- play_arrow vSRX Virtual Firewall Deployment for KVM
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in KVM
- Prepare Your Server for vSRX Virtual Firewall Installation
- Install vSRX Virtual Firewall with KVM
- Example: Install and Launch vSRX Virtual Firewall on Ubuntu
- Load an Initial Configuration on a vSRX Virtual Firewall with KVM
- Use Cloud-Init in an OpenStack Environment to Automate the Initialization of vSRX Virtual Firewall Instances
- play_arrow vSRX Virtual Firewall VM Management with KVM
- Configure vSRX Virtual Firewall Using the CLI
- Connect to the vSRX Virtual Firewall Management Console on KVM
- Add a Virtual Network to a vSRX Virtual Firewall VM with KVM
- Add a Virtio Virtual Interface to a vSRX Virtual Firewall VM with KVM
- SR-IOV and PCI
- Upgrade a Multi-core vSRX Virtual Firewall
- Monitor the vSRX Virtual Firewall VM in KVM
- Manage the vSRX Virtual Firewall Instance on KVM
- Recover the Root Password for vSRX Virtual Firewall in a KVM Environment
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters on KVM
-
- play_arrow vSRX Virtual Firewall Deployment for VMware
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in VMware
- play_arrow vSRX Virtual Firewall VM Management with VMware
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters in VMware
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Hyper-V
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Microsoft Hyper-V
- play_arrow vSRX Virtual Firewall VM Management with Microsoft Hyper-V
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters
-
- play_arrow vSRX Virtual Firewall Deployment for Contrail
- play_arrow Overview of vSRX Virtual Firewall Service Chains in Contrail
- play_arrow Install vSRX Virtual Firewall in Contrail
- play_arrow vSRX Virtual Firewall VM Management with Contrail
-
- play_arrow vSRX Virtual Firewall Deployment for Nutanix
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Nutanix
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Azure
- play_arrow Overview
- play_arrow Deploy vSRX Virtual Firewall from the Azure Portal
- play_arrow Deploy vSRX Virtual Firewall from the Azure CLI
- play_arrow Configure and Manage vSRX Virtual Firewall for Microsoft Azure
- play_arrow Configure Azure Features on vSRX Virtual Firewall and Use Cases
- Deployment of Microsoft Azure Hardware Security Module on vSRX Virtual Firewall 3.0
- Example: Configure an IPsec VPN Between Two vSRX Virtual Firewall Instances
- Example: Configure an IPsec VPN Between a vSRX Virtual Firewall and Virtual Network Gateway in Microsoft Azure
- Example: Configure Juniper ATP Cloud for vSRX Virtual Firewall
-
- play_arrow vSRX Virtual Firewall Deployment for Google Cloud Platform
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Google Cloud
-
- play_arrow vSRX Virtual Firewall Deployment for IBM Cloud
- play_arrow Overview
- play_arrow Installing and Configuring vSRX Virtual Firewall in IBM
- Performing vSRX Virtual Firewall Basics in IBM Cloud
- vSRX Virtual Firewall Readiness Checks in IBM Cloud
- Managing VLANs with a gateway appliance
- Working with the vSRX Virtual Firewall Default Configurations
- Migrating Legacy Configurations to the Current vSRX Virtual Firewall Architecture
- Allowing SSH and Ping to a Public Subnet
- Performing vSRX Virtual Firewall Advanced Tasks in IBM Cloud
- Upgrading the vSRX Virtual Firewall in IBM Cloud
- play_arrow Managing vSRX Virtual Firewall in IBM Cloud
- play_arrow Monitoring and Troubleshooting
-
- play_arrow vSRX Virtual Firewall Deployment for OCI
- play_arrow Overview
- play_arrow Installing vSRX Virtual Firewall in OCI
- play_arrow vSRX Virtual Firewall Licensing
-
Requirements for vSRX Virtual Firewall on AWS
This section presents an overview of requirements for deploying a vSRX Virtual Firewall instance on Amazon Web Services (AWS).
Minimum System Requirements for AWS
Table 1 lists the minimum system requirements for vSRX Virtual Firewall instances to be deployed on AWS.
inComponent | Specification and Details |
---|---|
Hypervisor support | XEN-HVM |
Memory | 4 GB |
Disk space | 16 GB |
vCPUs | 2 |
vNICs | 3 |
vNIC type | SR-IOV |
AMD Processors | Starting in Junos OS Release 22.3R2, vSRX Virtual Firewall 3.0 on Amazon Web Services (AWS) support the Advanced Micro Devices (AMD) processor for better performance. |
Interface Mapping for vSRX Virtual Firewall on AWS
vSRX Virtual Firewall on AWS supports up to a maximum of eight network interfaces, but the actual maximum number of interfaces that can be attached to a vSRX Virtual Firewall instance is dictated by the AWS instance type in which it is launched. For AWS instances that allow more than eight interfaces, vSRX Virtual Firewall will support up to a maximum of eight interfaces only.
The following are the supported C5 instance types :
c5.large
c5.xlarge
c5.2xlarge
c5.4xlarge
c5.9xlarge
c5n.2xlarge
c5n.4xlarge
c5n.9xlarge
The following are the supported AMD-based AWS instances:
C5a.16xlarge
C5a.8xlarge
C5a.4xlarge
C5a.2xlarge
C5a.xlarge
For more information on instance details such as vCPUs, memory and so on, see Pricing Information
For more information on maximum network interfaces by instance type, see https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-eni.html .
Table 2 shows a mapping between vSRX Virtual Firewall interface names and their corresponding AWS interface names for up to eight network interfaces. The first network interface is used for the out-of-band management (fxp0) for vSRX Virtual Firewall.
InterfaceNumber | vSRX Virtual Firewall Interface | AWS Interface |
---|---|---|
1 | fxp0 | eth0 |
2 | ge-0/0/0 | eth1 |
3 | ge-0/0/1 | eth2 |
4 | ge-0/0/2 | eth3 |
5 | ge-0/0/3 | eth4 |
6 | ge-0/0/4 | eth5 |
7 | ge-0/0/5 | eth6 |
8 | ge-0/0/6 | eth7 |
We recommend putting revenue interfaces in routing instances as a best practice to avoid asymmetric routing. Since fxp0 is part of the default (inet.0) routing table, there might be two default routes needed in the same routing instance: one for the fxp0 interface for external management access, and the other for the revenue interfaces for traffic access, resulting in asymmetric routing. Putting the revenue interfaces in a separate routing instance avoids this situation of two default routes in a single routing instance.
Ensure that interfaces belonging to the same security zone are in the same routing instance. See KB Article - Interface must be in the same routing instance as the other interfaces in the zone.
vSRX Virtual Firewall Default Settings on AWS
vSRX Virtual Firewall requires the following basic configuration settings:
Interfaces must be assigned IP addresses.
Interfaces must be bound to zones.
Policies must be configured between zones to permit or deny traffic.
The ENA driver-related component must be ready for vSRX Virtual Firewall.
Table 3 lists the factory-default settings for security policies on the vSRX Virtual Firewall.
Source Zone | Destination Zone | Policy Action |
---|---|---|
trust | untrust | permit |
trust | trust | permit |
Do not use the load factory-default
command on a vSRX Virtual Firewall AWS
instance. The factory-default configuration removes the AWS preconfiguration. If
you must revert to factory default, ensure that you manually reconfigure AWS
preconfiguration statements before you commit the configuration; otherwise, you
will lose access to the vSRX Virtual Firewall instance. See Configure vSRX Using the
CLI for AWS preconfiguration details.
Best Practices for Improving vSRX Virtual Firewall Performance
Review the following deployment practices to improve vSRX Virtual Firewall performance:
Disable the source/destination check for all vSRX Virtual Firewall interfaces.
Limit public key access permissions to 400 for key pairs.
Ensure that there are no contradictions between AWS security groups and your vSRX Virtual Firewall configuration.
Use the c5n instance types on AWS for best throughput on the vSRX Virtual Firewall.
Note:For c5-large instances, AWS uses second generation Intel Xeon Scalable Processors (Cascade Lake) or first generation Intel Xeon Platinum 8000 series (Skylake-SP) processor and for c4-xtra large instances, AWS uses high frequency Intel Xeon E5-2666 v3.
Ensure traffic flows through multiple interfaces of the vSRX Virtual Firewall for optimal usage of the vCPUs.
Use vSRX Virtual Firewall NAT to protect your Amazon EC2 instances from direct Internet traffic.