SRX

To see what policy is being hit by a flow:

show security match-policies ?
 Possible completions:
destination-ip       Match policy for the given destination IP
destination-port     Match policy for the given destination port) (1..65535)

[…]

source-port          Match policy for the given source port) (1..65535)
to-zone              Match policy for the given destination zone


Packet processing chain: SRX vs J-Series (Important to notice that, in j series, all nat happens after policy and routing):

CLUSTER - HACheck logs :show log jsrpd To log into shell/cli from the pair node:

rlogin -Jk -T node1

To force the failover to node 1 request chassis cluster failover node 1 redundancy-group 1

Normally, after force failover, we reset the priority values to the ones determined in the config: request chassis cluster failover reset redundancy-group 1

redundancy-group 1 {
  node 0 priority 100;
  node 1 priority 99;

This priority is only used when two devices come up at the exact same time or when preempt is enabled. (see this link)

Unrelated is the monitored interface priority. Basically the priority is subtracted from 255 (forget about the node priority! and there is a fail-over when the cumulative weights reach 0!


HARDWARE CHASSIS

CARDS:


ETHERNET SWITCHING mode on SRX

set protocols l2-learning global-mode switching

reboot
show ethernet-switching global-information


External Link Create the l2 vlan-trust:

set vlans vlan-trust vlan-id 3

Add interface vlan.0 L3]] interface

set vlans vlan-trust l3-interface vlan.0

And put ip on it:

set interfaces vlan.0 family inet address 192.168.1.1/24

Add physical interfaces to vlan-trust

set interfaces ge-0/0/10.0 family ethernet-switching vlan members vlan-trust



BGP SRX
To get inspiration: External Link & this seminal External Link
See this External Link

configure

delete security
< confirm this will delete everything below this level>
set security forwarding-options family mpls mode packet-based 
commit and-quit
request system reboot

Note that in packet mode, no security policies are allowed, no point on defining zones either.. External Link

If we are in flow mode, To allow communication:
Put all interfaces in the same zone:

set security zones security-zone trust interface ge-0/0/2.0
set security zones security-zone trust interface ge-0/0/3.0

Create a policy to permit intra-zone traffic.

set security policies from-zone trust to-zone trust policy trust-to-trust match source-address any destination address any application any
set security policies from-zone trust to-zone trust policy trust-to-trust then permit

SRX DIRECTORIES