Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

Example: Configuring an Active/Passive Chassis Cluster Pair with an IPsec Tunnel

This example shows how to configure active/passive chassis clustering with an IPsec tunnel for SRX Series devices.

Requirements

Before you begin:

  • Get two SRX5000 models with identical hardware configurations, one SRX210 edge router, and four EX Series Ethernet switches.
  • Physically connect the two devices (back-to-back for the fabric and control ports) and ensure that they are the same models. You can configure both the fabric and control ports on the SRX5000 line.
  • Set the two devices to cluster mode and reboot the devices. You must enter the following operational mode commands on both devices, for example:
    • On node 0:
      user@host> set chassis cluster cluster-id 1 node 0 reboot
    • On node 1:
      user@host> set chassis cluster cluster-id 1 node 1 reboot

    The cluster ID is the same on both devices, but the node ID must be different because one device is node 0 and the other device is node 1. The range for the cluster ID is 1 through 255. Setting a cluster ID to 0 is equivalent to disabling a cluster.

    Cluster ID greater than 15 can only be set when the fabric and control link interfaces are connected back-to-back.

  • Get two SRX5000 models with identical hardware configurations, one SRX210 edge router, and four EX Series Ethernet switches.
  • Physically connect the two devices (back-to-back for the fabric and control ports) and ensure that they are the same models. You can configure both the fabric and control ports on the SRX5000 line.

From this point forward, configuration of the cluster is synchronized between the node members and the two separate devices function as one device. Member-specific configurations (such as the IP address of the management port of each member) are entered using configuration groups.

Overview

In this example, a single device in the cluster terminates in an IPsec tunnel and is used to process all traffic, and the other device is used only in the event of a failure. (See Figure 1.) When a failure occurs, the backup device becomes master and controls all forwarding.

Figure 1: Active/Passive Chassis Cluster with IPsec Tunnel Topology (SRX Series Devices)

Active/Passive
Chassis Cluster with IPsec Tunnel Topology (SRX Series Devices)

In this example, you configure group (applying the configuration with the apply-groups command) and chassis cluster information. Then you configure IKE, IPsec, static route, security zone, and security policy parameters. See Table 1 through Table 7.

Table 1: Group and Chassis Cluster Configuration Parameters

Feature

Name

Configuration Parameters

Groups

node0

  • Hostname: SRX5800-1
  • Interface: fxp0
    • Unit 0
    • 172.19.100.50/24

node1

  • Hostname: SRX5800-2
  • Interface: fxp0
    • Unit 0
    • 172.19.100.51/24

Table 2: Chassis Cluster Configuration Parameters

Feature

Name

Configuration Parameters

Fabric links

fab0

Interface: xe-5/3/0

fab1

Interface: xe-17/3/0

Number of redundant Ethernet interfaces

2

Heartbeat interval

1000

Heartbeat threshold

3

Redundancy group

0

  • Priority:
    • Node 0: 254
    • Node 1: 1

1

  • Priority:
    • Node 0: 254
    • Node 1: 1

Interface monitoring

  • xe-5/0/0
  • xe-5/1/0
  • xe-17/0/0
  • xe-17/1/0

Interfaces

xe-5/1/0

Redundant parent: reth1

xe-5/1/0

Redundant parent: reth1

xe-5/0/0

Redundant parent: reth0

xe-17/0/0

Redundant parent: reth0

reth0

Redundancy group: 1

  • Unit 0
  • 10.1.1.60/16

reth1

Redundancy group: 1

  • Multipoint
  • Unit 0
  • 10.10.1.1/30

st0

  • Unit 0
  • 10.10.1.1/30

Table 3: IKE Configuration Parameters

Feature

Name

Configuration Parameters

Proposal

proposal-set standard

-

Policy

preShared

  • Mode: main
  • Proposal reference: proposal-set standard
  • IKE Phase 1 policy authentication method: pre-shared-key ascii-text

Gateway

SRX210-1

  • IKE policy reference: perShared
  • External interface: reth0.0
  • Gateway address: 10.1.1.90

Note: On all high-end SRX Series devices, only reth interfaces are supported for IKE external interface configuration in IPsec VPN. Other interface types can be configured, but IPsec VPN might not work.

On all branch SRX Series devices, reth interfaces and the lo0 interface are supported for IKE external interface configuration in IPsec VPN. Other interface types can be configured, but IPsec VPN might not work.

On all high-end SRX Series devices, the lo0 logical interface cannot be configured with RG0 if used as an IKE gateway external interface.

Table 4: IPsec Configuration Parameters

Feature

Name

Configuration Parameters

Proposal

proposal-set standard

Policy

std

VPN

SRX210-1

  • IKE gateway reference: SRX210-1
  • IPsec policy reference: std
  • Bind to interface: st0.0
  • VPN monitoring: vpn-monitor optimized
  • Tunnels established: establish-tunnels immediately

Note: The manual VPN name and the site-to-site gateway name cannot be the same.

Table 5: Static Route Configuration Parameters

Name

Configuration Parameters

0.0.0.0/0

Next hop: 10.2.1.1

10.3.0.0/16

Next hop: 10.10.1.2

Table 6: Security Zone Configuration Parameters

Name

Configuration Parameters

trust

  • All system services are allowed.
  • All protocols are allowed.
  • The reth0.0 interface is bound to this zone.

untrust

  • All system services are allowed.
  • All protocols are allowed.
  • The reth1.0 interface is bound to this zone.

vpn

  • All system services are allowed.
  • All protocols are allowed.
  • The st0.0 interface is bound to this zone.

Table 7: Security Policy Configuration Parameters

Purpose

Name

Configuration Parameters

This security policy permits traffic from the trust zone to the untrust zone.

ANY

  • Match criteria:
    • source-address any
    • destination-address any
    • application any
  • Action: permit

This security policy permits traffic from the trust zone to the vpn zone.

vpn-any

  • Match criteria:
    • source-address any
    • destination-address any
    • application any
  • Action: permit

Configuration

CLI Quick Configuration

To quickly configure an active/passive chassis cluster pair with an IPsec tunnel, copy the following commands and paste them into the CLI:

{primary:node0}[edit]set chassis cluster control-ports fpc 2 port 0set chassis cluster control-ports fpc 14 port 0set groups node0 system host-name SRX5800-1set groups node0 interfaces fxp0 unit 0 family inet address 172.19.100.50/24set groups node1 system host-name SRX5800-2set groups node1 interfaces fxp0 unit 0 family inet address 172.19.100.51/24set apply-groups “${node}”set interfaces fab0 fabric-options member-interfaces xe-5/3/0set interfaces fab1 fabric-options member-interfaces xe-17/3/0set chassis cluster reth-count 2set chassis cluster heartbeat-interval 1000set chassis cluster heartbeat-threshold 3set chassis cluster node 0set chassis cluster node 1set chassis cluster redundancy-group 0 node 0 priority 254set chassis cluster redundancy-group 0 node 1 priority 1set chassis cluster redundancy-group 1 node 0 priority 254set chassis cluster redundancy-group 1 node 1 priority 1set chassis cluster redundancy-group 1 preemptset chassis cluster redundancy-group 1 interface-monitor xe-5/0/0 weight 255set chassis cluster redundancy-group 1 interface-monitor xe-5/1/0 weight 255set chassis cluster redundancy-group 1 interface-monitor xe-17/0/0 weight 255set chassis cluster redundancy-group 1 interface-monitor xe-17/1/0 weight 255set interfaces xe-5/1/0 gigether-options redundant-parent reth1set interfaces xe-17/1/0 gigether-options redundant-parent reth1set interfaces xe-5/0/0 gigether-options redundant-parent reth0set interfaces xe-17/0/0 gigether-options redundant-parent reth0set interfaces reth0 redundant-ether-options redundancy-group 1set interfaces reth0 unit 0 family inet address 10.1.1.60/16set interfaces reth1 redundant-ether-options redundancy-group 1set interfaces reth1 unit 0 family inet address 10.2.1.60/16set interfaces st0 unit 0 multipoint family inet address 10.10.1.1/30set security ike policy preShared mode mainset security ike policy preShared proposal-set standardset security ike policy preShared pre-shared-key ascii-text "juniper"## Encrypted passwordset security ike gateway SRX210-1 ike-policy preSharedset security ike gateway SRX210-1 address 10.1.1.90set security ike gateway SRX210-1 external-interface reth0.0set security ipsec policy std proposal-set standardset security ipsec vpn SRX210-1 bind-interface st0.0set security ipsec vpn SRX210-1 vpn-monitor optimizedset security ipsec vpn SRX210-1 ike gateway SRX210-1set security ipsec vpn SRX210-1 ike ipsec-policy stdset security ipsec vpn SRX210-1 establish-tunnels immediatelyset routing-options static route 0.0.0.0/0 next-hop 10.2.1.1set routing-options static route 10.3.0.0/16 next-hop 10.10.1.2set security zones security-zone untrust host-inbound-traffic system-services allset security zones security-zone untrust host-inbound-traffic protocols allset security zones security-zone untrust interfaces reth1.0set security zones security-zone trust host-inbound-traffic system-services allset security zones security-zone trust host-inbound-traffic protocols allset security zones security-zone trust interfaces reth0.0set security zones security-zone vpn host-inbound-traffic system-services all 144set security zones security-zone vpn host-inbound-traffic protocols allset security zones security-zone vpn interfaces st0.0set security policies from-zone trust to-zone untrust policy ANY match source-address anyset security policies from-zone trust to-zone untrust policy ANY match destination-address anyset security policies from-zone trust to-zone untrust policy ANY match application anyset security policies from-zone trust to-zone vpn policy vpn-any then permit

Step-by-Step Procedure

To configure an active/passive chassis cluster pair with an IPsec tunnel:

  1. Configure control ports.
    {primary:node0}[edit]user@host# set chassis cluster control-ports fpc 2 port 0user@host# set chassis cluster control-ports fpc 14 port 0
  2. Configure the management interface.
    {primary:node0}[edit]user@host# set groups node0 system host-name SRX5800-1user@host# set groups node0 interfaces fxp0 unit 0 family inet address 172.19.100.50/24user@host#set groups node1 system host-name SRX5800-2user@host# set groups node1 interfaces fxp0 unit 0 family inet address 172.19.100.51/24user@host# set apply-groups “${node}”
  3. Configure the fabric interface.
    {primary:node0}[edit]user@host# set interfaces fab0 fabric-options member-interfaces xe-5/3/0user@host# set interfaces fab1 fabric-options member-interfaces xe-17/3/0
  4. Configure redundancy groups.
    {primary:node0}[edit]user@host# set chassis cluster reth-count 2user@host# set chassis cluster heartbeat-interval 1000user@host# set chassis cluster heartbeat-threshold 3user@host# set chassis cluster node 0user@host# set chassis cluster node 1user@host# set chassis cluster redundancy-group 0 node 0 priority 254user@host# set chassis cluster redundancy-group 0 node 1 priority 1user@host# set chassis cluster redundancy-group 1 node 0 priority 254user@host# set chassis cluster redundancy-group 1 node 1 priority 1user@host# set chassis cluster redundancy-group 1 preemptuser@host# set chassis cluster redundancy-group 1 interface-monitor xe-5/0/0 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor xe-5/1/0 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor xe-17/0/0 weight 255user@host# set chassis cluster redundancy-group 1 interface-monitor xe-17/1/0 weight 255
  5. Configure redundant Ethernet interfaces.
    {primary:node0}[edit]user@host# set interfaces xe-5/1/0 gigether-options redundant-parent reth1user@host# set interfaces xe-17/1/0 gigether-options redundant-parent reth1user@host# set interfaces xe-5/0/0 gigether-options redundant-parent reth0user@host# set interfaces xe-17/0/0 gigether-options redundant-parent reth0user@host# set interfaces reth0 redundant-ether-options redundancy-group 1user@host# set interfaces reth0 unit 0 family inet address 10.1.1.60/16user@host# set interfaces reth1 redundant-ether-options redundancy-group 1user@host# set interfaces reth1 unit 0 family inet address 10.2.1.60/16
  6. Configure IPsec parameters.
    {primary:node0}[edit]user@host# set interfaces st0 unit 0 multipoint family inet address 10.10.1.1/30user@host# set security ike policy preShared mode mainuser@host# set security ike policy preShared proposal-set standarduser@host# set security ike policy preShared pre-shared-key ascii-text "juniper"## Encrypted passworduser@host# set security ike gateway SRX210-1 ike-policy preShareduser@host# set security ike gateway SRX210-1 address 10.1.1.90user@host# set security ike gateway SRX210-1 external-interface reth0.0user@host# set security ipsec policy std proposal-set standarduser@host# set security ipsec vpn SRX210-1 bind-interface st0.0user@host# set security ipsec vpn SRX210-1 vpn-monitor optimizeduser@host# set security ipsec vpn SRX210-1 ike gateway SRX210-1user@host# set security ipsec vpn SRX210-1 ike ipsec-policy stduser@host# set security ipsec vpn SRX210-1 establish-tunnels immediately
  7. Configure static routes.
    {primary:node0}[edit]user@host# set routing-options static route 0.0.0.0/0 next-hop 10.2.1.1user@host# set routing-options static route 10.3.0.0/16 next-hop 10.10.1.2
  8. Configure security zones.
    {primary:node0}[edit]user@host# set security zones security-zone untrust host-inbound-traffic system-services alluser@host# set security zones security-zone untrust host-inbound-traffic protocols alluser@host# set security zones security-zone untrust interfaces reth1.0user@host# set security zones security-zone trust host-inbound-traffic system-services alluser@host# set security zones security-zone trust host-inbound-traffic protocols alluser@host# set security zones security-zone trust interfaces reth0.0user@host# set security zones security-zone vpn host-inbound-traffic system-services alluser@host# set security zones security-zone vpn host-inbound-traffic protocols alluser@host# set security zones security-zone vpn interfaces st0.0
  9. Configure security policies.
    {primary:node0}[edit]user@host# set security policies from-zone trust to-zone untrust policy ANY match source-address anyuser@host# set security policies from-zone trust to-zone untrust policy ANY match destination-address anyuser@host# set security policies from-zone trust to-zone untrust policy ANY match application anyuser@host# set security policies from-zone trust to-zone vpn policy vpn-any then permit

Step-by-Step Procedure

Results

From operational mode, confirm your configuration by entering the show configuration command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

For brevity, this show command output includes only the configuration that is relevant to this example. Any other configuration on the system has been replaced with ellipses (...).

user@host> show configuration
version x.xx.x;
groups { 
    node0 { 
        system { 
            host-name SRX5800­1; 
        } 
        interfaces { 
            fxp0 { 
                unit 0 { 
                    family inet { 
                        address 172.19.100.50/24;
                    } 
                } 
            }
        }
    }
    node1 { 
        system { 
            host-name SRX5800­2; 
        } 
        interfaces { 
            fxp0 { 
                unit 0 { 
                    family inet { 
                        address 172.19.100.51/24;
                    } 
                } 
            }
        }
    }
}
apply-groups "${node}";
system { 
        root-authentication { 
        encrypted-password "$1$zTMjraKG$qU8rjxoHzC6Y/WDmYpR9r.";
        }
}
chassis {
    cluster {
        reth-count 2;
        heartbeat-interval 1000;
        heartbeat-threshold 3;
        control-ports {
            fpc 2 port 0;
            fpc 14 port 0;
        }
        redundancy-group 0 {
            node 0 priority 254;
            node 1 priority 1;
        }
        redundancy-group 1 {
            node 0 priority 254;
            node 1 priority 1;
            preempt;
            interface-monitor {
                xe–6/0/0 weight 255;
                xe–6/1/0 weight 255;
                xe–18/0/0 weight 255;
                xe–18/1/0 weight 255;
            }
        } 
    }
}
interfaces { 
    xe–5/0/0 {
        gigether–options {
            redundant–parent reth0; 
        } 
    } 
    xe–5/1/0 { 
        gigether–options {
            redundant–parent reth1; 
        } 
    } 
    xe–17/0/0 { 
        gigether–options {
            redundant–parent reth0; 
        } 
    } 
    xe–17/1/0 { 
        gigether–options {
            redundant–parent reth1; 
        } 
    } 
    fab0 { 
        fabric–options {
            member–interfaces {
                xe–5/3/0;
            } 
        } 
    } 
    fab1 { 
        fabric–options {
            member–interfaces {
                xe–17/3/0;
            } 
        } 
    } 
    reth0 { 
        redundant–ether–options { 
            redundancy–group 1;
        }
        unit 0 { 
            family inet {
                address 10.1.1.60/16;
            } 
        } 
    } 
    reth1 { 
        redundant–ether–options { 
            redundancy–group 1;
        }
        unit 0 { 
            family inet {
                address 10.2.1.60/16;
            }
        } 
    }
    st0 {
        unit 0 {
            multipoint;
            family inet {
                address 5.4.3.2/32;
            }
        }
    }
}
routing–options {
    static {
        route 0.0.0.0/0 {
            next–hop 10.2.1.1;
    }
        route 10.3.0.0/16 {
            next–hop 10.10.1.2;
        }
    }
}
security {
    zones {
        security–zone trust {
            host–inbound–traffic {
                system–services {
                    all;
                }
            }
            interfaces {
                reth0.0;
            }
        }
        security–zone untrust 
            host-inbound-traffic {
                system-services {
                    all;
                }
            }        
                protocols {
                    all;
                }
            interfaces {
                reth1.0;
            }
        }

        security-zone vpn {
            host-inbound-traffic {
                system-services {
                    all;
                }
            }        
                protocols {
                    all;
                }
            interfaces {
                st0.0;
            }

        }
    }
    policies {
        from–zone trust to–zone untrust {
            policy ANY {
                match {
                    source–address any;
                    destination–address any;
                    application any;
                }
                then {
                    permit;
                }
            }
        } 
        from–zone trust to–zone vpn {
            policy vpn {
                match {
                    source–address any;
                    destination–address any;
                    application any;
                }
                then {
                    permit;
                }
            }
        } 
    }
}

If you are done configuring the device, enter commit from configuration mode.

Verification

Confirm that the configuration is working properly.

Verifying Chassis Cluster Status

Purpose

Verify the chassis cluster status, failover status, and redundancy group information.

Action

From operational mode, enter the show chassis cluster status command.

{primary:node0}
show chassis cluster status
Cluster ID: 1
Node                      Priority     Status    Preempt  Manual failover

Redundancy group: 0 , Failover count: 1
    node0                   1          primary   no       no
    node1                   254        secondary no       no

Redundancy group: 1 , Failover count: 1
    node0                   1          primary   yes      no
    node1                   254        secondary yes      no

Verifying Chassis Cluster Interfaces

Purpose

Verify the chassis cluster interfaces.

Action

From operational mode, enter the show chassis cluster interfaces command.

{primary:node0}
user@host> show chassis cluster interfaces
Control link name: fxp1

Redundant-ethernet Information:
    Name         Status      Redundancy-group
    reth0        Up          1
    reth1        Up          1

Interface Monitoring:
    Interface         Weight    Status    Redundancy-group
    xe-5/0/0          255       Up        1
    xe-5/1/0          255       Up        1
    xe-17/0/0         255       Up        1
    xe-17/1/0         255       Up        1

Verifying Chassis Cluster Statistics

Purpose

Verify information about chassis cluster services and control link statistics (heartbeats sent and received), fabric link statistics (probes sent and received), and the number of RTOs sent and received for services.

Action

From operational mode, enter the show chassis cluster statistics command.

{primary:node0}
user@host> show chassis cluster statistics
Control link statistics:
    Control link 0:
        Heartbeat packets sent: 258689
        Heartbeat packets received: 258684
        Heartbeat packets errors: 0
Fabric link statistics:
    Child link 0
        Probes sent: 258681
        Probes received: 258681
Services Synchronized:
    Service name                              RTOs sent    RTOs received
    Translation context                       0            0
    Incoming NAT                              0            0
    Resource manager                          6            0
    Session create                            161          0
    Session close                             148          0
    Session change                            0            0
    Gate create                               0            0
    Session ageout refresh requests           0            0
    Session ageout refresh replies            0            0
    IPSec VPN                                 0            0
    Firewall user authentication              0            0
    MGCP ALG                                  0            0
    H323 ALG                                  0            0
    SIP ALG                                   0            0
    SCCP ALG                                  0            0
    PPTP ALG                                  0            0
    RPC ALG                                   0            0
    RTSP ALG                                  0            0
    RAS ALG                                   0            0
    MAC address learning                      0            0
    GPRS GTP                                  0            0
   

Verifying Chassis Cluster Control Plane Statistics

Purpose

Verify information about chassis cluster control plane statistics (heartbeats sent and received) and the fabric link statistics (probes sent and received).

Action

From operational mode, enter the show chassis cluster control-panel statistics command.

{primary:node0}
user@host> show chassis cluster control-plane statistics
Control link statistics:
    Control link 0:
        Heartbeat packets sent: 258689
        Heartbeat packets received: 258684
        Heartbeat packets errors: 0
Fabric link statistics:
    Child link 0
        Probes sent: 258681
        Probes received: 258681

Verifying Chassis Cluster Data Plane Statistics

Purpose

Verify information about the number of RTOs sent and received for services.

Action

From operational mode, enter the show chassis cluster data-plane statistics command.

{primary:node0}
user@host> show chassis cluster data-plane statistics
Services Synchronized:
    Service name                              RTOs sent    RTOs received
    Translation context                       0            0
    Incoming NAT                              0            0
    Resource manager                          6            0
    Session create                            161          0
    Session close                             148          0
    Session change                            0            0
    Gate create                               0            0
    Session ageout refresh requests           0            0
    Session ageout refresh replies            0            0
    IPSec VPN                                 0            0
    Firewall user authentication              0            0
    MGCP ALG                                  0            0
    H323 ALG                                  0            0
    SIP ALG                                   0            0
    SCCP ALG                                  0            0
    PPTP ALG                                  0            0
    RPC ALG                                   0            0
    RTSP ALG                                  0            0
    RAS ALG                                   0            0
    MAC address learning                      0            0
    GPRS GTP                                  0            0

Verifying Chassis Cluster Redundancy Group Status

Purpose

Verify the state and priority of both nodes in a cluster and information about whether the primary node has been preempted or whether there has been a manual failover.

Action

From operational mode, enter the chassis cluster status redundancy-group command.

{primary:node0}
user@host> show chassis cluster status redundancy-group 1
Cluster ID: 1
    Node               Priority    Status    Preempt  Manual failover

	Redundancy-Group: 1, Failover count: 1
    node0              0           primary   yes      no
    node1              254         secondary yes      no

Troubleshooting with Logs

Purpose

Use these logs to identify any chassis cluster issues. You should run these logs on both nodes.

Action

From operational mode, enter these show commands.

user@host> show log jsrpduser@host> show log chassisduser@host> show log messagesuser@host> show log dcduser@host> show traceoptions

Published: 2015-02-27