sadm@SRX240# show ## Last changed: 2013-03-01 11:58:07 EST version 12.1R4.7; system { host-name SRX240; time-zone America/New_York; root-authentication { encrypted-password "$1$mQJoy9ct$vzCP8yKE52qA4qy1APIU81"; ## SECRET-DATA } name-server { 208.67.222.222; 208.67.220.220; 8.8.8.8; } login { user sadm { uid 2001; class super-user; authentication { encrypted-password "$1$GJVGyVHD$OKjdUVBBylghMnta6e3yp."; ## SECRET-DATA } } } services { ssh; telnet; xnm-clear-text; web-management { http { interface vlan.0; } https { system-generated-certificate; interface [ vlan.0 ge-0/0/15.0 ]; } } dhcp { router { 192.168.1.1; } pool 192.168.1.0/24 { address-range low 192.168.1.2 high 192.168.1.254; } propagate-settings ge-0/0/0.0; } } syslog { archive size 100k files 3; user * { any emergency; } host 10.102.100.17 { any any; match RT_FLOW_SESSION; facility-override local4; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } ntp { server 203.221.91.147; server 82.113.154.206; server 142.3.100.15; server 65.197.254.7 prefer; server 193.11.166.2 prefer; } } interfaces { ge-0/0/0 { unit 0; } ge-0/0/1 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/2 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/3 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/4 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/5 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/6 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/7 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/8 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/9 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/10 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/11 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/12 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/13 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/14 { unit 0 { family inet { filter { input Blah; } sampling { input; output; } address 172.19.22.1/24; } } } ge-0/0/15 { unit 0 { family inet { address 10.102.100.115/23; } } } vlan { unit 0 { family inet { address 192.168.1.1/24; } } } } forwarding-options { packet-capture { file filename Blah size 1k; maximum-capture-size 1500; } } routing-options { static { route 0.0.0.0/0 next-hop 10.102.100.1; } } protocols { stp; } security { ike { traceoptions { flag ike; } proposal Phase1-Proposal { authentication-method pre-shared-keys; dh-group group2; authentication-algorithm sha1; encryption-algorithm aes-128-cbc; } policy IKE_Policy { proposals Phase1-Proposal; pre-shared-key ascii-text "$9$MuuLXNUDkQz6.P1hSyKvoJZj.Pz36pO1"; ## SECRET-DATA } gateway bharat-gw { ike-policy IKE_Policy; address 10.102.101.164; external-interface ge-0/0/15.0; } } ipsec { proposal Phase2-Proposal { protocol esp; authentication-algorithm hmac-sha1-96; encryption-algorithm 3des-cbc; lifetime-seconds 3600; } policy IPSEC-Policy { proposals Phase2-Proposal; } vpn IPSEC-Tunnel-To-Bharat { ike { gateway bharat-gw; proxy-identity { local 1.1.1.1/32; remote 2.2.2.2/32; } ipsec-policy IPSEC-Policy; } } } flow { traceoptions { file vpn-debug size 1m files 2; flag basic-datapath; flag packet-drops; packet-filter filter2 { protocol esp; source-prefix 10.102.100.137/32; destination-prefix 10.102.100.115/32; } packet-filter filter1 { protocol esp; source-prefix 10.102.100.115/32; destination-prefix 10.102.100.137/32; } packet-filter filter3 { protocol icmp; } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } nat { source { pool A { address { 10.102.101.219/32; } } } proxy-arp { interface ge-0/0/15.0 { address { 10.102.101.219/32; 10.102.101.220/32; } } } } policies { from-zone trust to-zone untrust { policy outbound { match { source-address internal_host; destination-address Bharat-internal-host; application any; } then { permit { tunnel { ipsec-vpn IPSEC-Tunnel-To-Bharat; } } log { session-init; session-close; } } } policy outbound-1 { match { source-address internal_net; destination-address any-ipv4; application any; } then { permit; log { session-init; session-close; } } } } from-zone untrust to-zone trust { policy inbound-top { match { source-address Bharat-internal-host; destination-address internal_host; application any; } then { permit { tunnel { ipsec-vpn IPSEC-Tunnel-To-Bharat; } } log { session-init; session-close; } } } policy inbound { match { source-address any-ipv4; destination-address internal_host; application any; } then { permit; log { session-init; session-close; } } } } } zones { security-zone trust { address-book { address internal_net 172.19.22.0/24; address internal_host 172.19.22.5/32; address static-translated-ip 10.102.101.220/32; } host-inbound-traffic { system-services { all; } protocols { all; } } interfaces { vlan.0; ge-0/0/14.0; } } security-zone untrust { address-book { address Bharat-internal-net 172.19.20.0/24; address Bharat-internal-host 192.168.200.5/32; } screen untrust-screen; host-inbound-traffic { system-services { ssh; https; } } interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { tftp; dhcp; } } } ge-0/0/15.0; } } } } firewall { filter Blah { term capture { from { source-address { 172.19.22.5/32; } destination-address { 192.168.200.5/32; } } then accept; } term allow-all-other-traffic { then accept; } } } applications { application tcp2222 { protocol tcp; destination-port 2222; } } vlans { vlan-trust { vlan-id 3; l3-interface vlan.0; } } [edit]