Loopback interface for chassis cluster VPN-This feature is supported on all high-end SRX Series devices. An Internet Key Exchange (IKE) gateway needs an external interface to communicate with a peer device. In a chassis cluster setup, the node on which the external interface is active selects a Services Processing Unit (SPU) to support the VPN tunnel. IKE and IPsec packets are processed on that SPU. Therefore, the active external interface determines the anchor SPU.

In a chassis cluster setup, this external interface can be the redundant Ethernet interface or a standalone interface. These interfaces can go down when the physical interfaces are down. Therefore, loopback interfaces can be used to reach the peer gateway because the loopback interfaces are alternate physical interfaces.

This feature allows the loopback interface to be configured for any redundancy group. This redundancy group configuration is only checked for VPN packets, because only VPN packets must find the anchor SPU through the active interface.

On high-end SRX Series devices, the lo0 pseudointerface cannot be configured in RG0 when it is used as an IKE gateway external interface. Because a VPN is only supported in an active/passive chassis cluster environment on high-end SRX Series devices, the lo0 pseudointerface can be configured in such a setup for RG1. In a chassis cluster setup, the node on which the external interface is

https://www.juniper.net/techpubs/en_US/junos12.1x44/information-products/topic-collections/release-notes/12.1x44-d10/topic-72756.html#jd0e7482
Thanks
Alex

----- Original Message ----- From: "OBrien, Will" <obri...@missouri.edu>
To: "juniper-nsp" <juniper-nsp@puck.nether.net>
Sent: Wednesday, April 03, 2013 9:12 PM
Subject: [j-nsp] ike túnnel termination on 5800s


Hey guys, I'm building a new cluster of SRX 5800s and prepping to move several VPN tunnels to it. All of them are ike/ipsec.

I built a test site on a SRX210 and configured a tunnel between it and my cluster. My tunnels aren't coming up on the 5800 side at all. I'm using Agg Eth interfaces on each chassis cluster member since they are in diverse locations and the ciscos they connect to aren't configured for VPC pairing.

Basically, I've got a 20Gb Agg link up and down from each cluster member. Up heads to my DMZ/Internet and Down goes to the client core. (and a 20Gb lane between the cluster members)

In checking my documentation on VPN tunnels, I found this gem:
http://kb.juniper.net/InfoCenter/index?page=content&id=KB19829&actp=search&viewlocale=en_US&searchid=1365002153257

Apparently, high end SRX isn't supporting IKE unless it's via a RETH interface. <RANT> WHAT THE FREAKING HELL</RANT>

So, after some work with JTAC to validate my working plan, we configured our agg links as reth interfaces, which have two members off the same chassis to work around the restriction.

I now have tunnels talking to my new "reth" interfaces, but I'm incredibly displeased that I can't just terminate those on a loopback.


Are there any angles I'm missing on this? I can mostly live with the altered configuration. Luckily I planned to transition my vpn tunnels first, so I was able to reconfigure my DMZ uplinks without incurring an outage.



_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp


_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to