0% found this document useful (0 votes)
88 views10 pages

Juniper ACX4000 Configuration Overview

This document contains the configuration of a Juniper ACX4000 router with the host name KHSLB1_ACX4000. It includes configurations for system settings like authentication, radius servers, logging, NTP, and user accounts. Interface configurations are provided for ge-0/0/0, ge-0/0/2, ge-0/0/3 and others with descriptions and IP addresses. Protocol settings defined include BGP and ISIS.

Uploaded by

ziblur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views10 pages

Juniper ACX4000 Configuration Overview

This document contains the configuration of a Juniper ACX4000 router with the host name KHSLB1_ACX4000. It includes configurations for system settings like authentication, radius servers, logging, NTP, and user accounts. Interface configurations are provided for ge-0/0/0, ge-0/0/2, ge-0/0/3 and others with descriptions and IP addresses. Protocol settings defined include BGP and ISIS.

Uploaded by

ziblur
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 10

root@KHSLB1_ACX4000> show configuration

## Last commit: 2014-01-19 12:31:17 BDT by root


version 12.3X52-D10.4;
system {
host-name KHSLB1_ACX4000;
time-zone Asia/Dhaka;
authentication-order [ radius password ];
root-authentication {
encrypted-password "$1$N1cdmFoi$6XllZkOa.SB4mDo1zPXH8."; ## SECRET-DATA
}
radius-server {
10.164.97.11 {
port 1812;
accounting-port 1813;
secret "$9$E4ccrKvWXdw2n/9tO1cSVbsYaZUjHqP5"; ## SECRET-DATA
timeout 10;
retry 1;
source-address 10.251.1.151;
}
10.175.97.11 {
port 1812;
accounting-port 1813;
secret "$9$5Q3/9AuIhyaZGjqmQzREcSKM8X7-bs"; ## SECRET-DATA
timeout 10;
retry 1;
source-address 10.251.1.151;
}
}
accounting {
events [ login interactive-commands ];
destination {
radius;
}
}
login {
message "\n\n===========================================================\n\
nThis system is for use by authorized personell only. If you \n\nare not
authorized, disconnect now. All activity is logged, \n\nand may be supplied as
evidence in a court of law.\n\
n===========================================================\n\n";
retry-options {
tries-before-disconnect 3;
}
class custom_view {
permissions [ interface routing ];
allow-commands show;
deny-commands "file|request|set|op|clear|start";
}
user IPTX {
uid 2001;
class super-user;
authentication {
encrypted-password "$1$wW.zn2Qc$nmf.7F7O9Y.frBFKLkWEt0"; ## SECRET-
DATA
}
}
user admin {
uid 2000;
class super-user;
authentication {
encrypted-password "$1$J4Q6NgiS$mywaRJ1ISAUVML2bqeLt11"; ## SECRET-
DATA
}
}
user nerm_user {
uid 2002;
class read-only;
authentication {
encrypted-password "$1$Lm0alTSv$r/WEv8sUQwx713oUEOVNz/"; ## SECRET-
DATA
}
}
user super-users {
uid 2003;
class super-user;
authentication {
encrypted-password "$1$RJsvio4Q$CWAHCU1x1963udaw5p2CW0"; ## SECRET-
DATA
}
}
user viewer {
uid 2010;
class read-only;
}
}
services {
ftp {
connection-limit 5;
rate-limit 5;
}
ssh {
connection-limit 5;
rate-limit 5;
}
telnet {
connection-limit 10;
rate-limit 5;
}
}
syslog {
user * {
any emergency;
}
file messages {
any error;
authorization info;
}
file interactive-commands {
interactive-commands any;
}
}
ntp {
boot-server 172.19.16.15;
server 172.19.16.15 prefer;
server 172.16.16.14;
source-address 10.251.1.151;
}
}
interfaces {
ge-0/0/0 {
vlan-tagging;
media-type copper;
unit 20 {
description GP_Abis_NodeB_KHSLB1;
vlan-id 20;
family inet {
address 10.2.16.1/29;
}
}
unit 150 {
description GP_OM_NodeB_KHSLB1;
vlan-id 150;
family inet {
address 10.211.120.1/30;
}
}
}
ge-0/0/2 {
vlan-tagging;
media-type copper;
unit 24 {
description GP_Abis_NodeB_KHBYR1;
vlan-id 24;
family inet {
address 10.2.16.33/29;
}
}
unit 29 {
description GP_Abis_NodeB_KHSND1;
vlan-id 29;
family inet {
address 10.2.16.73/29;
}
}
unit 31 {
description GP_Abis_NodeB_KHUNV1;
vlan-id 31;
family inet {
address 10.2.16.89/29;
}
}
unit 32 {
description GP_Abis_NodeB_KHCLN1;
vlan-id 32;
family inet {
address 10.2.16.97/29;
}
}
unit 154 {
description GP_OM_NodeB_KHBYR1;
vlan-id 154;
family inet {
address 10.211.120.17/30;
}
}
unit 159 {
description GP_OM_NodeB_KHSND1;
vlan-id 159;
family inet {
address 10.211.120.37/30;
}
}
unit 161 {
description GP_OM_NodeB_KHUNV1;
vlan-id 161;
family inet {
address 10.211.120.45/30;
}
}
unit 162 {
description GP_OM_NodeB_KHCLN1;
vlan-id 162;
family inet {
address 10.211.120.49/30;
}
}
}
ge-0/0/3 {
vlan-tagging;
media-type copper;
unit 21 {
description GP_Abis_NodeB_KHBKL2;
vlan-id 21;
family inet {
address 10.2.16.9/29;
}
}
unit 22 {
description GP_Abis_NodeB_KHBNG1;
vlan-id 22;
family inet {
address 10.2.16.17/29;
}
}
unit 23 {
description GP_Abis_NodeB_KHBNK4;
vlan-id 23;
family inet {
address 10.2.16.25/29;
}
}
unit 25 {
description GP_Abis_NodeB_KHCNM1;
vlan-id 25;
family inet {
address 10.2.16.41/29;
}
}
unit 26 {
description GP_Abis_NodeB_KHGLL1;
vlan-id 26;
family inet {
address 10.2.16.49/29;
}
}
unit 27 {
description GP_Abis_NodeB_KHHPK4;
vlan-id 27;
family inet {
address 10.2.16.57/29;
}
}
unit 28 {
description GP_Abis_NodeB_KHMNP1;
vlan-id 28;
family inet {
address 10.2.16.65/29;
}
}
unit 30 {
description GP_Abis_NodeB_KHTTP2;
vlan-id 30;
family inet {
address 10.2.16.81/29;
}
}
unit 151 {
description GP_OM_NodeB_KHBKL2;
vlan-id 151;
family inet {
address 10.211.120.5/30;
}
}
unit 152 {
description GP_OM_NodeB_KHBNG1;
vlan-id 152;
family inet {
address 10.211.120.9/30;
}
}
unit 153 {
description GP_OM_NodeB_KHBNK4;
vlan-id 153;
family inet {
address 10.211.120.13/30;
}
}
unit 155 {
description GP_OM_NodeB_KHCNM1;
vlan-id 155;
family inet {
address 10.211.120.21/30;
}
}
unit 156 {
description GP_OM_NodeB_KHGLL1;
vlan-id 156;
family inet {
address 10.211.120.25/30;
}
}
unit 157 {
description GP_OM_NodeB_KHHPK4;
vlan-id 157;
family inet {
address 10.211.120.29/30;
}
}
unit 158 {
description GP_OM_NodeB_KHMNP1;
vlan-id 158;
family inet {
address 10.211.120.33/30;
}
}
unit 160 {
description GP_OM_NodeB_KHTTP2;
vlan-id 160;
family inet {
address 10.211.120.41/30;
}
}
}
ge-0/1/0 {
description "TO KHDMR1 ACX4000 ge-0/1/0";
mtu 1780;
unit 0 {
family inet {
address 10.254.64.141/30;
}
family iso;
family mpls;
}
}
ge-0/1/1 {
description "TO KHTWNR MX240 ge-1/0/4";
mtu 1780;
unit 0 {
family inet {
address 10.254.64.145/30;
}
family iso;
family mpls;
}
}
xe-0/2/0 {
description "TO JSNOP2 ACX4000 xe-0/2/0";
mtu 1780;
unit 0 {
family inet {
address 10.254.64.138/30;
}
family iso;
family mpls;
}
}
fxp0 {
unit 0 {
family inet {
address 100.1.1.1/30;
}
}
}
lo0 {
unit 0 {
family inet {
address 10.251.1.151/32;
}
family iso {
address 49.0004.0102.5101.0151.00;
}
family mpls;
}
}
}
snmp {
contact Grameenphone;
view nerm-view {
oid .1.3.6.1.4.1.2636.3.1.3.0;
oid ifDescr include;
oid ifAlias include;
oid ipNetToMediaType include;
}
community nerm {
view nerm-view;
authorization read-only;
clients {
0.0.0.0/0 restrict;
172.18.15.52/32;
}
}
}
protocols {
bgp {
group ACX_Internal {
type internal;
local-address 10.251.1.151;
family inet {
unicast;
}
family inet-vpn {
unicast;
}
peer-as 65000;
local-as 65000;
neighbor 10.253.70.1 {
authentication-key "$9$pYjm0ORSyKvLNcSwYoaUD"; ## SECRET-DATA
}
neighbor 10.253.78.1 {
authentication-key "$9$FAevn6A0OREyKu0LxdVY2"; ## SECRET-DATA
}
}
}
isis {
level 2 disable;
level 1 {
authentication-key "$9$YVg4Zji.mT3DjCtOBEh"; ## SECRET-DATA
authentication-type md5;
wide-metrics-only;
}
interface ge-0/1/0.0 {
ldp-synchronization;
point-to-point;
level 1 metric 1500;
level 2 disable;
}
interface ge-0/1/1.0 {
ldp-synchronization;
point-to-point;
level 1 metric 1500;
level 2 disable;
}
interface xe-0/2/0.0 {
ldp-synchronization;
point-to-point;
level 1 metric 1500;
level 2 disable;
}
interface lo0.0 {
passive;
level 2 disable;
}
}
ldp {
interface ge-0/1/0.0;
interface ge-0/1/1.0;
interface xe-0/2/0.0;
interface lo0.0;
}
lldp {
interface xe-0/2/0;
interface ge-0/1/0;
interface ge-0/1/1;
}
}
policy-options {
policy-statement AbisOIP_export {
term a {
from protocol direct;
then {
community add AbisOIP_VRF;
accept;
}
}
term b {
then reject;
}
}
policy-statement AbisOIP_import {
term a {
from {
protocol bgp;
community AbisOIP_VRF;
}
then accept;
}
term b {
then reject;
}
}
policy-statement NodeB_OM_export {
term a {
from protocol direct;
then {
community add NodeB_OM_VRF;
accept;
}
}
term b {
then reject;
}
}
policy-statement NodeB_OM_import {
term a {
from {
protocol bgp;
community NodeB_OM_VRF;
}
then accept;
}
term b {
then reject;
}
}
community AbisOIP_VRF members target:65000:21;
community NodeB_OM_VRF members target:65000:211;
}
routing-instances {
AbisOIP_VRF {
instance-type vrf;
interface ge-0/0/0.20;
interface ge-0/0/2.24;
interface ge-0/0/2.29;
interface ge-0/0/2.31;
interface ge-0/0/2.32;
interface ge-0/0/3.21;
interface ge-0/0/3.22;
interface ge-0/0/3.23;
interface ge-0/0/3.25;
interface ge-0/0/3.26;
interface ge-0/0/3.27;
interface ge-0/0/3.28;
interface ge-0/0/3.30;
route-distinguisher 65000:21;
vrf-import AbisOIP_import;
vrf-export AbisOIP_export;
vrf-table-label;
}
NodeB_OM_VRF {
instance-type vrf;
interface ge-0/0/0.150;
interface ge-0/0/2.154;
interface ge-0/0/2.159;
interface ge-0/0/2.161;
interface ge-0/0/2.162;
interface ge-0/0/3.151;
interface ge-0/0/3.152;
interface ge-0/0/3.153;
interface ge-0/0/3.155;
interface ge-0/0/3.156;
interface ge-0/0/3.157;
interface ge-0/0/3.158;
interface ge-0/0/3.160;
route-distinguisher 65000:211;
vrf-import NodeB_OM_import;
vrf-export NodeB_OM_export;
vrf-table-label;
}
}

root@KHSLB1_ACX4000>

You might also like