Configure Hub Profiles for SRX Series Firewalls
Each hub device in a Juniper Mist™ cloud topology must have its own profile. Hub profiles are a convenient way to create an overlay and assign a path for each WAN link on that overlay in Juniper WAN Assurance.
The difference between a hub profile and a WAN edge template is that you apply the hub profile to an individual device that’s at a hub site. And the WAN edge templates are bound to spoke sites that have multiple devices and bound with the same template across multiple sites. Every Hub WAN interface creates an overlay endpoint for spokes. Spoke WAN interfaces map the appropriate Hub WAN interfaces, defining the topology. Hub profiles drive the addition, removal of paths on your overlay.
When you create a hub profile for the Juniper Networks® SRX Series Firewall, the Mist cloud generates and installs the SSL certificates automatically. It also sets up WAN uplink probes for failover detection.
In this task, you create a hub profile and then clone the same profile to create a second hub profile in the Juniper Mist cloud portal.
Configure a Hub Profile
A hub profile comprises the set of attributes that associate with a particular hub device. Hub profiles include name, LAN,WAN, traffic steering, application policies, and routing options. You can assign the hub profile to a hub device and after a hub profile is loaded onto the site, the device assigned to the site picks up the attributes of that hub profile.
To configure a hub profile:
Add WAN Interfaces to the Hub Profile
Create WAN interfaces for the hub profile. WAN interfaces become the connection across the SD-WAN. The hub profile automatically creates an overlay endpoints for each WAN interface. Note that the overlay Hub Endpoints is where you tell the spoke (branch) about the hub endpoints.
To add WAN interfaces to the hub profile:
Add a LAN Interface to the Hub Profile
Hub-side of LAN interfaces connect a hub device to the LAN segment.
To add a LAN interface to the hub profile:
Configure Traffic-Steering Policies
Traffic steering is where you define the different paths that application traffic can take to traverse the network. The paths that you configure within traffic steering determine the destination zone. For any traffic steering policy, you need to define the paths for traffic to traverse and strategies for utilizing those paths. Strategies include:
- Ordered—Starts with a specified path and failover to backup path(s) when needed
- Weighted—Distributes traffic across links according to a weighted bias, as determined by a cost that you input
- Equal-cost multipath—Load balances traffic equally across multiple paths
When you apply a hub profile to a device, the traffic-steering policy determines the overlay, WAN and LAN interfaces, order of policies, and usage of Equal Cost Multi-Path (ECMP). The policy also determines how interfaces or a combination of interfaces interact to steer the traffic.
To configure traffic-steering policies:
Configure an Application Policy
Application policies are where you define which network and users can access which applications, and according to which traffic-steering policy. The settings in Networks/Users determine the source zone. The Applications and Traffic Steering path settings determine the destination zone. Additionally, you can assign a policy action— permit or deny to allow or block traffic. Mist evaluates and applies application policies in the order in which you list them in the portal. You can use Up Arrow and Down arrows to change the order of policies.
Figure 4 shows different traffic-direction requirements in this task. The image depicts a basic initial traffic model for a corporate VPN setup (third spoke device and second hub device are not shown).
In this task, you create the following application rules to allow traffic:
-
Rule 1—Allows traffic from spoke sites to reach the hub (and to a server in the DMZ attached to the hub device).
-
Rule 2—Allows traffic from servers in the DMZ attached to the hub to reach spoke devices.
-
Rule 3—Allows traffic from spoke devices to reach spoke device hair-pinning through a hub device
-
Rule 4—Allows Internet-bound traffic from the hub device to the Internet (local breakout). In this rule, define the destination as "Any" with IP address 0.0.0.0/0. The traffic uses the WAN underlay interface with SNAT applied to reach IP addresses on the Internet as a local breakout.
-
Note:
Avoid creating rules with same destination name and IP address 0.0.0.0/0. If required, create destinations with different names using IP address 0.0.0.0/0.
-
From the spoke devices to the Internet directly (not passing through the hub device). In this rule, define the destination as "Any" with IP address 0.0.0.0/0. The traffic uses the WAN underlay interface with SNAT applied to reach IP addresses on the Internet as a local breakout. This method implements a central breakout at the hub for all spoke devices.
To configure an application policy:
Create a Second Hub Profile by Cloning the Existing Hub Profile
Hub devices are unique throughout your network. You have to create an individual profile for each hub device. Juniper Mist™ enables you to create a hub profile by cloning the existing profile and applying modifications wherever required.
To create a second hub profile by cloning an existing hub profile:










