@jtacassist; @bobdunn
GOAL STATEMENT: Disable UTM without creating AV profiles. SRX wont accept a commit from factory default because an AV profile does not exist. Dont need AV services.
srx550
Junos: 18.2R1.9
JUNOS Software Release [18.2R1.9]
Hello:
As part of an upgrade and evaluation program where we are considering the wider deployment of SRX550HM/vSRX I am evauating JUNOS 18.2. Our organization is heavily invested in DevOps and Cloud based routing. Having strong API access to the SRX is an attractive feature for this program -- hence the exploration of Junos version 18.
Also, I am being asked to evauate Juniper as a possible contender for a larger project as well. So far, my experience has not been the best. Due to previous poor experiences with JTAC and newer software releases (an ungodly waste of my time on the phone and email), I am hoping the forums might be more helpful.
We are looking to deploy the SRX as a intranet - cloud "access router" with light firewall features -- dont need full utm or AV protections, we do need the 550 to offer fast convergence if a particular route fails. The SRX's "route to any where using any routing protocol" ability has been some thing that made me consider the SRX platform for this project. I am trying to drive the configuration from the CLI. I would prefer not to use J-WEB.
PROBLEM STATEMENTS:
1) Default configuration on a Juniper SRX550HM seems to be buggy and wont accept a commit -- asking for UTM Antivirus Profiles, even when I am trying to turn AV and UTM protection off. I would prefer to disable the enture UTM suite and focus on getting rotuing up and running. All of the KBs I have seen so far assume that I can issue a commit. I cant issue a commit on the default config as the SRX is looking for a default AV profile that does not exist. It appears that I cant define an AV profile as I dont have a license. Since I dont want the AV feature and dont want to have to turn it on only to define it and then shut it off, I could use some help. It appears that i am missing something or Junos has made some serious misteps in the QA process.
Errors:
[edit security utm utm-policy junos-av-policy anti-virus http-profile]
'http-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus ftp upload-profile]
'upload-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus ftp download-profile]
'download-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus smtp-profile]
'smtp-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus pop3-profile]
'pop3-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus imap-profile]
'imap-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus http-profile]
'http-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus ftp upload-profile]
'upload-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus ftp download-profile]
'download-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus smtp-profile]
'smtp-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus pop3-profile]
'pop3-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus imap-profile]
'imap-profile junos-av-defaults'
An anti-virus profile must be defined
error: commit failed: (statements constraint check failed)
SRX Configuration:
For a fair evaluation, we took an SRX, formatted the WinTec flash card and started from scratch. Install Junos 18 from tftp server. I am now stuck in this almost comical cycle where I cannot disable the utm features or sub features because of this race condition
root# deactivate security utm
[edit]
root# commit
[edit security utm utm-policy junos-av-policy anti-virus http-profile]
'http-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus ftp upload-profile]
'upload-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus ftp download-profile]
'download-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus smtp-profile]
'smtp-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus pop3-profile]
'pop3-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-policy anti-virus imap-profile]
'imap-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus http-profile]
'http-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus ftp upload-profile]
'upload-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus ftp download-profile]
'download-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus smtp-profile]
'smtp-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus pop3-profile]
'pop3-profile junos-av-defaults'
An anti-virus profile must be defined
[edit security utm utm-policy junos-av-wf-policy anti-virus imap-profile]
'imap-profile junos-av-defaults'
An anti-virus profile must be defined
error: commit failed: (statements constraint check failed)
Also appears that I cannot define an antivirus profile because I need a license for that??? Why would i need to get a temporary license for something i dont need?
Our evaluation process is pretty stringent. Vendors have been eliminated for this type of stupidity in the past. I am trying to be generous to Juniper and hopefully get some help -- Also making the hopeful assumption that I have missed something. A few things I am unwilling/unable to do:
1. I cant call the JTAC. Juniper has wasted my time for hours on end with the JTAC in the past. More than once, juniper customers have provided more accurate answers (some on this forum) than the information I received from the JTAC. If I create a ticket with the JTAC, for a default install, it is probably game over for this -- our vendor tickets are monitored closely -- partially due to previous issues with JTAC and Cisco. I truly like the SRX as a platform and the vSRX looks like a pretty good fit. One of the things that keeps me "attached" to Juniper is the passionate customer base. Juniper should do more to recognize the fact that their customers are part of the solution and their strongest advocates, especially in the federal/government space where Cisco is the 2 ton Gorilla.
2. Dow rev to version 15. There are features we need in version 18 (API and improved Netconf) Also I am not allowed to bring firmware / code into my environment that has object libraries released from Kapersky. Our goal is to have field deployable branch routing/security devices that can be hardened and meet known standards while offering heavy devops / API integration for remote maintenance in standardized manner.
Stuff I have done/tried
1. I have read the release notes and the DAYONE guides... they make no mention of this issue
2. Disabling UTM entirely -- the configuration --- unlike previous versions it looks like the AV profiles need to be defined prior to disabling UTM. This seems kinda silly.
3. https://kb.juniper.net/InfoCenter/index?page=content&id=KB16441&actp=METADATA This doesnt work. Even when subsitituting SOPHOS.
=================== Default Config Attached =========================
version 18.2R1.9;
system {
autoinstallation {
delete-upon-commit; ## Deletes [system autoinstallation] upon change/commit
traceoptions {
level verbose;
flag {
all;
}
}
interfaces {
ge-0/0/0 {
bootp;
}
}
}
name-server {
208.67.222.222;
208.67.220.220;
}
services {
ssh;
telnet;
xnm-clear-text;
web-management {
http {
interface vlan.0;
}
https {
system-generated-certificate;
interface vlan.0;
}
}
dhcp {
router {
192.168.1.1;
}
pool 192.168.1.0/24 {
address-range low 192.168.1.2 high 192.168.1.254;
}
propagate-settings ge-0/0/0.0;
}
}
syslog {
archive size 100k files 3;
file messages {
any critical;
}
file interactive-commands {
interactive-commands error;
}
}
max-configurations-on-flash 5;
max-configuration-rollbacks 5;
license {
autoupdate {
url https://ae1.juniper.net/junos/key_retrieval;
}
}
## Warning: missing mandatory statement(s): 'root-authentication'
}
security {
screen {
ids-option untrust-screen {
icmp {
ping-death;
}
ip {
source-route-option;
tear-drop;
}
tcp {
syn-flood {
alarm-threshold 1024;
attack-threshold 200;
source-threshold 1024;
destination-threshold 2048;
timeout 20;
}
land;
}
}
}
policies {
from-zone trust to-zone untrust {
policy trust-to-untrust {
match {
source-address any;
destination-address any;
application any;
}
then {
permit;
}
}
}
}
zones {
security-zone trust {
host-inbound-traffic {
system-services {
all;
}
protocols {
all;
}
}
interfaces {
vlan.0;
}
}
security-zone untrust {
screen untrust-screen;
interfaces {
ge-0/0/0.0 {
host-inbound-traffic {
system-services {
dhcp;
tftp;
}
}
}
}
}
}
}
interfaces {
ge-0/0/0 {
unit 0;
}
ge-0/0/1 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
ge-0/0/2 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
ge-0/0/3 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
ge-0/0/4 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
ge-0/0/5 {
unit 0 {
family ethernet-switching {
vlan {
members vlan-trust;
}
}
}
}
}
vlans {
vlan-trust {
vlan-id 3;
}
}