- play_arrow vSRX Virtual Firewall Deployment for KVM
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in KVM
- Prepare Your Server for vSRX Virtual Firewall Installation
- Install vSRX Virtual Firewall with KVM
- Example: Install and Launch vSRX Virtual Firewall on Ubuntu
- Load an Initial Configuration on a vSRX Virtual Firewall with KVM
- Use Cloud-Init in an OpenStack Environment to Automate the Initialization of vSRX Virtual Firewall Instances
- play_arrow vSRX Virtual Firewall VM Management with KVM
- Configure vSRX Virtual Firewall Using the CLI
- Connect to the vSRX Virtual Firewall Management Console on KVM
- Add a Virtual Network to a vSRX Virtual Firewall VM with KVM
- Add a Virtio Virtual Interface to a vSRX Virtual Firewall VM with KVM
- SR-IOV and PCI
- Upgrade a Multi-core vSRX Virtual Firewall
- Monitor the vSRX Virtual Firewall VM in KVM
- Manage the vSRX Virtual Firewall Instance on KVM
- Recover the Root Password for vSRX Virtual Firewall in a KVM Environment
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters on KVM
-
- play_arrow vSRX Virtual Firewall Deployment for VMware
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in VMware
- play_arrow vSRX Virtual Firewall VM Management with VMware
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters in VMware
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Hyper-V
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Microsoft Hyper-V
- play_arrow vSRX Virtual Firewall VM Management with Microsoft Hyper-V
- play_arrow Configure vSRX Virtual Firewall Chassis Clusters
-
- play_arrow vSRX Virtual Firewall Deployment for Contrail
- play_arrow Overview of vSRX Virtual Firewall Service Chains in Contrail
- play_arrow Install vSRX Virtual Firewall in Contrail
- play_arrow vSRX Virtual Firewall VM Management with Contrail
-
- play_arrow vSRX Virtual Firewall Deployment for Nutanix
- play_arrow Overview
- play_arrow Install vSRX Virtual Firewall in Nutanix
-
- play_arrow vSRX Virtual Firewall Deployment for AWS
- play_arrow Overview
- play_arrow Configure and Manage Virtual Firewall in AWS
- Configure an Amazon Virtual Private Cloud for vSRX Virtual Firewall
- Launch a vSRX Virtual Firewall Instance on an Amazon Virtual Private Cloud
- Enroll a vSRX Virtual Firewall on AWS with Juniper ATP Cloud
- Using Cloud-Init to Automate the Initialization of vSRX Virtual Firewall Instances in AWS
- AWS Elastic Load Balancing and Elastic Network Adapter
- Multi-Core Scaling Support on AWS with SWRSS and ENA
- Centralized Monitoring and Troubleshooting using AWS Features
- Deploying vSRX Virtual Firewall 3.0 for Securing Data using AWS KMS
- Configure vSRX Virtual Firewall Using the CLI
- Configure vSRX Virtual Firewall Using the J-Web Interface
- Upgrade Junos OS Software on a vSRX Virtual Firewall Instance
- Remove a vSRX Virtual Firewall Instance on AWS
- Geneve Flow Infrastructure on vSRX Virtual Firewall 3.0
- AWS Gateway Load Balancing with Geneve
- play_arrow Virtual Firewall in AWS Use Cases
-
- play_arrow vSRX Virtual Firewall Deployment for Microsoft Azure
- play_arrow Overview
- play_arrow Deploy vSRX Virtual Firewall from the Azure Portal
- play_arrow Deploy vSRX Virtual Firewall from the Azure CLI
- play_arrow Configure and Manage vSRX Virtual Firewall for Microsoft Azure
- play_arrow Configure Azure Features on vSRX Virtual Firewall and Use Cases
- Deployment of Microsoft Azure Hardware Security Module on vSRX Virtual Firewall 3.0
- Example: Configure an IPsec VPN Between Two vSRX Virtual Firewall Instances
- Example: Configure an IPsec VPN Between a vSRX Virtual Firewall and Virtual Network Gateway in Microsoft Azure
- Example: Configure Juniper ATP Cloud for vSRX Virtual Firewall
-
- play_arrow vSRX Virtual Firewall Deployment for IBM Cloud
- play_arrow Overview
- play_arrow Installing and Configuring vSRX Virtual Firewall in IBM
- Performing vSRX Virtual Firewall Basics in IBM Cloud
- vSRX Virtual Firewall Readiness Checks in IBM Cloud
- Managing VLANs with a gateway appliance
- Working with the vSRX Virtual Firewall Default Configurations
- Migrating Legacy Configurations to the Current vSRX Virtual Firewall Architecture
- Allowing SSH and Ping to a Public Subnet
- Performing vSRX Virtual Firewall Advanced Tasks in IBM Cloud
- Upgrading the vSRX Virtual Firewall in IBM Cloud
- play_arrow Managing vSRX Virtual Firewall in IBM Cloud
- play_arrow Monitoring and Troubleshooting
-
- play_arrow vSRX Virtual Firewall Deployment for OCI
- play_arrow Overview
- play_arrow Installing vSRX Virtual Firewall in OCI
- play_arrow vSRX Virtual Firewall Licensing
-
Requirements for vSRX Virtual Firewall on Google Cloud Platform
Google Compute Engine Instance Types
To create a vSRX Virtual Firewall instance, you need to choose a machine type. The machine type specifies a particular collection of virtualized hardware resources available to a VM instance, including the memory size, vCPU count, and maximum disk capacity.
Google Compute Engine allows you to use predefined machine or instances types or customized machine or instance types based on your needs. Table 1 below shows the predefined machine types available in Google Compute Engine.
Machine Name | Description | vCPUs | Memory (GB) | vSRX Virtual Firewall 3.0 Instance | Maximum number of Persistent Disks | Maximum total Persistent Disk Size (TB) | RSS Type |
---|---|---|---|---|---|---|---|
n1-standard-4 | Standard machine type with 4 vCPUs and 15 GB of memory | 4 | 15 | vSRX Virtual Firewall-4CPU-15G memory | 16 | 64 | SWRSS |
n1-standard-8 | Standard machine type with 8 vCPUs and 30 GB of memory | 8 | 30 | vSRX Virtual Firewall-8CPU-30G memory | 16 | 64 | SWRSS |
n1-standard-16 | Standard machine type with 16 vCPUs and 60 GB of memory | 16 | 60 | vSRX Virtual Firewall-16CPU-60G memory | 16 | 64 | SWRSS |
A single Google Compute Engine instance supports up to eight network interfaces. If you want to configure eight interfaces, choose n1-standard-8 or a larger machine type. After choosing the machine type, define the networking attributes and SSH Keys for the VM. For more information on network interfaces, see Creating instances with multiple network interfaces.
vSRX Virtual Firewall Support for Google Cloud
Starting in Junos OS Release 19.2R1, vSRX Virtual Firewall with 1 Junos Control Plane (JCP) vCPU, 1 data plane vCPU, and 4 GB of vRAM is supported.
vSRX Virtual Firewall Specifications for GCP
This topic provides details about hardware and software requirements for deploying vSRX Virtual Firewall with Google.
- Minimum System Requirements for Google Cloud Platform
- Interface Mapping for vSRX Virtual Firewall on Google Cloud
- vSRX Virtual Firewall Default Settings on GCP
Minimum System Requirements for Google Cloud Platform
Table 2 lists the minimum system requirements and the Junos OS release in which a particular software specification was introduced for vSRX Virtual Firewall instances to be deployed on GCP.
Component | Specification | Release Introduced |
---|---|---|
Memory | 4 GB | Junos OS Release 19.2R1 |
Disk space | 19-GB IDE drive | Junos OS Release 19.2R1 |
vCPUs | 1 Junos Control Plane (JCP) vCPU and 1 data plane vCPU | Junos OS Release 19.2R1 |
vNICs | 2-8 vNICs
| Junos OS Release 19.2R1 |
Software feature license | For more information, see Flex Software Subscription Model and Juniper Flex Program Support for Juniper Products. | NA |
Software packaging | Google Compute Engine has specific requirements for the bootable image that is imported to Google cloud space. For more information, see https://cloud.google.com/compute/docs/ images/import-existing-image#create_ image_file. For initial deployment, the .img file is used and for software upgrade, the .tgz image is used. | NA |
Interface Mapping for vSRX Virtual Firewall on Google Cloud
Each network adapter defined for a vSRX Virtual Firewall is mapped to a specific interface, depending on whether the vSRX Virtual Firewall instance is a standalone VM or one of a cluster pair for high availability. The interface names and mappings in vSRX Virtual Firewall are shown in Table 3.
Note the following:
In standalone mode:
fxp0 is the out-of-band management interface.
ge-0/0/0 is the first traffic (revenue) interface.
Table 3 shows the interface names and mappings for a standalone vSRX Virtual Firewall on Google cloud.
Network Adapter | Interface Name in Junos OS for vSRX Virtual Firewall |
---|---|
1 | fxp0 |
2 | ge-0/0/0 |
3 | ge-0/0/1 |
4 | ge-0/0/2 |
5 | ge-0/0/3 |
6 | ge-0/0/4 |
7 | ge-0/0/5 |
8 | ge-0/0/6 |
vSRX Virtual Firewall Default Settings on GCP
vSRX Virtual Firewall requires the following basic configuration settings:
Interfaces must be assigned IP addresses.
Interfaces must be bound to zones.
Policies must be configured between zones to permit or deny traffic.
Table 4 lists the factory-default settings for security policies on the vSRX Virtual Firewall instance.
Source Zone | Destination Zone | Policy Action |
---|---|---|
trust | untrust | permit |
trust | trust | permit |
untrust | trust | deny |