- play_arrow vSRX Virtual Firewall Deployment for KVM
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in KVM
- Prepare Your Server for vSRX Virtual Firewall Installation
- Install vSRX Virtual Firewall with KVM
- Example: Install and Launch vSRX Virtual Firewall on Ubuntu
- Load an Initial Configuration on a vSRX Virtual Firewall with KVM
- Use Cloud-Init in an OpenStack Environment to Automate the Initialization of vSRX Virtual Firewall Instances
- play_arrow vSRX Virtual Firewall VM Management with KVM
- Configure vSRX Virtual Firewall Using the CLI
- Connect to the vSRX Virtual Firewall Management Console on KVM
- Add a Virtual Network to a vSRX Virtual Firewall VM with KVM
- Add a Virtio Virtual Interface to a vSRX Virtual Firewall VM with KVM
- SR-IOV and PCI
- Upgrade a Multi-core vSRX Virtual Firewall
- Monitor the vSRX Virtual Firewall VM in KVM
- Manage the vSRX Virtual Firewall Instance on KVM
- Recover the Root Password for vSRX Virtual Firewall in a KVM Environment
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters on KVM
-
- play_arrow vSRX Virtual Firewall Deployment for VMware
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in VMware
- play_arrow vSRX Virtual Firewall VM Management with VMware
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters in VMware
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Hyper-V
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Microsoft Hyper-V
- play_arrow vSRX Virtual Firewall VM Management with Microsoft Hyper-V
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters
-
- play_arrow vSRX Virtual Firewall Deployment for Contrail
- play_arrow Overview of vSRX Virtual Firewall Service Chains in Contrail
- play_arrow Install vSRX Virtual Firewall in Contrail
- play_arrow vSRX Virtual Firewall VM Management with Contrail
-
- play_arrow vSRX Virtual Firewall Deployment for Nutanix
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Nutanix
-
- play_arrow vSRX Virtual Firewall Deployment for AWS
- play_arrow Overview
- play_arrow Configure and Manage Virtual Firewall in AWS
- Configure an Amazon Virtual Private Cloud for vSRX Virtual Firewall
- Launch a vSRX Virtual Firewall Instance on an Amazon Virtual Private Cloud
- Enroll a vSRX Virtual Firewall on AWS with Juniper ATP Cloud
- Using Cloud-Init to Automate the Initialization of vSRX Virtual Firewall Instances in AWS
- AWS Elastic Load Balancing and Elastic Network Adapter
- Multi-Core Scaling Support on AWS with SWRSS and ENA
- Centralized Monitoring and Troubleshooting using AWS Features
- Deploying vSRX Virtual Firewall 3.0 for Securing Data using AWS KMS
- Configure vSRX Virtual Firewall Using the CLI
- Configure vSRX Virtual Firewall Using the J-Web Interface
- Upgrade Junos OS Software on a vSRX Virtual Firewall Instance
- Remove a vSRX Virtual Firewall Instance on AWS
- Geneve Flow Infrastructure on vSRX Virtual Firewall 3.0
- AWS Gateway Load Balancing with Geneve
- play_arrow Virtual Firewall in AWS Use Cases
-
- play_arrow vSRX Virtual Firewall Deployment for Google Cloud Platform
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Google Cloud
-
- play_arrow vSRX Virtual Firewall Deployment for IBM Cloud
- play_arrow Overview
- play_arrow Installing and Configuring vSRX Virtual Firewall in IBM
- Performing vSRX Virtual Firewall Basics in IBM Cloud
- vSRX Virtual Firewall Readiness Checks in IBM Cloud
- Managing VLANs with a gateway appliance
- Working with the vSRX Virtual Firewall Default Configurations
- Migrating Legacy Configurations to the Current vSRX Virtual Firewall Architecture
- Allowing SSH and Ping to a Public Subnet
- Performing vSRX Virtual Firewall Advanced Tasks in IBM Cloud
- Upgrading the vSRX Virtual Firewall in IBM Cloud
- play_arrow Managing vSRX Virtual Firewall in IBM Cloud
- play_arrow Monitoring and Troubleshooting
-
- play_arrow vSRX Virtual Firewall Deployment for OCI
- play_arrow Overview
- play_arrow Installing vSRX Virtual Firewall in OCI
- play_arrow vSRX Virtual Firewall Licensing
-
Understand vSRX Virtual Firewall with Microsoft Azure Cloud
This section presents an overview of vSRX Virtual Firewall as deployed in the Microsoft Azure cloud.
vSRX Virtual Firewall with Microsoft Azure
Starting in Junos OS Release 15.1X49-D80 and Junos OS Release 17.3R1, you can deploy the vSRX Virtual Firewall to the Microsoft Azure Cloud. Microsoft Azure is Microsoft's application platform for the public cloud. It is an open, flexible, enterprise-grade cloud computing platform for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers. It provides Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) services. You place your virtual machines (VMs) onto Azure virtual networks, where the distributed and virtual networks in Azure help ensure that your private network traffic is logically isolated from traffic on other Azure virtual networks.
The Azure WALinuxAgent performs the provisioning job for the vSRX Virtual Firewall instances. When a
new vSRX Virtual Firewall instance is deployed, the continued increasing size of the waagent log file
might cause the vSRX Virtual Firewall to stop. If the vSRX Virtual Firewall is still operating, then delete the
/var/log/waagent.log directly or run the clear log
waagent.log all
command to clear the log file.
Or you can run the set groups azure-provision system syslog file waagent.log
archive size 1m
and set groups azure-provision system syslog
file waagent.log archive files 10
commands to prevent the growing of
the waagent logs. These configurations will cause the rotation of log of waagent
with the size bigger than 1MB and set a maximum of 10 backups.
You can add a vSRX Virtual Firewall virtual security appliance to provide networking security features as an application instance within an Azure virtual network. The vSRX Virtual Firewall protects the workloads that run within the virtual network on the Microsoft Azure Cloud.
You can deploy the vSRX Virtual Firewall VM in Azure using the following deployment methods:
Azure Marketplace—Deploy the vSRX Virtual Firewall VM from the Azure Marketplace. The Azure Marketplace provides you with different methods to deploy a vSRX Virtual Firewall VM in your virtual network. You can choose a customized solution template offered by Juniper Networks to automate the vSRX Virtual Firewall VM deployment based on specific use cases (for example, a security gateway). A solution template automates the dependencies associated with specific deployment use cases, such as VM settings, virtual network settings (such as multiple subsets for the management interface (fxp0) and two revenue (data) interfaces), and so on. Or, you can select the vSRX Virtual Firewall VM image and define the deployment settings and dependencies based on your specific networking requirements. Starting in Junos OS Release 15.1X49-D91 for vSRX Virtual Firewall, you can deploy the vSRX Virtual Firewall to Microsoft Azure Cloud from the Azure Marketplace.
Azure Marketplace also enables you to discover and subscribe to software that supports regulated workloads through Azure Marketplace for Azure Government Cloud (US).
Azure CLI—Deploy the vSRX Virtual Firewall VM from the Azure CLI. You can customize the vSRX Virtual Firewall VM deployment settings and dependencies based on your network requirements in Microsoft Azure Cloud. To help automate and simplify the deployment of the vSRX Virtual Firewall VM in the Microsoft Azure virtual network, Juniper Networks provides a series of scripts, Azure Resource Manager (ARM) templates and parameter files, and configuration files in a GitHub repository.
Note:Starting in Junos OS Release 15.1X49-D80 and Junos OS Release 17.3R1, you can deploy the vSRX Virtual Firewall to Microsoft Azure Cloud from the Azure CLI.
In Microsoft Azure, you can host servers and services on the cloud as a pay-as-you-go (PAYG) or bring-your-own-license (BYOL) service.
vSRX Virtual Firewall PAYG images do not require any Juniper Networks licenses.
Starting in Junos OS Release 15.1X49-D120, vSRX Virtual Firewall on Microsoft Azure Cloud supports the vSRX Virtual Firewall Premium-Next Generation Firewall with Anti-Virus Protection bundle for PAYG, available as 1-hour or 1-year subscriptions. This bundle includes:
Standard (STD) features of core security, including core firewall, IPsec VPN, NAT, CoS, and routing services.
Advanced Layer 4 through 7 security services such as AppSecure features of AppID, AppFW, AppQoS, and AppTrack, IPS and rich routing capabilities, including the Content Security antivirus feature.
Figure 1 illustrates the deployment of a vSRX Virtual Firewall in Microsoft Azure.
In the Microsoft Azure, public subnets have access to the Internet gateway, but private subnets do not. vSRX Virtual Firewall requires two public subnets and one or more private subnets for each individual instance group. The public subnets consist of one for the management interface (fxp0) and one for a revenue (data) interface. The private subnets, connected to the other vSRX Virtual Firewall interfaces, ensure that all traffic between applications on the private subnets and the Internet must pass through the vSRX Virtual Firewall instance.

For a glossary of Microsoft Azure terms see Microsoft Azure glossary.
Starting in Junos OS Release 21.4R1, vSRX Virtual Firewall 3.0 supports Azure Accelerated Networking (AAN) option that utilizes the Mellanox SR-IOV virtual function for high-speed networking.
Microsoft Azure has Azure Accelerated Networking (AAN) option for each attached network interface. The AAN utilizes the Mellanox SR-IOV virtual function for high-speed networking. vSRX Virtual Firewall 3.0 now supports AAN. vSRX Virtual Firewall 3.0 with AAN provides better network performance at Azure cloud.
We currently support only the below listed vSRX Virtual Firewall 3.0 instances for Azure AAN.
Size | vCPU | Memory (GiB) | MAX NICs |
---|---|---|---|
Standard_D8ds_v4 | 8 | 32 | 4 |
Standard_D16ds_v4 | 16 | 64 | 8 |
Standard_D32ds_v4 | 32 | 128 | 8 |
Use the
az network nic update --name <interface-name> --resource-group <resource-group> --accelerated-networking true
command to enable AAN.- Using the Web GUI: After you login to the Microsoft Azure portal:
Click Virtual networks and select the correct virtual network. networking”
Click Connected devices, select the required NIC interface and then click Enable accelerated networking.
Click Virtual machines and select the required VM, then click Networking. Finally, click the pane of correct NIC interface and click Enable accelerated networking.
For more information see Enabling Accelerated Networking for replicated VMs.
Change History Table
Feature support is determined by the platform and release you are using. Use Feature Explorer to determine if a feature is supported on your platform.