Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Enroll an SRX Series Firewall Using Juniper ATP Cloud Web Portal

Only devices enrolled with Juniper ATP Cloud can send files for malware inspection.

Before enrolling a device, check whether the device is already enrolled. To do this, use the Devices page or the Device Lookup option in the Web UI. See Search for SRX Series Firewalls Within Juniper Advanced Threat Prevention Cloud. If the device is already enrolled, disenroll it first before enrolling it again.

Note:

If a device is already enrolled in a realm and you enroll it in a new realm, none of the device data or configuration information is propagated to the new realm. This includes history, infected hosts feeds, logging, API tokens, and administrator accounts.

Note:

In the Enrolled Devices page, you can view the realm with which the device is associated. From the Realm Management page, you can change that realm association or attach new realms. See Realm Management for configuration details.

Starting in Junos OS Release 19.3R1, you can use the request services advanced-anti-malware enroll command on the SRX Series Firewall to enroll a device to the Juniper ATP Cloud Web Portal. With this command, you do not have to perform any enrollment tasks on the Web Portal. All enrollment is done from the CLI on the SRX. See Enroll an SRX Series Firewall Using the CLI.

Juniper ATP Cloud uses a Junos OS op script to help you configure your SRX Series Firewall to connect to the Juniper ATP Cloud service. This script performs the following tasks:

  • Downloads and installs certificate authority (CAs) licenses onto your SRX Series Firewall.

    Note:

    You can enroll SRX1600 and SRX2300 firewalls with Trusted Platform Module (TPM)-based certificates for TLS-based authentication and a secure connection with the Juniper ATP Cloud. For more information about TPM, see Encryption with Trusted Platform Module. Since the TPM-based certificates are used for connections between the SRX Series Firewall and Juniper ATP Cloud, you must allow traffic to the junipersecurity.net domain on ports 8444 and 7444.

  • Creates local certificates and enrolls these certificates with the cloud server.

  • Performs basic Juniper ATP Cloud configuration on the SRX Series Firewall.

  • Establishes a secure connection to the cloud server.

Note:
  • Juniper ATP Cloud requires that both your Routing Engine (control plane) and Packet Forwarding Engine (data plane) can connect to the Internet.

  • The data plane connection should not go through the management interface, for example, fxp0. You do not need to open any ports on the SRX Series Firewall to communicate with the cloud server. However, if you have a device in the middle, such as a firewall, then that device must have ports 8080 and 443 open.

  • The SRX Series Firewall uses the default inet.0 routing table and an interface part of inet.0 as source-interface for control-plane connection from SRX Series Firewall to Juniper ATP Cloud. If the only Internet-facing interface on SRX Series Firewall is part of a routing instance, then we recommend that you add a static route pointing to the routing instance. Else, the control connection will fail to establish.

  • Juniper ATP Cloud requires that your SRX Series Firewall hostname contains only alphanumeric ASCII characters (a-z, A-Z, 0-9), the underscore symbol (_) and the dash symbol (-).

Warning:

If you are configuring explicit web proxy support for SRX Series Firewall/Juniper ATP Cloud connections, you must enroll SRX Series Firewalls to Juniper ATP Cloud using a slightly different process. See Explicit Web Proxy for Juniper ATP Cloud.

To enroll a device in Juniper ATP Cloud using the Web Portal, do the following:

  1. Click the Enroll button on the Devices page.
  2. Copy the command to your clipboard and click OK.
  3. Paste the command into the Junos OS CLI of the SRX Series Firewall you want to enroll with Juniper ATP Cloud and press Enter. (Note that this command must be run in operational mode.)
Note:

If the script fails, disenroll the device (see instructions for disenrolling devices) and then re-enroll it.

Note:

(Optional) Use the show services advanced-anti-malware status CLI command to verify that a connection is made to the cloud server from the SRX Series Firewall.

Once configured, the SRX Series Firewall communicates to the cloud through multiple persistent connections that are established over a secure channel (TLS 1.2) and the SRX Series Firewall is authenticated using SSL client certificates.

In the Enrolled Devices page, basic connection information for all enrolled devices is provided. This information includes serial number, model number, tier level (free or not) enrollment status in Juniper ATP Cloud, last telemetry activity, and last activity seen. Click the serial number for more details. In addition to Enroll, the following buttons are available:

Table 1: Button Actions

Actions

Definition

Enroll

Use the Enroll button to obtain an enroll command to run on eligible SRX Series Firewalls. This command enrolls these devices in Juniper ATP Cloud and is valid for 7 days. Once enrolled, SRX Series Firewall appears in the Devices and Connections list.

Disenroll

Use the Disenroll button to obtain a disenroll command to run on SRX Series Firewalls currently enrolled in Juniper ATP Cloud. This command removes those devices from Juniper ATP Cloud enrollment and is valid for 7 days.

Note:

Running the Enroll or Disenroll command will commit any uncommitted configuration changes on the SRX Series Firewall.

Note:

Generating a new Enroll or Disenroll command invalidates any previously generated commands.

Device Lookup

Use the Device Lookup button to search for the device serial number(s) in the licensing database to determine the tier (premium, feed only, free) of the device. For this search, the device does not have to be currently enrolled in Juniper ATP Cloud.

Remove

Removing an SRX Series Firewall is different than disenrolling it. Use the Remove option only when the associated SRX Series Firewall is not responding (for example, hardware failure). Removing it, disassociates it from the cloud without running the Junos OS op script on the device (see Enrolling and Disenrolling Devices). You can later enroll it using the Enroll option when the device is again available.

For HA configurations, you only need to enroll the cluster primary. The cloud will detect that this is a cluster and will automatically enroll both the primary and backup as a pair. Both devices, however, must be licensed accordingly. For example, if you want premium features, both devices must be entitled with the premium license.

Note:

Juniper ATP Cloud supports both active-active and active-passive cluster configurations. The passive (non-active) node does not establish a connection to the cloud until it becomes the active node.

Note:

The License Expiration column contains the status of your current license, including expiration information. There is a 60 day grace period after the license expires before the SRX Series Firewall is disenrolled from Juniper ATP Cloud.