SlideShare a Scribd company logo
Juniper SRX
update
Karel Hendrych
khe@juniper.net
Consulting Engineer
Platform Updates:
Virtual
vSRX - Industry’s Fastest Virtual Firewall
• 18G FW Large packet (1514B), 4G FW Imix
• 2 vCPU (cores), Lowest TCO
• Highest Perf/Core
• ~80G FW (8 instances) Large packet per server • VMware5.5+SRIOV
- 8 vSRX instances
on a 2.4GHz Dell
server
• VMware5.5+SRIOV
–1 vSRX instance on
a 3.4GHz Dell server
100G vSRX just got announced!
vSRX VM
Hypervisors
(VMware, KVM)
Physical X86 CPU, Memory, & Storage
Adv Services
+
Flow Processing
+
Packet FWD
(JEXEC)
Junos Kernel
QEMU/KVM
Juniper Linux (Guest OS)
SRIOV
Junos Control Plane
(JCP/vRE)
MGD RPD
FEATURE PARITY TO FFP
(Including Firewall, AppSecure, UTM/IDP, VPN, NAT, Routing,
HA Cluster, etc.)
PLATFORMS
• VMWare 5.1,5.5, 6.0
• Ubuntu 14.04 (KVM)
CHANGES
• Name change to vSRX
• Junos Version change to 15.1
• DPDK
• SR-IOV
• VMXNET3 and VirtIO (Driver
updates)
• Linux Base OS
• 64Bit Flowd
• Dedicated management I/F
• SCSI Support
• SNMP enhancements
• VMTools
• Min 4G vRAM and 8G HD
vSRX 2.0 (15.1X49)
• CentOS 7.0 (KVM)
• Contrail 2.2
Platform Updates:
Physical
SRX Series Services Gateways for Branch
All in one routing, switching and security in a single platform
Security at a every layer with MAC-sec, IPSec and application security
Best end-user application experience and operational efficiency
SRX3xx Portfolio Summary
*Performance numbers for the IMIX packet size
**NGFW = IPS + AppFW + External Logging
App Firewall*
Routing*
IPSec VPN*
NGFW**
500 Mbps 1 Gbps 2 Gbps 3 Gbps
500 Mbps 1 Gbps 1.7 Gbps 2.5 Gbps
100 Mbps
100 Mbps
200 Mbps
200 Mbps
300 Mbps
300 Mbps
350 Mbps
350 Mbps
SRX300
Retail Office
Up to 50 Users
SRX320
Small Branch
Up to 50 Users
SRX340
Mid Branch
Up to 100 Users
Large Branch
Up to 500 Users
SRX550SRX345
Mid-Large Branch
Up to 200 Users
SRX1500 Services Gateway
Specification SRX1500
RAM / storage 16GB / 16GB
On-board 1G ports 16xGE (w 4x SFP)
On-board 10G ports 4x SFP+
OOB Management port 1x GE
Acoustics 66 dBA
SSD Storage 120G
Power Supply 1+1 400W PSU
Forwarding capacity 1.8 Mpps
Routing / firewall 5 Gbps
IPSec VPN (IMIX) 1.2 Gbps
IPS 3.5 Gbps
NGFW 1 Gbps
Concurrent session 2,000,000
• SRX1500 is a high performance, cost effective and high
available next generation firewall
• Provide outstanding protection with Sky ATP
• Integrate networking & security in a single platform
• High port density and small form factor
• Targeted for
• Enterprise Campus Edge
• Data Center Edge
• Branch Router
SRX5400
• Ideal for medium to large enterprises
and Service Provider networks
• Software Security Services
– AppSecure and IPS
– AV and web filtering
• Next-generation, high-performance line
cards
SRX5400
On-board Ports 100GE-CFP/CFP2
40GE-QSFPP
10GE-SFPP, XFP
1GE - SFP
JUNOS Software Version Support JUNOS 15.1X49-D10
Firewall Performance (w/ Express Path) 65Gbps (480 Gbps)
Firewall Performance IMIX (w/ Express
Path)
32 Gbps (450 Gbps)
Firewall Performance
(Firewall + Routing PPS 64byte)
(w/Express Path)
8 Mpps (98 Mpps)
VPN Performance – AES256+SHA-1 35 Gbps
AppSecure 42 Gbps
Intrusion Prevention System 22 Gbps
Connections Per Second (CPS) 450 K
Maximum Concurrent Sessions 42 M
High Availability A/A or A/P
SRX5k CPS with CP-lite, scaling up to 250M sessions!
1 4 7 10 11
X49-D10 213 420 420 420 420
CP-Lite 230 1060 1815 2240 2500
0
500
1000
1500
2000
2500
3000
KCPS
TCP CPS
Software update
Next-Gen Firewall Features on SRX
Application Reporting
Application Firewalling
Geo-IP
C&C & Reputation Filtering User Firewalling
Intrusion Prevention
Web Filtering
Anti-Virus
Anti-Spam
Content Filtering
SSL Inspection
Cloud-based Anti-malware
01101010 01110101 01101110 01101001 01110000
What is Sky Advanced Threat Prevention
Customer
SRX
Juniper Cloud
Customer
Sandbox
w/Deception
Static
Analysis
ATP
1. SRX extracts potentially malicious
objects and files and sends them
to the cloud for analysis
2. Known malicious files are quickly
identified and dropped before they
can infect a host
3. Multiple techniques identify new
malware, adding it to the Known
Bad list and reporting it to SecOps
4. Correlation between newly
identified malware and known
C&C sites aids analysis
5. SRX blocks known malicious file
downloads and outbound C&C
traffic
Sky Advanced
Threat Prevention
Cloud
The ATP verdict chain
Staged analysis: combining rapid response and deep analysis
Suspect
file
1
2
3
4
Suspect files enter the analysis chain in the cloud
Cache lookup: (~1 second)
Files we’ve seen before are identified and a verdict immediately goes back to SRX
Anti-virus scanning: (~5 second)
Multiple AV engines to return a verdict, which is then cached for future reference
Static analysis: (~30 second)
The static analysis engine does a deeper inspection, with the verdict again cached for
future reference
Dynamic analysis: (~7 minutes)
Dynamic analysis in a custom sandbox leverages deception and provocation techniques
to identify evasive malware
• Build for Aruba ClearPass integration but can be used by 3rd party
• https://srxhostname/api/userfw/v1/
SRX User Identity Restful API (12.3X48-D30)
Healthy(0), Checkup(10), Transition(15),
Quarantine(20), Infected(30), Unknown(100)
“Aruba ClearPass”, “UAC”, “Active Directory”
IPv4 & IPv6 support
Standard XML DateTime format (ISO8601)
logon, logoff or posture-update for logon, role-list is a
must for logoff
A list of roles, maximum 200 with each 64 characters
Custom AppID Signature (15.1X49-D40)
• Types of custom signatures:
• ICMP-based
• L3/L4 based
• Layer 7-based
http-get-url-parsed-param-parsed
http-header-content-type
http-header-cookie
http-header-host
http-header-user-agent
http-post-url-parsed-param-parsed
http-post-variable-parsed
http-url-parsed
http-url-parsed-param-parsed
ssl-server-name
stream
SSL Forward Proxy and UTM
• 12.3X48-D25 and 15.1X49-D40 support UTM with SSL Proxy
• No configuration changes on UTM side. A ssl-proxy profile must be
applied
[…]policy trust-to-untrust match source-address any
[…]policy trust-to-untrust match destination-address any
[…]policy trust-to-untrust match application junos-any
[…]policy trust-to-untrust then permit application-services ssl-proxy profile-name ssl-inspection-p
[…]policy trust-to-untrust then permit application-services utm-policy junos-av-policy
[…]policy trust-to-untrust then permit application-services application-firewall rule-set block-app
[…]policy trust-to-untrust then log session-close
Juniper site to site VPN Solutions update
Use Case Auto VPN Auto + AD VPN Group VPN
Network Topology
Failover Redundancy
Traffic Steering
• Large Scale of Hub and Spoke
• Cluster Hub/Spoke
• Active-Passive
• Active-Backup
• Traffic Selector with Static
Routes – Higher scalability
• Dynamic Routing
• On Demand Spoke to Spoke
• Dynamic Any-to-Any
• Cluster Hub
• Cluster Spokes (Hierarchy)
• Traffic Selector with Static
Routes – Higher scalability
• Dynamic Routing - OSPF
• Any-to-Any
• Full Mesh
• Server Cluster for Key Server
protection
• Up to 4 server in the same
cluster.
• No overlay routing
• Advance QoS for encrypted
traffic
Tunnel Technology
• Tunnel Based VPN
• St0 P2P with Traffic Selector
• St0 P2MP with Routing
• IKEv1 and IKEv2
• Dynamic Spoke to Spoke
Tunnel
• IKEv2
• Tunnel-less VPN
• Group Protection
• IKEV1
Performance / Scalability
• Up to 1 Gbps / 3 Gbps and
2000 Tunnel - SRX1500
• 15K Tunnel with TS
• 256 shortcut tunnels- SRX550M
• 512 shortcut tunnels - SRX650
and above
• 4000 group members per
server
• 16K per cluster
Management
Firewall Policy
Threat Map
Events and Logs
Application Visibility
Dashboard
Junos Space Security Director 2.0
https://www.youtube.com/watch?v=IN0g7SUfFQ0
Graphical, Intuitive, Network Wide Visibility
…smarter and faster
Big =
More
1
2
3
Future
Software Defined Secure Network Vision
Unify and rate threat intelligence, from
multiple sources
Create and centrally manage security
policy through user-intent based system
Enforce policy in near real time across
the network; ability to adapt to network
changes
Detection
Enforcement
Policy
Users & Roles
Departments &
Sites
Devices
Applications
Business
Needs
IT View
Switch Ports
VLANs
ACLs
IPs/Subnets
VRFs
ACLs
Firewall Zones
Rules
Users & Apps
Threats
Location
Thanks!

More Related Content

PDF
WAN - trends and use cases
PDF
Cellular technology with Embedded Linux - COSCUP 2016
PDF
VMworld 2013: Extreme Performance Series: Network Speed Ahead
PPTX
Openstack Quantum Security Groups Session
PPTX
Integrating OpenStack To Existing Infrastructure
PPTX
Juniper Network Automation for KrDAG
PPTX
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)
WAN - trends and use cases
Cellular technology with Embedded Linux - COSCUP 2016
VMworld 2013: Extreme Performance Series: Network Speed Ahead
Openstack Quantum Security Groups Session
Integrating OpenStack To Existing Infrastructure
Juniper Network Automation for KrDAG
How logging makes a private cloud a better cloud - OpenStack最新情報セミナー(2016年12月)

What's hot (20)

PDF
Openstack Networking Internals - first part
PPTX
Is OpenStack Neutron production ready for large scale deployments?
PDF
Open stack advanced_part
PPTX
Introduction to nexux from zero to Hero
PPTX
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
PDF
Intel DPDK Step by Step instructions
PDF
7 hands on
PPTX
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
DOCX
PDF
[2015-11월 정기 세미나]K8s on openstack
PDF
Contrail Enabler for agile cloud services
PDF
9 creating cent_os 7_mages_for_dpdk_training
PPTX
Demystifying openvswitch
PDF
5. hands on - building local development environment with Open Mano
PDF
OpenStack networking-sfc flow 분석
PDF
Unlock Your Cloud Potential with Mirantis OpenStack & Cumulus Linux
PPTX
OVS v OVS-DPDK
PDF
ONOS SDN Controller - Introduction
PDF
6. hands on - open mano demonstration in remote pool of servers
Openstack Networking Internals - first part
Is OpenStack Neutron production ready for large scale deployments?
Open stack advanced_part
Introduction to nexux from zero to Hero
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
Intel DPDK Step by Step instructions
7 hands on
NTTドコモ様 導入事例 OpenStack Summit 2016 Barcelona 講演「Expanding and Deepening NTT D...
[2015-11월 정기 세미나]K8s on openstack
Contrail Enabler for agile cloud services
9 creating cent_os 7_mages_for_dpdk_training
Demystifying openvswitch
5. hands on - building local development environment with Open Mano
OpenStack networking-sfc flow 분석
Unlock Your Cloud Potential with Mirantis OpenStack & Cumulus Linux
OVS v OVS-DPDK
ONOS SDN Controller - Introduction
6. hands on - open mano demonstration in remote pool of servers
Ad

Similar to Next Generation Security Solution (20)

PDF
Putting Firepower into the Next Generation Firewall
PDF
Cisco Next Generation Firewall with Firepower
PDF
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
PDF
Putting Firepower Into The Next Generation Firewall
PDF
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
PDF
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
PPTX
Sharing High-Performance Interconnects Across Multiple Virtual Machines
PDF
TeraVM_overview
PDF
TeraVM_overview_021115
PPTX
OpenStack High Availability
PPTX
OpenStack HA
PPTX
Introduction to NBL
PDF
Barracuda_NG_Firewall_Profile
PDF
Barracuda_NG_Firewall_Profile
PDF
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
PDF
Fortinet Service specifications shortlist
ODP
PDF
VMworld 2013: Real-world Deployment Scenarios for VMware NSX
PDF
security-products-comparison-chart.pdf
PDF
4.1-cnse-study-guide.pdf
Putting Firepower into the Next Generation Firewall
Cisco Next Generation Firewall with Firepower
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Putting Firepower Into The Next Generation Firewall
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Sharing High-Performance Interconnects Across Multiple Virtual Machines
TeraVM_overview
TeraVM_overview_021115
OpenStack High Availability
OpenStack HA
Introduction to NBL
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Fortinet Service specifications shortlist
VMworld 2013: Real-world Deployment Scenarios for VMware NSX
security-products-comparison-chart.pdf
4.1-cnse-study-guide.pdf
Ad

More from MarketingArrowECS_CZ (20)

PDF
INFINIDAT InfiniGuard - 20220330.pdf
PDF
Využijte svou Oracle databázi na maximum!
PDF
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
PDF
Chráníte správně svoje data?
PDF
Oracle databáze – Konsolidovaná Data Management Platforma
PDF
Nové vlastnosti Oracle Database Appliance
PDF
Infinidat InfiniGuard
PDF
Infinidat InfiniBox
PDF
Novinky ve světě Oracle DB a koncept konvergované databáze
PDF
Základy licencování Oracle software
PDF
Garance 100% dostupnosti dat! Kdo z vás to má?
PDF
Využijte svou Oracle databázi naplno
PDF
Oracle Data Protection - 2. část
PDF
Oracle Data Protection - 1. část
PDF
Benefity Oracle Cloudu (4/4): Storage
PDF
Benefity Oracle Cloudu (3/4): Compute
PDF
InfiniBox z pohledu zákazníka
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
PDF
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
PDF
Úvod do Oracle Cloud infrastruktury
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury

Recently uploaded (20)

PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Empathic Computing: Creating Shared Understanding
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Assigned Numbers - 2025 - Bluetooth® Document
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25-Week II
A comparative analysis of optical character recognition models for extracting...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Programs and apps: productivity, graphics, security and other tools
Empathic Computing: Creating Shared Understanding
Chapter 3 Spatial Domain Image Processing.pdf
Spectral efficient network and resource selection model in 5G networks
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...

Next Generation Security Solution

  • 3. vSRX - Industry’s Fastest Virtual Firewall • 18G FW Large packet (1514B), 4G FW Imix • 2 vCPU (cores), Lowest TCO • Highest Perf/Core • ~80G FW (8 instances) Large packet per server • VMware5.5+SRIOV - 8 vSRX instances on a 2.4GHz Dell server • VMware5.5+SRIOV –1 vSRX instance on a 3.4GHz Dell server 100G vSRX just got announced!
  • 4. vSRX VM Hypervisors (VMware, KVM) Physical X86 CPU, Memory, & Storage Adv Services + Flow Processing + Packet FWD (JEXEC) Junos Kernel QEMU/KVM Juniper Linux (Guest OS) SRIOV Junos Control Plane (JCP/vRE) MGD RPD FEATURE PARITY TO FFP (Including Firewall, AppSecure, UTM/IDP, VPN, NAT, Routing, HA Cluster, etc.) PLATFORMS • VMWare 5.1,5.5, 6.0 • Ubuntu 14.04 (KVM) CHANGES • Name change to vSRX • Junos Version change to 15.1 • DPDK • SR-IOV • VMXNET3 and VirtIO (Driver updates) • Linux Base OS • 64Bit Flowd • Dedicated management I/F • SCSI Support • SNMP enhancements • VMTools • Min 4G vRAM and 8G HD vSRX 2.0 (15.1X49) • CentOS 7.0 (KVM) • Contrail 2.2
  • 6. SRX Series Services Gateways for Branch All in one routing, switching and security in a single platform Security at a every layer with MAC-sec, IPSec and application security Best end-user application experience and operational efficiency
  • 7. SRX3xx Portfolio Summary *Performance numbers for the IMIX packet size **NGFW = IPS + AppFW + External Logging App Firewall* Routing* IPSec VPN* NGFW** 500 Mbps 1 Gbps 2 Gbps 3 Gbps 500 Mbps 1 Gbps 1.7 Gbps 2.5 Gbps 100 Mbps 100 Mbps 200 Mbps 200 Mbps 300 Mbps 300 Mbps 350 Mbps 350 Mbps SRX300 Retail Office Up to 50 Users SRX320 Small Branch Up to 50 Users SRX340 Mid Branch Up to 100 Users Large Branch Up to 500 Users SRX550SRX345 Mid-Large Branch Up to 200 Users
  • 8. SRX1500 Services Gateway Specification SRX1500 RAM / storage 16GB / 16GB On-board 1G ports 16xGE (w 4x SFP) On-board 10G ports 4x SFP+ OOB Management port 1x GE Acoustics 66 dBA SSD Storage 120G Power Supply 1+1 400W PSU Forwarding capacity 1.8 Mpps Routing / firewall 5 Gbps IPSec VPN (IMIX) 1.2 Gbps IPS 3.5 Gbps NGFW 1 Gbps Concurrent session 2,000,000 • SRX1500 is a high performance, cost effective and high available next generation firewall • Provide outstanding protection with Sky ATP • Integrate networking & security in a single platform • High port density and small form factor • Targeted for • Enterprise Campus Edge • Data Center Edge • Branch Router
  • 9. SRX5400 • Ideal for medium to large enterprises and Service Provider networks • Software Security Services – AppSecure and IPS – AV and web filtering • Next-generation, high-performance line cards SRX5400 On-board Ports 100GE-CFP/CFP2 40GE-QSFPP 10GE-SFPP, XFP 1GE - SFP JUNOS Software Version Support JUNOS 15.1X49-D10 Firewall Performance (w/ Express Path) 65Gbps (480 Gbps) Firewall Performance IMIX (w/ Express Path) 32 Gbps (450 Gbps) Firewall Performance (Firewall + Routing PPS 64byte) (w/Express Path) 8 Mpps (98 Mpps) VPN Performance – AES256+SHA-1 35 Gbps AppSecure 42 Gbps Intrusion Prevention System 22 Gbps Connections Per Second (CPS) 450 K Maximum Concurrent Sessions 42 M High Availability A/A or A/P
  • 10. SRX5k CPS with CP-lite, scaling up to 250M sessions! 1 4 7 10 11 X49-D10 213 420 420 420 420 CP-Lite 230 1060 1815 2240 2500 0 500 1000 1500 2000 2500 3000 KCPS TCP CPS
  • 12. Next-Gen Firewall Features on SRX Application Reporting Application Firewalling Geo-IP C&C & Reputation Filtering User Firewalling Intrusion Prevention Web Filtering Anti-Virus Anti-Spam Content Filtering SSL Inspection Cloud-based Anti-malware
  • 13. 01101010 01110101 01101110 01101001 01110000 What is Sky Advanced Threat Prevention Customer SRX Juniper Cloud Customer Sandbox w/Deception Static Analysis ATP 1. SRX extracts potentially malicious objects and files and sends them to the cloud for analysis 2. Known malicious files are quickly identified and dropped before they can infect a host 3. Multiple techniques identify new malware, adding it to the Known Bad list and reporting it to SecOps 4. Correlation between newly identified malware and known C&C sites aids analysis 5. SRX blocks known malicious file downloads and outbound C&C traffic Sky Advanced Threat Prevention Cloud
  • 14. The ATP verdict chain Staged analysis: combining rapid response and deep analysis Suspect file 1 2 3 4 Suspect files enter the analysis chain in the cloud Cache lookup: (~1 second) Files we’ve seen before are identified and a verdict immediately goes back to SRX Anti-virus scanning: (~5 second) Multiple AV engines to return a verdict, which is then cached for future reference Static analysis: (~30 second) The static analysis engine does a deeper inspection, with the verdict again cached for future reference Dynamic analysis: (~7 minutes) Dynamic analysis in a custom sandbox leverages deception and provocation techniques to identify evasive malware
  • 15. • Build for Aruba ClearPass integration but can be used by 3rd party • https://srxhostname/api/userfw/v1/ SRX User Identity Restful API (12.3X48-D30) Healthy(0), Checkup(10), Transition(15), Quarantine(20), Infected(30), Unknown(100) “Aruba ClearPass”, “UAC”, “Active Directory” IPv4 & IPv6 support Standard XML DateTime format (ISO8601) logon, logoff or posture-update for logon, role-list is a must for logoff A list of roles, maximum 200 with each 64 characters
  • 16. Custom AppID Signature (15.1X49-D40) • Types of custom signatures: • ICMP-based • L3/L4 based • Layer 7-based http-get-url-parsed-param-parsed http-header-content-type http-header-cookie http-header-host http-header-user-agent http-post-url-parsed-param-parsed http-post-variable-parsed http-url-parsed http-url-parsed-param-parsed ssl-server-name stream
  • 17. SSL Forward Proxy and UTM • 12.3X48-D25 and 15.1X49-D40 support UTM with SSL Proxy • No configuration changes on UTM side. A ssl-proxy profile must be applied […]policy trust-to-untrust match source-address any […]policy trust-to-untrust match destination-address any […]policy trust-to-untrust match application junos-any […]policy trust-to-untrust then permit application-services ssl-proxy profile-name ssl-inspection-p […]policy trust-to-untrust then permit application-services utm-policy junos-av-policy […]policy trust-to-untrust then permit application-services application-firewall rule-set block-app […]policy trust-to-untrust then log session-close
  • 18. Juniper site to site VPN Solutions update Use Case Auto VPN Auto + AD VPN Group VPN Network Topology Failover Redundancy Traffic Steering • Large Scale of Hub and Spoke • Cluster Hub/Spoke • Active-Passive • Active-Backup • Traffic Selector with Static Routes – Higher scalability • Dynamic Routing • On Demand Spoke to Spoke • Dynamic Any-to-Any • Cluster Hub • Cluster Spokes (Hierarchy) • Traffic Selector with Static Routes – Higher scalability • Dynamic Routing - OSPF • Any-to-Any • Full Mesh • Server Cluster for Key Server protection • Up to 4 server in the same cluster. • No overlay routing • Advance QoS for encrypted traffic Tunnel Technology • Tunnel Based VPN • St0 P2P with Traffic Selector • St0 P2MP with Routing • IKEv1 and IKEv2 • Dynamic Spoke to Spoke Tunnel • IKEv2 • Tunnel-less VPN • Group Protection • IKEV1 Performance / Scalability • Up to 1 Gbps / 3 Gbps and 2000 Tunnel - SRX1500 • 15K Tunnel with TS • 256 shortcut tunnels- SRX550M • 512 shortcut tunnels - SRX650 and above • 4000 group members per server • 16K per cluster
  • 20. Firewall Policy Threat Map Events and Logs Application Visibility Dashboard Junos Space Security Director 2.0 https://www.youtube.com/watch?v=IN0g7SUfFQ0 Graphical, Intuitive, Network Wide Visibility
  • 23. Software Defined Secure Network Vision Unify and rate threat intelligence, from multiple sources Create and centrally manage security policy through user-intent based system Enforce policy in near real time across the network; ability to adapt to network changes Detection Enforcement Policy Users & Roles Departments & Sites Devices Applications Business Needs IT View Switch Ports VLANs ACLs IPs/Subnets VRFs ACLs Firewall Zones Rules Users & Apps Threats Location