versions / version 3 for Node 172.31.254.219

Date of version: 2024-06-18 18:54:52 -03
# Hostname: BA-IBP-ACX2100-IBIRAPUA
# Model: acx2100
# Junos: 19.4R3.11
# JUNOS Base OS boot [19.4R3.11]
# JUNOS Base OS Software Suite [19.4R3.11]
# JUNOS Crypto Software Suite [19.4R3.11]
# JUNOS Packet Forwarding Engine Support (ACX) [19.4R3.11]
# JUNOS Web Management [19.4R3.11]
# JUNOS Online Documentation [19.4R3.11]
# JUNOS SDN Software Suite [19.4R3.11]
# JUNOS Services Application Level Gateways [19.4R3.11]
# JUNOS Services COS [19.4R3.11]
# JUNOS Services Jflow Container package [19.4R3.11]
# JUNOS Services Stateful Firewall [19.4R3.11]
# JUNOS Services NAT [19.4R3.11]
# JUNOS Services RPM [19.4R3.11]
# JUNOS Services SOFTWIRE [19.4R3.11]
# JUNOS Services Captive Portal and Content Delivery Container package [19.4R3.11]
# JUNOS Macsec Software Suite [19.4R3.11]
# JUNOS Services Crypto [19.4R3.11]
# JUNOS Services IPSec [19.4R3.11]
# JUNOS Services RTCOM [19.4R3.11]
# JUNOS Services SSL [19.4R3.11]
# JUNOS Services TCP-LOG [19.4R3.11]
# JUNOS DP Crypto Software Software Suite [19.4R3.11]
# JUNOS py-base-powerpc [19.4R3.11]
# JUNOS py-base2-powerpc [19.4R3.11]
# JUNOS py-extensions-powerpc [19.4R3.11]
# JUNOS py-extensions2-powerpc [19.4R3.11]
# JUNOS jsd [powerpc-19.4R3.11-jet-1]
# JUNOS Kernel Software Suite [19.4R3.11]
# JUNOS Routing Software Suite [19.4R3.11]
# Hardware inventory:
# Item Version Part number Serial number Description
# Chassis NK0214200123 ACX2100
# Midplane REV 10 650-045221 NK0214200123 ACX2100
# Routing Engine BUILTIN BUILTIN Routing Engine
# FEB 0 BUILTIN BUILTIN Forwarding Engine Processor
# FPC 0 BUILTIN BUILTIN FPC BUILTIN
# MIC 0 BUILTIN BUILTIN 16x CHE1T1, RJ48
# PIC 0 BUILTIN BUILTIN 16x CHE1T1, RJ48
# FPC 1 BUILTIN BUILTIN FPC BUILTIN
# MIC 0 BUILTIN BUILTIN 4x 1GE(LAN) RJ45
# PIC 0 BUILTIN BUILTIN 4x 1GE(LAN) RJ45
# MIC 1 BUILTIN BUILTIN 4x 1GE(LAN) SFP, RJ45
# PIC 1 BUILTIN BUILTIN 4x 1GE(LAN) SFP, RJ45
# Xcvr 2 REV 01 740-011782 p224w2pt0563 SFP-SX
# MIC 2 BUILTIN BUILTIN 2x 1GE(LAN) SFP
# PIC 2 BUILTIN BUILTIN 2x 1GE(LAN) SFP
# Xcvr 0 REV 01 740-021308 b2duairj0030 SFP+-10G-SR
# Xcvr 1 REV 01 740-011782 z2fhj24n0307 SFP-SX
# MIC 3 BUILTIN BUILTIN 2x 10GE(LAN) SFP+
# PIC 3 BUILTIN BUILTIN 2x 10GE(LAN) SFP+
# License usage: none
#
# Licenses installed: none
#
set version 19.4R3.11
set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection minimum-interval 1000
set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection multiplier 4
set groups OSPF-BFD protocols ospf area <*> interface <*> bfd-liveness-detection full-neighbors-only
set system host-name BA-IBP-ACX2100-IBIRAPUA
set system root-authentication encrypted-password "$5$8oSOQjvX$et1nd.2tIqfpmBqp9AZIQRJpp7eBJ5FhRrwCP6Gp7Z7"
set system login class CGR idle-timeout 2
set system login class CGR permissions configure
set system login class CGR permissions view
set system login class CGR permissions view-configuration
set system login class CGR allow-commands "(quit)|(configure)|(show .*)|(ping .*)|(traceroute .*)|(commit .*)"
set system login class CGR deny-commands .*
set system login class CGR allow-configuration "(interfaces)|(vlans)|(delete .*)|(set .*)"
set system login user OP full-name "Usuario Operador"
set system login user OP uid 2008
set system login user OP class CGR
set system login user RO full-name "Usuario Read Only"
set system login user RO uid 2009
set system login user RO class read-only
set system login user SU full-name "Usuario Super User"
set system login user SU uid 2010
set system login user SU class super-user
set system login user wkve full-name "Usuario Wkve Telecom"
set system login user wkve uid 2002
set system login user wkve class super-user
set system login user wkve authentication encrypted-password "$5$Tsp3kqqo$fnkypxgRXRNvfU1vpNwWxJOcACAcP13zamlgcuOdm.8"
set system services ssh root-login deny
set system services ssh no-tcp-forwarding
set system services ssh protocol-version v2
set system domain-name wkve.net.br
set system time-zone GMT+3
set system debugger-on-panic
set system debugger-on-break
set system dump-on-panic
set system authentication-order radius
set system name-server 177.8.8.8
set system name-server 177.8.8.9
set system radius-server 189.76.208.98 port 1840
set system radius-server 189.76.208.98 accounting-port 1841
set system radius-server 189.76.208.98 secret "$9$BACIyK8X-Vs2vWGDkqzFSre"
set system radius-server 189.76.208.98 timeout 15
set system radius-server 189.76.208.98 source-address 172.31.254.219
set system accounting events login
set system accounting events change-log
set system accounting events interactive-commands
set system accounting destination radius
set system syslog user * any emergency
set system syslog host 189.76.208.85 any notice
set system syslog host 189.76.208.85 kernel info
set system syslog host 189.76.208.85 firewall info
set system syslog host 189.76.208.85 pfe info
set system syslog host 189.76.208.85 interactive-commands any
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file messages match "!(.*mld6_input.*)"
set system syslog file interactive-commands interactive-commands any
set system ntp server 189.76.208.72
set system ntp source-address 172.31.254.219
set chassis dump-on-panic
set chassis aggregated-devices ethernet device-count 2
set chassis fpc 0 pic 0 tunnel-services bandwidth 1g
set chassis fpc 0 pic 1 tunnel-services bandwidth 10g
set chassis alarm management-ethernet link-down ignore
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp probe-type icmp-ping
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp target address 172.16.252.247
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp probe-count 15
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp probe-interval 1
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp test-interval 15
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp source-address 172.31.254.219
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp data-size 64
set services rpm probe RPM_BA-MUI-MK-SUZANO.CPD test icmp thresholds successive-loss 2
set interfaces ge-1/0/0 description "INTERFACE - SWITCH DELL6224 IBIRAPUA/IBP - 1/g1"
set interfaces ge-1/0/0 link-mode full-duplex
set interfaces ge-1/0/0 gigether-options 802.3ad ae1
set interfaces ge-1/0/1 description "INTERFACE - SWITCH DELL6224 IBIRAPUA/IBP - 1/g2"
set interfaces ge-1/0/1 link-mode full-duplex
set interfaces ge-1/0/1 gigether-options 802.3ad ae1
set interfaces ge-1/0/2 description "INTERFACE - ROUTERBOARD IBIRAPUA/BA - ether1"
set interfaces ge-1/0/2 vlan-tagging
set interfaces ge-1/0/2 mtu 9000
set interfaces ge-1/0/2 link-mode full-duplex
set interfaces ge-1/0/2 encapsulation flexible-ethernet-services
set interfaces ge-1/0/2 unit 1301 description "VLAN 1301 - PEER BA-IBP-MK-IBIRAPUA"
set interfaces ge-1/0/2 unit 1301 vlan-id 1301
set interfaces ge-1/0/2 unit 1301 statistics
set interfaces ge-1/0/2 unit 1301 family inet mtu 1500
set interfaces ge-1/0/2 unit 1301 family inet address 172.16.194.17/30
set interfaces ge-1/1/2 description "INTERFACE - CERAGON IP10 - REP ITABATA/BA"
set interfaces ge-1/1/2 vlan-tagging
set interfaces ge-1/1/2 mtu 9000
set interfaces ge-1/1/2 link-mode full-duplex
set interfaces ge-1/1/2 unit 1320 description "VLAN 1320 - PEER BA-MUI-MK-REP.ITABATA - VIA IBP/MUI"
set interfaces ge-1/1/2 unit 1320 vlan-id 1320
set interfaces ge-1/1/2 unit 1320 family inet mtu 1500
set interfaces ge-1/1/2 unit 1320 family inet address 172.16.252.49/30
set interfaces ge-1/1/2 unit 1321 description "VLAN 1321 - PEER BA-MUI-MK-REP.SUZANO - VIA IBP/MUI"
set interfaces ge-1/1/2 unit 1321 vlan-id 1321
set interfaces ge-1/1/2 unit 1321 family inet mtu 1500
set interfaces ge-1/1/2 unit 1321 family inet address 172.16.252.61/30
set interfaces ge-1/1/3 mtu 9000
set interfaces ge-1/2/0 description "INTERFACE - CERAGON IP20C - CARLOS CHAGAS/MG"
set interfaces ge-1/2/0 flexible-vlan-tagging
set interfaces ge-1/2/0 mtu 9000
set interfaces ge-1/2/0 link-mode full-duplex
set interfaces ge-1/2/0 unit 212 description "VLAN 212 - MG-IBP-ACX2100-DERRIBADINHA - VIA CERAGONIP20C IBP/CCH"
set interfaces ge-1/2/0 unit 212 vlan-id 212
set interfaces ge-1/2/0 unit 212 statistics
set interfaces ge-1/2/0 unit 212 family inet mtu 1600
set interfaces ge-1/2/0 unit 212 family inet address 172.30.0.182/30
set interfaces ge-1/2/0 unit 212 family mpls mtu 1600
set interfaces ge-1/2/0 unit 1201 description "VLAN 1201 - CERAGON IP20C - CARLOS CHAGAS/MG"
set interfaces ge-1/2/0 unit 1201 vlan-id 1201
set interfaces ge-1/2/0 unit 1201 family inet mtu 1600
set interfaces ge-1/2/0 unit 1201 family inet address 172.16.102.153/30
set interfaces ge-1/2/1 description "INTERFACE - SIAE 2+0 - NANUQUE/NNE"
set interfaces ge-1/2/1 vlan-tagging
set interfaces ge-1/2/1 mtu 9192
set interfaces ge-1/2/1 link-mode full-duplex
set interfaces ge-1/2/1 encapsulation flexible-ethernet-services
set interfaces ge-1/2/1 unit 510 description "VLAN 510 - MG-NNE-MK-NANUQUE - VIA SIAE 2+0 IBP/NNE"
set interfaces ge-1/2/1 unit 510 vlan-id 510
set interfaces ge-1/2/1 unit 510 family inet mtu 9160
set interfaces ge-1/2/1 unit 510 family inet address 172.16.193.201/30
set interfaces ae1 description "LACP - SWITCH DELL6224 IBIRAPUA/IBP"
set interfaces ae1 flexible-vlan-tagging
set interfaces ae1 encapsulation flexible-ethernet-services
set interfaces ae1 aggregated-ether-options minimum-links 1
set interfaces ae1 aggregated-ether-options link-speed 1g
set interfaces ae1 aggregated-ether-options lacp active
set interfaces ae1 unit 1300 description "VLAN 1300 - ADM BA-IBP-D6224-IBIRAPUA"
set interfaces ae1 unit 1300 vlan-id 1300
set interfaces ae1 unit 1300 family inet mtu 1500
set interfaces ae1 unit 1300 family inet address 172.16.255.237/30
set interfaces ae1 unit 1311 description "VLAN 1311 - PEER BA-MSN-MK-MNETO - VIA R5"
set interfaces ae1 unit 1311 vlan-id 1311
set interfaces ae1 unit 1311 family inet mtu 1500
set interfaces ae1 unit 1311 family inet address 172.16.253.173/30
set interfaces fxp0 description "GERENCIA LOCAL - JUNIPER ACX2200"
set interfaces fxp0 unit 0 family inet address 192.168.1.1/24
set interfaces lo0 unit 255 description "LOOPBACK - AREA BACKBONE"
set interfaces lo0 unit 255 family inet primary
set interfaces lo0 unit 255 family inet filter input PROTECT-RE
set interfaces lo0 unit 255 family inet address 172.31.254.219/32
set snmp description BA-IBP-ACX2100-IBIRAPUA
set snmp contact "cgr@wkve.com.br"
set snmp community cilbup authorization read-only
set snmp community cilbup clients 189.76.208.0/24
set forwarding-options hash-key family inet layer-3
set forwarding-options hash-key family inet layer-4
set forwarding-options hash-key family mpls label-1
set forwarding-options hash-key family mpls label-2
set forwarding-options hash-key family mpls label-3
set forwarding-options hash-key family mpls payload ip
set policy-options prefix-list localhost 127.0.0.0/8
set policy-options prefix-list ntp-servers apply-path "system ntp server <*>"
set policy-options prefix-list NetworkBGP-Prefixes 172.16.102.152/30
set policy-options prefix-list NetworkBGP-Prefixes 172.16.255.0/28
set policy-options prefix-list NetworkBGP-Prefixes 172.16.255.32/28
set policy-options prefix-list NetworkBGP-Prefixes 172.16.255.236/30
set policy-options prefix-list NetworkBGPv6-Prefixes
set policy-options policy-statement Default-originate term gateway from route-filter 0.0.0.0/0 exact
set policy-options policy-statement Default-originate term gateway then next-hop self
set policy-options policy-statement Default-originate term gateway then accept
set policy-options policy-statement Default-originate then next policy
set policy-options policy-statement Discard-All term implicit-deny then reject
set policy-options policy-statement ECMP term area-0 from protocol direct
set policy-options policy-statement ECMP term area-0 from area 0.0.0.0
set policy-options policy-statement ECMP term area-0 then accept
set policy-options policy-statement ECMP term area-24 from protocol direct
set policy-options policy-statement ECMP term area-24 from area 0.0.0.24
set policy-options policy-statement ECMP term area-24 then accept
set policy-options policy-statement ECMP then load-balance per-packet
set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32
set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32
set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32
set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32
set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32
set policy-options policy-statement EXPORT-LDP term ACCEPT-LOOPBACK then accept
set policy-options policy-statement EXPORT-LDP term DENY-ALL then reject
set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 189.76.208.0/24 prefix-length-range /32-/32
set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 177.8.16.0/23 prefix-length-range /32-/32
set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.255.0/24 prefix-length-range /32-/32
set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.254.0/24 prefix-length-range /32-/32
set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK from route-filter 172.31.253.0/24 prefix-length-range /32-/32
set policy-options policy-statement IMPORT-LDP term ACCEPT-LOOPBACK then accept
set policy-options policy-statement IMPORT-LDP term DENY-ALL then reject
set policy-options policy-statement IN-RR then accept
set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL from protocol bgp
set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL from as-path local-as
set policy-options policy-statement IN-iBGP-IPv4-WKVE term PERMIT-PREFIX-ASLOCAL then accept
set policy-options policy-statement IN-iBGP-IPv4-WKVE then reject
set policy-options policy-statement Next-hop-self term all from external
set policy-options policy-statement Next-hop-self term all then next-hop self
set policy-options policy-statement OUT-RR term DIRECT-V4 from family inet
set policy-options policy-statement OUT-RR term DIRECT-V4 from protocol direct
set policy-options policy-statement OUT-RR term DIRECT-V4 from prefix-list NetworkBGP-Prefixes
set policy-options policy-statement OUT-RR term DIRECT-V4 then accept
set policy-options policy-statement OUT-RR term DIRECT-V6 from family inet6
set policy-options policy-statement OUT-RR term DIRECT-V6 from protocol direct
set policy-options policy-statement OUT-RR term DIRECT-V6 from prefix-list NetworkBGPv6-Prefixes
set policy-options policy-statement OUT-RR term DIRECT-V6 then accept
set policy-options policy-statement OUT-RR term STATIC-V4 from family inet
set policy-options policy-statement OUT-RR term STATIC-V4 from protocol static
set policy-options policy-statement OUT-RR term STATIC-V4 from prefix-list NetworkBGP-Prefixes
set policy-options policy-statement OUT-RR term STATIC-V4 then accept
set policy-options policy-statement OUT-RR term STATIC-V6 from family inet6
set policy-options policy-statement OUT-RR term STATIC-V6 from protocol static
set policy-options policy-statement OUT-RR term STATIC-V6 from prefix-list NetworkBGPv6-Prefixes
set policy-options policy-statement OUT-RR term STATIC-V6 then accept
set policy-options policy-statement OUT-RR term ASPATH-LOCAL from protocol bgp
set policy-options policy-statement OUT-RR term ASPATH-LOCAL from as-path local-as
set policy-options policy-statement OUT-RR term ASPATH-LOCAL then accept
set policy-options policy-statement OUT-RR term CLIENTES from community COMMUNITY-CLIENTES
set policy-options policy-statement OUT-RR term CLIENTES then accept
set policy-options policy-statement OUT-RR term GERENCIA from community COMMUNITY-GERENCIA
set policy-options policy-statement OUT-RR term GERENCIA then accept
set policy-options policy-statement OUT-RR term ISP-TRANSIT from community COMMUNITY-ISPs
set policy-options policy-statement OUT-RR term ISP-TRANSIT then accept
set policy-options policy-statement OUT-RR term ISP-CDN from community COMMUNITY-ISP-CDNs
set policy-options policy-statement OUT-RR term ISP-CDN then accept
set policy-options policy-statement OUT-RR term VPN-V4 from family inet-vpn
set policy-options policy-statement OUT-RR term VPN-V4 then accept
set policy-options policy-statement OUT-RR term VPN-V6 from family inet6-vpn
set policy-options policy-statement OUT-RR term VPN-V6 then accept
set policy-options policy-statement OUT-RR then reject
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp from protocol bgp
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp from as-path local-as
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-bgp then accept
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static from protocol static
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static then next-hop self
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-static then accept
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks from protocol direct
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks from prefix-list NetworkBGP-Prefixes
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-networks then accept
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-downstream from community COMMUNITY-ISPs
set policy-options policy-statement OUT-iBGP-IPv4-WKVE term export-downstream then accept
set policy-options policy-statement OUT-iBGP-IPv4-WKVE then reject
set policy-options policy-statement explicit-deny then reject
set policy-options community 28360:6 members 28360:6
set policy-options community COMMUNITY-ALL members *:*
set policy-options community COMMUNITY-CLIENTES members 28360:1010
set policy-options community COMMUNITY-GERENCIA members 28360:1019
set policy-options community COMMUNITY-ISP-CDNs members 28360:15
set policy-options community COMMUNITY-ISPs members 28360:10
set policy-options community no-export members no-export
set policy-options as-path local-as "()"
set firewall family inet filter PROTECT-RE interface-specific
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.0.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 177.8.16.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.208.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 189.76.224.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 179.124.224.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 138.94.8.0/22
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 172.16.0.0/12
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-address 10.0.0.0/8
set firewall family inet filter PROTECT-RE term aceita-bgp-src from protocol tcp
set firewall family inet filter PROTECT-RE term aceita-bgp-src from source-port bgp
set firewall family inet filter PROTECT-RE term aceita-bgp-src then accept
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.0.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 177.8.16.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.208.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 189.76.224.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 179.124.224.0/20
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 138.94.8.0/22
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 172.16.0.0/12
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from source-address 10.0.0.0/8
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from protocol tcp
set firewall family inet filter PROTECT-RE term aceita-bgp-dst from destination-port bgp
set firewall family inet filter PROTECT-RE term aceita-bgp-dst then accept
set firewall family inet filter PROTECT-RE term aceita-ospf from protocol ospf
set firewall family inet filter PROTECT-RE term aceita-ospf then accept
set firewall family inet filter PROTECT-RE term aceita-bfd from source-address 172.16.0.0/12
set firewall family inet filter PROTECT-RE term aceita-bfd from source-address 10.0.0.0/8
set firewall family inet filter PROTECT-RE term aceita-bfd from destination-address 172.16.0.0/12
set firewall family inet filter PROTECT-RE term aceita-bfd from destination-address 10.0.0.0/8
set firewall family inet filter PROTECT-RE term aceita-bfd from protocol udp
set firewall family inet filter PROTECT-RE term aceita-bfd from port 4784
set firewall family inet filter PROTECT-RE term aceita-bfd from port 3784
set firewall family inet filter PROTECT-RE term aceita-bfd from port 3785
set firewall family inet filter PROTECT-RE term aceita-bfd then accept
set firewall family inet filter PROTECT-RE term aceita-rsvp from protocol rsvp
set firewall family inet filter PROTECT-RE term aceita-rsvp then accept
set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.2/32
set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 224.0.0.6/32
set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-address 172.31.254.219/32
set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol udp
set firewall family inet filter PROTECT-RE term aceita-dst-ldp from protocol tcp
set firewall family inet filter PROTECT-RE term aceita-dst-ldp from destination-port 646
set firewall family inet filter PROTECT-RE term aceita-dst-ldp then accept
set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.2/32
set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 224.0.0.6/32
set firewall family inet filter PROTECT-RE term aceita-src-ldp from destination-address 172.31.254.219/32
set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol udp
set firewall family inet filter PROTECT-RE term aceita-src-ldp from protocol tcp
set firewall family inet filter PROTECT-RE term aceita-src-ldp from source-port 646
set firewall family inet filter PROTECT-RE term aceita-src-ldp then accept
set firewall family inet filter PROTECT-RE term aceita-lsp-ping from destination-address 172.31.254.219/32
set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol udp
set firewall family inet filter PROTECT-RE term aceita-lsp-ping from protocol tcp
set firewall family inet filter PROTECT-RE term aceita-lsp-ping from source-port 3503
set firewall family inet filter PROTECT-RE term aceita-lsp-ping then accept
set firewall family inet filter PROTECT-RE term aceita-snmp from source-address 189.76.208.0/24
set firewall family inet filter PROTECT-RE term aceita-snmp from protocol udp
set firewall family inet filter PROTECT-RE term aceita-snmp from destination-port 161
set firewall family inet filter PROTECT-RE term aceita-snmp then policer limit-1m
set firewall family inet filter PROTECT-RE term aceita-snmp then accept
set firewall family inet filter PROTECT-RE term radius from source-address 189.76.208.98/32
set firewall family inet filter PROTECT-RE term radius then accept
set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 189.76.208.72/32
set firewall family inet filter PROTECT-RE term aceita-ntp from source-address 172.31.254.219/32
set firewall family inet filter PROTECT-RE term aceita-ntp from protocol udp
set firewall family inet filter PROTECT-RE term aceita-ntp from destination-port ntp
set firewall family inet filter PROTECT-RE term aceita-ntp then policer limit-32k
set firewall family inet filter PROTECT-RE term aceita-ntp then accept
set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.8/32
set firewall family inet filter PROTECT-RE term aceita-dns from source-address 177.8.8.9/32
set firewall family inet filter PROTECT-RE term aceita-dns from protocol udp
set firewall family inet filter PROTECT-RE term aceita-dns from source-port 53
set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-request
set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type echo-reply
set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type unreachable
set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type time-exceeded
set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp-reply
set firewall family inet filter PROTECT-RE term aceita-icmp from icmp-type timestamp
set firewall family inet filter PROTECT-RE term aceita-icmp then policer limit-10m
set firewall family inet filter PROTECT-RE term aceita-icmp then accept
set firewall family inet filter PROTECT-RE term aceita-traceroute from protocol udp
set firewall family inet filter PROTECT-RE term aceita-traceroute from destination-port 33434-33523
set firewall family inet filter PROTECT-RE term aceita-traceroute then accept
set firewall family inet filter PROTECT-RE term aceita-ssh-out from protocol tcp
set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port ssh
set firewall family inet filter PROTECT-RE term aceita-ssh-out from source-port 33
set firewall family inet filter PROTECT-RE term aceita-ssh-out then accept
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.208.0/24
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.214.0/24
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.230.0/24
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 189.76.223.0/24
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 177.8.16.0/23
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 192.168.1.0/24
set firewall family inet filter PROTECT-RE term aceita-ssh from source-address 172.16.0.0/12
set firewall family inet filter PROTECT-RE term aceita-ssh from destination-port ssh
set firewall family inet filter PROTECT-RE term aceita-ssh then accept
set firewall family inet filter PROTECT-RE term descarta-resto then discard
set firewall family any filter POLICER_150Mbps interface-specific
set firewall family any filter POLICER_150Mbps term 1 then policer limit-150Mb
set firewall family any filter POLICER_150Mbps term 1 then accept
set firewall family any filter POLICER_100Mbps interface-specific
set firewall family any filter POLICER_100Mbps term 1 then policer limit-100Mb
set firewall family any filter POLICER_100Mbps term 1 then accept
set firewall family any filter POLICER_250Mbps interface-specific
set firewall family any filter POLICER_250Mbps term 1 then policer limit-250Mb
set firewall family any filter POLICER_250Mbps term 1 then accept
set firewall policer limit-32k if-exceeding bandwidth-limit 32k
set firewall policer limit-32k if-exceeding burst-size-limit 15k
set firewall policer limit-32k then discard
set firewall policer limit-1m if-exceeding bandwidth-limit 1m
set firewall policer limit-1m if-exceeding burst-size-limit 15k
set firewall policer limit-1m then discard
set firewall policer limit-10m if-exceeding bandwidth-limit 10m
set firewall policer limit-10m if-exceeding burst-size-limit 625k
set firewall policer limit-10m then discard
set firewall policer limit-150Mb if-exceeding bandwidth-limit 154m
set firewall policer limit-150Mb if-exceeding burst-size-limit 625k
set firewall policer limit-150Mb then discard
set firewall policer limit-100Mb if-exceeding bandwidth-limit 100m
set firewall policer limit-100Mb if-exceeding burst-size-limit 625k
set firewall policer limit-100Mb then discard
set firewall policer limit-250Mb if-exceeding bandwidth-limit 252m
set firewall policer limit-250Mb if-exceeding burst-size-limit 625k
set firewall policer limit-250Mb then discard
set routing-options forwarding-table export ECMP
set routing-options router-id 172.31.254.219
set routing-options autonomous-system 28360
set protocols ospf apply-groups OSPF-BFD
set protocols ospf traffic-engineering
set protocols ospf area 0.0.0.0 interface lo0.255 passive
set protocols ospf area 0.0.0.0 interface ge-1/0/2.0
set protocols ospf area 0.0.0.0 interface ge-1/0/2.1301 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/0/2.1301 metric 10
set protocols ospf area 0.0.0.0 interface ge-1/1/0.1303 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/1/0.1303 metric 500
set protocols ospf area 0.0.0.0 interface ge-1/1/0.505 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/1/0.505 metric 10
deactivate protocols ospf area 0.0.0.0 interface ge-1/1/0.505
set protocols ospf area 0.0.0.0 interface ae1.1311 interface-type p2p
set protocols ospf area 0.0.0.0 interface ae1.1311 metric 10
set protocols ospf area 0.0.0.0 interface ge-1/1/2.1320 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/1/2.1320 metric 10
set protocols ospf area 0.0.0.0 interface ge-1/1/2.1321 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/1/2.1321 metric 10
set protocols ospf area 0.0.0.0 interface ge-1/2/1.510 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/2/1.510 metric 30
set protocols ospf area 0.0.0.0 interface ge-1/2/0.212 interface-type p2p
set protocols ospf area 0.0.0.0 interface ge-1/2/0.212 metric 10
set protocols ospf area 0.0.0.0 interface ge-1/2/0.212 ldp-synchronization hold-time 10
set protocols ospf export ECMP
set protocols ospf reference-bandwidth 1g
set protocols ospf no-rfc-1583
set protocols rsvp load-balance bandwidth
set protocols rsvp interface ge-1/2/0.212 bandwidth 560m
set protocols rsvp interface fxp0.0 disable
set protocols bgp path-selection cisco-non-deterministic
set protocols bgp group iBGP-LOOPBACK type internal
set protocols bgp group iBGP-LOOPBACK local-address 172.31.254.219
set protocols bgp group iBGP-LOOPBACK advertise-inactive
set protocols bgp group iBGP-LOOPBACK export Default-originate
set protocols bgp group iBGP-LOOPBACK export OUT-iBGP-IPv4-WKVE
set protocols bgp group iBGP-LOOPBACK cluster 172.31.254.219
set protocols bgp group iBGP-LOOPBACK peer-as 28360
set protocols bgp group iBGP-LOOPBACK neighbor 172.16.194.18 description "PEER - BA-IBP-MK-IBIRAPUA"
set protocols bgp group iBGP-LOOPBACK neighbor 172.16.252.246 description "PEER - BA-MSN-MK-MNETO"
set protocols bgp group iBGP-LOOPBACK neighbor 172.16.252.245 description "PEER - BA-MSN-MK-REP.SIMONETTI"
set protocols bgp group iBGP-LOOPBACK neighbor 172.16.252.242 description "PEER - BA-MUI-MK-REP.ITABATA"
set protocols bgp group iBGP-LOOPBACK neighbor 172.16.252.241 description "PEER - BA-MUI-MK-REP.SUZANO"
set protocols bgp group iBGP-LOOPBACK neighbor 172.16.192.6 description "PEER - MG-NNH-MK-NANUQUE"
set protocols bgp group RR type internal
set protocols bgp group RR local-address 172.31.254.219
set protocols bgp group RR advertise-inactive
set protocols bgp group RR import IN-RR
set protocols bgp group RR family inet unicast
set protocols bgp group RR family inet-vpn unicast
set protocols bgp group RR family inet6 labeled-unicast explicit-null
set protocols bgp group RR family inet6-vpn unicast
set protocols bgp group RR family l2vpn auto-discovery-only
set protocols bgp group RR export OUT-RR
set protocols bgp group RR peer-as 28360
set protocols bgp group RR neighbor 172.31.254.250 description "PEER - MG-BHE-ACX2100-RREFLECTOR1"
set protocols bgp group RR neighbor 172.31.254.251 description "PEER - MG-GVS-ACX2100-RREFLECTOR2"
set protocols ldp track-igp-metric
set protocols ldp import IMPORT-LDP
set protocols ldp export EXPORT-LDP
set protocols ldp transport-address 172.31.254.219
set protocols ldp interface ge-1/2/0.212
set protocols ldp interface fxp0.0 disable
set protocols ldp interface lo0.255
set protocols mpls interface lo0.255
set protocols mpls interface ge-1/2/0.212
set protocols mpls interface fxp0.0 disable