SRX devices are next-generation firewalls designed to combine networking and security capabilities. This means they can act as both a router and a firewall, providing multiple functions in a single device.
Stateful Firewall Capabilities:
Intrusion Prevention System (IPS):
Unified Threat Management (UTM):
Secure Connectivity with VPN:
SRX devices are available in different sizes and configurations to suit various needs. Here’s how they are deployed:
Branch Offices:
Enterprise and Data Centers:
SRX devices are built with modular components to manage and secure traffic effectively. Let’s break them down.
Zones are a fundamental concept in SRX devices, essential for organizing and securing network traffic. Let’s break this down further.
You can create custom zones for specific purposes:
Each physical or logical interface on the SRX must be assigned to a zone. Only traffic between zones is inspected and controlled by security policies.
Assign an IP address to the interface:
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
Assign the interface to the trust zone:
set security zones security-zone trust interfaces ge-0/0/1
Security policies control how traffic flows between zones. They define:
trust zone to the untrust zone for web browsing (HTTP and HTTPS traffic).Address book entries help organize IP addresses, making policies easier to manage.
set security address-book global address any-ip 0.0.0.0/0
Permit HTTP/HTTPS traffic:
set security policies from-zone trust to-zone untrust policy allow-web match source-address any-ip
set security policies from-zone trust to-zone untrust policy allow-web match destination-address any-ip
set security policies from-zone trust to-zone untrust policy allow-web match application junos-http
set security policies from-zone trust to-zone untrust policy allow-web match application junos-https
set security policies from-zone trust to-zone untrust policy allow-web then permit
Deny all other traffic:
set security policies from-zone trust to-zone untrust policy deny-all then deny
commit
Check the policies:
show configuration security policies
Monitor active sessions:
show security flow session
Use Specific Matches:
any for source or destination addresses unless necessary.Enable Logging:
set security policies from-zone trust to-zone untrust policy allow-web then permit log
Order Matters:
Regularly Review Policies:
Let’s put it all together with a complete configuration example:
trust (internal network) and untrust (Internet).Assign IP addresses to interfaces:
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
set interfaces ge-0/0/2 unit 0 family inet address 203.0.113.1/24
Assign interfaces to zones:
set security zones security-zone trust interfaces ge-0/0/1
set security zones security-zone untrust interfaces ge-0/0/2
Allow HTTP and HTTPS traffic:
set security policies from-zone trust to-zone untrust policy allow-web match source-address any-ip
set security policies from-zone trust to-zone untrust policy allow-web match destination-address any-ip
set security policies from-zone trust to-zone untrust policy allow-web match application junos-http
set security policies from-zone trust to-zone untrust policy allow-web match application junos-https
set security policies from-zone trust to-zone untrust policy allow-web then permit log
Deny all other traffic:
set security policies from-zone trust to-zone untrust policy deny-all then deny
Commit the configuration:
commit
Test traffic and check logs to ensure the policy works as intended:
show security policies hit-count
show log messages
The Unified Control Plane provides centralized management for SRX devices, enabling administrators to configure, monitor, and troubleshoot the device through various interfaces. Let’s explore each method in detail.
Overview:
Key Modes in Junos CLI:
Operational Mode:
Used for system monitoring, checking status, and basic diagnostics.
Commands often start with verbs like show, ping, or traceroute.
Example:
show version
show security flow session
Configuration Mode:
Used to modify device configurations.
Commands start with set, delete, edit, or commit.
Example:
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
commit
Tips for Beginners:
? key to view available commands or parameters at any point.commit confirmed to apply temporary changes, which will revert if not confirmed within a set time.Overview:
How to Access J-Web:
https://192.168.1.1).Advantages of J-Web:
Overview:
API Configuration Example:
Enable NETCONF:
set system services netconf ssh
commit
Why Use APIs?
ge-0/0/0).Assigning an IP Address to a Physical Interface:
Example:
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
Creating a Logical Interface (VLAN):
Example:
set interfaces ge-0/0/1 unit 0 vlan-id 100 family inet address 10.0.0.1/24
Admin Status:
Indicates whether the interface is enabled or disabled.
Command to enable:
set interfaces ge-0/0/1 disable
Operational Status:
Shows if the interface is up and running.
Command to view:
show interfaces terse
Static routing is simple and commonly used for smaller networks.
Configuration Example:
Route all traffic destined for the 10.0.0.0/8 network to the next hop 192.168.1.254:
set routing-options static route 10.0.0.0/8 next-hop 192.168.1.254
commit
For larger networks, dynamic routing protocols such as OSPF or BGP are used to adjust routes automatically based on network changes.
Example: Configuring OSPF
Step 1: Assign an OSPF area to the interface:
set protocols ospf area 0.0.0.0 interface ge-0/0/1
Step 2: Commit the configuration:
commit
Check the routing table:
show route
Troubleshoot a specific route:
traceroute 10.0.0.1
High Availability ensures that your network remains operational even if one SRX device fails. It uses redundant hardware and configurations to provide seamless failover.
Enable clustering:
set chassis cluster cluster-id 1 node 0 reboot
Configure redundancy groups:
set chassis cluster redundancy-group 1 node 0 priority 100
set chassis cluster redundancy-group 1 node 1 priority 50
Check cluster status:
show chassis cluster status
SRX devices primarily operate in Flow-Based Processing mode, but also support Packet-Based Processing in certain hardware and use cases. Understanding the difference is essential for both configuration and exam questions.
Default mode on most SRX devices.
Traffic is inspected as part of a session, not as individual packets.
A flow session is created after the first packet is evaluated.
Enables advanced security features such as:
Security Policies
NAT
UTM (Unified Threat Management)
IDP/IPS (Intrusion Detection/Prevention System)
Key benefits:
Stateful inspection.
Efficient session management.
Essential for most security services.
Processes each packet individually, without maintaining session state.
Used for Layer 2 bridging, transparent mode, or in hardware like LSYS (logical systems) with specific forwarding settings.
Limitations:
Cannot apply security policies.
No NAT, UTM, or session-based processing.
Suitable for simple forwarding scenarios where performance matters more than security inspection.
Only Flow-Based mode supports policies, NAT, UTM.
Packet-Based mode is limited and rarely used for Layer 3 firewalling.
Flow mode is required for default zone-based firewall operations.
In Flow-Based mode, sessions are the foundation of how SRX devices track, inspect, and control traffic.
Session Creation:
When a new packet enters the SRX, it is evaluated against policies and other rules. If allowed, a flow session is created.
Session Table Maintenance:
The SRX maintains a flow session table, which tracks:
Source and destination IPs and ports
Protocol (TCP/UDP/ICMP)
Ingress/egress interfaces
Policy ID applied
NAT translations (if any)
UTM/IDP inspection status
Sessions expire after a period of inactivity, defined by timeout values.
Example: A TCP session with no traffic may time out after 30 minutes (configurable).
View all sessions:
show security flow session
View session summary:
show security flow session summary
Clear sessions:
clear security flow session
Juniper SRX Series firewalls come in different models targeting different deployment scales.
Examples: SRX300, SRX320, SRX345
Designed for branch offices or small businesses
Moderate performance, compact, low power usage
Support full security services (Flow Mode)
Examples: SRX1500, SRX4100, SRX4600, SRX5400
Built for data centers, large enterprises, or service providers
High throughput, redundant hardware, carrier-grade features
A virtual firewall that runs on VMware, KVM, AWS, Azure, etc.
Same Junos OS and features as physical SRX
Ideal for cloud, virtualized environments, or testing
SRX management access is handled through the junos-host zone, which is a built-in zone for system traffic.
set system services ssh
This allows SSH access to the SRX itself from configured interfaces.
set system services web-management https interface ge-0/0/0.0
You must also assign an IP address to the interface and ensure the zone allows management traffic.
Logging and diagnostics are crucial for monitoring and resolving issues on SRX.
| Command | Purpose |
|---|---|
show log messages |
View system and security logs |
show security log |
View logs related to security events (if configured separately) |
monitor traffic interface ge-0/0/0 |
Real-time packet capture on an interface |
show chassis hardware |
Displays physical hardware components |
show chassis alarms |
Shows system alarms or hardware issues |
request support information |
Generates a full system diagnostics report for troubleshooting |
| Topic | Key Takeaways |
|---|---|
| Flow vs. Packet | Flow mode = security policies & services; packet mode = limited use |
| Session Handling | Sessions track traffic state; expire based on timeouts |
| Hardware Series | Branch (SRX300s), High-End (SRX1500+), vSRX (virtual) |
| Mgmt Access | Use set system services; access via junos-host |
| Diagnostics | Use show log, monitor traffic, show chassis, request support info |
What is the role of the Routing Engine (RE) in an SRX firewall?
The Routing Engine handles control-plane operations such as routing protocols, system management, and configuration.
The Routing Engine runs the Junos operating system and manages the device’s control plane. It processes tasks such as routing protocol calculations, CLI commands, configuration management, and system monitoring. The Routing Engine does not normally process user data traffic. Instead, it programs forwarding tables that are used by the Packet Forwarding Engine. Understanding this separation is important because it explains how SRX devices maintain high performance while still supporting complex routing and security features.
Demand Score: 88
Exam Relevance Score: 92
What component processes actual network traffic in an SRX firewall?
The Packet Forwarding Engine (PFE).
The Packet Forwarding Engine is responsible for forwarding packets through the device. It performs tasks such as packet classification, security policy enforcement, NAT translation, and session processing. Because the PFE handles data-plane operations using specialized hardware, it can process traffic at high speeds without involving the Routing Engine. This architecture allows SRX firewalls to scale efficiently while maintaining security inspection capabilities.
Demand Score: 87
Exam Relevance Score: 93
In what order are packets processed on an SRX firewall?
Packets typically follow the flow: interface → route lookup → security policy → NAT → forwarding.
When a packet enters an SRX firewall, it first arrives on an interface and is checked against routing information to determine the destination path. The firewall then evaluates security policies based on source and destination zones. If the traffic is permitted, NAT rules may be applied depending on the configuration. After all security and translation checks are complete, the packet is forwarded to the appropriate outgoing interface. Understanding packet flow order is critical for troubleshooting because incorrect assumptions about processing order can lead to configuration errors.
Demand Score: 93
Exam Relevance Score: 95
Why must every interface on an SRX firewall belong to a security zone?
Because security policies are evaluated based on zone-to-zone traffic.
SRX firewalls use a zone-based security model where traffic control is determined by the source and destination zones rather than individual interfaces. When traffic enters the device, the firewall determines which zone the interface belongs to and evaluates policies for that zone pair. If an interface is not assigned to a zone, the firewall cannot properly evaluate security policies for traffic entering or leaving that interface. This requirement ensures consistent policy enforcement across the network.
Demand Score: 87
Exam Relevance Score: 91
Why might traffic reach the correct route but still be dropped on an SRX firewall?
Because the security policy may deny the traffic even though routing is correct.
Routing and security policy processing are separate functions on SRX devices. A packet may successfully match a route in the routing table but still be blocked if no security policy permits traffic between the source and destination zones. This often confuses engineers because routing appears correct when checking the routing table. Troubleshooting should include verifying security policies, session tables, and zone assignments to ensure the firewall allows the traffic.
Demand Score: 85
Exam Relevance Score: 92