[j-nsp] SSG140 traffic dies - JTAC as no idea

ChrisSerafin chris at chrisserafin.com
Wed Mar 11 16:53:48 EDT 2009


UUGGGHH,

major problem for myself over here. I have installed a brand new SSG140 
firewall at a client and for some reason it keeps freezing and will not 
pass traffic. We are never onsite and can't get console messages or 
troubleshoot while it's down. (i'm putting a laptop attached to the 
console tomorrow for this) We have tried multiple firmware changes, 
swapped UPS's, and actually RMA'ed the device for a new one. Same thing 
persists. Pulling my hair out and JTAC says they need console access 
while it is down...hard to do for a HQ VPN hub site.

Any ideas are more than appreciated.....THANKS! Info below

--chris

Product Name 	SSG-140
Host Name 	QST-CHI-HQ
Serial Number 	0185062007000016
Control Number 	ffffffff
Hardware Version 	1010(0)-( 0), FPGA checksum: 0, VLAN1 IP (0.0.0.0)
Software Version 	6.0.0r7.0, Type: Firewall+VPN
Feature 	AV-K
Base Mac 	0019.e241.4880
File Name 	screenos_image, Checksum: e5cb9ed
Total Memory 	512MB
Date 03/11/2009 15:51:44, Daylight Saving Time enabled.
The Network Time Protocol is enabled.
Up 0 hours 6 minutes 27 seconds since 11Mar2009:15:45:17
Total Device Resets: 0.
System in NAT/route mode.
Use interface IP, Config Port: 80
User Name: netscreen






set clock ntp
set clock timezone -6
set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00
set vrouter trust-vr sharable
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
unset auto-route-export
exit
set service "DNB" protocol tcp src-port 1024-65535 dst-port 23202-23202
set service "IM_Custom" protocol tcp src-port 0-65535 dst-port 5200-5200
set service "SOCKS" protocol tcp src-port 1024-65535 dst-port 1080-1080
set service "TCP-1024-5000" protocol tcp src-port 1024-65535 dst-port 
1024-5000
set service "TCP-18190" protocol tcp src-port 1024-65535 dst-port 
18190-18190
set service "TCP-264" protocol tcp src-port 1024-65535 dst-port 264-264
set service "TCP-8100" protocol tcp src-port 1024-65535 dst-port 8100-8100
set service "TCP-82" protocol tcp src-port 1024-65535 dst-port 82-82
set service "Terminal_Srvc" protocol tcp src-port 0-65535 dst-port 
3389-3389
set service "UDP-2746" protocol udp src-port 0-65535 dst-port 2746-2746
set service "UDP-500" protocol udp src-port 0-65535 dst-port 500-500
set service "IPSEC" protocol 50 src-port 0-65535 dst-port 0-65535
set service "IPSEC" + 51 src-port 0-65535 dst-port 0-65535
set service "IPSEC" + udp src-port 0-65535 dst-port 500-500
set service "Juniper-IDP-Comms" protocol udp src-port 0-65535 dst-port 
7101-7102
set service "Juniper-IDP-Comms" + udp src-port 0-65535 dst-port 7201-7202
set service "RSA Services" protocol udp src-port 0-65535 dst-port 5500-5500
set service "RSA Services" + tcp src-port 0-65535 dst-port 5500-5500
set service "MexicanGov" protocol tcp src-port 0-65535 dst-port 8081-8081
set service "MexicanGov" + tcp src-port 0-65535 dst-port 8089-8089
set service "Mexico_software" protocol tcp src-port 0-65535 dst-port 
7824-7824
set service "Mexico_software" + tcp src-port 0-65535 dst-port 8080-8080
set service "Mexico_MS_VPN" protocol tcp src-port 0-65535 dst-port 
1723-1723
set service "Mexico_MS_VPN" + tcp src-port 0-65535 dst-port 47-47
set auth-server "Local" id 0
set auth-server "Local" server-name "Local"
set auth default auth server "Local"
set auth radius accounting port 1646
set admin name "netscreen"
set admin password "nO6/LZrBMXXXXXXXXXXXXXXCHtN6KXVn"
set admin auth timeout 10
set admin auth server "Local"
set admin format dos
set zone "Trust" vrouter "trust-vr"
set zone "Untrust" vrouter "trust-vr"
set zone "DMZ" vrouter "trust-vr"
set zone "VLAN" vrouter "trust-vr"
set zone "Untrust-Tun" vrouter "trust-vr"
set zone "Trust" tcp-rst
set zone "Untrust" block
unset zone "Untrust" tcp-rst
set zone "MGT" block
set zone "DMZ" tcp-rst
set zone "VLAN" block
set zone "VLAN" tcp-rst
unset zone "Untrust" screen tear-drop
unset zone "Untrust" screen syn-flood
unset zone "Untrust" screen ping-death
unset zone "Untrust" screen ip-filter-src
unset zone "Untrust" screen land
set zone "V1-Untrust" screen tear-drop
set zone "V1-Untrust" screen syn-flood
set zone "V1-Untrust" screen ping-death
set zone "V1-Untrust" screen ip-filter-src
set zone "V1-Untrust" screen land
set interface ethernet0/0 phy full 100mb
set interface "ethernet0/0" zone "Trust"
set interface "ethernet0/1" zone "DMZ"
set interface "ethernet0/2" zone "Untrust"
set interface "ethernet0/3" zone "DMZ"
set interface "ethernet0/4" zone "DMZ"
set interface "tunnel.1" zone "Untrust"
set interface "tunnel.2" zone "Untrust"
set interface "tunnel.3" zone "Trust"
set interface ethernet0/0 ip 192.168.180.26/24
set interface ethernet0/0 route
unset interface vlan1 ip
set interface ethernet0/1 ip 12.106.237.89/29
set interface ethernet0/1 nat
set interface ethernet0/2 ip 12.63.231.146/28
set interface ethernet0/2 route
set interface ethernet0/3 ip 192.168.3.1/24
set interface ethernet0/3 route
set interface ethernet0/4 ip 192.168.4.1/24
set interface ethernet0/4 route
set interface tunnel.1 ip unnumbered interface ethernet0/2
set interface tunnel.2 ip unnumbered interface ethernet0/2
set interface tunnel.3 ip unnumbered interface ethernet0/2
set interface ethernet0/4 mtu 1460
unset interface vlan1 bypass-others-ipsec
unset interface vlan1 bypass-non-ip
set interface ethernet0/0 ip manageable
set interface ethernet0/1 ip manageable
set interface ethernet0/2 ip manageable
set interface ethernet0/3 ip manageable
set interface ethernet0/4 ip manageable
set interface ethernet0/1 manage ssh
set interface ethernet0/1 manage telnet
set interface ethernet0/1 manage snmp
set interface ethernet0/1 manage web
set interface ethernet0/2 manage ping
set interface ethernet0/2 manage ssh
set interface ethernet0/2 manage telnet
set interface ethernet0/2 manage snmp
set interface ethernet0/2 manage ssl
set interface ethernet0/2 manage web
set interface ethernet0/0 monitor track-ip weight 1
unset interface ethernet0/0 monitor track-ip dynamic
set interface ethernet0/2 dip 4 12.63.231.150 12.63.231.150
set interface "ethernet0/2" mip 12.106.250.6 host 192.168.180.20 netmask 
255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.106.250.7 host 192.168.180.1 netmask 
255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.106.250.5 host 192.168.180.3 netmask 
255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.106.250.8 host 192.168.184.115 
netmask 255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.106.250.9 host 192.168.184.124 
netmask 255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.63.231.147 host 192.168.180.6 netmask 
255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.63.231.148 host 192.168.4.10 netmask 
255.255.255.255 vr "trust-vr"
set interface "ethernet0/2" mip 12.63.231.149 host 192.168.4.11 netmask 
255.255.255.255 vr "trust-vr"
set interface ethernet0/0 ntp-server
set flow tcp-mss
unset flow no-tcp-seq-check
unset flow tcp-syn-check
unset flow tcp-syn-bit-check
set flow reverse-route clear-text prefer
set flow reverse-route tunnel always
set console page 0
set hostname QST-CHI-HQ
set pki authority default scep mode "auto"
set pki x509 default cert-path partial
set dns host dns1 192.168.180.10 src-interface ethernet0/0
set dns host dns2 0.0.0.0
set dns host dns3 0.0.0.0
set dns host schedule 06:28 interval 8
set address "Trust" "12.63.231.147/32" 12.63.231.147 255.255.255.255
set address "Trust" "12.63.231.150/32" 12.63.231.150 255.255.255.255
set address "Trust" "192.168.0.0/16" 192.168.0.0 255.255.0.0
set address "Trust" "192.168.180.0/24" 192.168.180.0 255.255.255.0
set address "Trust" "192.168.180.10" 192.168.180.10 255.255.255.255
set address "Trust" "192.168.180.150/32" 192.168.180.150 255.255.255.255
set address "Trust" "192.168.180.163/32" 192.168.180.163 255.255.255.255
set address "Trust" "192.168.180.208/32" 192.168.180.208 255.255.255.255
set address "Trust" "192.168.180.6" 192.168.180.6 255.255.255.255 "PDC"
set address "Trust" "192.168.180.98/32" 192.168.180.98 255.255.255.255
set address "Trust" "192.168.180.99/32" 192.168.180.99 255.255.255.255
set address "Trust" "192.168.184.0" 192.168.184.0 255.255.255.0
set address "Trust" "192.168.186.0/24" 192.168.186.0 255.255.255.0
set address "Trust" "192.168.188.0/24" 192.168.188.0 255.255.255.0
set address "Trust" "Chicago" 192.168.180.0 255.255.255.0
set address "Trust" "Dallas" 192.168.182.0 255.255.255.0
set address "Trust" "Dominican Republic" 192.168.183.0 255.255.255.0
set address "Trust" "InternalDMZ" 12.106.237.89 255.255.255.248
set address "Trust" "Los_Angeles" 192.168.185.0 255.255.255.0
set address "Trust" "MailServer2" 192.168.181.8 255.255.255.255
set address "Trust" "MailServer3" 192.168.184.11 255.255.255.255
set address "Trust" "Mexico Vendor 2" 192.168.184.124 255.255.255.255
set address "Trust" "Mexico Vendor1" 192.168.184.115 255.255.255.255
set address "Trust" "Mexico_internal" 192.168.186.0 255.255.255.0
set address "Trust" "New_York" 192.168.187.0 255.255.255.0
set address "Trust" "newmail-192.168.180.206" 192.168.180.206 
255.255.255.255
set address "Trust" "newmail-192.168.180.207" 192.168.180.207 
255.255.255.255
set address "Trust" "newmail-192.168.180.208" 192.168.180.208 
255.255.255.255
set address "Trust" "North_Carolina" 192.168.181.0 255.255.255.0
set address "Trust" "Server05" 192.168.180.8 255.255.255.255
set address "Trust" "Server07" 192.168.180.5 255.255.255.255 "PDC"
set address "Trust" "Server09" 192.168.180.3 255.255.255.255
set address "Trust" "Server10" 192.168.180.1 255.255.255.255
set address "Trust" "TolucaMX" 192.168.184.0 255.255.255.0
set address "Trust" "Torreno_Mx" 192.168.186.0 255.255.255.0
set address "Untrust" "10.0.0.0/24" 10.0.0.0 255.255.255.0
set address "Untrust" "10.0.0.0/8" 10.0.0.0 255.0.0.0
set address "Untrust" "12.106.237.89/29" 12.106.237.89 255.255.255.248
set address "Untrust" "12.208.94.0/24" 12.208.94.0 255.255.255.0
set address "Untrust" "192.168.0.0/16" 192.168.0.0 255.255.0.0
set address "Untrust" "192.168.0.0/24" 192.168.0.0 255.255.255.0
set address "Untrust" "192.168.121.0/24" 192.168.121.0 255.255.255.0
set address "Untrust" "192.168.180.0/24" 192.168.180.0 255.255.255.0
set address "Untrust" "192.168.183.0/24" 192.168.183.0 255.255.255.0
set address "Untrust" "192.168.186.0/24" 192.168.186.0 255.255.255.0
set address "Untrust" "192.168.188.0/24" 192.168.188.0 255.255.255.0
set address "Untrust" "192.168.190.0/24" 192.168.190.0 255.255.255.0
set address "Untrust" "192.168.191.0/24" 192.168.191.0 255.255.255.0
set address "Untrust" "192.168.20.0/24" 192.168.20.0 255.255.255.0
set address "Untrust" "200.12.52.113/32" 200.12.52.113 255.255.255.255
set address "Untrust" "216.184.126.113" 216.184.126.113 255.255.255.255
set address "Untrust" "64.74.172.210/32" 64.74.172.210 255.255.255.255
set address "Untrust" "66.29.23.0/24" 66.29.23.0 255.255.255.0
set address "Untrust" "69.27.238.0/24" 69.27.238.0 255.255.255.0
set address "Untrust" "Cali" 192.168.121.0 255.255.255.0
set address "Untrust" "Defkon_NSM" 205.234.155.199 255.255.255.255
set address "Untrust" "Defkon_RKON" 205.234.155.0 255.255.255.0
set address "Untrust" "Guatemala" 192.168.188.0 255.255.255.0
set address "Untrust" "HongKong" 192.168.1.0 255.255.255.0 "Interior 
office range"
set address "Untrust" "ISA-1-12.63.231.148" 12.63.231.148 255.255.255.255
set address "Untrust" "ISA-2-12.63.231.149" 12.63.231.149 255.255.255.255
set address "Untrust" "Katharion_SPAM_1" 64.74.172.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_2" 64.74.173.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_3" 207.154.50.9 255.255.255.0
set address "Untrust" "Katharion_SPAM_4" 208.70.88.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_5" 208.70.89.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_6" 208.70.90.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_7" 208.70.91.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_NEW1" 174.36.154.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_NEW2" 208.43.37.0 255.255.255.0
set address "Untrust" "Mexico_internal" 192.168.186.0 255.255.255.0
set address "Untrust" "Mexico_Vendor_VPN" 12.26.200.0 255.255.255.0
set address "Untrust" "Singapore" 192.168.190.0 255.255.255.0 "Interior 
office range"
set address "Untrust" "Texas" 192.168.182.0 255.255.255.0
set address "Untrust" "TriActive" 66.45.78.1 255.255.255.0
set address "Global" "200.57.157.65/32" 200.57.157.65 255.255.255.255
set address "DMZ" "10.1.1.0/24" 10.1.1.0 255.255.255.0
set address "DMZ" "12.63.231.148/32" 12.63.231.148 255.255.255.255
set address "DMZ" "12.63.231.149/32" 12.63.231.149 255.255.255.255
set address "DMZ" "192.168.3.10/32" 192.168.3.10 255.255.255.255
set address "DMZ" "AT&TConcentrator" 12.106.237.94 255.255.255.255
set address "DMZ" "Cisco VPN" 12.106.237.90 255.255.255.255
set address "DMZ" "DMZ" 12.106.237.89 255.255.255.248
set address "DMZ" "Guatemala VPN" 12.106.237.92 255.255.255.255
set address "DMZ" "ISA-private" 192.168.3.10 255.255.255.255
set address "DMZ" "Juniper-IDP" 12.106.237.91 255.255.255.255
set address "DMZ" "Juniper-SSL" 12.106.237.92 255.255.255.255
set address "DMZ" "OWA" 12.106.237.93 255.255.255.255
set group address "Trust" "Internal Servers"
set group address "Trust" "Internal Servers" add "192.168.180.6"
set group address "Trust" "Internal Servers" add "Server05"
set group address "Trust" "Internal Servers" add "Server07"
set group address "Trust" "Internal Servers" add "Server09"
set group address "Trust" "Internal Servers" add "Server10"
set group address "Trust" "Mexico Vendor"
set group address "Trust" "Mexico Vendor" add "Mexico Vendor 2"
set group address "Trust" "Mexico Vendor" add "Mexico Vendor1"
set group address "Trust" "QST_Global"
set group address "Trust" "QST_Global" add "Chicago"
set group address "Trust" "QST_Global" add "Dallas"
set group address "Trust" "QST_Global" add "Dominican Republic"
set group address "Trust" "QST_Global" add "Los_Angeles"
set group address "Trust" "QST_Global" add "New_York"
set group address "Trust" "QST_Global" add "North_Carolina"
set group address "Trust" "QST_Global" add "TolucaMX"
set group address "Trust" "QST_Global" add "Torreno_Mx"
set group service "rbza_Requirements"
set group service "rbza_Requirements" add "FTP"
set group service "rbza_Requirements" add "HTTP"
set group service "rbza_Requirements" add "HTTPS"
set group service "rbza_Requirements" add "ICMP-ANY"
set group service "rbza_Requirements" add "SSH"
set group service "rbza_Requirements" add "TELNET"
set group service "rbza_Requirements" add "Terminal_Srvc"
set ike gateway "To_Guatemala" address 209.161.118.113 Main 
outgoing-interface "ethernet0/2" preshare 
"YFpv1oMqXfKeCnyCxbe3neNbtT4g==" proposal "pre-g2-3des-sha"
set ike gateway "To_Singapore" address 203.125.41.238 Main 
outgoing-interface "ethernet0/2" preshare 
"Byr0lsK2NFIXCDHUZMnAn0YnpSvQ==" proposal "pre-g2-3des-sha"
set ike gateway "To_Hong_Kong" address 210.177.75.29 Main 
outgoing-interface "ethernet0/2" preshare 
"sP2QFLPyNXMMCGhYVAHRn19dnfQg==" proposal "pre-g2-3des-sha"
set ike gateway "To_Cali" address 205.159.31.253 Main outgoing-interface 
"ethernet0/2" preshare "HaC5RtnENOXE6CX/qUNiHnvuelgzA==" proposal 
"pre-g2-3des-sha"
set ike gateway "To_Texas" address 68.165.74.138 Main outgoing-interface 
"ethernet0/2" preshare "UnCKD/bWNFXCL1rKADGnWi2f+sg==" proposal 
"pre-g2-3des-sha"
set ike gateway "To_Mexico" address 201.101.8.250 Main 
outgoing-interface "ethernet0/2" preshare 
"UNij3gU+NeU+XYnheYJSnWOANkRQ==" sec-level compatible
set ike gateway "Gateway for 10.0.0.0/24" address 196.3.88.102 Main 
outgoing-interface "ethernet0/2" preshare 
"Vxy5XbssXV1CC5mQdwBnQJyLJVg==" proposal "pre-g2-3des-md5"
set ike gateway "Gateway for LA" address 67.110.248.194 Main 
outgoing-interface "ethernet0/2" preshare "0smtBN/UNpXIQtKdntAYGiAA==" 
proposal "pre-g2-3des-md5"
set ike gateway "To_Torreon" address 201.117.236.9 Main local-id 
"192.168.0.0" outgoing-interface "ethernet0/2" preshare 
"acqpXbXC9ymdI9sn4g4MNbg==" proposal "pre-g2-3des-md5"
set ike gateway "To_Morracco" address 81.192.101.145 Main local-id 
"192.168.0.0" outgoing-interface "ethernet0/2" preshare 
"JtS3S9Xk8svPkCP9ZgWTUnb9IxPOw==" proposal "pre-g2-3des-md5"
set ike gateway "To_UK" address 81.137.215.196 Main outgoing-interface 
"ethernet0/2" preshare "F+YIj2vANCrJWUsbSXCZuXnm1ZFwew==" sec-level 
compatible
set ike respond-bad-spi 1
set ike soft-lifetime-buffer 30
unset ike ikeid-enumeration
unset ike dos-protection
unset ipsec access-session enable
set ipsec access-session maximum 5000
set ipsec access-session upper-threshold 0
set ipsec access-session lower-threshold 0
set ipsec access-session dead-p2-sa-timeout 0
unset ipsec access-session log-error
unset ipsec access-session info-exch-connected
unset ipsec access-session use-error-log
set vpn "To_Guatemala" gateway "To_Guatemala" no-replay tunnel idletime 
0 sec-level compatible
set vpn "To_Guatemala" monitor
set vpn "To_Singapore" gateway "To_Singapore" no-replay tunnel idletime 
0 sec-level compatible
set vpn "To_Hong_Kong" gateway "To_Hong_Kong" no-replay tunnel idletime 
0 sec-level compatible
set vpn "To_Hong_Kong" id 45 bind interface tunnel.1
set vpn "To_Cali" gateway "To_Cali" no-replay tunnel idletime 0 
sec-level compatible
set vpn "To_Texas" gateway "To_Texas" no-replay tunnel idletime 0 
sec-level compatible
set vpn "To_Mexico" gateway "To_Mexico" replay tunnel idletime 0 
sec-level standard
set vpn "To_Mexico" monitor
set vpn "Gateway for LA" gateway "Gateway for LA" no-replay tunnel 
idletime 0 proposal "nopfs-esp-3des-md5"
set vpn "To_Torreon" gateway "To_Torreon" replay tunnel idletime 0 
proposal "nopfs-esp-3des-md5"
set vpn "To_Morracco" gateway "To_Morracco" replay tunnel idletime 0 
proposal "nopfs-esp-3des-md5"
set vpn "To_UK" gateway "To_UK" no-replay tunnel idletime 0 sec-level 
compatible
set vpn "To_UK" monitor rekey
set vpn "To_UK" id 61 bind interface tunnel.3
set vpn "VPN for 10.0.0.0/24" gateway "Gateway for 10.0.0.0/24" 
no-replay tunnel idletime 0 proposal "nopfs-esp-3des-md5"
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit
set di service HTTP content_type_length 8192
set di service HTTP user_agent_length 8192
set di service HTTP host_length 8192
set di service HTTP failed_logins 50
set di service HTTP brute_search 100
set url protocol type scfp
set url protocol scfp
set config enable
set server 192.168.180.20 62252 60
set fail-mode permit
set server src-interface ethernet0/0
exit
set vpn "To_Hong_Kong" proxy-id local-ip 0.0.0.0/0 remote-ip 0.0.0.0/0 
"ANY"
set vpn "Gateway for LA" proxy-id local-ip 192.168.0.0/16 remote-ip 
192.168.0.0/24 "ANY"
set vpn "To_Torreon" proxy-id local-ip 192.168.0.0/16 remote-ip 
192.168.186.0/24 "ANY"
set vpn "To_Morracco" proxy-id local-ip 192.168.0.0/16 remote-ip 
192.168.191.0/24 "ANY"
set vpn "VPN for 10.0.0.0/24" proxy-id local-ip 192.168.0.0/16 remote-ip 
192.168.183.0/24 "ANY"
set policy id 106 from "Trust" to "Untrust"  "newmail-192.168.180.206" 
"10.0.0.0/8" "ANY" permit log
set policy id 106
set src-address "newmail-192.168.180.207"
set src-address "newmail-192.168.180.208"
set dst-address "192.168.0.0/16"
exit
set policy id 105 from "Trust" to "Untrust"  "newmail-192.168.180.206" 
"Any" "ANY" nat src dip-id 4 permit log
set policy id 105
set src-address "newmail-192.168.180.207"
set src-address "newmail-192.168.180.208"
exit
set policy id 104 from "Untrust" to "DMZ"  "Any" "MIP(12.63.231.149)" 
"HTTP" permit log
set policy id 104
set service "PING"
exit
set policy id 103 from "Untrust" to "DMZ"  "Any" "MIP(12.63.231.148)" 
"HTTP" permit log
set policy id 103
set service "HTTPS"
set service "PING"
exit
set policy id 102 from "DMZ" to "Trust"  "192.168.3.10/32" 
"192.168.180.208/32" "HTTPS" permit log
set policy id 102
exit
set policy id 101 from "DMZ" to "Trust"  "192.168.3.10/32" 
"192.168.180.10" "DNS" permit log
set policy id 101
set dst-address "192.168.180.6"
set service "LDAP"
exit
set policy id 99 from "Untrust" to "Trust"  "192.168.183.0/24" 
"192.168.0.0/16" "ANY" tunnel vpn "VPN for 10.0.0.0/24" id 62 
pair-policy 98 log
set policy id 99
exit
set policy id 107 from "Untrust" to "Trust"  "Katharion_SPAM_1" 
"12.63.231.150/32" "ICMP-ANY" nat dst ip 192.168.180.208 permit log
set policy id 107
set src-address "Katharion_SPAM_2"
set src-address "Katharion_SPAM_3"
set src-address "Katharion_SPAM_4"
set src-address "Katharion_SPAM_5"
set src-address "Katharion_SPAM_6"
set src-address "Katharion_SPAM_7"
set src-address "Katharion_SPAM_NEW1"
set src-address "Katharion_SPAM_NEW2"
set service "SMTP"
exit
set policy id 98 from "Trust" to "Untrust"  "192.168.0.0/16" 
"192.168.183.0/24" "ANY" tunnel vpn "VPN for 10.0.0.0/24" id 62 
pair-policy 99 log
set policy id 98
exit
set policy id 97 from "Untrust" to "Trust"  "Any" "Any" "NTP" permit log
set policy id 97
exit
set policy id 96 from "Trust" to "Untrust"  "Any" "Any" "NTP" permit log
set policy id 96
exit
set policy id 95 from "Untrust" to "Trust"  "192.168.20.0/24" 
"192.168.0.0/16" "ANY" permit log
set policy id 95
exit
set policy id 94 from "Trust" to "Untrust"  "192.168.0.0/16" 
"192.168.20.0/24" "ANY" permit log
set policy id 94
exit
set policy id 93 from "Untrust" to "Trust"  "192.168.191.0/24" 
"192.168.0.0/16" "ANY" tunnel vpn "To_Morracco" id 60 pair-policy 92 log
set policy id 93
exit
set policy id 92 from "Trust" to "Untrust"  "192.168.0.0/16" 
"192.168.191.0/24" "ANY" tunnel vpn "To_Morracco" id 60 pair-policy 93 log
set policy id 92
exit
set policy id 90 from "Trust" to "Untrust"  "192.168.0.0/16" 
"192.168.186.0/24" "ANY" tunnel vpn "To_Torreon" id 59 pair-policy 91 log
set policy id 90
exit
set policy id 88 from "Trust" to "Untrust"  "192.168.0.0/16" 
"192.168.0.0/24" "ANY" tunnel vpn "Gateway for LA" id 57 pair-policy 89 log
set policy id 88
exit
set policy id 84 name "Filter SPAM In - LDAP Requests" from "Untrust" to 
"Trust"  "Defkon_RKON" "MIP(12.63.231.147)" "ICMP-ANY" permit log
set policy id 84
set src-address "Katharion_SPAM_1"
set src-address "Katharion_SPAM_2"
set src-address "Katharion_SPAM_3"
set src-address "Katharion_SPAM_4"
set src-address "Katharion_SPAM_5"
set src-address "Katharion_SPAM_6"
set src-address "Katharion_SPAM_7"
set src-address "Katharion_SPAM_NEW1"
set src-address "Katharion_SPAM_NEW2"
set service "LDAP"
exit
set policy id 83 from "Trust" to "Untrust"  "192.168.180.0/24" 
"Mexico_internal" "rbza_Requirements" tunnel vpn "To_Mexico" id 50 
pair-policy 81 log
set policy id 83
exit
set policy id 80 from "Trust" to "Untrust"  "Any" "192.168.180.0/24" 
"rbza_Requirements" permit log
set policy id 80
exit
set policy id 79 from "Untrust" to "Trust"  "Texas" "Chicago" "ANY" 
tunnel vpn "To_Texas" id 49 pair-policy 78 log
set policy id 79
exit
set policy id 78 from "Trust" to "Untrust"  "Chicago" "Texas" "ANY" 
tunnel vpn "To_Texas" id 49 pair-policy 79 log
set policy id 78
exit
set policy id 77 from "Untrust" to "DMZ"  "HongKong" "OWA" "ANY" permit log
set policy id 77
exit
set policy id 76 from "DMZ" to "Untrust"  "OWA" "HongKong" "ANY" permit log
set policy id 76
exit
set policy id 75 from "Untrust" to "Trust"  "HongKong" "QST_Global" 
"ANY" permit log
set policy id 75
exit
set policy id 74 from "Trust" to "Untrust"  "QST_Global" "HongKong" 
"ANY" permit log
set policy id 74
exit
set policy id 73 from "Untrust" to "Trust"  "Cali" "Chicago" 
"rbza_Requirements" tunnel vpn "To_Cali" id 43 pair-policy 72 log
set policy id 73
exit
set policy id 72 from "Trust" to "Untrust"  "Chicago" "Cali" 
"rbza_Requirements" tunnel vpn "To_Cali" id 43 pair-policy 73 log
set policy id 72
exit
set policy id 71 from "DMZ" to "Untrust"  "AT&TConcentrator" "Any" "ANY" 
permit log
set policy id 71
exit
set policy id 66 name "To_Singapore" from "Trust" to "Untrust"  
"Chicago" "Singapore" "ANY" tunnel vpn "To_Singapore" id 27 pair-policy 65
set policy id 66
exit
set policy id 65 name "To_Singapore" from "Untrust" to "Trust"  
"Singapore" "Chicago" "ANY" tunnel vpn "To_Singapore" id 27 pair-policy 66
set policy id 65
exit
set policy id 48 name "Guatemala" from "Untrust" to "Trust"  "Guatemala" 
"Chicago" "ANY" tunnel vpn "To_Guatemala" id 12 pair-policy 49 log 
no-session-backup
set policy id 48
exit
set policy id 49 name "Guatemala" from "Trust" to "Untrust"  "Chicago" 
"Guatemala" "ANY" tunnel vpn "To_Guatemala" id 12 pair-policy 48 log 
no-session-backup
set policy id 49
exit
set policy id 61 name "Test Message" from "Trust" to "Global"  "Any" 
"200.57.157.65/32" "ANY" permit log
set policy id 61
exit
set policy id 51 from "Untrust" to "DMZ"  "Any" "AT&TConcentrator" "ANY" 
permit log
set policy id 51
exit
set policy id 50 from "Untrust" to "Trust"  "69.27.238.0/24" 
"MIP(12.106.250.5)" "MAIL" permit log
set policy id 50
set src-address "Katharion_SPAM_1"
set src-address "Katharion_SPAM_2"
set src-address "Katharion_SPAM_3"
set src-address "Katharion_SPAM_4"
set src-address "Katharion_SPAM_5"
set src-address "Katharion_SPAM_6"
set src-address "Katharion_SPAM_7"
set src-address "Katharion_SPAM_NEW1"
set src-address "Katharion_SPAM_NEW2"
exit
set policy id 40 name "CiscoVPN" from "Trust" to "DMZ"  "Any" "Cisco 
VPN" "ANY" permit
set policy id 40
exit
set policy id 39 name "Surf Control" from "Untrust" to "Trust"  "Any" 
"MIP(12.106.250.6)" "ICMP-ANY" permit
set policy id 39 disable
set policy id 39
set service "Terminal_Srvc"
exit
set policy id 29 from "Trust" to "Untrust"  "Any" "192.168.121.0/24" 
"ANY" permit
set policy id 29
set dst-address "192.168.188.0/24"
set dst-address "192.168.190.0/24"
set dst-address "Mexico_internal"
exit
set policy id 2 from "Trust" to "Untrust"  "Internal Servers" "Any" 
"FTP" nat src permit
set policy id 2
set service "HTTP"
set service "HTTPS"
exit
set policy id 27 from "Trust" to "Untrust"  "Any" "Any" "FTP" nat src 
permit log url-filter
set policy id 27
set service "HTTP"
set service "HTTPS"
set service "ICMP-ANY"
set service "Mexico_software"
set service "TELNET"
exit
set policy id 38 name "MexicanGov" from "Trust" to "Global"  "Any" "Any" 
"MexicanGov" permit log
set policy id 38
set service "Mexico_software"
exit
set policy id 37 name "SNMP Allowed Out" from "DMZ" to "Untrust"  
"Juniper-SSL" "Any" "ANY" permit
set policy id 37
exit
set policy id 36 name "Allow Juniper SSL Gateway" from "Untrust" to 
"DMZ"  "Any" "Juniper-SSL" "HTTP" permit
set policy id 36
set service "HTTPS"
set service "ICMP-ANY"
set service "RSA Services"
set service "SNMP"
exit
set policy id 34 from "DMZ" to "Untrust"  "Any" "Any" "ANY" permit
set policy id 34
exit
set policy id 70 from "DMZ" to "Trust"  "AT&TConcentrator" "Any" "ANY" 
permit log
set policy id 70
exit
set policy id 33 name "IDPTest" from "DMZ" to "Trust"  "Juniper-IDP" 
"Any" "ANY" permit
set policy id 33
exit
set policy id 32 name "IDP Comms Out" from "DMZ" to "Untrust"  
"Juniper-IDP" "Any" "ANY" permit
set policy id 32
exit
set policy id 31 name "Juniper Comm" from "Untrust" to "DMZ"  
"Defkon_NSM" "Juniper-IDP" "ANY" permit log
set policy id 31
exit
set policy id 26 name "Acces to Checkpoint Server" from "Trust" to 
"Untrust"  "192.168.180.98/32" "Any" "TCP-18190" nat src permit
set policy id 26
exit
set policy id 28 from "Untrust" to "Trust"  "192.168.121.0/24" "Any" 
"ANY" permit
set policy id 28
set src-address "192.168.188.0/24"
set src-address "192.168.190.0/24"
set src-address "Mexico_internal"
exit
set policy id 18 name "OLD RULE 26" from "Trust" to "Untrust"  "Any" 
"Any" "DNB" nat src permit log
set policy id 18
set service "DNS"
set service "IM_Custom"
set service "MAIL"
set service "POP3"
set service "SOCKS"
set service "SSH"
set service "TCP-1024-5000"
set service "TCP-8100"
exit
set policy id 14 from "DMZ" to "Trust"  "10.1.1.0/24" "Any" "ANY" permit
set policy id 14
set src-address "Cisco VPN"
exit
set policy id 13 from "Untrust" to "DMZ"  "Any" "Cisco VPN" "ANY" permit 
log
set policy id 13
exit
set policy id 12 from "Trust" to "DMZ"  "Any" "OWA" "ANY" permit log
set policy id 12
exit
set policy id 10 from "DMZ" to "Trust"  "OWA" "Any" "ANY" permit log
set policy id 10
exit
set policy id 8 from "Untrust" to "DMZ"  "Any" "OWA" "HTTPS" permit log
set policy id 8
exit
set policy id 3 from "Trust" to "Untrust"  "Any" "Any" "ANY" deny
set policy id 3
exit
set policy id 4 from "Trust" to "DMZ"  "Any" "Any" "ANY" permit log
set policy id 4
exit
set policy id 5 from "Untrust" to "DMZ"  "Any" "Any" "ANY" deny
set policy id 5
exit
set policy id 7 from "DMZ" to "Trust"  "Any" "Any" "ANY" permit log
set policy id 7
exit
set policy id 16 from "DMZ" to "Untrust"  "Guatemala VPN" 
"200.12.52.113/32" "IPSEC" permit
set policy id 16
set service "TELNET"
exit
set policy id 20 from "DMZ" to "Untrust"  "Guatemala VPN" 
"216.184.126.113" "IPSEC" permit
set policy id 20
exit
set policy id 17 from "DMZ" to "Untrust"  "Any" "Any" "ANY" deny
set policy id 17
exit
set policy id 21 from "Trust" to "Global"  "Any" "Any" "TCP-82" permit
set policy id 21
exit
set policy id 24 from "Trust" to "Global"  "Any" "Any" "TCP-264" permit
set policy id 24
set service "UDP-2746"
set service "UDP-500"
exit
set policy id 81 name "To_Mexico" from "Untrust" to "Trust"  
"Mexico_internal" "192.168.180.0/24" "rbza_Requirements" tunnel vpn 
"To_Mexico" id 50 pair-policy 83 log
set policy id 81
exit
set policy id 82 from "Untrust" to "Trust"  "Any" "Any" "ANY" deny
set policy id 82
exit
set policy id 89 from "Untrust" to "Trust"  "192.168.0.0/24" 
"192.168.0.0/16" "ANY" tunnel vpn "Gateway for LA" id 57 pair-policy 88 log
set policy id 89
exit
set policy id 91 from "Untrust" to "Trust"  "192.168.186.0/24" 
"192.168.0.0/16" "ANY" tunnel vpn "To_Torreon" id 59 pair-policy 90 log
set policy id 91
exit
set syslog config "205.234.155.251"
set syslog config "205.234.155.251" facilities local0 local0
set syslog src-interface ethernet0/2
set syslog enable
set nsmgmt bulkcli reboot-timeout 60
set ssh version v2
set ssh enable
set scp enable
set config lock timeout 5
unset license-key auto-update
set ntp server "1.pool.ntp.org"
set ntp server src-interface "ethernet0/2"
set ntp server backup1 "2.pool.ntp.org"
set ntp server backup1 src-interface "ethernet0/2"
set ntp server backup2 "0.pool.ntp.org"
set ntp server backup2 src-interface "ethernet0/2"
set ntp max-adjustment 60
set snmp community "rkOnmssp" Read-Write Trap-on  traffic version v2c
set snmp community "rkOnm$$p" Read-Write Trap-on  traffic version v2c
set snmp host "rkOnm$$p" XXXXXX 255.255.255.0
set snmp host "rkOnmssp" XXXXXXX 255.255.255.255 src-interface 
ethernet0/2 trap v2
set snmp location "Chicago HQ"
set snmp contact "support at rkon.com"
set snmp name "QST-Chi-Firewall"
set snmp port listen 161
set snmp port trap 162
set vrouter "untrust-vr"
set route 192.168.1.0/24 interface tunnel.1 preference 10
exit
set vrouter "trust-vr"
unset add-default-route
set route 0.0.0.0/0 interface ethernet0/2 gateway 12.63.231.145 
preference 20
set route 192.168.181.0/24 interface ethernet0/0 gateway 192.168.180.19 
preference 10
set route 192.168.184.0/24 interface ethernet0/0 gateway 192.168.180.19 
preference 10 permanent
set route 192.168.185.0/24 interface ethernet0/0 gateway 192.168.180.19 
preference 10
set route 192.168.187.0/24 interface ethernet0/0 gateway 192.168.180.19 
preference 10
set route 10.1.1.0/24 interface ethernet0/0 gateway 192.168.180.231 
preference 10 permanent
set route 192.168.1.0/24 interface tunnel.1 preference 10
set route 192.168.20.0/24 interface tunnel.3 preference 20 permanent
set route 12.63.231.150/32 interface ethernet0/0 preference 20
exit
set vrouter "untrust-vr"
exit
set vrouter "trust-vr"
exit



More information about the juniper-nsp mailing list