{\rtf1\ansi\ansicpg1252\cocoartf949\cocoasubrtf540 {\fonttbl\f0\fswiss\fcharset0 Helvetica;} {\colortbl;\red255\green255\blue255;} \margl1440\margr1440\vieww16340\viewh15980\viewkind0 \pard\tx560\tx1120\tx1680\tx2240\tx2800\tx3360\tx3920\tx4480\tx5040\tx5600\tx6160\tx6720\ql\qnatural\pardirnatural \f0\fs24 \cf0 version 9.2R1.10;\ system \{\ autoinstallation \{\ delete-upon-commit;\ traceoptions \{\ level verbose;\ flag \{\ all;\ \}\ \}\ \}\ host-name test;\ time-zone America/Los_Angeles;\ root-authentication \{\ encrypted-password "";\ \}\ services \{\ ssh;\ web-management \{\ http \{\ interface [ ge-0/0/0.0 ge-4/0/5.0 ];\ \}\ \}\ \}\ syslog \{\ user * \{\ any emergency;\ \}\ file messages \{\ any any;\ authorization info;\ \}\ file interactive-commands \{\ interactive-commands any;\ \}\ \}\ license \{\ autoupdate \{\ url https://ae1.juniper.net/junos/key_retrieval;\ \}\ \}\ \}\ interfaces \{\ ge-0/0/0 \{\ unit 0;\ \}\ t1-1/0/0 \{\ description "T1";\ clocking external;\ encapsulation cisco-hdlc;\ unit 0 \{\ description "T1";\ family inet \{\ address 10.15.245.221/30;\ \}\ \}\ \}\ ge-4/0/5 \{\ description "Link to Core G3/2";\ unit 0 \{\ description "Link to Core G3/2";\ family inet \{\ address 10.15.245.228/27;\ \}\ \}\ \}\ lo0 \{\ unit 0 \{\ family inet \{\ address 127.0.0.1/32;\ \}\ \}\ \}\ \}\ routing-options \{\ static \{\ route 10.89.24.0/24 next-hop 10.15.245.222;\ \}\ \}\ security \{\ screen \{\ ids-option untrust-screen \{\ icmp \{\ ping-death;\ \}\ ip \{\ source-route-option;\ tear-drop;\ \}\ tcp \{\ syn-flood \{\ alarm-threshold 1024;\ attack-threshold 200;\ source-threshold 1024;\ destination-threshold 2048;\ queue-size 2000;\ timeout 20;\ \}\ land;\ \}\ \}\ \}\ zones \{\ security-zone trust \{\ tcp-rst;\ interfaces \{\ ge-0/0/0.0 \{\ host-inbound-traffic \{\ system-services \{\ http;\ https;\ ssh;\ telnet;\ dhcp;\ \}\ \}\ \}\ ge-4/0/5.0;\ \}\ \}\ security-zone untrust \{\ screen untrust-screen;\ interfaces \{\ t1-1/0/0.0;\ \}\ \}\ \}\ policies \{\ from-zone trust to-zone trust \{\ policy default-permit \{\ match \{\ source-address any;\ destination-address any;\ application any;\ \}\ then \{\ permit;\ \}\ \}\ \}\ from-zone trust to-zone untrust \{\ policy default-permit \{\ match \{\ source-address any;\ destination-address any;\ application any;\ \}\ then \{\ permit;\ \}\ \}\ \}\ from-zone untrust to-zone trust \{\ policy default-deny \{\ match \{\ source-address any;\ destination-address any;\ application any;\ \}\ then \{\ deny;\ \}\ \}\ \}\ \}\ \}\ \ \ configuration_viewedit_viewtext_page\ Copyright \'a9 2004-2008, Juniper Networks, Inc. All Rights Reserved. Trademark Notice. Privacy.\ }