manual

Table Of Contents
Copyright © 2010, Juniper Networks, Inc. 25
APPLICATION NOTE - Branch Office Connectivity Guide
from accepting upstream routing information, namely the default route. If the firewall were still in the process of
accepting the default route, then it would take that route and pass it to the shared services core. This would force all
of the traffic through the firewall even though the required VSD is not active on the device.
To accomplish this, interface monitoring is enabled. Interface monitoring states that if the monitored interface
changes to a specific state, then that interface must change to a different state. In this case, if the NOC or out-
of-band interface fails, then both Internet-facing interfaces go down. If both Internet interfaces fail, but the NOC
interface stays up, the VSD must fail over because the VSD must be on the firewall that has access to the default
route being received by the edge routers. To accomplish this, VSD 1 tracks the next-hop IP addresses on the
Internet-facing interfaces. If that IP address is no longer accessible, then the OSPF neighbor relationship will be
down and the link essentially fails. If both Internet interfaces fail, then the firewall will fail over VSD 1.
The firewalls are deployed in an NSRP cluster and cross-connect to each other using 10/100 interfaces, as shown
in Figure 19. One interface is dedicated as an out-of-band management port and does not pass any traffic. It is only
used for management purposes. The NOC has only one interface from each firewall and it is not full meshed, so it
also uses a 10/100 interface that operates like a traditional NSRP active/passive interface. Table 5 summarizes the
Internet firewall connectivity and interfaces. For a description of the conventions used for Juniper Networks devices
and links, see Appendix B Naming Conventions.
Figure 19: Internet firewalls
Each of the two firewalls has its own unique IP address on the physical interface. However, both firewalls share
a VSI interface. This VSI is part of VSD 1 and not the typical VSD 0 that is used in an active/passive interface. It is
a passive OSPF interface that allows only the firewall with this interface in an active state to transmit a link-state
advertisement (LSA) for this network. The VSI allows all the hosts in the NOC to use this interface as a default route.
If a device failure occurs, the backup device takes over using the same VSI interface.
Table 5: Internet Firewall Connectivity and Interfaces
Function SSG Series (A) SSG Series (B)
Edge router connectivity
M Series (A)
Gigabit Ethernet ethernet0/0 Gigabit Ethernet ethernet0/1
Edge router-connectivity
M Series (B)
Gigabit Ethernet ethernet0/0 Gigabit Ethernet ethernet0/1
Shared services connectivity
Switch (A)
10/100 ethernet0/2 10/100 ethernet0/3
Shared services connectivity
Switch (B)
10/100 ethernet2/1 10/100 ethernet0/2
Router-router HA interfaces 10/100 ethernet2/2 – HA
10/100 ethernet2/3 – HA
10/100 ethernet2/2 – HA
10/100 ethernet2/3 – HA
Router-router interface Gigabit Ethernet (ge-0/1/3.0) Gigabit Ethernet (ge-0/1/3.0)
Juniper deploys the other four interfaces into two separate networks as a full mesh and all use Gigabit Ethernet
interfaces. Two of the interfaces connect into the Internet routers, and the other two interfaces connect into the
shared services core.
SSG
Series (A)
SSG
Series (B)
ethernet0/0
172.18.8.2/30
OSPF Cost-5
ethernet0/1
172.18.8.14/30
OSPF Cost-1000
ethernet0/0
172.18.8.10/30
OSPF Cost-500
ethernet2/0
192.168.128/24
ethernet0/0
172.18.8.34/30
OSPF Cost- 500
ethernet2/1
192.168.4.3/24
ethernet0/3
172.18.8.83/30
OSPF Cost-1000
ethernet2/0
192.168.3.127/24
ethernet2/1
192.168.4.2/24
ethernet0/2
172.18.8.26/30
OSPF Cost-5
ethernet0/3
172.18.8.30/30
OSPF Cost-10
ethernet0/1
172.18.8.8/30
OSPF Cost-10
loopback.1
172.18.8.43
loopback.1
172.18.8.42
ethernet2/2-HA
ethernet2/3-HA