Secure Access Service Virtual Appliance
|
|
|
- Aubrey Todd
- 10 years ago
- Views:
Transcription
1 Secure Access Service Virtual Appliance Service Provider Virtual Appliance Management Guide Release 7.2 Published: Part Number:, Revision 1
2 Juniper Networks, Inc North Mathilda Avenue Sunnyvale, California USA This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright , Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public domain. This product includes memory allocation software developed by Mark Moraes, copyright 1988, 1989, 1993, University of Toronto. This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, The Regents of the University of California. All rights reserved. GateD software copyright 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by Cornell University and its collaborators. Gated is based on Kirton s EGP, UC Berkeley s routing daemon (routed), and DCN s HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright 1991, D. L. S. Associates. This product includes software developed by Maker Communications, Inc., copyright 1996, 1997, Maker Communications, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Secure Access Service Virtual Appliance Service Provider Virtual Appliance Management Guide Revision History 2010 Revised for SA release Revised for Secure Access Service 7.2. The information in this document is current as of the date on the title page. END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at By downloading, installing or using such software, you agree to the terms and conditions of that EULA. ii
3 Abbreviated Table of Contents Part 1 About This Guide ix Virtual Appliances Chapter 1 Virtual Appliances Overview Chapter 2 Chapter 3 Chapter 4 Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties Deploying Secure Access Services Virtual Appliances in VMware vsphere Using the Serial Port Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance Part 2 Index Index iii
4 Service Provider Virtual Appliance Management Guide iv
5 Table of Contents About This Guide ix SA Series Related Documentation and Release Notes ix Document Conventions ix Requesting Technical Support x Self-Help Online Tools and Resources x Opening a Case with JTAC xi Part 1 Virtual Appliances Chapter 1 Virtual Appliances Overview Virtual Appliance Editions and Requirements Hardware and Software Requirements Upgrading from a Previous Version Supported Features on Virtual Appliances Virtual Appliance Package Information SPE Virtual Appliance Utility Scripts Chapter 2 Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties Overview of Deploying Virtual Appliances on VMware ESXi Using the Deployment Script to Define the Initial Configuration Parameters Example Output Verifying Your Deployment with vmware-cmd Chapter 3 Deploying Secure Access Services Virtual Appliances in VMware vsphere Using the Serial Port Overview of Scripts for Deploying Through the VMware ESX Hypervisor Serial Port Using the init-network-config.exp and create-va.exp Scripts init-network-config.exp Parameters create-va.exp Parameters Chapter 4 Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance Downloading the NETCONF Perl Client and Prerequisites Package Installing the NETCONF Perl Client and Prerequisites Package Verifying the Installation and the Version of Perl Extracting the NETCONF Perl Client and Sample Scripts Extracting and Installing the NETCONF Perl Client Prerequisites Package v
6 Service Provider Virtual Appliance Management Guide Installing the NETCONF Perl Client Software Installing the VA-SPE Sample Scripts Example Output Troubleshooting NETCONF Error Messages Enabling the VMXNET3 Driver Part 2 Index Index vi
7 List of Tables About This Guide ix Table 1: Notice Icons x Part 1 Chapter 2 Virtual Appliances Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties Table 2: create-va.pl pparameters Chapter 3 Deploying Secure Access Services Virtual Appliances in VMware vsphere Using the Serial Port Table 3: init-network-config.exp Parameters Table 4: create-va.exp Parameters Chapter 4 Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance Table 5: Copying Files to the NETCONF Installation Directory Table 6: Copying Files to the NETCONF Base Directory vii
8 Service Provider Virtual Appliance Management Guide viii
9 About This Guide SA Series Related Documentation and Release Notes on page ix Document Conventions on page ix Requesting Technical Support on page x SA Series Related Documentation and Release Notes Document Conventions For a list of related Secure Access Service documentation, see If the information in the latest release notes differs from the information in the documentation, follow the Secure Access Service Release Notes. To obtain the most current version of all Juniper Networks technical documentation, see the product documentation page on the Juniper Networks website at Juniper Networks supports a technical book program to publish books by Juniper Networks engineers and subject matter experts with book publishers around the world. These books go beyond the technical documentation to explore the nuances of network architecture, deployment, and administration of Juniper Networks devices. In addition, the Juniper Networks Technical Library, published in conjunction with O'Reilly Media, explores improving network security, reliability, and availability. All the books are for sale at technical bookstores and book outlets around the world. The current list can be viewed at Table 1 on page x defines notice icons used in this guide. ix
10 Service Provider Virtual Appliance Management Guide Table 1: Notice Icons Icon Meaning Description Informational note Indicates important features or instructions. Caution Indicates a situation that might result in loss of data or hardware damage. Warning Alerts you to the risk of personal injury or death. Laser warning Alerts you to the risk of personal injury from a laser. Requesting Technical Support Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC). If you are a customer with an active J-Care or JNASC support contract, or are covered under warranty, and need post-sales technical support, you can access our tools and resources online or open a case with JTAC. JTAC policies For a complete understanding of our JTAC procedures and policies, review the JTAC User Guide located at Product warranties For product warranty information, visit JTAC hours of operation The JTAC centers have resources available 24 hours a day, 7 days a week, 365 days a year. Self-Help Online Tools and Resources For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings: Search for known bugs: Find product documentation: Find solutions and answer questions using our Knowledge Base: Download the latest versions of software and review release notes: x
11 About This Guide Search technical bulletins for relevant hardware and software notifications: Join and participate in the Juniper Networks Community Forum: Open a case online in the CSC Case Management tool: To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool: Opening a Case with JTAC You can open a case with JTAC on the Web or by telephone. Use the Case Management tool in the CSC at Call JTAC ( toll-free in the USA, Canada, and Mexico). For international or direct-dial options in countries without toll-free numbers, see xi
12 Service Provider Virtual Appliance Management Guide xii
13 PART 1 Virtual Appliances Virtual Appliances Overview on page 3 Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties on page 9 Deploying Secure Access Services Virtual Appliances in VMware vsphere Using the Serial Port on page 15 Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance on page 19 1
14 Service Provider Virtual Appliance Management Guide 2
15 CHAPTER 1 Virtual Appliances Overview Running Secure Access Service software in a VMware virtual machine as a virtual appliance provides service providers with robust scalability and isolation. The server software from VMware supports several virtual machines on a high-end multiprocessor platform. Deploying a dedicated virtual appliance for each customer guarantees complete isolation between systems. Virtual Appliance Editions and Requirements on page 3 Supported Features on Virtual Appliances on page 4 Virtual Appliance Package Information on page 4 SPE Virtual Appliance Utility Scripts on page 7 Virtual Appliance Editions and Requirements Two types of SA Series Virtual Appliances are available: Demonstration and Training Edition (DTE) Service Provider Edition (SPE) The DTE is targeted for demonstration, initial evaluation, and training purposes. DTE is not a supported product; Juniper Networks Technical Support will not assist you with any questions or problems. If you are interested in the DTE, contact your Juniper Networks sales team or reseller for more information. The SPE is targeted for service providers who are interested in provisioning a remote access solution for a large number of customers. Hardware and Software Requirements SA Series Virtual Appliance was tested with the following products: IBM BladeServer H chassis BladeCenter HS blade server vsphere 4.1 or 5.0 3
16 Service Provider Virtual Appliance Management Guide NOTE: This document uses the term ESXi to refer to both ESXi 4.1 and ESXi 5.0. Any blade product compliant with these products should be suitable for use with virtual appliances. Upgrading from a Previous Version If you are upgrading the Secure Access Service software on your VA-SPE from a version earlier than 7.2 and if VMware High Availability (HA) is configured with the VMware VM Monitoring feature, you must change the das.minuptime value in the HA configuration to 600 seconds. If you use the default value of 120 seconds, you will encounter problems during the post-installation processing. Supported Features on Virtual Appliances All features of Secure Access Service are available on virtual appliances with the exception of the following: Instant Virtual System (IVS) Clustering User record synchronization A new option is available for switching between a virtual terminal and a serial console. Switching between these options requires a restart of the virtual appliance. Virtual appliances do not allow licenses to be installed directly on them. As such, virtual appliances can be only license clients. All virtual appliance licenses are subscription-based. NOTE: The License summary page displays a number under the Installed column on a virtual appliance SPE edition even though you cannot install licenses on a virtual appliance. This number is the implicit count available on all devices that do not have installed licenses. Virtual Appliance Package Information The SPE downloadable zip contains the following files: README-SPE.txt A quick start guide for the SPE virtual appliance. README-scripts.txt Up-to-date information on the contents of the zip file and how to run the scripts. VA-SPE-release-buildnumber-SERIAL-disk1.vmdk A virtual disk file that contains the SA software. The SERIAL version assumes using a serial port to set up the initial network configuration. 4
17 Chapter 1: Virtual Appliances Overview VA-SPE-release-buildnumber-SERIAL.ovf An Open Virtualization Format (OVF) specification that defines the virtual appliance and contains a reference to the disk image. VA-SPE-release-buildnumber-VT-disk1.vmdk A virtual disk file that contains the SA software. The VT version assumes using a virtual terminal to set up the initial network configuration. VA-SPE-release-buildnumber-VT.ovf An OVF specification that defines the virtual appliance and contains a reference to the disk image. init-network-config.exp A script to configure the initial network settings. create-va.exp A script to import the OVF file into the ESX server and configure the initial network settings (the create-va.exp script is a superset of the init-network-config.exp script). setupva.conf An example configuration file for the create-va.exp and init-network-config.exp scripts. create-va.pl A script for deploying a virtual appliance connected to the VMware vcenter Server. va.conf A sample configuration file for use with the create-va.pl script. perlclient/plugin/ive.pm A side file for configuring virtual appliances through NETCONF. perlclient/plugin/ive_methods.pl A side file for configuring virtual appliances through NETCONF. perlclient/examples/get_active_users.pl A side file for configuring virtual appliances through NETCONF. perlclient/examples/get_active_users.xsl A side file for configuring virtual appliances through NETCONF. perlclient/examples/get_active_users.xml A side file for configuring virtual appliances through NETCONF. The DTE downloadable zip contains the following files: README-DTE.txt A quick start guide for the SPE virtual appliance. VA-DTE-release-buildnumber-VT-disk1.vmdk A virtual disk file that contains the SA software. The VT version assumes using a virtual terminal to set up the initial network configuration. VA-DTE-release-buildnumber-VT.ovf An OVF specification that defines the virtual appliance and contains a reference to the disk image. The Secure Access Service virtual appliance is delivered in OVF and is preconfigured as follows: 20G virtual SCSI disk One virtual CPU 2G memory 5
18 Service Provider Virtual Appliance Management Guide Three virtual network interfaces Roughly 400 MB in size You can change this configuration by editing the OVF prior to importing it or by editing the virtual machine properties once it is created. NOTE: When customizing the configuration, do not reduce the disk size. The OVF specification defines three logical networks: InternalNetwork ExternalNetwork ManagementNetwork When importing the OVF file, these three networks must be mapped to the appropriate virtual networks on the ESX server. The OVF file does not include any virtual serial port configuration. If the SERIAL OVF image is used, the virtual machine specification needs to be updated with the desired virtual serial port configuration before the virtual appliance is powered up for the first time. When the virtual appliance is powered on for the first time, it expands the software package and performs the installation. We recommend you export a copy of the fully installed SPE virtual appliance and use that to instantiate additional SPE virtual appliances. Once configured, you can use any of the following methods to manage the Secure Access Service portion of the virtual appliance: Juniper Network s Device Management Interface (DMI) NOTE: Inbound DMI listens to port 830. Secure Access Service admin console Secure Access Service serial and virtual terminal console menus The DMI is an XML-RPC-based protocol used to manage Juniper Networks devices. This protocol allows administrators and third-party applications to configure and manage Juniper Networks devices bypassing their native interfaces. Virtual appliances are compliant with DMI. By default, the inbound DMI is enabled in virtual appliances. For more information on using DMI with virtual appliances, see the DMI Solution Guide available on the Juniper Networks support website. 6
19 Chapter 1: Virtual Appliances Overview SPE Virtual Appliance Utility Scripts Several utility scripts are included with the SPE virtual appliance package. These scripts assist with: Deployment Initial setup of the SPE virtual appliance Configuring the SPE virtual appliance You can configure your network with your own set of tools. However, be aware that using tools such as vapp lists options in a different order than what you would see during a typical Secure Access Service initial configuration session. As such, even though the scripts included in the SPE package are optional, we recommend you use them. The scripts are divided into three sets: Deploy the Secure Access Service virtual appliance in the VMware vsphere environment on ESXi hypervisor through vcenter using OVF properties. Use this script if you are using VMware vcenter Server and VMware ESXi for deploying the virtual appliance. This script can be used on both Virtualization Technology and serial editions of virtual appliances. Deploy the Secure Access virtual appliance in the VMware vsphere environment using a serial port. If you are using VMware ESX to run the virtual appliance, you can use these scripts for deployment. These scripts use the service console of ESX and can be used only with the serial edition of virtual appliances. Use NETCONF Perl client to configure the Secure Access virtual appliance. Plug-in and sample scripts for NETCONF Perl client can be used to configure the virtual appliance after it is deployed and powered on. The scripts use DMI for connecting to Secure Access Service on port 830. Related Documentation Overview of Deploying Virtual Appliances on VMware ESXi on page 9 Overview of Scripts for Deploying Through the VMware ESX Hypervisor Serial Port on page 15 Installing the VA-SPE Sample Scripts on page 24 7
20 Service Provider Virtual Appliance Management Guide 8
21 CHAPTER 2 Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties Overview of Deploying Virtual Appliances on VMware ESXi on page 9 Using the Deployment Script to Define the Initial Configuration Parameters on page 10 Verifying Your Deployment with vmware-cmd on page 12 Overview of Deploying Virtual Appliances on VMware ESXi VMware ESXi, like VMware ESX, is a hypervisor that installs on top of a physical server and partitions it into multiple virtual machines. VMware ESXi does not contain the ESX s Service Console and thus is a smaller footprint. When first powering up the Secure Access Service, an administrator must wait for the serial console to appear and manually configure the initial settings. In the case of multiple virtual machines, this process becomes too tedious and time-consuming. When deploying on VMware ESXi, the dependencies on a serial console and service console are removed. Juniper Networks lets the administrator set up all initial configuration settings in one pass using a process based on the VMware Guest Customization feature. With this approach: 1. You use a deployment script and OVF Tools to set up the initial configuration parameters. 2. ESXi passes these parameters into the VMware environment. 3. The Secure Access Service virtual appliance retrieves the parameters from the VMware environment and configures the initial settings. Related Documentation Using the Deployment Script to Define the Initial Configuration Parameters on page 10 Verifying Your Deployment with vmware-cmd on page 12 9
22 Service Provider Virtual Appliance Management Guide Using the Deployment Script to Define the Initial Configuration Parameters A create-va.pl script is included in your VA-SPE package and is used to deploy a virtual appliance connected to the VMware vcenter Server. This script can be run on any Linux or UNIX system that has Perl and VMware OVF Tools installed. Configuration parameters can be passed to the script through a configuration file, command-line options, or a combination of the two. Command-line parameters are passed to the scripts using the following format: - - paramname paramvalue Type two hyphens without a space between them for the - - string. The space shown here is for visual purposes only. A sample configuration file (va.conf) is provided as an example. NOTE: Because OVF does not support specifying a serial port, you must manually add the virtual serial port to the virtual appliance by editing the virtual appliance properties through the vsphere client. Table 2 on page 10 lists the parameters for create-va.pl. Type two hyphens without a space between them for the - - string. The space shown here is for visual purposes only. Table 2: create-va.pl pparameters vcenter-related Parameters - -vcenterserver Hostname or IP address of the vcenter Server where the virtual appliance is to be deployed. - -clustername Name of the VMware cluster where the virtual appliance is to be deployed. - -esxhostname Hostname or IP address of the VMware ESXi host. - -datastore Name of the datastore where the virtual appliance is to be deployed. - -vcenterusername Username for logging in to the VMware vcenter Server. - -vcenterpassword Password for logging into the VMware vcenter Server. Secure Access Service-Related Parameters - -ipaddress IP address to assign to the internal port of Secure Access Service virtual appliance. - -netmask Netmask to assign to the internal port of Secure Access Service virtual appliance. - -gateway Gateway to assign to the internal port of Secure Access Service virtual appliance. 10
23 Chapter 2: Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties Table 2: create-va.pl pparameters (continued) - -adminusername Username for the default administrator account for the Secure Access Service virtual appliance. - -adminpassword Password for the default administrator account for the Secure Access Service virtual appliance. - -primarydns IP address for the primary DNS server. - -secondarydns IP address for the secondary DNS server. - -wins Windows Internet Name Service (WINS) hostname or IP address. - -commonname Common name for the default device certificate. - -organization Organization for the default device certificate. - -randomtext Random text to use during certificate creation. Virtual Appliance-Related Parameters - -ovffile Name of OVF file to use. - -configfile Name of configuration files containing parameters to pass to the create-va.pl script. Values specified on the command line override the ones specified in the configuration file. -ExternalNetwork The virtual network in VMware vswitch to map the external network of the virtual appliance. - -InternalNetwork The virtual network in VMware vswitch to map the internal network of the virtual appliance. - -ManagementNetwork The virtual network in VMware vswitch to map the management network of the virtual appliance. NOTE: The Secure Access Service-related parameters are used for the initial configuration of the virtual appliance. The script does not validate these parameters. If the values passed are not valid, the Secure Access Service will stop at the location where a correct value needs to be provided. The administrator can connect to the virtual appliance using the VT or serial console to complete the initial setup. After running the create-va.pl script, you can use the VMware vsphere CLI vmware-cmd utility or the VMware vsphere Client to view the status. Once vsphere reports the system is ready, you can log in to the Secure Access Service virtual appliance. 11
24 Service Provider Virtual Appliance Management Guide Example Output The following example passes the IP address of the Secure Access Service internal port through the command line and uses the va.conf configuration file for the values of all other parameters. perl create-va.pl - -ipaddress configfile va.conf Your output will look similar to the following: The following values are used for creating and configuring the VA OVF File: VA-SPE-SA VT.ovf VA Name: Secure Access Service vcenter Server: vcenter Username: Administrator vcenter Password: password Datacenter Name: Cluster / Host Name: MyCompany-Dev TestCluster IP Address: Netmask: Gateway: Primary DNS: Secondary DNS: DNS Domain: mycompany.net WINS: WINSServer Admin Username: admin Admin Password: adminpassword Common Name: mycompany.net Organization: MyCompanyOrg Random Text: ran395029dfwsj10 ExternalNetwork Mapped to: mycompany-mgt InternalNetwork Mapped to: mycompany-mgt ManagementNetwork Mapped to: mycompany-mgt Command = ovftool - -skipmanifestcheck - -name= SecureAccessService - -prop:vaipaddress= Deploying VA. VA-SPE-SA VT, VA-SPE-SA VT.ovf Related Documentation Overview of Deploying Virtual Appliances on VMware ESXi on page 9 Verifying Your Deployment with vmware-cmd on page 12 Verifying Your Deployment with vmware-cmd Once deployed, the virtual appliance powers on and configures the initial settings for the Secure Access Service using the parameters passed by the create-va.pl script. The virtual appliance sets the status of the initial configuration in the valnitconfigstatus guest environment variable. You can check the status of the virtual appliance setup with the VMware vsphere CLI vmware-cmd command. Use the following format: vmware-cmd -H vcentername -h ESXi-name vm-cfg-path getguestinfo guestinfo.vainitconfigstatus 12
25 Chapter 2: Deploying Virtual Appliances on VMware ESXi Through vcenter Using OVF Properties For example: vmware-cmd -H h asgdevesx2.bngrd.juniper.net \ -U Admin -P Passwd123 "/vmfs/volumes/ds1/secureaccess/secureaccess.vmx" \ getguestinfo guestinfo.vainitconfigstatus Your output should look similar to the following: getguestinfo(guestinfo.vainitconfigstatus) = Status: Success Log: Configuring VA settings from OVF; Initial network configuration complete; The self-signed digital certificate was successfully created; VA Initial Configuration completed successfully. Related Documentation Using the Deployment Script to Define the Initial Configuration Parameters on page 10 13
26 Service Provider Virtual Appliance Management Guide 14
27 CHAPTER 3 Deploying Secure Access Services Virtual Appliances in VMware vsphere Using the Serial Port Overview of Scripts for Deploying Through the VMware ESX Hypervisor Serial Port on page 15 Using the init-network-config.exp and create-va.exp Scripts on page 16 Overview of Scripts for Deploying Through the VMware ESX Hypervisor Serial Port The following scripts are included in the VA-SPE package for deploying a virtual appliance through the serial port of a VMware ESX Hypervisor. init-network-config.exp An expect script that performs initial network configuration of newly instantiated SPE virtual appliances. create-va.exp This script is a superset of the init-network-config.exp script. It instantiates an SPE virtual appliance and performs the initial network configuration. The create-va.exp script is not needed if you instantiate the virtual appliance another way. NOTE: These scripts are not supported on the VMware ESXi Hypervisor. Prerequisites for these scripts are: Scripts must be installed and run on a Linux or UNIX system. The Linux or UNIX system must have the VMware Tcl/Tk Expect toolkits installed. The virtual appliance must be configured to use a serial console. The serial console must be accessible from the system running the scripts either through a direct connection or by telnet to a terminal server. (create-va.exp Script Only) The SPE ovf and vmdk files must be on the VMware ESX server where the virtual appliance is to be instantiated. You must use the serial version; the VT version is not suppoted. (create-va.exp Script Only) The OVF Tool must be installed on the VMware ESX server. 15
28 Service Provider Virtual Appliance Management Guide Related Documentation Using the init-network-config.exp and create-va.exp Scripts on page 16 Using the init-network-config.exp and create-va.exp Scripts The init-network-config.exp and create-va.exp scripts accept input from either the command line, a configuration file, or both. Command-line parameters are passed to the scripts using the following format: - - paramname paramvalue Type two hyphens without a space between them for the - - string. The space shown here is for visual purposes only. Configuration file parameters use the following format: paramname: paramvalue A configuration file is specified using the - - file parameter. If no configuration file is specified, the script looks for a setupva.conf file in the current directory. Each parameter must be on a separate line. Lines starting with a pound sign (#) are treated as comments. If a parameter appears on both the command line and in the configuration file, the command line value is used. NOTE: The init-network-config.exp and create-va.exp scripts neither validate parameters nor verify connectivity of the serial connection to the virtual appliance. init-network-config.exp Parameters The init-network-config.exp script configures the initial network configuration once the SPE virtual appliance is instantiated. Table 3 on page 16 lists all parameters for the init-network-config.exp script. Type two hyphens without a space between them for the - - string. The space shown here is for visual purposes only. Table 3: init-network-config.exp Parameters Parameters for Configuration File - -file filename The configuration file. If this parameter is not present, setupva.conf is used. Specifying a configuration file is optional. Parameters for Serial Console Access 16
29 Chapter 3: Deploying Secure Access Services Virtual Appliances in VMware vsphere Using the Serial Port Table 3: init-network-config.exp Parameters (continued) - -ctype connecttype The serial console connection. Valid values are terminal server or serial. You must place the value in double-quotes. For example, - -ctype serial. Use terminal server if the virtual appliance serial console is accessed through a telnet connection to a terminal server. Use "serial" if the virtual appliance serial console is accessed by directly opening a serial device at the system running the script. - -tsip terminal server ip The terminal service IP address. This parameter is valid only when ctype is set to terminal server. - -tsport terminal server port The telnet port at the terminal server used to access the virtual appliance serial console. - -cport serial port device The serial device to open to access the virtual appliance serial console. This parameter is valid only when ctype is set to serial. Parameters for Secure Access Virtual Appliance Initial Configuration - -ip ipaddress IP address for the virtual appliance internal port. - -mask netmask Virtual appliance internal port netmask. - -dgw default gateway Default gateway for the virtual appliance internal port. - -pridns primary dns IP address of the primary DNS server for the virtual appliance. - -secdns secondary dns Optional IP address of the secondary DNS server for the virtual appliance. - -domain domain Domain name for the virtual appliance. - -wins wins Optional WINS server IP address. - -cname common name Common name for the virtual appliance. - -orgname organization name Organization name for the virtual appliance. - -rtxt random text Random text used for generating a self-signed certificate. - -adminusr adminuser Administrator username for the virtual appliance. - -adminpwd adminpwd Administrator password for the administrator account at the virtual appliance. create-va.exp Parameters The create-va.exp script accepts all the init-network-config.exp script parameters in Table 3 on page 16. In addition, the create-va.exp script accepts the parameters shown in Table 4 on page 18 for instantiating the virtual appliance. Type two hyphens without a space between them for the - - string. The space shown here is for visual purposes only. 17
30 Service Provider Virtual Appliance Management Guide Table 4: create-va.exp Parameters ESX Server-Related Parameters - -esxhost esxhost DNS name or the IP address of the ESX server where the virtual appliance is to be instantiated. - -exadmin ESX username ESX administrator username. The script uses this username to log in to the ESX server. This user must have super user privileges. - -esxpasswd ESX password Administrator password to log in to the VMware ESX server. Parameters to Locate Resources at the ESX Server - -ovfpath ovf path The location of the OVF image at the VMware ESX server. - -esxserial serialdevice Path to the serial port device on the VMware ESX server; for example, -esxserialtty /dev/ttys0. This value creates the virtual serial port in the virtual appliance by editing the vmx file. - -netmap ovfnet=esxnet The mapping of a logical network name in the OVF specification to an actual network on the VMware ESX server. You can use the following values for ovfnet: InternalNetwork, ExternalNetwork and ManagementNetwork. Multiple network maps can be specified by repeating the netmap parameter. - -storage ESX datastore If there are multiple target datastores on the ESX server, this parameter specifies the datastore where the virtual appliance is to be created. Parameters Specifying Virtual Appliance Properties - -vaname VA name Name of the virtual appliance to create. - -switchconsole yes no Switches console from serial to terminal service after configuring the virtual appliance. The default is yes, meaning switch to terminal service. The following example uses the create-va.exp script: /create-va.exp --ip mask dgw pridns secdns domain company.com --wins cname aaa.company.com --orgname "Company Inc" --rtxt "Somerandomtext123" --adminusr admin --adminpwd Password --ctype "terminal server" --tsip ts.comp.com --tsport esxhost esxadmin root --esxpasswd pswd --vaname VA-SPE1 --ovfpath /root/ovfs/build12345.ovf --esxserial /tmp/ttys0 --netmap "InternalNetwork"="ESXInternalNetwork" --netmap "ExternalNetwork"="ESXExternalNetwork" --netmap "ManagementNetwork"="ESXManagementNetwork" storage=datastore1 Related Documentation Overview of Scripts for Deploying Through the VMware ESX Hypervisor Serial Port on page 15 18
31 CHAPTER 4 Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance NETCONF API is an XML application that client applications can use to exchange information with Juniper Network products. The purpose of the NETCONF Perl client is to connect and configure the device by establishing a DMI connection and sending specific RPCs. Both the general RPCs supported by Secure Access Service and the device-specific remote procedure calls (RPCs) can be used. Some of the device-specific RPCs are used to retrieve runtime information and statistics. The VA-SPE package contains a NETCONF plug-in for the Secure Access Service virtual appliance and sample Perl scripts. Using the supplied scripts as an example, you can write your own scripts for any DMI RPCs supported by the Secure Access Service virtual appliance. See the DMI Solution Guide located on the Juniper Networks Support website. Downloading the NETCONF Perl Client and Prerequisites Package on page 19 Installing the NETCONF Perl Client and Prerequisites Package on page 20 Installing the VA-SPE Sample Scripts on page 24 Troubleshooting NETCONF Error Messages on page 25 Enabling the VMXNET3 Driver on page 26 Downloading the NETCONF Perl Client and Prerequisites Package This topic explains how to download the compressed tar archives that contain the NETCONF Perl client distribution and the prerequisite package. To download the compressed tar archives: 1. Access the Juniper Networks Customer Support Center Web page at 2. Under Support, click Download Software. 3. Under Network Management, click NETCONF XML Management Protocol. 4. Click the link for the appropriate software release. The Secure Access Virtual Appliance supports version 11.1R1.14 and later. 19
32 Service Provider Virtual Appliance Management Guide 5. Select the Software tab. 6. Click NETCONF API Perl client and NETCONF API Perl client prerequisites to download the client distribution and the prerequisites package. NOTE: The NETCONF XML protocol Perl client software should be installed and run on a computer with a UNIX-like operating system; it is not meant to be installed on a Juniper Networks device. Optionally, download the packages containing the document type definitions (DTDs) and the XML schema language representation of the Junos OS configuration hierarchy: 1. Access the download page at 2. Click the link for the appropriate software release. 3. Select the Software tab. 4. Click the links to download the desired packages. Related Documentation Installing the NETCONF Perl Client and Prerequisites Package on page 20 Installing the VA-SPE Sample Scripts on page 24 Installing the NETCONF Perl Client and Prerequisites Package This topic explains how to install the NETCONF Perl client and the prerequisite package. It includes the following sections: Verifying the Installation and the Version of Perl on page 20 Extracting the NETCONF Perl Client and Sample Scripts on page 21 Extracting and Installing the NETCONF Perl Client Prerequisites Package on page 21 Installing the NETCONF Perl Client Software on page 23 Verifying the Installation and the Version of Perl Perl must be installed on your system before you install the NETCONF Perl client prerequisites package or client software. The NETCONF Perl client requires Perl version or later. To confirm whether Perl is installed on your system and to determine which version of Perl is currently running, issue the following commands: $ which perl $ perl -v If the issued output indicates that Perl is not installed or that the version is earlier than the required version, you must download and install Perl version or later in order to use the NETCONF Perl client. The Perl source packages are located at: 20
33 Chapter 4: Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance After installing a suitable version of Perl, extract the NETCONF Perl client, extract and install the prerequisites package, and then install the NETCONF Perl client application. Extracting the NETCONF Perl Client and Sample Scripts To uncompress and extract the contents of the compressed tar archive that contains the NETCONF Perl client and sample scripts: 1. Create the directory where you want to store the NET::Netconf Perl client application and sample scripts 2. Move the downloaded client application file into that directory. 3. Make that directory the working directory. $ mkdir parent-directory $ mv netconf-perl-release.tar.gz parent-directory $ cd parent-directory 4. Uncompress and extract the contents of the NETCONF Perl client package: On FreeBSD and Linux systems: $ tar zxf netconf-perl-release.tar.gz On Solaris systems: $ gzip -dc netconf-perl-release.tar.gz tar xf where release is the release code, for example 11.1R1.14. The command creates a directory called netconf-perl-release and extracts the contents of the tar archive to it. For example, a typical filename for the compressed tar archive is netconf-perl-11.1r1.14.tar.gz. Extracting the contents of this archive creates the directory netconf-perl-11.1r1.14 directly under parent-directory and places the application files and sample scripts into this new directory. The netconf-perl-release/readme file contains instructions for extracting and installing the Perl prerequisite modules, creating a Makefile, and installing and testing the NET::Netconf module. Extracting and Installing the NETCONF Perl Client Prerequisites Package The prerequisites package consists of C libraries, executables, and Perl modules. It must be installed on the client machine in order for the NETCONF Perl client and the included examples to work correctly. The NETCONF Perl distribution includes the install-prereqs.pl script, which you use to install the prerequisites. You have the option to install all Perl modules that are part of the prerequisites directly from the Comprehensive Perl Archive Network (CPAN) global repository. To uncompress and extract the contents of the compressed tar archive containing the prerequisite files: 1. Move the downloaded prerequisites package into the parent-directory/netconf-perl-release/ directory that was created in Extracting the NETCONF Perl Client and Sample Scripts on page
34 Service Provider Virtual Appliance Management Guide The compressed tar archive containing the prerequisite files must be uncompressed, unpacked, and installed in that directory. 2. Uncompress and extract the contents of the package: On FreeBSD and Linux systems: $ tar zxf netconf-perl-prereqs-release.tar.gz On Solaris systems: $ gzip -dc netconf-perl-prereqs-release.tar.gz tar xf where release is the release code, for example 11.1R1.14. This command creates a directory called prereqs/ and extracts the contents of the tar archive to it. By default, the prerequisite Perl modules are installed in the standard directory, which is /usr/local/lib/. You can opt to install the modules in a private directory. To install the required modules in the standard directory: 1. Log in as root. 2. Go to the netconf-perl-release/ directory where you extracted the contents of the prerequisites package. 3. Issue the following command: # perl install-prereqs.pl -used_by example -force where the -used_by example option is invoked to install only modules used by a specific example, and the -force option installs the module even if an earlier version of the module exists or if the make test command fails. To install the required modules in a private directory: 1. Set the PERL5LIB, MANPATH, and PATH environment variables. $ setenv PERL5LIB private-directory-path $ setenv MANPATH "$MANPATH/:$PERL5LIB/../man" $ setenv PATH "$PATH/:$PERL5LIB/../bin" For sh, ksh, and bash shells, $PERL5LIB can be set with EXPORT PERL5LIB=private-directory-path 2. Go to the netconf-perl-release directory where you extracted the contents of the prerequisites package. 3. Issue the following command: $ perl install-prereqs.pl -used_by example -install_directory $PERL5LIB -force where the -used_by example option is invoked to install only modules used by a specific example, and the -force option installs the module even if an earlier version of the module exists or if the make test command fails. The -install_directory $PERL5LIB option installs the prerequisite Perl modules in the private directory that you specified in Step 1. 22
35 Chapter 4: Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance After issuing the perl install-prereqs.pl command, the script provides the option to install the prerequisites from CPAN. The CPAN module is included with standard Perl installations. If you choose to install from CPAN, the script checks that the CPAN module is installed on your system and that you have connectivity to If the CPAN module is present and connectivity is verified, installation begins automatically. To install from CPAN: 1. Press Enter or type y when prompted. # perl install-prereqs.pl This script installs all modules required by default. Would you like to install the pre-requisite modules from CPAN? [y]/n y Testing MCPAN on your system... OK Trying to ping CPAN OK These modules will be installed in the system directory. This installation takes around 15 minutes Begin automatic installation: <output omitted> You might be prompted for additional information during the installation. For example, if additional dependent modules are required for a specific module, the installer might ask if the missing modules should be added to the install queue. NOTE: On some systems, the firewall might reject utilities that are set to use active FTP, and CPAN installation might hang. If this is an issue, set the corresponding environment variable so that passive FTP is enabled. Installation log files are written to netconf-perl-release/tmp/output/. 2. After installation, view any missing dependencies by issuing the following command: $ perl required-mod.pl This command lists the modules that still require installation. Installing the NETCONF Perl Client Software After installing the prerequisites package as detailed in Extracting and Installing the NETCONF Perl Client Prerequisites Package on page 21, install the NETCONF Perl client software. To install the client software: 1. Go to the netconf-perl-release/ directory that was created in Extracting the NETCONF Perl Client and Sample Scripts on page Create the makefile. To install the Perl client in the standard directory (usually /usr/local/lib): 23
36 Service Provider Virtual Appliance Management Guide # perl Makefile.PL Checking if your kit is complete... Looks good Writing Makefile for netconf-perl To install the Perl client in a private directory: Make sure that the PERL5LIB, MANPATH, and PATH environment variables are set as detailed in Extracting and Installing the NETCONF Perl Client Prerequisites Package on page 21, and create the makefile: # perl Makefile.PL LIB=$PERL5LIB INSTALLMAN3DIR=$PERL5LIB/../man/man3 3. Install the Net::NETCONF module: # make # make install The NETCONF Perl client installs under /usr/lib/perl5/site_perl/perl version/net/netconf or /usr/local/lib/perl5/site_perl/perl version/i686-linux/net/, depending on which version of Perl 5 you have installed. The NETCONF Perl client application is installed and ready for use. For information about the Net::NETCONF::Manager, Net::NETCONF::Transform, or Net::NETCONF::Trace classes, consult the appropriate man page by invoking the man command and specifying the class. For example: $ man Net::NETCONF::Manager $ man Net::NETCONF::Transform $ man Net::NETCONF::Trace The sample scripts reside in the netconf-perl-release/examples/ directory. You can review and run these examples to acquire some familiarity with the client before writing your own applications. Related Documentation Downloading the NETCONF Perl Client and Prerequisites Package on page 19 Installing the VA-SPE Sample Scripts on page 24 Installing the VA-SPE Sample Scripts After you download and install the VA-SPE and NETCONF packages, you must copy certain files from the VA-SPE installation to parent-directory/netconf-perl-release. Table 5 on page 24 shows the files to copy and their required destinations. Table 5: Copying Files to the NETCONF Installation Directory Copy This File To This Location get_active_users.pl parent-directory/netconf-perl-release/examples get_active_users.xml parent-directory/netconf-perl-release/examples get_active_users.xsl parent-directory/netconf-perl-release/examples 24
37 Chapter 4: Using NETCONF Perl Client to Configure the Secure Access Virtual Appliance You must also copy files to the /usr/local/lib/perl5/site_perl/perl version/i686-linux/net/netconf/access/ or /usr/lib/perl5/site_perl/perl version/net/netconf directories, depending on which version of Perl you have installed. This guide uses NETCONF-Base-Directory to refer to /usr/local/lib/perl5/site_perl/perl version/i686-linux/net/netconf/access/ or /usr/lib/perl5/site_perl/perl version/net/netconf. Table 6: Copying Files to the NETCONF Base Directory Copy This File To This Location ive.pm NETCONF-Base-Directory/Net/Netconf/Plugins/Plugin ive_methods.pl NETCONF-Base-Directory/Net/Netconf/Plugins/Plugin/ive Once the files are copied, you can run the sample code. Example Output The following example uses the username "user1", password "passwd123" and IP address " ". When run, it connects to the Secure Access Service virtual appliance, retrieves the list of active users, and puts the list in a table format, translating the XML using the get_active_users.xsl file. perl get_active_users.pl -l user1 -p passwd Related Documentation Installing the NETCONF Perl Client and Prerequisites Package on page 20 Troubleshooting NETCONF Error Messages on page 25 Troubleshooting NETCONF Error Messages If you receive the error Connection to Netconf server lost at /usr/lib/perl5/site_perl/5.8.5/net/netconf/manager.pm while running Perl scripts, then you must edit the ssh.pm file. It is located in /usr/local/lib/perl5/site_perl/perl version/i686-linux/net/netconf/access/ or /usr/lib/perl5/site_perl/perl version/net/netconf, depending on which version of Perl you have installed. Change or add the italicized lines that follow and then run your Perl script again. NOTE: This issue is resolved with NETCONF Perl client 12.1R2. # Send our password or passphrase if ($ssh->expect(10, ('password:', 'Password:', '(yes/no)?', 'passphrase'))) { print $ssh "$self->{'password'}\r" if ($ssh->match() eq 'password:'); print $ssh "$self->{'password'}\r" if ($ssh->match() eq 'Password:'); print $ssh "$self->{'password'}\r" if ($ssh->match() eq 'passphrase'); if ($ssh->match() eq '(yes/no)?') { # Host key authenticity print $ssh "yes\r"; if ($ssh->expect(10, 'password:')) { print $ssh "$self->{'password'}\r"; 25
38 Service Provider Virtual Appliance Management Guide } elsif ($ssh->expect(10, 'Password:')) { print $ssh "$self->{'password'}\r"; } } } else { $self->{'seen_eof'} = 1; } Related Documentation Installing the VA-SPE Sample Scripts on page 24 Enabling the VMXNET3 Driver To enable the VMXNET3 driver in your virtual appliance, you must deploy from the 7.2 OVF package. Upgrading from earlier versions such as 7.0 or 7.1 will continue to use VMXNET instead of the VMXNET3 driver. 26
39 PART 2 Index Index on page 29 27
40 Service Provider Virtual Appliance Management Guide 28
41 supported features...4 Index C configuration file va.conf...10 create-va.exp script...15, 16 create-va.pl script...10 customer support...x contacting JTAC...x T technical support contacting JTAC...x V va.conf configuration file...10 vmware-cmd...12 Z zip file contents...4 G get_active_users.pl...24 get_active_users.xml...24 get_active_users.xsl...24 I init-network-config.exp script...15, 16 install-prereqs script Perl client applications (NETCONF)...21 ive.pm...25 ive_methods.pl...25 N NETCONF Perl client downloading...19 P Perl client applications (NETCONF) install-prereqs script...21 installing...20, 23 installing prerequisites...21 prerequisite modules...21 R requirements hardware and software...3 S script create-va.exp...15, 16 create-va.pl...10 init-network-config.exp...15, 16 support, technical See technical support 29
42 Service Provider Virtual Appliance Management Guide 30
Juniper Secure Analytics
Juniper Secure Analytics Virtual Appliance Installation Guide Release 2014.1 Published: 2014-12-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Junos Space. Service Now User Guide. Release 13.1. Published: 2013-06-29. Copyright 2013, Juniper Networks, Inc.
Junos Space Service Now User Guide Release 13.1 Published: 2013-06-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes
Junos Pulse Secure Access Service
Junos Pulse Secure Access Service License Management Guide Release 7.2 Published: 2012-06-27 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
SRC Virtualization. Modified: 2015-06-19. Copyright 2015, Juniper Networks, Inc.
SRC Virtualization Modified: 2015-06-19 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks, Junos, Steel-Belted
Managing Service Design for PTP Timing
Managing Service Design for PTP Timing Published: 2012-02-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper
Junos Space. Virtual Appliance Deployment and Configuration Guide. Release 14.1R2. Modified: 2015-08-14 Revision 2
Junos Space Virtual Appliance Deployment and Configuration Guide Release 14.1R2 Modified: 2015-08-14 Revision 2 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Juniper Secure Analytics
Juniper Secure Analytics Big Data Management Guide Release 2014.2 Published: 2014-08-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Juniper Secure Analytics
Juniper Secure Analytics Big Data Management Guide Release 2014.1 Published: 2014-03-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
DDoS Secure. VMware Virtual Edition Installation Guide. Release 5.13.2-0. Published: 2013-11-25. Copyright 2013, Juniper Networks, Inc.
DDoS Secure VMware Virtual Edition Installation Guide Release 5.13.2-0 Published: 2013-11-25 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: 2016-06-10. Copyright 2016, Juniper Networks, Inc.
Junos Space Junos Space Security Director Restful Web Services API Reference Modified: 2016-06-10 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Juniper Secure Analytics
Juniper Secure Analytics Vulnerability Manager User Guide Release 2014.2 Published: 2014-12-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Firefly Host. Installation and Upgrade Guide for VMware. Release 6.0. Published: 2014-01-14. Copyright 2014, Juniper Networks, Inc.
Firefly Host Installation and Upgrade Guide for VMware Release 6.0 Published: 2014-01-14 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Junos Pulse. Administration Guide. Release 3.0. Published: 2012-04-30. Copyright 2012, Juniper Networks, Inc.
Junos Pulse Administration Guide Release 3.0 Published: 2012-04-30 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net This product includes the Envoy
EMC Data Domain Management Center
EMC Data Domain Management Center Version 1.1 Initial Configuration Guide 302-000-071 REV 04 Copyright 2012-2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC believes
Junos Space Security Director
Junos Space Security Director Logging and Reporting Getting Started Guide Release 13.3 Published: 2014-04-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
STRM Log Manager Administration Guide
Security Threat Response Manager Release 2013.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-15 Copyright Notice Copyright 2013
NSM Plug-In Users Guide
Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper
WinCollect User Guide
Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper
Juniper Networks Network and Security Manager
Juniper Networks Network and Security Manager CentOS Upgrade Guide Release 2012.2 Modified: 2015-07-20 Revision 4 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000
Adaptive Log Exporter Users Guide
Security Threat Response Manager Release 2012.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2012-05-30 Copyright Notice Copyright 2012
Junos Space. Audit Logs. Release 14.1. Published: 2014-08-21. Copyright 2014, Juniper Networks, Inc.
Junos Space Audit Logs Release 14.1 Published: 2014-08-21 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,
Intrusion Detection and Prevention
Intrusion Detection and Prevention Published: 2013-08-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy SNMP
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Managing Vulnerability Assessment
Security Threat Response Manager Release 2012.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-12 Copyright Notice Copyright 2013
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Junos OS. DDoS Protection Configuration Guide. Release 12.3. Published: 2012-12-11. Copyright 2012, Juniper Networks, Inc.
Junos OS DDoS Protection Configuration Guide Release 12.3 Published: 2012-12-11 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product
Junos OS. DDoS Protection Configuration Guide. Release 12.1. Published: 2012-02-29. Copyright 2012, Juniper Networks, Inc.
Junos OS DDoS Protection Configuration Guide Release 12.1 Published: 2012-02-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product
RSA Authentication Manager 8.1 Virtual Appliance Getting Started
RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Set Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
NexentaConnect for VMware Virtual SAN
NexentaConnect for VMware Virtual SAN QuickStart Installation Guide 1.0.2 FP2 Date: October, 2015 Subject: NexentaConnect for VMware Virtual SAN QuickStart Installation Guide Software: NexentaConnect for
Juniper Secure Analytics
Juniper Secure Analytics Log Sources Users Guide Release 2014.1 Modified: 2015-11-30 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.
Installing and Using the vnios Trial
Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM
Junos Pulse. Windows In-Box Junos Pulse Client Solution. Release 5.0. Published: 2013-11-20. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Solution Release 5.0 Published: 2013-11-20 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
After you have created your text file, see Adding a Log Source.
TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide
Extreme Control Center, NAC, and Purview Virtual Appliance Installation Guide 9034968 Published April 2016 Copyright 2016 All rights reserved. Legal Notice Extreme Networks, Inc. reserves the right to
DMI Device Management With SRC Software
DMI Device Management With SRC Software Modified: 2015-06-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,
VoIP Services in an SRC-Managed Network
VoIP Services in an SRC-Managed Network Modified: 2015-06-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
Rally Installation Guide
Rally Installation Guide Rally On-Premises release 2015.1 [email protected] www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access
Juniper Secure Analytics
Juniper Secure Analytics Installation Guide Release 2014.1 Published: 2014-11-26 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
Virtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
Virtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Junos OS for EX Series Ethernet Switches
Junos OS for EX Series Ethernet Switches Analyzers for EX9200 Switches Release 13.3 Published: 2014-08-07 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Junos OS. Distributed Denial-of-Service Protection Feature Guide. Release 13.2. Published: 2013-07-25. Copyright 2013, Juniper Networks, Inc.
Junos OS Distributed Denial-of-Service Protection Feature Guide Release 13.2 Published: 2013-07-25 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Juniper Networks Management Pack Documentation
Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133
Junos OS. System Log Messages. Release 15.1. Modified: 2015-05-19. Copyright 2015, Juniper Networks, Inc.
Junos OS System Log Messages Release 15.1 Modified: 2015-05-19 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted
Unless otherwise noted, all references to STRM refer to STRM, STRM Log Manager, and STRM Network Anomaly Detection.
TECHNICAL NOTE FORWARDING LOGS USING TAIL2SYSLOG MARCH 2013 The Tail2Syslog support script provides a method for monitoring and forwarding events to STRM using syslog for real-time correlation. Tail2Syslog
CommandCenter Secure Gateway
CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance and lmadmin License Server Management This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway.
NetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
Set Up Panorama. Palo Alto Networks. Panorama Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Set Up Panorama Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Managing Multi-Hypervisor Environments with vcenter Server
Managing Multi-Hypervisor Environments with vcenter Server vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.0 This document supports the version of each product listed and supports all subsequent
Quick Start Guide. for Installing vnios Software on. VMware Platforms
Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,
Juniper Networks Network and Security Manager
Juniper Networks Network and Security Manager Installation Guide Release 2012.2 Modified: 2015-09-07 Revision 5 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Junos OS. MPLS Network Operations Guide. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc.
Junos OS MPLS Network Operations Guide Published: 2012-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Administration Guide For VMware Virtual Appliances NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408)
CommandCenter Secure Gateway
CommandCenter Secure Gateway Quick Setup Guide for CC-SG Virtual Appliance - VMware, XEN, HyperV This Quick Setup Guide explains how to install and configure the CommandCenter Secure Gateway. For additional
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Junos OS. Firewall Filters Configuration Guide. Release 12.3. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc.
Junos OS Firewall Filters Configuration Guide Release 12.3 Published: 2012-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product
Release Notes: Junos Space Service Automation 13.3R4
Release Notes: Junos Space Service Automation 13.3R4 Release 13.3R4 September 2014 Contents Junos Space Service Automation Release Notes........................... 2 New Features in Junos Space Service
Unitrends Virtual Backup Installation Guide Version 8.0
Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...
Juniper Secure Analytics
Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Secure Access. Network Connect and Windows Secure Access Manager (WSAM) Error Messages. Release. Published: 2010-06-03 Part Number:, Revision 1
Secure Access Network Connect and Windows Secure Access Manager (WSAM) Error Messages Release Published: 2010-06-03 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Set Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
Install Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2
RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
VMware vsphere 5.0 Evaluation Guide
VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
FortiAnalyzer VM (VMware) Install Guide
FortiAnalyzer VM (VMware) Install Guide FortiAnalyzer VM (VMware) Install Guide December 05, 2014 05-520-203396-20141205 Copyright 2014 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
PHD Virtual Backup for Hyper-V
PHD Virtual Backup for Hyper-V version 7.0 Installation & Getting Started Guide Document Release Date: December 18, 2013 www.phdvirtual.com PHDVB v7 for Hyper-V Legal Notices PHD Virtual Backup for Hyper-V
By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.
TECHNICAL NOTE REPLACING THE SSL CERTIFICATE AUGUST 2012 By default, STRM provides an untrusted SSL certificate. You can replace the untrusted SSL certificate with a self-signed or trusted certificate.
ESX System Analyzer Version 1.0 Installation Guide
ESX System Analyzer Version 1.0 Installation Guide Page 1 Table of Contents ESX System Analyzer Installation Guide 1. Installing ESX System Analyzer... 3 ESX System Analyzer Appliance Distribution... 3
Deployment and Configuration Guide
vcenter Operations Manager 5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Configuring Offboard Storage Guide
Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-12-03 Copyright Notice Copyright 2014 Juniper
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
Junos Pulse Access Control Service
Junos Pulse Access Control Service User Access Management Framework Feature Guide Release 5.0 Published: 2013-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
Junos Space. Network Director Monitor Mode User Guide. Release 1.5. Published: 2013-10-15. Copyright 2013, Juniper Networks, Inc.
Junos Space Network Director Monitor Mode User Guide Release 1.5 Published: 2013-10-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
Juniper Secure Analytics
Juniper Secure Analytics Configuring Offboard Storage Guide Release 2014.3 Published: 2015-01-19 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
Juniper Secure Analytics
Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.4 Published: 2015-02-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
SonicWALL SRA Virtual Appliance Getting Started Guide
COMPREHENSIVE INTERNET SECURITY SonicWALL Secure Remote Access Appliances SonicWALL SRA Virtual Appliance Getting Started Guide SonicWALL SRA Virtual Appliance5.0 Getting Started Guide This Getting Started
MX Series Routers as a Service Node in an SRC-Managed Network
MX Series Routers as a Service Node in an SRC-Managed Network Published: 2014-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights
Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
Junos Space. Network Director Quick Start Guide. Release 2.0. Published: 2015-02-13. Copyright 2015, Juniper Networks, Inc.
Junos Space Network Director Quick Start Guide Release 2.0 Published: 2015-02-13 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.
Junos OS. Session Border Control Solutions Guide Using BGF and IMSG. Release 11.2. Published: 2011-10-27. Copyright 2011, Juniper Networks, Inc.
Junos OS Session Border Control Solutions Guide Using BGF and IMSG Release 11.2 Published: 2011-10-27 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
RSA Security Analytics Virtual Appliance Setup Guide
RSA Security Analytics Virtual Appliance Setup Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or
Junos Space. Junos Space Network Management Platform Getting Started Guide. Release 14.1. Modified: 2015-07-27
Junos Space Junos Space Network Management Platform Getting Started Guide Release 14.1 Modified: 2015-07-27 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Juniper Secure Analytics
Juniper Secure Analytics Users Guide Release 2014.1 Modified: 2015-06-25 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper
