Junos Security Objects are essential tools for configuring and managing SRX devices. They allow administrators to simplify security policy creation by using reusable, logical groupings for addresses, services, and applications.
Security objects in Junos OS are reusable entities that help define parameters for security policies. Instead of entering specific IP addresses, ports, or applications in every policy, you can create and reuse these objects.
Address Book Entries:
10.0.0.0/16 as an object named internal-network.Service Objects:
80.Application Groups:
internet-services.Address book entries are reusable definitions for IP addresses, subnets, or address ranges. These objects can be used in security policies to define traffic source or destination addresses.
Global Address Book:
Zone-Specific Address Book:
trust zone, only policies in that zone can use it.You want to define the following:
10.0.0.0/16 as internal-network.192.168.1.0/24 as dmz-network.all-internal-group.Define individual addresses:
set security address-book global address internal-network 10.0.0.0/16
set security address-book global address dmz-network 192.168.1.0/24
Create an address group:
set security address-book global address-group all-internal-group [ internal-network dmz-network ]
View the address book configuration:
show configuration security address-book
Output:
address internal-network 10.0.0.0/16;
address dmz-network 192.168.1.0/24;
address-group all-internal-group [ internal-network dmz-network ];
web-servers, dmz-network) to make the configuration readable.Service objects specify protocols (e.g., TCP, UDP) and port numbers for applications. These objects are used in security policies to define what kind of traffic is permitted or denied.
80.443.22.You want to define a service for web traffic (HTTP and HTTPS).
Create a service for HTTP:
set applications application http protocol tcp destination-port 80
Create a service for HTTPS:
set applications application https protocol tcp destination-port 443
Combine both into a group:
set applications application-set web-traffic application [ http https ]
View the service configuration:
show configuration applications
Output:
application http {
protocol tcp;
destination-port 80;
}
application https {
protocol tcp;
destination-port 443;
}
application-set web-traffic {
application [ http https ];
}
web-traffic, ssh-management) into application sets for easier policy creation.Application groups, also called application sets, are collections of individual applications or services. They simplify security policies by grouping related traffic.
You want to create a group for web-traffic (HTTP and HTTPS) and DNS.
Define DNS as a service:
set applications application dns protocol udp destination-port 53
Add DNS to the application group:
set applications application-set internet-services application [ web-traffic dns ]
View the application group configuration:
show configuration applications
Output:
application dns {
protocol udp;
destination-port 53;
}
application-set internet-services {
application [ web-traffic dns ];
}
Junos OS supports both global and zone-specific address books. Understanding the scope of address object visibility is critical in policy configuration and is a common exam trap.
When you define an address object inside a zone, that object is only usable in security policies that involve that zone as a source or destination.
Example:
set security zones security-zone trust address-book address internal-subnet 10.0.0.0/24
This internal-subnet object can only be used in policies from or to the trust zone.
If used in a policy involving other zones, the SRX will fail to apply the configuration.
Use global address books for reusable objects across multiple zones:
set security address-book global address shared-subnet 192.168.0.0/16
Junos OS includes a large set of predefined applications that represent common protocols and services. These are available out-of-the-box and can be referenced without any manual configuration.
| Predefined Application | Description |
|---|---|
junos-http |
HTTP (TCP port 80) |
junos-https |
HTTPS (TCP port 443) |
junos-ssh |
SSH (TCP port 22) |
junos-dns-tcp |
DNS over TCP (port 53) |
junos-icmp-all |
All ICMP traffic |
set security policies from-zone trust to-zone untrust policy allow-web match application junos-http
These built-in applications eliminate the need to manually define common services.
They also include protocol detection logic, enhancing accuracy beyond just port-based matching.
junos-https, not https-custom.Junos OS allows creating application sets, which are groups of applications or other sets.
set applications application-set web-traffic application [ junos-http junos-https ]
set applications application-set internet-services application web-traffic
In the above case:
web-traffic contains two predefined applications.
internet-services contains another set (web-traffic), showcasing nesting.
While nesting is allowed, it’s generally advised to limit to one level to:
Maintain readability and simplify troubleshooting.
Prevent performance degradation during policy evaluation.
Both application objects and service objects define how traffic is identified (protocol + port), but they are not used together in a single match clause.
If an application is specified in a security policy:
Likewise, if a service is matched, you cannot add application.
set security policies from-zone trust to-zone untrust policy allow-web match application junos-http
set security policies from-zone trust to-zone untrust policy mixed-policy match application junos-http
set security policies from-zone trust to-zone untrust policy mixed-policy match service my-custom-service
→ This will generate a commit error, as application and service are mutually exclusive.
| Concept | Key Point |
|---|---|
| Zone-specific address books | Only usable in policies involving that zone |
| Predefined applications | junos-http, junos-ssh, etc. are available by default |
| Application set nesting | Allowed, but over-nesting can impact clarity and performance |
| Application vs. service objects | Mutually exclusive in security policy match clauses |
What is the purpose of an address-book in Junos SRX security configuration?
An address-book stores IP address objects that can be referenced in security policies.
Address-books allow administrators to define reusable IP address objects instead of manually specifying addresses within every security policy. This improves configuration clarity and simplifies updates. For example, a server IP address can be defined once in the address-book and then referenced in multiple policies. If the server address changes, administrators only need to update the address object rather than modifying every policy. Address-books can be defined globally or within specific security zones depending on the configuration requirements.
Demand Score: 90
Exam Relevance Score: 93
What is the difference between an address object and an address-set in Junos SRX?
An address object represents a single IP address or subnet, while an address-set groups multiple address objects together.
Address objects define individual hosts or networks, such as a server IP or subnet. Address-sets allow administrators to combine multiple address objects into a single logical group. This grouping simplifies policy configuration because a security policy can reference the address-set instead of listing each address individually. Address-sets are especially useful in environments with many servers or networks that require the same policy rules.
Demand Score: 88
Exam Relevance Score: 92
What is an application object in Junos security policies?
An application object defines a specific protocol or service that can be used in security policy matching.
Application objects identify traffic based on protocol characteristics such as TCP/UDP ports or application signatures. For example, an application object may represent HTTP (TCP port 80) or HTTPS (TCP port 443). Security policies use application objects to control which types of traffic are permitted between zones. This approach allows administrators to create granular security rules based on specific services rather than allowing all traffic between networks.
Demand Score: 87
Exam Relevance Score: 91
What is the purpose of an application-set in Junos security configuration?
An application-set groups multiple application objects together for use in security policies.
Application-sets allow administrators to combine several application objects into a single logical group. For example, a web-services application-set might include HTTP, HTTPS, and DNS. Instead of creating multiple policies for each application, administrators can reference the application-set in a single policy. This simplifies configuration management and ensures consistent policy enforcement across multiple services.
Demand Score: 85
Exam Relevance Score: 90
Why might a security policy fail if an address object exists but traffic still does not match the policy?
Because the address object may be defined in the wrong address-book scope.
In Junos SRX, address objects can be defined either globally or within specific security zones. If a policy references an address object that exists in a different zone’s address-book, the policy may not match the traffic. Engineers troubleshooting this issue should verify that the address object is defined within the correct zone or in the global address-book so that it can be referenced by the intended policy.
Demand Score: 84
Exam Relevance Score: 90