- play_arrow vSRX Virtual Firewall Deployment for KVM
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in KVM
- Prepare Your Server for vSRX Virtual Firewall Installation
- Install vSRX Virtual Firewall with KVM
- Example: Install and Launch vSRX Virtual Firewall on Ubuntu
- Load an Initial Configuration on a vSRX Virtual Firewall with KVM
- Use Cloud-Init in an OpenStack Environment to Automate the Initialization of vSRX Virtual Firewall Instances
- play_arrow vSRX Virtual Firewall VM Management with KVM
- Configure vSRX Virtual Firewall Using the CLI
- Connect to the vSRX Virtual Firewall Management Console on KVM
- Add a Virtual Network to a vSRX Virtual Firewall VM with KVM
- Add a Virtio Virtual Interface to a vSRX Virtual Firewall VM with KVM
- SR-IOV and PCI
- Upgrade a Multi-core vSRX Virtual Firewall
- Monitor the vSRX Virtual Firewall VM in KVM
- Manage the vSRX Virtual Firewall Instance on KVM
- Recover the Root Password for vSRX Virtual Firewall in a KVM Environment
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters on KVM
-
- play_arrow vSRX Virtual Firewall Deployment for VMware
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in VMware
- play_arrow vSRX Virtual Firewall VM Management with VMware
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters in VMware
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Hyper-V
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Microsoft Hyper-V
- play_arrow vSRX Virtual Firewall VM Management with Microsoft Hyper-V
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters
-
- play_arrow vSRX Virtual Firewall Deployment for Contrail
- play_arrow Overview of vSRX Virtual Firewall Service Chains in Contrail
- play_arrow Install vSRX Virtual Firewall in Contrail
- play_arrow vSRX Virtual Firewall VM Management with Contrail
-
- play_arrow vSRX Virtual Firewall Deployment for Nutanix
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Nutanix
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Azure
- play_arrow Overview
- play_arrow Deploy vSRX Virtual Firewall from the Azure Portal
- play_arrow Deploy vSRX Virtual Firewall from the Azure CLI
- play_arrow Configure and Manage vSRX Virtual Firewall for Microsoft Azure
- play_arrow Configure Azure Features on vSRX Virtual Firewall and Use Cases
- Deployment of Microsoft Azure Hardware Security Module on vSRX Virtual Firewall 3.0
- Example: Configure an IPsec VPN Between Two vSRX Virtual Firewall Instances
- Example: Configure an IPsec VPN Between a vSRX Virtual Firewall and Virtual Network Gateway in Microsoft Azure
- Example: Configure Juniper ATP Cloud for vSRX Virtual Firewall
-
- play_arrow vSRX Virtual Firewall Deployment for Google Cloud Platform
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Google Cloud
-
- play_arrow vSRX Virtual Firewall Deployment for IBM Cloud
- play_arrow Overview
- play_arrow Installing and Configuring vSRX Virtual Firewall in IBM
- Performing vSRX Virtual Firewall Basics in IBM Cloud
- vSRX Virtual Firewall Readiness Checks in IBM Cloud
- Managing VLANs with a gateway appliance
- Working with the vSRX Virtual Firewall Default Configurations
- Migrating Legacy Configurations to the Current vSRX Virtual Firewall Architecture
- Allowing SSH and Ping to a Public Subnet
- Performing vSRX Virtual Firewall Advanced Tasks in IBM Cloud
- Upgrading the vSRX Virtual Firewall in IBM Cloud
- play_arrow Managing vSRX Virtual Firewall in IBM Cloud
- play_arrow Monitoring and Troubleshooting
-
- play_arrow vSRX Virtual Firewall Deployment for OCI
- play_arrow Overview
- play_arrow Installing vSRX Virtual Firewall in OCI
- play_arrow vSRX Virtual Firewall Licensing
-
Centralized Monitoring and Troubleshooting using AWS Features
This topic provides you details on how you can perform monitoring and troubleshooting of your vSRX Virtual Firewall instances on the AWS console by integrating vSRX Virtual Firewall with CloudWatch, IAM, and Security Hub.
Understanding Centralized Monitoring Using Cloudwatch
AWS provides a comprehensive view of various metrics, logs, security events from third-party services across AWS accounts. With the support of CloudWatch, vSRX Virtual Firewall can publish native metrics and logs to cloud, which you can use to monitor vSRX Virtual Firewall running status. Security Hub is the single place that aggregates, organizes and prioritizes security alerts.
The CloudWatch logs agent provides an automated way to send log data to CloudWatch Logs from Amazon EC2 instances. The agent pushes log data to CloudWatch Logs.
The cloudagent daemon that runs on the vSRX Virtual Firewall allows integration of AWS CloudWatch and Security Hub. The cloudagent:
Collects device metrics and send metrics to AWS CloudWatch
Collects system and security logs and sends the logs to AWS CloudWatchLog
Any event type (component or log level) that can be collected by the cloudagent under vSRX Virtual Firewall event log mode is supported for CloudWatch log collection. Events supported for CloudWatchLog are:
System activities such as Interfaces status (up/down), configuration changes, user login logout and so on.
Security events such as IDP, ATP Cloud, and security logs such as Content Security logs, and Screen, ATP Cloud and so on.
Collects security alerts and import those alerts to Security Hub in security finding format.
To import security events to Security Hub, you need to configure CloudWatch log collection and import the security events based on the log messages.
Security Hub collects security data from across AWS accounts, services, and supported third-party partners and helps you analyze your security trends and identify the highest priority security issues. After the AWS security hub support is added on vSRX Virtual Firewall, it helps administrator reduces the effort of collecting and prioritizing security findings across accounts. With the help of Security hub, you can run automated, continuous account-level configuration and compliance checks based on vSRX Virtual Firewall security output.
For the list of events and metrics that are imported, see Table 1 and Table 2.
For more information on the events and their purpose, see Juniper System Log Explorer.
Metric | Description |
---|---|
AV_MANY_MSGS_NOT_SCANNED_MT | Skip antivirus scanning due to excessive traffic |
WEBFILTER_URL_BLOCKED | Web request blocked |
AAMW_CONTENT_FALLBACK_LOG | AAMW content fallback info |
AV_MANY_MSGS_DROPPED_MT | Drop the received file due to excessive traffic |
PFE_SCREEN_MT_CFG_ERROR | screen config failure |
WEBFILTER_URL_REDIRECTED | Web request redirected |
AV_FILE_NOT_SCANNED_PASSED_MT | The antivirus scanner passed the received traffic without scanning because of exceeding the maximum content size |
RT_SCREEN_TCP_SRC_IP | TCP source IP attack |
RT_SCREEN_SESSION_LIMIT | Session limit |
SECINTEL_ACTION_LOG | Secintel action info |
IDP_APPDDOS_APP_STATE_EVENT | IDP: DDOS application state transition event |
AAMW_HOST_INFECTED_EVENT_LOG | AAMW cloud host status event info |
IDP_ATTACK_LOG_EVENT | IDP attack log |
IDP_SESSION_LOG_EVENT | IDP session event log |
AAMW_MALWARE_EVENT_LOG | AAMW cloud malware event info |
WEBFILTER_URL_PERMITTED | Web request permitted |
IDP_PACKET_CAPTURE_LOG_EVENT | IDP packet captutre event log |
RT_SCREEN_WHITE_LIST | Screen white list |
RT_SCREEN_IP | IP attack |
AAMW_SMTP_ACTION_LOG | AAMW SMTP action info |
RT_SCREEN_TCP_DST_IP | TCP destination IP attack |
IDP_APPDDOS_APP_ATTACK_EVENT | IDP: DDOS attack on application |
RT_SCREEN_ICMP | ICMP attack |
IDP_TCP_ERROR_LOG_EVENT | IDP TCP error log |
AV_FILE_NOT_SCANNED_DROPPED_MT | The antivirus scanner dropped the received traffic without scanning because of exceeding the maximum content size |
AAMW_ACTION_LOG | AAMW action info |
PFE_SCREEN_MT_ZONE_BINDING_ERROR | screen config failure |
AV_VIRUS_DETECTED_MT | The antivirus scanner detected a virus |
PFE_SCREEN_MT_CFG_EVENT | screen config |
RT_SCREEN_TCP | TCP attack |
RT_SCREEN_UDP | UDP attack |
AV_SCANNER_DROP_FILE_MT | The antivirus scanner dropped the received traffic because of an internal error |
AAMW_IMAP_ACTION_LOG | AAMW IMAP action info |
AV_SCANNER_ERROR_SKIPPED_MT | Skip antivirus scanning due to an internal error |
AV_MEMORY_INSUFFICIENT_MT | The DRAM size is too small to support antivirus |
Metric | Unit | Description |
---|---|---|
ControlPlaneCPUUtil | Percent | Utilization of the CPU on which control plane tasks are running |
DataPlaneCPUUtil | Percent | Utilization of each CPU on which data plane tasks are running |
DiskUtil | Percent | Disk storage utilization |
ControlPlaneMemoryUtil | Percent | Memory utilization of control plane tasks |
DataPlaneMemoryUtil | Percent | Memory utilization of data plane task |
FlowSessionInUse | Count | Monitors the number of flow session in use, including all those sessions are allocated in valid, invalid, pending and other states. |
FlowSessionUtil | Percent | Flow session utilization |
RunningProcesses | Count | Number of processes in running state. |
Ge00XInputKBPS | Kilobits/Second | Interfaces input statistics on Kilobits per second. Each GE interface will be monitored separately. |
Ge00XInputPPS | Count/Second | Interfaces input statistics on packets per second. Each GE interface will be monitored separately. |
Ge00XOutputKBPS | Kilobits/Second | Interfaces output statistics on Kilobits per second. Each GE interface will be monitored separately. |
Ge00XOutputPPS | Count/Second | Interfaces output statistics on packets per second. Each GE interface will be monitored separately. |
Besides the agent running in vSRX Virtual Firewall, you must configure the AWS console to enable CloudWatch and Security Hub service for vSRX Virtual Firewall, including:
Grant privileges for vSRX Virtual Firewall to post data to CloudWatch and Security Hub
Create a role with corresponding permission in AWS Identity and Access Management (IAM) console
Attach the role to vSRX Virtual Firewall instances in AWS EC2 console
Configure CloudWatch dashboard to display metric items with chart widget
Figure 1 shows how a cloudagent collects data from vSRX Virtual Firewall and posts to AWS services.

Benefits
Observability of events and data on a single platform across applications and infrastructure
Easiest way to collect metric in AWS and on-premises
Improve operational performance and resource optimization
Get operational visibility and insight
Derive actionable insights from logs
CloudWatch Overview
Amazon CloudWatch is a monitoring and management service built for developers, system operators, site reliability engineers (SRE), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, understand and respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health.
You can use CloudWatch to detect anomalous behavior in your environments, set alarms, visualize logs and metrics side by side, take automated actions, troubleshoot issues, and discover insights to keep your vSRX Virtual Firewall 3.0 instances running smoothly.
CloudWatch collects monitoring and operational data in the form of logs, metrics, and events, and visualizes it using automated dashboards so you can get a unified view of your AWS resources, applications, and services that run in AWS and on-premises. You can correlate your metrics and logs to better understand the health and performance of your resources. You can also create alarms based on metric value thresholds you specify, or that can watch for anomalous metric behavior based on machine learning algorithms. To take action quickly, you can set up automated actions to notify you if an alarm is triggered and automatically start auto scaling, for example, to help reduce mean-time-to-resolution. You can also dive deep and analyze your metrics, logs, and traces, to better understand how to improve application performance.
Security Hub Overview
AWS Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. Security Hub is the single place that aggregates, organizes, and prioritizes security alerts. vSRX Virtual Firewall supports Security Hub with authentication to post security finding data to Security Hub.
Various security alerts from your vSRX Virtual Firewall instances are collected by Security Hub. With the integration of Security Hub, you now have a single place that aggregates, organizes, and prioritizes your security alerts, or findings, from your vSRX Virtual Firewall instances. Your findings are visually summarized on integrated dashboards with actionable graphs and tables. You can also continuously monitor your environment using automated compliance checks based on the AWS best practices and Juniper standards. Enable Security Hub using the management console and once enabled, Security Hub will begin aggregating and prioritizing the findings.
Identity and Access Management Console
AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
IAM is a feature of your AWS account offered at no additional charge.
Integration of vSRX Virtual Firewall with AWS Monitoring and Troubleshooting Features
This topic provides details on how to integrate CloudWatch and Security Hub with vSRX Virtual Firewall 3.0 for centralized monitoring and troubleshooting on the AWS console.
- Grant Permission for vSRX Virtual Firewall to access AWS CloudWatch and Security Hub
- Enable Monitoring of vSRX Virtual Firewall Instances with AWS CloudWatch Metric
- Collect, Store, and View vSRX Virtual Firewall Logs to AWS CloudWatch
- Enable and Configure Security Hub on vSRX Virtual Firewall
Grant Permission for vSRX Virtual Firewall to access AWS CloudWatch and Security Hub
This section provides you details on how to enable access on vSRX Virtual Firewall instances to interact with AWS CloudWatch and Security Hub.
Enable Monitoring of vSRX Virtual Firewall Instances with AWS CloudWatch Metric
This procedure provides us steps to enable monitoring of vSRX Virtual Firewall with AWS CloudWatch Metric.
Metric is data about the performance of the system. By enabling CloudWatch Metric monitoring, you can monitor some resources of vSRX Virtual Firewall instances.
Collect, Store, and View vSRX Virtual Firewall Logs to AWS CloudWatch
CloudWatch Logs are used to monitor, store, and access log files from Amazon Elastic Compute Cloud (Amazon EC2) instances, AWS CloudTrail, Route 53, and other sources. For a vSRX Virtual Firewall instance, cloudagent collects both system and security logs and then post these logs to CloudWatchLog. The log collection in cloudagent will cache logs in a time window and post them to CloudWatchLog in a batch.
This procedure provides you details on how to enable and configure CloudWatch Logs on vSRX Virtual Firewall
Enable and Configure Security Hub on vSRX Virtual Firewall
To import security events to AWS Security Hub, you need to configure CloudWatch log collection and then import the security events based on the log messages.
For example:
# set security cloud aws cloudwatch log group vsrx-group
# set security cloud aws cloudwatch log file mylog security-hub-import
# set security cloud aws cloudwatch log file mylog collect-interval
1
# set system syslog file mylog any any
# set system syslog file mylog structured-data
In the above configuration you are configuring CloudWatch log collection on file mylog under /var/log directory and any security events in the log file will be imported from the vSRX Virtual Firewall to Security Hub in the AWS security finding format.
The security-hub-import
option is only supported
on log files with structured-data format. Which means if a message
is logged with plain text format, security events in log messages
cannot be converted to AWS security finding and imported to Security
Hub.
You can view the security findings posted from vSRX Virtual Firewall on the Security Hub console.
