set clock ntp set clock timezone -9 set vrouter trust-vr sharable unset vrouter "trust-vr" auto-route-export set service "HTTP" timeout 15 set auth-server "Local" id 0 set auth-server "Local" server-name "Local" set auth-server "Example.com_RADIUS" id 1 set auth-server "Example.com_RADIUS" server-name "192.168.101.5" set auth-server "Example.com_RADIUS" backup1 "192.168.100.10" set auth-server "Example.com_RADIUS" account-type auth xauth set auth-server "Example.com_RADIUS" radius secret "XYZ" set auth default auth server "Local" set admin port 1024 set admin auth timeout 10 set admin auth server "Local" set admin format dos set zone "Trust" vrouter "trust-vr" set zone "Untrust" vrouter "trust-vr" set zone "DMZ" vrouter "trust-vr" set zone "VLAN" vrouter "trust-vr" set zone "Trust" tcp-rst set zone "Untrust" block unset zone "Untrust" tcp-rst set zone "MGT" block set zone "DMZ" tcp-rst set zone "VLAN" block set zone "VLAN" tcp-rst set zone "Untrust" screen tear-drop set zone "Untrust" screen syn-flood set zone "Untrust" screen ping-death set zone "Untrust" screen ip-filter-src set zone "Untrust" screen land set zone "V1-Untrust" screen tear-drop set zone "V1-Untrust" screen syn-flood set zone "V1-Untrust" screen ping-death set zone "V1-Untrust" screen ip-filter-src set zone "V1-Untrust" screen land set interface "ethernet1" zone "Trust" set interface "ethernet2" zone "Trust" set interface "ethernet3" zone "DMZ" set interface "ethernet4" zone "Untrust" set interface "tunnel.1" zone "Trust" set interface "tunnel.2" zone "Trust" set interface "tunnel.4" zone "Trust" set interface "tunnel.5" zone "Trust" set interface "tunnel.6" zone "Trust" set interface "tunnel.7" zone "Trust" set interface "tunnel.8" zone "Trust" set interface "tunnel.9" zone "Trust" set interface "tunnel.10" zone "Trust" set interface "tunnel.11" zone "Trust" set interface "tunnel.12" zone "Trust" set interface "tunnel.13" zone "Trust" set interface "tunnel.14" zone "Trust" unset interface vlan1 ip set interface ethernet1 ip 192.168.101.1/24 set interface ethernet1 nat set interface ethernet2 ip 192.168.179.2/28 set interface ethernet2 route set interface ethernet4 ip 1.2.3.4/32 set interface ethernet4 route set interface tunnel.1 ip unnumbered interface ethernet4 set interface tunnel.2 ip unnumbered interface ethernet4 set interface tunnel.4 ip unnumbered interface ethernet4 set interface tunnel.5 ip unnumbered interface ethernet4 set interface tunnel.6 ip unnumbered interface ethernet4 set interface tunnel.7 ip unnumbered interface ethernet4 set interface tunnel.8 ip unnumbered interface ethernet4 set interface tunnel.9 ip unnumbered interface ethernet4 set interface tunnel.10 ip unnumbered interface ethernet4 set interface tunnel.11 ip unnumbered interface ethernet4 set interface tunnel.12 ip unnumbered interface ethernet4 set interface tunnel.13 ip unnumbered interface ethernet4 set interface tunnel.14 ip unnumbered interface ethernet4 set interface ethernet1 mtu 1500 set interface ethernet2 mtu 1500 set interface ethernet3 mtu 1500 set interface ethernet4 mtu 1360 set interface tunnel.1 mtu 1500 set interface tunnel.2 mtu 1500 set interface tunnel.4 mtu 1500 set interface tunnel.5 mtu 1500 set interface tunnel.6 mtu 1500 set interface tunnel.7 mtu 1500 set interface tunnel.8 mtu 1500 set interface tunnel.9 mtu 1500 set interface tunnel.10 mtu 1500 set interface tunnel.11 mtu 1500 set interface tunnel.12 mtu 1500 set interface tunnel.13 mtu 1500 set interface tunnel.14 mtu 1500 unset interface vlan1 bypass-others-ipsec unset interface vlan1 bypass-non-ip set interface ethernet1 ip manageable set interface ethernet2 ip manageable set interface ethernet4 ip manageable unset interface ethernet2 manage ssh unset interface ethernet2 manage telnet unset interface ethernet2 manage snmp unset interface ethernet2 manage ssl unset interface ethernet2 manage web set interface ethernet4 manage ping set interface ethernet4 manage ssh set interface ethernet4 manage snmp set interface ethernet4 manage ssl set interface ethernet4 manage web set interface ethernet4 vip untrust 25 "MAIL" 192.168.101.5 manual set interface ethernet4 vip untrust 80 "HTTP" 192.168.101.5 manual set flow all-tcp-mss 1304 unset flow no-tcp-seq-check set flow tcp-syn-check set hostname COVPN002 set dns host dns1 1.2.3.4 set dns host dns2 2.3.4.5 set address "Trust" "10.10.10.0/24" 10.10.10.0 255.255.255.0 set address "Trust" "10.56.151.0/24" 10.56.151.0 255.255.255.0 set address "Trust" "172.16.3.0/24" 172.16.3.0 255.255.255.0 set address "Trust" "192.168.100.0/24" 192.168.100.0 255.255.255.0 set address "Trust" "192.168.101.0/24" 192.168.101.0 255.255.255.0 set address "Trust" "192.168.106.0/24" 192.168.106.0 255.255.255.0 set address "Trust" "192.168.110.0/24" 192.168.110.0 255.255.255.0 set address "Trust" "192.168.113.0/24" 192.168.113.0 255.255.255.0 set address "Trust" "192.168.114.0/24" 192.168.114.0 255.255.255.0 set address "Trust" "192.168.115.0/24" 192.168.115.0 255.255.255.0 set address "Trust" "192.168.151.0/24" 192.168.151.0 255.255.255.0 set address "Trust" "192.168.152.0/24" 192.168.152.0 255.255.255.0 set address "Trust" "192.168.159.0/24" 192.168.159.0 255.255.255.0 set address "Untrust" "10.10.10.0/24" 10.10.10.0 255.255.255.0 set ippool "QAP_Remote" 172.16.3.10 172.16.3.50 set user "Example" uid 1 set user "Example" ike-id u-fqdn "VPN@example.com" share-limit 40 set user "Example" type ike xauth set user "Example" remote ippool "QAP_Remote" set user "Example" "enable" set user-group "Example.com_RAS" id 2 set user-group "Example.com_RAS" location external set user-group "Example.com_RAS" type auth xauth set user-group "Example_VPN_IAS_Users" id 1 set user-group "Example_VPN_IAS_Users" user "Example" set ike p1-proposal "Sully P1" preshare group2 esp 3des md5 second 86400 set ike gateway "Exclusive_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Secon_Juneau_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Aggpro_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Ketchikan_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "SM_PIX515" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "Sully P1" set ike gateway "SM_PIX515" nat-traversal unset ike gateway "SM_PIX515" nat-traversal udp-checksum set ike gateway "SM_PIX515" nat-traversal keepalive-frequency 20 set ike gateway "Bellevue_NS25" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Emulsion_North_Pole_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Emulsion_Eagle_River_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "University_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "QAP_Cange_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Example_VPN_gateway" dialup "Example_VPN_IAS_Users" Aggr outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" unset ike gateway "Example_VPN_gateway" nat-traversal udp-checksum set ike gateway "Example_VPN_gateway" nat-traversal keepalive-frequency 5 set ike gateway "Example_VPN_gateway" xauth server "Example.com_RADIUS" user-group "Example.com_RAS" set ike gateway "Pacific_Asphalt_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "QAP_Wasilla_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Secon_Shop_Juneau_NS5gt" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Exclusive_Project1_SSG5" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike gateway "Secon_Project1_SSG5" address 1.2.3.4 Main outgoing-interface "ethernet4" preshare "xyz" proposal "pre-g2-3des-md5" "pre-g2-3des-sha" set ike respond-bad-spi 1 set xauth default ippool "QAP_Remote" set xauth default dns1 192.168.101.5 set xauth default dns2 192.168.100.10 set xauth default wins1 192.168.101.5 set xauth default wins2 192.168.100.10 set xauth default auth server Example.com_RADIUS set vpn "QAP_to_Bellevue" gateway "Bellevue_NS25" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Bellevue" monitor set vpn "QAP_to_Bellevue" id 1 bind interface tunnel.1 set vpn "QAP_to_SM" gateway "SM_PIX515" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Aggpro" gateway "Aggpro_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Aggpro" monitor set vpn "QAP_to_Aggpro" id 4 bind interface tunnel.4 set vpn "QAP_to_Secon_Juneau" gateway "Secon_Juneau_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Secon_Juneau" monitor set vpn "QAP_to_Secon_Juneau" id 6 bind interface tunnel.6 set vpn "QAP_to_Exclusive" gateway "Exclusive_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Exclusive" monitor set vpn "QAP_to_Exclusive" id 9 bind interface tunnel.5 set vpn "QAP_to_Ketchikan" gateway "Ketchikan_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Ketchikan" monitor set vpn "QAP_to_Ketchikan" id 10 bind interface tunnel.7 set vpn "Example_VPN_Primary" gateway "Example_VPN_gateway" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Emulsion" gateway "Emulsion_North_Pole_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Emulsion" monitor set vpn "QAP_to_Emulsion" id 75 bind interface tunnel.2 set vpn "QAP_to_University" gateway "University_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_University" monitor set vpn "QAP_to_University" id 25 bind interface tunnel.8 set vpn "QAP_to_QAP_Cange" gateway "QAP_Cange_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_QAP_Cange" monitor set vpn "QAP_to_QAP_Cange" id 28 bind interface tunnel.9 set vpn "QAP_to_Pacific_Asphalt" gateway "Pacific_Asphalt_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Pacific_Asphalt" monitor set vpn "QAP_to_Pacific_Asphalt" id 69 bind interface tunnel.10 set vpn "QAP_to_QAP_Wasilla" gateway "QAP_Wasilla_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_QAP_Wasilla" monitor set vpn "QAP_to_QAP_Wasilla" id 70 bind interface tunnel.11 set vpn "QAP_to_Secon_Shop_Juneau" gateway "Secon_Shop_Juneau_NS5gt" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Secon_Shop_Juneau" monitor set vpn "QAP_to_Secon_Shop_Juneau" id 80 bind interface tunnel.12 set vpn "QAP_to_Exclusive_Project1" gateway "Exclusive_Project1_SSG5" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Exclusive_Project1" monitor set vpn "QAP_to_Exclusive_Project1" id 81 bind interface tunnel.13 set vpn "QAP_to_Secon_Project1" gateway "Secon_Project1_SSG5" no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5" "nopfs-esp-3des-sha" set vpn "QAP_to_Secon_Project1" monitor set vpn "QAP_to_Secon_Project1" id 85 bind interface tunnel.14 set pki authority default scep mode "auto" set pki x509 default cert-path partial set av all max-connections 200 set url protocol sc-cpa exit set policy id 56 from "Untrust" to "Untrust" "Any" "VIP(ethernet4)" "HTTP" permit log set policy id 55 from "Untrust" to "Untrust" "Any" "VIP(ethernet4)" "SMTP" permit log set policy id 8 name "Real Time Streaming Protocol" from "Trust" to "Untrust" "Any" "Any" "RTSP" deny set policy id 24 from "Trust" to "Untrust" "192.168.101.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 23 pair-policy 23 set policy id 30 from "Trust" to "Untrust" "192.168.100.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 37 pair-policy 31 set policy id 41 from "Trust" to "Untrust" "192.168.106.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 63 pair-policy 40 set policy id 43 from "Trust" to "Untrust" "192.168.110.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 64 pair-policy 42 set policy id 34 from "Trust" to "Untrust" "192.168.113.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 43 pair-policy 35 set policy id 45 from "Trust" to "Untrust" "192.168.114.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 65 pair-policy 44 set policy id 49 from "Trust" to "Untrust" "192.168.115.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 67 pair-policy 48 set policy id 47 from "Trust" to "Untrust" "10.56.151.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 86 pair-policy 46 set policy id 51 from "Trust" to "Untrust" "192.168.151.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 68 pair-policy 50 set policy id 61 from "Trust" to "Untrust" "192.168.152.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 84 pair-policy 62 set policy id 59 from "Trust" to "Untrust" "192.168.159.0/24" "Dial-Up VPN" "ANY" tunnel vpn "Example_VPN_Primary" id 83 pair-policy 60 set policy id 74 from "Trust" to "Untrust" "10.10.10.0/24" "Dial-Up VPN" "ANY" nat src tunnel vpn "Example_VPN_Primary" id 104 set policy id 9 from "Trust" to "Untrust" "192.168.101.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 95 pair-policy 10 set policy id 37 from "Trust" to "Untrust" "192.168.100.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 44 pair-policy 36 set policy id 71 from "Trust" to "Untrust" "192.168.106.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 97 pair-policy 72 set policy id 10 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.101.0/24" "ANY" tunnel vpn "QAP_to_SM" id 95 pair-policy 9 set policy id 36 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.100.0/24" "ANY" tunnel vpn "QAP_to_SM" id 44 pair-policy 37 set policy id 72 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.106.0/24" "ANY" tunnel vpn "QAP_to_SM" id 97 pair-policy 71 set policy id 11 from "Trust" to "Untrust" "192.168.110.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 16 pair-policy 12 set policy id 12 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.110.0/24" "ANY" tunnel vpn "QAP_to_SM" id 16 pair-policy 11 set policy id 68 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.114.0/24" "ANY" tunnel vpn "QAP_to_SM" id 90 pair-policy 67 set policy id 13 from "Trust" to "Untrust" "192.168.113.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 17 pair-policy 14 set policy id 67 from "Trust" to "Untrust" "192.168.114.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 90 pair-policy 68 set policy id 14 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.113.0/24" "ANY" tunnel vpn "QAP_to_SM" id 17 pair-policy 13 set policy id 65 from "Trust" to "Untrust" "192.168.115.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 89 pair-policy 66 set policy id 27 from "Trust" to "Untrust" "192.168.151.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 27 pair-policy 28 set policy id 57 from "Trust" to "Untrust" "192.168.159.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 82 pair-policy 58 set policy id 69 from "Trust" to "Untrust" "10.56.151.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 96 pair-policy 70 set policy id 75 from "Trust" to "Untrust" "172.16.3.0/24" "10.10.10.0/24" "ANY" tunnel vpn "QAP_to_SM" id 107 pair-policy 76 set policy id 2 name "Allow all outbound traffic" from "Trust" to "Untrust" "Any" "Any" "ANY" nat src permit set policy id 66 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.115.0/24" "ANY" tunnel vpn "QAP_to_SM" id 89 pair-policy 65 set policy id 28 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.151.0/24" "ANY" tunnel vpn "QAP_to_SM" id 27 pair-policy 27 set policy id 58 from "Untrust" to "Trust" "10.10.10.0/24" "192.168.159.0/24" "ANY" tunnel vpn "QAP_to_SM" id 82 pair-policy 57 set policy id 70 from "Untrust" to "Trust" "10.10.10.0/24" "10.56.151.0/24" "ANY" tunnel vpn "QAP_to_SM" id 96 pair-policy 69 set policy id 76 from "Untrust" to "Trust" "10.10.10.0/24" "172.16.3.0/24" "ANY" tunnel vpn "QAP_to_SM" id 107 pair-policy 75 set policy id 23 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.101.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 23 pair-policy 24 set policy id 29 from "Untrust" to "Global" "Any" "Any" "PING" permit set policy id 31 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.100.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 37 pair-policy 30 set policy id 40 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.106.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 63 pair-policy 41 set policy id 42 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.110.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 64 pair-policy 43 set policy id 35 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.113.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 43 pair-policy 34 set policy id 44 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.114.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 65 pair-policy 45 set policy id 48 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.115.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 67 pair-policy 49 set policy id 46 from "Untrust" to "Trust" "Dial-Up VPN" "10.56.151.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 86 pair-policy 47 set policy id 50 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.151.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 68 pair-policy 51 set policy id 62 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.152.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 84 pair-policy 61 set policy id 60 from "Untrust" to "Trust" "Dial-Up VPN" "192.168.159.0/24" "ANY" tunnel vpn "Example_VPN_Primary" id 83 pair-policy 59 set policy id 73 from "Untrust" to "Trust" "Dial-Up VPN" "10.10.10.0/24" "ANY" nat src tunnel vpn "Example_VPN_Primary" id 105 set vpn "QAP_to_Bellevue" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.100.0/24 "ANY" set vpn "QAP_to_Aggpro" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.113.0/24 "ANY" set vpn "QAP_to_Secon_Juneau" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.114.0/24 "ANY" set vpn "QAP_to_Exclusive" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.115.0/24 "ANY" set vpn "QAP_to_Ketchikan" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.110.0/24 "ANY" set vpn "QAP_to_Emulsion" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.106.0/24 "ANY" set vpn "QAP_to_University" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.151.0/24 "ANY" set vpn "QAP_to_QAP_Cange" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.153.0/24 "ANY" set vpn "QAP_to_Pacific_Asphalt" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.159.0/24 "ANY" set vpn "QAP_to_QAP_Wasilla" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.160.0/24 "ANY" set vpn "QAP_to_Secon_Shop_Juneau" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.161.0/24 "ANY" set vpn "QAP_to_Exclusive_Project1" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.162.0/24 "ANY" set vpn "QAP_to_Secon_Project1" proxy-id local-ip 192.168.101.0/24 remote-ip 192.168.164.0/24 "ANY" set pppoe name "ACS DSL" set pppoe name "ACS DSL" username "anchorageqap@acsalaska.net" password "LGWUDj3cNjV4aXsapQCvx2Tp4knmzGu3/w==" set pppoe name "ACS DSL" idle 0 set pppoe name "ACS DSL" static-ip set pppoe name "ACS DSL" interface ethernet4 unset pppoe name "ACS DSL" update-dhcpserver set pppoe name "ACS DSL" auto-connect 5 set nsmgmt report alarm traffic enable set nsmgmt report alarm attack enable set nsmgmt report alarm other enable set nsmgmt report alarm di enable set nsmgmt report log config enable set nsmgmt report log info enable set nsmgmt report log self enable set nsmgmt report log traffic enable set nsmgmt init id 123 set nsmgmt server primary 192.168.100.11 port 7800 set nsmgmt bulkcli reboot-timeout 60 set nsmgmt hb-interval 20 set nsmgmt hb-threshold 5 set nsmgmt enable set ssh version v2 set ssh enable set config lock timeout 5 set dl-buf size 4718592 set ntp server "0.north-america.pool.ntp.org" set ntp server src-interface "ethernet4" set ntp server backup1 "1.north-america.pool.ntp.org" set ntp server backup1 src-interface "ethernet4" set ntp server backup2 "2.north-america.pool.ntp.org" set ntp server backup2 src-interface "ethernet4" set snmp community "ExampleJuniper" Read-Write Trap-on traffic version v2c set snmp community "PRTGmonitor" Read-Only Trap-on traffic version any set snmp community "FarWest" Read-Only Trap-on traffic version v2c set snmp host "FarWest" 2.3.4.5 255.255.255.255 src-interface ethernet4 trap v2 set snmp host "FarWest" 1.2.3.4 255.255.255.255 src-interface ethernet4 trap v2 set snmp host "PRTGmonitor" 192.168.101.5 255.255.255.255 trap v2 set snmp host "ExampleJuniper" 192.168.100.103 255.255.255.255 src-interface ethernet1 trap v2 set snmp name "COVPN002" set snmp port listen 161 set snmp port trap 162 set vrouter "untrust-vr" exit set vrouter "trust-vr" unset add-default-route set route 192.168.100.0/24 interface tunnel.1 preference 20 set route 192.168.113.0/24 interface tunnel.4 preference 20 set route 192.168.115.0/24 interface tunnel.5 preference 20 set route 192.168.114.0/24 interface tunnel.6 preference 20 set route 172.16.2.0/24 interface tunnel.1 preference 20 set route 192.168.110.0/24 interface tunnel.7 preference 20 set route 192.168.151.0/24 interface tunnel.8 preference 20 set route 192.168.106.0/24 interface tunnel.2 preference 20 set route 192.168.153.0/24 interface tunnel.9 preference 20 set route 10.10.10.0/24 interface ethernet4 preference 20 set route 192.168.158.0/24 interface tunnel.4 preference 20 set route 192.168.152.0/24 interface tunnel.5 preference 20 set route 192.168.154.0/24 interface tunnel.5 preference 20 set route 192.168.156.0/24 interface tunnel.5 preference 20 set route 192.168.155.0/24 interface tunnel.5 preference 20 set route 192.168.159.0/24 interface tunnel.10 preference 20 set route 192.168.160.0/24 interface tunnel.11 preference 20 set route 10.10.10.0/24 interface tunnel.1 preference 40 set route 192.168.161.0/24 interface tunnel.12 preference 20 set route 192.168.162.0/24 interface tunnel.13 preference 20 set route 192.168.164.0/24 interface tunnel.14 preference 20 set route 10.56.151.0/24 interface ethernet2 gateway 192.168.179.3 preference 20 set route 192.168.163.0/24 interface tunnel.5 preference 20 exit set vrouter "untrust-vr" exit set vrouter "trust-vr" exit