Configuring L2 HA Link Encryption tunnel
Physically connect the two devices and ensure that they are the same models.
Connect the dedicated control ports on node 0 and node 1.
Connect the user defined fabricated ports on node 0 and node 1.
To configure two chassis in cluster mode, follow the below steps.
- Zeroize both the SRX devices before you use for cluster.
If the devices are already in cluster mode please make sure you disable
them before zeroize.
For information on how to disable chassis cluster, see Disabling a Chassis Cluster
- Delete the web management services.
user@host# delete system services web-management https
- Configure FIPS mode and bring up the devices in FIPS mode.[edit]user@host# set groups global system fips level 2[edit]user@host# set groups global system root-authentication plain-textpasswordNew password: type password hereRetype new password: retype password here[edit]user@host# commituser@host> request system reboot
- Configure device 1 with standard cluster commands for
operating in cluster mode as node0.[edit]user@host# set groups node0 system host-name node0-host-nameuser@host# set groups node0 system backup-router gateway-addressuser@host# set groups node0 system backup-router destination valueuser@host# set groups node0 interfaces fxp0 unit 0 family inet address node0-ip-addressuser@host# set groups node1 system host-name node1-host-nameuser@host# set groups node1 system backup-router gateway-addressuser@host# set groups node1 system backup-router destination valueuser@host# set groups node1 interfaces fxp0 unit 0 family inet address node1-ip-addressuser@host# set apply-groups globaluser@host# set apply-groups “$(node)user@host# delete apply-groups re0user@host# set system ports console log-out-on-disconnectuser@host# set chassis cluster reth-count 5user@host# set chassis cluster redundancy-group 0 node 0 priority 254user@host# set chassis cluster redundancy-group 0 node 1 priority 1user@host# commituser@host> set chassis cluster cluster-id 1 node 0 reboot
- After the device 1 is up, configure HA link encryption
as shown in sample configuration below, commit and reboot. device
1 needs to be configured with both node0 and node1 HA link encryption
configuration before commit and reboot.[edit]user@host# set groups node0 security ike traceoptions file ikeloguser@host# set groups node0 security ike traceoptions file size 100muser@host# set groups node0 security ike traceoptions flag alluser@host# set groups node0 security ike traceoptions level 15user@host# set groups node0 security ike proposal IKE_PROP_PSK authentication-method pre-shared-keysuser@host# set groups node0 security ike proposal IKE_PROP_PSK dh-group group20user@host# set groups node0 security ike proposal IKE_PROP_PSK authentication-algorithm sha-256user@host# set groups node0 security ike proposal IKE_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node0 security ike policy IKE_POL_PSK proposals IKE_PROP_PSKuser@host# prompt groups node0 security ike policy IKE_POL_PSK pre-shared-key ascii-text
New ascii-text (secret): juniper
Retype new ascii-text (secret): juniperuser@host# set groups node0 security ike gateway S2S_GW ike-policy IKE_POL_PSKuser@host# set groups node0 security ike gateway S2S_GW version v2-onlyuser@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK protocol espuser@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK authentication-algorithm hmac-sha1-96user@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK lifetime-seconds 200user@host# set groups node0 security ipsec policy IPSEC_POL_PSK perfect-forward-secrecy keys group20user@host# set groups node0 security ipsec policy IPSEC_POL_PSK proposals IPSEC_PROP_PSKuser@host# set groups node0 security ipsec vpn S2S_VPN ha-link-encryptionuser@host# set groups node0 security ipsec vpn S2S_VPN ike gateway S2S_GWuser@host# set groups node0 security ipsec vpn S2S_VPN ike ipsec-policy IPSEC_POL_PSKuser@host# set groups node1 security ike traceoptions file ikeloguser@host# set groups node1 security ike traceoptions file size 100muser@host# set groups node1 security ike traceoptions flag alluser@host# set groups node1 security ike traceoptions level 15user@host# set groups node1 security ike proposal IKE_PROP_PSK authentication-method pre-shared-keysuser@host# set groups node1 security ike proposal IKE_PROP_PSK dh-group group20user@host# set groups node1 security ike proposal IKE_PROP_PSK authentication-algorithm sha-256user@host# set groups node1 security ike proposal IKE_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node1 security ike policy IKE_POL_PSK proposals IKE_PROP_PSKuser@host# prompt groups node1 security ike policy IKE_POL_PSK pre-shared-key ascii-textNew ascii-text (secret): juniper
Retype new ascii-text (secret): juniperuser@host# set groups node1 security ike gateway S2S_GW ike-policy IKE_POL_PSKuser@host# set groups node1 security ike gateway S2S_GW version v2-onlyuser@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK protocol espuser@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK authentication-algorithm hmac-sha1-96user@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK lifetime-seconds 200user@host# set groups node1 security ipsec policy IPSEC_POL_PSK perfect-forward-secrecy keys group20user@host# set groups node1 security ipsec policy IPSEC_POL_PSK proposals IPSEC_PROP_PSKuser@host# set groups node1 security ipsec vpn S2S_VPN ha-link-encryptionuser@host# set groups node1 security ipsec vpn S2S_VPN ike gateway S2S_GWuser@host# set groups node1 security ipsec vpn S2S_VPN ike ipsec-policy IPSEC_POL_PSKuser@host# set groups global interfaces fab0 fabric-options member-interfaces ge-0/0/3user@host# set groups global interfaces fab1 fabric-options member-interfaces ge-5/0/3user@host# commituser@host>request system reboot - To proceed further with device 2 configuration and commit, you need to ensure device1 and device 2 are not reachable to each other. One way to achieve this is to power off device 1 at this point.
- Configure device 2 with standard cluster command for operating
in cluster mode as node1 [edit]user@host# set groups node0 system host-name node0-host-nameuser@host# set groups node0 system backup-router gateway-addressuser@host# set groups node0 system backup-router destination valueuser@host# set groups node0 interfaces fxp0 unit 0 family inet address node0-ip-addressuser@host# set groups node1 system host-name node1-host-nameuser@host# set groups node1 system backup-router gateway-addressuser@host# set groups node1 system backup-router destination valueuser@host# set groups node1 interfaces fxp0 unit 0 family inet address node1-ip-addressuser@host# set apply-groups globaluser@host# set apply-groups “$(node)”user@host# delete apply-groups re0user@host# set system ports console log-out-on-disconnectuser@host# set chassis cluster reth-count 5user@host# set chassis cluster redundancy-group 0 node 0 priority 254user@host# set chassis cluster redundancy-group 0 node 1 priority 1user@host# commituser@host> set chassis cluster cluster-id 1 node 1 reboot
- After the device 2 is up, configure HA link encryption
as shown in sample configuration below on device 2. Device 2 needs
to be configured with both node0 and node1 HA link encryption configuration.
Commit on node1 (device 2), and finally reboot node1 (device 2).[edit]user@host# set groups node0 security ike traceoptions file ikeloguser@host# set groups node0 security ike traceoptions file size 100muser@host# set groups node0 security ike traceoptions flag alluser@host# set groups node0 security ike traceoptions level 15user@host# set groups node0 security ike proposal IKE_PROP_PSK authentication-method pre-shared-keysuser@host# set groups node0 security ike proposal IKE_PROP_PSK dh-group group20user@host# set groups node0 security ike proposal IKE_PROP_PSK authentication-algorithm sha-256user@host# set groups node0 security ike proposal IKE_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node0 security ike policy IKE_POL_PSK proposals IKE_PROP_PSKuser@host# prompt groups node0 security ike policy IKE_POL_PSK pre-shared-key ascii-text
New ascii-text (secret): juniper
Retype new ascii-text (secret): juniperuser@host# set groups node0 security ike gateway S2S_GW ike-policy IKE_POL_PSKuser@host# set groups node0 security ike gateway S2S_GW version v2-onlyuser@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK protocol espuser@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK authentication-algorithm hmac-sha1-96user@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node0 security ipsec proposal IPSEC_PROP_PSK lifetime-seconds 200user@host# set groups node0 security ipsec policy IPSEC_POL_PSK perfect-forward-secrecy keys group20user@host# set groups node0 security ipsec policy IPSEC_POL_PSK proposals IPSEC_PROP_PSKuser@host# set groups node0 security ipsec vpn S2S_VPN ha-link-encryptionuser@host# set groups node0 security ipsec vpn S2S_VPN ike gateway S2S_GWuser@host# set groups node0 security ipsec vpn S2S_VPN ike ipsec-policy IPSEC_POL_PSKuser@host# set groups node1 security ike traceoptions file ikeloguser@host# set groups node1 security ike traceoptions file size 100muser@host# set groups node1 security ike traceoptions flag alluser@host# set groups node1 security ike traceoptions level 15user@host# set groups node1 security ike proposal IKE_PROP_PSK authentication-method pre-shared-keysuser@host# set groups node1 security ike proposal IKE_PROP_PSK dh-group group20user@host# set groups node1 security ike proposal IKE_PROP_PSK authentication-algorithm sha-256user@host# set groups node1 security ike proposal IKE_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node1 security ike policy IKE_POL_PSK proposals IKE_PROP_PSKuser@host# prompt groups node1 security ike policy IKE_POL_PSK pre-shared-key ascii-textNew ascii-text (secret): juniper
Retype new ascii-text (secret): juniperuser@host# set groups node1 security ike gateway S2S_GW ike-policy IKE_POL_PSKuser@host# set groups node1 security ike gateway S2S_GW version v2-onlyuser@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK protocol espuser@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK authentication-algorithm hmac-sha1-96user@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK encryption-algorithm aes-256-cbcuser@host# set groups node1 security ipsec proposal IPSEC_PROP_PSK lifetime-seconds 200user@host# set groups node1 security ipsec policy IPSEC_POL_PSK perfect-forward-secrecy keys group20user@host# set groups node1 security ipsec policy IPSEC_POL_PSK proposals IPSEC_PROP_PSKuser@host# set groups node1 security ipsec vpn S2S_VPN ha-link-encryptionuser@host# set groups node1 security ipsec vpn S2S_VPN ike gateway S2S_GWuser@host# set groups node1 security ipsec vpn S2S_VPN ike ipsec-policy IPSEC_POL_PSKuser@host# set groups global interfaces fab0 fabric-options member-interfaces ge-0/0/3user@host# set groups global interfaces fab1 fabric-options member-interfaces ge-5/0/3user@host# commituser@host> request system reboot - Power ON node0 (device 1).
- Both the nodes will be in cluster mode with HA link encryption
enabled.
Note To enable HA link encryption on node1 in step 6, the other node needs to be in lost state for the commit to go through. So this timing needs to be taken care by you, else step 6 needs to be redone until enabling HA link encryption on node1 commit goes through.