[Nocrancid] autopop-onenet.net/woodward-public-library-srx240.client.onenet.net[0] router config diffs
rancid at rancid.noc.onenet.net
rancid at rancid.noc.onenet.net
Fri Sep 25 13:23:19 CDT 2015
Index: configs/lukfata-ps.client.onenet.net
===================================================================
--- configs/lukfata-ps.client.onenet.net (revision 133319)
+++ configs/lukfata-ps.client.onenet.net (working copy)
@@ -0,0 +1,721 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show system commit
+# 2015-09-01 13:09:46 CDT by andrew via cli
+# 2015-09-01 13:05:17 CDT by andrew via cli commit confirmed, rollback in 3mins
+# 2015-09-01 12:58:30 CDT by andrew via cli
+# 2015-09-01 12:55:42 CDT by andrew via cli
+# 2015-09-01 12:53:40 CDT by andrew via cli
+# 2015-08-21 10:34:43 CDT by admin via cli commit confirmed, rollback in 3mins
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis environment
+# Class Item Status Measurement
+# Temp Routing Engine OK
+# Routing Engine CPU Absent
+# Fans SRX220 Chassis fan 0 OK
+# SRX220 Chassis fan 1 OK
+# Power Power Supply 0 OK
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis firmware
+# Part Type Version
+# FPC 0 O/S Version 12.1X44-D15.5 by builder on 2013-06
+# FWDD O/S Version 12.1X44-D15.5 by builder on 2013-06
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis fpc detail
+# Slot 0 information:
+# State Online
+# Total CPU DRAM ---- CPU less FPC ----
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis hardware
+# Hardware inventory:
+# Item Version Part number Serial number Description
+# Chassis CF3813AK0697 SRX220H2
+# Routing Engine REV 04 750-048778 ACKL0411 RE-SRX220H2
+# FPC 0 FPC
+# PIC 0 8x GE Base PIC
+# Power Supply 0
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis hardware models
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis routing-engine
+# Routing Engine status:
+# Serial ID ACKL0411
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis scb
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis sfm detail
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show chassis ssb
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show system boot-messages
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2013, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 2 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 5020 CPU Rev. 0.1 with no FPU implemented
+# L1 Cache: I size 32kb(128 line), D size 8kb(128 line), sixty four way.
+# L2 Cache: Size 128kb, 8 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# dwc0: <Synopsis DWC OTG Controller Driver> on obio0
+# usb0: <USB Bus for DWC OTG Controller> on dwc0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 1 port with 1 removable, self powered
+# uhub1: vendor 0x0409 product 0x005a, class 9/0, rev 2.00/1.00, addr 2
+# uhub1: single transaction translator
+# uhub1: 3 ports with 2 removable, self powered
+# cpld0 on obio0
+# pcib0: <Cavium on-chip PCI bridge> on obio0
+# Disabling Octeon big bar support
+# PCI Status: PCI 32-bit: 0xc041b
+# pcib0: Initialized controller
+# pci0: <PCI bus> on pcib0
+# pci0: <simple comms> at device 1.0 (no driver attached)
+# atapci0: <SiI 0680 UDMA133 controller> port 0x8-0xb,0x10-0x17,0x18-0x1b,0x20-0x2f mem 0x8020000-0x80200ff irq 0 at device 2.0 on pci0
+# ata2: <ATA channel 0> on atapci0
+# ata3: <ATA channel 1> on atapci0
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 8MB> on obio0
+# Timecounter "mips" frequency 700000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# ad0: Device does not support APM
+# ad0: 2000MB <CF 2GB 20100924> at ata2-master WDMA2
+# Trying to mount root from ufs:/dev/ad0s1a
+# WARNING: / was not properly dismounted
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show version
+# Hostname: LUKFATA-PS-SRX220-LR-00XXXX # Model: srx220h2 # JUNOS Software Release [12.1X44-D15.5] # # grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> file list /var/tmp detail # lrw-r--r-- 1 root wheel 11 Jun 6 2013 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show system uptime
+# System booted: 2015-06-21 20:21 CDT
+# Protocols started: 2015-06-21 20:23 CDT
+# Last configured: 2015-09-01 13:09 CDT by andrew
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show interface terse
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.0 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 up down
+#ge-0/0/1.0 up down
+#ge-0/0/2 down down
+#ge-0/0/3 down down
+#ge-0/0/4 down down
+#ge-0/0/5 down down
+#ge-0/0/6 down down
+#ge-0/0/7 up up
+#ge-0/0/7.0 up up
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#tap up up
+#vlan up up
+#vlan.3 up up
+#vlan.4 up up
+#vlan.999 up down
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show configuration
+## Last commit: 2015-09-01 13:09:46 CDT by andrew
+version 12.1X44.5;
+system {
+ host-name LUKFATA-PS-SRX220-LR-00XXXX;
+ domain-name onenet.net;
+ time-zone America/Chicago;
+ authentication-order [ radius password ];
+ ports {
+ console log-out-on-disconnect;
+ }
+ root-authentication {
+# encrypted-password <removed>;
+ }
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ radius-server {
+ 156.110.31.11 {
+# secret "<removed>"; ## SECRET-DATA
+ source-address 156.110.24.194;
+ }
+ }
+ radius-options {
+ attributes {
+ nas-ip-address 156.110.24.194;
+ }
+ }
+ login {
+ message "\n+----------------------------------------------------------------------------+\n| |\n| Managed by Oklahoma State Regents for Higher Education |\n| Oklahoma Network for Education Enrichment (ONENET) |\n| |\n| *** Unauthorized Use or Access Prohibited *** |\n| |\n| For more information, contact: |\n| |\n| Oklahoma State Regents for Higher Education |\n| Educational Telecommunications Network -- ONENET |\n| (888) 566-3638 |\n| !
info at onenet.net |\n| |\n+----------------------------------------------------------------------------+\n";
+ class admin {
+ idle-timeout 30;
+ permissions all;
+ }
+ class lockdown {
+ idle-timeout 2;
+ permissions view;
+ deny-commands .*;
+ deny-configuration .*;
+ }
+ class operator-local {
+ idle-timeout 15;
+ permissions [ access admin configure firewall interface network routing snmp system trace view ];
+ allow-commands "show log messages";
+ }
+ class robot {
+ idle-timeout 10;
+ permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+ }
+ user admin {
+ uid 1000;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user client {
+ uid 2000;
+ class admin;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user eng {
+ uid 2018;
+ class admin;
+ }
+ user rancid {
+ uid 2001;
+ class robot;
+ }
+ user remote {
+ uid 2002;
+ class operator-local;
+ }
+ user upgrades {
+ uid 2003;
+ class operator;
+ authentication {
+# ssh-rsa <removed>;
+ }
+ }
+ }
+ services {
+ ssh {
+ root-login deny;
+ protocol-version v2;
+ }
+ web-management {
+ https {
+ system-generated-certificate;
+ }
+ }
+ dhcp {
+ pool 10.7.0.0/24 {
+ address-range low 10.7.0.11 high 10.7.0.254;
+ domain-name onenet.net;
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ router {
+ 10.7.0.1;
+ }
+ }
+ }
+ }
+ syslog {
+ archive size 10m files 5;
+ user * {
+ any emergency;
+ }
+ file messages {
+ any notice;
+ authorization info;
+ }
+ file interactive-commands {
+ interactive-commands any;
+ }
+ file PROTECT-RE {
+ firewall any;
+ archive no-world-readable;
+ }
+ file traffic {
+ any any;
+ match RT_FLOW_SESSION;
+ }
+ file updown {
+ any any;
+ match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+ }
+ }
+ max-configurations-on-flash 20;
+ max-configuration-rollbacks 20;
+ ntp {
+ server 164.58.3.98 prefer;
+ }
+}
+interfaces {
+ ge-0/0/0 {
+ description "UNTRUST WAN Interface";
+ speed 100m;
+ link-mode full-duplex;
+ gigether-options {
+ no-auto-negotiation;
+ }
+ unit 0 {
+ family ethernet-switching {
+ vlan {
+ members UNTRUST-VLAN;
+ }
+ }
+ }
+ }
+ ge-0/0/1 {
+ unit 0 {
+ description TEST-INTERFACE;
+ family ethernet-switching {
+ vlan {
+ members TEST-VLAN;
+ }
+ }
+ }
+ }
+ ge-0/0/2 {
+ disable;
+ }
+ ge-0/0/3 {
+ disable;
+ }
+ ge-0/0/4 {
+ disable;
+ }
+ ge-0/0/5 {
+ disable;
+ }
+ ge-0/0/6 {
+ disable;
+ }
+ ge-0/0/7 {
+ description "TRUST LAN Interface";
+ unit 0 {
+ family ethernet-switching {
+ vlan {
+ members TRUST-VLAN;
+ }
+ }
+ }
+ }
+ lo0 {
+ unit 0 {
+ family inet {
+ filter {
+ input PROTECT-RE;
+ }
+ }
+ }
+ }
+ vlan {
+ unit 3 {
+ description "L3 INTERFACE - UNTRUST-VLAN - 156.110.24.194/30";
+ family inet {
+ address 156.110.24.194/30;
+ }
+ }
+ unit 4 {
+ description "L3 INTERFACE - TRUST-VLAN - 172.16.1.3/16";
+ family inet {
+ address 172.16.1.3/16;
+ }
+ }
+ unit 999 {
+ description "L3 INTERFACE - TEST-VLAN - 10.1.0.1/24";
+ family inet {
+ address 10.1.0.1/24;
+ }
+ }
+ }
+}
+snmp {
+ description OneNet;
+ contact "Net Group";
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-write;
+ }
+}
+routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 156.110.24.193;
+ }
+}
+protocols {
+ lldp {
+ interface all;
+ }
+ stp;
+}
+policy-options {
+ prefix-list PRE-MGMT-SOURCES {
+ 156.110.31.0/27;
+ 156.110.31.32/28;
+ 164.58.253.0/24;
+ }
+ prefix-list PRE-LOCALIPv4-SOURCES {
+ apply-path "interfaces <*> unit <*> family inet address <*>";
+ }
+}
+security {
+ ike {
+ policy ike-dyn-vpn-policy {
+ mode aggressive;
+ proposal-set standard;
+ pre-shared-key ascii-text "$9$KHxWXNs2aikPdbkP5Q9CKM8"; ## SECRET-DATA
+ }
+ gateway dyn-vpn-local-gw {
+ ike-policy ike-dyn-vpn-policy;
+ dynamic {
+ hostname dynvpn;
+ connections-limit 2;
+ ike-user-type group-ike-id;
+ }
+ external-interface vlan.3;
+ xauth access-profile dyn-vpn-access-profile;
+ }
+ }
+ ipsec {
+ policy ipsec-dyn-vpn-policy {
+ proposal-set standard;
+ }
+ vpn dyn-vpn {
+ ike {
+ gateway dyn-vpn-local-gw;
+ ipsec-policy ipsec-dyn-vpn-policy;
+ }
+ }
+ }
+ dynamic-vpn {
+ access-profile dyn-vpn-access-profile;
+ clients {
+ all {
+ remote-protected-resources {
+ 172.16.0.0/16;
+ }
+ remote-exceptions {
+ 0.0.0.0/0;
+ }
+ ipsec-vpn dyn-vpn;
+ user {
+ FARELY;
+ sfarley;
+ test;
+ }
+ }
+ }
+ }
+ screen {
+ ids-option UNTRUST-SCREEN {
+ icmp {
+ ping-death;
+ }
+ ip {
+ source-route-option;
+ tear-drop;
+ }
+ tcp {
+ syn-flood {
+ alarm-threshold 1024;
+ attack-threshold 200;
+ source-threshold 1024;
+ destination-threshold 2048;
+ timeout 20;
+ }
+ land;
+ }
+ }
+ }
+ nat {
+ source {
+ rule-set TRUST-TO-UNTRUST-NAT {
+ from zone TRUST;
+ to zone UNTRUST;
+ rule NAT-TRUST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ rule-set TEST-TO-UNTRUST-NAT {
+ from zone TEST;
+ to zone UNTRUST;
+ rule NAT-TEST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ }
+ }
+ policies {
+ from-zone TRUST to-zone UNTRUST {
+ policy TRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TEST to-zone UNTRUST {
+ policy ALLOW-ALL-OUT {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone UNTRUST to-zone TRUST {
+ policy dyn-vpn-policy {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit {
+ tunnel {
+ ipsec-vpn dyn-vpn;
+ }
+ }
+ }
+ }
+ }
+ }
+ zones {
+ security-zone TRUST {
+ interfaces {
+ vlan.4 {
+ host-inbound-traffic {
+ system-services {
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone TEST {
+ interfaces {
+ vlan.999 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone UNTRUST {
+ screen UNTRUST-SCREEN;
+ interfaces {
+ vlan.3 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ https;
+ ike;
+ }
+ }
+ }
+ }
+ }
+ }
+}
+firewall {
+ family inet {
+ filter PROTECT-RE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol udp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term ALL-TRAFFIC {
+ then accept;
+ }
+ }
+ }
+}
+access {
+ profile dyn-vpn-access-profile {
+ client FARELY {
+ firewall-user {
+ password "$9$A4nqt1heK87dsWL"; ## SECRET-DATA
+ }
+ }
+ client sfarley {
+ firewall-user {
+ password "$9$hW.rKMWLx7dsOBclMW-dk.P5QnApB"; ## SECRET-DATA
+ }
+ }
+ client test {
+ firewall-user {
+ password "$9$RLPElvM8Xx-wP5nCu0hcbs24aUTQF"; ## SECRET-DATA
+ }
+ }
+ address-assignment {
+ pool dyn-vpn-address-pool;
+ }
+ }
+ address-assignment {
+ pool dyn-vpn-address-pool {
+ family inet {
+ network 192.168.255.0/24;
+ range dvpn-range {
+ low 192.168.255.1;
+ high 192.168.255.254;
+ }
+ }
+ }
+ }
+ firewall-authentication {
+ web-authentication {
+ default-profile dyn-vpn-access-profile;
+ }
+ }
+}
+ethernet-switching-options {
+ secure-access-port {
+ interface ge-0/0/1.0 {
+ mac-limit 3 action shutdown;
+ }
+ }
+ bpdu-block {
+ interface ge-0/0/1.0;
+ }
+}
+vlans {
+ TEST-VLAN {
+ description "Test VLAN 999 for TESTING ONLY";
+ vlan-id 999;
+ l3-interface vlan.999;
+ }
+ TRUST-VLAN {
+ description TRUST-VLAN;
+ vlan-id 4;
+ l3-interface vlan.4;
+ }
+ UNTRUST-VLAN {
+ description UNTRUST-VLAN;
+ vlan-id 3;
+ l3-interface vlan.3;
+ }
+}
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show ospf neighbor
+# OSPF instance is not running
+#
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show bfd session
+
+0 sessions, 0 clients
+Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
+
+# grnoc-mon at LUKFATA-PS-SRX220-LR-00XXXX> show system snapshot media internal
+# Information for snapshot on internal (/dev/ad0s1a) (primary)
+# Creation date: Sep 19 18:46:26 2013
+# JUNOS version on snapshot:
+# junos : 12.1X44-D15.5-domestic
+# Information for snapshot on internal (/dev/ad0s2a) (backup)
+# Creation date: Sep 1 13:11:39 2015
+# JUNOS version on snapshot:
+# junos : 12.1X44-D15.5-domestic
+#
Index: configs/keota-hs-srx220.client.onenet.net
===================================================================
--- configs/keota-hs-srx220.client.onenet.net (revision 134324)
+++ configs/keota-hs-srx220.client.onenet.net (working copy)
@@ -0,0 +1,562 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show system commit
+# 2015-08-03 17:23:27 CDT by joel via cli
+# 2015-07-20 15:39:45 CDT by joel via cli
+# 2015-07-14 00:18:21 CDT by onenet via cli
+# 2014-08-15 23:07:23 CDT by onenet via cli
+# 2014-08-15 22:05:34 CDT by root via cli
+# 2014-08-15 16:45:08 CDT by root via other
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis environment
+# Class Item Status Measurement
+# Temp Routing Engine OK
+# Routing Engine CPU Absent
+# Fans SRX220 Chassis fan 0 OK
+# SRX220 Chassis fan 1 OK
+# Power Power Supply 0 OK
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis firmware
+# Part Type Version
+# FPC 0 O/S Version 12.1X44-D30.4 by builder on 2014-01
+# FWDD O/S Version 12.1X44-D30.4 by builder on 2014-01
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis fpc detail
+# Slot 0 information:
+# State Online
+# Total CPU DRAM ---- CPU less FPC ----
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis hardware
+# Hardware inventory:
+# Item Version Part number Serial number Description
+# Chassis AQ2613AK0321 SRX220H
+# Routing Engine REV 22 750-031175 ACAP8230 RE-SRX220H
+# FPC 0 FPC
+# PIC 0 8x GE Base PIC
+# Power Supply 0
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis hardware models
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis routing-engine
+# Routing Engine status:
+# Serial ID ACAP8230
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis scb
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis sfm detail
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show chassis ssb
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show system boot-messages
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2014, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 2 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 5020 CPU Rev. 0.1 with no FPU implemented
+# L1 Cache: I size 32kb(128 line), D size 8kb(128 line), sixty four way.
+# L2 Cache: Size 128kb, 8 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# dwc0: <Synopsis DWC OTG Controller Driver> on obio0
+# usb0: <USB Bus for DWC OTG Controller> on dwc0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 1 port with 1 removable, self powered
+# uhub1: vendor 0x0409 product 0x005a, class 9/0, rev 2.00/1.00, addr 2
+# uhub1: single transaction translator
+# uhub1: 3 ports with 2 removable, self powered
+# cpld0 on obio0
+# pcib0: <Cavium on-chip PCI bridge> on obio0
+# Disabling Octeon big bar support
+# PCI Status: PCI 32-bit: 0xc041b
+# pcib0: Initialized controller
+# pci0: <PCI bus> on pcib0
+# pci0: <simple comms> at device 1.0 (no driver attached)
+# atapci0: <SiI 0680 UDMA133 controller> port 0x8-0xb,0x10-0x17,0x18-0x1b,0x20-0x2f mem 0x8020000-0x80200ff irq 0 at device 2.0 on pci0
+# ata2: <ATA channel 0> on atapci0
+# ata3: <ATA channel 1> on atapci0
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 8MB> on obio0
+# Timecounter "mips" frequency 700000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# ad0: Device does not support APM
+# ad0: 1006MB <CF 1GB 20100924> at ata2-master WDMA2
+# Trying to mount root from ufs:/dev/ad0s2a
+# WARNING: / was not properly dismounted
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show version
+# Hostname: KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942 # Model: srx220h # JUNOS Software Release [12.1X44-D30.4] # # grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> file list /var/tmp detail # lrw-r--r-- 1 root wheel 11 Jan 11 2014 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show system uptime
+# System booted: 2015-08-20 20:30 CDT
+# Protocols started: 2015-08-20 20:32 CDT
+# Last configured: 2015-08-03 17:23 CDT by joel
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show interface terse
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.0 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 up down
+#ge-0/0/1.0 up down
+#ge-0/0/2 down down
+#ge-0/0/3 down down
+#ge-0/0/4 down down
+#ge-0/0/5 down down
+#ge-0/0/6 down down
+#ge-0/0/7 up up
+#ge-0/0/7.0 up up
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#tap up up
+#vlan up up
+#vlan.999 up down
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show configuration
+## Last commit: 2015-08-03 17:23:27 CDT by joel
+version 12.1X44-D30.4;
+system {
+ host-name KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942;
+ domain-name onenet.net;
+ time-zone America/Chicago;
+ authentication-order [ radius password ];
+ ports {
+ console log-out-on-disconnect;
+ }
+ root-authentication {
+# encrypted-password <removed>;
+ }
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ radius-server {
+ 156.110.31.11 {
+# secret "<removed>"; ## SECRET-DATA
+ source-address 156.110.28.154;
+ }
+ }
+ radius-options {
+ attributes {
+ nas-ip-address 156.110.28.154;
+ }
+ }
+ login {
+ message "\n+----------------------------------------------------------------------------+\n| |\n| Managed by Oklahoma State Regents for Higher Education |\n| Oklahoma Network for Education Enrichment (ONENET) |\n| |\n| *** Unauthorized Use or Access Prohibited *** |\n| |\n| For more information, contact: |\n| |\n| Oklahoma State Regents for Higher Education |\n| Educational Telecommunications Network -- ONENET |\n| (888) 566-3638 |\n| !
info at onenet.net |\n| |\n+----------------------------------------------------------------------------+\n";
+ class admin {
+ idle-timeout 30;
+ permissions all;
+ }
+ class lockdown {
+ idle-timeout 2;
+ permissions view;
+ deny-commands .*;
+ deny-configuration .*;
+ }
+ class operator-local {
+ idle-timeout 15;
+ permissions [ access admin configure firewall interface network routing snmp system trace view ];
+ allow-commands "show log messages";
+ }
+ class robot {
+ idle-timeout 10;
+ permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+ }
+ user admin {
+ uid 1000;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user client {
+ uid 2000;
+ class admin;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user eng {
+ uid 2018;
+ class admin;
+ }
+ user rancid {
+ uid 2001;
+ class robot;
+ }
+ user remote {
+ uid 2002;
+ class operator-local;
+ }
+ user upgrades {
+ uid 2003;
+ class operator;
+ authentication {
+# ssh-rsa <removed>;
+ }
+ }
+ }
+ services {
+ ssh {
+ root-login deny;
+ protocol-version v2;
+ }
+ dhcp {
+ pool 10.1.0.0/24 {
+ address-range low 10.1.0.2 high 10.1.0.254;
+ domain-name test.local;
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ router {
+ 10.1.0.1;
+ }
+ }
+ }
+ }
+ syslog {
+ archive size 10m files 5;
+ user * {
+ any emergency;
+ }
+ file messages {
+ any notice;
+ authorization info;
+ }
+ file interactive-commands {
+ interactive-commands any;
+ }
+ file PROTECT-RE {
+ firewall any;
+ archive no-world-readable;
+ }
+ file traffic {
+ any any;
+ match RT_FLOW_SESSION;
+ }
+ file updown {
+ any any;
+ match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+ }
+ }
+ max-configurations-on-flash 20;
+ max-configuration-rollbacks 20;
+ ntp {
+ server 164.58.3.98 prefer;
+ }
+}
+interfaces {
+ ge-0/0/0 {
+ description "UNTRUST WAN Interface - 156.110.28.154/30";
+ unit 0 {
+ family inet {
+ address 156.110.28.154/30;
+ }
+ }
+ }
+ ge-0/0/1 {
+ unit 0 {
+ description TEST-INTERFACE;
+ family ethernet-switching {
+ vlan {
+ members TEST-VLAN;
+ }
+ }
+ }
+ }
+ ge-0/0/2 {
+ disable;
+ }
+ ge-0/0/3 {
+ disable;
+ }
+ ge-0/0/4 {
+ disable;
+ }
+ ge-0/0/5 {
+ disable;
+ }
+ ge-0/0/6 {
+ disable;
+ }
+ ge-0/0/7 {
+ description "UNTRUST LAN Interface - 156.110.231.97/29";
+ unit 0 {
+ family inet {
+ address 156.110.231.97/29;
+ }
+ }
+ }
+ lo0 {
+ unit 0 {
+ family inet {
+ filter {
+ input PROTECT-RE;
+ }
+ }
+ }
+ }
+ vlan {
+ unit 999 {
+ description "L3 INTERFACE - TEST-VLAN - 10.1.0.1/24";
+ family inet {
+ address 10.1.0.1/24;
+ }
+ }
+ }
+}
+snmp {
+ description OneNet;
+ contact "Net Group";
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-write;
+ }
+}
+routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 156.110.28.153;
+ }
+}
+protocols {
+ lldp {
+ interface all;
+ }
+ stp;
+}
+policy-options {
+ prefix-list PRE-MGMT-SOURCES {
+ 156.110.31.0/27;
+ 156.110.31.32/28;
+ 164.58.253.0/24;
+ }
+ prefix-list PRE-LOCALIPv4-SOURCES {
+ apply-path "interfaces <*> unit <*> family inet address <*>";
+ }
+}
+security {
+ screen {
+ ids-option UNTRUST-SCREEN {
+ icmp {
+ ping-death;
+ }
+ ip {
+ source-route-option;
+ tear-drop;
+ }
+ tcp {
+ syn-flood {
+ alarm-threshold 1024;
+ attack-threshold 200;
+ source-threshold 1024;
+ destination-threshold 2048;
+ timeout 20;
+ }
+ land;
+ }
+ }
+ }
+ nat {
+ source {
+ rule-set TEST-TO-UNTRUST-NAT {
+ from zone TEST;
+ to zone UNTRUST;
+ rule NAT-TEST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ }
+ }
+ policies {
+ from-zone UNTRUST to-zone UNTRUST {
+ policy UNTRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TEST to-zone UNTRUST {
+ policy ALLOW-ALL-OUT {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ }
+ zones {
+ security-zone TEST {
+ interfaces {
+ vlan.999 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone UNTRUST {
+ screen UNTRUST-SCREEN;
+ interfaces {
+ ge-0/0/0.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ }
+ }
+ }
+ ge-0/0/7.0 {
+ host-inbound-traffic {
+ system-services {
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ }
+}
+firewall {
+ family inet {
+ filter PROTECT-RE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol udp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term ALL-TRAFFIC {
+ then accept;
+ }
+ }
+ }
+}
+ethernet-switching-options {
+ secure-access-port {
+ interface ge-0/0/1.0 {
+ mac-limit 3 action shutdown;
+ }
+ }
+ bpdu-block {
+ interface ge-0/0/1.0;
+ }
+}
+vlans {
+ TEST-VLAN {
+ description "Test VLAN 999 for TESTING ONLY";
+ vlan-id 999;
+ l3-interface vlan.999;
+ }
+}
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show ospf neighbor
+# OSPF instance is not running
+#
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show bfd session
+
+0 sessions, 0 clients
+Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
+
+# grnoc-mon at KEOTA-HS-SRX220-LEASED-ASSET-TAG-003942> show system snapshot media internal
+# Information for snapshot on internal (/dev/ad0s1a) (backup)
+# Creation date: Jul 20 15:40:50 2015
+# JUNOS version on snapshot:
+# junos : 12.1X44-D30.4-domestic
+# Information for snapshot on internal (/dev/ad0s2a) (primary)
+# Creation date: Aug 3 15:50:47 2015
+# JUNOS version on snapshot:
+# junos : 12.1X44-D30.4-domestic
+#
Index: configs/navajo-ps-srx220.client.onenet.net
===================================================================
--- configs/navajo-ps-srx220.client.onenet.net (revision 133433)
+++ configs/navajo-ps-srx220.client.onenet.net (working copy)
@@ -0,0 +1,789 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show system commit
+# 2015-07-27 15:07:08 CDT by joel via cli
+# 2015-07-27 14:56:33 CDT by joel via cli commit confirmed, rollback in 3mins
+# 2015-07-27 14:54:47 CDT by joel via cli
+# 2015-07-27 09:16:56 CDT by joel via cli commit confirmed, rollback in 3mins
+# 2015-07-24 10:23:32 CDT by admin via cli commit confirmed, rollback in 7mins
+# 2015-07-24 10:17:29 CDT by admin via cli commit confirmed, rollback in 10mins
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis environment
+# Class Item Status Measurement
+# Temp Routing Engine OK
+# Routing Engine CPU Absent
+# Fans SRX220 Chassis fan 0 OK
+# SRX220 Chassis fan 1 OK
+# Power Power Supply 0 OK
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis firmware
+# Part Type Version
+# FPC 0 O/S Version 12.1X44-D15.5 by builder on 2013-06
+# FWDD O/S Version 12.1X44-D15.5 by builder on 2013-06
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis fpc detail
+# Slot 0 information:
+# State Online
+# Total CPU DRAM ---- CPU less FPC ----
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis hardware
+# Hardware inventory:
+# Item Version Part number Serial number Description
+# Chassis CF4013AK0471 SRX220H2
+# Routing Engine REV 04 750-048778 ACKJ5495 RE-SRX220H2
+# FPC 0 FPC
+# PIC 0 8x GE Base PIC
+# Power Supply 0
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis hardware models
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis routing-engine
+# Routing Engine status:
+# Serial ID ACKJ5495
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis scb
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis sfm detail
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show chassis ssb
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show system boot-messages
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2013, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 2 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 2 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 5020 CPU Rev. 0.1 with no FPU implemented
+# L1 Cache: I size 32kb(128 line), D size 8kb(128 line), sixty four way.
+# L2 Cache: Size 128kb, 8 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# dwc0: <Synopsis DWC OTG Controller Driver> on obio0
+# usb0: <USB Bus for DWC OTG Controller> on dwc0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 1 port with 1 removable, self powered
+# uhub1: vendor 0x0409 product 0x005a, class 9/0, rev 2.00/1.00, addr 2
+# uhub1: single transaction translator
+# uhub1: 3 ports with 2 removable, self powered
+# cpld0 on obio0
+# pcib0: <Cavium on-chip PCI bridge> on obio0
+# Disabling Octeon big bar support
+# PCI Status: PCI 32-bit: 0xc041b
+# pcib0: Initialized controller
+# pci0: <PCI bus> on pcib0
+# pci0: <simple comms> at device 1.0 (no driver attached)
+# atapci0: <SiI 0680 UDMA133 controller> port 0x8-0xb,0x10-0x17,0x18-0x1b,0x20-0x2f mem 0x8020000-0x80200ff irq 0 at device 2.0 on pci0
+# ata2: <ATA channel 0> on atapci0
+# ata3: <ATA channel 1> on atapci0
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 8MB> on obio0
+# Timecounter "mips" frequency 700000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# ad0: Device does not support APM
+# ad0: 2000MB <CF 2GB 20100924> at ata2-master WDMA2
+# Trying to mount root from ufs:/dev/ad0s1a
+# WARNING: / was not properly dismounted
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show version
+# Hostname: NAVAJO-PUBLIC-SCHOOLS-SRX220 # Model: srx220h2 # JUNOS Software Release [12.1X44-D15.5] # # grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> file list /var/tmp detail # lrw-r--r-- 1 root wheel 11 Jun 6 2013 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show system uptime
+# System booted: 2015-04-17 10:08 CDT
+# Protocols started: 2015-04-17 10:11 CDT
+# Last configured: 2015-07-27 15:07 CDT by joel
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show interface terse
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.0 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 up down
+#ge-0/0/1.0 up down
+#ge-0/0/2 down down
+#ge-0/0/3 down down
+#ge-0/0/4 down down
+#ge-0/0/5 down down
+#ge-0/0/6 down down
+#ge-0/0/7 up up
+#ge-0/0/7.0 up up
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#tap up up
+#vlan up up
+#vlan.4 up up
+#vlan.999 up down
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show configuration
+## Last commit: 2015-07-27 15:07:08 CDT by joel
+version 12.1X44.5;
+system {
+ host-name NAVAJO-PUBLIC-SCHOOLS-SRX220;
+ domain-name onenet.net;
+ time-zone America/Chicago;
+ authentication-order [ radius password ];
+ ports {
+ console log-out-on-disconnect;
+ }
+ root-authentication {
+# encrypted-password <removed>;
+ }
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ radius-server {
+ 156.110.31.11 {
+# secret "<removed>"; ## SECRET-DATA
+ source-address 164.58.21.70;
+ }
+ }
+ radius-options {
+ attributes {
+ nas-ip-address 164.58.21.70;
+ }
+ }
+ login {
+ message "\n+----------------------------------------------------------------------------+\n| |\n| Managed by Oklahoma State Regents for Higher Education |\n| Oklahoma Network for Education Enrichment (ONENET) |\n| |\n| *** Unauthorized Use or Access Prohibited *** |\n| |\n| For more information, contact: |\n| |\n| Oklahoma State Regents for Higher Education |\n| Educational Telecommunications Network -- ONENET |\n| (888) 566-3638 |\n| !
info at onenet.net |\n| |\n+----------------------------------------------------------------------------+\n";
+ class admin {
+ idle-timeout 30;
+ permissions all;
+ }
+ class lockdown {
+ idle-timeout 2;
+ permissions view;
+ deny-commands .*;
+ deny-configuration .*;
+ }
+ class operator-local {
+ idle-timeout 15;
+ permissions [ access admin configure firewall interface network routing snmp system trace view ];
+ allow-commands "show log messages";
+ }
+ class robot {
+ idle-timeout 10;
+ permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+ }
+ user admin {
+ uid 1000;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user client {
+ uid 2000;
+ class admin;
+ }
+ user eng {
+ uid 2018;
+ class admin;
+ }
+ user rancid {
+ uid 2001;
+ class robot;
+ }
+ user remote {
+ uid 2002;
+ class operator-local;
+ }
+ user upgrades {
+ uid 2003;
+ class operator;
+ authentication {
+# ssh-rsa <removed>;
+ }
+ }
+ }
+ services {
+ ssh {
+ root-login deny;
+ protocol-version v2;
+ }
+ dhcp {
+ pool 10.1.0.0/24 {
+ address-range low 10.1.0.2 high 10.1.0.254;
+ domain-name test.local;
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ router {
+ 10.1.0.1;
+ }
+ }
+ }
+ }
+ syslog {
+ archive size 10m files 5;
+ user * {
+ any emergency;
+ }
+ file messages {
+ any notice;
+ authorization info;
+ }
+ file interactive-commands {
+ interactive-commands any;
+ }
+ file PROTECT-RE {
+ firewall any;
+ archive no-world-readable;
+ }
+ file traffic {
+ any any;
+ match RT_FLOW_SESSION;
+ }
+ file updown {
+ any any;
+ match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+ }
+ }
+ max-configurations-on-flash 20;
+ max-configuration-rollbacks 20;
+ ntp {
+ server 164.58.3.98 prefer;
+ }
+}
+interfaces {
+ ge-0/0/0 {
+ description "UNTRUST WAN Interface - 164.58.21.70/30";
+ unit 0 {
+ family inet {
+ address 164.58.21.70/30;
+ }
+ }
+ }
+ ge-0/0/1 {
+ unit 0 {
+ description TEST-INTERFACE;
+ family ethernet-switching {
+ vlan {
+ members TEST-VLAN;
+ }
+ }
+ }
+ }
+ ge-0/0/2 {
+ disable;
+ }
+ ge-0/0/3 {
+ disable;
+ }
+ ge-0/0/4 {
+ disable;
+ }
+ ge-0/0/5 {
+ disable;
+ }
+ ge-0/0/6 {
+ disable;
+ }
+ ge-0/0/7 {
+ description "TRUST LAN Interface";
+ unit 0 {
+ family ethernet-switching {
+ vlan {
+ members TRUST-VLAN;
+ }
+ }
+ }
+ }
+ lo0 {
+ unit 0 {
+ family inet {
+ filter {
+ input PROTECT-RE;
+ }
+ }
+ }
+ }
+ vlan {
+ unit 4 {
+ description "TRUST LAN Interface - 156.110.39.145/29";
+ family inet {
+ address 172.17.0.1/16;
+ address 156.110.39.145/29;
+ }
+ }
+ unit 999 {
+ description "L3 INTERFACE - TEST-VLAN - 10.1.0.1/24";
+ family inet {
+ address 10.1.0.1/24;
+ }
+ }
+ }
+}
+snmp {
+ description OneNet;
+ contact "Net Group";
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-write;
+ }
+}
+routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 164.58.21.69;
+ }
+}
+protocols {
+ lldp {
+ interface all;
+ }
+ stp;
+}
+policy-options {
+ prefix-list PRE-MGMT-SOURCES {
+ 156.110.31.0/27;
+ 156.110.31.32/28;
+ 164.58.253.0/24;
+ }
+ prefix-list PRE-LOCALIPv4-SOURCES {
+ apply-path "interfaces <*> unit <*> family inet address <*>";
+ }
+}
+security {
+ address-book {
+ global {
+ address host-172.017.000.003 {
+ description file-bucket;
+ 172.17.0.3/32;
+ }
+ address host-172.017.000.124 {
+ description admin-workstation;
+ 172.17.0.124/32;
+ }
+ address host-172.017.000.112 {
+ description admin-workstation;
+ 172.17.0.112/32;
+ }
+ address host-172.017.005.110 {
+ description admin-workstation;
+ 172.17.5.110/32;
+ }
+ address host-172.017.004.023 {
+ description admin-workstation;
+ 172.17.4.23/32;
+ }
+ address host-172.017.000.130 {
+ description active-directory;
+ 172.17.0.130/32;
+ }
+ address host-208.67.222.222 {
+ description opendns-1;
+ 208.67.222.222/32;
+ }
+ address host-208.67.220.220 {
+ description opendns-2;
+ 208.67.220.220/32;
+ }
+ }
+ }
+ screen {
+ ids-option UNTRUST-SCREEN {
+ icmp {
+ ping-death;
+ }
+ ip {
+ source-route-option;
+ tear-drop;
+ }
+ tcp {
+ syn-flood {
+ alarm-threshold 1024;
+ attack-threshold 200;
+ source-threshold 1024;
+ destination-threshold 2048;
+ timeout 20;
+ }
+ land;
+ }
+ }
+ }
+ nat {
+ source {
+ rule-set TRUST-TO-UNTRUST-NAT {
+ from zone TRUST;
+ to zone UNTRUST;
+ rule NAT-TRUST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ rule-set TEST-TO-UNTRUST-NAT {
+ from zone TEST;
+ to zone UNTRUST;
+ rule NAT-TEST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ }
+ destination {
+ pool 172_017_000_003_3389 {
+ address 172.17.0.3/32 port 3389;
+ }
+ pool 172_017_000_124_3389 {
+ address 172.17.0.124/32 port 3389;
+ }
+ pool 172_017_000_112_3389 {
+ address 172.17.0.112/32 port 3389;
+ }
+ pool 172_017_005_110_3389 {
+ address 172.17.5.110/32 port 3389;
+ }
+ pool 172_017_004_023_3389 {
+ address 172.17.4.23/32 port 3389;
+ }
+ pool 172_017_000_130_3389 {
+ address 172.17.0.130/32 port 3389;
+ }
+ rule-set UNTRUST {
+ from zone UNTRUST;
+ rule 156_110_039_149_8123 {
+ match {
+ destination-address 156.110.39.149/32;
+ destination-port 8123;
+ }
+ then {
+ destination-nat pool 172_017_000_003_3389;
+ }
+ }
+ rule 156_110_039_149_11296 {
+ match {
+ destination-address 156.110.39.149/32;
+ destination-port 11296;
+ }
+ then {
+ destination-nat pool 172_017_000_124_3389;
+ }
+ }
+ rule 156_110_039_149_12202 {
+ match {
+ destination-address 156.110.39.149/32;
+ destination-port 12202;
+ }
+ then {
+ destination-nat pool 172_017_000_112_3389;
+ }
+ }
+ rule 156_110_039_149_41049 {
+ match {
+ destination-address 156.110.39.149/32;
+ destination-port 41049;
+ }
+ then {
+ destination-nat pool 172_017_005_110_3389;
+ }
+ }
+ rule 156_110_039_149_42765 {
+ match {
+ destination-address 156.110.39.149/32;
+ destination-port 42765;
+ }
+ then {
+ destination-nat pool 172_017_004_023_3389;
+ }
+ }
+ rule 156_110_039_149_52375 {
+ match {
+ destination-address 156.110.39.149/32;
+ destination-port 52375;
+ }
+ then {
+ destination-nat pool 172_017_000_130_3389;
+ }
+ }
+ }
+ }
+ proxy-arp {
+ interface ge-0/0/0.0 {
+ address {
+ 156.110.39.149/32;
+ }
+ }
+ }
+ }
+ policies {
+ from-zone UNTRUST to-zone TRUST {
+ policy 201408261600 {
+ match {
+ source-address any;
+ destination-address host-172.017.000.003;
+ application custom-tcp-3389;
+ }
+ then {
+ permit;
+ }
+ }
+ policy 201408261601 {
+ match {
+ source-address any;
+ destination-address host-172.017.000.124;
+ application custom-tcp-3389;
+ }
+ then {
+ permit;
+ }
+ }
+ policy 201408261602 {
+ match {
+ source-address any;
+ destination-address host-172.017.000.112;
+ application custom-tcp-3389;
+ }
+ then {
+ permit;
+ }
+ }
+ policy 201408261603 {
+ match {
+ source-address any;
+ destination-address host-172.017.005.110;
+ application custom-tcp-3389;
+ }
+ then {
+ permit;
+ }
+ }
+ policy 201408261604 {
+ match {
+ source-address any;
+ destination-address host-172.017.004.023;
+ application custom-tcp-3389;
+ }
+ then {
+ permit;
+ }
+ }
+ policy 201408261605 {
+ match {
+ source-address any;
+ destination-address host-172.017.000.130;
+ application custom-tcp-3389;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TRUST to-zone UNTRUST {
+ policy TRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TEST to-zone UNTRUST {
+ policy ALLOW-ALL-OUT {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ }
+ zones {
+ security-zone TRUST {
+ interfaces {
+ vlan.4 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone TEST {
+ interfaces {
+ vlan.999 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone UNTRUST {
+ screen UNTRUST-SCREEN;
+ interfaces {
+ ge-0/0/0.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ }
+}
+firewall {
+ family inet {
+ filter PROTECT-RE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol udp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term ALL-TRAFFIC {
+ then accept;
+ }
+ }
+ }
+}
+applications {
+ application custom-tcp-3389 {
+ protocol tcp;
+ destination-port 3389;
+ }
+ application custom-tcp-53 {
+ protocol tcp;
+ destination-port 53;
+ }
+ application custom-udp-53 {
+ protocol udp;
+ destination-port 53;
+ }
+}
+ethernet-switching-options {
+ secure-access-port {
+ interface ge-0/0/1.0 {
+ mac-limit 3 action shutdown;
+ }
+ }
+ bpdu-block {
+ interface ge-0/0/1.0;
+ }
+}
+vlans {
+ TEST-VLAN {
+ description "Test VLAN 999 for TESTING ONLY";
+ vlan-id 999;
+ l3-interface vlan.999;
+ }
+ TRUST-VLAN {
+ description TRUST-VLAN;
+ vlan-id 4;
+ l3-interface vlan.4;
+ }
+}
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show ospf neighbor
+# OSPF instance is not running
+#
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show bfd session
+
+0 sessions, 0 clients
+Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
+
+# grnoc-mon at NAVAJO-PUBLIC-SCHOOLS-SRX220> show system snapshot media internal
+# Information for snapshot on internal (/dev/ad0s1a) (primary)
+# Creation date: Oct 2 05:41:55 2013
+# JUNOS version on snapshot:
+# junos : 12.1X44-D15.5-domestic
+# Information for snapshot on internal (/dev/ad0s2a) (backup)
+# Creation date: Jul 27 09:20:35 2015
+# JUNOS version on snapshot:
+# junos : 12.1X44-D15.5-domestic
+#
Index: configs/mid-america-tech-ctr.client.onenet.net
===================================================================
--- configs/mid-america-tech-ctr.client.onenet.net (revision 134344)
+++ configs/mid-america-tech-ctr.client.onenet.net (working copy)
@@ -0,0 +1,668 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show system commit
+# 2015-08-19 14:01:33 CDT by joel via cli
+# 2015-08-19 13:53:15 CDT by joel via cli commit confirmed, rollback in 3mins
+# 2015-08-14 09:02:12 CDT by andrew via cli
+# 2015-08-04 13:54:00 CDT by joel via cli commit confirmed, rollback in 2mins
+# 2015-07-31 20:28:20 CDT by admin via cli
+# 2015-07-30 00:49:10 CDT by root via other
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis environment
+# Class Item Status Measurement
+# Temp Routing Engine OK
+# Routing Engine CPU OK
+# Fans SRX240 PowerSupply fan 1 OK
+# SRX240 PowerSupply fan 2 OK
+# SRX240 CPU fan 1 OK
+# SRX240 CPU fan 2 OK
+# SRX240 IO fan 1 OK
+# SRX240 IO fan 2 OK
+# Power Power Supply 0 OK
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis firmware
+# Part Type Version
+# FPC 0 O/S Version 12.1X44-D35.5 by builder on 2014-05
+# FWDD O/S Version 12.1X44-D35.5 by builder on 2014-05
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis fpc detail
+# Slot 0 information:
+# State Online
+# Total CPU DRAM ---- CPU less FPC ----
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis hardware
+# Hardware inventory:
+# Item Version Part number Serial number Description
+# Chassis BU0814AK0389 SRX240H2
+# Routing Engine REV 09 750-043609 ACLA1807 RE-SRX240H2
+# FPC 0 FPC
+# PIC 0 16x GE Base PIC
+# Power Supply 0
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis hardware models
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis routing-engine
+# Routing Engine status:
+# Serial ID ACLA1807
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis scb
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis sfm detail
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show chassis ssb
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show system boot-messages
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2014, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 4 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 52XX CPU Rev. 0.8 with no FPU implemented
+# L1 Cache: I size 32kb(128 line), D size 8kb(128 line), sixty four way.
+# L2 Cache: Size 512kb, 8 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# dwc0: <Synopsis DWC OTG Controller Driver> on obio0
+# usb0: <USB Bus for DWC OTG Controller> on dwc0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 1 port with 1 removable, self powered
+# uhub1: vendor 0x0409 product 0x005a, class 9/0, rev 2.00/1.00, addr 2
+# uhub1: single transaction translator
+# uhub1: 3 ports with 2 removable, self powered
+# umass0: STMicroelectronics ST72682 High Speed Mode, rev 2.00/2.10, addr 3
+# dwc1: <Synopsis DWC OTG Controller Driver> on obio0
+# usb1: <USB Bus for DWC OTG Controller> on dwc1
+# usb1: USB revision 2.0
+# uhub2: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub2: 1 port with 1 removable, self powered
+# cpld0 on obio0
+# pcib1: <Cavium on-chip PCIe HOST bridge> on obio0
+# Disabling Octeon big bar support
+# PCIe: Waiting for port 0 to finish reset
+# PCIe: Port 0 link active, 2 lanes
+# PCIe: Waiting for port 1 to finish reset
+# PCIe: Port 1 link active, 1 lanes
+# pcib1: Initialized controller
+# pci0: <PCI bus> on pcib1
+# pcib2: <PCI-PCI bridge> irq 0 at device 0.0 on pci0
+# pci1: <PCI bus> on pcib2
+# pci1: <serial bus, USB> at device 2.0 (no driver attached)
+# pci1: <serial bus, USB> at device 2.1 (no driver attached)
+# pci1: <network> at device 7.0 (no driver attached)
+# pcib0: <Cavium on-chip PCIe HOST bridge> on obio0
+# pci2: <PCI bus> on pcib0
+# pci2: <processor> at device 0.0 (no driver attached)
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 4MB> on obio0
+# Timecounter "mips" frequency 600000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# da0 at umass-sim0 bus 0 target 0 lun 0
+# da0: <ST ST72682 2.10> Removable Direct Access SCSI-2 device
+# da0: 40.000MB/s transfers
+# da0: 2000MB (4096000 512 byte sectors: 255H 63S/T 254C)
+# Trying to mount root from ufs:/dev/da0s1a
+# WARNING: / was not properly dismounted
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show version
+# Hostname: MID-AMERICA-TECH-CTR-SRX240-LR-004891 # Model: srx240h2 # JUNOS Software Release [12.1X44-D35.5] # # grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> file list /var/tmp detail # lrw-r--r-- 1 root wheel 11 May 19 2014 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show system uptime
+# System booted: 2015-09-18 06:43 CDT
+# Protocols started: 2015-09-18 06:47 CDT
+# Last configured: 2015-08-19 14:01 CDT by joel
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show interface terse
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.0 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 up down
+#ge-0/0/1.0 up down
+#ge-0/0/2 down down
+#ge-0/0/3 down down
+#ge-0/0/4 down down
+#ge-0/0/5 down down
+#ge-0/0/6 down down
+#ge-0/0/7 down down
+#ge-0/0/8 down down
+#ge-0/0/9 down down
+#ge-0/0/10 down down
+#ge-0/0/11 down down
+#ge-0/0/12 down down
+#ge-0/0/13 down down
+#ge-0/0/14 down down
+#ge-0/0/15 up up
+#ge-0/0/15.0 up up
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#tap up up
+#vlan up up
+#vlan.999 up down
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show configuration
+## Last commit: 2015-08-19 14:01:33 CDT by joel
+version 12.1X44-D35.5;
+system {
+ host-name MID-AMERICA-TECH-CTR-SRX240-LR-004891;
+ domain-name onenet.net;
+ time-zone America/Chicago;
+ authentication-order [ radius password ];
+ ports {
+ console log-out-on-disconnect;
+ }
+ root-authentication {
+# encrypted-password <removed>;
+ }
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ radius-server {
+ 156.110.31.11 {
+# secret "<removed>"; ## SECRET-DATA
+ source-address 164.58.252.170;
+ }
+ }
+ radius-options {
+ attributes {
+ nas-ip-address 164.58.252.170;
+ }
+ }
+ login {
+ message "\n+----------------------------------------------------------------------------+\n| |\n| Managed by Oklahoma State Regents for Higher Education |\n| Oklahoma Network for Education Enrichment (ONENET) |\n| |\n| *** Unauthorized Use or Access Prohibited *** |\n| |\n| For more information, contact: |\n| |\n| Oklahoma State Regents for Higher Education |\n| Educational Telecommunications Network -- ONENET |\n| (888) 566-3638 |\n| !
info at onenet.net |\n| |\n+----------------------------------------------------------------------------+\n";
+ class admin {
+ idle-timeout 30;
+ permissions all;
+ }
+ class lockdown {
+ idle-timeout 2;
+ permissions view;
+ deny-commands .*;
+ deny-configuration .*;
+ }
+ class operator-local {
+ idle-timeout 15;
+ permissions [ access admin configure firewall interface network routing snmp system trace view ];
+ allow-commands "show log messages";
+ }
+ class robot {
+ idle-timeout 10;
+ permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+ }
+ user admin {
+ uid 1000;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user client {
+ uid 2000;
+ class admin;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user eng {
+ uid 2018;
+ class admin;
+ }
+ user rancid {
+ uid 2001;
+ class robot;
+ }
+ user remote {
+ uid 2002;
+ class operator-local;
+ }
+ user upgrades {
+ uid 2003;
+ class operator;
+ authentication {
+# ssh-rsa <removed>;
+ }
+ }
+ }
+ services {
+ ssh {
+ root-login deny;
+ protocol-version v2;
+ }
+ dhcp {
+ pool 10.1.0.0/24 {
+ address-range low 10.1.0.2 high 10.1.0.254;
+ domain-name test.local;
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ router {
+ 10.1.0.1;
+ }
+ }
+ }
+ }
+ syslog {
+ archive size 10m files 5;
+ user * {
+ any emergency;
+ }
+ file messages {
+ any notice;
+ authorization info;
+ }
+ file interactive-commands {
+ interactive-commands any;
+ }
+ file PROTECT-RE {
+ firewall any;
+ archive no-world-readable;
+ }
+ file traffic {
+ any any;
+ match RT_FLOW_SESSION;
+ }
+ file updown {
+ any any;
+ match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+ }
+ }
+ max-configurations-on-flash 20;
+ max-configuration-rollbacks 20;
+ ntp {
+ server 164.58.3.98 prefer;
+ }
+}
+interfaces {
+ ge-0/0/0 {
+ description "WAN Interface - 164.58.252.170/30";
+ unit 0 {
+ family inet {
+ filter {
+ input PACKET-MODE;
+ }
+ address 164.58.252.170/30;
+ }
+ }
+ }
+ ge-0/0/1 {
+ unit 0 {
+ description TEST-INTERFACE;
+ family ethernet-switching {
+ vlan {
+ members TEST-VLAN;
+ }
+ }
+ }
+ }
+ ge-0/0/2 {
+ disable;
+ }
+ ge-0/0/3 {
+ disable;
+ }
+ ge-0/0/4 {
+ disable;
+ }
+ ge-0/0/5 {
+ disable;
+ }
+ ge-0/0/6 {
+ disable;
+ }
+ ge-0/0/7 {
+ disable;
+ }
+ ge-0/0/8 {
+ disable;
+ }
+ ge-0/0/9 {
+ disable;
+ }
+ ge-0/0/10 {
+ disable;
+ }
+ ge-0/0/11 {
+ disable;
+ }
+ ge-0/0/12 {
+ disable;
+ }
+ ge-0/0/13 {
+ disable;
+ }
+ ge-0/0/14 {
+ disable;
+ }
+ ge-0/0/15 {
+ description "LAN Interface - 164.58.70.1/25";
+ unit 0 {
+ family inet {
+ filter {
+ input PACKET-MODE;
+ }
+ address 164.58.70.1/25;
+ }
+ }
+ }
+ lo0 {
+ unit 0 {
+ family inet {
+ filter {
+ input PROTECT-RE;
+ }
+ }
+ }
+ }
+ vlan {
+ unit 999 {
+ description "L3 INTERFACE - TEST-VLAN - 10.1.0.1/24";
+ family inet {
+ address 10.1.0.1/24;
+ }
+ }
+ }
+}
+snmp {
+ description OneNet;
+ contact "Net Group";
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-write;
+ }
+}
+routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 164.58.252.169;
+ }
+}
+protocols {
+ lldp {
+ interface all;
+ }
+ stp;
+}
+policy-options {
+ prefix-list PRE-MGMT-SOURCES {
+ 156.110.31.0/27;
+ 156.110.31.32/28;
+ 164.58.253.0/24;
+ }
+ prefix-list PRE-LOCALIPv4-SOURCES {
+ apply-path "interfaces <*> unit <*> family inet address <*>";
+ }
+}
+security {
+ screen {
+ ids-option UNTRUST-SCREEN {
+ icmp {
+ ping-death;
+ }
+ ip {
+ source-route-option;
+ tear-drop;
+ }
+ tcp {
+ syn-flood {
+ alarm-threshold 1024;
+ attack-threshold 200;
+ source-threshold 1024;
+ destination-threshold 2048;
+ timeout 20;
+ }
+ land;
+ }
+ }
+ }
+ nat {
+ source {
+ rule-set TEST-TO-UNTRUST-NAT {
+ from zone TEST;
+ to zone UNTRUST;
+ rule NAT-TEST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ }
+ }
+ policies {
+ from-zone UNTRUST to-zone UNTRUST {
+ policy UNTRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TEST to-zone UNTRUST {
+ policy ALLOW-ALL-OUT {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ }
+ zones {
+ security-zone TEST {
+ interfaces {
+ vlan.999 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ dns;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone UNTRUST {
+ screen UNTRUST-SCREEN;
+ interfaces {
+ ge-0/0/0.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ }
+ }
+ }
+ ge-0/0/15.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ }
+}
+firewall {
+ family inet {
+ filter PROTECT-RE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol tcp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term ALL-TRAFFIC {
+ then accept;
+ }
+ }
+ filter PACKET-MODE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol tcp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term PACKET-MODE {
+ then {
+ packet-mode;
+ accept;
+ }
+ }
+ }
+ }
+}
+ethernet-switching-options {
+ secure-access-port {
+ interface ge-0/0/1.0 {
+ mac-limit 3 action shutdown;
+ }
+ }
+ bpdu-block {
+ interface ge-0/0/1.0;
+ }
+}
+vlans {
+ TEST-VLAN {
+ description "Test VLAN 999 for TESTING ONLY";
+ vlan-id 999;
+ l3-interface vlan.999;
+ }
+}
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show ospf neighbor
+# OSPF instance is not running
+#
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show bfd session
+
+0 sessions, 0 clients
+Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
+
+# grnoc-mon at MID-AMERICA-TECH-CTR-SRX240-LR-004891> show system snapshot media internal
+# Information for snapshot on internal (/dev/da0s1a) (primary)
+# Creation date: May 14 20:34:05 2015
+# JUNOS version on snapshot:
+# junos : 12.1X44-D35.5-domestic
+# Information for snapshot on internal (/dev/da0s2a) (backup)
+# Creation date: Aug 4 13:56:18 2015
+# JUNOS version on snapshot:
+# junos : 12.1X44-D35.5-domestic
+#
Index: configs/odmhsas.central-office.okc.client.onenet.net
===================================================================
--- configs/odmhsas.central-office.okc.client.onenet.net (revision 134210)
+++ configs/odmhsas.central-office.okc.client.onenet.net (working copy)
@@ -0,0 +1,2456 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show system commit
+# 2015-07-28 13:23:21 CDT by andrew via cli
+# 2015-07-28 10:02:53 CDT by andrew via cli commit confirmed, rollback in 3mins
+# 2015-05-23 19:23:38 CDT by andrew via cli commit confirmed, rollback in 3mins
+# 2015-05-23 14:05:01 CDT by andrew via cli commit confirmed, rollback in 5mins
+# 2015-05-23 13:45:29 CDT by andrew via cli
+# 2015-05-23 13:34:23 CDT by andrew via cli
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis environment
+# Class Item Status Measurement
+# Temp Routing Engine OK
+# Routing Engine CPU OK
+# Routing Engine Absent
+# Routing Engine CPU Absent
+# Fans SRXSME Chassis Fan 0 OK
+# SRXSME Chassis Fan 1 OK
+# SRXSME Chassis Fan 2 OK
+# SRXSME Chassis Fan 3 OK
+# Power Power Supply 0 OK
+# Power Supply 1 OK
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis firmware
+# Part Type Version
+# FPC 0 O/S Version 12.1X46-D20.5 by builder on 2014-05
+# FWDD O/S Version 12.1X46-D20.5 by builder on 2014-05
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis fpc detail
+# Slot 0 information:
+# State Online
+# Total CPU DRAM ---- CPU less FPC ----
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis hardware
+# Hardware inventory:
+# Item Version Part number Serial number Description
+# Chassis AL1015AK0094 SRX550
+# Midplane REV 22 750-035027 ACMD7424
+# Routing Engine REV 12 711-035026 ACMD7155 RE-SRXSME-SRX550
+# FPC 0 FPC
+# PIC 0 6x GE, 4x GE SFP Base PIC
+# Power Supply 0 Rev 04 740-024283 ZB57779 PS 645W AC
+# Power Supply 1 Rev 04 740-024283 YJ54313 PS 645W AC
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis hardware models
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis routing-engine
+# Routing Engine status:
+# Serial ID ACMD7155
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis scb
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis sfm detail
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show chassis ssb
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show system boot-messages
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2014, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 6 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 6 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 63XX CPU Rev. 0.10 with no FPU implemented
+# L1 Cache: I size 37kb(128 line), D size 32kb(128 line), direct mapped.
+# L2 Cache: Size 2048kb, 16 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# cpld0 on obio0
+# pcib0: <Cavium on-chip PCIe HOST bridge> on obio0
+# Disabling Octeon big bar support
+# pcib0: Initialized controller
+# pci0: <PCI bus> on pcib0
+# pci0: <processor> at device 0.0 (no driver attached)
+# pcib1: <Cavium on-chip PCIe HOST bridge> on obio0
+# pci1: <PCI bus> on pcib1
+# pcib2: <PCI-PCI bridge> mem 0xf0000000-0xf001ffff irq 0 at device 0.0 on pci1
+# pci2: <PCI bus> on pcib2
+# pcib3: <PCI-PCI bridge> irq 0 at device 1.0 on pci2
+# pci3: <PCI bus> on pcib3
+# pcib4: <PCI-PCI bridge> irq 0 at device 2.0 on pci2
+# pci4: <PCI bus> on pcib4
+# pcib5: <PCI-PCI bridge> irq 0 at device 4.0 on pci2
+# pci5: <PCI bus> on pcib5
+# pci5: <network, ethernet> at device 0.0 (no driver attached)
+# pcib6: <PCI-PCI bridge> irq 0 at device 5.0 on pci2
+# pci6: <PCI bus> on pcib6
+# pcib7: <PCI-PCI bridge> irq 0 at device 6.0 on pci2
+# pci7: <PCI bus> on pcib7
+# pcib8: <PCI-PCI bridge> irq 0 at device 7.0 on pci2
+# pci8: <PCI bus> on pcib8
+# pcib9: <PCI-PCI bridge> irq 0 at device 8.0 on pci2
+# pci9: <PCI bus> on pcib9
+# atapci0: <SiI 3132 SATA300 controller> mem 0xf0700000-0xf070007f,0xf0740000-0xf0743fff irq 0 at device 0.0 on pci9
+# ata0: <ATA channel 0> on atapci0
+# ata0: signature=00000101
+# ata1: <ATA channel 1> on atapci0
+# pcib10: <PCI-PCI bridge> irq 0 at device 9.0 on pci2
+# pci10: <PCI bus> on pcib10
+# pcib11: <PCI-PCI bridge> irq 0 at device 10.0 on pci2
+# pci11: <PCI bus> on pcib11
+# pcib12: <PCI-PCI bridge> irq 0 at device 12.0 on pci2
+# pci12: <PCI bus> on pcib12
+# pcib13: <PCI-PCI bridge> irq 0 at device 14.0 on pci2
+# pci13: <PCI bus> on pcib13
+# ehci0: <Octeon EHCI USB 2.0 controller> on obio0
+# usb0: EHCI version 1.0
+# usb0 on ehci0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 EHCI root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 2 ports with 2 removable, self powered
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 8MB> on obio0
+# Timecounter "mips" frequency 1300000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# ad0: Device does not support APM
+# ad0: 2000MB <CF 2GB 20100924> at ata0-master WDMA2
+# Trying to mount root from ufs:/dev/ad0s2a
+# WARNING: / was not properly dismounted
+# WARNING: / was not properly dismounted
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show version
+# Hostname: ODMHSAS-CENTRAL-OFFICE-OKC-SRX550 # Model: srx550 # JUNOS Software Release [12.1X46-D20.5] # # grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> file list /var/tmp detail # lrw-r--r-- 1 root wheel 11 May 14 2014 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show system uptime
+# System booted: 2015-05-23 14:42 CDT
+# Protocols started: 2015-05-23 14:43 CDT
+# Last configured: 2015-07-28 13:23 CDT by andrew
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show interface terse
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.0 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 up up
+#ge-0/0/1.0 up up
+#ge-0/0/2 up up
+#ge-0/0/2.0 up up
+#ge-0/0/3 up down
+#ge-0/0/3.0 up down
+#ge-0/0/4 down down
+#ge-0/0/5 up down
+#ge-0/0/5.0 up down
+#ge-0/0/6 down down
+#ge-0/0/7 down down
+#ge-0/0/8 down down
+#ge-0/0/9 down down
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#st0.0 up down
+#st0.12 up up
+#st0.13 up up
+#st0.14 up up
+#st0.15 up up
+#st0.16 up up
+#st0.17 up up
+#st0.18 up down
+#st0.19 up up
+#st0.20 up up
+#st0.21 up up
+#st0.22 up up
+#st0.23 up up
+#st0.24 up up
+#st0.25 up up
+#st0.26 up up
+#st0.27 up up
+#st0.30 up up
+#st0.31 up up
+#st0.32 up up
+#st0.33 up up
+#st0.34 up up
+#st0.35 up up
+#st0.36 up up
+#st0.37 up up
+#st0.38 up up
+#st0.63 up up
+#tap up up
+#vlan up up
+#vlan.3 up up
+#vlan.4 up up
+#vlan.5 up down
+#vlan.10 up down
+#vlan.20 up down
+#vlan.30 up down
+#vlan.40 up down
+#vlan.50 up down
+#vlan.90 up up
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show configuration
+## Last commit: 2015-07-28 13:23:21 CDT by andrew
+version 12.1X46-D20.5;
+system {
+ host-name ODMHSAS-CENTRAL-OFFICE-OKC-SRX550;
+ domain-name onenet.net;
+ time-zone America/Chicago;
+ authentication-order [ radius password ];
+ ports {
+ console log-out-on-disconnect;
+ }
+ root-authentication {
+# encrypted-password <removed>;
+ }
+ name-server {
+ 164.58.253.10;
+ 164.58.198.10;
+ }
+ radius-server {
+ 156.110.31.11 {
+# secret "<removed>"; ## SECRET-DATA
+ source-address 156.110.27.62;
+ }
+ }
+ radius-options {
+ attributes {
+ nas-ip-address 156.110.27.62;
+ }
+ }
+ login {
+ message "\n+----------------------------------------------------------------------------+\n| |\n| Managed by Oklahoma State Regents for Higher Education |\n| Oklahoma Network for Education Enrichment (ONENET) |\n| |\n| *** Unauthorized Use or Access Prohibited *** |\n| |\n| For more information, contact: |\n| |\n| Oklahoma State Regents for Higher Education |\n| Educational Telecommunications Network -- ONENET |\n| (888) 566-3638 |\n| !
info at onenet.net |\n| |\n+----------------------------------------------------------------------------+\n";
+ class admin {
+ idle-timeout 30;
+ permissions all;
+ }
+ class lockdown {
+ idle-timeout 2;
+ permissions view;
+ deny-commands .*;
+ deny-configuration .*;
+ }
+ class operator-local {
+ idle-timeout 15;
+ permissions [ access admin configure firewall interface network routing snmp system trace view ];
+ allow-commands "show log messages";
+ }
+ class robot {
+ idle-timeout 10;
+ permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+ }
+ user admin {
+ uid 1000;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user eng {
+ uid 2018;
+ class admin;
+ }
+ user rancid {
+ uid 2001;
+ class robot;
+ }
+ user remote {
+ uid 2002;
+ class operator-local;
+ }
+ user upgrades {
+ uid 2003;
+ class operator;
+ authentication {
+# ssh-rsa <removed>;
+ }
+ }
+ }
+ services {
+ ssh {
+ root-login deny;
+ protocol-version v2;
+ }
+ }
+ syslog {
+ archive size 10m files 5;
+ user * {
+ any emergency;
+ }
+ file messages {
+ any notice;
+ authorization info;
+ match "!(WEBFILTER_)";
+ }
+ file interactive-commands {
+ interactive-commands any;
+ }
+ file PROTECT-RE {
+ firewall any;
+ archive no-world-readable;
+ }
+ file traffic {
+ any any;
+ match RT_FLOW_SESSION;
+ }
+ file updown {
+ any any;
+ match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+ }
+ file webfilter {
+ any notice;
+ match WEBFILTER_;
+ }
+ }
+ max-configurations-on-flash 20;
+ max-configuration-rollbacks 20;
+ ntp {
+ server 164.58.3.98 prefer;
+ }
+}
+interfaces {
+ ge-0/0/0 {
+ description WAN;
+ unit 0 {
+ family ethernet-switching {
+ port-mode access;
+ vlan {
+ members 3;
+ }
+ }
+ }
+ }
+ ge-0/0/1 {
+ description L3VPN;
+ unit 0 {
+ family ethernet-switching {
+ port-mode access;
+ vlan {
+ members 4;
+ }
+ }
+ }
+ }
+ ge-0/0/2 {
+ description "Servers [NO-MONITOR]";
+ unit 0 {
+ family ethernet-switching {
+ port-mode trunk;
+ vlan {
+ members 90;
+ }
+ }
+ }
+ }
+ ge-0/0/3 {
+ description "Link to HP VPN [NO-MONITOR]";
+ unit 0 {
+ family ethernet-switching {
+ port-mode access;
+ vlan {
+ members 5;
+ }
+ }
+ }
+ }
+ ge-0/0/4 {
+ disable;
+ }
+ ge-0/0/5 {
+ description "Link to LAN [NO-MONITOR]";
+ unit 0 {
+ family ethernet-switching {
+ port-mode trunk;
+ vlan {
+ members [ 10 20 30 40 50 ];
+ }
+ }
+ }
+ }
+ ge-0/0/6 {
+ disable;
+ }
+ ge-0/0/7 {
+ disable;
+ }
+ ge-0/0/8 {
+ disable;
+ }
+ ge-0/0/9 {
+ disable;
+ }
+ lo0 {
+ unit 0 {
+ family inet {
+ filter {
+ input PROTECT-RE;
+ }
+ address 10.199.11.10/32;
+ }
+ }
+ }
+ st0 {
+ unit 0 {
+ description "HP-VPN [NO-MONITOR]";
+ family inet;
+ }
+ unit 12 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Ada;
+ family inet {
+ address 10.119.21.104/31;
+ }
+ }
+ unit 13 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Altus;
+ family inet {
+ address 10.119.21.106/31;
+ }
+ }
+ unit 14 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Alva;
+ family inet {
+ address 10.119.21.108/31;
+ }
+ }
+ unit 15 {
+ description Backup-VPN-to-ODMHSAS-Atoka;
+ family inet {
+ address 10.119.21.110/31;
+ }
+ }
+ unit 16 {
+ description Backup-VPN-to-ODMHSAS-TMHC-Duncan;
+ family inet {
+ address 10.119.21.112/31;
+ }
+ }
+ unit 17 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Enid;
+ family inet {
+ address 10.119.21.114/31;
+ }
+ }
+ unit 18 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Fairview;
+ family inet {
+ address 10.119.21.116/31;
+ }
+ }
+ unit 19 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Fort-Supply;
+ family inet {
+ address 10.119.21.118/31;
+ }
+ }
+ unit 20 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Guymon;
+ family inet {
+ address 10.119.21.120/31;
+ }
+ }
+ unit 21 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Heavener;
+ family inet {
+ address 10.119.21.122/31;
+ }
+ }
+ unit 22 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Holdenville;
+ family inet {
+ address 10.119.21.124/31;
+ }
+ }
+ unit 23 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Hugo;
+ family inet {
+ address 10.119.21.126/31;
+ }
+ }
+ unit 24 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Idabel;
+ family inet {
+ address 10.119.21.128/31;
+ }
+ }
+ unit 25 {
+ description Backup-VPN-to-ODMHSAS-Lawton-Main;
+ family inet {
+ address 10.119.21.130/31;
+ }
+ }
+ unit 26 {
+ description Backup-VPN-to-ODMHSAS-Lawton-Other;
+ family inet {
+ address 10.119.21.132/31;
+ }
+ }
+ unit 27 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-McAlester;
+ family inet {
+ address 10.119.21.134/31;
+ }
+ }
+ unit 30 {
+ description Backup-VPN-to-ODMHSAS-Leland-Wolf-Users;
+ family inet {
+ address 10.119.21.140/31;
+ }
+ }
+ unit 31 {
+ description Backup-VPN-to-ODMHSAS-Shepard-Mall;
+ family inet {
+ address 10.119.21.142/31;
+ }
+ }
+ unit 32 {
+ description Backup-VPN-to-ODMHSAS-OCCIC;
+ family inet {
+ address 10.119.21.144/31;
+ }
+ }
+ unit 33 {
+ description Backup-VPN-to-ODMHSAS-CAMHC-Stigler;
+ family inet {
+ address 10.119.21.146/31;
+ }
+ }
+ unit 34 {
+ description Backup-VPN-to-ODMHSAS-Tulsa-Behavioral-Health;
+ family inet {
+ address 10.119.21.148/31;
+ }
+ }
+ unit 35 {
+ description Backup-VPN-to-ODMHSAS-OFC-Vinita;
+ family inet {
+ address 10.119.21.150/31;
+ }
+ }
+ unit 36 {
+ description Backup-VPN-to-ODMHSAS-Rose-Rock-Recovery;
+ family inet {
+ address 10.119.21.152/31;
+ }
+ }
+ unit 37 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Woodward;
+ family inet {
+ address 10.119.21.154/31;
+ }
+ }
+ unit 38 {
+ description Backup-VPN-to-ODMHSAS-NCBH-Woodward-Lighthouse;
+ family inet {
+ address 10.119.21.156/31;
+ }
+ }
+ unit 63 {
+ description "Backup-VPN-to-ODMHSAS-Test [NO-MONITOR]";
+ family inet {
+ address 10.119.21.254/31;
+ }
+ }
+ }
+ vlan {
+ unit 3 {
+ description WAN;
+ family inet {
+ address 156.110.27.62/30;
+ }
+ }
+ unit 4 {
+ description L3VPN;
+ family inet {
+ address 10.119.20.101/31;
+ }
+ }
+ unit 5 {
+ description "HP [NO-MONITOR]";
+ family inet {
+ address 128.212.228.90/30;
+ }
+ }
+ unit 10 {
+ description "VOICE [NO-MONITOR]";
+ }
+ unit 20 {
+ description "DATA [NO-MONITOR]";
+ }
+ unit 30 {
+ description "VIDEO [NO-MONITOR]";
+ }
+ unit 40 {
+ description "GUEST [NO-MONITOR]";
+ }
+ unit 50 {
+ description "MGMT [NO-MONITOR]";
+ }
+ unit 90 {
+ description "SERVERS [NO-MONITOR]";
+ }
+ }
+}
+snmp {
+ description OneNet;
+ contact "Net Group";
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-write;
+ }
+}
+routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 156.110.27.61;
+ route 164.58.58.128/26 discard;
+ route 164.58.29.64/28 next-hop 10.119.20.100;
+ }
+ autonomous-system 64576;
+}
+protocols {
+ bgp {
+ group EBGP-ONENET-L3VPN {
+ type external;
+ import EBGP-ONENET-L3VPN-IMPORT;
+ family inet {
+ unicast {
+ loops 2;
+ }
+ }
+ export EBGP-ONENET-L3VPN-EXPORT;
+ peer-as 64575;
+ bfd-liveness-detection {
+ minimum-interval 2000;
+ multiplier 3;
+ }
+ neighbor 10.119.20.100 {
+ description BGP-to-OneNet-Hubsite;
+# authentication-key <removed>;
+ }
+ }
+ group EBGP-ONENET {
+ type external;
+ import EBGP-ONENET-IMPORT;
+ family inet {
+ unicast;
+ }
+ export EBGP-ONENET-EXPORT;
+ peer-as 5078;
+ bfd-liveness-detection {
+ minimum-interval 2000;
+ multiplier 3;
+ }
+ neighbor 156.110.27.61 {
+ description BGP-to-OneNet;
+# authentication-key <removed>;
+ }
+ }
+ group EBGP-ODMHSAS-VPN {
+ type external;
+ import EBGP-ODMHSAS-VPN-IMPORT;
+ family inet {
+ unicast {
+ loops 2;
+ }
+ }
+ export EBGP-ODMHSAS-VPN-EXPORT;
+ peer-as 64577;
+ neighbor 10.119.21.255 {
+ description "Backup-BGP-to-ODMHSAS-Test [NO-MONITOR]";
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.151 {
+ description Backup-BGP-to-ODMHSAS-OFC-Vinita;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.149 {
+ description Backup-BGP-to-ODMHSAS-Tulsa-Behavioral-Health;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.105 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Ada;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.107 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Altus;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.109 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Alva;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.111 {
+ description Backup-BGP-to-ODMHSAS-Atoka;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.131 {
+ description Backup-BGP-to-ODMHSAS-Lawton-Main;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.155 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Woodward;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.157 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Woodward-Lighthouse;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.147 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Stigler;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.113 {
+ description Backup-BGP-to-ODMHSAS-TMHC-Duncan;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.115 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Enid;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.117 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Fairview;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.123 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Heavener;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.125 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Holdenville;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.129 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Idabel;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.135 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-McAlester;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.127 {
+ description Backup-BGP-to-ODMHSAS-CAMHC-Hugo;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.119 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Fort-Supply;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.121 {
+ description Backup-BGP-to-ODMHSAS-NCBH-Guymon;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.143 {
+ description Backup-BGP-to-ODMHSAS-Shepard-Mall;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.145 {
+ description Backup-BGP-to-ODMHSAS-OCCIC;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.153 {
+ description Backup-BGP-to-ODMHSAS-Rose-Rock-Recovery;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.141 {
+ description Backup-BGP-to-ODMHSAS-Leland-Wolf-Users;
+# authentication-key <removed>;
+ }
+ neighbor 10.119.21.133 {
+ description Backup-BGP-to-ODMHSAS-Lawton-Other;
+# authentication-key <removed>;
+ }
+ }
+ }
+ lldp {
+ interface all;
+ }
+ stp;
+}
+policy-options {
+ prefix-list PRE-MGMT-SOURCES {
+ 156.110.31.0/27;
+ 156.110.31.32/28;
+ 164.58.253.0/24;
+ }
+ prefix-list PRE-LOCALIPv4-SOURCES {
+ apply-path "interfaces <*> unit <*> family inet address <*>";
+ }
+ policy-statement EBGP-ODMHSAS-VPN-EXPORT {
+ term EXPORT-DEFAULT {
+ from {
+ route-filter 0.0.0.0/0 exact;
+ }
+ then {
+ as-path-prepend "64576 64576 64576 64576 64576 64576";
+ accept;
+ }
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+ policy-statement EBGP-ODMHSAS-VPN-IMPORT {
+ term IMPORT-VPN {
+ from {
+ route-filter 10.0.0.0/8 orlonger;
+ route-filter 192.168.100.0/24 exact;
+ route-filter 192.168.101.0/24 exact;
+ route-filter 172.20.10.0/24 exact;
+ }
+ then {
+ as-path-prepend "64577 64577 64577 64577 64577 64577";
+ accept;
+ }
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+ policy-statement EBGP-ONENET-EXPORT {
+ term EXPORT {
+ from {
+ route-filter 164.58.58.128/26 exact;
+ }
+ then {
+ metric 100;
+ accept;
+ }
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+ policy-statement EBGP-ONENET-IMPORT {
+ term DEFAULT {
+ from {
+ route-filter 0.0.0.0/0 exact;
+ }
+ then accept;
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+ policy-statement EBGP-ONENET-L3VPN-EXPORT {
+ term EXPORT-DEFAULT {
+ from {
+ route-filter 0.0.0.0/0 exact;
+ }
+ then accept;
+ }
+ term EXPORT-ROUTES {
+ from {
+ route-filter 10.0.0.0/8 orlonger;
+ route-filter 192.168.100.0/24 exact;
+ route-filter 192.168.101.0/24 exact;
+ route-filter 172.20.10.0/24 exact;
+ }
+ then accept;
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+ policy-statement EBGP-ONENET-L3VPN-IMPORT {
+ term ROUTES {
+ from {
+ route-filter 10.0.0.0/8 orlonger;
+ }
+ then accept;
+ }
+ term LEGACY-ROUTES {
+ from {
+ route-filter 128.212.227.0/24 exact;
+ route-filter 128.212.228.0/25 exact;
+ route-filter 192.168.176.0/20 exact;
+ route-filter 192.168.0.0/16 orlonger;
+ route-filter 172.20.10.0/24 exact;
+ }
+ then accept;
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+}
+security {
+ ike {
+ proposal PRE-G2-AES128-SHA {
+ authentication-method pre-shared-keys;
+ dh-group group2;
+ authentication-algorithm sha1;
+ encryption-algorithm aes-128-cbc;
+ lifetime-seconds 28800;
+ }
+ proposal IKE-PROPOSAL-HP-VPN {
+ authentication-method pre-shared-keys;
+ dh-group group2;
+ authentication-algorithm md5;
+ encryption-algorithm 3des-cbc;
+ lifetime-seconds 3600;
+ }
+ policy IKE-ODMHSAS-TEST {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$kP5zIRSrKMp0clK8N-k.m5F/p0IRESFnpB1IcSwYg4GDQz6AtOaJ"; ## SECRET-DATA
+ }
+ policy IKE-OFC-VINITA {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$7pVw2mPQF69jHT36AOB7-dwgJjHmPfQgojq.mTQEcyrM8Y2aUDkeK"; ## SECRET-DATA
+ }
+ policy IKE-TCBH {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$UlHqPu0IESr/C1hSe8LUjiqfz/Cu0OIfT/tpu1INdbw4amPQn6AY2"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-ADA {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$A8Wo0BRx7Vw24vWds2aDjApuBEyvWx7NVEcvLXxdVqmf536IRSeK8Qz"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-ALTUS {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$.5Q3EhreM80ByKMXdV.PfQnC0BEhcrn/0IREyrYgoaDiF39pu1ZG"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-ALVA {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$z3lE69teK8XNdhSWxNbg4z3n9pBhSeKv8p0hrleW8ZUjimfAtOREykq"; ## SECRET-DATA
+ }
+ policy IKE-ATOKA {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$OlfERhyVb24JGX7YoJDq.O1IhrvX7Vbw2reX-dVY25QF3CtSyK8LN6/"; ## SECRET-DATA
+ }
+ policy IKE-LAWTON-MAIN {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$oXGDH9CuOIEz3pBIceKoJZDkPz39CAuk.z6/9pu8X7NwYiHmTQndV"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-WOODWARD {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$DGk.f0ORhyl9AIcyKLXDiH.5F9A0OBR5Q9pu0IR-VwsoJPfz6/t2g"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-LIGHTHOUSE {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$jXqm5OBEcreCtRSrvXxjHkmT3CtOB1ETzCu0OREdbsYaZf5F/9pg4"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-STIGLER {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$0GrLIESdVYgaZLxs4aUkq0B1EyKLxdVbYylLN-dsYfTzF9AcSeW87n6"; ## SECRET-DATA
+ }
+ policy IKE-TMHC-DUNCAN {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$E9Zylv2gJGjHdbaUjq5TEcSlMXdb2g4JM8dsY2aJ369C0BKvLN-wtp"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-ENID {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$BIKEcrbwgoZUxN2aZj.mBIRclMxNbwsglKxdVb2gTz3nApyrvLX-/9"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-FAIRVIEW {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$s54aGF39AuOP5/tu1cSs2gaUHP5F3n9UjPQzF/9evW8NdZGi.mTXx"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-HEAVENER {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$7TVw2mPQF69jHT36AOB7-dwgJjHmPfQgojq.mTQEcyrM8Y2aUDkeK"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-HOLDENVILLE {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$VpYgaTQn/Apqm39A0REVwsgJDqmTQznJGqf5T3nylKvX7oaUHkPW8"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-IDABEL {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$KYY8XNUDk.fT4aHmfz/9KMWX-w4aUDjk-V4ZGUHkp0B1cy7Nb2gJRE"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-MCALESTER {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$A5v.0BRx7Vw24vWds2aDjApuBEyvWx7NVEcvLXxdVqmf536IRSeK8Qz"; ## SECRET-DATA
+ }
+ policy IKE-CAMHC-HUGO {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$gIJGj6/tuBITzA0BErlgoaGi.Tz6/9tikT3n6AtM8XxVwDjqf5FN-"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-FT-SUPPLY {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$fz3/SyKMLx1ReWLNwsfTQ39p1RSyrK9A1hcSeK4aZGHq6/tOBEDj"; ## SECRET-DATA
+ }
+ policy IKE-NCBH-GUYMON {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$Dok.f0ORhyl9AIcyKLXDiH.5F9A0OBR5Q9pu0IR-VwsoJPfz6/t2g"; ## SECRET-DATA
+ }
+ policy IKE-SHEPARD-MALL {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$MTOX7dji.PTzaZqfT3CAM8L7VYaZjiH.VwaUDjq.0BIRyl-ds4oGhc"; ## SECRET-DATA
+ }
+ policy IKE-OCCIC {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$17WhSlws4aGD7-gJGimP1RESeW7-wsY4ev7Vbwg4QFn6turlMXxd9C"; ## SECRET-DATA
+ }
+ policy IKE-ROSE-ROCK-RECOVERY {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$VYYgaTQn/Apqm39A0REVwsgJDqmTQznJGqf5T3nylKvX7oaUHkPW8"; ## SECRET-DATA
+ }
+ policy IKE-LELAND-WOLF-USERS {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$jYqm5OBEcreCtRSrvXxjHkmT3CtOB1ETzCu0OREdbsYaZf5F/9pg4"; ## SECRET-DATA
+ }
+ policy IKE-HP-VPN {
+ proposals IKE-PROPOSAL-HP-VPN;
+ pre-shared-key ascii-text "$9$85tx7Vs2aHqfDi6Au0hcylK8X-"; ## SECRET-DATA
+ }
+ policy IKE-LAWTON-OTHER {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+ pre-shared-key ascii-text "$9$oXGDH9CuOIEz3pBIceKoJZDkPz39CAuk.z6/9pu8X7NwYiHmTQndV"; ## SECRET-DATA
+ }
+ gateway IKE-GATE-ODMHSAS-TEST {
+ ike-policy IKE-ODMHSAS-TEST;
+ address 166.130.131.48;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-OFC-VINITA {
+ ike-policy IKE-OFC-VINITA;
+ address 166.130.29.34;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-TCBH {
+ ike-policy IKE-TCBH;
+ address 166.130.131.65;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-ADA {
+ ike-policy IKE-CAMHC-ADA;
+ address 166.130.131.61;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-ALTUS {
+ ike-policy IKE-CAMHC-ALTUS;
+ address 166.130.131.64;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-ALVA {
+ ike-policy IKE-NCBH-ALVA;
+ address 166.130.131.55;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-ATOKA {
+ ike-policy IKE-ATOKA;
+ address 166.130.131.53;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-LAWTON-MAIN {
+ ike-policy IKE-LAWTON-MAIN;
+ address 166.130.131.56;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-WOODWARD {
+ ike-policy IKE-NCBH-WOODWARD;
+ address 166.130.131.47;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-LIGHTHOUSE {
+ ike-policy IKE-NCBH-LIGHTHOUSE;
+ address 166.130.131.70;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-STIGLER {
+ ike-policy IKE-CAMHC-STIGLER;
+ address 166.130.131.66;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-TMHC-DUNCAN {
+ ike-policy IKE-TMHC-DUNCAN;
+ address 166.130.131.68;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-ENID {
+ ike-policy IKE-NCBH-ENID;
+ address 166.130.131.69;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-FAIRVIEW {
+ ike-policy IKE-NCBH-FAIRVIEW;
+ address 166.130.131.62;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-HEAVENER {
+ ike-policy IKE-CAMHC-HEAVENER;
+ address 166.130.131.60;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-HOLDENVILLE {
+ ike-policy IKE-CAMHC-HOLDENVILLE;
+ address 166.130.131.57;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-IDABEL {
+ ike-policy IKE-CAMHC-IDABEL;
+ address 166.130.131.27;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-MCALESTER {
+ ike-policy IKE-CAMHC-MCALESTER;
+ address 166.130.131.73;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-CAMHC-HUGO {
+ ike-policy IKE-CAMHC-HUGO;
+ address 166.130.131.54;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-FT-SUPPLY {
+ ike-policy IKE-NCBH-FT-SUPPLY;
+ address 166.130.131.67;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-NCBH-GUYMON {
+ ike-policy IKE-NCBH-GUYMON;
+ address 166.130.131.58;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-SHEPARD-MALL {
+ ike-policy IKE-SHEPARD-MALL;
+ address 166.130.131.59;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-OCCIC {
+ ike-policy IKE-OCCIC;
+ address 166.130.131.52;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-ROSE-ROCK-RECOVERY {
+ ike-policy IKE-ROSE-ROCK-RECOVERY;
+ address 166.130.131.25;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-LELAND-WOLF-USERS {
+ ike-policy IKE-LELAND-WOLF-USERS;
+ address 166.130.131.71;
+ external-interface vlan.3;
+ }
+ gateway IKE-GATE-HP-VPN {
+ ike-policy IKE-ODMHSAS-TEST;
+ address 70.184.28.104;
+ external-interface vlan.5;
+ }
+ gateway IKE-GATE-LAWTON-OTHER {
+ ike-policy IKE-LAWTON-OTHER;
+ address 166.130.4.159;
+ external-interface vlan.3;
+ }
+ }
+ ipsec {
+ vpn-monitor-options {
+ interval 60;
+ threshold 5;
+ }
+ proposal G2-ESP-AES128-SHA {
+ description group2;
+ protocol esp;
+ authentication-algorithm hmac-sha1-96;
+ encryption-algorithm aes-128-cbc;
+ lifetime-seconds 3600;
+ }
+ proposal IPSEC-PROPOSAL-HP-VPN {
+ protocol esp;
+ authentication-algorithm hmac-md5-96;
+ encryption-algorithm 3des-cbc;
+ lifetime-seconds 28800;
+ }
+ policy VPN-POLICY-ODMHSAS-TEST {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-OFC-VINITA {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-TCBH {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-ADA {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-ALTUS {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-ALVA {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-ATOKA {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-LAWTON-MAIN {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-WOODWARD {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-LIGHTHOUSE {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-STIGLER {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-TMHC-DUNCAN {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-ENID {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-FAIRVIEW {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-HEAVENER {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-HOLDENVILLE {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-IDABEL {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-MCALESTER {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-CAMHC-HUGO {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-FT-SUPPLY {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-NCBH-GUYMON {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-SHEPARD-MALL {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-OCCIC {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-ROSE-ROCK-RECOVERY {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-LELAND-WOLF-USERS {
+ proposals G2-ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-HP-VPN {
+ proposals IPSEC-PROPOSAL-HP-VPN;
+ }
+ policy VPN-POLICY-LAWTON-OTHER {
+ proposals G2-ESP-AES128-SHA;
+ }
+ inactive: vpn IPSEC-VPN-ODMHSAS-TEST {
+ bind-interface st0.63;
+ vpn-monitor {
+ optimized;
+ source-interface st0.63;
+ destination-ip 10.119.21.255;
+ }
+ ike {
+ gateway IKE-GATE-ODMHSAS-TEST;
+ ipsec-policy VPN-POLICY-ODMHSAS-TEST;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-OFC-VINITA {
+ bind-interface st0.35;
+ vpn-monitor {
+ optimized;
+ source-interface st0.35;
+ destination-ip 10.119.21.151;
+ }
+ ike {
+ gateway IKE-GATE-OFC-VINITA;
+ ipsec-policy VPN-POLICY-OFC-VINITA;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-TCBH {
+ bind-interface st0.34;
+ vpn-monitor {
+ optimized;
+ source-interface st0.34;
+ destination-ip 10.119.21.149;
+ }
+ ike {
+ gateway IKE-GATE-TCBH;
+ ipsec-policy VPN-POLICY-TCBH;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-ADA {
+ bind-interface st0.12;
+ vpn-monitor {
+ optimized;
+ source-interface st0.12;
+ destination-ip 10.119.21.105;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-ADA;
+ ipsec-policy VPN-POLICY-CAMHC-ADA;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-ALTUS {
+ bind-interface st0.13;
+ vpn-monitor {
+ optimized;
+ source-interface st0.13;
+ destination-ip 10.119.21.107;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-ALTUS;
+ ipsec-policy VPN-POLICY-CAMHC-ALTUS;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-ALVA {
+ bind-interface st0.14;
+ vpn-monitor {
+ optimized;
+ source-interface st0.14;
+ destination-ip 10.119.21.109;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-ALVA;
+ ipsec-policy VPN-POLICY-NCBH-ALVA;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-ATOKA {
+ bind-interface st0.15;
+ vpn-monitor {
+ optimized;
+ source-interface st0.15;
+ destination-ip 10.119.21.111;
+ }
+ ike {
+ gateway IKE-GATE-ATOKA;
+ ipsec-policy VPN-POLICY-ATOKA;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-LAWTON-MAIN {
+ bind-interface st0.25;
+ vpn-monitor {
+ optimized;
+ source-interface st0.25;
+ destination-ip 10.119.21.131;
+ }
+ ike {
+ gateway IKE-GATE-LAWTON-MAIN;
+ ipsec-policy VPN-POLICY-LAWTON-MAIN;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-WOODWARD {
+ bind-interface st0.37;
+ vpn-monitor {
+ optimized;
+ source-interface st0.37;
+ destination-ip 10.119.21.155;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-WOODWARD;
+ ipsec-policy VPN-POLICY-NCBH-WOODWARD;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-LIGHTHOUSE {
+ bind-interface st0.38;
+ vpn-monitor {
+ optimized;
+ source-interface st0.38;
+ destination-ip 10.119.21.157;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-LIGHTHOUSE;
+ ipsec-policy VPN-POLICY-NCBH-LIGHTHOUSE;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-STIGLER {
+ bind-interface st0.33;
+ vpn-monitor {
+ optimized;
+ source-interface st0.33;
+ destination-ip 10.119.21.147;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-STIGLER;
+ ipsec-policy VPN-POLICY-CAMHC-STIGLER;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-TMHC-DUNCAN {
+ bind-interface st0.16;
+ vpn-monitor {
+ optimized;
+ source-interface st0.16;
+ destination-ip 10.119.21.113;
+ }
+ ike {
+ gateway IKE-GATE-TMHC-DUNCAN;
+ ipsec-policy VPN-POLICY-TMHC-DUNCAN;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-ENID {
+ bind-interface st0.17;
+ vpn-monitor {
+ optimized;
+ source-interface st0.17;
+ destination-ip 10.119.21.115;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-ENID;
+ ipsec-policy VPN-POLICY-NCBH-ENID;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-FAIRVIEW {
+ bind-interface st0.18;
+ vpn-monitor {
+ optimized;
+ source-interface st0.18;
+ destination-ip 10.119.21.117;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-FAIRVIEW;
+ ipsec-policy VPN-POLICY-NCBH-FAIRVIEW;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-HEAVENER {
+ bind-interface st0.21;
+ vpn-monitor {
+ optimized;
+ source-interface st0.21;
+ destination-ip 10.119.21.123;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-HEAVENER;
+ ipsec-policy VPN-POLICY-CAMHC-HEAVENER;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-HOLDENVILLE {
+ bind-interface st0.22;
+ vpn-monitor {
+ optimized;
+ source-interface st0.22;
+ destination-ip 10.119.21.125;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-HOLDENVILLE;
+ ipsec-policy VPN-POLICY-CAMHC-HOLDENVILLE;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-IDABEL {
+ bind-interface st0.24;
+ vpn-monitor {
+ optimized;
+ source-interface st0.24;
+ destination-ip 10.119.21.129;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-IDABEL;
+ ipsec-policy VPN-POLICY-CAMHC-IDABEL;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-MCALESTER {
+ bind-interface st0.27;
+ vpn-monitor {
+ optimized;
+ source-interface st0.27;
+ destination-ip 10.119.21.135;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-MCALESTER;
+ ipsec-policy VPN-POLICY-CAMHC-MCALESTER;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-CAMHC-HUGO {
+ bind-interface st0.23;
+ vpn-monitor {
+ optimized;
+ source-interface st0.23;
+ destination-ip 10.119.21.127;
+ }
+ ike {
+ gateway IKE-GATE-CAMHC-HUGO;
+ ipsec-policy VPN-POLICY-CAMHC-HUGO;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-FT-SUPPLY {
+ bind-interface st0.19;
+ vpn-monitor {
+ optimized;
+ source-interface st0.19;
+ destination-ip 10.119.21.119;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-FT-SUPPLY;
+ ipsec-policy VPN-POLICY-NCBH-FT-SUPPLY;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-NCBH-GUYMON {
+ bind-interface st0.20;
+ vpn-monitor {
+ optimized;
+ source-interface st0.20;
+ destination-ip 10.119.21.121;
+ }
+ ike {
+ gateway IKE-GATE-NCBH-GUYMON;
+ ipsec-policy VPN-POLICY-NCBH-GUYMON;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-SHEPARD-MALL {
+ bind-interface st0.31;
+ vpn-monitor {
+ optimized;
+ source-interface st0.31;
+ destination-ip 10.119.21.143;
+ }
+ ike {
+ gateway IKE-GATE-SHEPARD-MALL;
+ ipsec-policy VPN-POLICY-SHEPARD-MALL;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-OCCIC {
+ bind-interface st0.32;
+ vpn-monitor {
+ optimized;
+ source-interface st0.32;
+ destination-ip 10.119.21.145;
+ }
+ ike {
+ gateway IKE-GATE-OCCIC;
+ ipsec-policy VPN-POLICY-OCCIC;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-ROSE-ROCK-RECOVERY {
+ bind-interface st0.36;
+ vpn-monitor {
+ optimized;
+ source-interface st0.36;
+ destination-ip 10.119.21.153;
+ }
+ ike {
+ gateway IKE-GATE-ROSE-ROCK-RECOVERY;
+ ipsec-policy VPN-POLICY-ROSE-ROCK-RECOVERY;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-LELAND-WOLF-USERS {
+ bind-interface st0.30;
+ vpn-monitor {
+ optimized;
+ source-interface st0.30;
+ destination-ip 10.119.21.141;
+ }
+ ike {
+ gateway IKE-GATE-LELAND-WOLF-USERS;
+ ipsec-policy VPN-POLICY-LELAND-WOLF-USERS;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-HP-VPN {
+ bind-interface st0.0;
+ ike {
+ gateway IKE-GATE-HP-VPN;
+ ipsec-policy VPN-POLICY-HP-VPN;
+ }
+ traffic-selector HP-TS-01 {
+ local-ip 192.168.133.0/24;
+ remote-ip 128.212.227.0/24;
+ }
+ traffic-selector HP-TS-02 {
+ local-ip 192.168.133.0/24;
+ remote-ip 128.212.228.0/25;
+ }
+ traffic-selector HP-TS-03 {
+ local-ip 192.168.133.0/24;
+ remote-ip 192.168.176.0/20;
+ }
+ traffic-selector HP-TS-04 {
+ local-ip 192.168.133.0/24;
+ remote-ip 192.85.171.0/24;
+ }
+ traffic-selector HP-TS-05 {
+ local-ip 192.168.133.0/24;
+ remote-ip 192.168.69.0/24;
+ }
+ traffic-selector HP-TS-06 {
+ local-ip 192.168.133.0/24;
+ remote-ip 192.168.3.17/32;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-LAWTON-OTHER {
+ bind-interface st0.26;
+ vpn-monitor {
+ optimized;
+ source-interface st0.26;
+ destination-ip 10.119.21.133;
+ }
+ ike {
+ gateway IKE-GATE-LAWTON-OTHER;
+ ipsec-policy VPN-POLICY-LAWTON-OTHER;
+ }
+ establish-tunnels immediately;
+ }
+ }
+ utm {
+ feature-profile {
+ web-filtering {
+ type websense-redirect;
+ websense-redirect {
+ profile JUNOS-WF-WEBSENSE-DEFAULT {
+ server {
+ host 10.2.11.237;
+ port 15868;
+ }
+ fallback-settings {
+ default log-and-permit;
+ }
+ timeout 10;
+ sockets 8;
+ }
+ }
+ }
+ }
+ utm-policy WEBSENSE-UTM-POLICY {
+ web-filtering {
+ http-profile JUNOS-WF-WEBSENSE-DEFAULT;
+ }
+ }
+ }
+ forwarding-options {
+ family {
+ inet6 {
+ mode flow-based;
+ }
+ }
+ }
+ flow {
+ tcp-mss {
+ ipsec-vpn {
+ mss 1360;
+ }
+ }
+ }
+ screen {
+ ids-option UNTRUST-SCREEN {
+ icmp {
+ ping-death;
+ }
+ ip {
+ source-route-option;
+ tear-drop;
+ }
+ tcp {
+ syn-flood {
+ alarm-threshold 1024;
+ attack-threshold 200;
+ source-threshold 1024;
+ destination-threshold 2048;
+ timeout 20;
+ }
+ land;
+ }
+ }
+ }
+ nat {
+ source {
+ pool 164_58_58_131 {
+ address {
+ 164.58.58.131/32;
+ }
+ }
+ pool HP-VPN-POOL {
+ address {
+ 192.168.133.1/32 to 192.168.133.200/32;
+ }
+ }
+ rule-set TRUST-TO-UNTRUST-NAT {
+ from zone TRUST;
+ to zone UNTRUST;
+ rule NAT-TRUST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ pool {
+ 164_58_58_131;
+ }
+ }
+ }
+ }
+ }
+ rule-set TRUST-TO-HP-VPN-NAT {
+ from zone TRUST;
+ to zone HP-VPN;
+ rule NAT-TRUST-TO-HP-VPN {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ pool {
+ HP-VPN-POOL;
+ }
+ }
+ }
+ }
+ }
+ }
+ static {
+ rule-set HP-VPN-NAT {
+ from zone HP-VPN;
+ rule 192_168_133_216 {
+ match {
+ destination-address 192.168.133.216/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.0.20/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_218 {
+ match {
+ destination-address 192.168.133.218/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.11.23/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_219 {
+ match {
+ destination-address 192.168.133.219/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.17.0.12/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_221 {
+ match {
+ destination-address 192.168.133.221/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.17.0.2/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_224 {
+ match {
+ destination-address 192.168.133.224/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.16.0.9/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_225 {
+ match {
+ destination-address 192.168.133.225/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.16.0.3/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_226 {
+ match {
+ destination-address 192.168.133.226/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.16.3.92/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_227 {
+ match {
+ destination-address 192.168.133.227/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.1.255.4/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_228 {
+ match {
+ destination-address 192.168.133.228/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.6.0.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_229 {
+ match {
+ destination-address 192.168.133.229/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.6.12/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_230 {
+ match {
+ destination-address 192.168.133.230/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.5.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_231 {
+ match {
+ destination-address 192.168.133.231/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.7.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_232 {
+ match {
+ destination-address 192.168.133.232/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.2.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_233 {
+ match {
+ destination-address 192.168.133.233/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.8.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_234 {
+ match {
+ destination-address 192.168.133.234/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.6.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_235 {
+ match {
+ destination-address 192.168.133.235/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.4.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_236 {
+ match {
+ destination-address 192.168.133.236/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.3.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_237 {
+ match {
+ destination-address 192.168.133.237/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.21.1.11/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_238 {
+ match {
+ destination-address 192.168.133.238/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.7.0.10/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_239 {
+ match {
+ destination-address 192.168.133.239/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.7.0.8/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_240 {
+ match {
+ destination-address 192.168.133.240/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.1.255.1/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_241 {
+ match {
+ destination-address 192.168.133.241/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.5.17/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_242 {
+ match {
+ destination-address 192.168.133.242/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.5.53/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_243 {
+ match {
+ destination-address 192.168.133.243/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.7.0.9/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_244 {
+ match {
+ destination-address 192.168.133.244/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.3.2.5/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_245 {
+ match {
+ destination-address 192.168.133.245/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.3.1.1/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_246 {
+ match {
+ destination-address 192.168.133.246/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.5.0.18/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_247 {
+ match {
+ destination-address 192.168.133.247/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.5.0.21/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_248 {
+ match {
+ destination-address 192.168.133.248/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.5.0.8/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_250 {
+ match {
+ destination-address 192.168.133.250/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.23.1.2/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_251 {
+ match {
+ destination-address 192.168.133.251/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.23.1.3/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_252 {
+ match {
+ destination-address 192.168.133.252/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.5.1/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_253 {
+ match {
+ destination-address 192.168.133.253/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.5.2/32;
+ }
+ }
+ }
+ }
+ rule 192_168_133_254 {
+ match {
+ destination-address 192.168.133.254/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 10.2.5.23/32;
+ }
+ }
+ }
+ }
+ }
+ }
+ }
+ policies {
+ from-zone TRUST to-zone UNTRUST {
+ policy WEBSENSE-TRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application junos-http;
+ }
+ then {
+ permit {
+ application-services {
+ utm-policy WEBSENSE-UTM-POLICY;
+ }
+ }
+ }
+ }
+ policy TRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TRUST to-zone TRUST {
+ policy TRUST-TO-TRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TRUST to-zone HP-VPN {
+ policy TRUST-TO-HP-VPN {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone HP-VPN to-zone TRUST {
+ policy HP-VPN-TO-TRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ }
+ zones {
+ security-zone TRUST {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ }
+ protocols {
+ bgp;
+ bfd;
+ }
+ }
+ interfaces {
+ vlan.4;
+ st0.63;
+ st0.35;
+ st0.34;
+ st0.12;
+ st0.13;
+ st0.14;
+ st0.15;
+ st0.25;
+ st0.37;
+ st0.38;
+ st0.33;
+ st0.16;
+ st0.17;
+ st0.18;
+ st0.21;
+ st0.22;
+ st0.24;
+ st0.27;
+ st0.23;
+ st0.19;
+ st0.20;
+ st0.31;
+ st0.32;
+ st0.36;
+ st0.30;
+ vlan.10;
+ vlan.20;
+ vlan.30;
+ vlan.40;
+ vlan.50;
+ vlan.90;
+ st0.26;
+ }
+ }
+ security-zone UNTRUST {
+ screen UNTRUST-SCREEN;
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ ike;
+ }
+ protocols {
+ bgp;
+ bfd;
+ }
+ }
+ interfaces {
+ vlan.3;
+ }
+ }
+ security-zone HP-VPN-LINK {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ ike;
+ }
+ }
+ interfaces {
+ vlan.5;
+ }
+ }
+ security-zone HP-VPN {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ interfaces {
+ st0.0;
+ }
+ }
+ }
+}
+firewall {
+ family inet {
+ filter PROTECT-RE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol udp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term ALL-TRAFFIC {
+ then accept;
+ }
+ }
+ }
+}
+routing-instances {
+ HP-VPN-LINK {
+ instance-type virtual-router;
+ interface vlan.5;
+ routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 128.212.228.89;
+ }
+ }
+ }
+}
+vlans {
+ VLAN-10 {
+ vlan-id 10;
+ l3-interface vlan.10;
+ }
+ VLAN-20 {
+ vlan-id 20;
+ l3-interface vlan.20;
+ }
+ VLAN-3 {
+ vlan-id 3;
+ l3-interface vlan.3;
+ }
+ VLAN-30 {
+ vlan-id 30;
+ l3-interface vlan.30;
+ }
+ VLAN-4 {
+ vlan-id 4;
+ l3-interface vlan.4;
+ }
+ VLAN-40 {
+ vlan-id 40;
+ l3-interface vlan.40;
+ }
+ VLAN-5 {
+ vlan-id 5;
+ l3-interface vlan.5;
+ }
+ VLAN-50 {
+ vlan-id 50;
+ l3-interface vlan.50;
+ }
+ VLAN-90 {
+ vlan-id 90;
+ l3-interface vlan.90;
+ }
+}
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show ospf neighbor
+# OSPF instance is not running
+#
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show bfd session
+ Detect Transmit
+Address State Interface Time Interval Multiplier
+10.119.20.100 Up vlan.4 6.000 2.000 3
+156.110.27.61 Up vlan.3 6.000 2.000 3
+
+2 sessions, 2 clients
+Cumulative transmit rate 1.0 pps, cumulative receive rate 1.0 pps
+
+# grnoc-mon at ODMHSAS-CENTRAL-OFFICE-OKC-SRX550> show system snapshot media internal
+# Information for snapshot on internal (/dev/ad0s1a) (backup)
+# Creation date: Apr 21 01:07:13 2015
+# JUNOS version on snapshot:
+# junos : 12.1X46-D20.5-domestic
+# Information for snapshot on internal (/dev/ad0s2a) (primary)
+# Creation date: May 23 14:42:38 2015
+# JUNOS version on snapshot:
+# junos : 12.1X46-D20.5-domestic
+#
Index: configs/oktaha-srx240.onenet.net
===================================================================
--- configs/oktaha-srx240.onenet.net (revision 133170)
+++ configs/oktaha-srx240.onenet.net (working copy)
@@ -114,8 +114,8 @@
# total files: 1
#
# grnoc-mon at OKTAHA-SRX240-LEASED-004898> show system uptime
-# System booted: 2015-08-07 11:18 CDT
-# Protocols started: 2015-08-07 11:21 CDT
+# System booted: 2015-09-20 13:36 CDT
+# Protocols started: 2015-09-20 13:39 CDT
# Last configured: 2015-08-07 14:03 CDT by sean
#
# grnoc-mon at OKTAHA-SRX240-LEASED-004898> show interface terse
More information about the Nocrancid
mailing list