# Hostname: PA-MBA-ACX2100-MORADANOVA # Model: acx2100 # Junos: 19.4R3.11 limited # JUNOS Base OS boot [19.4R3.11] # JUNOS Base OS Software Suite [19.4R3.11] # JUNOS Crypto Software Suite [19.4R3.11] # JUNOS Packet Forwarding Engine Support (ACX) [19.4R3.11] # JUNOS Web Management [19.4R3.11] # JUNOS Online Documentation [19.4R3.11] # JUNOS SDN Software Suite [19.4R3.11] # JUNOS Services Application Level Gateways [19.4R3.11] # JUNOS Services COS [19.4R3.11] # JUNOS Services Jflow Container package [19.4R3.11] # JUNOS Services Stateful Firewall [19.4R3.11] # JUNOS Services NAT [19.4R3.11] # JUNOS Services RPM [19.4R3.11] # JUNOS Services SOFTWIRE [19.4R3.11] # JUNOS Services Captive Portal and Content Delivery Container package [19.4R3.11] # JUNOS py-base-powerpc [19.4R3.11] # JUNOS py-base2-powerpc [19.4R3.11] # JUNOS py-extensions-powerpc [19.4R3.11] # JUNOS py-extensions2-powerpc [19.4R3.11] # JUNOS jsd [powerpc-19.4R3.11-jet-1] # JUNOS Kernel Software Suite [19.4R3.11] # JUNOS Routing Software Suite [19.4R3.11] # Hardware inventory: # Item Version Part number Serial number Description # Chassis NK0214530225 ACX2100 # Midplane REV 10 650-045221 NK0214530225 ACX2100 # Routing Engine BUILTIN BUILTIN Routing Engine # FEB 0 BUILTIN BUILTIN Forwarding Engine Processor # FPC 0 BUILTIN BUILTIN FPC BUILTIN # MIC 0 BUILTIN BUILTIN 16x CHE1T1, RJ48 # PIC 0 BUILTIN BUILTIN 16x CHE1T1, RJ48 # FPC 1 BUILTIN BUILTIN FPC BUILTIN # MIC 0 BUILTIN BUILTIN 4x 1GE(LAN) RJ45 # PIC 0 BUILTIN BUILTIN 4x 1GE(LAN) RJ45 # MIC 1 BUILTIN BUILTIN 4x 1GE(LAN) SFP, RJ45 # PIC 1 BUILTIN BUILTIN 4x 1GE(LAN) SFP, RJ45 # Xcvr 0 NON-JNPR A1277040 SFP-SX # Xcvr 1 NON-JNPR 1508283239 SFP-LX10 # Xcvr 3 NON-JNPR 1308041309 SFP-LX10 # MIC 2 BUILTIN BUILTIN 2x 1GE(LAN) SFP # PIC 2 BUILTIN BUILTIN 2x 1GE(LAN) SFP # MIC 3 BUILTIN BUILTIN 2x 10GE(LAN) SFP+ # PIC 3 BUILTIN BUILTIN 2x 10GE(LAN) SFP+ # Xcvr 0 REV 01 740-021309 b1p18p140022 SFP+-10G-LR # Xcvr 1 NON-JNPR DC240123015 SFP+-10G-ER # License usage: none # # Licenses installed: none # set version 19.4R3.11 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection minimum-interval 1000 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection multiplier 4 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection full-neighbors-only set system host-name PA-MBA-ACX2100-MORADANOVA set system root-authentication encrypted-password "$5$9jHtfWnG$lNKL77HDCCWO1X7xN6BdR.54mRkGspN7CmG6CoqHX0A" set system login class CGR idle-timeout 2 set system login class CGR permissions configure set system login class CGR permissions view set system login class CGR permissions view-configuration set system login class CGR allow-commands "(quit)|(configure)|(show .*)|(ping .*)|(traceroute .*)|(commit .*)" set system login class CGR deny-commands .* set system login class CGR allow-configuration "(interfaces)|(vlans)|(delete .*)|(set .*)" set system login user OP full-name "Usuario Operador" set system login user OP uid 2008 set system login user OP class CGR set system login user RO full-name "Usuario Read Only" set system login user RO uid 2009 set system login user RO class read-only set system login user SU full-name "Usuario Super User" set system login user SU uid 2010 set system login user SU class super-user set system login user wkve full-name "Usuario Wkve Telecom" set system login user wkve uid 2002 set system login user wkve class super-user set system login user wkve authentication encrypted-password "$5$abXNTW2l$z/NfrRa6dnn8XzKsF8ZqBPrQYtH8mdFU5h56mpZ5t.C" set system services ssh root-login deny set system services ssh no-tcp-forwarding set system services ssh protocol-version v2 set system domain-name wkve.net.br set system time-zone GMT+3 set system debugger-on-panic set system debugger-on-break set system dump-on-panic set system authentication-order radius set system name-server 177.8.8.8 set system name-server 177.8.8.9 set system radius-server 189.76.208.98 port 1840 set system radius-server 189.76.208.98 accounting-port 1841 set system radius-server 189.76.208.98 secret "$9$9j7SABEylM8xNhSYgJZq.O1R" set system radius-server 189.76.208.98 timeout 15 set system radius-server 189.76.208.98 source-address 172.31.255.248 set system accounting events login set system accounting events change-log set system accounting events interactive-commands set system accounting destination radius set system syslog user * any emergency set system syslog host 189.76.208.85 any notice set system syslog host 189.76.208.85 kernel info set system syslog host 189.76.208.85 firewall info set system syslog host 189.76.208.85 pfe info set system syslog host 189.76.208.85 interactive-commands any set system syslog file messages any notice set system syslog file messages authorization info set system syslog file messages match "!(.*mld6_input.*)" set system syslog file interactive-commands interactive-commands any set system ntp server 189.76.208.72 set system ntp source-address 172.31.255.248 set chassis dump-on-panic set chassis aggregated-devices ethernet device-count 2 set chassis fpc 0 pic 0 tunnel-services bandwidth 1g set chassis fpc 0 pic 1 tunnel-services bandwidth 10g set chassis alarm management-ethernet link-down ignore set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp probe-type icmp-ping set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp target address 172.30.0.233 set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp probe-count 15 set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp probe-interval 1 set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp test-interval 15 set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp source-address 172.30.0.234 set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp data-size 64 set services rpm probe RPM_MBA-BHE_VIA_TELEBRAS test icmp thresholds successive-loss 2 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp probe-type icmp-ping set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp target address 172.29.0.137 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp probe-count 15 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp probe-interval 1 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp test-interval 15 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp source-address 172.29.0.138 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp data-size 64 set services rpm probe RPM_MBA-PUP_VIA_COELHO test icmp thresholds successive-loss 2 set interfaces ge-1/0/0 description "INTERFACE - ROUTERBOARD - MORADANOVA/MBA" set interfaces ge-1/0/0 flexible-vlan-tagging set interfaces ge-1/0/0 mtu 9000 set interfaces ge-1/0/0 link-mode full-duplex set interfaces ge-1/0/0 encapsulation flexible-ethernet-services set interfaces ge-1/0/0 unit 2515 description "VLAN 2515 - PEER PA-MBA-MK-MORADANOVA" set interfaces ge-1/0/0 unit 2515 vlan-id 2515 set interfaces ge-1/0/0 unit 2515 statistics set interfaces ge-1/0/0 unit 2515 family inet mtu 1500 set interfaces ge-1/0/0 unit 2515 family inet address 172.16.51.65/30 set interfaces ge-1/1/0 description "INTERFACE - CERAGON IP10 - RECORD/MBA" set interfaces ge-1/1/0 flexible-vlan-tagging set interfaces ge-1/1/0 mtu 9000 set interfaces ge-1/1/0 link-mode full-duplex set interfaces ge-1/1/0 media-type fiber set interfaces ge-1/1/1 description "INTERFACE - CERAGON IP20C - RECORD/MBA" set interfaces ge-1/1/1 flexible-vlan-tagging set interfaces ge-1/1/1 mtu 9000 set interfaces ge-1/1/1 link-mode full-duplex set interfaces ge-1/1/1 media-type fiber set interfaces ge-1/1/1 encapsulation flexible-ethernet-services set interfaces ge-1/1/1 unit 2502 description "VLAN 2502 - ADM CERAGON IP20C MORADANOVA/RECORD - MBA" set interfaces ge-1/1/1 unit 2502 vlan-id 2502 set interfaces ge-1/1/1 unit 2502 family inet mtu 1500 set interfaces ge-1/1/1 unit 2502 family inet address 172.16.52.1/29 set interfaces ge-1/1/1 unit 2570 description "VLAN 2570 - PA-MBA-ACX2100-RECORD - VIA IP20C MRN/REC" set interfaces ge-1/1/1 unit 2570 vlan-id 2570 set interfaces ge-1/1/1 unit 2570 family inet mtu 1600 set interfaces ge-1/1/1 unit 2570 family inet address 172.29.0.141/30 set interfaces ge-1/1/1 unit 2570 family mpls mtu 1600 set interfaces ge-1/1/2 description "INTERFACE - CERAGON IP20 - BREJOMEIO/PA" set interfaces ge-1/1/2 flexible-vlan-tagging set interfaces ge-1/1/2 mtu 9000 set interfaces ge-1/1/2 link-mode full-duplex set interfaces ge-1/1/2 media-type fiber set interfaces ge-1/1/2 encapsulation flexible-ethernet-services set interfaces ge-1/1/2 unit 2500 description "VLAN 2500 - ADM CERAGON IP20 MRN/BJM" set interfaces ge-1/1/2 unit 2500 vlan-id 2500 set interfaces ge-1/1/2 unit 2500 family inet mtu 1500 set interfaces ge-1/1/2 unit 2500 family inet address 172.16.50.225/29 set interfaces ge-1/1/3 description "INTERFACE - CERAGON IP10 - BREJOMEIO/PA" set interfaces ge-1/1/3 flexible-vlan-tagging set interfaces ge-1/1/3 mtu 9000 set interfaces ge-1/1/3 link-mode full-duplex set interfaces ge-1/1/3 media-type fiber set interfaces ge-1/1/3 encapsulation flexible-ethernet-services set interfaces ge-1/1/3 unit 2501 description "VLAN 2501 - ADM CERAGON IP10 MBA/BJM" set interfaces ge-1/1/3 unit 2501 vlan-id 2501 set interfaces ge-1/1/3 unit 2501 family inet mtu 1500 set interfaces ge-1/1/3 unit 2501 family inet address 172.16.51.225/29 set interfaces ge-1/1/3 unit 2561 description "VLAN 2561 - PEER - PA-BJM-MK-BREJOMEIO - VIA CERAGON IP10 - MRN/BJM" set interfaces ge-1/1/3 unit 2561 vlan-id 2561 set interfaces ge-1/1/3 unit 2561 statistics set interfaces ge-1/1/3 unit 2561 family inet mtu 1600 set interfaces ge-1/1/3 unit 2561 family inet address 172.29.0.145/30 set interfaces ge-1/1/3 unit 2561 family mpls mtu 1600 set interfaces xe-1/3/0 description "INTERFACE - CLEAR CHANNEL TELEBRAS - BHE" set interfaces xe-1/3/0 vlan-tagging set interfaces xe-1/3/0 speed 10g set interfaces xe-1/3/0 mtu 9000 set interfaces xe-1/3/0 encapsulation flexible-ethernet-services set interfaces xe-1/3/0 unit 1018 description "VLAN 1018 - BRIDGE-BHE_PUP-TELEBRAS/CTE" set interfaces xe-1/3/0 unit 1018 encapsulation vlan-bridge set interfaces xe-1/3/0 unit 1018 vlan-id 1018 set interfaces xe-1/3/0 unit 1019 description "VLAN 1019 - MG-BHE-S6730-ELETRONET - VIA TELEBRAS" set interfaces xe-1/3/0 unit 1019 vlan-id 1019 set interfaces xe-1/3/0 unit 1019 family inet mtu 1600 set interfaces xe-1/3/0 unit 1019 family inet address 172.30.0.234/30 set interfaces xe-1/3/0 unit 1019 family mpls mtu 1600 set interfaces xe-1/3/0 unit 1201 description "VLAN 1201 - BRIDGE-BHE_PUP-TELEBRAS/CTE-S6730" set interfaces xe-1/3/0 unit 1201 encapsulation vlan-bridge set interfaces xe-1/3/0 unit 1201 vlan-id 1201 set interfaces xe-1/3/1 description "INTERFACE - CLEAR CHANNEL COELHO - MBA/PUP" set interfaces xe-1/3/1 flexible-vlan-tagging set interfaces xe-1/3/1 native-vlan-id 1003 set interfaces xe-1/3/1 speed 10g set interfaces xe-1/3/1 mtu 9000 set interfaces xe-1/3/1 encapsulation flexible-ethernet-services set interfaces xe-1/3/1 unit 821 description "VLAN 821 - TESTE CTE" set interfaces xe-1/3/1 unit 821 vlan-id 821 set interfaces xe-1/3/1 unit 821 family inet address 10.11.80.6/29 set interfaces xe-1/3/1 unit 1003 vlan-id 1003 set interfaces xe-1/3/1 unit 1003 family inet mtu 1500 set interfaces xe-1/3/1 unit 1003 family inet address 10.100.0.1/24 set interfaces xe-1/3/1 unit 1018 description "VLAN 1018 - BRIDGE-BHE_PUP-COELHO/TELEBRAS" set interfaces xe-1/3/1 unit 1018 encapsulation vlan-bridge set interfaces xe-1/3/1 unit 1018 vlan-id 1018 set interfaces xe-1/3/1 unit 1201 description "VLAN 1201 - BRIDGE-BHE_PUP-COELHO/TELEBRAS-S6730" set interfaces xe-1/3/1 unit 1201 encapsulation vlan-bridge set interfaces xe-1/3/1 unit 1201 vlan-id 1201 set interfaces xe-1/3/1 unit 1315 description "VLAN 1315 - TESTE COELHO PA-PUP-S6730-WKVETELECOM" set interfaces xe-1/3/1 unit 1315 vlan-id 1315 set interfaces xe-1/3/1 unit 1315 family inet mtu 1500 set interfaces xe-1/3/1 unit 1315 family inet address 10.10.10.1/24 set interfaces xe-1/3/1 unit 1316 description "VLAN 1316 - PEER PA-PUP-S6730-WKVETELECOM" set interfaces xe-1/3/1 unit 1316 vlan-id 1316 set interfaces xe-1/3/1 unit 1316 family inet mtu 1600 set interfaces xe-1/3/1 unit 1316 family inet address 172.29.0.138/30 set interfaces xe-1/3/1 unit 1316 family mpls mtu 1600 set interfaces fxp0 description "INTERAFACE - GERENCIA LOCAL" set interfaces fxp0 unit 0 family inet address 192.168.1.1/24 set interfaces lo0 unit 255 description "LOOPBACK - AREA BACKBONE" set interfaces lo0 unit 255 family inet primary set interfaces lo0 unit 255 family inet filter input PROTECT-RE set interfaces lo0 unit 255 family inet address 172.31.255.248/32 set snmp description PA-MBA-ACX2100-MORADANOVA set snmp contact "cgr@wkve.com.br" set snmp community cilbup authorization read-only set snmp community cilbup clients 189.76.208.0/24 set snmp community cilbup clients 177.8.22.232/29 set forwarding-options hash-key family inet layer-3 set forwarding-options hash-key family inet layer-4 set forwarding-options hash-key family mpls label-1 set forwarding-options hash-key family mpls label-2 set forwarding-options hash-key family mpls payload ip set policy-options prefix-list localhost 127.0.0.0/8 set policy-options prefix-list ntp-servers apply-path "system ntp server <*>" set policy-options prefix-list NetworkBGP-Prefixes 172.16.50.224/29 set policy-options prefix-list NetworkBGP-Prefixes 172.16.50.224/30 set policy-options prefix-list NetworkBGP-Prefixes 172.16.51.224/29 set policy-options prefix-list NetworkBGP-Prefixes 172.16.52.0/29 set policy-options prefix-list NetworkBGP-Prefixes 177.8.25.8/30 set policy-options prefix-list NetworkBGPv6-Prefixes set policy-options policy-statement Default-originate term gateway from route-filter 0.0.0.0/0 exact set policy-options policy-statement Default-originate term gateway then next-hop self set policy-options policy-statement Default-originate term gateway then accept set policy-options policy-statement Default-originate then next policy set policy-options policy-statement ECMP term area-0 from protocol direct set policy-options policy-statement ECMP term area-0 from area 0.0.0.0 set policy-options policy-statement ECMP term area-0 then accept set policy-options policy-statement ECMP term area-177 from protocol direct set policy-options policy-statement ECMP term area-177 from area 0.0.0.177 set policy-options policy-statement ECMP term area-177 then accept set policy-options policy-statement ECMP then load-balance per-packet set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK then accept set policy-options policy-statement EXPORT-LDP term DENY-ALL then reject set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK then accept set policy-options policy-statement IMPORT-LDP term DENY-ALL then reject set policy-options policy-statement IN-RR then accept set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL from protocol bgp set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL from as-path local-as set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL then accept set policy-options policy-statement IN-iBGP-IPv4-WKVE then reject set policy-options policy-statement OUT-RR term 10 from family inet set policy-options policy-statement OUT-RR term 10 from protocol direct set policy-options policy-statement OUT-RR term 10 from prefix-list NetworkBGP-Prefixes set policy-options policy-statement OUT-RR term 10 then local-preference 1000 set policy-options policy-statement OUT-RR term 10 then community add GERENCIA set policy-options policy-statement OUT-RR term 10 then next-hop self set policy-options policy-statement OUT-RR term 10 then accept set policy-options policy-statement OUT-RR term 20 from family inet6 set policy-options policy-statement OUT-RR term 20 from protocol direct set policy-options policy-statement OUT-RR term 20 from prefix-list NetworkBGPv6-Prefixes set policy-options policy-statement OUT-RR term 20 then local-preference 1000 set policy-options policy-statement OUT-RR term 20 then community add GERENCIA set policy-options policy-statement OUT-RR term 20 then next-hop self set policy-options policy-statement OUT-RR term 20 then accept set policy-options policy-statement OUT-RR term 30 from family inet set policy-options policy-statement OUT-RR term 30 from protocol static set policy-options policy-statement OUT-RR term 30 from prefix-list NetworkBGP-Prefixes set policy-options policy-statement OUT-RR term 30 then local-preference 1000 set policy-options policy-statement OUT-RR term 30 then community add GERENCIA set policy-options policy-statement OUT-RR term 30 then next-hop self set policy-options policy-statement OUT-RR term 30 then accept set policy-options policy-statement OUT-RR term 40 from family inet6 set policy-options policy-statement OUT-RR term 40 from protocol static set policy-options policy-statement OUT-RR term 40 from prefix-list NetworkBGPv6-Prefixes set policy-options policy-statement OUT-RR term 40 then local-preference 1000 set policy-options policy-statement OUT-RR term 40 then community add GERENCIA set policy-options policy-statement OUT-RR term 40 then next-hop self set policy-options policy-statement OUT-RR term 40 then accept set policy-options policy-statement OUT-RR term 50 from community CLIENTES set policy-options policy-statement OUT-RR term 50 then accept set policy-options policy-statement OUT-RR term 60 from community GERENCIA set policy-options policy-statement OUT-RR term 60 then accept set policy-options policy-statement OUT-RR term 70 from protocol bgp set policy-options policy-statement OUT-RR term 70 from as-path local-as set policy-options policy-statement OUT-RR term 70 then local-preference 1000 set policy-options policy-statement OUT-RR term 70 then accept set policy-options policy-statement OUT-RR term 80 from family inet-vpn set policy-options policy-statement OUT-RR term 80 then accept set policy-options policy-statement OUT-RR term 90 from family inet6-vpn set policy-options policy-statement OUT-RR term 90 then accept set policy-options policy-statement OUT-RR then reject set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp from protocol bgp set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp from as-path local-as set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static from protocol static set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static then next-hop self set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks from protocol direct set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks from prefix-list NetworkBGP-Prefixes set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-downstream from community COMMUNITY-ISPs set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-downstream then accept set policy-options policy-statement OUT-iBGP-IPv4-WKVE then reject set policy-options community 28360:6 members 28360:6 set policy-options community CLIENTES members 28360:1010 set policy-options community COMMUNITY-ALL members *:* set policy-options community COMMUNITY-CLIENTES members 28360:1010 set policy-options community COMMUNITY-GERENCIA members 28360:1019 set policy-options community COMMUNITY-ISP-CDNs members 28360:15 set policy-options community COMMUNITY-ISPs members 28360:10 set policy-options community GERENCIA members 28360:1019 set policy-options community no-export members no-export set policy-options as-path local-as "()" set firewall family inet filter PROTECT-RE interface-specific set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.0.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.16.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.208.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 179.124.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 138.94.8.0/22 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bgp-src from protocol tcp set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-port bgp set firewall family inet filter PROTECT-RE term aceita-bgp-src then accept set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.0.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.16.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.208.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 179.124.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 138.94.8.0/22 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from protocol tcp set firewall family inet filter PROTECT-RE term aceita-bgp-dst from destination-port bgp set firewall family inet filter PROTECT-RE term aceita-bgp-dst then accept set firewall family inet filter PROTECT-RE term aceita-ospf from protocol ospf set firewall family inet filter PROTECT-RE term aceita-ospf then accept set firewall family inet filter PROTECT-RE term aceita-bfd from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bfd from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bfd from destination-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bfd from destination-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bfd from protocol udp set firewall family inet filter PROTECT-RE term aceita-bfd from port 4784 set firewall family inet filter PROTECT-RE term aceita-bfd from port 3784 set firewall family inet filter PROTECT-RE term aceita-bfd from port 3785 set firewall family inet filter PROTECT-RE term aceita-bfd then accept set firewall family inet filter PROTECT-RE term aceita-rsvp from protocol rsvp set firewall family inet filter PROTECT-RE term aceita-rsvp then accept set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.2/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.6/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 172.31.255.248/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol udp set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol tcp set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-port 646 set firewall family inet filter PROTECT-RE term aceita-dst-ldp then accept set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.2/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.6/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 172.31.255.248/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol udp set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol tcp set firewall family inet filter PROTECT-RE term aceita-src-ldp from source-port 646 set firewall family inet filter PROTECT-RE term aceita-src-ldp then accept set firewall family inet filter PROTECT-RE term aceita-lsp-ping from destination-address 172.31.255.248/32 set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol udp set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol tcp set firewall family inet filter PROTECT-RE term aceita-lsp-ping from source-port 3503 set firewall family inet filter PROTECT-RE term aceita-lsp-ping then accept set firewall family inet filter PROTECT-RE term aceita-snmp from source-address 189.76.208.0/24 set firewall family inet filter PROTECT-RE term aceita-snmp from source-address 177.8.22.232/29 set firewall family inet filter PROTECT-RE term aceita-snmp from protocol udp set firewall family inet filter PROTECT-RE term aceita-snmp from destination-port 161 set firewall family inet filter PROTECT-RE term aceita-snmp then policer limit-1m set firewall family inet filter PROTECT-RE term aceita-snmp then accept set firewall family inet filter PROTECT-RE term radius from source-address 189.76.208.98/32 set firewall family inet filter PROTECT-RE term radius then accept set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 189.76.208.72/32 set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 172.31.255.248/32 set firewall family inet filter PROTECT-RE term aceita-ntp from protocol udp set firewall family inet filter PROTECT-RE term aceita-ntp from destination-port ntp set firewall family inet filter PROTECT-RE term aceita-ntp then policer limit-32k set firewall family inet filter PROTECT-RE term aceita-ntp then accept set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.8/32 set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.9/32 set firewall family inet filter PROTECT-RE term aceita-dns from protocol udp set firewall family inet filter PROTECT-RE term aceita-dns from source-port 53 set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-request set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-reply set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type unreachable set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type time-exceeded set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp-reply set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp set firewall family inet filter PROTECT-RE term aceita-icmp then policer limit-10m set firewall family inet filter PROTECT-RE term aceita-icmp then accept set firewall family inet filter PROTECT-RE term aceita-traceroute from protocol udp set firewall family inet filter PROTECT-RE term aceita-traceroute from destination-port 33434-33523 set firewall family inet filter PROTECT-RE term aceita-traceroute then accept set firewall family inet filter PROTECT-RE term aceita-ssh-out from protocol tcp set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port ssh set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port 33 set firewall family inet filter PROTECT-RE term aceita-ssh-out then accept set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.208.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.214.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.230.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.223.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 177.8.16.0/23 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 192.168.1.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-ssh from destination-port ssh set firewall family inet filter PROTECT-RE term aceita-ssh then accept set firewall family inet filter PROTECT-RE term descarta-resto then discard set firewall policer limit-32k if-exceeding bandwidth-limit 32k set firewall policer limit-32k if-exceeding burst-size-limit 15k set firewall policer limit-32k then discard set firewall policer limit-1m if-exceeding bandwidth-limit 1m set firewall policer limit-1m if-exceeding burst-size-limit 15k set firewall policer limit-1m then discard set firewall policer limit-10m if-exceeding bandwidth-limit 100m set firewall policer limit-10m if-exceeding burst-size-limit 625k set firewall policer limit-10m then discard set routing-options forwarding-table export ECMP set routing-options router-id 172.31.255.248 set routing-options autonomous-system 28360 set protocols ospf apply-groups OSPF-BFD set protocols ospf traffic-engineering set protocols ospf area 0.0.0.177 interface ge-1/0/0.2515 metric 10 set protocols ospf area 0.0.0.177 interface ge-1/1/2.2510 metric 100 set protocols ospf area 0.0.0.177 interface ge-1/1/3.2561 interface-type p2p set protocols ospf area 0.0.0.177 interface ge-1/1/3.2561 metric 50 set protocols ospf area 0.0.0.177 interface ge-1/1/3.2561 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.177 interface lo0.255 set protocols ospf area 0.0.0.177 interface ge-1/1/1.2570 interface-type p2p set protocols ospf area 0.0.0.177 interface ge-1/1/1.2570 metric 10 set protocols ospf area 0.0.0.177 interface ge-1/1/1.2570 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.177 interface xe-1/3/1.1316 interface-type p2p set protocols ospf area 0.0.0.177 interface xe-1/3/1.1316 metric 10 set protocols ospf area 0.0.0.177 interface xe-1/3/1.1316 ldp-synchronization hold-time 10 set protocols ospf area 0.0.0.0 interface xe-1/3/0.1019 interface-type p2p set protocols ospf area 0.0.0.0 interface xe-1/3/0.1019 metric 10 set protocols ospf area 0.0.0.0 interface xe-1/3/0.1019 ldp-synchronization hold-time 10 set protocols ospf export ECMP set protocols ospf reference-bandwidth 1g set protocols ospf no-rfc-1583 set protocols rsvp load-balance bandwidth set protocols rsvp interface ge-1/1/3.2561 bandwidth 300m set protocols rsvp interface ge-1/1/1.2570 bandwidth 500m set protocols rsvp interface xe-1/3/1.1316 bandwidth 4200000000 set protocols rsvp interface xe-1/3/0.1019 bandwidth 4200000000 set protocols rsvp interface fxp0.0 disable set protocols bgp path-selection cisco-non-deterministic set protocols bgp group RR type internal set protocols bgp group RR local-address 172.31.255.248 set protocols bgp group RR advertise-inactive set protocols bgp group RR import IN-RR set protocols bgp group RR family inet unicast set protocols bgp group RR family inet-vpn unicast set protocols bgp group RR family inet6 labeled-unicast explicit-null set protocols bgp group RR family inet6-vpn unicast set protocols bgp group RR family l2vpn auto-discovery-only set protocols bgp group RR export OUT-RR set protocols bgp group RR peer-as 28360 set protocols bgp group RR neighbor 172.31.255.250 description "PEER - PA-PUP-VRR-RREFLECTOR1" set protocols bgp group RR neighbor 172.31.255.251 description "PEER - PA-PUP-VRR-RREFLECTOR2" set protocols ldp track-igp-metric set protocols ldp import IMPORT-LDP set protocols ldp export EXPORT-LDP set protocols ldp transport-address 172.31.255.248 set protocols ldp interface ge-1/1/1.2570 set protocols ldp interface ge-1/1/3.2561 set protocols ldp interface xe-1/3/0.1019 set protocols ldp interface xe-1/3/1.1316 set protocols ldp interface fxp0.0 disable set protocols ldp interface lo0.255 set protocols mpls traffic-engineering mpls-forwarding set protocols mpls expand-loose-hop set protocols mpls interface lo0.255 set protocols mpls interface ge-1/1/1.2570 set protocols mpls interface ge-1/1/3.2561 set protocols mpls interface xe-1/3/0.1019 set protocols mpls interface xe-1/3/1.1316 set protocols mpls interface fxp0.0 disable set bridge-domains bridge-domain-1018 vlan-id 1018 set bridge-domains bridge-domain-1018 interface xe-1/3/0.1018 set bridge-domains bridge-domain-1018 interface xe-1/3/1.1018 set bridge-domains bridge-domain-1201 vlan-id 1201 set bridge-domains bridge-domain-1201 interface xe-1/3/0.1201 set bridge-domains bridge-domain-1201 interface xe-1/3/1.1201