ON THIS PAGE
Example: Configuring an Active/Passive Chassis Cluster on SRX5800 Devices
Example: Configuring an Active/Passive Chassis Cluster Pair (SRX1500)
Example: Configuring an Active/Passive Chassis Cluster Pair (J-Web)
Understanding Active/Passive Chassis Cluster Deployment with an IPsec Tunnel
Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel
Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel (J-Web)
Active/Passive Chassis Cluster Deployments
Understanding Active/Passive Chassis Cluster Deployment
In this case, a single device in the cluster is used to route all traffic while the other device is used only in the event of a failure (see Figure 1). When a failure occurs, the backup device becomes primary and controls all forwarding.

An active/passive chassis cluster can be achieved by using redundant Ethernet interfaces (reths) that are all assigned to the same redundancy group. If any of the interfaces in an active group in a node fails, the group is declared inactive and all the interfaces in the group fail over to the other node.
This configuration minimizes the traffic over the fabric link because only one node in the cluster forwards traffic at any given time.
See also
Example: Configuring an Active/Passive Chassis Cluster on SRX5800 Devices
This example shows how to set up basic active/passive chassis clustering on an SRX5800 devices.
Requirements
Before you begin:
You need two SRX5800 Services Gateways with identical hardware configurations, and optionally one MX240 edge router, and one EX8208 Ethernet Switch for sending end to end data traffic.
Physically connect the two devices (back-to-back for the fabric and control ports) and ensure that they are the same models.
Before the cluster is formed, you must configure control ports for each device, as well as assign a cluster ID and node ID to each device, and then reboot. When the system boots, both the nodes come up as a cluster.
Control port configuration is required for SRX5400, SRX5600, and SRX5800 devices.
Now the devices are a pair. From this point forward, configuration of the cluster is synchronized between the node members, and the two separate devices function as one device.
Overview
This example shows how to set up basic active/passive chassis clustering on an SRX Series device. The basic active/passive example is the most common type of chassis cluster.
The basic active/passive chassis cluster consists of two devices:
One device actively provides routing, firewall, NAT, VPN, and security services, along with maintaining control of the chassis cluster.
The other device passively maintains its state for cluster failover capabilities in case the active device becomes inactive.
This active/passive mode example for the SRX5800 Services Gateway does not describe in detail miscellaneous configurations such as how to configure NAT, security policies, or VPNs. They are essentially the same as they would be for standalone configurations. See Introduction to NAT, Security Policies Overview, and IPsec VPN Overview. However, if you are performing proxy ARP in chassis cluster configurations, you must apply the proxy ARP configurations to the reth interfaces rather than the member interfaces because the RETH interfaces hold the logical configurations. See Configuring Proxy ARP for NAT (CLI Procedure). You can also configure separate logical interface configurations using VLANs and trunked interfaces in the SRX5800 Services Gateway. These configurations are similar to the standalone implementations using VLANs and trunked interfaces.
Figure 2 shows the topology used in this example.

Configuration
Configuring the Control Ports and Enabling Cluster Mode
CLI Quick Configuration
To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.
On {primary:node0}
(Optional) To quickly configure an EX8208 Core Switch, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.
On {primary:node0}
(Optional)To quickly configure an MX240 edge router, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.
On {primary:node0}
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode in the CLI User Guide.
To configure a chassis cluster on an SRX Series device:
In cluster mode, the configuration is synchronized over the control link between the nodes when you execute a commit command. All commands are applied to both nodes regardless of from which device the command is configured.
- Configure both the standalone devices with backup router
destination configuration to provide the management access on the
backup node after the device is up in cluster mode. The access to
the primary node is enabled through the routing on the primary node.user@hostA# set groups re0 system host-name hostAuser@hostA# set groups re0 system backup-router 10.204.191.254user@hostA# set groups re0 system backup-router destination 10.0.0.0/8user@hostA# set groups re0 system backup-router destination 172.0.0.0/8user@hostA# set groups re0 system backup-router destination 192.0.0.0/8user@hostA# set groups re0 interfaces fxp0 unit 0 family inet address 10.204.149.140/18user@hostA# set apply-groups re0user@hostB# set groups re0 system host-name hostBuser@hostB# set groups re0 system backup-router 10.204.191.254user@hostB# set groups re0 system backup-router destination 10.0.0.0/8user@hostB# set groups re0 system backup-router destination 172.0.0.0/8user@hostB# set groups re0 system backup-router destination 192.0.0.0/8user@hostB# set groups re0 interfaces fxp0 unit 0 family inet address 10.204.149.142/18user@hostB# set apply-groups re0
- Because the SRX5000 series Services Gateway chassis cluster
configuration is contained within a single common configuration, to
assign some elements of the configuration to a specific member only,
you must use the Junos OS node-specific configuration method called
groups. The set apply-groups ${node} command uses the node
variable to define how the groups are applied to the nodes; each node
recognizes its number and accepts the configuration accordingly. You
must also configure out-of-band management on the fxp0 interface of
the SRX5000 series Services Gateway using separate IP addresses for
the individual control planes of the cluster.
Configuring the backup router destination address as x.x.x.0/0 is not allowed.
user@hostA# set groups node0 system host-name hostAuser@hostA# set groups node0 system backup-router 10.204.191.254user@hostA# set groups node0 system backup-router destination 10.0.0.0/8user@hostA# set groups node0 system backup-router destination 172.0.0.0/8user@hostA# set groups node0 system backup-router destination 192.0.0.0/8user@hostA# set groups node0 interfaces fxp0 unit 0 family inet address 10.204.149.140/18user@hostB# set groups node1 system host-name hostBuser@hostB# set groups node1 system backup-router 10.204.191.254user@hostB# set groups node1 system backup-router destination 10.0.0.0/8user@hostB# set groups node1 system backup-router destination 172.0.0.0/8user@hostB# set groups node1 system backup-router destination 192.0.0.0/8user@hostB# set groups node1 interfaces fxp0 unit 0 family inet address 10.204.149.142/18The above groups node0 and node1 configuration is committed, but not applied. Once the device is up in cluster, these commands are applied using set apply-groups “${node}”.
- Configure the control port for each device, and commit
the configuration.
Ensure to have the physical control link connection between the SPC cards on both the nodes as per the configuration.
The control ports are derived based on the SPC location in the chassis and offset value is based on the platform. In the below example the SPC is present in revenue slot 1 and because offset of SRX5800 is 12, the control ports are 1, 13. You can view the Offset value for particular platform using “jwhoami -c” command in shell mode.You must enter the following commands on both devices. For example:
On node 0:
user@hostA# set chassis cluster control-ports fpc 1 port 0user@hostA# set chassis cluster control-ports fpc 13 port 0user@hostA# commitOn node 1:
user@hostB# set chassis cluster control-ports fpc 1 port 0user@hostB# set chassis cluster control-ports fpc 13 port 0user@hostB# commit
- Set the two devices to cluster mode. A reboot is required
to enter into cluster mode after the cluster ID and node ID are set.
You can cause the system to boot automatically by including the reboot parameter in the CLI command line. You must enter the
operational mode commands on both devices. For example:
On node 0:
user@hostA> set chassis cluster cluster-id 1 node 0 rebootOn node 1:
user@hostB> set chassis cluster cluster-id 1 node 1 reboot
The cluster ID must be the same on both devices in a cluster, but the node ID must be different because one device is node 0 and the other device is node 1. The range for the cluster ID is 1 through 255. Setting a cluster ID to 0 is equivalent to disabling a cluster. But it is recommended to use set chassis cluster disable to break the nodes from cluster.
- Use the following commands to configure the node 0, which
is primary. The node 1 is unreachable till the node configuration
is committed. The node 0 will automatically sync the configuration
through the control port to node 1 and it is not required to explicitly
configure node 1. user@hostA# delete apply-groups re0user@hostA# set apply-groups “${node}”
- Configure redundancy groups for chassis clustering. Each
node has interfaces in a redundancy group where interfaces are active
in active redundancy groups (multiple active interfaces can exist
in one redundancy group). Redundancy group 0 controls the control
plane and redundancy group 1+ controls the data plane and includes
the data plane ports. For this active/passive mode example, only one
chassis cluster member is active at a time so you need to define redundancy
groups 0 and 1 only. Besides redundancy groups, you must also define:
Redundant Ethernet groups—Configure how many redundant Ethernet interfaces (member links) will be active on the device so that the system can allocate the appropriate resources for it.
Priority for control plane and data plane—Define which device has priority (for chassis cluster, high priority is preferred) for the control plane, and which device is preferred to be active for the data plane.
In active/passive or active/active mode, the control plane (redundancy group 0) can be active on a chassis different from the data plane (redundancy group 1+ and groups) chassis. However, for this example we recommend having both the control and data plane active on the same chassis member. When traffic passes through the fabric link to go to another member node, latency is introduced (z line mode traffic).
On SRX Series devices (SRX5000 line), the IPsec VPN is not supported in active/active chassis cluster configuration (that is, when there are multiple RG1+ redundancy groups).
user@hostA# set chassis cluster reth-count 2user@hostA# set chassis cluster redundancy-group 1 node 0 priority 254user@hostA# set chassis cluster redundancy-group 1 node 1 priority 1user@hostA# set chassis cluster redundancy-group 0 node 0 priority 254user@hostA# set chassis cluster redundancy-group 0 node 1 priority 1 - Configure the fabric (data) ports of the cluster that
are used to pass RTOs in active/passive mode. For this example, use
one of the revenue ports. Define
two fabric interfaces, one on each chassis, to connect together.
Configure the data interfaces on the platform so that in the event of a data plane failover, the other chassis cluster member can take over the connection seamlessly. Seamless transition to a new active node will occur with data plane failover. In case of control plane failover, all the daemons are restarted on the new node thus enabling a graceful restart to avoid losing neighborship with peers (ospf, bgp). This promotes a seamless transition to the new node without any packet loss.
You must define the following items:
Define the membership information of the member interfaces to the reth interface.
Define which redundancy group the reth interface is a member of. For this active/passive example, it is always 1.
Define reth interface information such as the IP address of the interface.
{primary:node0}[edit]user@hostA# set interfaces fab0 fabric-options member-interfaces ge-3/2/8user@hostA# set interfaces fab1 fabric-options member-interfaces ge-15/2/8 - (Optional) Configure the chassis cluster behavior in case
of a failure. For the SRX5800 Services Gateway, the failover threshold
is set at 255. You can alter the weights to determine the impact on
the chassis failover. You must also configure control link recovery.
The recovery automatically causes the secondary node to reboot should
the control link fail, and then come back online. Enter these commands
on node 0.{primary:node0}[edit]user@hostA# set chassis cluster redundancy-group 1 interface-monitor xe-6/0/0 weight 255user@hostA# set chassis cluster redundancy-group 1 interface-monitor xe-6/1/0 weight 255user@hostA# set chassis cluster redundancy-group 1 interface-monitor xe-18/0/0 weight 255user@hostA# set chassis cluster redundancy-group 1 interface-monitor xe-18/1/0 weight 255user@hostA# set chassis cluster control-link-recovery
This step completes the chassis cluster configuration part of the active/passive mode example for the SRX5800 Services Gateway. The rest of this procedure describes how to configure the zone, virtual router, routing, EX8208 Core Switch, and MX240 Edge Router to complete the deployment scenario.
- (Optional) Configure and connect the reth interfaces to
the appropriate zones and virtual routers. For this example, leave
the reth0 and reth1 interfaces in the default virtual router inet.0,
which does not require any additional configuration.{primary:node0}[edit]user@hostA# set security zones security-zone untrust interfaces reth0.0user@hostA# set security zones security-zone trust interfaces reth1.0
- (Optional) For this active/passive mode example, because
of the simple network architecture, use static routes to define how
to route to the other network devices.{primary:node0}[edit]user@hostA# set routing-options static route 0.0.0.0/0 next-hop 1.1.1.254user@hostA# set routing-options static route 2.0.0.0/8 next-hop 2.2.2.254
- (Optional) For the EX8208 Ethernet Switch, the following
commands provide only an outline of the applicable configuration as
it pertains to this active/passive mode example for the SRX5800 Services
Gateway; most notably the VLANs, routing, and interface configuration.{primary:node0}[edit]user@hostA# set interfaces xe-1/0/0 unit 0 family ethernet-switching port-mode access vlan members SRX5800user@hostA# set interfaces xe-2/0/0 unit 0 family ethernet-switching port-mode access vlan members SRX5800user@hostA# set interfaces vlan unit 50 family inet address 2.2.2.254/24user@hostA# set vlans SRX5800 vlan-id 50user@hostA# set vlans SRX5800 l3-interface vlan.50user@hostA# set routing-options static route 0.0.0.0/0 next-hop 2.2.2.1/24
- (Optional) For the MX240 edge router, the following commands
provide only an outline of the applicable configuration as it pertains
to this active/passive mode example for the SRX5800 Services Gateway;
most notably you must use an IRB interface within a virtual switch
instance on the switch.{primary:node0}[edit]user@hostA# set interfaces xe-1/0/0 encapsulation ethernet-bridge unit 0 family ethernet-switchinguser@hostA# set interfaces xe-2/0/0 encapsulation ethernet-bridge unit 0 family ethernet-switchinguser@hostA# set interfaces irb unit 0 family inet address 1.1.1.254/24user@hostA# set routing-options static route 2.0.0.0/8 next-hop 1.1.1.1user@hostA# set routing-options static route 0.0.0.0/0 next-hop (upstream router)user@hostA# set vlans SRX5800 vlan-id X (could be set to “none”)user@hostA# set vlans SRX5800 domain-type bridge routing-interface irb.0user@hostA# set vlans SRX5800 domain-type bridge interface xe-1/0/0user@hostA# set vlans SRX5800 domain-type bridge interface xe-2/0/0
Verification
Confirm that the configuration is working properly.
Verifying Chassis Cluster Status
Purpose
Verify the chassis cluster status, failover status, and redundancy group information.
Action
From operational mode, enter the show chassis cluster status command.
{primary:node0}
show chassis cluster status
Monitor Failure codes: CS Cold Sync monitoring FL Fabric Connection monitoring GR GRES monitoring HW Hardware monitoring IF Interface monitoring IP IP monitoring LB Loopback monitoring MB Mbuf monitoring NH Nexthop monitoring NP NPC monitoring SP SPU monitoring SM Schedule monitoring CF Config Sync monitoring RE Relinquish monitoring Cluster ID: 1 Node Priority Status Preempt Manual Monitor-failures Redundancy group: 0 , Failover count: 1 node0 254 primary no no None node1 1 secondary no no None Redundancy group: 1 , Failover count: 1 node0 254 primary no no None node1 1 secondary no no None
Verifying Chassis Cluster Interfaces
Purpose
Verify information about chassis cluster interfaces.
Action
From operational mode, enter the show chassis cluster interfaces command.
{primary:node0}
user@host> show chassis cluster interfaces
Control link status: Up Control interfaces: Index Interface Monitored-Status Internal-SA 0 em0 Up Disabled 1 em1 Down Disabled Fabric link status: Up Fabric interfaces: Name Child-interface Status (Physical/Monitored) fab0 ge-3/2/8 Up / Up fab0 fab1 ge-15/2/8 Up / Up fab1 Redundant-ethernet Information: Name Status Redundancy-group reth0 Down Not configured reth1 Down Not configured Redundant-pseudo-interface Information: Name Status Redundancy-group lo0 Up 0
Verifying Chassis Cluster Statistics
Purpose
Verify information about chassis cluster services and control link statistics (heartbeats sent and received), fabric link statistics (probes sent and received), and the number of RTOs sent and received for services.
Action
From operational mode, enter the show chassis cluster statistics command.
{primary:node0}
user@host> show chassis cluster statistics
Control link statistics: Control link 0: Heartbeat packets sent: 16275 Heartbeat packets received: 16072 Heartbeat packet errors: 0 Control link 1: Heartbeat packets sent: 0 Heartbeat packets received: 0 Heartbeat packet errors: 0 Fabric link statistics: Child link 0 Probes sent: 30690 Probes received: 9390 Child link 1 Probes sent: 0 Probes received: 0 Services Synchronized: Service name RTOs sent RTOs received Translation context 0 0 Incoming NAT 0 0 Resource manager 0 0 DS-LITE create 0 0 Session create 0 0 IPv6 session create 0 0 Session close 0 0 IPv6 session close 0 0 Session change 0 0 IPv6 session change 0 0 ALG Support Library 0 0 Gate create 0 0 Session ageout refresh requests 0 0 IPv6 session ageout refresh requests 0 0 Session ageout refresh replies 0 0 IPv6 session ageout refresh replies 0 0 IPSec VPN 0 0 Firewall user authentication 0 0 MGCP ALG 0 0 H323 ALG 0 0 SIP ALG 0 0 SCCP ALG 0 0 PPTP ALG 0 0 JSF PPTP ALG 0 0 RPC ALG 0 0 RTSP ALG 0 0 RAS ALG 0 0 MAC address learning 0 0 GPRS GTP 0 0 GPRS SCTP 0 0 GPRS FRAMEWORK 0 0 JSF RTSP ALG 0 0 JSF SUNRPC MAP 0 0 JSF MSRPC MAP 0 0 DS-LITE delete 0 0 JSF SLB 0 0 APPID 0 0 JSF MGCP MAP 0 0 JSF H323 ALG 0 0 JSF RAS ALG 0 0 JSF SCCP MAP 0 0 JSF SIP MAP 0 0 PST_NAT_CREATE 0 0 PST_NAT_CLOSE 0 0 PST_NAT_UPDATE 0 0 JSF TCP STACK 0 0 JSF IKE ALG 0 0
Verifying Chassis Cluster Control Plane Statistics
Purpose
Verify information about chassis cluster control plane statistics (heartbeats sent and received) and the fabric link statistics (probes sent and received).
Action
From operational mode, enter the show chassis cluster control-plane statistics command.
{primary:node0}
user@host> show chassis cluster control-plane
statistics
Control link statistics: Control link 0: Heartbeat packets sent: 16315 Heartbeat packets received: 16113 Heartbeat packet errors: 0 Control link 1: Heartbeat packets sent: 0 Heartbeat packets received: 0 Heartbeat packet errors: 0 Fabric link statistics: Child link 0 Probes sent: 30772 Probes received: 9472 Child link 1 Probes sent: 0 Probes received: 0
Verifying Chassis Cluster Data Plane Statistics
Purpose
Verify information about the number of RTOs sent and received for services.
Action
From operational mode, enter the show chassis cluster data-plane statistics command.
{primary:node0}
user@host> show chassis cluster data-plane statistics
Services Synchronized: Service name RTOs sent RTOs received Translation context 0 0 Incoming NAT 0 0 Resource manager 0 0 DS-LITE create 0 0 Session create 0 0 IPv6 session create 0 0 Session close 0 0 IPv6 session close 0 0 Session change 0 0 IPv6 session change 0 0 ALG Support Library 0 0 Gate create 0 0 Session ageout refresh requests 0 0 IPv6 session ageout refresh requests 0 0 Session ageout refresh replies 0 0 IPv6 session ageout refresh replies 0 0 IPSec VPN 0 0 Firewall user authentication 0 0 MGCP ALG 0 0 H323 ALG 0 0 SIP ALG 0 0 SCCP ALG 0 0 PPTP ALG 0 0 JSF PPTP ALG 0 0 RPC ALG 0 0 RTSP ALG 0 0 RAS ALG 0 0 MAC address learning 0 0 GPRS GTP 0 0 GPRS SCTP 0 0 GPRS FRAMEWORK 0 0 JSF RTSP ALG 0 0 JSF SUNRPC MAP 0 0 JSF MSRPC MAP 0 0 DS-LITE delete 0 0 JSF SLB 0 0 APPID 0 0 JSF MGCP MAP 0 0 JSF H323 ALG 0 0 JSF RAS ALG 0 0 JSF SCCP MAP 0 0 JSF SIP MAP 0 0 PST_NAT_CREATE 0 0 PST_NAT_CLOSE 0 0 PST_NAT_UPDATE 0 0 JSF TCP STACK 0 0 JSF IKE ALG 0 0
Verifying Chassis Cluster Redundancy Group Status
Purpose
Verify the state and priority of both nodes in a cluster and information about whether the primary node has been preempted or whether there has been a manual failover.
Action
From operational mode, enter the chassis cluster status redundancy-group command.
{primary:node0}
user@host> show chassis cluster status redundancy-group
1
Monitor Failure codes: CS Cold Sync monitoring FL Fabric Connection monitoring GR GRES monitoring HW Hardware monitoring IF Interface monitoring IP IP monitoring LB Loopback monitoring MB Mbuf monitoring NH Nexthop monitoring NP NPC monitoring SP SPU monitoring SM Schedule monitoring CF Config Sync monitoring RE Relinquish monitoring Cluster ID: 1 Node Priority Status Preempt Manual Monitor-failures Redundancy group: 1 , Failover count: 1 node0 254 primary no no None node1 1 secondary no no None
Troubleshooting with Logs
Purpose
Use these logs to identify any chassis cluster issues. You must run these logs on both nodes.
Action
From operational mode, enter these show log commands.
user@host> show log jsrpd
user@host> show log chassisd
user@host> show log messages
user@host> show log dcd
user@host> show traceoptions
See also
Example: Configuring an Active/Passive Chassis Cluster Pair (SRX1500)
This example shows how to configure active/passive chassis clustering for SRX1500 device.
Requirements
Before you begin:
- Physically connect a pair of devices together, ensuring that they are the same models.
- Create a fabric link by connecting a Gigabit Ethernet interface on one device to another Gigabit Ethernet interface on the other device.
- Create a control link by connecting the control port of the two SRX1500 devices.
- Connect to one of the devices using the console port.
(This is the node that forms the cluster.) and set the cluster ID
and node number.user@host> set chassis cluster cluster-id 1 node 0 reboot
- Connect to the other device using the console port and
set the cluster ID and node number.user@host> set chassis cluster cluster-id 1 node 1 reboot
Overview
In this example, a single device in the cluster is used to route all traffic, and the other device is used only in the event of a failure. (See Figure 3.) When a failure occurs, the backup device becomes primary and controls all forwarding.

You can create an active/passive chassis cluster by configuring redundant Ethernet interfaces (reths) that are all assigned to the same redundancy group. This configuration minimizes the traffic over the fabric link because only one node in the cluster forwards traffic at any given time.
In this example, you configure group (applying the configuration with the apply-groups command) and chassis cluster information. Then you configure security zones and security policies. See Table 1 through Table 4.
Table 1: Group and Chassis Cluster Configuration Parameters
Feature | Name | Configuration Parameters |
---|---|---|
Groups | node0 |
|
node1 |
|
Table 2: Chassis Cluster Configuration Parameters
Feature | Name | Configuration Parameters |
---|---|---|
Fabric links | fab0 | Interface: ge-0/0/1 |
fab1 | Interface: ge-7/0/1 | |
Heartbeat interval | – | 1000 |
Heartbeat threshold | – | 3 |
Redundancy group | 0 |
|
1 |
| |
Interface monitoring
| ||
Number of redundant Ethernet interfaces | – | 2 |
Interfaces | ge-0/0/4 | Redundant parent: reth0 |
ge-7/0/4 | Redundant parent: reth0 | |
ge-0/0/5 | Redundant parent: reth1 | |
ge-7/0/5 | Redundant parent: reth1 | |
reth0 | Redundancy group: 1 | |
| ||
reth1 | Redundancy group: 1 | |
|
Table 3: Security Zone Configuration Parameters
Name | Configuration Parameters |
---|---|
trust | The reth1.0 interface is bound to this zone. |
untrust | The reth0.0 interface is bound to this zone. |
Table 4: Security Policy Configuration Parameters
Purpose | Name | Configuration Parameters |
---|---|---|
This security policy permits traffic from the trust zone to the untrust zone. | ANY |
|
Configuration
CLI Quick Configuration
To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.
Step-by-Step Procedure
To configure an active/passive chassis cluster:
- Configure the management interface.{primary:node0}[edit]user@host# set groups node0 system host-name srx1500-Auser@host# set groups node0 interfaces fxp0 unit 0 family inet address 192.0.2.110/24user@host# set groups node1 system host-name srx1500-Buser@host# set groups node1 interfaces fxp0 unit 0 family inet address 192.0.2.111/24user@host# set apply-groups “${node}”
- Configure the fabric interface.{primary:node0}[edit]user@host# set interfaces fab0 fabric-options member-interfaces ge-0/0/1user@host# set interfaces fab1 fabric-options member-interfaces ge-7/0/1
- Configure heartbeat settings.{primary:node0}[edit]user@host# set chassis cluster heartbeat-interval 1000user@host# set chassis cluster heartbeat-threshold 3
- Configure redundancy groups.{primary:node0}[edit]user@host# set chassis cluster redundancy-group 0 node 0 priority 100user@host# set chassis cluster redundancy-group 0 node 1 priority 1user@host# set chassis cluster redundancy-group 1 node 0 priority 100user@host# set chassis cluster redundancy-group 1 node 1 priority 1user@host# set chassis cluster redundancy-group 1 interface-monitor ge-0/0/4 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor ge-7/0/4 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor ge-0/0/5 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor ge-7/0/5 weight 255
- Configure redundant Ethernet interfaces.{primary:node0}[edit]user@host# set chassis cluster reth-count 2user@host# set interfaces ge-0/0/5 gigether-options redundant-parent reth1user@host# set interfaces ge-7/0/5 gigether-options redundant-parent reth1user@host# set interfaces ge-0/0/4 gigether-options redundant-parent reth0user@host# set interfaces ge-7/0/4 gigether-options redundant-parent reth0user@host# set interfaces reth0 redundant-ether-options redundancy-group 1user@host# set interfaces reth0 unit 0 family inet address 198.51.100.1/24user@host# set interfaces reth1 redundant-ether-options redundancy-group 1user@host# set interfaces reth1 unit 0 family inet address 203.0.113.233/24
- Configure security zones.{primary:node0}[edit]user@host# set security zones security-zone untrust interfaces reth1.0user@host# set security zones security-zone trust interfaces reth0.0
- Configure security policies.{primary:node0}[edit]user@host# set security policies from-zone trust to-zone untrust policy ANY match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy ANY match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy ANY match application anyuser@host# set security policies from-zone trust to-zone untrust policy ANY then permit
Results
From configuration mode, confirm your configuration by entering the show configuration command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.
For brevity, this show command output includes only the configuration that is relevant to this example. Any other configuration on the system has been replaced with ellipses (...).
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Chassis Cluster Status
Purpose
Verify the chassis cluster status, failover status, and redundancy group information.
Action
From operational mode, enter the show chassis cluster status command.
{primary:node0}
user@host> show chassis cluster status
Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 1 node0 100 primary no no node1 1 secondary no no Redundancy group: 1 , Failover count: 1 node0 100 primary no no node1 1 secondary no no
Verifying Chassis Cluster Interfaces
Purpose
Verify information about chassis cluster interfaces.
Action
From operational mode, enter the show chassis cluster interfaces command.
{primary:node0}
user@host> show chassis cluster interfaces
Control link status: Up Control interfaces: Index Interface Monitored-Status Security 0 em0 Up Disabled 1 em1 Down Disabled Fabric link status: Up Fabric interfaces: Name Child-interface Status Security fab0 ge-0/0/1 Up Disabled fab0 fab1 ge-7/0/1 Up Disabled fab1 Redundant-ethernet Information: Name Status Redundancy-group reth0 Up 1 reth1 Up 1 Redundant-pseudo-interface Information: Name Status Redundancy-group lo0 Up 1 Interface Monitoring: Interface Weight Status Redundancy-group ge-0/0/4 255 Up 1 ge-7/0/4 255 Up 1 ge-0/0/5 255 Up 1 ge-7/0/5 255 Up 1
Verifying Chassis Cluster Statistics
Purpose
Verify information about the statistics of the different objects being synchronized, the fabric and control interface hellos, and the status of the monitored interfaces in the cluster.
Action
From operational mode, enter the show chassis cluster statistics command.
{primary:node0}
user@host> show chassis cluster statistics
Control link statistics: Control link 0: Heartbeat packets sent: 2276 Heartbeat packets received: 2280 Heartbeat packets errors: 0 Fabric link statistics: Child link 0 Probes sent: 2272 Probes received: 597 Services Synchronized: Service name RTOs sent RTOs received Translation context 0 0 Incoming NAT 0 0 Resource manager 6 0 Session create 161 0 Session close 148 0 Session change 0 0 Gate create 0 0 Session ageout refresh requests 0 0 Session ageout refresh replies 0 0 IPSec VPN 0 0 Firewall user authentication 0 0 MGCP ALG 0 0 H323 ALG 0 0 SIP ALG 0 0 SCCP ALG 0 0 PPTP ALG 0 0 RPC ALG 0 0 RTSP ALG 0 0 RAS ALG 0 0 MAC address learning 0 0 GPRS GTP 0 0
Verifying Chassis Cluster Control Plane Statistics
Purpose
Verify information about chassis cluster control plane statistics (heartbeats sent and received) and the fabric link statistics (probes sent and received).
Action
From operational mode, enter the show chassis cluster control-plane statistics command.
{primary:node0}
user@host> show chassis cluster control-plane
statistics
Control link statistics: Control link 0: Heartbeat packets sent: 258689 Heartbeat packets received: 258684 Heartbeat packets errors: 0 Fabric link statistics: Child link 0 Probes sent: 258681 Probes received: 258681
Verifying Chassis Cluster Data Plane Statistics
Purpose
Verify information about the number of RTOs sent and received for services.
Action
From operational mode, enter the show chassis cluster data-plane statistics command.
{primary:node0}
user@host> show chassis cluster data-plane statistics
Services Synchronized: Service name RTOs sent RTOs received Translation context 0 0 Incoming NAT 0 0 Resource manager 6 0 Session create 161 0 Session close 148 0 Session change 0 0 Gate create 0 0 Session ageout refresh requests 0 0 Session ageout refresh replies 0 0 IPSec VPN 0 0 Firewall user authentication 0 0 MGCP ALG 0 0 H323 ALG 0 0 SIP ALG 0 0 SCCP ALG 0 0 PPTP ALG 0 0 RPC ALG 0 0 RTSP ALG 0 0 RAS ALG 0 0 MAC address learning 0 0 GPRS GTP 0 0
Verifying Chassis Cluster Redundancy Group Status
Purpose
Verify the state and priority of both nodes in a cluster and information about whether the primary node has been preempted or whether there has been a manual failover.
Action
From operational mode, enter the chassis cluster status redundancy-group command.
{primary:node0}
user@host> show chassis cluster status redundancy-group
1
Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy-Group: 1, Failover count: 1 node0 100 primary no no node1 1 secondary no no
Troubleshooting with Logs
Purpose
Use these logs to identify any chassis cluster issues. You must run these logs on both nodes.
Action
From operational mode, enter these show commands.
See also
Example: Configuring an Active/Passive Chassis Cluster Pair (J-Web)
- Enable clustering. See Step 1 in Example: Configuring an Active/Passive Chassis Cluster Pair (CLI).
- Configure the management interface. See Step 2 in Example: Configuring an Active/Passive Chassis Cluster Pair (CLI).
- Configure the fabric interface. See Step 3 in Example: Configuring an Active/Passive Chassis Cluster Pair (CLI).
- Configure the redundancy groups.
Select Configure>Chassis Cluster.
Enter the following information, and then click Apply:
Redundant ether-Interface Count: 2
Heartbeat Interval: 1000
Heartbeat Threshold: 3
Nodes: 0
Group Number: 0
Priorities: 100
Enter the following information, and then click Apply:
Nodes: 0
Group Number: 1
Priorities: 1
Enter the following information, and then click Apply:
Nodes: 1
Group Number: 0
Priorities: 100
- Configure the redundant Ethernet interfaces.
Select Configure>Chassis Cluster.
Select ge-0/0/4.
Enter reth1 in the Redundant Parent box.
Click Apply.
Select ge-7/0/4.
Enter reth1 in the Redundant Parent box.
Click Apply.
Select ge-0/0/5.
Enter reth0 in the Redundant Parent box.
Click Apply.
Select ge-7/0/5.
Enter reth0 in the Redundant Parent box.
Click Apply.
See Step 5 in Example: Configuring an Active/Passive Chassis Cluster Pair (CLI) for the last four configuration settings.
- Configure the security zones. See Step 6 in Example: Configuring an Active/Passive Chassis Cluster Pair (CLI).
- Configure the security policies. See Step 7 in Example: Configuring an Active/Passive Chassis Cluster Pair (CLI).
- Click OK to check your configuration and save it as a candidate configuration, then click Commit Options>Commit.
See also
Understanding Active/Passive Chassis Cluster Deployment with an IPsec Tunnel
In this case, a single device in the cluster terminates in an IPsec tunnel and is used to process all traffic while the other device is used only in the event of a failure (see Figure 4). When a failure occurs, the backup device becomes primary and controls all forwarding.

An active/passive chassis cluster can be achieved by using redundant Ethernet interfaces (reths) that are all assigned to the same redundancy group. If any of the interfaces in an active group in a node fails, the group is declared inactive and all the interfaces in the group fail over to the other node.
This configuration provides a way for a site-to-site IPsec tunnel to terminate in an active/passive cluster where a redundant Ethernet interface is used as the tunnel endpoint. In the event of a failure, the redundant Ethernet interface in the backup SRX Series device becomes active, forcing the tunnel to change endpoints to terminate in the new active SRX Series device. Because tunnel keys and session information are synchronized between the members of the chassis cluster, a failover does not require the tunnel to be renegotiated and all established sessions are maintained.
Dynamic tunnels cannot load-balance across different SPCs.
See also
Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel
This example shows how to configure active/passive chassis clustering with an IPsec tunnel for SRX Series devices.
Requirements
Before you begin:
Get two SRX5000 models with identical hardware configurations, one SRX1500 device, and four EX Series Ethernet switches.
Physically connect the two devices (back-to-back for the fabric and control ports) and ensure that they are the same models. You can configure both the fabric and control ports on the SRX5000 line.
Set the two devices to cluster mode and reboot the devices. You must enter the following operational mode commands on both devices, for example:
On node 0:
user@host> set chassis cluster cluster-id 1 node 0 rebootOn node 1:
user@host> set chassis cluster cluster-id 1 node 1 reboot
The cluster ID is the same on both devices, but the node ID must be different because one device is node 0 and the other device is node 1. The range for the cluster ID is 1 through 255. Setting a cluster ID to 0 is equivalent to disabling a cluster.
Cluster ID greater than 15 can only be set when the fabric and control link interfaces are connected back-to-back.
Get two SRX5000 models with identical hardware configurations, one SRX1500 edge router, and four EX Series Ethernet switches.
Physically connect the two devices (back-to-back for the fabric and control ports) and ensure that they are the same models. You can configure both the fabric and control ports on the SRX5000 line.
From this point forward, configuration of the cluster is synchronized between the node members and the two separate devices function as one device. Member-specific configurations (such as the IP address of the management port of each member) are entered using configuration groups.
Overview
In this example, a single device in the cluster terminates in an IPsec tunnel and is used to process all traffic, and the other device is used only in the event of a failure. (See Figure 5.) When a failure occurs, the backup device becomes primary and controls all forwarding.

In this example, you configure group (applying the configuration with the apply-groups command) and chassis cluster information. Then you configure IKE, IPsec, static route, security zone, and security policy parameters. See Table 5 through Table 11.
Table 5: Group and Chassis Cluster Configuration Parameters
Feature | Name | Configuration Parameters |
---|---|---|
Groups | node0 |
|
node1 |
|
Table 6: Chassis Cluster Configuration Parameters
Feature | Name | Configuration Parameters |
---|---|---|
Fabric links | fab0 | Interface: xe-5/3/0 |
fab1 | Interface: xe-17/3/0 | |
Number of redundant Ethernet interfaces | – | 2 |
Heartbeat interval | – | 1000 |
Heartbeat threshold | – | 3 |
Redundancy group | 0 |
|
1 |
| |
Interface monitoring
| ||
Interfaces | xe-5/1/0 | Redundant parent: reth1 |
xe-5/1/0 | Redundant parent: reth1 | |
xe-5/0/0 | Redundant parent: reth0 | |
xe-17/0/0 | Redundant parent: reth0 | |
reth0 | Redundancy group: 1 | |
| ||
reth1 | Redundancy group: 1 | |
| ||
st0 | ||
|
Table 7: IKE Configuration Parameters
Feature | Name | Configuration Parameters |
---|---|---|
Proposal | proposal-set standard | - |
Policy | preShared |
|
Gateway | SRX1500-1 |
Note: In SRX chassis clustering, only reth and lo0 interfaces are supported for the IKE external interface configuration. Other interface types can be configured, but IPsec VPN might not work. If a lo0 logical interface is used as an IKE gateway external interface, it cannot be configured with RG0. |
Table 8: IPsec Configuration Parameters
Feature | Name | Configuration Parameters |
---|---|---|
Proposal | proposal-set standard | – |
Policy | std | – |
VPN | SRX1500-1 |
Note: The manual VPN name and the site-to-site gateway name cannot be the same. |
Table 9: Static Route Configuration Parameters
Name | Configuration Parameters |
---|---|
0.0.0.0/0 | Next hop: 10.2.1.1 |
10.3.0.0/16 | Next hop: 10.10.1.2 |
Table 10: Security Zone Configuration Parameters
Name | Configuration Parameters |
---|---|
trust |
|
untrust |
|
vpn |
|
Table 11: Security Policy Configuration Parameters
Purpose | Name | Configuration Parameters |
---|---|---|
This security policy permits traffic from the trust zone to the untrust zone. | ANY |
|
This security policy permits traffic from the trust zone to the vpn zone. | vpn-any |
|
Configuration
CLI Quick Configuration
To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.
Step-by-Step Procedure
To configure an active/passive chassis cluster pair with an IPsec tunnel:
- Configure control ports.{primary:node0}[edit]user@host# set chassis cluster control-ports fpc 2 port 0user@host# set chassis cluster control-ports fpc 14 port 0
- Configure the management interface.{primary:node0}[edit]user@host# set groups node0 system host-name SRX5800-1user@host# set groups node0 interfaces fxp0 unit 0 family inet address 172.19.100.50/24user@host#set groups node1 system host-name SRX5800-2user@host# set groups node1 interfaces fxp0 unit 0 family inet address 172.19.100.51/24user@host# set apply-groups “${node}”
- Configure the fabric interface.{primary:node0}[edit]user@host# set interfaces fab0 fabric-options member-interfaces xe-5/3/0user@host# set interfaces fab1 fabric-options member-interfaces xe-17/3/0
- Configure redundancy groups.{primary:node0}[edit]user@host# set chassis cluster reth-count 2user@host# set chassis cluster heartbeat-interval 1000user@host# set chassis cluster heartbeat-threshold 3user@host# set chassis cluster node 0user@host# set chassis cluster node 1user@host# set chassis cluster redundancy-group 0 node 0 priority 254user@host# set chassis cluster redundancy-group 0 node 1 priority 1user@host# set chassis cluster redundancy-group 1 node 0 priority 254user@host# set chassis cluster redundancy-group 1 node 1 priority 1user@host# set chassis cluster redundancy-group 1 preemptuser@host# set chassis cluster redundancy-group 1 interface-monitor xe-5/0/0 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor xe-5/1/0 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor xe-17/0/0 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor xe-17/1/0 weight 255
- Configure redundant Ethernet interfaces.{primary:node0}[edit]user@host# set interfaces xe-5/1/0 gigether-options redundant-parent reth1user@host# set interfaces xe-17/1/0 gigether-options redundant-parent reth1user@host# set interfaces xe-5/0/0 gigether-options redundant-parent reth0user@host# set interfaces xe-17/0/0 gigether-options redundant-parent reth0user@host# set interfaces reth0 redundant-ether-options redundancy-group 1user@host# set interfaces reth0 unit 0 family inet address 10.1.1.60/16user@host# set interfaces reth1 redundant-ether-options redundancy-group 1user@host# set interfaces reth1 unit 0 family inet address 10.2.1.60/16
- Configure IPsec parameters.{primary:node0}[edit]user@host# set interfaces st0 unit 0 multipoint family inet address 10.10.1.1/30user@host# set security ike policy preShared mode mainuser@host# set security ike policy preShared proposal-set standarduser@host# set security ike policy preShared pre-shared-key ascii-text "$ABC123"## Encrypted passworduser@host# set security ike gateway SRX1500-1 ike-policy preShareduser@host# set security ike gateway SRX1500-1 address 10.1.1.90user@host# set security ike gateway SRX1500-1 external-interface reth0.0user@host# set security ipsec policy std proposal-set standarduser@host# set security ipsec vpn SRX1500-1 bind-interface st0.0user@host# set security ipsec vpn SRX1500-1 vpn-monitor optimizeduser@host# set security ipsec vpn SRX1500-1 ike gateway SRX1500-1user@host# set security ipsec vpn SRX1500-1 ike ipsec-policy stduser@host# set security ipsec vpn SRX1500-1 establish-tunnels immediately
- Configure static routes.{primary:node0}[edit]user@host# set routing-options static route 0.0.0.0/0 next-hop 10.2.1.1user@host# set routing-options static route 10.3.0.0/16 next-hop 10.10.1.2
- Configure security zones.{primary:node0}[edit]user@host# set security zones security-zone untrust host-inbound-traffic system-services alluser@host# set security zones security-zone untrust host-inbound-traffic protocols alluser@host# set security zones security-zone untrust interfaces reth1.0user@host# set security zones security-zone trust host-inbound-traffic system-services alluser@host# set security zones security-zone trust host-inbound-traffic protocols alluser@host# set security zones security-zone trust interfaces reth0.0user@host# set security zones security-zone vpn host-inbound-traffic system-services alluser@host# set security zones security-zone vpn host-inbound-traffic protocols alluser@host# set security zones security-zone vpn interfaces st0.0
- Configure security policies.{primary:node0}[edit]user@host# set security policies from-zone trust to-zone untrust policy ANY match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy ANY match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy ANY match application anyuser@host# set security policies from-zone trust to-zone vpn policy vpn-any then permit
Results
From operational mode, confirm your configuration by entering the show configuration command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.
For brevity, this show command output includes only the configuration that is relevant to this example. Any other configuration on the system has been replaced with ellipses (...).
user@host> show configuration
version x.xx.x; groups { node0 { system { host-name SRX58001; } interfaces { fxp0 { unit 0 { family inet { address 172.19.100.50/24; } } } } } node1 { system { host-name SRX58002; } interfaces { fxp0 { unit 0 { family inet { address 172.19.100.51/24; } } } } } } apply-groups "${node}"; system { root-authentication { encrypted-password "$ABC123"; } } chassis { cluster { reth-count 2; heartbeat-interval 1000; heartbeat-threshold 3; control-ports { fpc 2 port 0; fpc 14 port 0; } redundancy-group 0 { node 0 priority 254; node 1 priority 1; } redundancy-group 1 { node 0 priority 254; node 1 priority 1; preempt; interface-monitor { xe–6/0/0 weight 255; xe–6/1/0 weight 255; xe–18/0/0 weight 255; xe–18/1/0 weight 255; } } } } interfaces { xe–5/0/0 { gigether–options { redundant–parent reth0; } } xe–5/1/0 { gigether–options { redundant–parent reth1; } } xe–17/0/0 { gigether–options { redundant–parent reth0; } } xe–17/1/0 { gigether–options { redundant–parent reth1; } } fab0 { fabric–options { member–interfaces { xe–5/3/0; } } } fab1 { fabric–options { member–interfaces { xe–17/3/0; } } } reth0 { redundant–ether–options { redundancy–group 1; } unit 0 { family inet { address 10.1.1.60/16; } } } reth1 { redundant–ether–options { redundancy–group 1; } unit 0 { family inet { address 10.2.1.60/16; } } } st0 { unit 0 { multipoint; family inet { address 5.4.3.2/32; } } } } routing–options { static { route 0.0.0.0/0 { next–hop 10.2.1.1; } route 10.3.0.0/16 { next–hop 10.10.1.2; } } } security { zones { security–zone trust { host–inbound–traffic { system–services { all; } } interfaces { reth0.0; } } security–zone untrust host-inbound-traffic { system-services { all; } } protocols { all; } interfaces { reth1.0; } } security-zone vpn { host-inbound-traffic { system-services { all; } } protocols { all; } interfaces { st0.0; } } } policies { from–zone trust to–zone untrust { policy ANY { match { source–address any; destination–address any; application any; } then { permit; } } } from–zone trust to–zone vpn { policy vpn { match { source–address any; destination–address any; application any; } then { permit; } } } } }
If you are done configuring the device, enter commit from configuration mode.
Verification
Confirm that the configuration is working properly.
Verifying Chassis Cluster Status
Purpose
Verify the chassis cluster status, failover status, and redundancy group information.
Action
From operational mode, enter the show chassis cluster status command.
{primary:node0}
show chassis cluster status
Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy group: 0 , Failover count: 1 node0 1 primary no no node1 254 secondary no no Redundancy group: 1 , Failover count: 1 node0 1 primary yes no node1 254 secondary yes no
Verifying Chassis Cluster Interfaces
Purpose
Verify the chassis cluster interfaces.
Action
From operational mode, enter the show chassis cluster interfaces command.
{primary:node0}
user@host> show chassis cluster interfaces
Control link name: fxp1 Redundant-ethernet Information: Name Status Redundancy-group reth0 Up 1 reth1 Up 1 Interface Monitoring: Interface Weight Status Redundancy-group xe-5/0/0 255 Up 1 xe-5/1/0 255 Up 1 xe-17/0/0 255 Up 1 xe-17/1/0 255 Up 1
Verifying Chassis Cluster Statistics
Purpose
Verify information about chassis cluster services and control link statistics (heartbeats sent and received), fabric link statistics (probes sent and received), and the number of RTOs sent and received for services.
Action
From operational mode, enter the show chassis cluster statistics command.
{primary:node0}
user@host> show chassis cluster statistics
Control link statistics: Control link 0: Heartbeat packets sent: 258689 Heartbeat packets received: 258684 Heartbeat packets errors: 0 Fabric link statistics: Child link 0 Probes sent: 258681 Probes received: 258681 Services Synchronized: Service name RTOs sent RTOs received Translation context 0 0 Incoming NAT 0 0 Resource manager 6 0 Session create 161 0 Session close 148 0 Session change 0 0 Gate create 0 0 Session ageout refresh requests 0 0 Session ageout refresh replies 0 0 IPSec VPN 0 0 Firewall user authentication 0 0 MGCP ALG 0 0 H323 ALG 0 0 SIP ALG 0 0 SCCP ALG 0 0 PPTP ALG 0 0 RPC ALG 0 0 RTSP ALG 0 0 RAS ALG 0 0 MAC address learning 0 0 GPRS GTP 0 0
Verifying Chassis Cluster Control Plane Statistics
Purpose
Verify information about chassis cluster control plane statistics (heartbeats sent and received) and the fabric link statistics (probes sent and received).
Action
From operational mode, enter the show chassis cluster control-panel statistics command.
{primary:node0}
user@host> show chassis cluster control-plane
statistics
Control link statistics: Control link 0: Heartbeat packets sent: 258689 Heartbeat packets received: 258684 Heartbeat packets errors: 0 Fabric link statistics: Child link 0 Probes sent: 258681 Probes received: 258681
Verifying Chassis Cluster Data Plane Statistics
Purpose
Verify information about the number of RTOs sent and received for services.
Action
From operational mode, enter the show chassis cluster data-plane statistics command.
{primary:node0}
user@host> show chassis cluster data-plane statistics
Services Synchronized: Service name RTOs sent RTOs received Translation context 0 0 Incoming NAT 0 0 Resource manager 6 0 Session create 161 0 Session close 148 0 Session change 0 0 Gate create 0 0 Session ageout refresh requests 0 0 Session ageout refresh replies 0 0 IPSec VPN 0 0 Firewall user authentication 0 0 MGCP ALG 0 0 H323 ALG 0 0 SIP ALG 0 0 SCCP ALG 0 0 PPTP ALG 0 0 RPC ALG 0 0 RTSP ALG 0 0 RAS ALG 0 0 MAC address learning 0 0 GPRS GTP 0 0
Verifying Chassis Cluster Redundancy Group Status
Purpose
Verify the state and priority of both nodes in a cluster and information about whether the primary node has been preempted or whether there has been a manual failover.
Action
From operational mode, enter the chassis cluster status redundancy-group command.
{primary:node0}
user@host> show chassis cluster status redundancy-group
1
Cluster ID: 1 Node Priority Status Preempt Manual failover Redundancy-Group: 1, Failover count: 1 node0 0 primary yes no node1 254 secondary yes no
Troubleshooting with Logs
Purpose
Use these logs to identify any chassis cluster issues. You must run these logs on both nodes.
Action
From operational mode, enter these show commands.
Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel (J-Web)
- Enable clusters. See Step 1 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Configure the management interface. See Step 2 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Configure the fabric interface. See Step 3 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Configure the redundancy groups.
Select Configure>System Properties>Chassis Cluster.
Enter the following information, and then click Apply:
Redundant ether-Interfaces Count: 2
Heartbeat Interval: 1000
Heartbeat Threshold: 3
Nodes: 0
Group Number: 0
Priorities: 254
Enter the following information, and then click Apply:
Nodes: 0
Group Number: 1
Priorities: 254
Enter the following information, and then click Apply:
Nodes: 1
Group Number: 0
Priorities: 1
Enter the following information, and then click Apply:
Nodes: 1
Group Number: 1
Priorities: 1
Preempt: Select the check box.
Interface Monitor—Interface: xe-5/0/0
Interface Monitor—Weight: 255
Interface Monitor—Interface: xe-5/1/0
Interface Monitor—Weight: 255
Interface Monitor—Interface: xe-17/0/0
Interface Monitor—Weight: 255
Interface Monitor—Interface: xe-17/1/0
Interface Monitor—Weight: 255
- Configure the redundant Ethernet interfaces.
Select Configure>System Properties>Chassis Cluster.
Select xe-5/1/0.
Enter reth1 in the Redundant Parent box.
Click Apply.
Select xe-17/1/0.
Enter reth1 in the Redundant Parent box.
Click Apply.
Select xe-5/0/0.
Enter reth0 in the Redundant Parent box.
Click Apply.
Select xe-17/0/0.
Enter reth0 in the Redundant Parent box.
Click Apply.
See Step 5 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Configure the IPsec configuration. See Step 6 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Configure the static routes .
Select Configure>Routing>Static Routing.
Click Add.
Enter the following information, and then click Apply:
Static Route Address: 0.0.0.0/0
Next-Hop Addresses: 10.2.1.1
Enter the following information, and then click Apply:
Static Route Address: 10.3.0.0/16
Next-Hop Addresses: 10.10.1.2
- Configure the security zones. See Step 8 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Configure the security policies. See Step 9 in Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel.
- Click OK to check your configuration and save it as a candidate configuration, then click Commit Options>Commit.