You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/content/docs/magic-wan/configuration/manually/third-party/juniper.mdx
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,6 @@
1
1
---
2
2
pcx_content_type: integration-guide
3
3
title: Juniper Networks SRX Series Firewalls
4
-
5
4
---
6
5
7
6
This tutorial provides information and examples of how to configure Juniper Networks SRX Series Firewalls with Magic WAN.
@@ -10,7 +9,7 @@ This tutorial provides information and examples of how to configure Juniper Netw
10
9
11
10
Confirm that you have the Cloudflare anycast IPs for your account. You should have two IPs allocated.
12
11
13
-
The goal is to configure two IPsec tunnels for each endpoint. This provides us with tunnel redundancy and the ability to load balance ingress and egress traffic (via ECMP).
12
+
The goal is to configure two IPsec tunnels for each endpoint. This provides you with tunnel redundancy and the ability to load balance ingress and egress traffic (via ECMP).
14
13
15
14
Additionally, you will need to select two subnets (either `/31` or `/30`) for the Virtual Tunnel Interfaces (`st0.x`) to control what traffic is routed through the tunnels.
16
15
@@ -21,21 +20,21 @@ This section of the document will cover the configuration of:
21
20
- Magic IPsec tunnels
22
21
- Magic static routes
23
22
24
-
### Magic IPsec Tunnels
23
+
### Magic IPsec tunnels
25
24
26
25
1. Start by [creating the IPsec tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/#add-tunnels) in the Cloudflare dashboard with the following values:
27
26
-**Tunnel name**: Up to 15 characters (no spaces).
28
27
-**Description** (Optional).
29
-
-**Interface address**: This is the Virtual Tunnel Interface (VTI = `st0.x`) RFC1918 address — the IP address specified in this dialog box is the address on the Cloudflare side of the tunnel.
28
+
-**Interface address**: This is the Virtual Tunnel Interface (VTI = `st0.x`) RFC 1918 address — the IP address specified in this dialog box is the address on the Cloudflare side of the tunnel.
30
29
-**Customer endpoint**: This is the public IP address the tunnel will be established with on the Juniper SRX.
31
30
-**Cloudflare endpoint**: One of the two Cloudflare anycast IP addresses.
2. Select **Add IPsec Tunnel** and fill in the values for the second tunnel to the same Juniper SRX:
34
-
- The IP addresses used for the Interface address must be a unique RFC1918 address (`/31` or `/30`).
33
+
- The IP addresses used for the Interface address must be a unique RFC 1918 address (`/31` or `/30`).
35
34
- The **Customer endpoint** is the same IP specified for the first tunnel.
36
35
- The **Cloudflare Endpoint** for the second tunnel will be the second Cloudflare anycast IP provisioned for your account.
37
-
3. Select **Add tunnels**. We also recommend selecting **Test Tunnels** to ensure that the settings do not conflict with any other tunnels defined in your account and that the correct anycast IP addresses are specified.
38
-
4. Because we chose to add a pre-shared key at a later stage, you will see a warning indicator next to the tunnel names after creating them. This is expected behavior and indicates there is no pre-shared key associated with the tunnel.
36
+
3. Select **Add tunnels**. We also recommend selecting **Test Tunnels** to ensure that the settings do not conflict with any other tunnels defined in your account and that you specified the correct anycast IP addresses.
37
+
4. Because we chose to add a pre-shared key at a later stage, you will see a warning indicator next to the tunnel names after creating them. This is expected behavior and indicates there is no pre-shared key associated with the tunnel.
39
38
5. Select **Edit** next to one of the tunnels to generate a pre-shared key.
40
39
6. Select **Generate a new pre-shared key** > **Update and generate a pre-shared key**. Make note of the pre-shared key and store it somewhere safe.
3. Select **Test routes** to ensure the settings will be accepted, and then select **Add Routes**.
68
67
4. Confirm the routes were added correctly in **Magic WAN** > **Configuration** > **Static Routes**.
69
68
70
-
## Juniper SRX Configuration
69
+
## Juniper SRX configuration
71
70
72
71
The configuration settings in this document are based on JUNOS 21.4R3-S4.9.
73
72
@@ -83,7 +82,7 @@ The following elements will be configured on the Juniper SRX firewall(s):
83
82
- Static routes
84
83
- Security policies
85
84
86
-
### Tunnel Interfaces
85
+
### Tunnel interfaces
87
86
88
87
1. Add two tunnel interfaces:
89
88
@@ -112,7 +111,7 @@ unit 1 {
112
111
113
112
### Security Zone (Cloudflare) - tunnel interfaces
114
113
115
-
Define a security zone and add both tunnel interfaces to it. At a minimum, the interfaces should allow ping, but this zone only contains point-to-point connections between the firewall and the customer network namespace. Setting it to `all` for system-services and protocols should be fine.
114
+
Define a security zone and add both tunnel interfaces to it. At a minimum, the interfaces should allow `ping`, but this zone only contains point-to-point connections between the firewall and the customer network namespace. Setting it to `all` for system-services and protocols should be fine.
116
115
117
116
```txt
118
117
set security zones security-zone cloudflare interfaces st0.0 host-inbound-traffic system-services all
@@ -149,7 +148,7 @@ interfaces {
149
148
150
149
### Security zone (untrust) - `host-inbound-traffic`
151
150
152
-
Add `ping` and `ike` to the security zone containing the external interface used to establish the IPsec tunnels to Cloudflare. If your security policy blocks ping by default, you will need to create a firewall-filter to allow ICMP from the [Cloudflare IPv4 address space](https://www.cloudflare.com/ips-v4) — not covered in this tutorial.
151
+
Add `ping` and `ike` to the security zone containing the external interface used to establish the IPsec tunnels to Cloudflare. If your security policy blocks `ping` by default, you will need to create a firewall-filter to allow ICMP from the [Cloudflare IPv4 address space](https://www.cloudflare.com/ips-v4) — not covered in this tutorial.
153
152
154
153
```txt
155
154
set security zones security-zone untrust interfaces ge-0/0/2.0 host-inbound-traffic system-services ping
@@ -440,11 +439,11 @@ set security ike traceoptions flag all
440
439
The log file can be viewed by doing the following:
441
440
442
441
1. From an operational mode, run **start shell**.
443
-
2.Then use the `tail` command to view the contents of the log file in real-time:
442
+
2.Use the `tail` command to view the contents of the log file in real-time:
444
443
```txt
445
444
tail -f /var/log/ike-debug.log
446
445
```
447
-
3. Press <kbd>CTRL+C</kbd> when finished.
446
+
3. Press <kbd>CTRL+C</kbd> when finished.
448
447
4. Type `exit` to return to the operational mode prompt.
449
448
450
449
Either deactivate `traceoptions` or delete `traceoptions` once debugging is complete.
0 commit comments