# Hostname: MG-BHE-KVM-VRR-ISP # Model: vrr # Junos: 23.4R2.13 # JUNOS OS Kernel 64-bit [20240604.39c9257_builder_stable_12_234] # JUNOS OS libs [20240604.39c9257_builder_stable_12_234] # JUNOS OS runtime [20240604.39c9257_builder_stable_12_234] # JUNOS OS time zone information [20240604.39c9257_builder_stable_12_234] # JUNOS network stack and utilities [20240705.152839_builder_junos_234_r2] # JUNOS libs [20240705.152839_builder_junos_234_r2] # JUNOS OS libs compat32 [20240604.39c9257_builder_stable_12_234] # JUNOS OS 32-bit compatibility [20240604.39c9257_builder_stable_12_234] # JUNOS libs compat32 [20240705.152839_builder_junos_234_r2] # JUNOS runtime [20240705.152839_builder_junos_234_r2] # JUNOS sflow mx [20240705.152839_builder_junos_234_r2] # JUNOS py extensions [20240705.152839_builder_junos_234_r2] # JUNOS py base [20240705.152839_builder_junos_234_r2] # JUNOS OS vmguest [20240604.39c9257_builder_stable_12_234] # JUNOS OS package [20240623.004723_builder_main] # JUNOS OS network modules [20240604.39c9257_builder_stable_12_234] # JUNOS OS crypto [20240604.39c9257_builder_stable_12_234] # JUNOS OS boot-ve files [20240604.39c9257_builder_stable_12_234] # JUNOS na telemetry [23.4R2.13] # JUNOS vmguest [20240705.152839_builder_junos_234_r2] # JUNOS Virtual Route Reflector Configuraton Package [20240705.152839_builder_junos_234_r2] # JUNOS mx libs compat32 [20240705.152839_builder_junos_234_r2] # JUNOS mx runtime [20240705.152839_builder_junos_234_r2] # JUNOS RPD Telemetry Application [23.4R2.13] # JUNOS python routing scripts for consistency check in RIB/FIB/PFE [20240705.152839_builder_junos_234_r2] # JUNOS Routing mpls-oam-basic [20240705.152839_builder_junos_234_r2] # JUNOS Routing mpls-oam-advanced [20240705.152839_builder_junos_234_r2] # JUNOS Routing lsys [20240705.152839_builder_junos_234_r2] # JUNOS Routing controller-internal [20240705.152839_builder_junos_234_r2] # JUNOS Routing controller-external [20240705.152839_builder_junos_234_r2] # JUNOS Routing 32-bit Compatible Version [20240705.152839_builder_junos_234_r2] # JUNOS Routing aggregated [20240705.152839_builder_junos_234_r2] # Redis [20240705.152839_builder_junos_234_r2] # JUNOS probe utility [20240705.152839_builder_junos_234_r2] # JUNOS common platform support [20240705.152839_builder_junos_234_r2] # JUNOS Openconfig [23.4R2.13] # JUNOS mtx network modules [20240705.152839_builder_junos_234_r2] # JUNOS modules [20240705.152839_builder_junos_234_r2] # JUNOS mx modules [20240705.152839_builder_junos_234_r2] # JUNOS mx libs [20240705.152839_builder_junos_234_r2] # JUNOS L2 RSI Scripts [20240705.152839_builder_junos_234_r2] # JUNOS SQL Sync Daemon [20240705.152839_builder_junos_234_r2] # JUNOS mtx Data Plane Crypto Support [20240705.152839_builder_junos_234_r2] # JUNOS daemons [20240705.152839_builder_junos_234_r2] # JUNOS mx daemons [20240705.152839_builder_junos_234_r2] # JUNOS Broadband Edge User Plane Apps [23.4R2.13] # JUNOS appidd-mx application-identification daemon [20240705.152839_builder_junos_234_r2] # JUNOS Services URL Filter package [20240705.152839_builder_junos_234_r2] # JUNOS Services TLB Service PIC package [20240705.152839_builder_junos_234_r2] # JUNOS Services Telemetry [20240705.152839_builder_junos_234_r2] # JUNOS Services TCP-LOG [20240705.152839_builder_junos_234_r2] # JUNOS Services SSL [20240705.152839_builder_junos_234_r2] # JUNOS Services SOFTWIRE [20240705.152839_builder_junos_234_r2] # JUNOS Services Stateful Firewall [20240705.152839_builder_junos_234_r2] # JUNOS Services RTCOM [20240705.152839_builder_junos_234_r2] # JUNOS Services RPM [20240705.152839_builder_junos_234_r2] # JUNOS Services PCEF package [20240705.152839_builder_junos_234_r2] # JUNOS Services NAT [20240705.152839_builder_junos_234_r2] # JUNOS Services Mobile Subscriber Service Container package [20240705.152839_builder_junos_234_r2] # JUNOS Services MobileNext Software package [20240705.152839_builder_junos_234_r2] # JUNOS Services Logging Report Framework package [20240705.152839_builder_junos_234_r2] # JUNOS Services LL-PDF Container package [20240705.152839_builder_junos_234_r2] # JUNOS Services Jflow Container package [20240705.152839_builder_junos_234_r2] # JUNOS Services Deep Packet Inspection package [20240705.152839_builder_junos_234_r2] # JUNOS Services IPSec [20240705.152839_builder_junos_234_r2] # JUNOS Services IDS [20240705.152839_builder_junos_234_r2] # JUNOS IDP Services [20240705.152839_builder_junos_234_r2] # JUNOS Services HTTP Content Management package [20240705.152839_builder_junos_234_r2] # JUNOS Services DNS Filter package (i386) [20240705.152839_builder_junos_234_r2] # JUNOS Services Crypto [20240705.152839_builder_junos_234_r2] # JUNOS Services Captive Portal and Content Delivery Container package [20240705.152839_builder_junos_234_r2] # JUNOS Services COS [20240705.152839_builder_junos_234_r2] # JUNOS AppId Services [20240705.152839_builder_junos_234_r2] # JUNOS Services Application Level Gateways [20240705.152839_builder_junos_234_r2] # JUNOS Services AACL Container package [20240705.152839_builder_junos_234_r2] # JUNOS Extension Toolkit [20240705.152839_builder_junos_234_r2] # JUNOS Packet Forwarding Engine Support (M/T Common) [20240705.152839_builder_junos_234_r2] # JUNOS Juniper Malware Removal Tool (JMRT) [1.0.0+20240705.152839_builder_junos_234_r2] # JUNOS Juniper Malware Removal Tool (JMRT) Test [1.0.0+20240705.152839_builder_junos_234_r2] # JUNOS J-Insight [20240705.152839_builder_junos_234_r2] # JUNOS jfirmware [20240515.054255_builder_junos_234_r2] # JUNOS Online Documentation [20240705.152839_builder_junos_234_r2] # JUNOS jail runtime [20240604.39c9257_builder_stable_12_234] # JUNOS dsa [20240705.152839_builder_junos_234_r2] # Hardware inventory: # Item Version Part number Serial number Description # Chassis VR669A7661CD VRR # Midplane # Routing Engine RE-VRR # License usage: # Licensed Licensed Licensed # Feature Feature Feature # Feature name used installed needed Expiry # scale-subscriber 10 0 permanent # scale-l2tp 0 1000 0 permanent # cBNG Lite UP License 0 100 0 permanent # # Licenses installed: none # set version 23.4R2.13 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection minimum-interval 500 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection multiplier 3 set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection full-neighbors-only set system host-name MG-BHE-KVM-VRR-ISP set system root-authentication encrypted-password "$6$VNEQSqiQ$j3PlTMuYpVW3VHUwHViZGxFam1Aab9jiE9Ngxl18nbOy.01mA40wmQnrN8Tv2XQ54MZefAHcbGnX3g6iftJZf0" set system login idle-timeout 10 set system login class CGR idle-timeout 2 set system login class CGR permissions configure set system login class CGR permissions view set system login class CGR permissions view-configuration set system login class CGR allow-commands "(quit)|(configure)|(show)" set system login class CGR deny-commands .* set system login class CGR allow-configuration "(interfaces)|(vlans)|(delete .*)|(set .*)" set system login user OP full-name "Usuario Operador" set system login user OP uid 2008 set system login user OP class CGR set system login user RO full-name "Usuario Read Only" set system login user RO uid 2009 set system login user RO class read-only set system login user SU full-name "Usuario Super User" set system login user SU uid 2010 set system login user SU class super-user set system login user wkve full-name "Usuario Wkve Telecom" set system login user wkve uid 2002 set system login user wkve class super-user set system login user wkve authentication encrypted-password "$6$4lDCp22R$0t.HsHO6Pr.WyAKlYwn0laZA2GjVaydU9OBxUR9XF5IvVJPo/Z7xYZKfeFg2dU9b8vDgacspioUPXBcUGhrkW0" set system services ssh root-login deny set system services ssh protocol-version v2 set system domain-name wkve.net.br set system time-zone GMT+3 set system debugger-on-panic set system debugger-on-break set system dump-on-panic set system authentication-order radius set system authentication-order password set system name-server 177.8.8.8 set system name-server 177.8.8.9 set system name-server 177.8.8.10 set system radius-server 189.76.208.98 port 1840 set system radius-server 189.76.208.98 accounting-port 1841 set system radius-server 189.76.208.98 secret "$9$vSlWNb24ZUikwYTz6/OB7-V" set system radius-server 189.76.208.98 timeout 15 set system radius-server 189.76.208.98 source-address 189.76.208.252 set system accounting events login set system accounting events change-log set system accounting events interactive-commands set system accounting destination radius set system syslog user * any emergency set system syslog host 189.76.208.85 any notice set system syslog host 189.76.208.85 kernel info set system syslog host 189.76.208.85 firewall info set system syslog host 189.76.208.85 pfe info set system syslog host 189.76.208.85 interactive-commands any set system syslog file interactive-commands interactive-commands any set system syslog file messages any notice set system syslog file messages authorization info set system syslog file messages match "!(.*mld6_input.*)" set system processes routing force-64-bit set system ntp server 189.76.208.72 set system ntp source-address 189.76.208.252 set chassis dump-on-panic set chassis alarm management-ethernet link-down ignore set interfaces em0 disable set interfaces em1 mtu 9000 set interfaces em1 unit 0 family inet mtu 1600 set interfaces em1 unit 0 family inet address 172.30.2.102/30 set interfaces em1 unit 0 family inet6 mtu 1600 set interfaces em1 unit 0 family mpls mtu 1600 set interfaces lo0 unit 255 description "LOOPBACK - AREA BACKBONE" set interfaces lo0 unit 255 family inet primary set interfaces lo0 unit 255 family inet filter input PROTECT-RE set interfaces lo0 unit 255 family inet address 189.76.208.252/32 set interfaces lo0 unit 255 family inet6 filter input PROTECTv6-RE set interfaces lo0 unit 255 family inet6 address 2804:14::252/128 set snmp location "Rack Server BL18, Fase 2, Data Center Sonda Ativas, Belo Horizonte, Brasil [-19.9425622,-44.0135095]" set snmp contact "cgr@wkve.com.br" set snmp community cilbup authorization read-only set snmp community cilbup clients 189.76.208.0/24 set policy-options prefix-list bgp-peers apply-path "protocols bgp group <*> neighbor <*>" set policy-options prefix-list bgp-peers-vpn apply-path "routing-instances <*> protocols bgp group <*> neighbor <*>" set policy-options policy-statement DENY-ALL then reject set policy-options policy-statement ECMP then load-balance per-packet set policy-options policy-statement ECMPv6 then load-balance per-packet set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32 set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK then accept set policy-options policy-statement EXPORT-LDP then reject set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32 set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK then accept set policy-options policy-statement IMPORT-LDP then reject set policy-options policy-statement IN-BORDA term 10 from family inet set policy-options policy-statement IN-BORDA term 10 from protocol bgp set policy-options policy-statement IN-BORDA term 10 from route-filter 0.0.0.0/0 upto /24 set policy-options policy-statement IN-BORDA term 10 then accept set policy-options policy-statement IN-BORDA term 20 from family inet6 set policy-options policy-statement IN-BORDA term 20 from protocol bgp set policy-options policy-statement IN-BORDA term 20 from route-filter ::/0 upto /48 set policy-options policy-statement IN-BORDA term 20 then accept set policy-options policy-statement IN-BORDA then reject set policy-options policy-statement OUT-BORDA term 20 from family inet6 set policy-options policy-statement OUT-BORDA term 20 from protocol direct set policy-options policy-statement OUT-BORDA term 20 from route-filter 2804:14::252/128 exact set policy-options policy-statement OUT-BORDA term 20 then accept set policy-options policy-statement OUT-BORDA then reject set policy-options policy-statement OUT-IPV4-FULLROUTING term 10 from route-filter 0.0.0.0/0 exact set policy-options policy-statement OUT-IPV4-FULLROUTING term 10 then reject set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 0.0.0.0/8 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 10.0.0.0/8 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 100.64.0.0/10 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 127.0.0.0/8 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 128.0.0.0/16 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 172.16.0.0/12 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 191.255.0.0/16 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 192.0.2.0/24 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 223.255.255.0/24 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 224.0.0.0/3 upto /32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 from route-filter 0.0.0.0/0 prefix-length-range /25-/32 set policy-options policy-statement OUT-IPV4-FULLROUTING term 20 then reject set policy-options policy-statement OUT-IPV4-FULLROUTING term 50 from protocol bgp set policy-options policy-statement OUT-IPV4-FULLROUTING term 50 from route-filter 0.0.0.0/0 upto /24 set policy-options policy-statement OUT-IPV4-FULLROUTING term 50 then community delete COMMUNITY-ALL set policy-options policy-statement OUT-IPV4-FULLROUTING term 50 then accept set policy-options policy-statement OUT-IPV4-FULLROUTING then reject set policy-options policy-statement OUT-IPV6-FULLROUTING term 10 from route-filter ::/0 exact set policy-options policy-statement OUT-IPV6-FULLROUTING term 10 then reject set policy-options policy-statement OUT-IPV6-FULLROUTING term 50 from route-filter ::/0 upto /48 set policy-options policy-statement OUT-IPV6-FULLROUTING term 50 then community delete COMMUNITY-ALL set policy-options policy-statement OUT-IPV6-FULLROUTING term 50 then accept set policy-options policy-statement OUT-IPV6-FULLROUTING then reject set policy-options community COMMUNITY-ALL members *:* set firewall family inet filter PROTECT-RE interface-specific set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.0.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.16.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.208.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 179.124.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 138.94.8.0/22 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bgp-src from protocol tcp set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-port bgp set firewall family inet filter PROTECT-RE term aceita-bgp-src then accept set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.0.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.16.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.208.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 179.124.224.0/20 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 138.94.8.0/22 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 10.0.0.0/8 set firewall family inet filter PROTECT-RE term aceita-bgp-dst from protocol tcp set firewall family inet filter PROTECT-RE term aceita-bgp-dst from destination-port bgp set firewall family inet filter PROTECT-RE term aceita-bgp-dst then accept set firewall family inet filter PROTECT-RE term aceita-ospf from protocol ospf set firewall family inet filter PROTECT-RE term aceita-ospf then accept set firewall family inet filter PROTECT-RE term aceita-rsvp from protocol rsvp set firewall family inet filter PROTECT-RE term aceita-rsvp then accept set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.2/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.6/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 189.76.208.252/32 set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol udp set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol tcp set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-port 646 set firewall family inet filter PROTECT-RE term aceita-dst-ldp then accept set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.2/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.6/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 189.76.208.252/32 set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol udp set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol tcp set firewall family inet filter PROTECT-RE term aceita-src-ldp from source-port 646 set firewall family inet filter PROTECT-RE term aceita-src-ldp then accept set firewall family inet filter PROTECT-RE term aceita-lsp-ping from destination-address 189.76.208.252/32 set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol udp set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol tcp set firewall family inet filter PROTECT-RE term aceita-lsp-ping from source-port 3503 set firewall family inet filter PROTECT-RE term aceita-lsp-ping then accept set firewall family inet filter PROTECT-RE term aceita-snmp from source-address 189.76.208.0/24 set firewall family inet filter PROTECT-RE term aceita-snmp from protocol udp set firewall family inet filter PROTECT-RE term aceita-snmp from destination-port 161 set firewall family inet filter PROTECT-RE term aceita-snmp then policer limit-1m set firewall family inet filter PROTECT-RE term aceita-snmp then accept set firewall family inet filter PROTECT-RE term radius from source-address 189.76.208.98/32 set firewall family inet filter PROTECT-RE term radius then accept set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 189.76.208.72/32 set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 189.76.208.252/32 set firewall family inet filter PROTECT-RE term aceita-ntp from protocol udp set firewall family inet filter PROTECT-RE term aceita-ntp from destination-port ntp set firewall family inet filter PROTECT-RE term aceita-ntp then policer limit-32k set firewall family inet filter PROTECT-RE term aceita-ntp then accept set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.8/32 set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.9/32 set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.10/32 set firewall family inet filter PROTECT-RE term aceita-dns from source-address 8.8.8.8/32 set firewall family inet filter PROTECT-RE term aceita-dns from protocol udp set firewall family inet filter PROTECT-RE term aceita-dns from source-port 53 set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-request set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-reply set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type unreachable set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type time-exceeded set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp-reply set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp set firewall family inet filter PROTECT-RE term aceita-icmp then policer limit-10m set firewall family inet filter PROTECT-RE term aceita-icmp then accept set firewall family inet filter PROTECT-RE term aceita-traceroute from protocol udp set firewall family inet filter PROTECT-RE term aceita-traceroute from destination-port 33434-33523 set firewall family inet filter PROTECT-RE term aceita-traceroute then accept set firewall family inet filter PROTECT-RE term aceita-ssh-out from protocol tcp set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port ssh set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port 33 set firewall family inet filter PROTECT-RE term aceita-ssh-out then accept set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.208.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.214.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.230.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.223.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 177.8.16.0/23 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 192.168.1.0/24 set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 172.16.0.0/12 set firewall family inet filter PROTECT-RE term aceita-ssh from destination-port ssh set firewall family inet filter PROTECT-RE term aceita-ssh then accept set firewall family inet filter PROTECT-RE term descarta-resto then discard set firewall family inet6 filter PROTECTv6-RE term icmpv6 from next-header icmp6 set firewall family inet6 filter PROTECTv6-RE term icmpv6 then policer limit-icmp set firewall family inet6 filter PROTECTv6-RE term icmpv6 then accept set firewall family inet6 filter PROTECTv6-RE term ospf3 from next-header ospf set firewall family inet6 filter PROTECTv6-RE term ospf3 then accept set firewall family inet6 filter PROTECTv6-RE term traceroute from next-header udp set firewall family inet6 filter PROTECTv6-RE term traceroute from destination-port 33434-33523 set firewall family inet6 filter PROTECTv6-RE term traceroute then policer limit-icmp set firewall family inet6 filter PROTECTv6-RE term traceroute then accept set firewall family inet6 filter PROTECTv6-RE term hopbyhop from next-header hop-by-hop set firewall family inet6 filter PROTECTv6-RE term hopbyhop then accept set firewall family inet6 filter PROTECTv6-RE term bgp from source-prefix-list bgp-peers set firewall family inet6 filter PROTECTv6-RE term bgp then accept set firewall family inet6 filter PROTECTv6-RE term bgp-vpn from source-prefix-list bgp-peers-vpn set firewall family inet6 filter PROTECTv6-RE term bgp-vpn then accept set firewall family inet6 filter PROTECTv6-RE term reject then discard set firewall policer limit-10m if-exceeding bandwidth-limit 10m set firewall policer limit-10m if-exceeding burst-size-limit 625k set firewall policer limit-10m then discard set firewall policer limit-1m if-exceeding bandwidth-limit 1m set firewall policer limit-1m if-exceeding burst-size-limit 15k set firewall policer limit-1m then discard set firewall policer limit-32k if-exceeding bandwidth-limit 32k set firewall policer limit-32k if-exceeding burst-size-limit 15k set firewall policer limit-32k then discard set firewall policer limit-icmp if-exceeding bandwidth-limit 3m set firewall policer limit-icmp if-exceeding burst-size-limit 800k set firewall policer limit-icmp then discard set routing-options router-id 189.76.208.252 set routing-options autonomous-system 28360 set routing-options static route 0.0.0.0/0 next-hop 172.30.2.101 set routing-options static route 0.0.0.0/0 metric 250 set routing-options forwarding-table export ECMP set protocols bgp group BORDA type internal set protocols bgp group BORDA local-address 189.76.208.252 set protocols bgp group BORDA import IN-BORDA set protocols bgp group BORDA family inet unicast set protocols bgp group BORDA family inet6 labeled-unicast explicit-null set protocols bgp group BORDA export OUT-BORDA set protocols bgp group BORDA cluster 189.76.208.252 set protocols bgp group BORDA peer-as 28360 set protocols bgp group BORDA graceful-restart set protocols bgp group BORDA neighbor 189.76.208.253 description "PEER - SP-SPO-MX204-EQUINIX" set protocols bgp group BORDA neighbor 189.76.208.254 description "PEER - MG-BHE-MX204-ATIVAS" set protocols bgp group EBGP-V4-CLIENTES type external set protocols bgp group EBGP-V4-CLIENTES multihop ttl 255 set protocols bgp group EBGP-V4-CLIENTES local-address 189.76.208.252 set protocols bgp group EBGP-V4-CLIENTES advertise-inactive set protocols bgp group EBGP-V4-CLIENTES import DENY-ALL set protocols bgp group EBGP-V4-CLIENTES export OUT-IPV4-FULLROUTING set protocols bgp group EBGP-V4-CLIENTES neighbor 189.76.223.206 description "PEERV4 - ASN263881 - ISP50637-VALE" set protocols bgp group EBGP-V4-CLIENTES neighbor 189.76.223.206 peer-as 263881 set protocols bgp group EBGP-V6-CLIENTES type external set protocols bgp group EBGP-V6-CLIENTES multihop ttl 255 set protocols bgp group EBGP-V6-CLIENTES local-address 2804:14::252 set protocols bgp group EBGP-V6-CLIENTES advertise-inactive set protocols bgp group EBGP-V6-CLIENTES import DENY-ALL set protocols bgp group EBGP-V6-CLIENTES family inet6 unicast set protocols bgp group EBGP-V6-CLIENTES export OUT-IPV6-FULLROUTING set protocols bgp group EBGP-V6-CLIENTES neighbor 2804:14:2000::2 description "PEERv6 - ASN263881 - ISP50637-VALE" set protocols bgp group EBGP-V6-CLIENTES neighbor 2804:14:2000::2 peer-as 263881 set protocols ldp track-igp-metric set protocols ldp import IMPORT-LDP set protocols ldp export EXPORT-LDP set protocols ldp transport-address 189.76.208.252 set protocols ldp interface em1.0 set protocols mpls traffic-engineering mpls-forwarding set protocols mpls ipv6-tunneling set protocols mpls interface em1.0 set protocols mpls interface lo0.255 set protocols ospf traffic-engineering set protocols ospf area 0.0.0.0 interface em1.0 interface-type p2p set protocols ospf area 0.0.0.0 interface em1.0 metric 1 set protocols ospf area 0.0.0.0 interface lo0.255 passive set protocols ospf export ECMP set protocols ospf reference-bandwidth 1g set protocols ospf no-rfc-1583 set protocols rsvp load-balance bandwidth set protocols rsvp interface em1.0 bandwidth 1g set protocols rsvp interface lo0.255