[edit security ike] set security ike traceoptions flag all deactivate security ike traceoptions set security ike policy ike-dyn-vpn-policy mode aggressive set security ike policy ike-dyn-vpn-policy proposal-set standard set security ike policy ike-dyn-vpn-policy pre-shared-key ascii-text "$9$J6Uqf5Qnp0I5Q/tO1yrevW87VJZjPfzVw" set security ike gateway dyn-vpn-local-gw ike-policy ike-dyn-vpn-policy set security ike gateway dyn-vpn-local-gw dynamic hostname dynvpn set security ike gateway dyn-vpn-local-gw dynamic connections-limit 2 set security ike gateway dyn-vpn-local-gw dynamic ike-user-type group-ike-id set security ike gateway dyn-vpn-local-gw external-interface ge-0/0/0.0 set security ike gateway dyn-vpn-local-gw xauth access-profile dyn-vpn-access-profile [edit security ipsec] set security ipsec policy ipsec-dyn-vpn-policy proposal-set standard set security ipsec vpn dyn-vpn ike gateway dyn-vpn-local-gw set security ipsec vpn dyn-vpn ike ipsec-policy ipsec-dyn-vpn-policy [edit security policies from-zone Untrust to-zone Zone-A] set security policies from-zone Untrust to-zone Zone-A policy dyn-vpn-policy match source-address any set security policies from-zone Untrust to-zone Zone-A policy dyn-vpn-policy match destination-address 192.168.10.0 set security policies from-zone Untrust to-zone Zone-A policy dyn-vpn-policy match application any set security policies from-zone Untrust to-zone Zone-A policy dyn-vpn-policy then permit tunnel ipsec-vpn dyn-vpn [edit security policies from-zone Untrust to-zone Zone-B] set security policies from-zone Untrust to-zone Zone-B policy dyn-vpn-policy match source-address any set security policies from-zone Untrust to-zone Zone-B policy dyn-vpn-policy match destination-address 192.168.22.0 set security policies from-zone Untrust to-zone Zone-B policy dyn-vpn-policy match application any set security policies from-zone Untrust to-zone Zone-B policy dyn-vpn-policy then permit tunnel ipsec-vpn dyn-vpn [edit security dynamic-vpn] set security dynamic-vpn access-profile dyn-vpn-access-profile set security dynamic-vpn clients all remote-protected-resources 192.168.10.0/24 set security dynamic-vpn clients all remote-protected-resources 192.168.22.0/24 set security dynamic-vpn clients all remote-exceptions 0.0.0.0/0 set security dynamic-vpn clients all ipsec-vpn dyn-vpn set security dynamic-vpn clients all user vpnclient1 set security dynamic-vpn clients all user vpnclient2