Pulse Connect Secure
Pulse Connect Secure (PCS), previously known as Juniper SSL VPN, is a commercial VPN solution targeted at businesses.
To connect via the command line, run the command:
$ /opt/pulsesecure/bin/pulselauncher [-U signinUrl] [-r realm] [-l role] [-c cert] [-u username] [-p password]
Note that the login URL is different from the URL used in browsers. Check "Note regarding Server/URL" section below.
To use the
pulseUi GUI client you need to additionally install and . In the GUI client, the URL should be same as that used in browsers.
/etc/resolv.confto have NetworkManager correctly detect that it should manage DNS.
# mkdir -p /var/lib/pulsesecure/pulse # mkdir -p /etc/pki/ca-trust/extracted/openssl # ln -s /etc/ca-certificates/extracted/ca-bundle.trust.crt /etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt
The OpenConnect VPN client also supports Pulse Connect Secure, however Host Checker support (required by some Pulse servers) is not yet implemented at the time of this writing (Spring 2022). See the initial announcement for more details.
To use, install. If your Juniper VPN setup does not require any input after connecting you can use this command in order to connect
# openconnect --protocol=pulse https://vpn.example.com/
If you want NetworkManager support, install , or try the latest git version. The VPN connection can be created through the GUI or by using this command:
$ nmcli con add type vpn con-name "Connection Name" ifname "*" vpn-type openconnect -- vpn.data "gateway=vpn.example.com,protocol=nc"
1. Go to your company's VPN site, log in and download/install the Juniper client.
3. Make a directory for the .config file:
$ mkdir -p ~/.juniper_networks/network_connect/config
4. Copy and adapt this .config file in this directory:
host=foo.bar.com user=username password=secret realm= realm with spaces cafile=/etc/ssl/bar-chain.pem certfile=
- ca chain to verify the host certificate
- host certificate in DER format. Cafile or certfile must be configured, you can download them from your VPN sign-in page (certificate information, export certificate).
- You can find out your realm by viewing the page source of your VPN sign-in page: just search for the word realm in it.
5. Start/stop network connect:
$ jnc --nox
for use without GUI. To stop the client, execute
$ jnc stop
Access the the Juniper VPN website you need to use. Log in and allow the installation to attempt and fail (due to non-32 bit Java). You should get an error similar to the following:
Setup failed. Please install 32 bit Java and update alternatives links using update-alternatives command. For more details, refer KB article KB25230
You should now have the file
ncLinuxApp.jar is not downloaded, fetch it manually - see the following example URL:
https://server/dana-cached/nc/ncLinuxApp.jar (note: you need to log in first).
Then download the msjnc script, make it executable, and put it in your
Automatic installation of ncsvc using msjnc
The first time you launch msjnc (before ncsvc is installed), it will extract
ncLinuxApp.jar and prompt for your password in order to install the service. This requires sudo to be configured to allow all commands to your user.
After the service is installed to
~/.juniper_networks/network_connect/ncsvc with suid, create a profile and connect.
Manual installation of msjnc
Create these directories:
$ mkdir -p ~/.juniper_networks/network_connect $ mkdir -p ~/.juniper_networks/tmp
Extract the software:
$ unzip ~/.juniper_networks/ncLinuxApp.jar -d ~/.juniper_networks/tmp
NC.jar to the
$ cp ~/.juniper_networks/tmp/NC.jar ~/.juniper_networks/network_connect
Install the service:
$ sh ~/.juniper_networks/tmp/installNC.sh ~/.juniper_networks/network_connect
Launch msjnc, create a profile, and connect.
Note regarding Server/URL
For the Server/URL, you may have to provide the URL that processes the login form rather than the login page itself. As an example, one company's login form is on
/dana-na/auth/url_0/welcome.cgi but the form is actually processed by
/dana-na/auth/url_0/login.cgi. You may have to inspect the html of the login page to find the form's action attribute.
The JVPN Perl script establishes a Juniper VPN connection and supports the following features:
- Connection using Host Checker.
- Automatic download of the required Juniper java and daemon files (ncsvc) when run as root.
Install the perl dependencies and . Once you have done so, you must choose whether to run jvpn as root (easiest method) or as a regular user and run the steps below accordingly.
Running as root
Run the command:
# curl -L https://github.com/samm-git/jvpn/archive/v0.7.0.tar.gz | tar xz
The command creates a file
jvpn-0.7.0 in current directory.
Finally, start the script with:
On first run, the script will download all the necessary files
Running as a regular user
Use your web browser (no need for 32-bit Java) to connect to the VPN website and download the appropriate software. The files downloaded will be located in
~/.juniper_networks/network_connect/ (even if the VPN connection actually fails).
This step is considered more complex because you have to have a functional Java plugin in your browser (configured with appropriate security settings). During installation of Network Connect, the browser will request a root password to set the setuid flag on ncsvc (Juniper daemon).
Then install jvpn into the folder by executing the following:
$ cd ~/.juniper_networks/network_connect $ curl -L https://github.com/samm-git/jvpn/archive/v0.7.0.tar.gz | tar xz --strip-components=1
jvpn.ini (directions are included in the file).
Finally, start the script with the following:
$ cd ~/.juniper_networks/network_connect $ ./jvpn.pl
64-bit Java (workaround 1)
/opt/bin32-jre, rather than
/opt/java, where it will conflict with the 64-bit JRE.
3) Move the java binary to
# mv /opt/java/jre/bin/java /opt/java/jre/bin/java.orig
4) Create a bash script
java and make it executable:
# touch /opt/java/jre/bin/java # chmod 755 /opt/java/jre/bin/java
5) Finally, edit the bash script as per the below:
#!/bin/bash if [ $3x = "NCx" ] then /opt/bin32-jre/jre/bin/java "$@" else /opt/java/jre/bin/java.orig "$@" fi
64-bit Java (workaround 2)
Another approach is to install an alternative version of Java and link the Java plugin for Firefox manually - this avoids the necessity of using a chroot environment. Follow the instructions below:
- install .
- Install a custom 64-bit Java environment from java.com. Select the Linux x64 version. Once you have decided upon a location for the installation, extract the binary into that location and then mark it executable. Finally, run the binary to install Java.
- Install a custom 32-bit Java environment, also from java.com but this time, select the Linux (self-extracting) option. Extract the new binary to the same location created above, mark it executable, and run the binary. It will ask you whether you want to replace the files to 32 bit: Type "A" to overwrite all the 64-bit files with the 32-bit ones.
- Finally, link the library into the required location. The relevant library for Firefox is
libnpjp2.so. To link it, use the following command
ln -s location-of-custom-java-installation/lib/amd64/libnpjp2.so /usr/lib/mozilla/plugins/libnpjp2.so.
/usr/lib/mozilla/pluginsfor plugins instead of
~/.mozilla/pluginswhich was used in previous versions.
For more information, see the following guide from Southern Illinois University.
Motif and libstdc++-libc6.2-2.so.3
When trying to use Juniper VPN, you may be informed that there are missing libraries. If so, follow the instructions below.
1) Install a Java Runtime Environment (JRE) - see Java.
2) Install broken link: package not found] which provides the required
3) Install the Motif toolkit. Note that lesstif must be used - the
libXm.so.4 instead of
4) Then create symlinks in order to be able to use lesstif as if it is official Motif - see the reference below.
5) Install- the installation uses xterm to ask for the root password.
6) Next, run:
modprobe tun as root. You will need to do this every time before you connect. As such, you might want to setup the tun module to be autoloaded at startup.
7) Finally, head over to your VPN portal page and initiate the connection by clicking on Network Connect.
For more information see: Gentoo Wiki Archives
If your username and password are correct but the system reports that they are incorrect, that means the POST request to the Juniper IVE box failed.
The Tamper Data addon for Firefox can be used to debug. Try changing the fields in the headers.
Note that Juniper IVE does not support UTF-8. The
intl.charset.default setting in
about:config for Firefox is UTF-8, causing a POST request to have only UTF-8 in the charset. Setting it to
ISO-8859-1 might fix the problem. Also double check the
intl.accept_charsets Firefox setting. Using UTF-8, Chinese and European charsets is possible but ensure you have
ISO-8859-1 as a fallback. Note that you can use the Tamper Data addon to make sure you really are accepting
ISO-8859-1 in the HTTP header.
Finally, ensure that the useragent is
Bon Echo. You may need to change this under
Login succeeds but Network Connect will not launch
- Firstly, verify your Java installation.
- Then navigate to
- Check that
ncsvcis setuid root. Fix it if not.
ldd ncsvcand see if there are any missing libraries.
- Follow the instructions from the Juniper forum to run it from command line. Use the
-L 5switch to log everything and use strace as root. Also try consulting
ncsvc.logfor any possible errors.
Network Connect launched but the VPN does not work
ip route to to check if the route is present. Network connect has a diagnosis tool in the GUI. You can also checks the logs (also available in the GUI).
Other cause for VPN not working can lie in DNS settings. Check whether they really are set (usually in /etc/resolv.conf) and that DNS cache does not intervene (stop systemd-resolved service if running).
/etc/resolv.confwill periodically get overwritten by DHCPCD so your VPN will stop working eventually. If that happens, just restart Network Connect. You might also wish to save your
/etc/resolv.conffile so that your VPN settings can be easily restored. As of 2007, there is no known solution to the problem but there is a bug report on Red Hat Bugzilla.
Network Connect launched and a configuration error message is displayed
Check that you haveinstalled.
ncapp.error Failed to connect/authenticate with IVE.
See this post on the Ubuntu forums. Note that in some cases, the policy will not permit a connection initiated from the command line. Instead, you have to install both AUR and AUR and authenticate through the browser.
ncsvc and kernel versions 3.19 and 4.5 to 4.9
Juniter VPN does not support UNIXgr.3.19. See
There are also issues with Bug 121131 on the Kernel bug tracker for more information. There are two ways to work around this issue:versions 4.5 to 4.9 (and probably later versions too). See
- Downgrade to version 4.4, or install .
- According to a comment on the kernel bugzilla disabling router solicitations for IPv6 and reconnecting will also solve the issue. This can be done with the following command:
# echo 0 > /proc/sys/net/ipv6/conf/default/router_solicitations
- To make this setting automatically on boot time use systemd-tmpfiles:
w /proc/sys/net/ipv6/conf/default/router_solicitations - - - - 0
When using the
~/.pulse_secure/pulse/pulsesvc.log for such messages:
rmon.error Unauthorized new route to x.x.x.x/y.y.y.y has been added (conflicts with our route to z.z.z.z), disconnecting (routemon.cpp:598)
If this is the case, using NetworkManager instead can fix the issue.
After login, pulseUi displays 'Compliance: Security policies not met'
pulseUi does not remember connections
If pulseUI keeps forgetting your connections, make sure the directory
/var/lib/pulsesecure/pulse/ exists. If it does not:
# mkdir -p /var/lib/pulsesecure/pulse/