IBM Cloud Docs
了解 vSRX 缺省配置

了解 vSRX 缺省配置

IBM Cloud® Juniper vSRX 设备随附以下缺省配置:

  • 在 vSRX 公共和专用网关 IP 地址上都允许 SSH 和 Ping 流量
  • 公共和专用网关 IP 地址的 HTTPS 端口 8443 上允许使用 Juniper Web 管理 (J-Web) UI 访问
  • IBM 服务网络已预先设置了一个地址集 SERVICE
  • 预定义了两个安全专区:SL-PRIVATESL-PUBLIC
  • SL-PRIVATE 区域的所有服务均由 IBM 提供,允许使用地址设置 SERVICE
  • 其他所有网络访问都会被拒绝

配置了两个冗余组。 下表说明了这两个冗余组:

冗余组
冗余组 冗余组功能
redundancy-group 0 用于控制平面的冗余组
redundancy-group 1 用于数据平面的冗余组

冗余组中的优先级决定了哪个 vSRX 节点处于活动状态。 缺省情况下,对于控制平面和数据平面,都是节点 0 处于活动状态。

样本 1G 独立 SR-IOV Public 和 Private vSRX Gateway 的缺省配置

以下代码样本是来自最新代码发布的示例。

## Last commit: 2020-04-28 00:32:27 UTC by root
version 18.4R1-S1.3;
system {
    login {
        class security {
            permissions [ security-control view-configuration ];
        }
        user admin {
            uid 2000;
            class super-user;
            authentication {
                encrypted-password "$6$5gPuIk9u$JPzyjh5zVz0tf4P3.POWv4UWGDfowbzirGmnpiBUW0tDWLf1ZfvP.YwN88Mc8.cyOIvgDMrksbCYsmZxf4f3p."; ## SECRET-DATA
            }
        }
    }
    root-authentication {
        encrypted-password "$6$q9tQzuqT$/TFQLkHK.woO.Qv9YcZ1nnJqZqhLBqXeg7L3xkUWXVmq8fn4N7mClTpckoCKhombXucxU6StRKOiHTDUeTdd91"; ## SECRET-DATA
    }
    services {
        ssh {
            root-login allow;
        }
        netconf {
            ssh {
                port 830;
            }
        }
        web-management {
            http {
                interface fxp0.0;
            }
            https {
                port 8443;
                system-generated-certificate;
                interface [ fxp0.0 ae0.0 ae1.0 ge-0/0/0.0 ge-0/0/1.0 ];
            }
            session {
                session-limit 100;
            }
        }
    }
    host-name asloma-swap-18-1g-sa0-vsrx-vSRX;
    name-server {
        10.0.80.11;
        10.0.80.12;
    }
    syslog {
        user * {
            any emergency;
        }
        file messages {
            any any;
            authorization info;
        }
        file interactive-commands {
            interactive-commands any;
        }
    }
    ntp {
        server 10.0.77.54;
    }
}
chassis {
    aggregated-devices {
        ethernet {
            device-count 10;
        }
    }
}
security {
    log {
        mode stream;
        report;
    }
    address-book {
        global {
            address SL8 10.1.192.0/20;
            address SL9 10.1.160.0/20;
            address SL4 10.2.128.0/20;
            address SL5 10.1.176.0/20;
            address SL6 10.1.64.0/19;
            address SL7 10.1.96.0/19;
            address SL1 10.0.64.0/19;
            address SL2 10.1.128.0/19;
            address SL3 10.0.86.0/24;
            address SL20 10.3.80.0/20;
            address SL18 10.2.176.0/20;
            address SL19 10.3.64.0/20;
            address SL16 10.2.144.0/20;
            address SL17 10.2.48.0/20;
            address SL14 10.1.208.0/20;
            address SL15 10.2.80.0/20;
            address SL12 10.2.112.0/20;
            address SL13 10.2.160.0/20;
            address SL10 10.2.32.0/20;
            address SL11 10.2.64.0/20;
            address SL_PRIV_MGMT 10.188.111.70/32;
            address SL_PUB_MGMT 169.60.101.121/32;
            address-set SERVICE {
                address SL8;
                address SL9;
                address SL4;
                address SL5;
                address SL6;
                address SL7;
                address SL1;
                address SL2;
                address SL3;
                address SL20;
                address SL18;
                address SL19;
                address SL16;
                address SL17;
                address SL14;
                address SL15;
                address SL12;
                address SL13;
                address SL10;
                address SL11;
            }
        }
    }
    screen {
        ids-option untrust-screen {
            icmp {
                ping-death;
            }
            ip {
                source-route-option;
                tear-drop;
            }
            tcp {
                syn-flood {
                    alarm-threshold 1024;
                    attack-threshold 200;
                    source-threshold 1024;
                    destination-threshold 2048;
                    queue-size 2000; ## Warning: 'queue-size' is deprecated
                    timeout 20;
                }
                land;
            }
        }
    }
    policies {
        from-zone SL-PRIVATE to-zone SL-PRIVATE {
            policy Allow_Management {
                match {
                    source-address any;
                    destination-address [ SL_PRIV_MGMT SERVICE ];
                    application any;
                }
                then {
                    permit;
                }
            }
        }
        from-zone SL-PUBLIC to-zone SL-PUBLIC {
            policy Allow_Management {
                match {
                    source-address any;
                    destination-address SL_PUB_MGMT;
                    application [ junos-ssh junos-https junos-http junos-icmp-ping ];
                }
                then {
                    permit;
                }
            }
        }
    }
    zones {
        security-zone SL-PRIVATE {
            interfaces {
                ae0.0 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                    }
                }
            }
        }
        security-zone SL-PUBLIC {
            interfaces {
                ae1.0 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                    }
                }
            }
        }
    }
}
interfaces {
    ge-0/0/0 {
        ether-options {
            802.3ad ae0;
        }
    }
    ge-0/0/1 {
        ether-options {
            802.3ad ae1;
        }
    }
    ge-0/0/2 {
        ether-options {
            802.3ad ae0;
        }
    }
    ge-0/0/3 {
        ether-options {
            802.3ad ae1;
        }
    }
    ae0 {
        description PRIVATE_VLANs;
        flexible-vlan-tagging;
        native-vlan-id 925;
        unit 0 {
            vlan-id 925;
            family inet {
                address 10.188.111.70/26;
            }
        }
    }
    ae1 {
        description PUBLIC_VLAN;
        flexible-vlan-tagging;
        native-vlan-id 985;
        unit 0 {
            vlan-id 985;
            family inet {
                address 169.60.101.121/28;
            }
            family inet6 {
                address 2607:f0d0:3901:0063:0000:0000:0000:000f/64;
            }
        }
    }
    fxp0 {
        unit 0;
    }
    lo0 {
        unit 0 {
            family inet {
                filter {
                    input PROTECT-IN;
                }
                address 127.0.0.1/32;
            }
        }
    }
}
firewall {
    filter PROTECT-IN {
        term PING {
            from {
                destination-address {
                    169.60.101.121/32;
                    10.188.111.70/32;
                }
                protocol icmp;
            }
            then accept;
        }
        term SSH {
            from {
                destination-address {
                    169.60.101.121/32;
                    10.188.111.70/32;
                }
                protocol tcp;
                destination-port ssh;
            }
            then accept;
        }
        term WEB {
            from {
                destination-address {
                    169.60.101.121/32;
                    10.188.111.70/32;
                }
                protocol tcp;
                port 8443;
            }
            then accept;
        }
        term DNS {
            from {
                protocol udp;
                source-port 53;
            }
            then accept;
        }
    }
}
routing-options {
    static {
        route 166.9.0.0/16 next-hop 10.188.111.65;
        route 0.0.0.0/0 next-hop 169.60.101.113;
        route 161.26.0.0/16 next-hop 10.188.111.65;
        route 10.0.0.0/8 next-hop 10.188.111.65;
    }
}

下表说明了先前配置的网络接口定义:

网络接口定义
接口名称 接口功能
ge-0/0/0 用于 SL-PRIVATE 传输 VLAN 的千兆以太网接口
ge-0/0/1 用于 SL-PUBLIC 传输 VLAN 的千兆以太网接口
ge-0/0/2 用于 SL-PRIVATE 传输 VLAN 的千兆以太网接口
ge-0/0/3 用于 SL-PUBLIC 传输 VLAN 的千兆以太网接口
ae0.0 聚集的以太网接口
ae1.0 聚集的以太网接口
fxp0 管理接口
lo0 回送接口

样本 10G HA SR-IOV Public 和 Private vSRX Gateway 的缺省配置

## Last commit: 2020-04-21 17:22:34 UTC by root
version 18.4R1-S1.3;
groups {
    node0 {
        system {
            host-name asloma-tc1b-18-10g-pubpriv-dual-ha1-vsrx-vSRX-Node0;
        }
    }
    node1 {
        system {
            host-name asloma-tc1b-18-10g-pubpriv-dual-ha1-vsrx-vSRX-Node1;
        }
    }
}
apply-groups "${node}";
system {
    login {
        class security {
            permissions [ security-control view-configuration ];
        }
        user admin {
            uid 2000;
            class super-user;
            authentication {
                encrypted-password "xxx"; ## SECRET-DATA
            }
        }
    }
    root-authentication {
        encrypted-password "xxx”;## SECRET-DATA
    }
    services {
        ssh {
            root-login allow;
        }
        netconf {
            ssh {
                port 830;
            }
        }
        web-management {
            http {
                interface fxp0.0;
            }
            https {
                port 8443;
                system-generated-certificate;
                interface [ fxp0.0 reth1.0 reth0.0 ];
            }
            session {
                session-limit 100;
            }
        }
    }
    name-server {
        10.0.80.11;
        10.0.80.12;
    }
    syslog {
        user * {
            any emergency;
        }
        file messages {
            any any;
            authorization info;
        }
        file interactive-commands {
            interactive-commands any;
        }
    }
    ntp {
        server 10.0.77.54;
    }
}
chassis {
    cluster {
        control-link-recovery;
        reth-count 4;
        heartbeat-interval 2000;
        heartbeat-threshold 8;
        redundancy-group 0 {
            node 0 priority 100;
            node 1 priority 1;
        }
        redundancy-group 1 {
            node 0 priority 100;
            node 1 priority 1;
            inactive: preempt;
            interface-monitor {
                ge-0/0/3 weight 130;
                ge-0/0/4 weight 130;
                ge-7/0/3 weight 130;
                ge-7/0/4 weight 130;
            }
        }
    }
}
security {
    log {
        mode stream;
        report;
    }
    address-book {
        global {
            address SL8 10.1.192.0/20;
            address SL9 10.1.160.0/20;
            address SL4 10.2.128.0/20;
            address SL5 10.1.176.0/20;
            address SL6 10.1.64.0/19;
            address SL7 10.1.96.0/19;
            address SL1 10.0.64.0/19;
            address SL2 10.1.128.0/19;
            address SL3 10.0.86.0/24;
            address SL20 10.3.80.0/20;
            address SL18 10.2.176.0/20;
            address SL19 10.3.64.0/20;
            address SL16 10.2.144.0/20;
            address SL17 10.2.48.0/20;
            address SL14 10.1.208.0/20;
            address SL15 10.2.80.0/20;
            address SL12 10.2.112.0/20;
            address SL13 10.2.160.0/20;
            address SL10 10.2.32.0/20;
            address SL11 10.2.64.0/20;
            address SL_PRIV_MGMT 10.87.40.36/32;
            address SL_PUB_MGMT 169.62.79.21/32;
            address-set SERVICE {
                address SL8;
                address SL9;
                address SL4;
                address SL5;
                address SL6;
                address SL7;
                address SL1;
                address SL2;
                address SL3;
                address SL20;
                address SL18;
                address SL19;
                address SL16;
                address SL17;
                address SL14;
                address SL15;
                address SL12;
                address SL13;
                address SL10;
                address SL11;
            }
        }
    }
    screen {
        ids-option untrust-screen {
            icmp {
                ping-death;
            }
            ip {
                source-route-option;
                tear-drop;
            }
            tcp {
                syn-flood {
                    alarm-threshold 1024;
                    attack-threshold 200;
                    source-threshold 1024;
                    destination-threshold 2048;
                    queue-size 2000; ## Warning: 'queue-size' is deprecated
                    timeout 20;
                }
                land;
            }
        }
    }
    policies {
        from-zone SL-PRIVATE to-zone SL-PRIVATE {
            policy Allow_Management {
                match {
                    source-address any;
                    destination-address [ SL_PRIV_MGMT SERVICE ];
                    application any;
                }
                then {
                    permit;
                }
            }
        }
        from-zone SL-PUBLIC to-zone SL-PUBLIC {
            policy Allow_Management {
                match {
                    source-address any;
                    destination-address SL_PUB_MGMT;
                    application [ junos-ssh junos-https junos-http junos-icmp-ping ];
                }
                then {
                    permit;
                }
            }
        }
    }
    zones {
        security-zone SL-PRIVATE {
            interfaces {
                reth0.0 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                    }
                }
            }
        }
        security-zone SL-PUBLIC {
            interfaces {
                reth1.0 {
                    host-inbound-traffic {
                        system-services {
                            all;
                        }
                    }
                }
            }
        }
    }
}
interfaces {
    ge-0/0/1 {
        gigether-options {
            redundant-parent reth0;
        }
    }
    ge-0/0/2 {
        gigether-options {
            redundant-parent reth0;
        }
    }
    ge-0/0/3 {
        gigether-options {
            redundant-parent reth1;
        }
    }
    ge-0/0/4 {
        gigether-options {
            redundant-parent reth1;
        }
    }
    ge-0/0/5 {
        gigether-options {
            redundant-parent reth2;
        }
    }
    ge-0/0/6 {
        gigether-options {
            redundant-parent reth2;
        }
    }
    ge-0/0/7 {
        gigether-options {
            redundant-parent reth3;
        }
    }
    ge-0/0/8 {
        gigether-options {
            redundant-parent reth3;
        }
    }
    ge-7/0/1 {
        gigether-options {
            redundant-parent reth0;
        }
    }
    ge-7/0/2 {
        gigether-options {
            redundant-parent reth0;
        }
    }
    ge-7/0/3 {
        gigether-options {
            redundant-parent reth1;
        }
    }
    ge-7/0/4 {
        gigether-options {
            redundant-parent reth1;
        }
    }
    ge-7/0/5 {
        gigether-options {
            redundant-parent reth2;
        }
    }
    ge-7/0/6 {
        gigether-options {
            redundant-parent reth2;
        }
    }
    ge-7/0/7 {
        gigether-options {
            redundant-parent reth3;
        }
    }
    ge-7/0/8 {
        gigether-options {
            redundant-parent reth3;
        }
    }
    fab0 {
        fabric-options {
            member-interfaces {
                ge-0/0/0;
                ge-0/0/9;
            }
        }
    }
    fab1 {
        fabric-options {
            member-interfaces {
                ge-7/0/0;
                ge-7/0/9;
            }
        }
    }
    lo0 {
        unit 0 {
            family inet {
                filter {
                    input PROTECT-IN;
                }
                address 127.0.0.1/32;
            }
        }
    }
    reth0 {
        redundant-ether-options {
            redundancy-group 1;
        }
        unit 0 {
            description "SL PRIVATE VLAN INTERFACE";
            family inet {
                address 10.87.40.36/26;
            }
        }
    }
    reth1 {
        redundant-ether-options {
            redundancy-group 1;
        }
        unit 0 {
            description "SL PUBLIC VLAN INTERFACE";
            family inet {
                address 169.62.79.21/29;
            }
            family inet6 {
                address 2607:f0d0:2901:002e:0000:0000:0000:0003/64;
            }
        }
    }
    reth2 {
        vlan-tagging;
        redundant-ether-options {
            redundancy-group 1;
        }
    }
    reth3 {
        vlan-tagging;
        redundant-ether-options {
            redundancy-group 1;
        }
    }
}
firewall {
    filter PROTECT-IN {
        term PING {
            from {
                destination-address {
                    169.62.79.21/32;
                    10.87.40.36/32;
                }
                protocol icmp;
            }
            then accept;
        }
        term SSH {
            from {
                destination-address {
                    169.62.79.21/32;
                    10.87.40.36/32;
                }
                protocol tcp;
                destination-port ssh;
            }
            then accept;
        }
        term WEB {
            from {
                destination-address {
                    169.62.79.21/32;
                    10.87.40.36/32;
                }
                protocol tcp;
                port 8443;
            }
            then accept;
        }
        term DNS {
            from {
                protocol udp;
                source-port 53;
            }
            then accept;
        }
    }
}
routing-options {
    static {
        route 166.9.0.0/16 next-hop 10.87.40.1;
        route 0.0.0.0/0 next-hop 169.62.79.17;
        route 161.26.0.0/16 next-hop 10.87.40.1;
        route 10.0.0.0/8 next-hop 10.87.40.1;
    }
}

下表中的信息表示上面的配置:

配置信息
接口名称 接口功能 冗余接口
ge-0/0/1 / ge-0/0/2 节点 0 上 SL-PRIVATE 传输 VLAN 的千兆以太网接口 reth0
ge-0/0/3 / ge-0/0/4 节点 0 上的 SL-PUBLIC 传输 VLAN 的千兆以太网接口 reth1
ge-0/0/5 / ge-0/0/6 节点 0 上客户专用 VLAN 的千兆以太网接口 reth2
ge-0/0/7 / ge-0/0/8 节点 0 上客户公用 VLAN 的千兆以太网接口 reth3
ge-7/0/1 / ge-7/0/2 节点 1 上 SL-PRIVATE 传输 VLAN 的千兆以太网接口 reth0
ge-7/0/3 / ge-7/0/4 节点 1 上的 SL-PUBLIC 传输 VLAN 的千兆以太网接口 reth1
ge-7/0/5 / ge-7/0/6 节点 1 上客户专用 VLAN 的千兆以太网接口 reth2
ge-7/0/7 / ge-7/0/8 节点 1 上客户公用 VLAN 的千兆以太网接口 reth3
fab0 机箱集群光纤网链路使用 ge-0/0/0 和 ge-0/0/9
fab1 机箱集群光纤网链路使用 ge-7/0/0 和 ge-7/0/9
fxp0 管理接口
lo0 回送接口

接口配置

这些配置的旧体系结构利用了 Ubuntu 主机管理程序上的 Linux 桥接。 此后,IBM 已转换为其网关的新体系结构,以利用主机上的 SR-IOV。 这导致 vSRX 配置的接口映射在许多情况下发生更改。 接口配置中的差异还受 vSRX 是否为以下值的影响:

  • 10G 或 1G
  • 独立或高可用性
  • 公用和专用,或者仅专用
  • vSRX 版本
    • 所有基于15.1的vSRX’s都使用传统架构
    • 一些基于18.4的vSRX’s也使用传统架构

以下部分中详细描述了旧体系结构和当前体系结构。

vSRX 高可用性接口 (当前体系结构)

vSRX 高可用性接口(当前架构)
interface 10G 发布 + 特权 10G 仅限 Priv 1G 发布 + 特权 1G 仅限 Priv
ge-0/0/0 fab0 fab0 fab0 fab0
ge-0/0/1 reth0 reth0 reth0 reth0
ge-0/0/2 reth0 reth0 reth0 reth0
ge-0/0/3 reth1 reth2 reth1 reth2
ge-0/0/4 reth1 reth2 reth1 reth2
ge-0/0/5 reth2 fab0 reth2 fab0
ge-0/0/6 reth2 不存在 reth2 不存在
ge-0/0/7 reth3 不存在 reth3 不存在
ge-0/0/8 reth3 不存在 reth3 不存在
ge-0/0/9 fab0 不存在 fab0 不存在
ge-7/0/0 fab1 fab1 fab1 fab1
ge-7/0/1 reth0 reth0 reth0 reth0
ge-7/0/2 reth0 reth0 reth0 reth0
ge-7/0/3 reth1 reth2 reth1 reth2
ge-7/0/4 reth1 reth2 reth1 reth2
ge-7/0/5 reth2 fab1 reth2 fab1
ge-7/0/6 reth2 不存在 reth2 不存在
ge-7/0/7 reth3 不存在 reth3 不存在
ge-7/0/8 reth3 不存在 reth3 不存在
ge-7/0/9 fab1 不存在 fab1 不存在

vSRX 独立接口 (当前体系结构)

vSRX 独立接口(当前架构)
interface 10G 发布 + 特权 10G 仅限 Priv 1G 发布 + 特权 1G 仅限 Priv
ge-0/0/0 ae0 ae0 ae0 ae0
ge-0/0/1 ae1 ae0 ae1 ae0
ge-0/0/2 ae0 不存在 ae0 不存在
ge-0/0/3 ae1 不存在 ae1 不存在

vSRX 高可用性接口 (旧体系结构)

vSRX 高可用性接口(传统架构)
interface 10G Priv + 发布 10G 仅限 Priv 1G Priv + 发布 1G 仅限 Priv
ge-0/0/0 fab0 fab0 fab0 fab0
ge-0/0/1 reth0 reth0 reth0 reth0
ge-0/0/2 reth0 reth0 reth2 reth2
ge-0/0/3 reth1 reth2 reth1 未用
ge-0/0/4 reth1 reth2 reth3 未用
ge-0/0/5 reth2 未用 不存在 不存在
ge-0/0/6 reth2 未用 不存在 不存在
ge-0/0/7 reth3 未用 不存在 不存在
ge-0/0/8 reth3 未用 不存在 不存在
ge-7/0/0 fab1 fab1 fab1 fab1
ge-7/0/1 reth0 reth0 reth0 reth0
ge-7/0/2 reth0 reth0 reth2 reth2
ge-7/0/3 reth1 reth2 reth1 未用
ge-7/0/4 reth1 reth2 reth3 未用
ge-7/0/5 reth2 未用 不存在 不存在
ge-7/0/6 reth2 未用 不存在 不存在
ge-7/0/7 reth3 未用 不存在 不存在
ge-7/0/8 reth3 未用 不存在 不存在

vSRX 独立接口 (旧体系结构)

vSRX 独立接口(传统架构)
interface 10G 发布 + 特权 10G 仅限 Priv 1G 发布 + 特权 1G 仅限 Priv
ge-0/0/0 ae0 ae0 ge-0/0/0 ge-0/0/0
ge-0/0/1 ae1 ae0 ge-0/0/1 不存在
ge-0/0/2 ae0 不存在 不存在 不存在
ge-0/0/3 ae1 不存在 不存在 不存在