11. Configure the default route.[edit]admin@# set routing-options static route 0.0.0.0/0 next-hop gateway12. Configure basic security zones and bind them to traffic interfaces.[edit]admin@# set security zones security-zone untrust interfaces ge-0/0/113. Configure basic security policies.[edit]admin@# set security policies from-zone trust to-zone untrust policy policy-namematch source-address any destination-address any application anyroot@# set security policies from-zone trust to-zone untrust policy policy-name thenpermit14. Create a NAT rule for source translation of all Internet bound traffic.[edit]admin@# set security nat source rule-set interface-nat from zone trustadmin@# set security nat source rule-set interface-nat to zone untrustadmin@# set security nat source rule-set interface-nat rule rule1 matchsource-address 0.0.0.0/0 destination-address 0.0.0.0/0admin@# set security nat source rule-set interface-nat rule rule1 then source-natinterface15. Check the configuration for validity.[edit]admin@# commit checkconfiguration check succeeds16. Commit the configuration to activate it on the device.[edit]admin@# commitcommit complete17. Optionally, display the configuration to verify that it is correct.[edit]user@host# showsystem {host-name devicea;domain-name lab.device.net;domain-search [ lab.device.net device.net ];backup-device 192.168.2.44;time-zone America/Los_Angeles;root-authentication {ssh-rsa "ssh-rsa AAAAB3Nza...D9Y2gXF9ac==root@devicea.lab.device.net";}name-server {10.148.2.32;}services {}ntp {server 10.148.2.21;}95Chapter 16: Performing Initial Software Configuration on the J-SRX210 Services Gateway