[Nocrancid] autopop-onenet.net router config diffs
rancid at rancid.noc.onenet.net
rancid at rancid.noc.onenet.net
Wed Jan 11 19:04:01 CST 2017
Index: router.db
===================================================================
--- router.db (revision 149727)
+++ router.db (working copy)
@@ -403,6 +403,7 @@
lawton-ps.client.onenet.net:juniper:up
LAWTON-PUBLIC-LIBRARY.client.onenet.net:juniper:up
leflore-ps.client.onenet.net:juniper:up
+legal-aid-okc.client.onenet.net:juniper:up
legal-aid-tulsa.client.onenet.net:juniper:up
lone-wolf-ps.client.onenet.net:juniper:up
lowery-ps.client.onenet.net:juniper:up
Index: routers.up
===================================================================
--- routers.up (revision 149712)
+++ routers.up (working copy)
@@ -335,6 +335,7 @@
lawton-ps.client.onenet.net:juniper
lawton-public-library.client.onenet.net:juniper
leflore-ps.client.onenet.net:juniper
+legal-aid-okc.client.onenet.net:juniper
legal-aid-tulsa.client.onenet.net:juniper
lone-wolf-ps.client.onenet.net:juniper
lowery-ps.client.onenet.net:juniper
Index: configs/allen-public-library.client.onenet.net
===================================================================
--- configs/allen-public-library.client.onenet.net (revision 149722)
+++ configs/allen-public-library.client.onenet.net (working copy)
@@ -137,8 +137,8 @@
#ge-0/0/2.0 up up
#ge-0/0/3 up down
#ge-0/0/3.0 up down
-#ge-0/0/4 up up
-#ge-0/0/4.0 up up
+#ge-0/0/4 up down
+#ge-0/0/4.0 up down
#ge-0/0/5 up up
#ge-0/0/5.0 up up
#ge-0/0/6 up up
Index: configs/asher-ps.nid.onenet.net
===================================================================
--- configs/asher-ps.nid.onenet.net (revision 149470)
+++ configs/asher-ps.nid.onenet.net (working copy)
@@ -557,7 +557,7 @@
network-element ne-1
configure nte nte112pro-1-1-1
configure access-port access-1-1-1-3
- admin-state unassigned
+ admin-state maintenance
service-type epl
speed auto
port-shaped-speed 0
@@ -1911,10 +1911,11 @@
configure nte nte112pro-1-1-1
configure access-port access-1-1-1-3
configure flow flow-1-1-1-3-1
+ admin-state management
circuit-name ""
es-frame-loss-threshold 1
ses-frame-loss-threshold-ratio 30
- access-interface access-1-1-1-3 network-interface network-1-1-1-1 push 3-0 none
+ access-interface access-1-1-1-3 network-interface network-1-1-1-1 push 400-0 none
a2n-shaping-type flow-based
policing enabled
policing-control a2n-n2a
@@ -2098,8 +2099,8 @@
configure access-port access-1-1-1-3
configure flow flow-1-1-1-3-1
configure a2n-policer a2n_policer-1-1-1-3-1-0
- eir 0
- ebs 0
+ ebs 1024
+ eir 100032000
cir 0
cbs 0
color-marking enabled
Index: configs/core2.dc.onenet.net
===================================================================
--- configs/core2.dc.onenet.net (revision 149717)
+++ configs/core2.dc.onenet.net (working copy)
@@ -1,12 +1,12 @@
# RANCID-CONTENT-TYPE: juniper
#
# grnoc-mon at MX480_DC_02_RE0> show system commit
+# 2017-01-11 18:19:24 CST by andrew via cli commit synchronize
# 2017-01-11 11:57:47 CST by andrew via cli commit synchronize
# 2017-01-08 15:23:08 CST by andrew via cli commit confirmed, rollback in 3mins synchronize
# 2017-01-08 12:09:14 CST by andrew via cli commit synchronize
# 2017-01-08 11:58:05 CST by andrew via cli commit synchronize
# 2017-01-08 11:40:19 CST by andrew via cli commit synchronize
-# 2017-01-08 11:37:58 CST by andrew via cli commit synchronize
# grnoc-mon at MX480_DC_02_RE0> show chassis environment
# Class Item Status Measurement
# Temp PEM 0 OK
@@ -326,7 +326,7 @@
# grnoc-mon at MX480_DC_02_RE0> show system uptime
# System booted: 2016-09-03 21:49 CDT
# Protocols started: 2016-09-03 21:51 CDT
-# Last configured: 2017-01-11 11:57 CST by andrew
+# Last configured: 2017-01-11 18:19 CST by andrew
#
# {master}
# grnoc-mon at MX480_DC_02_RE0> show interface terse
@@ -548,7 +548,6 @@
#irb.2714 up up
#irb.2716 up up
#irb.2717 up up
-#irb.2718 up up
#irb.2719 up up
#irb.2723 up up
#irb.2724 up up
@@ -595,7 +594,7 @@
#pp0 up up
#tap up up
# grnoc-mon at MX480_DC_02_RE0> show configuration
-## Last commit: 2017-01-11 11:57:47 CST by andrew
+## Last commit: 2017-01-11 18:19:24 CST by andrew
version 12.3R7.7;
groups {
re0 {
@@ -1656,12 +1655,6 @@
address 164.58.25.201/29;
}
}
- unit 2718 {
- description "un_ou_vm___01-2718 [DECOM]";
- family inet {
- address 164.58.25.229/30;
- }
- }
unit 2719 {
description un_samplic_01-2719;
family inet {
@@ -3763,10 +3756,6 @@
vlan-id 2712;
routing-interface irb.2712;
}
- un_ou_vm___01-2718 {
- vlan-id 2718;
- routing-interface irb.2718;
- }
un_outside-01-0250 {
vlan-id 250;
routing-interface irb.250;
Index: configs/core5.tul.onenet.net
===================================================================
--- configs/core5.tul.onenet.net (revision 149722)
+++ configs/core5.tul.onenet.net (working copy)
@@ -1,12 +1,12 @@
# RANCID-CONTENT-TYPE: juniper
#
# grnoc-mon at TULSA-CORE5-MX480-RE0> show system commit
+# 2017-01-11 18:41:57 CST by andrew via cli commit synchronize
# 2017-01-11 14:01:39 CST by andrew via cli commit synchronize
# 2017-01-11 14:00:38 CST by andrew via cli commit synchronize
# 2017-01-11 13:52:12 CST by andrew via cli commit synchronize
# 2017-01-11 13:06:46 CST by andrew via cli commit synchronize
# 2017-01-11 12:58:11 CST by sky via cli commit synchronize
-# 2017-01-11 12:08:22 CST by sky via cli commit synchronize
# grnoc-mon at TULSA-CORE5-MX480-RE0> show chassis environment
# Class Item Status Measurement
# Temp PEM 0 OK
@@ -392,7 +392,7 @@
# grnoc-mon at TULSA-CORE5-MX480-RE0> show system uptime
# System booted: 2016-08-15 04:47 CDT
# Protocols started: 2016-08-15 04:53 CDT
-# Last configured: 2017-01-11 14:01 CST by andrew
+# Last configured: 2017-01-11 18:41 CST by andrew
#
# {master}
# grnoc-mon at TULSA-CORE5-MX480-RE0> show interface terse
@@ -826,7 +826,7 @@
#pp0 up up
#tap up up
# grnoc-mon at TULSA-CORE5-MX480-RE0> show configuration
-## Last commit: 2017-01-11 14:01:39 CST by andrew
+## Last commit: 2017-01-11 18:41:57 CST by andrew
version 13.3R9.13;
groups {
re0 {
@@ -3900,7 +3900,7 @@
}
}
unit 517 {
- description "DHS-OKMULGEE-N-WOOD-MGMT-100M-CIR0019727 [ORDERED]";
+ description DHS-OKMULGEE-N-WOOD-MGMT-100M-CIR0019727;
bandwidth 100m;
vlan-tags outer 517 inner 500;
family inet {
@@ -4150,7 +4150,7 @@
}
}
unit 1517 {
- description "DHS-OKMULGEE-N-WOOD-DATA-100M-CIR0019727 [ORDERED]";
+ description DHS-OKMULGEE-N-WOOD-DATA-100M-CIR0019727;
bandwidth 100m;
vlan-tags outer 517 inner 501;
family inet {
@@ -4348,7 +4348,7 @@
}
}
unit 2517 {
- description "DHS-OKMULGEE-N-WOOD-GUEST-100M-CIR0019727 [ORDERED]";
+ description DHS-OKMULGEE-N-WOOD-GUEST-100M-CIR0019727;
bandwidth 100m;
vlan-tags outer 517 inner 502;
family inet {
Index: configs/legal-aid-okc.client.onenet.net
===================================================================
--- configs/legal-aid-okc.client.onenet.net (revision 149728)
+++ configs/legal-aid-okc.client.onenet.net (working copy)
@@ -0,0 +1,1603 @@
+# RANCID-CONTENT-TYPE: juniper
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show system commit
+# 2017-01-11 18:55:30 CST by admin via cli
+# 2017-01-11 18:54:02 CST by admin via cli
+# 2017-01-05 08:44:37 CST by aduenas via junoscript
+# 2016-12-29 15:28:42 CST by admin via cli
+# 2016-12-29 14:54:06 CST by admin via cli
+# 2016-12-22 11:53:09 CST by aduenas via junoscript
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis environment
+# Class Item Status Measurement
+# Temp Routing Engine OK
+# Routing Engine CPU OK
+# Fans SRX240 PowerSupply fan 1 OK
+# SRX240 PowerSupply fan 2 OK
+# SRX240 CPU fan 1 OK
+# SRX240 CPU fan 2 OK
+# SRX240 IO fan 1 OK
+# SRX240 IO fan 2 OK
+# Power Power Supply 0 OK
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis firmware
+# Part Type Version
+# FPC 0 O/S Version 12.1X46-D40.2 by builder on 2015-09
+# FWDD O/S Version 12.1X46-D40.2 by builder on 2015-09
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis fpc detail
+# Slot 0 information:
+# State Online
+# Total CPU DRAM ---- CPU less FPC ----
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis hardware
+# Hardware inventory:
+# Item Version Part number Serial number Description
+# Chassis BU2815AK0705 SRX240H2
+# Routing Engine REV 14 750-043609 ACMN6095 RE-SRX240H2
+# FPC 0 FPC
+# PIC 0 16x GE Base PIC
+# Power Supply 0
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis hardware models
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis routing-engine
+# Routing Engine status:
+# Serial ID ACMN6095
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis scb
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis sfm detail
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show chassis ssb
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show system boot-messages
+# kld_map_v: 0x8ff80000, kld_map_p: 0x0
+# Copyright (c) 1996-2015, Juniper Networks, Inc.
+# All rights reserved.
+# Copyright (c) 1992-2006 The FreeBSD Project.
+# Copyright (c) 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, 1994
+# The Regents of the University of California. All rights reserved.
+# FreeBSD/SMP: Multiprocessor System Detected: 4 CPUs
+# Security policy loaded: JUNOS MAC/pcap (mac_pcap)
+# Security policy loaded: JUNOS MAC/runasnonroot (mac_runasnonroot)
+# netisr_init: !debug_mpsafenet, forcing maxthreads from 4 to 1
+# cpu0 on motherboard
+# : CAVIUM's OCTEON 52XX CPU Rev. 0.8 with no FPU implemented
+# L1 Cache: I size 32kb(128 line), D size 8kb(128 line), sixty four way.
+# L2 Cache: Size 512kb, 8 way
+# obio0 on motherboard
+# uart0: <Octeon-16550 channel 0> on obio0
+# uart0: console (9600,n,8,1)
+# twsi0 on obio0
+# dwc0: <Synopsis DWC OTG Controller Driver> on obio0
+# usb0: <USB Bus for DWC OTG Controller> on dwc0
+# usb0: USB revision 2.0
+# uhub0: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub0: 1 port with 1 removable, self powered
+# uhub1: vendor 0x0409 product 0x005a, class 9/0, rev 2.00/1.00, addr 2
+# uhub1: single transaction translator
+# uhub1: 3 ports with 2 removable, self powered
+# umass0: STMicroelectronics ST72682 High Speed Mode, rev 2.00/2.10, addr 3
+# dwc1: <Synopsis DWC OTG Controller Driver> on obio0
+# usb1: <USB Bus for DWC OTG Controller> on dwc1
+# usb1: USB revision 2.0
+# uhub2: vendor 0x0000 DWC OTG root hub, class 9/0, rev 2.00/1.00, addr 1
+# uhub2: 1 port with 1 removable, self powered
+# cpld0 on obio0
+# pcib1: <Cavium on-chip PCIe HOST bridge> on obio0
+# Disabling Octeon big bar support
+# PCIe: Waiting for port 0 to finish reset
+# PCIe: Port 0 link active, 2 lanes
+# PCIe: Waiting for port 1 to finish reset
+# PCIe: Port 1 link active, 1 lanes
+# pcib1: Initialized controller
+# pci0: <PCI bus> on pcib1
+# pcib2: <PCI-PCI bridge> irq 0 at device 0.0 on pci0
+# pci1: <PCI bus> on pcib2
+# pci1: <serial bus, USB> at device 2.0 (no driver attached)
+# pci1: <serial bus, USB> at device 2.1 (no driver attached)
+# pci1: <network> at device 7.0 (no driver attached)
+# pcib0: <Cavium on-chip PCIe HOST bridge> on obio0
+# pci2: <PCI bus> on pcib0
+# pci2: <processor> at device 0.0 (no driver attached)
+# gblmem0 on obio0
+# octpkt0: <Octeon RGMII> on obio0
+# cfi0: <AMD/Fujitsu - 4MB> on obio0
+# Timecounter "mips" frequency 600000000 Hz quality 0
+# ###PCB Group initialized for udppcbgroup
+# ###PCB Group initialized for tcppcbgroup
+# da0 at umass-sim0 bus 0 target 0 lun 0
+# da0: <ST ST72682 2.10> Removable Direct Access SCSI-2 device
+# da0: 40.000MB/s transfers
+# da0: 2000MB (4096000 512 byte sectors: 255H 63S/T 254C)
+# Trying to mount root from ufs:/dev/da0s2a
+# WARNING: / was not properly dismounted
+# WARNING: / was not properly dismounted
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show version
+# Hostname: LEGAL-AID-OKC-SRX240-MR # Model: srx240h2 # JUNOS Software Release [12.1X46-D40.2] # # grnoc-mon at LEGAL-AID-OKC-SRX240-MR> file list /var/tmp detail # lrw-r--r-- 1 root wheel 11 Sep 26 2015 /var/tmp@ -> /cf/var/tmp
+# total files: 1
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show system uptime
+# System booted: 2016-11-08 16:48 CST
+# Protocols started: 2016-11-08 16:52 CST
+# Last configured: 2017-01-11 18:55 CST by admin
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show interface terse
+#Interface Admin Link
+#ge-0/0/0 up up
+#ge-0/0/0.500 up up
+#ge-0/0/0.501 up up
+#ge-0/0/0.32767 up up
+#gr-0/0/0 up up
+#ip-0/0/0 up up
+#lsq-0/0/0 up up
+#lt-0/0/0 up up
+#mt-0/0/0 up up
+#sp-0/0/0 up up
+#sp-0/0/0.0 up up
+#sp-0/0/0.16383 up up
+#ge-0/0/1 down down
+#ge-0/0/2 down down
+#ge-0/0/3 down down
+#ge-0/0/4 down down
+#ge-0/0/5 down down
+#ge-0/0/6 down down
+#ge-0/0/7 down down
+#ge-0/0/8 down down
+#ge-0/0/9 down down
+#ge-0/0/10 down down
+#ge-0/0/11 down down
+#ge-0/0/12 up up
+#ge-0/0/12.0 up up
+#ge-0/0/13 up up
+#ge-0/0/13.0 up up
+#ge-0/0/14 up up
+#ge-0/0/14.0 up up
+#ge-0/0/15 up up
+#ge-0/0/15.1 up up
+#ge-0/0/15.2 up up
+#ge-0/0/15.4 up up
+#ge-0/0/15.5 up up
+#ge-0/0/15.32767 up up
+#fxp2 up up
+#fxp2.0 up up
+#gre up up
+#ipip up up
+#irb up up
+#lo0 up up
+#lo0.0 up up
+#lo0.16384 up up
+#lo0.16385 up up
+#lo0.32768 up up
+#lsi up up
+#mtun up up
+#pimd up up
+#pime up up
+#pp0 up up
+#ppd0 up up
+#ppe0 up up
+#st0 up up
+#st0.0 up up
+#st0.10 up up
+#st0.11 up up
+#st0.12 up up
+#st0.13 up up
+#st0.14 up up
+#st0.15 up up
+#st0.16 up up
+#st0.17 up up
+#st0.18 up up
+#st0.19 up up
+#st0.20 up up
+#st0.21 up up
+#st0.22 up up
+#st0.23 up up
+#tap up up
+#vlan up up
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show configuration
+## Last commit: 2017-01-11 18:55:30 CST by admin
+version 12.1X46-D40.2;
+system {
+ host-name LEGAL-AID-OKC-SRX240-MR;
+ domain-name onenet.net;
+ time-zone America/Chicago;
+ authentication-order [ radius password ];
+ ports {
+ console log-out-on-disconnect;
+ }
+ root-authentication {
+# encrypted-password <removed>;
+ }
+ name-server {
+ 164.58.200.200;
+ 156.110.200.200;
+ }
+ radius-server {
+ 156.110.31.11 {
+# secret "<removed>"; ## SECRET-DATA
+ source-address 164.58.28.58;
+ }
+ }
+ radius-options {
+ attributes {
+ nas-ip-address 164.58.28.58;
+ }
+ }
+ login {
+ message "\n+----------------------------------------------------------------------------+\n| |\n| Managed by Oklahoma State Regents for Higher Education |\n| Oklahoma Network for Education Enrichment (ONENET) |\n| |\n| *** Unauthorized Use or Access Prohibited *** |\n| |\n| For more information, contact: |\n| |\n| Oklahoma State Regents for Higher Education |\n| Educational Telecommunications Network -- ONENET |\n| (888) 566-3638 |\n| !
info at onenet.net |\n| |\n+----------------------------------------------------------------------------+\n";
+ class admin {
+ idle-timeout 30;
+ permissions all;
+ }
+ class lockdown {
+ idle-timeout 2;
+ permissions view;
+ deny-commands .*;
+ deny-configuration .*;
+ }
+ class operator-local {
+ idle-timeout 15;
+ permissions [ access admin configure firewall interface network routing snmp system trace view ];
+ allow-commands "show log messages";
+ }
+ class robot {
+ idle-timeout 10;
+ permissions [ admin configure firewall interface routing secret security snmp system trace view ];
+ }
+ user admin {
+ uid 1000;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user aduenas {
+ uid 2100;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user client {
+ uid 2000;
+ class admin;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ user eng {
+ uid 2018;
+ class admin;
+ }
+ user rancid {
+ uid 2001;
+ class robot;
+ }
+ user remote {
+ uid 2002;
+ class operator-local;
+ }
+ user upgrades {
+ uid 2003;
+ class operator;
+ authentication {
+# ssh-rsa <removed>;
+ }
+ }
+ user wguyton {
+ full-name "william guyton";
+ uid 2101;
+ class super-user;
+ authentication {
+# encrypted-password <removed>;
+ }
+ }
+ }
+ services {
+ ssh {
+ root-login deny;
+ protocol-version v2;
+ }
+ dhcp-local-server {
+ group JDHCP {
+ interface ge-0/0/15.1;
+ interface ge-0/0/15.4;
+ interface ge-0/0/15.5;
+ }
+ }
+ web-management {
+ https {
+ system-generated-certificate;
+ }
+ session {
+ idle-timeout 60;
+ }
+ }
+ }
+ syslog {
+ archive size 10m files 5;
+ user * {
+ any emergency;
+ }
+ file messages {
+ any notice;
+ authorization info;
+ }
+ file interactive-commands {
+ interactive-commands any;
+ }
+ file PROTECT-RE {
+ firewall any;
+ archive no-world-readable;
+ }
+ file traffic {
+ any any;
+ match RT_FLOW_SESSION;
+ }
+ file updown {
+ any any;
+ match "SNMP_TRAP_LINK_|(TRAP_LINK)|bgp_rt_maxprefixes_check|RPD_BGP_NEIGHBOR_STATE";
+ }
+ }
+ max-configurations-on-flash 20;
+ max-configuration-rollbacks 20;
+ ntp {
+ server 164.58.3.98 prefer;
+ }
+}
+interfaces {
+ ge-0/0/0 {
+ description "Link to OneNet";
+ vlan-tagging;
+ speed 100m;
+ link-mode full-duplex;
+ gigether-options {
+ no-auto-negotiation;
+ }
+ unit 500 {
+ description "OneNet Internet";
+ vlan-id 500;
+ family inet {
+ address 164.58.28.58/30;
+ }
+ }
+ unit 501 {
+ description "OneNet MPLS";
+ vlan-id 501;
+ family inet {
+ address 10.199.6.2/30;
+ }
+ }
+ }
+ ge-0/0/1 {
+ disable;
+ }
+ ge-0/0/2 {
+ disable;
+ }
+ ge-0/0/3 {
+ disable;
+ }
+ ge-0/0/4 {
+ disable;
+ }
+ ge-0/0/5 {
+ disable;
+ }
+ ge-0/0/6 {
+ disable;
+ }
+ ge-0/0/7 {
+ disable;
+ }
+ ge-0/0/8 {
+ disable;
+ }
+ ge-0/0/9 {
+ disable;
+ }
+ ge-0/0/10 {
+ disable;
+ }
+ ge-0/0/11 {
+ disable;
+ }
+ ge-0/0/12 {
+ description "Link to SSG Untrust";
+ unit 0 {
+ family inet {
+ address 164.58.22.241/28;
+ }
+ }
+ }
+ ge-0/0/13 {
+ description "Link to SSG Trust";
+ unit 0 {
+ family inet {
+ address 10.255.255.253/30;
+ }
+ }
+ }
+ ge-0/0/14 {
+ description "Link to Cox TLAN";
+ unit 0 {
+ family inet {
+ address 172.31.253.129/25;
+ }
+ }
+ }
+ ge-0/0/15 {
+ description "Link to Switch";
+ flexible-vlan-tagging;
+ native-vlan-id 1;
+ unit 1 {
+ vlan-id 1;
+ family inet {
+ address 192.168.1.4/24;
+ address 192.168.1.1/24;
+ }
+ }
+ unit 2 {
+ vlan-id 2;
+ family inet {
+ address 192.168.25.1/24;
+ }
+ }
+ unit 4 {
+ vlan-id 4;
+ family inet {
+ address 192.168.101.1/24;
+ }
+ }
+ unit 5 {
+ vlan-id 5;
+ family inet {
+ address 192.168.102.1/24;
+ }
+ }
+ }
+ lo0 {
+ unit 0 {
+ family inet {
+ filter {
+ input PROTECT-RE;
+ }
+ }
+ }
+ }
+ st0 {
+ unit 0 {
+ description AZURE-VPN;
+ family inet;
+ }
+ unit 10 {
+ description LAOK-ADA-VPN;
+ family inet;
+ }
+ unit 11 {
+ description LAOK-ALTUS-VPN;
+ family inet;
+ }
+ unit 12 {
+ description LAOK-ARDMORE-VPN;
+ family inet;
+ }
+ unit 13 {
+ description LAOK-BARTLESVILLE-VPN;
+ family inet;
+ }
+ unit 14 {
+ description LAOK-GUYMON-VPN;
+ family inet;
+ }
+ unit 15 {
+ description LAOK-HUGO-VPN;
+ family inet;
+ }
+ unit 16 {
+ description LAOK-LAWTON-VPN;
+ family inet;
+ }
+ unit 17 {
+ description LAOK-MUSKOGEE-VPN;
+ family inet;
+ }
+ unit 18 {
+ description LAOK-POTEAU-VPN;
+ family inet;
+ }
+ unit 19 {
+ description LAOK-SHAWNEE-VPN;
+ family inet;
+ }
+ unit 20 {
+ description LAOK-STILLWATER-VPN;
+ family inet;
+ }
+ unit 21 {
+ description LAOK-TAHLEQUAH-VPN;
+ family inet;
+ }
+ unit 22 {
+ description LAOK-WEATHERFORD-VPN;
+ family inet;
+ }
+ unit 23 {
+ description LAOK-WOODWARD-VPN;
+ family inet;
+ }
+ }
+}
+snmp {
+ description OneNet;
+ contact "Net Group";
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+ community "<removed>" {
+ authorization read-write;
+ }
+ community "<removed>" {
+ authorization read-only;
+ }
+}
+routing-options {
+ static {
+ route 0.0.0.0/0 next-hop 164.58.28.57;
+ route 192.168.42.0/24 next-hop 10.199.6.1;
+ route 192.168.36.0/24 next-hop 10.199.6.1;
+ route 192.168.37.0/24 next-hop 10.199.6.1;
+ route 192.168.38.0/24 next-hop 10.199.6.1;
+ route 10.199.6.0/25 next-hop 10.199.6.1;
+ route 10.100.100.0/24 next-hop 10.255.255.254;
+ route 192.168.2.0/24 next-hop 172.31.253.130;
+ route 192.168.10.0/24 next-hop 172.31.253.130;
+ route 192.168.11.0/24 next-hop 172.31.253.130;
+ route 192.168.12.0/24 next-hop 172.31.253.130;
+ route 192.168.13.0/24 next-hop 172.31.253.130;
+ route 192.168.14.0/24 next-hop 172.31.253.130;
+ route 10.100.120.0/22 next-hop st0.0;
+ route 192.168.129.0/24 next-hop st0.10;
+ route 192.168.130.0/24 next-hop st0.11;
+ route 192.168.131.0/24 next-hop st0.12;
+ route 192.168.138.0/24 next-hop st0.15;
+ route 192.168.140.0/24 next-hop st0.16;
+ route 192.168.153.0/24 next-hop st0.14;
+ route 192.168.147.0/24 next-hop st0.23;
+ route 192.168.141.0/24 next-hop st0.17;
+ route 192.168.143.0/24 next-hop st0.18;
+ route 192.168.144.0/24 next-hop st0.19;
+ route 192.168.145.0/24 next-hop st0.20;
+ route 192.168.134.0/24 next-hop st0.22;
+ route 192.168.132.0/24 next-hop st0.13;
+ route 192.168.146.0/24 next-hop st0.21;
+ route 192.168.111.0/24 next-hop 10.199.6.1;
+ route 192.168.112.0/24 next-hop 10.199.6.1;
+ route 192.168.113.0/24 next-hop 10.199.6.1;
+ }
+}
+protocols {
+ ospf {
+ export EXPORT-TO-OSPF;
+ area 0.0.0.0 {
+ interface ge-0/0/14.0;
+ }
+ }
+ lldp {
+ interface all;
+ }
+ stp;
+}
+policy-options {
+ prefix-list PRE-MGMT-SOURCES {
+ 156.110.31.0/27;
+ 156.110.31.32/28;
+ 164.58.253.0/24;
+ }
+ prefix-list PRE-LOCALIPv4-SOURCES {
+ apply-path "interfaces <*> unit <*> family inet address <*>";
+ }
+ policy-statement EXPORT-TO-OSPF {
+ term REJECT-DEFAULT {
+ from {
+ route-filter 0.0.0.0/0 exact;
+ }
+ then reject;
+ }
+ term REJECT-BATESVILLE {
+ from {
+ route-filter 10.100.100.0/24 exact;
+ }
+ then reject;
+ }
+ term SEND-STATIC {
+ from protocol static;
+ then accept;
+ }
+ term SEND-DIRECT {
+ from protocol direct;
+ then accept;
+ }
+ term REJECT-ALL-ELSE {
+ then reject;
+ }
+ }
+}
+security {
+ ike {
+ proposal PRE-G2-AES256-SHA {
+ authentication-method pre-shared-keys;
+ dh-group group2;
+ authentication-algorithm sha1;
+ encryption-algorithm aes-256-cbc;
+ lifetime-seconds 28800;
+ }
+ proposal PRE-G2-AES128-SHA {
+ authentication-method pre-shared-keys;
+ dh-group group2;
+ authentication-algorithm sha1;
+ encryption-algorithm aes-128-cbc;
+ lifetime-seconds 28800;
+ }
+ policy IKE-POLICY-AZURE {
+ mode main;
+ proposals PRE-G2-AES256-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-ADA {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-ALTUS {
+ mode aggressive;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-ARDMORE {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-HUGO {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-LAWTON {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-GUYMON {
+ mode aggressive;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-WOODWARD {
+ mode aggressive;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-MUSKOGEE {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-POTEAU {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-SHAWNEE {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-STILLWATER {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-WEATHERFORD {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-BARTLESVILLE {
+ mode main;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ policy IKE-POLICY-TAHLEQUAH {
+ mode aggressive;
+ proposals PRE-G2-AES128-SHA;
+# pre-shared-#key <removed>;
+ }
+ gateway IKE-GATE-AZURE {
+ ike-policy IKE-POLICY-AZURE;
+ address 104.43.235.2;
+ external-interface ge-0/0/0.500;
+ version v2-only;
+ }
+ gateway IKE-GATE-ADA {
+ ike-policy IKE-POLICY-ADA;
+ address 69.92.92.164;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-ALTUS {
+ ike-policy IKE-POLICY-ALTUS;
+ dynamic user-at-hostname "altus at laok.com";
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-ARDMORE {
+ ike-policy IKE-POLICY-ARDMORE;
+ address 69.92.121.47;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-HUGO {
+ ike-policy IKE-POLICY-HUGO;
+ address 209.33.92.233;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-LAWTON {
+ ike-policy IKE-POLICY-LAWTON;
+ address 24.139.48.191;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-GUYMON {
+ ike-policy IKE-POLICY-GUYMON;
+ dynamic user-at-hostname "guymon at laok.com";
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-WOODWARD {
+ ike-policy IKE-POLICY-WOODWARD;
+ dynamic user-at-hostname "woodward at laok.com";
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-MUSKOGEE {
+ ike-policy IKE-POLICY-MUSKOGEE;
+ address 66.76.254.173;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-POTEAU {
+ ike-policy IKE-POLICY-POTEAU;
+ address 75.89.94.190;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-SHAWNEE {
+ ike-policy IKE-POLICY-SHAWNEE;
+ address 65.64.64.114;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-STILLWATER {
+ ike-policy IKE-POLICY-STILLWATER;
+ address 66.76.244.231;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-WEATHERFORD {
+ ike-policy IKE-POLICY-WEATHERFORD;
+ address 173.219.106.23;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-BARTLESVILLE {
+ ike-policy IKE-POLICY-BARTLESVILLE;
+ address 184.155.102.138;
+ external-interface ge-0/0/0.500;
+ }
+ gateway IKE-GATE-TAHLEQUAH {
+ ike-policy IKE-POLICY-TAHLEQUAH;
+ dynamic user-at-hostname "tahlequah at laok.com";
+ external-interface ge-0/0/0.500;
+ }
+ }
+ ipsec {
+ proposal ESP-AES256-SHA {
+ protocol esp;
+ authentication-algorithm hmac-sha1-96;
+ encryption-algorithm aes-256-cbc;
+ lifetime-seconds 3600;
+ }
+ proposal ESP-AES128-SHA {
+ protocol esp;
+ authentication-algorithm hmac-sha1-96;
+ encryption-algorithm aes-128-cbc;
+ lifetime-seconds 3600;
+ }
+ policy VPN-POLICY-AZURE {
+ proposals ESP-AES256-SHA;
+ }
+ policy VPN-POLICY-ADA {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-ALTUS {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-ARDMORE {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-HUGO {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-LAWTON {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-GUYMON {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-WOODWARD {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-MUSKOGEE {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-POTEAU {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-SHAWNEE {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-STILLWATER {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-WEATHERFORD {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-BARTLESVILLE {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ policy VPN-POLICY-TAHLEQUAH {
+ perfect-forward-secrecy {
+ keys group2;
+ }
+ proposals ESP-AES128-SHA;
+ }
+ vpn IPSEC-VPN-AZURE {
+ bind-interface st0.0;
+ ike {
+ gateway IKE-GATE-AZURE;
+ ipsec-policy VPN-POLICY-AZURE;
+ }
+ }
+ vpn IPSEC-VPN-ADA {
+ bind-interface st0.10;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-ADA;
+ ipsec-policy VPN-POLICY-ADA;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-ALTUS {
+ bind-interface st0.11;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-ALTUS;
+ ipsec-policy VPN-POLICY-ALTUS;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-ARDMORE {
+ bind-interface st0.12;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-ARDMORE;
+ ipsec-policy VPN-POLICY-ARDMORE;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-HUGO {
+ bind-interface st0.15;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-HUGO;
+ ipsec-policy VPN-POLICY-HUGO;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-LAWTON {
+ bind-interface st0.16;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-LAWTON;
+ ipsec-policy VPN-POLICY-LAWTON;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-GUYMON {
+ bind-interface st0.14;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-GUYMON;
+ ipsec-policy VPN-POLICY-GUYMON;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-WOODWARD {
+ bind-interface st0.23;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-WOODWARD;
+ ipsec-policy VPN-POLICY-WOODWARD;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-MUSKOGEE {
+ bind-interface st0.17;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-MUSKOGEE;
+ ipsec-policy VPN-POLICY-MUSKOGEE;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-POTEAU {
+ bind-interface st0.18;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-POTEAU;
+ ipsec-policy VPN-POLICY-POTEAU;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-SHAWNEE {
+ bind-interface st0.19;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-SHAWNEE;
+ ipsec-policy VPN-POLICY-SHAWNEE;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-STILLWATER {
+ bind-interface st0.20;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-STILLWATER;
+ ipsec-policy VPN-POLICY-STILLWATER;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-WEATHERFORD {
+ bind-interface st0.22;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-WEATHERFORD;
+ ipsec-policy VPN-POLICY-WEATHERFORD;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-BARTLESVILLE {
+ bind-interface st0.13;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-BARTLESVILLE;
+ ipsec-policy VPN-POLICY-BARTLESVILLE;
+ }
+ establish-tunnels immediately;
+ }
+ vpn IPSEC-VPN-TAHLEQUAH {
+ bind-interface st0.21;
+ vpn-monitor {
+ optimized;
+ }
+ ike {
+ gateway IKE-GATE-TAHLEQUAH;
+ ipsec-policy VPN-POLICY-TAHLEQUAH;
+ }
+ establish-tunnels immediately;
+ }
+ }
+ address-book {
+ global {
+ address HOST-192.168.25.30 192.168.25.30/32;
+ address HOST-192.168.25.35 192.168.25.35/32;
+ }
+ }
+ utm {
+ utm-policy junos-wf-policy {
+ web-filtering {
+ http-profile junos-wf-websense-default;
+ }
+ }
+ }
+ flow {
+ tcp-mss {
+ ipsec-vpn {
+ mss 1350;
+ }
+ }
+ }
+ screen {
+ ids-option UNTRUST-SCREEN {
+ icmp {
+ ping-death;
+ }
+ ip {
+ source-route-option;
+ tear-drop;
+ }
+ tcp {
+ syn-flood {
+ alarm-threshold 1024;
+ attack-threshold 200;
+ source-threshold 1024;
+ destination-threshold 2048;
+ timeout 20;
+ }
+ land;
+ }
+ }
+ }
+ nat {
+ source {
+ rule-set TRUST-TO-UNTRUST-NAT {
+ from zone TRUST;
+ to zone UNTRUST;
+ rule NAT-TRUST-TO-UNTRUST {
+ match {
+ source-address 0.0.0.0/0;
+ }
+ then {
+ source-nat {
+ interface;
+ }
+ }
+ }
+ }
+ }
+ static {
+ rule-set SNAT-UNTRUST {
+ from zone UNTRUST;
+ rule 164-058-072-226 {
+ match {
+ destination-address 164.58.72.226/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 192.168.25.30/32;
+ }
+ }
+ }
+ }
+ rule 164-058-072-227 {
+ match {
+ destination-address 164.58.72.227/32;
+ }
+ then {
+ static-nat {
+ prefix {
+ 192.168.25.35/32;
+ }
+ }
+ }
+ }
+ }
+ }
+ }
+ policies {
+ from-zone TRUST to-zone UNTRUST {
+ policy TRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit {
+ application-services {
+ utm-policy junos-wf-policy;
+ }
+ }
+ }
+ }
+ }
+ from-zone TRUST to-zone TRUST {
+ policy TRUST-TO-TRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone UNTRUST to-zone UNTRUST {
+ policy UNTRUST-TO-UNTRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone TRUST to-zone VPN {
+ policy TRUST-TO-VPN {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone VPN to-zone TRUST {
+ policy VPN-TO-TRUST {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone VPN to-zone VPN {
+ policy VPN-TO-VPN {
+ match {
+ source-address any;
+ destination-address any;
+ application any;
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ from-zone UNTRUST to-zone TRUST {
+ policy 201612120908 {
+ match {
+ source-address any;
+ destination-address HOST-192.168.25.30;
+ application junos-https;
+ }
+ then {
+ permit;
+ }
+ }
+ policy 201612291526 {
+ match {
+ source-address any;
+ destination-address HOST-192.168.25.35;
+ application [ junos-smtp junos-http junos-https ];
+ }
+ then {
+ permit;
+ }
+ }
+ }
+ }
+ zones {
+ security-zone TRUST {
+ interfaces {
+ ge-0/0/0.501 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ ge-0/0/15.1 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ ping;
+ traceroute;
+ ssh;
+ https;
+ snmp;
+ }
+ }
+ }
+ ge-0/0/15.2 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ ge-0/0/15.4 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ ge-0/0/15.5 {
+ host-inbound-traffic {
+ system-services {
+ dhcp;
+ ping;
+ traceroute;
+ }
+ }
+ }
+ ge-0/0/14.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ protocols {
+ ospf;
+ }
+ }
+ }
+ ge-0/0/13.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone UNTRUST {
+ screen UNTRUST-SCREEN;
+ interfaces {
+ ge-0/0/0.500 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ snmp;
+ ssh;
+ traceroute;
+ ike;
+ }
+ }
+ }
+ ge-0/0/12.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ security-zone VPN {
+ interfaces {
+ st0.0 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.10 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.11 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.12 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.15 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.16 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.14 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.23 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.17 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.18 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.19 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.20 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.22 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.13 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ st0.21 {
+ host-inbound-traffic {
+ system-services {
+ ping;
+ traceroute;
+ }
+ }
+ }
+ }
+ }
+ }
+}
+firewall {
+ family inet {
+ filter PROTECT-RE {
+ term SSH-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port ssh;
+ }
+ then accept;
+ }
+ term SNMP-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol udp;
+ destination-port snmp;
+ }
+ then accept;
+ }
+ term HTTPS-ALLOW {
+ from {
+ source-prefix-list {
+ PRE-MGMT-SOURCES;
+ PRE-LOCALIPv4-SOURCES;
+ }
+ protocol tcp;
+ destination-port https;
+ }
+ then accept;
+ }
+ term SSH-DENY {
+ from {
+ protocol tcp;
+ destination-port ssh;
+ }
+ then {
+ discard;
+ }
+ }
+ term SNMP-DENY {
+ from {
+ protocol udp;
+ destination-port snmp;
+ }
+ then {
+ discard;
+ }
+ }
+ term HTTPS-DENY {
+ from {
+ protocol tcp;
+ destination-port https;
+ }
+ then {
+ discard;
+ }
+ }
+ term ALL-TRAFFIC {
+ then accept;
+ }
+ }
+ }
+}
+access {
+ address-assignment {
+ pool 192-168-1-0-POOL {
+ family inet {
+ network 192.168.1.0/24;
+ range 192-168-1-0-RANGE {
+ low 192.168.1.120;
+ high 192.168.1.224;
+ }
+ dhcp-attributes {
+ domain-name ad.laso.org;
+ name-server {
+ 192.168.25.30;
+ 192.168.11.240;
+ }
+ router {
+ 192.168.1.1;
+ }
+ }
+ }
+ }
+ pool 192-168-101-0-POOL {
+ family inet {
+ network 192.168.101.0/24;
+ range 192-168-101-0-RANGE {
+ low 192.168.101.50;
+ high 192.168.101.200;
+ }
+ dhcp-attributes {
+ domain-name ad.laso.org;
+ name-server {
+ 192.168.25.30;
+ 192.168.11.240;
+ }
+ router {
+ 192.168.101.1;
+ }
+ }
+ }
+ }
+ pool 192-168-102-0-POOL {
+ family inet {
+ network 192.168.102.0/24;
+ range 192-168-102-0-RANGE {
+ low 192.168.102.100;
+ high 192.168.102.200;
+ }
+ dhcp-attributes {
+ domain-name laso.org;
+ name-server {
+ 8.8.8.8;
+ 8.8.4.4;
+ }
+ router {
+ 192.168.102.1;
+ }
+ }
+ }
+ }
+ }
+}
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show ospf neighbor
+# Address Interface State ID Pri Dead
+# 172.31.253.130 ge-0/0/14.0 Full 192.168.253.1
+#
+# grnoc-mon at LEGAL-AID-OKC-SRX240-MR> show bfd session
+
+0 sessions, 0 clients
+Cumulative transmit rate 0.0 pps, cumulative receive rate 0.0 pps
+
Index: configs/core1.dc.onenet.net
===================================================================
--- configs/core1.dc.onenet.net (revision 149717)
+++ configs/core1.dc.onenet.net (working copy)
@@ -1,12 +1,12 @@
# RANCID-CONTENT-TYPE: juniper
#
# grnoc-mon at MX480_DC_01_RE0> show system commit
+# 2017-01-11 18:19:20 CST by andrew via cli commit synchronize
# 2017-01-11 11:58:00 CST by andrew via cli commit synchronize
# 2017-01-11 11:24:01 CST by andrew via cli commit synchronize
# 2017-01-09 17:17:31 CST by andrew via cli commit confirmed, rollback in 3mins synchronize
# 2017-01-08 15:24:58 CST by andrew via cli commit confirmed, rollback in 3mins synchronize
# 2017-01-08 14:51:57 CST by andrew via cli commit synchronize
-# 2017-01-08 14:17:11 CST by andrew via cli commit synchronize
# grnoc-mon at MX480_DC_01_RE0> show chassis environment
# Class Item Status Measurement
# Temp PEM 0 OK
@@ -338,7 +338,7 @@
# grnoc-mon at MX480_DC_01_RE0> show system uptime
# System booted: 2014-08-25 20:38 CDT
# Protocols started: 2014-08-25 20:39 CDT
-# Last configured: 2017-01-11 11:58 CST by andrew
+# Last configured: 2017-01-11 18:19 CST by andrew
#
# {master}
# grnoc-mon at MX480_DC_01_RE0> show interface terse
@@ -590,7 +590,6 @@
#irb.2714 up up
#irb.2716 up up
#irb.2717 up up
-#irb.2718 up up
#irb.2719 up up
#irb.2723 up up
#irb.2724 up up
@@ -639,7 +638,7 @@
#pp0 up up
#tap up up
# grnoc-mon at MX480_DC_01_RE0> show configuration
-## Last commit: 2017-01-11 11:58:00 CST by andrew
+## Last commit: 2017-01-11 18:19:20 CST by andrew
version 12.3R7.7;
groups {
re0 {
@@ -1907,12 +1906,6 @@
address 164.58.25.201/29;
}
}
- unit 2718 {
- description "un_ou_vm___01-2718 [DECOM]";
- family inet {
- address 164.58.25.229/30;
- }
- }
unit 2719 {
description un_samplic_01-2719;
family inet {
@@ -4174,10 +4167,6 @@
vlan-id 2712;
routing-interface irb.2712;
}
- un_ou_vm___01-2718 {
- vlan-id 2718;
- routing-interface irb.2718;
- }
un_outside-01-0250 {
vlan-id 250;
routing-interface irb.250;
Index: routers.all
===================================================================
--- routers.all (revision 149712)
+++ routers.all (working copy)
@@ -430,6 +430,7 @@
law-adva.p.onenet.net:fsp3000
lawton-ps.client.onenet.net:juniper
leflore-ps.client.onenet.net:juniper
+legal-aid-okc.client.onenet.net:juniper
legal-aid-tulsa.client.onenet.net:juniper
lone-wolf-ps.client.onenet.net:juniper
lowery-ps.client.onenet.net:juniper
More information about the Nocrancid
mailing list