- Key Features in Junos OS Release 22.2
- play_arrow Junos OS Release Notes for ACX Series
- play_arrow Junos OS Release Notes for cRPD
- play_arrow Junos OS Release Notes for EX Series
- play_arrow Junos OS Release Notes for JRR Series
- play_arrow Junos OS Release Notes for MX Series
- play_arrow What's New
- play_arrow What's New in 22.2R1-S2
- play_arrow What's New in 22.2R1
- EVPN
- High Availability
- Interfaces
- IP Tunneling
- Junos Telemetry Interface
- Licensing
- MACsec
- MPLS
- Platform and Infrastructure
- Precision Time Protocol (PTP)
- Routing Policy and Firewall Filters
- Routing Protocols
- Routing Policy and Firewall Filters
- Source Packet Routing in Networking (SPRING) or Segment Routing
- Software Installation and Upgrade
- Subscriber Management and Services
- VPNs
- Additional Features
- What’s Changed
- Known Limitations
- Open Issues
- Resolved Issues
- Migration, Upgrade, and Downgrade Instructions
- play_arrow Junos OS Release Notes for NFX Series
- play_arrow Junos OS Release Notes for PTX Series
- play_arrow Junos OS Release Notes for QFX Series
- play_arrow Junos OS Release Notes for SRX Series
- play_arrow Junos OS Release Notes for vMX
- play_arrow Junos OS Release Notes for vRR
- play_arrow Junos OS Release Notes for vSRX
- Licensing
- Finding More Information
- Requesting Technical Support
- Revision History
Authentication and Access Control
Support for dynamic address groups (cSRX)—Starting in Junos OS Release 22.2R1, cSRX supports dynamic address groups (DAGs) or entries in a security policy.
In a Juniper Connected Security deployment, cSRX receives policy updates from external sources such as Policy Enforcer and SecIntel feeds. These external sources provide lists of IP addresses that satisfy either of these conditions:
- Have a specific purpose, such as a blocklist.
- Include a common attribute, such as a particular location or behavior that might pose a threat.
You use the external intelligence in the cloud to identify threat sources by their IP addresses. You can then group those addresses into a dynamic address entry or DAG.
Reference this dynamic address entry in a security policy to control the traffic to and from those addresses.
[See Dynamic Address Group Overview and Dynamic Address Groups in Security Policies.]