# Hostname: MG-GVS-ACX2100-PEDREIRA # Model: acx2100 # Junos: 19.4R3.11 limited # JUNOS Base OS boot [19.4R3.11] # JUNOS Base OS Software Suite [19.4R3.11] # JUNOS Crypto Software Suite [19.4R3.11] # JUNOS Packet Forwarding Engine Support (ACX) [19.4R3.11] # JUNOS Web Management [19.4R3.11] # JUNOS Online Documentation [19.4R3.11] # JUNOS SDN Software Suite [19.4R3.11] # JUNOS Services Application Level Gateways [19.4R3.11] # JUNOS Services COS [19.4R3.11] # JUNOS Services Jflow Container package [19.4R3.11] # JUNOS Services Stateful Firewall [19.4R3.11] # JUNOS Services NAT [19.4R3.11] # JUNOS Services RPM [19.4R3.11] # JUNOS Services SOFTWIRE [19.4R3.11] # JUNOS Services Captive Portal and Content Delivery Container package [19.4R3.11] # JUNOS py-base-powerpc [19.4R3.11] # JUNOS py-base2-powerpc [19.4R3.11] # JUNOS py-extensions-powerpc [19.4R3.11] # JUNOS py-extensions2-powerpc [19.4R3.11] # JUNOS jsd [powerpc-19.4R3.11-jet-1] # JUNOS Kernel Software Suite [19.4R3.11] # JUNOS Routing Software Suite [19.4R3.11] # Hardware inventory: # Item Version Part number Serial number Description # Chassis NK0214120145 ACX2100 # Midplane REV 08 650-045221 NK0214120145 ACX2100 # Routing Engine BUILTIN BUILTIN Routing Engine # FEB 0 BUILTIN BUILTIN Forwarding Engine Processor # FPC 0 BUILTIN BUILTIN FPC BUILTIN # MIC 0 BUILTIN BUILTIN 16x CHE1T1, RJ48 # PIC 0 BUILTIN BUILTIN 16x CHE1T1, RJ48 # FPC 1 BUILTIN BUILTIN FPC BUILTIN # MIC 0 BUILTIN BUILTIN 4x 1GE(LAN) RJ45 # PIC 0 BUILTIN BUILTIN 4x 1GE(LAN) RJ45 # MIC 1 BUILTIN BUILTIN 4x 1GE(LAN) SFP, RJ45 # PIC 1 BUILTIN BUILTIN 4x 1GE(LAN) SFP, RJ45 # Xcvr 0 REV 01 740-011782 pllqq5gt0014 SFP-SX # Xcvr 3 REV 01 740-011782 pllqq5gt0292 SFP-SX # MIC 2 BUILTIN BUILTIN 2x 1GE(LAN) SFP # PIC 2 BUILTIN BUILTIN 2x 1GE(LAN) SFP # MIC 3 BUILTIN BUILTIN 2x 10GE(LAN) SFP+ # PIC 3 BUILTIN BUILTIN 2x 10GE(LAN) SFP+ # Xcvr 0 REV 01 740-030128 SK1D0F216417 SFP+-10G-ER # Xcvr 1 10G-ER 740-030128 b1pp2yfe0015 SFP+-10G-ER # License usage: none # # Licenses installed: none # set version 19.4R3.11 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection minimum-interval 1000 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection multiplier 4 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection full-neighbors-only set system host-name MG-GVS-ACX2100-PEDREIRA set system root-authentication encrypted-password "$5$tsB/NdX2$w/Fo1SKqypjGM7qJRmZrVei8cZ1LvtTR4d/oNtNDYA/" set system login class CGR idle-timeout 2 set system login class CGR permissions configure set system login class CGR permissions view set system login class CGR permissions view-configuration set system login class CGR allow-commands "(quit)|(configure)|(show .*)|(ping .*)|(traceroute .*)|(commit .*)" set system login class CGR deny-commands .* set system login class CGR allow-configuration "(interfaces)|(vlans)|(delete .*)|(set .*)" set system login user OP full-name "Usuario Operador" set system login user OP uid 2008 set system login user OP class CGR set system login user RO full-name "Usuario Read Only" set system login user RO uid 2009 set system login user RO class read-only set system login user SU full-name "Usuario Super User" set system login user SU uid 2010 set system login user SU class super-user set system login user wkve full-name "Usuario Wkve Telecom" set system login user wkve uid 2002 set system login user wkve class super-user set system login user wkve authentication encrypted-password "$5$xTcZfCRT$fMQefoMhiIEEIGDsHWvJKTZMBLRv.3zfSFCYIhPcLO2" set system services ssh root-login deny set system services ssh no-tcp-forwarding set system services ssh protocol-version v2 set system domain-name wkve.net.br set system time-zone GMT+3 set system debugger-on-panic set system debugger-on-break set system dump-on-panic set system authentication-order radius set system name-server 177.8.8.8 set system name-server 177.8.8.9 set system radius-server 189.76.208.98 port 1840 set system radius-server 189.76.208.98 accounting-port 1841 set system radius-server 189.76.208.98 secret "$9$OfUx1SeWLNdwYKMZUHkQzcyl" set system radius-server 189.76.208.98 timeout 15 set system radius-server 189.76.208.98 source-address 172.31.254.185 set system accounting events login set system accounting events change-log set system accounting events interactive-commands set system accounting destination radius set system syslog user * any emergency set system syslog host 189.76.208.85 any notice set system syslog host 189.76.208.85 kernel info set system syslog host 189.76.208.85 firewall info set system syslog host 189.76.208.85 pfe info set system syslog host 189.76.208.85 interactive-commands any set system syslog file messages any notice set system syslog file messages authorization info set system syslog file messages match "!(.*mld6_input.*)" set system syslog file interactive-commands interactive-commands any set system ntp server 189.76.208.72 set system ntp source-address 172.31.254.185 set chassis dump-on-panic set chassis aggregated-devices ethernet device-count 4 set chassis fpc 0 pic 0 tunnel-services bandwidth 1g set chassis fpc 0 pic 1 tunnel-services bandwidth 10g set chassis alarm management-ethernet link-down ignore set interfaces ge-1/0/0 description "INTERFACE - MG-GVS-EX2300-TORRE.PEDREIRA - ge-0/0/2" set interfaces ge-1/0/0 gigether-options 802.3ad ae0 set interfaces ge-1/0/1 description "INTERFACE - MG-GVS-EX2300-TORRE.PEDREIRA - ge-0/0/3" set interfaces ge-1/0/1 gigether-options 802.3ad ae0 set interfaces ge-1/1/0 description "INTERFACE - CERAGON IP20G PALMITAL" set interfaces ge-1/1/0 flexible-vlan-tagging set interfaces ge-1/1/0 mtu 9000 set interfaces ge-1/1/0 encapsulation flexible-ethernet-services set interfaces ge-1/1/0 unit 1653 description "VLAN 1653 - MG-MPL-ACX2100-PALMITAL - VIA CERAGON IP20G" set interfaces ge-1/1/0 unit 1653 vlan-id 1653 set interfaces ge-1/1/0 unit 1653 family inet mtu 1600 set interfaces ge-1/1/0 unit 1653 family inet address 172.30.1.233/30 set interfaces ge-1/1/0 unit 1653 family mpls mtu 1600 set interfaces ge-1/1/3 description "INTERFACE - CERAGON IP20C TORRE WAISMAN/CSN" set interfaces ge-1/1/3 flexible-vlan-tagging set interfaces ge-1/1/3 mtu 9000 set interfaces ge-1/1/3 encapsulation flexible-ethernet-services set interfaces ge-1/1/3 unit 1487 description "VLAN 1487 - GERENCIA CERAGON IP20C PEDREIRA-WAISMAN/CSN" set interfaces ge-1/1/3 unit 1487 vlan-id 1487 set interfaces ge-1/1/3 unit 1487 family inet mtu 1500 set interfaces ge-1/1/3 unit 1487 family inet address 172.16.102.9/30 set interfaces ge-1/1/3 unit 1654 description "VLAN 1654 - MG-CSN-ACX2100-CONSELHEIROPENA - VIA CERAGON IP20C" set interfaces ge-1/1/3 unit 1654 vlan-id 1654 set interfaces ge-1/1/3 unit 1654 family inet mtu 1600 set interfaces ge-1/1/3 unit 1654 family inet address 172.30.1.237/30 set interfaces ge-1/1/3 unit 1654 family mpls mtu 1600 set interfaces xe-1/3/0 description "INTERFACE - FIBRA ESC.CONSELHEIRO PENA - VIA TTG" set interfaces xe-1/3/0 flexible-vlan-tagging set interfaces xe-1/3/0 mtu 9000 set interfaces xe-1/3/0 encapsulation flexible-ethernet-services set interfaces xe-1/3/0 unit 1651 description "VLAN 1651 - MG-CSN-S6730-ESC.CONSELHEIROPENA - VIA FIBRA TTG" set interfaces xe-1/3/0 unit 1651 vlan-id 1651 set interfaces xe-1/3/0 unit 1651 family inet mtu 1600 set interfaces xe-1/3/0 unit 1651 family inet address 172.30.1.229/30 set interfaces xe-1/3/0 unit 1651 family mpls mtu 1600 set interfaces xe-1/3/1 description "INTERFACE - FIBRA SEDE WKVE - GVS" set interfaces xe-1/3/1 flexible-vlan-tagging set interfaces xe-1/3/1 mtu 9000 set interfaces xe-1/3/1 encapsulation flexible-ethernet-services set interfaces xe-1/3/1 unit 1650 description "VLAN 1650 - MG-GVS-S6730-WKVETELECOM - VIA FIBRA" set interfaces xe-1/3/1 unit 1650 vlan-id 1650 set interfaces xe-1/3/1 unit 1650 family inet mtu 1600 set interfaces xe-1/3/1 unit 1650 family inet address 172.30.1.226/30 set interfaces xe-1/3/1 unit 1650 family mpls mtu 1600 set interfaces ae0 description "LACP 2Gbps - MG-GVS-EX2300-TORRE.PEDREIRA" set interfaces ae0 flexible-vlan-tagging set interfaces ae0 mtu 9000 set interfaces ae0 encapsulation flexible-ethernet-services set interfaces ae0 aggregated-ether-options minimum-links 1 set interfaces ae0 aggregated-ether-options link-speed 1g set interfaces ae0 aggregated-ether-options lacp active set interfaces ae0 unit 1412 description "VLAN 1412 - GERENCIA MG-GVS-EX2300-PEDREIRA" set interfaces ae0 unit 1412 vlan-id 1412 set interfaces ae0 unit 1412 family inet mtu 1500 set interfaces ae0 unit 1412 family inet address 172.16.99.113/30 set interfaces ae0 unit 1652 description "VLAN 1652 - MG-GVS-MK-TORRE.PEDREIRA" set interfaces ae0 unit 1652 vlan-id 1652 set interfaces ae0 unit 1652 family inet mtu 1500 set interfaces ae0 unit 1652 family inet address 172.16.201.29/30 set interfaces ae0 unit 1704 description "VLAN 1704 - MG-GVS-PEDREIRA - PPPoE" set interfaces ae0 unit 1704 encapsulation vlan-ccc set interfaces ae0 unit 1704 vlan-id 1704 set interfaces ae0 unit 1704 statistics set interfaces ae0 unit 1704 family ccc set interfaces fxp0 description "GERENCIA LOCAL - JUNIPER ACX2100" set interfaces fxp0 unit 0 family inet address 192.168.1.1/24 set interfaces lo0 unit 255 description "LOOPBACK - AREA BACKBONE" set interfaces lo0 unit 255 family inet primary set interfaces lo0 unit 255 family inet filter input PROTECT-RE set interfaces lo0 unit 255 family inet address 172.31.254.185/32 set snmp description MG-GVS-ACX2100-PEDREIRA set snmp location "MG, GOVERNADOR VALADARES - PEDREIRA [-18.847019, -41.824894]" set snmp contact "cgr@wkve.com.br" set snmp community cilbup authorization read-only set snmp community cilbup clients 189.76.208.0/24 set forwarding-options hash-key family inet layer-3 set forwarding-options hash-key family inet layer-4 set forwarding-options hash-key family mpls label-1 set forwarding-options hash-key family mpls label-2 set forwarding-options hash-key family mpls label-3 set forwarding-options hash-key family mpls payload ip set policy-options prefix-list localhost 127.0.0.0/8 set policy-options prefix-list ntp-servers apply-path "system ntp server <*>" set policy-options prefix-list NetworkBGP-Prefixes 172.16.99.112/30 set policy-options prefix-list NetworkBGP-Prefixes 172.16.102.8/30 set policy-options prefix-list NetworkBGPv6-Prefixes set policy-options policy-statement Default-originate term gateway from route-filter 0.0.0.0/0 exact set policy-options policy-statement Default-originate term gateway then next-hop self set policy-options policy-statement Default-originate term gateway then accept set policy-options policy-statement Default-originate then next policy set policy-options policy-statement Discard-All term implicit-deny then reject set policy-options policy-statement ECMP term area-0 from protocol direct set policy-options policy-statement ECMP term area-0 from area 0.0.0.0 set policy-options policy-statement ECMP term area-0 then accept set policy-options policy-statement ECMP then load-balance per-packet set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK then accept set policy-options policy-statement EXPORT-LDP term DENY-ALL then reject set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK then accept set policy-options policy-statement IMPORT-LDP term DENY-ALL then reject set policy-options policy-statement IN-RR then accept set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL from protocol bgp set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL from as-path local-as set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL then accept set policy-options policy-statement IN-iBGP-IPv4-WKVE then reject set policy-options policy-statement Next-hop-self term all from external set policy-options policy-statement Next-hop-self term all then next-hop self set policy-options policy-statement OUT-RR term DIRECT-V4 from family inet set policy-options policy-statement OUT-RR term DIRECT-V4 from protocol direct set policy-options policy-statement OUT-RR term DIRECT-V4 from prefix-list NetworkBGP-Prefixes set policy-options policy-statement OUT-RR term DIRECT-V4 then accept set policy-options policy-statement OUT-RR term DIRECT-V6 from family inet6 set policy-options policy-statement OUT-RR term DIRECT-V6 from protocol direct set policy-options policy-statement OUT-RR term DIRECT-V6 from prefix-list NetworkBGPv6-Prefixes set policy-options policy-statement OUT-RR term DIRECT-V6 then accept set policy-options policy-statement OUT-RR term STATIC-V4 from family inet set policy-options policy-statement OUT-RR term STATIC-V4 from protocol static set policy-options policy-statement OUT-RR term STATIC-V4 from prefix-list NetworkBGP-Prefixes set policy-options policy-statement OUT-RR term STATIC-V4 then accept set policy-options policy-statement OUT-RR term STATIC-V6 from family inet6 set policy-options policy-statement OUT-RR term STATIC-V6 from protocol static set policy-options policy-statement OUT-RR term STATIC-V6 from prefix-list NetworkBGPv6-Prefixes set policy-options policy-statement OUT-RR term STATIC-V6 then accept set policy-options policy-statement OUT-RR term ASPATH-LOCAL from protocol bgp set policy-options policy-statement OUT-RR term ASPATH-LOCAL from as-path local-as set policy-options policy-statement OUT-RR term ASPATH-LOCAL then accept set policy-options policy-statement OUT-RR term CLIENTES from community COMMUNITY-CLIENTES set policy-options policy-statement OUT-RR term CLIENTES then accept set policy-options policy-statement OUT-RR term GERENCIA from community COMMUNITY-GERENCIA set policy-options policy-statement OUT-RR term GERENCIA then accept set policy-options policy-statement OUT-RR term ISP-TRANSIT from community COMMUNITY-ISPs set policy-options policy-statement OUT-RR term ISP-TRANSIT then accept set policy-options policy-statement OUT-RR term ISP-CDN from community COMMUNITY-ISP-CDNs set policy-options policy-statement OUT-RR term ISP-CDN then accept set policy-options policy-statement OUT-RR term VPN-V4 from family inet-vpn set policy-options policy-statement OUT-RR term VPN-V4 then accept set policy-options policy-statement OUT-RR term VPN-V6 from family inet6-vpn set policy-options policy-statement OUT-RR term VPN-V6 then accept set policy-options policy-statement OUT-RR then reject set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp from protocol bgp set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp from as-path local-as set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static from protocol static set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static then next-hop self set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks from protocol direct set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks from prefix-list NetworkBGP-Prefixes set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-downstream from community COMMUNITY-ISPs set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-downstream then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE then reject set policy-options policy-statement explicit-deny then reject set policy-options community 28360:6 members 28360:6 set policy-options community COMMUNITY-ALL members *:* set policy-options community COMMUNITY-CLIENTES members 28360:1010 set policy-options community COMMUNITY-GERENCIA members 28360:1019 set policy-options community COMMUNITY-ISP-CDNs members 28360:15 set policy-options community COMMUNITY-ISPs members 28360:10 set policy-options community no-export members no-export set policy-options as-path local-as "()" set firewall family inet filter PROTECT-RE interface-specific set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.0.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.16.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.208.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 179.124.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 138.94.8.0/22 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bgp-src from protocol tcp set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-port bgp set firewall family inet filter PROTECT-RE term aceita-bgp-src then accept set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.0.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.16.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.208.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 179.124.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 138.94.8.0/22 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from protocol tcp set firewall family inet filter PROTECT-RE term aceita-bgp-dst from destination-port bgp set firewall family inet filter PROTECT-RE term aceita-bgp-dst then accept set firewall family inet filter PROTECT-RE term aceita-ospf from protocol ospf set firewall family inet filter PROTECT-RE term aceita-ospf then accept set firewall family inet filter PROTECT-RE term aceita-bfd from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bfd from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bfd from destination-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bfd from destination-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bfd from protocol udp set firewall family inet filter PROTECT-RE term aceita-bfd from port 4784 set firewall family inet filter PROTECT-RE term aceita-bfd from port 3784 set firewall family inet filter PROTECT-RE term aceita-bfd from port 3785 set firewall family inet filter PROTECT-RE term aceita-bfd then accept set firewall family inet filter PROTECT-RE term aceita-rsvp from protocol rsvp set firewall family inet filter PROTECT-RE term aceita-rsvp then accept set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.2/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.6/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 172.31.254.185/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol udp set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol tcp set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-port 646 set firewall family inet filter PROTECT-RE term aceita-dst-ldp then accept set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.2/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.6/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 172.31.254.185/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol udp set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol tcp set firewall family inet filter PROTECT-RE term aceita-src-ldp from source-port 646 set firewall family inet filter PROTECT-RE term aceita-src-ldp then accept set firewall family inet filter PROTECT-RE term aceita-lsp-ping from destination-address 172.31.254.185/32 set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol udp set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol tcp set firewall family inet filter PROTECT-RE term aceita-lsp-ping from source-port 3503 set firewall family inet filter PROTECT-RE term aceita-lsp-ping then accept set firewall family inet filter PROTECT-RE term aceita-snmp from source-address 189.76.208.0/24 set firewall family inet filter PROTECT-RE term aceita-snmp from protocol udp set firewall family inet filter PROTECT-RE term aceita-snmp from destination-port 161 set firewall family inet filter PROTECT-RE term aceita-snmp then policer limit-1m set firewall family inet filter PROTECT-RE term aceita-snmp then accept set firewall family inet filter PROTECT-RE term radius from source-address 189.76.208.98/32 set firewall family inet filter PROTECT-RE term radius then accept set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 189.76.208.72/32 set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 172.31.254.185/32 set firewall family inet filter PROTECT-RE term aceita-ntp from protocol udp set firewall family inet filter PROTECT-RE term aceita-ntp from destination-port ntp set firewall family inet filter PROTECT-RE term aceita-ntp then policer limit-32k set firewall family inet filter PROTECT-RE term aceita-ntp then accept set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.8/32 set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.9/32 set firewall family inet filter PROTECT-RE term aceita-dns from protocol udp set firewall family inet filter PROTECT-RE term aceita-dns from source-port 53 set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-request set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-reply set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type unreachable set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type time-exceeded set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp-reply set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp set firewall family inet filter PROTECT-RE term aceita-icmp then policer limit-10m set firewall family inet filter PROTECT-RE term aceita-icmp then accept set firewall family inet filter PROTECT-RE term aceita-traceroute from protocol udp set firewall family inet filter PROTECT-RE term aceita-traceroute from destination-port 33434-33523 set firewall family inet filter PROTECT-RE term aceita-traceroute then accept set firewall family inet filter PROTECT-RE term aceita-ssh-out from protocol tcp set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port ssh set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port 33 set firewall family inet filter PROTECT-RE term aceita-ssh-out then accept set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.208.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.214.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.230.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.223.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 177.8.16.0/23 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 192.168.1.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-ssh from destination-port ssh set firewall family inet filter PROTECT-RE term aceita-ssh then accept set firewall family inet filter PROTECT-RE term descarta-resto then discard set firewall policer limit-32k if-exceeding bandwidth-limit 32k set firewall policer limit-32k if-exceeding burst-size-limit 15k set firewall policer limit-32k then discard set firewall policer limit-1m if-exceeding bandwidth-limit 1m set firewall policer limit-1m if-exceeding burst-size-limit 15k set firewall policer limit-1m then discard set firewall policer limit-10m if-exceeding bandwidth-limit 10m set firewall policer limit-10m if-exceeding burst-size-limit 625k set firewall policer limit-10m then discard set routing-options forwarding-table export ECMP set routing-options router-id 172.31.254.185 set routing-options autonomous-system 28360 set protocols ospf apply-groups OSPF-BFD set protocols ospf traffic-engineering set protocols ospf area 0.0.0.0 interface lo0.255 passive set protocols ospf area 0.0.0.0 interface xe-1/3/1.1650 interface-type p2p set protocols ospf area 0.0.0.0 interface xe-1/3/1.1650 metric 20 set protocols ospf area 0.0.0.0 interface xe-1/3/1.1650 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.0 interface xe-1/3/0.1651 interface-type p2p set protocols ospf area 0.0.0.0 interface xe-1/3/0.1651 metric 50 set protocols ospf area 0.0.0.0 interface xe-1/3/0.1651 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.0 interface ge-1/1/0.1653 interface-type p2p set protocols ospf area 0.0.0.0 interface ge-1/1/0.1653 metric 10 set protocols ospf area 0.0.0.0 interface ge-1/1/0.1653 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.0 interface ge-1/1/3.1654 interface-type p2p set protocols ospf area 0.0.0.0 interface ge-1/1/3.1654 metric 50 set protocols ospf area 0.0.0.0 interface ge-1/1/3.1654 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.0 interface ae0.1652 interface-type p2p set protocols ospf area 0.0.0.0 interface ae0.1652 metric 10 set protocols ospf export ECMP set protocols ospf reference-bandwidth 1g set protocols ospf no-rfc-1583 set protocols rsvp load-balance bandwidth set protocols rsvp interface fxp0.0 disable set protocols rsvp interface lo0.255 set protocols rsvp interface xe-1/3/1.1650 bandwidth 7g set protocols rsvp interface xe-1/3/0.1651 bandwidth 7g set protocols rsvp interface ge-1/1/0.1653 bandwidth 650m set protocols rsvp interface ge-1/1/3.1654 bandwidth 630m set protocols l2circuit neighbor 172.31.254.249 interface ae0.1704 virtual-circuit-id 1704 set protocols l2circuit neighbor 172.31.254.249 interface ae0.1704 description "L2CIRCUIT - MG-GVS-S6730-WKVETELECOM" set protocols l2circuit neighbor 172.31.254.249 interface ae0.1704 no-control-word set protocols l2circuit neighbor 172.31.254.249 interface ae0.1704 mtu 1600 set protocols l2circuit neighbor 172.31.254.249 interface ae0.1704 encapsulation-type ethernet-vlan set protocols bgp path-selection cisco-non-deterministic set protocols bgp group RR type internal set protocols bgp group RR local-address 172.31.254.185 set protocols bgp group RR advertise-inactive set protocols bgp group RR import IN-RR set protocols bgp group RR family inet unicast set protocols bgp group RR family inet-vpn unicast set protocols bgp group RR family inet6 labeled-unicast explicit-null set protocols bgp group RR family inet6-vpn unicast set protocols bgp group RR family l2vpn auto-discovery-only set protocols bgp group RR export OUT-RR set protocols bgp group RR peer-as 28360 set protocols bgp group RR neighbor 172.31.254.250 description "PEER - MG-BHE-ACX2100-RREFLECTOR1" set protocols bgp group RR neighbor 172.31.254.251 description "PEER - MG-GVS-ACX2100-RREFLECTOR2" set protocols bgp group iBGP-LOOPBACK type internal set protocols bgp group iBGP-LOOPBACK local-address 172.31.254.185 set protocols bgp group iBGP-LOOPBACK advertise-inactive set protocols bgp group iBGP-LOOPBACK export Default-originate set protocols bgp group iBGP-LOOPBACK export OUT-iBGP-IPv4-WKVE set protocols bgp group iBGP-LOOPBACK cluster 172.31.254.185 set protocols bgp group iBGP-LOOPBACK peer-as 28360 set protocols ldp track-igp-metric set protocols ldp import IMPORT-LDP set protocols ldp export EXPORT-LDP set protocols ldp transport-address 172.31.254.185 set protocols ldp interface ge-1/1/0.1653 set protocols ldp interface ge-1/1/3.1654 set protocols ldp interface xe-1/3/0.1651 set protocols ldp interface xe-1/3/1.1650 set protocols ldp interface fxp0.0 disable set protocols ldp interface lo0.255 set protocols mpls interface lo0.255 set protocols mpls interface fxp0.0 disable set protocols mpls interface xe-1/3/1.1650 set protocols mpls interface xe-1/3/0.1651 set protocols mpls interface ge-1/1/0.1653 set protocols mpls interface ge-1/1/3.1654