PrepAway - Latest Free Exam Questions & Answers

How would you accomplish this task?

You have been asked to configure traffic to flow between two virtual routers (VRs) residing on two
unique logical systems (LSYSs) on the same SRX5800.
How would you accomplish this task?

PrepAway - Latest Free Exam Questions & Answers

Configure a security policy that contains the context from VR1 to VR2 to permit the relevant

Configure a security policy that contains the context from LSYS1 to LSYS2 and relevant match
conditions in the rule set to allow traffic between the IP networks in VR1 and VR2.

Configure logical tunnel interfaces between VR1 and VR2 and security policies that allow
relevant traffic between VR1 and VR2 over that link.

Configure an interconnect LSYS to facilitate a connection between LSYS1 and LSYS2 and
relevant policies to allow the traffic.


Reference :

2 Comments on “How would you accomplish this task?

  1. Juniper says:

    Remember that LS contain the VR.

    Answer is D. The question refers to communicating 2 LS (the VRs are contained in the LS)

    This topic covers the interconnect logical system that serves as an internal virtual private
    LAN service (VPLS) switch connecting one logical system on the device to another. The
    topic also explains how logical tunnel (lt-0/0/0) interfaces are used to connect logical
    systems through the interconnect logical system.
    A device running logical systems can use an internal VPLS switch to pass traffic without
    it leaving the device. The interconnect logical system switches traffic across logical
    10 Copyright © 2011, Juniper Networks, Inc.
    Junos OS Logical Systems Configuration Guide for Security Devicessystems that use it. Although a virtual switch is used typically, it is not mandatory. If you
    choose to use a virtual switch, you must configure the interconnect logical system. There
    can be only one interconnect logical system on a device.
    For communication between logical systems on the device to occur, you must configure
    an lt-0/0/0 interface on each logical system that will use the internal switch, and you
    must associate it with its peer lt-0/0/0 interface on the interconnect logical system,
    effectively creating a logical tunnel between them. You define a peer relationship at each
    end of the tunnel when you configure the logical system’s lt-0/0/0 interfaces.
    You might want all logical systems on the device to be able to communicate with one
    another without using an external switch. Alternatively, you might want some logical
    systems to connect across the internal switch but not all of them.
    The interconnect logical systemdoes not require security resources assigned to it through
    a security profile. However, you must assign a dummy security profile containing no
    resources to the interconnect logical system. Otherwise you will notbe able to successfully
    commit the configuration for it.



Leave a Reply