If you have a real out of band network, that can be used to manage the devices, but few people do. If there is a management network, its often just another VLAN on the switches. So what I usually do is a setup with two routing instances. I think I have already described the setup here before, but its something like this:
ISP
|
--------------
| DEFAULT-VR | fxp0 (1.1.1.10/24) ---|
| | fxp0 (1.1.1.20/24) ---|
-------------- |
MGMT VLAN
--------------- |
| INTERNAL-VR | reth0 (1.1.1.1/24) --|
| |
---------------
| |
WAN LAN
All routes are exchanged between the two VRs, except for routes to the MGMT vlan. If I need to manage this device over a WAN connection, that is plugged in on the internal VR, traffic is routed out through reth0 so I can access each fxp0 address (with the necessary backup-router configs of course).
If I need to manage the devices through a VPN connection (scary, but it happens), place the st0.X interface in the internal-vr and everything works in the same manner.
I have used this setup and slight varions several times and it works pretty well. The advantage is that I get logs from both devices in NSM (if traffic levels aren't too high). The alternative is placing the two SRXes in VC-mode for management but then you loose the logs from the backup node, which might not seem like a big problem but if RG0 and RG1 are active on different nodes, that means you no longer get traffic logs.
And as soon as we can terminate VPN connections in non-default routing instances, the ISP link can be moved to the internal instance and all the special route-distribution config can be deleted 🙂