Step 2: Up and Running
Now that you’ve successfully logged in to CSO, let’s use CSO’s intuitive GUI to do the initial configuration.
If you’re an OpCo Administrator, add one or more tenants and assign CSO licenses to the tenants. See Add Tenants (OpCo Administrator) and Assign the CSO License to the Tenant ( OpCo Administrator).
If you’re a Tenant Administrator, deploy the SD-WAN or NGFW service. See Deploy the SD-WAN Service (Tenant Administrator) or Deploy the NGFW or Security Services (Tenant Administrator).
When in doubt, hover over the ? (Help) icon displayed next to the page title or fields on the CSO GUI to know more about a page or a field on the page.
Add Tenants (OpCo Administrator)
Here’s how to add a tenant:
Assign the CSO License to the Tenant ( OpCo Administrator)
Deploy the SD-WAN Service (Tenant Administrator)
To deploy the SD-WAN Advanced service, you'll need to add an enterprise hub site or a provider hub site, and a branch site. These tasks are optional for the SD-WAN Essentials service.
Starting in Release 6.0.0, CSO supports IPv6 in the underlay.
Before you begin:
Ensure that the Encapsulating Security Payload (ESP) protocol traffic is allowed on the network.
Ensure that Network Address Translation (NAT) and firewall ports are open on the network. Here are the ports that must be open for your CPE device:
Device Model
NAT/Firewall Ports
CPE WAN Link Ports (minimum one port; maximum four ports)
SRX4100 and SRX4200
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
xe-0/0/0
throughxe-0/0/7
SRX4600
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
xe-1/1/0
throughxe-1/1/7
et-1/0/0
throughet-1/0/3
SRX300, SRX320, and vSRX
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
throughge-0/0/7
SRX340 and SRX345
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
throughge-0/0/15
SRX380
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
ge-0/0/2
throughge-0/0/15
xe-0/0/16
throughxe-0/0/19
SRX550M
50, 51, 53, 123, 443, 500 or 4500, 514 or 3514, 7804
ge-0/0/0
throughge-0/0/9
NFX250
50, 51, 443, 500 or 4500, 514 or 3514, 2216, 7804
ge-0/0/10
,ge-0/0/11
,xe-0/0/12
, andxe-0/0/13
NFX150
50, 51, 443, 500 or 4500, 514 or 3514, 7804
heth0
throughheth5
Add an Enterprise Hub Site
If you intend to use an existing Juniper Networks provider hub site, adding an enterprise hub site is optional.
Add an SD-WAN Branch Site
Upload and Push the Device License
Install the Signature Database
The signature database contains intrusion detection prevention (IDP) and intrusion prevention system (IPS) signature definitions of predefined attack objects and groups. CSO uses IDP and IPS signatures to detect known attack patterns and protocol anomalies within the network traffic. You'll need to install the signature database on one or more of your network devices. Juniper Networks downloads this database to CSO.
Here’s how to install the signature database:
Add and Deploy a Firewall Policy
A firewall policy enforces rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. You can deploy a firewall policy to all sites or specific sites.
Here’s how to add and deploy a firewall policy:
Deploy SD-WAN Policy Intents
If your SD-WAN Essentials service deployment does not involve hubs, you'll need to:
Create a Local Breakout (Underlay) profile. See Adding Breakout Profiles.
Create an SD-WAN policy intent specifying the source and application (Any), and the breakout profile. See Creating SD-WAN Policy Intents.
SD-WAN policy intents optimize how the network uses WAN links and distributes traffic. CSO provides predefined SD-WAN policy intents for tenants.
Here’s how to deploy an SD-WAN policy intent:
Deploy the NGFW or Security Services (Tenant Administrator)
Before you add an NGFW (Security Services) site:
Ensure that the required ports are open on the network. Here are the ports that must be open for your NGFW device:
Device Model
NAT/Firewall
SRX3xx, SRX550M, SRX1500, SRX4100, and SRX4200
443, 500 or 4500, 514 or 3514, 6514, 7804, 8060 (needed if using PKI authentication to validate CRL)
Note:When you configure the SRX Series device, ensure that you configure either the first port (
ge-0/0/0
) or the last port (ge-0/0/7
orge-0/0/15
based on the model) for Internet connectivity.
Add an NGFW (Security Services) Site
Upload and Push the Device License
Install the Signature Database
The signature database contains intrusion detection prevention (IDP) and intrusion prevention system (IPS) signature definitions of predefined attack objects and groups. CSO uses IDP and IPS signatures to detect known attack patterns and protocol anomalies within the network traffic. You'll need to install the signature database on one or more of your network devices. Juniper Networks downloads this database to CSO.
Add and Deploy a Firewall Policy
A firewall policy enforces rules for transit traffic, in terms of what traffic can pass through the firewall, and the actions that need to take place on traffic as it passes through the firewall. You can deploy a firewall policy to all sites or specific sites.