0% found this document useful (0 votes)
12 views1 page

Initial Device Configurations

The document outlines the initial configuration steps for the vSRX1 device, including commands to delete default security policies and zones. It provides a command to verify the configuration and lists the expected output settings. The configuration includes system settings, user authentication, services, and interface addresses.

Uploaded by

rashmi m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views1 page

Initial Device Configurations

The document outlines the initial configuration steps for the vSRX1 device, including commands to delete default security policies and zones. It provides a command to verify the configuration and lists the expected output settings. The configuration includes system settings, user authentication, services, and interface addresses.

Uploaded by

rashmi m
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 1

Initial Device Configurations

**** vSRX1 ****

1) Login to the vSRX1 and type "edit"


2) This will put you into configuration mode, copy and paste the following
commands:

delete security policies from-zone trust to-zone trust policy default-permit


delete security policies from-zone trust to-zone untrust policy default-permit
delete security zones security-zone trust
delete security zones security-zone untrust

3) Type "commit and-quit"

4) Peform the following command and verify your output looks similar to the
configuration below "show configuration | display set"

5) You are now ready to follow along and start the lab!

jcluser@vSRX1> show configuration | display set


set version 21.1R3.11
set system host-name vSRX1
set system root-authentication encrypted-password
"$6$dSTbXxFy$KeCmFiHX6XSMkn3DX9GdrZY1Fb.iDnrGRpdJA9XWMvtaOKfvFe/n8yU2AMp8HJi5aj7ZVW
azmdt.bkc4rtTss1"
set system scripts language python
set system login user jcluser uid 2000
set system login user jcluser class super-user
set system login user jcluser authentication encrypted-password
"$6$iKgVA34A$AR62xbpriXxVbDQuT6DMOph1r069/ytRiJKThwdXK/Ol2U6k3knRxtPonzIHGmSzQUwdDg
mbzT7JM9Rnx7QRF."
set system services ssh root-login allow
set system services netconf ssh
set system services rest http port 3000
set system services web-management http interface fxp0.0
set system services web-management https system-generated-certificate
set system services web-management https interface fxp0.0
set system syslog user * any emergency
set system syslog file messages any any
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold
2048
set security screen ids-option untrust-screen tcp syn-flood queue-size 2000
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security policies
set interfaces ge-0/0/0 unit 0 family inet address 10.100.11.1/24
set interfaces ge-0/0/1 unit 0 family inet address 10.100.12.1/24
set interfaces ge-0/0/2 unit 0 family inet address 10.100.13.1/24
set interfaces fxp0 unit 0 family inet dhcp

You might also like