Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 40

=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2020.10.

10 23:07:26 =~=~=~=~=~=~=~=~=~=~=~=
show con
^
'con' is ambiguous.
Possible completions:
configuration Show current configuration
connections Show circuit cross-connect connections
malek@FRC_CORE> show con ###figuration
## Last commit: 2020-10-08 15:07:58 BDT by root
version 18.2R3-S1.7;
system {
login {
user malek {
uid 2001;
class super-user;
authentication {
encrypted-password
"$6$5mjfKlR6$b4nEiJlqkihD4GsRMNbxBju8PrsNu0TvIXyTGlNOQEt0fMr.ulBdoMiw3zVK.tl87Jnky.
IngMk/jJgUxH5eH."; ## SECRET-DATA
}
}
}
root-authentication {
encrypted-password
"$6$Z3y72IO7$gCVJRw3tmZkrS23o.1CRUDvHr3x3fnNlE9kvRx8YgV9Rs2WOT.D6kGVJFw16.ORSumfNxf
lwg.lE0h/0A2TKJ0"; ## SECRET-DATA
}
host-name FRC_CORE;
time-zone Asia/Dhaka;
services {
ssh {
port 2111;
connection-limit 10;
rate-limit 5;
}
}
syslog {
user * {
any emergency;
}
file messages {
any notice;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
inactive: processes {
dhcp-service {
inactive: traceoptions {
file dhcp_logfile size 10m;
level all;
flag packet;
}
}
}
ntp {
server 203.190.10.242 prefer;
}
}
logical-systems {
BDIX_RT {
interfaces {
xe-0/1/0 {
unit 2539 {
description SUMMIT_BDIX;
vlan-id 2539;
family inet {
address 43.245.143.198/30;
}
}
unit 3580 {
description RADIENT_BDIX;
vlan-id 3580;
family inet {
address 10.23.131.66/30;
}
}
}
xe-0/1/6 {
inactive: unit 12 {
description INT_RT;
vlan-id 12;
family inet {
address 192.168.255.10/30;
}
}
}
xe-0/1/7 {
unit 23 {
description AGG_RT_BDIX;
vlan-id 23;
family inet {
address 103.111.121.13/30;
}
}
}
lo0 {
unit 4 {
description Loopback;
family inet {
filter {
input protect-router-control-plane;
}
address 200.192.168.4/32;
}
}
}
}
protocols {
bgp {
group RADIENT {
type external;
peer-as 38067;
neighbor 10.23.131.65 {
description ***RADIENT_BDIX***;
local-address 10.23.131.66;
import RADIENT_BDIX_IN;
export RADIENT_BDIX_OUT;
}
}
inactive: group INT_RT {
type internal;
peer-as 137515;
neighbor 200.192.168.1 {
description INT_RT;
local-address 200.192.168.4;
import INT_RT_IN;
export [ next-hop-self INT_RT_OUT ];
}
}
group SUMMIT {
type external;
peer-as 58717;
neighbor 43.245.143.197 {
description SUMMIT_BDIX;
local-address 43.245.143.198;
import SUMMIT_BDIX_IN;
export SUMMIT_BDIX_OUT;
}
}
group AGG_RT {
type internal;
peer-as 137515;
neighbor 103.111.121.14 {
description ***AGG_RT***;
local-address 103.111.121.13;
import AGG_RT_IN;
export [ next-hop-self AGG_RT_OUT ];
}
}
}
ospf {
area 0.0.0.0 {
interface xe-0/1/6.12 {
interface-type p2p;
}
inactive: interface xe-0/1/7.23 {
interface-type p2p;
}
interface lo0.4 {
passive;
}
}
}
}
policy-options {
prefix-list ROUTER-ACCESSLIST {
103.111.120.0/22;
103.203.176.0/22;
223.29.212.0/22;
}
prefix-list ROUTER-ACCESSLIST_IPv6 {
2405:7e40::/32;
}
policy-statement AGG_RT_IN {
term 1 {
then accept;
}
}
policy-statement AGG_RT_OUT {
term 1 {
then accept;
}
}
policy-statement INT_RT_IN {
term 1 {
from {
route-filter 103.111.120.0/22 upto /32;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement INT_RT_OUT {
term 1 {
then reject;
}
}
policy-statement RADIENT_BDIX_IN {
term 1 {
from {
route-filter 0.0.0.0/8 upto /32;
route-filter 10.0.0.0/8 upto /32;
route-filter 100.64.0.0/10 upto /32;
route-filter 127.0.0.0/8 upto /32;
route-filter 169.254.0.0/16 upto /32;
route-filter 172.16.0.0/12 upto /32;
route-filter 192.0.0.0/24 upto /32;
route-filter 192.0.2.0/24 upto /32;
route-filter 192.168.0.0/16 upto /32;
route-filter 203.0.113.0/24 upto /32;
route-filter 224.0.0.0/3 upto /32;
route-filter 103.111.120.0/22 upto /32;
}
then reject;
}
term 1000 {
then {
local-preference 1500;
accept;
}
}
}
policy-statement RADIENT_BDIX_OUT {
term 1 {
from {
route-filter 103.111.122.0/24 exact;
route-filter 103.111.120.0/22 exact;
}
then {
as-path-prepend "137515 137515 137515 137515";
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_BDIX_IN {
term 1 {
from {
route-filter 0.0.0.0/8 upto /32;
route-filter 10.0.0.0/8 upto /32;
route-filter 100.64.0.0/10 upto /32;
route-filter 127.0.0.0/8 upto /32;
route-filter 169.254.0.0/16 upto /32;
route-filter 172.16.0.0/12 upto /32;
route-filter 192.0.0.0/24 upto /32;
route-filter 192.0.2.0/24 upto /32;
route-filter 192.168.0.0/16 upto /32;
route-filter 203.0.113.0/24 upto /32;
route-filter 224.0.0.0/3 upto /32;
route-filter 103.111.120.0/22 upto /32;
}
then reject;
}
term 1000 {
then {
local-preference 2000;
accept;
}
}
}
policy-statement SUMMIT_BDIX_OUT {
term 1 {
from {
route-filter 103.111.120.0/24 exact;
route-filter 103.111.121.0/24 exact;
route-filter 103.111.123.0/24 exact;
route-filter 103.111.120.0/22 exact;
}
then {
as-path-prepend "137515 137515 137515";
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement next-hop-self {
term se-nh {
then {
next-hop self;
}
}
}
}
routing-options {
rib inet6.0 {
static {
route 2405:7e40::/32 discard;
route 2405:7e40::/35 discard;
route 2405:7e40:2000::/35 discard;
route 2405:7e40:4000::/35 discard;
route 2405:7e40:6000::/35 discard;
route 2405:7e40:8000::/35 discard;
route 2405:7e40:a000::/35 discard;
route 2405:7e40:c000::/35 discard;
route 2405:7e40:e000::/35 discard;
}
}
static {
route 103.111.120.0/22 discard;
route 103.111.120.0/23 discard;
route 103.111.120.0/24 discard;
route 103.111.121.0/24 discard;
route 103.111.122.0/23 discard;
route 103.111.122.0/24 discard;
route 103.111.123.0/24 discard;
/* // TEST */
route 169.136.0.0/16 next-hop 43.245.143.197;
route 164.90.0.0/16 next-hop 43.245.143.197;
route 42.99.128.0/17 next-hop 43.245.143.197;
route 23.57.0.0/16 next-hop 43.245.143.197;
route 111.119.0.0/16 next-hop 43.245.143.197;
}
router-id 200.192.168.4;
autonomous-system 137515;
}
firewall {
family inet {
filter protect-router-control-plane {
term snmp {
from {
source-address {
103.111.120.106/32;
}
protocol udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
protocol udp;
destination-port snmp;
}
then {
discard;
}
}
term dns {
from {
source-address {
103.111.120.75/32;
103.111.120.76/32;
8.8.8.8/32;
}
protocol udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
protocol udp;
port domain;
}
then {
discard;
}
}
term syslog {
from {
source-address {
103.111.120.26/32;
}
protocol udp;
port 514;
}
then accept;
}
term ospf {
from {
protocol ospf;
}
then accept;
}
term bgp {
from {
source-address {
43.245.143.197/32;
10.23.131.65/32;
200.192.168.5/32;
200.192.168.1/32;
172.30.255.14/32;
103.111.121.16/32;
103.111.121.14/32;
}
protocol tcp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
protocol tcp;
port bgp;
}
then {
discard;
}
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
protocol tcp;
port telnet;
}
then {
discard;
}
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
protocol tcp;
port ssh;
}
then {
discard;
}
}
term ntp-allow {
from {
source-address {
203.190.10.242/32;
}
protocol udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
protocol udp;
port ntp;
}
then {
discard;
}
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
}
}
policer 10MB {
if-exceeding {
bandwidth-limit 10m;
burst-size-limit 256k;
}
then discard;
}
}
}
FNA_RT {
interfaces {
xe-0/1/0 {
unit 2538 {
description SUMMIT_FNA;
vlan-id 2538;
family inet {
address 10.10.59.158/30;
}
family inet6 {
address 2405:1500:90::6/126;
}
}
}
xe-0/1/6 {
unit 11 {
description INT_RT;
vlan-id 11;
family inet {
address 192.168.255.6/30;
}
}
}
xe-0/1/7 {
unit 22 {
description AGG_RT_FNA;
vlan-id 22;
family inet {
address 103.111.121.9/30;
}
family inet6 {
address 2405:7e40:200:ff00::11/126;
}
}
}
lo0 {
unit 3 {
description Loopback;
family inet {
filter {
input protect-router-control-plane;
}
address 200.192.168.3/32;
}
family inet6 {
filter {
input protect-router-control-plane_ipv6;
}
address 2405:7e40::200:192:168:3/128;
}
}
}
}
protocols {
bgp {
group SUMMIT {
type external;
peer-as 58717;
neighbor 10.10.59.157 {
description SUMMIT_FNA;
local-address 10.10.59.158;
import SUMMIT_FNA_IN;
export SUMMIT_FNA_OUT;
}
neighbor 2405:1500:90::5 {
description SUMMIT_IPv6_FNA;
local-address 2405:1500:90::6;
import SUMMIT_FNA_IPv6_IN;
export SUMMIT_FNA_IPv6_OUT;
}
}
inactive: group INT_RT {
type internal;
peer-as 137515;
neighbor 200.192.168.1 {
description INT_RT;
local-address 200.192.168.3;
import INT_RT_IN;
export [ next-hop-self INT_RT_OUT ];
}
}
group AGG_RT {
type internal;
peer-as 137515;
inactive: neighbor 103.111.121.16 {
description AGG_RT;
}
neighbor 103.111.121.10 {
description AGG_RT;
local-address 103.111.121.9;
import AGG_RT_IN;
export [ next-hop-self AGG_RT_OUT ];
}
neighbor 2405:7e40:200:ff00::12 {
description AGG_RT_IPv6;
local-address 2405:7e40:200:ff00::11;
export [ next-hop-self AGG_RT_IPv6_OUT ];
}
}
}
ospf {
area 0.0.0.0 {
interface lo0.3 {
passive;
}
interface xe-0/1/6.11 {
interface-type p2p;
}
inactive: interface xe-0/1/7.22 {
interface-type p2p;
}
}
}
}
policy-options {
prefix-list ROUTER-ACCESSLIST {
103.111.120.0/22;
103.203.176.0/22;
223.29.212.0/22;
}
prefix-list ROUTER-ACCESSLIST_IPv6 {
2405:7e40::/32;
}
policy-statement AGG_RT_IN {
term 1 {
then accept;
}
}
policy-statement AGG_RT_IPv6_OUT {
term 1 {
from {
route-filter 2405:1500:0:10::/64 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement AGG_RT_OUT {
term 1 {
from {
route-filter 43.245.142.128/26 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement INT_RT_IN {
term 1 {
then accept;
}
}
policy-statement INT_RT_OUT {
term 1 {
from {
route-filter 43.245.142.128/26 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_FNA_IN {
term 1 {
from {
route-filter 43.245.142.128/26 exact;
}
then {
local-preference 1200;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_FNA_IPv6_IN {
term 1 {
from {
route-filter 2405:1500:0:10::/64 exact;
}
then {
local-preference 1200;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_FNA_IPv6_OUT {
term 1 {
from {
route-filter 2405:7e40::/32 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_FNA_OUT {
term 1 {
from {
route-filter 103.111.120.0/22 upto /24;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement next-hop-self {
term se-nh {
then {
next-hop self;
}
}
}
}
routing-options {
rib inet6.0 {
static {
route 2405:7e40::/32 discard;
route 2405:7e40::/35 discard;
route 2405:7e40:2000::/35 discard;
route 2405:7e40:4000::/35 discard;
route 2405:7e40:6000::/35 discard;
route 2405:7e40:8000::/35 discard;
route 2405:7e40:a000::/35 discard;
route 2405:7e40:c000::/35 discard;
route 2405:7e40:e000::/35 discard;
}
}
static {
route 103.111.120.0/22 discard;
route 103.111.120.0/23 discard;
route 103.111.120.0/24 discard;
route 103.111.121.0/24 discard;
route 103.111.122.0/23 discard;
route 103.111.122.0/24 discard;
route 103.111.123.0/24 discard;
}
router-id 200.192.168.3;
autonomous-system 137515;
}
firewall {
family inet {
filter protect-router-control-plane {
term snmp {
from {
source-address {
103.111.120.106/32;
}
protocol udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
protocol udp;
destination-port snmp;
}
then {
discard;
}
}
term dns {
from {
source-address {
103.111.120.75/32;
103.111.120.76/32;
8.8.8.8/32;
}
protocol udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
protocol udp;
port domain;
}
then {
discard;
}
}
term syslog {
from {
source-address {
103.111.120.26/32;
}
protocol udp;
port 514;
}
then accept;
}
term ospf {
from {
protocol ospf;
}
then accept;
}
term bgp {
from {
source-address {
10.10.59.157/32;
200.192.168.1/32;
103.111.121.16/32;
103.111.121.10/32;
}
protocol tcp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
protocol tcp;
port bgp;
}
then {
discard;
}
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
protocol tcp;
port telnet;
}
then {
discard;
}
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
protocol tcp;
port ssh;
}
then {
discard;
}
}
term ntp-allow {
from {
source-address {
203.190.10.242/32;
}
protocol udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
protocol udp;
port ntp;
}
then {
discard;
}
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
}
}
family inet6 {
filter protect-router-control-plane_ipv6 {
term snmp {
from {
source-address {
2405:7e40::103:111:120:106/32;
}
next-header udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
next-header udp;
destination-port snmp;
}
then discard;
}
term dns {
from {
source-address {
2405:7e40::103:111:120:75/32;
2405:7e40::103:111:120:76/32;
2405:7e40::8:8:8:8/32;
}
next-header udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
next-header udp;
port domain;
}
then discard;
}
term syslog {
from {
source-address {
2405:7e40::103:111:120:26/32;
}
next-header udp;
port 514;
}
then accept;
}
term bgp {
from {
source-address {
2405:1500:90::5/128;
2405:7e40:200:ff00::12/128;
}
next-header udp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
next-header udp;
port bgp;
}
then discard;
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST_IPv6;
}
next-header udp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
next-header udp;
port telnet;
}
then discard;
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST_IPv6;
}
next-header udp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
port ssh;
}
then discard;
}
term ntp-allow {
from {
source-address {
2405:7e40::203:190:10:242/32;
}
next-header udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
next-header udp;
port ntp;
}
then discard;
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
term ospf {
from {
next-header udp;
}
}
}
}
policer 10MB {
if-exceeding {
bandwidth-limit 10m;
burst-size-limit 256k;
}
then discard;
}
}
}
GGC_RT {
interfaces {
xe-0/1/0 {
unit 2536 {
description SUMMIT_GGC;
vlan-id 2536;
family inet {
address 10.10.105.126/30;
}
family inet6 {
address 2405:1500:a0::6/126;
}
}
}
xe-0/1/6 {
unit 10 {
description INT_RT;
vlan-id 10;
family inet {
address 192.168.255.2/30;
}
}
}
xe-0/1/7 {
unit 21 {
description AGG_RT_GGC;
vlan-id 21;
family inet {
address 103.111.121.5/30;
}
family inet6 {
address 2405:7e40:200:ff00::d/126;
}
}
}
lo0 {
unit 2 {
description Loopback;
family inet {
filter {
input protect-router-control-plane;
}
address 200.192.168.2/32;
}
family inet6 {
filter {
input protect-router-control-plane_ipv6;
}
address 2405:7e40::200:192:168:2/128;
}
}
}
}
protocols {
bgp {
group SUMMIT {
type external;
peer-as 58717;
neighbor 10.10.105.125 {
description SUMMIT_GGC;
local-address 10.10.105.126;
import SUMMIT_GGC_IN;
export SUMMIT_GGC_OUT;
}
neighbor 2405:1500:a0::5 {
description SUMMIT_GGC_IPv6;
local-address 2405:1500:a0::6;
import SUMMIT_GGC_IPv6_IN;
export SUMMIT_GGC_IPv6_OUT;
}
}
inactive: group INT_RT {
type internal;
peer-as 137515;
neighbor 200.192.168.1 {
description INT_RT;
local-address 200.192.168.2;
import INT_RT_IN;
export [ next-hop-self INT_RT_OUT ];
}
}
group AGG_RT {
type internal;
peer-as 137515;
neighbor 103.111.121.6 {
description AGG_RT;
local-address 103.111.121.5;
export [ next-hop-self AGG_RT_OUT ];
}
neighbor 2405:7e40:200:ff00::e {
description AGG_RT_IPv6;
local-address 2405:7e40:200:ff00::d;
export [ next-hop-self AGG_RT_IPv6_OUT ];
}
}
}
ospf {
inactive: traceoptions {
file OSPF_FILE world-readable;
flag event detail;
flag hello detail;
flag error detail;
}
area 0.0.0.0 {
interface lo0.2 {
passive;
}
interface xe-0/1/6.10 {
interface-type p2p;
}
inactive: interface xe-0/1/7.21 {
interface-type p2p;
}
}
}
}
policy-options {
prefix-list ROUTER-ACCESSLIST {
103.111.120.0/22;
103.203.176.0/22;
223.29.212.0/22;
}
prefix-list ROUTER-ACCESSLIST_IPv6 {
2405:7e40::/32;
}
policy-statement AGG_RT_IN {
term 1 {
then accept;
}
}
policy-statement AGG_RT_IPv6_OUT {
term 1 {
from {
route-filter 2405:1500:0:2f::/64 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement AGG_RT_OUT {
term 1 {
from {
route-filter 43.245.142.192/27 exact;
route-filter 43.245.142.224/27 exact;
route-filter 103.15.244.64/26 exact;
route-filter 103.15.244.128/26 exact;
route-filter 103.15.246.96/27 exact;
route-filter 144.48.148.192/27 exact;
route-filter 144.48.148.224/27 exact;
route-filter 157.119.187.0/27 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement INT_RT_IN {
term 1 {
then accept;
}
}
policy-statement INT_RT_OUT {
term 1 {
from {
route-filter 43.245.142.192/27 exact;
route-filter 43.245.142.224/27 exact;
route-filter 103.15.244.64/26 exact;
route-filter 103.15.244.128/26 exact;
route-filter 103.15.246.96/27 exact;
route-filter 144.48.148.192/27 exact;
route-filter 144.48.148.224/27 exact;
route-filter 157.119.187.0/27 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_GGC_IN {
term 1 {
from {
route-filter 43.245.142.192/27 exact;
route-filter 43.245.142.224/27 exact;
route-filter 103.15.244.64/26 exact;
route-filter 103.15.244.128/26 exact;
route-filter 103.15.246.96/27 exact;
route-filter 144.48.148.192/27 exact;
route-filter 144.48.148.224/27 exact;
route-filter 157.119.187.0/27 exact;
}
then {
local-preference 1200;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_GGC_IPv6_IN {
term 1 {
from {
route-filter 2405:1500:0:2f::/64 exact;
}
then {
local-preference 1200;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_GGC_IPv6_OUT {
term 1 {
from {
route-filter 2405:7e40::/32 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_GGC_OUT {
term 1 {
from {
route-filter 103.111.120.0/22 upto /24;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement next-hop-self {
term se-nh {
then {
next-hop self;
}
}
}
}
routing-options {
rib inet6.0 {
static {
route 2405:7e40::/32 discard;
route 2405:7e40::/35 discard;
route 2405:7e40:2000::/35 discard;
route 2405:7e40:4000::/35 discard;
route 2405:7e40:6000::/35 discard;
route 2405:7e40:8000::/35 discard;
route 2405:7e40:a000::/35 discard;
route 2405:7e40:c000::/35 discard;
route 2405:7e40:e000::/35 discard;
}
}
static {
route 103.111.120.0/22 discard;
route 103.111.120.0/23 discard;
route 103.111.120.0/24 discard;
route 103.111.121.0/24 discard;
route 103.111.122.0/23 discard;
route 103.111.122.0/24 discard;
route 103.111.123.0/24 discard;
}
router-id 200.192.168.2;
autonomous-system 137515;
}
firewall {
family inet {
filter protect-router-control-plane {
term snmp {
from {
source-address {
103.111.120.106/32;
}
protocol udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
protocol udp;
destination-port snmp;
}
then {
discard;
}
}
term dns {
from {
source-address {
103.111.120.75/32;
103.111.120.76/32;
8.8.8.8/32;
}
protocol udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
protocol udp;
port domain;
}
then {
discard;
}
}
term syslog {
from {
source-address {
103.111.120.26/32;
}
protocol udp;
port 514;
}
then accept;
}
term ospf {
from {
protocol ospf;
}
then accept;
}
term bgp {
from {
source-address {
10.10.105.125/32;
103.111.121.16/32;
200.192.168.1/32;
103.111.121.6/32;
}
protocol tcp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
protocol tcp;
port bgp;
}
then {
discard;
}
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
protocol tcp;
port telnet;
}
then {
discard;
}
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
protocol tcp;
port ssh;
}
then {
discard;
}
}
term ntp-allow {
from {
source-address {
203.190.10.242/32;
}
protocol udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
protocol udp;
port ntp;
}
then {
discard;
}
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
}
}
family inet6 {
filter protect-router-control-plane_ipv6 {
term snmp {
from {
source-address {
2405:7e40::103:111:120:106/32;
}
next-header udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
next-header udp;
destination-port snmp;
}
then discard;
}
term dns {
from {
source-address {
2405:7e40::103:111:120:75/32;
2405:7e40::103:111:120:76/32;
2405:7e40::8:8:8:8/32;
}
next-header udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
next-header udp;
port domain;
}
then discard;
}
term syslog {
from {
source-address {
2405:7e40::103:111:120:26/32;
}
next-header udp;
port 514;
}
then accept;
}
term bgp {
from {
source-address {
2405:1500:a0::5/128;
2405:7e40:200:ff00::e/128;
}
next-header udp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
next-header udp;
port bgp;
}
then discard;
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST_IPv6;
}
next-header udp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
next-header udp;
port telnet;
}
then discard;
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST_IPv6;
}
next-header udp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
port ssh;
}
then discard;
}
term ntp-allow {
from {
source-address {
2405:7e40::203:190:10:242/32;
}
next-header udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
next-header udp;
port ntp;
}
then discard;
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
term ospf {
from {
next-header udp;
}
}
}
}
policer 10MB {
if-exceeding {
bandwidth-limit 10m;
burst-size-limit 256k;
}
then discard;
}
}
}
}
interfaces {
xe-0/1/0 {
vlan-tagging;
unit 2537 {
description SUMMIT_INT;
vlan-id 2537;
family inet {
address 103.26.246.78/30;
}
family inet6 {
address 2405:1500:30:1::e6/126;
}
}
unit 3577 {
description RADIENT_INT;
vlan-id 3577;
family inet {
address 10.20.131.66/30;
}
}
}
xe-0/1/5 {
vlan-tagging;
inactive: unit 10 {
description GGC_RT;
vlan-id 10;
family inet {
address 192.168.255.1/30;
}
}
inactive: unit 11 {
description FNA_RT;
vlan-id 11;
family inet {
address 192.168.255.5/30;
}
}
inactive: unit 12 {
description BDIX_RT;
vlan-id 12;
family inet {
address 192.168.255.9/30;
}
}
}
xe-0/1/6 {
vlan-tagging;
}
xe-0/1/7 {
vlan-tagging;
unit 20 {
description AGG_RT;
vlan-id 20;
family inet {
address 103.111.121.1/30;
address 166.1.200.1/30;
}
family inet6 {
address 2405:7e40:200:ff00::9/126;
}
}
}
fxp0 {
unit 0 {
family inet {
dhcp {
vendor-id Juniper-mx10001-CJ188;
}
}
}
}
lo0 {
unit 1 {
description Loopback;
family inet {
filter {
input protect-router-control-plane;
}
address 200.192.168.1/32;
}
family inet6 {
filter {
input protect-router-control-plane_ipv6;
}
address 2405:7e40::200:192:168:1/128;
}
}
}
}
snmp {
contact "malek017111@gmail.com";
community FrRbMpm {
authorization read-only;
clients {
103.111.120.77/32;
103.111.120.106/32;
0.0.0.0/0 restrict;
}
}
}
routing-options {
rib inet6.0 {
static {
route 2405:7e40::/32 discard;
route 2405:7e40::/35 discard;
route 2405:7e40:2000::/35 discard;
route 2405:7e40:4000::/35 discard;
route 2405:7e40:6000::/35 discard;
route 2405:7e40:8000::/35 discard;
route 2405:7e40:a000::/35 discard;
route 2405:7e40:c000::/35 discard;
route 2405:7e40:e000::/35 discard;
}
}
static {
route 103.111.120.0/22 discard;
route 103.111.120.0/23 discard;
route 103.111.120.0/24 discard;
route 103.111.121.0/24 discard;
route 103.111.122.0/23 discard;
route 103.111.122.0/24 discard;
route 103.111.123.0/24 discard;
}
router-id 200.192.168.1;
autonomous-system 137515;
}
protocols {
bgp {
group SUMMIT {
type external;
peer-as 58717;
neighbor 103.26.246.77 {
description SUMMIT_INT;
local-address 103.26.246.78;
import SUMMIT_IN;
export SUMMIT_OUT;
}
neighbor 2405:1500:30:1::e5 {
description SUMMIT_IPV6_INT;
local-address 2405:1500:30:1::e6;
import SUMMIT_IPv6_IN;
export SUMMIT_IPv6_OUT;
}
}
group RADIENT {
type external;
peer-as 58688;
neighbor 10.20.131.65 {
description RADIENT_INT;
local-address 10.20.131.66;
import RADIENT_IN;
export RADIENT_OUT;
}
}
inactive: group GGC_RT {
type internal;
peer-as 137515;
neighbor 200.192.168.2 {
description GGC_RT;
local-address 200.192.168.1;
import GGC_RT_IN;
export [ next-hop-self GGC_RT_OUT ];
}
}
inactive: group FNA_RT {
type internal;
peer-as 137515;
neighbor 200.192.168.3 {
description FNA_RT;
local-address 200.192.168.1;
import FNA_RT_IN;
export [ next-hop-self FNA_RT_OUT ];
}
}
inactive: group BDIX_RT {
type internal;
peer-as 137515;
neighbor 200.192.168.4 {
description BDIX_RT;
local-address 200.192.168.1;
import BDIX_RT_IN;
export [ next-hop-self BDIX_RT_OUT ];
}
}
group AGG_RT {
type internal;
peer-as 137515;
inactive: neighbor 103.111.121.16;
neighbor 2405:7e40:200:ff00::a {
description AGG_RT_IPv6;
local-address 2405:7e40:200:ff00::9;
import AGG_RT_IPV6_IN;
export [ next-hop-self AGG_RT_IPV6_OUT ];
}
neighbor 103.111.121.2 {
description ***AGG_RT_INT;
local-address 103.111.121.1;
import AGG_RT_IN;
export [ next-hop-self AGG_RT_OUT ];
}
}
inactive: group AGG_RT_IPV6 {
type internal;
peer-as 137515;
neighbor 2405:7e40:200:ff00::10 {
description AGG_RT_IPV6;
local-address 2405:7e40:200:ff00::9;
import AGG_RT_IPV6_IN;
export AGG_RT_IPV6_OUT;
}
}
}
ospf {
area 0.0.0.0 {
interface lo0.1 {
passive;
}
interface xe-0/1/5.10 {
interface-type p2p;
}
interface xe-0/1/5.11 {
interface-type p2p;
}
interface xe-0/1/5.12 {
interface-type p2p;
}
inactive: interface xe-0/1/7.20;
}
}
ospf3 {
area 0.0.0.0 {
interface lo0.1;
interface xe-0/1/7.20;
}
}
}
policy-options {
prefix-list ROUTER-ACCESSLIST {
103.111.120.0/22;
103.203.176.0/22;
223.29.212.0/22;
}
prefix-list ROUTER-ACCESSLIST_IPv6 {
2405:7e40::/32;
}
policy-statement AGG_RT_IN {
term 1 {
then accept;
}
}
policy-statement AGG_RT_IPV6_IN {
term 1 {
from {
route-filter 2405:7e40::/32 upto /64;
}
then accept;
}
}
policy-statement AGG_RT_IPV6_OUT {
term 1 {
from {
route-filter ::/0 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement AGG_RT_OUT {
term 1 {
from {
route-filter 0.0.0.0/0 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement BDIX_RT_IN {
term 1000 {
then reject;
}
}
policy-statement BDIX_RT_OUT {
term 1 {
from {
route-filter 103.111.120.0/22 upto /24;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement FNA_RT_IN {
term 1 {
from {
route-filter 43.245.142.128/26 exact;
}
then {
local-preference 1000;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement FNA_RT_OUT {
term 1 {
from {
route-filter 103.111.120.0/22 upto /24;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement GGC_RT_IN {
term 1 {
from {
route-filter 43.245.142.192/27 exact;
route-filter 43.245.142.224/27 exact;
route-filter 103.15.244.64/26 exact;
route-filter 103.15.244.128/26 exact;
route-filter 103.15.246.96/27 exact;
route-filter 144.48.148.192/27 exact;
route-filter 144.48.148.224/27 exact;
route-filter 157.119.187.0/27 exact;
}
then {
local-preference 1000;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement GGC_RT_OUT {
term 1 {
from {
route-filter 103.111.120.0/22 upto /24;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement RADIENT_IN {
term 1 {
from {
route-filter 0.0.0.0/0 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement RADIENT_OUT {
term 1 {
from {
route-filter 103.111.122.0/24 exact;
route-filter 103.111.120.0/22 exact;
}
then {
as-path-prepend 137515;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_IN {
term 1 {
from {
route-filter 0.0.0.0/0 exact;
}
then {
local-preference 1000;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_IPv6_IN {
term 1 {
from {
route-filter ::/0 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_IPv6_OUT {
term 1 {
from {
route-filter 2405:7e40::/32 exact;
route-filter 2405:7e40::/35 exact;
route-filter 2405:7e40:2000::/35 exact;
route-filter 2405:7e40:4000::/35 exact;
route-filter 2405:7e40:6000::/35 exact;
route-filter 2405:7e40:8000::/35 exact;
route-filter 2405:7e40:a000::/35 exact;
route-filter 2405:7e40:c000::/35 exact;
route-filter 2405:7e40:e000::/35 exact;
}
then accept;
}
term 1000 {
then reject;
}
}
policy-statement SUMMIT_OUT {
term 1 {
from {
route-filter 103.111.120.0/24 exact;
route-filter 103.111.121.0/24 exact;
route-filter 103.111.123.0/24 exact;
route-filter 103.111.120.0/22 exact;
}
then {
as-path-prepend 137515;
accept;
}
}
term 1000 {
then reject;
}
}
policy-statement next-hop-self {
term se-nh {
then {
next-hop self;
}
}
}
}
firewall {
family inet {
filter protect-router-control-plane {
term snmp {
from {
source-address {
103.111.120.77/32;
}
protocol udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
protocol udp;
destination-port snmp;
}
then {
discard;
}
}
term dns {
from {
source-address {
103.111.120.75/32;
103.111.120.76/32;
8.8.8.8/32;
}
protocol udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
protocol udp;
port domain;
}
then {
discard;
}
}
term syslog {
from {
source-address {
103.111.120.26/32;
}
protocol udp;
port 514;
}
then accept;
}
term ospf {
from {
protocol ospf;
}
then accept;
}
term bgp {
from {
source-address {
103.26.246.77/32;
10.20.131.65/32;
200.192.168.2/32;
200.192.168.3/32;
200.192.168.4/32;
103.111.121.16/32;
172.30.255.0/24;
103.111.121.2/32;
}
protocol tcp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
protocol tcp;
port bgp;
}
then {
discard;
}
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
protocol tcp;
port telnet;
}
then {
discard;
}
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST;
}
protocol tcp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
protocol tcp;
port ssh;
}
then {
discard;
}
}
term ntp-allow {
from {
source-address {
203.190.10.242/32;
}
protocol udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
protocol udp;
port ntp;
}
then {
discard;
}
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
}
}
family inet6 {
filter protect-router-control-plane_ipv6 {
term snmp {
from {
source-address {
2405:7e40::103:111:120:106/32;
}
next-header udp;
destination-port snmp;
}
then accept;
}
term snmp-other {
from {
next-header udp;
destination-port snmp;
}
then discard;
}
term dns {
from {
source-address {
2405:7e40::103:111:120:75/32;
2405:7e40::103:111:120:76/32;
2405:7e40::8:8:8:8/32;
}
next-header udp;
destination-port domain;
}
then accept;
}
term dns-other {
from {
next-header udp;
port domain;
}
then discard;
}
term syslog {
from {
source-address {
2405:7e40::103:111:120:26/32;
}
next-header udp;
port 514;
}
then accept;
}
term bgp {
from {
source-address {
2405:7e40:200:ff00::10/128;
}
next-header udp;
port bgp;
}
then accept;
}
term bgp-deny {
from {
next-header udp;
port bgp;
}
then discard;
}
term ROUTER-ACCESS {
from {
source-prefix-list {
ROUTER-ACCESSLIST_IPv6;
}
next-header udp;
port telnet;
}
then accept;
}
term ROUTER-ACCESS-telnet-deny {
from {
next-header udp;
port telnet;
}
then discard;
}
term ROUTER-ACCESS-ssh {
from {
source-prefix-list {
ROUTER-ACCESSLIST_IPv6;
}
next-header udp;
port ssh;
}
then accept;
}
term ROUTER-ACCESS-ssh-deny {
from {
port ssh;
}
then discard;
}
term ntp-allow {
from {
source-address {
2405:7e40::203:190:10:242/32;
}
next-header udp;
port ntp;
}
then accept;
}
term ntp-other-discard {
from {
next-header udp;
port ntp;
}
then discard;
}
term default-term {
then {
policer 10MB;
count copp-exceptions;
log;
accept;
}
}
term ospf {
from {
next-header udp;
}
}
}
}
policer 10MB {
if-exceeding {
bandwidth-limit 10m;
burst-size-limit 256k;
}
then discard;
}
}

malek@FRC_CORE> exit

You might also like