SRX

last person joined: yesterday 

Ask questions and share experiences about the SRX Series, vSRX, and cSRX.
Expand all | Collapse all

NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

  • 1.  NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-23-2013 23:26

    WE HAVE DUAL ISP ROUTERS AND WE NEED ACTIVE ACTIVE CONFIGURATION. CAN ANYONE PLEASE SHARE WHAT CONFIGURATION I WILL DO TO WORK IT ACTIVE ACTIVE.  WILL I CREATE TWO DEFAULT ROUTES ON BOTH SRX.

     

    SEONDLY WE NEED TO ALLOCATE 25 % BANDWIDTH TO EMAIL TRAFFIC AND REMAINING BANDWIDTH TO OTHER TRAFFIC

     

     

    THIRDLY WE NEED TO BLOCK UTORRENT

     

     

    LASTLY SSL VPN CONFIGURATION REQUIRED.

     

    APPRECIATE YOUR HELP 

     

    REGARD

     



  • 2.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 01:02

    For active active configuration :

    set groups node0
    set groups node1
    set apply-groups "${node}"
    set chassis cluster control-link-recovery
    set chassis cluster reth-count 5
    set chassis cluster heartbeat-interval 2000
    set chassis cluster heartbeat-threshold 8
    set chassis cluster network-management cluster-master
    set chassis cluster redundancy-group 0 node 0 priority 200
    set chassis cluster redundancy-group 0 node 1 priority 100
    set chassis cluster redundancy-group 1 node 0 priority 100
    set chassis cluster redundancy-group 1 node 1 priority 1
    set chassis cluster redundancy-group 1 preempt
    set chassis cluster redundancy-group 1 gratuitous-arp-count 4
    set chassis cluster redundancy-group 1 hold-down-interval 2
    set chassis cluster redundancy-group 1 interface-monitor ge-0/0/3 weight 255
    set chassis cluster redundancy-group 1 interface-monitor ge-4/0/3 weight 255
    set chassis cluster redundancy-group 3 node 0 priority 100
    set chassis cluster redundancy-group 3 node 1 priority 1
    set chassis cluster redundancy-group 3 preempt
    set chassis cluster redundancy-group 3 gratuitous-arp-count 4
    set chassis cluster redundancy-group 3 hold-down-interval 2
    set chassis cluster redundancy-group 3 interface-monitor ge-4/0/2 weight 255
    set interfaces fab0 fabric-options member-interfaces ge-0/0/5
    set interfaces fab1 fabric-options member-interfaces ge-4/0/5



  • 3.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-25-2013 21:56

    jaishan for active active i need some clearance

     

    For active active configuration :

    set groups node0
    set groups node1
    set apply-groups "${node}"
    set chassis cluster control-link-recovery
    set chassis cluster reth-count 5
    set chassis cluster heartbeat-interval 2000
    set chassis cluster heartbeat-threshold 8
    set chassis cluster network-management cluster-master
    set chassis cluster redundancy-group 0 node 0 priority 200
    set chassis cluster redundancy-group 0 node 1 priority 100
    set chassis cluster redundancy-group 1 node 0 priority 100
    set chassis cluster redundancy-group 1 node 1 priority 1
    set chassis cluster redundancy-group 1 preempt
    set chassis cluster redundancy-group 1 gratuitous-arp-count 4
    set chassis cluster redundancy-group 1 hold-down-interval 2
    set chassis cluster redundancy-group 1 interface-monitor ge-0/0/3 weight 255    (is this port ge-0/0/3 connected to isp router that will be monitored)
    set chassis cluster redundancy-group 1 interface-monitor ge-4/0/3 weight 255    
    set chassis cluster redundancy-group 3 node 0 priority 100
    set chassis cluster redundancy-group 3 node 1 priority 1
    set chassis cluster redundancy-group 3 preempt
    set chassis cluster redundancy-group 3 gratuitous-arp-count 4
    set chassis cluster redundancy-group 3 hold-down-interval 2
    set chassis cluster redundancy-group 3 interface-monitor ge-4/0/2 weight 255
    set interfaces fab0 fabric-options member-interfaces ge-0/0/5  (what about these two ports)
    set interfaces fab1 fabric-options member-interfaces ge-4/0/5

     
     
    can you please explore active active configuration for dual isp connection. apolgizes for silly question but i am a bit confused. 
     


  • 4.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-26-2013 00:41

    jaisahn you didn't related interfaces to groups in your active active configuration. 

     

    # set chassis cluster reth-count 2

    -for first interface in the group (on Device A)
    # set interfaces ge-0/0/4 gigether-options redundant-parent reth1    

    -for second interface in the group (on Device B)
    # set interfaces ge-5/0/4 gigether-options redundant-parent reth1    

    -set up redundancy group for interfaces
    # set interfaces reth1 redundant-ether-options redundancy-group 1      
    # set interfaces reth1 unit 0 family inet address 192.168.1.1/24

    -for first interface in the group (on Device A)
    # set interfaces ge-0/0/3 gigether-options redundant-parent reth0    

    -for second interface in the group (on Device B)
    # set interfaces ge-5/0/3 gigether-options redundant-parent reth0    

    -set up redundancy group for interfaces
    # set interfaces reth0 redundant-ether-options redundancy-group 1 
        
    # set interfaces reth0 unit 0 family inet address 10.10.10.200/24
    # set security zones security-zone untrust interfaces reth0.0
    # set security zones security-zone trust interfaces reth1.0

     

     



  • 5.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 01:07

    For blocking of Utorrent , you have to go for the IDP feature or licensce. Cause Utorrent is a signature based and you can block it using IDP signature allowing on SRX1400. You have to buy licensce for that feature to enable. 



  • 6.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 01:20

    For bandwith allocation, please read the below link, which was already discussed on the forum earlier. Please check and accept all as a solution or kudos will always b accepted.

     

    http://forums.juniper.net/t5/Routing/Traffic-Shaping-on-SRX-650/m-p/110914//true



  • 7.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 01:56

    jaishan really appreciate your quick reply. thank a lot

     

     

    bro can you please tell as i have two dual isp. do i have to make two static routes. 

     

    if possible can you please share some sample configuration for dual isp working as active active

     

    regards



  • 8.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED
    Best Answer

    Posted 12-24-2013 02:19

    This is a below example which will help you in config:

    Trust zone network is 192.168.1.0/24 on ge-0/0/0
    DMZ zone network is 10.10.10.0/24 on ge-0/0/1

    ISP1 zone network is 1.1.1.0/29 on fe-0/0/6
    ISP2 zone network is 2.2.2.0/29 on fe-0/0/7

    Requirements

    • Trust and DMZ zones should egress out ISP1 with source-nat.
    • If ISP1 interface goes down, then Trust and DMZ zones should egress out ISP2 instead with source-nat.
    • If ISP1 interface returns, then Trust and DMZ zones should revert back to using ISP1 again.
    • ISP1 must allow destination NAT for web server in Trust zone and mail server in DMZ zone.
    • ISP2 also has destination NAT for same web and mail servers.
    • When both ISPs are up, destination NAT addresses should be available from both ISPs for both web and mail servers.

    Solution:

    This is possible using a combination of multiple routing-instance with filter-based forwarding and qualified-next-hop on the default route. Below is a sample working configurations for above scenario.

    interfaces {

        ge-0/0/0 {

            unit 0 {

                family inet {

                    address 192.168.1.254/24;

                }

            }

        }

        ge-0/0/1 {

            unit 0 {

                family inet {

                    address 10.10.10.254/24;

                }

            }

        }

        fe-0/0/6 {

            unit 0 {

                family inet {

                    filter {

                        input isp1-in;

                    }

                    address 1.1.1.2/29;

                }

            }

        }

        fe-0/0/7 {

            unit 0 {

                family inet {

                    filter {

                        input isp2-in;

                    }

                    address 2.2.2.2/29;

                }

            }

        }

    }

    routing-options {

        interface-routes {

            rib-group inet inside;

        }

        static {

            route 0.0.0.0/0 {

                next-hop 1.1.1.1;

                qualified-next-hop 2.2.2.1 {

                    preference 10;

                }

            }

        }

        rib-groups {

            inside {

                import-rib [ inet.0 TRUST-VRF.inet.0 INSIDE.inet.0 ISP2.inet.0 ];

            }

        }

    }

    security {

        nat {

            source {

                rule-set interface-nat-out {

                    from routing-instance INSIDE;

                    to routing-instance [ ISP2 default ];

                    rule interface-nat-out {

                        match {

                            source-address 0.0.0.0/0;

                            destination-address 0.0.0.0/0;

                        }

                        then {

                            source-nat {

                                interface;

                            }

                        }

                    }

                }

            }

            destination {

                pool web-server-trust {

                    address 192.168.1.5/32 port 80;

                }

                pool mail-server-dmz {

                    address 10.10.10.5/32 port 25;

                }

                rule-set isp1-to-trust {

                    from interface fe-0/0/6.0;

                    rule isp1-http-in {

                        match {

                            source-address 0.0.0.0/0;

                            destination-address 1.1.1.5/32;

                            destination-port 80;

                        }

                        then {

                            destination-nat pool web-server-trust;

                        }

                    }

                    rule isp1-mail-in {

                        match {

                            source-address 0.0.0.0/0;

                            destination-address 1.1.1.5/32;

                            destination-port 25;

                        }

                        then {

                            destination-nat pool mail-server-dmz;

                        }

                    }

                }

                rule-set isp2-to-dmz {

                    from interface fe-0/0/7.0;

                    rule isp2-http-in {

                        match {

                            source-address 0.0.0.0/0;

                            destination-address 2.2.2.5/32;

                            destination-port 80;

                        }

                        then {

                            destination-nat pool web-server-trust;

                        }

                    }

                    rule isp2-mail-in {

                        match {

                            source-address 0.0.0.0/0;

                            destination-address 2.2.2.5/32;

                            destination-port 25;

                        }

                        then {

                            destination-nat pool mail-server-dmz;

                        }

                    }

                }

            }

            proxy-arp {

                interface fe-0/0/6.0 {

                    address {

                        1.1.1.5/32;

                    }

                }

                interface fe-0/0/7.0 {

                    address {

                        2.2.2.5/32;

                    }

                }

            }

        }

        zones {

            security-zone trust {

                address-book {

                    address web-server 192.168.1.5/32;

                }

                interfaces {

                    ge-0/0/0.0 {

                        host-inbound-traffic {

                            system-services {

                                all;

                            }

                        }

                    }

                }

            }

            security-zone dmz {

                address-book {

                    address mail-server 10.10.10.5/32;

                }

                interfaces {

                    ge-0/0/1.0 {

                        host-inbound-traffic {

                            system-services {

                                all;

                            }

                        }

                    }

                }

            }

            security-zone isp1 {

                interfaces {

                    fe-0/0/6.0 {

                        host-inbound-traffic {

                            system-services {

                                ssh;

                                https;

                                ping;

                            }

                        }

                    }

                }

            }

            security-zone isp2 {

                interfaces {

                    fe-0/0/7.0 {

                        host-inbound-traffic {

                            system-services {

                                ssh;

                                https;

                                ping;

                            }

                        }

                    }

                }

            }

        }

        policies {

            from-zone trust to-zone dmz {

                policy allow-trust-to-dmz {

                    match {

                        source-address any;

                        destination-address any;

                        application any;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone trust to-zone isp1 {

                policy allow-trust-out-isp1 {

                    match {

                        source-address any;

                        destination-address any;

                        application any;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone trust to-zone isp2 {

                policy allow-trust-out-isp2 {

                    match {

                        source-address any;

                        destination-address any;

                        application any;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone dmz to-zone trust {

                policy allow-dmz-to-trust {

                    match {

                        source-address any;

                        destination-address any;

                        application any;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone dmz to-zone isp1 {

                policy allow-dmz-out-isp1 {

                    match {

                        source-address any;

                        destination-address any;

                        application any;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone dmz to-zone isp2 {

                policy allow-dmz-out-isp2 {

                    match {

                        source-address any;

                        destination-address any;

                        application any;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone isp1 to-zone trust {

                policy isp1-http-incoming {

                    match {

                        source-address any;

                        destination-address web-server;

                        application junos-http;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone isp1 to-zone dmz {

                policy isp1-mail-incoming {

                    match {

                        source-address any;

                        destination-address mail-server;

                        application junos-mail;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone isp2 to-zone trust {

                policy isp2-http-incoming {

                    match {

                        source-address any;

                        destination-address web-server;

                        application junos-http;

                    }

                    then {

                        permit;

                    }

                }

            }

            from-zone isp2 to-zone dmz {

                policy isp2-mail-incoming {

                    match {

                        source-address any;

                        destination-address mail-server;

                        application junos-mail;

                    }

                    then {

                        permit;

                    }

                }

            }

        }

    }

    firewall {

        filter isp1-in {

            term 1 {

                from {

                    destination-address {

                        1.1.1.0/29;

                    }

                }

                then {

                    routing-instance TRUST-VRF;

                }

            }

            term 2 {

                then {

                    accept;

                }

            }

        }

        filter isp2-in {

            term 1 {

                from {

                    destination-address {

                        2.2.2.0/29;

                    }

                }

                then {

                    routing-instance TRUST-VRF;

                }

            }

            term 2 {

                then {

                    accept;

                }

            }

        }

    }

    routing-instances {

        TRUST-VRF {

            instance-type forwarding;

            routing-options {

                static {

                    route 192.168.1.0/24 next-hop 192.168.1.1;

                    route 10.10.10.0/24 next-hop 10.10.10.1;

                }

            }

        }

        INSIDE {

            instance-type virtual-router;

            interface ge-0/0/0.0;

            interface ge-0/0/1.0;

            routing-options {

                interface-routes {

                    rib-group inet inside;

                }

                static {

                    route 0.0.0.0/0 next-table inet.0;

                }

            }

        }

        ISP2 {

            instance-type virtual-router;

            interface fe-0/0/7.0;

            routing-options {

                interface-routes {

                    rib-group inet inside;

                }

                static {

                    route 0.0.0.0/0 {

                        next-hop 2.2.2.1;

                        qualified-next-hop 1.1.1.1 {

                            preference 10;

                        }

                    }

                }

            }

        }

    }

     

     



  • 9.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 02:42

    thanks brother, can u share network diagram for this setup. apolgizes as i am really very new to srx. 

     

    i mean about physciall port connection. 

     

    thanks for your solution



  • 10.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 03:03

    please read the requirements carefully its easy dude.



  • 11.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 03:13

    understood thanks bro

     

    just wanted to know for clustering will will connect port ge-0/0/10 and ge-0/0/11 

     

     

      srx1         ge0/0/10 >>>>>>>>>>   srx2 ge0/0/0/10

     

    srx2         ge0/0/11>>>>>>>>>>>>> srx2 ge0/0/0/11

     

     

    if i am wrong please correct me

     



  • 12.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-24-2013 05:52
      |   view attached

    yes correct for control ports , please check the attached file which you can keep for future also .will be good.

     



  • 13.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-25-2013 07:51

    jaisahn thanks a lot for your friendly help. appreciate it heartly.

     

    i am going to implement the srx day after tomorow and if i face any issues i will let you know.

     

     

    Regards



  • 14.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-25-2013 09:49

    ok...no problem. best of luck



  • 15.  RE: NEW SRX 1400 ACTIVE ACTIVE CONFIGURATION HELP NEEDED

    Posted 12-25-2013 21:09

    jaishan can you please share the configruation of LDAP authentication with SRX. I want SRX to authenticate the users for internet. 

     

    regards