This document contains the non-default configuration of a network switch, including VLAN, port, and logging settings. VLANs are created and named for different departments and services. Port priorities and VLAN access ports are configured. A logging server is configured to receive logs.
The document discusses new features in MySQL 5.6 replication including:
1) Crash-safe slaves that store replication information in database tables to prevent data loss if slaves crash.
2) Multi-threaded slaves that improve performance by distributing the replication workload across multiple threads.
3) Time-delayed replication that allows replication to be delayed by a configurable number of seconds.
4) Optimized row-based replication that reduces the size of binary logs by only replicating changed columns where possible.
This document contains configurations for Cisco routers, including:
1. Interface configurations for E1 and serial interfaces with descriptions and multilink PPP settings.
2. Site-to-site VPN and Easy VPN configurations using IPSec.
3. Control plane policies to limit traffic like Telnet, SNMP, and ICMP.
4. Other settings like IP aliases, QoS, time ranges, route maps, NTP, TACACS, RADIUS, DHCP, and ISDN.
The document provides instructions for configuring basic settings on Cisco switches and routers, including enabling privileged modes, setting passwords, configuring interfaces, VLANs, routing protocols, ACLs, SNMP, and more. Example commands are given for tasks like configuring device hostnames, IP addresses, routing protocols, trunking, VLANs, DHCP, ACLs, and other common switch and router configurations.
1. The document provides instructions for upgrading the image on an 8600 switch, including copying new image and configuration files from a server, formatting the flash memory, and rebooting the switch with the new image.
2. It then lists configurations for various protocols and features including OSPF, MLT, Spanning Tree, DHCP Relay, port mirroring, NTP, Radius, VRRP, MAC security, broadcast/multicast rate limiting, static routes, ATM PVCs with VLAN mapping, and RIP.
3. The document finishes with configurations for access policies, syslog server, port tagging, and global port settings.
Deploy Failover/High Availability in ASA FirewallKHNOG
This document provides an overview of high availability network design using failover. It discusses failover concepts and terminology, deployment, configuration, and behaviors. The key aspects covered include active/standby configuration and operation, failover requirements, and trigger conditions for failover.
This document outlines the configuration of a network with routers in Limerick, Cork, Belfast, and Galway. It describes:
1) The IP addressing and subnetting for interfaces on each router, as well as the OSPF routing protocol configuration.
2) The configuration of VLANs, DHCP services, and access control lists on various network devices.
3) The simulation of a Frame Relay network between Cork and Galway routers.
4) Network address translation (NAT) being configured on the Belfast router to share a public IP address.
This document provides instructions for configuring SSH on a switch. It shows the commands used to generate an RSA key pair with a 768-bit modulus for SSH, set the SSH timeout to 60 seconds and authentication retry limit to 3, create a local user with username "admin" and password "123", and configure the VTY lines to use SSH for login authentication.
The document provides instructions for configuring various networking devices including switches, routers, and VLANs. It discusses:
1. Configuring a switch with settings like the hostname, passwords, IP addresses, VLANs for different ports, and trunk configuration between VLANs.
2. Configuring routers with RIP, EIGRP, OSPF routing protocols as well as NAT, DHCP, and ACL configurations.
3. Cable types for straight through and crossover cabling and guidelines for inter-VLAN routing.
The document discusses new features in MySQL 5.6 replication including:
1) Crash-safe slaves that store replication information in database tables to prevent data loss if slaves crash.
2) Multi-threaded slaves that improve performance by distributing the replication workload across multiple threads.
3) Time-delayed replication that allows replication to be delayed by a configurable number of seconds.
4) Optimized row-based replication that reduces the size of binary logs by only replicating changed columns where possible.
This document contains configurations for Cisco routers, including:
1. Interface configurations for E1 and serial interfaces with descriptions and multilink PPP settings.
2. Site-to-site VPN and Easy VPN configurations using IPSec.
3. Control plane policies to limit traffic like Telnet, SNMP, and ICMP.
4. Other settings like IP aliases, QoS, time ranges, route maps, NTP, TACACS, RADIUS, DHCP, and ISDN.
The document provides instructions for configuring basic settings on Cisco switches and routers, including enabling privileged modes, setting passwords, configuring interfaces, VLANs, routing protocols, ACLs, SNMP, and more. Example commands are given for tasks like configuring device hostnames, IP addresses, routing protocols, trunking, VLANs, DHCP, ACLs, and other common switch and router configurations.
1. The document provides instructions for upgrading the image on an 8600 switch, including copying new image and configuration files from a server, formatting the flash memory, and rebooting the switch with the new image.
2. It then lists configurations for various protocols and features including OSPF, MLT, Spanning Tree, DHCP Relay, port mirroring, NTP, Radius, VRRP, MAC security, broadcast/multicast rate limiting, static routes, ATM PVCs with VLAN mapping, and RIP.
3. The document finishes with configurations for access policies, syslog server, port tagging, and global port settings.
Deploy Failover/High Availability in ASA FirewallKHNOG
This document provides an overview of high availability network design using failover. It discusses failover concepts and terminology, deployment, configuration, and behaviors. The key aspects covered include active/standby configuration and operation, failover requirements, and trigger conditions for failover.
This document outlines the configuration of a network with routers in Limerick, Cork, Belfast, and Galway. It describes:
1) The IP addressing and subnetting for interfaces on each router, as well as the OSPF routing protocol configuration.
2) The configuration of VLANs, DHCP services, and access control lists on various network devices.
3) The simulation of a Frame Relay network between Cork and Galway routers.
4) Network address translation (NAT) being configured on the Belfast router to share a public IP address.
This document provides instructions for configuring SSH on a switch. It shows the commands used to generate an RSA key pair with a 768-bit modulus for SSH, set the SSH timeout to 60 seconds and authentication retry limit to 3, create a local user with username "admin" and password "123", and configure the VTY lines to use SSH for login authentication.
The document provides instructions for configuring various networking devices including switches, routers, and VLANs. It discusses:
1. Configuring a switch with settings like the hostname, passwords, IP addresses, VLANs for different ports, and trunk configuration between VLANs.
2. Configuring routers with RIP, EIGRP, OSPF routing protocols as well as NAT, DHCP, and ACL configurations.
3. Cable types for straight through and crossover cabling and guidelines for inter-VLAN routing.
This document provides configuration instructions for setting up an IPSec VPN tunnel between an AWS Virtual Private Cloud (VPC) and a Cisco ASA firewall using a virtual private gateway and customer gateway. It includes steps for configuring IKE and IPsec settings, access control lists, crypto maps, SLA monitoring and VPN filtering to control traffic flowing through the tunnel.
The Netmiko library simplifies SSH management and configuration of network devices from Python. It supports platforms like Cisco IOS, Cisco ASA, Arista EOS, Juniper Junos, and others. The library establishes SSH connections, executes show and configuration commands, and retrieves command output. The document provides an example of using Netmiko to connect to different network devices and execute the "show arp" command on each one.
The document discusses using proxy ARP to allow multiple containers and VMs to share a single network interface on the host machine. It notes some limitations of alternative approaches like Linux bridges, Open vSwitch, and MACVLAN. It also describes some issues with proxy ARP like stealing MAC addresses and requiring static routing. The proposed solution is to use arptables to selectively allow ARP requests from specific IP addresses to prevent MAC address conflicts while enabling network access for containers and VMs.
This document summarizes network address translation (NAT). It defines key NAT terminology like inside/outside addresses and translations. It provides examples of static and dynamic NAT configuration using access lists, pools, and overload. It also covers port address translation, troubleshooting, and tuning NAT translations.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store the fingerprint of a host's public key in DNS, allowing clients to validate the key via DNS lookup rather than trusting the host directly.
2) Instructions for generating SSHFP records for network devices that may not support all SSH commands, including extracting public keys and generating fingerprints.
3) Configuration details for distributing the SSHFP records in DNS and validating them during SSH connections using DNSSEC, avoiding the need to manually accept host keys.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store fingerprints of host public keys in DNS to validate connections, rather than distributing keys directly.
2) The process of generating fingerprints from router public keys, creating SSHFP records, and configuring DNS to distribute them securely via DNSSEC.
3) How an SSH client can validate connections to a host by looking up its SSHFP records and fingerprints in DNS, preventing man-in-the-middle attacks.
The document provides the configuration steps for a lab exercise on BGP. The steps include:
1. Configuring IBGP and EBGP neighborships between routers as shown in the topology diagram using loopback addresses.
2. Advertising loopback networks in BGP to ensure all routers have the routing information.
3. Configuring route reflectors to reduce the number of neighbor relationships needed.
4. Setting preferences for best paths between routers for certain networks.
Watching And Manipulating Your Network TrafficJosiah Ritchie
This is an intro presentation to using the powerful tools for provided for linux in the area of networking. These are command line only tools because in a good network firewall, you won't have the option of graphical tools.
Report of the HWBOT Rookie Rumble #19 overclocking competition. The competition engaged 350 overclockers during a three week period in June.
More info: http://oc-esports.io/#!/round/rookie_rumble_19
This document provides instructions for configuring cut-through proxy on an ASA firewall. It includes steps to configure interfaces, ACLs, AAA authentication with an ISE server, a virtual Telnet IP, and verification tests. The goal is to allow a client to Telnet to a virtual IP on the ASA that will authenticate with ISE and cut through to permit access to a real host IP if authentication succeeds.
This document contains a list of package names and versions for software that is likely part of a Linux distribution. There are over 200 packages listed ranging from core system packages like GConf2 and ORBit2 to specific language spell checkers and printer drivers. The packages are for the x86_64 architecture and the Mandriva Linux 2011 distribution.
This document provides instructions for setting up a single server SDN testbed environment using Open vSwitch. It describes installing Ubuntu, configuring networking, installing necessary programs like Open vSwitch and DevStack, and configuring Open vSwitch bridges, tunnels, and virtual machines to emulate an SDN network on a single physical server.
The document describes the configuration of two routers, R1 and R2, to establish an IPsec VPN using pre-shared keys for authentication. It then shows the configuration of a Certificate Authority (CA) and the enrollment of certificates on R1 and R2 to authenticate the IPsec tunnel using RSA signatures instead of pre-shared keys. Access control lists (ACLs) and crypto maps are used to define the traffic to protect and apply the IPsec policies.
This document provides information about a Cisco Collaboration workshop taking place on October 20, 2015. It lists the contact information for three people - Christophe DERVIEUX, Séverine PASTUREAU, and Sandra BOCCIOLINI - who can provide further details about the workshop. The workshop will cover Cisco VCS ExpressWay and include a lab demonstration.
The CCIE Collaboration certification is for Collaboration Architects, Unified Communications Architects, or Voice and Video Network Managers who are responsible for the design, implementation, and troubleshooting of complex collaboration solutions.
This document provides configuration instructions for setting up an IPSec VPN tunnel between an AWS Virtual Private Cloud (VPC) and a Cisco ASA firewall using a virtual private gateway and customer gateway. It includes steps for configuring IKE and IPsec settings, access control lists, crypto maps, SLA monitoring and VPN filtering to control traffic flowing through the tunnel.
The Netmiko library simplifies SSH management and configuration of network devices from Python. It supports platforms like Cisco IOS, Cisco ASA, Arista EOS, Juniper Junos, and others. The library establishes SSH connections, executes show and configuration commands, and retrieves command output. The document provides an example of using Netmiko to connect to different network devices and execute the "show arp" command on each one.
The document discusses using proxy ARP to allow multiple containers and VMs to share a single network interface on the host machine. It notes some limitations of alternative approaches like Linux bridges, Open vSwitch, and MACVLAN. It also describes some issues with proxy ARP like stealing MAC addresses and requiring static routing. The proposed solution is to use arptables to selectively allow ARP requests from specific IP addresses to prevent MAC address conflicts while enabling network access for containers and VMs.
This document summarizes network address translation (NAT). It defines key NAT terminology like inside/outside addresses and translations. It provides examples of static and dynamic NAT configuration using access lists, pools, and overload. It also covers port address translation, troubleshooting, and tuning NAT translations.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store the fingerprint of a host's public key in DNS, allowing clients to validate the key via DNS lookup rather than trusting the host directly.
2) Instructions for generating SSHFP records for network devices that may not support all SSH commands, including extracting public keys and generating fingerprints.
3) Configuration details for distributing the SSHFP records in DNS and validating them during SSH connections using DNSSEC, avoiding the need to manually accept host keys.
SSHFP records provide a secure method of distributing host public keys via DNS. The document discusses:
1) How SSHFP records store fingerprints of host public keys in DNS to validate connections, rather than distributing keys directly.
2) The process of generating fingerprints from router public keys, creating SSHFP records, and configuring DNS to distribute them securely via DNSSEC.
3) How an SSH client can validate connections to a host by looking up its SSHFP records and fingerprints in DNS, preventing man-in-the-middle attacks.
The document provides the configuration steps for a lab exercise on BGP. The steps include:
1. Configuring IBGP and EBGP neighborships between routers as shown in the topology diagram using loopback addresses.
2. Advertising loopback networks in BGP to ensure all routers have the routing information.
3. Configuring route reflectors to reduce the number of neighbor relationships needed.
4. Setting preferences for best paths between routers for certain networks.
Watching And Manipulating Your Network TrafficJosiah Ritchie
This is an intro presentation to using the powerful tools for provided for linux in the area of networking. These are command line only tools because in a good network firewall, you won't have the option of graphical tools.
Report of the HWBOT Rookie Rumble #19 overclocking competition. The competition engaged 350 overclockers during a three week period in June.
More info: http://oc-esports.io/#!/round/rookie_rumble_19
This document provides instructions for configuring cut-through proxy on an ASA firewall. It includes steps to configure interfaces, ACLs, AAA authentication with an ISE server, a virtual Telnet IP, and verification tests. The goal is to allow a client to Telnet to a virtual IP on the ASA that will authenticate with ISE and cut through to permit access to a real host IP if authentication succeeds.
This document contains a list of package names and versions for software that is likely part of a Linux distribution. There are over 200 packages listed ranging from core system packages like GConf2 and ORBit2 to specific language spell checkers and printer drivers. The packages are for the x86_64 architecture and the Mandriva Linux 2011 distribution.
This document provides instructions for setting up a single server SDN testbed environment using Open vSwitch. It describes installing Ubuntu, configuring networking, installing necessary programs like Open vSwitch and DevStack, and configuring Open vSwitch bridges, tunnels, and virtual machines to emulate an SDN network on a single physical server.
The document describes the configuration of two routers, R1 and R2, to establish an IPsec VPN using pre-shared keys for authentication. It then shows the configuration of a Certificate Authority (CA) and the enrollment of certificates on R1 and R2 to authenticate the IPsec tunnel using RSA signatures instead of pre-shared keys. Access control lists (ACLs) and crypto maps are used to define the traffic to protect and apply the IPsec policies.
This document provides information about a Cisco Collaboration workshop taking place on October 20, 2015. It lists the contact information for three people - Christophe DERVIEUX, Séverine PASTUREAU, and Sandra BOCCIOLINI - who can provide further details about the workshop. The workshop will cover Cisco VCS ExpressWay and include a lab demonstration.
The CCIE Collaboration certification is for Collaboration Architects, Unified Communications Architects, or Voice and Video Network Managers who are responsible for the design, implementation, and troubleshooting of complex collaboration solutions.
Cisco Systems was founded in 1984 by computer scientists Len Bosack and Sandy Lerner from Stanford University. It now has over 60,000 employees and annual revenue of $40 billion. The document lists the names and employee IDs of six Cisco employees. It provides background on Cisco's history, vision, mission, global facts, business segments, and strategies for human resources, finance, and operations. It also discusses Cisco's presence and market leadership in India.
The document summarizes Maycon Vitali's presentation on hacking embedded devices. It includes an agenda covering extracting firmware from devices using tools like BusPirate and flashrom, decompressing firmware to view file systems and binaries, emulating binaries using QEMU, reverse engineering code to find vulnerabilities, and details four vulnerabilities discovered in Ubiquiti networking devices designated as CVEs. The presentation aims to demonstrate common weaknesses in embedded device security and how tools can be used to analyze and hack these ubiquitous connected systems.
Alexander Reelsen - Seccomp for DevelopersDevDay Dresden
The document discusses seccomp and its usage for developers. It begins with an introduction to seccomp, explaining that it allows limiting system calls to prevent untrusted code from performing dangerous actions. It then provides examples of using seccomp in various high-level languages like Java, Crystal, Python, and Go. The document concludes by discussing how seccomp filters work and how violations can be monitored using audit logs.
The document discusses hacking the Swisscom modem by exploiting default credentials to gain access. Upon login, the author runs commands to investigate the system such as viewing configuration files and mapping the internal network. Various system details are discovered including the Linux kernel version and software components.
1. The document describes how to initialize and reset Cisco Catalyst switches to the factory default settings. This involves disabling passwords, erasing the startup configuration file, and deleting VLAN files.
2. Configuration scenarios are provided for setting up Cisco switches in a network. Scenario 1 involves configuring the management VLAN and IP addresses on core and access switches to be on a separate management subnet.
3. Scenario 2 modifies the management configuration so that the IP addresses are assigned to VLANs on the floor subnets, rather than a separate management subnet.
This document describes the configuration of VLANs on a Cisco switch. The key steps are:
1. Six VLANs are created and named for different departments.
2. Ports on the switch are assigned to each VLAN to segregate network traffic for each department.
3. IP addresses are configured for each VLAN interface and routing is enabled with RIP to allow communication between VLANs.
4. Ping tests confirm connectivity between devices on different VLANs, showing the VLAN configuration is functioning properly.
This document contains the configuration of a network device. It configures interfaces, VLANs, SNMP, NTP, and access control lists. Interfaces include Ethernet and EPON ports. VLANs 1 and 10-12, 100, and 111 are defined. NTP and SNMP are enabled for management. Access control lists restrict traffic to the management network and allow DHCP and client traffic.
The document discusses configuring and operating Cisco IOS. It describes starting a switch and router, observing the boot process, and entering different command modes. It also covers basic Cisco IOS commands, viewing device information, and configuring parameters like hostname, interfaces, and protocols. The document provides an example of initializing a router through an interactive setup process.
This document discusses several topics related to threads, memory allocation, and software vulnerabilities:
1) It mentions master threads, worker threads, and synchronization primitives like spin locks and conditional variables that are used for communication between threads.
2) It discusses issues like user-after-free vulnerabilities that can occur if memory is freed and reallocated without proper synchronization between threads.
3) It provides an example of how reallocating memory could potentially cause problems if the memory address changes or if too many reallocations exhaust available memory. Precautions are needed to avoid security issues or denial of service attacks in multithreaded programs.
Cisco Wireless LAN Controller Command Reference, Release 7.4.pdfssusercbaa33
This document provides a list of commands related to configuring Lightweight Access Point (LWAP) features on Cisco Wireless LAN Controllers. It includes over 100 commands organized by function, with each command's syntax and a brief description. The commands allow administrators to configure LWAP settings such as CAPWAP parameters, radio profiles, redundancy, and troubleshooting features from the controller interface.
This document provides an overview of basic vimrc configuration settings including encoding, syntax highlighting, color schemes, indentation, status lines, mappings, and more. It introduces vimrc as something Linux users need to learn for faster development efficiency and typing practice. Issues with plugin installation are also mentioned.
The document provides guidelines for deploying an L.N.M.P environment on a 64-bit server. It specifies directory locations for source code, installed software, scripts and logs. It also outlines steps to update the system, install and configure MySQL, Nginx, PHP and other packages, including compiling Nginx with specific modules and options, setting Nginx as a service, and enabling syntax highlighting for Nginx configuration files.
Libvirt is a virtualization API and management tool that allows programmatic control over virtual machines and hypervisors. It provides a common API that works across multiple hypervisor platforms to control virtualization lifecycles including defining, starting, stopping, and deleting virtual machines. The document discusses using libvirt and its command line tool virsh to manage VMs, the libvirt API, and some examples of using the Python bindings to perform basic VM operations like attaching and detaching disks. It also covers some issues with libvirt like unstable VM status detection on Xen and techniques for debugging and logging.
The document contains configuration details of a main router and main switch used to connect different departments using VLAN encapsulation. The router configuration shows 11 VLAN interfaces configured for IP addresses on FastEthernet0/0, while the switch configuration shows each port assigned to a specific VLAN and the VLAN database output listing the 11 VLANs.
The document contains configuration files from 3 switches (S1, S2, S3) and 3 routers (R1, R2, R3). The configurations show basic settings like hostname, enable secret password, interfaces, and OSPF routing.
This document discusses using LVS (Linux Virtual Server) and Keepalived to implement high performance and high availability load balancing. It provides instructions on installing LVS and Keepalived, configuring LVS for load balancing, and using Keepalived to realize load balancing and high availability. Key aspects covered include using LVS-DR and real server scripts, and configuring Keepalived on the master and backup servers.
Routers are networking devices that connect different networks. This document discusses router basics including Cisco router models, external and internal parts of routers, software used to configure routers, and basic router configuration tasks like setting passwords, configuring interfaces, and setting static and default routes. It provides a step-by-step guide to initial router setup and configuration.
The document discusses using Ixia's IxVM virtual machine for network testing in Cisco's Modeling Lab (CML) virtual environment. Specifically:
- IxVM is a virtual machine version of Ixia's network testing hardware that runs on Linux. Its OVA file can be added to CML.
- The OVA file contains disk files that are extracted and registered with CML's OpenStack environment to launch the IxVM VM.
- Example shows configuring a router and IxVM VMs in CML, and using IxNetwork software to generate OSPF traffic between the VMs and router ports for testing.
This document provides instructions for configuring Emacs as a Python IDE. It discusses installing various Python-related packages and plugins through Emacs' package manager, including yasnippet, auto-completion, python-mode, ipython, and plugins for Python documentation lookup, pylint, and PEP8. It also covers installing and configuring the Emacs Code Browser (ECB) plugin to provide a sidebar for navigating code.
1. This command shows non-default configurations only.
Use 'show config all' to show both default and non-default configurations.
begin
!
#***** NON-DEFAULT CONFIGURATION *****
!
!
# Firmware Revision: 06.42.06.0008
!
#ip
set ip address 192.168.30.66 mask 255.255.255.0 gateway 192.168.30.1
!
#system
set switch member 1 4
set switch member 2 4
set switch member 3 4
set switch member 4 4
set switch description 2 ""
set switch description 3 ""
set switch description 4 ""
set system name "NAN_Men.B5G.R+3"
set system location "Rue Menou - Nantes"
set system contact "AI - DINT - CG44"
set system password length 6
set system login admin super-user enable password :
31aa5c55a2d060590a63ac750639100f7b517e9478a339529a65b651d67fc24d5c0f965edd7aeb0c
9a:
set system login ro read-only disable
set system login rw read-write disable
set system login retis super-user enable password :
3cd843539a4c81471216e166411a4315f9c163be2c7baa01f7620452f76ae535cc4e54669b5e7711
be:
!
#vlan
set vlan create 66
set vlan create 90
set vlan create 100
set vlan create 120
set vlan create 693
set vlan create 1953
set vlan name 66 "HORO"
set vlan name 90 "VISIO"
set vlan name 100 "NETADMIN"
set vlan name 120 "WIFI"
set vlan name 693 "VOIX"
set vlan name 1953 "NAN_Men"
clear vlan egress 1 ge.1.1-48;ge.2.1-48;ge.3.1-48;ge.4.1-46
set vlan egress 66 ge.1.47;ge.4.47;lag.0.1 tagged
set vlan egress 90 ge.1.47;ge.4.47;lag.0.1 tagged
set vlan egress 100 ge.1.47;ge.4.47;lag.0.1 tagged
set vlan egress 120 ge.1.47;ge.4.47;lag.0.1 tagged
set vlan egress 120 ge.1.1-4;ge.2.1-4 untagged
set vlan egress 693 ge.1.5-46;ge.2.5-48;ge.3.1-48;ge.4.1-46 tagged
set vlan egress 1953 ge.1.47;ge.4.47;lag.0.1 tagged
set vlan egress 1953 ge.1.5-46;ge.2.5-48;ge.3.1-48;ge.4.1-46 untagged
set host vlan 100
!
#Router Configuration
!
3. !
#logging
set logging server 1 ip-addr 10.14.7.20 descr 'default' state enable
!
#logout
!
#mac
!
#macauthentication
!
#maclock
!
#mtu
!
#multiauth
!
#newaddrtrap
!
#nodealias
!
#cos state
!
#cos setting
!
#cos port-config
!
#cos port-resource
!
#cos reference
!
#policy
!
#port
set port
set port
set port
set port
set port
set port
set port
set port
set port
set port
set port
set port
set port
set port
set port
lacp port ge.1.47 aadminkey 1
lacp port ge.4.47 aadminkey 1
priority-queue ge.1.5 0 0
priority-queue ge.1.5 4 4
priority-queue ge.1.5 5 5
priority-queue ge.1.6 0 0
priority-queue ge.1.6 4 4
priority-queue ge.1.6 5 5
priority-queue ge.1.7 0 0
priority-queue ge.1.7 4 4
priority-queue ge.1.7 5 5
priority-queue ge.1.8 0 0
priority-queue ge.1.8 4 4
priority-queue ge.1.8 5 5
priority-queue ge.1.9 0 0
21. #txqmonitor
!
#radius
!
#rmon alarm
!
#rmon capture
!
#rmon channel
!
#rmon event
!
#rmon filter
!
#rmon history
!
#rmon stats
!
#snmp
clear snmp access ro security-model v1
clear snmp access ro security-model v2c
clear snmp access public security-model v1
clear snmp access public security-model v2c
clear snmp access public security-model usm
set snmp access visite security-model v1 exact read All notify All nonvolatile
set snmp access visite security-model v2c exact read All notify All nonvolatile
set snmp access supcg44 security-model v1 exact read All write All notify All
nonvolatile
set snmp access supcg44 security-model v2c exact read All write All notify All
nonvolatile
set snmp community :
3fb03022e4966512343b511c263dcf1240739359ec6cad7d8c6277007e7e0657521e0641967b1501
56:
clear snmp group ro ro security-model v1
clear snmp group ro ro security-model v2c
set snmp group public user public security-model v1
set snmp group visite user visite security-model v1
set snmp group supcg44 user supcg44 security-model v1
set snmp group public user public security-model v2c
set snmp group visite user visite security-model v2c
set snmp group supcg44 user supcg44 security-model v2c
set snmp group public user public security-model usm
set snmp notify TVInformTag tag TVInformTag inform
set snmp notify TVTrapTag tag TVTrapTag
set snmp targetaddr TVae714TV1visite 10.14.7.20 param TV1visite taglist
TVTrapTag
set snmp targetparams TV1visite user visite security-model v1 message-processing
v1 noauthentication nonvolatile
clear snmp user public
set snmp view viewname All subtree 1
!
#sntp
set sntp client unicast
set sntp server 10.14.7.20
22. !
#spantree
set spantree version rstp
set spantree priority 28672 0
!
#ssh
set ssh enabled
!
#ssl
!
#summertime
!
#tacacs
!
#telnet
set telnet disable inbound
!
#tftp
!
#timezone
set timezone 'Eur' 1 0
!
#vlanauthorization
!
#webview
!
#width
!
end
NAN_Men.B5G.R+3(su)->