Identity-Based Application and Network Profiling

Size: px
Start display at page:

Download "Identity-Based Application and Network Profiling"

Transcription

1 Application Note Identity-Based Application and Network Profiling Using UAC in Conjunction with NSM, IDP and Infranet Enforcers Permits User-Identified Application and Network Profiling Juniper Networks, Inc North Mathilda Avenue Sunnyvale, California USA JUNIPER Part Number: Nov 2007

2 Table of Contents Introduction... 3 Scope Design Considerations... 3 Description and Deployment Scenario... 3 Summary About Juniper Networks Copyright 2007, Juniper Networks, Inc.

3 Introduction Scope When Juniper Networks Unified Access Control (UAC) is used in conjunction with Juniper Networks NetScreen-Security Manager (NSM) and Juniper Networks Infranet Enforcers, you gain user-identified visibility into your network traffic. With the addition of an Intrusion Detection and Prevention (IDP) system, whether standalone or integrated, you can gain an even deeper insight into your network by being able to correlate user identity with application and network profiling data collected by the IDP. Previously, profiler data was identified strictly by a combination of IP addresses, ports, and applications, but no user identity information was included. The identity of the user responsible for generating the traffic obtained by the profiler was difficult to determine without a significant correlation effort. Using UAC, however, the IDP application and network profile is tagged with the username and roles of the user that generated the profiled traffic. This application note describes how to configure NSM, the Infranet Enforcers, and the IDP to provide user-identified application and network profiler information. Design Considerations To generate identity-based profiler data, you need the following: Hardware Requirements Server platform capable of running NSM version R1 or greater (or Juniper Networks NSMXpress appliance) Infranet Enforcer(s) capable of running Juniper Networks ScreenOS version 6.0.0R1 or greater Juniper Networks Infranet Controller models IC4000 or IC6000 IDP standalone (IDP50/200/600/1100) or firewall-integrated (Juniper Networks Integrated Security Gateways [ISG] 1000/2000) Software Requirements Description and Deployment Scenario NetScreen-Security Manager version R1 or greater ScreenOS version 6.0.0R1 or greater Infranet Controller version 2.0R3 or greater IDP software v4.1r1a or greater In order to use this new feature you must complete a couple of steps. First, the Infranet Enforcers, and the IDP systems used to gather profiling information, must be under control of NSM. Before adding the devices to NSM, you must make a change to the NSM Device Server configuration: Edit the /var/netscreen/devsvr/devsvr.cfg file. Look for the following line in the file and change it from: devsvrmanager.uac_correlation_enabled 0 to devsvrmanager.uac_correlation_enabled 1 After making this change, you will need to restart the NSM Device Server. You can either reboot the NSM server, or execute the command /usr/netscreen/devsvr/bin/devsvr.sh restart. Copyright 2007, Juniper Networks, Inc. 3

4 After modifying the NSM Device Server configuration, you can add your Infranet Enforcer and IDP devices to NSM. Be aware that without at least one Infranet Enforcer configured to send traffic logs to NSM, you will not be able to correlate user-identity with profiler data. This is because NSM receives the user, role, and IP address information from the Infranet Enforcer traffic log data. As such, useridentified profiling should be done using an ISG platform with the integrated IDP module(s). Using the ISG as both an Infranet Enforcer and IDP ensures that the traffic log data matches that collected by the profiler and permits NSM to identify by user all application and network profile information. Though possible to use a standalone IDP in conjunction with separate Infranet Enforcers, this is not ideal, as the IDP profiler may collect application and network data that cannot be correlated because the user s traffic did not pass through an Infranet Enforcer. To get the Infranet Enforcer traffic logs into NSM, you must complete three steps: (1) add the Infranet Enforcer to NSM, (2) enable traffic logging on the Infranet Enforcer, and (3) enable logging on any Infranet policy for which you want traffic data captured to NSM. For a step-by-step configuration example, see the Identity-based Traffic Logging and Reporting application note. Next, you must add the IDP to NSM. While this procedure is covered in detail in numerous other documents, below is a brief step-by-step guide on how to do it. Within NSM, open the Device Manager > Security Devices window, click on the plus sign (+), and select Device from the pull down menu. Figure 1: Log View Creation Enter the Device Name for your IDP (this is only for NSM), then click Next. Specify the IP Address of the IDP, along with the Admin Username and Password and the root password of the device; then click Next. Once contact is made, click Next to accept the IDP s SSH key. Finally, once the device information has been auto-detected, click Next to add the IDP into NSM. 4 Copyright 2007, Juniper Networks, Inc.

5 Figure 2: IDP Addition to NSM After adding the IDP to NSM, you will most likely need to import the device s configuration into NSM. You can verify whether or not this needs to be done by mousing over the IDP in the Security Devices view. Note the value for Configuration State. If it indicates that an import is needed, perform the next step; otherwise you can skip it. Even if the Configuration State shows Managed, performing an import will not harm anything. Figure 3: IDP Status To import the IDP configuration into NSM, right-click on the IDP device icon and select Import Device from the menu. After a few moments, NSM should report the successful importation of the IDP configuration. You can again check the status of the IDP, which should now show its Configuration State as Managed. Copyright 2007, Juniper Networks, Inc. 5

6 Figure 4: IDP Configuration Import into NSM Once the IDP is in a Managed state, it s time to configure it for profiling. Open the IDP configuration for editing by double-clicking the IDP icon in the Security Devices list. In the Info pane, select a Security Policy from the pull-down menu. You can use a pre-defined Security Policy, or you will have to create your own (not discussed here). Figure 5: Configure IDP Security Policy 6 Copyright 2007, Juniper Networks, Inc.

7 Next, go to the Profiler Settings pane. There are several tabs here that you will need to configure. First, check the Enable Profiling checkbox on the General tab. Figure 6: Enable Profiling Copyright 2007, Juniper Networks, Inc. 7

8 On the Tracked Hosts tab, select those hosts that you want the profiler to pay attention to. The list of Tracked Hosts must be defined separately in the Object Manager section of NSM. Figure 7: Selecting Tracked Hosts 8 Copyright 2007, Juniper Networks, Inc.

9 On the Contexts to Profile tab, select all Contexts unless you have a specific reason not to. Consult the IDP and NSM documentation for further information about these selections. After completing this tab, click OK to save the Profiler configuration. Figure 8: Selecting Contexts to Profile To start the Profiler, right-click on the IDP device icon in the Security Device list and select IDP Profiler > Start Profiler from the pull-down menu. The pop-up window allows you to change any of the Profiler settings that you just made (you don t need to change anything). Click OK to start the Profiler. You should receive a Job Information window showing that the Profiler has started. Figure 9: Starting the Profiler Copyright 2007, Juniper Networks, Inc. 9

10 To see the Profiler logs, navigate to the Security Monitor > Profiler menu within the NSM main window. The Application Profiler will be the default view. It s possible that this table won t contain the User and Role columns that you re after, so you ll have to add them. Select View > Choose Columns from the menus at the top of the NSM window, check the User and Role checkboxes, and move them to a position of your liking. Figure 10: Adjusting Column Settings Your Application Profiler view should now look something like the picture below. The User column will reflect the username of the person that generated the traffic associated with that particular Profiler entry, and the Role column will show the UAC roles to which that user was mapped. All other traditional Profiler information is there, and now it s correlated to a user. Figure 11: Application Profiler View 10 Copyright 2007, Juniper Networks, Inc.

11 The Network Profiler view looks similar. Figure 12: Network Profiler View Summary The latest versions of NSM, Infranet Enforcers, IDP and UAC, working together as an integrated solution, enable you to perform application and network profiling that is specific to an individual user. This user-indentified profiling information provides you with valuable insight into the state of your network and application usage. Copyright 2007, Juniper Networks, Inc. 11

12 About Juniper Networks Juniper Networks, Inc. is the leader in high-performance networking. Juniper offers a high-performance network infrastructure that creates a responsive and trusted environment for accelerating the deployment of services and applications over a single network. This fuels high-performance businesses. Additional information can be found at CORPORATE HEADQUARTERS AND SALES HEADQUARTERS FOR NORTH AND SOUTH AMERICA Juniper Networks, Inc North Mathilda Avenue Sunnyvale, CA USA Phone: 888.JUNIPER ( ) or Fax: EUROPE, MIDDLE EAST, AFRICA REGIONAL SALES HEADQUARTERS Juniper Networks (UK) Limited Building 1 Aviator Park Station Road Addlestone Surrey, KT15 2PG, U.K. Phone: 44.(0) Fax: 44.(0) EAST COAST OFFICE Juniper Networks, Inc. 10 Technology Park Drive Westford, MA USA Phone: Fax: ASIA PACIFIC REGIONAL SALES HEADQUARTERS Juniper Networks (Hong Kong) Ltd. 26/F, Cityplaza One 1111 King s Road Taikoo Shing, Hong Kong Phone: Fax: Copyright 2007 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. JUNOS and JUNOSe are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. To purchase Juniper Networks solutions, please contact your Juniper Networks sales representative at or authorized reseller. 12

Identity-Based Traffic Logging and Reporting

Identity-Based Traffic Logging and Reporting Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,

More information

Limitation of Riverbed s Quality of Service (QoS)

Limitation of Riverbed s Quality of Service (QoS) Application Note Limitation of Riverbed s Quality of Service (QoS) Riverbed s Quality of Service (QoS) configuration and limitations Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL

IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3

More information

TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server

TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available

More information

Juniper Networks Solution Portfolio for Public Sector Network Security

Juniper Networks Solution Portfolio for Public Sector Network Security Solution Brochure Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance STRM NS-Security

More information

JUNOScope IP Service Manager

JUNOScope IP Service Manager Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies

More information

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET

Network and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,

More information

WXOS 5.5 SSL Optimization Implementation Guide for Configuration and Basic Troubleshooting

WXOS 5.5 SSL Optimization Implementation Guide for Configuration and Basic Troubleshooting 1 WXOS 5.5 SSL Optimization Implementation Guide for Configuration and Basic Troubleshooting Table of Contents 1. Introduction...1 1.1. How Does the SSL Optimization Feature Work...2 1.2. What Happens

More information

Configuring and Implementing A10

Configuring and Implementing A10 IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this

More information

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS

MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.

More information

After you have created your text file, see Adding a Log Source.

After you have created your text file, see Adding a Log Source. TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular

More information

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM)

Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM) White Paper Meeting PCI Data Security Standards with Juniper Networks Security Threat Response Manager (STRM) When It Comes To Monitoring and Validation It Takes More Than Just Collecting Logs Juniper

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE IDP Series Intrusion Detection and Prevention Appliances PRODUCT CATEGORY BROCHURE Staying One Step Ahead With the accelerating number of applications allowed in from the Internet and the higher frequency

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

NETWORK AND SECURITY MANAGER

NETWORK AND SECURITY MANAGER DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching

More information

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY

PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................

More information

Juniper Networks Solution Portfolio for Public Sector Network Security

Juniper Networks Solution Portfolio for Public Sector Network Security SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper

More information

Setting up an icap Server for ISG- 1000/2000 AV Support

Setting up an icap Server for ISG- 1000/2000 AV Support Application Note Setting up an icap Server for ISG- 1000/2000 AV Support Version 1.1 Ronald Ng AJTAC Engineer AV/DI/UF Specialist Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA

More information

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES

VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table

More information

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations

More information

Remote Access Protection

Remote Access Protection IMPLEMENTATION GUIDE Remote Access Protection Best Practices for Implementing Remote Access Protection Using Juniper Networks SA Series SSL VPN Appliances, IDP Series Intrusion Detection and Prevention

More information

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)

NETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000) DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL USING NFS FOR STRM BACKUPS SEPTEMBER 2013 This technical note provides guidelines and procedures for using a Network File System (NFS) storage solution in your STRM deployment. Unless otherwise

More information

By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.

By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate. TECHNICAL NOTE REPLACING THE SSL CERTIFICATE AUGUST 2012 By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size

More information

Juniper Networks Education Services

Juniper Networks Education Services Datasheet Education Services Deploying networks that can securely and reliably deliver high-speed services is a must for setting your business apart from the competition. But how do you keep pace with

More information

Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches

Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL NOTE INSTALLING STRM USING A BOOTABLE USB FLASH-DRIVE JULY 2013 This technical note provides information on how to re-install STRM software on the STRM appliances using a bootable USB flash-drive.

More information

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES

MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,

More information

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS)

CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) APPLICATION NOTE CONFIGURATION OPTIONS FOR HARDWARE RULE SEARCH (RMS) AND SOFTWARE RULE SEARCH (SWRS) Discover Which Juniper Networks ScreenOS Rule Search Works for Your Network Copyright 2010, Juniper

More information

This technical note provides information on how to customize your email notifications. This section includes the following topics:

This technical note provides information on how to customize your email notifications. This section includes the following topics: TECHNICAL NOTE CONFIGURING CUSTOM EMAIL NOTIFICATIONS AUGUST 2012 When configuring rules in STRM, you can specify that each time the rule generates a response, an email notification is sent to recipients

More information

Juniper Networks Unified Access Control (UAC) and EX-Series Switches

Juniper Networks Unified Access Control (UAC) and EX-Series Switches White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Tackling the Top Five Network Access Control Challenges Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

Implementing Firewalls inside the Core Data Center Network

Implementing Firewalls inside the Core Data Center Network Implementation Guide Implementing Firewalls inside the Core Data Center Network Best Practices for Implementing Juniper Networks Firewall Devices in the Data Center Core Juniper Networks, Inc. 1194 North

More information

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.

Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection. TECHNICAL NOTE FORWARDING LOGS USING TAIL2SYSLOG MARCH 2013 The Tail2Syslog support script provides a method for monitoring and forwarding events to STRM using syslog for real-time correlation. Tail2Syslog

More information

Juniper Networks Customer Service

Juniper Networks Customer Service Juniper Networks Customer Service Customer Services that assure network performance by providing optimal security, quality, and reliability for your network. Juniper Networks Customer Service We Are All

More information

Using Multicast Call Admission Control for IPTV Bandwidth Management

Using Multicast Call Admission Control for IPTV Bandwidth Management Application Note Using Multicast Call Admission Control for IPTV Bandwidth Management Managing Multicast Bandwidth in IPTV Networks Using Multicast Call Admission Control in the Edge Router Juniper Networks,

More information

Deploying IP Telephony with EX-Series Switches

Deploying IP Telephony with EX-Series Switches Application Note Deploying IP Telephony with EX-Series Switches Optimizing VoIP Applications with EX 3200 and EX 4200 Series Ethernet Switches Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches

Optimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,

More information

AlienVault. Unified Security Management 5.x Configuring a VPN Environment

AlienVault. Unified Security Management 5.x Configuring a VPN Environment AlienVault Unified Security Management 5.x Configuring a VPN Environment USM 5.x Configuring a VPN Environment, rev. 3 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Juniper Networks Unified Access Control (UAC) and EX-Series Switches

Juniper Networks Unified Access Control (UAC) and EX-Series Switches White Paper Juniper Networks Unified Access Control (UAC) and EX-Series Switches Meeting Today s Security Challenges with End-to-End Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources

Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................

More information

Web Filtering For Branch SRX Series and J Series

Web Filtering For Branch SRX Series and J Series APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Migrating Log Manager to JSA

Migrating Log Manager to JSA Juniper Log Manager Release 2014.4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-03-02 Copyright Notice Copyright 2015 Juniper Networks,

More information

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc. Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

A Secure Network for Credit Card Transactions

A Secure Network for Credit Card Transactions White Paper A Secure Network for Credit Card Transactions Addressing PCI Compliance with Juniper Networks Unified Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California

More information

Meeting PCI Data Security Standards with

Meeting PCI Data Security Standards with WHITE PAPER Meeting PCI Data Security Standards with Juniper Networks STRM Series Security Threat Response Managers When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork

SoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3

More information

Introduction to Junos Space Network Director

Introduction to Junos Space Network Director Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES

WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1

More information

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation

More information

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager Release 2013.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-15 Copyright Notice Copyright 2013

More information

Strategic Network Consulting

Strategic Network Consulting Strategic Network Consulting Service Description Document November 2009 Contents 1. Introduction... 2 2. Eligibility and Prerequisites... 2 3. Service Features and Deliverables... 2 4. Customer Responsibilities...

More information

Electronic Fulfillment of Feature, Capacity and Subscription License Activation Keys via the License Management System (LMS)

Electronic Fulfillment of Feature, Capacity and Subscription License Activation Keys via the License Management System (LMS) Electronic Fulfillment of Feature, Capacity and Subscription License Activation Keys via the License Management System (LMS) Table of Contents OVERVIEW... 2 A LICENSE KEY EXPLAINED... 2 LICENSE... 2 LICENSE

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

SOLUTION BROCHURE. Lifecycle Wireless Infrastructure, Security and Services Management

SOLUTION BROCHURE. Lifecycle Wireless Infrastructure, Security and Services Management SOLUTION BROCHURE Wireless LAN Management Solution Overview Lifecycle Wireless Infrastructure, Security and Services Management Wireless LAN Management Solution Overview A successful wireless LAN (WLAN)

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

ADMINISTRATOR S GUIDE

ADMINISTRATOR S GUIDE ADMINISTRATOR S GUIDE NetScreen-Statistical Report Server Version FP2 P/N 093-1386-000 Rev.A Copyright Notice Copyright 2004 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks

More information

Palomar College Dial-up Remote Access

Palomar College Dial-up Remote Access Palomar College Dial-up Remote Access Instructions for Windows 95/98 and Windows 2000 Following are instructions to implement dialup access to the Palomar College network, email and Internet. The minimum

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Big Data Management Guide Release 2014.2 Published: 2014-08-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Adaptive Log Exporter Service Update

Adaptive Log Exporter Service Update Juniper Secure Analytics Release 2014.6 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2016-04-21 Copyright Notice Copyright 2016 Juniper

More information

Security Solutions Portfolio

Security Solutions Portfolio Fixed Telecommuter or Small Medium Office Regional Office SSG 520M SSG 550M Security Solutions Portfolio Integrated Firewall/VPN Solutions SSG 140 Branch Office... SSG 320M... SSG 350M... SSG 5 SSG 20...

More information

Registered Trademarks and Proprietary Names

Registered Trademarks and Proprietary Names 123 User's Guide Notice of Copyright Published by Maximizer Software Inc. Copyright 1988-2010 All rights reserved. Registered Trademarks and Proprietary Names Product names mentioned in this document

More information

Juniper Networks WX Series Large. Integration on Cisco

Juniper Networks WX Series Large. Integration on Cisco APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure

More information

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES

DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

Installing JSA Using a Bootable USB Flash Drive

Installing JSA Using a Bootable USB Flash Drive Juniper Secure Analytics Installing JSA Using a Bootable USB Flash Drive Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published:

More information

How do I set up a branch office VPN tunnel with the Management Server?

How do I set up a branch office VPN tunnel with the Management Server? Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels

More information

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways

J-Flow on J Series Services Routers and Branch SRX Series Services Gateways APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring

More information

REPLACING THE SSL CERTIFICATE

REPLACING THE SSL CERTIFICATE Juniper Secure Analytics REPLACING THE SSL CERTIFICATE Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright

More information

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document

Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper

More information

Thales nshield HSM. ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2. www.thales-esecurity.com

Thales nshield HSM. ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2. www.thales-esecurity.com Thales nshield HSM ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2 www.thales-esecurity.com Version: 1.0 Date: 11 June 2012 Copyright 2012 Thales e-security Limited. All rights

More information

Product Description. Product Overview

Product Description. Product Overview DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their

More information

Voice Modules for the CTP Series

Voice Modules for the CTP Series DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Maximizer is a contact manager designed to help individuals, home offices, and small businesses succeed by helping them maximize their time, create satisfied customers, and increase

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Virtual Appliance Installation Guide Release 2014.1 Published: 2014-12-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

WinCollect User Guide

WinCollect User Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

Implementation Consulting

Implementation Consulting Implementation Consulting Service Description Document August 2009 Table of Contents 1. Introduction...2 2. Eligibility and Prerequisite...2 3. Service Features and Deliverables...2 4. Customer Responsibilities...3

More information

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005

Using Group Policies to Install AutoCAD. CMMU 5405 Nate Bartley 9/22/2005 Using Group Policies to Install AutoCAD CMMU 5405 Nate Bartley 9/22/2005 Before we get started This manual provides a step-by-step process for creating a Group Policy that will install AutoCAD to a Windows

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Big Data Management Guide Release 2014.1 Published: 2014-03-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways

Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways APPLICATION NOTE Dynamic VPN Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3

More information

SSL Insight Certificate Installation Guide

SSL Insight Certificate Installation Guide SSL Insight Certificate Installation Guide For A10 Thunder Application Delivery Controllers DEPLOYMENT GUIDE Table of Contents Introduction...3 Generating a CA Certificate...3 Exporting a Certificate from

More information

Juniper Networks Network and Security Manager

Juniper Networks Network and Security Manager Juniper Networks Network and Security Manager CentOS Upgrade Guide Release 2012.2 Modified: 2015-07-20 Revision 4 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Registered Trademarks and Proprietary Names

Registered Trademarks and Proprietary Names 123 User's Guide Notice of Copyright Published by Maximizer Software Inc. Copyright 1988-2010 All rights reserved. Registered Trademarks and Proprietary Names Product names mentioned in this document

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Multiple Port Mirroring Sessions on EX4200 Switches Published: 2014-04-09 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Managing Vulnerability Assessment

Managing Vulnerability Assessment Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.2 Published: 2012-06-27 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

IDP SERIES POLICY DESIGN AND OPTIMIZATION

IDP SERIES POLICY DESIGN AND OPTIMIZATION IMPLEMENTATION GUIDE IDP SERIES POLICY DESIGN AND OPTIMIZATION Although Juniper Networks has attempted to provide accurate information in this guide, Juniper Networks does not warrant or guarantee the

More information

Integrating Juniper Netscreen (ScreenOS)

Integrating Juniper Netscreen (ScreenOS) Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you

More information

Installation Guide. Trimble Accubid Time & Material Billing Software

Installation Guide. Trimble Accubid Time & Material Billing Software Revision A (ENG) May 2015 F Installation Guide Trimble Accubid Time & Material Billing Software Revision A (ENG) May 2015 F Toronto Office Trimble Canada Ltd. 9131 Keele Street Suite A7 Vaughan, Ontario

More information

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario...

Introduction...3. Scope...3. Design Considerations...3. Hardware Requirements...3. Software Requirements...3. Description and Deployment Scenario... APPLICATION NOTE Securing Virtualization in the Cloud-Ready Data Center Integrating vgw Virtual Gateway with SRX Series Services Gateways and STRM Series Security Threat Response Manager for Data Center

More information

Solution Brief. Migrating to Next Generation WANs. Secure, Virtualized Solutions with IPSec and MPLS

Solution Brief. Migrating to Next Generation WANs. Secure, Virtualized Solutions with IPSec and MPLS Solution Brief Migrating to Next Generation WANs Secure, Virtualized Solutions with IPSec and MPLS Migrating to Next Generation WANs Page 2 Migration Drivers for Ethernet and Virtual Private Networking

More information

Service Description Overview

Service Description Overview Service Description Overview Firewall Configuration Migration Service Service Description Overview...1 Firewall Configuration Migration Service...1 1. Introduction...2 2. Service Features...2 3. Service

More information

Tackling the Top Five Network Access

Tackling the Top Five Network Access WHITE PAPER Tackling the Top Five Network Access Control Challenges Juniper Networks Unified Access Control and EX Series Ethernet Switches Copyright 2010, Juniper Networks, Inc. Table of Contents Table

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Vulnerability Manager User Guide Release 2014.2 Published: 2014-12-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008

StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008 StarWind iscsi SAN Software: Using an existing SAN for configuring High Availability storage with Windows Server 2003 and 2008 www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT

More information