Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 21:10:13 Muffin:~$more /tftpboot/ilebeaute-mskmts-ivpn-11-confg
- !
- ! Last configuration change at 06:22:05 MSK Tue Feb 26 2019 by kzalyank
- ! NVRAM config last updated at 06:22:08 MSK Tue Feb 26 2019 by kzalyank
- !
- version 15.4
- service nagle
- no service pad
- service tcp-keepalives-in
- service tcp-keepalives-out
- service timestamps debug datetime localtime show-timezone
- service timestamps log datetime localtime show-timezone
- service password-encryption
- service linenumber
- service sequence-numbers
- !
- hostname ilebeaute-mskmts-IVPN-11
- !
- boot-start-marker
- boot system flash c800-universalk9-mz.SPA.154-3.M10.bin
- boot-end-marker
- !
- aqm-register-fnf
- !
- logging buffered 16000
- no logging console
- enable secret 5 $1$.Ocb$3eCYIaYwRjksQyQG0KCAk.
- !
- aaa new-model
- !
- !
- aaa authentication fail-message CAuthentication Fails, Please try again
- aaa authentication login default group tacacs+ local
- aaa authentication login CONSOLE group tacacs+ enable
- aaa authorization exec default group tacacs+ none
- aaa authorization commands 1 default group tacacs+ none
- aaa authorization commands 15 default group tacacs+ none
- aaa authorization network default none
- !
- !
- !
- !
- !
- aaa session-id common
- clock timezone MSK 3 0
- !
- crypto pki trustpoint CA
- enrollment terminal pem
- crl cache delete-after 10
- revocation-check crl
- !
- crypto pki trustpoint Ile_De_Beaute23
- crl cache delete-after 10
- revocation-check crl
- rsakeypair Ile_De_Beaute23
- !
- !
- crypto pki certificate chain CA
- certificate ca 00853578AA658FC223
- 30820455 3082033D A0030201 02020900 853578AA 658FC223 300D0609 2A864886
- F70D0101 05050030 8184310B 30090603 55040613 02525531 0F300D06 03550407
- 13064D6F 73636F77 31133011 06035504 0A130A45 7175616E 74204C4C 43312130
- 1F060355 040B1318 4F72616E 67652042 7573696E 65737320 53657276 69636573
- 312C302A 06035504 0313234F 72616E67 65204275 73696E65 73732053 65727669
- 63657273 20527573 73696120 4341301E 170D3132 30373234 30383532 31395A17
- 0D343230 37323330 38353231 395A3081 84310B30 09060355 04061302 5255310F
- 300D0603 55040713 064D6F73 636F7731 13301106 0355040A 130A4571 75616E74
- 204C4C43 3121301F 06035504 0B13184F 72616E67 65204275 73696E65 73732053
- 65727669 63657331 2C302A06 03550403 13234F72 616E6765 20427573 696E6573
- 73205365 72766963 65727320 52757373 69612043 41308201 22300D06 092A8648
- 86F70D01 01010500 0382010F 00308201 0A028201 0100BFD3 83D3F017 8BC00A0D
- 7287C4C8 8746C54D A32BD017 D2B7CF83 EFFE2BAD 98313DE7 2BC09929 BF0FB9BF
- 978F1C3C C04F5D27 0849351F 0FBBBF7B EB4062C8 0AD4917B E3835DE0 07ED177E
- 5F3818FC 4A6B7C17 7F75C47E 65A06C01 4DF675C0 605F3B79 8BE4DD0C FA6F1EF1
- 43D593A2 460DE843 6E27774E C9D2ADC8 2D4A3B1C 40821939 D6C424C6 21CF1D97
- 8A6B3105 3D2AD5E5 C327B1FE 1C042433 B942AB89 959220AD F0C1AFDE 29FC9023
- 4C40D24F A72F514D 973B7251 0A76EF7F D6E113DC EF5DA49E D83D5B38 6FBE9F47
- 52314043 EED45C28 6230F67B 18C92C79 52B04766 1B9EEF89 39DA3046 3981CE0B
- 2F32696E F50EF6F7 381E8C73 AA593160 BC14ED00 14DB0203 010001A3 81C73081
- C4300C06 03551D13 04053003 0101FF30 81A30603 551D2304 819B3081 98A1818A
- A4818730 8184310B 30090603 55040613 02525531 0F300D06 03550407 13064D6F
- 73636F77 31133011 06035504 0A130A45 7175616E 74204C4C 43312130 1F060355
- 040B1318 4F72616E 67652042 7573696E 65737320 53657276 69636573 312C302A
- 06035504 0313234F 72616E67 65204275 73696E65 73732053 65727669 63657273
- 20527573 73696120 43418209 00853578 AA658FC2 23300E06 03551D0F 0101FF04
- 04030201 06300D06 092A8648 86F70D01 01050500 03820101 00303428 A403EF42
- 33CE7793 27CF1F63 14B03BD7 6626EC1F 4A095354 A9398203 5997E50E 4B1EA795
- 0A9E603F C4ABE545 E041AFBC 9664C111 A1D5F9AC E6F25055 D7D9A5DC 0B51FC82
- 42D388D4 14B79640 FBD6C48F 22410632 89890365 21DA0260 8430D741 9C7DDE2E
- 9118DE43 7B4E45D3 64B4488E 5EA5474C 055D6E68 E75F9CA9 3302E78C 9D7DDB8C
- 32EB4F4E 4439FCAB 3181A7B1 B15A5B21 DE84630D EC12BC43 0BD809A6 C69A25B3
- 1E6D9F2D 6DD98354 544D019C B60D3F9E 62D5C7F2 D912A786 CE9F866E 473839BD
- 2C4F2E14 8C75E18E 09593B80 53FBB183 42A07A9C F5F1026D 676B1957 4D3BEA3F
- 9B8E8BDB 0A9E74CE 9E122D1C 8C6362EB 1BBD203E B53541F3 91
- quit
- crypto pki certificate chain Ile_De_Beaute23
- certificate 0167
- 308203FE 308202E6 A0030201 02020201 67300D06 092A8648 86F70D01 01050500
- 30818731 0B300906 03550406 13025255 310F300D 06035504 070C064D 6F73636F
- 77311330 11060355 040A0C0A 45717561 6E74204C 4C433121 301F0603 55040B0C
- 184F7261 6E676520 42757369 6E657373 20536572 76696365 73312F30 2D060355
- 04030C26 4F72616E 67652042 7573696E 65737320 53657276 69636572 73205275
- 73736961 20737562 4341301E 170D3136 30343134 31323138 32375A17 0D323130
- 34313331 32313832 375A3075 310B3009 06035504 06130252 55310F30 0D060355
- 04070C06 4D6F7363 6F773113 30110603 55040A0C 0A457175 616E7420 4C4C4331
- 1D301B06 0355040B 0C144956 504E5F49 6C655F44 655F4265 61757465 32333121
- 301F0603 5504030C 18696C65 62656175 74652D6D 736B6D74 732D4956 504E2D31
- 31308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201 0A028201
- 0100C58E DFB0B97B 5977580E 392D5340 8199C293 D30F6228 57568930 D0368AA5
- E3FA0BBE 542439E8 7F7ACAA0 3088ED3A BAE30B7F C1A186B2 61008028 F411B815
- E91D3ED6 F05C87C8 BE5BC155 A4DF2120 97E978FB E7B458D1 86BB451C 336DA55C
- 3F2D3538 F5DFBA89 AEA63C99 546CB938 56724870 032F1AE8 1F19A44B 63EB929E
- DF57F5A8 46D721B6 73EA8571 7F7390CE C9887FF6 188C5AF9 B421F416 FEA70A67
- 59437D6A DEFCAB77 0591AD34 D70C6FE5 37C48F44 931F5B20 A7D0C3B6 F30CB182
- 25C9A64E DB4EF8DF 90A72DDA 1BAEC2AC 28CCD620 BCF5FD7F E5F4490B 76C60C3F
- 24DAF58C 3FA4CE85 725B108D ED86DF95 6DAAF6BF 68B14B5B 9FCE33A9 D70E0FD9
- C0D10203 010001A3 81843081 81300906 03551D13 04023000 30330603 551D1F04
- 2C302A30 28A026A0 24862268 7474703A 2F2F6372 6C2E7265 6D6F7465 2E697076
- 706E2E72 752F6F62 732E6372 6C303F06 09608648 0186F842 010D0432 16304F72
- 616E6765 20427573 696E6573 73205365 72766963 65732049 56504E20 526F7574
- 65722063 65727469 66696361 7465300D 06092A86 4886F70D 01010505 00038201
- 01007612 782CC451 5A002037 5915EC5E F6F4A5BA 14441552 3E2F851E D124587B
- 8BD7FE7A 219F8264 D0C52BC5 B9DBD601 9E97DD9F 31AA96C1 21A89E4F 8165E815
- 256AC7CC D8E91563 068BF0EF 8E5218E3 A7E373EC 60AC72D8 A10F42A5 9B4AF09B
- B35272FC 3113D60A 919303CD 277D6C4C 2CEB1233 24106212 0904290C A122D967
- 3047C845 D54BFF14 BA26F278 CDA4B772 A10C385D BD1CC32B A3A3B1A3 5AB2CCCA
- 9BAD9008 DBC10C35 50B2D021 CAFD26C1 2A3E6A3A F285842F 565493EA 2A6EE927
- 758A62EB 5BDBA983 6232873A 4483862B 77C6294C C7338ED3 4D5A953B 3F92169B
- B7E026B5 D0C17DE9 6D0D3C02 7C546A35 5F4382E0 F80E5C5E 9BE603C7 85965195 9541
- quit
- certificate ca 00B10559F6754C9300
- 30820490 30820378 A0030201 02020900 B10559F6 754C9300 300D0609 2A864886
- F70D0101 05050030 8184310B 30090603 55040613 02525531 0F300D06 03550407
- 13064D6F 73636F77 31133011 06035504 0A130A45 7175616E 74204C4C 43312130
- 1F060355 040B1318 4F72616E 67652042 7573696E 65737320 53657276 69636573
- 312C302A 06035504 0313234F 72616E67 65204275 73696E65 73732053 65727669
- 63657273 20527573 73696120 4341301E 170D3132 30373234 30393236 31375A17
- 0D323730 37323430 39323631 375A3081 87310B30 09060355 04061302 5255310F
- 300D0603 5504070C 064D6F73 636F7731 13301106 0355040A 0C0A4571 75616E74
- 204C4C43 3121301F 06035504 0B0C184F 72616E67 65204275 73696E65 73732053
- 65727669 63657331 2F302D06 03550403 0C264F72 616E6765 20427573 696E6573
- 73205365 72766963 65727320 52757373 69612073 75624341 30820122 300D0609
- 2A864886 F70D0101 01050003 82010F00 3082010A 02820101 00C17F49 BA09BF4D
- 2EB44FC4 EEE27E89 569B6C62 50DC3350 89A3A2C6 32EB461A B96838C3 11CB70C2
- 5AA87448 56C71FEF 5F982654 170C2284 854F4D99 B76FF976 CE722BDA BF1D1E5F
- BC6155D7 AA587341 BC03A130 71CF2832 65F3CFEE 206ED77D A79C728E F56247EC
- 1D6A80B4 A3461373 E99EF747 A923DDA4 AEC2DB14 82EAE3F4 D1E81F34 C244AECF
- DC10F3DC F6108F9F 5C57DFE8 0A22D8B0 F1A12B3C 9466B195 45D725DD A2557FAF
- F83D8F00 229E4FDD 3ADD7ACE F8548CD2 42FF9083 49A1CBEE C2DCABE4 B641BA8C
- AC440C2E E010DFE4 F5D32F0A F175A0C7 A951A2F9 3A6118EE B15EFABD A3A8074B
- 47A403D6 2A1FC416 FC8143EF 7B1B84C2 B50DC82C 2770D6B9 8B020301 0001A381
- FF3081FC 300F0603 551D1304 08300601 01FF0201 00303306 03551D1F 042C302A
- 3028A026 A0248622 68747470 3A2F2F63 726C2E72 656D6F74 652E6970 76706E2E
- 72752F6F 62732E63 726C300E 0603551D 0F0101FF 04040302 01063081 A3060355
- 1D230481 9B308198 A1818AA4 81873081 84310B30 09060355 04061302 5255310F
- 300D0603 55040713 064D6F73 636F7731 13301106 0355040A 130A4571 75616E74
- 204C4C43 3121301F 06035504 0B13184F 72616E67 65204275 73696E65 73732053
- 65727669 63657331 2C302A06 03550403 13234F72 616E6765 20427573 696E6573
- 73205365 72766963 65727320 52757373 69612043 41820900 853578AA 658FC223
- 300D0609 2A864886 F70D0101 05050003 82010100 7A0E1596 AF1D0B7C 9D05D9A3
- 500EEE91 3C624FDE E08A230B 28F1B980 33F9ACC3 561231BC AC72A251 29F06BA7
- BF30044E 2EBCC07D DD31FAD9 14B4C42A 3612C3A0 895A5F7D EBBCE72D 1636B182
- 28CCFDE1 28489073 5C2687C2 246A183C 069D9AF4 32A6CA35 C7C463AA F5B9F2A7
- 3AB9CC18 1F472EFD F0036FA6 72833C2B F86946C4 4CC5472A 34D6B68B 991B9A5C
- 6CF91628 426A07CF D2E2BFE9 51C396B9 B16FA769 C5BC57D4 6B8551DC 5FD95A89
- 025A02CB A196311A A5DBA128 5058F39C C0A678EB 3B83824A 2A924D6F B0F83E17
- 8CFD576D EE535961 562C5A17 6D48FDD8 541BD4A3 19C02A13 F3FC6472 46AC8DDD
- 54CCC40E 39FE1A34 EC67386C 0CC25F6B C7003C90
- quit
- no ip source-route
- no ip gratuitous-arps
- !
- !
- !
- !
- !
- !
- !
- !
- !
- no ip dhcp conflict logging
- !
- !
- !
- no ip bootp server
- no ip domain lookup
- ip host crl.remote.ipvpn.ru 194.84.23.2
- ip name-server 212.44.130.6
- ip name-server 194.85.128.10
- ip cef
- no ipv6 cef
- !
- !
- !
- !
- !
- multilink bundle-name authenticated
- !
- !
- !
- !
- !
- !
- !
- !
- cts logging verbose
- license udi pid C881-K9 sn FCZ1921703C
- !
- !
- !
- no spanning-tree vlan 99
- no spanning-tree vlan 999
- username helpdesk secret 5 $1$6jpF$3nymlclU/48xK62bV4XsH.
- !
- !
- !
- !
- !
- track 100 list boolean and
- object 101
- object 102
- object 103
- object 104
- !
- track 101 stub-object
- default-state up
- !
- track 102 stub-object
- default-state up
- !
- track 103 stub-object
- default-state up
- !
- track 104 stub-object
- default-state up
- !
- track 200 list boolean and
- object 201
- object 202
- object 203
- object 204
- !
- track 201 stub-object
- default-state up
- !
- track 202 stub-object
- default-state up
- !
- track 203 stub-object
- default-state up
- !
- track 204 stub-object
- default-state up
- !
- track 300 stub-object
- default-state up
- !
- !
- !
- crypto isakmp policy 10
- encr aes
- group 2
- !
- !
- crypto ipsec transform-set DMVPN_TRANS esp-aes esp-sha-hmac
- mode tunnel
- !
- crypto ipsec profile IPSEC_PROF_DMVPN
- set transform-set DMVPN_TRANS
- !
- !
- !
- !
- !
- !
- !
- !
- interface Loopback0
- description --- #0021488 /CID-006-317 /mrs ---
- ip address 172.23.151.22 255.255.255.255
- !
- interface Tunnel1
- description --- To Hub1 ---
- bandwidth 2000
- ip address 57.199.228.22 255.255.255.0
- no ip redirects
- ip mtu 1400
- no ip split-horizon eigrp 1
- ip nhrp authentication !Q2w#E4r
- ip nhrp map multicast 194.84.45.74
- ip nhrp map 57.199.228.1 194.84.45.74
- ip nhrp network-id 154
- ip nhrp holdtime 300
- ip nhrp nhs 57.199.228.1
- ip tcp adjust-mss 1360
- tunnel source FastEthernet4.1000
- tunnel mode gre multipoint
- tunnel key 154
- tunnel protection ipsec profile IPSEC_PROF_DMVPN shared
- !
- interface Tunnel2
- description --- To Hub2 ---
- bandwidth 1000
- ip address 57.199.229.22 255.255.255.0
- no ip redirects
- ip mtu 1400
- no ip split-horizon eigrp 1
- ip nhrp authentication !Q2w#E4r
- ip nhrp map multicast 194.84.151.74
- ip nhrp map 57.199.229.1 194.84.151.74
- ip nhrp network-id 254
- ip nhrp holdtime 300
- ip nhrp nhs 57.199.229.1
- ip tcp adjust-mss 1360
- tunnel source FastEthernet4.1000
- tunnel mode gre multipoint
- tunnel key 254
- tunnel protection ipsec profile IPSEC_PROF_DMVPN shared
- !
- interface FastEthernet0
- description --- LAN_2,LAN_3 ----
- switchport trunk allowed vlan 1-3,1002-1005
- switchport mode trunk
- no ip address
- !
- interface FastEthernet1
- description --- LAN_2,LAN_3 ----
- switchport access vlan 99
- no ip address
- !
- interface FastEthernet2
- description --- LAN_2,LAN_3 ----
- switchport trunk allowed vlan 1-3,1002-1005
- switchport mode trunk
- no ip address
- !
- interface FastEthernet3
- description --- ISP2 ---
- switchport access vlan 999
- no ip address
- load-interval 30
- !
- interface FastEthernet4
- description --- WAN port ---
- no ip address
- duplex auto
- speed auto
- !
- interface FastEthernet4.1000
- description --- WAN 217.69.222.38 ---
- encapsulation dot1Q 1000 native
- ip address 10.31.186.2 255.255.255.252
- !
- interface FastEthernet4.1001
- description --- LAN_1 ---
- encapsulation dot1Q 1001
- ip address 10.161.0.1 255.255.255.248
- ip access-group Sephora_Interconnection out
- !
- interface Vlan1
- no ip address
- shutdown
- !
- interface Vlan2
- description --- LAN_2 ---
- ip address 10.160.35.190 255.255.255.192
- ip flow ingress
- ip flow egress
- !
- interface Vlan3
- description --- LAN_3 ---
- ip address 10.160.35.254 255.255.255.192
- ip flow ingress
- ip flow egress
- !
- interface Vlan99
- description --- #0021488 / 753443 ---
- ip address 10.235.35.190 255.255.255.248
- !
- interface Vlan999
- description --- ISP2 ---
- ip address 195.239.2.30 255.255.255.252
- !
- !
- router eigrp 1
- network 10.160.0.0 0.0.255.255
- network 10.235.35.184 0.0.0.7
- network 57.199.228.0 0.0.0.255
- network 57.199.229.0 0.0.0.255
- network 172.23.151.0 0.0.0.255
- redistribute static route-map STATIC-TO-EIGRP
- passive-interface default
- no passive-interface Tunnel1
- no passive-interface Tunnel2
- eigrp stub connected static
- !
- ip forward-protocol nd
- no ip http server
- no ip http secure-server
- !
- ip flow-export source Vlan2
- ip flow-export version 5
- ip flow-export destination 10.160.3.7 9995
- !
- ip tftp source-interface Loopback0
- ip route 194.33.81.1 255.255.255.255 10.31.186.1 name ntp track 300
- ip route 194.84.23.2 255.255.255.255 10.31.186.1 name ServerSertifikat track 300
- ip route 194.84.45.74 255.255.255.255 10.31.186.1 name LoopBackTunnel1 track 300
- ip route 194.84.77.20 255.255.255.255 10.31.186.1 name ntp2 track 300
- ip route 194.84.151.74 255.255.255.255 10.31.186.1 name LoopBackTunnel2 track 300
- ip route 212.176.2.22 255.255.255.255 10.31.186.1 name NRI track 300
- ip route 10.160.35.128 255.255.255.192 10.235.35.187
- ip route 10.234.35.128 255.255.255.192 10.235.35.187
- ip route 10.235.35.128 255.255.255.192 10.235.35.187
- ip route 77.108.96.194 255.255.255.255 195.239.2.29 100 name clients_icmp
- ip route 87.229.187.170 255.255.255.255 195.239.2.29 100 name clients_icmp
- ip route 172.31.186.0 255.255.255.240 10.161.0.2
- ip route 172.31.186.16 255.255.255.240 10.161.0.2
- ip route 172.31.186.32 255.255.255.224 10.161.0.2
- ip route 185.110.84.75 255.255.255.255 195.239.2.29 100 name clients_icmp
- ip route 192.168.186.0 255.255.255.128 10.161.0.2
- ip route 192.168.186.128 255.255.255.128 10.161.0.2
- ip route 193.232.88.0 255.255.255.0 195.239.2.29 100 name management
- ip route 193.232.88.0 255.255.255.0 10.31.186.1 200 name management
- ip route 194.33.81.1 255.255.255.255 195.239.2.29 100 name ntp
- ip route 194.84.23.2 255.255.255.255 195.239.2.29 100 name ServerSertifikat
- ip route 194.84.45.74 255.255.255.255 195.239.2.29 100 name LoopBackTunnel1
- ip route 194.84.77.20 255.255.255.255 195.239.2.29 100 name ntp2
- ip route 194.84.151.74 255.255.255.255 195.239.2.29 100 name LoopBackTunnel2
- ip route 195.151.232.2 255.255.255.255 10.31.186.1 name TRACK1
- ip route 195.151.232.13 255.255.255.255 195.239.2.29 name TRACK2
- ip route 212.176.2.22 255.255.255.255 195.239.2.29 100 name NRI
- ip route 212.176.2.23 255.255.255.255 195.239.2.29 100 name NMS-ribugin,Zabbix
- ip tacacs source-interface Loopback0
- ip scp server enable
- !
- ip access-list extended BU-BREAK
- deny icmp host 195.151.232.13 host 195.239.2.30
- permit ip any any
- ip access-list extended MAIN-BREAK
- deny icmp host 195.151.232.2 host 10.31.186.2
- permit ip any any
- ip access-list extended Sephora_Interconnection
- permit icmp any any echo
- permit icmp any any echo-reply
- permit icmp any any time-exceeded
- permit icmp any any unreachable
- permit icmp any any traceroute
- permit udp any any range 33434 33600
- permit tcp 10.160.35.128 0.0.0.63 host 192.168.186.139 eq www 443
- permit tcp 10.160.35.128 0.0.0.63 172.31.186.32 0.0.0.31 eq www 443
- permit tcp 10.160.35.128 0.0.0.63 172.31.186.0 0.0.0.15 eq 8016 8116 8200 8201 10019
- permit tcp 10.160.35.128 0.0.0.63 eq www 443 9100 172.31.186.16 0.0.0.15
- permit udp 10.160.35.128 0.0.0.63 eq snmp 192.168.186.128 0.0.0.127
- permit tcp 10.160.35.128 0.0.0.63 eq 9100 9220 192.168.186.128 0.0.0.127
- !
- !
- ip prefix-list STATIC seq 5 permit 10.160.35.128/26
- ip prefix-list STATIC seq 10 permit 10.234.35.128/26
- ip prefix-list STATIC seq 15 permit 10.235.35.128/26
- ip sla 1
- icmp-jitter 195.151.232.2 source-ip 10.31.186.2 num-packets 20 interval 50
- threshold 1000
- timeout 1000
- ip sla schedule 1 life forever start-time now
- ip sla 2
- icmp-jitter 195.151.232.13 source-ip 195.239.2.30 num-packets 20 interval 50
- threshold 1000
- timeout 1000
- ip sla schedule 2 life forever start-time now
- ip sla reaction-configuration 1 react rtt threshold-value 200 150 threshold-type consecutive 3
- ip sla reaction-configuration 1 react jitterAvg threshold-value 50 30 threshold-type consecutive 3
- ip sla reaction-configuration 1 react packetLoss threshold-value 3 2 threshold-type consecutive 3
- ip sla reaction-configuration 1 react timeout threshold-type immediate
- ip sla reaction-configuration 2 react rtt threshold-value 200 150 threshold-type consecutive 3
- ip sla reaction-configuration 2 react jitterAvg threshold-value 50 30 threshold-type consecutive 3
- ip sla reaction-configuration 2 react packetLoss threshold-value 3 2 threshold-type consecutive 3
- ip sla reaction-configuration 2 react timeout threshold-type immediate
- ip sla enable reaction-alerts
- ip sla responder
- logging trap notifications
- logging facility local5
- logging source-interface Loopback0
- logging host 172.18.128.255
- logging host 172.18.128.244
- !
- route-map STATIC-TO-EIGRP permit 10
- match ip address prefix-list STATIC
- !
- snmp-server community public RO 7
- snmp-server ifindex persist
- snmp-server location ILE DE BEAUTE (Moscow, Kaluzhskoe shosse 21km.)
- snmp-server contact OBS (Moscow) (+7-495-620-9500)
- snmp-server enable traps tty
- snmp-server host 172.18.128.244 public
- snmp-server host 172.18.128.255 public
- tacacs-server host 172.18.128.255
- tacacs-server directed-request
- tacacs-server key 7 0725305B190455405E4B0F0A0B
- access-list 7 permit 195.151.60.215
- access-list 7 remark List of MRS Telnet and SNMP RO Access
- access-list 7 permit 172.18.128.254
- access-list 7 permit 172.18.128.255
- access-list 7 permit 172.18.128.253
- access-list 7 permit 172.18.128.244
- access-list 7 permit 172.23.101.5
- access-list 7 permit 193.232.88.0 0.0.0.255
- access-list 24 remark Deny Outgoing VTY Sessions
- access-list 24 deny any
- !
- !
- !
- control-plane
- !
- !
- mgcp behavior rsip-range tgcp-only
- mgcp behavior comedia-role none
- mgcp behavior comedia-check-media-src disable
- mgcp behavior comedia-sdp-force disable
- !
- mgcp profile default
- !
- !
- !
- !
- !
- !
- vstack
- alias exec crb show interfaces crb | i
- alias exec c configure terminal
- alias exec bri show ip interface brief
- alias exec wrn copy running-config tftp://172.18.128.255/ilebeaute-mskmts-ivpn-11-confg
- privilege exec level 0 traceroute ip
- privilege exec level 0 traceroute
- privilege exec level 0 ping ip
- privilege exec level 0 ping
- privilege exec level 15 show access-lists
- privilege exec level 15 show ip access-lists
- privilege exec level 1 show ip
- privilege exec level 1 show logging
- privilege exec level 1 show
- privilege exec level 0 clear counters
- privilege exec level 0 clear
- banner motd
- #### ##### ####
- ## ## ## ## ## ##
- ## ## ##### #### ##### ##### #### ## ## ##
- ## ## ### ## ## ### ## ## ## ## ## #### ####
- ## ## ## ##### ## ## ### ###### ## ## ##
- ## ## ## ## ## ## ## ## ## ## ## ## ##
- #### ## ##### ## ## #### #### ##### ####
- ## ##
- rus-conf.corp@list2.orange.com #### [2016]
- __________________________________________________________
- Attention! Access to and usage of this system is restricted
- to authorized personnel only! Violators will be prosecuted
- to the fullest extent of both civil and criminal law.
- Please Call to Orange 8 800 500 5 500, before making any
- action with this device.
- __________________________________________________________
- !
- line con 0
- access-class 24 out
- logging synchronous
- login authentication CONSOLE
- no modem enable
- history size 256
- transport preferred none
- transport output none
- line aux 0
- access-class 7 in
- access-class 24 out
- logging synchronous
- login authentication CONSOLE
- history size 256
- transport input telnet
- line vty 0 4
- access-class 7 in
- exec-timeout 5 0
- logging synchronous
- history size 256
- transport preferred none
- transport input telnet ssh
- !
- scheduler allocate 20000 1000
- ntp source Loopback0
- ntp server 172.18.128.189
- !
- !
- event manager session cli username "helpdesk" privilege 15
- event manager applet IPSLA-Main-Status-RTT
- event ipsla operation-id 1 reaction-type rtt
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 101 state down
- action 3 else
- action 4 track set 101 state up
- action 5 end
- event manager applet IPSLA-Main-Status-Jitter
- event ipsla operation-id 1 reaction-type maxOfNegativeDS
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 102 state down
- action 3 else
- action 4 track set 102 state up
- action 5 end
- event manager applet IPSLA-Main-Status-Loss
- event ipsla operation-id 1 reaction-type packetLossSD
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 103 state down
- action 3 else
- action 4 track set 103 state up
- action 5 end
- event manager applet IPSLA-Main-Status-Timeout
- event ipsla operation-id 1 reaction-type timeout
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 104 state down
- action 3 else
- action 4 track set 104 state up
- action 5 end
- event manager applet IPSLA-BU-Status-RTT
- event ipsla operation-id 2 reaction-type rtt
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 201 state down
- action 3 else
- action 4 track set 201 state up
- action 5 end
- event manager applet IPSLA-BU-Status-Jitter
- event ipsla operation-id 2 reaction-type maxOfNegativeDS
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 202 state down
- action 3 else
- action 4 track set 202 state up
- action 5 end
- event manager applet IPSLA-BU-Status-Loss
- event ipsla operation-id 2 reaction-type packetLossSD
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 203 state down
- action 3 else
- action 4 track set 203 state up
- action 5 end
- event manager applet IPSLA-BU-Status-Timeout
- event ipsla operation-id 2 reaction-type timeout
- action 1 if $_ipsla_condition eq "Occurred"
- action 2 track set 204 state down
- action 3 else
- action 4 track set 204 state up
- action 5 end
- event manager applet IPSLA-switch-to-Main authorization bypass
- event track 100 state up
- trigger occurs 1
- action 00 syslog msg "Primary link Up"
- action 01 syslog msg "Switch to Main"
- action 02 cli command "en"
- action 03 cli command "conf t"
- action 04 cli command "int range tu1-2"
- action 05 cli command "shut"
- action 06 cli command "no tunnel source vlan 999"
- action 07 cli command "tunnel source Fa4.1000"
- action 08 cli command "no shut"
- action 09 cli command "end"
- action 10 track set 300 state up
- event manager applet IPSLA-switch-to-BU authorization bypass
- event tag 1 track 100 state down
- trigger occurs 1
- action 00 syslog msg "Primary link down"
- action 01 track read 200
- action 02 if $_track_state eq "up"
- action 03 syslog msg "Switch to BU"
- action 04 cli command "en"
- action 05 cli command "conf t"
- action 06 cli command "int range tu1-2"
- action 07 cli command "shut"
- action 08 cli command "no tunnel source FastEthernet4.1000"
- action 09 cli command "tunnel source vlan 999"
- action 10 cli command "no shut"
- action 11 cli command "end"
- action 12 track set 300 state down
- action 13 else
- action 14 syslog msg "Do nothing"
- action 15 end
- event manager applet IPSLA-switch-to-BU-2 authorization bypass
- event tag 1 track 200 state up
- action 00 syslog msg "Backup link Up"
- action 01 track read 100
- action 02 if $_track_state eq "up"
- action 03 syslog msg "Do nothing"
- action 04 else
- action 05 syslog msg "Switch to BU"
- action 06 cli command "en"
- action 07 cli command "conf t"
- action 08 cli command "int range tu1-2"
- action 09 cli command "shut"
- action 10 cli command "no tunnel source FastEthernet4.1000"
- action 11 cli command "tunnel source vlan 999"
- action 12 cli command "no shut"
- action 13 cli command "end"
- action 14 track set 300 state down
- action 15 end
- !
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement