Вы находитесь на странице: 1из 7

<RR01SMR-MEX-70109443>dis cu

[V200R006C10SPC600]
#
sysname RR01SMR-MEX-70109443
#
drop illegal-mac alarm
#
pki realm default
enrollment self-signed
#
ssl policy default_policy type server
pki-realm default
#
acl name ce.mt 3995
rule 5 permit tcp source 172.30.34.86 0 source-port eq telnet
rule 10 permit tcp source 172.30.34.86 0 source-port eq tacacs
rule 15 permit tcp source 172.30.34.86 0 source-port eq 161
rule 20 permit tcp source 172.30.34.86 0 source-port eq 162
rule 25 permit icmp source 172.30.34.86 0
acl name ce.bs 3996
rule 10 permit ip destination 10.150.13.50 0
rule 20 permit ip destination 200.4.81.88 0
rule 30 permit ip destination 192.230.66.62 0
rule 40 permit ip destination 187.237.58.76 0
rule 50 permit ip destination 10.150.12.130 0
rule 60 permit ip destination 204.79.197.217 0
rule 70 permit ip destination 10.150.13.79 0
rule 80 permit ip destination 198.172.88.80 0
rule 90 permit ip destination 198.172.88.64 0
rule 100 permit ip destination 94.31.29.168 0
rule 110 permit ip destination 198.41.215.68 0
rule 120 permit ip destination 216.58.218.202 0
rule 130 permit ip destination 10.150.13.84 0
rule 140 permit ip destination 10.150.13.82 0
rule 150 permit ip destination 10.150.13.81 0
rule 160 permit ip source 10.150.13.84 0
rule 170 permit ip destination 10.150.13.7 0
rule 180 permit ip source 10.150.13.7 0
rule 190 permit ip destination 10.100.13.15 0
rule 200 permit ip destination 10.100.13.51 0
rule 210 permit ip destination 10.100.13.62 0
rule 220 permit ip destination 10.100.13.2 0
rule 230 permit ip destination 10.100.13.30 0
rule 240 permit ip destination 10.150.13.46 0
rule 250 permit ip destination 10.150.13.16 0
rule 260 permit ip source 10.150.13.16 0
rule 280 permit ip destination 200.12.166.9 0
rule 290 permit ip destination 10.150.13.9 0
rule 300 permit ip destination 10.110.14.134 0
acl name ce.cd 3997
rule 10 permit ip destination 64.145.75.11 0
rule 20 permit ip destination 72.2.118.175 0
rule 30 permit ip destination 187.210.45.0 0.0.0.255
rule 40 permit ip destination 69.20.3.245 0
rule 50 permit ip destination 10.150.12.166 0
rule 60 permit ip destination 10.150.12.72 0
rule 70 permit ip destination 66.163.47.21 0
rule 80 permit ip destination 10.150.12.167 0
rule 90 permit ip source 10.150.12.167 0
rule 100 permit ip destination 10.150.12.219 0
rule 110 permit ip destination 10.150.13.20 0
rule 120 permit ip source 10.150.13.20 0
rule 130 permit ip destination 10.150.13.32 0
rule 140 permit ip destination 10.150.12.70 0
rule 150 permit ip destination 10.150.12.103 0
rule 170 permit ip source 10.150.12.103 0
rule 180 permit ip destination 10.150.12.20 0
rule 190 permit ip destination 10.100.12.20 0
rule 200 permit ip destination 10.150.12.44 0
rule 210 permit ip destination 10.100.12.44 0
rule 220 permit ip source 10.150.12.166 0
rule 230 permit ip destination 216.58.218.132 0
rule 240 permit ip destination 187.191.71.208 0
rule 260 permit ip destination 10.150.13.2 0
rule 270 permit ip destination 10.100.11.5 0
rule 280 permit ip destination 10.150.13.7 0
rule 290 permit ip destination 10.150.13.130 0
rule 300 permit ip destination 10.150.11.55 0
rule 310 permit ip destination 10.150.11.56 0
rule 320 permit ip destination 10.150.13.14 0
rule 330 permit ip destination 10.150.11.92 0
rule 340 permit ip destination 10.150.12.16 0
rule 350 permit ip destination 10.150.13.47 0
acl name ce.vd 3998
rule 5 permit ip source 10.60.3.0 0.0.0.255
rule 10 permit ip source 10.60.3.0 0.0.0.255 destination 10.201.200.0 0.0.0.15
acl name ce.rt 3999
rule 5 permit ip source 10.60.4.0 0.0.0.255
rule 10 permit udp source 10.60.4.0 0.0.0.255 destination-port range 16384 32767
rule 20 permit tcp source 10.60.4.0 0.0.0.255 destination-port range 5060 5061
rule 30 permit udp source 10.60.4.0 0.0.0.255 destination-port range 5060 5061
rule 40 permit udp source 10.60.4.0 0.0.0.255 destination-port range 2000 2002
rule 50 permit udp source 10.60.4.0 0.0.0.255 destination-port eq 2427
rule 60 permit tcp source 10.60.4.0 0.0.0.255 destination-port eq 2428
rule 70 permit tcp source 10.60.4.0 0.0.0.255 destination-port range 16384 32767
rule 75 permit ip source 10.60.20.0 0.0.0.255
rule 80 permit ip source 10.60.41.0 0.0.0.255
rule 85 permit ip source 10.60.42.0 0.0.0.255
rule 90 permit ip source 10.60.43.0 0.0.0.255
rule 95 permit ip source 10.60.44.0 0.0.0.255
#
drop-profile QoS
wred dscp
#
traffic classifier rpvm_bs_in operator or
if-match acl ce.mt
traffic classifier rpvm_bs_out operator or
if-match acl ce.mt
if-match dscp af22
traffic classifier mark.ce.cd operator or
if-match dscp cs2 af31 af32 af33
if-match acl ce.bs
traffic classifier mark.ce.rt operator or
if-match dscp cs3 cs5 ef
if-match acl ce.rt
traffic classifier mark.ce.mt operator or
if-match dscp cs6 cs7
if-match acl ce.mt
traffic classifier mark.ce.vd operator or
if-match dscp af41 af42 af43
if-match acl ce.vd
traffic classifier mark.ce.bs operator or
if-match dscp cs1 af21 af22 af23
if-match acl ce.mt
traffic classifier mark.ce.default operator or
if-match dscp default
traffic classifier shaping.out operator or
if-match any
traffic classifier policing.in operator or
if-match any
traffic classifier rpvm_vd_in operator or
if-match acl ce.vd
traffic classifier rpvm_vd_out operator or
if-match acl ce.vd
if-match dscp af42
traffic classifier rpvm_mt_in operator or
if-match acl ce.mt
traffic classifier rpvm_mt_out operator or
if-match acl ce.mt
if-match dscp cs6
traffic classifier rpvm_default_in operator or
if-match dscp default
traffic classifier rpvm_rt_in operator or
if-match acl ce.rt
traffic classifier rpvm_rt_out operator or
if-match acl ce.rt
if-match dscp ef
traffic classifier rpvm_cd_in operator or
if-match acl ce.bs
traffic classifier rpvm_cd_out operator or
if-match acl ce.bs
if-match dscp af32
#
traffic behavior eth.shaping.out
gts cir 20000 cbs 500000 queue-length 64
traffic-policy rpvm.ce.pb22.out
traffic behavior rpvm_bs_in
car cir pct 25 mode color-blind green pass yellow pass red pass
statistic enable
traffic behavior rpvm_bs_out
car cir pct 10 mode color-blind green pass yellow pass red discard
remark 8021p 2
queue af bandwidth pct 10
drop-profile QoS
statistic enable
traffic behavior policing.in
car cir 20000 cbs 3760000 pbs 6260000 mode color-blind green pass yellow pass red
pass
traffic-policy rpvm.ce.pb22.in
traffic behavior rpvm_vd_in
car cir pct 25 mode color-blind green pass yellow pass red discard
statistic enable
traffic behavior rpvm_vd_out
car cir pct 40 mode color-blind green pass yellow discard red discard
queue af bandwidth pct 40
drop-profile QoS
remark 8021p 2
statistic enable
traffic behavior rpvm_mt_in
car cir pct 15 mode color-blind green pass yellow pass red pass
statistic enable
traffic behavior rpvm_mt_out
remark 8021p 2
car cir pct 5 mode color-blind green pass yellow pass red discard
queue af bandwidth pct 5
queue-length packets 512
drop-profile QoS
statistic enable
traffic behavior behavior.ce.cd
remark dscp af32
statistic enable
traffic behavior behavior.ce.rt
remark dscp ef
statistic enable
traffic behavior behavior.ce.mt
remark dscp cs6
statistic enable
traffic behavior behavior.ce.vd
remark dscp af42
statistic enable
traffic behavior behavior.ce.bs
remark dscp af22
statistic enable
traffic behavior behavior.ce.default
remark dscp default
statistic enable
traffic behavior rpvm_default_in
car cir pct 13 mode color-blind green pass yellow pass red pass
statistic enable
traffic behavior rpvm_default_out
car cir pct 1 mode color-blind green pass yellow pass red discard
remark 8021p 1
queue af bandwidth pct 1
queue-length packets 512
drop-profile QoS
statistic enable
traffic behavior rpvm_rt_in
car cir pct 13 mode color-blind green pass yellow pass red discard
statistic enable
traffic behavior rpvm_rt_out
car cir pct 13 mode color-blind green pass yellow discard red discard
remark 8021p 5
queue ef bandwidth pct 13
statistic enable
traffic behavior rpvm_cd_in
car cir pct 25 mode color-blind green pass yellow pass red pass
statistic enable
traffic behavior rpvm_cd_out
car cir pct 31 mode color-blind green pass yellow pass red discard
remark 8021p 2
queue af bandwidth pct 31
drop-profile QoS
statistic enable
#
traffic policy rpvm.ce.pb22.in
classifier rpvm_bs_in behavior rpvm_bs_in
classifier rpvm_vd_in behavior rpvm_vd_in
classifier rpvm_mt_in behavior rpvm_mt_in
classifier rpvm_default_in behavior rpvm_default_in
classifier rpvm_rt_in behavior rpvm_rt_in
classifier rpvm_cd_in behavior rpvm_cd_in
traffic policy rpvm.ce.pb22.out
classifier rpvm_mt_out behavior rpvm_mt_out
classifier rpvm_rt_out behavior rpvm_rt_out
classifier rpvm_vd_out behavior rpvm_vd_out
classifier rpvm_cd_out behavior rpvm_cd_out
classifier rpvm_bs_out behavior rpvm_bs_out
classifier default-class behavior rpvm_default_out
traffic policy eth.shaping.out
classifier shaping.out behavior eth.shaping.out
traffic policy eth.policing.in
classifier policing.in behavior policing.in
traffic policy pb22.ce.lan
classifier mark.ce.rt behavior behavior.ce.rt
classifier mark.ce.vd behavior behavior.ce.vd
classifier mark.ce.cd behavior behavior.ce.cd
classifier mark.ce.mt behavior behavior.ce.mt
classifier mark.ce.default behavior behavior.ce.default
classifier mark.ce.bs behavior behavior.ce.bs
#
aaa
authentication-scheme default
authorization-scheme default
accounting-scheme default
domain default
domain default_admin
local-user admin password irreversible-cipher %^%#b1.pN8N11;877|CuM;;0CY4GHm+7|
K$T=8%Ae<sE[E2eQ(d@5JX&IGI]QK>'%^%#
local-user admin privilege level 15
local-user admin service-type telnet terminal ftp
#
firewall zone Local
priority 16
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/2
#
interface GigabitEthernet0/0/3
#
interface GigabitEthernet0/0/4
#
interface GigabitEthernet0/0/5
#
interface GigabitEthernet0/0/6
#
interface GigabitEthernet0/0/7
#
interface GigabitEthernet0/0/8
bandwidth 20
undo negotiation auto
#
interface GigabitEthernet0/0/8.3988
description Conexion con Referencia C02-1403-0034
bandwidth 20
dot1q termination vid 3988
ip address 187.219.215.146 255.255.255.252
#
interface GigabitEthernet0/0/9
undo negotiation auto
speed 1000
#
interface GigabitEthernet0/0/9.7
dot1q termination vid 7
ip address 10.60.7.1 255.255.255.252
traffic-policy pb22.ce.lan inbound
#
interface GigabitEthernet0/0/9.1000
dot1q termination vid 1000
ip address 172.30.34.86 255.255.255.240
traffic-policy pb22.ce.lan inbound
#
interface GigabitEthernet0/0/10
description VirtualPort
#
interface Cellular0/0/0
#
interface Cellular0/0/1
#
interface NULL0
#
interface Tunnel0/0/40
ip address 1.1.40.2 255.255.255.252
tunnel-protocol gre
source GigabitEthernet0/0/8.3988
destination 10.110.1.8
#
bgp 65194
timer keepalive 10 hold 30
peer 187.219.215.145 as-number 8151
#
ipv4-family unicast
undo synchronization
network 10.60.0.0 255.255.0.0
network 10.60.2.0 255.255.255.0
network 10.60.3.0 255.255.255.0
network 10.60.4.0 255.255.255.0
network 10.60.7.0 255.255.255.252
network 10.60.10.0 255.255.255.0
network 10.60.20.0 255.255.255.0
network 10.60.41.0 255.255.255.0
network 10.60.42.0 255.255.255.0
network 10.60.43.0 255.255.255.0
network 10.60.44.0 255.255.255.0
network 10.60.50.0 255.255.255.0
network 10.60.51.0 255.255.255.0
network 10.60.52.0 255.255.255.0
network 10.60.53.0 255.255.255.0
network 172.30.34.80 255.255.255.240
peer 187.219.215.145 enable
peer 187.219.215.145 as-path-filter 10 export
#
snmp-agent local-engineid 800007DB0318DED7283569
snmp-agent community write %@%@Tu+<7%gW|G.{L5K_vht/$R/0N.uW~@r$lDd)
(JLa2lgER/3$HX(!R9BjbXsm#z/\.k%)/<$R%@%@
snmp-agent sys-info version v2c
snmp-agent
#
telnet server enable
#
http secure-server ssl-policy default_policy
http server enable
http secure-server enable
#
ip as-path-filter 10 permit ^$
#
ip route-static 0.0.0.0 0.0.0.0 1.1.40.1
ip route-static 10.60.0.0 255.255.0.0 10.60.7.2
ip route-static 10.60.2.0 255.255.255.0 10.60.7.2
#
user-interface con 0
authentication-mode aaa
user-interface vty 0
authentication-mode aaa
user privilege level 15
user-interface vty 1 4
authentication-mode aaa
#
wlan ac
#
return
<RR01SMR-MEX-70109443>

Вам также может понравиться