[Nocrancid] autopop-onenet.net router config diffs

rancid at rancid.noc.onenet.net rancid at rancid.noc.onenet.net
Wed Jan 11 19:04:01 CST 2017


Index: router.db
===================================================================
--- router.db	(revision 149727)
+++ router.db	(working copy)
@@ -403,6 +403,7 @@
 lawton-ps.client.onenet.net:juniper:up
 LAWTON-PUBLIC-LIBRARY.client.onenet.net:juniper:up
 leflore-ps.client.onenet.net:juniper:up
+legal-aid-okc.client.onenet.net:juniper:up
 legal-aid-tulsa.client.onenet.net:juniper:up
 lone-wolf-ps.client.onenet.net:juniper:up
 lowery-ps.client.onenet.net:juniper:up
Index: routers.up
===================================================================
--- routers.up	(revision 149712)
+++ routers.up	(working copy)
@@ -335,6 +335,7 @@
 lawton-ps.client.onenet.net:juniper
 lawton-public-library.client.onenet.net:juniper
 leflore-ps.client.onenet.net:juniper
+legal-aid-okc.client.onenet.net:juniper
 legal-aid-tulsa.client.onenet.net:juniper
 lone-wolf-ps.client.onenet.net:juniper
 lowery-ps.client.onenet.net:juniper
Index: configs/allen-public-library.client.onenet.net
===================================================================
--- configs/allen-public-library.client.onenet.net	(revision 149722)
+++ configs/allen-public-library.client.onenet.net	(working copy)
@@ -137,8 +137,8 @@
 #ge-0/0/2.0 up up
 #ge-0/0/3 up down
 #ge-0/0/3.0 up down
-#ge-0/0/4 up up
-#ge-0/0/4.0 up up
+#ge-0/0/4 up down
+#ge-0/0/4.0 up down
 #ge-0/0/5 up up
 #ge-0/0/5.0 up up
 #ge-0/0/6 up up
Index: configs/asher-ps.nid.onenet.net
===================================================================
--- configs/asher-ps.nid.onenet.net	(revision 149470)
+++ configs/asher-ps.nid.onenet.net	(working copy)
@@ -557,7 +557,7 @@
 network-element ne-1
   configure nte nte112pro-1-1-1
     configure access-port access-1-1-1-3
-      admin-state unassigned
+      admin-state maintenance
       service-type epl
       speed auto
       port-shaped-speed 0
@@ -1911,10 +1911,11 @@
   configure nte nte112pro-1-1-1
     configure access-port access-1-1-1-3
       configure flow flow-1-1-1-3-1
+        admin-state management
         circuit-name ""
         es-frame-loss-threshold 1
         ses-frame-loss-threshold-ratio 30
-        access-interface access-1-1-1-3 network-interface network-1-1-1-1 push 3-0 none
+        access-interface access-1-1-1-3 network-interface network-1-1-1-1 push 400-0 none
         a2n-shaping-type flow-based
         policing enabled
         policing-control a2n-n2a
@@ -2098,8 +2099,8 @@
     configure access-port access-1-1-1-3
       configure flow flow-1-1-1-3-1
         configure a2n-policer a2n_policer-1-1-1-3-1-0
-          eir 0
-          ebs 0
+          ebs 1024
+          eir 100032000
           cir 0
           cbs 0
           color-marking enabled
Index: configs/core2.dc.onenet.net
===================================================================
--- configs/core2.dc.onenet.net	(revision 149717)
+++ configs/core2.dc.onenet.net	(working copy)
@@ -1,12 +1,12 @@
 # RANCID-CONTENT-TYPE: juniper
 #
 # grnoc-mon at MX480_DC_02_RE0> show system commit 
+#   2017-01-11 18:19:24 CST by andrew via cli commit synchronize
 #   2017-01-11 11:57:47 CST by andrew via cli commit synchronize
 #   2017-01-08 15:23:08 CST by andrew via cli commit confirmed, rollback in 3mins synchronize
 #   2017-01-08 12:09:14 CST by andrew via cli commit synchronize
 #   2017-01-08 11:58:05 CST by andrew via cli commit synchronize
 #   2017-01-08 11:40:19 CST by andrew via cli commit synchronize
-#   2017-01-08 11:37:58 CST by andrew via cli commit synchronize
 # grnoc-mon at MX480_DC_02_RE0> show chassis environment 
 # Class Item                           Status     Measurement
 # Temp  PEM 0                          OK        
@@ -326,7 +326,7 @@
 # grnoc-mon at MX480_DC_02_RE0> show system uptime 
 # System booted: 2016-09-03 21:49 CDT 
 # Protocols started: 2016-09-03 21:51 CDT 
-# Last configured: 2017-01-11 11:57 CST  by andrew
+# Last configured: 2017-01-11 18:19 CST  by andrew
 # 
 # {master}
 # grnoc-mon at MX480_DC_02_RE0> show interface terse 
@@ -548,7 +548,6 @@
 #irb.2714 up up
 #irb.2716 up up
 #irb.2717 up up
-#irb.2718 up up
 #irb.2719 up up
 #irb.2723 up up
 #irb.2724 up up
@@ -595,7 +594,7 @@
 #pp0 up up
 #tap up up
 # grnoc-mon at MX480_DC_02_RE0> show configuration 
-## Last commit: 2017-01-11 11:57:47 CST by andrew
+## Last commit: 2017-01-11 18:19:24 CST by andrew
 version 12.3R7.7;
 groups {
     re0 {
@@ -1656,12 +1655,6 @@
                 address 164.58.25.201/29;
             }
         }
-        unit 2718 {
-            description "un_ou_vm___01-2718 [DECOM]";
-            family inet {
-                address 164.58.25.229/30;
-            }
-        }
         unit 2719 {
             description un_samplic_01-2719;
             family inet {
@@ -3763,10 +3756,6 @@
         vlan-id 2712;
         routing-interface irb.2712;
     }
-    un_ou_vm___01-2718 {
-        vlan-id 2718;
-        routing-interface irb.2718;
-    }
     un_outside-01-0250 {
         vlan-id 250;
         routing-interface irb.250;
Index: configs/core5.tul.onenet.net
===================================================================
--- configs/core5.tul.onenet.net	(revision 149722)
+++ configs/core5.tul.onenet.net	(working copy)
@@ -1,12 +1,12 @@
 # RANCID-CONTENT-TYPE: juniper
 #
 # grnoc-mon at TULSA-CORE5-MX480-RE0> show system commit 
+#   2017-01-11 18:41:57 CST by andrew via cli commit synchronize
 #   2017-01-11 14:01:39 CST by andrew via cli commit synchronize
 #   2017-01-11 14:00:38 CST by andrew via cli commit synchronize
 #   2017-01-11 13:52:12 CST by andrew via cli commit synchronize
 #   2017-01-11 13:06:46 CST by andrew via cli commit synchronize
 #   2017-01-11 12:58:11 CST by sky via cli commit synchronize
-#   2017-01-11 12:08:22 CST by sky via cli commit synchronize
 # grnoc-mon at TULSA-CORE5-MX480-RE0> show chassis environment 
 # Class Item                           Status     Measurement
 # Temp  PEM 0                          OK        
@@ -392,7 +392,7 @@
 # grnoc-mon at TULSA-CORE5-MX480-RE0> show system uptime 
 # System booted: 2016-08-15 04:47 CDT 
 # Protocols started: 2016-08-15 04:53 CDT 
-# Last configured: 2017-01-11 14:01 CST  by andrew
+# Last configured: 2017-01-11 18:41 CST  by andrew
 # 
 # {master}
 # grnoc-mon at TULSA-CORE5-MX480-RE0> show interface terse 
@@ -826,7 +826,7 @@
 #pp0 up up
 #tap up up
 # grnoc-mon at TULSA-CORE5-MX480-RE0> show configuration 
-## Last commit: 2017-01-11 14:01:39 CST by andrew
+## Last commit: 2017-01-11 18:41:57 CST by andrew
 version 13.3R9.13;
 groups {
     re0 {
@@ -3900,7 +3900,7 @@
             }
         }
         unit 517 {
-            description "DHS-OKMULGEE-N-WOOD-MGMT-100M-CIR0019727 [ORDERED]";
+            description DHS-OKMULGEE-N-WOOD-MGMT-100M-CIR0019727;
             bandwidth 100m;
             vlan-tags outer 517 inner 500;
             family inet {
@@ -4150,7 +4150,7 @@
             }
         }
         unit 1517 {
-            description "DHS-OKMULGEE-N-WOOD-DATA-100M-CIR0019727 [ORDERED]";
+            description DHS-OKMULGEE-N-WOOD-DATA-100M-CIR0019727;
             bandwidth 100m;
             vlan-tags outer 517 inner 501;
             family inet {
@@ -4348,7 +4348,7 @@
             }
         }
         unit 2517 {
-            description "DHS-OKMULGEE-N-WOOD-GUEST-100M-CIR0019727 [ORDERED]";
+            description DHS-OKMULGEE-N-WOOD-GUEST-100M-CIR0019727;
             bandwidth 100m;
             vlan-tags outer 517 inner 502;
             family inet {
Index: configs/legal-aid-okc.client.onenet.net
===================================================================
--- configs/legal-aid-okc.client.onenet.net	(revision 149728)
+++ configs/legal-aid-okc.client.onenet.net	(working copy)
@@ -0,0 +1,1603 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show system commit 
+#   2017-01-11 18:55:30 CST by admin via cli
+#   2017-01-11 18:54:02 CST by admin via cli
+#   2017-01-05 08:44:37 CST by aduenas via junoscript
+#   2016-12-29 15:28:42 CST by admin via cli
+#   2016-12-29 14:54:06 CST by admin via cli
+#   2016-12-22 11:53:09 CST by aduenas via junoscript
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis environment 
+# Class Item                           Status     Measurement
+# Temp  Routing Engine                 OK        
+#       Routing Engine CPU             OK        
+# Fans  SRX240 PowerSupply fan 1       OK
+#       SRX240 PowerSupply fan 2       OK
+#       SRX240 CPU fan 1               OK
+#       SRX240 CPU fan 2               OK
+#       SRX240 IO  fan 1               OK
+#       SRX240 IO  fan 2               OK
+# Power Power Supply 0                 OK        
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis firmware 
+# Part                     Type       Version
+# FPC 0                    O/S        Version 12.1X46-D40.2 by builder on 2015-09
+# FWDD                     O/S        Version 12.1X46-D40.2 by builder on 2015-09
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis fpc detail 
+# Slot 0 information:
+#   State                               Online    
+#   Total CPU DRAM                      ---- CPU less FPC ----
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis hardware 
+# Hardware inventory:
+# Item             Version  Part number  Serial number     Description
+# Chassis                                BU2815AK0705      SRX240H2
+# Routing Engine   REV 14   750-043609   ACMN6095          RE-SRX240H2
+# FPC 0                                                    FPC
+#   PIC 0                                                  16x GE Base PIC
+# Power Supply 0  
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis hardware models 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis routing-engine 
+# Routing Engine status:
+#     Serial ID                      ACMN6095
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis scb 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis sfm detail
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis ssb 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show system boot-messages 
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2015, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# 	The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 4 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 52XX CPU Rev. 0.8 with no FPU implemented
+#         L1 Cache: I size 32kb(128 line), D size 8kb(128 line), sixty four way.
+#         L2 Cache: Size 512kb, 8 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# dwc0: <Synopsis DWC OTG Controller Driver> on obio0
+# usb0: <USB Bus for DWC OTG Controller> on dwc0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 1 port with 1 removable, self powered
+# uhub1: vendor 0x0409 product 0x005a, class 9/0, rev 2.00/1.00, addr 2
+# uhub1: single transaction translator
+# uhub1: 3 ports with 2 removable, self powered
+# umass0: STMicroelectronics ST72682  High Speed Mode, rev 2.00/2.10, addr 3
+# dwc1: <Synopsis DWC OTG Controller Driver> on obio0
+# usb1: <USB Bus for DWC OTG Controller> on dwc1
+# usb1: USB revision 2.0
+# uhub2: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub2: 1 port with 1 removable, self powered
+# cpld0 on obio0
+# pcib1: <Cavium on-chip PCIe HOST bridge> on obio0
+# Disabling Octeon big bar support
+# PCIe: Waiting for port 0 to finish reset
+# PCIe: Port 0 link active, 2 lanes
+# PCIe: Waiting for port 1 to finish reset
+# PCIe: Port 1 link active, 1 lanes
+# pcib1: Initialized controller
+# pci0: <PCI bus> on pcib1
+# pcib2: <PCI-PCI bridge> irq 0 at device 0.0 on pci0
+# pci1: <PCI bus> on pcib2
+# pci1: <serial bus, USB> at device 2.0 (no driver attached)
+# pci1: <serial bus, USB> at device 2.1 (no driver attached)
+# pci1: <network> at device 7.0 (no driver attached)
+# pcib0: <Cavium on-chip PCIe HOST bridge> on obio0
+# pci2: <PCI bus> on pcib0
+# pci2: <processor> at device 0.0 (no driver attached)
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 4MB> on obio0
+# Timecounter "mips" frequency 600000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# da0 at umass-sim0 bus 0 target 0 lun 0
+# da0: <ST ST72682 2.10> Removable Direct Access SCSI-2 device
+# da0: 40.000MB/s transfers
+# da0: 2000MB (4096000 512 byte sectors: 255H 63S/T 254C)
+# Trying to mount root from ufs:/dev/da0s2a
+# WARNING: / was not properly dismounted
+# WARNING: / was not properly dismounted
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show version 
+# Hostname: LEGAL-AID-OKC-SRX240-MR # Model: srx240h2 # JUNOS Software Release [12.1X46-D40.2] #  # grnoc-mon at LEGAL-AID-OKC-SRX240-MR> file list /var/tmp detail # lrw-r--r--  1 root  wheel         11 Sep 26  2015 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show system uptime 
+# System booted: 2016-11-08 16:48 CST 
+# Protocols started: 2016-11-08 16:52 CST 
+# Last configured: 2017-01-11 18:55 CST  by admin
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show interface terse 
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.500 up up
+#ge-0/0/0.501 up up
+#ge-0/0/0.32767 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 down down
+#ge-0/0/2 down down
+#ge-0/0/3 down down
+#ge-0/0/4 down down
+#ge-0/0/5 down down
+#ge-0/0/6 down down
+#ge-0/0/7 down down
+#ge-0/0/8 down down
+#ge-0/0/9 down down
+#ge-0/0/10 down down
+#ge-0/0/11 down down
+#ge-0/0/12 up up
+#ge-0/0/12.0 up up
+#ge-0/0/13 up up
+#ge-0/0/13.0 up up
+#ge-0/0/14 up up
+#ge-0/0/14.0 up up
+#ge-0/0/15 up up
+#ge-0/0/15.1 up up
+#ge-0/0/15.2 up up
+#ge-0/0/15.4 up up
+#ge-0/0/15.5 up up
+#ge-0/0/15.32767 up up
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#st0.0 up up
+#st0.10 up up
+#st0.11 up up
+#st0.12 up up
+#st0.13 up up
+#st0.14 up up
+#st0.15 up up
+#st0.16 up up
+#st0.17 up up
+#st0.18 up up
+#st0.19 up up
+#st0.20 up up
+#st0.21 up up
+#st0.22 up up
+#st0.23 up up
+#tap up up
+#vlan up up
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show configuration 
+## Last commit: 2017-01-11 18:55:30 CST by admin
+version 12.1X46-D40.2;
+system {
+    host-name LEGAL-AID-OKC-SRX240-MR;
+    domain-name onenet.net;
+    time-zone America/Chicago;
+    authentication-order [ radius password ];
+    ports {
+        console log-out-on-disconnect;
+    }
+    root-authentication {
+#        encrypted-password <removed>;
+    }
+    name-server {
+        164.58.200.200;
+        156.110.200.200;
+    }
+    radius-server {
+        156.110.31.11 {
+#            secret "<removed>"; ## SECRET-DATA
+            source-address 164.58.28.58;
+        }
+    }
+    radius-options {
+        attributes {
+            nas-ip-address 164.58.28.58;
+        }
+    }
+    login {
+        message "\n+----------------------------------------------------------------------------+\n|                                                                            |\n|            Managed by Oklahoma State Regents for Higher Education          |\n|             Oklahoma Network for Education Enrichment  (ONENET)            |\n|                                                                            |\n|               *** Unauthorized Use or Access Prohibited ***                |\n|                                                                            |\n|                       For more information, contact:                       |\n|                                                                            |\n|                Oklahoma State Regents for Higher Education                 |\n|              Educational Telecommunications Network -- ONENET              |\n|                               (888) 566-3638                               |\n|        !
                        info at onenet.net                              |\n|                                                                            |\n+----------------------------------------------------------------------------+\n";
+        class admin {
+            idle-timeout 30;
+            permissions all;
+        }
+        class lockdown {
+            idle-timeout 2;
+            permissions view;
+            deny-commands .*;
+            deny-configuration .*;
+        }
+        class operator-local {
+            idle-timeout 15;
+            permissions [ access admin configure firewall interface network routing snmp system trace view ];
+            allow-commands "show log messages";
+        }
+        class robot {
+            idle-timeout 10;
+            permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+        }
+        user admin {
+            uid 1000;
+            class super-user;
+            authentication {
+#                encrypted-password <removed>;
+            }
+        }
+        user aduenas {
+            uid 2100;
+            class super-user;
+            authentication {
+#                encrypted-password <removed>;
+            }
+        }
+        user client {
+            uid 2000;
+            class admin;
+            authentication {
+#                encrypted-password <removed>;
+            }
+        }
+        user eng {
+            uid 2018;
+            class admin;
+        }
+        user rancid {
+            uid 2001;
+            class robot;
+        }
+        user remote {
+            uid 2002;
+            class operator-local;
+        }
+        user upgrades {
+            uid 2003;
+            class operator;
+            authentication {
+#                ssh-rsa <removed>;
+            }
+        }
+        user wguyton {
+            full-name "william guyton";
+            uid 2101;
+            class super-user;
+            authentication {
+#                encrypted-password <removed>;
+            }
+        }
+    }
+    services {
+        ssh {
+            root-login deny;
+            protocol-version v2;
+        }
+        dhcp-local-server {
+            group JDHCP {
+                interface ge-0/0/15.1;
+                interface ge-0/0/15.4;
+                interface ge-0/0/15.5;
+            }
+        }
+        web-management {
+            https {
+                system-generated-certificate;
+            }
+            session {
+                idle-timeout 60;
+            }
+        }
+    }
+    syslog {
+        archive size 10m files 5;
+        user * {
+            any emergency;
+        }
+        file messages {
+            any notice;
+            authorization info;
+        }
+        file interactive-commands {
+            interactive-commands any;
+        }
+        file PROTECT-RE {
+            firewall any;
+            archive no-world-readable;
+        }
+        file traffic {
+            any any;
+            match RT_FLOW_SESSION;
+        }
+        file updown {
+            any any;
+            match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+        }
+    }
+    max-configurations-on-flash 20;
+    max-configuration-rollbacks 20;
+    ntp {
+        server 164.58.3.98 prefer;
+    }
+}
+interfaces {
+    ge-0/0/0 {
+        description "Link to OneNet";
+        vlan-tagging;
+        speed 100m;
+        link-mode full-duplex;
+        gigether-options {
+            no-auto-negotiation;
+        }
+        unit 500 {
+            description "OneNet Internet";
+            vlan-id 500;
+            family inet {
+                address 164.58.28.58/30;
+            }
+        }
+        unit 501 {
+            description "OneNet MPLS";
+            vlan-id 501;
+            family inet {
+                address 10.199.6.2/30;
+            }
+        }
+    }
+    ge-0/0/1 {
+        disable;
+    }
+    ge-0/0/2 {
+        disable;
+    }
+    ge-0/0/3 {
+        disable;
+    }
+    ge-0/0/4 {
+        disable;
+    }
+    ge-0/0/5 {
+        disable;
+    }
+    ge-0/0/6 {
+        disable;
+    }
+    ge-0/0/7 {
+        disable;
+    }
+    ge-0/0/8 {
+        disable;
+    }
+    ge-0/0/9 {
+        disable;
+    }
+    ge-0/0/10 {
+        disable;
+    }
+    ge-0/0/11 {
+        disable;
+    }
+    ge-0/0/12 {
+        description "Link to SSG Untrust";
+        unit 0 {
+            family inet {
+                address 164.58.22.241/28;
+            }
+        }
+    }
+    ge-0/0/13 {
+        description "Link to SSG Trust";
+        unit 0 {
+            family inet {
+                address 10.255.255.253/30;
+            }
+        }
+    }
+    ge-0/0/14 {
+        description "Link to Cox TLAN";
+        unit 0 {
+            family inet {
+                address 172.31.253.129/25;
+            }
+        }
+    }
+    ge-0/0/15 {
+        description "Link to Switch";
+        flexible-vlan-tagging;
+        native-vlan-id 1;
+        unit 1 {
+            vlan-id 1;
+            family inet {
+                address 192.168.1.4/24;
+                address 192.168.1.1/24;
+            }
+        }
+        unit 2 {
+            vlan-id 2;
+            family inet {
+                address 192.168.25.1/24;
+            }
+        }
+        unit 4 {
+            vlan-id 4;
+            family inet {
+                address 192.168.101.1/24;
+            }
+        }
+        unit 5 {
+            vlan-id 5;
+            family inet {
+                address 192.168.102.1/24;
+            }
+        }
+    }
+    lo0 {
+        unit 0 {
+            family inet {
+                filter {
+                    input PROTECT-RE;
+                }
+            }
+        }
+    }
+    st0 {
+        unit 0 {
+            description AZURE-VPN;
+            family inet;
+        }
+        unit 10 {
+            description LAOK-ADA-VPN;
+            family inet;
+        }
+        unit 11 {
+            description LAOK-ALTUS-VPN;
+            family inet;
+        }
+        unit 12 {
+            description LAOK-ARDMORE-VPN;
+            family inet;
+        }
+        unit 13 {
+            description LAOK-BARTLESVILLE-VPN;
+            family inet;
+        }
+        unit 14 {
+            description LAOK-GUYMON-VPN;
+            family inet;
+        }
+        unit 15 {
+            description LAOK-HUGO-VPN;
+            family inet;
+        }
+        unit 16 {
+            description LAOK-LAWTON-VPN;
+            family inet;
+        }
+        unit 17 {
+            description LAOK-MUSKOGEE-VPN;
+            family inet;
+        }
+        unit 18 {
+            description LAOK-POTEAU-VPN;
+            family inet;
+        }
+        unit 19 {
+            description LAOK-SHAWNEE-VPN;
+            family inet;
+        }
+        unit 20 {
+            description LAOK-STILLWATER-VPN;
+            family inet;
+        }
+        unit 21 {
+            description LAOK-TAHLEQUAH-VPN;
+            family inet;
+        }
+        unit 22 {
+            description LAOK-WEATHERFORD-VPN;
+            family inet;
+        }
+        unit 23 {
+            description LAOK-WOODWARD-VPN;
+            family inet;
+        }
+    }
+}
+snmp {
+    description OneNet;
+    contact "Net Group";
+    community "<removed>" {
+        authorization read-only;
+    }
+    community "<removed>" {
+        authorization read-only;
+    }
+    community "<removed>" {
+        authorization read-write;
+    }
+    community "<removed>" {
+        authorization read-only;
+    }
+}
+routing-options {
+    static {
+        route 0.0.0.0/0 next-hop 164.58.28.57;
+        route 192.168.42.0/24 next-hop 10.199.6.1;
+        route 192.168.36.0/24 next-hop 10.199.6.1;
+        route 192.168.37.0/24 next-hop 10.199.6.1;
+        route 192.168.38.0/24 next-hop 10.199.6.1;
+        route 10.199.6.0/25 next-hop 10.199.6.1;
+        route 10.100.100.0/24 next-hop 10.255.255.254;
+        route 192.168.2.0/24 next-hop 172.31.253.130;
+        route 192.168.10.0/24 next-hop 172.31.253.130;
+        route 192.168.11.0/24 next-hop 172.31.253.130;
+        route 192.168.12.0/24 next-hop 172.31.253.130;
+        route 192.168.13.0/24 next-hop 172.31.253.130;
+        route 192.168.14.0/24 next-hop 172.31.253.130;
+        route 10.100.120.0/22 next-hop st0.0;
+        route 192.168.129.0/24 next-hop st0.10;
+        route 192.168.130.0/24 next-hop st0.11;
+        route 192.168.131.0/24 next-hop st0.12;
+        route 192.168.138.0/24 next-hop st0.15;
+        route 192.168.140.0/24 next-hop st0.16;
+        route 192.168.153.0/24 next-hop st0.14;
+        route 192.168.147.0/24 next-hop st0.23;
+        route 192.168.141.0/24 next-hop st0.17;
+        route 192.168.143.0/24 next-hop st0.18;
+        route 192.168.144.0/24 next-hop st0.19;
+        route 192.168.145.0/24 next-hop st0.20;
+        route 192.168.134.0/24 next-hop st0.22;
+        route 192.168.132.0/24 next-hop st0.13;
+        route 192.168.146.0/24 next-hop st0.21;
+        route 192.168.111.0/24 next-hop 10.199.6.1;
+        route 192.168.112.0/24 next-hop 10.199.6.1;
+        route 192.168.113.0/24 next-hop 10.199.6.1;
+    }
+}
+protocols {
+    ospf {
+        export EXPORT-TO-OSPF;
+        area 0.0.0.0 {
+            interface ge-0/0/14.0;
+        }
+    }
+    lldp {
+        interface all;
+    }
+    stp;
+}
+policy-options {
+    prefix-list PRE-MGMT-SOURCES {
+        156.110.31.0/27;
+        156.110.31.32/28;
+        164.58.253.0/24;
+    }
+    prefix-list PRE-LOCALIPv4-SOURCES {
+        apply-path "interfaces <*> unit <*> family inet address <*>";
+    }
+    policy-statement EXPORT-TO-OSPF {
+        term REJECT-DEFAULT {
+            from {
+                route-filter 0.0.0.0/0 exact;
+            }
+            then reject;
+        }
+        term REJECT-BATESVILLE {
+            from {
+                route-filter 10.100.100.0/24 exact;
+            }
+            then reject;
+        }
+        term SEND-STATIC {
+            from protocol static;
+            then accept;
+        }
+        term SEND-DIRECT {
+            from protocol direct;
+            then accept;
+        }
+        term REJECT-ALL-ELSE {
+            then reject;
+        }
+    }
+}
+security {
+    ike {
+        proposal PRE-G2-AES256-SHA {
+            authentication-method pre-shared-keys;
+            dh-group group2;
+            authentication-algorithm sha1;
+            encryption-algorithm aes-256-cbc;
+            lifetime-seconds 28800;
+        }
+        proposal PRE-G2-AES128-SHA {
+            authentication-method pre-shared-keys;
+            dh-group group2;
+            authentication-algorithm sha1;
+            encryption-algorithm aes-128-cbc;
+            lifetime-seconds 28800;
+        }
+        policy IKE-POLICY-AZURE {
+            mode main;
+            proposals PRE-G2-AES256-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-ADA {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-ALTUS {
+            mode aggressive;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-ARDMORE {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-HUGO {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-LAWTON {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-GUYMON {
+            mode aggressive;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-WOODWARD {
+            mode aggressive;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-MUSKOGEE {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-POTEAU {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-SHAWNEE {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-STILLWATER {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-WEATHERFORD {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-BARTLESVILLE {
+            mode main;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        policy IKE-POLICY-TAHLEQUAH {
+            mode aggressive;
+            proposals PRE-G2-AES128-SHA;
+#            pre-shared-#key <removed>;
+        }
+        gateway IKE-GATE-AZURE {
+            ike-policy IKE-POLICY-AZURE;
+            address 104.43.235.2;
+            external-interface ge-0/0/0.500;
+            version v2-only;
+        }
+        gateway IKE-GATE-ADA {
+            ike-policy IKE-POLICY-ADA;
+            address 69.92.92.164;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-ALTUS {
+            ike-policy IKE-POLICY-ALTUS;
+            dynamic user-at-hostname "altus at laok.com";
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-ARDMORE {
+            ike-policy IKE-POLICY-ARDMORE;
+            address 69.92.121.47;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-HUGO {
+            ike-policy IKE-POLICY-HUGO;
+            address 209.33.92.233;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-LAWTON {
+            ike-policy IKE-POLICY-LAWTON;
+            address 24.139.48.191;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-GUYMON {
+            ike-policy IKE-POLICY-GUYMON;
+            dynamic user-at-hostname "guymon at laok.com";
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-WOODWARD {
+            ike-policy IKE-POLICY-WOODWARD;
+            dynamic user-at-hostname "woodward at laok.com";
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-MUSKOGEE {
+            ike-policy IKE-POLICY-MUSKOGEE;
+            address 66.76.254.173;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-POTEAU {
+            ike-policy IKE-POLICY-POTEAU;
+            address 75.89.94.190;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-SHAWNEE {
+            ike-policy IKE-POLICY-SHAWNEE;
+            address 65.64.64.114;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-STILLWATER {
+            ike-policy IKE-POLICY-STILLWATER;
+            address 66.76.244.231;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-WEATHERFORD {
+            ike-policy IKE-POLICY-WEATHERFORD;
+            address 173.219.106.23;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-BARTLESVILLE {
+            ike-policy IKE-POLICY-BARTLESVILLE;
+            address 184.155.102.138;
+            external-interface ge-0/0/0.500;
+        }
+        gateway IKE-GATE-TAHLEQUAH {
+            ike-policy IKE-POLICY-TAHLEQUAH;
+            dynamic user-at-hostname "tahlequah at laok.com";
+            external-interface ge-0/0/0.500;
+        }
+    }
+    ipsec {
+        proposal ESP-AES256-SHA {
+            protocol esp;
+            authentication-algorithm hmac-sha1-96;
+            encryption-algorithm aes-256-cbc;
+            lifetime-seconds 3600;
+        }
+        proposal ESP-AES128-SHA {
+            protocol esp;
+            authentication-algorithm hmac-sha1-96;
+            encryption-algorithm aes-128-cbc;
+            lifetime-seconds 3600;
+        }
+        policy VPN-POLICY-AZURE {
+            proposals ESP-AES256-SHA;
+        }
+        policy VPN-POLICY-ADA {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-ALTUS {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-ARDMORE {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-HUGO {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-LAWTON {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-GUYMON {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-WOODWARD {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-MUSKOGEE {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-POTEAU {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-SHAWNEE {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-STILLWATER {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-WEATHERFORD {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-BARTLESVILLE {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        policy VPN-POLICY-TAHLEQUAH {
+            perfect-forward-secrecy {
+                keys group2;
+            }
+            proposals ESP-AES128-SHA;
+        }
+        vpn IPSEC-VPN-AZURE {
+            bind-interface st0.0;
+            ike {
+                gateway IKE-GATE-AZURE;
+                ipsec-policy VPN-POLICY-AZURE;
+            }
+        }
+        vpn IPSEC-VPN-ADA {
+            bind-interface st0.10;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-ADA;
+                ipsec-policy VPN-POLICY-ADA;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-ALTUS {
+            bind-interface st0.11;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-ALTUS;
+                ipsec-policy VPN-POLICY-ALTUS;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-ARDMORE {
+            bind-interface st0.12;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-ARDMORE;
+                ipsec-policy VPN-POLICY-ARDMORE;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-HUGO {
+            bind-interface st0.15;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-HUGO;
+                ipsec-policy VPN-POLICY-HUGO;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-LAWTON {
+            bind-interface st0.16;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-LAWTON;
+                ipsec-policy VPN-POLICY-LAWTON;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-GUYMON {
+            bind-interface st0.14;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-GUYMON;
+                ipsec-policy VPN-POLICY-GUYMON;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-WOODWARD {
+            bind-interface st0.23;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-WOODWARD;
+                ipsec-policy VPN-POLICY-WOODWARD;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-MUSKOGEE {
+            bind-interface st0.17;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-MUSKOGEE;
+                ipsec-policy VPN-POLICY-MUSKOGEE;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-POTEAU {
+            bind-interface st0.18;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-POTEAU;
+                ipsec-policy VPN-POLICY-POTEAU;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-SHAWNEE {
+            bind-interface st0.19;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-SHAWNEE;
+                ipsec-policy VPN-POLICY-SHAWNEE;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-STILLWATER {
+            bind-interface st0.20;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-STILLWATER;
+                ipsec-policy VPN-POLICY-STILLWATER;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-WEATHERFORD {
+            bind-interface st0.22;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-WEATHERFORD;
+                ipsec-policy VPN-POLICY-WEATHERFORD;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-BARTLESVILLE {
+            bind-interface st0.13;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-BARTLESVILLE;
+                ipsec-policy VPN-POLICY-BARTLESVILLE;
+            }
+            establish-tunnels immediately;
+        }
+        vpn IPSEC-VPN-TAHLEQUAH {
+            bind-interface st0.21;
+            vpn-monitor {
+                optimized;
+            }
+            ike {
+                gateway IKE-GATE-TAHLEQUAH;
+                ipsec-policy VPN-POLICY-TAHLEQUAH;
+            }
+            establish-tunnels immediately;
+        }
+    }
+    address-book {
+        global {
+            address HOST-192.168.25.30 192.168.25.30/32;
+            address HOST-192.168.25.35 192.168.25.35/32;
+        }
+    }
+    utm {
+        utm-policy junos-wf-policy {
+            web-filtering {
+                http-profile junos-wf-websense-default;
+            }
+        }
+    }
+    flow {
+        tcp-mss {
+            ipsec-vpn {
+                mss 1350;
+            }
+        }
+    }
+    screen {
+        ids-option UNTRUST-SCREEN {
+            icmp {
+                ping-death;
+            }
+            ip {
+                source-route-option;
+                tear-drop;
+            }
+            tcp {
+                syn-flood {
+                    alarm-threshold 1024;
+                    attack-threshold 200;
+                    source-threshold 1024;
+                    destination-threshold 2048;
+                    timeout 20;
+                }
+                land;
+            }
+        }
+    }
+    nat {
+        source {
+            rule-set TRUST-TO-UNTRUST-NAT {
+                from zone TRUST;
+                to zone UNTRUST;
+                rule NAT-TRUST-TO-UNTRUST {
+                    match {
+                        source-address 0.0.0.0/0;
+                    }
+                    then {
+                        source-nat {
+                            interface;
+                        }
+                    }
+                }
+            }
+        }
+        static {
+            rule-set SNAT-UNTRUST {
+                from zone UNTRUST;
+                rule 164-058-072-226 {
+                    match {
+                        destination-address 164.58.72.226/32;
+                    }
+                    then {
+                        static-nat {
+                            prefix {
+                                192.168.25.30/32;
+                            }
+                        }
+                    }
+                }
+                rule 164-058-072-227 {
+                    match {
+                        destination-address 164.58.72.227/32;
+                    }
+                    then {
+                        static-nat {
+                            prefix {
+                                192.168.25.35/32;
+                            }
+                        }
+                    }
+                }
+            }
+        }
+    }
+    policies {
+        from-zone TRUST to-zone UNTRUST {
+            policy TRUST-TO-UNTRUST {
+                match {
+                    source-address any;
+                    destination-address any;
+                    application any;
+                }
+                then {
+                    permit {
+                        application-services {
+                            utm-policy junos-wf-policy;
+                        }
+                    }
+                }
+            }
+        }
+        from-zone TRUST to-zone TRUST {
+            policy TRUST-TO-TRUST {
+                match {
+                    source-address any;
+                    destination-address any;
+                    application any;
+                }
+                then {
+                    permit;
+                }
+            }
+        }
+        from-zone UNTRUST to-zone UNTRUST {
+            policy UNTRUST-TO-UNTRUST {
+                match {
+                    source-address any;
+                    destination-address any;
+                    application any;
+                }
+                then {
+                    permit;
+                }
+            }
+        }
+        from-zone TRUST to-zone VPN {
+            policy TRUST-TO-VPN {
+                match {
+                    source-address any;
+                    destination-address any;
+                    application any;
+                }
+                then {
+                    permit;
+                }
+            }
+        }
+        from-zone VPN to-zone TRUST {
+            policy VPN-TO-TRUST {
+                match {
+                    source-address any;
+                    destination-address any;
+                    application any;
+                }
+                then {
+                    permit;
+                }
+            }
+        }
+        from-zone VPN to-zone VPN {
+            policy VPN-TO-VPN {
+                match {
+                    source-address any;
+                    destination-address any;
+                    application any;
+                }
+                then {
+                    permit;
+                }
+            }
+        }
+        from-zone UNTRUST to-zone TRUST {
+            policy 201612120908 {
+                match {
+                    source-address any;
+                    destination-address HOST-192.168.25.30;
+                    application junos-https;
+                }
+                then {
+                    permit;
+                }
+            }
+            policy 201612291526 {
+                match {
+                    source-address any;
+                    destination-address HOST-192.168.25.35;
+                    application [ junos-smtp junos-http junos-https ];
+                }
+                then {
+                    permit;
+                }
+            }
+        }
+    }
+    zones {
+        security-zone TRUST {
+            interfaces {
+                ge-0/0/0.501 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                ge-0/0/15.1 {
+                    host-inbound-traffic {
+                        system-services {
+                            dhcp;
+                            ping;
+                            traceroute;
+                            ssh;
+                            https;
+                            snmp;
+                        }
+                    }
+                }
+                ge-0/0/15.2 {
+                    host-inbound-traffic {
+                        system-services {
+                            dhcp;
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                ge-0/0/15.4 {
+                    host-inbound-traffic {
+                        system-services {
+                            dhcp;
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                ge-0/0/15.5 {
+                    host-inbound-traffic {
+                        system-services {
+                            dhcp;
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                ge-0/0/14.0 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                        protocols {
+                            ospf;
+                        }
+                    }
+                }
+                ge-0/0/13.0 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+            }
+        }
+        security-zone UNTRUST {
+            screen UNTRUST-SCREEN;
+            interfaces {
+                ge-0/0/0.500 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            snmp;
+                            ssh;
+                            traceroute;
+                            ike;
+                        }
+                    }
+                }
+                ge-0/0/12.0 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+            }
+        }
+        security-zone VPN {
+            interfaces {
+                st0.0 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.10 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.11 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.12 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.15 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.16 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.14 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.23 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.17 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.18 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.19 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.20 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.22 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.13 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+                st0.21 {
+                    host-inbound-traffic {
+                        system-services {
+                            ping;
+                            traceroute;
+                        }
+                    }
+                }
+            }
+        }
+    }
+}
+firewall {
+    family inet {
+        filter PROTECT-RE {
+            term SSH-ALLOW {
+                from {
+                    source-prefix-list {
+                        PRE-MGMT-SOURCES;
+                        PRE-LOCALIPv4-SOURCES;
+                    }
+                    protocol tcp;
+                    destination-port ssh;
+                }
+                then accept;
+            }
+            term SNMP-ALLOW {
+                from {
+                    source-prefix-list {
+                        PRE-MGMT-SOURCES;
+                        PRE-LOCALIPv4-SOURCES;
+                    }
+                    protocol udp;
+                    destination-port snmp;
+                }
+                then accept;
+            }
+            term HTTPS-ALLOW {
+                from {
+                    source-prefix-list {
+                        PRE-MGMT-SOURCES;
+                        PRE-LOCALIPv4-SOURCES;
+                    }
+                    protocol tcp;
+                    destination-port https;
+                }
+                then accept;
+            }
+            term SSH-DENY {
+                from {
+                    protocol tcp;
+                    destination-port ssh;
+                }
+                then {
+                    discard;
+                }
+            }
+            term SNMP-DENY {
+                from {
+                    protocol udp;
+                    destination-port snmp;
+                }
+                then {
+                    discard;
+                }
+            }
+            term HTTPS-DENY {
+                from {
+                    protocol tcp;
+                    destination-port https;
+                }
+                then {
+                    discard;
+                }
+            }
+            term ALL-TRAFFIC {
+                then accept;
+            }
+        }
+    }
+}
+access {
+    address-assignment {
+        pool 192-168-1-0-POOL {
+            family inet {
+                network 192.168.1.0/24;
+                range 192-168-1-0-RANGE {
+                    low 192.168.1.120;
+                    high 192.168.1.224;
+                }
+                dhcp-attributes {
+                    domain-name ad.laso.org;
+                    name-server {
+                        192.168.25.30;
+                        192.168.11.240;
+                    }
+                    router {
+                        192.168.1.1;
+                    }
+                }
+            }
+        }
+        pool 192-168-101-0-POOL {
+            family inet {
+                network 192.168.101.0/24;
+                range 192-168-101-0-RANGE {
+                    low 192.168.101.50;
+                    high 192.168.101.200;
+                }
+                dhcp-attributes {
+                    domain-name ad.laso.org;
+                    name-server {
+                        192.168.25.30;
+                        192.168.11.240;
+                    }
+                    router {
+                        192.168.101.1;
+                    }
+                }
+            }
+        }
+        pool 192-168-102-0-POOL {
+            family inet {
+                network 192.168.102.0/24;
+                range 192-168-102-0-RANGE {
+                    low 192.168.102.100;
+                    high 192.168.102.200;
+                }
+                dhcp-attributes {
+                    domain-name laso.org;
+                    name-server {
+                        8.8.8.8;
+                        8.8.4.4;
+                    }
+                    router {
+                        192.168.102.1;
+                    }
+                }
+            }
+        }
+    }
+}
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show ospf neighbor 
+# Address          Interface              State     ID               Pri  Dead
+# 172.31.253.130   ge-0/0/14.0            Full      192.168.253.1
+# 
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show bfd session 
+
+0 sessions, 0 clients
+Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
+
Index: configs/core1.dc.onenet.net
===================================================================
--- configs/core1.dc.onenet.net	(revision 149717)
+++ configs/core1.dc.onenet.net	(working copy)
@@ -1,12 +1,12 @@
 # RANCID-CONTENT-TYPE: juniper
 #
 # grnoc-mon at MX480_DC_01_RE0> show system commit 
+#   2017-01-11 18:19:20 CST by andrew via cli commit synchronize
 #   2017-01-11 11:58:00 CST by andrew via cli commit synchronize
 #   2017-01-11 11:24:01 CST by andrew via cli commit synchronize
 #   2017-01-09 17:17:31 CST by andrew via cli commit confirmed, rollback in 3mins synchronize
 #   2017-01-08 15:24:58 CST by andrew via cli commit confirmed, rollback in 3mins synchronize
 #   2017-01-08 14:51:57 CST by andrew via cli commit synchronize
-#   2017-01-08 14:17:11 CST by andrew via cli commit synchronize
 # grnoc-mon at MX480_DC_01_RE0> show chassis environment 
 # Class Item                           Status     Measurement
 # Temp  PEM 0                          OK        
@@ -338,7 +338,7 @@
 # grnoc-mon at MX480_DC_01_RE0> show system uptime 
 # System booted: 2014-08-25 20:38 CDT 
 # Protocols started: 2014-08-25 20:39 CDT 
-# Last configured: 2017-01-11 11:58 CST  by andrew
+# Last configured: 2017-01-11 18:19 CST  by andrew
 # 
 # {master}
 # grnoc-mon at MX480_DC_01_RE0> show interface terse 
@@ -590,7 +590,6 @@
 #irb.2714 up up
 #irb.2716 up up
 #irb.2717 up up
-#irb.2718 up up
 #irb.2719 up up
 #irb.2723 up up
 #irb.2724 up up
@@ -639,7 +638,7 @@
 #pp0 up up
 #tap up up
 # grnoc-mon at MX480_DC_01_RE0> show configuration 
-## Last commit: 2017-01-11 11:58:00 CST by andrew
+## Last commit: 2017-01-11 18:19:20 CST by andrew
 version 12.3R7.7;
 groups {
     re0 {
@@ -1907,12 +1906,6 @@
                 address 164.58.25.201/29;
             }
         }
-        unit 2718 {
-            description "un_ou_vm___01-2718 [DECOM]";
-            family inet {
-                address 164.58.25.229/30;
-            }
-        }
         unit 2719 {
             description un_samplic_01-2719;
             family inet {
@@ -4174,10 +4167,6 @@
         vlan-id 2712;
         routing-interface irb.2712;
     }
-    un_ou_vm___01-2718 {
-        vlan-id 2718;
-        routing-interface irb.2718;
-    }
     un_outside-01-0250 {
         vlan-id 250;
         routing-interface irb.250;
Index: routers.all
===================================================================
--- routers.all	(revision 149712)
+++ routers.all	(working copy)
@@ -430,6 +430,7 @@
 law-adva.p.onenet.net:fsp3000
 lawton-ps.client.onenet.net:juniper
 leflore-ps.client.onenet.net:juniper
+legal-aid-okc.client.onenet.net:juniper
 legal-aid-tulsa.client.onenet.net:juniper
 lone-wolf-ps.client.onenet.net:juniper
 lowery-ps.client.onenet.net:juniper



More information about the Nocrancid mailing list