root> show configuration | no-more ## Last commit: 2013-05-29 00:41:42 UTC by root version 12.1R6.5; system { root-authentication { encrypted-password "$1$M/YbLgAW$RCW76rx/LHP.Ra/LkBy.s1"; ## SECRET-DATA } name-server { 208.67.222.222; 208.67.220.220; } services { ssh; telnet; xnm-clear-text; web-management { http { interface vlan.0; } https { system-generated-certificate; interface vlan.0; } } dhcp { pool 192.168.1.0/24 { address-range low 192.168.1.2 high 192.168.1.254; router { 192.168.1.1; } } propagate-settings fe-0/0/0.0; } } syslog { archive size 100k files 3; user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; max-configuration-rollbacks 20; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } } interfaces { lt-0/0/0 { unit 100 { encapsulation ethernet; peer-unit 101; family inet { address 10.10.10.1/30; } } unit 101 { encapsulation ethernet; peer-unit 100; family inet { address 10.10.10.2/30; } } } pt-1/0/0 { unit 0; } lo0 { unit 1 { family inet { address 1.1.1.1/32; } } unit 2 { family inet { address 2.2.2.2/32; } } } } protocols { stp; } security { flow { inactive: traceoptions { file debug01 size 5m files 2; flag all; packet-filter f0 { destination-prefix 10.10.10.2/32; } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } policies { from-zone trust to-zone untrust { policy trust-to-untrust { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone TR1 to-zone TR2 { policy TR1-TR2 { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone TR2 to-zone TR1 { policy TR2-TR1 { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone junos-host to-zone TR1 { policy self-TR1 { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone junos-host to-zone TR2 { policy self-TR2 { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone TR1 to-zone junos-host { policy TR1-self { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone TR2 to-zone junos-host { policy TR2-self { match { source-address any; destination-address any; application any; } then { permit; } } } } zones { security-zone trust { host-inbound-traffic { system-services { all; } protocols { all; } } } security-zone untrust { screen untrust-screen; interfaces { pt-1/0/0.0 { host-inbound-traffic { system-services { dhcp; tftp; } } } } } security-zone TR1 { interfaces { lt-0/0/0.100 { host-inbound-traffic { system-services { any-service; } protocols { all; } } } lo0.1; } } security-zone TR2 { interfaces { lt-0/0/0.101 { host-inbound-traffic { system-services { any-service; } protocols { all; } } } lo0.2; } } } } routing-instances { TestRouter1 { description "Test Router 1"; instance-type virtual-router; interface lt-0/0/0.100; interface lo0.1; } TestRouter2 { description "Test Router 2"; instance-type virtual-router; interface lt-0/0/0.101; interface lo0.2; } } applications { application trace-icmp { term 1 protocol icmp; } application trace-udp { term 2 protocol udp destination-port 33434-33534; } application-set trace-udp-icmp { application trace-icmp; application trace-udp; } }