Juniper Atp Cloud Quick Start
Juniper Atp Cloud Quick Start
Juniper Atp Cloud Quick Start
IN THIS GUIDE
Step 1: Begin | 1
Step 1: Begin
IN THIS SECTION
Get Your SRX Series Firewall Ready to Work with Juniper ATP Cloud | 3
In this guide, we provide a simple, three-step path, to quickly get you up and running with Juniper Networks®
Advanced Threat Prevention Cloud (Juniper ATP Cloud). We’ve simplified and shortened the configuration procedures
and included how-to videos that show you how to obtain your ATP license, how to configure SRX Series Firewalls for
Juniper ATP Cloud, and how to use the Juniper ATP Cloud Web Portal to enroll your SRX Series Firewalls and configure
basic security policies.
2
Meet Juniper ATP Cloud
Juniper ATP Cloud is cloud-based threat detection software that protects all hosts in your network against evolving
security threats. Juniper ATP Cloud uses a combination of static and dynamic analysis and machine learning to quickly
identify unknown threats, either downloaded from the Web or sent through email. It delivers a file verdict and risk score
to the SRX Series firewall which blocks the threat at the network level. In addition, Juniper ATP Cloud delivers security
intelligence (SecIntel) feeds consisting of malicious domains, URLs, and IP addresses gathered from file analysis, Juniper
Threat Labs research, and highly reputable third-party threat feeds. These feeds are collected and distributed to SRX
Series firewalls to automatically block command-and-control (C&C) communications.
Here’s an example of how you can deploy Juniper ATP Cloud to protect a host in your network against security threats.
3
Get Your Juniper ATP Cloud License
First things, first. You’ll need to get your Juniper ATP Cloud license before you can start configuring Juniper ATP Cloud
on your firewall device. Juniper ATP Cloud has three service levels: free, basic, and premium. The free license provides
limited functionality and is included with the base software. Contact your local sales office or Juniper Networks partner
to place an order for a Juniper ATP Cloud premium or basic license. Once the order is complete, an activation code is
sent to you by email. You’ll use this code in conjunction with your SRX Series Firewall serial number to generate a
premium or basic license entitlement. (Use the show chassis hardware CLI command to find the serial number of the SRX
Series Firewall).
1. Go to https://license.juniper.net and log in with your Juniper Networks Customer Support Center (CSC) credentials.
2. Select J Series Service Routers and SRX Series Devices or vSRX from the Generate Licenses list.
3. Using your authorization code and SRX Series serial number, follow the instructions to generate your license key.
• If you are using Juniper ATP Cloud with SRX Series Firewalls, then you don't need to enter the license key
because it is automatically transferred to the cloud server. It can take up to 24 hours for your license to be
activated.
• If you are using Juniper ATP Cloud with vSRX Virtual Firewall, the license is not automatically transferred. You'll
need to install the license. For more details, see License Management and vSRX Deployments. After the license is
generated and applied to a specific vSRX Virtual Firewall device, use the show system license CLI command to view
the software serial number of the device.
Get Your SRX Series Firewall Ready to Work with Juniper ATP Cloud
After you've obtained a Juniper ATP Cloud license, you’ll need to configure your SRX Series Firewall to communicate
with the Juniper ATP Cloud Web Portal. Then you can configure policies on the SRX Series Firewall that use Juniper
ATP Cloud cloud-based threat feeds.
NOTE: This guide assumes that you are already familiar with Junos OS CLI commands and syntax, and have
experience with administering SRX Series Firewalls.
Before you begin, make sure you have an SSH connection to an Internet-connected SRX Series Firewall.
• SRX1500
NOTE: For SRX340, SRX345, and SRX550M, as part of initial device configuration, you must run set security
forwarding-process enhanced-services-mode and reboot the device.
New password:
3. Set up interfaces.
The SRX Series Firewall is a zone-based firewall. You’ll need to assign each interface to a zone to pass traffic through
it. To configure security zones, enter the following commands:
NOTE: For the untrust or internal security zone, enable only the services required by the infrastructure for
each specific service.
5. Configure DNS.
6. Configure NTP.
user@host# commit
IN THIS SECTION
Configure Security Polices on the SRX Series Firewall to Use Cloud Feeds | 12
Now that you’ve got the SRX Series Firewall ready to work with Juniper ATP Cloud, let’s log in to the Juniper ATP Cloud
Web Portal and enroll your SRX Series Firewall. You'll need to create a Juniper ATP Cloud Web Portal login account, and
then enroll your SRX Series Firewall in Juniper ATP Cloud Web Portal.
• Your single sign-on or Juniper Networks Customer Support Center (CSC) credentials.
• A security realm name. For example, Juniper-Mktg-Sunnyvale. Realm names can contain only alphanumeric
characters and the dash (“—”) symbol.
• An email address and password. This will be your login information to access the Juniper ATP Cloud management
interface.
6
Let's get going!
1. Open a Web browser and connect to the Juniper ATP Cloud Web Portal at https://sky.junipersecurity.net. Select
your geographical region— North America, Canada, European Union, or Asia Pacific and click Go.
You can also connect to the ATP Cloud Web Portal using the customer portal URL for your location as shown below.
APAC https://apac.sky.junipersecurity.net
Canada https://canada.sky.junipersecurity.net
• Your single sign-on or Juniper Networks Customer Support Center (CSC) credentials
Now that you've created an account, let's enroll your SRX Series Firewall in Juniper ATP Cloud. In this guide, we show
you how to enroll your device using the Juniper ATP Cloud Web Portal hosted by Juniper. However, you can also enroll
your device using the Junos OS CLI, the J-Web Portal, or the Junos Space Security Director Web Portal. Choose the
configuration tool that's right for you:
• Juniper ATP Cloud Web Portal—The ATP Cloud Web Portal is hosted by Juniper Networks in the cloud. You don’t
need to download or install Juniper ATP Cloud on your local system.
• CLI commands—Starting in Junos OS Release 19.3R1, you can enroll a device to the Juniper ATP Cloud using the
Junos OS CLI on your SRX Series Firewall. See Enrolling an SRX Series Firewall without Using Juniper ATP Cloud
Web Portal.
• J-Web Portal—The J-Web Portal comes preinstalled on the SRX Series Firewall and can also be used to enroll an SRX
Series Firewall to Juniper ATP Cloud. For details, watch this video:
• Security Director Policy Enforcer—If you are a licensed Junos Space Security Director Policy Enforcer user, you can
use Security Director Policy Enforcer to set up and use Juniper ATP Cloud. For more information about using
Security Director with Juniper ATP Cloud, see How to Enroll Your SRX Series Firewall in Juniper Advanced Threat
Prevention (ATP) Cloud Using Policy Enforcer.
When you enroll an SRX Series Firewall, you establish a secure connection between the Juniper ATP Cloud server.
Enrollment also:
• Downloads and installs certificate authority (CA) licenses onto your SRX Series Firewall
NOTE: Juniper ATP Cloud requires that both your Routing Engine (control plane) and Packet Forwarding Engine
(data plane) are connected to the Internet. You don’t need to open any ports on the SRX Series Firewall to
communicate with the cloud server. However, if you have a device in between, such as a firewall, then that
device must have ports 80, 8080, and 443 open.
Also, the SRX Series Firewall must be configured with DNS servers in order to resolve the cloud URL.
Enroll Your SRX Series Firewall in Juniper ATP Cloud Web Portal
Here's how to enroll your SRX Series Firewall in Juniper ATP Cloud Web Portal:
NOTE: You must run the op url command from operational mode. Once generated, the op url command is
valid for 7 days. If you generate a new op url command within that time period, the old command is no longer
valid. (Only the most recently generated op url command is valid.)
5. Log in to your SRX Series Firewall. The SRX Series CLI opens on your screen.
6. Run the op url command that you previously copied from the pop-up window. Simply paste the command into the
CLI and press Enter.
The SRX Series Firewall will make a connection to the ATP Cloud server and begin downloading and running the op
scripts. The status of the enrollment appears on screen.
7. (Optional) Run the following command to view additional information:
request services advanced-anti-malware diagnostics customer-portal detail
9
Example
You can use the show services advanced-anti-malware status CLI command on your SRX Series Firewall to verify that a
connection has been made to the cloud server from the SRX Series Firewall. After it’s enrolled, the SRX Series
Firewall communicates with the cloud through multiple, persistent connections established over a secure channel
(TLS 1.2). The SRX Series Firewall is authenticated using SSL client certificates.
You can also enroll an SRX Series Firewall to Juniper ATP Cloud using J-Web. This is the Web interface that comes up
on the SRX Series Firewall.
• Decide which region the realm you create will cover because you must select a region when you configure a realm.
• Ensure the device is registered in the Juniper ATP Cloud Web Portal.
• In CLI mode, configure set security forwarding-process enhanced-services-mode on your SRX300, SRX320, SRX340,
SRX345, and SRX550M devices to open ports and get the device ready to communicate with Juniper ATP Cloud.
Here's how to enroll your SRX Series Firewall using J-Web Portal.
a. In the J-Web UI, navigate to Device Administration > ATP Management > Enrollment.
NOTE:
• The list displays the existing proxy profiles created using the Proxy Profile page (Security Policies &
Objects > Proxy Profiles).
• The SRX Series Firewall and Juniper ATP Cloud communicate through the proxy server if a proxy
profile is configured. Otherwise, they directly communicate with each other
• Connection Type—Select the connection type server (from the list) that the proxy profile uses:
• Port Number—Select a port number for the proxy profile. Range is 0 through 65,535.
Click OK.
Applying proxy enables the SRX Series Firewall and Juniper ATP Cloud to communicate through the proxy server.
NOTE: If there are any existing configuration changes, a message appears for you to commit the changes
and then to proceed with the enrollment process.
11
• Create New Realm—By default, this option is disabled if you have a Juniper ATP Cloud account with an
associated license. Enable this option to add a new realm if you do not have a Juniper ATP Cloud account with
an associated license.
• Location—By default, the region is set as Others. Enter the region URL.
• Password—Enter a unique string at least eight characters long. Include both uppercase and lowercase letters,
at least one number, and at least one special character; no spaces are allowed, and you cannot use the same
sequence of characters that are in your e-mail address.
• Realm—Enter a name for the security realm. This should be a name that is meaningful to your organization. A
realm name can contain only alphanumeric characters and the dash symbol. Once created, this name cannot
be changed.
c. Click OK.
Security policies, such as anti-malware and security-intelligence policies, use Juniper ATP Cloud threat feeds to inspect
files and quarantine hosts that have downloaded malware. Let's create a security policy, aamw-policy, for an SRX Series
Firewall.
user@host# commit
2. (Optional) Configure the anti-malware source interface.
The source interface is used to send files to the cloud. If you configure the source-interface but not the source-
address, the SRX Series Firewall uses the IP address from the specified interface for connections. If you are using a
routing instance, you must configure the source interface for the anti-malware connection. If you are using a
nondefault routing instance, you don’t have to complete this step on the SRX Series Firewall.
NOTE: For Junos OS Release 18.3R1 and later, we recommend that you use a management routing instance
for fxp0 (dedicated management interface to the routing-engine of the device) and the default routing
instance for traffic.
user@host# set services security-intelligence profile secintel_profile rule secintel_rule match threat-level [ 7 8 9 10 ]
user@host# set services security-intelligence profile secintel_profile rule secintel_rule then action block drop
user@host# set services security-intelligence profile secintel_profile rule secintel_rule then log
user@host# set services security-intelligence profile secintel_profile default-rule then action permit
13
user@host# set services security-intelligence profile secintel_profile default-rule then log
user@host# set services security-intelligence profile ih_profile rule ih_rule match threat-level [ 10 ]
user@host# set services security-intelligence profile ih_profile rule ih_rule then action block drop
user@host# set services security-intelligence profile ih_profile rule ih_rule then log
user@host# commit
4.
NOTE: If you wish to inspect HTTPs traffic, you must optionally enable SSL-Proxy in your security policies. To
configure SSL-Proxy, refer to Step 4 and Step 5.
Configuring these features will impact the performance of the traffic traversing the applied security policies.
(Optional) Generate public/private key pairs and self-signed certificates, and install CA certificates.
user@host> request security pki generate-key-pair certificate-id ssl-inspect-ca size 2048 type rsa
user@host> request security pki ca-certificate ca-profile-group load ca-group-name trusted-ca-* filename default
NOTE: The internal clients must trust certificates generated by the SRX Series Firewall. Therefore, you must
import the root CA as a trusted CA into client browsers. This is required for the client browsers to trust the
certificates signed by the SRX Series Firewall. See Importing a Root CA Certificate into a Browser.
5. (Optional) Configure the SSL forward proxy profile (SSL forward proxy is required for HTTPS traffic in the data plane).
user@host# set services ssl proxy profile ssl-inspect-profile-dut root-ca ssl-inspect-ca
user@host# set services ssl proxy profile ssl-inspect-profile-dut actions log all
user@host# commit
6. Configure the security firewall policy.
user@host# set security policies from-zone trust to-zone untrust policy 1 match source-address any
user@host# set security policies from-zone trust to-zone untrust policy 1 match destination-address any
user@host# set security policies from-zone trust to-zone untrust policy 1 match application any
14
user@host# set security policies from-zone trust to-zone untrust policy 1 then permit application-services ssl-proxy profile-
name ssl-inspect-profile-dut
user@host# set security policies from-zone trust to-zone untrust policy 1 then permit application-services advanced-anti-
malware-policy aamw-policy
user@host# set security policies from-zone trust to-zone untrust policy 1 then permit application-services security-
intelligence-policy secintel_policy
Congratulations! You've completed the initial configuration for Juniper ATP Cloud on your SRX Series Firewall!
IN THIS SECTION
What's Next? | 14
General Information | 15
What's Next?
Now that you have basic security intelligence and anti-malware policies in place, you'll want to explore what else you
can do with Juniper ATP Cloud.
Specify trusted and untrusted sources for your network See Create Allowlists and Blocklists
Configure how you’d like ATP Cloud to handle email See Email Management Overview
Define which files to send to the cloud for inspection See Create File Inspection Profiles
Configure advanced Juniper ATP Cloud features See the Juniper Advanced Threat Prevention Administration Guide
15
General Information
View the Juniper ATP Cloud System Administration Guide See Juniper Advanced Threat Prevention Administration Guide
See all documentation available for Juniper ATP Cloud Visit the Juniper Advanced Threat Prevention (ATP) Cloud
Documentation page in the Juniper TechLibrary
See all documentation available for Policy Enforcer Visit the Policy Enforcer Documentation page in the Juniper
TechLibrary.
See, automate, and protect your network with Juniper Security Visit the Security Design Center
Stay up-to-date on new and changed features and known and See the Juniper Advanced Threat Prevention Cloud Release
resolved issues Notes
Troubleshoot some typical problems you may encounter with See the Juniper Advanced Threat Prevention Cloud
Juniper ATP Cloud Troubleshooting Guide
Our video library continues to grow! We’ve created many, many videos that demonstrate how to do everything from
install your hardware to configure advanced Junos OS network features. Here are some great video and training
resources that will help you expand your knowledge of Junos OS.
View an ATP Cloud Demonstration that shows you how to Watch the ATP Cloud Demonstration video
setup and configure ATP Cloud
Learn how to use the Policy Enforcer Wizard Watch the Using the Policy Enforcer Wizard video
Get short and concise tips and instructions that provide quick See Learning with Videos on Juniper Networks main YouTube
answers, clarity, and insight into specific features and functions page
of Juniper technologies
16
(Continued)
View a list of the many free technical trainings we offer at Visit the Getting Started page on the Juniper Learning Portal
Juniper
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the
United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the
property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document.
Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Copyright © 2023 Juniper Networks, Inc. All rights reserved.