•
Configuration of a chassis cluster—Perform the initial configuration of the chassis
cluster using a console connection. Before you perform the initial configuration, connect
the built-in Ethernet ports as follows:
•
Port 0/6—Connect to the out-of-band management network for management of
the device. When you enable chassis clustering as part of configuring the chassis
cluster, the management interface (fxp0) is automatically created on this port.
•
Port 0/7—Connect to the other device in the chassis cluster. When you enable chassis
clustering, the control interface between the two devices (fxp1) is automatically
created on this port.
You must also make another connection between the two devices for the fabric link.
You can use any Fast Ethernet or Gigabit Ethernet port for this connection. You must
configure the interface you choose as the fabric link. For more information on configuring
chassis clusters, see the Junos OS Security Configuration Guide.
Mapping the Chassis Cluster Ports
On the SRX210 Services Gateway, the fxp1 port is not user-configurable when the services
gateway is operating in chassis cluster mode.
The fxp0 port is dedicated as the out-of-band management interface for each of the
devices in the chassis cluster setup and the fxp1 port is dedicated as the chassis-cluster
control port.
Table 40 on page 127 shows the mapping of the chassis cluster ports.
Table 40: Mapping the Chassis Cluster Ports on an SRX210 Services
Gateway
Management InterfaceEthernet Ports on SRX210 Services Gateway
fxp0 (management port)0/6 (fe-0/0/6)
fxp1 (control port)0/7 (fe-0/0/7)
Junos OS automatically creates the fxp0 and fxp1 interfaces on these ports when the
SRX210 Services Gateway is operating in chassis cluster mode.
For more information, see the following guides:
•
Junos OS Interfaces and Routing Configuration Guide
•
Junos OS Security Configuration Guide
Understanding Management Access
Telnet allows you to connect to the services gateway and access the CLI to execute
commands from a remote system. The Telnet CLI connections are not encrypted and
therefore can be intercepted.
127Copyright © 2012, Juniper Networks, Inc.
Chapter 17: Configuring Basic Settings