Configure WAN Edge Templates for SRX Series Firewalls
SUMMARY
The WAN edge template in Juniper Mist™ WAN Assurance enables you to define common spoke characteristics including WAN interfaces, traffic-steering rules, and access policies. You then apply these configurations to the Juniper Networks® SRX Series Firewall deployed as a WAN edge device. When you assign a WAN edge device to a site, the device automatically adopts the configuration from the associated template. This automatic process enables you to manage and apply consistent and standardized configurations across your network infrastructure, streamlining the configuration process.
Configuration done on the WAN edge device through the Mist dashboard overrides any configuration done through the device CLI.
You can have one or more templates for your spoke devices.
In this task, you create and configure a WAN edge template for a spoke device in the Juniper Mist™ cloud portal.
Configure a WAN Edge Template
To configure a WAN edge template:
Add WAN Interfaces to the Template
In this task, add two WAN interfaces to the WAN edge template.
To add WAN interfaces to the template:
Add a LAN Interface
LAN interface configuration identifies your request source from the name of the network you specify in the LAN configuration.
To add a LAN interface:
Configure Traffic-Steering Policies
Just like with hub profiles, traffic steering in a Juniper Mist network is where you define the different paths that application traffic can take to traverse the network. The paths that you configure within traffic steering also determine the destination zone.
To configure traffic-steering policies:
Configure Application Policies
In a Mist network, application policies are where you define which network and users can access which applications, and according to which traffic-steering policy. The Networks/Users settings determine the source zone. The Application + Traffic Steering settings determine the destination zone. Additionally, you can assign an action of Permit or Deny. Mist evaluates and applies application policies in the order in which you list them.
Consider the traffic-flow requirements in Figure 6. The image depicts a basic initial traffic model for a corporate VPN setup (third spoke device and second hub device are not shown).
To meet the preceding requirements, you need to create the following application policies:
-
Policy 1—Allows traffic from spoke sites to the hub. In this case, the destination prefix used in address groups represents the LAN interface of two hubs.
-
Policy 2—Allows spoke-to-spoke traffic through the corporate LAN through an overlay.
Note:This may not be feasible in the real world except on expensive MPLS networks with managed IPs. Managed IPs send traffic directly to the other spoke. This type of traffic usually flows through a hub device
-
Policy 3—Allows traffic from both the hub and the DMZ attached to the hub to the spoke devices.
-
Policy 4—Allows Internet-bound traffic to flow from spoke devices to the hub device. From there, the traffic breaks out to the Internet. In this case, the hub applies source NAT to the traffic and routes traffic to a WAN interface, as defined in the hub profile. This rule is general, so you should place it after the specific rules. Because Mist evaluates application policies in the order they are placed in the policies list.
To configure application polices:






