SRX-100 at our remote site.
When I try to HTTPS://192.168.203.1, I get the following error:
Access Error: 401 -- Unauthorized
Interface is not authorized for HTTP access
I am at the corporate office. We have the st0 up, and I can ssh.
set version 12.1X44-D35.5 set system host-name vpnloaner03 set system domain-name mass.com set system time-zone EST set system root-authentication encrypted-password "" set system name-server 10.10.10.10 set system name-server 10.20.10.10 set system name-server 208.67.222.222 set system name-server 208.67.220.220 set system name-resolution no-resolve-on-input set system login user admin full-name Administrator set system login user admin uid 2000 set system login user admin class super-user set system login user admin authentication encrypted-password "" set system services ssh max-sessions-per-connection 32 set system services telnet set system services netconf ssh set system services web-management http interface vlan.1 set system services web-management https system-generated-certificate set system services web-management https interface vlan.1 set system services web-management https interface fe-0/0/0.0 set system services web-management session idle-timeout 60 set system services dhcp option 161 string wyse.mass.com set system services dhcp option 186 string wyse.mass.com set system services dhcp pool 192.168.203.0/24 address-range low 192.168.203.50 set system services dhcp pool 192.168.203.0/24 address-range high 192.168.203.249 set system services dhcp pool 192.168.203.0/24 router 192.168.203.1 set system services dhcp propagate-settings fe-0/0/0 set system syslog archive size 100k set system syslog archive files 3 set system syslog user * any emergency set system syslog file messages any critical set system syslog file messages authorization info set system syslog file interactive-commands interactive-commands error set system syslog file default-log-messages any info set system syslog file default-log-messages match "(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES|(AIS_DATA_AVAILABLE)" set system syslog file default-log-messages structured-data set system max-configurations-on-flash 5 set system max-configuration-rollbacks 5 set system license autoupdate url https://ae1.juniper.net/junos/key_retrieval set system ntp server us.ntp.pool.org set interfaces fe-0/0/0 unit 0 family inet dhcp set interfaces fe-0/0/1 unit 0 family ethernet-switching vlan members vlan1 set interfaces fe-0/0/2 unit 0 family ethernet-switching vlan members vlan1 set interfaces fe-0/0/3 unit 0 family ethernet-switching vlan members vlan1 set interfaces fe-0/0/4 unit 0 family ethernet-switching vlan members vlan1 set interfaces fe-0/0/5 unit 0 family ethernet-switching vlan members vlan1 set interfaces fe-0/0/6 unit 0 family ethernet-switching vlan members vlan1 set interfaces fe-0/0/7 unit 0 family ethernet-switching vlan members vlan1 set interfaces st0 unit 0 family inet address 192.168.200.203/24 set interfaces vlan unit 1 family inet address 192.168.203.1/24 set snmp trap-group space targets 10.10.9.6 set routing-options static route 192.168.200.0/24 next-hop st0.0 set routing-options static route 10.0.0.0/8 next-hop st0.0 set routing-options static route 10.10.13.30/32 next-hop st0.0 set protocols stp set security ike policy ike_pol_vpnloaner03 mode aggressive set security ike policy ike_pol_vpnloaner03 proposal-set standard set security ike policy ike_pol_vpnloaner03 pre-shared-key ascii-text "$9$5QnCtpBESe0BclKWdVqmPfFn/Ct1Ec" set security ike gateway gw_vpnloaner03 ike-policy ike_pol_vpnloaner03 set security ike gateway gw_vpnloaner03 address 75.112.50.226 set security ike gateway gw_vpnloaner03 local-identity hostname vpnloaner03 set security ike gateway gw_vpnloaner03 external-interface fe-0/0/0.0 set security ipsec policy ipsec_pol_vpnloaner03 perfect-forward-secrecy keys group1 set security ipsec policy ipsec_pol_vpnloaner03 proposal-set standard set security ipsec vpn vpnloaner03 bind-interface st0.0 set security ipsec vpn vpnloaner03 ike gateway gw_vpnloaner03 set security ipsec vpn vpnloaner03 ike ipsec-policy ipsec_pol_vpnloaner03 set security ipsec vpn vpnloaner03 establish-tunnels immediately set security screen ids-option untrust-screen icmp ping-death set security screen ids-option untrust-screen ip source-route-option set security screen ids-option untrust-screen ip tear-drop set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024 set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200 set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024 set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048 set security screen ids-option untrust-screen tcp syn-flood timeout 20 set security screen ids-option untrust-screen tcp land set security nat source rule-set nsw_srcnat from zone Internal set security nat source rule-set nsw_srcnat to zone Internet set security nat source rule-set nsw_srcnat rule nsw-src-interface match source-address 0.0.0.0/0 set security nat source rule-set nsw_srcnat rule nsw-src-interface match destination-address 0.0.0.0/0 set security nat source rule-set nsw_srcnat rule nsw-src-interface then source-nat interface set security policies from-zone Internal to-zone Internet policy All_Internal_Internet match source-address any set security policies from-zone Internal to-zone Internet policy All_Internal_Internet match destination-address any set security policies from-zone Internal to-zone Internet policy All_Internal_Internet match application any set security policies from-zone Internal to-zone Internet policy All_Internal_Internet then permit set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 match source-address addr_192_168_203_0_24 set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 match destination-address addr_192_168_200_0_24 set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 match application any set security policies from-zone Internal to-zone Internet policy policy_out_vpnloaner03 then permit set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match source-address addr_10_0_0_0_8 set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match source-address addr_192_168_0_0_16 set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match destination-address addr_192_168_203_0_24 set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 match application any set security policies from-zone Internet to-zone Internal policy policy_in_vpnloaner03 then permit set security zones security-zone Internal address-book address addr_192_168_203_0_24 192.168.203.0/24 set security zones security-zone Internal host-inbound-traffic system-services all set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services ping set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services dhcp set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services http set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services https set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services ssh set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services telnet set security zones security-zone Internal interfaces vlan.1 host-inbound-traffic system-services snmp set security zones security-zone Internet address-book address addr_192_168_0_0_16 192.168.0.0/16 set security zones security-zone Internet address-book address addr_10_0_0_0_8 10.0.0.0/8 set security zones security-zone Internet address-book address addr_192_168_200_0_24 192.168.200.0/24 set security zones security-zone Internet host-inbound-traffic system-services ike set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ping set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services dhcp set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services https set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ssh set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ike set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services snmp set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services https set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services ping set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services ike set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services ssh set security zones security-zone Internet interfaces st0.0 host-inbound-traffic system-services snmp set vlans vlan1 vlan-id 3 set vlans vlan1 l3-interface vlan.1