show access profile rem_users { client aaaaa { xauth { ip-address 192.168.10.11/32; } client-group g1; firewall-user { password "$9$6S3n9CuleWdVYhSs4aJDjp0OBSr"; ## SECRET-DATA } } client bbbbb { xauth { ip-address 192.168.10.4/24; } client-group g2; firewall-user { password "$9$l0LKLx24aJDi4oJU"; ## SECRET-DATA } } client ccccc { xauth { ip-address 192.168.10.17/32; } client-group g3; firewall-user { password "$9$JoGqmfTz3/Ctu87dsJZz36/tOEhreK8Rh"; ## SECRET-DATA show security policies from-zone untrust to-zone trust policy 10 { match { source-address 192.168.10.11; destination-address trust_lan; application [ rdp junos-ike junos-ping junos-ssh junos-http]; } then { permit { tunnel { ipsec-vpn vpn1; } } log { session-close; } } policy 11 { match { source-address 192.168.10.4; destination-address 172.16.16.10; application [ junos-ike junos-dns-udp junos-http ]; } then { permit { tunnel { ipsec-vpn vpn2; } } log { session-close; } } policy 12 { match { source-address 192.168.10.17; destination-address 172.16.16.12; application [ junos-ike junos-ping junos-https 3128_tcp ]; } then { permit { tunnel { ipsec-vpn vpn3; } } log { session-close; } } } Show security dynamic-vpn access-profile rem_users; clients { admins { remote-protected-resources { 172.16.16.0/24; } remote-exceptions { 0.0.0.0/0; } ipsec-vpn vpn1; user-groups { g1; } } managers { remote-protected-resources { 172.16.16.10/32; } remote-exceptions { 0.0.0.0/0; } ipsec-vpn vpn2; user-groups { g2; } } others { remote-protected-resources { 172.16.16.12/32; } remote-exceptions { 0.0.0.0/0; } ipsec-vpn vpn3; user-groups { g3; } }