Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

header-navigation
keyboard_arrow_up
close
keyboard_arrow_left
list Table of Contents
file_download PDF
{ "lLangCode": "en", "lName": "English", "lCountryCode": "us", "transcode": "en_US" }
English
keyboard_arrow_right

Configure vSRX Virtual Firewall Using the CLI

date_range 27-May-23

To configure the vSRX Virtual Firewall instance using the CLI:

  1. Verify that the instance is powered on.
  2. Log in using the username and password credentials for your vSRX Virtual Firewall VM deployment.
  3. Start the CLI.
    content_copy zoom_out_map
    root#cli
    root@>
    
  4. Enter configuration mode.
    content_copy zoom_out_map
    configure 
    [edit]
    root@#
    
  5. Set the root authentication password by entering a cleartext password, an encrypted password, or an SSH public key string (DSA or RSA).
    content_copy zoom_out_map
    [edit]
    root@# set system root-authentication plain-text-password
    New password: password 
    Retype new password: password 
    
  6. Configure the traffic interfaces.
    content_copy zoom_out_map
    [edit]
    root@# set interfaces ge-0/0/0 unit 0 family inet address assigned_ip/netmask
    root@# set interfaces ge-0/0/1 unit 0 family inet address assigned_ip/netmask
    
    Note:

    Configuration of the management interface fxp0 for the vSRX Virtual Firewall is not necessary, because it is configured during vSRX Virtual Firewall VM deployment. Do not change the configuration for interface fxp0 and the default routing table or you will lose connectivity.

  7. Configure routing interfaces to isolate management network and traffic network.
    content_copy zoom_out_map
    [edit]
    root@# set routing-instances vsrx-vr1 instance-type virtual-router 
    root@# set routing-instances vsrx-vr1 interface ge-0/0/0.0 
    root@# set routing-instances vsrx-vr1 interface ge-0/0/1.0 
    
  8. Verify the configuration changes.
    content_copy zoom_out_map
    [edit]
    root@# commit check
    configuration check succeeds
    
  9. Commit the current configuration to make it permanent and to avoid the possibility of losing connectivity to the vSRX Virtual Firewall instance.
    content_copy zoom_out_map
    [edit]
    root@# commit confirmed
    commit confirmed will be automatically rolled back in 10 minutes unless confirmed
    commit complete
    # commit confirmed will be rolled back in 10 minutes
    
  10. Commit the configuration to activate it on the instance.
    content_copy zoom_out_map
    [edit]
    root@# commit
    commit complete
    
  11. Optionally, use the show command to display the configuration to verify that it is correct.
Note:

Certain Junos OS software features require a license to activate the feature. To enable a licensed feature, you need to purchase, install, manage, and verify a license key that corresponds to each licensed feature. To conform to software feature licensing requirements, you must purchase one license per feature per instance. The presence of the appropriate software unlocking key on your virtual instance allows you to configure and use the licensed feature.

See Managing Licenses for vSRX for details.

footer-navigation