show configuration ## Last commit: 2010-11-29 19:13:02 PST by root version 10.2R3.10; system { host-name SRX210; time-zone America/Los_Angeles; root-authentication { encrypted-password "$1$bBFzjMlb$LDe4IvlglPZFKc7bH1K999"; ## SECRET-DATA } name-server { 8.8.8.8; 8.8.4.4; } services { ssh; web-management { traceoptions { flag all; } https { system-generated-certificate; interface [ ge-0/0/1.0 vlan.0 ]; } session { session-limit 4; } } dhcp { domain-name testlab.local; name-server { 8.8.8.8; 8.8.4.4; } server-identifier xx.xxx.xx.xxx; pool 192.168.1.0/24 { address-range low 192.168.1.10 high 192.168.1.50; default-lease-time 7200; domain-name testlab.local; name-server { 8.8.8.8; 8.8.4.4; } router { 192.168.1.1; } propagate-settings vlan.0; } } } syslog { archive size 100k files 3; user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } ntp { server 63.240.161.99; server 216.45.57.38; } } interfaces { interface-range interfaces-trust { member fe-0/0/3; member fe-0/0/4; member fe-0/0/5; member fe-0/0/6; unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/0 { unit 0 { family inet { dhcp; } } } ip-0/0/0 { unit 0 { tunnel { source xx.xxx.xxx.xx; destination xx.xx.xxx.xx; } family inet6 { address xxxx:xxx:xxxx:xxxx::2/64; } } } ge-0/0/1 { unit 0 { family inet { dhcp; } } } fe-0/0/2 { unit 0 { family inet { dhcp; } } } lo0 { unit 0 { family inet { address 192.168.2.1/32; } } } vlan { unit 0 { family inet { address 192.168.1.1/24; } family inet6 { address xxxx:xxx:xxx:xxxx::3/64; } } } } routing-options { rib inet6.0 { static { route ::/0 next-hop xxxx:xxxx:xxxx:xxxx::1; } } } protocols { router-advertisement { interface vlan.0 { max-advertisement-interval 5; min-advertisement-interval 3; managed-configuration; prefix xxxx:xxxx:xxxx:xxxx::/64 { on-link; autonomous; } } } } security { ike { proposal p1-prop { authentication-method pre-shared-keys; dh-group group2; authentication-algorithm sha1; encryption-algorithm aes-128-cbc; } policy ike-pol { mode aggressive; proposals p1-prop; pre-shared-key ascii-text "$9$e1Vv87aJDP5Fk.Qn/AIRxNdb4Z"; ## SECRET-DATA } gateway dyn-gw-home { ike-policy ike-pol; dynamic hostname srx210; external-interface ge-0/0/1.0; xauth access-profile radius-server; } } ipsec { proposal p2-prop { protocol esp; authentication-algorithm hmac-sha1-96; encryption-algorithm 3des-cbc; } policy ipsec-pol { perfect-forward-secrecy { keys group2; } proposals p2-prop; } vpn dynamic-vpn-home { ike { gateway dyn-gw-home; ipsec-policy ipsec-pol; } } } nat { source { rule-set snat-trust-untrust { from zone trust; to zone untrust; rule S-Rule { match { source-address 0.0.0.0/0; destination-address 0.0.0.0/0; } then { source-nat { interface; } } } } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } zones { security-zone trust { address-book { address 192.168.1.11 192.168.1.11/32; address 192.168.1.12 192.168.1.12/32; } host-inbound-traffic { system-services { all; } protocols { all; } } interfaces { vlan.0 { host-inbound-traffic { system-services { ping; https; dhcp; ssh; } } } lo0.0 { host-inbound-traffic { system-services { all; } } } } } security-zone untrust { screen untrust-screen; host-inbound-traffic { system-services { ping; } } interfaces { fe-0/0/2.0 { host-inbound-traffic { system-services { dhcp; } } } ge-0/0/0.0 { host-inbound-traffic { system-services { dhcp; } } } ge-0/0/1.0 { host-inbound-traffic { system-services { dhcp; ping; ike; } } } ip-0/0/0.0; } } security-zone u; } policies { from-zone trust to-zone untrust { policy trust-to-untrust { match { source-address any; destination-address any; application any; } then { permit; log { session-init; session-close; } count; } } } from-zone untrust to-zone trust { policy vpn-test { match { source-address any; destination-address any; application any; } then { permit { tunnel { ipsec-vpn dynamic-vpn-home; } } } } } from-zone trust to-zone trust { policy trust-trust { match { source-address any; destination-address any; application any; } then { permit; } } } } alg { msrpc disable; sunrpc disable; real disable; rsh disable; rtsp disable; sql disable; talk disable; pptp disable; } dynamic-vpn { access-profile user-auth-profile; clients { test-client { remote-protected-resources { 192.168.1.0/24; } ipsec-vpn dynamic-vpn-home; user { test-user; } } } } } access { profile user-auth-profile { client test-user { firewall-user { password "$9$x9WNb2ji.QF/jHpBIRle"; ## SECRET-DATA } } } profile radius-server { authentication-order radius; radius-server { 192.168.1.2 secret "$9$8HsLVY"; ## SECRET-DATA } } firewall-authentication { web-authentication { default-profile user-auth-profile; } } } vlans { vlan-trust { vlan-id 2; l3-interface vlan.0; } } root@SRX210>