Sie sind auf Seite 1von 3

<WWCPEENT4102>dis cu configuration

#
sysname WWCPEENT4102
#
info-center loghost source Vlanif888
info-center loghost 172.17.1.40 vpn-instance cpe_oam
#
vlan batch 888 1370 4000
#
undo telnet server enable
undo telnet ipv6 server enable
#
radius enable
#
undo dcn
#
clock timezone GMT add 08:00:00
#
energy conservation disable
#
over-temperature protection enable
#
lldp enable
#
ip vpn-instance __LOCAL_OAM_VPN__
ipv4-family
#
ip vpn-instance cpe_oam
ipv4-family
#
hwtacacs-server template maxis
hwtacacs-server authentication 121.123.6.240 vpn-instance cpe_oam
hwtacacs-server authentication 121.123.6.241 vpn-instance cpe_oam secondary
hwtacacs-server authorization 121.123.6.240 vpn-instance cpe_oam
hwtacacs-server authorization 121.123.6.241 vpn-instance cpe_oam secondary
hwtacacs-server accounting 121.123.6.240 vpn-instance cpe_oam
hwtacacs-server accounting 121.123.6.241 vpn-instance cpe_oam secondary
hwtacacs-server shared-key cipher %^%#u12>@:_pdGN1hd,NB|I42"Bn~f.M_@eQ<E5nvsO=%^%#
undo hwtacacs-server user-name domain-included
#
bfd
mpls-passive
#
mpls lsr-id 10.85.11.134
mpls
#
mpls l2vpn
#
acl name REMOTE_MGMT number 2001
rule 5 permit vpn-instance cpe_oam source 121.123.28.28 0
rule 10 permit vpn-instance cpe_oam source 121.123.28.29 0
rule 15 permit vpn-instance cpe_oam source 121.123.6.224 0.0.0.31
#
diffserv domain default
#
qos-profile EPL_BE_30M
car cir 30000 pir 30000 cbs 5610000 pbs 5610000 green pass yellow pass red discard
#
undo pnp enable
#
aaa
local-user maxis$enterprise password cipher $1a$Q}.~#|Y+].
$|,TETE|],GcnO*+c#;:Xe}XyDZo02LBpA\DEF#&M$
local-user maxis$enterprise service-type ssh
local-user maxis$enterprise level 3
local-user maxis$enterprise state block fail-times 3 interval 5
authentication-scheme default0
authentication-scheme default1
authentication-scheme default
authentication-mode hwtacacs local
authentication-scheme maxis
authentication-mode hwtacacs local
#
authorization-scheme default
authorization-mode hwtacacs local
authorization-scheme maxis
authorization-mode hwtacacs local
authorization-cmd 3 hwtacacs local
#
accounting-scheme default0
accounting-scheme default1
accounting-scheme default
accounting-mode none
accounting-scheme maxis
accounting-mode hwtacacs
#
domain default_admin
authorization-scheme default
accounting-scheme default0
domain default_8021x
accounting-scheme default0
domain default0
accounting-scheme default0
domain default1
accounting-scheme default0
domain maxis
authentication-scheme maxis
authorization-scheme maxis
accounting-scheme maxis
hwtacacs-server maxis
#
#
ntp-service server disable
ntp-service ipv6 server disable
ntp-service access peer 2002
ntp-service unicast-server 172.17.1.33 vpn-instance cpe_oam source-interface
Vlanif888
ntp-service unicast-server 172.17.1.32 vpn-instance cpe_oam source-interface
Vlanif888 preference
#
ip route-static vpn-instance cpe_oam 0.0.0.0 0.0.0.0 10.85.11.133 description FOR
WWCPEENT4102 OAM
#
snmp-agent
snmp-agent local-engineid 800007DB0304BD7069C390
snmp-agent community read cipher %^%#69**JAbDW1Hv;y$M@Rw5TE$n=SovN#hA>OR%I]'/9[D4Y:
(xh62{B^Cg@!"W78+56yTXa:Td*B~`IS'8%^%#
snmp-agent sys-info version v2c
undo snmp-agent sys-info version v3
snmp-agent target-host trap address udp-domain 121.123.6.234 source Vlanif888 vpn-
instance cpe_oam params securityname cipher %^%#+_zTLG&V)0G~xjPv%pk7+k%
[E6SKu"nib23%;=*M%^%#
snmp-agent target-host trap address udp-domain 121.123.6.235 source Vlanif888 vpn-
instance cpe_oam params securityname cipher %^%#Jxx&X%WzPMKNs1)Qe]z41&eQ!
pQ1G~^'{J$i1>]~%^%#
snmp-agent trap enable
#
undo ssh server compatible-ssh1x enable
sftp server enable
stelnet server enable
ssh server acl 2001
#
lldp enable-dcn authentication %^%#!w"[G5C{Y):1Kk%8:%*MaV7NMK;VtYR,1^H>W+84%^%#
#
user-interface con 0
authentication-mode password
set authentication password cipher $1a$jXn#BUM3DL$.I
%~EF1nBS*Qm]#oipjJ6lWz@\=-)3=(EtO~V@\8$
user-interface vty 0 4
acl REMOTE_MGMT inbound
authentication-mode aaa
idle-timeout 5 0
protocol inbound ssh
user-interface vty 16 20
acl REMOTE_MGMT inbound
authentication-mode aaa
protocol inbound ssh
#
return

Das könnte Ihnen auch gefallen