## Last changed: 2012-07-16 17:20:46 MSK version 12.1R2.9; system { host-name jun240_SRX_SZESS_lab; time-zone Europe/Moscow; root-authentication { encrypted-password ""; ## SECRET-DATA } name-server { 208.67.222.222; 208.67.220.220; 8.8.8.8; 194.105.193.35; } services { ssh; telnet; xnm-clear-text; web-management { http { interface vlan.0; } https { system-generated-certificate; interface vlan.0; } } dhcp { router { 10.55.55.1; } pool 10.55.55.0/24 { address-range low 10.55.55.2 high 10.55.55.254; } propagate-settings vlan.0; } } syslog { archive size 100k files 3; user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; ## ## Warning: statement ignored: unsupported platform (srx240b) ## max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } ntp { server 199.165.76.11 prefer; } } interfaces { ge-0/0/0 { unit 0 { family inet { address 194.105.214.2/30; } } } ge-0/0/1 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/2 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/3 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/4 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/5 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/6 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/7 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/8 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/9 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/10 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/11 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/12 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/13 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/14 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } ge-0/0/15 { unit 0 { family ethernet-switching { vlan { members vlan-trust; } } } } vlan { unit 0 { family inet { address 10.55.55.1/24; } } } } routing-options { static { route 0.0.0.0/0 next-hop 194.105.214.3; } } protocols { stp; } security { ike { proposal ike-proposal-test { authentication-method pre-shared-keys; dh-group group2; authentication-algorithm md5; encryption-algorithm 3des-cbc; lifetime-seconds 2400; } policy ike-policy-test { mode main; description ike-policy-for-trest; proposals ike-proposal-test; pre-shared-key ascii-text "key"; ## SECRET-DATA } gateway ike-gate-test { ike-policy ike-policy-test; address 194.186.155.8; external-interface ge-0/0/0.0; } } ipsec { proposal ipsec-proposal-test { protocol esp; authentication-algorithm hmac-sha1-96; encryption-algorithm 3des-cbc; lifetime-seconds 28800; } policy ipsec-policy-test { proposals ipsec-proposal-test; } vpn ipsec-vpn-test { ike { gateway ike-gate-test; ipsec-policy ipsec-policy-test; } establish-tunnels immediately; } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } nat { source { rule-set trust-to-untrust { from zone trust; to zone untrust; rule No-Nat-Rule { match { source-address 10.55.55.0/24; destination-address 10.60.0.0/16; } then { source-nat { off; } } } rule def-nat-rule { match { source-address 10.55.55.0/24; destination-address 0.0.0.0/0; } then { source-nat { interface; } } } } } } policies { from-zone trust to-zone untrust { policy vpnpolicy-trust-untrust-test { match { source-address net-test_10-55-55-0--24; destination-address [ net-test_10-60-8-0--21 net-trest_10-60-59-0--24 ]; application any; } then { permit { tunnel { ipsec-vpn ipsec-vpn-test; pair-policy vpnpolicy-untrust-trust-test; } } } } policy trust-to-untrust { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone untrust to-zone trust { policy vpnpolicy-untrust-trust-test { match { source-address [ net-test_10-60-8-0--21 net-trest_10-60-59-0--24 ]; destination-address net-test_10-55-55-0--24; application any; } then { permit { tunnel { ipsec-vpn ipsec-vpn-test; pair-policy vpnpolicy-trust-untrust-test; } } } } } } zones { security-zone trust { address-book { address net-test_10-55-55-0--24 10.55.55.0/24; } host-inbound-traffic { system-services { all; } protocols { all; } } interfaces { vlan.0; } } security-zone untrust { address-book { address net-test_10-60-8-0--21 10.60.8.0/21; address net-trest_10-60-59-0--24 10.60.59.0/24; } screen untrust-screen; host-inbound-traffic { system-services { ike; } } interfaces { ge-0/0/0.0; } } } } vlans { vlan-trust { vlan-id 3; l3-interface vlan.0; } }