What's Changed
Learn about what changed in this release for vSRX.
Content Security
-
Juniper NextGen Web filtering license warning enhancement (SRX Series and vSRX)—Starting in Junos OS Release 24.4R1, if you configure the Web Filtering type as
juniper-enhancedorng-juniperwithout a corresponding valid license, the system does not generate a warning message. You can confirm whether the Web Filtering is down due to a missing license using theshow security utm web-filtering statuscomamnd.Earlier to this release, if you configure Web Filtering type as
juniper-enhancedorng-juniperwithout a valid license, the system generated a warning message.[See show security utm web-filtering status and Juniper NextGen Web Filtering Overview.]
Junos XML API and Scripting
-
Commit script input to identify software upgrades during boot time (ACX Series, EX Series, MX Series, QFX Series, SRX Series, and vSRX)—The
junos-contextnode-set includes thesw-upgrade-in-progresstag. Commit scripts can test thesw-upgrade-in-progresstag value to determine if the commit is taking place during boot time and a software upgrade is in progress. The tag value isyesif the commit takes place during the first reboot after a software upgrade, software downgrade, or rollback. The tag value isnoif the device is booting normally.[See Global Parameters and Variables in Junos OS Automation Scripts.]
User Interface and Configuration
-
Compact format deprecated for JSON-formatted state data (ACX Series, EX Series, MX Series, QFX Series, SRX Series, and vSRX)—We've removed the
compactoption at the[edit system export-format state-data json]hierarchy level because Junos devices no longer support emitting JSON-formatted state data in compact format. -
Access privileges for request support information command (ACX Series, EX Series, MX Series, PTX Series, QFX Series, SRX Series Firewalls, and vSRX Virtual Firewall)—The
request support informationcommand is designed to generate system information for troubleshooting and debugging purposes. Users with the specific access privilegesmaintenance,view, andview-configurationcan execute request support information command. -
Changes to the
show system informationandshow versioncommand output (ACX Series, EX Series, MX Series, QFX Series, SRX Series, and vSRX)—Theshow system informationcommand output lists theHostnamefield first instead of last. Theshow versioncommand output includes theFamilyfield. TheFamilyfield identifies the device family under which the device is categorized, for example,junos,junos-es,junos-ex, orjunos-qfx.[See show system information and show version.]
VPN
-
Compliance check is added for Juniper Secure Connect (SRX Series, and vSRX 3.0)—In Junos OS, we have added a compliance check to enforce that only Juniper Secure Connect clients can establish remote access VPN connections, and to reject connection requests from non-compliant remote access clients. You'll notice this behavior for the VPN connection using the remote access profile attached to the IPsec VPN object.
-
Changes to syslog messages for IPsec VPN service (SRX Series, and vSRX 3.0)—We've made changes to the syslog messages for the IPsec VPN service. You'll notice that: Tunnel-id field is added to the KMD_PM_SA_ESTABLISHED syslog messages when running IPsec VPN service using the kmd process. - New syslog message IKE_VPN_SA_ESTABLISHED is added for an IPsec rekey event when running IPsec VPN service using the iked process.
-
Changes to the lifetime-kilobytes option in IPsec VPN Security Association (SRX Series Firewalls, and vSRX 3.0)—The minimum allowed IPsec proposal lifetime-kilobytes value is changed from 64KB to 64000KB for IPsec VPN Security Association.
[See proposal (Security IPsec).]
-
Changes to syslog messages for IPsec VPN service (SRX Series, and vSRX 3.0)—We've made changes to the syslog messages for the IPsec VPN service. You'll notice that: - Tunnel-id field is added to the KMD_PM_SA_ESTABLISHED syslog messages when running IPsec VPN service using the kmd process. New syslog message IKE_VPN_SA_ESTABLISHED is added for an IPsec rekey event when running IPsec VPN service using the iked process.
-
Support for iPadOS for prelogon compliance checks in Juniper Secure Connect (SRX Series, and vSRX3.0)—You can configure prelogon compliance checks on your firewall to allow or reject endpoints running iPadOS. Use the
ipadosoption at the[edit security remote-access compliance pre-logon name term name match platform]hierarchy level to enforce these checks. This ensures that only compliant iPadOS devices are permitted access, enhancing the security of your network. -
Invalid CLI command removal for IPsec VPN with iked process (SRX Series and vSRX 3.0)—When running IPsec VPN services using the iked process, your firewall no longer displays the unsupported Junos OS CLI command
clear security ike respond-bad-spi-count. This update prevents invalid command displays for the unrecognized CLIs. You can continue to use the command with the kmd process.