Skip to main content

Juniper ScreenOS networking equipment (SSH)

Connector name

agtscreenos

Connector type

PSLang script

Type (UI field value)

Juniper ScreenOS networking equipment (SSH)

Connector status / support

Customer-Verified

Clients may contact Bravura Security support for assistance with this connector. Troubleshooting and testing must be completed in the client's test environment as Bravura Security does not maintain internal test environments for the associated target system.

Installation / setup

Bravura Security Fabric performs operations on Juniper ScreenOS networking equipment using the agtscreenos connector. This connector consists of a PSLang script, agtscreenos.psl and a scripted platform definition file, agtscreenos.con, that associates the script with the SSH connector (agtssh) to access Juniper ScreenOS via SSH.

The following Bravura Security Fabric operations are supported by this connector (depending on your product license and version):

  • administrator reset password

  • user verify password

  • verify+reset password

  • create account

  • delete account

  • get server information

  • List:

    • accounts

    • attributes

For a full list and explanation of each connector operation, see connector operations.

See also

See Secure Shell for details about agtssh .

Targeting the Juniper ScreenOS networking equipment system

For each Juniper ScreenOS networking equipment system, add a target system in Bravura Security Fabric (Manage the System > Resources > Target systems):

  • Type is Juniper ScreenOS networking equipment (SSH) .

  • Address uses options described in the table below.

The full list of target parameters is explained in Target System Options .

Table 1. Juniper ScreenOS (SSH) address configuration

Option

Description

Options marked with a redstar.png are required.

Script file redstar.png

Must be set to agtscreenos.psl

(key: script)

Server redstar.png

The IP address/domain name of the Juniper ScreenOS networking equipment.

(key: server)

Target system’s internal hostname or prompt redstar.png

This is the internally-defined host name that, along with the logged in user’s name, comprises the Juniper ScreenOS prompt. The script generates the expected prompt using this value, then uses the generated prompt to know when commands have completed.

(key: hostname)

Save target system configuration

Select this to commit changes made to this target to permanent storage on the networking device, otherwise it will be stored in memory. This is selected by default.

(key: docommit)

Advanced

Port

TCP Port number. Default is 22.

(key: port)

Compression

Select to enable data compression for SSH connections. Default is false.

(key: compression)

Action for host keys

Select AllowAppend (default) or DenyUnmatch. For new targets, AllowAppend is recommended.

AllowAppend connects to SSH hosts whose public host keys have been previously recorded and have not been changed, and to SSH hosts whose keys have not been previously recorded. It will reject SSH hosts whose keys were previously recorded but have changed.

DenyUnmatch only connects to SSH hosts whose public host keys have been previously recorded and have not been changed. It will reject SSH hosts whose keys have not been previously recorded or were previously recorded but have changed.

(key: hostkeys)

Host keys file

Specify the name of the public host key file. It must be located in the \<instance>\script\ directory.

The file consists of a KVGroup with an entry that contains the host information as the key and the hostkey as the value. This information can be extracted from the PuTTY registry entries (HKEY_CURRENT_USER \Software\SimonTatham\PuTTY\SshHostKeys) where "Name" corresponds to the key and "Data" corresponds to the value.

(key: file)

Authentication key file

This is a generic SSH target field that is ignored for Juniper ScreenOS target systems. Login must be done with username and password.

(key: authkey)

Timeout for connection

Amount of time the connector will wait for a response.

(key: timeout)

Enable SSH v1?

To enable SSH connection via SSH protocol version 1.

(key: enable_ssh_1)



Creating a template account

Bravura Security Fabric uses template accounts as models or "blueprints" for creating new accounts on Juniper ScreenOS networking equipment.

Consult the documentation included with your specific application to learn how to create an account to use as a template in Bravura Security Fabric . You can then add account attributes to determine how new accounts should be created based on the template account’s parameters.

Note that Bravura Security Fabric still requires a template account, even though attributes may or may not be copied from the template account, for example, if the configured action for all account attributes is Set .