Juniper vSRX#
Juniper vSRX virtualized firewall is identified with juniper_vsrx
kind in the topology file. It is built using vrnetlab project and essentially is a Qemu VM packaged in a docker container format.
Managing Juniper vSRX nodes#
Note
Containers with vSRX inside will take ~7min to fully boot.
You can monitor the progress with docker logs -f <container-name>
.
Juniper vSRX node launched with containerlab can be managed via the following interfaces:
Info
Default user credentials: admin:admin@123
Interface naming#
You can use interfaces names in the topology file like they appear in Juniper vSRX.
The interface naming convention is: et-0/0/X
(or ge-0/0/X
, xe-0/0/X
, all are accepted), where X denotes the port number.
With that naming convention in mind:
et-0/0/0
- first data port availableet-0/0/1
- second data port, and so on...
Note
Data port numbering starts at 0
.
The example ports above would be mapped to the following Linux interfaces inside the container running the Juniper vSRX VM:
Juniper vJunosEvolved container can have up to 17 interfaces and uses the following mapping rules:
eth0
- management interface connected to the containerlab management networketh1
- first data interface, mapped to a first data port of vJunosEvolved VM, which iset-0/0/0
and notet-0/0/1
.eth2+
- second and subsequent data interface
When containerlab launches Juniper vSRX node the management interface of the VM gets assigned 10.0.0.15/24
address from the QEMU DHCP server. This interface is transparently stitched with container's eth0
interface such that users can reach the management plane of the Juniper vSRX using containerlab's assigned IP.
Data interfaces et-0/0/0+
need to be configured with IP addressing manually using CLI or other available management interfaces.
Features and options#
Node configuration#
Juniper vSRX nodes come up with a basic configuration where only the control plane and line cards are provisioned and the admin
user with the provided password.
Startup configuration#
It is possible to make vSRX nodes boot up with a user-defined startup-config instead of a built-in one. With a startup-config
property of the node/kind user sets the path to the config file that will be mounted to a container and used as a startup-config:
With this knob, containerlab is instructed to take a file myconfig.txt
from the directory that hosts the topology file and copy it to the lab directory for that specific node under the /config/startup-config.cfg
name. Then the directory that hosts the startup-config dir is mounted to the container. This will result in this config being applied at startup by the node.
Configuration is applied after the node is started. Thus it can contain partial configuration snippets that you desire to add on top of the default config that a node boots up with.
Lab examples#
The following simple lab consists of two Linux hosts connected via one vSRX: