Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


Juniper Security Director Cloud Overview

Juniper Security Director Cloud is your portal to Secure Access Service Edge (SASE), bridging your current security deployments with your future SASE rollout. Juniper Security Director Cloud helps organizations migrate securely to SASE architecture. Using Juniper Security Director Cloud, organizations can create unified policies once and deploy the policies wherever their users are using the applications. Unified policy management ensures seamless security across all users, applications, or devices wherever they are.

Juniper Security Director Cloud empowers both traditional security roles and network roles by automating tier I and tier II security tasks and by supplementing network visibility with security insights. Additionally, Juniper Security Director Cloud provides value for enterprise and service providers by shifting from monolithic centralized data center architectures to SASE-based, decentralized architectures that bring services closer to end users.

Juniper Security Director Cloud provides a user-friendly and security-focused GUI interface that allows an administrator to perform specific tasks. Table 1.

When you log in to application, the main menu (left sidebar) that is displayed and the actions that you can perform depend on your access privileges. Table 1 lists the main menu that is available in the Juniper Security Director Cloud, a brief description of each menu item, and a link to the relevant topic in the Juniper Security Director Cloud User Guide.

Table 1: GUI Menu and Description
Menu Description


The dashboard displays information such as top events, top denials, top applications, top source and destination IP addresses, top traffic, and top infected hosts. Graphical security widgets that can be added, removed, and rearranged per user. These widgets offer each user a customized view of network security. See About the Dashboard.


You can view following information from Monitor menu:

  • Alerts—Alerts are used to notify about significant events within the system. You can define alert criteria based on a set of predefined filters. See Alerts Overview
  • Logs—You can view details of the traffic logs that are generated by managed devices. You can view information about security events based on IPS policies, Web filtering policies, and IPSec VPN policies. You can also view an overall, high‐level view of your network environment. You can view abnormal events, attacks, viruses, or worms when log data is correlated and analyzed. See About the Session Page
  • Maps and Charts—The threat map provides a visualization of the geographic regions for incoming and outgoing traffic. You can view blocked and allowed threat events based on feeds from IPS, antivirus, and antispam engines. See Threat Map Overview
  • Reports—Reports are generated based on a summary of network activity and overall network status. These generated reports can help you to perform a trend analysis of your network's activities to study changes in traffic patterns. You can use the predefined reports, or you can build custom reports that meet specific needs. See Reports Overview

SRX>Device Management

  • Devices—Discover and manage devices. See About the Devices Page.

  • Configuration Templates—Provision configurations, both during onboarding and throughout the device life cycle, for Juniper Networks and other third-party devices. By using configuration templates, you can deploy customized configurations on devices. See Configuration Templates Overview.

  • Software Images—A software image is a software installation package used to upgrade or downgrade the operating system running on a network device. Juniper Security Director Cloud helps you to manage (add, stage, deploy, and delete) the entire lifecycle of software images of all managed network devices. See About the Images Page.

  • Security Packages—Security package consists of IPS Signatures, Application Signatures, and URL Categories. Use the Security Packages page. You can view the list of latest security packages available on Juniper Security Director Cloud, view the list of currently installed security packages on the device, and install the latest security packages on the device. See About the Security Packages Page.

SRX>Security Policy

  • SRX Policy— Provides security functionality by enforcing rules on traffic that passes through a device. Traffic is permitted or denied based on the action defined in the security policy rules. You can create, modify, and delete security policy and associate the devices with a security policy. See Security Policy Overview.

  • Device View—Provides an overall, high-level view of your security policy device settings. You can also use this page to view detailed information on the number of rules and policies assigned per device. See Devices with Security Policies Main Page Fields.

SRX>Security Subscriptions

Advanced Security management related to:
  • IPS— The intrusion prevention system (IPS) profile is deployed on a device by associating the profile with a security policy rule, which is deployed on the device. You can associate IPS rules and exempt rules with an IPS profile. See About the IPS Profiles Page.
  • Content Security—content security is a term used to describe the consolidation of several security features to protect against multiple threat types. You can enable antispam, antivirus, content filtering, and web filtering. See About the Content Security Profiles Page.
  • Decrypt Profiles—You can view and manage SSL proxy profiles. See About the Decrypt Profiles Page.
  • VPN—You can view and manage the IPsec VPN profiles that provide a means to securely communicate with remote computers across a public WAN, such as the Internet. See IPsec VPN Overview.


IPsec VPN—You can view and manage the IPsec VPN profiles that provide a means to securely communicate with remote computers across a public WAN, such as the Internet. See IPsec VPN Overview.


  • NAT Policies— Create, modify, clone, and delete NAT policies and policy rules. You can filter and sort this information to get a better understanding of what you want to configure. See About the NAT Policies Page.

  • NAT Pools—A NAT pool is a set of IP addresses that you can define and use for address translation. NAT policies perform address translation by translating internal IP addresses to the addresses in these pools. See About the NAT Pools Page.


  • JIMS—Use the Identity Management Profile page to obtain advanced user identity from different authentication sources for SRX Series Firewalls. You can create, edit, clone, delete and deploy identity management profiles. See About the Identity Management Profile Page.
  • Active Directory—Active Directory configuration is used by the SRX Series Firewalls to contact the Active Directory server. You can view, create, modify, clone, and delete Active Directory profile. See About the Active Directory Profile Page.
  • Access Profiles—Access profiles enable access configuration on the network—this consists of authentication configuration. Juniper Security Director Cloud supports RADIUS, Lightweight Directory Access Protocol (LDAP), and local authentication as authentication methods. See About the Access Profile Page.
  • Address Pools—An address pool is a set of Internet Protocol (IP) addresses available for allocation to users, such as in host configurations with the DHCP. You can create centralized IPv4 address pools independent of the client applications that use the pools. See About the Address Pool Page.

Shared Services>Firewall Profiles

Perform security-related management tasks related to:

  • Rule Options—You can create an object to specify redirect options, authentication, TCP-options, and action for destination-address translated or untranslated packets. When a rule options is created, the Juniper Security Director Cloud creates an object in the database to represent the rule options. See About Rule Options Page.
  • Redirect Profiles—You can create a redirect profile and provide a reason for the policy action or to redirect the user request to an informative webpage. See About the Redirect Profiles Page.

Shared Services>Objects

Mange the following objects:

  • Addresses—Create, edit, and delete addresses and address groups. Addresses and address groups are used in security and NAT services. See About the Addresses Page.
  • GeoIP—Create, modify, or delete the IP-based geolocation (GeoIP) feeds. You can use the GeoIP feeds in security policy to deny or allow traffic based on source or destination IP address. See About the GeoIP Page.
  • Services—Manage applications across devices. A service refers to an application on a device, such as Domain Name Service (DNS). See About the Services Page.
  • Applications—Create, modify, clone, and delete application signature groups. You can also view the details of predefined application signatures that are already downloaded. See About the Application Signatures Page.
  • Schedules—A schedule allows a policy to be active for a specified duration. If you want a policy to be active during a scheduled time, you must first create a schedule for that policy or link the policy to an existing schedule. See Schedules Overview.
  • URL Patterns—View, create, edit, clone, and delete URL patterns. A URL pattern contains a list of URLs. See About the URL Patterns Page
  • URL Categories—View, create, edit, clone, and delete URL categories. A URL category is a list of URL patterns grouped under a single title. See About the URL Categories Page.


Perform administrative tasks including:

  • Subscriptions—Add and manage your Juniper Security Director Cloud subscriptions. See Subscriptions Overview.
  • Users and Roles—Juniper Security Director Cloud supports authentication and role-based access control (RBAC) to its resources and services. See About the Users Page
  • Jobs—The Jobs page lets you monitor the status of jobs that have run or are scheduled to run in Juniper Security Director Cloud. Jobs can be scheduled to run immediately or in the future. See Jobs Management in Juniper Security Director Cloud
  • Audit logs—An audit log is a record of a sequence of activities that have affected a specific operation or procedure. Audit logs are useful for tracing events and for maintaining historical data. See About the Audit Logs Page
  • Data Management—The Data Management page displays device logs related to security and data traffic. You can export or delete these logs. See About the Data Management Page
  • Organization—An organization account helps you to add devices, subscribe your devices, and start managing the devices. An administrator, operator, or user with read-only access of organization can create multiple organization accounts in Juniper Security Director Cloud. See About the Organization Page

When you log in to Portal, the main menu (left sidebar) that is displayed and the actions that you can perform depend on your access privileges. Table 1 displays the main menu available in the Juniper Security Director Cloud Portal, a brief description of each menu item, and a link to the relevant topic in the Juniper Security Director Cloud User Guide.

Benefits of Juniper Security Director Cloud

  • Manages all security deployments—physical, virtual, and containerized SRX for traditional deployments— and helps the smooth transition to a SASE architecture.
  • Offers fully integrated security with unified policies at every point of connection. With unified policy management, you can create a policy once and apply it anywhere. You don't need to copy over or recreate rule sets.
  • Provides a single centralized management interface that enables administrators to manage all phases of the security policy life cycle by using customizable dashboards and reports.
  • Offers protection from attacks against the client and from the server-side exploits, malware, and C2 traffic, regardless of where the users and applications are located.
  • Enables easy deployment and configuration for new sites using zero-touch provisioning (ZTP), auto-rule placement, and policy-based routing.
  • Enables security for on-premise and cloud-based environments simultaneously and at scale, with validated efficacy against data center threats.

Access Juniper Security Director Cloud

To access Juniper Security Director Cloud portal:

  1. If you are logging in to Juniper Security Director Cloud for the first time, click Create an organization account link. If you already created an organization account, skip to Step 5.
  2. Set your login credentials, contact details, and the organization account details according to the guidelines provided in table Table 2.
    Table 2: Fields to Create an Organization Account



    Login Credentials


    Enter a valid e-mail ID.


    Enter a password that contains at least one number, one uppercase letter and one special character. The password length should be between 8 to 20 characters.

    Contact Details

    Contact Details

    Enter the following contact details:

    • Name—Enter your name. Only alphabets with spaces are allowed. The maximum length is 32 characters.
    • Company name—Enter your company name. Only alphanumeric characters, spaces, `-` (hyphen) and `_` (underscore) are allowed. The maximum length is 64 characters.
    • Country—Select the country from the dropdown list.
    • Phone number—Enter a valid phone number that can contain numbers and +, -, or () symbols. The total length of phone number must be 7 (including hyphen) through 18 characters. Example phone formats:
      • +91-9590951194
      • +918087677876
      • 408-111-1111
      • 1(234)56789011234
      • (+351)282435050
      • 90191919908
      • 555-89097896
    Organization account details  

    Organization name

    Enter a name for the organization account for which you would be managing the security devices and services.

    Select Home Pop

    Select your home region.

    The home region is usually the geographical area where your SRX Series Firewalls are located. Technically, you can select any region, but we recommend you select the region that is closest to your geographical location.


    The Juniper Security Director Cloud FQDN of each home region is different. You must configure your network firewall to allow access to the FQDN. Contact your sales representative or account manager for the specific FQDN.

  3. Click Create Organization Account. You will receive an email to verify your e-mail address and to send a request to the Juniper Security Director Cloud team to activate your organization account.
  4. Log in to your e-mail account, open the e-mail, and click the Activate Organization Account button to send a request to activate your organization account.
    • You must verify your e-mail address and send the account activation request by clicking the Activate Organization Account button within 24 hours after receiving the e-mail. Otherwise, your account details will be deleted from Juniper Security Director Cloud, and you'll have to re-create your account and send the activation request.

    • You will receive an e-mail about your organization account activation status within 7 working days.

    If your account activation request is approved, you will receive an e-mail with login page information.

  5. Click Go to Login Page and enter your e-mail address and password to log in and start using the Juniper Security Director Cloud portal.

    We recommend that you use Google Chrome (Version 85 or later) or Firefox (Version 85 or later) to access the Juniper Security Director Cloud GUI.

  6. Click Go to Dashboard. You can access different tasks easily using the menu bar on the left of each page. The top-level menu items are listed in Table 1.

Using Navigational Elements

For a more personal and customizable user experience, Juniper Networks provides some navigational aids within the GUI. Table 3 shows the sample of navigation, customization, and help icons.

Table 3: Navigational Elements
Element Icon Location
Breadcrumbs—Trace your location in the UI. The breadcrumbs provide a path back to one of the seven starting tabs: Dashboard, Monitor, Device Management, NAT & Objects, Firewall, Advanced Security, and Administration.

The upper left part of the main screen below the Monitor tab. Not visible on the Dashboard.
Info Tips—Position your mouse over any available question mark icon for quick pop-up guidance. Various places around the GUI.
Show and Hide Left-Nav—Click the hamburger icon to show or hide the left-navigation section. Left side of the tab bar.
Show/Hide Columns—In tabular displays, you can choose which columns are visible by clicking the icon, and then selecting the check boxes in the menu. Upper-right corner of some tabular display windows such as the Monitor tab and the Device Management tab.

Global Search—Search for specific data such as security policies, addresses, zone, service objects, and so on in your network. You can click the result to navigate to the specific page in the UI.

You can also refine the search results based on specific criteria such as date range, device type, and policy type. You can also search for objects in your network using full or partial keywords.

You can search for:

  • Addresses

  • Applications

  • CASB profiles and rules

  • Configuration templates

  • Configured schedules

  • Content Security:

    • Content security profiles

    • Antivirus profiles

    • Antispam profiles

    • Web filtering profiles

    • Content filtering profiles

    • Anti-malware

  • Decrypt profiles

  • Devices using the hostname, OS version, and product series as keywords

  • Extranet devices using the name, description, the IKE identity, and the IKE address as keywords

  • Firewall rules and rule options

  • Firewall redirect profiles

  • Identify management:

    • JIMS

    • Active Directory

    • Access profiles

    • Address pools

  • IPS profiles and signatures

  • IPsec VPNs and profiles

  • NAT policies and pools

  • SecIntel profiles and groups

  • Security policies

  • Secure web proxies

  • Services

  • Software images

  • URL categories

  • URL patterns

  • Users and user roles

Navigation aid on the right side of the top bar.
Table Search—In large tabular views, you can search for specific text within any of the visible fields in the display. Upper-right corner of tabular views. Next to the Show Hide Columns icon.