[j-nsp] SRX advice
Doug Hanks
dhanks at juniper.net
Fri Feb 4 01:49:50 EST 2011
The SRX is able to meet all of these requirements. I would highly recommend the SRX650.
In regards to the HA - I personally feel it's really good. It isn't a traditional HA setup where the passive firewall is completely unusable and just an insurance policy until there's a failure. The SRX HA is similar to how the EX performs virtual-chassis. The primary SRX will handle the control plane while the secondary SRX acts like a linecard. In effect when you login to a SRX cluster and type "show interfaces terse" you'll see every single interface on both firewalls and you're able to use them all in an active/active scenario.
I suggest taking a look at the Junos Security book for more information. It's a really good read.
http://www.juniper.net/us/en/training/jnbooks/junos_security.html
Doug
-----Original Message-----
From: juniper-nsp-bounces at puck.nether.net [mailto:juniper-nsp-bounces at puck.nether.net] On Behalf Of Ryan Goldberg
Sent: Thursday, February 03, 2011 9:13 PM
To: juniper-nsp at puck.nether.net
Subject: [j-nsp] SRX advice
Hi-
Totally new here, and I mainly lurk on other lists, so be gentle if possible.
We are in a situation we need to get out of. I am considering a pair of juniper SRX boxes (240s are in the budget) to do that.
This is what we have:
watchguard a) is the outbound nat box for about 70 small offices (we are a small ISP too, these are fiber-connected customers). it also handles some amount of inbound nat for those customer's various servers, which may be in the customers office, or a virtual host in our racks. and maybe a half dozen ssl-vpn road-warrior types. There's also a dozen or so lan-to-lan ipsec tunnels on it. sustained 2-20 inbound. light outbound.
watchguard b) is for internet facing windows boxes. lotsa inbound nat. sustained 2-20Mbit outbound
watchguard c) is for our office, 55ish users. some inbound nat too. 0-50Mbit inbound, widely varying
watchguard d) is for one particular hosting customer where stability is paramount. The other firewalls get touched a lot (and as of late, have been puking when they feel like it). 2-15Mbit of sustained web traffic, with the odd spike or lull.
a 2821) terminates a bunch of lan-to-lan ipsec tunnels (VTI style) to 1841s all over the place. box is completely VRFed, no global table, all the tunnels land in the INTERNET vrf and pop out in customer vlans, each their own vrf. 10-30Mbit
So - goal is to collapse all this onto a single pair of boxes running in an HA config. Watchguard a, b, and c are problematic, and are becoming more problematic. watchguard d is pretty quiet, but we are contractually obligated to remove all SPOF from that clients setup. the 2821 is very quiet, no troubles.
My main question revolves around number of virtual routers. We can't afford a big enough box to stuff everything (as in, every customer network) in its own vrf/routing-instance. I will admit that I've become hooked on using vrfs in cisco land on ISRs (a lot of double-ISP configs, random dirty hacks). But for our future firewall setup, I don't know what a bunch of routing-instances really buys us, if anything (aside from the psychological aspect). All we really need is for all the private networks behind this thing to get natted to their corresponding public ip(s), and if something behind the firewall needs to talk to something else behind the firewall, it should go out and back in (getting source nattted, then dest natted). If the J-boxes can do that without separate routing-instances, then we're good.
My other question involves HA stability. I've seen instances with other kit where introducing "HA" actually reduced availability. SRX boxes like running in HA, or are they fussy?
I very much thank anyone who takes the time to reply to this.
Ryan
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
More information about the juniper-nsp
mailing list