show configuration | display set set version 12.1X46-D40.2 set groups node0 system host-name F1-LNSIMSPTC-00 set groups node0 system backup-router XXXX set groups node0 system backup-router destination XXXX set groups node0 system authentication-order tacplus set groups node0 system authentication-order password set groups node0 system tacplus-server XXXX port 49 set groups node0 system tacplus-server XXXX secret XXXX set groups node0 system tacplus-server XXXX timeout 20 set groups node0 system tacplus-server XXXX source-address XXXX set groups node0 system accounting events login set groups node0 system accounting events change-log set groups node0 system accounting events interactive-commands set groups node0 system accounting destination tacplus server XXXX secret XXXX set groups node0 system accounting destination tacplus server XXXX source-address XXXX set groups node0 system services ssh protocol-version v2 set groups node0 system services netconf ssh set groups node0 system services outbound-ssh client nsm device-id 320C86 set groups node0 system services outbound-ssh client nsm secret XXXX set groups node0 system services outbound-ssh client nsm services netconf set groups node0 system services outbound-ssh client nsm XXXX port 7804 set groups node0 system services outbound-ssh client nsm XXXX port 7804 set groups node0 system syslog file default-log-messages any any set groups node0 system syslog file default-log-messages structured-data set groups node0 interfaces fxp0 unit 0 family inet address 155.16.250.196/29 set groups node0 snmp description "NSM Leveraged Firewall" set groups node0 snmp client-list XXXX set groups node0 snmp client-list XXXX set groups node0 snmp community "Im5r0!" authorization read-only set groups node1 system host-name f1-lnsimsptc-01 set groups node1 system backup-router XXXX set groups node1 system backup-router destination XXXX set groups node1 system authentication-order tacplus set groups node1 system authentication-order password set groups node1 system tacplus-server XXXX port 49 set groups node1 system tacplus-server XXXX secret XXXX set groups node1 system tacplus-server XXXX source-address XXXX set groups node1 system accounting events login set groups node1 system accounting events change-log set groups node1 system accounting events interactive-commands set groups node1 system accounting destination tacplus server XXXX secret XXXX set groups node1 system accounting destination tacplus server XXXX source-address XXXX set groups node1 system services outbound-ssh client nsm device-id 51E433 set groups node1 system services outbound-ssh client nsm secret XXXX set groups node1 system services outbound-ssh client nsm services netconf set groups node1 system services outbound-ssh client nsm XXXX port 7804 set groups node1 system services outbound-ssh client nsm XXXX port 7804 set groups node1 system syslog file default-log-messages any any set groups node1 system syslog file default-log-messages structured-data set groups node1 interfaces fxp0 unit 0 family inet address XXXX set groups node1 snmp community "Im5r0!" authorization read-only set groups node1 snmp trap-options source-address XXXX deactivate groups node1 snmp trap-options set groups node1 snmp trap-group jnpr version v2 set groups node1 snmp trap-group jnpr categories chassis set groups node1 snmp trap-group jnpr categories link set groups node1 snmp trap-group jnpr categories routing set groups node1 snmp trap-group jnpr categories configuration set groups node1 snmp trap-group jnpr targets XXXX deactivate groups node1 snmp trap-group jnpr set groups cli set groups node9 set apply-groups "${node}" set system time-zone CST6CDT set system root-authentication encrypted-password XXXX set system name-server XXXX set system name-server XXXX set system login message "This computer network and its associated computer resources is privately owned and operated, and access is restricted to authorized personnel. Unauthorized access to this computer network is prohibited by applicable criminal law, and is punishable by fines, imprisonment or both. In addition, substantial civil penalties may be imposed for unauthorized access." set system login class LOGIN idle-timeout 10 set system login class LOGIN permissions all set system login user XXXX uid 2002 set system login user XXXX class LOGIN set system login user XXXX authentication encrypted-password XXXX set system login user XXXX uid 2003 set system login user XXXX class LOGIN set system login user XXXX authentication encrypted-password XXXX set system login user remote uid 2001 set system login user remote class LOGIN set system services ssh protocol-version v2 set system services telnet set system services xnm-clear-text set system services web-management http interface vlan.0 set system services web-management http interface fxp0.0 set system services web-management https system-generated-certificate set system services web-management https interface vlan.0 set system syslog archive size 100k set system syslog archive files 3 set system syslog user * any emergency set system syslog host XXXX any any set system syslog host XXXX port 1029 set system syslog file messages any critical set system syslog file messages authorization info set system syslog file interactive-commands interactive-commands error set system syslog source-address 165.136.227.20 set system max-configurations-on-flash 5 set system max-configuration-rollbacks 5 set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval set system ntp server XXXX set chassis cluster reth-count 4 set chassis cluster redundancy-group 0 node 0 priority 100 set chassis cluster redundancy-group 0 node 1 priority 1 set chassis cluster redundancy-group 1 node 0 priority 100 set chassis cluster redundancy-group 1 node 1 priority 1 set chassis cluster redundancy-group 1 interface-monitor ge-0/0/3 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-5/0/3 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-0/0/4 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-5/0/4 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-0/0/5 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-5/0/5 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-0/0/6 weight 255 set chassis cluster redundancy-group 1 interface-monitor ge-5/0/6 weight 255 set interfaces traceoptions file IFACES.txt set interfaces traceoptions file size 1m set interfaces traceoptions file files 5 set interfaces traceoptions file world-readable set interfaces traceoptions file match icmp deactivate interfaces traceoptions set interfaces ge-0/0/3 description toMDMZ set interfaces ge-0/0/3 speed 100m set interfaces ge-0/0/3 link-mode full-duplex set interfaces ge-0/0/3 gigether-options no-auto-negotiation set interfaces ge-0/0/3 gigether-options redundant-parent reth0 set interfaces ge-0/0/4 description toInternet set interfaces ge-0/0/4 gigether-options redundant-parent reth1 set interfaces ge-0/0/5 description toDMZ set interfaces ge-0/0/5 speed 100m set interfaces ge-0/0/5 link-mode full-duplex set interfaces ge-0/0/5 gigether-options no-auto-negotiation set interfaces ge-0/0/5 gigether-options redundant-parent reth2 set interfaces ge-0/0/6 description to7/11 set interfaces ge-0/0/6 speed 1g set interfaces ge-0/0/6 link-mode full-duplex set interfaces ge-0/0/6 gigether-options redundant-parent reth3 set interfaces ge-0/0/7 description "PTC Vcloud CDV switch port ge-1/0/22" set interfaces ge-0/0/8 unit 0 set interfaces ge-0/0/9 unit 0 set interfaces ge-0/0/10 unit 0 set interfaces ge-0/0/11 unit 0 set interfaces ge-0/0/12 unit 0 set interfaces ge-0/0/13 unit 0 set interfaces ge-0/0/14 unit 0 set interfaces ge-0/0/15 unit 0 set interfaces ge-5/0/3 description toMDMZ set interfaces ge-5/0/3 speed 100m set interfaces ge-5/0/3 link-mode full-duplex set interfaces ge-5/0/3 gigether-options no-auto-negotiation set interfaces ge-5/0/3 gigether-options redundant-parent reth0 set interfaces ge-5/0/4 description toInternet set interfaces ge-5/0/4 gigether-options redundant-parent reth1 set interfaces ge-5/0/5 description toDMZ set interfaces ge-5/0/5 speed 100m set interfaces ge-5/0/5 link-mode full-duplex set interfaces ge-5/0/5 gigether-options no-auto-negotiation set interfaces ge-5/0/5 gigether-options redundant-parent reth2 set interfaces ge-5/0/6 description to7/11 set interfaces ge-5/0/6 speed 1g set interfaces ge-5/0/6 link-mode full-duplex set interfaces ge-5/0/6 gigether-options redundant-parent reth3 set interfaces ge-5/0/7 description "PTC Vcloud CDV switch port ge-1/0/22" set interfaces fab0 fabric-options member-interfaces ge-0/0/2 set interfaces fab1 fabric-options member-interfaces ge-5/0/2 set interfaces reth0 description VIP_to_MDMZ set interfaces reth0 redundant-ether-options redundancy-group 1 set interfaces reth0 unit 0 family inet address XXXX set interfaces reth1 description VIP_to_Internet set interfaces reth1 redundant-ether-options redundancy-group 1 set interfaces reth1 unit 0 family inet address XXXX set interfaces reth2 description VIP_to_DMZ set interfaces reth2 redundant-ether-options redundancy-group 1 set interfaces reth2 unit 0 family inet address XXXX set interfaces reth3 description VIP_to_7/11 set interfaces reth3 redundant-ether-options redundancy-group 1 set interfaces reth3 unit 0 family inet address XXXX set interfaces st0 unit 0 set interfaces st0 unit 1 set forwarding-options sampling input rate 1 set forwarding-options sampling family inet output file filename test-japan deactivate forwarding-options sampling set snmp client-list XXXX set snmp client-list XXXX set snmp client-list Read-Only XXXX set snmp client-list Read-Only XXXX set snmp community "Im5r0!" authorization read-only set snmp community "Im5r0!" client-list-name Read-Only set snmp trap-options set snmp trap-group jnpr version v2 set snmp trap-group jnpr categories chassis set snmp trap-group jnpr categories configuration set snmp trap-group jnpr categories chassis-cluster set snmp trap-group jnpr targets 155.16.59.232 set snmp traceoptions file snmp_trace set snmp traceoptions flag all deactivate snmp traceoptions deactivate snmp set routing-options static route set routing-options static route set protocols stp set security log mode event set security log event-rate 100 set security log format syslog set security log source-address XXXX set security log stream 7-11-logs format sd-syslog set security log stream 7-11-logs category all set security log stream 7-11-logs host xxxxx set security log stream 7-11-logs host port 1029 set security flow traceoptions file ping set security flow traceoptions flag basic-datapath set security flow traceoptions packet-filter 1 source-port 7804 set security flow traceoptions packet-filter 2 destination-port 7804 set security flow traceoptions packet-filter 3 source-prefix XXXX set security flow traceoptions packet-filter 4 destination-prefix deactivate security flow traceoptions set security flow tcp-mss ipsec-vpn mss 1350 set security nat source pool 7-11-DMZ-NAT address XXXX to XXXXX set security nat source rule-set 7-11 from zone trust set security nat source rule-set 7-11 to zone DMZ set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 172.23.0.0/17 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 172.31.180.0/24 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 172.28.48.0/22 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 172.28.4.0/24 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 192.168.0.11/32 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 10.132.192.0/20 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 172.22.64.0/21 set security nat source rule-set 7-11 rule 7-11-RULE-1 match source-address 172.28.0.0/15 set security nat source rule-set 7-11 rule 7-11-RULE-1 match destination-address set security nat source rule-set 7-11 rule 7-11-RULE-1 then source-nat pool 7-11-DMZ-NAT set security nat source rule-set 7-11 rule 7-11-RULE-2 match source-address 172.16.15.0/24 set security nat source rule-set 7-11 rule 7-11-RULE-2 match source-address 172.16.16.0/20 set security nat source rule-set 7-11 rule 7-11-RULE-2 match source-address set security nat source rule-set 7-11 rule 7-11-RULE-2 match source-address 172.16.32.0/19 set security nat source rule-set 7-11 rule 7-11-RULE-2 match source-address 172.16.64.0/19 set security nat source rule-set 7-11 rule 7-11-RULE-2 match destination-address set security nat source rule-set 7-11 rule 7-11-RULE-2 then source-nat pool 7-11-DMZ-NAT set security nat proxy-arp interface reth3.0 address XXXXX to XXXX set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match source-address any set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match destination-address 7-11-TO-FW set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match application junos-ping set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match application junos-telnet set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match application junos-ssh set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match application junos-http set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST match application junos-https set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST then permit set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST then log session-init set security policies from-zone DMZ to-zone trust policy DMZ-TO-TRUST then log session-close set security policies from-zone trust to-zone DMZ policy TRUST-TO-DMZ match source-address 7-11-SUBNETS set security policies from-zone trust to-zone DMZ policy TRUST-TO-DMZ match destination-address 7-11-DMZ-SERVERS set security policies from-zone trust to-zone DMZ policy TRUST-TO-DMZ match application 7-11-APPS set security policies from-zone trust to-zone DMZ policy TRUST-TO-DMZ then permit set security policies from-zone trust to-zone DMZ policy TRUST-TO-DMZ then log session-init set security policies from-zone trust to-zone DMZ policy TRUST-TO-DMZ then log session-close set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ match source-address ErnstYoung set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ match destination-address DFW-DB-07 set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ match application junos-http set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ match application junos-https set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ then permit set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ then log session-init set security policies from-zone trust to-zone DMZ policy EY-TO-DMZ then log session-close set security policies from-zone trust to-zone MDMZ policy 7-11-TRUST-TO-MDMZ match source-address 7-11-DEVICES set security policies from-zone trust to-zone MDMZ policy 7-11-TRUST-TO-MDMZ match destination-address MDMZ-MON-SERVERS set security policies from-zone trust to-zone MDMZ policy 7-11-TRUST-TO-MDMZ match application any set security policies from-zone trust to-zone MDMZ policy 7-11-TRUST-TO-MDMZ then permit set security policies from-zone trust to-zone MDMZ policy 7-11-TRUST-TO-MDMZ then log session-init set security policies from-zone trust to-zone MDMZ policy 7-11-TRUST-TO-MDMZ then log session-close set security policies from-zone MDMZ to-zone trust policy 7-11-MDMZ-TO-TRUST match source-address MDMZ-MON-SERVERS set security policies from-zone MDMZ to-zone trust policy 7-11-MDMZ-TO-TRUST match destination-address 7-11-DEVICES set security policies from-zone MDMZ to-zone trust policy 7-11-MDMZ-TO-TRUST match application any set security policies from-zone MDMZ to-zone trust policy 7-11-MDMZ-TO-TRUST then permit set security policies from-zone MDMZ to-zone trust policy 7-11-MDMZ-TO-TRUST then log session-init set security policies from-zone MDMZ to-zone trust policy 7-11-MDMZ-TO-TRUST then log session-close set security zones security-zone untrust address-book address Dell-Japan-network 61.123.128.222/32 set security zones security-zone untrust host-inbound-traffic system-services ping set security zones security-zone untrust host-inbound-traffic system-services ike set security zones security-zone untrust interfaces reth1.0 set security zones security-zone untrust interfaces st0.0 host-inbound-traffic system-services all set security zones security-zone untrust interfaces st0.1 host-inbound-traffic system-services all set security zones security-zone trust address-book address 7-11-SUBNET-1 172.28.0.0/15 set security zones security-zone trust address-book address 7-11-SUBNET-2 172.31.180.0/24 set security zones security-zone trust address-book address 7-11-SUBNET-3 172.28.48.0/22 set security zones security-zone trust address-book address 7-11-SUBNET-5 172.28.4.0/24 set security zones security-zone trust address-book address R1-LNS7-11PTC-DALLAS 192.168.0.11/32 set security zones security-zone trust address-book address R2-LNS7-11PTC-ALLEN 192.168.0.12/32 set security zones security-zone trust address-book address R1-LNS7-11ALLEN-PTC 192.168.0.14/32 set security zones security-zone trust address-book address R1-LNS7-11DALLAS-PTC 192.168.0.13/32 set security zones security-zone trust address-book address S2-LNS7-11LAN-PTC 192.168.0.10/32 set security zones security-zone trust address-book address S1-LNS7-11LAN-PTC 192.168.0.9/32 set security zones security-zone trust address-book address TEST-LOOPBACK 192.168.0.11/32 set security zones security-zone trust address-book address 7-11-TO-FW 165.136.63.88/29 set security zones security-zone trust address-book address S1-LNS7-11PTC-2 192.168.0.5/32 set security zones security-zone trust address-book address S2-LNS7-11PTC-2 192.168.0.6/32 set security zones security-zone trust address-book address 7-11-SUBNET-6 10.132.192.0/20 set security zones security-zone trust address-book address 7-11-SUBNET-7 172.22.64.0/21 set security zones security-zone trust address-book address 7-11-SUBNET-8 172.16.15.0/24 set security zones security-zone trust address-book address 7-11-SUBNET-9 172.16.16.0/20 set security zones security-zone trust address-book address 7-11-SUBNET-4 172.28.0.0/16 set security zones security-zone trust address-book address 7-11-SUBNET-10 172.23.0.0/17 set security zones security-zone trust address-book address 7-11-SUBNET-11 172.29.0.0/16 set security zones security-zone trust address-book address 7-11-SUBNET-12 172.16.32.0/19 set security zones security-zone trust address-book address 7-11-SUBNET-13 172.16.64.0/19 set security zones security-zone trust address-book address-set 7-11-DEVICES address R1-LNS7-11PTC-DALLAS set security zones security-zone trust address-book address-set 7-11-DEVICES address R1-LNS7-11ALLEN-PTC set security zones security-zone trust address-book address-set 7-11-DEVICES address R2-LNS7-11PTC-ALLEN set security zones security-zone trust address-book address-set 7-11-DEVICES address S1-LNS7-11LAN-PTC set security zones security-zone trust address-book address-set 7-11-DEVICES address S2-LNS7-11LAN-PTC set security zones security-zone trust address-book address-set 7-11-DEVICES address R1-LNS7-11DALLAS-PTC set security zones security-zone trust address-book address-set 7-11-DEVICES address S1-LNS7-11PTC-2 set security zones security-zone trust address-book address-set 7-11-DEVICES address S2-LNS7-11PTC-2 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-1 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-2 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-3 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-4 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-5 set security zones security-zone trust address-book address-set 7-11-SUBNETS address TEST-LOOPBACK set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-6 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-7 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-8 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-9 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-10 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-11 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-12 set security zones security-zone trust address-book address-set 7-11-SUBNETS address 7-11-SUBNET-13 set security zones security-zone trust host-inbound-traffic system-services ssh set security zones security-zone trust host-inbound-traffic system-services snmp set security zones security-zone trust host-inbound-traffic system-services ping set security zones security-zone trust host-inbound-traffic system-services https set security zones security-zone trust host-inbound-traffic protocols all set security zones security-zone trust interfaces reth3.0 set security zones security-zone DMZ address-book address DFW-DB-07 XXXXXXXX set security zones security-zone DMZ address-book address DFW-MFR-130 set security zones security-zone DMZ address-book address DFW-MFR-131 XXXXX set security zones security-zone DMZ address-book address-set 7-11-DMZ-SERVERS address DFW-DB-07 set security zones security-zone DMZ address-book address-set 7-11-DMZ-SERVERS address DFW-MFR-130 set security zones security-zone DMZ address-book address-set 7-11-DMZ-SERVERS address DFW-MFR-131 set security zones security-zone DMZ address-book address-set 7-11-DMZ-SERVERS address DFW-MFR-132 set security zones security-zone DMZ address-book address-set 7-11-DMZ-SERVERS address DFW-MFR-133 set security zones security-zone DMZ address-book address-set 7-11-DMZ-SERVERS address set security zones security-zone DMZ host-inbound-traffic system-services ping set security zones security-zone DMZ host-inbound-traffic system-services ssh set security zones security-zone DMZ host-inbound-traffic system-services traceroute set security zones security-zone DMZ interfaces reth2.0 set security zones security-zone MDMZ address-book address VOYENCE-MDMZ 155.17.66.228/32 set security zones security-zone MDMZ address-book address ENMDMZ00 set security zones security-zone MDMZ address-book address PSC-NW set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address ENMDMZ00 set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address ENMDMZ01 set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address ENMDMZ02 set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address ENMDMZ03 set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address VOYENCE-MDMZ set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address MDMZ-NIC set security zones security-zone MDMZ address-book address-set MDMZ-MON-SERVERS address PSC-NW set security zones security-zone MDMZ host-inbound-traffic system-services ping set security zones security-zone MDMZ host-inbound-traffic system-services ssh set security zones security-zone MDMZ interfaces reth0.0 set firewall family inet filter one-ip term get-ip from source-address set firewall family inet filter one-ip term get-ip then sample set firewall family inet filter one-ip term get-ip then accept deactivate firewall family inet filter one-ip set firewall filter filter1 term t1 from destination-address 10.91.26.10/32 set firewall filter filter1 term t1 from protocol icmp set firewall filter filter1 term t1 then count counter1 set firewall filter filter1 term t1 then accept set firewall filter filter1 term t2 from source-address 10.91.26.10/32 set firewall filter filter1 term t2 from protocol icmp set firewall filter filter1 term t2 then count counter2 set firewall filter filter1 term t2 then accept set firewall filter filter1 term default then accept deactivate firewall filter filter1 set applications application 7-11-CITRIX-1 protocol tcp set applications application 7-11-CITRIX-1 destination-port 1494 set applications application 7-11-CITRIX-2 protocol tcp set applications application 7-11-CITRIX-2 destination-port 2598 set applications application Dell-Japan-1 protocol tcp set applications application Dell-Japan-1 destination-port 1828 set applications application Dell-Japan-2 protocol tcp set applications application Dell-Japan-2 destination-port 3389 set applications application RSM2SIP-https protocol tcp set applications application RSM2SIP-https destination-port 443 set applications application RSM2EvntConsl-1828 protocol tcp set applications application RSM2EvntConsl-1828 destination-port 1828 set applications application EvntConsl2RSM-135 protocol tcp set applications application EvntConsl2RSM-135 destination-port 135 set applications application EvntConsl2RSM-139 protocol tcp set applications application EvntConsl2RSM-139 destination-port 139 set applications application EvntConsl2RSM-445 protocol tcp set applications application EvntConsl2RSM-445 destination-port 445 set applications application EvntConsl2RSM-3389 protocol tcp set applications application EvntConsl2RSM-3389 destination-port 3389 set applications application EvntConsl2RSM-137 protocol udp set applications application EvntConsl2RSM-137 destination-port 137 set applications application EvntConsl2RSM-138 protocol udp set applications application EvntConsl2RSM-138 destination-port 138 set applications application EvntConsl2RSM-dyn protocol udp set applications application EvntConsl2RSM-dyn destination-port 49152-65535 set applications application RSM2SIP-http protocol tcp set applications application RSM2SIP-http destination-port 80 set applications application-set 7-11-APPS application junos-http set applications application-set 7-11-APPS application junos-https set applications application-set 7-11-APPS application 7-11-CITRIX-1 set applications application-set 7-11-APPS application 7-11-CITRIX-2 set applications application-set 7-11-APPS application junos-icmp-all set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-135 set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-139 set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-445 set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-3389 set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-137 set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-138 set applications application-set EvntCnsl2RSM-set application EvntConsl2RSM-dyn set applications application-set EvntCnsl2RSM-set application junos-icmp-all set applications application-set RSM2EvntCnsl-set application junos-icmp-all set applications application-set RSM2EvntCnsl-set application RSM2EvntConsl-1828 set applications application-set RSM2SIP-set application RSM2SIP-http set applications application-set RSM2SIP-set application RSM2SIP-https set applications application-set RSM2SIP-set application junos-icmp-all {primary:node0} sharad.pandey@F1-LNSIMSPTC-00> exit