I've come across a similar issue to this one with an SSG20. When you do eventually get some console access to the device, check the event log for messages such as "Switch error: get phy register (dev 8, reg 4) fail". If this is the same problem I was having, then there was a patch built off 6.0r5 (I notice you are running r7) and related PR numbers are 291764, 225017, 285333, 286295, though I think most were private last time I checked.

On 12/03/2009, at 10:27 AM, ChrisSerafin wrote:

Tim Eberhard wrote:
Is the firewall itself freezing or is it just not passing traffic?

I understand step 1 when working with a remote device like that is typically have the customer reboot it to see if that restores service but is it really frozen?

You could be having interface issues (I see most are auto neg) or circuit issues.

-Tim Eberhard

On Wed, Mar 11, 2009 at 3:53 PM, ChrisSerafin <ch...@chrisserafin.com <mailto:ch...@chrisserafin.com>> wrote:

   UUGGGHH,

   major problem for myself over here. I have installed a brand new
   SSG140 firewall at a client and for some reason it keeps freezing
   and will not pass traffic. We are never onsite and can't get
   console messages or troubleshoot while it's down. (i'm putting a
   laptop attached to the console tomorrow for this) We have tried
   multiple firmware changes, swapped UPS's, and actually RMA'ed the
   device for a new one. Same thing persists. Pulling my hair out and
   JTAC says they need console access while it is down...hard to do
   for a HQ VPN hub site.

   Any ideas are more than appreciated.....THANKS! Info below

   --chris

   Product Name    SSG-140
   Host Name       QST-CHI-HQ
   Serial Number   0185062007000016
   Control Number  ffffffff
   Hardware Version        1010(0)-( 0), FPGA checksum: 0, VLAN1 IP
   (0.0.0.0)
   Software Version        6.0.0r7.0, Type: Firewall+VPN
   Feature         AV-K
   Base Mac        0019.e241.4880
   File Name       screenos_image, Checksum: e5cb9ed
   Total Memory    512MB
   Date 03/11/2009 15:51:44, Daylight Saving Time enabled.
   The Network Time Protocol is enabled.
   Up 0 hours 6 minutes 27 seconds since 11Mar2009:15:45:17
   Total Device Resets: 0.
   System in NAT/route mode.
   Use interface IP, Config Port: 80
   User Name: netscreen






   set clock ntp
   set clock timezone -6
   set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0
   11 02:00
   set vrouter trust-vr sharable
   set vrouter "untrust-vr"
   exit
   set vrouter "trust-vr"
   unset auto-route-export
   exit
   set service "DNB" protocol tcp src-port 1024-65535 dst-port
   23202-23202
   set service "IM_Custom" protocol tcp src-port 0-65535 dst-port
   5200-5200
   set service "SOCKS" protocol tcp src-port 1024-65535 dst-port
   1080-1080
   set service "TCP-1024-5000" protocol tcp src-port 1024-65535
   dst-port 1024-5000
   set service "TCP-18190" protocol tcp src-port 1024-65535 dst-port
   18190-18190
   set service "TCP-264" protocol tcp src-port 1024-65535 dst-port
   264-264
   set service "TCP-8100" protocol tcp src-port 1024-65535 dst-port
   8100-8100
set service "TCP-82" protocol tcp src-port 1024-65535 dst-port 82-82
   set service "Terminal_Srvc" protocol tcp src-port 0-65535 dst-port
   3389-3389
   set service "UDP-2746" protocol udp src-port 0-65535 dst-port
   2746-2746
set service "UDP-500" protocol udp src-port 0-65535 dst-port 500-500
   set service "IPSEC" protocol 50 src-port 0-65535 dst-port 0-65535
   set service "IPSEC" + 51 src-port 0-65535 dst-port 0-65535
   set service "IPSEC" + udp src-port 0-65535 dst-port 500-500
   set service "Juniper-IDP-Comms" protocol udp src-port 0-65535
   dst-port 7101-7102
   set service "Juniper-IDP-Comms" + udp src-port 0-65535 dst-port
   7201-7202
   set service "RSA Services" protocol udp src-port 0-65535 dst-port
   5500-5500
set service "RSA Services" + tcp src-port 0-65535 dst-port 5500-5500
   set service "MexicanGov" protocol tcp src-port 0-65535 dst-port
   8081-8081
   set service "MexicanGov" + tcp src-port 0-65535 dst-port 8089-8089
   set service "Mexico_software" protocol tcp src-port 0-65535
   dst-port 7824-7824
   set service "Mexico_software" + tcp src-port 0-65535 dst-port
   8080-8080
   set service "Mexico_MS_VPN" protocol tcp src-port 0-65535 dst-port
   1723-1723
   set service "Mexico_MS_VPN" + tcp src-port 0-65535 dst-port 47-47
   set auth-server "Local" id 0
   set auth-server "Local" server-name "Local"
   set auth default auth server "Local"
   set auth radius accounting port 1646
   set admin name "netscreen"
   set admin password "nO6/LZrBMXXXXXXXXXXXXXXCHtN6KXVn"
   set admin auth timeout 10
   set admin auth server "Local"
   set admin format dos
   set zone "Trust" vrouter "trust-vr"
   set zone "Untrust" vrouter "trust-vr"
   set zone "DMZ" vrouter "trust-vr"
   set zone "VLAN" vrouter "trust-vr"
   set zone "Untrust-Tun" vrouter "trust-vr"
   set zone "Trust" tcp-rst
   set zone "Untrust" block
   unset zone "Untrust" tcp-rst
   set zone "MGT" block
   set zone "DMZ" tcp-rst
   set zone "VLAN" block
   set zone "VLAN" tcp-rst
   unset zone "Untrust" screen tear-drop
   unset zone "Untrust" screen syn-flood
   unset zone "Untrust" screen ping-death
   unset zone "Untrust" screen ip-filter-src
   unset zone "Untrust" screen land
   set zone "V1-Untrust" screen tear-drop
   set zone "V1-Untrust" screen syn-flood
   set zone "V1-Untrust" screen ping-death
   set zone "V1-Untrust" screen ip-filter-src
   set zone "V1-Untrust" screen land
   set interface ethernet0/0 phy full 100mb
   set interface "ethernet0/0" zone "Trust"
   set interface "ethernet0/1" zone "DMZ"
   set interface "ethernet0/2" zone "Untrust"
   set interface "ethernet0/3" zone "DMZ"
   set interface "ethernet0/4" zone "DMZ"
   set interface "tunnel.1" zone "Untrust"
   set interface "tunnel.2" zone "Untrust"
   set interface "tunnel.3" zone "Trust"
   set interface ethernet0/0 ip 192.168.180.26/24
   <http://192.168.180.26/24>
   set interface ethernet0/0 route
   unset interface vlan1 ip
   set interface ethernet0/1 ip 12.106.237.89/29
   <http://12.106.237.89/29>
   set interface ethernet0/1 nat
   set interface ethernet0/2 ip 12.63.231.146/28
   <http://12.63.231.146/28>
   set interface ethernet0/2 route
   set interface ethernet0/3 ip 192.168.3.1/24 <http://192.168.3.1/24>
   set interface ethernet0/3 route
   set interface ethernet0/4 ip 192.168.4.1/24 <http://192.168.4.1/24>
   set interface ethernet0/4 route
   set interface tunnel.1 ip unnumbered interface ethernet0/2
   set interface tunnel.2 ip unnumbered interface ethernet0/2
   set interface tunnel.3 ip unnumbered interface ethernet0/2
   set interface ethernet0/4 mtu 1460
   unset interface vlan1 bypass-others-ipsec
   unset interface vlan1 bypass-non-ip
   set interface ethernet0/0 ip manageable
   set interface ethernet0/1 ip manageable
   set interface ethernet0/2 ip manageable
   set interface ethernet0/3 ip manageable
   set interface ethernet0/4 ip manageable
   set interface ethernet0/1 manage ssh
   set interface ethernet0/1 manage telnet
   set interface ethernet0/1 manage snmp
   set interface ethernet0/1 manage web
   set interface ethernet0/2 manage ping
   set interface ethernet0/2 manage ssh
   set interface ethernet0/2 manage telnet
   set interface ethernet0/2 manage snmp
   set interface ethernet0/2 manage ssl
   set interface ethernet0/2 manage web
   set interface ethernet0/0 monitor track-ip weight 1
   unset interface ethernet0/0 monitor track-ip dynamic
   set interface ethernet0/2 dip 4 12.63.231.150 12.63.231.150
   set interface "ethernet0/2" mip 12.106.250.6 host 192.168.180.20
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.106.250.7 host 192.168.180.1
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.106.250.5 host 192.168.180.3
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.106.250.8 host 192.168.184.115
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.106.250.9 host 192.168.184.124
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.63.231.147 host 192.168.180.6
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.63.231.148 host 192.168.4.10
   netmask 255.255.255.255 vr "trust-vr"
   set interface "ethernet0/2" mip 12.63.231.149 host 192.168.4.11
   netmask 255.255.255.255 vr "trust-vr"
   set interface ethernet0/0 ntp-server
   set flow tcp-mss
   unset flow no-tcp-seq-check
   unset flow tcp-syn-check
   unset flow tcp-syn-bit-check
   set flow reverse-route clear-text prefer
   set flow reverse-route tunnel always
   set console page 0
   set hostname QST-CHI-HQ
   set pki authority default scep mode "auto"
   set pki x509 default cert-path partial
   set dns host dns1 192.168.180.10 src-interface ethernet0/0
   set dns host dns2 0.0.0.0
   set dns host dns3 0.0.0.0
   set dns host schedule 06:28 interval 8
   set address "Trust" "12.63.231.147/32 <http://12.63.231.147/32>"
   12.63.231.147 255.255.255.255
   set address "Trust" "12.63.231.150/32 <http://12.63.231.150/32>"
   12.63.231.150 255.255.255.255
   set address "Trust" "192.168.0.0/16 <http://192.168.0.0/16>"
   192.168.0.0 255.255.0.0
   set address "Trust" "192.168.180.0/24 <http://192.168.180.0/24>"
   192.168.180.0 255.255.255.0
   set address "Trust" "192.168.180.10" 192.168.180.10 255.255.255.255
   set address "Trust" "192.168.180.150/32
   <http://192.168.180.150/32>" 192.168.180.150 255.255.255.255
   set address "Trust" "192.168.180.163/32
   <http://192.168.180.163/32>" 192.168.180.163 255.255.255.255
   set address "Trust" "192.168.180.208/32
   <http://192.168.180.208/32>" 192.168.180.208 255.255.255.255
   set address "Trust" "192.168.180.6" 192.168.180.6 255.255.255.255
   "PDC"
   set address "Trust" "192.168.180.98/32 <http://192.168.180.98/32>"
   192.168.180.98 255.255.255.255
   set address "Trust" "192.168.180.99/32 <http://192.168.180.99/32>"
   192.168.180.99 255.255.255.255
   set address "Trust" "192.168.184.0" 192.168.184.0 255.255.255.0
   set address "Trust" "192.168.186.0/24 <http://192.168.186.0/24>"
   192.168.186.0 255.255.255.0
   set address "Trust" "192.168.188.0/24 <http://192.168.188.0/24>"
   192.168.188.0 255.255.255.0
   set address "Trust" "Chicago" 192.168.180.0 255.255.255.0
   set address "Trust" "Dallas" 192.168.182.0 255.255.255.0
set address "Trust" "Dominican Republic" 192.168.183.0 255.255.255.0
   set address "Trust" "InternalDMZ" 12.106.237.89 255.255.255.248
   set address "Trust" "Los_Angeles" 192.168.185.0 255.255.255.0
   set address "Trust" "MailServer2" 192.168.181.8 255.255.255.255
   set address "Trust" "MailServer3" 192.168.184.11 255.255.255.255
set address "Trust" "Mexico Vendor 2" 192.168.184.124 255.255.255.255 set address "Trust" "Mexico Vendor1" 192.168.184.115 255.255.255.255
   set address "Trust" "Mexico_internal" 192.168.186.0 255.255.255.0
   set address "Trust" "New_York" 192.168.187.0 255.255.255.0
   set address "Trust" "newmail-192.168.180.206" 192.168.180.206
   255.255.255.255
   set address "Trust" "newmail-192.168.180.207" 192.168.180.207
   255.255.255.255
   set address "Trust" "newmail-192.168.180.208" 192.168.180.208
   255.255.255.255
   set address "Trust" "North_Carolina" 192.168.181.0 255.255.255.0
   set address "Trust" "Server05" 192.168.180.8 255.255.255.255
   set address "Trust" "Server07" 192.168.180.5 255.255.255.255 "PDC"
   set address "Trust" "Server09" 192.168.180.3 255.255.255.255
   set address "Trust" "Server10" 192.168.180.1 255.255.255.255
   set address "Trust" "TolucaMX" 192.168.184.0 255.255.255.0
   set address "Trust" "Torreno_Mx" 192.168.186.0 255.255.255.0
   set address "Untrust" "10.0.0.0/24 <http://10.0.0.0/24>" 10.0.0.0
   255.255.255.0
   set address "Untrust" "10.0.0.0/8 <http://10.0.0.0/8>" 10.0.0.0
   255.0.0.0
   set address "Untrust" "12.106.237.89/29 <http://12.106.237.89/29>"
   12.106.237.89 255.255.255.248
   set address "Untrust" "12.208.94.0/24 <http://12.208.94.0/24>"
   12.208.94.0 255.255.255.0
   set address "Untrust" "192.168.0.0/16 <http://192.168.0.0/16>"
   192.168.0.0 255.255.0.0
   set address "Untrust" "192.168.0.0/24 <http://192.168.0.0/24>"
   192.168.0.0 255.255.255.0
   set address "Untrust" "192.168.121.0/24 <http://192.168.121.0/24>"
   192.168.121.0 255.255.255.0
   set address "Untrust" "192.168.180.0/24 <http://192.168.180.0/24>"
   192.168.180.0 255.255.255.0
   set address "Untrust" "192.168.183.0/24 <http://192.168.183.0/24>"
   192.168.183.0 255.255.255.0
   set address "Untrust" "192.168.186.0/24 <http://192.168.186.0/24>"
   192.168.186.0 255.255.255.0
   set address "Untrust" "192.168.188.0/24 <http://192.168.188.0/24>"
   192.168.188.0 255.255.255.0
   set address "Untrust" "192.168.190.0/24 <http://192.168.190.0/24>"
   192.168.190.0 255.255.255.0
   set address "Untrust" "192.168.191.0/24 <http://192.168.191.0/24>"
   192.168.191.0 255.255.255.0
   set address "Untrust" "192.168.20.0/24 <http://192.168.20.0/24>"
   192.168.20.0 255.255.255.0
   set address "Untrust" "200.12.52.113/32 <http://200.12.52.113/32>"
   200.12.52.113 255.255.255.255
   set address "Untrust" "216.184.126.113" 216.184.126.113
   255.255.255.255
   set address "Untrust" "64.74.172.210/32 <http://64.74.172.210/32>"
   64.74.172.210 255.255.255.255
   set address "Untrust" "66.29.23.0/24 <http://66.29.23.0/24>"
   66.29.23.0 255.255.255.0
   set address "Untrust" "69.27.238.0/24 <http://69.27.238.0/24>"
   69.27.238.0 255.255.255.0
   set address "Untrust" "Cali" 192.168.121.0 255.255.255.0
   set address "Untrust" "Defkon_NSM" 205.234.155.199 255.255.255.255
   set address "Untrust" "Defkon_RKON" 205.234.155.0 255.255.255.0
   set address "Untrust" "Guatemala" 192.168.188.0 255.255.255.0
   set address "Untrust" "HongKong" 192.168.1.0 255.255.255.0
   "Interior office range"
   set address "Untrust" "ISA-1-12.63.231.148" 12.63.231.148
   255.255.255.255
   set address "Untrust" "ISA-2-12.63.231.149" 12.63.231.149
   255.255.255.255
   set address "Untrust" "Katharion_SPAM_1" 64.74.172.0 255.255.255.0
   set address "Untrust" "Katharion_SPAM_2" 64.74.173.0 255.255.255.0
   set address "Untrust" "Katharion_SPAM_3" 207.154.50.9 255.255.255.0
   set address "Untrust" "Katharion_SPAM_4" 208.70.88.0 255.255.255.0
   set address "Untrust" "Katharion_SPAM_5" 208.70.89.0 255.255.255.0
   set address "Untrust" "Katharion_SPAM_6" 208.70.90.0 255.255.255.0
   set address "Untrust" "Katharion_SPAM_7" 208.70.91.0 255.255.255.0
set address "Untrust" "Katharion_SPAM_NEW1" 174.36.154.0 255.255.255.0 set address "Untrust" "Katharion_SPAM_NEW2" 208.43.37.0 255.255.255.0
   set address "Untrust" "Mexico_internal" 192.168.186.0 255.255.255.0
   set address "Untrust" "Mexico_Vendor_VPN" 12.26.200.0 255.255.255.0
   set address "Untrust" "Singapore" 192.168.190.0 255.255.255.0
   "Interior office range"
   set address "Untrust" "Texas" 192.168.182.0 255.255.255.0
   set address "Untrust" "TriActive" 66.45.78.1 255.255.255.0
   set address "Global" "200.57.157.65/32 <http://200.57.157.65/32>"
   200.57.157.65 255.255.255.255
   set address "DMZ" "10.1.1.0/24 <http://10.1.1.0/24>" 10.1.1.0
   255.255.255.0
   set address "DMZ" "12.63.231.148/32 <http://12.63.231.148/32>"
   12.63.231.148 255.255.255.255
   set address "DMZ" "12.63.231.149/32 <http://12.63.231.149/32>"
   12.63.231.149 255.255.255.255
   set address "DMZ" "192.168.3.10/32 <http://192.168.3.10/32>"
   192.168.3.10 255.255.255.255
   set address "DMZ" "AT&TConcentrator" 12.106.237.94 255.255.255.255
   set address "DMZ" "Cisco VPN" 12.106.237.90 255.255.255.255
   set address "DMZ" "DMZ" 12.106.237.89 255.255.255.248
   set address "DMZ" "Guatemala VPN" 12.106.237.92 255.255.255.255
   set address "DMZ" "ISA-private" 192.168.3.10 255.255.255.255
   set address "DMZ" "Juniper-IDP" 12.106.237.91 255.255.255.255
   set address "DMZ" "Juniper-SSL" 12.106.237.92 255.255.255.255
   set address "DMZ" "OWA" 12.106.237.93 255.255.255.255
   set group address "Trust" "Internal Servers"
   set group address "Trust" "Internal Servers" add "192.168.180.6"
   set group address "Trust" "Internal Servers" add "Server05"
   set group address "Trust" "Internal Servers" add "Server07"
   set group address "Trust" "Internal Servers" add "Server09"
   set group address "Trust" "Internal Servers" add "Server10"
   set group address "Trust" "Mexico Vendor"
   set group address "Trust" "Mexico Vendor" add "Mexico Vendor 2"
   set group address "Trust" "Mexico Vendor" add "Mexico Vendor1"
   set group address "Trust" "QST_Global"
   set group address "Trust" "QST_Global" add "Chicago"
   set group address "Trust" "QST_Global" add "Dallas"
   set group address "Trust" "QST_Global" add "Dominican Republic"
   set group address "Trust" "QST_Global" add "Los_Angeles"
   set group address "Trust" "QST_Global" add "New_York"
   set group address "Trust" "QST_Global" add "North_Carolina"
   set group address "Trust" "QST_Global" add "TolucaMX"
   set group address "Trust" "QST_Global" add "Torreno_Mx"
   set group service "rbza_Requirements"
   set group service "rbza_Requirements" add "FTP"
   set group service "rbza_Requirements" add "HTTP"
   set group service "rbza_Requirements" add "HTTPS"
   set group service "rbza_Requirements" add "ICMP-ANY"
   set group service "rbza_Requirements" add "SSH"
   set group service "rbza_Requirements" add "TELNET"
   set group service "rbza_Requirements" add "Terminal_Srvc"
   set ike gateway "To_Guatemala" address 209.161.118.113 Main
   outgoing-interface "ethernet0/2" preshare
   "YFpv1oMqXfKeCnyCxbe3neNbtT4g==" proposal "pre-g2-3des-sha"
   set ike gateway "To_Singapore" address 203.125.41.238 Main
   outgoing-interface "ethernet0/2" preshare
   "Byr0lsK2NFIXCDHUZMnAn0YnpSvQ==" proposal "pre-g2-3des-sha"
   set ike gateway "To_Hong_Kong" address 210.177.75.29 Main
   outgoing-interface "ethernet0/2" preshare
   "sP2QFLPyNXMMCGhYVAHRn19dnfQg==" proposal "pre-g2-3des-sha"
   set ike gateway "To_Cali" address 205.159.31.253 Main
   outgoing-interface "ethernet0/2" preshare
   "HaC5RtnENOXE6CX/qUNiHnvuelgzA==" proposal "pre-g2-3des-sha"
   set ike gateway "To_Texas" address 68.165.74.138 Main
   outgoing-interface "ethernet0/2" preshare
   "UnCKD/bWNFXCL1rKADGnWi2f+sg==" proposal "pre-g2-3des-sha"
   set ike gateway "To_Mexico" address 201.101.8.250 Main
   outgoing-interface "ethernet0/2" preshare
   "UNij3gU+NeU+XYnheYJSnWOANkRQ==" sec-level compatible
   set ike gateway "Gateway for 10.0.0.0/24 <http://10.0.0.0/24>"
   address 196.3.88.102 Main outgoing-interface "ethernet0/2"
   preshare "Vxy5XbssXV1CC5mQdwBnQJyLJVg==" proposal "pre-g2-3des-md5"
   set ike gateway "Gateway for LA" address 67.110.248.194 Main
   outgoing-interface "ethernet0/2" preshare
   "0smtBN/UNpXIQtKdntAYGiAA==" proposal "pre-g2-3des-md5"
   set ike gateway "To_Torreon" address 201.117.236.9 Main local-id
   "192.168.0.0" outgoing-interface "ethernet0/2" preshare
   "acqpXbXC9ymdI9sn4g4MNbg==" proposal "pre-g2-3des-md5"
   set ike gateway "To_Morracco" address 81.192.101.145 Main local-id
   "192.168.0.0" outgoing-interface "ethernet0/2" preshare
   "JtS3S9Xk8svPkCP9ZgWTUnb9IxPOw==" proposal "pre-g2-3des-md5"
   set ike gateway "To_UK" address 81.137.215.196 Main
   outgoing-interface "ethernet0/2" preshare
   "F+YIj2vANCrJWUsbSXCZuXnm1ZFwew==" sec-level compatible
   set ike respond-bad-spi 1
   set ike soft-lifetime-buffer 30
   unset ike ikeid-enumeration
   unset ike dos-protection
   unset ipsec access-session enable
   set ipsec access-session maximum 5000
   set ipsec access-session upper-threshold 0
   set ipsec access-session lower-threshold 0
   set ipsec access-session dead-p2-sa-timeout 0
   unset ipsec access-session log-error
   unset ipsec access-session info-exch-connected
   unset ipsec access-session use-error-log
   set vpn "To_Guatemala" gateway "To_Guatemala" no-replay tunnel
   idletime 0 sec-level compatible
   set vpn "To_Guatemala" monitor
   set vpn "To_Singapore" gateway "To_Singapore" no-replay tunnel
   idletime 0 sec-level compatible
   set vpn "To_Hong_Kong" gateway "To_Hong_Kong" no-replay tunnel
   idletime 0 sec-level compatible
   set vpn "To_Hong_Kong" id 45 bind interface tunnel.1
   set vpn "To_Cali" gateway "To_Cali" no-replay tunnel idletime 0
   sec-level compatible
   set vpn "To_Texas" gateway "To_Texas" no-replay tunnel idletime 0
   sec-level compatible
   set vpn "To_Mexico" gateway "To_Mexico" replay tunnel idletime 0
   sec-level standard
   set vpn "To_Mexico" monitor
   set vpn "Gateway for LA" gateway "Gateway for LA" no-replay tunnel
   idletime 0 proposal "nopfs-esp-3des-md5"
   set vpn "To_Torreon" gateway "To_Torreon" replay tunnel idletime 0
   proposal "nopfs-esp-3des-md5"
   set vpn "To_Morracco" gateway "To_Morracco" replay tunnel idletime
   0 proposal "nopfs-esp-3des-md5"
   set vpn "To_UK" gateway "To_UK" no-replay tunnel idletime 0
   sec-level compatible
   set vpn "To_UK" monitor rekey
   set vpn "To_UK" id 61 bind interface tunnel.3
   set vpn "VPN for 10.0.0.0/24 <http://10.0.0.0/24>" gateway
   "Gateway for 10.0.0.0/24 <http://10.0.0.0/24>" no-replay tunnel
   idletime 0 proposal "nopfs-esp-3des-md5"
   set vrouter "untrust-vr"
   exit
   set vrouter "trust-vr"
   exit
   set di service HTTP content_type_length 8192
   set di service HTTP user_agent_length 8192
   set di service HTTP host_length 8192
   set di service HTTP failed_logins 50
   set di service HTTP brute_search 100
   set url protocol type scfp
   set url protocol scfp
   set config enable
   set server 192.168.180.20 62252 60
   set fail-mode permit
   set server src-interface ethernet0/0
   exit
   set vpn "To_Hong_Kong" proxy-id local-ip 0.0.0.0/0
   <http://0.0.0.0/0> remote-ip 0.0.0.0/0 <http://0.0.0.0/0> "ANY"
   set vpn "Gateway for LA" proxy-id local-ip 192.168.0.0/16
   <http://192.168.0.0/16> remote-ip 192.168.0.0/24
   <http://192.168.0.0/24> "ANY"
   set vpn "To_Torreon" proxy-id local-ip 192.168.0.0/16
   <http://192.168.0.0/16> remote-ip 192.168.186.0/24
   <http://192.168.186.0/24> "ANY"
   set vpn "To_Morracco" proxy-id local-ip 192.168.0.0/16
   <http://192.168.0.0/16> remote-ip 192.168.191.0/24
   <http://192.168.191.0/24> "ANY"
   set vpn "VPN for 10.0.0.0/24 <http://10.0.0.0/24>" proxy-id
   local-ip 192.168.0.0/16 <http://192.168.0.0/16> remote-ip
   192.168.183.0/24 <http://192.168.183.0/24> "ANY"
   set policy id 106 from "Trust" to "Untrust"
    "newmail-192.168.180.206" "10.0.0.0/8 <http://10.0.0.0/8>" "ANY"
   permit log
   set policy id 106
   set src-address "newmail-192.168.180.207"
   set src-address "newmail-192.168.180.208"
   set dst-address "192.168.0.0/16 <http://192.168.0.0/16>"
   exit
   set policy id 105 from "Trust" to "Untrust"
    "newmail-192.168.180.206" "Any" "ANY" nat src dip-id 4 permit log
   set policy id 105
   set src-address "newmail-192.168.180.207"
   set src-address "newmail-192.168.180.208"
   exit
   set policy id 104 from "Untrust" to "DMZ"  "Any"
   "MIP(12.63.231.149)" "HTTP" permit log
   set policy id 104
   set service "PING"
   exit
   set policy id 103 from "Untrust" to "DMZ"  "Any"
   "MIP(12.63.231.148)" "HTTP" permit log
   set policy id 103
   set service "HTTPS"
   set service "PING"
   exit
   set policy id 102 from "DMZ" to "Trust"  "192.168.3.10/32
   <http://192.168.3.10/32>" "192.168.180.208/32
   <http://192.168.180.208/32>" "HTTPS" permit log
   set policy id 102
   exit
   set policy id 101 from "DMZ" to "Trust"  "192.168.3.10/32
   <http://192.168.3.10/32>" "192.168.180.10" "DNS" permit log
   set policy id 101
   set dst-address "192.168.180.6"
   set service "LDAP"
   exit
   set policy id 99 from "Untrust" to "Trust"  "192.168.183.0/24
   <http://192.168.183.0/24>" "192.168.0.0/16
   <http://192.168.0.0/16>" "ANY" tunnel vpn "VPN for 10.0.0.0/24
   <http://10.0.0.0/24>" id 62 pair-policy 98 log
   set policy id 99
   exit
   set policy id 107 from "Untrust" to "Trust"  "Katharion_SPAM_1"
   "12.63.231.150/32 <http://12.63.231.150/32>" "ICMP-ANY" nat dst ip
   192.168.180.208 permit log
   set policy id 107
   set src-address "Katharion_SPAM_2"
   set src-address "Katharion_SPAM_3"
   set src-address "Katharion_SPAM_4"
   set src-address "Katharion_SPAM_5"
   set src-address "Katharion_SPAM_6"
   set src-address "Katharion_SPAM_7"
   set src-address "Katharion_SPAM_NEW1"
   set src-address "Katharion_SPAM_NEW2"
   set service "SMTP"
   exit
   set policy id 98 from "Trust" to "Untrust"  "192.168.0.0/16
   <http://192.168.0.0/16>" "192.168.183.0/24
   <http://192.168.183.0/24>" "ANY" tunnel vpn "VPN for 10.0.0.0/24
   <http://10.0.0.0/24>" id 62 pair-policy 99 log
   set policy id 98
   exit
   set policy id 97 from "Untrust" to "Trust"  "Any" "Any" "NTP"
   permit log
   set policy id 97
   exit
   set policy id 96 from "Trust" to "Untrust"  "Any" "Any" "NTP"
   permit log
   set policy id 96
   exit
   set policy id 95 from "Untrust" to "Trust"  "192.168.20.0/24
   <http://192.168.20.0/24>" "192.168.0.0/16 <http://192.168.0.0/16>"
   "ANY" permit log
   set policy id 95
   exit
   set policy id 94 from "Trust" to "Untrust"  "192.168.0.0/16
   <http://192.168.0.0/16>" "192.168.20.0/24
   <http://192.168.20.0/24>" "ANY" permit log
   set policy id 94
   exit
   set policy id 93 from "Untrust" to "Trust"  "192.168.191.0/24
   <http://192.168.191.0/24>" "192.168.0.0/16
   <http://192.168.0.0/16>" "ANY" tunnel vpn "To_Morracco" id 60
   pair-policy 92 log
   set policy id 93
   exit
   set policy id 92 from "Trust" to "Untrust"  "192.168.0.0/16
   <http://192.168.0.0/16>" "192.168.191.0/24
   <http://192.168.191.0/24>" "ANY" tunnel vpn "To_Morracco" id 60
   pair-policy 93 log
   set policy id 92
   exit
   set policy id 90 from "Trust" to "Untrust"  "192.168.0.0/16
   <http://192.168.0.0/16>" "192.168.186.0/24
   <http://192.168.186.0/24>" "ANY" tunnel vpn "To_Torreon" id 59
   pair-policy 91 log
   set policy id 90
   exit
   set policy id 88 from "Trust" to "Untrust"  "192.168.0.0/16
   <http://192.168.0.0/16>" "192.168.0.0/24 <http://192.168.0.0/24>"
   "ANY" tunnel vpn "Gateway for LA" id 57 pair-policy 89 log
   set policy id 88
   exit
   set policy id 84 name "Filter SPAM In - LDAP Requests" from
   "Untrust" to "Trust"  "Defkon_RKON" "MIP(12.63.231.147)"
   "ICMP-ANY" permit log
   set policy id 84
   set src-address "Katharion_SPAM_1"
   set src-address "Katharion_SPAM_2"
   set src-address "Katharion_SPAM_3"
   set src-address "Katharion_SPAM_4"
   set src-address "Katharion_SPAM_5"
   set src-address "Katharion_SPAM_6"
   set src-address "Katharion_SPAM_7"
   set src-address "Katharion_SPAM_NEW1"
   set src-address "Katharion_SPAM_NEW2"
   set service "LDAP"
   exit
   set policy id 83 from "Trust" to "Untrust"  "192.168.180.0/24
   <http://192.168.180.0/24>" "Mexico_internal" "rbza_Requirements"
   tunnel vpn "To_Mexico" id 50 pair-policy 81 log
   set policy id 83
   exit
   set policy id 80 from "Trust" to "Untrust"  "Any"
   "192.168.180.0/24 <http://192.168.180.0/24>" "rbza_Requirements"
   permit log
   set policy id 80
   exit
   set policy id 79 from "Untrust" to "Trust"  "Texas" "Chicago"
   "ANY" tunnel vpn "To_Texas" id 49 pair-policy 78 log
   set policy id 79
   exit
   set policy id 78 from "Trust" to "Untrust"  "Chicago" "Texas"
   "ANY" tunnel vpn "To_Texas" id 49 pair-policy 79 log
   set policy id 78
   exit
   set policy id 77 from "Untrust" to "DMZ"  "HongKong" "OWA" "ANY"
   permit log
   set policy id 77
   exit
   set policy id 76 from "DMZ" to "Untrust"  "OWA" "HongKong" "ANY"
   permit log
   set policy id 76
   exit
   set policy id 75 from "Untrust" to "Trust"  "HongKong"
   "QST_Global" "ANY" permit log
   set policy id 75
   exit
   set policy id 74 from "Trust" to "Untrust"  "QST_Global"
   "HongKong" "ANY" permit log
   set policy id 74
   exit
   set policy id 73 from "Untrust" to "Trust"  "Cali" "Chicago"
   "rbza_Requirements" tunnel vpn "To_Cali" id 43 pair-policy 72 log
   set policy id 73
   exit
   set policy id 72 from "Trust" to "Untrust"  "Chicago" "Cali"
   "rbza_Requirements" tunnel vpn "To_Cali" id 43 pair-policy 73 log
   set policy id 72
   exit
   set policy id 71 from "DMZ" to "Untrust"  "AT&TConcentrator" "Any"
   "ANY" permit log
   set policy id 71
   exit
   set policy id 66 name "To_Singapore" from "Trust" to "Untrust"
    "Chicago" "Singapore" "ANY" tunnel vpn "To_Singapore" id 27
   pair-policy 65
   set policy id 66
   exit
   set policy id 65 name "To_Singapore" from "Untrust" to "Trust"
    "Singapore" "Chicago" "ANY" tunnel vpn "To_Singapore" id 27
   pair-policy 66
   set policy id 65
   exit
   set policy id 48 name "Guatemala" from "Untrust" to "Trust"
    "Guatemala" "Chicago" "ANY" tunnel vpn "To_Guatemala" id 12
   pair-policy 49 log no-session-backup
   set policy id 48
   exit
   set policy id 49 name "Guatemala" from "Trust" to "Untrust"
    "Chicago" "Guatemala" "ANY" tunnel vpn "To_Guatemala" id 12
   pair-policy 48 log no-session-backup
   set policy id 49
   exit
   set policy id 61 name "Test Message" from "Trust" to "Global"
"Any" "200.57.157.65/32 <http://200.57.157.65/32>" "ANY" permit log
   set policy id 61
   exit
   set policy id 51 from "Untrust" to "DMZ"  "Any" "AT&TConcentrator"
   "ANY" permit log
   set policy id 51
   exit
   set policy id 50 from "Untrust" to "Trust"  "69.27.238.0/24
   <http://69.27.238.0/24>" "MIP(12.106.250.5)" "MAIL" permit log
   set policy id 50
   set src-address "Katharion_SPAM_1"
   set src-address "Katharion_SPAM_2"
   set src-address "Katharion_SPAM_3"
   set src-address "Katharion_SPAM_4"
   set src-address "Katharion_SPAM_5"
   set src-address "Katharion_SPAM_6"
   set src-address "Katharion_SPAM_7"
   set src-address "Katharion_SPAM_NEW1"
   set src-address "Katharion_SPAM_NEW2"
   exit
   set policy id 40 name "CiscoVPN" from "Trust" to "DMZ"  "Any"
   "Cisco VPN" "ANY" permit
   set policy id 40
   exit
   set policy id 39 name "Surf Control" from "Untrust" to "Trust"
    "Any" "MIP(12.106.250.6)" "ICMP-ANY" permit
   set policy id 39 disable
   set policy id 39
   set service "Terminal_Srvc"
   exit
   set policy id 29 from "Trust" to "Untrust"  "Any"
   "192.168.121.0/24 <http://192.168.121.0/24>" "ANY" permit
   set policy id 29
   set dst-address "192.168.188.0/24 <http://192.168.188.0/24>"
   set dst-address "192.168.190.0/24 <http://192.168.190.0/24>"
   set dst-address "Mexico_internal"
   exit
   set policy id 2 from "Trust" to "Untrust"  "Internal Servers"
   "Any" "FTP" nat src permit
   set policy id 2
   set service "HTTP"
   set service "HTTPS"
   exit
   set policy id 27 from "Trust" to "Untrust"  "Any" "Any" "FTP" nat
   src permit log url-filter
   set policy id 27
   set service "HTTP"
   set service "HTTPS"
   set service "ICMP-ANY"
   set service "Mexico_software"
   set service "TELNET"
   exit
   set policy id 38 name "MexicanGov" from "Trust" to "Global"  "Any"
   "Any" "MexicanGov" permit log
   set policy id 38
   set service "Mexico_software"
   exit
   set policy id 37 name "SNMP Allowed Out" from "DMZ" to "Untrust"
    "Juniper-SSL" "Any" "ANY" permit
   set policy id 37
   exit
   set policy id 36 name "Allow Juniper SSL Gateway" from "Untrust"
   to "DMZ"  "Any" "Juniper-SSL" "HTTP" permit
   set policy id 36
   set service "HTTPS"
   set service "ICMP-ANY"
   set service "RSA Services"
   set service "SNMP"
   exit
   set policy id 34 from "DMZ" to "Untrust"  "Any" "Any" "ANY" permit
   set policy id 34
   exit
   set policy id 70 from "DMZ" to "Trust"  "AT&TConcentrator" "Any"
   "ANY" permit log
   set policy id 70
   exit
   set policy id 33 name "IDPTest" from "DMZ" to "Trust"
    "Juniper-IDP" "Any" "ANY" permit
   set policy id 33
   exit
   set policy id 32 name "IDP Comms Out" from "DMZ" to "Untrust"
    "Juniper-IDP" "Any" "ANY" permit
   set policy id 32
   exit
   set policy id 31 name "Juniper Comm" from "Untrust" to "DMZ"
    "Defkon_NSM" "Juniper-IDP" "ANY" permit log
   set policy id 31
   exit
   set policy id 26 name "Acces to Checkpoint Server" from "Trust" to
   "Untrust"  "192.168.180.98/32 <http://192.168.180.98/32>" "Any"
   "TCP-18190" nat src permit
   set policy id 26
   exit
   set policy id 28 from "Untrust" to "Trust"  "192.168.121.0/24
   <http://192.168.121.0/24>" "Any" "ANY" permit
   set policy id 28
   set src-address "192.168.188.0/24 <http://192.168.188.0/24>"
   set src-address "192.168.190.0/24 <http://192.168.190.0/24>"
   set src-address "Mexico_internal"
   exit
   set policy id 18 name "OLD RULE 26" from "Trust" to "Untrust"
    "Any" "Any" "DNB" nat src permit log
   set policy id 18
   set service "DNS"
   set service "IM_Custom"
   set service "MAIL"
   set service "POP3"
   set service "SOCKS"
   set service "SSH"
   set service "TCP-1024-5000"
   set service "TCP-8100"
   exit
   set policy id 14 from "DMZ" to "Trust"  "10.1.1.0/24
   <http://10.1.1.0/24>" "Any" "ANY" permit
   set policy id 14
   set src-address "Cisco VPN"
   exit
   set policy id 13 from "Untrust" to "DMZ"  "Any" "Cisco VPN" "ANY"
   permit log
   set policy id 13
   exit
set policy id 12 from "Trust" to "DMZ" "Any" "OWA" "ANY" permit log
   set policy id 12
   exit
set policy id 10 from "DMZ" to "Trust" "OWA" "Any" "ANY" permit log
   set policy id 10
   exit
   set policy id 8 from "Untrust" to "DMZ"  "Any" "OWA" "HTTPS"
   permit log
   set policy id 8
   exit
   set policy id 3 from "Trust" to "Untrust"  "Any" "Any" "ANY" deny
   set policy id 3
   exit
   set policy id 4 from "Trust" to "DMZ"  "Any" "Any" "ANY" permit log
   set policy id 4
   exit
   set policy id 5 from "Untrust" to "DMZ"  "Any" "Any" "ANY" deny
   set policy id 5
   exit
   set policy id 7 from "DMZ" to "Trust"  "Any" "Any" "ANY" permit log
   set policy id 7
   exit
   set policy id 16 from "DMZ" to "Untrust"  "Guatemala VPN"
   "200.12.52.113/32 <http://200.12.52.113/32>" "IPSEC" permit
   set policy id 16
   set service "TELNET"
   exit
   set policy id 20 from "DMZ" to "Untrust"  "Guatemala VPN"
   "216.184.126.113" "IPSEC" permit
   set policy id 20
   exit
   set policy id 17 from "DMZ" to "Untrust"  "Any" "Any" "ANY" deny
   set policy id 17
   exit
set policy id 21 from "Trust" to "Global" "Any" "Any" "TCP-82" permit
   set policy id 21
   exit
   set policy id 24 from "Trust" to "Global"  "Any" "Any" "TCP-264"
   permit
   set policy id 24
   set service "UDP-2746"
   set service "UDP-500"
   exit
   set policy id 81 name "To_Mexico" from "Untrust" to "Trust"
    "Mexico_internal" "192.168.180.0/24 <http://192.168.180.0/24>"
   "rbza_Requirements" tunnel vpn "To_Mexico" id 50 pair-policy 83 log
   set policy id 81
   exit
   set policy id 82 from "Untrust" to "Trust"  "Any" "Any" "ANY" deny
   set policy id 82
   exit
   set policy id 89 from "Untrust" to "Trust"  "192.168.0.0/24
   <http://192.168.0.0/24>" "192.168.0.0/16 <http://192.168.0.0/16>"
   "ANY" tunnel vpn "Gateway for LA" id 57 pair-policy 88 log
   set policy id 89
   exit
   set policy id 91 from "Untrust" to "Trust"  "192.168.186.0/24
   <http://192.168.186.0/24>" "192.168.0.0/16
   <http://192.168.0.0/16>" "ANY" tunnel vpn "To_Torreon" id 59
   pair-policy 90 log
   set policy id 91
   exit
   set syslog config "205.234.155.251"
   set syslog config "205.234.155.251" facilities local0 local0
   set syslog src-interface ethernet0/2
   set syslog enable
   set nsmgmt bulkcli reboot-timeout 60
   set ssh version v2
   set ssh enable
   set scp enable
   set config lock timeout 5
   unset license-key auto-update
   set ntp server "1.pool.ntp.org <http://1.pool.ntp.org>"
   set ntp server src-interface "ethernet0/2"
   set ntp server backup1 "2.pool.ntp.org <http://2.pool.ntp.org>"
   set ntp server backup1 src-interface "ethernet0/2"
   set ntp server backup2 "0.pool.ntp.org <http://0.pool.ntp.org>"
   set ntp server backup2 src-interface "ethernet0/2"
   set ntp max-adjustment 60
set snmp community "rkOnmssp" Read-Write Trap-on traffic version v2c set snmp community "rkOnm$$p" Read-Write Trap-on traffic version v2c
   set snmp host "rkOnm$$p" XXXXXX 255.255.255.0
   set snmp host "rkOnmssp" XXXXXXX 255.255.255.255 src-interface
   ethernet0/2 trap v2
   set snmp location "Chicago HQ"
   set snmp contact "supp...@rkon.com <mailto:supp...@rkon.com>"
   set snmp name "QST-Chi-Firewall"
   set snmp port listen 161
   set snmp port trap 162
   set vrouter "untrust-vr"
   set route 192.168.1.0/24 <http://192.168.1.0/24> interface
   tunnel.1 preference 10
   exit
   set vrouter "trust-vr"
   unset add-default-route
   set route 0.0.0.0/0 <http://0.0.0.0/0> interface ethernet0/2
   gateway 12.63.231.145 preference 20
   set route 192.168.181.0/24 <http://192.168.181.0/24> interface
   ethernet0/0 gateway 192.168.180.19 preference 10
   set route 192.168.184.0/24 <http://192.168.184.0/24> interface
   ethernet0/0 gateway 192.168.180.19 preference 10 permanent
   set route 192.168.185.0/24 <http://192.168.185.0/24> interface
   ethernet0/0 gateway 192.168.180.19 preference 10
   set route 192.168.187.0/24 <http://192.168.187.0/24> interface
   ethernet0/0 gateway 192.168.180.19 preference 10
   set route 10.1.1.0/24 <http://10.1.1.0/24> interface ethernet0/0
   gateway 192.168.180.231 preference 10 permanent
   set route 192.168.1.0/24 <http://192.168.1.0/24> interface
   tunnel.1 preference 10
   set route 192.168.20.0/24 <http://192.168.20.0/24> interface
   tunnel.3 preference 20 permanent
   set route 12.63.231.150/32 <http://12.63.231.150/32> interface
   ethernet0/0 preference 20
   exit
   set vrouter "untrust-vr"
   exit
   set vrouter "trust-vr"
   exit

   _______________________________________________
   juniper-nsp mailing list juniper-nsp@puck.nether.net
   <mailto:juniper-nsp@puck.nether.net>
   https://puck.nether.net/mailman/listinfo/juniper-nsp


------------------------------------------------------------------------


No virus found in this incoming message.
Checked by AVG - www.avg.com Version: 8.0.237 / Virus Database: 270.11.10/1995 - Release Date: 03/11/09 08:28:00


I di see the WAn interface is showing 100/half and the upstream device is locked at 100/full....

That will be the first thing I change tomorrow AM......

--chris
_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

_______________________________________________
juniper-nsp mailing list juniper-nsp@puck.nether.net
https://puck.nether.net/mailman/listinfo/juniper-nsp

Reply via email to