Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Hot Patch Releases

This section describes the installation procedure, features, and resolved issues in Junos Space Security Director Release 22.1R1 hot patch.

During hot patch installation, the script performs the following operations:

  • Blocks the device communication.

  • Stops JBoss, JBoss Domain Controller (JBoss-dc), and jmp-watchdog services.

  • Backs up existing configuration files and EAR files.

  • Updates the Red Hat Package Manager (RPM) files.

  • Restarts the watchdog process, which restarts JBoss and JBoss-dc services.

  • Unblocks device communication after restarting the watchdog process for device load balancing.

Note:

You must install the hot patch on Security Director Release 22.1R1 or on any previously installed hot patch. The hot patch installer backs up all the files which are modified or replaced during hot patch installation.

Installation Instructions

Perform the following steps in the CLI of the JBoss-VIP node only:

  1. Download the Security Director 22.1R1 Patch vX from the download site.

    Here, X is the hot patch version. For example, v1, v2, and so on.

  2. Copy the SD-22.1R1-hotpatch-vX.tgz file to the /home/admin location of the VIP node.

  3. Verify the checksum of the hot patch for data integrity:

    md5sum SD-22.1R1-hotpatch-vX.tgz.

  4. Extract the SD-22.1R1-hotptach-vX.tgz file:

    tar -zxvf SD-22.1R1-hotpatch-vX.tgz

  5. Change the directory to SD-22.1R1-hotpatch-vX.

    cd SD-22.1R1-hotpatch-vX

  6. Execute the patchme.sh script from the SD-22.1R1-hotpatch-vX folder:

    sh patchme.sh

    The script detects whether the deployment is a standalone deployment or a cluster deployment and installs the patch accordingly.

A marker file, /etc/.SD-22.1R1-hotpatch-vX, is created with the list of Red-hat Package Manager (RPM) details in the hot patch.

Note:

You must install Junos Space Network Management Platform Release 22.1R1 hot patch V1 before installing Security Director Release 22.1R1 hot patch V1.

Note:

We recommend that you install the latest available hot-patch version, which is the cumulative patch.

New and Enhanced Features in the Hot Patch

Junos Space Security Director Release 22.1R1 hot patch includes the following enhancements:

  • Polymorphic address support in source and destination address for NAT rules— Starting in Security Director Release 22.1R1 hot patch V1, while creating NAT rules for group policies you can select polymorphic addresses as source or destination address. The rule points to default address if the device IP address does not match any of the context values in the polymorphic address. If there is a match, the address corresponding to the context value is considered in the source or destination address of the rule.

    Note:

    Polymorphic address is not supported for static NAT destination address.

  • Support for disabling service offload in Security Director— Starting in Security Director Release 22.1R1 hot patch V1, we’ve provided an option to disable service offload on the Edit Profile page of a rule for standard and unified firewall policies. This feature is supported both on logical systems and tenant systems. You can select from the following options:

    • None: Select to delete the configured service on the device.

    • Enable: Select to enable service offload. When services-offload is enabled, only the first packets of a session go to the Services Processing Unit (SPU), rest of packets in services-offload mode does not go to SPU, therefore some security features such as stateful screen are not supported. Only TCP and UDP packets can be services offloaded.

    • Disable: Select to disable service offload.

  • Support to terminate CLI/J-Web edit mode user session— tarting in Security Director Release 22.1R1 hot patch V1, when you retry the update job on failed devices caused due to device lock failures, you can log the user (edit mode user) out who locked the configuration database, from the device CLI. Navigate to Monitor > Job Management. Select the job, and then from the More list select Retry on Failed Devices. On the Retry Update Failed Devices page, enable Evict CLI/J-Web edit mode users option.

Resolved Issues in Hot Patches

Table 1 lists the resolved issues in the Security Director Release 22.1R1 hot patch.

Table 1: Resolved Issues in the Hot Patch

PR

Description

Hot Patch Version

PR1653543

The IPS signature update fails with an error.

V1

PR1654241

Select and Save functionalities in intrusion prevention system (IPS) policy fails in the firewall rule.

V1

PR1654639

Search functionality does not work as expected.

V1

PR1655068

Unable to delete unused address objects from the Security Director application.

V1

PR1655401

The user is unable to delete unused dynamic objects created as a result of import.

V1

PR1655473

The logical system device update fails.

V1

PR1656449

Security Director is unreachable when node 2 is the VIP node.

V1

PR1660583

Security Director fails to display the latest device configuration in the preview, and displays the following error message: Statement creation failed.

V1

PR1660892

Security Director fails to export the filtered search for a rule to .pdf format.

V1

PR1662493

Unified Threat Management (UTM) custom categories are deleted from SSL proxy profile whitelist.

V1

PR1663517

Security Director UI is not accessible when fail over occurs due to faulty rpm upgrade.

V1

PR1663898

Security Director updates an existing address book to SRX series device.

V1

PR1664618

Unable to push multiple configurations to a device in Junos Space Security Director application.

V1

PR1664941

Security Director API call fails for NAT policies with 300 rules.

V1

PR1666574

Security Director alarms fail to show up after upgrading to 22.1R1.

V1

PR1666985

The changes made to IPS policy in firewall rule are not visible in the GUI.

V1

PR1664637

References do not work for dynamic address objects in Security Director.

V1

PR1653847

The user is unable to disable NAT policies on devices.

V1

PR1669805

When you update policies, re-synchronize the Security Director with the managed device.

V1

Note:

If the hot patch contains a UI fix, then you must clear the Web browser’s cache to reflect the latest changes.