Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Requirements for Deploying cSRX on Contrail

    This section presents an overview of requirements for deploying a cSRX container on Contrail:

    Platform and Server Requirements

    Table 1 lists the Contrail platform requirement specifications and Table 2 lists the server requirements for deploying a cSRX container in a compute node.

    Note: The cSRX can run either on a physical server or virtual machine. For scalability and availability reasons, we recommend using a physical server to deploy the cSRX container.

    Table 1: Platform Requirements

    Component

    Operating System and Kernel Versions

    Contrail Release

    Contrail 3.2

    OpenStack Release

    • OpenStack Liberty

    • CentOS 7.2—Linux Kernel version-3.10.0-327.10.1

    • Ubuntu 14.04.4—Linux kernel versions 3.13.0-85-generic and 4.4.0-34-generic

    • Red Hat 7.2—Linux Kernel version- 3.10.0-327.10.

    • VMware vCenter 5.5, 6.0—Ubuntu 14.04.4 kernel version 3.13.0-85-generic

    • OpenStack Mitaka

    • CentOS 7.2—Linux kernel version 3.10.0-327.10.1

    • Ubuntu 14.04.4—Linux kernel version 3.13.0-85-generic

    The cSRX container compute node requirements should be same as the other compute nodes running in Contrail cloud. Each server must have the minimum requirements outlined in Table 2.

    Table 2: Server Requirement Specifications

    Component

    Specification

    Release Introduced

    Docker Engine

    Docker Engine 1.9 or later installed on the same compute node as the cSRX

    Junos OS Release 18.1R1

    vCPUs

    2 CPU cores

    Memory

    8 GB

    Disk space

    40 GB hard drive

    Network interface

    1 Ethernet port (minimum)

    cSRX container includes 3 network interfaces (eth0, eth1, and eth2), and requires that you create 3 virtual interfaces and attach those interfaces to a virtual network.

    One interface is intended for out-of-band management to accept management sessions and traffic, and the other two interfaces are used by the cSRX as the revenue ports to process in-band data traffic.

     

    cSRX Basic Configuration Settings

    The cSRX container requires the following basic configuration settings:

    • Interfaces must be assigned IP addresses.

    • Interfaces must be bound to security zones.

    • Policies must be configured between zones to permit or deny traffic.

    By default, interface ge-0/0/0 is bound to the untrust security zone (eth2) and interface ge-0/0/1 is bound to the trust security zone (eth1).

    Modified: 2018-03-20