- play_arrow Introduction
- play_arrow Dashboard
- play_arrow Monitor
- play_arrow Alerts
- play_arrow Logs
- play_arrow Insights
- play_arrow Maps and Charts
- play_arrow Tunnel Status
- play_arrow Service Locations
- play_arrow Advanced Threat Prevention
- Hosts Overview
- Host Details
- Threat Sources Overview
- Threat Source Details
- HTTP File Download Overview
- HTTP File Download Details
- Signature Details
- Manual Scanning Overview
- SMB File Download Overview
- SMB File Download Details
- Email Attachments Scanning Overview
- Email Attachments Scanning Details
- DNS DGA Detection Overview
- DNS Tunnel Detection Overview
- DNS DGA and Tunneling Detection Details
- Encrypted Traffic Insights Overview
- Encrypted Traffic Insights Details
- SMTP Quarantine Overview
- IMAP Block Overview
- Telemetry Overview
- play_arrow Reports
- play_arrow Report Definitions
- Report Definitions Main Page Fields
- Create Threat Assessment Report Definitions
- Create Application User Usage Report Definitions
- Create IPS Report Definitions
- Create Rule Analysis Report Definitions
- Create Security Events Report Definitions
- Create Top Talkers Report Definitions
- Create Network Operations Report Definitions
- Create URLs Visited Per User Report Definitions
- Create Log Streaming Report Definitions
- Using Report Definitions
- Editing Report Definitions
- Deleting Report Definitions
- play_arrow Generated Reports
- play_arrow ATP Report Definitions
- play_arrow ATP Generated Reports
- play_arrow Secure Edge Reports
-
- play_arrow SRX Device Management
- play_arrow Devices
- Devices Overview
- Add Devices
- Enroll SRX Series Firewalls from ATP Cloud to Juniper Security Director Cloud
- Disenroll SRX Series Firewall from ATP Cloud
- Device Subscriptions
- Add Licenses
- Import Device Certificates
- Configure Security Logs
- Configuration Versions
- Out-of-Band Changes
- Resolve Out-of-Band Changes
- Resynchronize Devices
- Upgrade Devices
- Reboot Devices
- Delete Devices
- play_arrow Device Groups
- play_arrow Preprovision Profiles
- play_arrow Configuration Templates
- play_arrow Images
- play_arrow Security Packages
-
- play_arrow SRX Security Policy
- play_arrow SRX Security Policies
- play_arrow SRX Security Policy Rules
- Security Policy Rules Overview
- Add a Security Policy Rule
- Edit, Clone, and Delete a Security Policy Rule
- Reorder a Security Policy Rule
- Configure Default Rule Option
- Select a Security Policy Rule Source
- Select a Security Policy Rule Destination
- Select Applications and Services
- Common Operations on a Security Policy Rule
- Add SRX Policy Rules to Secure Edge Policy (From SRX Policy Page)
- play_arrow SRX Security Policy Versions
- play_arrow Device View
-
- play_arrow SRX Security Subsciptions
- play_arrow IPS Profiles
- play_arrow IPS Signatures
- play_arrow Content Security
- play_arrow Content Security Profiles
- play_arrow Web Filtering Profiles
- play_arrow Antivirus Profiles
- play_arrow Antispam Profiles
- play_arrow Content Filtering Profiles
- play_arrow Content Filtering Policies (New)
- play_arrow Decrypt Profiles
- play_arrow SecIntel
- play_arrow SecIntel Profiles
- play_arrow SecIntel Profile Groups
- play_arrow Anti-Malware
- play_arrow Secure Web Proxy
- play_arrow Flow-Based Antivirus
- play_arrow ICAP Redirect Profile
- play_arrow Metadata Streaming Policy
- Security Metadata Streaming Policies Overview
- Create Metadata Streaming Profile
- Create Metadata Streaming Profile to Detect all DNS Threats
- Create Metadata Streaming Profile to Detect DGA-Based Threats
- Create Metadata Streaming Profile to Detect DNS Tunnels
- Create Metadata Streaming Profile to Detect all HTTP Threats
- Create Metadata Streaming Profile to Detect Command-and-Control (C2) Communications
- Edit, Clone, or Delete Metadata Streaming Profile
- Create Metadata Streaming Rule
- Edit or Delete Metadata Streaming Rule
- Deploy Metadata Streaming Policy
- Import Metadata Streaming Policy and DNS Cache
- play_arrow DNS Filter
-
- play_arrow SRX NAT
- play_arrow NAT Policies
- play_arrow NAT Pools
-
- play_arrow SRX Identity
- play_arrow JIMS
- play_arrow Active Directory
- play_arrow Access profile
- play_arrow Address Pools
-
- play_arrow Secure Edge Service Management
- Juniper Secure Edge Overview
- About the Service Locations Page
- Create a Service Location
- Edit and Delete Service Locations
- About the Sites Page
- Create a Site
- Create Bulk Sites
- Edit and Delete Sites
- About the IPsec Profiles Page
- Create an IPsec Profile
- Edit or Delete an IPsec Profile
- About the External Probe Page
- play_arrow Secure Edge Security Policy
- About the Secure Edge Policy Page
- Add a Secure Edge Policy Rule
- Edit, Clone, and Delete a Secure Edge Policy Rule
- Reorder a Security Policy Rule
- Select a Secure Edge Policy Source
- Select a Secure Edge Policy Destination
- Select Applications and Services
- Common Operations on a Secure Edge Policy
- Deploy Secure Edge Policies
- Add SRX Policy Rules to Secure Edge Policy (From Secure Edge Policy Page)
- play_arrow Secure Edge Security Subscriptions
- IPS Policies Overview
- About IPS Policies
- Create IPS Rule
- Edit, Clone, and Delete IPS Rules
- Create Exempt Rule
- Edit, Clone, and Delete Exempt Rule
- Web Filtering Profiles Overview
- About the Web Filtering Profiles Page
- Create a Web Filtering Profile
- Edit, Clone, and Delete a Web Filtering Profile
- CASB Overview
- About the CASB Profiles Page
- Create a CASB Profile
- Edit and Delete a CASB Profile
- About the CASB Rules Page
- Add Rules to a CASB Profile
- Edit and Delete a CASB Rule
- About the Application Instances Page
- Create an Application Instance
- Edit and Delete an Application Instance
- About the Application Tagging Page
- Content Filtering Policies Overview
- About the Content Filtering Policies Page
- Create a Content Filtering Policy
- Add Rules in a Content Filtering Policy
- Edit and Delete a Content Filtering Policy
- Edit, Clone, and Delete a Content Filtering Policy Rule
- SecIntel Profiles Overview
- About SecIntel Profiles
- Create Command and Control Profile
- Create DNS Profile
- Create Infected Hosts Profile
- Edit, Clone, and Delete SecIntel Profile
- About SecIntel Profile Groups
- Create SecIntel Profile Group
- Edit, Clone, and Delete SecIntel Profile Group
- Anti-malware Profiles Overview
- About Anti-malware Profiles
- Create Anti-malware Profile
- Edit, Clone, and Delete Anti-malware Profile
- Create a DNS Security Profile
- Create an Encrypted Traffic Insights Profile
- play_arrow Secure Edge Service Administration
- Certificate Management Overview
- About the Certificate Management Page
- Generate a Certificate
- Upload and Download a Certificate
- Regenerate and Delete a Certificate
- Add Juniper Clouds Root CA Certificate on Microsoft Windows
- Add Juniper Clouds Root CA Certificate on MacOS
- Add Juniper Clouds Root CA Certificate in Google Chrome
- Add Juniper Clouds Root CA Certificate in Mozilla Firefox
- Proxy Auto Configuration Files Overview
- About the PAC Files Page
- Edit, Clone, and Delete a Proxy Auto Configuration File
- Distribute a Proxy Auto Configuration File URL to Web Browsers
- Manually Add a Proxy Auto Configuration File URL to a Web Browser
- Configure an Explicit Proxy Profile
- Decrypt Profiles Overview
- About the Decrypt Profiles Page
- Create a Decrypt Profile
- Edit, Clone, and Delete a Decrypt Profile
- play_arrow Secure Edge Identity
- End User Authentication Overview
- About the End User Authentication Page
- Add an End User Profile
- Edit and Delete an End User Profile
- Add a Group
- Edit and Delete a Group
- Juniper Identity Management Service Overview
- About the JIMS Page
- JIMS Collector Onboarding Overview
- Onboard JIMS Collector
- Create JIMS Collector Service Accounts
- Install JIMS Collector
- Configure JIMS Collector to Get Information from the Directory Service
- Configure JIMS Collector to Get Microsoft Event Logs
- Configure JIMS Collector to Probe Unknown IP Addresses
- Delete JIMS Collector
- About the Authentication Settings Page
- Configure the Authentication Frequency
- play_arrow Secure Edge CASB and DLP
- play_arrow Shared Services Firewall Policies
- play_arrow Rule Options
- play_arrow Redirect Profiles
-
- play_arrow Shared Services Objects
- play_arrow Addresses
- play_arrow GeoIP
- play_arrow Services
- play_arrow Applications
- play_arrow Schedules
- play_arrow URL Patterns
- play_arrow URL Categories
- play_arrow SSL Initiation Profile
-
- play_arrow Shared Services Advanced Threat Prevention
- Enroll an SRX Series Firewall using Juniper ATP Cloud Web Portal
- Remove an SRX Series Firewall From Juniper Advanced Threat Prevention Cloud
- Search for SRX Series Firewalls Within Juniper Advanced Threat Prevention Cloud
- Device Information
- File Inspection Profiles Overview
- Create File Inspection Profiles
- Email Management Overview
- Configure SMTP Email Management
- Configure IMAP Email Management
- Adaptive Threat Profiling Overview
- Create an Adaptive Threat Profiling Feed
- Allowlist and Blocklist Overview
- Create Allowlists and Blocklists
- SecIntel Feeds Overview
- Juniper Threat Feeds Overview
- Global Configuration for Infected Hosts
- Enable Logging
- Configure Threat Intelligence Sharing
- Configure Trusted Proxy Servers
- Configure DAG Filter
- Configure Webhook
- play_arrow Shared Services Insights
- play_arrow On-prem Collectors
- play_arrow Cloud Collector
- play_arrow Rules
- play_arrow Settings
-
- play_arrow Administration
- play_arrow Subscriptions
- play_arrow Users & Roles
- play_arrow Single Sign-On Configuration
- play_arrow Audit Logs
- play_arrow Service Updates
- play_arrow Jobs
- play_arrow Data Management
- play_arrow Log Streaming
- play_arrow URL Recategorization
- play_arrow API Security
- play_arrow Organization
- play_arrow ATP Mapping
- play_arrow ATP Audit Logs
-
Creating VPN Profiles
Configure VPN profiles that define security parameters when establishing a VPN connection. You can reuse the same profile to create more VPN tunnels. The VPN profile includes VPN proposals, VPN mode, authentication, and other parameters used in IPsec VPN. When a VPN profile is created, Juniper Security Director Cloud creates an object in the database to represent the VPN profile. You can use this object to create either route-based or policy-based IPsec VPNs.
You cannot modify or delete Juniper Networks-defined VPN profiles. You can only clone the profiles and create new profiles.
You can also configure the IKE negotiation phases known as Phase 1 and Phase 2 settings in a VPN profile. SRX Series Firewalls support the following authentication methods in IKE negotiations for IPsec VPN:
Preshared key
ECDSA certificate
RSA certificate
DSA certificate
The predefined VPN profile is available for RSA certificates-based authentication. The PKI certificate list from the device is automatically retrieved during the device discovery.
Before You Begin
Read the VPN Profiles overview and view the field descriptions to understand your current data set. See VPN Profiles Overview.
A new VPN profile with the predefined VPN configuration is created. You can use this object to create IPsec VPNs.
Setting | Guideline |
---|---|
Name | Enter a unique string of maximum 255 alphanumeric characters without spaces. The string can contain colons, periods, dashes, and underscores. |
Description | Enter a description containing maximum 1024 character for the VPN profile. |
Authentication Type | Select the required authentication type:
|
IKE Version | Select the required IKE version, either V1 or V2, that is used to negotiate dynamic security associations (SAs) for IPsec. By default, IKEv1 is used. In Juniper Security Director Cloud, IKEv2 message fragmentation allows IKEv2 to operate in environments where IP fragments might be blocked and peers would not be able to establish an IPsec security association (SA). IKEv2 fragmentation splits a large IKEv2 message into a set of smaller ones so that there is no fragmentation at the IP level. |
Mode | Select a VPN mode:
|
Encryption Algorithm | Select the appropriate encryption mechanism. |
Authentication Algorithm | Select an algorithm. The device uses this algorithm to verify the authenticity and integrity of a packet. |
Deffie Hellman Group | Select a group. Diffie-Hellman (DH) groups determine the strength of the key used in the key exchange process. |
Lifetime Seconds | Select a lifetime of an IKE security association (SA). The valid range is from 180 through 86400 seconds. |
Dead Peer Detection | Enable this option to permit the two gateways to determine if the peer gateway is up and responding to the Dead Peer Detection (DPD) messages that are negotiated during IPsec establishment. |
DPD Mode | Select a DPD Mode.
|
DPD Interval | Select an interval in seconds to send dead peer detection messages. The default interval is 10 seconds with a valid range of 2 to 60 seconds. |
DPD Threshold | Select the failure DPD threshold value. This specifies the maximum number of times the DPD messages must be sent when there is no response from the peer. The default number of transmissions is 5 times with a valid range of 1 to 5. |
Advance Settings | |
General-IkeID | Enable this option to accept peer IKE ID in general. This option is disabled by default. If General IKE ID is enabled, the IKE ID option is disabled automatically.
|
IKEv2 Re Authentication | Select a reauthentication frequency. Reauthentication can be disabled by setting the reauthentication frequency to 0. The valid range is 0 to 100. |
IKEv2 Re Fragmentation Support | Enable this option to split a large IKEv2 message into a set of smaller ones so that there is no fragmentation at the IP level. |
IKEv2 Re-fragment Size | Select the size of the packet at which messages are fragmented. By default, the size is 576 bytes for IPv4, and the valid range is 570 to 1320. |
IKE Id | Configure the following IKE identifiers:
Note:
|
NAT-T | Enable Network Address Translation-Traversal (NAT-T) if the dynamic endpoint is behind a NAT device. |
Keep Alive | Select a period in seconds to keep the connection alive. NAT Keepalives are required to maintain the NAT translation during the connection between the VPN peers. The valid range is from 1 to 300 seconds. |
IPsec Settings | |
Protocol | Select the required protocol to establish the VPN.
|
Encryption Algorithm | Select the necessary encryption method. This is applicable if the Protocol is ESP. |
Authentication Algorithm | Select an algorithm. The device uses these algorithms to verify the authenticity and integrity of a packet. |
Perfect Forward Secrecy | Select Perfect Forward Secrecy (PFS) as the method that the device uses to generate the encryption key. The PFS generates each new encryption key independently from the previous key. The higher numbered groups provide more security but require more processing time. |
Establish Tunnel | Select an option to specify when IKE is activated.
|
Advance Settings | |
VPN Monitor | Enable this option to send Internet Control Message Protocol (ICMP) to determine if the VPN is up. |
Optimized | Enable this option to optimize VPN monitoring and configure SRX Series Firewalls to send ICMP echo requests, also called pings, only when there is outgoing traffic and no incoming traffic from the configured peer through the VPN tunnel. If there is incoming traffic through the VPN tunnel, the SRX Series Firewalls considers the tunnel to be active and do not send pings to the peer. |
Anti Replay | Enable this option for the IPsec mechanism to protect against a VPN attack that uses a sequence of numbers that are built into the IPsec packet. IPsec does not accept a packet for which it has already seen the same sequence number. It checks the sequence numbers and enforces the check rather than just ignoring the sequence numbers. Disable this option if there is an error with the IPsec mechanism that results in out-of-order packets, preventing proper functionality. By default, Anti-Replay detection is enabled. |
Install interval | Select the maximum number of seconds to allow for the installation of a re-keyed outbound security association (SA) on the device. |
Idle Time | Select the appropriate idle time interval. The sessions and their corresponding translations typically time out after a certain period if no traffic is received. |
DF Bit | Select an option to process the Don’t Fragment (DF) bit in IP messages.
|
Copy Outer DSCP | Enable this option to allow copying of the Differentiated Services Code Point (DSCP) field from the outer IP header encrypted packet to the inner IP header plain text message on the decryption path. The benefit in enabling this feature is that after IPsec decryption, clear text packets can follow the inner class-of-service (CoS) rules. |
Lifetime Seconds | Select a lifetime of an IKE security association (SA). The valid range is from 180 through 86400 seconds. |
Lifetime Kilobytes | Select the lifetime in kilobytes of an IPsec security association (SA). The valid range is from 64 through 4294967294 kilobytes. |