Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
IPsec VPN User Guide
Table of Contents Expand all
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Chassis Cluster HA Control Link Encryption

date_range 30-Nov-23

Connect the dedicated control ports on node 0 and node 1. Connect the user defined fabricated ports on node 0 and node 1. To configure two chassis in cluster mode, follow the below steps:

Enable chassis cluster mode on both the nodes, see SRX Series Chassis Cluster Configuration Overview.

  1. After enabling the chassis cluster, in the device 1, configure HA link encryption as shown in sample configuration below, commit and reboot. Device 1 needs to be configured with both node0 and node1 HA link encryption configuration before commit and reboot.
    content_copy zoom_out_map
    [edit]
    user@host# set groups node0 security ike proposal HA authentication-method pre-shared-keys
    user@host# set groups node0 security ike proposal HA dh-group group20
    user@host# set groups node0 security ike proposal HA authentication-algorithm sha-256
    user@host# set groups node0 security ike proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node0 security ike policy HA proposals HA
    user@host# prompt groups node0 security ike policy HA pre-shared-key ascii-text
    This Should Be A Strong And Secure Key
    Retype This Should Be A Strong And Secure Key
    user@host# set groups node0 security ike gateway HA ike-policy HA
    user@host# set groups node0 security ike gateway HA version v2-only
    user@host# set groups node0 security ipsec proposal HA protocol esp
    user@host# set groups node0 security ipsec proposal HA authentication-algorithm hmac-sha1-96
    user@host# set groups node0 security ipsec proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node0 security ipsec policy HA perfect-forward-secrecy keys group20
    user@host# set groups node0 security ipsec policy HA proposal HA
    user@host# set groups node0 security ipsec vpn HA ha-link-encryption
    user@host# set groups node0 security ipsec vpn HA ike gateway HA
    user@host# set groups node0 security ipsec vpn HA ike ipsec-policy HA
    user@host# set groups node1 security ike proposal HA authentication-method pre-shared-keys
    user@host# set groups node1 security ike proposal HA dh-group group20
    user@host# set groups node1 security ike proposal HA authentication-algorithm sha-256
    user@host# set groups node1 security ike proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node1 security ike policy HA proposals HA
    user@host# prompt groups node1 security ike policy HA pre-shared-key ascii-text
    New ascii-text(secret): juniper
    Retype This Should Be A Strong And Secure Key
    user@host# set groups node1 security ike gateway HA ike-policy HA
    user@host# set groups node1 security ike gateway HA version v2-only
    user@host# set groups node1 security ipsec proposal HA protocol esp
    user@host# set groups node1 security ipsec proposal HA authentication-algorithm hmac-sha1-96
    user@host# set groups node1 security ipsec proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node1 security ipsec policy HA perfect-forward-secrecy keys group20
    user@host# set groups node1 security ipsec policy HA proposals HA
    user@host# set groups node1 security ipsec vpn HA ha-link-encryption
    user@host# set groups node1 security ipsec vpn HA ike gateway HA
    user@host# set groups node1 security ipsec vpn HA ike ipsec-policy HA
    user@host# commit
    user@host> request system reboot
  2. To proceed further with device 2 configuration and commit, you need to ensure device 1 and device 2 are not reachable to each other. One way to achieve this is to power off device 1 at this point.
  3. After the device 2 is up, configure HA link encryption as shown in sample configuration below on device 2. Device 2 needs to be configured with both node0 and node1 HA link encryption configuration. Commit on node1 (device 2), and finally reboot node1 (device 2).
    content_copy zoom_out_map
    [edit]
    user@host# set groups node0 security ike proposal HA authentication-method pre-shared-keys
    user@host# set groups node0 security ike proposal HA dh-group group20
    user@host# set groups node0 security ike proposal HA authentication-algorithm sha-256
    user@host# set groups node0 security ike proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node0 security ike policy HA proposals HA
    user@host# prompt groups node0 security ike policy HA pre-shared-key ascii-text
    This Should Be A Strong And Secure Key
    Retype This Should Be A Strong And Secure Key
    user@host# set groups node0 security ike gateway HA ike-policy HA
    user@host# set groups node0 security ike gateway HA version v2-only
    user@host# set groups node0 security ipsec proposal HA protocol esp
    user@host# set groups node0 security ipsec proposal HA authentication-algorithm hmac-sha1-96
    user@host# set groups node0 security ipsec proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node0 security ipsec policy HA perfect-forward-secrecy keys group20
    user@host# set groups node0 security ipsec policy HA proposal HA
    user@host# set groups node0 security ipsec vpn HA ha-link-encryption
    user@host# set groups node0 security ipsec vpn HA ike gateway HA
    user@host# set groups node0 security ipsec vpn HA ike ipsec-policy HA
    user@host# set groups node1 security ike proposal HA authentication-method pre-shared-keys
    user@host# set groups node1 security ike proposal HA dh-group group20
    user@host# set groups node1 security ike proposal HA authentication-algorithm sha-256
    user@host# set groups node1 security ike proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node1 security ike policy HA proposals HA
    user@host# prompt groups node1 security ike policy HA pre-shared-key ascii-text
    New ascii-text(secret): juniper
    Retype This Should Be A Strong And Secure Key
    user@host# set groups node1 security ike gateway HA ike-policy HA
    user@host# set groups node1 security ike gateway HA version v2-only
    user@host# set groups node1 security ipsec proposal HA protocol esp
    user@host# set groups node1 security ipsec proposal HA authentication-algorithm hmac-sha1-96
    user@host# set groups node1 security ipsec proposal HA encryption-algorithm aes-256-cbc
    user@host# set groups node1 security ipsec policy HA perfect-forward-secrecy keys group20
    user@host# set groups node1 security ipsec policy HA proposals HA
    user@host# set groups node1 security ipsec vpn HA ha-link-encryption
    user@host# set groups node1 security ipsec vpn HA ike gateway HA
    user@host# set groups node1 security ipsec vpn HA ike ipsec-policy HA
    user@host# commit
    user@host> request system reboot
    Note: To enable HA link encryption on node1 in step 3, the other node needs to be in lost state for the commit to go through. So this timing needs to be taken care by you, else step 3 needs to be redone until enabling HA link encryption on node1 commit goes through.
footer-navigation