J-Web
-
Support for allowed groups in LDAP (SRX300, SRX320, SRX340, SRX345, and SRX380)— Starting in Junos OS Release 23.4R2, you can use Allowed Groups under the LDAP option in this navigation path: Security Services > Firewall Authentication > Access Profile > Create Access Profile to configure groups that are allowed to sign in.
[See Add an Access Profile.]
-
Support for LDAP (SRX300, SRX320, SRX340, SRX345, and SRX380)— Starting in Junos OS Release 23.4R2, you can use the LDAP option in this navigation path: Network > VPN > IPsec VPN > Create VPN > Remote Access > Juniper Secure Connect > Local Gateway to configure user authentication for an access profile.
[See Create a Remote Access VPN—Juniper Secure Connect and Add an Access Profile.]
-
Support for system logs (SRX300, SRX320, SRX340, SRX345, and SRX380)— Starting in Junos OS Release 23.4R2, you can use System > Monitor to monitor information about system events such as routine operations, failure and error conditions, and emergency or critical conditions.
[See Monitor System.]
-
Support for compliance rules (SRX300, SRX320, SRX340, SRX345, and SRX380)— Starting in Junos OS Release 23.4R2 you can use:
-
Network > Compliance menu to create remote access pre-logon compliance policies in the SRX Series Firewall. You can associate only one compliance policy for a remote access connection profile. The Juniper Secure Connect application sends details to the SRX Series Firewall. The device performs pre-logon compliance checks and accepts or rejects a connection based on the pre-logon compliance rule match.
-
Compliance option under Network > VPN > IPsec VPN > Create VPN > Remote Access > Juniper Secure Connect > Remote User to associate only one compliance rule for a remote access connection profile.
[See About the Compliance Page and Create a Remote Access VPN—Juniper Secure Connect.]
-
-
Support for application bypass (SRX300, SRX320, SRX340, SRX345, and SRX380)— Starting in Junos OS Release 23.4R2, you can use Application Bypass under Network > VPN > IPsec VPN > Create VPN > Remote Access > Juniper Secure Connect > Remote User to define Juniper Secure Connect remote client configuration parameters to bypass certain applications. Bypassing is based on domain names and protocols without passing through the remote access VPN tunnel. The administrator configures these parameters on the SRX Series Firewall which are pushed to client application after successful authentication.