Add Devices
Before You Begin
-
Ensure you have access to the Juniper Security Director's Device connection virtual IP address or FQDN. You can find the virtual IP address details on the page.
- Open port TCP/443 (HTTPS) for the Juniper Security Director's UI virtual IP address or FQDN.
- Open port TCP/7804 (NETCONF) for SRX Series Firewall outbound access to Juniper Security Director’s Device connection virtual IP address or FQDN.
- Open port TCP/6514 (TLS Syslog) for monitoring and sending security logs to Juniper Security Director’s Log collector virtual IP address or FQDN.
- Open port TCP/53 (DNS) for the IP address 8.8.8.8 to allow access to the Google DNS server.
- Open port UDP/53 (DNS) for the IP address 8.8.4.4 to allow access to the Google DNS server.
- Ensure a minimum of 32 SSH connections for NETCONF. If the number of connections is currently lower, increase it to prevent any potential configuration or synchronization issues. For more details, see Establish an SSH Connection for a NETCONF Session.
- Ensure the System time on the device is configured correctly. You can set the time manually or synchronize the device with your NTP server.
-
Ensure that each SRX Series Firewall port can communicate with Juniper Security Director. The following table contains the details of SRX Series Firewall inbound connection ports.
Table 1: Inbound Ports Port
Purpose
7804
Inbound connection from all managed devices
6514
Inbound connection for traffic logs
-
If you use a custom routing-instance to connect to Juniper Security Director, run the following CLI commands to download and install the IDP security package from Juniper Security Director to a device:
Standalone Devices Device Clusters MNHA Pair Devices set security idp security-package routing-instance <custom routing-instance>-
set groups node0 security idp security-package routing-instance <custom routing-instance> -
set groups node1 security idp security-package routing-instance <custom routing-instance>
For each device in an MNHA pair:
set security idp security-package routing-instance <custom routing-instance> -
Add Standalone Devices, Device Clusters, or MNHA Pair Devices Using Commands
Juniper Security Director generates commands for adding a standalone device, a device cluster, or a multinode high availability (MNHA) pair devices. You can copy-paste and commit the commands into the device console, after which the devices are discovered and added to Juniper Security Director. For more information about MNHA, see the High Availability User Guide.
Juniper Security Director supports MNHA pair devices that run Junos OS Release 22.4R1 or later.
Auto Import Behavior on Devices Added To Juniper Security Director
If you have selected the auto-import option under the Organization tab and the devices are managed using the adopt devices method and device discovery profiles, this will automatically import security policies, NAT and referred objects. See About the Organization Page.
-
The auto import process creates copies of objects that conflict with the existing objects in Juniper Security Director.
-
The auto import process does not overwrite default Content Security settings in Juniper Security Director. The existing Content Security configuration is considered instead of the imported device configuration. We recommend you review and configure the Content Security settings in Juniper Security Director before managing the device. See Configure the Content Security Settings.