<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>JunosNotes</title><description>Notes and thoughts on Junos</description><managingEditor>noreply@blogger.com (junosblogg)</managingEditor><pubDate>Fri, 30 Aug 2024 10:26:37 +1000</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">30</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">6</openSearch:itemsPerPage><link>https://junosnotes.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Notes and thoughts on Junos</itunes:subtitle><itunes:category text="Technology"/><itunes:author>junosblogg</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>junosblogg</itunes:name></itunes:owner><item><title>SRX VIRTUALISATION: Basics</title><link>https://junosnotes.blogspot.com/2014/09/srx-virtualisation-basics.html</link><category>DHCP</category><category>Routing-instance</category><category>Srx</category><category>Virtualisation</category><pubDate>Wed, 3 Sep 2014 16:44:00 +1000</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-4743811155547445168.post-6801281720208385797</guid><description>&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Virtualisation.&lt;br /&gt;&lt;br /&gt;That got your attention didn't it! It's the big topic these days and in the SRX we can apply in several ways.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;In the Juniper world we have VSYS on ScreenOS and LSYS for high end SRXs both of which allow the creation of logical firewalls with different administrative rights within a single box.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;There is also Firefly Perimeter to consider (Eval for 60 day)&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;a href="http://www.juniper.net/us/en/products-services/security/firefly-perimeter/#evaluation"&gt;http://www.juniper.net/us/en/products-services/security/firefly-perimeter/#evaluation&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Even though we can't use LSYS on a branch SRX device we can still set up logical routers called Routing Instances on them and then apply specific zones/interfaces to those Routing Instances thereby gaining some degree or virtualisation in the branch SRX. &lt;br /&gt;&lt;br /&gt;Lets look at a simple example of how to apply this..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Lets say we have a single SRX serving 2 separate companies. We'll call them comp1 and comp2. Each has their own Internet connection and they don't want to share them.&lt;br /&gt;&lt;br /&gt;We will create a separate routing instance for comp1 and assign the zones that comp1 uses to it. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Remember:&lt;/b&gt; A logical interface or zone can only exist in one routing instance.&lt;br /&gt;&lt;br /&gt;Here is the diagram of what we will build..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4yZ3a0VvzY34Knp4UNHH_WVRUVl43OQlF8a9yROktWyup9xozPaMu-DQAK7UCKgk6JTnoVI8sHgKoJmbLQ91ObJpX0Mqj53vMDf1O-vGXzSlNfgOv5gkufOdd0DuYn-o4cpEik73A1gQ/s1600/routing+instance.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="237" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4yZ3a0VvzY34Knp4UNHH_WVRUVl43OQlF8a9yROktWyup9xozPaMu-DQAK7UCKgk6JTnoVI8sHgKoJmbLQ91ObJpX0Mqj53vMDf1O-vGXzSlNfgOv5gkufOdd0DuYn-o4cpEik73A1gQ/s1600/routing+instance.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Comp2 will use the default master routing instance - inet.0&lt;br /&gt;Comp1 will use a new created routing instance called vr-comp1, which means its routing instance will be vr-comp1.inet.0&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;In both the inet.0 and the routing instance the ISP interfaces (fe-0/0/7 and fe-0/0/6) are DHCP clients of their respective ISPs and will propagate the ISP assigned DNS settings to their associated DHCP client pools.&lt;br /&gt;&lt;br /&gt;Before we get into the config of the routing instance I just want to mention some things about DHCP.&lt;br /&gt;&lt;br /&gt;Juniper recommends (&lt;a href="http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB26897"&gt;http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB26897&lt;/a&gt;) to use JDHCP rather than DHCP as this addresses providing DHCP to a client on a routing instance which is what we will be doing.&lt;br /&gt;&lt;br /&gt;So, for example, whereas before we would have had this config for DHCP to serve clients on the SRX..&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set system services dhcp pool 10.10.10.0/24 address-range low 10.10.10.50&lt;br /&gt;set system services dhcp pool 10.10.10.0/24 address-range high 10.10.10.100&lt;br /&gt;set system services dhcp pool 10.10.10.0/24 exclude-address 10.10.10.30&lt;br /&gt;set system services dhcp pool 10.10.10.0/24 default-lease-time 86400&lt;br /&gt;set system services dhcp pool 10.10.10.0/24 domain-name xyz.com&lt;br /&gt;set system services dhcp pool 10.10.10.0/24 router 10.10.10.1&lt;br /&gt;set system services dhcp propagate-settings fe-0/0/4.0&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We now have this config..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set system services dhcp-local-server group dhcp-comp2 interface vlan.7&lt;br /&gt;&lt;br /&gt;set access address-assignment pool pool-comp2 family inet network 10.10.10.0/24&lt;br /&gt;set access address-assignment pool pool-comp2 family inet range range-comp1 low 10.10.10.50&lt;br /&gt;set access address-assignment pool pool-comp2 family inet range range-comp1 high 10.10.10.100&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes maximum-lease-time 86400&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes domain-name xyz.com&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes router 10.10.10.1&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes propagate-settings fe-0/0/4.0&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Also not the difference in the daemon that is running &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;DHCP..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; show system processes | match dhcp &lt;br /&gt;&amp;nbsp;1264&amp;nbsp; ??&amp;nbsp; S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9:17.23 /usr/sbin/&lt;b&gt;dhcpd&lt;/b&gt; -N&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;JDHCP..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE&amp;gt; show system processes | match dhcp &lt;br /&gt;&amp;nbsp;4494&amp;nbsp; ??&amp;nbsp; S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0:00.98 /usr/sbin/&lt;b&gt;jdhcpd&lt;/b&gt; -N&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;CONFIG FOR INET.0&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;1) Setup the ISP interface as a DHCP client&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set interfaces fe-0/0/7 unit 0 family inet dhcp-client update-server&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;2) Create the logical VLAN interface for the comp2 clients and assign to physical interface.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set vlans vlan-comp2 vlan-id 20&lt;br /&gt;set vlans vlan-comp2 l3-interface vlan.20&lt;br /&gt;set interfaces fe-0/0/4 unit 0 family ethernet-switching vlan members vlan-comp2&lt;br /&gt;set interfaces vlan unit 20 family inet address 192.168.20.1/24&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;3) Create The DHCP pool for the comp2 clients &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set access address-assignment pool pool-comp2 family inet network 192.168.20.0/24&lt;br /&gt;set access address-assignment pool pool-comp2 family inet range range-comp1 low 192.168.20.50&lt;br /&gt;set access address-assignment pool pool-comp2 family inet range range-comp1 high 192.168.20.100&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes maximum-lease-time 86400&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes domain-name comp2.com&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes router 192.168.20.1&lt;br /&gt;set access address-assignment pool pool-comp2 family inet dhcp-attributes propagate-settings fe-0/0/7.0&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;4) Set the default route for inet.0&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;Set routing-options static route 0.0.0.0/0 next-hop 1.1.1.1&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;CONFIG FOR THE ROUTING INSTANCE.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1) Set up the ISP interface as a DHCP client&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set interfaces fe-0/0/6 unit 0 family inet dhcp-client update-server&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Note the use of the dhcp-client now rather than dhcp. Below is what happens if you don't&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE# commit &lt;br /&gt;[edit interfaces fe-0/0/6 unit 0 family inet]&lt;br /&gt;&amp;nbsp; 'dhcp'&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Incompatible with the dhcp-local-server configured under 'routing-instances &amp;lt;*&amp;gt; system services dhcp-local-server group&lt;br /&gt;[edit interfaces fe-0/0/6 unit 0 family inet]&lt;br /&gt;&amp;nbsp; 'dhcp'&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Incompatible with the dhcp-local-server configured under 'system services dhcp-local-server group&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;2) Create the logical VLAN interface for the comp1 clients and assign to physical interface.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set vlans vlan-comp1 vlan-id 10&lt;br /&gt;set vlans vlan-comp1 l3-interface vlan.10&lt;br /&gt;set interfaces fe-0/0/3 unit 0 family ethernet-switching vlan members vlan-comp1&lt;br /&gt;set interfaces vlan unit 10 family inet address 192.168.10.1/24&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;3) Create the routing instance and assign interfaces&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-instances vr-comp1 instance-type virtual-router&lt;br /&gt;set routing-instances vr-comp1 interface fe-0/0/6.0&lt;br /&gt;set routing-instances vr-comp1 interface vlan.10&lt;br /&gt;set interfaces vlan unit 10 family inet address 192.168.10.1/24&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;4) Create The DHCP pool for the comp1 clients &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-instances vr-comp1 system services dhcp-local-server group dhcp-comp1 interface vlan.10&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet network 192.168.10.0/24&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet range range-comp1 low 192.168.10.50&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet range range-comp1 high 192.168.10.100&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet dhcp-attributes maximum-lease-time 86400&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet dhcp-attributes domain-name comp.com&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet dhcp-attributes router 192.168.10.1&lt;br /&gt;set routing-instances vr-comp1 access address-assignment pool pool-comp1 family inet dhcp-attributes propagate-settings fe-0/0/6.0&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;5) Give the routing instance a default route&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-instances vr-comp1 routing-options static route 0.0.0.0/0 next-hop 2.2.2.2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Here is all the routing instance config..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE&amp;gt; show configuration routing-instances &lt;br /&gt;vr-comp1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; instance-type virtual-router;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; system {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; services {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dhcp-local-server {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; group dhcp-comp1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface vlan.10;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; access {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; address-assignment {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pool pool-comp1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; family inet {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; network 192.168.10.0/24;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; range range-comp1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; low 192.168.10.50;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; high 192.168.10.100;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dhcp-attributes {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; maximum-lease-time 86400;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; domain-name comp1.com;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; router {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.1;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; propagate-settings fe-0/0/6.0;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface fe-0/0/6.0;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface vlan.10;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; routing-options {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route 0.0.0.0/0 next-hop 2.2.2.2;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;} &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;ZONE, NAT AND POLICY SETTINGS&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security zones security-zone zone-comp1 interfaces vlan.10 host-inbound-traffic system-services ping&lt;br /&gt;set security zones security-zone zone-comp1 interfaces vlan.10 host-inbound-traffic system-services dhcp&lt;br /&gt;set security zones security-zone zone-comp2 interfaces vlan.20 host-inbound-traffic system-services dhcp&lt;br /&gt;set security zones security-zone zone-comp2 interfaces vlan.20 host-inbound-traffic system-services ping&lt;br /&gt;set security zones security-zone zone-isp1 interfaces fe-0/0/6.0 host-inbound-traffic system-services dhcp&lt;br /&gt;set security zones security-zone zone-isp2 interfaces fe-0/0/7.0 host-inbound-traffic system-services dhcp&lt;br /&gt;&lt;br /&gt;set security nat source rule-set comp2-isp2 from zone zone-comp2&lt;br /&gt;set security nat source rule-set comp2-isp2 to zone zone-isp2&lt;br /&gt;set security nat source rule-set comp2-isp2 rule n1-comp2 match source-address 0.0.0.0/0&lt;br /&gt;set security nat source rule-set comp2-isp2 rule n1-comp2 then source-nat interface&lt;br /&gt;set security nat source rule-set comp1-isp1 from zone zone-comp1&lt;br /&gt;set security nat source rule-set comp1-isp1 to zone zone-isp1&lt;br /&gt;set security nat source rule-set comp1-isp1 rule n1-comp1 match source-address 0.0.0.0/0&lt;br /&gt;set security nat source rule-set comp1-isp1 rule n1-comp1 then source-nat interface&lt;br /&gt;&lt;br /&gt;set security policies from-zone zone-comp2 to-zone zone-isp2 policy p1-comp2 match source-address any&lt;br /&gt;set security policies from-zone zone-comp2 to-zone zone-isp2 policy p1-comp2 match destination-address any&lt;br /&gt;set security policies from-zone zone-comp2 to-zone zone-isp2 policy p1-comp2 match application any&lt;br /&gt;set security policies from-zone zone-comp2 to-zone zone-isp2 policy p1-comp2 then permit&lt;br /&gt;set security policies from-zone zone-comp2 to-zone zone-isp2 policy p1-comp2 then log session-init&lt;br /&gt;set security policies from-zone zone-comp1 to-zone zone-isp1 policy p1-comp1 match source-address any&lt;br /&gt;set security policies from-zone zone-comp1 to-zone zone-isp1 policy p1-comp1 match destination-address any&lt;br /&gt;set security policies from-zone zone-comp1 to-zone zone-isp1 policy p1-comp1 match application any&lt;br /&gt;set security policies from-zone zone-comp1 to-zone zone-isp1 policy p1-comp1 then permit&lt;br /&gt;set security policies from-zone zone-comp1 to-zone zone-isp1 policy p1-comp1 then log session-init&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;As you can see, nothing special for these elements in relation to the routing instance.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;VERIFICATION&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1) Check the route instances&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE&amp;gt; show route instance&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;Instance&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Primary RIB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Active/holddown/hidden&lt;br /&gt;&lt;b&gt;master&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; forwarding&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inet.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8/0/0&lt;/b&gt;&lt;br /&gt;__juniper_private1__ forwarding&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; __juniper_private1__.inet.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7/0/0&lt;br /&gt;&lt;br /&gt;__juniper_private2__ forwarding&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; __juniper_private2__.inet.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0/0/1&lt;br /&gt;&lt;br /&gt;__master.anon__&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; forwarding&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;b&gt;vr-comp1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; virtual-router &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vr-comp1.inet.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7/0/0&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;blogger@SRX-CORE&amp;gt; show route instance vr-comp1 &lt;br /&gt;Instance&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Primary RIB&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Active/holddown/hidden&lt;br /&gt;vr-comp1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; virtual-router &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vr-comp1.inet.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7/0/0&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;2) Check the route tables&lt;br /&gt;&lt;br /&gt;Notice the 2 now separate route tables&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE&amp;gt; show route&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;b&gt;inet.0&lt;/b&gt;: 8 destinations, 8 routes (8 active, 0 holddown, 0 hidden)&lt;br /&gt;+ = Active Route, - = Last Active, * = Both&lt;br /&gt;&lt;br /&gt;0.0.0.0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Static/5] 04:04:15&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; to 1.1.1.1 via fe-0/0/7.0&lt;br /&gt;1.1.1.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Direct/0] 04:04:15&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; via fe-0/0/7.0&lt;br /&gt;1.1.1.10/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Local/0] 04:04:15&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local via fe-0/0/7.0&lt;br /&gt;192.168.20.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Direct/0] 04:06:40&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; via vlan.20&lt;br /&gt;192.168.20.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Local/0] 5d 19:56:05&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local via vlan.20&lt;br /&gt;192.168.20.51/32&amp;nbsp;&amp;nbsp; *[Access-internal/12] 03:08:19&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; to 192.168.20.1 via vlan.20&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;b&gt;vr-comp1.inet.0&lt;/b&gt;: 7 destinations, 7 routes (7 active, 0 holddown, 0 hidden)&lt;br /&gt;+ = Active Route, - = Last Active, * = Both&lt;br /&gt;&lt;br /&gt;0.0.0.0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Static/5] 03:58:55&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; to 2.2.2.2 via fe-0/0/6.0&lt;br /&gt;2.2.2.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Direct/0] 03:58:56&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; via fe-0/0/6.0&lt;br /&gt;2.2.2.10/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Local/0] 03:58:56&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local via fe-0/0/6.0&lt;br /&gt;192.168.10.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Direct/0] 03:23:29&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; via vlan.10&lt;br /&gt;192.168.10.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp; *[Local/0] 5d 19:56:05&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local via vlan.10&lt;br /&gt;192.168.10.51/32&amp;nbsp;&amp;nbsp; *[Access-internal/12] 03:31:51&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; to 192.168.10.1 via vlan.10&lt;br /&gt;192.168.10.52/32&amp;nbsp;&amp;nbsp; *[Access-internal/12] 03:31:51&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; to 192.168.10.1 via vlan.10&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;3) Verify inet.0 and the routing instance can both access the internet..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE&amp;gt; ping 8.8.8.8 count 4 rapid&amp;nbsp; &lt;br /&gt;PING 8.8.8.8 (8.8.8.8): 56 data bytes&lt;br /&gt;!!!!&lt;br /&gt;--- 8.8.8.8 ping statistics ---&lt;br /&gt;4 packets transmitted, 4 packets received, 0% packet loss&lt;br /&gt;round-trip min/avg/max/stddev = 62.483/94.899/112.646/19.407 ms&lt;br /&gt;&lt;br /&gt;blogger@SRX-CORE&amp;gt; &lt;br /&gt;&lt;br /&gt;blogger@SRX-CORE&amp;gt; ping 8.8.8.8 routing-instance vr-comp1 count 4 rapid &lt;br /&gt;PING 8.8.8.8 (8.8.8.8): 56 data bytes&lt;br /&gt;!!!!&lt;br /&gt;--- 8.8.8.8 ping statistics ---&lt;br /&gt;4 packets transmitted, 4 packets received, 0% packet loss&lt;br /&gt;round-trip min/avg/max/stddev = 4.550/6.442/8.554/1.731 ms&lt;br /&gt;&lt;br /&gt;blogger@SRX-CORE&amp;gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;5) Verify DHCP client and Server &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX-CORE&amp;gt; show dhcp client binding &lt;br /&gt;&lt;br /&gt;IP address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hardware address&amp;nbsp;&amp;nbsp; Expires&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface&lt;br /&gt;1.1.1.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40:b4:f0:8f:2d:47&amp;nbsp; 72916&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUND&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; fe-0/0/7.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;blogger@SRX-CORE&amp;gt; show dhcp client binding routing-instance vr-comp1 &lt;br /&gt;&lt;br /&gt;IP address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hardware address&amp;nbsp;&amp;nbsp; Expires&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface&lt;br /&gt;2.2.2.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40:b4:f0:8f:2d:46&amp;nbsp; 72909&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUND&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; fe-0/0/6.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;blogger@SRX-CORE&amp;gt; show dhcp server binding detail &lt;br /&gt;&lt;br /&gt;Client IP Address:&amp;nbsp; 192.168.20.51&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hardware Address:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 08:00:27:ce:af:e7&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUND(LOCAL_SERVER_STATE_BOUND)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Expires:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-04 11:04:55 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Expires in:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74229 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Start:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-03 11:04:55 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last Packet Received:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-03 11:04:55 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Incoming Client Interface:&amp;nbsp;&amp;nbsp;&amp;nbsp; vlan.20&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Interface Vlan Id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server Identifier:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.20.1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Pool Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pool-comp2&lt;br /&gt;&lt;br /&gt;blogger@SRX-CORE&amp;gt; show dhcp server binding detail routing-instance vr-comp1 &lt;br /&gt;&lt;br /&gt;Client IP Address:&amp;nbsp; 192.168.10.52&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hardware Address:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:23:18:46:37:85&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUND(LOCAL_SERVER_STATE_BOUND)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Expires:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-04 10:49:51 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Expires in:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 73299 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Start:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-03 10:49:51 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last Packet Received:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-03 10:49:59 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Incoming Client Interface:&amp;nbsp;&amp;nbsp;&amp;nbsp; vlan.10&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Interface Vlan Id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server Identifier:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Pool Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pool-comp1&lt;br /&gt;Client IP Address:&amp;nbsp; 192.168.10.51&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hardware Address:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00:23:18:46:37:85&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUND(LOCAL_SERVER_STATE_BOUND)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Expires:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-04 10:06:43 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Expires in:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 70711 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lease Start:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-09-03 10:06:43 UTC&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last Packet Received:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Incoming Client Interface:&amp;nbsp;&amp;nbsp;&amp;nbsp; vlan.10&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Interface Vlan Id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server Identifier:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Session Id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Client Pool Name:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pool-comp1&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;So that's it. Two separate client groups using 2 different Internet links on one SRX. &lt;br /&gt;All DHCP client , server and propagation is working with this config.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;This is one way to do it. There are of course different ways....&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Model: srx210he&lt;br /&gt;JUNOS Software Release [12.1X44-D35.5]&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4yZ3a0VvzY34Knp4UNHH_WVRUVl43OQlF8a9yROktWyup9xozPaMu-DQAK7UCKgk6JTnoVI8sHgKoJmbLQ91ObJpX0Mqj53vMDf1O-vGXzSlNfgOv5gkufOdd0DuYn-o4cpEik73A1gQ/s72-c/routing+instance.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (junosblogg)</author></item><item><title>SRX IDP: Templates Update</title><link>https://junosnotes.blogspot.com/2014/07/srx-idp-templates-update.html</link><category>IDP</category><category>Srx</category><pubDate>Mon, 14 Jul 2014 16:11:00 +1000</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-4743811155547445168.post-9106370503882817534</guid><description>&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Did you notice that Juniper has updated their IDP policy templates?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;First lets review the list of old of pre-defined templates..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; show security idp policy-templates-list &lt;br /&gt;Web_Server&lt;br /&gt;DMZ_Services&lt;br /&gt;DNS_Service&lt;br /&gt;File_Server&lt;br /&gt;Getting_Started&lt;br /&gt;IDP_Default&lt;br /&gt;Recommended&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Lets check the version of that template..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; show security idp security-package-version &lt;br /&gt;&amp;nbsp; Attack database version:2395(Wed Jul&amp;nbsp; 2 18:14:04 2014 UTC)&lt;br /&gt;&amp;nbsp; Detector version :12.6.160140626&lt;br /&gt;&amp;nbsp; Policy template version :&lt;span style="color: red;"&gt;&lt;b&gt;2192&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Lets check and see whats available..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; request security idp security-package download check-server &lt;br /&gt;Successfully retrieved from(https://services.netscreen.com/cgi-bin/index.cgi).&lt;br /&gt;Version info:2395(Detector=12.6.160140626, Templates=&lt;span style="color: red;"&gt;&lt;b&gt;2395&lt;/b&gt;&lt;/span&gt;) &lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;So you see, even if you are automatically updating the attack database that doesn't update the policy templates.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;GETTING THE NEW TEMPLATES.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Using the same process that I described before in my IDP blog..&lt;br /&gt;&lt;br /&gt;a) Download the templates&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@LEFTY&amp;gt; request security idp security-package download policy-templates&amp;nbsp;&amp;nbsp; &lt;br /&gt;Will be processed in async mode. Check the status using the status checking CLI&lt;br /&gt;&lt;br /&gt;blogger@SRX&amp;gt; request security idp security-package download status &lt;br /&gt;Done;Successfully downloaded from(https://services.netscreen.com/cgi-bin/index.cgi).&lt;br /&gt;Version info:2395&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;b) Install the templates&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; request security idp security-package install policy-templates &lt;br /&gt;Will be processed in async mode. Check the status using the status checking CLI&lt;br /&gt;&lt;br /&gt;blogger@SRX&amp;gt; request security idp security-package install status &lt;br /&gt;Done;policy-templates has been successfully updated into internal repository&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (=&amp;gt;/var/db/scripts/commit/templates.xsl)!&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;c) Install and then delete the script&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX# set system scripts commit file templates.xsl &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;blogger@SRX# commit &lt;br /&gt;commit complete&lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;blogger@SRX# delete system scripts &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;blogger@SRX# commit &lt;br /&gt;commit complete&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;As always this step takes time and will likely drive your cpu to close to 100% on a low end device&lt;br /&gt;&lt;br /&gt;d) check the version..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; show security idp security-package-version &lt;br /&gt;&amp;nbsp; Attack database version:2395(Wed Jul&amp;nbsp; 2 18:14:04 2014 UTC)&lt;br /&gt;&amp;nbsp; Detector version :12.6.160140626&lt;br /&gt;&amp;nbsp; Policy template version :2395&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Our policy templates are now updated.&lt;br /&gt;&lt;br /&gt;e) Examine the available templates..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX&amp;gt; show security idp policy-templates-list &lt;br /&gt;Web_Server&lt;br /&gt;DMZ_Services&lt;br /&gt;DNS_Service&lt;br /&gt;File_Server&lt;br /&gt;Getting_Started&lt;br /&gt;IDP_Default&lt;br /&gt;Recommended&lt;br /&gt;Server-Protection&lt;br /&gt;Server-Protection-1G&lt;br /&gt;Client-Protection&lt;br /&gt;Client-Protection-1G&lt;br /&gt;Client-And-Server-Protection&lt;br /&gt;Client-And-Server-Protection-1G&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;A few new templates to consider there.&lt;br /&gt;&lt;br /&gt;Here are the descriptions that come with each template..&lt;br /&gt;&lt;br /&gt;idp-policy Web_Server {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect commonly used HTTP servers from remote attacks. */&lt;br /&gt;&lt;br /&gt;idp-policy DMZ_Services {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to be used to protect a typical DMZ environment. */&lt;br /&gt;&lt;br /&gt;idp-policy DNS_Service {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect DNS services. Use this template as a starting point to customize your desired level of protection. */&lt;br /&gt;&lt;br /&gt;idp-policy File_Server {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to provide protection to various file sharing services such as AMB, NFS, FTP, and others. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy Getting_Started {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template is a good starting point for learning how to create IDP policies. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy IDP_Default {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy represents a good blend od security and performance. Use this template for "in-line" mode. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy Recommended {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This legacy template policy covers most current vulnerabilities.&amp;nbsp; This template is supported on all platforms, including Branch devices with 1G of memory. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy Server-Protection {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect servers.&amp;nbsp; It is supported on devices with 2G or more of memory.&amp;nbsp; Branch devices with only 1G are not supported. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy Server-Protection-1G {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect servers.&amp;nbsp; This template is supported on all platforms, including Branch devices with 1G of memory. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy Client-Protection {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect clients.&amp;nbsp; It is supported on devices with 2G or more of memory.&amp;nbsp; Branch devices with only 1G are not supported. */&lt;br /&gt;&lt;br /&gt;idp-policy Client-Protection-1G {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect clients.&amp;nbsp; This template is supported on all platforms, including Branch devices with 1G of memory. */&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;idp-policy Client-And-Server-Protection {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect both clients and servers.&amp;nbsp; It is supported on devices with 2G or more of memory.&amp;nbsp; Branch devices with only 1G are not supported. */&lt;br /&gt;&lt;br /&gt;idp-policy Client-And-Server-Protection-1G {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; /* This template policy is designed to protect both clients and servers.&amp;nbsp; This template is supported on all platforms, including Branch devices with 1G of memory. */&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Interesting that they call the Recommended policy now "Legacy" and I note that the Recommended template as it now comes seems to have all its rules duplicated; first as numbered and then as named rules. I guess if you wanted to use this new Recommended template you would delete which ever lot of either the named or numbered you didn't want.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;ACTIVATE A POLICY&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;a) Copy the template you wish to use.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;Make a copy of the template you wish to use as a starting point, so you can always reference where you came from and what you changed in your own policy from the default.&lt;br /&gt;&lt;br /&gt;Eg..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX# copy security idp idp-policy Client-Protection-1G to idp-policy Client-Protection-1G_customised&lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;blogger@SRX# commit &lt;br /&gt;commit complete&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;b) Activate the new policy &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@SRX# set security idp active-policy Client-Protection-1G_customised &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;blogger@SRX# commit &lt;br /&gt;commit complete&lt;br /&gt;&lt;br /&gt;blogger@SRX&amp;gt; show security idp status &lt;br /&gt;State of IDP: Default,&amp;nbsp; Up since: 2014-06-06 10:16:46 EST (4w0d 06:15 ago)&lt;br /&gt;&lt;br /&gt;Packets/second: 22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak: 852 @ 2014-06-27 16:01:42 EST&lt;br /&gt;KBits/second&amp;nbsp; : 52&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peak: 5377 @ 2014-07-04 16:20:13 EST&lt;br /&gt;Latency (microseconds): [min: 0] [max: 0] [avg: 0]&lt;br /&gt;&lt;br /&gt;Packet Statistics:&lt;br /&gt;&amp;nbsp;[ICMP: 0] [TCP: 4364406] [UDP: 159154] [Other: 0]&lt;br /&gt;&lt;br /&gt;Flow Statistics:&lt;br /&gt;&amp;nbsp; ICMP: [Current: 0] [Max: 714 @ 2014-06-17 14:05:40 EST]&lt;br /&gt;&amp;nbsp; TCP: [Current: 58] [Max: 698 @ 2014-06-17 13:59:43 EST]&lt;br /&gt;&amp;nbsp; UDP: [Current: 0] [Max: 1574 @ 2014-07-03 12:40:43 EST]&lt;br /&gt;&amp;nbsp; Other: [Current: 0] [Max: 0 @ 2014-06-06 10:16:46 EST]&lt;br /&gt;&lt;br /&gt;Session Statistics:&lt;br /&gt;&amp;nbsp;[ICMP: 0] [TCP: 29] [UDP: 0] [Other: 0]&lt;br /&gt;&amp;nbsp; Policy Name : &lt;b&gt;Client-Protection-1G_customised&lt;/b&gt;&lt;br /&gt;&amp;nbsp; Running Detector Version : 12.6.160140626&lt;br /&gt;&lt;br /&gt;blogger@SRX&amp;gt; &lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;c) Delete the other policies from the configuration for a cleanup&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;CHANGE POLICIES&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;What if you wanted to change the active IDP policy to another template after you deleted all the other ones from the config?&lt;br /&gt;&lt;br /&gt;It can be done.&lt;br /&gt;&lt;br /&gt;The old templates are still there for you even if they are not in the config (I.e if you did a cleanup) but you cant just switch to another one if its not in the config. Eg..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;[edit]&lt;br /&gt;root# set security idp active-policy Recommended &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;root# commit &lt;br /&gt;[edit security idp active-policy]&lt;br /&gt;&amp;nbsp; 'active-policy Recommended'&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy must be defined under [security idp idp-policy] &lt;br /&gt;error: commit failed: (statements constraint check failed)&lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;root# &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So if you wanted to resurrect one of the templates you deleted from the policy just commit the templates script again and select activate the policy template you want.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;[edit]&lt;br /&gt;root# set system scripts commit file templates.xsl &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;root# commit &lt;br /&gt;commit complete&lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;root# delete system scripts &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;root# commit &lt;br /&gt;commit complete&lt;br /&gt;&lt;br /&gt;[edit]&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Doing this will of course bring all the templates back into the config and also wont delete your customised template copy policy.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;SUMMARY&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If you using an old template its worth having a look at the new ones as a basis for starting off or just for giving you ideas of rules to add to your existing policy.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;b&gt;Model: srx210he&lt;br /&gt;JUNOS Software Release [12.1X44-D25.5]&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (junosblogg)</author></item><item><title>SRX NAT: Destination</title><link>https://junosnotes.blogspot.com/2014/04/srx-nat-destination.html</link><category>NAT</category><category>Srx</category><pubDate>Tue, 29 Apr 2014 16:41:00 +1000</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-4743811155547445168.post-9067015606575909962</guid><description>&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Today we will have a look at some Destination NAT (DNAT) on the SRX with port translation.&lt;br /&gt;&lt;br /&gt;We have the following network scenario..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ1VXHRoSuByWxQzAjjHP6kOZBm8405TfPeKuokQGHHyLe-l9DAI-7zbbXzsRMJnbqasZDcV_3qebM9-ACO9GZkJvYhYK7CiDPvKNP4aIJLdP3__u1WyjTgRiIidyHT3-L33u7olAJq5c/s1600/dnat.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="184" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ1VXHRoSuByWxQzAjjHP6kOZBm8405TfPeKuokQGHHyLe-l9DAI-7zbbXzsRMJnbqasZDcV_3qebM9-ACO9GZkJvYhYK7CiDPvKNP4aIJLdP3__u1WyjTgRiIidyHT3-L33u7olAJq5c/s1600/dnat.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;In the this scenario we need to do DNAT using the actual external interface IP (192.168.200.200).&lt;br /&gt;&lt;br /&gt;So the flows will go like this.&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;PRENAT&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; POSTNAT&lt;br /&gt;192.168.200.10 --&amp;gt; 192.168.200.200:8088&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.10 --&amp;gt; 10.31.254.17:80&lt;br /&gt;192.168.200.10 --&amp;gt; 192.168.200.200:2088&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.10 --&amp;gt; 10.31.254.17:22&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="color: purple;"&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="color: black;"&gt;DNAT is a one way translation. It does not itself permit the destination to &lt;i&gt;initiate &lt;/i&gt;to the source.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="color: black;"&gt;The destination can of course statefully reply to a session initiated to it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="color: black;"&gt;Steps to configure and test.. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;1) CREATE ADDRESS ENTRIES&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The only address book entry we need is the real IP of the destination&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show configuration security address-book | display set | match 10.31.254.17&lt;br /&gt;set security address-book global address SERVER_REAL_10.31.254.17 10.31.254.17/32&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;2) CREATE DNAT RULES&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show configuration security nat destination | display set&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;set security nat destination pool TESTA address 10.31.254.17/32&lt;br /&gt;set security nat destination pool TESTA address port 80&lt;br /&gt;set security nat destination pool TESTA_2 address 10.31.254.17/32&lt;br /&gt;set security nat destination pool TESTA_2 address port 22&lt;br /&gt;set security nat destination rule-set DNAT1 from zone untrust&lt;br /&gt;set security nat destination rule-set DNAT1 rule r1 match destination-address 192.168.200.200/32&lt;br /&gt;set security nat destination rule-set DNAT1 rule r1 match destination-port 8088&lt;br /&gt;set security nat destination rule-set DNAT1 rule r1 then destination-nat pool TESTA&lt;br /&gt;set security nat destination rule-set DNAT1 rule r2 match destination-address 192.168.200.200/32&lt;br /&gt;set security nat destination rule-set DNAT1 rule r2 match destination-port 2088&lt;br /&gt;set security nat destination rule-set DNAT1 rule r2 then destination-nat pool TESTA_2&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Looks like this in the heirachical config..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show configuration security nat destination &lt;br /&gt;pool TESTA {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address 10.31.254.17/32 port 80;&lt;br /&gt;}&lt;br /&gt;pool TESTA_2 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address 10.31.254.17/32 port 22;&lt;br /&gt;}&lt;br /&gt;rule-set DNAT1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; from zone untrust;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule r1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address 192.168.200.200/32;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-port 8088;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; then {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-nat pool TESTA;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule r2 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address 192.168.200.200/32;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-port 2088;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; then {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-nat pool TESTA_2;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;3) CREATE SECURITY POLICIES&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The main point to note here is that we use the translated destination IP in the rule as DNAT takes place before the security policy is processed. Also the port to be used is the post translation destination port.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show configuration security policies from-zone untrust to-zone trust | display set&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p1 match source-address any&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p1 match destination-address SERVER_REAL_10.31.254.17&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p1 match application junos-http&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p1 then permit destination-address drop-untranslated&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p1 then log session-init&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p2 match source-address any&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p2 match destination-address SERVER_REAL_10.31.254.17&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p2 match application junos-ssh&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p2 then permit destination-address drop-untranslated&lt;br /&gt;set security policies from-zone untrust to-zone trust policy p2 then log session-init&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Looks like this in the heirachical config..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show configuration security policies from-zone untrust to-zone trust&lt;br /&gt;policy p1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-address any;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address SERVER_REAL_10.31.254.17;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application junos-http;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; then {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop-untranslated;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session-init;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;}&lt;br /&gt;policy p2 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; match {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source-address any;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address SERVER_REAL_10.31.254.17;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application junos-ssh;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; then {&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; permit {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop-untranslated;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; log {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session-init;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We have the source set as any as the source in these types of rules is often coming from the Internet.&lt;br /&gt;For extra security we are only permitting packets that are subjected to being translated -&amp;nbsp; "drop-untranslated"&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;4) TESTING &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;a) Checking if our DNAT rules have hits..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show security nat destination rule all &lt;br /&gt;Total destination-nat rules: 2&lt;br /&gt;Total referenced IPv4/IPv6 ip-prefixes: 2/0&lt;br /&gt;&lt;br /&gt;Destination NAT rule: r1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rule-set: DNAT1 &lt;br /&gt;&amp;nbsp; Rule-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&amp;nbsp; &lt;br /&gt;&amp;nbsp; Rule position&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;br /&gt;&amp;nbsp; From zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : untrust&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination addresses&amp;nbsp;&amp;nbsp;&amp;nbsp; : 192.168.200.200 - 192.168.200.200&lt;br /&gt;&lt;br /&gt;&amp;nbsp; Destination port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 8088 &lt;br /&gt;&amp;nbsp; Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : TESTA &lt;br /&gt;&amp;nbsp; Translation hits&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : &lt;b&gt;44&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Destination NAT rule: r2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rule-set: DNAT1 &lt;br /&gt;&amp;nbsp; Rule-Id&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&amp;nbsp; &lt;br /&gt;&amp;nbsp; Rule position&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2&lt;br /&gt;&amp;nbsp; From zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : untrust&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination addresses&amp;nbsp;&amp;nbsp;&amp;nbsp; : 192.168.200.200 - 192.168.200.200&lt;br /&gt;&lt;br /&gt;&amp;nbsp; Destination port&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 2088 &lt;br /&gt;&amp;nbsp; Action&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : TESTA_2 &lt;br /&gt;&amp;nbsp; Translation hits&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : &lt;b&gt;3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;b) Checking if the security policy rules have hits..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show security policies hit-count from-zone untrust to-zone trust &lt;br /&gt;Logical system: root-logical-system&lt;br /&gt;&amp;nbsp;Index&amp;nbsp;&amp;nbsp; From zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; To zone&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Policy count&lt;br /&gt;&amp;nbsp;1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; untrust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; p1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;44&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; untrust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; p2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;3&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;Number of policy: 2&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;c) We should see active flow sessions..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show security flow session source-prefix 192.168.200.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;Session ID: 24519, Policy name: p2/7, Timeout: 1780, Valid&lt;br /&gt;&amp;nbsp; In: 192.168.200.10/35673 --&amp;gt; 192.168.200.200/2088;tcp, If: vlan.3, Pkts: 67, Bytes: 5762&lt;br /&gt;&amp;nbsp; Out: 10.31.254.17/22 --&amp;gt; 192.168.200.10/35673;tcp, If: vlan.2, Pkts: 45, Bytes: 5629&lt;br /&gt;&lt;br /&gt;Session ID: 24794, Policy name: p1/6, Timeout: 1194, Valid&lt;br /&gt;&amp;nbsp; In: 192.168.200.10/54017 --&amp;gt; 192.168.200.200/8088;tcp, If: vlan.3, Pkts: 30, Bytes: 5251&lt;br /&gt;&amp;nbsp; Out: 10.31.254.17/80 --&amp;gt; 192.168.200.10/54017;tcp, If: vlan.2, Pkts: 27, Bytes: 29397&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;d) Finally we can also check the logs as we are logging on "session-init"&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;In the below you can clearly see the &lt;span style="color: red;"&gt;pre nat&lt;/span&gt; dest IP being DNATed to the&lt;span style="color: lime;"&gt; &lt;span style="color: blue;"&gt;post nat&lt;/span&gt;&lt;/span&gt; IP in the initial session setup..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;srx&amp;gt; show log POLICY | match 192.168.200.10 &lt;br /&gt;Apr 29 14:49:19&amp;nbsp;&amp;nbsp; RT_FLOW: RT_FLOW_SESSION_CREATE: session created 192.168.200.10/35673-&amp;gt;&lt;span style="color: red;"&gt;192.168.200.200/2088&lt;/span&gt; junos-ssh 192.168.200.10/35673-&amp;gt;&lt;span style="color: blue;"&gt;10.31.254.17/22&lt;/span&gt; None r2 6 p2 untrust trust 24519 N/A(N/A) vlan.3&lt;br /&gt;Apr 29 14:49:56&amp;nbsp;&amp;nbsp; RT_FLOW: RT_FLOW_SESSION_CREATE: session created 192.168.200.10/54017-&amp;gt;&lt;span style="color: red;"&gt;192.168.200.200/8088&lt;/span&gt; junos-http 192.168.200.10/54017-&amp;gt;&lt;span style="color: blue;"&gt;10.31.254.17/80&lt;/span&gt; None r1 6 p1 untrust trust 24794 N/A(N/A) vlan.3&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: purple;"&gt;5) PROXY ARP&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In the above example I have not used proxy arp as we are using the actual interface address as the initial target for the source. But what if the destination address was 192.168.200.201 rather than the interface's IP of 192.168.200.200.&lt;br /&gt;&lt;br /&gt;I.e What if we changed NAT rule r1 to be like this?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;rule-set DNAT1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; from zone untrust;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule r1 {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; match {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-address 192.168.200.&lt;b&gt;201&lt;/b&gt;/32;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-port 8088;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; then {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination-nat pool TESTA;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Then in this case we &lt;u&gt;&lt;b&gt;do&lt;/b&gt;&lt;/u&gt; need proxy-arp as we meet this criteria as defined by Juniper in KB21785&amp;nbsp; &lt;a href="http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB21785"&gt;http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB21785&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;i&gt;"When addresses in the original destination address entry in the destination NAT rules are in the same subnet as that of the ingress interface&amp;nbsp;&amp;nbsp; (Destination NAT scenario)"&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;This is what we need to make it work..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security nat proxy-arp interface vlan.3 address 192.168.200.201/32&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;vlan.3 in our case is the untrust VLAN.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Model: srx210he&lt;br /&gt;JUNOS Software Release [12.1R5.5]&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZ1VXHRoSuByWxQzAjjHP6kOZBm8405TfPeKuokQGHHyLe-l9DAI-7zbbXzsRMJnbqasZDcV_3qebM9-ACO9GZkJvYhYK7CiDPvKNP4aIJLdP3__u1WyjTgRiIidyHT3-L33u7olAJq5c/s72-c/dnat.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (junosblogg)</author></item><item><title>CX111</title><link>https://junosnotes.blogspot.com/2014/02/cx111.html</link><category>CX111</category><category>DHCP</category><category>DNS</category><pubDate>Mon, 17 Feb 2014 12:47:00 +1100</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-4743811155547445168.post-7857307793403150118</guid><description>&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;I recently had the opportunity to test out a CX111.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Its a device that acts as a L2 bridge between a 3G/4G USB modem connected to one of 3 available USB ports on it and a single Ethernet port.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.juniper.net/au/en/products-services/routing/srx-series/cx111/"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;http://www.juniper.net/au/en/products-services/routing/srx-series/cx111/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Specifically I tested it with a Telstra 4G Sierra Wireless AirCard 320U.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;And the results were great!&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;My setup was as follows..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Telstra 4G USB ----CX111----SRX----laptop&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The 4G USB stick was plugged into USB1 of the CX111.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The SRX on the CX111 side was set to the untrust zone and on the client side the trust zone.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The only things I had to do on the CX111 to get it connected to the Telstra network were:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;a) Upgrade the firmware from 1.7.2 to 2.2.2 which was easily done through the CX111 gui.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtU4XTgHG4vBRfyi4vMacvF2UipqhwfFErfCwqLIL-usK99lR5vVs8hKPHJ1ZYniIdIF8rCe7HNyPDB82bJOK-RsKDtyVt-AfBa35Mjpsj8B2rJM_UvjTTqFrSJ6lZX8jgq_QnUZ1pfFM/s1600/general.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtU4XTgHG4vBRfyi4vMacvF2UipqhwfFErfCwqLIL-usK99lR5vVs8hKPHJ1ZYniIdIF8rCe7HNyPDB82bJOK-RsKDtyVt-AfBa35Mjpsj8B2rJM_UvjTTqFrSJ6lZX8jgq_QnUZ1pfFM/s1600/general.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;b) Program the SIM PIN of the USB into CX111.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzfs7k1dPDpIm45FbagD6eR9SHYxtCKMlo5QHTmkj1B1p6_zaDDpRd2IYc1d-8IdLcUUFcbH28jfbOyIv3HAefE4E9PE9chRLo4sYwUn7H9GuuD2MXS7tFdzVFfHnoQF6k8fGpMUhCz-w/s1600/sim+pin.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzfs7k1dPDpIm45FbagD6eR9SHYxtCKMlo5QHTmkj1B1p6_zaDDpRd2IYc1d-8IdLcUUFcbH28jfbOyIv3HAefE4E9PE9chRLo4sYwUn7H9GuuD2MXS7tFdzVFfHnoQF6k8fGpMUhCz-w/s1600/sim+pin.jpg" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;That's it! After that the Telstra 4G USB stick successfully connected to the network. Too easy..&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPKXkO4uM992MSlX_JMdXEC7GzMje8-tE_zK2RMtndAQcBWxtTloPL8wqYVvyJ4Mv8HmIY-GLIVDaQ_ox4IyHQ0jArQeE6rtN0XlBEfWqdtTt9b0z9530exNKCv_YncB6GpU0QFflC7VI/s1600/dns.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPKXkO4uM992MSlX_JMdXEC7GzMje8-tE_zK2RMtndAQcBWxtTloPL8wqYVvyJ4Mv8HmIY-GLIVDaQ_ox4IyHQ0jArQeE6rtN0XlBEfWqdtTt9b0z9530exNKCv_YncB6GpU0QFflC7VI/s1600/dns.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt; &lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimHNY8E0FYnz1gI54UYBoXUPRlL8F4TLExvptQ_vKbQ1NtCfSd7ED0gTpe9KUvM5m-MbEVmNfn0X1E9DuDbA-yW76MCXe-0LfIVL1TNfqzrUKVgrzSX5rlCCOlpIoJTO-XJwlOh5z4m54/s1600/modem.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimHNY8E0FYnz1gI54UYBoXUPRlL8F4TLExvptQ_vKbQ1NtCfSd7ED0gTpe9KUvM5m-MbEVmNfn0X1E9DuDbA-yW76MCXe-0LfIVL1TNfqzrUKVgrzSX5rlCCOlpIoJTO-XJwlOh5z4m54/s1600/modem.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The CX111 has a 2 position switch on it. In the "O" position the CX111 assigns a locally set DHCP assignment downstream to it's LAN connected device. This is known as configuration mode, though its still usable as a WAN device when set this way - its just that you can manage it as well from it's LAN side.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;When the switch is set to the "I" position it's in Pass-Through mode and CX111 LAN side device receives the ISP IP assignment. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The only gotcha is that the CX111 will not propagate the ISP DNS settings in its DHCP assignment to the SRX (Or whatever is on it's LAN interface) regardless of which way the switch is set. So you must hard set the DNS for the SRX trust zone DHCP pool within the SRX config.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Conclusion - a quick and easy way to bring 4G data services to a site as either a primary or backup WAN service.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Here is the relevant parts of the config of the SRX to get it going. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set system services dhcp pool 192.168.40.0/24 address-range low 192.168.40.40&lt;br /&gt;set system services dhcp pool 192.168.40.0/24 address-range high 192.168.40.210&lt;br /&gt;set system services dhcp pool 192.168.40.0/24 default-lease-time 86400&lt;br /&gt;set system services dhcp pool 192.168.40.0/24 &lt;b&gt;name-server 10.4.81.103&lt;/b&gt;&lt;br /&gt;set system services dhcp pool 192.168.40.0/24 router 192.168.40.1&lt;br /&gt;&lt;br /&gt;set interfaces ge-0/0/0 unit 0 family inet dhcp&lt;br /&gt;set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces fe-0/0/2 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces fe-0/0/3 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces fe-0/0/4 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces fe-0/0/5 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces fe-0/0/6 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces fe-0/0/7 unit 0 family ethernet-switching vlan members vlan-trust&lt;br /&gt;set interfaces vlan unit 2 family inet address 192.168.40.1/24&lt;br /&gt;&lt;br /&gt;set security nat source rule-set trust_to_untrust from zone trust&lt;br /&gt;set security nat source rule-set trust_to_untrust to zone untrust&lt;br /&gt;set security nat source rule-set trust_to_untrust rule source_nat_trust match source-address 0.0.0.0/0&lt;br /&gt;set security nat source rule-set trust_to_untrust rule source_nat_trust then source-nat interface&lt;br /&gt;&lt;br /&gt;set security policies from-zone trust to-zone untrust policy p1 match source-address any&lt;br /&gt;set security policies from-zone trust to-zone untrust policy p1 match destination-address any&lt;br /&gt;set security policies from-zone trust to-zone untrust policy p1 match application any&lt;br /&gt;set security policies from-zone trust to-zone untrust policy p1 then permit&lt;br /&gt;set security policies from-zone trust to-zone untrust policy p1 then log session-init&lt;br /&gt;&lt;br /&gt;set security zones security-zone trust host-inbound-traffic system-services all&lt;br /&gt;set security zones security-zone trust host-inbound-traffic protocols all&lt;br /&gt;set security zones security-zone trust interfaces vlan.2&lt;br /&gt;set security zones security-zone untrust screen untrust-screen&lt;br /&gt;set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services dhcp&lt;br /&gt;set security zones security-zone untrust interfaces ge-0/0/0.0 host-inbound-traffic system-services ping&lt;br /&gt;&lt;br /&gt;set vlans vlan-trust vlan-id 2&lt;br /&gt;set vlans vlan-trust l3-interface vlan.2&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtU4XTgHG4vBRfyi4vMacvF2UipqhwfFErfCwqLIL-usK99lR5vVs8hKPHJ1ZYniIdIF8rCe7HNyPDB82bJOK-RsKDtyVt-AfBa35Mjpsj8B2rJM_UvjTTqFrSJ6lZX8jgq_QnUZ1pfFM/s72-c/general.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><author>noreply@blogger.com (junosblogg)</author></item><item><title>SRX VPN: Multipoint</title><link>https://junosnotes.blogspot.com/2014/01/srx-vpn-multipoint.html</link><category>Multipoint</category><category>NHTB</category><category>Srx</category><category>VPN</category><pubDate>Fri, 3 Jan 2014 10:38:00 +1100</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-4743811155547445168.post-980584061658938401</guid><description>&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Happy New Year to all readers!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Today we are going to make a multipoint VPN.&lt;br /&gt;One hub site (VPN-CORE) and 2 spokes sites (LEFTY and RIGHTY2). All devices are SRXs.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;Multipoint is only supported with Route based VPNs so that's what we will be using and the key point to note is that the multipoint hub only uses a single tunnel interface regardless of the number of VPN tunnels.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;In real life you probably wouldn't bother with multipoint for just 2 spokes but this is a lab so lets do it!&lt;br /&gt;&lt;br /&gt;Here is the network we are working on..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We will want to get traffic between the 2 trust zones and the server-zone running over the VPN.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-eK7n2syJW4V7c0DUeV4WUpU9EQ1eb7i83E8geWmiOaSWSLIBK1kzRsHJO7ffj76hMYDsBLXMYJNVIVbG7cpqyonTzMxB1egaFUTXt2es8E7x8Xy8B-eX1Hff0zolgLpLlrjZI5Y_S74/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="489" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-eK7n2syJW4V7c0DUeV4WUpU9EQ1eb7i83E8geWmiOaSWSLIBK1kzRsHJO7ffj76hMYDsBLXMYJNVIVbG7cpqyonTzMxB1egaFUTXt2es8E7x8Xy8B-eX1Hff0zolgLpLlrjZI5Y_S74/s1600/Capture.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;SPOKE SITE CONFIG (RIGHTY2)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;With colour highlights showing how all the different elements "glue" together.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;1) TUNNEL INTERFACE&lt;br /&gt;&lt;br /&gt;Create the tunnel interface. &lt;br /&gt;All the tunnel interfaces are in the same subnet - 20.0.20.0/24&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set interfaces st0 unit 0 family inet address 20.0.20.3/24&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;2) ROUTING&lt;br /&gt;&lt;br /&gt;a) Define default route to point to the cloud.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-options static route 0.0.0.0/0 next-hop 3.3.3.1&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;b) Define which destination traffic we wish to access to via the tunnel interface.&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We wish to get to the server network behind VPN-CORE via the VPN,&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-options static route 192.168.210.0/24 next-hop st0.0&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;3) SPOKE CONFIG PHASE 1 and 2 &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;a) Define Phase 1 proposal set&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ike proposal &lt;span style="color: blue;"&gt;aes-phase1&lt;/span&gt; authentication-method pre-shared-keys&lt;br /&gt;set security ike proposal &lt;span style="color: blue;"&gt;aes-phase1&lt;/span&gt; dh-group group2&lt;br /&gt;set security ike proposal &lt;span style="color: blue;"&gt;aes-phase1&lt;/span&gt; authentication-algorithm sha1&lt;br /&gt;set security ike proposal &lt;span style="color: blue;"&gt;aes-phase1&lt;/span&gt; encryption-algorithm aes-256-cbc&lt;br /&gt;set security ike proposal &lt;span style="color: blue;"&gt;aes-phase1&lt;/span&gt; lifetime-seconds 86400&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;b) Define Phase 1 policy&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ike policy &lt;span style="color: red;"&gt;hub_p1_pol&lt;/span&gt; mode main&lt;br /&gt;set security ike policy &lt;span style="color: red;"&gt;hub_p1_pol&lt;/span&gt; proposals &lt;span style="color: blue;"&gt;aes-phase1&lt;/span&gt;&lt;br /&gt;set security ike policy &lt;span style="color: red;"&gt;hub_p1_pol&lt;/span&gt; pre-shared-key ascii-text testkey2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;c) Define Phase 1 gateway&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ike gateway &lt;span style="color: purple;"&gt;hub_gw&lt;/span&gt; ike-policy &lt;span style="color: red;"&gt;hub_p1_pol&lt;/span&gt;&lt;br /&gt;set security ike gateway &lt;span style="color: purple;"&gt;hub_gw&lt;/span&gt; address 4.4.4.2&lt;br /&gt;set security ike gateway &lt;span style="color: purple;"&gt;hub_gw&lt;/span&gt; external-interface fe-0/0/7.0&lt;br /&gt;set security ike gateway &lt;span style="color: purple;"&gt;hub_gw&lt;/span&gt; version v1-only&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The IP address here is the external address of the hub SRX ans the external interface in the physical interface the VPN traffic will use&lt;br /&gt;&lt;br /&gt;d) Define Phase 2 proposal set&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec proposal &lt;span style="color: #b45f06;"&gt;aes-phase2&lt;/span&gt; protocol esp&lt;br /&gt;set security ipsec proposal &lt;span style="color: #b45f06;"&gt;aes-phase2&lt;/span&gt; authentication-algorithm hmac-sha1-96&lt;br /&gt;set security ipsec proposal &lt;span style="color: #b45f06;"&gt;aes-phase2&lt;/span&gt; encryption-algorithm aes-256-cbc&lt;br /&gt;set security ipsec proposal &lt;span style="color: #b45f06;"&gt;aes-phase2&lt;/span&gt; lifetime-seconds 3600&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;e) Define Phase 2 policy &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec policy &lt;span style="color: magenta;"&gt;hub_p2_pol&lt;/span&gt; perfect-forward-secrecy keys group2&lt;br /&gt;set security ipsec policy &lt;span style="color: magenta;"&gt;hub_p2_pol&lt;/span&gt; proposals &lt;span style="color: #b45f06;"&gt;aes-phase2&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;f) Define the VPN&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec vpn hub_vpn bind-interface &lt;span style="color: #38761d;"&gt;st0.0&lt;/span&gt;&lt;br /&gt;set security ipsec vpn hub_vpn ike gateway &lt;span style="color: purple;"&gt;hub_gw&lt;/span&gt;&lt;br /&gt;set security ipsec vpn hub_vpn ike ipsec-policy &lt;span style="color: magenta;"&gt;hub_p2_pol&lt;/span&gt;&lt;br /&gt;set security ipsec vpn hub_vpn establish-tunnels immediately&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You can clearly see how the VPN section of the config ties all the other elements together&lt;br /&gt;&lt;br /&gt;So no difference in configuring the spoke side of a multipoint VPN as compared to configuring one side of a point-to-point link.&lt;br /&gt;&lt;br /&gt;4) VPN ZONE&lt;br /&gt;&lt;br /&gt;Define a VPN security zone and put the tunnel interface in it.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security zones security-zone vpn interfaces &lt;span style="color: #38761d;"&gt;st0.0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;/span&gt;5) ADDRESSES&lt;br /&gt;&lt;br /&gt;Define any needed addresses for the policy rules&lt;br /&gt;&lt;br /&gt;Local address..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security address-book global address net_192.168.197.0/24 192.168.197.0/24 &amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Remote address..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security address-book global address net_192.168.210.0/24 192.168.210.0/24&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;6) POLICY&lt;br /&gt;&lt;br /&gt;Create appropriate policy rules according to your needs&lt;br /&gt;&lt;br /&gt;From the local network to the remote server network on any port&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security policies from-zone trust to-zone vpn policy vpn_core_access match source-address net_192.168.197.0/24&lt;br /&gt;set security policies from-zone trust to-zone vpn policy vpn_core_access match destination-address net_192.168.210.0/24&lt;br /&gt;set security policies from-zone trust to-zone vpn policy vpn_core_access match application any&lt;br /&gt;set security policies from-zone trust to-zone vpn policy vpn_core_access then permit&lt;br /&gt;set security policies from-zone trust to-zone vpn policy vpn_core_access then log session-init&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;From the remote server network to the local network on any port&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security policies from-zone vpn to-zone trust policy vpn_core_access match source-address net_192.168.210.0/24&lt;br /&gt;set security policies from-zone vpn to-zone trust policy vpn_core_access match destination-address net_192.168.197.0/24&lt;br /&gt;set security policies from-zone vpn to-zone trust policy vpn_core_access match application any&lt;br /&gt;set security policies from-zone vpn to-zone trust policy vpn_core_access then permit&lt;br /&gt;set security policies from-zone vpn to-zone trust policy vpn_core_access then log session-init&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;7) ALLOW IKE &lt;br /&gt;&lt;br /&gt;Permit IKE on the external facing security zone &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security zones security-zone cloud-link host-inbound-traffic system-services ike&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;HUB SITE CONFIG (VPN-CORE)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;1) TUNNEL INTERFACE&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set interfaces st0.0 &lt;b&gt;multipoint&lt;/b&gt; family inet address 20.0.20.4/24&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;* Note the use of the keywork Multipoint&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;. This is the only tunnel interface we will need to create on the hub site. Which leads us to..&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;&lt;u&gt;NHTB.&lt;/u&gt;&lt;br /&gt;&lt;br /&gt;The hub device has only one tunnel interface in a multipoint config so it needs a way to be able to decide which VPN to use for what traffic.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;For this it uses the next-hop tunnel binding table (NHTB) feature which maps VPN names to next hop IP gateways. VPN name in this instance means the actual name given in the &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec vpn &lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;command.&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;The remote device's st0 interface IP is the next hop IP for the NHTB&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;Here are the elements to get traffic into the correct tunnel for a specific destination address.&lt;br /&gt;inet.0 &amp;nbsp;&amp;nbsp;&amp;nbsp; - destination address to next hop mapping&lt;br /&gt;NHTB &amp;nbsp;&amp;nbsp;&amp;nbsp; - next hop mapping to VPN ....i.e The link between the destination route and the VPN to use for that route&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;As all the devices in our network are SRXs we dont need to manually define the NHTB table as the NHTB mappings can be discovered during Phase 1 negotiations. If we didnt have Junos (or ScreenOS) devices as both ends we would need to manually define the NHTB entries.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;br /&gt;We will see this all more clearly in the output when its all working below.&lt;br /&gt;&lt;br /&gt;2) ROUTING&lt;br /&gt;&lt;br /&gt;a) Define default route to point to the cloud.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-options static route 0.0.0.0/0 next-hop 4.4.4.1&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;b) Define the next hops for the remote destination networks pointing to the remote st0 IPs&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set routing-options static route 192.168.197.0/24 next-hop 20.0.20.3&lt;br /&gt;set routing-options static route 192.168.20.0/24 next-hop 20.0.20.2&lt;br /&gt;set routing-options static route 192.168.30.0/24 next-hop 20.0.20.2&lt;br /&gt;set routing-options static route 192.168.40.0/24 next-hop 20.0.20.2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;If this was a point-to-point to point VPN we would add the route for the remote networks pointing to st0.x. But we cant do that with the multipoint config as we only have the one tunnel! So we use the remote tunnel IP for the next hop IP (Remote st0 IP)&lt;br /&gt;&lt;br /&gt;3) HUB CONFIG PHASE 1 and 2 &lt;br /&gt;&lt;br /&gt;a) Define Phase 1 proposal set&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ike proposal aes-phase1 authentication-method pre-shared-keys&lt;br /&gt;set security ike proposal aes-phase1 dh-group group2&lt;br /&gt;set security ike proposal aes-phase1 authentication-algorithm sha1&lt;br /&gt;set security ike proposal aes-phase1 encryption-algorithm aes-256-cbc&lt;br /&gt;set security ike proposal aes-phase1 lifetime-seconds 86400&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;b) Define Phase 1 policies&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ike policy righty2_p1_pol mode main&lt;br /&gt;set security ike policy righty2_p1_pol proposals aes-phase1&lt;br /&gt;set security ike policy righty2_p1_pol pre-shared-key ascii-text testkey2&lt;br /&gt;&lt;br /&gt;set security ike policy lefty_p1_pol mode main&lt;br /&gt;set security ike policy lefty_p1_pol proposals aes-phase1&lt;br /&gt;set security ike policy lefty_p1_pol pre-shared-key ascii-text testkey&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;c) Define Phase 1 gateways &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ike gateway righty2_gw ike-policy righty2_p1_pol&lt;br /&gt;set security ike gateway righty2_gw address 3.3.3.2&lt;br /&gt;set security ike gateway righty2_gw external-interface fe-0/0/7.0&lt;br /&gt;set security ike gateway righty2_gw version v1-only&lt;br /&gt;&lt;br /&gt;set security ike gateway lefty_gw ike-policy lefty_p1_pol&lt;br /&gt;set security ike gateway lefty_gw address 2.2.2.2&lt;br /&gt;set security ike gateway lefty_gw external-interface fe-0/0/7.0&lt;br /&gt;set security ike gateway lefty_gw version v1-only&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;d) Define Phase 2 proposal set&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec proposal aes-phase2 protocol esp&lt;br /&gt;set security ipsec proposal aes-phase2 authentication-algorithm hmac-sha1-96&lt;br /&gt;set security ipsec proposal aes-phase2 encryption-algorithm aes-256-cbc&lt;br /&gt;set security ipsec proposal aes-phase2 lifetime-seconds 3600&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;e) Define Phase 2 policies&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec policy righty2_p2_pol perfect-forward-secrecy keys group2&lt;br /&gt;set security ipsec policy righty2_p2_pol proposals aes-phase2&lt;br /&gt;&lt;br /&gt;set security ipsec policy lefty_p2_pol perfect-forward-secrecy keys group2&lt;br /&gt;set security ipsec policy lefty_p2_pol proposals aes-phase2&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;f) Define the VPNs&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security ipsec vpn righty2_vpn bind-interface &lt;b&gt;st0.0&lt;/b&gt;&lt;br /&gt;set security ipsec vpn righty2_vpn ike gateway righty2_gw&lt;br /&gt;set security ipsec vpn righty2_vpn ike ipsec-policy righty2_p2_pol&lt;br /&gt;set security ipsec vpn righty2_vpn establish-tunnels immediately&lt;br /&gt;&lt;br /&gt;set security ipsec vpn lefty_vpn bind-interface &lt;b&gt;st0.0&lt;/b&gt;&lt;br /&gt;set security ipsec vpn lefty_vpn ike gateway lefty_gw&lt;br /&gt;set security ipsec vpn lefty_vpn ike ipsec-policy lefty_p2_pol&lt;br /&gt;set security ipsec vpn lefty_vpn establish-tunnels immediately&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Note the use of the same tunnel interface.&lt;br /&gt;&lt;br /&gt;4) VPN ZONE&lt;br /&gt;&lt;br /&gt;Define a VPN security zone and put the tunnel interface in it.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security zones security-zone vpn interfaces st0.0&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;5) ADDRESSES&lt;br /&gt;&lt;br /&gt;Define any needed addresses for the policy rules&lt;br /&gt;&lt;br /&gt;Local address..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security address-book global address net_192.168.210.0/24 192.168.210.0/24&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Remote address..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security address-book global address net_192.168.197.0/24 192.168.197.0/24&lt;br /&gt;set security address-book global address net_192.168.20.0/24 192.168.20.0/24&amp;nbsp; &lt;br /&gt;set security address-book global address net_192.168.30.0/24 192.168.30.0/24&amp;nbsp; &lt;br /&gt;set security address-book global address net_192.168.40.0/24 192.168.40.0/24&amp;nbsp; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;6) POLICY&lt;br /&gt;&lt;br /&gt;From the remote networks to the local server network on any port&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access match source-address net_192.168.197.0/24&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access match source-address net_192.168.20.0/24&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access match source-address net_192.168.30.0/24&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access match source-address net_192.168.40.0/24&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access match destination-address net_192.168.210.0/24&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access match application any&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access then permit&lt;br /&gt;set security policies from-zone vpn to-zone server-zone policy vpn_core_access then log session-init&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;From the local server network to the remote networks on any port&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access match source-address net_192.168.210.0/24&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access match destination-address net_192.168.197.0/24&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access match destination-address net_192.168.20.0/24&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access match destination-address net_192.168.30.0/24&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access match destination-address net_192.168.40.0/24&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access match application any&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access then permit&lt;br /&gt;set security policies from-zone server-zone to-zone vpn policy vpn_core_access then log session-init&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;7) ALLOW IKE &lt;br /&gt;&lt;br /&gt;Permit IKE on the external facing security zone &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;set security zones security-zone cloud-link host-inbound-traffic system-services ike&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;VERIFICATION&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;u&gt;SPOKE SIDE VERIFICATION&amp;nbsp;&lt;/u&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;1) Check Phase 1 is up..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@RIGHTY2&amp;gt; show security ike security-associations &lt;br /&gt;Index&amp;nbsp;&amp;nbsp; State&amp;nbsp; Initiator cookie&amp;nbsp; Responder cookie&amp;nbsp; Mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote Address&amp;nbsp;&amp;nbsp; &lt;br /&gt;3184912 UP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0b97d84cc0ef6274&amp;nbsp; 6484e2b7dfa56dc0&amp;nbsp; &lt;b&gt;Main&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.4.4.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;blogger@RIGHTY2&amp;gt; show security ike security-associations detail &lt;br /&gt;IKE peer 4.4.4.2, Index 3184912,&lt;br /&gt;&amp;nbsp; Role: Responder, State: UP&lt;br /&gt;&amp;nbsp; Initiator cookie: 0b97d84cc0ef6274, Responder cookie: 6484e2b7dfa56dc0&lt;br /&gt;&amp;nbsp; Exchange type: Main, Authentication method: Pre-shared-keys&lt;br /&gt;&amp;nbsp; Local: 3.3.3.2:500, Remote: 4.4.4.2:500&lt;br /&gt;&amp;nbsp; Lifetime: Expires in 73786 seconds&lt;br /&gt;&amp;nbsp; Peer ike-id: 4.4.4.2&lt;br /&gt;&amp;nbsp; Xauth assigned IP: 0.0.0.0&lt;br /&gt;&amp;nbsp; Algorithms:&lt;br /&gt;&amp;nbsp;&amp;nbsp; Authentication&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : hmac-sha1-96 &lt;br /&gt;&amp;nbsp;&amp;nbsp; Encryption&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : aes256-cbc&lt;br /&gt;&amp;nbsp;&amp;nbsp; Pseudo random function: hmac-sha1&lt;br /&gt;&amp;nbsp; Traffic statistics:&lt;br /&gt;&amp;nbsp;&amp;nbsp; Input&amp;nbsp; bytes&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2872&lt;br /&gt;&amp;nbsp;&amp;nbsp; Output bytes&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2244&lt;br /&gt;&amp;nbsp;&amp;nbsp; Input&amp;nbsp; packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 17&lt;br /&gt;&amp;nbsp;&amp;nbsp; Output packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8&lt;br /&gt;&amp;nbsp; Flags: IKE SA is created &lt;br /&gt;&amp;nbsp; IPSec security associations: 5 created, 4 deleted&lt;br /&gt;&amp;nbsp; Phase 2 negotiations in progress: 0&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Negotiation type: Quick mode, Role: Responder, Message ID: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local: 3.3.3.2:500, Remote: 4.4.4.2:500&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local identity: 3.3.3.2&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote identity: 4.4.4.2&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags: IKE SA is created&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;2) Check Phase 2 is up..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@RIGHTY2&amp;gt; show security ipsec security-associations &lt;br /&gt;&amp;nbsp; Total active tunnels: 1&lt;br /&gt;&amp;nbsp; ID&amp;nbsp;&amp;nbsp;&amp;nbsp; Algorithm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SPI&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Life:sec/kb&amp;nbsp; Mon vsys Port&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp; &amp;lt;131073 ESP:aes-256/sha1 92cde104 2231/ unlim -&amp;nbsp; root 500&amp;nbsp;&amp;nbsp; 4.4.4.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp; &amp;gt;131073 ESP:aes-256/sha1 8ef2d2ea 2231/ unlim -&amp;nbsp; root 500&amp;nbsp;&amp;nbsp; 4.4.4.2&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@RIGHTY2&amp;gt; show security ipsec security-associations detail &lt;br /&gt;&amp;nbsp; Virtual-system: root&lt;br /&gt;&amp;nbsp; Local Gateway: 3.3.3.2, Remote Gateway: 4.4.4.2&lt;br /&gt;&amp;nbsp; Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)&lt;br /&gt;&amp;nbsp; Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)&lt;br /&gt;&amp;nbsp; Version: IKEv1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DF-bit: clear&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction: inbound, SPI: 92cde104, AUX-SPI: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VPN Monitoring: -&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hard lifetime: Expires in 2200 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifesize Remaining:&amp;nbsp; Unlimited&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Soft lifetime: Expires in 1628 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode: Tunnel, Type: dynamic, State: installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (256 bits)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-replay service: counter-based enabled, Replay window size: 64&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction: outbound, SPI: 8ef2d2ea, AUX-SPI: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VPN Monitoring: -&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hard lifetime: Expires in 2200 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifesize Remaining:&amp;nbsp; Unlimited&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Soft lifetime: Expires in 1628 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode: Tunnel, Type: dynamic, State: installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (256 bits)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-replay service: counter-based enabled, Replay window size: 64&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;3) Check stats..&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@RIGHTY2&amp;gt; show security ipsec statistics &lt;br /&gt;ESP Statistics:&lt;br /&gt;&amp;nbsp; Encrypted bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 88160&lt;br /&gt;&amp;nbsp; Decrypted bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 48720&lt;br /&gt;&amp;nbsp; Encrypted packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 580&lt;br /&gt;&amp;nbsp; Decrypted packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 580&lt;br /&gt;AH Statistics:&lt;br /&gt;&amp;nbsp; Input bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp; Output bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp; Input packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp; Output packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;Errors:&lt;br /&gt;&amp;nbsp; AH authentication failures: 0, Replay errors: 0&lt;br /&gt;&amp;nbsp; ESP authentication failures: 0, ESP decryption failures: 0&lt;br /&gt;&amp;nbsp; Bad headers: 0, Bad trailers: 0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;u&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;HUB SIDE VERIFICATION&lt;/span&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;1) Check Phase 1 is up..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ike security-associations &lt;br /&gt;Index&amp;nbsp;&amp;nbsp; State&amp;nbsp; Initiator cookie&amp;nbsp; Responder cookie&amp;nbsp; Mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote Address&amp;nbsp;&amp;nbsp; &lt;br /&gt;6340566 UP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3a4e4de2147e1425&amp;nbsp; 3a329010954c4d83&amp;nbsp; &lt;b&gt;Main&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;6340567 UP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cce17ea8c4fbbaa5&amp;nbsp; 01463a6a9e1bdd7b&amp;nbsp; &lt;b&gt;Main&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.3.3.2&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ike security-associations detail &lt;br /&gt;IKE peer 2.2.2.2, Index 6340566, Gateway Name: &lt;b&gt;lefty_gw&lt;/b&gt;&lt;br /&gt;&amp;nbsp; Role: Initiator, State: UP&lt;br /&gt;&amp;nbsp; Initiator cookie: 3a4e4de2147e1425, Responder cookie: 3a329010954c4d83&lt;br /&gt;&amp;nbsp; Exchange type: Main, Authentication method: Pre-shared-keys&lt;br /&gt;&amp;nbsp; Local: 4.4.4.2:500, Remote: 2.2.2.2:500&lt;br /&gt;&amp;nbsp; Lifetime: Expires in 85593 seconds&lt;br /&gt;&amp;nbsp; Peer ike-id: 2.2.2.2&lt;br /&gt;&amp;nbsp; Xauth assigned IP: 0.0.0.0&lt;br /&gt;&amp;nbsp; Algorithms:&lt;br /&gt;&amp;nbsp;&amp;nbsp; Authentication&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : hmac-sha1-96 &lt;br /&gt;&amp;nbsp;&amp;nbsp; Encryption&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : aes256-cbc&lt;br /&gt;&amp;nbsp;&amp;nbsp; Pseudo random function: hmac-sha1&lt;br /&gt;&amp;nbsp;&amp;nbsp; Diffie-Hellman group&amp;nbsp; : DH-group-2&lt;br /&gt;&amp;nbsp; Traffic statistics:&lt;br /&gt;&amp;nbsp;&amp;nbsp; Input&amp;nbsp; bytes&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 916&lt;br /&gt;&amp;nbsp;&amp;nbsp; Output bytes&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1000&lt;br /&gt;&amp;nbsp;&amp;nbsp; Input&amp;nbsp; packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&lt;br /&gt;&amp;nbsp;&amp;nbsp; Output packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;br /&gt;&amp;nbsp; Flags: IKE SA is created &lt;br /&gt;&amp;nbsp; IPSec security associations: 1 created, 0 deleted&lt;br /&gt;&amp;nbsp; Phase 2 negotiations in progress: 0&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Negotiation type: Quick mode, Role: Initiator, Message ID: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local: 4.4.4.2:500, Remote: 2.2.2.2:500&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local identity: 4.4.4.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote identity: 2.2.2.2&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags: IKE SA is created&lt;br /&gt;&lt;br /&gt;IKE peer 3.3.3.2, Index 6340567, Gateway Name: &lt;b&gt;righty2_gw&lt;/b&gt;&lt;br /&gt;&amp;nbsp; Role: Initiator, State: UP&lt;br /&gt;&amp;nbsp; Initiator cookie: cce17ea8c4fbbaa5, Responder cookie: 01463a6a9e1bdd7b&lt;br /&gt;&amp;nbsp; Exchange type: Main, Authentication method: Pre-shared-keys&lt;br /&gt;&amp;nbsp; Local: 4.4.4.2:500, Remote: 3.3.3.2:500&lt;br /&gt;&amp;nbsp; Lifetime: Expires in 85593 seconds&lt;br /&gt;&amp;nbsp; Peer ike-id: 3.3.3.2&lt;br /&gt;&amp;nbsp; Xauth assigned IP: 0.0.0.0&lt;br /&gt;&amp;nbsp; Algorithms:&lt;br /&gt;&amp;nbsp;&amp;nbsp; Authentication&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : hmac-sha1-96 &lt;br /&gt;&amp;nbsp;&amp;nbsp; Encryption&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : aes256-cbc&lt;br /&gt;&amp;nbsp;&amp;nbsp; Pseudo random function: hmac-sha1&lt;br /&gt;&amp;nbsp;&amp;nbsp; Diffie-Hellman group&amp;nbsp; : DH-group-2&lt;br /&gt;&amp;nbsp; Traffic statistics:&lt;br /&gt;&amp;nbsp;&amp;nbsp; Input&amp;nbsp; bytes&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 916&lt;br /&gt;&amp;nbsp;&amp;nbsp; Output bytes&amp;nbsp; :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1000&lt;br /&gt;&amp;nbsp;&amp;nbsp; Input&amp;nbsp; packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&lt;br /&gt;&amp;nbsp;&amp;nbsp; Output packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;br /&gt;&amp;nbsp; Flags: IKE SA is created &lt;br /&gt;&amp;nbsp; IPSec security associations: 1 created, 0 deleted&lt;br /&gt;&amp;nbsp; Phase 2 negotiations in progress: 0&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Negotiation type: Quick mode, Role: Initiator, Message ID: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local: 4.4.4.2:500, Remote: 3.3.3.2:500&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local identity: 4.4.4.2&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote identity: 3.3.3.2&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flags: IKE SA is created&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;2) Check Phase 2 is up..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ipsec security-associations &lt;br /&gt;&amp;nbsp; Total active tunnels: 2&lt;br /&gt;&amp;nbsp; ID&amp;nbsp;&amp;nbsp;&amp;nbsp; Algorithm&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SPI&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Life:sec/kb&amp;nbsp; Mon lsys Port&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp; &amp;lt;131074 ESP:aes-cbc-256/sha1 9434a8a9 2755/ unlim - root 500 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp; &amp;gt;131074 ESP:aes-cbc-256/sha1 47c144b2 2755/ unlim - root 500 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp; &amp;lt;131073 ESP:aes-cbc-256/sha1 1298cf37 2755/ unlim - root 500 3.3.3.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp; &amp;gt;131073 ESP:aes-cbc-256/sha1 12f7c6b5 2755/ unlim - root 500 3.3.3.2&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;4 phase 2 SAs - one pair for each of the spoke sites - exactly what we expect for a route based VPN.&amp;nbsp; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ipsec security-associations detail &lt;br /&gt;&amp;nbsp; ID: 131074 Virtual-system: root, VPN Name: &lt;b&gt;lefty_vpn&lt;/b&gt;&lt;br /&gt;&amp;nbsp; Local Gateway: 4.4.4.2, Remote Gateway: 2.2.2.2&lt;br /&gt;&amp;nbsp; Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)&lt;br /&gt;&amp;nbsp; Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)&lt;br /&gt;&amp;nbsp; Version: IKEv1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DF-bit: clear&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bind-interface: st0.0&lt;br /&gt;&lt;br /&gt;&amp;nbsp; Port: 500, Nego#: 1, Fail#: 0, Def-Del#: 0 Flag: 600a29 &lt;br /&gt;&amp;nbsp; Tunnel Down Reason: SA not initiated&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction: inbound, SPI: 9434a8a9, AUX-SPI: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VPN Monitoring: -&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hard lifetime: Expires in 2752 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifesize Remaining:&amp;nbsp; Unlimited&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Soft lifetime: Expires in 2130 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode: Tunnel(0 0), Type: dynamic, State: installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (256 bits)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-replay service: counter-based enabled, Replay window size: 64&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction: outbound, SPI: 47c144b2, AUX-SPI: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VPN Monitoring: -&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hard lifetime: Expires in 2752 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifesize Remaining:&amp;nbsp; Unlimited&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Soft lifetime: Expires in 2130 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode: Tunnel(0 0), Type: dynamic, State: installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (256 bits)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-replay service: counter-based enabled, Replay window size: 64&lt;br /&gt;&lt;br /&gt;&amp;nbsp; ID: 131073 Virtual-system: root, VPN Name: &lt;b&gt;righty2_vpn&lt;/b&gt;&lt;br /&gt;&amp;nbsp; Local Gateway: 4.4.4.2, Remote Gateway: 3.3.3.2&lt;br /&gt;&amp;nbsp; Local Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)&lt;br /&gt;&amp;nbsp; Remote Identity: ipv4_subnet(any:0,[0..7]=0.0.0.0/0)&lt;br /&gt;&amp;nbsp; Version: IKEv1&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; DF-bit: clear&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bind-interface: st0.0&lt;br /&gt;&lt;br /&gt;&amp;nbsp; Port: 500, Nego#: 1, Fail#: 0, Def-Del#: 0 Flag: 600a29 &lt;br /&gt;&amp;nbsp; Tunnel Down Reason: SA not initiated&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction: inbound, SPI: 1298cf37, AUX-SPI: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VPN Monitoring: -&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hard lifetime: Expires in 2752 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifesize Remaining:&amp;nbsp; Unlimited&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Soft lifetime: Expires in 2118 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode: Tunnel(0 0), Type: dynamic, State: installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (256 bits)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-replay service: counter-based enabled, Replay window size: 64&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Direction: outbound, SPI: 12f7c6b5, AUX-SPI: 0&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; , VPN Monitoring: -&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hard lifetime: Expires in 2752 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lifesize Remaining:&amp;nbsp; Unlimited&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Soft lifetime: Expires in 2118 seconds&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mode: Tunnel(0 0), Type: dynamic, State: installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Protocol: ESP, Authentication: hmac-sha1-96, Encryption: aes-cbc (256 bits)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-replay service: counter-based enabled, Replay window size: 64&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;3) Check NHTB table and routing..&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;blogger@VPN-CORE&amp;gt; show security ipsec next-hop-tunnels &lt;br /&gt;Next-hop gateway&amp;nbsp; interface&amp;nbsp;&amp;nbsp; IPSec VPN name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flag&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IKE-ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XAUTH username&lt;br /&gt;20.0.20.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; st0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lefty_vpn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;Auto&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;20.0.20.3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; st0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; righty2_vpn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;Auto&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.3.3.2&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;S&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;ee how the NHTB&amp;nbsp; entries have been auto installed due to phase 1 negotiations. If we were using a point-to-point VPN we would see no output for this command.&lt;/span&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;Here is a VPN debug showing the NHTB negotiations between the hub and 2 spokes.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show log VPNLOG | match NHTB &lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]Construction NHTB payload for&amp;nbsp; local:4.4.4.2, remote:2.2.2.2 IKEv1 P1 SA index &lt;span style="color: red;"&gt;6340566&lt;/span&gt; sa-cfg lefty_vpn&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]iked_nhtb_get_tunnel_ifam: got ifa&amp;nbsp; error&amp;nbsp; 0&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]Construction NHTB payload for&amp;nbsp; local:4.4.4.2, remote:3.3.3.2 IKEv1 P1 SA index &lt;span style="color: #b45f06;"&gt;6340567&lt;/span&gt; sa-cfg righty2_vpn&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]iked_nhtb_get_tunnel_ifam: got ifa&amp;nbsp; error&amp;nbsp; 0&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]Received NHTB payload from&amp;nbsp; local:4.4.4.2, remote:2.2.2.2 IKEv1 P1 SA index &lt;span style="color: red;"&gt;6340566&lt;/span&gt;&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]Received NHTB private IP address 20.0.20.2&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]In iked_nhtb_config_send_msg Adding GENCFG msg with key = 20002&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]iked_nhtb_config_send_msg: Successfully added NHTB Config with key&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]nhtb route operation: ifindex=69, (69), rttabl=0&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]iked_nhtb_add_entry: Not adding NHTB entry to kernel as IKED_NHTB_IN_KERNEL is set&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]Received NHTB payload from&amp;nbsp; local:4.4.4.2, remote:3.3.3.2 IKEv1 P1 SA index 6340567&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:42]Received NHTB private IP address 20.0.20.3&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:43]In iked_nhtb_config_send_msg Adding GENCFG msg with key = 20001&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:43]iked_nhtb_config_send_msg: Successfully added NHTB Config with key&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:43]nhtb route operation: ifindex=69, (69), rttabl=0&lt;br /&gt;[Jan&amp;nbsp; 2 12:38:43]iked_nhtb_add_entry: Not adding NHTB entry to kernel as IKED_NHTB_IN_KERNEL is set&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Note how the phase 1 SAs above match the following info..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ike security-associations &lt;br /&gt;Index&amp;nbsp;&amp;nbsp; State&amp;nbsp; Initiator cookie&amp;nbsp; Responder cookie&amp;nbsp; Mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote Address&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;span style="color: red;"&gt;6340566&lt;/span&gt; UP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3a4e4de2147e1425&amp;nbsp; 3a329010954c4d83&amp;nbsp; Main&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;span style="color: #b45f06;"&gt;6340567&lt;/span&gt; UP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; cce17ea8c4fbbaa5&amp;nbsp; 01463a6a9e1bdd7b&amp;nbsp; Main&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.3.3.2&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;So lets go over the routing from the hub SRX to get to the remote network behind RIGHYT2 - 192.168.197.0/24&lt;br /&gt;Here is how I think it through..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show route 192.168.197.0 &lt;br /&gt;&lt;br /&gt;inet.0: 13 destinations, 13 routes (13 active, 0 holddown, 0 hidden)&lt;br /&gt;+ = Active Route, - = Last Active, * = Both&lt;br /&gt;&lt;br /&gt;192.168.197.0/24&amp;nbsp;&amp;nbsp; *[Static/5] 00:18:43&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;gt; to 20.0.20.3 via st0.0&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;The above says to get to the remote network 192.168.197.0/24 go via 20.0.20.3 via st0.0&lt;br /&gt;We know 20.0.20.3 is the IP of st0.0 on RIGHTY2&lt;br /&gt;But how do we get to 20.0.20.3?&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ipsec next-hop-tunnels &lt;br /&gt;Next-hop gateway&amp;nbsp; interface&amp;nbsp;&amp;nbsp; IPSec VPN name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Flag&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IKE-ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XAUTH username&lt;br /&gt;20.0.20.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; st0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lefty_vpn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2.2.2.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;b&gt;20.0.20.3&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; st0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;righty2_vpn&amp;nbsp;&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Auto&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3.3.3.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The above says we get to 20.0.20.3 via the righty2_vpn.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;4) Check stats..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security ipsec statistics&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;ESP Statistics:&lt;br /&gt;&amp;nbsp; Encrypted bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13568&lt;br /&gt;&amp;nbsp; Decrypted bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7420&lt;br /&gt;&amp;nbsp; Encrypted packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 68&lt;br /&gt;&amp;nbsp; Decrypted packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 83&lt;br /&gt;AH Statistics:&lt;br /&gt;&amp;nbsp; Input bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp; Output bytes:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp; Input packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp; Output packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;Errors:&lt;br /&gt;&amp;nbsp; AH authentication failures: 0, Replay errors: 0&lt;br /&gt;&amp;nbsp; ESP authentication failures: 0, ESP decryption failures: 0&lt;br /&gt;&amp;nbsp; Bad headers: 0, Bad trailers: 0&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;5) Check ESP is in the session flow table&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;blogger@VPN-CORE&amp;gt; show security flow session | match esp &lt;br /&gt;&amp;nbsp; In: 2.2.2.2/37940 --&amp;gt; 4.4.4.2/43177;esp, If: fe-0/0/7.0, Pkts: 0, Bytes: 0&lt;br /&gt;&amp;nbsp; In: 2.2.2.2/0 --&amp;gt; 4.4.4.2/0;esp, If: fe-0/0/7.0, Pkts: 0, Bytes: 0&lt;br /&gt;&amp;nbsp; In: 3.3.3.2/4760 --&amp;gt; 4.4.4.2/53047;esp, If: fe-0/0/7.0, Pkts: 0, Bytes: 0&lt;br /&gt;&amp;nbsp; In: 3.3.3.2/0 --&amp;gt; 4.4.4.2/0;esp, If: fe-0/0/7.0, Pkts: 0, Bytes: 0&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;You can also see the same thing with &lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;show security flow session tunnel &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;SPOKE TO SPOKE COMMUNICATIONS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;With what we have set up in this lab, the spokes will not be allowed to talk to each other. If you wanted to allow the spokes to talk to each other you would need..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;On the HUB..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;An intra vpn zone policy such as..&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;set security policies from-zone vpn to-zone vpn policy intra-vpn match source-address any&lt;br /&gt;set security policies from-zone vpn to-zone vpn policy intra-vpn match destination-address any&lt;br /&gt;set security policies from-zone vpn to-zone vpn policy intra-vpn match application any&lt;br /&gt;set security policies from-zone vpn to-zone vpn policy intra-vpn then permit&lt;br /&gt;set security policies from-zone vpn to-zone vpn policy intra-vpn then log session-init&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;On the Spokes..&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Adjust the policies accordingly and don't forget to add the routes to the other spoke(s) via st0.0&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="color: black;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Model: srx210he&lt;br /&gt;JUNOS Software Release [12.1X45-D15.5] &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-eK7n2syJW4V7c0DUeV4WUpU9EQ1eb7i83E8geWmiOaSWSLIBK1kzRsHJO7ffj76hMYDsBLXMYJNVIVbG7cpqyonTzMxB1egaFUTXt2es8E7x8Xy8B-eX1Hff0zolgLpLlrjZI5Y_S74/s72-c/Capture.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><author>noreply@blogger.com (junosblogg)</author></item><item><title>SRX UTM: Antivirus - Sophos</title><link>https://junosnotes.blogspot.com/2013/11/srx-utm-antivirus-sophos.html</link><category>Antivirus</category><category>Srx</category><category>Traceoptions</category><category>UTM</category><pubDate>Tue, 26 Nov 2013 10:44:00 +1100</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-4743811155547445168.post-2153569984587983106</guid><description>&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Here is a quick overview of getting Sophos AV working on an SRX&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Sophos is the Cloud based solution and so needs an active Internet connection to work. This means the AV database is not stored locally on the SRX like Kaspersky. The SRX uses DNS queries to the Sophos Cloud to perform AV queries. We'll see later how these work.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Sophos can also perform URI content checking over HTTP to detect malware.This is essentially a reputataion check and can be disabled if you wish.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The Sophos solution should put less load on the SRX, processor and memory wise due to not having to download a giant AV database and run checks against it though it does cache responses to improve lookup performance.&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;1) THE LICENSE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;You need the highlighted line.. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220&amp;gt; show system license &lt;br /&gt;License usage: &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Licenses&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Licenses&amp;nbsp;&amp;nbsp;&amp;nbsp; Licenses&amp;nbsp;&amp;nbsp;&amp;nbsp; Expiry&lt;br /&gt;&amp;nbsp; Feature name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; used&amp;nbsp;&amp;nbsp;&amp;nbsp; installed&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; needed &lt;br /&gt;&amp;nbsp; anti_spam_key_sbl&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-02-12 11:00:00 EST&lt;br /&gt;&amp;nbsp; idp-sig&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-02-12 11:00:00 EST&lt;br /&gt;&amp;nbsp; dynamic-vpn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; permanent&lt;br /&gt;&amp;nbsp; ax411-wlan-ap&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; permanent&lt;br /&gt;&amp;nbsp; appid-sig&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-02-12 11:00:00 EST&lt;br /&gt;&lt;b&gt;&amp;nbsp; av_key_sophos_engine&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-02-12 11:00:00 EST&lt;/b&gt;&lt;br /&gt;&amp;nbsp; wf_key_websense_ewf&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 2014-02-12 11:00:00 EST &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;2) PICK THE AV ENGINE&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Prior to selecting Sophos AV we can check the AV status..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220&amp;gt; show security utm anti-virus status &lt;br /&gt;&amp;nbsp;UTM anti-virus status: &lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus key expire date: license not installed&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Update server: http://update.juniper-updates.net/AV/SRX220/&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interval: 60 minutes&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pattern update status: update disabled due to no license&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last result: N/A&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus signature version: &lt;b&gt;not loaded&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus signature compiler version: N/A&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scan engine type:&lt;b&gt; kaspersky-lab-engine&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scan engine information: last action result: Engine not ready&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Note: by default it shows the Kaspersky engine even though we don't have a license for it and we never configured it .&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Trying to update with no AV configured even though we have the Sophos licence..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220&amp;gt; request security utm anti-virus sophos-engine pattern-update &lt;br /&gt;Anti-virus update request results: engine type mismatch! &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Now we configure Sophos..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220# set security utm feature-profile anti-virus type sophos-engine &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;If we do a commit at this stage and then check the AV status again..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220# run show security utm anti-virus status&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;UTM anti-virus status: &lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus key expire date: 2014-02-12 11:00:00&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Update server: http://update.juniper-updates.net/SAV/&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interval: 1440 minutes&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pattern update status: next update in 1439 minutes&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last result: &lt;b&gt;new database downloaded&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus signature version: 1.02.0 (1.02)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scan engine type: &lt;b&gt;sophos-engine&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scan engine information: last action result: No error&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Looks better!&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Lets changes the update interval to 12 hours..&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220# run show security utm anti-virus status&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&amp;nbsp;UTM anti-virus status: &lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus key expire date: 2014-02-12 11:00:00&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Update server: http://update.juniper-updates.net/SAV/&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interval: &lt;b&gt;720 minutes&lt;/b&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pattern update status: next update in 719 minutes&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last result: already have latest database&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus signature version: 1.02.0 (1.02)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scan engine type: sophos-engine&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Scan engine information: last action result: No error&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Its actually interesting to consider here exactly what the update interval does as we know running Sophos we are not actually downloading the AV signature set.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;I believe this is the best description of whats happening with these updates..&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;i&gt;Sophos antivirus uses a set of data files that need to
be updated on a regular basis. These are not typical virus pattern
files; they are a set of small files that help guide virus scanning
logic. You can manually download the data files or set up automatic
download.&amp;nbsp;&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept/utm-antivirus-sophos-comparison-to-kaspersky.html" target="_blank"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept/utm-antivirus-sophos-comparison-to-kaspersky.html&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;3) Bind AV to the UTM Policy&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;In my case I already have a UTM policy which has Enhanced Web Filtering in it so we will use that.&lt;br /&gt;&lt;br /&gt;Here is the UTM policy config before changes..&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;user@SRX220# run show configuration security utm utm-policy utm_testa &lt;br /&gt;web-filtering {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; http-profile wf_e_profile;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now we add AV to the UTM policy. You need to define which protocols you want AV to protect with individual profiles. This time we will apply it to all possible choices.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;[edit]&lt;br /&gt;user@SRX220# set security utm utm-policy utm_testa anti-virus http-profile junos-sophos-av-defaults &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm utm-policy utm_testa anti-virus smtp-profile junos-sophos-av-defaults&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm utm-policy utm_testa anti-virus pop3-profile junos-sophos-av-defaults&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm utm-policy utm_testa anti-virus imap-profile junos-sophos-av-defaults&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm utm-policy utm_testa anti-virus ftp upload-profile junos-sophos-av-defaults&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm utm-policy utm_testa anti-virus ftp download-profile junos-sophos-av-defaults&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;4) OTHER OPTIONS&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;If you are happy to use the junos-sophos-av-default profile thats it. No more to configure in the AV section. &lt;br /&gt;&lt;br /&gt;However when we look at the default profile settings..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;user@SRX220# show groups junos-defaults security utm feature-profile anti-virus sophos-engine &lt;br /&gt;pattern-update {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; url http://update.juniper-updates.net/SAV/;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; interval 1440;&lt;br /&gt;}&lt;br /&gt;profile junos-sophos-av-defaults {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fallback-options {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default log-and-permit;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; content-size log-and-permit;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; engine-not-ready log-and-permit;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; timeout log-and-permit;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; out-of-resources log-and-permit;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; too-many-requests log-and-permit;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; scan-options {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; uri-check;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; content-size-limit 10000;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; timeout 180;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; notification-options {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; virus-detection {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type message;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no-notify-mail-sender;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; custom-message "VIRUS WARNING";&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; fallback-block {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type message;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no-notify-mail-sender;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We dont see any settings for these below sxl-retry and sxl-timeout options so Im not sure what the default settings for them are. SXL is Sophos Extensible List - the servers contain the virus and malware database for scanning operations&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;user@SRX220# set security utm feature-profile anti-virus sophos-engine ?&amp;nbsp; &lt;br /&gt;Possible completions:&lt;br /&gt;+ apply-groups&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Groups from which to inherit configuration data&lt;br /&gt;+ apply-groups-except&amp;nbsp; Don't inherit configuration data from these groups&lt;br /&gt;&amp;gt; pattern-update&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus sophos-engine pattern update&lt;br /&gt;&amp;gt; profile&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti-virus sophos-engine profile&lt;br /&gt;&amp;nbsp; &lt;b&gt;sxl-retry&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sxl sophos anti-virus engine query retry (number of times) (0..5)&lt;br /&gt;&amp;nbsp; &lt;b&gt;sxl-timeout&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sxl sophos anti-virus engine timeout (1..5 seconds)&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;So you may want to set them to whatever you want so you know what those settings are..&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;user@SRX220# set security utm feature-profile anti-virus sophos-engine sxl-retry ?&lt;br /&gt;Possible completions:&lt;br /&gt;&amp;nbsp; &amp;lt;sxl-retry&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sxl sophos anti-virus engine query retry (number of times) (0..5)&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm feature-profile anti-virus sophos-engine sxl-retry 5&amp;nbsp; &lt;br /&gt;&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm feature-profile anti-virus sophos-engine sxl-timeout ?&amp;nbsp; &lt;br /&gt;Possible completions:&lt;br /&gt;&amp;nbsp; &amp;lt;sxl-timeout&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Sxl sophos anti-virus engine timeout (1..5 seconds)&lt;br /&gt;[edit]&lt;br /&gt;user@SRX220# set security utm feature-profile anti-virus sophos-engine sxl-timeout 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;5) AV CONFIG&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Here is the resulting AV config in full..&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220&amp;gt; show configuration security utm feature-profile anti-virus&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;type sophos-engine;&lt;br /&gt;sophos-engine {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sxl-timeout 5;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; sxl-retry 5;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pattern-update {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interval 720;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;user@SRX220&amp;gt; show configuration security utm utm-policy utm_testa &lt;br /&gt;anti-virus {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; http-profile junos-sophos-av-defaults;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ftp {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; upload-profile junos-sophos-av-defaults;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; download-profile junos-sophos-av-defaults;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; smtp-profile junos-sophos-av-defaults;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pop3-profile junos-sophos-av-defaults;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; imap-profile junos-sophos-av-defaults;&lt;br /&gt;}&lt;br /&gt;web-filtering {&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; http-profile wf_e_profile;&lt;br /&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;To make it work you attach the UTM policy to the policy you want to enforce AV checking and note that policy will also do web filtering.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Finally I have setup the same syslog files as from the Kaspersky blog (AV_OPS and AV_VIRUS) &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;To see the config for the syslog setup and the enforcing policy please check the Kaspersky lab blog - they are exactly the same.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: purple;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: purple;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;6) TESTING&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;All test results are the same as per the Kaspersky blog so I wont bore you by repeating them here.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We'll just quickly verify its stats..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220&amp;gt; show security utm anti-virus statistics&amp;nbsp; &lt;br /&gt;&amp;nbsp;UTM Anti Virus statistics: &lt;br /&gt;&amp;nbsp;MIME-whitelist passed:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp;URL-whitelist passed:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp;Scan Request: &lt;br /&gt;&lt;br /&gt;&amp;nbsp; Total&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Clean&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;Threat-found&amp;nbsp;&lt;/b&gt;&amp;nbsp;&amp;nbsp; Fallback&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 21&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;3&lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&lt;br /&gt;&amp;nbsp;Fallback: &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Log-and-Permit&amp;nbsp;&amp;nbsp;&amp;nbsp; Block&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit&lt;br /&gt;&amp;nbsp;Engine not ready:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 &lt;br /&gt;&amp;nbsp;Out of resources:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp;Timeout:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp;Maximum content size:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp;Too many requests:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;br /&gt;&amp;nbsp;Others:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;For something a little different lets dig a bit deeper into its workings..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;AV Traceoptions..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;To do traceoptions for AV it doesnt appear you can set the traceoptions file under either security &amp;gt; utm &amp;gt; feature-profile &amp;gt; anti-virus or even under  security &amp;gt; utm. You have to set the file directly under security for this type of traceoptions though that isn't necessarily the case for all the hierarchies under security.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Here is the full AV traceoptions settings I used based on..&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB21781&amp;amp;smlogin=true#UTMAntiVirus" target="_blank"&gt;http://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=KB21781&amp;amp;smlogin=true#UTMAntiVirus &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220# run show configuration | match traceoptions | display set &lt;br /&gt;set security utm traceoptions flag all&lt;br /&gt;set security utm application-proxy traceoptions flag all&lt;br /&gt;set security utm feature-profile anti-virus traceoptions flag all&lt;br /&gt;set security traceoptions file SEC-UTM&lt;br /&gt;set security traceoptions file size 1m&lt;br /&gt;set security traceoptions file files 3&lt;br /&gt;set security traceoptions file world-readable&lt;br /&gt;set security traceoptions flag all&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Be aware of the phenominal amount of data these traceoptions generate. The caveats in the above link are important... &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Below are some selected output from the traceoptions that are understandable/meaningful.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Naturally with traceoptions you get way more than you need so you need to know what to look for. Surely only a Junos programmer could undestand all of the output! &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Looks like the event of trying to download the eicar file is assigned a unique &lt;span style="color: blue;"&gt;app_obj&lt;/span&gt; which you can follow through the log entries to see whats happening with said event.&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Starting the download.. &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:HTTP: 10.222.222.10(54767)-&amp;gt;188.40.238.250(80) server header /download/&lt;b&gt;eicar_com.zip&lt;/b&gt; is received.&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;app_obj assigned.. &lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:: HTTP http_post_event_handler 245 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; event_id 11.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Checks if it is in the whitelist..&lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:&lt;b&gt;check url whitelist&lt;/b&gt;: (0) url:www.eicar.org/download/eicar_com.zip&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Not in whitelist.. &lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:&lt;b&gt;not found&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We need to scan it.. &lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:SAV: &lt;b&gt;sav_is_scan_required&lt;/b&gt; 720 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; sav_ctx 0x4ac76650&lt;br /&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:SAV: check_sav_configuration 584 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; sav_info 0x4db94bf0 filename www.eicar.org/download/eicar_com.zip.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Size confirms its our file.. &lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:AV: current content &lt;b&gt;size:184&lt;/b&gt;, config maximum content size:10000K&lt;br /&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:check_sav_configuration: need scan&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;We send the scan request to the cloud..&lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.386915:CID-0:RT:SAV: sav_&lt;b&gt;send_sxl_request&lt;/b&gt; 814 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; sav_ctx 0x4ac76650 send dns to a3d093b len 142 (0)&lt;br /&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.390513:CID-0:RT:: APPPXY HANDLER EVENT utm_apppxy_event_scheduler 234 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; event_handler=222e50b4.&lt;br /&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.390513:CID-0:RT:Release APPPXY:0x4E44B050 app object &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; for flow 10.222.222.10(54767)-&amp;gt;188.40.238.250(80).&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Response back from the cloud..&lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.705882:CID-0:RT:SAV: &lt;b&gt;sav_sxl_response&lt;/b&gt;_callback 1918 context 0x4ac75010 request 0x4e44be20 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; rtn 11&lt;br /&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.705882:CID-0:RT:APPPXY: HTTP on_http_mod_sav_recv_scan_result 563 app_obj 0x4ac767b8 http_session &lt;span style="color: blue;"&gt;0x4ac76a28&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.705882:CID-0:RT:APPPXY: HTTP http_sav_process_scan_result 899 app_obj &lt;span style="color: blue;"&gt;0x4ac767b8&lt;/span&gt; http_session 0x4ac76a28 flow_orig 1&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;br /&gt;We drop the request.. &lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.705882:CID-0:RT: &lt;b&gt;drop_pak&lt;/b&gt;_queue 658 q AV-CTX(0x4ac766f0) total 2 bytes 400&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;The drop message is sent to the browser.. &lt;/span&gt;&lt;br /&gt;Nov 21 13:46:26 13:46:26.705882:CID-0:RT:APPPXY: HTTP &lt;b&gt;http_create_drop_msg&lt;/b&gt; 222 protocol_only 0, plain_msg 0&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;I cant be certain all my descriptions of the log events are correct but it makes sense in light of what we know how it works and what happened. Comments welcome..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Here is the corresponding log entry to the above event..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot; , &amp;quot;courier&amp;quot; , monospace;"&gt;user@SRX220&amp;gt; show log AV_VIRUS&amp;nbsp; &lt;br /&gt;Nov 21 13:46:26&amp;nbsp; SRX RT_UTM: AV_VIRUS_DETECTED_MT: AntiVirus: Virus detected: from 188.40.238.250:80 to 10.222.222.10:54767 source-zone untrust www.eicar.org/download/eicar_com.zip file www.eicar.org/download/eicar_com.zip virus EICAR-AV-Test URL:HTTP://SXL2-01.P.LINK.SOPHOS.COM/T/en/EICAR-AV-Test username N/A roles N/A&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Model: srx220h&lt;br /&gt;JUNOS Software Release [12.1X44-D25.5]&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><author>noreply@blogger.com (junosblogg)</author></item></channel></rss>