Skip to content

Commit 64d15af

Browse files
Apply suggestions from code review
Co-authored-by: Pedro Sousa <[email protected]>
1 parent f8123b2 commit 64d15af

File tree

1 file changed

+12
-13
lines changed
  • src/content/docs/magic-wan/configuration/manually/third-party

1 file changed

+12
-13
lines changed

src/content/docs/magic-wan/configuration/manually/third-party/juniper.mdx

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
pcx_content_type: integration-guide
33
title: Juniper Networks SRX Series Firewalls
4-
54
---
65

76
This tutorial provides information and examples of how to configure Juniper Networks SRX Series Firewalls with Magic WAN.
@@ -10,7 +9,7 @@ This tutorial provides information and examples of how to configure Juniper Netw
109

1110
Confirm that you have the Cloudflare anycast IPs for your account. You should have two IPs allocated.
1211

13-
The goal is to configure two IPsec tunnels for each endpoint. This provides us with tunnel redundancy and the ability to load balance ingress and egress traffic (via ECMP).
12+
The goal is to configure two IPsec tunnels for each endpoint. This provides you with tunnel redundancy and the ability to load balance ingress and egress traffic (via ECMP).
1413

1514
Additionally, you will need to select two subnets (either `/31` or `/30`) for the Virtual Tunnel Interfaces (`st0.x`) to control what traffic is routed through the tunnels.
1615

@@ -21,21 +20,21 @@ This section of the document will cover the configuration of:
2120
- Magic IPsec tunnels
2221
- Magic static routes
2322

24-
### Magic IPsec Tunnels
23+
### Magic IPsec tunnels
2524

2625
1. Start by [creating the IPsec tunnels](/magic-wan/configuration/manually/how-to/configure-tunnels/#add-tunnels) in the Cloudflare dashboard with the following values:
2726
- **Tunnel name**: Up to 15 characters (no spaces).
2827
- **Description** (Optional).
29-
- **Interface address**: This is the Virtual Tunnel Interface (VTI = `st0.x`) RFC1918 address — the IP address specified in this dialog box is the address on the Cloudflare side of the tunnel.
28+
- **Interface address**: This is the Virtual Tunnel Interface (VTI = `st0.x`) RFC 1918 address — the IP address specified in this dialog box is the address on the Cloudflare side of the tunnel.
3029
- **Customer endpoint**: This is the public IP address the tunnel will be established with on the Juniper SRX.
3130
- **Cloudflare endpoint**: One of the two Cloudflare anycast IP addresses.
3231
- **Pre-shared key**: Choose **Add pre-shared key later**.
3332
2. Select **Add IPsec Tunnel** and fill in the values for the second tunnel to the same Juniper SRX:
34-
- The IP addresses used for the Interface address must be a unique RFC1918 address (`/31` or `/30`).
33+
- The IP addresses used for the Interface address must be a unique RFC 1918 address (`/31` or `/30`).
3534
- The **Customer endpoint** is the same IP specified for the first tunnel.
3635
- The **Cloudflare Endpoint** for the second tunnel will be the second Cloudflare anycast IP provisioned for your account.
37-
3. Select **Add tunnels**. We also recommend selecting **Test Tunnels** to ensure that the settings do not conflict with any other tunnels defined in your account and that the correct anycast IP addresses are specified.
38-
4. Because we chose to add a pre-shared key at a later stage, you will see a warning indicator next to the tunnel names after creating them. This is expected behavior and indicates there is no pre-shared key associated with the tunnel.
36+
3. Select **Add tunnels**. We also recommend selecting **Test Tunnels** to ensure that the settings do not conflict with any other tunnels defined in your account and that you specified the correct anycast IP addresses.
37+
4. Because we chose to add a pre-shared key at a later stage, you will see a warning indicator next to the tunnel names after creating them. This is expected behavior and indicates there is no pre-shared key associated with the tunnel.
3938
5. Select **Edit** next to one of the tunnels to generate a pre-shared key.
4039
6. Select **Generate a new pre-shared key** > **Update and generate a pre-shared key**. Make note of the pre-shared key and store it somewhere safe.
4140
:::note
@@ -67,7 +66,7 @@ Cloudflare leverages [equal-cost multi-path routing](/magic-wan/reference/traffi
6766
3. Select **Test routes** to ensure the settings will be accepted, and then select **Add Routes**.
6867
4. Confirm the routes were added correctly in **Magic WAN** > **Configuration** > **Static Routes**.
6968

70-
## Juniper SRX Configuration
69+
## Juniper SRX configuration
7170

7271
The configuration settings in this document are based on JUNOS 21.4R3-S4.9.
7372

@@ -83,7 +82,7 @@ The following elements will be configured on the Juniper SRX firewall(s):
8382
- Static routes
8483
- Security policies
8584

86-
### Tunnel Interfaces
85+
### Tunnel interfaces
8786

8887
1. Add two tunnel interfaces:
8988

@@ -112,7 +111,7 @@ unit 1 {
112111

113112
### Security Zone (Cloudflare) - tunnel interfaces
114113

115-
Define a security zone and add both tunnel interfaces to it. At a minimum, the interfaces should allow ping, but this zone only contains point-to-point connections between the firewall and the customer network namespace. Setting it to `all` for system-services and protocols should be fine.
114+
Define a security zone and add both tunnel interfaces to it. At a minimum, the interfaces should allow `ping`, but this zone only contains point-to-point connections between the firewall and the customer network namespace. Setting it to `all` for system-services and protocols should be fine.
116115

117116
```txt
118117
set security zones security-zone cloudflare interfaces st0.0 host-inbound-traffic system-services all
@@ -149,7 +148,7 @@ interfaces {
149148

150149
### Security zone (untrust) - `host-inbound-traffic`
151150

152-
Add `ping` and `ike` to the security zone containing the external interface used to establish the IPsec tunnels to Cloudflare. If your security policy blocks ping by default, you will need to create a firewall-filter to allow ICMP from the [Cloudflare IPv4 address space](https://www.cloudflare.com/ips-v4) — not covered in this tutorial.
151+
Add `ping` and `ike` to the security zone containing the external interface used to establish the IPsec tunnels to Cloudflare. If your security policy blocks `ping` by default, you will need to create a firewall-filter to allow ICMP from the [Cloudflare IPv4 address space](https://www.cloudflare.com/ips-v4) — not covered in this tutorial.
153152

154153
```txt
155154
set security zones security-zone untrust interfaces ge-0/0/2.0 host-inbound-traffic system-services ping
@@ -440,11 +439,11 @@ set security ike traceoptions flag all
440439
The log file can be viewed by doing the following:
441440

442441
1. From an operational mode, run **start shell**.
443-
2. Then use the `tail` command to view the contents of the log file in real-time:
442+
2. Use the `tail` command to view the contents of the log file in real-time:
444443
```txt
445444
tail -f /var/log/ike-debug.log
446445
```
447-
3. Press <kbd>CTRL+C </kbd> when finished.
446+
3. Press <kbd>CTRL+C</kbd> when finished.
448447
4. Type `exit` to return to the operational mode prompt.
449448

450449
Either deactivate `traceoptions` or delete `traceoptions` once debugging is complete.

0 commit comments

Comments
 (0)