Here is a question were would I download another Pulse client
Ok here is the file.
root@Gtown-VPN02> file show new-sec-config
set security ike policy ike_policy_startup_rvpn mode aggressive
set security ike policy ike_policy_startup_rvpn proposal-set standard
set security ike policy ike_policy_startup_rvpn pre-shared-key ascii-text "$9$8gdLdsgoGDkPbsaUjkQz"
set security ike gateway gw_startup_rvpn ike-policy ike_policy_startup_rvpn
set security ike gateway gw_startup_rvpn dynamic hostname SRX-GW
set security ike gateway gw_startup_rvpn dynamic connections-limit 50
set security ike gateway gw_startup_rvpn dynamic ike-user-type group-ike-id
set security ike gateway gw_startup_rvpn external-interface fe-0/0/0.0
set security ike gateway gw_startup_rvpn xauth access-profile remote_access_profile
set security ipsec policy ipsec_pol_startup_rvpn perfect-forward-secrecy keys group2
set security ipsec policy ipsec_pol_startup_rvpn proposal-set standard
set security ipsec vpn startup_rvpn ike gateway gw_startup_rvpn
set security ipsec vpn startup_rvpn ike ipsec-policy ipsec_pol_startup_rvpn
set security dynamic-vpn access-profile remote_access_profile
set security dynamic-vpn clients startup_rvpn_group remote-protected-resources 192.168.0.0/24
set security dynamic-vpn clients startup_rvpn_group remote-exceptions 0.0.0.0/0
set security dynamic-vpn clients startup_rvpn_group ipsec-vpn startup_rvpn
set security dynamic-vpn clients startup_rvpn_group user rcarongt
set security dynamic-vpn clients all remote-protected-resources 10.0.0.0/24
set security dynamic-vpn clients all remote-exceptions 0.0.0.0/0
set security dynamic-vpn clients all ipsec-vpn startup_rvpn
set security dynamic-vpn clients all user rcarongt
set security flow traceoptions file flow-debug
set security flow traceoptions flag basic-datapath
set security screen ids-option untrust-screen icmp ping-death
set security screen ids-option untrust-screen ip source-route-option
set security screen ids-option untrust-screen ip tear-drop
set security screen ids-option untrust-screen tcp syn-flood alarm-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood attack-threshold 200
set security screen ids-option untrust-screen tcp syn-flood source-threshold 1024
set security screen ids-option untrust-screen tcp syn-flood destination-threshold 2048
set security screen ids-option untrust-screen tcp syn-flood timeout 20
set security screen ids-option untrust-screen tcp land
set security nat source rule-set nsw_srcnat from zone Controls
set security nat source rule-set nsw_srcnat from zone Gtown
set security nat source rule-set nsw_srcnat to zone Internet
set security nat source rule-set nsw_srcnat rule nsw-src-interface match source-address 0.0.0.0/0
set security nat source rule-set nsw_srcnat rule nsw-src-interface match destination-address 0.0.0.0/0
set security nat source rule-set nsw_srcnat rule nsw-src-interface then source-nat interface
set security nat proxy-arp interface fe-0/0/2.0 address 192.168.0.30/32 to 192.168.0.35/32
set security policies from-zone Internet to-zone Controls policy policy_startup_rvpn_Controls match source-address any
set security policies from-zone Internet to-zone Controls policy policy_startup_rvpn_Controls match destination-address any
set security policies from-zone Internet to-zone Controls policy policy_startup_rvpn_Controls match application any
set security policies from-zone Internet to-zone Controls policy policy_startup_rvpn_Controls then permit tunnel ipsec-vpn startup_rvpn
set security policies from-zone Internet to-zone Controls policy policy_startup_rvpn_Controls then log session-init
set security policies from-zone Internet to-zone Controls policy policy_startup_rvpn_Controls then log session-close
set security policies from-zone Gtown to-zone Internet policy All_Gtown_Internet match source-address any
set security policies from-zone Gtown to-zone Internet policy All_Gtown_Internet match destination-address any
set security policies from-zone Gtown to-zone Internet policy All_Gtown_Internet match application any
set security policies from-zone Gtown to-zone Internet policy All_Gtown_Internet then permit
set security policies from-zone Controls to-zone Internet policy All_Controls_Internet match source-address any
set security policies from-zone Controls to-zone Internet policy All_Controls_Internet match destination-address any
set security policies from-zone Controls to-zone Internet policy All_Controls_Internet match application any
set security policies from-zone Controls to-zone Internet policy All_Controls_Internet then permit
set security policies from-zone Gtown to-zone Controls policy All_Gtown_Controls match source-address any
set security policies from-zone Gtown to-zone Controls policy All_Gtown_Controls match destination-address any
set security policies from-zone Gtown to-zone Controls policy All_Gtown_Controls match application any
set security policies from-zone Gtown to-zone Controls policy All_Gtown_Controls then permit
set security policies from-zone Controls to-zone Gtown policy All_Gtown_Controls match source-address any
set security policies from-zone Controls to-zone Gtown policy All_Gtown_Controls match destination-address any
set security policies from-zone Controls to-zone Gtown policy All_Gtown_Controls match application any
set security policies from-zone Controls to-zone Gtown policy All_Gtown_Controls then permit
set security zones security-zone Gtown interfaces fe-0/0/7.0 host-inbound-traffic system-services ping
set security zones security-zone Gtown interfaces fe-0/0/7.0 host-inbound-traffic system-services https
set security zones security-zone Gtown interfaces fe-0/0/7.0 host-inbound-traffic system-services ssh
set security zones security-zone Controls interfaces fe-0/0/2.0 host-inbound-traffic system-services ping
set security zones security-zone Controls interfaces fe-0/0/2.0 host-inbound-traffic system-services http
set security zones security-zone Controls interfaces fe-0/0/2.0 host-inbound-traffic system-services https
set security zones security-zone Controls interfaces fe-0/0/2.0 host-inbound-traffic system-services ssh
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services https
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ike
set security zones security-zone Internet interfaces fe-0/0/0.0 host-inbound-traffic system-services ping