SRX
To see what policy is being hit by a flow:
show security match-policies ? Possible completions: destination-ip Match policy for the given destination IP destination-port Match policy for the given destination port) (1..65535)
[…]
source-port Match policy for the given source port) (1..65535) to-zone Match policy for the given destination zone
Packet processing chain: SRX vs J-Series (Important to notice that, in j series, all nat happens after policy and routing):
CLUSTER - HACheck logs :show log jsrpd To log into shell/cli from the pair node:
rlogin -Jk -T node1
To force the failover to node 1 request chassis cluster failover node 1 redundancy-group 1
Normally, after force failover, we reset the priority values to the ones determined in the config: request chassis cluster failover reset redundancy-group 1
redundancy-group 1 {
node 0 priority 100;
node 1 priority 99;
This priority is only used when two devices come up at the exact same time or when preempt is enabled. (see this link)
Unrelated is the monitored interface priority. Basically the priority is subtracted from 255 (forget about the node priority! and there is a fail-over when the cumulative weights reach 0!
HARDWARE
CHASSIS
CARDS:
ETHERNET SWITCHING mode on SRX
set protocols l2-learning global-mode switching
reboot show ethernet-switching global-information
External Link
Create the l2 vlan-trust:
set vlans vlan-trust vlan-id 3
Add interface vlan.0 L3]] interface
set vlans vlan-trust l3-interface vlan.0
And put ip on it:
set interfaces vlan.0 family inet address 192.168.1.1/24
Add physical interfaces to vlan-trust
set interfaces ge-0/0/10.0 family ethernet-switching vlan members vlan-trust
BGP SRX
To get inspiration: External Link & this seminal External Link
See this External Link
configure
delete security < confirm this will delete everything below this level> set security forwarding-options family mpls mode packet-based commit and-quit request system reboot
Note that in packet mode, no security policies are allowed, no point on defining zones either.. External Link
If we are in flow mode, To allow communication:
Put all interfaces in the same zone:
set security zones security-zone trust interface ge-0/0/2.0 set security zones security-zone trust interface ge-0/0/3.0
Create a policy to permit intra-zone traffic.
set security policies from-zone trust to-zone trust policy trust-to-trust match source-address any destination address any application any set security policies from-zone trust to-zone trust policy trust-to-trust then permit
SRX DIRECTORIES