root@srx210h-poe> show configuration | no-more ## Last commit: 2011-09-05 19:32:57 UTC by root version 10.4R6.5; system { host-name srx210h-poe; root-authentication { encrypted-password "$1$.HWBin9a$fO0M3AbpyDzByg6fDHR1m1"; ## SECRET-DATA } name-server { 192.168.1.254; } services { ssh; web-management { http { interface ge-0/0/0.0; } } } syslog { user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } } interfaces { ge-0/0/0 { unit 0 { family inet { address 192.168.75.1/24; } } } fe-0/0/2 { unit 0 { family inet { dhcp { server-address 192.168.1.254; } } } } } security { nat { source { rule-set RS1 { from zone trust; to zone untrust; rule RS1-r1 { match { source-address 192.168.75.0/24; destination-address 0.0.0.0/0; } then { source-nat { interface; } } } } } static { rule-set facebook-DNS-doctoring { from zone untrust; rule 1 { match { destination-address 69.63.0.0/16; } then { static-nat prefix 127.0.0.0/16; } } rule 2 { match { destination-address 69.171.0.0/16; } then { static-nat prefix 127.1.0.0/16; } } rule 3 { match { destination-address 66.220.0.0/16; } then { static-nat prefix 127.2.0.0/16; } } } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; queue-size 2000; ## Warning: 'queue-size' is deprecated timeout 20; } land; } } } zones { security-zone trust { tcp-rst; interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { all; } } } } } security-zone untrust { interfaces { fe-0/0/2.0 { host-inbound-traffic { system-services { all; } } } } } } policies { from-zone trust to-zone trust { policy default-permit { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone trust to-zone untrust { policy default-permit { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone untrust to-zone trust { policy default-deny { match { source-address any; destination-address any; application any; } then { deny; } } } } }