## Last changed: 2011-03-20 20:50:29 CDT version 10.4R1.9; groups { node0 { system { host-name HOUTXGW1; } interfaces { fxp0 { unit 0 { family inet { address 192.168.2.1/24; } } } } } node1 { system { host-name HOUTXGW2; } interfaces { fxp0 { unit 0 { family inet { address 192.168.2.2/24; } } } } } } apply-groups "${node}"; system { time-zone America/Chicago; root-authentication { encrypted-password "$1$XerblLjy$NGsYkErHAIXaodkJEV.Ai."; } name-server { 208.67.222.222; 208.67.220.220; } services { ssh; web-management { http { interface fxp0.0; } https { system-generated-certificate; interface fxp0.0; } } } syslog { archive size 100k files 3; user * { any emergency; } file messages { any critical; authorization info; } file interactive-commands { interactive-commands error; } file policy_session { user info; match RT_FLOW; archive size 1000k world-readable; structured-data; } } max-configurations-on-flash 5; max-configuration-rollbacks 5; license { autoupdate { url https://ae1.juniper.net/junos/key_retrieval; } } ntp { server 192.43.244.18; } } chassis { cluster { control-link-recovery; reth-count 2; node 0; redundancy-group 0 { node 0 priority 100; node 1 priority 99; } redundancy-group 1 { node 0 priority 100; node 1 priority 99; preempt; interface-monitor { ge-0/0/5 weight 255; ge-5/0/5 weight 255; ge-0/0/6 weight 255; ge-5/0/6 weight 255; } } } } interfaces { ge-0/0/5 { gigether-options { redundant-parent reth0; } } ge-0/0/6 { gigether-options { redundant-parent reth1; } } ge-5/0/5 { gigether-options { redundant-parent reth0; } } ge-5/0/6 { gigether-options { redundant-parent reth1; } } fab0 { fabric-options { member-interfaces { ge-0/0/2; } } } fab1 { fabric-options { member-interfaces { ge-5/0/2; } } } reth0 { vlan-tagging; redundant-ether-options { redundancy-group 1; } unit 12 { description CIF; vlan-id 12; family inet { address 192.168.12.1/24; } } unit 102 { description CII; vlan-id 102; family inet { address 10.1.102.1/24; } } } reth1 { redundant-ether-options { redundancy-group 1; } unit 0 { family inet { address 75.148.210.41/29; } } } } snmp { community public { authorization read-only; } } routing-options { static { route 0.0.0.0/0 next-hop 75.148.210.46; } } security { nat { source { rule-set source-nat { from zone [ dmz trust ]; to zone untrust; rule source-nat-rule { match { source-address 0.0.0.0/0; } then { source-nat { interface; } } } } } destination { pool dnat-pool-1 { address 192.168.12.140/32; } } static { rule-set static-nat { from zone [ dmz trust untrust ]; rule static-nat-rule { match { destination-address 75.148.210.42/32; } then { static-nat prefix 192.168.12.140/32; } } } } proxy-arp { interface reth1.0 { address { 75.148.210.42/32 to 75.148.210.45/32; } } } } screen { ids-option untrust-screen { icmp { ping-death; } ip { source-route-option; tear-drop; } tcp { syn-flood { alarm-threshold 1024; attack-threshold 200; source-threshold 1024; destination-threshold 2048; timeout 20; } land; } } } zones { security-zone trust { host-inbound-traffic { system-services { all; } protocols { all; } } interfaces { reth0.102; } } security-zone dmz { address-book { address webserver 192.168.12.140/32; address-set webserver-group { address webserver; } } host-inbound-traffic { system-services { all; } protocols { all; } } interfaces { reth0.12; } } security-zone untrust { screen untrust-screen; host-inbound-traffic { system-services { ping; traceroute; } } interfaces { reth1.0; } } } policies { from-zone trust to-zone trust { policy trust-to-trust { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone trust to-zone untrust { policy trust-to-untrust { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone untrust to-zone trust { policy untrust-to-trust { match { source-address any; destination-address any; application any; } then { deny; log { session-init; session-close; } } } } from-zone dmz to-zone dmz { policy dmz-to-dmz { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone dmz to-zone untrust { policy dmz-to-untrust { match { source-address any; destination-address any; application any; } then { permit; } } } from-zone untrust to-zone dmz { policy static-nat-policy { match { source-address any; destination-address webserver-group; application [ junos-http junos-https ]; } then { permit; } } policy untrust-to-dmz { match { source-address any; destination-address any; application any; } then { deny; log { session-init; session-close; } } } } } }