- play_arrow Configure
- play_arrow Configure ATP Cloud Features on SRX Series Firewall
- Encrypted Traffic Insights Overview
- Configure Encrypted Traffic Insights
- Adaptive Threat Profiling Overview
- Configure and Deploy Adaptive Threat Profiling
- Adaptive Threat Profiling Use Cases
- Enable DNS Secintel Detection
- DNS DGA Detection Overview
- Enable DNS DGA Detection
- DNS Tunnel Detection Overview
- Enable DNS Tunnel Detection
- DNS Sinkhole Overview
- Configure DNS Sinkhole
- DNS Security Logs
- Geolocation IPs and Juniper Advanced Threat Prevention Cloud
- Configure Juniper Advanced Threat Prevention Cloud With Geolocation IP
- Configure IPFilter Category
- Configure Reverse Shell Detection
- play_arrow Configure AI Predictive Threat Prevention on SRX Series Firewall
-
- play_arrow Configuration Statements and Operational Commands
- play_arrow SRX Series Firewall Commands to Configure Juniper ATP Cloud
-
- play_arrow Use Cases
- play_arrow SecIntel Feeds for MX Series Routers
- play_arrow Amazon Web Services GuardDuty with vSRX Virtual Firewall
- play_arrow Juniper ATP Cloud with Policy Enforcer
-
- play_arrow Troubleshoot
- Juniper Advanced Threat Prevention Cloud Troubleshooting Overview
- Troubleshooting Juniper Advanced Threat Prevention Cloud: Checking DNS and Routing Configurations
- Troubleshooting Juniper Advanced Threat Prevention Cloud: Checking Certificates
- Troubleshooting Juniper Advanced Threat Prevention Cloud: Checking the Routing Engine Status
- Troubleshooting Juniper Advanced Threat Prevention Cloud: Checking the application-identification License
- Viewing Juniper Advanced Threat Prevention Cloud System Log Messages
- Configure traceoptions
- Viewing the traceoptions Log File
- Turning Off traceoptions
- Juniper Advanced Threat Prevention Cloud Dashboard Reports Not Displaying
- Juniper Advanced Threat Prevention Cloud RMA Process
- play_arrow More Documentation
- play_arrow Additional Documentation on Juniper.net
-
Configure Reverse Proxy on the SRX Series Firewall
Starting with Junos OS Release 15.1X49-D80 and Junos OS Release 17.3R1, the SRX Series Firewall acts as a proxy, so it can downgrade SSL negotiation to RSA. Other changes are shown in Table 1.
Feature | Prior to 15.1X49-D80 | After 15.1X49-D80 and 17.3R1 |
---|---|---|
Proxy model | Runs only in tap mode Instead of participating in SSL handshake, it listens to the SSL handshake, computes session keys and then decrypts the SSL traffic. | Terminates client SSL on the SRX Series Firewall and initiates a new SSL connection with a server. Decrypts SSL traffic from the client/server and encrypts again (after inspection) before sending to the server/client. |
Protocol version | Does not support TLS Version 1.1 and 1.2. | Supports all current protocol versions. |
Key exchange methods | Supports RSA. | Supports RSA. |
Echo system | Tightly coupled with IDP engine and its detector. | Uses existing SSL forward proxy with TCP proxy underneath. |
Security services | Decrypted SSL traffic can be inspected only by IDP. | Just like forward proxy, decrypted SSL traffic is available for all security services. |
Ciphers supported | Limited set of ciphers are supported. | All commonly used ciphers are supported. |
The remainder of this topic uses the term SSL proxy to denote both forward proxy and reverse proxy.
Like forward proxy, reverse proxy requires a profile to be configured at the firewall rule level. In addition, you must also configure server certificates with private keys for reverse proxy. During an SSL handshake, the SSL proxy performs a lookup for a matching server private key in its server private key hash table database. If the lookup is successful, the handshake continues. Otherwise, SSL proxy terminates the hand shake. Reverse proxy does not prohibit server certificates. It forwards the actual server certificate/chain as is to the client without modifying it. Intercepting the server certificate occurs only with forward proxy. The following shows example forward and reverse proxy profile configurations.
# show services ssl ... proxy { profile ssl-inspect-profile-dut { # For forward proxy. No server cert/key is needed. root-ca ssl-inspect-ca; actions { ignore-server-auth-failure; log { all; } } } profile ssl-1 { root-ca ssl-inspect-ca; actions { ignore-server-auth-failure; log { all; } } } profile ssl-2 { root-ca ssl-inspect-ca; actions { ignore-server-auth-failure; log { all; } } } profile ssl-server-protection { # For reverse proxy. No root-ca is needed. server-certificate ssl-server-protection; actions { log { all; } } } } ...
You must configure either root-ca
or server-certificate
in an SSL proxy profile. Otherwise the commit check fails. See Table 2.
server-certificate configured | root-ca configured | Profile type |
---|---|---|
No | No | Commit check fails. You must configure either |
Yes | Yes | Commit check fails. Configuring both |
No | Yes | Forward proxy |
Yes | No | Reverse proxy |
Configuring multiple instances of forward and reverse proxy profiles are supported. But for a given firewall policy, only one profile (either a forward or reverse proxy profile) can be configured. Configuring both forward and reverse proxy on the same device is also supported.
You cannot configure the previous reverse proxy implementation with the new reverse proxy implementation for a given firewall policy. If both are configured, you will receive a commit check failure message.
The following are the minimum steps to configure reverse proxy: