Advertisement
Guest User

Untitled

a guest
Jul 31st, 2015
237
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.46 KB | None | 0 0
  1. security {
  2. ike {
  3. traceoptions {
  4. flag all;
  5. }
  6. policy ike_pol_wizard_dyn_vpn {
  7. mode aggressive;
  8. proposal-set standard;
  9. pre-shared-key ascii-text
  10. }
  11. gateway gw_wizard_dyn_vpn {
  12. ike-policy ike_pol_wizard_dyn_vpn;
  13. dynamic {
  14. hostname srx220-indy1.trelane.net;
  15. connections-limit 50;
  16. ike-user-type group-ike-id;
  17. }
  18. external-interface ge-0/0/0.0;
  19. xauth access-profile remote_access_profile;
  20. }
  21. }
  22. ipsec {
  23. traceoptions {
  24. flag all;
  25. }
  26. policy ipsec_pol_wizard_dyn_vpn {
  27. perfect-forward-secrecy {
  28. keys group1;
  29. }
  30. proposal-set standard;
  31. }
  32. vpn wizard_dyn_vpn {
  33. ike {
  34. gateway gw_wizard_dyn_vpn;
  35. ipsec-policy ipsec_pol_wizard_dyn_vpn;
  36. }
  37. }
  38. }
  39. dynamic-vpn {
  40. access-profile remote_access_profile;
  41. clients {
  42. wizard-dyn-group {
  43. remote-protected-resources {
  44. 192.168.100.0/24;
  45. }
  46. ipsec-vpn wizard_dyn_vpn;
  47. user {
  48. trelane;
  49. }
  50. }
  51. }
  52. }
  53. forwarding-options {
  54. family {
  55. inet6 {
  56. mode flow-based;
  57. }
  58. }
  59. }
  60. screen {
  61. ids-option Internet-screen {
  62. icmp {
  63. ping-death;
  64. }
  65. ip {
  66. source-route-option;
  67. tear-drop;
  68. }
  69. tcp {
  70. syn-flood {
  71. alarm-threshold 1024;
  72. attack-threshold 200;
  73. source-threshold 1024;
  74. destination-threshold 2048;
  75. timeout 20;
  76. }
  77. land;
  78. }
  79. limit-session {
  80. destination-ip-based 50;
  81. }
  82. }
  83. }
  84. nat {
  85. source {
  86. rule-set nsw_srcnat {
  87. from zone Internal;
  88. to zone Internet;
  89. rule nsw-src-interface {
  90. match {
  91. source-address 0.0.0.0/0;
  92. destination-address 0.0.0.0/0;
  93. }
  94. then {
  95. source-nat {
  96. interface;
  97. }
  98. }
  99. }
  100. }
  101. }
  102. destination {
  103. pool test {
  104. address 192.168.100.10/32 port 22;
  105. }
  106. rule-set DNAT {
  107. from zone Internet;
  108. rule test {
  109. match {
  110. destination-address 0.0.0.0/0;
  111. destination-port {
  112. 2222;
  113. }
  114. protocol tcp;
  115. }
  116. then {
  117. destination-nat {
  118. pool {
  119. test;
  120. }
  121. }
  122. }
  123. }
  124. }
  125. }
  126. }
  127. policies {
  128. from-zone Internal to-zone Internet {
  129. policy All_Internal_Internet {
  130. match {
  131. source-address any;
  132. destination-address any;
  133. application any;
  134. }
  135. then {
  136. permit;
  137. }
  138. }
  139. }
  140. from-zone Internet to-zone Internal {
  141. policy policy_in_wizard_dyn_vpn {
  142. match {
  143. source-address any;
  144. destination-address any;
  145. application any;
  146. }
  147. then {
  148. permit {
  149. tunnel {
  150. ipsec-vpn wizard_dyn_vpn;
  151. }
  152. }
  153. }
  154. }
  155. }
  156. }
  157. zones {
  158. security-zone Internal {
  159. interfaces {
  160. vlan.1 {
  161. host-inbound-traffic {
  162. system-services {
  163. ping;
  164. dhcp;
  165. ssh;
  166. snmp;
  167. http;
  168. https;
  169. traceroute;
  170. }
  171. protocols {
  172. router-discovery;
  173. }
  174. }
  175. }
  176. }
  177. }
  178. security-zone Internet {
  179. screen Internet-screen;
  180. interfaces {
  181. ge-0/0/0.0 {
  182. host-inbound-traffic {
  183. system-services {
  184. ping;
  185. dhcp;
  186. ssh;
  187. ike;
  188. traceroute;
  189. dhcpv6;
  190. http;
  191. https;
  192. }
  193. }
  194. }
  195. }
  196. }
  197. }
  198. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement