server.

  • Ensure that you have installed the application identification feature license.

This example uses the following hardware and software components:

  • An SRX Series Firewall

  • Junos OS Release 12.1X47-D10

Overview

In this example, you download and install the signature database from the Juniper Networks website.

Configuration

Downloading and Installing the Signature Database

CLI Quick Configuration

CLI quick configuration is not available for this example because manual intervention is required during the configuration.

Step-by-Step Procedure

To download and install application signatures:

  1. Download the signature database.

    Note:

    Downloading the database might take some time depending on the database size and the speed of your Internet connection.

  2. Check the security package download status.

  3. Install the attack database.

    Note:

    Installing the attack database might take some time depending on the security database size.

  4. Check the attack database install status. The command output displays information about the downloaded and installed versions of the attack database.

  5. Confirm your IDP security package version.

  6. Confirm your application identification package version.

Verification

Confirm that the application signature package is being updated properly.

Verifying application signature package

Purpose

Verify the services application identification version.

Action

From operational mode, enter the show services application-identification version command.

Meaning

The sample output shows that the services application identification version is 1884.

Downloading Junos OS Application Signature Package from A Proxy Server

This example shows how to create a proxy profile and use it for downloading the application signature package from a proxy server.

Configuration

Step-by-Step Procedure

Create a proxy profile and apply it for downloading the application package through the proxy server.

  1. Create a proxy profile for protocol HTTP.

  2. Specify the IP address of the proxy server.

  3. Specify the port number used by the proxy server.

  4. Download the application package from the proxy host.

Step-by-Step Procedure

You can disable the proxy server for downloading application signature package when not required.

  • Disable the proxy server for application signature download.

Requirements

This example uses the following hardware and software components:

  • Valid application identification feature license installed on an SRX Series Firewall.

  • SRX Series Firewall with Junos OS Release 18.3R1 or later. This configuration example is tested for Junos OS Release 18.3R1.

Overview

You must download and install the application signature package that is hosted on an external server on the SRX Series Firewall. Starting from Junos OS Release 18.3R1, you can download the application signature package using a proxy server.

To enable downloading signature package from the proxy server:

  1. Configure a profile with host and port details of the proxy server using the set services proxy profile command.

  2. Use the set services application-identification download proxy-profile profile-name command to connect to the proxy server and download the application signature package.

When you download the signature package, the request is routed through the proxy host to the actual server hosting the signature package. The proxy host relays the response back from the actual host. The download retrieves the application package from the Juniper Networks security website https://signatures.juniper.net/cgi-bin/index.cgi.

Note:

Support for the proxy profile configuration is available for only HTTP connections.

In this example, you create a proxy profile, and refer the profile when you download the application signature package from the external host. Table 1 provides the details of the parameters used in this example.

Table 1: Proxy Profile Configuration Parameters

Parameter

Name

Profile Name

Profile-1

IP address of the proxy server

5.0.0.1

Port number of the proxy server

3128

Verification

Verifying Application Signature Download Through the Proxy Server

Purpose

Display the details for the application signature package download through a proxy server.

Action

From operational mode, enter the show services application-identification status command.

Meaning

In the command output, you can find the proxy profile details in Proxy Profile and Proxy Address fields.

Verifying Application Signature Download Status

Purpose

Check the application package download status.

Action

From operational mode, enter the request services application-identification download status command.

Meaning

The command displays the application signature package download status.

Example: Scheduling the Application Signature Package Updates

This example shows how to set up automatic updates of the predefined application signature package.

Requirements

Before you begin:

  • Ensure that your security device has a connection to the Internet to download security package updates.

    Note:

    DNS must be set up because you need to resolve the name of the update server.

  • Ensure that you have installed the application identification feature license.

Overview

In this example, you want to download the current version of the application signature package periodically. The download should start at 11:59 PM on December 10. To maintain the most current information, you want to update the package automatically every 2 days from your company’s intranet site.

Configuration

Procedure

GUI Quick Configuration

To set up the automatic download and periodic update with the J-Web interface:

Step-by-Step Procedure

  1. Enter Configure>Security>AppSecure Settings to display the Applications Signature page.

  2. Click Global Settings.

  3. Click the Download Scheduler tab, and modify the following fields:

    • URL: https://signatures.juniper.net/cgi-bin/index.cgi

    • Enable Schedule Update: Select the check box.

    • Interval: 48

  4. Click Reset Setting to clear the existing start time, enter the new start time in YYYY-MM-DD.hh:mm format, and click OK.

    • Start Time: 2019-06-30.10:00:00

  5. Click Commit Options>Commit to commit your changes.

  6. Click Check Status to monitor the progress of an active download or update, or to check the outcome of the latest update.

Step-by-Step Procedure

To use the CLI to automatically update the Junos OS application signature package:

  1. Specify the URL for the security package. The security package includes the detector and the latest attack objects and groups. The following statement specifies https://signatures.juniper.net/cgi-bin/index.cgi as the URL for downloading signature database updates:

  2. Specify the time and interval for download. The following statement sets the interval as 48 hours and the start time as 10 am on December 10:

  3. If you are done configuring the device, commit the configuration.

Verification

To verify that the application signature package is being updated properly, enter the show services application-identification version command. Review the version number and details for the latest update.

Scheduling the Application Signature Package Updates As Part of the IDP Security Package

The configuration instructions in this example describe how to setup automatic updates of application identification signature package (part of IDP security package) at a specified date and time.

Requirements

Before you begin:

  • Ensure that your security device has a connection to the Internet to download security package updates.

    Note:

    DNS must be set up because you need to resolve the name of the update server.

  • Ensure that you have installed the application identification feature license.

Overview

In this example, you want to download the current version of the application signature package periodically. The download should start at 11:59 PM on December 10. To maintain the most current information, you want to update the package automatically every 2 days from your company’s intranet site.

Configuration

Procedure

GUI Quick Configuration

To set up the automatic download and periodic update with the J-Web interface:

Step-by-Step Procedure

  1. Enter Configure>Security>IDP>Signature Updates to display the Security IDP Signature Configuration page.

  2. Click Download Settings and modify the URL: https://signatures.juniper.net/cgi-bin/index.cgi

  3. Click the Auto Download Settings tab, and modify the following fields:

    • Interval: 48

    • Start Time: 2013-12-10.23:59:55

    • Enable Schedule Update: Select the check box.

  4. Click Reset Setting to clear the existing fields, enter the new values. Click OK.

  5. Click Commit Options>Commit to commit your changes.

  6. Click Check Status to monitor the progress of an active download or update, or to check the outcome of the latest update.

Step-by-Step Procedure

To use the CLI to automatically update the Junos OS application signature package:

  1. Specify the URL for the security package. The security package includes the detector and the latest attack objects and groups. The following statement specifies https://signatures.juniper.net/cgi-bin/index.cgi as the URL for downloading signature database updates:

  2. Specify the time and interval for download. The following statement sets the interval as 48 hours and the start time as 11:55 pm on December 10, 2013:

  3. Enable an automatic download and update of the security package.

  4. If you are done configuring the device, commit the configuration.

Verification

Confirm that the application signature package is being updated properly.

Verifying application signature package

Purpose

Verify services application identification version

Action

From operational mode, enter the show services application-identification version command.

Meaning

The sample output shows that, the services application identification version is 1884.

Example: Downloading and Installing the Application Identification Package in Chassis Cluster Mode

This example shows how to download and install the application signature package database to a device operating in chassis cluster mode.

Downloading and Installing the Application Identification Package

Step-by-Step Procedure

The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see CLI User Guide.

To download and install an application package:

  1. Download the application package on the primary node.

    {primary:node0}[edit]

    user@host> request services application-identification download

  2. Check the application package download status.

    {primary:node0}[edit]

    user@host> request services application-identification download status

    On a successful download, the following message is displayed

    The application package is installed in the application signature database on the primary node, and application identification files are synchronized on the primary and secondary nodes.

  3. Update the application package using install command.

    {primary:node0}[edit]

    user@host> request services application-identification install

  4. Check the application package update status. The command output displays information about the downloaded and installed versions of the application package.

    {primary:node0}[edit]

    user@host> request services application-identification install status

    Note:

    It is possible that an application signature is removed from the new version of an application signature database. If this signature is used in an existing application firewall policy on your device, the installation of the new database will fail. An installation status message identifies the signature that is no longer valid. To update the database successfully, remove all references to the deleted signature from your existing policies and groups, and rerun the install command.

    Note:

    While downloading the application signature package on the primary node, sometimes, due to unexpected failover, the primary node might not able to download the application signature package completely. As a workaround, you must delete the /var/db/appid/sec-download/.apppack_state and restart the device.

Step-by-Step Procedure

To uninstall an application package:

  1. Uninstall the application package using uninstall command.

    {primary:node0}[edit]

    user@host> request services application-identification uninstall

  2. Check the uninstall status of the application package.

    {primary:node0}[edit]

    user@host> request services application-identification uninstall status

  3. Check the uninstall status of protocol bundle:

Requirements

Before you begin:

Overview

If you use application identification, you can download the predefined application signature package database. Juniper Networks regularly updates the database and makes it available on the Juniper Networks website. This package includes application objects that can be used to match traffic in IDP, application firewall policies, and application tracking. For more details, see Understanding the Junos OS Application Package Installation.

When you download the application identification security package on a device operating in chassis cluster mode, the security package is downloaded to the primary node and then synchronized to the secondary node.

Verifying the Junos OS Application Identification Extracted Application Package

Purpose

After successful download and installation of the application package, use the following commands to view the predefined application signature package content.

Action

  • View the current version of the application package:

  • View the current status of the application package:

Uninstalling the Junos OS Application Identification Application Package

You can uninstall the predefined application package. The uninstall operation will fail if there are any active security policies referenced in the predefined application signatures in the Junos OS configuration

To uninstall application package:

  1. Uninstall the application package:
  2. Check the uninstall operation status of the application package. The command output displays information about the uninstall status of the application package and protocol bundle.
    • Check the uninstall status:

    • Check the uninstall status of protocol bundle:

The application package and protocol bundle are uninstalled on the device. To reinstall application identification, you need to download application package and reinstall it again.

Application Signature Package Rollback

Starting in Junos OS Release 20.3R1, you can rollback the current version of application signature pack to the previous version by one of the following methods:

  • Automatic Rollback

  • Manual Rollback

Automatic Rollback

In case of application signature package installation failure, the system automatically rolls back to the previous version of the application signature package that is currently installed on your security device.

When you download and install the application signature package on a device operating in chassis cluster mode, if the installation fails on a node, the system rolls back to the previous version of the application signature. The device displays a minor alarm on the same node where installation fails and rollback succeeds.

Example:

Check application signature package rollback status when installation failed and the rollback completes successfully.

Manual Rollback

You can manually rollback the application signature package to the previous installed version using the following steps:

  1. Rollback the application signature package to the previous version.

  2. Check the rollback status.

Note the following for manual rollback of an application signature package:

  • Once you rollback application signature package version manually from version Y to version X, the scheduled auto-update of an application signature package is skipped until a new version Z, which is higher than the version Y, is available.

  • You can download and install application signatures through intrusion detection and prevention (IDP) security packages. In this case, if AppID installation fails during the IDP install, AppID rolls back to the previous version and IDP installation continues with the requested version. In such cases, IDP and AppID might have different versions.

  • Application signature package installation does not proceed if there is any corruption, deletion, or modification of downloaded signature package files. In such cases, the following message is displayed:

  • When your security device does not include any previous version application signature package and you attempt to rollback application signature package, the device displays the following error message:

Grouping Newly Added Application Signatures

We’ve enhanced the application signature package by grouping all newly added application signatures under junos:all-new-apps group. When you download the application signature package on your security device, the entire predefined application group is downloaded and available for you to configure in security policy as shown in the below example:

We’ve also introduced a list of application tags in the application signature package. You can group similar applications on those predefined tags that are based on application attributes. By doing so, you can consistently reuse the application groups when you define security policies.

Example

In the above example, you configure tag-based application group with tags remote-access and web and another tag group with social_networking. All the applications which are having tags as either web or remote-access and social_networking will be added to the application group.

Grouping of similar applications based on tags help you to consistently reuse the application groups when defining security policies.

Migration of New Applications to Normal Applications:

The junos:all-new-apps group contains a set of all new applications in the installed application signature pack on your security device compared to previously installed signature pack. If you decide to install a newer version of the application signature package, that version will contain a new set of applications in the junos:all-new-apps group.

You can chose to migrate the new applications to normal applications in your existing application signature package. This migration will help you to consistently maintain rules in security policy which are created specific to the new applications whenever you upgrade to newer application signature versions in future.

You can use the following new commands to move the applications tagged as new applications to normal applications:

  • To migrate only specified new applications as normal application, use the following command:

  • To migrate all new applications as normal applications, use the following command:

After you run these commands, application will no longer be tagged as new and will not be part of the junos:all-new-apps group.

Application Signatures Package Enhancements

We've introduced the following enhancements to the application signature package:

Application Signatures Package Installation Enhancements

You can use the following enhanced application signature package installation options:

Application Signature Package Installation Failure

During application signature package installation, if an error occurs, or the process unexpectedly crashes, the installation automatically stops and reverts to the previously installed version.

The system displays the following error messages when you try to check download status of the faulty application signature package:

  • With specified the application signature package version:
  • With out specified application signature package version:

The system displays following messages when you check application signature installation status:

  • When application package installation is completed and being validated for any defects:

  • When trying to install application signature package which is marked as faulty:

  • When the installed application signature package is detected as faulty:

You can see the details of the failed version using the following command:

For scheduled the automatic update of application signature package: While installation is in-progress, and if the installation package has any issues, the system rolls back the application signature package to the previous version. During the next auto update, the system does not continue with the problematic signature package for download and installation.

Auto Rollback Enhancement

The auto rollback feature now enables the system to revert to a previously working version of the application signature package. Additionally, it retains the previously designated rollback version in the event of any issues during application signature package installation

For example, if your device currently has application signature package version Y, and you’ve set the rollback version as X, here’s what happens during an installation attempt:

  • You try to install the new version Z.
  • If any issues arise during installation or if version Z fails to install, the system automatically reverts back to the current version Y.
  • The previously designated rollback version X remains unchanged.

In this way, the system ensures a smooth transition by reverting to a known working version if needed.

Application Signature Package Installation on a Chassis Cluster Setup

When using a chassis cluster setup, the system first installs the application signature package on the primary node and checks for any issues or problems.

Application signature package installation starts immediately on the primary node. During installation, the secondary node waits for the primary node to complete the validation of the installation package. If the validation is successful, then the system proceeds to install the same package on the secondary node, otherwise, it skips the installation.

You can check the installation status using the following command:

If the installation fails on the primary node, then rollback happens only on the primary node. Similarly if the installation fails on the secondary node, then rollback is triggered on secondary node only.

When the installation fails, system displays following messages:

Primary Node

Secondary Node

When a node changes from primary state to the secondary state while installation is in-progress on the primary node, then the system displays the following message:

Primary Node

Secondary Node

If the primary system can not update the secondary node within time (approximately 35 minutes) due to unexpected issues, the installation process on the secondary system will be canceled.

Once the primary node completes the installation and validation, the system initiates the installation on the secondary node. In case change in the primary and secondary roles due to a failover, then the previous-secondary node (now primary) continues to install the signature package.

Application Signatures Package Major and Minor Versions

We've enhanced application signature package installation with following features:

Installation Status to the Signature Package Server

Application signature engine sends the status to the signature package server for installation success or failure. During application signature package installation, if errors are found in the package, installation stops and reverts to the previous active version and status is sent to the server. If multiple devices report a faulty application signature package, the server analyzes this data, marks the package as invalid, and prevents future downloads.

Marking a signature package as invalid is available only for the major signature package.

The signature package marked as invalid will not be available for future downloads only by CLI. Download and installation by Security Director and offline downloads display error message informing that the requested application package is not available for download.

Major and Minor Signature Package

Now we support two types of signature packages are available for the updates:

  • Major updates include IDP signatures, IDP detector, and application identification protobundle.
  • Minor updates include regular signature updates.

Let’s understand the difference in major and minor updates with an example:

  • The signature package version with protocol bundle released has version 3585. This is a major update. All minor signature packages post 3585 contain this updated protocol bundle until we have next major signature package update.
  • The next release of package includes IDP detector and has version 3598. This is again a major update. All minor signature packages post 3598 contain this updated detector until we have next major update.

If your firewall is having major signature pack version 3598 and if you attempt to download minor version such as 3588 using manual download method or automatic download, then the download fails with the following error message:

Downloading Minor-Only Signature Package

You can download an application signature package that is marked as minor. The default behavior does not check for major or minor version.

To set automatic download of the minor signature package:

Specifying minor-only in the command downloads the minor version of the signature package.

To download minor signature package:

Specifying minor-only in the command downloads the minor version of the signature package.

Check the available signature package versions:

The command displays all the available versions of the application signature package.

Check the available signature package versions:

The command displays all the latest version of the major application signature package.

View the version of your signature package:

The command displays application signature package version installed on your device in Application package version field.

Check the version of the signature package from the Juniper Networks security website.

The command displays the latest version of both major and minor application signature packages, which are available on Juniper Networks security website.

Downgrading Application Signature Package Version

You can downgrade your application signature package version by specifying the signature package version. Use the following steps to downgrade:

  1. Check the available signature package versions using the show services application-identification recent-appid-sigpack-versions command.

  2. Run the command to download the required version:

Offline Application Identification (AppID) Update

Offline Application Identification (AppID) Update and associated features significantly enhance the manageability and serviceability of network systems, particularly in environments with limited connectivity.

The offline AppID update feature allows you to update the signature package from a local tar file using the following CLI command:

When you enter this command, the system uncompresses the signature package and places the extracted files in the proper locations on the device.

Example:

  1. Copy or download the offline application package from the URL: https://support.juniper.net/support/downloads/?p=282
  2. Enter the command to extract signature package:
  3. Check the status of offline download of signature package:

    The system displays the following error message when the package path is not correct:

  4. Use the request services application-identification install command to install the signature package on the device.

The operation concludes with a system log message indicating whether the update was successful or if it encountered any errors, providing immediate feedback for troubleshooting. Example of syslog messages:

  • The APPIDD_APPPACK_OFFLINE_DOWNLOAD_RESULT: AppID sigpack offline download : Complete confirms a successful update.
  • The APPIDD_APPPACK_OFFLINE_DOWNLOAD_RESULT: AppID sigpack offline download : Failed with error (AppID offline download package </var/tmp/...> does not exist) indicates a failure along with a specific error message

This feature is particularly useful in the environments with limited or no Internet connectivity, such as remote locations or secure facilities.

Syslog Message for Deprecated Applications

You can now manage deprecated applications and application groups. After performing a signature pack update, a system log message lists deprecated applications, helping you identify and manage outdated applications that might impact your security policies.

When handling deprecated applications, the system log message APPIDD_DEPRECATED_APPLIST: Obsolete apps: app1, app2, app3, app4... lists outdated applications, enabling you to take appropriate actions.

List Deprecated Application Groups

You can list all the deprecated application groups using the following command:

The command allows you to list deprecated application groups, ensuring these groups do not interfere with device configuration and preventing commit failures due to hidden deprecated groups.

You can use the following system log message to view deprecated application groups:

Additional Platform Information for Licenses

A separate license key for Application Security is no longer required. Instead, you must use the appropriate JSE or JSB software license corresponding to your product and device (Table 2 and Table 3) . This license enables you to:

  • Download and install AppID signature database updates
  • Access AppSecure features such as AppFW, AppQoS, and AppTrack

This marks a change from the previous model, where a dedicated Application Security subscription license had to be purchased and installed separately on each device.

Application Security is part of Junos Software Enhanced (JSE) software license package for the SRX Series Firewalls shown in Table 2 .

Table 2: Support for Application Security in JSE Package
Platforms Starting in Release
SRX4100, and SRX4200 devices Junos OS Release 15.1X49-D65 and Junos OS Release 17.3R1
SRX1500, SRX300, SRX320, SRX340, and SRX345 devices Junos OS Release 15.1X49-D30 and Junos OS Release 17.3R1
SRX5400, SRX5600, SRX5800, vSRX, and cSRX Junos OS Release 25.2R1

Application Security is part of Junos Software Base (JSB) software license package for the SRX Series Firewalls shown in Table 3.

Table 3: Support for Application Security in JSB Package
Platforms Starting in Release
SRX380, SRX4600 Junos OS Release 20.2R1
SRX1600, SRX2300, SRX4300 Junos OS Release 23.4R1
SRX4120 Junos OS Release 25.2R1

To understand more about Junos OS Software Licensing, see the Juniper Licensing Guide.

Refer to the product Data Sheets at SRX Series Services Gateways for details, or contact your Juniper Account Team or Juniper Partner.

Refer Feature Explorer for features supported on a product in a software release

Change History Table

Feature support is determined by the platform and release you are using. Use Feature Explorer to determine if a feature is supported on your platform.

Release
Description
24.4R1
Starting in Junos OS 24.4R1, application signature installation is enhanced with status reporting, version-specific downgrades, and support for major and minor signature packages
24.4R1
Starting in Junos OS Release 24.4R1, we support offline AppID update and system log message listing deprecated applications.
24.4R1
Starting in Junos OS 24.2R1, application signature installation includes auto-rollback on errors or crashes, reverting to the last working version, and in chassis clusters, the package installs first on the primary node for validation.
21.1R1
Starting in Junos OS Release 21.1R1, we’ve enhanced the application signature package by grouping all newly added application signatures under junos:all-new-apps group.
21.1R1
Starting in Junos OS Release 21.1R1, we've introduced the enhancements to the application signature package that includes support for FTP data context propagation, skipping of deep packet inspection (DPI) for the sessions offloaded by APBR on application system cache (ASC) hit, forceful installation of the application signature pack over the same version of signature pack.
21.1R1
Starting in Junos OS Release 21.1R1, we have enhanced CLI commands to display application signature pack release date and display the list of deprecated application signatures in the installed signature pack .
20.4R1
Starting in Junos OS Release 20.4R1, system log messages are updated to display the application signature package download and installation results.
20.4R1
Starting in Junos OS Release 20.4R1, system log messages are updated to display the application signature package download and installation results.
20.3R1
Starting in Junos OS Release 20.3R1, you can rollback the current version of application signature pack to the previous version.
12.1X47-D10
Starting from Junos OS Release 12.1X47-D10, next-generation application identification is supported.
12.1X47-D10
Starting from Junos OS Release 15.1X49-D50 and Junos OS Release 17.3, upgrading or downgrading an application signature package triggers an error if there's a mismatch in application IDs between proto bundles and those used in AppFW or AppQoS rules.
12.1X47-D10
Starting from Junos OS Release 12.1X47-D10, some applications may have new aliases. Existing configurations still work, but logs and related data will reflect the updated names