Juniper Secure Analytics Users GuidePublished2022-07-05RELEASE7.4.2
iiJuniper Networks, Inc.1133 Innovation WaySunnyvale, California 94089USA408-745-2000www.juniper.netJuniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc.in the United States and other countries. All other trademarks, service marks, registered marks, or registered servicemarks are the property of their respective owners.Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the rightto change, modify, transfer, or otherwise revise this publication without notice.Juniper Secure Analytics Users Guide7.4.2Copyright 2022 Juniper Networks, Inc. All rights reserved.The information in this document is current as of the date on the title page.YEAR 2000 NOTICEJuniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-relatedlimitations through the year 2038. However, the NTP application is known to have some difficulty in the year 2036.END USER LICENSE AGREEMENTThe Juniper Networks product that is the subject of this technical documentation consists of (or is intended for usewith) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User LicenseAgreement ("EULA") posted at https://support.juniper.net/support/eula/. By downloading, installing or using suchsoftware, you agree to the terms and conditions of that EULA.
iiiTable of ContentsAbout This Guide ix1What's New for JSA UsersNew Features and Enhancements in JSA 7.4.2 2New Features and Enhancements in JSA 7.4.1 3New Features and Enhancements in JSA 7.4.0 42Capabilities in your JSA productCapabilities in Your JSA Product 6Supported Web Browsers 8JSA Login 9RESTful API 10User Interface Tabs 11JSA Common Procedures 143Dashboard ManagementDashboard Management 22Default Dashboards 22Custom Dashboards 26Creating a Custom Dashboard 36Using the Dashboard to Investigate Log or Network Activity 37Configuring Dashboard Chart Types 38Removing Dashboard Items 39Detaching a Dashboard Item 40Renaming a Dashboard 40
ivDeleting a Dashboard 41Managing System Notifications 41Adding Search-based Dashboard Items to the Add Items List 424QRadar Analyst WorkflowQRadar Analyst Workflow 45What's New in QRadar Analyst Workflow 46Known Issues 46Installing the QRadar Analyst Workflow 47Offenses 48Querying Event and Flow Data to Find Specific Offenses 53Events 555Offense ManagementOffense Management 59Offense Prioritization 59Offense Chaining 60Offense Indexing 61Offense Retention 63Offense Investigations 65Offense Actions 796Log Activity InvestigationLog Activity Investigation 88Log Activity Tab Overview 88Log Activity Monitoring 93Viewing Associated Offenses 110Modifying Event Mapping 111
vTuning False Positives 112PCAP Data 113Exporting Events 1167Network Activity MonitoringNetwork Activity Monitoring 119Flow Pipeline 120Flow Sources 121Aggregating Flows 132Flow Direction 134Application Identification 138Superflows 140Deduplication 143View Flow Data on the Network Activity Tab 145VLAN Fields 153Configuring a Flow Processor 155Tuning False Positives 1598Asset ManagementAsset Management 161Sources Of Asset Data 163Incoming Asset Data Workflow 166Updates to Asset Data 167Identification Of Asset Growth Deviations 172Asset Blacklists and Whitelists 177Asset Profiles 1809Chart Management
viChart Management 202Time Series Chart Overview 203Chart Legends 205Configuring Charts 20510Event and Flow SearchesEvent and Flow Searches 209Offense Searches 231Finding IOCs Quickly with Lazy Search 246Deleting Search Criteria 247Using a Subsearch to Refine Search Results 248Managing Search Results 249Managing Search Groups 250Search Example: Daily Employee Reports 25511Custom Event and Flow PropertiesCustom Event and Flow Properties 258Creating a Custom Property 259Modifying or Deleting a Custom Property 261Defining Custom Properties by Using Custom Property Expressions 261Use case: Create a report that uses Event Data that is not Normalized 26812RulesRules 271Custom Rules 273Creating a Custom Rule 275Configuring an Event or Flow As False Positive 281Anomaly Detection Rules 281
viiConfiguring a Rule Response to Add Data to a Reference Data Collection 291Editing Building Blocks 292Rule Performance Visualization 29313Historical CorrelationHistorical Correlation 297Historical Correlation Overview 298Creating a Historical Correlation Profile 299Viewing Information About Historical Correlation Runs 30114Juniper Networks X-Force IntegrationJuniper Networks X-Force Integration 304X-Force Data on the Dashboard 304IP Address and URL Categories 305Confidence Factor and IP Address Reputation 308Searching Data from Juniper X-Force Exchange with Advanced Search Criteria 31015Report ManagementReport Management 313Report Layout 314Chart Types 314Report Tab Toolbar 317Graph Types 319Creating Custom Reports 322Editing a Report 327Viewing Generated Reports 327Deleting Generated Content 328Manually Generating a Report 329
viiiDuplicating a Report 330Sharing a Report 330Branding Reports 331Report Groups 332
ixAbout This GuideUse this guide to manage JSA including the dashboard, offenses, reports, assets, log activity, andnetwork activity interfaces.
1CHAPTERWhat's New for JSA UsersNew Features and Enhancements in JSA 7.4.2 2New Features and Enhancements in JSA 7.4.1 3New Features and Enhancements in JSA 7.4.0 4
2New Features and Enhancements in JSA 7.4.2IN THIS SECTIONAccumulated Byte and Packet Counters 2New "Common Destination Port" Flow Direction Algorithms 2MAC Address Support 3For JSA users, JSA 7.4.2 introduces new flow algorithms, new accumulated byte and packet counters,and support for MAC address fields.Accumulated Byte and Packet CountersFlows are reported in 1-minute intervals, and can span several minutes, hours, or even days. For sessionsthat span more than a minute, JSA reports on the current metrics for the flow at the end of each 1minute interval. The byte and packet counters show the number of bytes and packets that were receivedin that 1-minute interval.In JSA 7.4.2, you can now see the total number of bytes and packets that accumulated over the durationof the flow session. The byte and packet counters for each 1-minute interval that the flow is observedare also preserved.You can view the accumulated counters by including the following fields in your search results. Accumulated source bytes Accumulated source packets Accumulated destination bytes Accumulated destination packetsNew "Common Destination Port" Flow Direction AlgorithmsJSA provides information about which algorithm was used to determine the flow direction.
3JSA 7.4.2 introduces two new common destination port algorithms for use when the flow matches thecriteria, but the flow direction is unchanged: Single common destination port (unaltered) (5) Both common destination ports, RFC 1700 preferred (unaltered) (6)In previous releases of JSA, the common destination port algorithms were reported only when the flowdirection was reversed. Most other flows used the Arrival time algorithm, including the flows thatmatched the common destination port criteria but did not have the flow direction reversed.Now, the only flows that show the Arrival time annotation in the Flow Direction Algorithm field are theflows that do not match the criteria for any other flow direction algorithm.MAC Address SupportJSA can now receive MAC address information from IPFIX and NetFlow V9 exporters.The following MAC address fields are supported in JSA 7.4.2: sourceMacAddress (IANA Element ID 56) postDestinationMacAddress (IANA Element ID 57) destinationMacAddress (IANA Element ID 80) postSourceMacAddress (IANA Element ID 81)You can use the new MAC address fields in filters, searches, and rules.New Features and Enhancements in JSA 7.4.1IN THIS SECTIONSupport for the Flow ID Field in NetFlow V9 Flow Records 4For JSA users, JSA 7.4.1 introduces the following new features.
4Support for the Flow ID Field in NetFlow V9 Flow RecordsJSA now supports the flowId field (IANA element 148) in NetFlow Version 9 data exports. In JSA, thefield appears in the Vendor Flow ID field on the Flow Details window.The flow ID is used as part of the flow's unique identifier so that only flow records with the same flowID value are aggregated together. Sessions with different flow IDs are kept separate and mapped todifferent Flow ID values.You can use the flowId field in filters and searches to quickly identify all of the flow records in a particularsession.New Features and Enhancements in JSA 7.4.0IN THIS SECTIONAdditional standard fields for events 4For JSA users, JSA 7.4.0 introduces the following new features.Additional standard fields for eventsView additional details about your events. These details provide increased visibility into how events areinternally processed by JSA.
2CHAPTERCapabilities in your JSA productCapabilities in Your JSA Product 6Supported Web Browsers 8JSA Login 9RESTful API 10User Interface Tabs 11JSA Common Procedures 14
6Capabilities in Your JSA ProductIN THIS SECTIONJSA Product Capabilities 6JSA product documentation describes functionality such as offenses, flows, assets, and historicalcorrelation, that might not be available in all JSA products. Depending on the product that you are using,some documented features might not be available in your deployment. Log Manager--Log Manager is a basic, high-performance, and scalable solution for collecting,analyzing, storing, and reporting on large volumes of network and security event logs. JSA--JSA is an advanced offering that includes the full range of security intelligence capabilities foron-premises deployments. It consolidates log source and network flow data from thousands ofassets, devices, endpoints, and applications that are distributed throughout your network, andperforms immediate normalization and correlation activities on the raw data to distinguish realthreats from false positives.JSA Product CapabilitiesJSA product documentation describes capabilities, such as offenses, flows, assets, and historicalcorrelation, that might not be available in all JSA products. Review the following table to compare thecapabilities in each product.Table 1: Comparison Of JSA CapabilitiesCapabilityJSALog ManagerFull administrative capabilitiesYesYesSupports hosted deploymentsNoNoCustomizable dashboardsYesYes
7Table 1: Comparison Of JSA Capabilities (Continued)CapabilityJSALog ManagerCustom rules engineYesYesManage network and security eventsYesYesManage host and application logsYesYesThreshold-based alertsYesYesCompliance templatesYesYesData archivingYesYesJuniper X-Force Threat Intelligence IP reputation feedintegrationYesYesWinCollect stand-alone deploymentsYesYesWinCollect managed deploymentsYesYesJSA Vulnerability Manager integrationYesYesNetwork activity monitoringYesNoAsset profilingYesNo 1Offenses managementYesNoNetwork flow capture and analysisYesNoHistorical correlationYesNo
8Table 1: Comparison Of JSA Capabilities (Continued)CapabilityJSALog ManagerJSA Vulnerability Manager integrationYesYesJSA Risk Manager integrationYesNoVulnerability Assessment ScannersYesYes1LogManager tracks asset data only if JSA Vulnerability Manager is installed.Some documentation, such as the Juniper Secure Analytics Administration Guide and the Juniper SecureAnalytics Users Guide, is common across multiple products and might describe capabilities that are notavailable in your deployment.RELATED DOCUMENTATIONSupported Web Browsers 8JSA Login 9Supported Web BrowsersFor the features in JSA products to work properly, you must use a supported web browser.The following table lists the supported versions of web browsers.Table 2: Supported Web Browsers for JSA ProductsWeb browserSupported versions64 bit Mozilla Firefox60 Extended Support Release and later64-bit Microsoft Edge38.14393 and later
9Table 2: Supported Web Browsers for JSA Products (Continued)Web browserSupported versions64 bit Google ChromeLatestThe Microsoft Internet Explorer web browser is no longer supported as of JSA 7.4.0.Security exceptions and certificatesIf you are using the Mozilla Firefox web browser, you must add an exception to Mozilla Firefox to log into JSA. For more information, see your Mozilla Firefox web browser documentation.Navigate the web-based applicationWhen you use JSA, use the navigation options available in the JSA user interface instead of your webbrowser Back button.RELATED DOCUMENTATIONJSA Login 9RESTful API 10JSA LoginJSA is a web-based application. JSA uses default login information for the URL, user name, andpassword.Use the information in the following table when you log in to your JSA console.Table 3: Default Login Information for JSALogin informationDefaultURLhttps:// IP Address , where IP Address is the IP address of the JSA console.To log in to JSA in an IPv6, wrap the IP address in square brackets:https://[ IP Address ]
10Table 3: Default Login Information for JSA (Continued)Login informationDefaultUser nameadminPasswordThe password that is assigned to JSA during the installation process.License keyA default license key provides you access to the system for 5 weeks.RELATED DOCUMENTATIONRESTful API 10User Interface Tabs 11JSA Common Procedures 14RESTful APIIN THIS SECTIONJSA API Forum and Code Samples 11The representational state transfer (REST) application programming interface (API) is useful when youwant to integrate JSA with other solutions. You can perform actions on the JSA console by sendingHTTPS requests to specific endpoints (URLs) on the JSA console.Each endpoint contains the URL of the resource that you want to access and the action that you want tocomplete on that resource. The action is indicated by the HTTP method of the request: GET, POST, PUT,or DELETE. For more information about the parameters and responses for each endpoint, see theJuniper Secure Analytics API Guide.
11JSA API Forum and Code SamplesThe API forum provides more information about the REST API, including the answers to frequentlyasked questions and annotated code samples that you can use in a test environment.RELATED DOCUMENTATIONUser Interface Tabs 11JSA Common Procedures 14JSA Login 9User Interface TabsIN THIS SECTIONDashboard Tab 11Offenses Tab 12Log Activity Tab 12Network Activity Tab 12Assets Tab 13Reports Tab 13JSA Risk Manager 13Functionality is divided into tabs. The Dashboard tab is displayed when you log in.You can easily navigate the tabs to locate the data or functionality you require.Dashboard TabThe Dashboard tab is a workspace environment that provides summary and detailed information onevents occurring in your network.
12The Dashboard tab supports multiple dashboards on which you can display your views of networksecurity, activity, or data that JSA collects. Five default dashboards are available. Each dashboardcontains items that provide summary and detailed information about offenses that occur on yournetwork. You can also create a custom dashboard to allow you to focus on your security or networkoperations responsibilities. For more information about using the Dashboard tab, see "DashboardManagement" on page 22.Offenses TabThe Offenses tab will allow you to view offenses that occur on your network, which you can locate byusing various navigation options or through powerful searches.From the Offenses tab, you can investigate an offense to determine the root cause of an issue. You canalso resolve the issue.For more information about Offenses tab, see "Offense Management" on page 59.Log Activity TabThe Log Activity tab will allow you to investigate event logs being sent to JSA in real-time, performpowerful searches, and view log activity by using configurable time-series charts.The Log Activity tab will allow you to perform in-depth investigations on event data.For more information, see "Log Activity Investigation" on page 88.Network Activity TabUse the Network Activity tab to investigate flows that are sent in real-time, perform powerful searches,and view network activity by using configurable time-series charts.A flow is a communication session between two hosts. Viewing flow information will allow you todetermine how the traffic is communicated, what is communicated (if the content capture option isenabled), and who is communicating. Flow data also includes details such as protocols, ASN values,IFIndex values, and priorities.For more information, see Network Activity Investigation.
13Assets TabJSA automatically discovers assets, servers, and hosts, operating on your network.Automatic discovery is based on passive flow data and vulnerability data, allowing JSA to build an assetprofile.Asset profiles provide information about each known asset in your network, including identityinformation, if available, and what services are running on each asset. This profile data is used forcorrelation purposes to help reduce false positives.For example, an attack tries to use a specific service that is running on a specific asset. In this situation,JSA can determine whether the asset is vulnerable to this attack by correlating the attack to the assetprofile. Using the Assets tab, you can view the learned assets or search for specific assets to view theirprofiles.Reports TabThe Reports tab will allow you to create, distribute, and manage reports for any data within JSA.The Reports feature will allow you to create customized reports for operational and executive use. Tocreate a report, you can combine information (such as, security or network) into a single report. You canalso use preinstalled report templates that are included with JSA.The Reports tab also will allow you to brand your reports with customized logos. This customization isbeneficial for distributing reports to different audiences.For more information about reports, see "Report Management" on page 313.JSA Risk ManagerJSA Risk Manager is a separately installed appliance for monitoring device configurations, simulatingchanges to your network environment, and prioritizing risks and vulnerabilities in your network.JSA Risk Manager uses data that is collected by configuration data from network and security device,such as firewalls, routers, switches, or IPSs, vulnerability feeds, and vendor security sources. This data isused to identify security, policy, and compliance risks within your network security infrastructure andthe probability of those risks that are being exploited.
14NOTE: For more information about Juniper Secure Analytics Risk Manager, contact your localsales representative.RELATED DOCUMENTATIONJSA Common Procedures 14JSA Login 9RESTful API 10JSA Common ProceduresIN THIS SECTIONViewing Notifications 14Refreshing and Pausing JSA 16Investigating IP Addresses 16System Time 18Updating User Preferences 19Various controls on the JSA user interface are common to most user interface tabs.Information about these common procedures is described in the following sections.Viewing NotificationsThe Notifications menu, which is on the upper right corner of the user interface, provides access to awindow in which you can read and manage your system notifications.For system notifications to show on the Notifications window, the administrator must create a rule thatis based on each notification message type and select the Notify check box in the Custom Rules Wizard.
15The Messages menu indicates how many unread system notifications you have in your system. Thisindicator increments the number until you close system notifications. For each system notification, theMessages window provides a summary and the date stamp for when the system notification wascreated. You can hover your mouse pointer over a notification to view more detail. Using the functionson the Messages window, you can manage the system notifications.System notifications are also available on the Dashboard tab and on an optional pop-up window thatcan be displayed on the lower left corner of the user interface. Actions that you perform in theMessages window are propagated to the Dashboard tab and the pop-up window. For example, if youclose a system notification from the Messages window, the system notification is removed from allsystem notification displays.For more information about Dashboard system notifications, see "Managing System Notifications" onpage 41.1. Log in to JSA .2. On the upper right corner of the user interface, click Notifications.3. On the Messages window, view the system notification details.4. Optional. To refine the list of system notifications, click one of the following options: Errors Warnings Information5. Optional. To close system notifications, choose of the following options:OptionDescriptionDismiss AllClick to close all system notifications.DismissClick the Dismiss icon next to the system notificationthat you want to close.6. Optional. To view the system notification details, hover your mouse pointer over the systemnotification.
16Refreshing and Pausing JSAYou can manually refresh, pause, and play the data that is displayed on tabs. Dashboard tab--The Dashboard tab automatically refreshes every 60 seconds. The timer, which is onthe upper right corner of the interface, indicates the amount of time that remains until the tab isautomatically refreshed.Click the title bar of any dashboard item to automatically pause the refresh time. The timer flashesred to indicate that the current display is paused. Log Activity and Network Activity tabs--The Log Activity and Network Activity tabs automaticallyrefresh every 60 seconds if you are viewing the tab in Last Interval (auto refresh) mode.When you view the Log Activity or Network Activity tab in Real Time (streaming) or Last Minute(auto refresh) mode, you can use the Pause icon to pause the current display. Offenses tab--The Offenses tab must be refreshed manually. The timer, which is on the upper rightcorner of the interface, indicates the amount of time since the data was last refreshed. The timerflashes red when the timer is paused.Investigating IP AddressesYou can use several methods to investigate information about IP addresses on the Dashboard, LogActivity, and Network Activity tabs.1. Log in to JSA.2. Click the tab that you want to view.3. Move your mouse pointer over an IP address to view the location of the IP address.4. Right-click the IP address or asset name and select one of the following options:Table 4: IP Addresses InformationOptionDescriptionNavigate View byNetworkDisplays the networks that are associated with the selected IP address.
17Table 4: IP Addresses Information (Continued)OptionDescriptionNavigate ViewSource SummaryDisplays the offenses that are associated with the selected source IP address.Navigate ViewDestination SummaryDisplays the offenses that are associated with the selected destination IP address.Information DNSLookupSearches for DNS entries that are based on the IP address.Information WHOISLookupSearches for the registered owner of a remote IP address. The default WHOISserver is whois.arin.net.Information PortScanPerforms a Network Mapper (NMAP) scan of the selected IP address. This option isonly available if NMAP is installed on your system. For more information aboutinstalling NMAP, see your vendor documentation.Information AssetProfileDisplays asset profile information.This option is displayed if JSA Vulnerability Manager is purchased and licensed. Formore information, see the Juniper Secure Analytics Vulnerability Manager UserGuide.This menu option is available if JSA acquired profile data either actively through ascan or passively through flow sources.This menu option is available if JSA acquired profile data actively through a scan.For information, see the Juniper Secure Analytics Administration Guide.Information SearchEventsSearches for events that are associated with this IP address.Information SearchFlowsSearches for flows that are associated with this IP address.
18Table 4: IP Addresses Information (Continued)OptionDescriptionInformation SearchConnectionsSearches for connections that are associated with this IP address. This option is onlydisplayed if you purchased JSA Risk Manager and connected JSA and the JSA RiskManager appliance. For more information, see the Juniper Secure Analytics RiskManager User Guide.Information SwitchPort LookupDetermines the switch port on a Cisco IOS device for this IP address. This optionapplies only to switches that are discovered by using the Discover Devices optionon the Risks tab.NOTE: This menu option isn't available in Log ManagerInformation ViewTopologyDisplays the Risks tab, which depicts the layer 3 topology of your network. Thisoption is available if you purchased JSA Risk Manager and connected JSA and theJSA Risk Manager appliance. appliance.Run Vulnerability ScanSelect the Run Vulnerability Scan option to scan an JSA Vulnerability Manager scanon this IP address. This option is only displayed when JSA Vulnerability Manager hasbeen purchased and licensed. For more information, see the Juniper SecureAnalytics Vulnerability Manager User Guide.System TimeThe right corner of the JSA user interface displays system time, which is the time on the console.The console time synchronizes JSA systems within the JSA deployment. The console time is used todetermine what time events were received from other devices for correct time synchronizationcorrelation.In a distributed deployment, the console might be in a different time zone from your desktop computer.When you apply time-based filters and searches on the Log Activity and Network Activity tabs, youmust use the console system time to specify a time range.When you apply time-based filters and searches on the Log Activity tab, you must use the consolesystem time to specify a time range.
19Updating User PreferencesYou can set your user preference, such as locale, in the main JSA user interface.1. To access your user information, click Preferences.2. Update your preferences.OptionDescriptionUsernameDisplays your user name. You cannot edit this field.PasswordJSA user passwords are stored as a salted SHA-256string.The password must meet the following criteria: Minimum of 6 characters Maximum of 255 characters Contain at least 1 special character Contain 1 uppercase characterPassword (Confirm)Password confirmationEmail AddressThe email address must meet the followingrequirements: Minimum of 10 characters Maximum of 255 charactersLocaleJSA is available in the following languages: English,Simplified Chinese, Traditional Chinese, Japanese,Korean, French, German, Italian, Spanish, Russian,and Portuguese (Brazil).If you choose a different language, the user interfacedisplays in English. Other associated culturalconventions, such as, character type, collation,format of date and time, currency unit are used.
20(Continued)OptionDescriptionEnable Popup NotificationsSelect this check box if you want to enable pop-upsystem notifications to be displayed on your userinterface.RELATED DOCUMENTATIONJSA Login 9RESTful API 10User Interface Tabs 11
3CHAPTERDashboard ManagementDashboard Management 22Default Dashboards 22Custom Dashboards 26Creating a Custom Dashboard 36Using the Dashboard to Investigate Log or Network Activity 37Configuring Dashboard Chart Types 38Removing Dashboard Items 39Detaching a Dashboard Item 40Renaming a Dashboard 40Deleting a Dashboard 41Managing System Notifications 41Adding Search-based Dashboard Items to the Add Items List 42
22Dashboard ManagementThe Dashboard tab is the default view when you log in.It provides a workspace environment that supports multiple dashboards on which you can display yourviews of network security, activity, or data that is collected.Dashboards allow you to organize your dashboard items into functional views, which enable you tofocus on specific areas of your network.Use the Dashboard tab to monitor your security event behavior.You can customize your dashboard. The content that is displayed on the Dashboard tab is user-specific.Changes that are made within a session affect only your system.Default DashboardsUse the default dashboard to customize your items into functional views. These functional views focuson specific areas of your network.The Dashboard tab provides five default dashboards that are focused on security, network activity,application activity, system monitoring, and compliance.Each dashboard displays a default that is set of dashboard items. The dashboard items act as startingpoint to navigate to more detailed data. The following table defines the default dashboards.
23Table 5: Default DashboardsDefault dashboardItemsApplication OverviewThe Application Overview dashboard includes the following default items: Inbound Traffic by Country (Total Bytes) Outbound Traffic by Country (Total Bytes) Top Applications (Total Bytes) Top Applications Inbound from Internet (Total Bytes) Top Applications Outbound to the Internet (Total Bytes) Top Services Denied through Firewalls (Event Count) DSCP - Precedence (Total Bytes)Compliance OverviewThe Compliance Overview dashboard includes the following default items: Top Authentications by User (Time Series) Top Authentication Failures by User (Event Count) Login Failures by User (real-time) Compliance: Username Involved in Compliance Rules (time series) Compliance: Source IPs Involved in Compliance Rules (time series) Most Recent Reports
24Table 5: Default Dashboards (Continued)Default dashboardItemsNetwork OverviewTh
The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License
play in the Juniper JN0-210 certification exam. This study guide is an instrument to get you on the same page with Juniper and understand the nature of the Juniper JNCIA-Cloud exam. Our team of experts has composed this Juniper JN0-210 exam preparation guide to provide the overview about Juniper Clou
have partnered with Juniper Networks and worked closely with members of the Juniper Net-works Technical Certification Program to develop this Official Study Guide for the Juniper Networks Certified Internet Associate certification. Just as Juniper Networks is comm
Remote Assistance using Juniper Networks Secure Meeting Juniper Secure Meeting allows users to securely schedule and hold online meetings, for presentation and support . desktop (or individual windows) with the other users. Finally, the icon indicates the current "controller". As the image suggests, the controller is the user .
13. Multi-Protocol Lab – OSPF and RIP 14. iBGP 15. iBGP – Route Reflector 16. iBGP – Juniper and Cisco 17. eBGP – Juniper to Juniper 18. eBGP – Juniper to Cisco (and some MD5) 19. NHRP 20. System Services – NTP – Telnet –
Juniper Networks SRX300, SRX340, and SRX345 Services Gateways Non-Proprietary FIPS 140-2 Cryptographic Module Security Policy Version: 2.4 Date: December 22, 2017 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net
Juniper Networks SRX1500, SRX4100 and SRX4200 Services Gateways Non-Proprietary FIPS 140-2 Cryptographic Module Security Policy Version: 1.3 Date: February 21, 2018 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net
Title: Juniper Secure Analytics Log Event Extended Format Author: Juniper Networks Created Date: 20160412114400Z
penyembuhan tulang yang optimal. 2.1.1 Anatomi dan Histologi Tulang Komponen seluler tulang terdiri dari sel prekusor osteogenik ( sel mesenkim ), sel sel osteoblas, sel osteoklas, sel osteosit serta elemen hematopoetik lainnya dalam sumsum tulang. Sel prekursor osteogenik terdapat pada permukaan tulang yang tidak mengalami proses resorpsi, dan membentuk lapisan bagian dalam dari periosteum .