Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Example: Single MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewall (MNHA) for Stateful Firewall

In this configuration, you'll learn to setup a single MX Series as the CSDS Traffic Orchestrator with SRX Series Firewalls in Multinode High Availability for stateful firewall service.

Connected Security Distributed Services Traffic Orchestrator (CSDS-TO) enables stateless load balancing functionality in MX Series routers. The router distributes the transit traffic across the configured SRX Series Firewalls. CSDS-TO runs a Routing Engine (RE)-based health check process for each SRX Series Firewalls. This process ensures that the traffic management, traffic distribution orchestration, and traffic redirection are connected to the local instance of the network monitoring process.

In this example, CSDS architecture uses MX Series in the forwarding layer to load-balance the traffic and SRX Series Firewalls in the services layer with scaled-out functionality in Multinode High Availability (MNHA) deployment.

SRX Series Firewalls connect in MNHA topology providing stateful session synchronization between the nodes to ensure guaranteed redundancy and an uninterrupted traffic flow. The example demonstrates the configuration of a stateful firewall service with a single MX Series with CSDS-TO and SRX Series Firewalls in MNHA.

Tip:
Table 1: Readability Score and Time Estimates

Reading Time

Less than two hours

Configuration Time

Less than three hours

Example Prerequisites

Table 2: Requirements for MX Series

Hardware requirements

  • Juniper Networks® MX304

Software requirements

  • Junos OS Release 24.4R1

Table 3: Requirements for SRX Series Firewalls

Hardware requirements

  • 4 x Juniper Networks® SRX4600

Software requirements

  • Junos OS Release 24.4R1

Ensure you read the following prerequisites:

  • For detailed list of supported platforms and releases, see Release Notes: Connected Security Distributed Services Architecture.

  • Complete the basic setup of MX Series router and SRX Series Firewalls, and ensure the nodes can communicate with each other over the management network.

  • We suggest that you review the Functional Overview, Topology Overview, and Topology Illustration sections to understand the configuration.

  • The example guides you through the step-by-step configuration of MX1 in the forwarding plane, and SRX1-A and SRX1-B in the services plane in MNHA mode. You can build a similar step-by-step configuration for SRX2-A and SRX2-B. Note that the gateway router is not a device under test (DUT).

  • The example uses MX304 as the gateway router but you can use any device for this role. To provide redundancy in the forwarding layer, consider using a second MX Series router.

  • We recommend that you perform the configuration using Junos Node Unifier unified CLI management.

  • You can use Junos OS configuration groups to create reusable groups of configuration statements and apply them to multiple levels in the configuration.

Before You Begin

Table 4: Resources, and Additional Information

Understand CSDS-TO for CSDS

Understand how CSDS works with the traffic orchestrator. See How CSDS Works with Intelligent Traffic Orchestrator

Know more

Learn more

Functional Overview

Table 5: Filter-Based Forwarding (FBF) and CSDS-TO Functional Details on MX1

Functionality

Description

FBF of traffic on MX Series

  • Configure FBF instance to direct client-to-server traffic to the CSDS-TO's TRUST_VR instance. Further, CSDS-TO distributes traffic across all the available SRX Series Firewalls using source-based hashing.

  • Configure another FBF instance to direct server-to-client traffic to the CSDS-TO's UNTRUST_VR instance. Further, CSDS-TO performs destination-based hashing to load-balance the traffic across all the available SRX Series Firewalls.

Firewall filter on trust side for forward data traffic

Configure a firewall filter on the TRUST_VR instance for the forward traffic flow coming from the client to the MX Series, and route the traffic that matches to the appropriate routing instance.

  • Firewall filter name: MX_LB_TRUST

  • Match condition: Match the traffic that is coming from the IP 172.16.160.0/24 (data client)

  • Action: Allow the traffic and send it to its destination (one of the server IPs configured on the loopback interfaces for SRX Series Firewalls) based on the entry in its routing instance srx_mnha_group_trust_fi.

  • Apply: Apply the firewall filter to interface ae10.41

Firewall filter on untrust side for reverse data traffic

Configure a firewall filter on the UNTRUST_VR instance for the reverse traffic flow going out of the MX Series to the Internet server, and route the traffic that matches to the appropriate routing instance.

  • Firewall filter name: MX_LB_UNTRUST

  • Match condition: Match traffic destined to the IP 172.16.160.0/24 (Data Clients)

  • Action: Allow the traffic and send it to its destination based on the entry in its routing instance srx_mnha_group_untrust_fi.

  • Apply: Apply the firewall filter to interface ae10.81

CSDS-TO on MX Series

Deploy forwarding layer functionality on MX Series with CSDS-TO to load-balance the traffic based on the available next hops. MX Series performs RE-based health checks for the available SRX Series Firewalls. The MX Series adds the available SRX Series Firewalls as a composite next-hop in the routing table.

  • Load balancing mode: direct-server-return

CSDS-TO for forward data traffic

Load-balance forward traffic to the available next hop SRX Series Firewalls server groups based on source-based hashing on the TRUST_VR instance.

  • CSDS-TO instance name: csds_sfw_trust and ipv6_csds_sfw_trust for IPv4 and IPv6 traffic respectively.
  • Virtual routing instance name for the client-side Virtual Routing and Forwarding (VRF): TRUST_VR
  • Virtual routing instance name for the server-side VRF: TRUST_VR
  • Addition of target SRX Series Firewalls as real services: MNHA_SRX1 MNHA_SRX2 and IPv6_MNHA_SRX1 IPv6_MNHA_SRX2

  • Virtual service name associated with the servers for traffic distribution: srx_trust_vs and ipv6_srx_trust_vs

CSDS-TO for reverse data traffic

Load-balance reverse traffic to the available next hop SRX Series Firewalls server groups based on destination-based hashing on the UNTRUST_VR instance.

  • CSDS-TO instance name: csds_sfw_untrust and ipv6_csds_sfw_untrustt for IPv4 and IPv6 traffic respectively.
  • Virtual routing instance name for the client-side VRF: UNTRUST_VR
  • Virtual routing instance name for the server-side VRF: UNTRUST_VR
  • Addition of target SRX Series Firewalls as real services: UNTRUST_SRX1 UNTRUST_SRX2 and IPv6_UNTRUST_SRX1 IPv6_UNTRUST_SRX2

  • Virtual service name associated with the servers for traffic distribution: srx_untrust_vs and ipv6_srx_untrust_vs
Table 6: MNHA Functional Details on SRX Series Firewalls

Functionality

Description

MNHA pairs

  • SRX1-A and SRX1-B are a pair of MNHA (Active/Backup) nodes.

  • SRX2-A and SRX2-B are another pair of MNHA (Active/Backup) nodes.

  • Only one node per pair is active at a time.

Based on the traffic load requirements, you can have more MNHA pairs.

MNHA mode

  • Layer 3 high availability mode

  • Connectivity between the nodes and stateful session synchronization is through the MX1.

  • Uses BGP for high availability nodes communication and stateful session synchronization

Service Redundancy Group (SRG)

  • SRG0 to manage stateful firewall service for Layer 4-Layer 7 traffic

BGP for routing

Each of the SRX Series Firewalls have 6 BGP peering sessions with MX1 – 3 for IPv4 data traffic and 3 for IPv6 data traffic.

  • BGP peering with MX1 TRUST_VR side

  • BGP peering with MX1 UNTRUST_VR side

  • BGP peering with MX1 MNHA-VR for stateful session synchronization in MNHA

Table 7: Interface Details on MX1

Interface

IP Address

Description

ae10.41

  • 172.16.1.1/30

  • 2001:db8:172:1:1::1/126

IPv4 and IPv6 addresses that connect to the GW router on trust side

ae10.81

  • 172.16.2.1/30

  • 2001:db8:172:2:1::1/126

IPv4 and IPv6 addresses that connect to the GW router on untrust side

lo0.1

  • 192.168.10.251/32

  • 2001:db8:1:255::251/128

IPv4 and IPv6 addresses for CSDS-TO health check on TRUST_VR instance

lo0.2

  • 192.168.10.252/32

  • 2001:db8:1:255::252/128

IPv4 and IPv6 addresses for CSDS-TO health check on UNTRUST_VR instance

ae1.0

  • 10.1.1.1/30

  • 2001:db8:1:1:1::1/126

Local IPv4 and IPv6 addresses on TRUST_VR instance for BGP peering with SRX1-A

ae1.1

  • 10.2.1.1/30

  • 2001:db8:1:2:1::1/126

Local IPv4 and IPv6 addresses on UNTRUST_VR instance for BGP peering with SRX1-A

ae2.0

  • 10.1.2.1/30

  • 2001:db8:1:1:2::1/126

Local IPv4 and IPv6 addresses on TRUST_VR instance for BGP peering with SRX1-B

ae2.1

  • 10.2.2.1/30

  • 2001:db8:1:2:2::1/126

Local IPv4 and IPv6 addresses on UNTRUST_VR instance for BGP peering with SRX1-B

ae3.0

  • 10.1.3.1/30

  • 2001:db8:1:1:3::1/126

Local IPv4 and IPv6 addresses on TRUST_VR instance for BGP peering with SRX2-A

ae3.1

  • 10.2.3.1/30

  • 2001:db8:1:2:3::1/126

Local IPv4 and IPv6 addresses on UNTRUST_VR instance for BGP peering with SRX2-A

ae4.0

  • 10.1.4.1/30

  • 2001:db8:1:1:4::1/126

Local IPv4 and IPv6 addresses on TRUST_VR instance for BGP peering with SRX2-B

ae4.1

  • 10.2.4.1/30

  • 2001:db8:1:2:4::1/126

Local IPv4 and IPv6 addresses on UNTRUST_VR instance for BGP peering with SRX2-B

ae1.100

  • 10.3.1.1/30

Local IP address for BGP peering with SRX1-A in MNHA-VR routing instance

ae2.100

  • 10.3.2.1/30

Local IP address for BGP peering with SRX1-B in MNHA-VR routing instance

ae3.100

  • 10.3.3.1/30

Local IP address for BGP peering with SRX2-A in MNHA-VR routing instance

ae4.100

  • 10.3.4.1/30

Local IP address for BGP peering with SRX2-B in MNHA-VR routing instance

Table 8: Interface Details on SRX Series Firewalls

Interface

IP Address

Description

On SRX1-A

lo0.0

  • 192.168.0.1/32

MNHA IP address

lo0.1

  • 192.168.10.1/32

  • 2001:db8:1:255::1/128

Health check IPv4 and IPv6 addresses for MNHA pair 1

ae1.0

  • 10.1.1.2/30

  • 2001:db8:1:1:1::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 TRUST_VR instance

ae1.1

  • 10.2.1.2/30

  • 2001:db8:1:2:1::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 in UNTRUST_VR instance

ae1.100

10.3.1.2/30

Local IP address for BGP peering with MX1 in MNHA-VR routing instance

On SRX1-B

lo0.0

  • 192.168.0.2/32

MNHA IP address

lo0.1

  • 192.168.10.1/32

  • 2001:db8:1:255::1/128

Health check IPv4 and IPv6 addresses for MNHA pair 1

ae1.0

  • 10.1.2.2/30

  • 2001:db8:1:1:2::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 TRUST_VR instance

ae1.1

  • 10.2.2.2/30

  • 2001:db8:1:2:2::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 in UNTRUST_VR instance

ae1.100

10.3.2.2/30

Local IP address for BGP peering with MX1 in MNHA-VR routing instance

On SRX2-A

lo0.0

  • 192.168.0.3/32

MNHA IP address

lo0.1

  • 192.168.10.2/32

  • 2001:db8:1:255::2/128

Health check IPv4 and IPv6 addresses for MNHA pair 2

ae2.0

  • 10.1.3.2/30

  • 2001:db8:1:1:3::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 TRUST_VR instance

ae2.1

  • 10.2.3.2/30

  • 2001:db8:1:2:3::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 in UNTRUST_VR instance

ae2.100

10.3.3.2/30

Local IP address for BGP peering with MX1 in MNHA-VR routing instance

On SRX2-B

lo0.0

  • 192.168.0.4/32

MNHA IP address

lo0.1

  • 192.168.10.2/32

  • 2001:db8:1:255::2/128

Health check IPv4 and IPv6 addresses for MNHA pair 2

ae2.0

  • 10.1.4.2/30

  • 2001:db8:1:1:4::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 TRUST_VR instance

ae2.1

  • 10.2.4.2/30

  • 2001:db8:1:2:4::2/126

Local IPv4 and IPv6 addresses for BGP peering with MX1 in UNTRUST_VR instance

ae2.100

10.3.4.2/30

Local IP address for BGP peering with MX1 in MNHA-VR routing instance

Table 9: Interface Details on GW

Interface

IP Address

Description

ae10.41

  • 172.16.1.2/30

  • 2001:db8:172:1:1::2/126

Interface that connect to the MX1 on trust side

ae10.81

  • 172.16.2.2/30

  • 2001:db8:172:2:1::2/126

Interface that connect to the MX1 on untrust side

et-0/0/2

  • 172.16.8.2/24

  • 2001:db8:172:16:8::2/126

Interface on trust side through which the data clients are reachable.

et-0/0/5

  • 172.16.10.2/24

  • 2001:db8:172:16:10::2/126

Interface on untrust side through which the Internet server is reachable.

Topology Overview

Table 10: Devices, Role, and Functionality used in the Configuration

Device

Role

Function

MX1

Forwarding layer device

Load-balance traffic using CSDS-TO

SRX1-A

Services layer device

Device part of MNHA pair 1

SRX1-B

Services layer device

Device part of MNHA pair 1

SRX2-A

Services layer device

Device part of MNHA pair 2

SRX2-B

Services layer device

Device part of MNHA pair 2

GW

Gateway router

Gateway router for trust side and untrust side networks. The device is used for reaching the data clients and the Internet server. The example uses MX Series. You can use any device.

Table 11: Traffic Flows on MNHA Pair for Stateful Firewall Services with IPv4 Addresses

Feature

Traffic Flow Component

IP Address

Stateful firewall services on SRX Series Firewalls for Multinode HA Pair 1

(SRX1-A, SRX1-B)

Source data client

172.16.160.0/24

Destination Internet server

172.16.10.2/32

SRX Series Firewall Series with stateful firewall - Source

172.16.160.0/24

SRX Series Firewall Series with stateful firewall - Destination

172.16.10.2/32

Stateful firewall services on SRX Series Firewalls for Multinode HA Pair 2

(SRX2-A, SRX2-B)

Source data client

172.16.160.0/24

Destination Internet server

172.16.10.2/32

SRX Series Firewall Series with stateful firewall - Source

172.16.160.0/24

SRX Series Firewall Series with stateful firewall - Destination

172.16.10.2/32

Table 12: Traffic Flows on MNHA Pair for Stateful Firewall Services with IPv6 Addresses

Feature

Traffic Flow Component

IP Address

Stateful firewall services on SRX Series Firewalls for Multinode HA Pair 1

(SRX1-A, SRX1-B)

Source data client

2001:db8:172:160::/96

Destination Internet server

2001:db8:172:16:10::3/128

SRX Series Firewall with stateful firewall - Source

2001:db8:172:160::/96

SRX Series Firewall with stateful firewall - Destination

2001:db8:172:16:10::3/128

Stateful firewall services on SRX Series Firewalls for Multinode HA Pair 2

(SRX2-A, SRX2-B)

Source data client

2001:db8:172:160::/96

Destination Internet server

2001:db8:172:16:10::3/128

SRX Series Firewall with stateful firewall - Source

2001:db8:172:160::/96

SRX Series Firewall with stateful firewall - Destination

2001:db8:172:16:10::3/128

Topology Illustration

Figure 1: CSDS Traffic Orchestrator with Single MX Series and Scaled-out SRX Series Firewalls CSDS Traffic Orchestrator with Single MX Series and Scaled-out SRX Series Firewalls
Figure 2: Forward Traffic Flow Forward Traffic Flow
Figure 3: Reverse Traffic Flow Reverse Traffic Flow

Figure 1 shows that the MX1 performs traffic load balancing based on the available next-hops. The SRX Series Firewalls are the available next-hops. The traffic originating from the data clients is designated as the trusted side traffic. Traffic originating from the Internet is considered as untrust side traffic. The topology uses a GW router that serves as a gateway to the data clients and the Internet server. The devices in the topology use Aggregated Ethernet interfaces. You can use standalone interfaces in your setup.

You'll perform the following tasks in this configuration:

  1. Configure CSDS traffic orchestration on MX1 to load-balance the traffic based on the available next hops.

    • Configure BGP between MX1 and the firewalls, as well as between MX1 and the GW router. MX1 maintains two routing instances for trust side and untrust side routing.

    • Configure FBF on trust and untrust sides for forward and reverse traffic.

    • Configure hashing algorithm-based forwarding decisions for load balancing. Configure two CSDS-TO instances on MX1, one for the trust side and another for the untrust side.

    • Configure IPv4 and IPv6 based CSDS-TO health checks for the four SRX Series Firewalls available. MX1 performs RE-based health checks on each of the SRX Series Firewalls through CSDS-TO.

    • Configure the health check IP on the loopback interface. MX1 advertises the loopback interface IP to the firewalls through BGP.

  2. Configure the four SRX Series Firewalls in two MNHA pairs.

    • In each firewall, configure a server IP which is the MNHA IP address.

    • In each firewall, configure the health check IP on loopback interface. Both the nodes in a Multinode HA pair use the same health check IP address. Only the primary node responds to the health check request from MX1.

    • Configure SRG0 for Multinode HA. In the first Multinode HA pair, SRX1-A is the active node and SRX1-B is the standby node. In the second Multinode HA pair, SRX2-A is the active node and SRX2-B is the standby node.

    • Configure BGP routing for HA communication and stateful synchronization of the sessions. Based on the primary role, the Multinode HA places a single route in the routing table. When the primary role changes, the firewall advertises its routes in BGP.

For the forward data traffic as shown in Figure 2 (Data-clients > GW > MX1 (with FBF on trust side) > SRX > MX1 > GW > Internet server :

  • On the trust side, MX1 advertises a default route to the GW router. The GW router receives the data clients traffic and uses the default route to reach MX1. On untrust side, MX1 receives a default route from the GW router, which then advertises it to the firewalls.

  • The active node in the Multinode HA pair, advertises the health check IP. Always the active node responds to the health checks from MX1. On MX1, the CSDS-TO has two next-hops to the SRX Series Firewalls.

  • When the trust side traffic arrives from GW to MX1, the stateless firewall filter applies FBF on MX1 incoming interface, ae10.41. The trust side FBF filter then matches any source IP from the data clients prefix and sends the traffic to the CSDS-TO forwarding instance, trust-fi.

  • CSDS-TO performs source hash for the data client prefixes. Then, it load balances the traffic over the available active MNHA pair next-hops through interfaces ae1.0 and ae3.0 on MX1. Finally, the traffic reaches the firewalls through interfaces ae1.0 and ae2.0.

  • When the traffic arrives at SRX1-A and SRX2-A, the firewalls create a flow. The packets receive stateful firewall services, and a 5 tuple session gets created for that packets on SRX1-A and SRX2-A.

  • After creating a session for stateful firewall services, the packets exit the firewalls on ae1.1 and ae2.1 interfaces heading to the ae1.1 and ae3.1 interfaces on MX1. MX1 does a route look up and using the default route, the traffic reaches the Internet server

For the reverse data traffic as shown in Figure 3 (Internet server > GW > MX1 (with FBF on untrust side) > SRX > MX1 > GW > Data clients):

  • On the untrust side traffic, traffic coming to the MX1 ae10.81 from the Internet server and destined to the data clients, MX1 applies stateless firewall FBF filter. The untrust side FBF filter, then matches any destination IP from the data clients prefix and sends the traffic to the CSDS-TO forwarding instance, untrust-fi.

  • CSDS-TO performs destination hash for the data client prefixes. Then, it load balances the traffic over the available active MNHA pair next hops through interfaces ae1.1 and ae3.1 on MX1. Finally, the traffic reaches the firewalls through interfaces ae1.1 and ae2.1.

  • In SRX Series Firewalls, the 5 tuple remains the same for the stateful firewall services on both forward flow and reverse flow.

  • On the firewalls the reverse data traffic takes the ae1.0 and ae2.0 on the firewalls and ae1.0 and ae3.0 on MX1.

  • MX1 performs a route look up and traffic goes to the data client.

Step-By-Step Configuration on MX1

Ensure you meet the following prerequisites:

  • Enable commit operation synchronization across both the REs.

  • Enable NETCONF and SSH services.

  • Enable SDK service for CSDS-TO.

Setup MX1 for CSDS-TO configuration.

Run the commands on re0. MX1 ensure synchronization between the REs.

  1. Configure chassis redundancy, pic-mode, and enable enhanced-ip.
  2. Configure interfaces.
    1. Configure aggregated ethernet interfaces with LACP, VLANs, and IP address settings.
    2. Configure loopback interfaces for CSDS-TO health check.
  3. Configure routing instances.
    1. Configure MNHA-VR routing instance for BGP peering.
    2. Configure TRUST_VR routing instance for the forward data traffic from client to server.
    3. Configure UNTRUST_VR routing instance for the reverse data traffic from server to client.
    4. Configure forwarding-based routing instances for traffic redirections to trust and untrust directions.
  4. Configure routing.
    1. Configure global routing options.
    2. Configure static routing between MX1 and GW router.
    3. Configure BGP between MX1 MNHA-VR instance. and SRX1-A and SRX1-B.
    4. Configure BGP between MX1 MNHA-VR instance, and SRX2-A and SRX2-B.
    5. Configure BGP between MX1 TRUST_VR instance and GW router.
    6. Configure BGP between MX1 UNTRUST_VR instance and GW router.
    7. Configure BGP between MX1 TRUST_VR instance, and SRX1-A and SRX1-B.
    8. Configure BGP between MX1 UNTRUST_VR instance, and SRX1-A and SRX1-B.
    9. Configure BGP between MX1 TRUST_VR instance, and SRX2-A and SRX2-B.
    10. Configure BGP between MX1 UNTRUST_VR instance, and SRX2-A and SRX2-B.
  5. Enable hashing algorithm-based forwarding decisions for load balancing.
  6. Configure routing policies for traffic forwarding.
    1. Configure policy to export static route 172.16.80.0/24 from client to servers.
    2. Configure policy to export IPv4 default route 0.0.0.0/0 from MX1 to GW.
    3. Configure policy to export CSDS-TO health check IPv4 address for TRUST_VR instance and BGP routes.
    4. Configure policy to export CSDS-TO health check IPv4 address for UNTRUST_VR instance and BGP routes.
    5. Configure policy to export the static route 172.16.160.0/24 (Data client).
    6. Configure to export IPv6 default route from MX1 to GW.
    7. Configure to export CSDS-TO health check IPv6 address for TRUST_VR instance and BGP routes.
    8. Configure policy to export CSDS-TO health check IPv6 address for UNTRUST_VR instance and BGP routes.
    9. Configure policy to export the static route 2001:db8:172:160::/96 (client).
    10. Configure policy to export the BGP routes from MX1 to the servers (SRX1-A, SRX1-B, SRX2-A, and SRX2-B).
    11. Configure policy to ensure that the traffic not handled by rest of the policies undergoes per-packet load-balancing for CSDS-TO processing.
  7. Configure FBF for traffic to be directed to ITO.
    1. Configure a firewall filter to direct traffic from 172.16.160.0/24 (Data client) to trust routing instance for MNHA groups (SRX1-A, SRX1-B, SRX2-A, and SRX2-B).
    2. Configure a firewall filter to direct traffic destined to 172.16.160.0/24 (Data clients) through untrust routing instance for MNHA groups (SRX1-A, SRX1-B, SRX2-A, and SRX2-B).
    3. Configure firewall filters for to accept the traffic from IPv6 trust and untrust groups.
  8. Configure ITO.
    1. Configure RE-based load balancing.
    2. Configure CSDS-TO to load-balance IPv4 traffic on TRUST_VR. Associate the servers, and virtual services.
    3. Configure CSDS-TO to load-balance IPv6 traffic on TRUST_VR. Associate the servers, and virtual services.
    4. Configure CSDS-TO to load-balance IPv4 traffic on UNTRUST_VR. Associate the servers, and virtual services.
    5. Configure CSDS-TO to load-balance IPv6 traffic on UNTRUST_VR. Associate the servers, and virtual services.
    6. Configure ICMP and TCP-based health checks.

Step-By-Step Configuration on GW Router

Note that GW router configuration is for representational purpose and is not the DUT in the example.

Ensure you've configured the basic settings such as the SSH login services, and chassis configuration.

Setup GW router configuration.

If you have dual RE device, run the commands on re0 and ensure synchronization between the REs.

  1. Configure interfaces.
    1. Configure aggregated ethernet interfaces with LACP, VLANs, and IP address settings.
  2. Configure routing instances.
    1. Configure TRUST_VR routing instance for the forward data traffic from client to server.
    2. Configure UNTRUST_VR routing instance for the reverse data traffic from server to client.
  3. Configure routing.
    1. Configure static routing on TRUST_VR instance between GW router and MX1.
    2. Configure static routing on UNTRUST_VR instance between GW router and MX1.
    3. Configure BGP on TRUST_VR instance between GW router and MX1.
    4. Configure BGP on UNTRUST_VR instance between GW router and MX1.
  4. Configure routing policies for traffic forwarding.
    1. Configure policy to export static routes to accept IPv4 traffic from client to servers.
    2. Configure policy to export static routes to accept IPv6 traffic from client to servers.
    3. Configure policy to export static routes to accept IPv4 traffic from server to client.
    4. Configure policy to export static routes to accept IPv6 traffic from server to client.

Step-By-Step Configuration on SRX1-A

Ensure you meet the following prerequisites:

  • Enable NETCONF, SSH service, and web management service.

This configuration is applicable for SRX1-A. You must make the appropriate device-specific configuration changes for SRX2-A.

Setup SRX1-A configuration.

  1. Configure speed.
  2. Configure interfaces.
    1. Configure aggregated ethernet interfaces with LACP, VLANs, and IP address settings.
    2. Configure loopback interfaces for communication between the nodes using inter chassis link (ICL).
  3. Configure MNHA.
    1. Configure MNHA with local node, peer node, Inter Chassis Link (ICL) and routing instance for the nodes communication, and Bidirectional Forwarding Detection (BFD) protocol options on the peer node.
    2. Setup the services redundancy group, SRG0 and configure BFD monitoring parameters to detect failures in network.
  4. Configure routing instances.
    1. Configure MNHA-VR routing instance for SRX1-A BGP peering with MX1 for stateful session synchronization in MNHA.
    2. Configure VR-1 routing instance for the trust side and untrust side data traffic.
  5. Configure routing.
    1. Configure global routing options.
    2. Configure BGP on MNHA-VR instance.
    3. Configure BGP on VR-1 instance for the IPv4 and IPv6 data traffic on the trust side.
    4. Configure BGP on VR-1 instance for the IPv4 and IPv6 data traffic on the untrust side.
  6. Configure routing policies.
    1. Configure per-flow load balancing of traffic across the available routes based on the flow attributes (source IP, destination IP, source port, destination port.) of the traffic.
    2. Configure policy to export routes for IPv4 trust side traffic.
    3. Configure policy to export routes for IPv6 trust side traffic.
    4. Configure policy to export routes for IPv4 untrust side traffic.
    5. Configure policy to export routes for IPv6 untrust side traffic.
    6. Configure policy for MNHA traffic.
    7. Specify the route condition for high availability in case of failure.
  7. Configure address book for the source prefixes.
  8. Configure security zones, assign interfaces to the zones, and specify the allowed system services for the security zones.
  9. Configure security policies for the traffic between trust and untrust sides.

Step-By-Step Configuration on SRX1-B

Ensure you meet the following prerequisites:

  • Enable NETCONF, SSH service, and web management service.

This configuration is applicable for SRX1-B. You must make the appropriate device-specific configuration changes for SRX2-B.

Setup SRX1-B configuration.

  1. Configure speed.
  2. Configure interfaces.
    1. Configure aggregated ethernet interfaces with LACP, VLANs, and IP address settings.
    2. Configure loopback interfaces for communication between the nodes using inter chassis link (ICL).
  3. Configure MNHA.
    1. Configure MNHA with local node, peer node, Inter Chassis Link (ICL) and routing instance for the nodes communication, and Bidirectional Forwarding Detection (BFD) protocol options on the peer node.
    2. Setup the services redundancy group, SRG0 and configure BFD monitoring parameters to detect failures in network.
  4. Configure routing instances.
    1. Configure MNHA-VR routing instance for SRX1-B BGP peering with MX1 for stateful session synchronization in MNHA.
    2. Configure VR-1 routing instance for the trust side and untrust side data traffic.
  5. Configure routing.
    1. Configure global routing options.
    2. Configure BGP on MNHA-VR instance.
    3. Configure BGP on VR-1 instance for the IPv4 and IPv6 data traffic on the trust side.
    4. Configure BGP on VR-1 instance for the IPv4 and IPv6 data traffic on the untrust side.
  6. Configure routing policies.
    1. Configure per-flow load balancing of traffic across the available routes based on the flow attributes (source IP, destination IP, source port, destination port and so on) of the traffic.
    2. Configure policy to export routes for IPv4 trust side traffic.
    3. Configure policy to export routes for IPv6 trust side traffic.
    4. Configure policy to export routes for IPv4 untrust side traffic.
    5. Configure policy to export routes for IPv6 untrust side traffic.
    6. Configure policy for MNHA traffic.
    7. Specify the route condition for high availability in case of failure.
  7. Configure address book for the source prefixes.
  8. Configure security zones, assign interfaces to the zones, and specify the allowed system services for the security zones.
  9. Configure security policies for the traffic between trust and untrust sides.

Verification

This section provides a list of show commands that you can use to verify the feature in this example. Run the commands in operational mode.

CSDS Traffic Orchestration Statistics on MX1

Purpose

Run the command to display the traffic statistics for the load balancing instance.

Action

From operational mode, run the command show services traffic-load-balance statistics instance instance-name on MX1.

Meaning

The command displays the load balancing metrics for IPv4 and IPv6 trust and untrust instances.

Verify Routing Details for the Composite Next Hop on MX1

Purpose

Run the commands to verify the composite next hop when load balancing the traffic using CSDS-TO based on the load and the firewall's availability.

Action

From operational mode, run the command show route table instance-name on MX1.

Meaning

The command displays the routing table for srx_mnha_group_trust_fi.inet.0, srx_mnha_group_trust_fi.inet6.0, srx_mnha_group_untrust_fi.inet.0, and srx_mnha_group_untrust_fi.inet6.0 instances for the IPv4 and IPv6 trust side and untrust side traffic.

Verify Routing Details to the Multinode HA Pair from MX1

Purpose

Run the command to verify the routing details to the SRX Series Firewall Series health check IP address.

Action

From operational mode, run the command show routing table instance-name on MX1.

Meaning

The command displays the BGP routing information from MX1 to Multinode HA pairs for IPv4 and IPv6 health check IPs.

Verify Routing Details to the Data Clients from MX1

Purpose

Run the commands to verify the routing details to the data clients through the trust side and untrust side instance for IPv4 and IPv6 data traffic.

Action

From operational mode, run show routing table instance-name command on MX1.

Meaning

The command displays the routing details from MX1 trust side and untrust side to the data clients for IPv4 and IPv6 data traffic.

Verify Routing Details to the Internet Server from MX1

Purpose

Run the commands to verify the routing details to the Internet server through the trust side and untrust side instance for IPv4 and IPv6 data traffic.

Action

From operational mode, run show routing table instance-name command on MX1.

Meaning

The command displays the routing details from MX1 trust side and untrust side to the Internet server for IPv4 and IPv6 data traffic.

Verify MNHA Details on the SRX Series Firewalls

Purpose

Verify the details of the MNHA setup configured on the SRX Series Firewalls.

Action

From operational mode, run show chassis high-availability information command on the SRX Series Firewalls.

Meaning

The command displays the local node and peer node details such as the IP address and ID, SRG details on both the nodes in the Multinode HA pair.

Verify BGP Session on the SRX Series Firewalls

Purpose

Verify the summary information about BGP and its neighbors to determine if routes are received from the peers for the MNHA-VR and VR-1 routing instances.

Action

From operational mode, run show bgp summary instance instance-name command on SRX Series Firewalls.

Meaning

The command displays that the BGP session is established and the peers exchange update messages for the MNHA-VR and VR-1 routing instance on SRX-1A and SRX1-B devices.

Verify Routing Details to the Data Clients from SRX Series Firewalls

Purpose

Run the commands to verify the routing details to the data clients for IPv4 and IPv6 data traffic.

Action

From operational mode, run show routing table instance-name command on the SRX Series Firewalls.

Meaning

The command displays the routing details from SRX1-A and SRX1-B to the data clients for IPv4 and IPv6 data traffic.

Verify Routing Details to the Internet Server from SRX Series Firewalls

Purpose

Run the commands to verify the routing details to the Internet server for IPv4 and IPv6 data traffic.

Action

From operational mode, run show routing table instance-name command on the SRX Series Firewalls.

Meaning

The command displays the routing details from SRX1-A and SRX1-B to the Internet server for IPv4 and IPv6 data traffic.

Verify the Session Flow

Purpose

Run the commands to verify the session flow creation for the stateful firewalls services.

Action

From operational mode, run show security flow session command on the SRX Series Firewalls.

Meaning

The commands show that the sessions are active on the SRX1-A device.

Appendix 1: Show Configuration Output on DUT

Show command output on the DUT.

The example demonstrates the show command output of MX1 and SRX1-A devices. You'll see similar output for SRX1-B.

From configuration mode, confirm your configuration by entering the following commands. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

Show Commands on MX Series

Show Command on SRX Series Firewalls