Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Juniper Security Director Cloud GUI Overview

Juniper Security Director Cloud offers an intuitive, security-oriented GUI to help administrators with various tasks. The main menu options and actions available upon login depend on your access privileges.

Table 1 outlines the main menu in Juniper Security Director Cloud, provides a brief overview of each item, and links to the relevant sections in the Juniper Security Director Cloud User Guide.

Table 1: GUI Menu and Description
Menu Description

Dashboard

The dashboard displays information such as top events, top denials, top applications, top source and destination IP addresses, top traffic, and top infected hosts.

Graphical security widgets provide you with personalized network security views. You can customize your dashboard layout by adding, removing, and rearranging these widgets. See About the Dashboard.

Monitor

  • Alerts—Alerts inform you about major events in the system. You can define alert parameters using a range of predefined filters. See Alerts Overview.
  • Logs—Managed devices generate traffic logs that you can examine for details on security events stemming from IPS policies, Web filtering policies, and IPSec VPN policies. Additionally, these logs provide a comprehensive overview of your network environment. By correlating and analyzing log data, you can identify abnormal events, attacks, viruses, or worms. See About the Session Page.
  • Maps and Charts—The threat map offers a visual representation of geographic areas for both incoming and outgoing traffic. You can view blocked and allowed threat events using data from IPS, antivirus, and antispam engines. See Threat Map Overview.
  • Reports—Reports summarise network activity and overall status, aiding in trend analysis of traffic patterns. You can use predefined reports or create custom ones to meet specific needs. See Reports Overview.

SRX > Device Management

  • Devices—Discover and manage devices. See Devices Overview.

  • Configuration Templates—Manage configuration settings during onboarding and throughout the devices' life cycle for Juniper Networks and other third-party devices. Use configuration templates to apply tailored configurations to these devices. See Configuration Templates Overview.

  • Software Images—Use software installation packages to update or revert the operating system on a network device. Juniper Security Director Cloud assists in managing the complete lifecycle of software images for all managed network devices, including adding, staging, deploying, and deleting them. See Software Images Overview.

  • Security Packages—View the latest security packages available on Juniper Security Director Cloud on the Security Packages page, check the security packages currently installed on your device, and install the latest ones. The security packages include IPS Signatures, Application Signatures, and URL Categories. See Security Packages Overview.

SRX > Security Policy

  • SRX Policy—Implement security by applying rules to the traffic passing through a device. Traffic is allowed or blocked depending on the actions specified in the security policy rules. You can create, edit, and delete security policies and link devices to these policies. See Security Policies Overview.

  • Device View—View detailed information about the number of rules and policies allocated to each device. See Devices with Security Policies Main Page Fields.

SRX > Security Subscriptions

Manage advanced security related to:
  • IPS—Deploy an intrusion prevention system (IPS) profile on a device by linking the profile to a security policy rule, which is implemented on the device. You can connect IPS rules and exempt rules to an IPS profile. See IPS Profiles Overview.
  • Content Security—Configure integrated Content Security features to defend against different threats, such as antispam, antivirus, content filtering, and web filtering. See Content Security Profiles Overview.
  • Decrypt Profiles—Manage SSL proxy profiles. See Decrypt Profiles Overview.
  • Flow-Based Antivirus—Manage flow-based antivirus profiles, which scan packet content in real time and block it if a threat is identified. See Flow-Based Antivirus Profiles Overview.

SRX > IPsec VPN

IPsec VPN—Manage IPsec VPN profiles to securely connect with remote computers over a public WAN like the Internet. See IPsec VPN Overview.

SRX > NAT

  • NAT Policies—Create, modify, clone, and delete NAT policies and their associated rules. You can also filter and organize this information to gain a clearer understanding of your desired configurations. See NAT Policies Overview.

  • NAT Pools—Define NAT pools for address translation. NAT pools comprise a group of IP addresses designated for address translation. NAT policies facilitate this process by converting internal IP addresses to the IP addresses in the NAT pools. See NAT Pools Overview.

SRX > Identity

  • JIMS—Retrieve comprehensive user identities from various authentication sources for SRX Series Firewalls on the Identity Management Profile. You can create, modify, clone, remove, and deploy identity management profiles. See JIMS Identity Management Profile Overview.
  • Active Directory—Configure Active Directory server profiles for the SRX Series Firewalls to contact the Active Directory servers. You can view, create, modify, clone, and delete Active Directory profiles. See Active Directory Profile Overview.
  • Access Profiles—Configure access profiles for network access and authentication settings. Juniper Security Director Cloud supports RADIUS, LDAP, and local authentication methods. See Access Profile Overview.
  • Address Pools—Create centralized IPv4 address pools separately from the client applications using the address pools. An address pool consists of IP addresses that can be allocated to users, such as in DHCP setups. See Address Pools Overview.

Shared Services > Firewall Profiles

Manage security related to:

  • Rule Options—Define objects to set redirect options, authentication parameters, TCP options, and actions for both translated and untranslated destination-address packets. Upon creating rule options, Juniper Security Director Cloud generates objects in its database to represent these rule options. See Rule Options Overview.
  • Redirect Profiles—Create a redirect profile and explain the policy action or direct user requests to an informative webpage. See Redirect Profiles Overview.

Shared Services > Objects

Mange objects related to:

  • Addresses—Create addresses and address groups that are used in security and NAT services. You can create, edit, and delete addresses and address groups. See Addresses Overview.
  • GeoIP—Create IP-based geolocation (GeoIP) feeds in security policies to deny or allow traffic based on the source or the destination IP address. You can create, modify, or delete the GeoIP feeds. See GeoIP Overview.
  • Services—Manage applications across multiple devices. A service refers to an application on a device, such as Domain Name Service (DNS). See Services Overview.
  • Applications—Manage application signature groups. You can create, modify, clone, and delete application signature groups. You can also view the details of predefined application signatures that are downloaded. See Aplication Signatures Overview.
  • Schedules—Create schedules for security policies to be active only during the scheduled time or link policies to existing schedules. See Schedules Overview.
  • URL Patterns—Create URL patterns that contain a list of URLs. You can create, edit, clone, and delete URL patterns. See URL Patterns Overview.
  • URL Categories—Create URL categories that contain a list of URL patterns which are grouped under a single title. You can create, edit, clone, and delete URL categories. See URL Categories Overview.

Administration

Perform administrative tasks related to:

  • Subscriptions—Manage your Juniper Security Director Cloud subscriptions. See Subscriptions Overview.
  • Users and Roles—Manage authentication and role-based access control (RBAC) to Juniper Security Director Cloud's resources and services. See About the Users Page.
  • Jobs—Monitor the status of jobs executed or scheduled in Juniper Security Director Cloud. You can configure jobs to run immediately or later. See Jobs Management in Juniper Security Director Cloud.
  • Audit logs—Use audit logs to trace events and to maintain historical data. An audit log is a record of a sequence of activities that have affected a specific operation or procedure. See About the Audit Logs Page.
  • Data Management—View device logs related to security and data traffic on the Data Management page. You can export or delete these logs. See About the Data Management Page.
  • Organization—Manage your organization account's devices and subcriptions. Administrators, operators, or users with read-only access of organizations can create multiple organization accounts in Juniper Security Director Cloud. See About the Organization Page.

Juniper Security Director Cloud Navigational Elements

Juniper Security Director Cloud offers several navigational tools within the GUI for a more tailored user experience. Table 2 displays sample icons for navigation, customization, and assistance.

Table 2: Navigational Elements
Element Icon Location
Breadcrumbs—Trace your location in the GUI. Follow the breadcrumbs in the GUI to navigate back to one of the seven main tabs: Dashboard, Monitor, Device Management, NAT & Objects, Firewall, Advanced Security, and Administration.

Upper-left corner of the main screen, below the Monitor menu. It is not visible on the Dashboard.

Info Tips—Hover over an info tip icon for quick pop-up guidance. Various places around the GUI.
Show and Hide Left-Nav—Click the hamburger icon to show or hide the left-navigation section. Left side of the menu bar.
Show/Hide Columns—Click the kebab icon and select the check boxes in the menu to choose which columns are visible in tabular displays. Upper-right corner of tabular display windows such as the Monitor menu and the Device Management menu.

Global Search—Search for specific data, such as security policies, addresses, zone, and service objects in your network. You can also search for objects in your network using full or partial keywords, such as security policies, addresses, and devices using host name, OS version, or product series. Click the result to navigate to the specific page in the GUI.

You can refine the search results for specific criteria such as date range, device type, and policy type.

Right side of the top bar.
Table Search—Search for specific text in the visible fields of large tabular views. Upper-right corner of tabular views, next to the Show/Hide Columns icon.