Sei sulla pagina 1di 24

Pulse Policy Secure

Release Notes

Release and Build 5.0 R13.1,


Published

Document Version Revision 6.0


Pulse Policy Secure 5.0R13.1 Release Notes

Contents
Introduction .................................................................................................................................................................................5
Interoperability and Supported Platforms ...................................................................................................................................5
Problems Resolved in C5.0R13.1 Release ....................................................................................................................................5
Table 1: Problems Resolved in C5.0R13.1 Release...............................................................................................................5
Pulse Policy Secure New Features in C5.0R13 Release ................................................................................................................5
NDPP DHE-2048 Key Exchange Enhancement .....................................................................................................................5
Figure 1: Configuration ........................................................................................................................................................6
Problems Resolved in C5.0R13 Release .......................................................................................................................................6
Table 2: Problems Resolved in C5.0R13 Release..................................................................................................................6
Security Issues Resolved in C5.0R13 Release ...............................................................................................................................6
Table 3: Security Issues Resolved in C5.0R13 Release .........................................................................................................6
Pulse Policy Secure New Features in C5.0R12.1 Release .............................................................................................................7
Pulse Secure Rebranding .............................................................................................................................................................7
Problems Resolved in C5.0R12.1 Release ....................................................................................................................................7
Table 4: Problems Resolved in This Release ........................................................................................................................7
Security Issues Resolved in C5.0R12.1 Release ............................................................................................................................8
Table 5: Security Issues Resolved in This Release ................................................................................................................8
Problems Resolved in C5.0R11 Release .......................................................................................................................................8
Table 6: Problems Resolved in This Release ........................................................................................................................8
Security Issues Resolved in C5.0R11 Release ...............................................................................................................................8
Table 7: Security Issues Resolved in This Release ................................................................................................................8
Noteworthy Changes in C5.0R10 Release ....................................................................................................................................9
Figure 2: Host Checker Policy ...............................................................................................................................................9
Figure 3: Patch Management .............................................................................................................................................10
Problems Resolved in C5.0R10 Release .....................................................................................................................................10
Table 8: Problems Resolved in This Release ......................................................................................................................10
Pulse Policy Secure New Features in C5.0R9 Release ................................................................................................................11
Disable TLS 1.0 ...................................................................................................................................................................11
New Functionality to create role mapping rules based on EKU field of certificate: ..........................................................11
Figure 4: Expressions and Variables ...................................................................................................................................12
Problems Resolved in C5.0R9 Release .......................................................................................................................................12
Table 9: Problems Resolved in This Release ......................................................................................................................12

© 2015 by Pulse Secure, LLC. All rights reserved 2


Pulse Policy Secure 5.0R13.1 Release Notes

Known Issues in C5.0R9 Release ................................................................................................................................................13


Table 10: Known Issues in this release ...............................................................................................................................13
Noteworthy Changes in C5.0R8.1 Release .................................................................................................................................13
Problems Resolved in C5.0R8.1 Release ....................................................................................................................................13
Table 11: Problems Resolved in This Release ....................................................................................................................13
Problems Resolved in C5.0R8 Release .......................................................................................................................................14
Table 12: Problems Resolved in This Release ....................................................................................................................14
Noteworthy Changes in C5.0R7 Release ....................................................................................................................................14
Problems Resolved in C5.0R7 Release .......................................................................................................................................15
Table 13: Problems Resolved in This Release ....................................................................................................................15
Problems Resolved in C5.0R6 Release .......................................................................................................................................15
Table 14: Problems Resolved in This Release ....................................................................................................................15
Pulse Policy Secure 5.0R5 New Features ...................................................................................................................................16
File Integrity Check during Boot up ....................................................................................................................................16
New Junos Pulse Connect and Policy secure license SKU’s ................................................................................................16
License JSA rollback and PAC license server side enforcement .........................................................................................16
Problems Resolved in C5.0R5 Release .......................................................................................................................................16
Table 15: Problems Resolved in This Release ....................................................................................................................16
Known Issues in C5.0R5 Release ................................................................................................................................................17
Table 16: Known Issues in This Release .............................................................................................................................17
Problems Resolved in C5.0R4 Release .......................................................................................................................................17
Table 17: Problems Resolved in This Release ....................................................................................................................17
Problems Resolved in C5.0R3.2 Release ....................................................................................................................................17
Table 18: Problem Resolved in This Release ......................................................................................................................17
Pulse Policy Secure 5.0R3 and Pulse 5.0R3 New Features .........................................................................................................18
SRX Dynamic VPN Connections for Junos Pulse for Mac ...................................................................................................18
Figure 5: Junos Pulse for Mac ............................................................................................................................................18
Configuring a Junos Pulse Credential Provider Connection for Password or Smart Card Login ........................................18
Figure 6: Pulse Credential Provider Tiles............................................................................................................................19
Table 19: Configuration Options for Credential Provider Login .........................................................................................20
Updated NDIS Support .......................................................................................................................................................21
Problems Resolved in C5.0R3 Release .......................................................................................................................................22
Table 20: Problems Resolved in This Release ....................................................................................................................22

© 2015 by Pulse Secure, LLC. All rights reserved 3


Pulse Policy Secure 5.0R13.1 Release Notes

Known Issues in C5.0R3 Release ................................................................................................................................................22


Table 21: Known Issues in This Release .............................................................................................................................22
Problems Resolved in 5.0R2 Release .........................................................................................................................................22
Table 22: Problems Resolved in This Release ....................................................................................................................22
Known Issues in C5.0R2 Release ................................................................................................................................................23
Table 23: Known Issues This Release .................................................................................................................................23
Documentation ..........................................................................................................................................................................23
Documentation Feedback ..........................................................................................................................................................23
Technical Support ......................................................................................................................................................................23
Revision History .........................................................................................................................................................................24
Table 24: Revision History ..................................................................................................................................................24

© 2015 by Pulse Secure, LLC. All rights reserved 4


Pulse Policy Secure 5.0R13.1 Release Notes

Introduction
These release notes contain information about new features, software issues that have been resolved and new issues. If the
information in the release notes differs from the information found in the documentation set, follow the release notes.

This is an incremental release notes document that describes the changes made from 5.0R1 release to C5.0R13.1. The 5.0R1
release notes still apply except for the changes mentioned in this document. Please refer to 5.0R1 release notes for the
complete version.

Interoperability and Supported Platforms


Please refer to the Junos Pulse Access Control Service Supported Platforms Guide for supported versions of browsers and
operating systems in this release.

Problems Resolved in C5.0R13.1 Release


Table 1: Problems Resolved in C5.0R13.1 Release

Problem Report
Number Description

When Shavlik patch assessment policies are configured as enforcement or evaluation policies, Pulse will not connect.
PRS-333341

PRS-333865 Host checker validation on MAC OSX may fail when deployed from Pulse Policy Secure

Pulse Policy Secure New Features in C5.0R13 Release


NDPP DHE-2048 Key Exchange Enhancement

To address the security vulnerability CVE-2015-4000 (Logjam issue), a new option has been added under ‘System ->
Configuration -> Security -> SSL Options’ that ensures that all Diffie-Helman key exchanges use a 2048 bit key.

The TLS protocol uses Key Exchange algorithms to transfer the pre-master secret between TLS client and TLS server. The
major key exchange algorithms supported in TLS are RSA, ECDHE and DHE. Security of the TLS transfer depends heavily on
the use of stronger keys for key exchange algorithms.

The current Diffie-Hellman Key Exchange (DHE) uses 512 or 1024 bits keys which are considered cryptographically weak.

If this new option is enabled, the Diffie-Hellman Key Exchange will use 2048-bit keys.

© 2015 by Pulse Secure, LLC. All rights reserved 5


Pulse Policy Secure 5.0R13.1 Release Notes

Figure 1: Configuration

Problems Resolved in C5.0R13 Release


Table 2: Problems Resolved in C5.0R13 Release

Problem Report
Number Description

In a specific case where multiple 802.1x sessions exist pertaining to same mac-address (for example, switch user in Windows m/c)
PRS-328935 and same IP-address. Also, one session allows auth provision and other session doesn't. In this condition, gateman crash happens
occasionally.

When 802.1X is in use, there may be occasional “Program radius recently failed” messages, and they are not in themselves
PRS-324914
serious.

Security Issues Resolved in C5.0R13 Release


Table 3 describes issues that are resolved when you upgrade.

Table 3: Security Issues Resolved in C5.0R13 Release

Problem Report
Description
Number

PRS-328850 PKCS7 crash with missing Enveloped Content (CVE-2015-1790)

PRS-328848 CMS verify infinite loop with unknown hash function (CVE-2015-1792)

PRS-328777 Malformed ECParameters causes infinite loop (CVE-2015-1788)

PRS-328776 Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)

© 2015 by Pulse Secure, LLC. All rights reserved 6


Pulse Policy Secure 5.0R13.1 Release Notes

Pulse Policy Secure New Features in C5.0R12.1 Release


Pulse Secure Rebranding
Pulse Policy Secure C5.0R12.1 have been re-branded with the new Pulse Secure logo. The Pulse Secure logo has replaced
Juniper logo. You will see certain changes on the admin console that indicate this re-brand.

Pulse client on desktop have been re-branded with the new corporate logo.

When you upgrade to 8.0R12.1/5.0R12.1, please be aware of these user-visible changes. There are no specific changes to
the upgrade experience or to the overall behavior tied to re-branding. Several internal aspects such as filenames, location
of install directories, registry keys and so on will remain the same in this release.

Note: For Pulse Secure 5.0R12.1, the names of the Pulse Secure gateways (formerly collectively referred to
as the IVE, or “Instant Virtual Extranet”) have changed.

The SSL-VPN headend (formerly called the Secure Access or SA device) is now called Pulse Connect Secure.
The access-control headend (formerly called the Unified Access Control or UAC device, and also sometimes
called the Infranet Controller or IC) is now called Pulse Policy Secure.

Problems Resolved in C5.0R12.1 Release


A few of the fixes that were included in 5.0R11 were (inadvertently) not included in 5.0R12, this release fixes the issue. For
details please refer TSB40051

Table 4: Problems Resolved in This Release

Problem Report
Description
Number

PRS-324526 Accessing certain JIRA links through rewriter gives 404 error using IE9 browser.

PRS-327629 Access of webmail via Office 365 through the rewriter fails.

© 2015 by Pulse Secure, LLC. All rights reserved 7


Pulse Policy Secure 5.0R13.1 Release Notes

Security Issues Resolved in C5.0R12.1 Release


Table 5 describes issues that are resolved when you upgrade.

Table 5: Security Issues Resolved in This Release

Problem Report
Description
Number

PRS-327488 XSS via UserAgent string

PRS-327388 Is SA/MAG vulnerable to CVE-2014-3572?

PRS-327354 Security vulnerability "APP-H-002: Reflected Cross-Site Scripting allows control of victim's browser"

Problems Resolved in C5.0R11 Release


Table 6: Problems Resolved in This Release

Problem Report
Description
Number

PRS-324749 With Pulse, Host Checker fails to delete the files from the path specified with <USERHOME> as environmental variable.

When a Pulse user saves their credentials for dual authentication, and the secondary password is changed, Pulse never prompts
PRS-325004
for credentials and authentication fails.

PRS-324178 Language localization is incorrect for Guest User Access Management web pages.

In a clustered environment all the nodes in the cluster send logs to the syslog server even though synchronize log messages option
PRS-323861
is enabled.

Security Issues Resolved in C5.0R11 Release


Table 7: Security Issues Resolved in This Release

Problem Report
Description
Number

PRS-324926 Base64 decode (CVE-2015-0292).

PRS-324904 ASN.1 structure reuse memory corruption fix (CVE-2015-0287).

PRS-324902 Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)

© 2015 by Pulse Secure, LLC. All rights reserved 8


Pulse Policy Secure 5.0R13.1 Release Notes

PRS-324910 Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)

Noteworthy Changes in C5.0R10 Release


In C5.1R1 release, patch assessment and remediation functionality offered by Shavlik is deprecated and replaced with
Opswat patch management solution. Shavlik solution will be deprecated in future C5.0Rx release as well.

For an interim period, we are providing both Shavlik and Opswat patch solutions in C5.0R10 release. This will give the
opportunity to test and familiarize with the OPSWAT based policies for an easier transition when the Shavlik based policies
are deprecated.

OPSWAT based patch management policies can be configured by navigating to Authentication-> Endpoint Security -> Host
Checker -> Policies -> New:

Figure 2: Host Checker Policy

© 2015 by Pulse Secure, LLC. All rights reserved 9


Pulse Policy Secure 5.0R13.1 Release Notes

Figure 3: Patch Management

Problems Resolved in C5.0R10 Release


Table 8 describes issues that are resolved when you upgrade.

Table 8: Problems Resolved in This Release

Problem Report
Description
Number

PRS-324043 Implementing OPSWAT Patch management support for C5.0Rx releases.

PRS-322543 When the role is configured with "Allow VPN through firewall" option, a process memory leak can occur.

PRS-321629 AD authentication may not correctly fallback to secondary DNS server if the primary is unreachable for IC users.

Pulse sends TCP Keep alives every 2mins irrespective of the heart beat interval timer & queries on Pulse client connection status
PRS-322829
transition delay.

© 2015 by Pulse Secure, LLC. All rights reserved 10


Pulse Policy Secure 5.0R13.1 Release Notes

PRS-322101 L2 network connectivity (802.1x session to) to persist until session limit, even if Pulse loses TCP connection to IC.

PRS-321949 Host Check is performed twice for L2 Pulse auth user when the Host Check interval is configured as "0".

Pulse Policy Secure New Features in C5.0R9 Release


Disable TLS 1.0

The “Disable TLS 1.0” feature will provide a mechanism to allow administrators more fine-tuned control of the TLS version
used for connections to the Pulse Access Control.

This granularity is required by multiple agencies; NIST standards note TLS 1.0 should not be used and will transition to
stating only TLS 1.2 and higher should be allowed.

The current SSL protocol selection mechanism is as follows:

 Accept only TLS


 Accept only SSL V3 and TLS
 Accept SSL V2 and TLS V3 TLS

This feature allows more fine-grained control of SSL and TLS versions to be used, for example:

 Accept only TLS 1.2 and later


 Accept only TLS 1.1 and later
 Accept only TLS
 Accept SSL V3 and TLS

Note: This setting controls only connections into the device (Inbound Settings) and
does not dictate settings for SSL connections that are initiated by the IVE.

New Functionality to create role mapping rules based on EKU field of certificate:

C5.0R9 for the Pulse Access Control, introduces the ability to create custom expressions based on OID and/or text-based
extended key usage (EKU) fields of client certificates. The screenshot below shows where the option can be found in the
certAttr field.

© 2015 by Pulse Secure, LLC. All rights reserved 11


Pulse Policy Secure 5.0R13.1 Release Notes

Below screenshot shows the custom expressions:

Figure 4: Expressions and Variables

Problems Resolved in C5.0R9 Release


Table 9 describes issues that are resolved when you upgrade.

Table 9: Problems Resolved in This Release

Problem Report
Description
Number

PRS-322000 System-generated process snapshot are generating every second, due to CRL entry getting corrupted.

© 2015 by Pulse Secure, LLC. All rights reserved 12


Pulse Policy Secure 5.0R13.1 Release Notes

PRS-319038 CGI server process crashes with host checker when null user agent string is sent.

PRS-316679 Cannot remove certificate from IC with error SAML auth server “chassis auth server" is configured to use this certificate.

PRS-318842 Delegated admin users can make changes to the device management setting.

Known Issues in C5.0R9 Release


Table 10 describes the open issues in this release

Table 10: Known Issues in this release

Problem Report
Description
Number

Push Config from one IVE to another fails, if the target is configured to accept TLS 1.1 or higher and source is configured to use
323238
SSLv3.

Noteworthy Changes in C5.0R8.1 Release


This release addresses the POODLE fix when hardware acceleration is enabled.

Problems Resolved in C5.0R8.1 Release


Table 11 describes issues that are resolved when you upgrade.

Table 11: Problems Resolved in This Release

Problem Report
Description
Number

PRS-321986 Authentication failure when certificate authentication is enabled against a hardware acceleration IVE.

© 2015 by Pulse Secure, LLC. All rights reserved 13


Pulse Policy Secure 5.0R13.1 Release Notes

Problems Resolved in C5.0R8 Release


Table 12 describes issues that are resolved when you upgrade.

Table 12: Problems Resolved in This Release

Problem Report
Description
Number

PRS-318582 Fed client logs a Major event every three minutes if it cannot connect to the IF-MAP server.

While allocating the license to a client (IC-6500, IC-6000, IC-4000 and SA-6500, SA-6000, SA-4000) the license allocation table is
PRS-316305
visible.

Fed client where an enforcer is connected crashes when unauthenticated users try to access a resource behind the enforcer at
PRS-308597
higher rate with 50k CPS.

Federated session on fed server has stale device attribute if the user logins in and logs out of fed client several times and if the
PRS-318090
session export policy is configured with "Set IF-MAP Device Attribute".

PRS-317599 The radius process sometimes crashes when a new PIN is being specified for EAP-GTC authentication.

PRS-317224 RADIUS-only license does not allow role mapping rules to be re-ordered.

PRS-317062 Existing Tunnel-Private-Group-ID attribute syntax does not work with Aruba equipment.

Debug log message is added when a MS native supplicant enabled with 802.1X L2 user where agentless is not enabled on an
PRS-316848
Infranet Controller and try to access a resource behind the enforcer.

PRS-309845 Dashboard crashes during HC policy evaluation.

PRS-318422 MAC Realm with radius return attributes is failing when the radius return attribute does not belong to the respective radius client.

Noteworthy Changes in C5.0R7 Release


This release addresses the issue described in the following Juniper Security Advisory: http://kb.juniper.net/JSA10648

© 2015 by Pulse Secure, LLC. All rights reserved 14


Pulse Policy Secure 5.0R13.1 Release Notes

Problems Resolved in C5.0R7 Release


Table 13 describes issues that are resolved when you upgrade.

Table 13: Problems Resolved in This Release

Problem Report
Description
Number

PRS-317489 XML import failing when Shavlik policies have custom rule expression with "." in it.

PRS-316045 Add new MIB variable "iveTotalSignedInUsers" to count Concurrent RADIUS MAC and OAC users.

PRS-315355 MAC address authentication-using LDAP server fails when there is transient disconnect between SA and LDAP server.

UAC returns incorrect radius return attribute policies when client resumes from hibernation after roaming to a new location
PRS-311942
group.

PRS-308305 When Fedclient imports the sessions at a rate of 500, a fedclient crash is observed.

UAC returns incorrect radius return attribute policies when client resumes from hibernation after roaming to a new location group
PRS-311948

Problems Resolved in C5.0R6 Release


Table 14 describes issues that are resolved when you upgrade.

Table 14: Problems Resolved in This Release

Problem Report
Description
Number

If a sign in policy is mapped to multiple realms and a user's 802.1x authentication protocol does not map to the first realm (as
1004553
displayed in the UI), then the L2 authentication will fail.

999541 Junos Pulse client fails role-mapping rule based on custom expression variable “loginHost”.

997794 Incorrect release string is logged for UAC as part of automatic version monitoring

945445 IC-SRX reconnects multiple time when SRX failover occur.

© 2015 by Pulse Secure, LLC. All rights reserved 15


Pulse Policy Secure 5.0R13.1 Release Notes

Pulse Policy Secure 5.0R5 New Features


File Integrity Check during Boot up

The file integrity check is added to satisfy Common Criteria certification. File integrity check is performed at every system
reboot to verify Juniper-built binary files. If the verification fails, a critical message is logged in the events log and message is
also logged in the debug log with details of what failed.

New Junos Pulse Connect and Policy secure license SKU’s

With the 8.0r5 release of the MAG Series gateway software, role specific licenses are being introduced in conjunction with
the common access licenses. The Connect Secure licenses (CONSEC*) must be used on Junos Pulse Secure Access (SSL VPN)
devices/personality only and Policy Secure (POLSEC*) licenses must be used on Junos Pulse Access Control (UAC)
devices/personality only. Please refer to the Junos Pulse Ordering Guide and/or Admin Guide for further details.

License JSA rollback and PAC license server side enforcement

Juniper had temporarily removed software-based license enforcement in its Pulse mobility products in SA/UAC versions
8.0/5.0 as part of evaluating a new licensing initiative. Please be advised that this release (8.0R5) will re-instate software-
based license enforcement. The software-based license enforcement will be the same as in pre 8.0 releases.

Problems Resolved in C5.0R5 Release


Table 15 describes issues that are resolved when you upgrade.

Table 15: Problems Resolved in This Release

Problem Report
Description
Number

989428 Improved IF-MAP logging for session import on IF-MAP client.

945102 License page does not display the installed license details correctly for other node in a cluster.

© 2015 by Pulse Secure, LLC. All rights reserved 16


Pulse Policy Secure 5.0R13.1 Release Notes

Known Issues in C5.0R5 Release


Table 16 describes the open issues in this release

Table 16: Known Issues in This Release

Problem Report
Description
Number

Junos Pulse (and OAC) UAC IPSec enforcement on Windows is performed in a Network (NDIS) Filter Driver. Other products such
as IPSec based VPN clients may also perform IPSec processing in a Network Filter Driver. The order of processing of Network
Filtering Drivers may affect interoperability between Junos Pulse UAC IPSec enforcement and third-party VPN clients. To
999688
minimize interoperability issues with Network Filter order UAC support forcing UDP encapsulation of IPSec traffic. When UDP
encapsulation is enabled Junos Pulse IPSec packets will be correctly sent and received from the third-party VPN IPSec interface
irrespective of Network Filter ordering.

Problems Resolved in C5.0R4 Release


Table 17 describes issues that are resolved when you upgrade.

Table 17: Problems Resolved in This Release

Problem Report
Description
Number

949672 Radius crash occurs rarely during new PIN creation using RSA ACE authentication.

962348 Radius and web processes leak memory while accepting SSL connections when exchanging keys with the client.

943637 Push configuration fails when trying to do selective push of Resource access policies for customer configuration.

922906 Gateman crashes when there is an endpoint session with no IP address and only MAC address.

Problems Resolved in C5.0R3.2 Release


Table 18 describes issues that are resolved when you upgrade.

Table 18: Problem Resolved in This Release

Problem Report
Description
Number

981148 This release fixes the issue described in JSA10623. For more detailed info please refer KB29007

© 2015 by Pulse Secure, LLC. All rights reserved 17


Pulse Policy Secure 5.0R13.1 Release Notes

Pulse Policy Secure 5.0R3 and Pulse 5.0R3 New Features


SRX Dynamic VPN Connections for Junos Pulse for Mac

Junos Pulse for Mac OS X adds support for Dynamic VPN tunnels to a Juniper Networks SRX gateway. Mac OS X endpoints
can now use Junos Pulse client software to connect to SRX Branch series SRX100-SRX650 gateways that are running Junos OS
Release 10.x or later, and that have dynamic VPN access enabled and configured. SRX gateways do not support deployment
of the Mac version of the Junos Pulse Client. For deployment options for the Mac version of the Junos Pulse client, please
read the Junos Pulse Admin guide.

Figure 5: Junos Pulse for Mac

Note: The Junos Pulse Dynamic VPN functionality is compatible with SRX-Branch
(SRX100-SRX650) devices only. SRX Data Center (SRX1400-SRX5800 – also called SRX
HE or High End) devices do not support Junos Pulse Dynamic VPN from either
Windows or Mac clients. For more details, please see the KB
http://kb.juniper.net/InfoCenter/index?page=content&id=KB17436&smlogin=true.

Configuring a Junos Pulse Credential Provider Connection for Password or Smart Card Login

If you allow users to log in with smart cards or with a username/password, then you can have the Pulse credential provider
automatically authenticate the user based on the login method. The Pulse user sees two different credential provider tiles
for the Pulse connection, one for smart card authentication and one for username/password authentication. Credential

© 2015 by Pulse Secure, LLC. All rights reserved 18


Pulse Policy Secure 5.0R13.1 Release Notes

provider tiles that launch a Pulse connection include a Pulse logo. See figure 6. The Pulse connection determines which
realm to use through preferred realm settings that you specify as part of the Pulse connection preferences. If the
connection succeeds, the login type is saved so that, if re-authentication is needed, (for example, the connection times out),
the same login type is used.

Figure 6: Pulse Credential Provider Tiles

Before you begin:

 Before you deploy a connection that uses this feature, make sure that you have created all the authentication realms
that are required. You need one realm for smart card authentication and a different one for user name/password
authentication. Both realms can be mapped to the same role or you can use different roles, and include a remediation
role for endpoints that do not pass Host Checker evaluation. If you use machine authentication for a connection
(machine-then-user-at-credprov), you need an authentication realm for the machine.
 Make sure that all of the realms that are used in the Pulse connection are included in the sign-in policy.
 The authentication realms on the Pulse server must be configured so that the Preferred Pre-login Smartcard Realm
uses certificate authentication and the Preferred Pre-login Password Realm uses username/password authentication.
The following procedure summarizes the steps to create a Junos Pulse connection that uses credential provider
authentication, and allows the user to choose either smart card login or username/password login. Error! Reference source
ot found. describes the configuration options:

1. Click Users > Junos Pulse > Connections and create or select a connection set.
2. Create or edit a connection. For connection type, you can select either UAC (802.1X) for a Layer 2 connection or SSL
VPN or UAC (L3) for a Layer 3 connection. The SRX and App Acceleration connection types do not support credential
provider authentication.
3. For the Connection is established option, choose one of the credential provider options:
 Automatically at user login—Enables Pulse client interaction with the credential provider software on the
endpoint. The user credentials are used to establish the authenticated Pulse connection to the network, login to
the endpoint, and login to the domain server.
 Automatically when the machine starts. Connection is authenticated again at user login—Enables Pulse client
interaction with the credential provider software on the endpoint. Machine credentials are used to establish the

© 2015 by Pulse Secure, LLC. All rights reserved 19


Pulse Policy Secure 5.0R13.1 Release Notes

authenticated Pulse connection to the network using the specified Machine Connection Preferences or Pre-login
Connection Preferences. When the user provides user credentials, the connection is authenticated again.
4. For SSL VPN or UAC (L3) connections that are set to have the connection established automatically, you can define
location awareness rules that enable an endpoint to connect conditionally.
5. For a Layer 2 connection that uses machine certificate authentication, make sure that the connection has an entry in
the Trusted Server List. To allow any server certificate, type ANY as the Server certificate DN. To allow only one server
certificate, specify the server certificate’s full DN for example,
C=US; ST=NH; L=Kingston; O=My Company; OU=Engineering; CN=c4k1.stnh.mycompany.net;
E=ausername@mycompany.com.
6. For the desired connection behavior, set the connection preferences as described in Error! Reference source not
ound..

Table 19: Configuration Options for Credential Provider Login

Pulse Client Credential Provider Connection is User Connection Pre-login Connection Machine Connection
Login Behavior established option Preferences options Preferences Preferences

At user login, the user can choose Automatically at Preferred User Realm Enables Pulse credential Not available.
from two credential provider tiles: user login and Preferred User Role provider tiles. The realm
smart card login or Set are not available if name appears on each tile.
username/password login. you specify values for You must specify values for
Preferred Pre-login both of the following options:
The credentials are then used to Password Realm
connect to the network, login to Preferred Pre-login  Preferred Pre-login
the endpoint, and login to the Smartcard Realm. Password Realm—
domain server. The authentication
realm that
provides
username/passwor
d authentication.

 Preferred Pre-
login Smartcard
Realm—The
authentication
realm that
provides
smartcard
authentication.

© 2015 by Pulse Secure, LLC. All rights reserved 20


Pulse Policy Secure 5.0R13.1 Release Notes

At machine login and at user login, Automatically Enables Pulse credential Preferred Machine
the user can choose from two when machine provider tiles. The realm Realm and Preferred
credential provider tiles: smart starts. Connection name appears on each tile. Machine Role Set are
card login or username/password is authenticated not available if you
login. again at user login.  Preferred Pre-login specify values for
Password Realm— Preferred Pre-login
The authentication Password Realm
realm that Preferred Pre-login
provides Smartcard Realm.
username/passwor
d authentication.

 Preferred Pre-login
Smartcard
Realm—The
authentication
realm that
provides smartcard
authentication.

Updated NDIS Support

Junos Pulse for Windows includes a set of drivers that interface with the Windows Network Driver Interface Specification
(NDIS) driver for communications with the endpoint’s network interface. For Pulse 5.0R3, the NDIS5 compliant Juniper
Network Agent (JNPRNA) has been replaced with the NDIS6 compliant Juniper Network Service (JNPRNS) to support
enhanced functionality that is available in Windows Vista and later Windows versions. JNPRNA will continue to be available
on Windows XP endpoints. Pulse on all other Windows versions will use JNPRNS. The Pulse for Windows file set changes are
included in the Junos Pulse Client Changes Guide 5.0R3.

Note: JNPRNS does not support wired 802.1x for Odyssey Access Client (OAC). If
OAC is already installed on the endpoint when you install Pulse 5.0R3, the new
JNPRNS components will be installed to support Pulse, and the required legacy
JNPRNA components will remain on the endpoint to support OAC functionality.
For more information about NDIS and upgrading to Pulse 5.0R3, see KB 28892.

© 2015 by Pulse Secure, LLC. All rights reserved 21


Pulse Policy Secure 5.0R13.1 Release Notes

Problems Resolved in C5.0R3 Release


Table 20 describes issues that are resolved when you upgrade.

Table 20: Problems Resolved in This Release

Problem Report
Number Description

If a RADIUS Client is configured with Support Disconnect Message [x]

The following message may appear in the Events log:


928667
RADIUS: Invalid Message-Authenticator from RADIUS client CLIENT, discarding. Incorrect shared secret?

Here CLIENT will be localhost2 or the name of a node of the appliance's cluster

948953 CHAP authentication for users authenticating to SQL authentication server fails

Known Issues in C5.0R3 Release


Table 21 describes the open issues with Junos Pulse.

Table 21: Known Issues in This Release

Problem Report
Number Description

There are no new issues to report in this release.

Problems Resolved in 5.0R2 Release


Table 22 describes the open issues with Junos Pulse.

Table 22: Problems Resolved in This Release

Problem Report
Description
Number

935842 OAC failed to populate the correct encryption details during a network scan for a new network when the wireless access point is
configured for WPA2/TKIP or WPA/AES Encryption.

851224
IP allocation fails for the IPSEC clients connected to IC A/A cluster configured with DNS load balancer.

© 2015 by Pulse Secure, LLC. All rights reserved 22


Pulse Policy Secure 5.0R13.1 Release Notes

952715 Gateman crashes when there are multiple dot1x sessions for same IP and MAC address but different users. The dot1x session is
using non-JUAC protocol and the IP is updated on IC by publishing IP-MAC link.

921463 Log messages like "Warning: Duplicate Request in Cache with mismatched message authenticator, rejecting." observed in SBR
logs.

923625 Secure Access users sending PAP authentication requests fails to get connected to the UAC device having certificate restriction
enabled on the realm.

947021
RADIUS process memory leak when client sends EAP-NAK indicating it has no supported protocols.

Known Issues in C5.0R2 Release


Table 23 describes the open issues with Junos Pulse.

Table 23: Known Issues This Release

Problem Report
Number Description

There are no new issues to report in this release.

Documentation
Pulse Policy Secure documentation is available at https://www.pulsesecure.net/support.

Documentation Feedback
We encourage you to provide feedback, comments, and suggestions so that we can improve the documentation. You can
send your comments to techpubs-comments@pulsesecure.net.

Technical Support
When you need additional information or assistance, you can contact the Pulse Secure Global Support Center (PSGSC)
 Pulse Secure Global Support Center (PSGSC): 1-844-751-7629 (Toll Free, US).
 All other Countries - https://www.pulsesecure.net/support/support-contacts call us at 1-408-300-9668.
 For more technical support resources, browse the support website (http://www.pulsesecure.net/support).

© 2015 by Pulse Secure, LLC. All rights reserved 23


Pulse Policy Secure 5.0R13.1 Release Notes

Revision History
Table 24 lists the revision history for this document.

Table 24: Revision History

Revision
Description

February 17, 2015 Included C5.0R9 release notes

March 23, 2015 Included C5.0R10 release notes

May 22, 2015 Included C5.0R11 release notes

August 7, 2015 Included C5.0R12 release notes

September 24, 2015 Included C5.0R13release notes

Included C5.0R13.1 release notes


November 17, 2015

© 2015 by Pulse Secure, LLC. All rights reserved 24

Potrebbero piacerti anche