Skip to content

7.0.0 documentation #837

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 29 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
5ac9089
draft versions of topics
Chr1st0ph3rTurn3r Mar 19, 2025
a7a83a0
missed commit
Chr1st0ph3rTurn3r Mar 20, 2025
2193afa
fixing code example, adding topics to TOC
Chr1st0ph3rTurn3r Mar 20, 2025
de52ee4
edits to topics
Chr1st0ph3rTurn3r Mar 20, 2025
6d94caf
7.0 docs; password secutity and new screens, release notes updates, t…
Chr1st0ph3rTurn3r Apr 3, 2025
d3b781e
graphics
Chr1st0ph3rTurn3r Apr 3, 2025
bf5769f
updated TOC to match new format on Juniper site. Also keeping the old…
Chr1st0ph3rTurn3r Apr 7, 2025
7501927
edits
Chr1st0ph3rTurn3r Apr 9, 2025
e539158
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r Apr 23, 2025
dcb1f0b
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r May 6, 2025
54395de
interim commit
Chr1st0ph3rTurn3r May 15, 2025
3094c2a
cleanup and adding the svr-ztna topic to the security section
Chr1st0ph3rTurn3r May 21, 2025
8ed05e8
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r May 22, 2025
492d308
fixing broken link
Chr1st0ph3rTurn3r May 22, 2025
07e196d
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r Jun 2, 2025
d179550
draft of NIC driver FEC support info.
Chr1st0ph3rTurn3r Jun 2, 2025
43c3b02
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r Jun 4, 2025
826abcc
draft for SVRv2 available for review
Chr1st0ph3rTurn3r Jun 4, 2025
176e45b
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r Jun 5, 2025
c5bc24e
Merge branch 'master' into 7.0.0-documentation
Chr1st0ph3rTurn3r Jun 10, 2025
f443036
interim commit
Chr1st0ph3rTurn3r Jun 11, 2025
149cfd2
intrinm
Chr1st0ph3rTurn3r Jun 11, 2025
7a6f073
one question added
Chr1st0ph3rTurn3r Jun 18, 2025
5240fe2
adding graphics and text for improved explanations.
Chr1st0ph3rTurn3r Jun 25, 2025
cadf539
graphics to accompany text updates
Chr1st0ph3rTurn3r Jun 25, 2025
cc16a48
interim commit
Chr1st0ph3rTurn3r Jun 25, 2025
c0d2e74
interim commit
Chr1st0ph3rTurn3r Jun 26, 2025
b855793
updating mdx to md file
Chr1st0ph3rTurn3r Jun 26, 2025
2945b88
removed unnecessary releases.table.js
Chr1st0ph3rTurn3r Jun 26, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 1 addition & 11 deletions docs/about_releases.mdx → docs/about_releases.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,9 +3,6 @@ title: List of Releases
sidebar_label: SSR Releases
---

import { PesterDataTable } from "@site/src/components/PesterDataTable";
import { columns, releases, moduleTests } from "./releases.table";

The SSR software follows a semantic versioning scheme. Semantic versioning is a simple scheme built around the `name-X.Y.Z-build-milestone` concept. `X` is incremented for every major release. A major release can be the introduction of major features or when backwards compatibility _may_ be broken. `Y` is a minor release with solely non-breaking feature additions. `Z` is designated for bug fixes in previous releases. `-build` is used to denote the incremental process of development until the culmination in the final release. `-milestone` can be one of `r1`, `r2`, `sts` or `lts`.

Starting with version `5.4.0` the `-build` will reflect the number of iterations the release candidate went through prior to release. The build number will never increment once the software has been released. The build number will be included in the release notes for the respective version.
Expand Down Expand Up @@ -39,7 +36,7 @@ However, issues resolved in `4.3.12`, which was released on 3/12/2021 are not ad
| Version | Initial GA Version | First Release Shipping Date | Latest GA Version | End of Engineering support | End of Support |
| -- | -- | -- | -- | -- | -- |
| Release 6.3 | [6.3.0](release_notes_128t_6.3.md#release-630-107r1) | September 30, 2024 | [6.3.4-r2](release_notes_128t_6.3.md#release-634-7r2) | March 26, 2026 | September 26, 2026 |
| Release 6.2 | [6.2.0](release_notes_128t_6.2.md#release-620-39r1) | November 16, 2023 | [6.2.8-lts](release_notes_128t_6.2.md#release-628-10-lts) | September 6, 2026 | March 6, 2027 |
| Release 6.2 | [6.2.0](release_notes_128t_6.2.md#release-620-39r1) | November 16, 2023 | [6.2.9-lts](release_notes_128t_6.2.md#release-629-5-lts) | September 6, 2026 | March 6, 2027 |
| Release 6.1 | [6.1.0](release_notes_128t_6.1.md#release-610-55r1) | April 14, 2023 | [6.1.13-lts](release_notes_128t_6.1.md#release-6113-7-lts) | July 14, 2025 | January 14, 2026 |
| Release 5.6 | [5.6.7](release_notes_128t_5.6.md#release-567-4) | March 16, 2023 | [5.6.17](release_notes_128t_5.6.md#release-5617-1) | June 16, 2024 | December 16, 2024 |

Expand All @@ -64,10 +61,3 @@ However, issues resolved in `4.3.12`, which was released on 3/12/2021 are not ad


Please refer to the [Software Support Policy](about_support_policy.md) page to understand the lifecycle of SSR releases.

## All Releases - Limited, General Availability and Out of Support

<PesterDataTable
columns={ columns }
data={ releases }
/>
177 changes: 177 additions & 0 deletions docs/app_policy_hit_count.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,177 @@
---
title: Application Policy Hit Count
sidebar_label: Application Policy Hit Count
---

Application Policy Hit Count (APHC) provides insight into the routing policies being referenced to direct traffic in your network operations; it reports which policies are being referenced ("hit") and how. These values are presented as metrics tracked per service, per tenant; where each tenant service combination could be "hit" in one of the following ways.

| Count | Description |
| ---- | ----------- |
| Allowed | The session was allowed and created successfully. |
| Failed | The session could not be created. |
| Denied due to Access Policy | The packet was denied because an access policy explicitly disallows access. |
| Denied due to URL Filtering | The session was created but was blocked once app classification was completed. |
| Denied due to Local Service Definition | The session was allowed on another ingress router, but is denied here based on the rules of this router (relates to hierarchical services). |

## How Does It Work?

Application Policy Hit Count is enabled by default, tracking counts for all observed service and tenant combinations, including the `access policy denied` counters.

The system maintains the current value in memory and will not provide a historical time series of the data. To prevent excessive consumption of memory resources, the device periodically removes combinations that are no longer being observed. Inactive tenant service combinations remain in the system for 30 to 60 minutes before being removed.

## Configuration

Counter configuration is flexible and can be enabled or disabled on individual routers, or across the whole authority. Counters can be configured to persist the policy hit count metrics, allowing them to be viewed as a time-series graph. The following configuration snippets show how each configure each option.

### Disable APHC for the Authority

```
configure
authority
metrics
application-policy-hit-count-tracking
enabled false
exit
exit
exit
exit
```

### Disable APHC for the Router

```
configure
authority
router <router>
system
metrics
application-policy-hit-count-tracking disabled
exit
exit
exit
exit
exit
```

### Disable APHC for the Authority but Enable for a Specific Router

```
configure
authority
metrics
application-policy-hit-count-tracking
enabled false
exit
exit
router <router>
system
metrics
application-policy-hit-count-tracking enabled
exit
exit
exit
exit
exit
```

### Clear Expiring Counts

The cleanup of expired counters runs automatically every 30 minutes. However, in some situations it may be necessary to manually clear hit count entries. In this situation the following command is available:.

`clear application-policy-hit-counts [force] [node <node>] {router <router> | resource-group <resource-group>}`

This command manually triggers the cleanup process. The execution does not change or prevent the scheduled cleanup run. However, executing the command twice will move cleanup forward by an hour and fully clear the policy hit count metrics.

## Persist APHC Metrics

Persistence can be configured using a metrics profile as described in the SSR Documentation. The example below show how to persist all hit count types for a specific service and tenant combination, using the `short` retention policy. It is a best practice to always use the shortest retention policy that satisfies your requirements.

There are typically a significant number of APHC metrics active on a system. If persistence is necessary, select a small number of service tenant combinations to be persisted. Careless selection may overwhelm the stats infrastructure resulting in resource shortages.

The following configurations are examples only; they should not be directly copied into another environment. Service, tenant, and router names must be replaced.

### Authority Configuration

```
configure
authority
metrics-profile internet-policy-hit-counts
name internet-policy-hit-counts
metric /stats/application-policy-hit-count/allowed
id /stats/application-policy-hit-count/allowed
description "Allowed Hit Count"
exit
metric /stats/application-policy-hit-count/failed
id /stats/application-policy-hit-count/failed
description "Failed Hit Count"
exit
metric /stats/application-policy-hit-count/deny/policy-table
id /stats/application-policy-hit-count/deny/policy-table
description "Denied for Explicit Access Policy Hit Count"
exit
metric /stats/application-policy-hit-count/deny/local-service
id /stats/application-policy-hit-count/deny/local-service
description "Denied After Ingress Router Allowed Hit Count"
exit
metric /stats/application-policy-hit-count/deny/url-filtering
id /stats/application-policy-hit-count/deny/url-filtering
description "Denied For URL Filtering Hit count"
exit
filter service
parameter service
value internet
exit
filter tenant
parameter tenant
value engineering
exit
exit
exit
exit
```


### Router Configuration

```
configure
authority
router <router>
name <router>
system
metrics
profile internet-policy-hit-counts
name internet-policy-hit-counts
retention short
exit
exit
exit
exit
exit
exit
```

## Stats Output

The hit count metrics can be accessed via the PCLI as shown. They provide a combination of services and tenants and show how traffic is allowed or blocked. In the example shown, we also see failures due to improperly configured services.

```
[email protected]_West# show stats application-policy-hit-count node westA
Wed 2025-01-08 18:59:28 UTC
✔ Retrieving statistics...

Highway Manager application policy hit count Stats
--------------------------------------------------

========= ======= ================= ================== =======
Metric Node Tenant Service Value
========= ======= ================= ================== =======
allowed westA <global> lan2-service 1
westA red lan2-service 1
westA red lan2-service 326
deleted westA <global> lan2-service 1
failed westA <invalidTenant> <UnknownService> 11
westA red <UnknownService> 5841

Completed in 0.06 seconds
```
Loading