version 11.4R2.14; system { host-name my-i-edge default-address-selection; ports { console insecure; auxiliary disable; } static-host-mapping { localhost inet 127.0.0.1; } services { ssh { root-login deny; protocol-version v2; connection-limit 5; rate-limit 5; } web-management { management-url my-jweb; https { system-generated-certificate; interface vlan.0; [ ** Used to have this and lo0.0 but get a infinite loop error **] } } dhcp { pool 192.168.2.0/24 { address-range low 192.168.2.128 high 192.168.2.252; maximum-lease-time 86400; domain-name cofa.noaa.gov; router { 192.168.2.1; } server-identifier 192.168.2.1; } propagate-settings ge-0/0/0.0; } } } interfaces { interface-range interfaces-unused { member-range ge-0/0/2 to ge-0/0/7; disable; } ge-0/0/0 { description "ISP"; unit 0 { family inet { dhcp; } } } ge-0/0/1 { description "To EX-3200 port ge-0/0/0"; unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } lo0 { unit 0 { family inet { address 127.0.0.1/32; address 192.168.2.254/32 { [ ** Why can I not get here from the EX-3200 LAN / Workstation **] preferred; } } } } vlan { unit 0 { family inet { address 192.168.2.1/24; } } } } routing-options { static { route 0.0.0.0/0 next-hop 192.168.1.1; [** Do I even need this .. shouldn't I pick this up ISP propogate DHCP? **] } } protocols { rstp; } security { utm { feature-profile { anti-virus { kaspersky-lab-engine { url http://update.juniper-updates.net/AV/SRX220; interval 119; } } } } utm-policy custom-utm-policy { anti-virus { http-profile junos-av-defaults; } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } nat { source { rule-set trust-to-untrust { from zone trust; to zone untrust; rule source-nat-rule { match { source-address 0.0.0.0/0; } then { source-nat { interface; } } } } } } policies { from-zone trust to-zone untrust { policy trust-to-untrust { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone untrust to-zone trust { policy default-permit { match { source-address any; destination-address any; application any; } then { permit { application-services { utm-policy custom-utm-policy; } } } } } } zones { security-zone trust { host-inbound-traffic { system-services { all; } protocols { all; } } interfaces { vlan.0; lo0.0; ge-0/0/1.0; } } security-zone untrust { screen untrust-screen; interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { dhcp; } } } } } } } vlans { vlan-trust { vlan-id 3; l3-interface vlan.0; } }