Multiple vpn tunnels in Junos on SRX platform

interfaces {
    fe-0/0/3 {
        description untrustinterface;
        unit 0 {
            family inet {
                address 1.1.1.1/24;
            }
        }
    }
    st0 {
        description TunnelInterface;
        unit 10 {
            description TunnelVPN10;
            family inet {
                address 10.1.254.1/30;
            }
        }
        unit 11 {
            description TunnelVPN11;
            family inet {
                address 10.1.254.5/30;
            }
        }
    }
}
routing-options {
    static {
        route 0.0.0.0/0 next-hop 1.1.1.254;
        route 10.1.10.0/24 next-hop 10.1.254.2;
        route 10.1.11.0/24 next-hop 10.1.254.6;
    }
}
security {
    ike {
        proposal IkeProposal1 {
            authentication-method pre-shared-keys;
            dh-group group2;
            authentication-algorithm md5;
            encryption-algorithm 3des-cbc;
            lifetime-seconds 86400;
        }
        policy IkePolicyVPN10 {
            mode main;
            proposals IkeProposal1;
            pre-shared-key ascii-text "vbnFGJrtuy"; ## SECRET-DATA
        }
        policy IkePolicyVPN11 {
            mode main;
            proposals IkeProposal1;
            pre-shared-key ascii-text "gjhgJHGDFGHdfj"; ## SECRET-DATA
        }
        gateway IkeGatewayVPN10 {
            ike-policy IkePolicyVPN10;
            address 2.2.2.2;
            dead-peer-detection;
            external-interface fe-0/0/3.0;
        }
        gateway IkeGatewayVPN11 {
            ike-policy IkePolicyVPN11;
            address 3.3.3.3;
            dead-peer-detection;
            external-interface fe-0/0/3.0;
        }
    }
    ipsec {
        proposal IpsecProposal1 {
            protocol esp;
            authentication-algorithm hmac-md5-96;
            encryption-algorithm 3des-cbc;
        }
        policy VpnPolicy1 {
            perfect-forward-secrecy {
                keys group2;
            }
        }
        vpn VPN10 {
            bind-interface st0.10;
            ike {
                gateway IkeGatewayVPN10;
                ipsec-policy VpnPolicy1;
            }
        }
        vpn VPN11 {
            bind-interface st0.11;
            ike {
                gateway IkeGatewayVPN11;
                ipsec-policy VpnPolicy1;
            }
        }
    }
    zones {
        security-zone untrust {
            screen untrust-screen;
            host-inbound-traffic {
                system-services {
                    ike;
                    ssh;
                    ping;
                }
            }
            interfaces {
                fe-0/0/3.0;
            }
        }
        security-zone VPN {
            host-inbound-traffic {
                system-services {
                    ping;
                }
            }
            interfaces {
                st0.10;
                st0.11;
            }
        }

    }
    policies {
    flow {
        tcp-mss {
            ipsec-vpn {
                mss 1350;
            }
        }
    }
}

Hits: 31

VRRP Example on Procurve E-series

On Core1:
vlan 201
   name "servers"
   ip address 10.254.201.1 255.255.255.0
   tagged A2-A23,B1-B24,C1-C23,Trk1
   exit
vlan 202
   name "beheer"
   untagged A2-A23,B1-B24,C1-C23
   ip address 10.254.202.1 255.255.255.0
   tagged Trk1
   exit
router vrrp
router vrrp virtual-ip-ping
vlan 201
   vrrp vrid 201
      owner
      virtual-ip-address 10.254.201.1 255.255.255.0
      priority 255
      enable
      exit
   exit
vlan 202
   vrrp vrid 202
      owner
      virtual-ip-address 10.254.202.1 255.255.255.0
      priority 255
      enable
      exit
   exit

On Core2:
vlan 201
   name "servers"
   ip address 10.254.201.2 255.255.255.0
   tagged A2-A23,B1-B24,C1-C23,Trk1
   exit
vlan 202
   name "beheer"
   untagged A2-A23,B1-B24,C1-C23
   ip address 10.254.202.2 255.255.255.0
   tagged Trk1
   exit
router vrrp
router vrrp virtual-ip-ping
vlan 201
   vrrp vrid 201
      backup
      virtual-ip-address 10.254.201.1 255.255.255.0
      priority 250
      enable
      exit
   exit
vlan 202
   vrrp vrid 202
      backup
      virtual-ip-address 10.254.202.1 255.255.255.0
      priority 250
      enable
      exit
   exit

Hits: 31