SlideShare a Scribd company logo
1 of 12
Kashif Latif
The SRX Clustering Module (SCM) is a card that
you can install in the services gateway to
enable the dual control link feature for chassis
cluster supported in Junos OS Release 10.2.
When deploying SRX3600’s in H/A cluster, the
SRX cluster module utilize the redundant
architecture design of the SRX3000 line to
provide full control link resiliency for mission
critical environments.
To form a chassis cluster, a pair of the same kind
of supported SRX-series devices or J-series
devices are combined to act as a single system
that enforces the same overall security.
 For SRX 5600 and SRX 5800 chassis
  clusters, the placement and type of Services
  Processing Cards (SPCs) must match in the two
  clusters.
 For SRX 3400 and SRX 3600 chassis
  clusters, the placement and type of
  SPCs, Input/output Cards (IOCs), and Network
  Processing Cards (NPCs) must match in the two
  devices.
For J-series chassis clusters, although the
devices must be the same kind, they can
contain different Physical Interface Modules
(PIMs).

When a device joins a cluster, it becomes a
node of that cluster. With the exception of
unique node settings and management IP
addresses, nodes in a cluster share the same
configuration.
You can deploy up to 15 chassis clusters in a
Layer 2 domain. Clusters and nodes are
identified in the following way:

1.   A cluster is identified by a cluster
     ID (cluster-id) specified as a number from 1
     through 15.
2.   A cluster node is identified by a node
     ID (node) specified as a number from 0 to 1.
Juniper Networks Intrusion Detection and
Prevention (IDP) products provide comprehensive
and easy-to-use in-line protection that stops
network and application level attacks before they
inflict any damage to the network, minimizing the
time and costs associated with maintaining a
secure network.

 Usingindustry-recognized stateful detection and
 prevention techniques, Juniper Networks IDP
 provides zero day protection against
 worms, Trojans, spyware, key loggers and other
 malware from penetrating the network or
 spreading from already infected users.
Juniper Networks IDP not only helps protect
networks against attacks, it provides
information on rogue servers, as well as types
and versions of applications and operating
systems that may have unknowingly been
added to the network.

Application signatures, available on the Juniper
Networks IDP, goes a step further and enables
accurate detection of specific applications such
as peer-to-peer or instant messaging.
   Juniper Networks IDP 75 brings full Intrusion
    prevention System (IPS) capability to small and
    mid-size businesses as well as remote offices.

    Juniper Networks IDP 250 and IDP 800 offer
    market-leading IPS capabilities to mid-size and
    large enterprises as well as service providers.

    Juniper Networks IDP 8200 offers market
    leading performance with 10 Gbps of real world
    throughput and is also suited for large
    enterprises and service providers.
Kashif Latif

More Related Content

Viewers also liked

Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of VarianceKashif Latif
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsKashif Latif
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core SwitchKashif Latif
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall FilterKashif Latif
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution ProtocolKashif Latif
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster ConfigurationKashif Latif
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control ProtocolKashif Latif
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway ProtocolKashif Latif
 
Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming ApplicationKashif Latif
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information ProtocolKashif Latif
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path FirstKashif Latif
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFPKashif Latif
 

Viewers also liked (15)

Analysis of Variance
Analysis of VarianceAnalysis of Variance
Analysis of Variance
 
HA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy GroupsHA, SRX Cluster & Redundancy Groups
HA, SRX Cluster & Redundancy Groups
 
Ex8216 Core Switch
Ex8216 Core SwitchEx8216 Core Switch
Ex8216 Core Switch
 
Routing Polices And Firewall Filter
Routing Polices And Firewall FilterRouting Polices And Firewall Filter
Routing Polices And Firewall Filter
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
Chassis Cluster Configuration
Chassis Cluster ConfigurationChassis Cluster Configuration
Chassis Cluster Configuration
 
Link Aggregation Control Protocol
Link Aggregation Control ProtocolLink Aggregation Control Protocol
Link Aggregation Control Protocol
 
OSI Layers
OSI LayersOSI Layers
OSI Layers
 
MX960 Router
MX960 RouterMX960 Router
MX960 Router
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Border Gateway Protocol
Border Gateway ProtocolBorder Gateway Protocol
Border Gateway Protocol
 
Linear Programming Application
Linear Programming ApplicationLinear Programming Application
Linear Programming Application
 
Routing Information Protocol
Routing Information ProtocolRouting Information Protocol
Routing Information Protocol
 
Open Shortest Path First
Open Shortest Path FirstOpen Shortest Path First
Open Shortest Path First
 
Difference Between XFP & SFP
Difference Between XFP & SFPDifference Between XFP & SFP
Difference Between XFP & SFP
 

Similar to SRX3600 Cluster & IDP

IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET Journal
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsAltaware, Inc.
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014Sanjay Basu
 
08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docxcroftsshanon
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lanjency j
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfTaherAzzam2
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochureIEI Integration Corp.
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
IPLOOK IKEPC 500 Series Product Information
IPLOOK IKEPC 500 Series Product InformationIPLOOK IKEPC 500 Series Product Information
IPLOOK IKEPC 500 Series Product InformationIPLOOK Networks
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowiaemedu
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Juniper Networks
 

Similar to SRX3600 Cluster & IDP (20)

1500024 en
1500024 en1500024 en
1500024 en
 
Srx3000
Srx3000Srx3000
Srx3000
 
Juniper
JuniperJuniper
Juniper
 
1000281 en 2
1000281 en 21000281 en 2
1000281 en 2
 
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
IRJET- Public Key Infrastructure (PKI) Understanding for Vxworks RTOS using A...
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
VMware NSX primer 2014
VMware NSX primer 2014VMware NSX primer 2014
VMware NSX primer 2014
 
08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx08680982.pdfArchitectures for Security A comparative anal.docx
08680982.pdfArchitectures for Security A comparative anal.docx
 
SCADAShield-Datasheet
SCADAShield-DatasheetSCADAShield-Datasheet
SCADAShield-Datasheet
 
Data center & wireless lan
Data center & wireless lanData center & wireless lan
Data center & wireless lan
 
Cisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdfCisco Firepower Next-Generation Firewall (NGFW).pdf
Cisco Firepower Next-Generation Firewall (NGFW).pdf
 
2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure2020 IEI PUZZLE series network appliance brochure
2020 IEI PUZZLE series network appliance brochure
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
IPLOOK IKEPC 500 Series Product Information
IPLOOK IKEPC 500 Series Product InformationIPLOOK IKEPC 500 Series Product Information
IPLOOK IKEPC 500 Series Product Information
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Cellnetrix company brochure 2012
Cellnetrix company brochure 2012Cellnetrix company brochure 2012
Cellnetrix company brochure 2012
 
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
Network Configuration Example: Junos OS NAT Configuration Examples for Screen...
 
How to Configure a Cisco Router
How to Configure a Cisco RouterHow to Configure a Cisco Router
How to Configure a Cisco Router
 
Sudharsan rangasamy resume
Sudharsan rangasamy resumeSudharsan rangasamy resume
Sudharsan rangasamy resume
 

Recently uploaded

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Recently uploaded (20)

Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 

SRX3600 Cluster & IDP

  • 2. The SRX Clustering Module (SCM) is a card that you can install in the services gateway to enable the dual control link feature for chassis cluster supported in Junos OS Release 10.2.
  • 3. When deploying SRX3600’s in H/A cluster, the SRX cluster module utilize the redundant architecture design of the SRX3000 line to provide full control link resiliency for mission critical environments.
  • 4. To form a chassis cluster, a pair of the same kind of supported SRX-series devices or J-series devices are combined to act as a single system that enforces the same overall security.  For SRX 5600 and SRX 5800 chassis clusters, the placement and type of Services Processing Cards (SPCs) must match in the two clusters.  For SRX 3400 and SRX 3600 chassis clusters, the placement and type of SPCs, Input/output Cards (IOCs), and Network Processing Cards (NPCs) must match in the two devices.
  • 5. For J-series chassis clusters, although the devices must be the same kind, they can contain different Physical Interface Modules (PIMs). When a device joins a cluster, it becomes a node of that cluster. With the exception of unique node settings and management IP addresses, nodes in a cluster share the same configuration.
  • 6. You can deploy up to 15 chassis clusters in a Layer 2 domain. Clusters and nodes are identified in the following way: 1. A cluster is identified by a cluster ID (cluster-id) specified as a number from 1 through 15. 2. A cluster node is identified by a node ID (node) specified as a number from 0 to 1.
  • 7. Juniper Networks Intrusion Detection and Prevention (IDP) products provide comprehensive and easy-to-use in-line protection that stops network and application level attacks before they inflict any damage to the network, minimizing the time and costs associated with maintaining a secure network.  Usingindustry-recognized stateful detection and prevention techniques, Juniper Networks IDP provides zero day protection against worms, Trojans, spyware, key loggers and other malware from penetrating the network or spreading from already infected users.
  • 8. Juniper Networks IDP not only helps protect networks against attacks, it provides information on rogue servers, as well as types and versions of applications and operating systems that may have unknowingly been added to the network. Application signatures, available on the Juniper Networks IDP, goes a step further and enables accurate detection of specific applications such as peer-to-peer or instant messaging.
  • 9.
  • 10.
  • 11. Juniper Networks IDP 75 brings full Intrusion prevention System (IPS) capability to small and mid-size businesses as well as remote offices.  Juniper Networks IDP 250 and IDP 800 offer market-leading IPS capabilities to mid-size and large enterprises as well as service providers.  Juniper Networks IDP 8200 offers market leading performance with 10 Gbps of real world throughput and is also suited for large enterprises and service providers.