- play_arrow Juniper Web Device Manager
- play_arrow Getting Started
-
- play_arrow Add SRX Series Firewall to Security Director Cloud
- play_arrow Dashboard
- play_arrow J-Web Dashboard
-
- play_arrow Monitor
- play_arrow Network
- play_arrow Logs
- play_arrow Maps and Charts
- play_arrow Statistics
- play_arrow Reports
-
- play_arrow Device Administration
- play_arrow Basic Settings
- play_arrow Cluster Management
- play_arrow User & Roles
- play_arrow Multi Tenancy—Resource Profiles
- play_arrow Multi Tenancy—Interconnect Ports
- play_arrow Multi Tenancy—Logical Systems
- play_arrow Multi Tenancy—Tenants
- play_arrow Certificates Management—Certificates
- play_arrow Certificate Management—Certificate Authority Group
- play_arrow License Management
- play_arrow Security Package Management
- play_arrow ATP Management
- play_arrow Operations
- play_arrow Software Management
- play_arrow Configuration Management
- play_arrow Alarm Management
- play_arrow RPM
- play_arrow Tools
- play_arrow Reset Configuration
-
- play_arrow Network
- play_arrow Connectivity—Interfaces
- play_arrow Connectivity—VLAN
- play_arrow Connectivity—Link Aggregation
- play_arrow Connectivity—Wireless LAN
- play_arrow DHCP Client
- play_arrow DHCP Server
- play_arrow Firewall Filters—IPv4
- play_arrow Firewall Filters—IPv6
- play_arrow Firewall Filters—Assign to Interfaces
- play_arrow NAT Policies
- play_arrow NAT Pools
- play_arrow Destination NAT
- play_arrow Static NAT
- play_arrow NAT Proxy ARP/ND
- play_arrow Static Routing
- play_arrow RIP Routing
- play_arrow OSPF Routing
- play_arrow BGP Routing
- play_arrow Routing Instances
- play_arrow Routing—Policies
- play_arrow Routing—Forwarding Mode
- play_arrow CoS—Value Aliases
- play_arrow CoS—Forwarding Classes
- play_arrow CoS Classifiers
- play_arrow CoS—Rewrite Rules
- play_arrow CoS—Schedulers
- play_arrow CoS—Scheduler Maps
- play_arrow CoS—Drop Profile
- play_arrow CoS—Virtual Channel Groups
- play_arrow CoS—Assign To Interface
- play_arrow Application QoS
- play_arrow IPsec VPN
- play_arrow Dynamic VPN
- play_arrow Compliance
-
- play_arrow Security Policies and Objects
- play_arrow Security Policies
- play_arrow Metadata Streaming Policy
- play_arrow Zones/Screens
- play_arrow Zone Addresses
- play_arrow Global Addresses
- play_arrow Services
- play_arrow Dynamic Applications
- play_arrow Application Tracking
- play_arrow Schedules
- play_arrow Proxy Profiles
-
ON THIS PAGE
About the SSL Proxy Page
You are here: Security Services > SSL Profiles > SSL Proxy.
You can create, add, edit, and delete SSL proxy or global policy configurations.
Tasks You Can Perform
You can perform the following tasks from this page:
Configure global policy. To do this, click Global Config at the upper-right corner of the table and enter the session cache timeout in seconds.
Add an SSL proxy profile. See Add an SSL Proxy Profile.
Edit na SSL proxy profile. See Edit an SSL Proxy Profile.
Delete SSL proxy profile. See Delete a SSL Proxy Profile.
Clone an SSL proxy profile. See Clone an SSL Proxy Profile.
View the details of an SSL proxy profile—To do this, select the SSL proxy profile for which you want to view the details and follow the available options:
Click More and select Detailed View.
Right-click on the selected SSL proxy profile and select Detailed View.
Mouse over to the left of the selected SSL proxy profile and click Detailed View.
Deselect the selected SSL proxy profiles. To do this, click More and select Clear All Selections.
Show or hide columns in the SSL Proxy Profiles table. To do this, click the Show Hide Columns icon in the upper-right corner of the custom objects table and select the options you want to view or deselect the options you want to hide on the page.
Advance search for SSL proxy profiles. To do this, use the search text box present above the table grid. The search includes the logical operators as part of the filter string. In the search text box, when you hover over the icon, it displays an example filter condition. When you start entering the search string, the icon indicates whether the filter string is valid or not.
For an advanced search:
Enter the search string in the text box.
Based on your input, a list of items from the filter context menu appears.
Select a value from the list and then select a valid operator based on which you want to perform the advanced search operation.
Note:Press Spacebar to add an AND operator or OR operator to the search string. Press backspace at any point of time while entering a search criteria, only one character is deleted.
Press Enter to display the search results in the grid.
Field Descriptions
Table 1 describes the fields on the SSL Proxy page.
Field | Description |
---|---|
Name | Displays the name of the SSL Proxy profile. |
Protection Type | Displays the type of protection the profile provides. One is client protection and the other one is server protection. Client protection is for SSL forward proxy and server protection is for reverse proxy. |
Preferred Cipher | Displays the category of the profile depending on their key strength. |
Custom Cipher | Displays the custom cipher which the SSH server uses to perform encryption and decryption function. |
Flow Tracing | Displays whether flow trace is enabled or disabled for troubleshooting policy-related issues. |
Exempted Addresses | Displays the addresses to whitelists that bypass SSL forward proxy processing. |
Server Auth Failure | Displays the action that will be performed if errors are encountered during the server certificate verification process (such as CA signature verification failure, self-signed certificates, and certificate expiry). |
Session Resumption | Displays whether the session resumption is disabled or not. |
Interface | Displays the name of the interface associated with the VLAN. |
MAC Address | Displays the MAC address associated with the VLAN. |