[j-nsp] SSG140 traffic dies - JTAC as no idea
Ben Dale
bdale at comlinx.com.au
Wed Mar 11 21:56:02 EDT 2009
I've come across a similar issue to this one with an SSG20. When you
do eventually get some console access to the device, check the event
log for messages such as "Switch error: get phy register (dev 8, reg
4) fail". If this is the same problem I was having, then there was a
patch built off 6.0r5 (I notice you are running r7) and related PR
numbers are 291764, 225017, 285333, 286295, though I think most were
private last time I checked.
On 12/03/2009, at 10:27 AM, ChrisSerafin wrote:
Tim Eberhard wrote:
> Is the firewall itself freezing or is it just not passing traffic?
>
> I understand step 1 when working with a remote device like that is
> typically have the customer reboot it to see if that restores
> service but is it really frozen?
>
> You could be having interface issues (I see most are auto neg) or
> circuit issues.
>
> -Tim Eberhard
>
> On Wed, Mar 11, 2009 at 3:53 PM, ChrisSerafin
> <chris at chrisserafin.com <mailto:chris at chrisserafin.com>> wrote:
>
> UUGGGHH,
>
> major problem for myself over here. I have installed a brand new
> SSG140 firewall at a client and for some reason it keeps freezing
> and will not pass traffic. We are never onsite and can't get
> console messages or troubleshoot while it's down. (i'm putting a
> laptop attached to the console tomorrow for this) We have tried
> multiple firmware changes, swapped UPS's, and actually RMA'ed the
> device for a new one. Same thing persists. Pulling my hair out and
> JTAC says they need console access while it is down...hard to do
> for a HQ VPN hub site.
>
> Any ideas are more than appreciated.....THANKS! Info below
>
> --chris
>
> Product Name SSG-140
> Host Name QST-CHI-HQ
> Serial Number 0185062007000016
> Control Number ffffffff
> Hardware Version 1010(0)-( 0), FPGA checksum: 0, VLAN1 IP
> (0.0.0.0)
> Software Version 6.0.0r7.0, Type: Firewall+VPN
> Feature AV-K
> Base Mac 0019.e241.4880
> File Name screenos_image, Checksum: e5cb9ed
> Total Memory 512MB
> Date 03/11/2009 15:51:44, Daylight Saving Time enabled.
> The Network Time Protocol is enabled.
> Up 0 hours 6 minutes 27 seconds since 11Mar2009:15:45:17
> Total Device Resets: 0.
> System in NAT/route mode.
> Use interface IP, Config Port: 80
> User Name: netscreen
>
>
>
>
>
>
> set clock ntp
> set clock timezone -6
> set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0
> 11 02:00
> set vrouter trust-vr sharable
> set vrouter "untrust-vr"
> exit
> set vrouter "trust-vr"
> unset auto-route-export
> exit
> set service "DNB" protocol tcp src-port 1024-65535 dst-port
> 23202-23202
> set service "IM_Custom" protocol tcp src-port 0-65535 dst-port
> 5200-5200
> set service "SOCKS" protocol tcp src-port 1024-65535 dst-port
> 1080-1080
> set service "TCP-1024-5000" protocol tcp src-port 1024-65535
> dst-port 1024-5000
> set service "TCP-18190" protocol tcp src-port 1024-65535 dst-port
> 18190-18190
> set service "TCP-264" protocol tcp src-port 1024-65535 dst-port
> 264-264
> set service "TCP-8100" protocol tcp src-port 1024-65535 dst-port
> 8100-8100
> set service "TCP-82" protocol tcp src-port 1024-65535 dst-port
> 82-82
> set service "Terminal_Srvc" protocol tcp src-port 0-65535 dst-port
> 3389-3389
> set service "UDP-2746" protocol udp src-port 0-65535 dst-port
> 2746-2746
> set service "UDP-500" protocol udp src-port 0-65535 dst-port
> 500-500
> set service "IPSEC" protocol 50 src-port 0-65535 dst-port 0-65535
> set service "IPSEC" + 51 src-port 0-65535 dst-port 0-65535
> set service "IPSEC" + udp src-port 0-65535 dst-port 500-500
> set service "Juniper-IDP-Comms" protocol udp src-port 0-65535
> dst-port 7101-7102
> set service "Juniper-IDP-Comms" + udp src-port 0-65535 dst-port
> 7201-7202
> set service "RSA Services" protocol udp src-port 0-65535 dst-port
> 5500-5500
> set service "RSA Services" + tcp src-port 0-65535 dst-port
> 5500-5500
> set service "MexicanGov" protocol tcp src-port 0-65535 dst-port
> 8081-8081
> set service "MexicanGov" + tcp src-port 0-65535 dst-port 8089-8089
> set service "Mexico_software" protocol tcp src-port 0-65535
> dst-port 7824-7824
> set service "Mexico_software" + tcp src-port 0-65535 dst-port
> 8080-8080
> set service "Mexico_MS_VPN" protocol tcp src-port 0-65535 dst-port
> 1723-1723
> set service "Mexico_MS_VPN" + tcp src-port 0-65535 dst-port 47-47
> set auth-server "Local" id 0
> set auth-server "Local" server-name "Local"
> set auth default auth server "Local"
> set auth radius accounting port 1646
> set admin name "netscreen"
> set admin password "nO6/LZrBMXXXXXXXXXXXXXXCHtN6KXVn"
> set admin auth timeout 10
> set admin auth server "Local"
> set admin format dos
> set zone "Trust" vrouter "trust-vr"
> set zone "Untrust" vrouter "trust-vr"
> set zone "DMZ" vrouter "trust-vr"
> set zone "VLAN" vrouter "trust-vr"
> set zone "Untrust-Tun" vrouter "trust-vr"
> set zone "Trust" tcp-rst
> set zone "Untrust" block
> unset zone "Untrust" tcp-rst
> set zone "MGT" block
> set zone "DMZ" tcp-rst
> set zone "VLAN" block
> set zone "VLAN" tcp-rst
> unset zone "Untrust" screen tear-drop
> unset zone "Untrust" screen syn-flood
> unset zone "Untrust" screen ping-death
> unset zone "Untrust" screen ip-filter-src
> unset zone "Untrust" screen land
> set zone "V1-Untrust" screen tear-drop
> set zone "V1-Untrust" screen syn-flood
> set zone "V1-Untrust" screen ping-death
> set zone "V1-Untrust" screen ip-filter-src
> set zone "V1-Untrust" screen land
> set interface ethernet0/0 phy full 100mb
> set interface "ethernet0/0" zone "Trust"
> set interface "ethernet0/1" zone "DMZ"
> set interface "ethernet0/2" zone "Untrust"
> set interface "ethernet0/3" zone "DMZ"
> set interface "ethernet0/4" zone "DMZ"
> set interface "tunnel.1" zone "Untrust"
> set interface "tunnel.2" zone "Untrust"
> set interface "tunnel.3" zone "Trust"
> set interface ethernet0/0 ip 192.168.180.26/24
> <http://192.168.180.26/24>
> set interface ethernet0/0 route
> unset interface vlan1 ip
> set interface ethernet0/1 ip 12.106.237.89/29
> <http://12.106.237.89/29>
> set interface ethernet0/1 nat
> set interface ethernet0/2 ip 12.63.231.146/28
> <http://12.63.231.146/28>
> set interface ethernet0/2 route
> set interface ethernet0/3 ip 192.168.3.1/24 <http://192.168.3.1/24>
> set interface ethernet0/3 route
> set interface ethernet0/4 ip 192.168.4.1/24 <http://192.168.4.1/24>
> set interface ethernet0/4 route
> set interface tunnel.1 ip unnumbered interface ethernet0/2
> set interface tunnel.2 ip unnumbered interface ethernet0/2
> set interface tunnel.3 ip unnumbered interface ethernet0/2
> set interface ethernet0/4 mtu 1460
> unset interface vlan1 bypass-others-ipsec
> unset interface vlan1 bypass-non-ip
> set interface ethernet0/0 ip manageable
> set interface ethernet0/1 ip manageable
> set interface ethernet0/2 ip manageable
> set interface ethernet0/3 ip manageable
> set interface ethernet0/4 ip manageable
> set interface ethernet0/1 manage ssh
> set interface ethernet0/1 manage telnet
> set interface ethernet0/1 manage snmp
> set interface ethernet0/1 manage web
> set interface ethernet0/2 manage ping
> set interface ethernet0/2 manage ssh
> set interface ethernet0/2 manage telnet
> set interface ethernet0/2 manage snmp
> set interface ethernet0/2 manage ssl
> set interface ethernet0/2 manage web
> set interface ethernet0/0 monitor track-ip weight 1
> unset interface ethernet0/0 monitor track-ip dynamic
> set interface ethernet0/2 dip 4 12.63.231.150 12.63.231.150
> set interface "ethernet0/2" mip 12.106.250.6 host 192.168.180.20
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.106.250.7 host 192.168.180.1
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.106.250.5 host 192.168.180.3
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.106.250.8 host 192.168.184.115
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.106.250.9 host 192.168.184.124
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.63.231.147 host 192.168.180.6
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.63.231.148 host 192.168.4.10
> netmask 255.255.255.255 vr "trust-vr"
> set interface "ethernet0/2" mip 12.63.231.149 host 192.168.4.11
> netmask 255.255.255.255 vr "trust-vr"
> set interface ethernet0/0 ntp-server
> set flow tcp-mss
> unset flow no-tcp-seq-check
> unset flow tcp-syn-check
> unset flow tcp-syn-bit-check
> set flow reverse-route clear-text prefer
> set flow reverse-route tunnel always
> set console page 0
> set hostname QST-CHI-HQ
> set pki authority default scep mode "auto"
> set pki x509 default cert-path partial
> set dns host dns1 192.168.180.10 src-interface ethernet0/0
> set dns host dns2 0.0.0.0
> set dns host dns3 0.0.0.0
> set dns host schedule 06:28 interval 8
> set address "Trust" "12.63.231.147/32 <http://12.63.231.147/32>"
> 12.63.231.147 255.255.255.255
> set address "Trust" "12.63.231.150/32 <http://12.63.231.150/32>"
> 12.63.231.150 255.255.255.255
> set address "Trust" "192.168.0.0/16 <http://192.168.0.0/16>"
> 192.168.0.0 255.255.0.0
> set address "Trust" "192.168.180.0/24 <http://192.168.180.0/24>"
> 192.168.180.0 255.255.255.0
> set address "Trust" "192.168.180.10" 192.168.180.10 255.255.255.255
> set address "Trust" "192.168.180.150/32
> <http://192.168.180.150/32>" 192.168.180.150 255.255.255.255
> set address "Trust" "192.168.180.163/32
> <http://192.168.180.163/32>" 192.168.180.163 255.255.255.255
> set address "Trust" "192.168.180.208/32
> <http://192.168.180.208/32>" 192.168.180.208 255.255.255.255
> set address "Trust" "192.168.180.6" 192.168.180.6 255.255.255.255
> "PDC"
> set address "Trust" "192.168.180.98/32 <http://192.168.180.98/32>"
> 192.168.180.98 255.255.255.255
> set address "Trust" "192.168.180.99/32 <http://192.168.180.99/32>"
> 192.168.180.99 255.255.255.255
> set address "Trust" "192.168.184.0" 192.168.184.0 255.255.255.0
> set address "Trust" "192.168.186.0/24 <http://192.168.186.0/24>"
> 192.168.186.0 255.255.255.0
> set address "Trust" "192.168.188.0/24 <http://192.168.188.0/24>"
> 192.168.188.0 255.255.255.0
> set address "Trust" "Chicago" 192.168.180.0 255.255.255.0
> set address "Trust" "Dallas" 192.168.182.0 255.255.255.0
> set address "Trust" "Dominican Republic" 192.168.183.0
> 255.255.255.0
> set address "Trust" "InternalDMZ" 12.106.237.89 255.255.255.248
> set address "Trust" "Los_Angeles" 192.168.185.0 255.255.255.0
> set address "Trust" "MailServer2" 192.168.181.8 255.255.255.255
> set address "Trust" "MailServer3" 192.168.184.11 255.255.255.255
> set address "Trust" "Mexico Vendor 2" 192.168.184.124
> 255.255.255.255
> set address "Trust" "Mexico Vendor1" 192.168.184.115
> 255.255.255.255
> set address "Trust" "Mexico_internal" 192.168.186.0 255.255.255.0
> set address "Trust" "New_York" 192.168.187.0 255.255.255.0
> set address "Trust" "newmail-192.168.180.206" 192.168.180.206
> 255.255.255.255
> set address "Trust" "newmail-192.168.180.207" 192.168.180.207
> 255.255.255.255
> set address "Trust" "newmail-192.168.180.208" 192.168.180.208
> 255.255.255.255
> set address "Trust" "North_Carolina" 192.168.181.0 255.255.255.0
> set address "Trust" "Server05" 192.168.180.8 255.255.255.255
> set address "Trust" "Server07" 192.168.180.5 255.255.255.255 "PDC"
> set address "Trust" "Server09" 192.168.180.3 255.255.255.255
> set address "Trust" "Server10" 192.168.180.1 255.255.255.255
> set address "Trust" "TolucaMX" 192.168.184.0 255.255.255.0
> set address "Trust" "Torreno_Mx" 192.168.186.0 255.255.255.0
> set address "Untrust" "10.0.0.0/24 <http://10.0.0.0/24>" 10.0.0.0
> 255.255.255.0
> set address "Untrust" "10.0.0.0/8 <http://10.0.0.0/8>" 10.0.0.0
> 255.0.0.0
> set address "Untrust" "12.106.237.89/29 <http://12.106.237.89/29>"
> 12.106.237.89 255.255.255.248
> set address "Untrust" "12.208.94.0/24 <http://12.208.94.0/24>"
> 12.208.94.0 255.255.255.0
> set address "Untrust" "192.168.0.0/16 <http://192.168.0.0/16>"
> 192.168.0.0 255.255.0.0
> set address "Untrust" "192.168.0.0/24 <http://192.168.0.0/24>"
> 192.168.0.0 255.255.255.0
> set address "Untrust" "192.168.121.0/24 <http://192.168.121.0/24>"
> 192.168.121.0 255.255.255.0
> set address "Untrust" "192.168.180.0/24 <http://192.168.180.0/24>"
> 192.168.180.0 255.255.255.0
> set address "Untrust" "192.168.183.0/24 <http://192.168.183.0/24>"
> 192.168.183.0 255.255.255.0
> set address "Untrust" "192.168.186.0/24 <http://192.168.186.0/24>"
> 192.168.186.0 255.255.255.0
> set address "Untrust" "192.168.188.0/24 <http://192.168.188.0/24>"
> 192.168.188.0 255.255.255.0
> set address "Untrust" "192.168.190.0/24 <http://192.168.190.0/24>"
> 192.168.190.0 255.255.255.0
> set address "Untrust" "192.168.191.0/24 <http://192.168.191.0/24>"
> 192.168.191.0 255.255.255.0
> set address "Untrust" "192.168.20.0/24 <http://192.168.20.0/24>"
> 192.168.20.0 255.255.255.0
> set address "Untrust" "200.12.52.113/32 <http://200.12.52.113/32>"
> 200.12.52.113 255.255.255.255
> set address "Untrust" "216.184.126.113" 216.184.126.113
> 255.255.255.255
> set address "Untrust" "64.74.172.210/32 <http://64.74.172.210/32>"
> 64.74.172.210 255.255.255.255
> set address "Untrust" "66.29.23.0/24 <http://66.29.23.0/24>"
> 66.29.23.0 255.255.255.0
> set address "Untrust" "69.27.238.0/24 <http://69.27.238.0/24>"
> 69.27.238.0 255.255.255.0
> set address "Untrust" "Cali" 192.168.121.0 255.255.255.0
> set address "Untrust" "Defkon_NSM" 205.234.155.199 255.255.255.255
> set address "Untrust" "Defkon_RKON" 205.234.155.0 255.255.255.0
> set address "Untrust" "Guatemala" 192.168.188.0 255.255.255.0
> set address "Untrust" "HongKong" 192.168.1.0 255.255.255.0
> "Interior office range"
> set address "Untrust" "ISA-1-12.63.231.148" 12.63.231.148
> 255.255.255.255
> set address "Untrust" "ISA-2-12.63.231.149" 12.63.231.149
> 255.255.255.255
> set address "Untrust" "Katharion_SPAM_1" 64.74.172.0 255.255.255.0
> set address "Untrust" "Katharion_SPAM_2" 64.74.173.0 255.255.255.0
> set address "Untrust" "Katharion_SPAM_3" 207.154.50.9 255.255.255.0
> set address "Untrust" "Katharion_SPAM_4" 208.70.88.0 255.255.255.0
> set address "Untrust" "Katharion_SPAM_5" 208.70.89.0 255.255.255.0
> set address "Untrust" "Katharion_SPAM_6" 208.70.90.0 255.255.255.0
> set address "Untrust" "Katharion_SPAM_7" 208.70.91.0 255.255.255.0
> set address "Untrust" "Katharion_SPAM_NEW1" 174.36.154.0
> 255.255.255.0
> set address "Untrust" "Katharion_SPAM_NEW2" 208.43.37.0
> 255.255.255.0
> set address "Untrust" "Mexico_internal" 192.168.186.0 255.255.255.0
> set address "Untrust" "Mexico_Vendor_VPN" 12.26.200.0 255.255.255.0
> set address "Untrust" "Singapore" 192.168.190.0 255.255.255.0
> "Interior office range"
> set address "Untrust" "Texas" 192.168.182.0 255.255.255.0
> set address "Untrust" "TriActive" 66.45.78.1 255.255.255.0
> set address "Global" "200.57.157.65/32 <http://200.57.157.65/32>"
> 200.57.157.65 255.255.255.255
> set address "DMZ" "10.1.1.0/24 <http://10.1.1.0/24>" 10.1.1.0
> 255.255.255.0
> set address "DMZ" "12.63.231.148/32 <http://12.63.231.148/32>"
> 12.63.231.148 255.255.255.255
> set address "DMZ" "12.63.231.149/32 <http://12.63.231.149/32>"
> 12.63.231.149 255.255.255.255
> set address "DMZ" "192.168.3.10/32 <http://192.168.3.10/32>"
> 192.168.3.10 255.255.255.255
> set address "DMZ" "AT&TConcentrator" 12.106.237.94 255.255.255.255
> set address "DMZ" "Cisco VPN" 12.106.237.90 255.255.255.255
> set address "DMZ" "DMZ" 12.106.237.89 255.255.255.248
> set address "DMZ" "Guatemala VPN" 12.106.237.92 255.255.255.255
> set address "DMZ" "ISA-private" 192.168.3.10 255.255.255.255
> set address "DMZ" "Juniper-IDP" 12.106.237.91 255.255.255.255
> set address "DMZ" "Juniper-SSL" 12.106.237.92 255.255.255.255
> set address "DMZ" "OWA" 12.106.237.93 255.255.255.255
> set group address "Trust" "Internal Servers"
> set group address "Trust" "Internal Servers" add "192.168.180.6"
> set group address "Trust" "Internal Servers" add "Server05"
> set group address "Trust" "Internal Servers" add "Server07"
> set group address "Trust" "Internal Servers" add "Server09"
> set group address "Trust" "Internal Servers" add "Server10"
> set group address "Trust" "Mexico Vendor"
> set group address "Trust" "Mexico Vendor" add "Mexico Vendor 2"
> set group address "Trust" "Mexico Vendor" add "Mexico Vendor1"
> set group address "Trust" "QST_Global"
> set group address "Trust" "QST_Global" add "Chicago"
> set group address "Trust" "QST_Global" add "Dallas"
> set group address "Trust" "QST_Global" add "Dominican Republic"
> set group address "Trust" "QST_Global" add "Los_Angeles"
> set group address "Trust" "QST_Global" add "New_York"
> set group address "Trust" "QST_Global" add "North_Carolina"
> set group address "Trust" "QST_Global" add "TolucaMX"
> set group address "Trust" "QST_Global" add "Torreno_Mx"
> set group service "rbza_Requirements"
> set group service "rbza_Requirements" add "FTP"
> set group service "rbza_Requirements" add "HTTP"
> set group service "rbza_Requirements" add "HTTPS"
> set group service "rbza_Requirements" add "ICMP-ANY"
> set group service "rbza_Requirements" add "SSH"
> set group service "rbza_Requirements" add "TELNET"
> set group service "rbza_Requirements" add "Terminal_Srvc"
> set ike gateway "To_Guatemala" address 209.161.118.113 Main
> outgoing-interface "ethernet0/2" preshare
> "YFpv1oMqXfKeCnyCxbe3neNbtT4g==" proposal "pre-g2-3des-sha"
> set ike gateway "To_Singapore" address 203.125.41.238 Main
> outgoing-interface "ethernet0/2" preshare
> "Byr0lsK2NFIXCDHUZMnAn0YnpSvQ==" proposal "pre-g2-3des-sha"
> set ike gateway "To_Hong_Kong" address 210.177.75.29 Main
> outgoing-interface "ethernet0/2" preshare
> "sP2QFLPyNXMMCGhYVAHRn19dnfQg==" proposal "pre-g2-3des-sha"
> set ike gateway "To_Cali" address 205.159.31.253 Main
> outgoing-interface "ethernet0/2" preshare
> "HaC5RtnENOXE6CX/qUNiHnvuelgzA==" proposal "pre-g2-3des-sha"
> set ike gateway "To_Texas" address 68.165.74.138 Main
> outgoing-interface "ethernet0/2" preshare
> "UnCKD/bWNFXCL1rKADGnWi2f+sg==" proposal "pre-g2-3des-sha"
> set ike gateway "To_Mexico" address 201.101.8.250 Main
> outgoing-interface "ethernet0/2" preshare
> "UNij3gU+NeU+XYnheYJSnWOANkRQ==" sec-level compatible
> set ike gateway "Gateway for 10.0.0.0/24 <http://10.0.0.0/24>"
> address 196.3.88.102 Main outgoing-interface "ethernet0/2"
> preshare "Vxy5XbssXV1CC5mQdwBnQJyLJVg==" proposal "pre-g2-3des-md5"
> set ike gateway "Gateway for LA" address 67.110.248.194 Main
> outgoing-interface "ethernet0/2" preshare
> "0smtBN/UNpXIQtKdntAYGiAA==" proposal "pre-g2-3des-md5"
> set ike gateway "To_Torreon" address 201.117.236.9 Main local-id
> "192.168.0.0" outgoing-interface "ethernet0/2" preshare
> "acqpXbXC9ymdI9sn4g4MNbg==" proposal "pre-g2-3des-md5"
> set ike gateway "To_Morracco" address 81.192.101.145 Main local-id
> "192.168.0.0" outgoing-interface "ethernet0/2" preshare
> "JtS3S9Xk8svPkCP9ZgWTUnb9IxPOw==" proposal "pre-g2-3des-md5"
> set ike gateway "To_UK" address 81.137.215.196 Main
> outgoing-interface "ethernet0/2" preshare
> "F+YIj2vANCrJWUsbSXCZuXnm1ZFwew==" sec-level compatible
> set ike respond-bad-spi 1
> set ike soft-lifetime-buffer 30
> unset ike ikeid-enumeration
> unset ike dos-protection
> unset ipsec access-session enable
> set ipsec access-session maximum 5000
> set ipsec access-session upper-threshold 0
> set ipsec access-session lower-threshold 0
> set ipsec access-session dead-p2-sa-timeout 0
> unset ipsec access-session log-error
> unset ipsec access-session info-exch-connected
> unset ipsec access-session use-error-log
> set vpn "To_Guatemala" gateway "To_Guatemala" no-replay tunnel
> idletime 0 sec-level compatible
> set vpn "To_Guatemala" monitor
> set vpn "To_Singapore" gateway "To_Singapore" no-replay tunnel
> idletime 0 sec-level compatible
> set vpn "To_Hong_Kong" gateway "To_Hong_Kong" no-replay tunnel
> idletime 0 sec-level compatible
> set vpn "To_Hong_Kong" id 45 bind interface tunnel.1
> set vpn "To_Cali" gateway "To_Cali" no-replay tunnel idletime 0
> sec-level compatible
> set vpn "To_Texas" gateway "To_Texas" no-replay tunnel idletime 0
> sec-level compatible
> set vpn "To_Mexico" gateway "To_Mexico" replay tunnel idletime 0
> sec-level standard
> set vpn "To_Mexico" monitor
> set vpn "Gateway for LA" gateway "Gateway for LA" no-replay tunnel
> idletime 0 proposal "nopfs-esp-3des-md5"
> set vpn "To_Torreon" gateway "To_Torreon" replay tunnel idletime 0
> proposal "nopfs-esp-3des-md5"
> set vpn "To_Morracco" gateway "To_Morracco" replay tunnel idletime
> 0 proposal "nopfs-esp-3des-md5"
> set vpn "To_UK" gateway "To_UK" no-replay tunnel idletime 0
> sec-level compatible
> set vpn "To_UK" monitor rekey
> set vpn "To_UK" id 61 bind interface tunnel.3
> set vpn "VPN for 10.0.0.0/24 <http://10.0.0.0/24>" gateway
> "Gateway for 10.0.0.0/24 <http://10.0.0.0/24>" no-replay tunnel
> idletime 0 proposal "nopfs-esp-3des-md5"
> set vrouter "untrust-vr"
> exit
> set vrouter "trust-vr"
> exit
> set di service HTTP content_type_length 8192
> set di service HTTP user_agent_length 8192
> set di service HTTP host_length 8192
> set di service HTTP failed_logins 50
> set di service HTTP brute_search 100
> set url protocol type scfp
> set url protocol scfp
> set config enable
> set server 192.168.180.20 62252 60
> set fail-mode permit
> set server src-interface ethernet0/0
> exit
> set vpn "To_Hong_Kong" proxy-id local-ip 0.0.0.0/0
> <http://0.0.0.0/0> remote-ip 0.0.0.0/0 <http://0.0.0.0/0> "ANY"
> set vpn "Gateway for LA" proxy-id local-ip 192.168.0.0/16
> <http://192.168.0.0/16> remote-ip 192.168.0.0/24
> <http://192.168.0.0/24> "ANY"
> set vpn "To_Torreon" proxy-id local-ip 192.168.0.0/16
> <http://192.168.0.0/16> remote-ip 192.168.186.0/24
> <http://192.168.186.0/24> "ANY"
> set vpn "To_Morracco" proxy-id local-ip 192.168.0.0/16
> <http://192.168.0.0/16> remote-ip 192.168.191.0/24
> <http://192.168.191.0/24> "ANY"
> set vpn "VPN for 10.0.0.0/24 <http://10.0.0.0/24>" proxy-id
> local-ip 192.168.0.0/16 <http://192.168.0.0/16> remote-ip
> 192.168.183.0/24 <http://192.168.183.0/24> "ANY"
> set policy id 106 from "Trust" to "Untrust"
> "newmail-192.168.180.206" "10.0.0.0/8 <http://10.0.0.0/8>" "ANY"
> permit log
> set policy id 106
> set src-address "newmail-192.168.180.207"
> set src-address "newmail-192.168.180.208"
> set dst-address "192.168.0.0/16 <http://192.168.0.0/16>"
> exit
> set policy id 105 from "Trust" to "Untrust"
> "newmail-192.168.180.206" "Any" "ANY" nat src dip-id 4 permit log
> set policy id 105
> set src-address "newmail-192.168.180.207"
> set src-address "newmail-192.168.180.208"
> exit
> set policy id 104 from "Untrust" to "DMZ" "Any"
> "MIP(12.63.231.149)" "HTTP" permit log
> set policy id 104
> set service "PING"
> exit
> set policy id 103 from "Untrust" to "DMZ" "Any"
> "MIP(12.63.231.148)" "HTTP" permit log
> set policy id 103
> set service "HTTPS"
> set service "PING"
> exit
> set policy id 102 from "DMZ" to "Trust" "192.168.3.10/32
> <http://192.168.3.10/32>" "192.168.180.208/32
> <http://192.168.180.208/32>" "HTTPS" permit log
> set policy id 102
> exit
> set policy id 101 from "DMZ" to "Trust" "192.168.3.10/32
> <http://192.168.3.10/32>" "192.168.180.10" "DNS" permit log
> set policy id 101
> set dst-address "192.168.180.6"
> set service "LDAP"
> exit
> set policy id 99 from "Untrust" to "Trust" "192.168.183.0/24
> <http://192.168.183.0/24>" "192.168.0.0/16
> <http://192.168.0.0/16>" "ANY" tunnel vpn "VPN for 10.0.0.0/24
> <http://10.0.0.0/24>" id 62 pair-policy 98 log
> set policy id 99
> exit
> set policy id 107 from "Untrust" to "Trust" "Katharion_SPAM_1"
> "12.63.231.150/32 <http://12.63.231.150/32>" "ICMP-ANY" nat dst ip
> 192.168.180.208 permit log
> set policy id 107
> set src-address "Katharion_SPAM_2"
> set src-address "Katharion_SPAM_3"
> set src-address "Katharion_SPAM_4"
> set src-address "Katharion_SPAM_5"
> set src-address "Katharion_SPAM_6"
> set src-address "Katharion_SPAM_7"
> set src-address "Katharion_SPAM_NEW1"
> set src-address "Katharion_SPAM_NEW2"
> set service "SMTP"
> exit
> set policy id 98 from "Trust" to "Untrust" "192.168.0.0/16
> <http://192.168.0.0/16>" "192.168.183.0/24
> <http://192.168.183.0/24>" "ANY" tunnel vpn "VPN for 10.0.0.0/24
> <http://10.0.0.0/24>" id 62 pair-policy 99 log
> set policy id 98
> exit
> set policy id 97 from "Untrust" to "Trust" "Any" "Any" "NTP"
> permit log
> set policy id 97
> exit
> set policy id 96 from "Trust" to "Untrust" "Any" "Any" "NTP"
> permit log
> set policy id 96
> exit
> set policy id 95 from "Untrust" to "Trust" "192.168.20.0/24
> <http://192.168.20.0/24>" "192.168.0.0/16 <http://192.168.0.0/16>"
> "ANY" permit log
> set policy id 95
> exit
> set policy id 94 from "Trust" to "Untrust" "192.168.0.0/16
> <http://192.168.0.0/16>" "192.168.20.0/24
> <http://192.168.20.0/24>" "ANY" permit log
> set policy id 94
> exit
> set policy id 93 from "Untrust" to "Trust" "192.168.191.0/24
> <http://192.168.191.0/24>" "192.168.0.0/16
> <http://192.168.0.0/16>" "ANY" tunnel vpn "To_Morracco" id 60
> pair-policy 92 log
> set policy id 93
> exit
> set policy id 92 from "Trust" to "Untrust" "192.168.0.0/16
> <http://192.168.0.0/16>" "192.168.191.0/24
> <http://192.168.191.0/24>" "ANY" tunnel vpn "To_Morracco" id 60
> pair-policy 93 log
> set policy id 92
> exit
> set policy id 90 from "Trust" to "Untrust" "192.168.0.0/16
> <http://192.168.0.0/16>" "192.168.186.0/24
> <http://192.168.186.0/24>" "ANY" tunnel vpn "To_Torreon" id 59
> pair-policy 91 log
> set policy id 90
> exit
> set policy id 88 from "Trust" to "Untrust" "192.168.0.0/16
> <http://192.168.0.0/16>" "192.168.0.0/24 <http://192.168.0.0/24>"
> "ANY" tunnel vpn "Gateway for LA" id 57 pair-policy 89 log
> set policy id 88
> exit
> set policy id 84 name "Filter SPAM In - LDAP Requests" from
> "Untrust" to "Trust" "Defkon_RKON" "MIP(12.63.231.147)"
> "ICMP-ANY" permit log
> set policy id 84
> set src-address "Katharion_SPAM_1"
> set src-address "Katharion_SPAM_2"
> set src-address "Katharion_SPAM_3"
> set src-address "Katharion_SPAM_4"
> set src-address "Katharion_SPAM_5"
> set src-address "Katharion_SPAM_6"
> set src-address "Katharion_SPAM_7"
> set src-address "Katharion_SPAM_NEW1"
> set src-address "Katharion_SPAM_NEW2"
> set service "LDAP"
> exit
> set policy id 83 from "Trust" to "Untrust" "192.168.180.0/24
> <http://192.168.180.0/24>" "Mexico_internal" "rbza_Requirements"
> tunnel vpn "To_Mexico" id 50 pair-policy 81 log
> set policy id 83
> exit
> set policy id 80 from "Trust" to "Untrust" "Any"
> "192.168.180.0/24 <http://192.168.180.0/24>" "rbza_Requirements"
> permit log
> set policy id 80
> exit
> set policy id 79 from "Untrust" to "Trust" "Texas" "Chicago"
> "ANY" tunnel vpn "To_Texas" id 49 pair-policy 78 log
> set policy id 79
> exit
> set policy id 78 from "Trust" to "Untrust" "Chicago" "Texas"
> "ANY" tunnel vpn "To_Texas" id 49 pair-policy 79 log
> set policy id 78
> exit
> set policy id 77 from "Untrust" to "DMZ" "HongKong" "OWA" "ANY"
> permit log
> set policy id 77
> exit
> set policy id 76 from "DMZ" to "Untrust" "OWA" "HongKong" "ANY"
> permit log
> set policy id 76
> exit
> set policy id 75 from "Untrust" to "Trust" "HongKong"
> "QST_Global" "ANY" permit log
> set policy id 75
> exit
> set policy id 74 from "Trust" to "Untrust" "QST_Global"
> "HongKong" "ANY" permit log
> set policy id 74
> exit
> set policy id 73 from "Untrust" to "Trust" "Cali" "Chicago"
> "rbza_Requirements" tunnel vpn "To_Cali" id 43 pair-policy 72 log
> set policy id 73
> exit
> set policy id 72 from "Trust" to "Untrust" "Chicago" "Cali"
> "rbza_Requirements" tunnel vpn "To_Cali" id 43 pair-policy 73 log
> set policy id 72
> exit
> set policy id 71 from "DMZ" to "Untrust" "AT&TConcentrator" "Any"
> "ANY" permit log
> set policy id 71
> exit
> set policy id 66 name "To_Singapore" from "Trust" to "Untrust"
> "Chicago" "Singapore" "ANY" tunnel vpn "To_Singapore" id 27
> pair-policy 65
> set policy id 66
> exit
> set policy id 65 name "To_Singapore" from "Untrust" to "Trust"
> "Singapore" "Chicago" "ANY" tunnel vpn "To_Singapore" id 27
> pair-policy 66
> set policy id 65
> exit
> set policy id 48 name "Guatemala" from "Untrust" to "Trust"
> "Guatemala" "Chicago" "ANY" tunnel vpn "To_Guatemala" id 12
> pair-policy 49 log no-session-backup
> set policy id 48
> exit
> set policy id 49 name "Guatemala" from "Trust" to "Untrust"
> "Chicago" "Guatemala" "ANY" tunnel vpn "To_Guatemala" id 12
> pair-policy 48 log no-session-backup
> set policy id 49
> exit
> set policy id 61 name "Test Message" from "Trust" to "Global"
> "Any" "200.57.157.65/32 <http://200.57.157.65/32>" "ANY" permit
> log
> set policy id 61
> exit
> set policy id 51 from "Untrust" to "DMZ" "Any" "AT&TConcentrator"
> "ANY" permit log
> set policy id 51
> exit
> set policy id 50 from "Untrust" to "Trust" "69.27.238.0/24
> <http://69.27.238.0/24>" "MIP(12.106.250.5)" "MAIL" permit log
> set policy id 50
> set src-address "Katharion_SPAM_1"
> set src-address "Katharion_SPAM_2"
> set src-address "Katharion_SPAM_3"
> set src-address "Katharion_SPAM_4"
> set src-address "Katharion_SPAM_5"
> set src-address "Katharion_SPAM_6"
> set src-address "Katharion_SPAM_7"
> set src-address "Katharion_SPAM_NEW1"
> set src-address "Katharion_SPAM_NEW2"
> exit
> set policy id 40 name "CiscoVPN" from "Trust" to "DMZ" "Any"
> "Cisco VPN" "ANY" permit
> set policy id 40
> exit
> set policy id 39 name "Surf Control" from "Untrust" to "Trust"
> "Any" "MIP(12.106.250.6)" "ICMP-ANY" permit
> set policy id 39 disable
> set policy id 39
> set service "Terminal_Srvc"
> exit
> set policy id 29 from "Trust" to "Untrust" "Any"
> "192.168.121.0/24 <http://192.168.121.0/24>" "ANY" permit
> set policy id 29
> set dst-address "192.168.188.0/24 <http://192.168.188.0/24>"
> set dst-address "192.168.190.0/24 <http://192.168.190.0/24>"
> set dst-address "Mexico_internal"
> exit
> set policy id 2 from "Trust" to "Untrust" "Internal Servers"
> "Any" "FTP" nat src permit
> set policy id 2
> set service "HTTP"
> set service "HTTPS"
> exit
> set policy id 27 from "Trust" to "Untrust" "Any" "Any" "FTP" nat
> src permit log url-filter
> set policy id 27
> set service "HTTP"
> set service "HTTPS"
> set service "ICMP-ANY"
> set service "Mexico_software"
> set service "TELNET"
> exit
> set policy id 38 name "MexicanGov" from "Trust" to "Global" "Any"
> "Any" "MexicanGov" permit log
> set policy id 38
> set service "Mexico_software"
> exit
> set policy id 37 name "SNMP Allowed Out" from "DMZ" to "Untrust"
> "Juniper-SSL" "Any" "ANY" permit
> set policy id 37
> exit
> set policy id 36 name "Allow Juniper SSL Gateway" from "Untrust"
> to "DMZ" "Any" "Juniper-SSL" "HTTP" permit
> set policy id 36
> set service "HTTPS"
> set service "ICMP-ANY"
> set service "RSA Services"
> set service "SNMP"
> exit
> set policy id 34 from "DMZ" to "Untrust" "Any" "Any" "ANY" permit
> set policy id 34
> exit
> set policy id 70 from "DMZ" to "Trust" "AT&TConcentrator" "Any"
> "ANY" permit log
> set policy id 70
> exit
> set policy id 33 name "IDPTest" from "DMZ" to "Trust"
> "Juniper-IDP" "Any" "ANY" permit
> set policy id 33
> exit
> set policy id 32 name "IDP Comms Out" from "DMZ" to "Untrust"
> "Juniper-IDP" "Any" "ANY" permit
> set policy id 32
> exit
> set policy id 31 name "Juniper Comm" from "Untrust" to "DMZ"
> "Defkon_NSM" "Juniper-IDP" "ANY" permit log
> set policy id 31
> exit
> set policy id 26 name "Acces to Checkpoint Server" from "Trust" to
> "Untrust" "192.168.180.98/32 <http://192.168.180.98/32>" "Any"
> "TCP-18190" nat src permit
> set policy id 26
> exit
> set policy id 28 from "Untrust" to "Trust" "192.168.121.0/24
> <http://192.168.121.0/24>" "Any" "ANY" permit
> set policy id 28
> set src-address "192.168.188.0/24 <http://192.168.188.0/24>"
> set src-address "192.168.190.0/24 <http://192.168.190.0/24>"
> set src-address "Mexico_internal"
> exit
> set policy id 18 name "OLD RULE 26" from "Trust" to "Untrust"
> "Any" "Any" "DNB" nat src permit log
> set policy id 18
> set service "DNS"
> set service "IM_Custom"
> set service "MAIL"
> set service "POP3"
> set service "SOCKS"
> set service "SSH"
> set service "TCP-1024-5000"
> set service "TCP-8100"
> exit
> set policy id 14 from "DMZ" to "Trust" "10.1.1.0/24
> <http://10.1.1.0/24>" "Any" "ANY" permit
> set policy id 14
> set src-address "Cisco VPN"
> exit
> set policy id 13 from "Untrust" to "DMZ" "Any" "Cisco VPN" "ANY"
> permit log
> set policy id 13
> exit
> set policy id 12 from "Trust" to "DMZ" "Any" "OWA" "ANY" permit
> log
> set policy id 12
> exit
> set policy id 10 from "DMZ" to "Trust" "OWA" "Any" "ANY" permit
> log
> set policy id 10
> exit
> set policy id 8 from "Untrust" to "DMZ" "Any" "OWA" "HTTPS"
> permit log
> set policy id 8
> exit
> set policy id 3 from "Trust" to "Untrust" "Any" "Any" "ANY" deny
> set policy id 3
> exit
> set policy id 4 from "Trust" to "DMZ" "Any" "Any" "ANY" permit log
> set policy id 4
> exit
> set policy id 5 from "Untrust" to "DMZ" "Any" "Any" "ANY" deny
> set policy id 5
> exit
> set policy id 7 from "DMZ" to "Trust" "Any" "Any" "ANY" permit log
> set policy id 7
> exit
> set policy id 16 from "DMZ" to "Untrust" "Guatemala VPN"
> "200.12.52.113/32 <http://200.12.52.113/32>" "IPSEC" permit
> set policy id 16
> set service "TELNET"
> exit
> set policy id 20 from "DMZ" to "Untrust" "Guatemala VPN"
> "216.184.126.113" "IPSEC" permit
> set policy id 20
> exit
> set policy id 17 from "DMZ" to "Untrust" "Any" "Any" "ANY" deny
> set policy id 17
> exit
> set policy id 21 from "Trust" to "Global" "Any" "Any" "TCP-82"
> permit
> set policy id 21
> exit
> set policy id 24 from "Trust" to "Global" "Any" "Any" "TCP-264"
> permit
> set policy id 24
> set service "UDP-2746"
> set service "UDP-500"
> exit
> set policy id 81 name "To_Mexico" from "Untrust" to "Trust"
> "Mexico_internal" "192.168.180.0/24 <http://192.168.180.0/24>"
> "rbza_Requirements" tunnel vpn "To_Mexico" id 50 pair-policy 83 log
> set policy id 81
> exit
> set policy id 82 from "Untrust" to "Trust" "Any" "Any" "ANY" deny
> set policy id 82
> exit
> set policy id 89 from "Untrust" to "Trust" "192.168.0.0/24
> <http://192.168.0.0/24>" "192.168.0.0/16 <http://192.168.0.0/16>"
> "ANY" tunnel vpn "Gateway for LA" id 57 pair-policy 88 log
> set policy id 89
> exit
> set policy id 91 from "Untrust" to "Trust" "192.168.186.0/24
> <http://192.168.186.0/24>" "192.168.0.0/16
> <http://192.168.0.0/16>" "ANY" tunnel vpn "To_Torreon" id 59
> pair-policy 90 log
> set policy id 91
> exit
> set syslog config "205.234.155.251"
> set syslog config "205.234.155.251" facilities local0 local0
> set syslog src-interface ethernet0/2
> set syslog enable
> set nsmgmt bulkcli reboot-timeout 60
> set ssh version v2
> set ssh enable
> set scp enable
> set config lock timeout 5
> unset license-key auto-update
> set ntp server "1.pool.ntp.org <http://1.pool.ntp.org>"
> set ntp server src-interface "ethernet0/2"
> set ntp server backup1 "2.pool.ntp.org <http://2.pool.ntp.org>"
> set ntp server backup1 src-interface "ethernet0/2"
> set ntp server backup2 "0.pool.ntp.org <http://0.pool.ntp.org>"
> set ntp server backup2 src-interface "ethernet0/2"
> set ntp max-adjustment 60
> set snmp community "rkOnmssp" Read-Write Trap-on traffic version
> v2c
> set snmp community "rkOnm$$p" Read-Write Trap-on traffic version
> v2c
> set snmp host "rkOnm$$p" XXXXXX 255.255.255.0
> set snmp host "rkOnmssp" XXXXXXX 255.255.255.255 src-interface
> ethernet0/2 trap v2
> set snmp location "Chicago HQ"
> set snmp contact "support at rkon.com <mailto:support at rkon.com>"
> set snmp name "QST-Chi-Firewall"
> set snmp port listen 161
> set snmp port trap 162
> set vrouter "untrust-vr"
> set route 192.168.1.0/24 <http://192.168.1.0/24> interface
> tunnel.1 preference 10
> exit
> set vrouter "trust-vr"
> unset add-default-route
> set route 0.0.0.0/0 <http://0.0.0.0/0> interface ethernet0/2
> gateway 12.63.231.145 preference 20
> set route 192.168.181.0/24 <http://192.168.181.0/24> interface
> ethernet0/0 gateway 192.168.180.19 preference 10
> set route 192.168.184.0/24 <http://192.168.184.0/24> interface
> ethernet0/0 gateway 192.168.180.19 preference 10 permanent
> set route 192.168.185.0/24 <http://192.168.185.0/24> interface
> ethernet0/0 gateway 192.168.180.19 preference 10
> set route 192.168.187.0/24 <http://192.168.187.0/24> interface
> ethernet0/0 gateway 192.168.180.19 preference 10
> set route 10.1.1.0/24 <http://10.1.1.0/24> interface ethernet0/0
> gateway 192.168.180.231 preference 10 permanent
> set route 192.168.1.0/24 <http://192.168.1.0/24> interface
> tunnel.1 preference 10
> set route 192.168.20.0/24 <http://192.168.20.0/24> interface
> tunnel.3 preference 20 permanent
> set route 12.63.231.150/32 <http://12.63.231.150/32> interface
> ethernet0/0 preference 20
> exit
> set vrouter "untrust-vr"
> exit
> set vrouter "trust-vr"
> exit
>
> _______________________________________________
> juniper-nsp mailing list juniper-nsp at puck.nether.net
> <mailto:juniper-nsp at puck.nether.net>
> https://puck.nether.net/mailman/listinfo/juniper-nsp
>
>
> ------------------------------------------------------------------------
>
>
> No virus found in this incoming message.
> Checked by AVG - www.avg.com Version: 8.0.237 / Virus Database:
> 270.11.10/1995 - Release Date: 03/11/09 08:28:00
>
>
I di see the WAn interface is showing 100/half and the upstream device
is locked at 100/full....
That will be the first thing I change tomorrow AM......
--chris
_______________________________________________
juniper-nsp mailing list juniper-nsp at puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp
More information about the juniper-nsp
mailing list