What's Changed
Learn about what changed in this release for vSRX.
Juniper Secure Connect
-
Support for iPadOS for prelogon compliance checks in Juniper Secure Connect (SRX Series, and vSRX3.0)—You can configure prelogon compliance checks on your firewall to allow or reject endpoints running iPadOS. Use the
ipadosoption at the[edit security remote-access compliance pre-logon name term name match platform]hierarchy level to enforce these checks. This ensures that only compliant iPadOS devices are permitted access, enhancing the security of your network.
Network Address Translation (NAT)
-
Support for NAT debugging (SRX Series Firewalls and vSRX) To debug NAT-related issues, use the nat option with the request support information security-components command.
[See request support information.]
User Interface and Configuration
-
Access privileges for request support information command (ACX Series, EX Series, MX Series, QFX Series, SRX Series Firewalls, and vSRX Virtual Firewall)—The
request support informationcommand is designed to generate system information for troubleshooting and debugging purposes. Users with the specific access privilegesmaintenance,view, andview-configurationcan execute request support information command. -
Option to view combined disk space usage statistics for all configuration databases (ACX Series, EX Series, MX Series, QFX Series, SRX Series, and vSRX)—The
show system configuration database usagecommand provides themergeoption. When you include themergeoption, the command output displays combined disk space usage statistics for all configuration databases, including the static configuration database and all ephemeral configuration database instances.
VPNs
-
Deprecation of weak algorithms in IPsec VPN (SRX Series and vSRX 3.0)—We've deprecated the weak algorithms in IKE and IPsec proposals. You'll no longer be able to use the following algorithms:
Table 1: Deprecated Junos CLI Options Type Algorithm Junos CLI Statement Encryption Algorithm in IKE Proposal des-cbcand3des-cbcset security ike proposal name encryption-algorithmAuthentication Algorithm in IKE Proposal md5andsha1set security ike proposal name authentication-algorithmDH Group in IKE Proposal group1,group2, andgroup5set security ike proposal name dh-groupEncryption Algorithm in IKE Proposal des-cbcand3des-cbcset security ipsec proposal name encryption-algorithmAuthentication Algorithm in IKE Proposal hmac-md5-96andhmac-sha1-96set security ipsec proposal name authentication-algorithmYou will receive a warning message if you configure these deprecated algorithms explicitly. As an alternative, we recommend that you configure the stronger algorithms to enhance the security in IPsec VPN.
[See proposal (Security IKE, and proposal (Security IPsec).]
-
Default installation of junos-ike package on additional platforms (SRX1500, SRX4100, SRX4200, SRX4600, and vSRX3.0)—The
junos-ikepackage is installed by default on SRX1500, SRX4100, SRX4200, SRX4600, and vSRX3.0 firewalls, ensuring the default support forikedprocess for IPsec VPN service. This aligns with the existing default installation of the package on SRX5000 line with Routing Engine 3 (SRX5K-SPC3 with RE3). You can delete thejunos-ikepackage using the commandrequest system software delete junos-ike. This runs thekmdprocess on these firewalls, allowing flexible management of your security infrastructure. -
Support for iPadOS for prelogon compliance checks in Juniper Secure Connect (SRX Series, and vSRX3.0)—You can configure prelogon compliance checks on your firewall to allow or reject endpoints running iPadOS. Use the
ipadosoption at the[edit security remote-access compliance pre-logon name term name match platform]hierarchy level to enforce these checks. This ensures that only compliant iPadOS devices are permitted access, enhancing the security of your network.