## Last changed: 2015-08-17 17:54:20 GMT+1 version 12.1X44-D35.5; system { host-name GKDC-SRX100; time-zone GMT+1; root-authentication { encrypted-password "$1$44sLipPG$PbD2fteqj4BwX7R"; ## SECRET-DATA } name-server { 194.74.65.68; 194.72.9.38; } name-resolution { no-resolve-on-input; } login { user itcode { uid 2001; class super-user; authentication { encrypted-password "$1$bvz0UYHH$Zr0PCFOa5Mt7Y"; ## SECRET-DATA } } } services { ssh; web-management { http { interface vlan.1; } https { system-generated-certificate; interface [ fe-0/0/0.0 vlan.1 ]; } session { idle-timeout 60; } } dhcp { propagate-settings fe-0/0/0; } } syslog { archive size 100k files 3; user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } } max-configurations-on-flash 5; max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } ntp { server uk.ntp.pool.org; } } interfaces { fe-0/0/0 { unit 0 { encapsulation ppp-over-ether; } } fe-0/0/1 { unit 0 { family ethernet-switching { vlan { members vlan1; } } } } fe-0/0/2 { unit 0 { family ethernet-switching { vlan { members vlan1; } } } } fe-0/0/3 { unit 0 { family ethernet-switching { vlan { members vlan1; } } } } pp0 { unit 0 { ppp-options { chap { default-chap-secret "$9$OjCpRhyXxdgoGevxdwsZG76Yth"; ## SECRET-DATA local-name "***@hg23.btclick.com"; no-rfc2486; passive; } } pppoe-options { underlying-interface fe-0/0/0.0; idle-timeout 0; auto-reconnect 1; client; } family inet { mtu 1492; address 213.123.219.146/31; } } } vlan { unit 1 { family inet { address 192.168.0.1/24; } } } } routing-options { static { route 0.0.0.0/0 { next-hop pp0.0; metric 1; } } } protocols { stp; } security { ike { policy ike_policy_startup_rvpn { mode aggressive; proposal-set standard; pre-shared-key ascii-text "$9$go4UH.PQF/tjHfz3/OB"; ## SECRET-DATA } gateway gw_startup_rvpn { ike-policy ike_policy_startup_rvpn; dynamic { hostname SRX-GW; connections-limit 50; ike-user-type group-ike-id; } external-interface fe-0/0/0.0; xauth access-profile remote_access_profile; } } ipsec { policy ipsec_pol_startup_rvpn { perfect-forward-secrecy { keys group2; } proposal-set standard; } vpn startup_rvpn { ike { gateway gw_startup_rvpn; ipsec-policy ipsec_pol_startup_rvpn; } } } dynamic-vpn { access-profile remote_access_profile; clients { startup_rvpn_group { remote-protected-resources { 0.0.0.0/0; } ipsec-vpn startup_rvpn; user { itcode; } } } } flow { tcp-mss { all-tcp { mss 1300; } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } nat { source { rule-set nsw_srcnat { from zone trust; to zone Internet; rule nsw-src-interface { match { source-address 0.0.0.0/0; destination-address 0.0.0.0/0; } then { source-nat { interface; } } } } } } policies { from-zone Internet to-zone trust { policy POL-Internet_to_trust { match { source-address any-ipv4; destination-address any-ipv4; application [ junos-smtp junos-pptp junos-imap junos-pop3 junos-http junos-https junos-ping ]; } then { permit; } } } from-zone trust to-zone Internet { policy POL-trust_to_Internet { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone trust to-zone trust { policy trust-to-trust { match { source-address any; destination-address any; application any; } then { permit; } } } } zones { security-zone trust { interfaces { vlan.1 { host-inbound-traffic { system-services { ping; http; https; ssh; } } } } } security-zone Internet { interfaces { fe-0/0/0.0 { host-inbound-traffic { system-services { ping; dhcp; https; ssh; ike; } } } } } security-zone untrust; security-zone internet { interfaces { pp0.0; } } } } access { profile remote_access_profile { client itcode { firewall-user { password "$9$BMd1crM8XNVweKJGiqQzevMLdbsYg"; ## SECRET-DATA } } address-assignment { pool startup_rvpn_add_pool; } } address-assignment { pool startup_rvpn_add_pool { family inet { network 192.168.0.0/24; range startup-rvpn-range { low 192.168.0.150; high 192.168.0.199; } xauth-attributes { primary-dns 192.168.0.10/32; } } } } firewall-authentication { web-authentication { default-profile remote_access_profile; } } } vlans { vlan1 { vlan-id 3; l3-interface vlan.1; } }