- play_arrow CSDS Deployment Overview
- play_arrow CSDS Deployment Scenarios and Topologies
- Deployment Scenarios and Topologies
- CSDS Dual MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Multinode HA)
- CSDS Single MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Standalone)
- CSDS Single MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewalls (MNHA)
- CSDS Dual MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewalls (MNHA)
- play_arrow ECMP-Based Consistent Hashing in CSDS
- How CSDS Works with ECMP Based Consistent Hashing
- IPsec VPN Traffic Flow in Single MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Standalone)
- NAT Traffic Flow in Single MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Standalone)
- Stateful Firewall Traffic Flow in Single MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Standalone)
- Stateful Firewall and NAT Traffic Flow in Dual MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Multinode HA)
- play_arrow CSDS Traffic Orchestrator
- How Does CSDS Traffic Orchestrator Work
- IPsec VPN Traffic Flow in Single MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewalls
- NAT Traffic Flow in Single MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewalls
- Stateful Firewall Traffic Flow in Single MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewalls
- play_arrow Unified Management with JNU in CSDS
- play_arrow vSRX Orchestration with JDM in CSDS
- play_arrow Configure CSDS
- Example: Single MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Standalone) for IPsec VPN
- Example: Single MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Standalone) for NAT and Stateful Firewall
- Example: Dual MX Series (ECMP Based Consistent Hashing) and Scaled-Out SRX Series Firewalls (Multinode HA) for NAT and Stateful Firewall
- Example: Single MX Series (CSDS Traffic Orchestrator) and Scaled-Out SRX Series Firewall (MNHA) for Stateful Firewall
- Configure Junos Node Unifier for CSDS
- Install and Configure Junos Device Manager for CSDS
CSDS Overview
Read this topic to learn about the Juniper’s Connected Security Distributed Services (CSDS) Architecture and benefits.
Juniper’s Connected Security Distributed Services Architecture delivers a scalable, distributed security architecture design that fully decouples the forwarding and security services layers. This approach enables existing Juniper MX Series routers to act as intelligent forwarding engine and load balancer with path redundancy capability.

Benefits
CSDS Architecture delivers the following unique capabilities:
- Scalability: Ability to scale horizontally and elastically as needed, with no chassis limitations. All distributed firewalls function together as a fabric, enabling automated resiliency with multi-path redundancy. If one fails, others automatically load balance and pick up the slack.
- Simplicity: Manage all distributed firewall engines as a single logical element, regardless of the count. You can deploy in the right form at each site almost similar to adding virtual service cards to a chassis.
- Flexibility: Forwarding performance and services can scale independently by decoupling forwarding and services layers. This helps to deliver the right size security solution for every deployment and the ability to mix and match different form factors. Additionally, you can continue to use the existing Juniper firewalls in the new architecture, ensuring that the processes and policies all remain intact.