Juniper Secure Connect Administrator Guide
Juniper Secure Connect Administrator Guide
Guide
Published
2020-11-10
ii
Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in
the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks
are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right
to change, modify, transfer, or otherwise revise this publication without notice.
The information in this document is current as of the date on the title page.
Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related
limitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with)
Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement
(“EULA”) posted at https://support.juniper.net/support/eula/. By downloading, installing or using such software, you
agree to the terms and conditions of that EULA.
iii
Table of Contents
About the Documentation | v
Documentation Conventions | v
Feature Support Comparison Between Juniper Secure Connect and Dynamic VPN | 12
License Requirements | 16
Licensing Requirements | 17
Authentication Methods | 29
Windows | 102
macOS | 108
Android | 111
v
IN THIS SECTION
Documentation Conventions | v
Read this guide to learn how you, as a system administrator can configure a remote-access VPN for Juniper
Secure Connect on SRX Series devices. You can also refer this guide, if you are planning to migrate from
Dynamic VPN to Juniper Secure Connect.
®
To obtain the most current version of all Juniper Networks technical documentation, see the product
documentation page on the Juniper Networks website at https://www.juniper.net/documentation/.
If the information in the latest release notes differs from the information in the documentation, follow the
product Release Notes.
Juniper Networks Books publishes books by Juniper Networks engineers and subject matter experts.
These books go beyond the technical documentation to explore the nuances of network architecture,
deployment, and administration. The current list can be viewed at https://www.juniper.net/books.
Documentation Conventions
Laser warning Alerts you to the risk of personal injury from a laser.
Table 2 on page vi defines the text and syntax conventions used in this guide.
Bold text like this Represents text that you type. To enter configuration mode, type
the configure command:
user@host> configure
Fixed-width text like this Represents output that appears on user@host> show chassis alarms
the terminal screen.
No alarms currently active
Italic text like this • Introduces or emphasizes important • A policy term is a named structure
new terms. that defines match conditions and
• Identifies guide names. actions.
Italic text like this Represents variables (options for Configure the machine’s domain
which you substitute a value) in name:
commands or configuration
[edit]
statements.
root@# set system domain-name
domain-name
Text like this Represents names of configuration • To configure a stub area, include
statements, commands, files, and the stub statement at the [edit
directories; configuration hierarchy protocols ospf area area-id]
levels; or labels on routing platform hierarchy level.
components. • The console port is labeled
CONSOLE.
< > (angle brackets) Encloses optional keywords or stub <default-metric metric>;
variables.
# (pound sign) Indicates a comment specified on the rsvp { # Required for dynamic MPLS
same line as the configuration only
statement to which it applies.
[ ] (square brackets) Encloses a variable for which you can community name members [
substitute one or more values. community-ids ]
GUI Conventions
viii
Bold text like this Represents graphical user interface • In the Logical Interfaces box, select
(GUI) items you click or select. All Interfaces.
• To cancel the configuration, click
Cancel.
> (bold right angle bracket) Separates levels in a hierarchy of In the configuration editor hierarchy,
menu selections. select Protocols>Ospf.
Documentation Feedback
We encourage you to provide feedback so that we can improve our documentation. You can use either
of the following methods:
• Online feedback system—Click TechLibrary Feedback, on the lower right of any page on the Juniper
Networks TechLibrary site, and do one of the following:
• Click the thumbs-up icon if the information on the page was helpful to you.
• Click the thumbs-down icon if the information on the page was not helpful to you or if you have
suggestions for improvement, and use the pop-up form to provide feedback.
Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC).
If you are a customer with an active Juniper Care or Partner Support Services support contract, or are
ix
covered under warranty, and need post-sales technical support, you can access our tools and resources
online or open a case with JTAC.
• JTAC policies—For a complete understanding of our JTAC procedures and policies, review the JTAC User
Guide located at https://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.
• JTAC hours of operation—The JTAC centers have resources available 24 hours a day, 7 days a week,
365 days a year.
For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called
the Customer Support Center (CSC) that provides you with the following features:
• Find solutions and answer questions using our Knowledge Base: https://kb.juniper.net/
To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool:
https://entitlementsearch.juniper.net/entitlementsearch/
You can create a service request with JTAC on the Web or by telephone.
• Visit https://myjuniper.juniper.net.
Overview | 11
11
Overview
With today’s modern, distributed workforce, organizations need to keep remote users connected and
productive while ensuring business continuity and security. Organizations need to provide endpoint
protection as part of a comprehensive and connected security strategy.
Juniper Secure Connect is a client-based SSL-VPN application that allows you to securely connect and
access protected resources on your network. This application, when combined with SRX Series Services
Gateways, helps organizations quickly achieve dynamic, flexible, and adaptable connectivity from devices
anywhere across the globe. Juniper Secure Connect extends visibility and enforcement from client to cloud
using secure VPN connections.
• SRX Series firewall—Serves as an entry and exit point for communication between users with Juniper
Secure Connect and the protected resources on the corporate network or in the cloud.
• Juniper Secure Connect application—Secures connectivity between the protected resources and the
host clients running Microsoft Windows, Apple macOS, and Google Android operating systems. The
Juniper Secure Connect application connects through a VPN tunnel to the SRX Series firewall to gain
access to the protected resources in the network.
Figure 1 on page 12 illustrates the Juniper Secure Connect remote access solution for establishing secure
VPN connectivity for remote users at different locations.
12
This document is for system administrators who want to configure remote-access VPN for Juniper Secure
Connect on SRX Series devices. If you are a remote user, see Juniper Secure Connect User Guide.
• Easy management of remote clients, policies, and VPN events from a single console (using J-Web)
This topic describes the differences between Juniper Secure Connect and dynamic VPN.
Figure 2 on page 13 shows the high-level comparison between Juniper Secure Connect and dynamic VPN.
13
Figure 2: High-Level Feature Comparison Between Juniper Secure Connect and Dynamic VPN
Table 3 on page 13 shows the connection feature related differences between dynamic VPN and Juniper
Secure Connect on SRX Series devices:
Table 3: Differences Between Dynamic VPN and Juniper Secure Connect on SRX Series devices
Connection
Features Dynamic VPN Juniper Secure Connect
Figure 3 on page 14 shows the deployment scenario for Juniper Secure Connect. Ensure you adjust the
configuration values to map to your environment.
For traffic to flow correctly, you can either include a route in the protected network for the IP address
that you assign to the clients directs to the SRX Series devices or NAT all client traffic coming into the
protected networks.
RELATED DOCUMENTATION
System Requirements | 16
System Requirements
• SRX Series device or vSRX instance running Junos OS Release 20.3R1 or later.
• Juniper Secure Connect application software installed and running on supported operating systems. For
details on installation, see Juniper Secure Connect User Guide.
• We recommend using J-Web and Security Director to configure Juniper Secure Connect on SRX Series
device. To add a new license key, delete one or more license keys, update license keys, or download
license keys for J-Web, see Manage Your Licenses.
To enable J-Web access on your security device, use the following commands:
License Requirements
You need an active SRX-based license to use Juniper Secure Connect. By default, each SRX Series device
includes two built-in concurrent user licenses. You must purchase and install a license for additional
concurrent users. Contact your Juniper Networks representative for remote-access licensing. To understand
more about Juniper Secure Connect licenses, see Licenses for Juniper Secure Connect and Managing
Licenses.
RELATED DOCUMENTATION
Overview | 11
Migrating from Junos OS Dynamic VPN to Juniper Secure Connect | 17
Preparing Juniper Secure Connect Configuration | 19
17
SUMMARY
This topic is intended for the users who have existing dynamic VPN deployments and are planning
to migrate to Juniper Secure Connect. If you are a new user for Juniper Secure Connect, you can
skip this topic.
• Learn about feature comparison. See “Feature Support Comparison Between Juniper Secure Connect
and Dynamic VPN” on page 12
• Learn about feature enhancement. See “Benefits of Juniper Secure Connect” on page 11
BEST PRACTICE: We recommend you to backup the current working configuration if you later
need to rollback and have a rolled over your history of rollbacks for some reason.
Licensing Requirements
As a first step, ensure that you have installed the license for Juniper Secure Connect if you need more
than two concurrent users.
• Verify the from-zone option in the current Dynamic VPN policies. The from-zone option will be the
source-zone used in the Juniper Secure Connect VPN wizard.
• Delete IKE and IPsec configurations created for the Dynamic VPN configuration under edit security
dynamic-vpn, edit security ike, and edit security ipsec hierarchies.
We recommend you to use J-Web wizard for Juniper Secure Connect configuration.
We recommend you to start with a new deployment of Juniper Secure Connect. Because migrating the
current settings is likely to cause overlooking of one or more values. Use the following guidance for the
fresh setup of Juniper Secure Connect.
• Check if you have any split tunneling rules. These rule specify remote protected resources behind the
SRX Series device, that the client communicates with, over the VPN tunnel. You can check your rules
at [set security dynamic-vpn clients configuration-name remote-protected-resources] hierarchy-level.
The same split tunnel definitions are used in the Secure Connect VPN wizard as protected-networks.
• Start a new deployment in the J-Web deployment wizard. We recommend enabling the Auto-create
Firewall Policy option to create a firewall policy automatically.
• You can reuse the access profiles and address-assignment pool in this workflow.
• If you already have a route from your network pointing to the SRX Series devices and included that IP
address in the address assignment pool or defined through the RADIUS, you can disable the use of
source NAT.
RELATED DOCUMENTATION
IN THIS SECTION
Authentication Methods | 29
Before you deploy Juniper Secure Connect, you must ensure that the SRX Series device uses either a
signed certificate or a self-signed certificate instead of the default system-generated certificate.
You can generate a certificate request or a self-signed certificate by navigating to Device Administration
> Certificate Management > Device Certificates in the J-Web interface as shown in Figure 4 on page 20.
Below are the minimum of values that you should configure. Ensure that these values matches with your
own organization. If you initiate a Certificate Signing Request (CSR), the certificate must be signed by your
CA before it is loaded on the SRX Series device.
20
After creating a self-signed or loading a signed certificate, you must bind the certificate to the SRX Series
device by navigating to Basic Settings > Management Access Configuration > Services > HTTPS > HTTPS
certificate and select the appropriate name.
When the certificate has been loaded to the SRX Series device, you can validate the certificate by viewing
the certificate information in your browser bar. The steps involved in viewing the certificate information
depends on your browser and browser version. Figure 5 on page 21 shows the certificate information that
you configured in the SRX Series device.
21
Figure 6 on page 22 shows all the details of the certificate that is configured in the SRX Series device.
22
You must check for the following from the certificate information in the browser:
• Check if the Subject Alternative Name matches with your generated certificate.
• The Thumbprint/Fingerprint is also important if you not exporting the CA certificate from the SRX Series
device to all clients. In such cases, it will be displayed in a warning message.
We recommend that you export the self-signed certificate from the SRX Series device in .pem format, or
the CA root certificate from the CA that signed your CSR to each client. You can do this manually or
distributed using a client rollout package for Windows and macOS. See Create Installation Packages for
Juniper Secure Connect Rollout on Windows and Create Rollout Packages for Juniper Secure Connect Installation
on macOS.
Table 4 on page 23 lists the Juniper Secure Connect application directory location to place the exported
certificate on different platforms:
23
Windows C:\ProgramData\Juniper\SecureConnect\cacerts\
Android /Juniper/Export
Before we start configuring Juniper Secure Connect on SRX Series device, lets understand at high-level
how Juniper Secure Connect solution works.
24
Different stages of establishing connectivity between a Juniper Secure Connect application and an SRX
Series device.
1. A remote user downloads Juniper Secure Connect application on the device such as smart phone, or
a laptop, or its distributed by the organizations software distribution system.
2. When the user initiates a connection, the application validates whether the gateway certificate is valid.
NOTE: If the SRX Series device has a system-generated certificate enabled, the user cannot
establish any connection with the application.
If the gateway uses a certificate where the root certificate has not been distributed to the application
(Create Installation Packages for Juniper Secure Connect Rollout on Windows and Create Rollout Packages
for Juniper Secure Connect Installation on macOS), the user will be prompted with a warning message
shown in Figure 8 on page 24, Figure 9 on page 25, and Figure 10 on page 26 based on the platform
where the Juniper Secure Connect application is installed.
Figure 8 on page 24 is a sample warning message on Windows platform if the application does not
have a root certificate.
Figure 9 on page 25 is a sample warning message on macOS platform if the application does not have
a root certificate.
25
Figure 10 on page 26 is a sample warning message on Android platform if the application does not
have a root certificate.
26
The appearance of the warning message page differs based on the platform where the Juniper Secure
Connect application is installed.
Details of the warning message is based on the certificate that is configured on Juniper Secure Connect.
Table 5 on page 26 shows the details in the sample warning message.
SAN Subject Alternative Name (SAN) represents the subject alternative name in the
certificate.
You as a system administrator must inform your users what action to take when a warning message is
displayed. The easiest way to validate your certificate as an administrator is to click on the warning
message in the browser toolbar to display the certificate details as shown in Figure 5 on page 21 and
Figure 6 on page 22 or load the correct root certificate on the client.
Below warning message is displayed if the application cannot reach the CRL (Certificate Revocation
List) of the signed certificate loaded on the SRX Series device.
WARNING: When you use a signed certificate and if the Juniper Secure Connect
application cannot reach the Certificate Revocation List (CRL) to validate the gateway
certificate, the application prompts the users with the warning message (as shown
in Figure 11 on page 27, Figure 12 on page 28, and Figure 13 on page 29) each
time they connect until the CRL is accessible. Juniper Networks' strongly
recommends you or your user to report this error message to your IT organization
to solve the CRL download failure.
Figure 11: Warning Message when Application Cannot Validate Gateway Certificate (Windows)
28
Figure 12: Warning Message when Application Cannot Validate Gateway Certificate (macOS)
29
Figure 13: Warning Message when Application Cannot Validate Gateway Certificate (Android)
3. SRX device authenticates the user based on credentials (user name, password, and domain) or certificates.
4. After a successful authentication, the client downloads and installs the latest configuration policy
defined on the SRX Series device. This step ensures that the client always uses the latest configuration
policy defined by the administrator
5. The client establishes a secure VPN connection based on downloaded configuration profile.
Now that we know how Juniper Secure Connect works, lets understand more about the different
authentication methods available.
Authentication Methods
There is two ways to authenticate users establishing secure connectivity with juniper secure connect,
either local or external authentication, each of these two ways have certain restrictions described below.
30
• Local Authentication—In local authentication, the SRX Series device validates the user credentials by
checking them in the local database. In this method, the administrator handles change of password or
resetting of forgotten password. Here, it requires that an user must remember a new password. This
option is not much preferred from a security standpoint.
• External Authentication—In external authentication, you can allow the users to use the same user
credentials they use when accessing other resources on the network. In many cases, user credentials
are domain logon used for Active Directory or any other LDAP authorization system. This method
simplifies user experience and improves the organization’s security posture; because you can maintain
the authorization system with the regular security policy used by your organization.
Multi Factor Authentication—To add an extra layer of protection, you can also enable Multi Factor
Authentication (MFA). In this method, a RADIUS proxy is used to send a notification message to a device
such as the users’ smart phone. Users must accept the notification message to complete the connection.
How it works? Local database External RADIUS SRX Series Device validates the user credentials
maintains user server manages all by checking them in the local database (local
accounts and user user accounts and authentication)
groups and uses performs
External Radius server performs authentication
configured password authentication
service (external authentication).
to authenticate the service.
users
Username and Yes Yes Users must provide user name and password when
password initiating a new connection.
Now, we got an idea about the authentication methods that Juniper Secure Connect supports. Now it is
time for us to get into J-Web and get ourselves familiar with configuration options and various fields
available in the GUI.
Secure Connect VPN solution lets you create a remote access VPN tunnel between a remote user and the
internal network in few steps with intuitive, easy to use VPN wizard in J-Web.
Once you navigate to VPN > IPsec VPN and select Create VPN > Remote Access > Juniper Secure Connect,
the Create Remote Access (Juniper Secure Connect) page appears as shown in Figure 14 on page 31.
The VPN configuration wizard allows you to configure Juniper Secure Connect in just few steps as shown
in Table 7 on page 32.
32
Name Name for the remote access connection. This name will be displayed
on the Juniper Secure Connect application on remote client device when
you do not select a default profile.
Example:
Routing Mode Routing Mode is set to Traffic Selector (Auto Route Insertion) by default.
You cannot change this option.
Authentication Method Pre-shared: This authentication method is simple and easy to use, but
it is less secure than the certificates. If you select pre-shared option,
you can use:
Local Gateway • SRX Series device settings such as interfaces, authentication options,
tunnel interfaces, SSL VPN, and NAT details including the following
options:
• Network information to enable remote clients to connect to the
gateway.
• Specify how the gateway authenticates users.
IKE and IPSec • IKE and IPSec options on the SRX Series device for Juniper Secure
Connect remote client connections.
• IKE Settings and IPsec Settings are advanced options. J-Web is already
configured with default values for IKE and IPsec fields.
• IKE settings used in negotiation of authenticating the device when a
Juniper Secure Connect application initiates a connection to the SRX
Series device.
• IPsec settings specify connection settings, and security associations
to govern authentication, encryption, encapsulation, and key
management.
Now you have understanding about the configuration options. lets get started with the configuration.
Based on the authentication method you have selected, see either of these topics:
RELATED DOCUMENTATION
System Requirements | 16
3 CHAPTER
We assume that you have completed the basic setup of your SRX Series devices, including interfaces,
zones, and security policies as illustrated in the “Deployment Scenario for Juniper Secure Connect” on
page 14.
Figure 17 on page 37 shows an example of the J-Web Configure tab where VPN is selected.
b. At the right corner of the page, select Create VPN > Remote Access > Juniper Secure Connect to
create the IPsec VPN setting for Juniper Secure Connect. The Create Remote Access (Juniper Secure
Connect) page appears.
Figure 20 on page 38 shows an example of the create remote access page with pre-shared key
authentication method.
Figure 20: Create Remote Access Page For Pre-shared Key Authentication Method
3. On the Create Remote Access (Juniper Secure Connect) page (see Figure 21 on page 38):
a. Enter the name for the Remote Access Connection (this is, the name that will be displayed on the
End Users Realm Name in Juniper Secure Connect application) and a description.
b. The routing mode is set to Traffic Selector (Auto Route Insertion) by default.
c. Select the authentication method. For this example, let’s select Pre-shared Key from the drop-down
list.
d. Select Yes to create the firewall policy automatically using the Auto-create Firewall Policy option.
4. Click Remote User icon to configure the Juniper Secure Connect application settings.
Configure the remote user client by selecting the options on the Remote User page and then clicking
OK :
Remote User
Settings Description
Default Profile The Default Profile is enabled by default. If you do not want this profile to be the default profile,
click the toggle button.
If you enable Default Profile for the VPN connection profile, Juniper Secure Connect
automatically selects default profile as realm name (in this example: https://12.12.12.12/). In
this case, it is optional to enter the realm name in Juniper Secure Connect.
If you disable Default Profile for the VPN connection profile, you must enter the realm name
along with the gateway address (in this example:
https://12.12.12.12/JUNIPER_SECURE_CONNECT) in Juniper Secure Connect.
40
Remote User
Settings Description
Connection Mode To establish the client connection manually or automatically, select the appropriate option.
• If you select Manual, then in the Juniper Secure Connect application, to establish a connection,
you must either click the toggle button or select Connection > Connect from the menu.
• If you select Always, then Juniper Secure Connect automatically establishes the connection.
Known Limitation:
Android device: If you use or select Always, then the configuration is downloaded from the
first used SRX device. If the first SRX device configuration changes or if you connect to a new
SRX device, the configuration does not get downloaded to the Juniper Secure Connect
application.
This means that once you connect in the Always mode using the Android device, any
configuration changes in the SRX device do not take effect on Juniper Secure Connect.
SSL VPN To enable support for SSL VPN connection from the Juniper Secure Connect application to the
SRX Series devices, click the toggle button. Use this option when IPsec ports are not allowed.
By enabling SSL VPN, the client has the flexibility in connecting the SRX Series devices. By
default, SSL VPN is enabled.
Biometric This option is disabled by default. If you enable this option, when you click connect in Juniper
authentication Secure Connect, Juniper Secure Connect displays an authentication prompt.
This option allows the user to protect their credentials using the operating system’s built-in
biometric authentication support.
Dead Peer Dead Peer Detection (DPD) is enabled by default to allow the client to detect if the SRX Series
Detection device is reachable and if the device is not reachable, disable the connection till reachability is
restored.
Windows Logon This option allows users to logon to the local Windows system through an already established
VPN tunnel (using Windows Pre-Logon), so that it is authenticated to the central Windows
domain or Active Directory.
a. If you enable Gateway is behind NAT, a text box appears. In the text box, enter the NAT IP address.
We support only IPv4 addresses. NAT address is the external address.
c. In the External Interface field, select the IP address for the clients to connect. You must enter this
same IP address (in this example: https://12.12.12.12/) for the Gateway Address field in the Juniper
Secure Connect application.
If you enable Gateway is behind NAT, then the NAT IP address becomes the gateway address.
d. From the Tunnel Interface drop-down list, select an interface to bind it to the route-based VPN.
Alternatively click Add. If you click Add, the Create Tunnel Interface page appears.
The next available ST0 logical interface number is displayed in the Interface Unit field and you can
enter a description for this interface. Select the zone to add this tunnel interface to. If Auto-create
Firewall Policy (in Create Remote Access page) is set to Yes, the firewall policy uses this zone. Click
OK.
f. From the User Authentication drop-down list, select an existing access profile or click Add to create
a new access profile. If you click Add, the Create Access Profile page appears.
Enter the access profile name. From the Address Assignment drop-down list, select an address pool
or click Create Address Pool. If you click Create Address Pool, the Create Address Pool page appears.
• Enter the details for the local IP pool that is in the VPN policy for the clients. Enter a name for
the IP address pool.
• Enter the network address that you use for the address assignment.
• Enter your DNS server address. Enter WINS server details, if required. Now click the add icon (+)
to create the address range to assign IP addresses to the clients.
• Enter the name, and the lower and higher limits. After entering the details, click OK.
Select the Local check box to create local authentication user, where all the authentication details
are stored on the SRX Series devices. If you click the add icon (+), the Create Local Authentication
User window appears.
Enter a username and password, and then click OK. Click OK again to complete the access profile
configuration.
g. From the SSL VPN Profile drop-down list, select an existing profile or click Add to create a new SSL
VPN profile. If you click Add, the Add SSL VPN Profile page appears.
Figure 28 on page 45 shows an example of the Add SSL VPN Profile page.
On the Add SSL VPN Profile page, you can configure the SSL VPN profile. Enter the SSL VPN profile
name in the Name field, and enable logging using the toggle, if required. In the SSL Termination
Profile field, select the SSL termination profile from the drop-down list. SSL termination is a process
where the SRX Series devices acts as an SSL proxy server, and terminates the SSL session from the
client. If you want to create a new SSL termination profile, click Add. The Create SSL Termination
Profile page appears.
Figure 29 on page 46 shows an example of the Create SSL Termination Profile page.
46
• Enter the name for the SSL termination profile and select the server certificate that you use for
the SSL termination on the SRX Series devices. Click Add to add a new server certificate or click
Import to import the server certificate. The server certificate is a local certificate identifier. Server
certificates are used to authenticate the identity of a server.
• Click OK.
h. The Source NAT Traffic option is enabled by default. When Source NAT Traffic is enabled, all traffic
from the Juniper Secure Connect application is NATed to the selected interface by default. Click
the toggle button to disable the Source NAT Traffic option. If the option is disabled, you must ensure
that you have a route from your network pointing to the SRX Series devices for handling the return
traffic correctly.
i. Under Protected Networks, click add icon (+) to select the networks that the Juniper Secure Connect
application can connect to.
By default, any network 0.0.0.0/0 is allowed. If you configure a specific network, split tunneling for
Juniper Secure Connect application is enabled. If you retain the default value, you can restrict access
to your defined networks by adjusting the firewall policy from the client network. Click OK, and the
selected networks are now in the list of protected networks. Click OK to complete the local gateway
configuration.
IKE Settings and IPsec Settings are advanced options. J-Web is already configured with default
values for the IKE and IPsec parameters. It is not mandatory to configure these settings.
6. You can now find the URL for the remote users to connect to. Copy and store this URL for sharing with
your remote users. You need only the /xxxx information if this configuration is not your default profile.
Figure 32 on page 48 highlights the URL that remote user must enter in the Gateway address field in
Juniper Secure Connect application to establish remote access connection.
a. Click Save to complete the Juniper Secure Connect VPN configuration and associated policy if you
have selected the auto policy creation option.
b. Click the highlighted Commit button (at the top right of the page next to Feedback Button) to
commit the configuration.
Download and install Juniper Secure Connect application on the client machine. Launch Juniper Secure
Connect and connect to the gateway address of the SRX Series device. See Juniper Secure Connect User
Guide for more details.
49
RELATED DOCUMENTATION
Overview | 11
External User Authentication Using RADIUS | 49
Certificate-Based Validation Using EAP-MSCHAPv2 Authentication | 64
Certificate-Based Validation Using EAP-TLS Authentication | 81
Monitor Juniper Secure Connect | 100
We assume that you have completed the basic setup of your SRX Series devices, including interfaces,
zones, and security policies as illustrated in the “Deployment Scenario for Juniper Secure Connect” on
page 14.
Figure 35 on page 51 shows an example of the J-Web Configure tab where VPN is selected.
b. At the right corner of the page, select Create VPN > Remote Access > Juniper Secure Connect to
create the IPsec VPN setting for Juniper Secure Connect. The Create Remote Access (Juniper Secure
Connect) page appears.
Figure 38 on page 52 shows an example of the create remote access page with pre-shared key
authentication method.
Figure 38: Create Remote Access Page For Pre-shared Key Authentication Method
3. On the Create Remote Access (Juniper Secure Connect) page (see Figure 39 on page 52):
a. Enter the name for the Remote Access Connection (this is, the name that will be displayed on the
End Users Realm Name in Juniper Secure Connect application) and a description.
b. The routing mode is set to Traffic Selector (Auto Route Insertion) by default.
c. Select the authentication method. For this example, let’s select Pre-shared Key from the drop-down
menu.
d. Select Yes to create the firewall policy automatically using the Auto-create Firewall Policy option.
4. Click Remote User icon to configure the Juniper Secure Connect application settings.
Configure the remote user client by selecting the options on the Remote User page and then clicking
OK :
Remote User
Client Settings Description
Default Profile The Default Profile is enabled by default. If you do not want this profile to be the default profile,
click the toggle button.
If you enable Default Profile for the VPN connection profile, Juniper Secure Connect
automatically selects default profile as realm name (in this example: https://12.12.12.12/). In
this case, it is optional to enter the realm name in Juniper Secure Connect.
If you disable Default Profile for the VPN connection profile, you must enter the realm name
along with the gateway address (in this example:
https://12.12.12.12/JUNIPER_SECURE_CONNECT) in Juniper Secure Connect.
54
Remote User
Client Settings Description
Connection Mode To establish the client connection manually or automatically, select the appropriate option.
• If you select Manual, then in the Juniper Secure Connect application, to establish a connection,
you must either click the toggle button or select Connection > Connect from the menu.
• If you select Always, then Juniper Secure Connect automatically establishes the connection.
Known Limitation:
Android device: If you use or select Always, then the configuration is downloaded from the
first used SRX device. If the first SRX device configuration changes or if you connect to a new
SRX device, the configuration does not get downloaded to the Juniper Secure Connect
application.
This means that once you connect in the Always mode using the Android device, any
configuration changes in the SRX device do not take effect on Juniper Secure Connect.
SSL VPN To enable support for SSL VPN connection from the Juniper Secure Connect application to
the SRX Series devices, click the toggle button. Use this option when IPsec ports are not allowed.
By enabling SSL VPN, the client has the flexibility in connecting the SRX Series devices. By
default, SSL VPN is enabled.
Biometric This option is disabled by default. If you enable this option, when you click connect in Juniper
authentication Secure Connect, Juniper Secure Connect displays an authentication prompt.
This option allows the user to protect their credentials using the operating system’s built-in
biometric authentication support.
Dead Peer Dead Peer Detection (DPD) is enabled by default to allow the client to detect if the SRX Series
Detection device is not reachable, disable the connection till reachability is restored.
Windows Logon This option allows users to logon to the local Windows system through an already established
VPN tunnel (using Windows Pre-Logon), so that it is authenticated to the central Windows
domain or Active Directory.
a. If you enable Gateway is behind NAT, a text box appears. In the text box, enter the NAT IP address.
We support only IPv4 addresses. NAT address is the external address.
c. In the External Interface field, select the IP address for the clients to connect. You must enter this
same IP address (in this example: https://12.12.12.12/) for the Gateway Address field in the Juniper
Secure Connect application.
If you enable Gateway is behind NAT, then the NAT IP address becomes the gateway address.
d. From the Tunnel Interface drop-down list, select an interface to bind it to the route-based VPN.
Alternatively click Add. If you click Add, the Create Tunnel Interface page appears.
The next available ST0 logical interface number is displayed in the Interface Unit field and you can
enter a description for this interface. Select the zone to add this tunnel interface to. If Auto-create
Firewall Policy (in Create Remote Access page) is set to Yes, the firewall policy uses this zone. Click
OK.
f. From the User Authentication drop-down list, select an existing access profile or click Add to create
a new access profile. If you click Add, the Create Access Profile page appears.
Enter the access profile name. From the Address Assignment drop-down list, select an address pool
or click Create Address Pool. If you click Create Address Pool, the Create Address Pool page appears.
• Enter the details for the local IP pool that is in the VPN policy for the clients. Enter a name for
the IP address pool.
• Enter the network address that you use for the address assignment.
• Enter your DNS server address. Enter WINS server details, if required. Now click the add icon (+)
to create the address range to assign IP addresses to the clients.
• Enter the name, and the lower and higher limits. After entering the details, click OK.
Select the RADIUS check box, where all the authentication details are stored on an external radius
server.
• Click the add icon (+) to configure the radius server details. See Figure 45 on page 59.
59
• Enter the Radius Server IP Address, the Radius Secret, and Source Address for the radius
communications to be sourced from. Click OK.
In the Authentication Order, from Order 1 drop-down list select RADIUS. Click OK to complete
the access profile configuration.
g. From the SSL VPN Profile drop-down list, select an existing profile or click Add to create a new SSL
VPN profile. If you click Add, the Add SSL VPN Profile page appears.
Figure 47 on page 60 shows an example of the Add SSL VPN Profile page.
On the Add SSL VPN Profile page, you can configure the SSL VPN profile. Enter the SSL VPN profile
name in the Name field, and enable logging using the toggle, if required. In the SSL Termination
61
Profile field, select the SSL termination profile from the dropdown list. SSL termination is a process
where the SRX Series devices acts as an SSL proxy server, and terminates the SSL session from the
client. If you want to create a new SSL termination profile, click Add. The Create SSL Termination
Profile page appears.
Figure 48 on page 61 shows an example of the Create SSL Termination Profile page.
• Enter the name for the SSL termination profile and select the server certificate that you use for
the SSL termination on the SRX Series devices. Click Add to add a new server certificate or click
Import to import the server certificate. The server certificate is a local certificate identifier. Server
certificates are used to authenticate the identity of a server.
• Click OK.
h. The Source NAT Traffic option is enabled by default. When Source NAT Traffic is enabled, all traffic
from the Juniper Secure Connect application is NATed to the selected interface by default. Click
the toggle button to disable the Source NAT Traffic option. If the option is disabled, you must ensure
that you have a route from your network pointing to the SRX Series devices for handling the return
traffic correctly.
i. Under Protected Networks, click the add icon (+) to select the networks that the Juniper Secure
Connect application can connect to.
By default, any network 0.0.0.0/0 is allowed. If you configure a specific network, split tunneling for
Juniper Secure Connect application is enabled. If you retain the default value, you can restrict access
to your defined networks by adjusting the firewall policy from the client network. Click OK, and the
selected networks are now in the list of protected networks. Click OK to complete the local gateway
configuration.
IKE Settings and IPsec Settings are advanced options. J-Web is already configured with default
values for the IKE and IPsec parameters. It is not mandatory to configure these settings.
6. You can now find the URL for the remote users to connect to. Copy and store this URL for sharing with
your remote users. You need only the /xxxx information if this configuration is not your default profile.
Figure 51 on page 63 highlights the URL that remote user must enter in the Gateway address field in
Juniper Secure Connect application to establish remote access connection.
a. Click Save to complete the Juniper Secure Connect VPN configuration and associated policy if you
have selected the auto policy creation option.
b. Click the highlighted Commit button (at the top right of the page next to Feedback Button) to
commit the configuration.
Download and install Juniper Secure Connect application on the client machine. Launch Juniper Secure
Connect and connect to the gateway address of the SRX Series device. See Juniper Secure Connect User
Guide for more details.
64
RELATED DOCUMENTATION
Overview | 11
Local User Authentication Using Pre-shared Key | 35
Certificate-Based Validation Using EAP-MSCHAPv2 Authentication | 64
Certificate-Based Validation Using EAP-TLS Authentication | 81
Monitor Juniper Secure Connect | 100
We assume that you have completed the basic setup of your SRX Series devices, including interfaces,
zones, and security policies as illustrated in the “Deployment Scenario for Juniper Secure Connect” on
page 14.
Ensure that you have a Public Key Infrastructure (PKI) configured as the backend authentication. In this
case, you only need to install the root certificate of the CA on each client. Note that local authentication
is not supported in this scenario.
65
Figure 54 on page 66 shows an example of the J-Web Configure tab where VPN is selected.
b. At the right corner of the page, select Create VPN > Remote Access > Juniper Secure Connect to
create the IPsec VPN setting for Juniper Secure Connect. The Create Remote Access (Juniper Secure
Connect) page appears.
Figure 57 on page 67 shows an example of the create remote access page with Certificate Based
authentication method.
Figure 57: Create Remote Access Page For Certificate-Based Authentication Method
3. On the Create Remote Access (Juniper Secure Connect) page (see Figure 58 on page 67):
a. Enter the name for the Remote Access Connection (this is, the name that will be displayed on the
End Users Realm Name in Juniper Secure Connect application) and a description.
b. The routing mode is set to Traffic Selector (Auto Route Insertion) by default.
c. Select the authentication method. For this example, let’s select Certificate Based from the drop-down
list.
d. Select Yes to create the firewall policy automatically using Auto-create Firewall Policy option.
4. Click Remote User icon to configure the Juniper Secure Connect application settings.
68
Configure the remote user client by selecting the options on the Remote User page and then clicking
OK :
Remote User
Client Settings Description
Default Profile The Default Profile is enabled by default. If you do not want this profile to be the default profile,
click the toggle button.
If you enable Default Profile for the VPN connection profile, Juniper Secure Connect
automatically selects default profile as realm name (in this example: https://12.12.12.12/). In
this case, it is optional to enter the realm name in Juniper Secure Connect.
If you disable Default Profile for the VPN connection profile, you must enter the realm name
along with the gateway address (in this example:
https://12.12.12.12/JUNIPER_SECURE_CONNECT) in Juniper Secure Connect.
69
Remote User
Client Settings Description
Connection Mode To establish the client connection manually or automatically, select the appropriate option.
• If you select Manual, then in the Juniper Secure Connect application, to establish a connection,
you must either click the toggle button or select Connection > Connect from the menu.
• If you select Always, then Juniper Secure Connect automatically establishes the connection.
Known Limitation:
Android device: If you use or select Always, then the configuration is downloaded from the
first used SRX device. If the first SRX device configuration changes or if you connect to a new
SRX device, the configuration does not get downloaded to the Juniper Secure Connect
application.
This means that once you connect in the Always mode using the Android device, any
configuration changes in the SRX device do not take effect on Juniper Secure Connect.
SSL VPN To enable support for SSL VPN connection from the Juniper Secure Connect application to the
SRX Series devices, click the toggle button. By enabling SSL VPN, the client has the flexibility
in connecting the SRX Series devices. By default, SSL VPN is enabled.
Biometric This option is disabled by default. If you enable this option, when you click connect in Juniper
authentication Secure Connect, Juniper Secure Connect displays an authentication prompt.
This option allows the user to protect their credentials using the operating system’s built-in
biometric authentication support.
Dead Peer Dead Peer Detection (DPD) is enabled by default to allow the client to detect if the SRX Series
Detection device is not reachable, disable the connection till reachability is restored.
• Expiry Warning—This option is enabled by default. When enabled, you receive certificate
expiration warning on the Secure Connect client, when the certificate is about to expire.
• Warning Interval—Enter the Interval at which the warning is displayed in days
• Pin Req Per Connection—This option is enabled by default. When enabled, you must enter
the certificate pin for every connection.
EAP-TLS EAP-TLS is enabled by default. As, in this example we are using EAP-MSCHAPv2, toggle the
EAP-TLS switch to disabled state.
Windows Logon This option allows users to logon to the local Windows system through an already established
VPN tunnel (using Windows Pre-Logon), so that it is authenticated to the central Windows
domain or Active Directory.
70
a. If you enable Gateway is behind NAT, a text box appears. In the text box, enter the NAT IP address.
We support only IPv4 addresses. NAT address is the external address.
c. In the External Interface field, select the IP address for the clients to connect. You must enter this
same IP address (in this example: https://12.12.12.12/) for the Gateway Address field in the Juniper
Secure Connect application.
If you enable Gateway is behind NAT, then the NAT IP address becomes the gateway address.
d. From the Tunnel Interface drop-down list, select an interface to bind it to the route-based VPN.
Alternatively click Add. If you click Add, the Create Tunnel Interface page appears.
The next available ST0 logical interface number is displayed in the Interface Unit field and you can
enter a description for this interface. Select the zone to add this tunnel interface to. If Auto-create
Firewall Policy (in Create Remote Access page) is set to Yes, the firewall policy uses this zone. Click
OK.
e. From the Local certificate field, select one of your already externally signed local certificates. Click
Add to add a new local certificate or click Import to import the local certificate.
f. For CA certificate, from the Trusted CA/Group field, select one of your already externally signed
CA certificates, including the matching Trusted CA/Group. If you do not have any of these, click
Add CA Profile and fill in the values that match your environment. Figure 63 on page 73 shows an
example of Add CA PROFILE page.
73
g. From the User Authentication drop-down list, select an existing access profile or click Add to create
a new access profile. If you click Add, the Create Access Profile page appears.
Enter the access profile name. From the Address Assignment drop-down list, select an address pool
or click Create Address Pool. If you click Create Address Pool, the Create Address Pool page appears.
• Enter the details for the local IP pool that is in the VPN policy for the clients. Enter a name for
the IP address pool.
• Enter the network address that you use for the address assignment.
• Enter your DNS server address. Enter WINS server details, if required. Now click the add icon (+)
to create the address range to assign IP addresses to the clients.
• Enter the name, and the lower and higher limits. After entering the details, click OK.
Select the RADIUS check box, where all the authentication details are stored on an external radius
server.
• Click the add icon (+) to configure the Radius Server details. See Figure 66 on page 76.
76
• Enter the Radius Server IP Address, the Radius Secret, and Source Address for the radius
communications to be sourced from. Click OK.
In the Authentication Order, from Order 1 drop-down list select RADIUS. Click OK to complete
the access profile configuration.
h. From the SSL VPN Profile drop-down list, select an existing profile or click Add to create a new SSL
VPN profile. If you click Add, the Add SSL VPN Profile page appears.
Figure 68 on page 77 shows an example of the Add SSL VPN Profile page.
On the Add SSL VPN Profile page, you can configure the SSL VPN profile. Enter the SSL VPN profile
name in the Name field, and enable logging using the toggle, if required. In the SSL Termination
78
Profile field, select the SSL termination profile from the drop-down list. SSL termination is a process
where the SRX Series devices acts as an SSL proxy server, and terminates the SSL session from the
client. If you want to create a new SSL termination profile, click Add. The Create SSL Termination
Profile page appears.
Figure 69 on page 78 shows an example of the Create SSL Termination Profile page.
• Enter the name for the SSL termination profile and select the server certificate that you use for
the SSL termination on the SRX Series devices. Click Add to add a new server certificate or click
Import to import the server certificate. The server certificate is a local certificate identifier. Server
certificates are used to authenticate the identity of a server.
• Click OK.
i. The Source NAT Traffic option is enabled by default. When Source NAT Traffic is enabled, all traffic
from the Juniper Secure Connect application is NATed to the selected interface by default. Click
the toggle button to disable the Source NAT Traffic option. If the option is disabled, you must ensure
that you have a route from your network pointing to the SRX Series devices for handling the return
traffic correctly.
j. Under Protected Networks, click the add icon (+) to select the networks that the Juniper Secure
Connect application can connect to.
By default, any network 0.0.0.0/0 is allowed. If you configure a specific network, split tunneling for
Juniper Secure Connect application is enabled. If you retain the default value, you can restrict access
to your defined networks by adjusting the firewall policy from the client network. Click OK, and the
selected networks are now in the list of protected networks. Click OK to complete the local gateway
configuration.
IKE Settings and IPsec Settings are advanced options. J-Web is already configured with default
values for the IKE and IPsec parameters. It is not mandatory to configure these settings.
6. You can now find the URL for the remote users to connect to. Copy and store this URL for sharing with
your remote users. You need only the /xxxx information if this configuration is not your default profile.
Figure 72 on page 80 highlights the URL that remote user must enter in the Gateway address field in
Juniper Secure Connect application to establish remote access connection.
a. Click Save to complete the Juniper Secure Connect VPN configuration and associated policy if you
have selected the auto policy creation option.
b. Click the highlighted Commit button (at the top right of the page next to Feedback Button) to
commit the configuration.
Download and install Juniper Secure Connect application on the client machine. Launch Juniper Secure
Connect and connect to the gateway address of the SRX Series device. You must also place the root CA
certificate at the appropriate directory location for your respective platform where you’ve installed Juniper
Secure Connect application. See Juniper Secure Connect User Guide for more details.
81
RELATED DOCUMENTATION
Overview | 11
Local User Authentication Using Pre-shared Key | 35
External User Authentication Using RADIUS | 49
Certificate-Based Validation Using EAP-TLS Authentication | 81
Monitor Juniper Secure Connect | 100
We assume that you have completed the basic setup of your SRX Series devices, including interfaces,
zones, and security policies as illustrated in the “Deployment Scenario for Juniper Secure Connect” on
page 14.
Ensure that you have a Public Key Infrastructure (PKI) configured as the backend authentication. In this
case, you need to install the root certificate of the CA on each client as well as a user specific certificate
on each client device. Note that local authentication is not supported in this scenario.
82
Figure 75 on page 83 shows an example of the J-Web Configure tab where VPN is selected.
b. At the right corner of the page, select Create VPN > Remote Access > Juniper Secure Connect to
create the IPsec VPN setting for Juniper Secure Connect. The Create Remote Access (Juniper Secure
Connect) page appears.
Figure 78 on page 84 shows an example of the Create Remote Access page with Certificate-based
authentication method.
Figure 78: Create Remote Access Page For Certificate-Based Authentication Method
3. On the Create Remote Access (Juniper Secure Connect) page (see Figure 79 on page 84):
a. Enter the name for the Remote Access Connection (this is, the name that will be displayed on the
End Users Realm Name in Juniper Secure Connect application) and a description.
b. The routing mode is set to Traffic Selector (Auto Route Insertion) by default.
c. Select the authentication method. For this example, let’s select Certificate Based from the drop-down
list.
d. Select Yes to create the firewall policy automatically using Auto-create Firewall Policy option.
4. Click Remote User icon to configure the Juniper Secure Connect application settings.
85
Configure the remote user client by selecting the options on the Remote User page and then clicking
OK :
Remote User
Client Settings Description
Default Profile The Default Profile is enabled by default. If you do not want this profile to be the default profile,
click the toggle button.
If you enable Default Profile for the VPN connection profile, Juniper Secure Connect
automatically selects default profile as realm name (in this example: https://12.12.12.12/). In
this case, it is optional to enter the realm name in Juniper Secure Connect.
If you disable Default Profile for the VPN connection profile, you must enter the realm name
along with the gateway address (in this example:
https://12.12.12.12/JUNIPER_SECURE_CONNECT) in Juniper Secure Connect.
86
Remote User
Client Settings Description
Connection Mode To establish the client connection manually or automatically, select the appropriate option.
• If you select Manual, then in the Juniper Secure Connect application, to establish a connection,
you must either click the toggle button or select Connection > Connect from the menu.
• If you select Always, then Juniper Secure Connect automatically establishes the connection.
Known Limitation:
Android device: If you use or select Always, then the configuration is downloaded from the
first used SRX device. If the first SRX device configuration changes or if you connect to a new
SRX device, the configuration does not get downloaded to the Juniper Secure Connect
application.
This means that once you connect in the Always mode using the Android device, any
configuration changes in the SRX device do not take effect on Juniper Secure Connect.
SSL VPN To enable support for SSL VPN connection from the Juniper Secure Connect application to the
SRX Series devices, click the toggle button. By enabling SSL VPN, the client has the flexibility
in connecting the SRX Series devices. By default, SSL VPN is enabled.
Biometric This option is disabled by default. If you enable this option, when you click connect in Juniper
authentication Secure Connect, Juniper Secure Connect displays an authentication prompt.
This option allows the user to protect their credentials using the operating system’s built-in
biometric authentication support.
Dead Peer Dead Peer Detection (DPD) is enabled by default to allow the client to detect if the SRX Series
Detection device is not reachable, disable the connection till reachability is restored.
• Expiry Warning—This option is enabled by default. When enabled, you receive certificate
expiration warning on the Secure Connect client, when the certificate is about to expire.
• Warning Interval—Enter the Interval at which the warning is displayed in days
• Pin Req Per Connection—This option is enabled by default. When enabled, you must enter
the certificate pin for every connection.
Windows Logon This option allows users to logon to the local Windows system through an already established
VPN tunnel (using Windows Pre-Logon), so that it is authenticated to the central Windows
domain or Active Directory.
87
a. If you enable Gateway is behind NAT, a text box appears. In the text box, enter the NAT IP address.
We support only IPv4 addresses. NAT address is the external address.
c. In the External Interface field, select the IP address for the clients to connect. You must enter this
same IP address (in this example: https://12.12.12.12/) for the Gateway Address field in the Juniper
Secure Connect application.
If you enable Gateway is behind NAT, then the NAT IP address becomes the gateway address.
d. From the Tunnel Interface drop-down list, select an interface to bind it to the route-based VPN.
Alternatively click Add. If you click Add, the Create Tunnel Interface page appears.
The next available ST0 logical interface number is displayed in the Interface Unit field and you can
enter a description for this interface. Select the zone to add this tunnel interface to. If Auto-create
Firewall Policy (in Create Remote Access page) is set to Yes, the firewall policy uses this zone. Click
OK.
e. From the Local certificate field, select one of your already externally signed local certificates. Click
Add to add a new local certificate or click Import to import the local certificate.
f. For CA certificate, from the Trusted CA/Group field, select one of your already externally signed
CA certificates, including the matching Trusted CA/Group. If you do not have any of these, click
Add CA Profile and fill in the values that match your environment. Figure 84 on page 90 shows an
example of Add CA PROFILE page.
90
g. In the User Authentication dropdown menu, you can select existing access profile or click Add to
create a new Access Profile. If you click Add, the Create Access Profile window appears.
Enter the access profile name. From the Address Assignment drop-down list, select an address pool
or click Create Address Pool. If you click Create Address Pool, the Create Address Pool page appears.
• Enter the details for the Local IP pool that is in the VPN policy for the clients. Enter a name for
the IP address pool.
• Enter the network address that you use for the address assignment.
• Enter your DNS server address. Enter WINS server details, if required. Now click the add icon (+)
to create the address range to assign IP addresses to the clients.
• Enter the name, and the lower and higher limits. After entering the details, click OK.
Select the RADIUS check box, where all the authentication details are stored on an external radius
server.
• Click on the add icon (+) to configure the radius server details. See Figure 66 on page 76.
93
• Enter the Radius Server IP Address, the Radius Secret, and Source Address for the radius
communications to be sourced from. Click OK.
In the Authentication Order, from Order 1 drop-down list select RADIUS. Click OK to complete
the access profile configuration.
h. From the SSL VPN Profile drop-down list, select an existing profile or click Add to create a new SSL
VPN profile. If you click Add, the Add SSL VPN Profile page appears.
Figure 89 on page 94 shows an example of the Add SSL VPN Profile page.
On the Add SSL VPN Profile page , you can configure the SSL VPN profile. Enter the SSL VPN
profile name in the Name field, and enable logging using the toggle, if required. In the SSL Termination
95
Profile field, select the SSL termination profile from the drop-down list. SSL termination is a process
where the SRX Series devices acts as an SSL proxy server, and terminates the SSL session from the
client. If you want to create a new SSL termination profile, click Add. The Create SSL Termination
Profile page appears.
Figure 90 on page 95 shows an example of the Create SSL Termination Profile page.
• Enter the name for the SSL termination profile and select the server certificate that you use for
the SSL termination on the SRX Series devices. Click Add to add a new server certificate or click
Import to import the server certificate. The server certificate is a local certificate identifier. Server
certificates are used to authenticate the identity of a server.
• Click OK.
i. The Source NAT Traffic option is enabled by default. When Source NAT Traffic is enabled, all traffic
from the Juniper Secure Connect application is NATed to the selected interface by default. Click
the toggle button to disable the Source NAT Traffic option. If the option is disabled, you must ensure
that you have a route from your network pointing to the SRX Series devices for handling the return
traffic correctly.
j. Under Protected Networks, click the add icon (+) to select the networks that the Juniper Secure
Connect application can connect to.
By default, any network 0.0.0.0/0 is allowed. If you configure a specific network, split tunneling for
Juniper Secure Connect application is enabled. If you retain the default value, you can restrict access
to your defined networks by adjusting the firewall policy from the client network. Click OK, and the
selected networks are now in the list of protected networks. Click OK to complete the local gateway
configuration.
IKE Settings and IPsec Settings are advanced options. J-Web is already configured with default
values for the IKE and IPsec parameters. It is not mandatory to configure these settings.
6. You can now find the URL for the remote users to connect to. Copy and store this URL for sharing with
your remote users. You need only the /xxxx information if this configuration is not your default profile.
Figure 93 on page 97 highlights the URL that remote user must enter in the Gateway address field in
Juniper Secure Connect application to establish remote access connection.
a. Click Save to complete the Juniper Secure Connect VPN Configuration and associated policy if you
have selected the auto policy creation option.
b. Click the highlighted Commit button (at the top right of the page next to Feedback Button) to
commit the configuration.
Download and install Juniper Secure Connect application on the client machine. Launch Juniper Secure
Connect and connect to the gateway address of the SRX Series device. You must also place the root CA
certificate and user certificate at the appropriate directory location for the respective platform where
you’ve installed Juniper Secure Connect application. See Juniper Secure Connect User Guide for more
details.
98
RELATED DOCUMENTATION
Overview | 11
Local User Authentication Using Pre-shared Key | 35
External User Authentication Using RADIUS | 49
Certificate-Based Validation Using EAP-MSCHAPv2 Authentication | 64
Monitor Juniper Secure Connect | 100
4 CHAPTER
IN THIS SECTION
In case of any issues, we recommend that you follow these steps to check the log messages and locate
the issue:
You must configure syslog to save the syslog file on your device. Currently, J-Web does not support
structured logs. Only unstructured logs are supported.
Depending on the syslog format (for structured logs) you configure in the system, you might not find the
log messages under Monitor > Events > System. Because of this, we recommend that you download the
"messages" file from Device Administration > Operations > Files and search for the event.
For the unstructured logs (in J-Web), to find information about the success or failure of authentication:
• For a Juniper Secure Connect application configuration download, search for "REMOTE_ACCESS".
By default, J-Web displays warning and error messages. If you want to view info level messages, change
the syslog configuration using CLI. Table 12 on page 101 lists the supported log levels:
alert Indicates conditions that require immediate correction, such as a corrupted system
database.
emergency Indicates system panic or other conditions that cause the routing platform to stop
functioning.
none No messages.
You can view the stream (traffic or routing engine) logs by navigating to Monitor > Events > IPsec VPN
page.
102
IN THIS SECTION
Windows | 102
macOS | 108
Android | 111
Windows
Following are the steps to check the Juniper Secure Connect application logs on a Windows device:
103
1. The log is continuously active in the background, even if the log window is not open. All the relevant
Juniper Secure Connect communication events are displayed and saved for one week per operation
day, in a log file. The files older than seven online days are automatically deleted.
The log file is generated automatically in the installation directory under the Log folder when the
communication process is completed. The log file is named in NCPyymmdd.LOG format, where yy=year,
mm=month, and dd=date. Select Help > Logbook to view the log messages in the log book page.
You can change the storage time for log files using the Extended Log Settings option. You can open
and analyze the log files using a text editor.
2. From the menu bar, click Help and then select Extended Log Settings.
105
3. Enable all options by selecting all the check boxes, and then click OK.
4. Open the logbook and check for any log messages that indicate the problem. If you cannot resolve
your issue based upon the log messages, start the Support Assistant by clicking Help and then selecting
Support Assistant. The Support Assistant collects all the required data.
5. Click Add to attach any additional files, and then click Next. The Save archive file page opens.
6. Select the Only create the archive file option button. Then, click Next.
After the archival process is completed, Juniper Secure Connect displays the archived file location.
108
7. Click Finish.
macOS
Following are the steps to check the Juniper Secure Connect application logs on a macOS platform:
1. Select Log > Logbook through the Juniper Secure Connect application menu to open the logbook.
2. If you are not able to resolve the issue, save this log message into a file with the ncpmonlog.txt filename.
Copy the file ncpphone.cfg to the same location where you saved the logbook file /Library/Application
Support/Juniper/SecureConnect/ncpphone.cfg.
3. To locate the ncpphone.cfg file, open the Finder and select Go in the menu bar and at the same time
press down the “Option” key on your keyboard.
110
The directory location where the Juniper Secure Connect files are saved is displayed.
111
Android
Following are the steps to check the Juniper Secure Connect application logs on an Android device:
In the Juniper Secure Connect application menu, click the three vertical dots at the top right corner and
select Log from the menu.
112
RELATED DOCUMENTATION
Overview | 11
Local User Authentication Using Pre-shared Key | 35
External User Authentication Using RADIUS | 49