version 9.5R1.8; system { host-name xxxxxxxxxxxxxx; time-zone xxxxxxxxxxxxx; root-authentication { encrypted-password "xxxxxxxxxxxxxxxxxxxxxxxxxxxxx"; } services { ssh; web-management { http; https { system-generated-certificate; } } } syslog { user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } } interfaces { ge-0/0/0 { unit 0 { family inet { address 212.xx.xx.xx/28; } } } ge-0/0/1 { unit 0 { description "Logical Unit 0 on Gigabit Ethernet Interface 'ge-0/0/1'"; family inet { address 10.10.158.226/24; } } } fe-0/0/7 { unit 0 { description fe-0/0/7.0; family inet { address 10.10.167.1/24; } } } lo0 { unit 0 { family inet { address 127.0.0.1/32; } } } st0 { unit 0 { family inet; } } } routing-options { static { route 0.0.0.0/0 next-hop 212.xx.xx.xx; } } security { ike { proposal pre-g2-3des-sha { authentication-method pre-shared-keys; dh-group group2; authentication-algorithm sha1; encryption-algorithm 3des-cbc; } policy ike-policy1 { mode main; proposals pre-g2-3des-sha; pre-shared-key ascii-text "xxxxxxxxxxxxxxxxxxxxxxxxxx"; } gateway ike-gateway { ike-policy ike-policy1; address 188.xx.xx.xx; nat-keepalive 5; external-interface ge-0/0/0; } } ipsec { policy vpn-policy1 { proposal-set standard; } vpn ike-vpn { ike { gateway ike-gateway; ipsec-policy vpn-policy1; } } } nat { source { rule-set rule-set-name-nat { from zone trust; to zone untrust; rule rule-name { match { source-address 0.0.0.0/0; destination-address 0.0.0.0/0; } then { source-nat interface; } } } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; queue-size 2000; timeout 20; } land; } } } zones { security-zone trust { tcp-rst; address-book { address local-net 10.10.167.0/24; } host-inbound-traffic { system-services { all; } } interfaces { ge-0/0/1.0 { host-inbound-traffic { system-services { all; } } } fe-0/0/7.0 { host-inbound-traffic { system-services { all; } } } } } security-zone untrust { address-book { address remote-net 10.10.166.0/24; } screen untrust-screen; host-inbound-traffic { system-services { ike; ping; https; ssh; http; } } interfaces { ge-0/0/0.0 { host-inbound-traffic { system-services { http; https; ike; ssh; ping; } } } } } } policies { from-zone trust to-zone trust { policy default-permit { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone trust to-zone untrust { policy vpnpolicy-tr-unt { match { source-address local-net; destination-address remote-net; application any; } then { permit { tunnel { ipsec-vpn ike-vpn; pair-policy vpnpolicy-unt-tr; } } } } policy default-permit { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone untrust to-zone trust { policy vpnpolicy-unt-tr { match { source-address remote-net; destination-address local-net; application any; } then { permit { tunnel { ipsec-vpn ike-vpn; pair-policy vpnpolicy-tr-unt; } } } } policy default-deny { match { source-address any; destination-address any; application any; } then { deny; } } } } }