ON THIS PAGE
Configure Traffic Forwarding on cSRX
You can change the traffic forwarding mode of the cSRX Container Firewall container as a means to facilitate security service provisioning when running the cSRX. For example, if you deploy a cSRX container inline of protected segments, the cSRX should be transparent to avoid changing the virtual network topology. In other deployments, the cSRX container should be able to specify the next-hop address of egress traffic. To address variations in cSRX network deployment, you can configure the traffic forwarding mode of the cSRX to operate in routing mode (static routing only) or secure-wire mode.
The cSRX uses routing
as the default environment variable for traffic
forwarding mode.
This section includes the following topics:
Configure Routing Mode
When running the cSRX container in routing mode, the cSRX uses a static route to forward traffic for routes destined to interfaces ge-0/0/0 and ge-0/0/1. You must create a static route and specify the next-hop address.
When you start the cSRX container, you need to specify port number in the environment using the variable CSRX_PORT_NUM to define the number of interfaces you need to add to container in routing mode.
For example, to launch cSRX instance in routing mode with 17 interfaces:
root@csrx-ubuntu3:~/csrx# docker run -d --privileged --net=none -e
CSRX_PORT_NUM=17 CSRX_SIZE=large -e
CSRX_HUGEPAGES=no -e CSRX_PACKET_DRIVER=interrupt -e CSRX_FORWARD_MODE=routing
--name=<srx-container-name> <csrx-image-name>
The interfaces specified in the CSRX_PORT_NUM environment variable (default value is 3) must be added to a network after instantiation of the cSRX. Unless all the interfaces are added to the bridge or the macvlan networks, the PFE does not launch on the cSRX, and the ge-x/y/z interfaces remains down.
Include the -e CSRX_FORWARD_MODE=routing
environment variable in the
docker run
command to instruct the cSRX to run in static route forwarding
mode.
To configure the cSRX container to run in static routing mode:
Configure Secure-Wire Mode
When operating in secure-wire mode, all traffic that arrives on a specific interface, ge-0/0/0 or ge-0/0/1, is forwarded unchanged through the interface. This mapping of interfaces, called secure wire, allows the cSRX to be deployed in the path of network traffic without requiring a change to routing tables or a reconfiguration of neighboring devices. A cross-connection is set up between interface pairs ge-0/0/0 and ge-0/0/1 to steer traffic from one port to the other port based on the Interworking and Interoperability Function (IIF) as the input key.
Include the -e CSRX_FORWARD_MODE=wire
environment variable in the
docker run
command to instruct the cSRX to run in secure-wire forwarding
mode.
When you launch the cSRX container in secure-wire mode, the cSRX instance automatically creates a default secure-wire named csrx_sw in the srxpfe process, and the ge-0/0/0 and ge-0/0/1 interface pair are added into the secure-wire.
Launch the cSRX instance in secure-wire mode using the following command:
root@csrx-ubuntu3:~/csrx# docker run -d --privileged --network=mgt_bridge
-e CSRX_FORWARD_MODE="wire" --name=<csrx-container-name>
<csrx-image-name>