Junos Space Security Director and Policy Enforcer User Guide
- June 13, 2024
- Junos Space
Table of Contents
- About This In Focus Guide
- Use Case 1: Configure IPS Policy in a Firewall Policy
- Benefits
- Before You Begin
- Overview
- Create an IPS Policy
- Assign the IPS Policy to a Firewall Policy Rule
- Verify the IPS Policy Assignment to Firewall Policy
- CLI Configuration
- Security Firewall Policy: global ##
- Use Case 2: Import a Firewall Policy that Has IPS Policy Configured
- Use Case 3: Configure Certificate-Based Authentication in Policy Enforcer
- Generate SSL certificates
- Generate a CA certificate
- Generate Client SSL certificates
- Upload the CA Certificate
- Upload the User Certificate
- Upload X.509 Certificate File in Policy Enforcer
- Configure the Web Browser Settings
- Change the User Authentication Mode to Certificate-Based Authentication
- Verify the Certificate-Based Authentication Mode
- Troubleshoot Authentication Issues
- References
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
Engineering Simplicity
In Focus
Junos Space Security Director and Policy Enforcer
About This In Focus Guide
Use cases| Use this guide to quickly learn about important use cases of Junos
Space Security Director
and Policy Enforcer.
In addition to this guide, you can find detailed information about concepts
and configuration in the Junos Space Security Director documentation and
Policy Enforcer documentation.
---|---
Audience| Network operators and administrators
Knowledge level| General familiarity with networking fundamentals and data
center architectures.
Supported web browsers| Junos Space Security Director and Policy Enforcer are
best viewed on the following web browsers:
• Mozilla Firefox
• Google Chrome
• Microsoft Internet Explorer 11
Use Case 1: Configure IPS Policy in a Firewall Policy
SUMMARY
An intrusion prevention system (IPS) policy enables you to selectively enforce
various attack detection and prevention techniques on the network traffic
passing through an IPS-enabled device. In this section, you’ll learn how to
create an IPS policy and then assign the IPS policy to a firewall policy rule
that is assigned to a device running Junos OS Release 18.2 or later.
Benefits
- Assign a different IPS policy to each firewall policy rule.
- IPS policy matches are handled within the standard or unified firewall policy to which the IPS policy is assigned.
- Simplifies application-based security policy management at Layer 7.
- Provides greater control and extensibility to manage dynamic applications traffic.
Before You Begin
-
Install Junos Space Security Director and Log Collector. See Junos Space Security Director Installation and Upgrade Guide.
-
Ensure that IPS is enabled on the SRX Series device.
-
Ensure that the SRX Series device runs Junos OS Release 18.2 or later.
NOTE: -
Although this use case has been specifically validated against Junos Space Security Director Release 19.3 and an SRX Series device running Junos OS Release 18.2, you can use Junos OS Release 18.2 or later.
-
Only mandatory fields and other required fields are included in the procedures in this use case.
Overview
Starting in Junos Space Security Director Release 19.3, you cannot assign
devices running Junos OS Release 18.2 and later to an IPS policy from the IPS
Policies page. You’ll need to assign an IPS policy to a firewall policy rule
for devices running Junos OS Release 18.2 and later. The CLI configuration for
the IPS policy is generated along with the standard or unified firewall policy
to which the IPS policy is assigned. When an IPS policy is configured in a
firewall policy, the traffic that matches the specified criteria is checked
against the IPS rule bases. This type of configuration can be used to monitor
traffic to and from the secure area of an internal network as an added
security measure for confidential communications.
In the following topology, we have an enterprise local area network behind a
Layer 2 switch. The switch is connected to an SRX Series firewall that has IPS
enabled and inspects all the traffic traveling in and out of the network. The
SRX Series device can be in any form: hardware, virtual, or
containerized.
Create an IPS Policy
Let’s first create an IPS policy that we will then configure on an SRX Series device running Junos OS Release 18.2:
-
Select Configure > IPS Policy > Policies.
The IPS Policies page is displayed. -
Click the + icon.
The Create IPS Policy page is displayed. -
Enter the following IPS policy name: IPS_Policy
A policy name can have a maximum of 255 characters, and can include alphanumeric characters, spaces, and periods. -
Select the Policy Type as Device Policy.
NOTE: You can also select the group policy option. You can assign either a group policy or a device-specific policy to the firewall policy. -
Do not select any device from the list.
NOTE: Only the devices running Junos OS Release 18.1 and earlier are listed. To configure an IPS policy on devices running Junos OS Release 18.2 or later, you’ll need to assign an IPS policy (without device assignment) to a firewall policy rule. The IPS policy is updated with firewall policy update. -
Click OK.
The created IPS Policy (IPS_Policy) is displayed on the IPS Policies page.
Assign the IPS Policy to a Firewall Policy Rule
Now let’s assign the created IPS policy to a firewall policy rule:
-
Select Configure > Firewall Policy > Standard Policies.
The Standard Policies page is displayed. -
Click the + icon.
The Create Firewall Policy page is displayed. -
Enter the following firewall policy name: Firewall_Policy
-
Select the Policy Type as Device Policy.
When you select the device policy option, the firewall policy is created for each device. If you select the group policyoption, th e firewall policy is shared with multiple devices. -
Select the vsrx-18.2 device.
All the devices that are discovered by Junos Space Security Director are listed in the drop-down. To know more about device discovery in Junos Space Security Director, see Create Device Discovery Profiles in Security Director.
NOTE: The device that you select must be running Junos OS Release 18.2 or later. -
Click OK to create the firewall policy.
The firewall policy that you created (Firewall_Policy) is displayed on the Standard Policies page. -
Click Add Rule for the Firewall_Policy policy to add rules.
The Create Rule page is displayed. -
On the General tab, enter the following rule name: Firewall_Policy_Rule
-
Click Next until you reach the Advanced Security tab.
-
On the Advanced Security tab:
a. Select Permit from the Action drop-down list.
b. Select the value IPS_Policy from the IPS Policy drop-down list.
NOTE: Starting in Junos Space Security Director Release 20.1R1 V1 hot patch, you can assign a group IPS policy that is not assigned to any device to a firewall policy. -
Click Next until you reach the Rule Placement tab, and click Finish.
You can view the IPS policy details in the firewall policy configuration summary. -
Click OK to create the rule.
The rule is displayed on the Firewall_Policy/Rules page. -
Click Save to save the rule.
Similar to Firewall_Policy_Rule, we have created another rule Firewall_Policy_Rule2.
Verify the IPS Policy Assignment to Firewall Policy
Purpose
Let’s verify that the firewall policy that you created includes the IPS policy
that you created (IPS_Policy).
Action
-
Select Configure > Firewall Policy > Standard Policies.
The Standard Policies page is displayed. -
Click the rules for the firewall policy named (Firewall_Policy).
The Firewall_Policy/Rules page is displayed. In the Advanced Security column, the IPS policy named IPS_Policy is displayed for both the rules that you created (Firewall_Policy_Rule and Firewall_Policy_Rule2).
CLI Configuration
You’ll see that the IPS_Policy policy is assigned to the Firewall_Policy_Rule and Firewall_Policy_Rule2 rules.
Security Firewall Policy: global ##
set security policies global policy Firewall_Policy_Rule match application any
set security policies global policy Firewall_Policy_Rule match destination-
address any
set security policies global policy Firewall_Policy_Rule match source-address
any
set security policies global policy Firewall_Policy_Rule then permit
application-services idp-policy IPS_Policy
set security policies global policy Firewall_Policy_Rule2 match application
any
set security policies global policy Firewall_Policy_Rule2 match destination-
address any
set security policies global policy Firewall_Policy_Rule2 match source-address
any
set security policies global policy Firewall_Policy_Rule2 then permit
application-services idp-policy IPS_Policy
##IDP Configurations##
set security idp idp-policy IPS_Policy rulebase-ips rule Device-1 match
application default
set security idp idp-policy IPS_Policy rulebase-ips rule Device-1 match
attacks predefined-attack-groups “Additional
Web Services – Info”
set security idp idp-policy IPS_Policy rulebase-ips rule Device-1 match from-
zone any
set security idp idp-policy IPS_Policy rulebase-ips rule Device-1 match to-
zone any
set security idp idp-policy IPS_Policy rulebase-ips rule Device-1 then action
recommended
WHAT’S NEXT
To learn more about IPS features, see Junos Space Security Director User
Guide.
Use Case 2: Import a Firewall Policy that Has IPS Policy Configured
SUMMARY
An intrusion prevention system (IPS) policy enables you to selectively enforce
various attack detection and prevention techniques on the network traffic
passing through an IPS-enabled device. In this section, you’ll learn how to
import a device running Junos OS Release 18.2 (that has a firewall policy with
an IPS policy configured) to Junos Space Security Director. You’ll see that
the assigned IPS policy is imported along with the firewall policy.
Benefits
- Each imported firewall policy rule can have a different IPS policy assigned.
- Simplifies application-based security policy management at Layer 7.
- Provides greater control and extensibility to manage dynamic applications traffic.
Before You Begin
-
Install Junos Space Security Director and Log Collector. See Junos Space Security Director Installation and Upgrade Guide.
-
Ensure that IPS is enabled on the SRX Series device.
-
Ensure that the SRX Series device runs Junos OS Release 18.2 or later.
NOTE: -
Although this use case has been specifically validated against Junos Space Security Director Release 19.3 and an SRX Series device running Junos OS Release 18.2, you can use Junos OS Release 18.2 or later.
-
Only mandatory fields and other required fields are included in the procedures in this use case.
Overview
Starting in Junos Space Security Director Release 19.3, when you import a
firewall policy from an SRX Series device running Junos OS Release 18.2 or
later, the IPS policy that is assigned to the firewall policy is also
imported. The imported device is assigned to the firewall policy, and is
displayed on the firewall policies page. The imported device is not displayed
on the IPS Policies page.
In the following topology, we have an enterprise local area network behind a
Layer 2 switch. The switch is connected to an SRX Series firewall that has IPS
enabled and inspects all the traffic traveling in and out of the network. The
SRX Series device can be in any form: hardware, virtual, or containerized.
Import a Firewall Policy
Let’s import a firewall policy from an SRX Series device running Junos OS
Release 18.2:
-
Select Devices > Security Devices.
The Security Devices page is displayed. -
Select the vsrx-18.2 device, and click Import.
The Import Configuration page is displayed. -
Select the firewall policy vsrx-18.2 (the IPS policy is assigned to this firewall policy).
-
Click Next.
A summary of the configuration changes to be imported is displayed. -
Click OK to import the device configuration.
The Job Details page is displayed. The IPS policy (IPS-Policy-1) is imported along with the firewall policy (vsrx-18.2). -
Click OK.
The imported policies are displayed on the IPS Policies page and also in the firewall policy rule.
CLI Configuration
Here is the CLI configuration from the vsrx-18.2 device:
set security idp idp-policy IPS-Policy-1 rulebase-ips rule rule1 match from-
zone any
set security idp idp-policy IPS-Policy-1 rulebase-ips rule rule1 match to-zone
any
set security idp idp-policy IPS-Policy-1 rulebase-ips rule rule1 match
application default
set security idp idp-policy IPS-Policy-1 rulebase-ips rule rule1 match attacks
predefined-attacks
ICMP:INFO:ECHO-REPLY
set security idp idp-policy IPS-Policy-1 rulebase-ips rule rule1 then action
recommended
set security policies global policy rule-one match source-address any
set security policies global policy rule-one match destination-address any
set security policies global policy rule-one match application any
set security policies global policy rule-one then permit application-services
idp-policy IPS-Policy-1
Verify the Imported Configuration in Security Director
Purpose
Let’s verify that the device is assigned to the imported firewall policy.
You’ll see that the device is not assigned to the imported IPS policy on the
IPS Policies page.
Action
-
Select Configure > IPS Policy > Policies.
The device is not displayed for the imported IPS policy on the IPS Policies page. -
Select Configure > Firewall Policy > Standard Policies.
The imported firewall policy (vsrx-18.2) and the assigned device (vsrx-18.2) are displayed on the Standard Policies page. -
Click the rules for the vsrx-18.2 firewall policy.
On the firewall policy rules (vsrx-18.2/Rules) page, you’ll see the imported IPS policy (IPS-Policy-1) in the Advanced Security column.NOTE: If a device runs Junos OS Release 18.2 or later and has deprecated active-idp policy CLI, Junos Space Security Director imports the IPS policy and assigns it to all firewall policy rules with IPS ON.
WHAT’S NEXT
To learn more about IPS features, see Junos Space Security Director User
Guide.
Use Case 3: Configure Certificate-Based Authentication in Policy Enforcer
SUMMARY
Users typically gain access to resources from an application or system on the
basis of their username and password. You can also use certificates to
authenticate and authorize sessions among various servers and users. Only one
authentication mode is supported at a time and all users are authenticated
using the selected authentication mode. In this use case, you’ll learn how to
configure certificate-based authentication for a Policy Enforcer user.
Benefits
Certificate-based authentication over a Secure Sockets Layer (SSL) connection
is the most secure type of authentication.
Before You Begin
- Install Junos Space Security Director. See Junos Space Security Director Installation and Upgrade Guide.
- Install and configure Policy Enforcer virtual machine, see Policy Enforcer Installation Overview.
- Generate X.509 certificates, and make sure that the user certificates are available on your local machine. See “Generate SSL certificates” on page 21.
NOTE: Only mandatory fields and other required fields are included in the
procedures in this use case.
Overview
Starting in Policy Enforcer Release 20.1R1, you can enable certificate-based
authentication for the Policy Enforcer user.
The following topology shows Policy Enforcer configured in Junos Space
Security Director. The user can configure certificate-based authentication
mode and use certificates to gain access to the application.
Generate SSL certificates
Let’s learn how to generate a certification authority (CA) certificate, generate a client certificate and a private key for the SSL client, and then convert the client certificate and private key to Personal Information Exchange-pkcs#12 format for use by web browsers.
Generate a CA certificate
-
Log in to the Linux server.
-
Run the following command:
openssl req -newkey rsa:4096 -keyform PEM -keyout ca.key -x509 -days 3650 -outform PEM -out ca.cer -
Enter the PEM passphrase, for example: 1234.
You’ll need this passphrase while you generate client certificates. -
Enter the following details, for example:
• Country Name: IN
• State or Province name: KAR
• Locality Name: BAN
• Organization Name: Juniper
• Organization Unit Name: space
• Common Name: space_user
The certificate is issued by this name.
• Email Address: example@juniper.com
Generate Client SSL certificates
-
Log in to the Linux server.
-
Run the following command to generate a private key for the SSL client, for example: client1.key.
openssl genrsa -out client1.key 4096 -
Run the following command to generate the certificate request, for example: client1.req.
openssl req -new -key client1.key -out client1.req -
Enter the following details for client1, for example:
• Country Name: IN
• State or Province name: KAR
• Locality Name: BAN
• Organization Name: Juniper
• Organization Unit Name: space
• Common Name: space_user1
The certificate is issued by this name.
• Email Address: example1@juniper.com -
Enter the challenge password, for example: 12345.
-
Run the following command to issue the client certificate using the certificate request and the CA key, for example:
client1.cer.
openssl x509 -req -in client1.req -CA ca.cer -CAkey ca.key -set_serial 101 -extensions client1 -days 365 -outform PEM -out client1.cer -
Enter the passphrase for the ca.key as 1234. This must be the same passphrase that you provided while creating the CA certificate in Step 3.
-
Run the following command to convert the client certificate and private key to pkcs#12 format for use by web browsers, for example: client1.p12 (Personal Information Exchange file type).
openssl pkcs12 -export -inkey client1.key -in client1.cer -out client1.p12 -
Enter the export password, for example 123456.
You’ll need this password to import the certificate to the web browser.
The following certificates are generated:
Similarly, generate client2.cer, client2.key, and client2.p12 certificates with the following details, for example:
-
Country Name: IN
-
State or Province name: KAR
-
Locality Name: BAN
-
Organization Name: Juniper
-
Organization Unit Name: space
-
Common Name: space_user2
The certificate is issued by this name. -
Email Address: example2@juniper.com
NOTE: In this example, we will use the generated client1 certificates for
the Junos Space user (user1) and client2 certificates for the Policy Enforcer
user (pe_user).
Copy the Certificates from the Linux Server to Your Local Machine
-
Log in to the WinSCP client to copy the certificates that you generated from the Linux server to your local machine.
You can use any file transfer protocol client. -
Select the file protocol as SFTP.
-
Enter the hostname of the Linux server, username, and password, and click Login.
-
Select the certificate files that you generated in the Linux server, and copy the files to the preferred location on your local machine.
Upload the CA Certificate
Let’s upload the CA certificate or the root certificate to verify user
certificates. The private key of the root certificate is used to sign the user
certificates, which then inherits the trustworthiness of the root certificate.
To upload a CA certificate:
-
Log in to Junos Space Network Management Platform.
-
Select Administration > CA/CRL Certificates.
The CA CRL Certificates page is displayed. -
Click the arrow next to the + icon, and select X.509 CA Certificate.
The Upload X.509 CA Certificate File page is displayed. -
Browse the X.509 CA certificate file (for example: ca.cer) from your local machine that you generated in “Generate SSL certificates” on page 21.
-
Click Upload.
A success message is displayed after you upload the valid certificate. You can view the CA certificate details on the CA/CRL Certificates page.
Upload the User Certificate
Let’s upload user certificates to authenticate the Junos Space user by using
certificate-based authentication. You need to upload the corresponding
certificate for each user for the Junos Space server to authenticate the user.
To create a user in Junos Space Network Management Platform, see Create Users
in Junos Space Network Management Platform.
To upload the user certificate for an existing user, for example user1:
-
Log in to Junos Space Network Management Platform.
-
Select Role Based Access Control > User Accounts.
The User Accounts page is displayed. -
Right-click the Junos Space user, for example: user1, and select Modify User.
The Modify User page for user1 is displayed. -
In the X509 Cert File field, browse the X.509 certificate file (for example: client1.cer) from your local machine that you generated in “Generate SSL certificates” on page 21.
-
Click Upload.
A success message is displayed.
Upload X.509 Certificate File in Policy Enforcer
After you configure Policy Enforcer, a new user called pe_user is created. You must add X.509 certificate for the pe_user for seamless certificate-based authentication. Policy Enforcer authenticates with Junos Space Security Director and Junos Space Network Management Platform using certificates in the certificate-based authentication mode.
-
Log in to Junos Space Security Director.
-
Select Administration > Policy Enforcer > Settings.
The Settings page is displayed. -
Enable Certificate Based Authentication.
This provides seamless operation when Junos Space Network Management Platform user switches to certificate-based authentication mode. -
Browse the X509 certificate file, for example: client2.cer, and X509 certificate key file, for example: client2.key that you generated in “Generate SSL certificates” on page 21.
-
Click OK.
After uploading the certificates on the Settings Page, navigate to Junos Space
Network Management Platform, select User > Role Based Access control > User
Accounts. Right-click the pe_user, and select Modify User. Here, you can view
the certificate details uploaded for the pe_user.
Configure the Web Browser Settings
You must import the Personal Information Exchange-pkcs#12 file type certificate uploaded to the Junos Space user (user1) on all the supported web browser settings page. In this example, let’s upload the client1.p12 on Google Chrome to enable certificate-based authentication.
-
Open the Google Chrome web browser.
NOTE: You can use any supported web browser. -
Click on the ellipsis icon on the top-right corner of the web browser, and select Settings.
-
Select Security and Privacy.
The Security and Privacy page is displayed. -
Select Security.
The Security page is displayed. -
Select Manage Certificates.
The Certificates page is displayed. -
Click Import.
The Certificate Import Wizard is displayed. -
Browse the personal information file type, for example: client1.p12.
-
Click Next.
-
Enter the password for the private key as 123456. You must use the same password that you provided in Step 9 while creating the client1 certificates.
-
Browse the location to store the certificate.
A summary of certificate details is displayed. -
Click Finish.
A pop-up is displayed confirming the import of new private exchange key. -
Click OK.
A success message is displayed and the certificate is added to your web browser settings.
Change the User Authentication Mode to Certificate-Based Authentication
Mode
Now let’s change the authentication mode from password-based to complete certificate–based for users to get authenticated on the basis of their certificates.
-
Log in to Junos Space Network Management Platform.
-
Select Administration > Application.
-
Right-click Network Management Platform, and select Modify Application Settings.
The Modify Network Management Platform Settings page is displayed. -
Select User.
The User page is displayed. -
Select the Use X509 Certificate Complete Certificate option as the authentication mode.
The Change Summary page is displayed.
-
Click Confirm to enable the certificate-based authentication.
When you change the authentication mode, all existing user sessions, except that of the current administrator who is changing the authentication mode, are automatically terminated and the users are forced to log out.
Verify the Certificate-Based Authentication Mode
Purpose
Let’s verify that you can log in to Junos Space Network Management Platform
using certificates.
Action
-
Access the Junos Space Network Management Platform application.
The following pop-up is displayed. -
Click OK.
The Security Page is displayed. -
Click Allow.
The user1 is logged in to the Junos Space Network Management application without providing any username and password.
Troubleshoot Authentication Issues
Problem
Description: You must follow all the steps in the previous sections to
enable certificate-based authentication. However, if you are restricted from
logging in by using certificate–based authentication mode, then you can change
the authentication mode to password-based from the CLI.
Solution
To change the authentication mode to password-based authentication from the
CLI:
- Log in to the CLI of the Junos Space server VIP node.
- Navigate to the following directory: /var/www/cgi-bin.
- Type the following command:
./setSpaceAuthMode password-based
The authentication mode is changed to password-based, and you can login with the username and password.
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2022 Juniper Networks, Inc. All rights reserved. .
References
- Junos Space Archives | Juniper Networks
- Security Director User Guide - TechLibrary - Juniper Networks
- Creating Users in Junos Space Network Management Platform - TechLibrary - Juniper Networks
- Policy Enforcer Installation Overview - TechLibrary - Juniper Networks
- Creating Device Discovery Profiles in Security Director - TechLibrary - Juniper Networks
- Security Director Documentation | Juniper Networks
- Policy Enforcer Documentation | Juniper Networks
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>