Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- set version 11.2R4.3
- set system host-name firewall
- set system root-authentication encrypted-password "$1$LH0x4v36$yUEal4Pt3OGGYdwDbO6dF0"
- set system name-server 24.217.0.5
- set system name-server 24.217.201.67
- set system name-server 24.247.15.53
- set system services ssh
- set system services telnet
- set system services xnm-clear-text
- set system services web-management http interface fe-0/0/2.0
- set system services web-management http interface fe-0/0/1.0
- set system services web-management https system-generated-certificate
- set system services web-management https interface fe-0/0/2.0
- set system services web-management https interface fe-0/0/1.0
- set system services dhcp router 192.168.1.1
- set system services dhcp propagate-settings fe-0/0/0.0
- set system syslog archive size 100k
- set system syslog archive files 3
- set system syslog user * any emergency
- set system syslog file messages any critical
- set system syslog file messages authorization info
- set system syslog file interactive-commands interactive-commands error
- set system max-configurations-on-flash 5
- set system max-configuration-rollbacks 5
- set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
- set interfaces fe-0/0/0 unit 0 family inet address 96.35.165.2/27
- set interfaces fe-0/0/1 unit 0 family inet address 10.0.2.1/16
- set interfaces fe-0/0/2 unit 0 family inet address 192.168.1.1/24
- set interfaces fe-0/0/3 unit 0 family ethernet-switching
- set interfaces fe-0/0/4 unit 0 family ethernet-switching
- set interfaces fe-0/0/5 unit 0 family ethernet-switching
- set interfaces fe-0/0/6 unit 0 family ethernet-switching
- set interfaces fe-0/0/7 unit 0 family ethernet-switching
- set routing-options static route 0.0.0.0/0 next-hop 96.35.165.1
- set protocols stp
- set security ike policy ike_pol_wizard_dyn_vpn mode aggressive
- set security ike policy ike_pol_wizard_dyn_vpn proposal-set compatible
- set security ike policy ike_pol_wizard_dyn_vpn pre-shared-key ascii-text "$9$JoUjq3nCpORHqIcyr8LgoJZjqP5QCp0"
- set security ike gateway gw_wizard_dyn_vpn ike-policy ike_pol_wizard_dyn_vpn
- set security ike gateway gw_wizard_dyn_vpn dynamic hostname firewall
- set security ike gateway gw_wizard_dyn_vpn dynamic hostname firewall
- set security ike gateway gw_wizard_dyn_vpn dynamic connections-limit 50
- set security ike gateway gw_wizard_dyn_vpn dynamic ike-user-type group-ike-id
- set security ike gateway gw_wizard_dyn_vpn external-interface fe-0/0/0.0
- set security ike gateway gw_wizard_dyn_vpn xauth access-profile remote_access_profile
- set security ipsec policy ipsec_pol_wizard_dyn_vpn perfect-forward-secrecy keys group2
- set security ipsec policy ipsec_pol_wizard_dyn_vpn proposal-set compatible
- set security ipsec vpn wizard_dyn_vpn ike gateway gw_wizard_dyn_vpn
- set security ipsec vpn wizard_dyn_vpn ike ipsec-policy ipsec_pol_wizard_dyn_vpn
- set security dynamic-vpn access-profile remote_access_profile
- set security dynamic-vpn clients wizard-dyn-group remote-protected-resources 10. 0.0.0/16
- set security dynamic-vpn clients wizard-dyn-group ipsec-vpn wizard_dyn_vpn
- set security dynamic-vpn clients wizard-dyn-group user ereynold
- set security dynamic-vpn clients wizard-dyn-group user jrhodes
- set security dynamic-vpn clients wizard-dyn-group user struman
- set security screen ids-option untrust-screen icmp ping-death
- set security screen ids-option untrust-screen ip source-route-option
- set security screen ids-option untrust-screen ip tear-drop
- set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
- set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
- set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
- set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
- set security screen ids-option untrust-screen tcp syn-flood timeout 20
- set security screen ids-option untrust-screen tcp land
- set security nat source rule-set trust-to-untrust from zone trust
- set security nat source rule-set trust-to-untrust to zone untrust
- set security nat source rule-set trust-to-untrust rule source-nat-rule match source-address 0.0.0.0/0
- set security nat source rule-set trust-to-untrust rule source-nat-rule then source-nat interface
- set security nat destination rule-set cloud-8080 from interface fe-0/0/0.0
- set security nat destination rule-set cloud-8080 rule cloud-8080 match source-address 0.0.0.0/0
- set security nat destination rule-set cloud-8080 rule cloud-8080 match destination-address 192.168.2.1/32
- set security nat destination rule-set cloud-8080 rule cloud-8080 match destination-port 8080
- set security nat destination rule-set cloud-8080 rule cloud-8080 then destination-nat off
- set security nat proxy-arp interface fe-0/0/0.0 address 10.0.10.1/32 to 10.0.10.255/32
- set security policies from-zone trust to-zone untrust policy trust-to-untrust match source-address any
- set security policies from-zone trust to-zone untrust policy trust-to-untrust match destination-address any
- set security policies from-zone trust to-zone untrust policy trust-to-untrust match application any
- set security policies from-zone trust to-zone untrust policy trust-to-untrust then permit
- set security policies from-zone untrust to-zone trust policy policy_in_wizard_dyn_vpn match source-address any
- set security policies from-zone untrust to-zone trust policy policy_in_wizard_dyn_vpn match destination-address any
- set security policies from-zone untrust to-zone trust policy policy_in_wizard_dyn_vpn match application any
- set security policies from-zone untrust to-zone trust policy policy_in_wizard_dyn_vpn then permit tunnel ipsec-vpn wizard_dyn_vpn
- set security zones security-zone trust host-inbound-traffic system-services all
- set security zones security-zone trust interfaces fe-0/0/1.0
- set security zones security-zone trust interfaces fe-0/0/2.0
- set security zones security-zone untrust screen untrust-screen
- set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services dhcp
- set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services tftp
- set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services ike
- set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services https
- set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services ping
- set security zones security-zone untrust interfaces fe-0/0/0.0 host-inbound-traffic system-services ssh
- set access profile remote_access_profile client struman firewall-user password "$9$xE77dsoJDP5FNdHqm5F3KMWLdb"
- set access profile remote_access_profile address-assignment pool dyn-vpn-address-pool
- set access address-assignment pool dyn-vpn-address-pool family inet network 10.0.0.0/16
- set access address-assignment pool dyn-vpn-address-pool family inet range dvpn-range low 10.0.10.1
- set access address-assignment pool dyn-vpn-address-pool family inet range dvpn-range high 10.0.10.255
- set access address-assignment pool dyn-vpn-address-pool family inet xauth-attributes primary-dns 10.0.2.2/32
- set access address-assignment pool dyn-vpn-address-pool family inet xauth-attributes primary-wins 10.0.2.2/32
- set access firewall-authentication web-authentication default-profile remote_access_profile
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement