Step 1: Begin
This guide walks you through the simple steps to onboard Juniper Networks® SRX Series Firewalls to Juniper® Security Director Cloud. You can onboard SRX Series Firewalls to Juniper Security Director Cloud using the following options:
-
Greenfield onboarding: Onboard new SRX Series Firewalls.
Greenfield onboarding involves onboarding new SRX Series firewalls to Juniper Security Director Cloud. This process includes purchasing subscriptions, scanning the QR code on the device, and following the on-screen instructions to add the firewall to Juniper Security Director Cloud.
You can also onboard new, greenfield, SRX Series Firewalls to Juniper Security Director Cloud using ZTP. For details, see Add Devices Using Zero Touch Provisioning.
-
Brownfield onboarding: Onboard existing, in-service SRX Series Firewalls.
Brownfield onboarding involves onboarding existing, in-service SRX Series Firewalls to Juniper Security Director Cloud. This process includes logging in to Juniper Security Director Cloud portal, adopting the device to generate the Junos OS CLI commands, copying the CLI commands into the firewall's CLI, and then committing the changes.
For supported SRX Series Firewalls, see Juniper Security Director Cloud Supported Firewalls.
Greenfield Onboarding: Add Cloud-Ready SRX Series Firewalls to Juniper Security Director Cloud Using QR Code
Cloud-ready SRX Series Firewalls have a QR or claim code on the chassis for quick onboarding to Juniper Security Director Cloud. Cloud-ready SRX Series Firewalls offer advanced security services, seamless integration, and protection for cloud deployments. You can onboard the cloud-ready SRX Series Firewalls using your mobile phone.
For information about supported cloud-ready and non-cloud-ready SRX Series Firewalls, see Juniper Security Director Cloud Supported Firewalls.
To onboard non-cloud-ready SRX Series Firewalls to Juniper Security Director Cloud using ZTP, see Add Devices Using Zero Touch Provisioning.
In this section, we will learn how to onboard cloud-ready SRX Series Firewalls using a QR code.

Install the rack and power on your cloud-ready SRX Series Firewall. For instructions specific to your device, see the applicable hardware guide.
DHCP is enabled on all interfaces on cloud-ready SRX Series Firewalls in the factory-default configuration. Make sure that you can connect to the Internet using one of the interfaces.
Brownfield Onboarding: Add SRX Series Firewalls to Juniper Security Director Cloud Using Commands
In this section, we will learn how to onboard existing, in-service, SRX Series Firewalls using CLI commands.

You can also onboard existing, in-service (brownfield), SRX Series Firewalls using the following methods:
- To onboard (adopt) existing, in-service (brownfield), SRX Series Firewalls into Juniper Security Director Cloud using J-Web, see Add SRX Series Firewalls to Juniper Security Director Cloud Using J-Web.
- To onboard (adopt) existing, in-service (brownfield), SRX Series Firewalls into Juniper Security Director Cloud using Security Director on-prem, see Add Devices to Juniper Security Director Cloud.
-
Make sure SRX Series Firewall can communicate with Juniper Security Director Cloud fully qualified domain name (FQDN) on respective ports. The FQDN of each home region is different. See the following table for FQDN mapping details.
Table 1: Home Region to FQDN Mapping Region Purpose Port FQDN North Virginia, U.S.
ZTP
443
jsec2-virginia.juniperclouds.net
Outbound SSH
7804
srx.sdcloud.juniperclouds.net
Syslog TLS
6514
srx.sdcloud.juniperclouds.net
Ohio, U.S.
ZTP
443
jsec2-ohio.juniperclouds.net
Outbound SSH
7804
srx.jsec2-ohio.juniperclouds.net
Syslog TLS
6514
srx.jsec2-ohio.juniperclouds.net
Montreal, Canada
ZTP
443
jsec-montreal2.juniperclouds.net
Outbound SSH
7804
srx.jsec-montreal2.juniperclouds.net
Syslog TLS
6514
srx.jsec-montreal2.juniperclouds.net
Frankfurt, Germany
ZTP
443
jsec-frankfurt.juniperclouds.net
Outbound SSH
7804
srx.jsec-frankfurt.juniperclouds.net
Syslog TLS
6514
srx.jsec-frankfurt.juniperclouds.net
-
Use TCP port 53 and UDP port 53 to connect to Google DNS servers (IP addresses—8.8.8.8 and 8.8.4.4). The Google DNS servers are specified as the default servers in the factory settings of the SRX Series Firewalls. You must use these default DNS servers when you use ZTP to onboard the firewalls. You can use private DNS servers when you use other methods to onboard the firewalls. Note that you must make sure that the private DNS servers can resolve the Juniper Security Director Cloud FQDNs.
It will take few seconds for the device discovery. After device discovery is successful, verify the following fields on the Devices page:
-
Management Status changes from Discovery in progress to Up.
-
Inventory Status and Device Config Status changes from Out of Sync to In Sync.
In case of discovery failure, navigate to
page to view the status.You’re ready to associate devices to your Juniper Security Director Cloud subscription. To continue, proceed to Step 2: Up and Running.