Hi Zouj,
1. If you do not want routing engines to shift from one firewall to other, tackle it by not defining interface-monitor & defining only priority under redundancy-group 0 (sice REs are always member of RG0)
2. Moreover, if you want the traffice to traverse both the firewalls in case of cloud or switch failure traffic, then you should use separate RGs for trust and untrust sides i.e. RG1 and RG2.
an example config will become like this
chassis {
cluster {
control-link-recovery;
reth-count 2;
heartbeat-threshold 3;
node 0;
node 1;
redundancy-group 0 {
node 0 priority 254;
node 1 priority 1;
}
redundancy-group 1 {
node 0 priority 254;
node 1 priority 1;
preempt;
interface-monitor {
ge-2/0/0 weight 255;
ge-11/0/0 weight 255;
ge-2/0/1 weight 255;
ge-11/0/1 weight 255;
}
}
redundancy-group 2 {
node 0 priority 254;
node 1 priority 1;
preempt;
interface-monitor {
ge-2/0/2 weight 255;
ge-11/0/2 weight 255;
}
}
}
}
In above example ge-2/0/0, ge-2/0/1, ge-11/0/0, ge-11/0/1 are connected to L1, L2, D1 and D2, respectively and LACP enabled. Whereas ge-2/0/2 and ge-11/0/2 are connected to Switch-1 and Switch-2 respectively. Moreover, reth0 & reth1 will be member of different redundancy-groups therefore, failure of ge-2/0/0 will not impact RG2.or anyother.
Hope it helps