You are on page 1of 5

<JBC-Mirpur-73-AR651>display current-configuration

[V300R019C13SPC200]
#
sysname JBC-Mirpur-73-AR651
#
drop illegal-mac alarm
#
clock timezone BD add 06:00:00
#
ipv6
#
authentication-profile name default_authen_profile
authentication-profile name dot1x_authen_profile
authentication-profile name dot1xmac_authen_profile
authentication-profile name mac_authen_profile
authentication-profile name multi_authen_profile
authentication-profile name portal_authen_profile
#
dhcp enable
#
radius-server template default
#
pki realm default
certificate-check none
#
ssl policy default_policy type server
pki-realm default
version tls1.2
ciphersuite rsa_aes_128_sha256 rsa_aes_256_sha256 ecdhe_rsa_aes128_gcm_sha256
ecdhe_rsa_aes256_gcm_sha384
#
acl number 3000
rule 5 permit gre source 10.99.0.73 0 destination 10.99.255.2 0
#
ipsec proposal JBC-DC
esp authentication-algorithm sha2-256
esp encryption-algorithm aes-192
#
ike proposal default
encryption-algorithm aes-256 aes-192 aes-128
dh group14
authentication-algorithm sha2-512 sha2-384 sha2-256
authentication-method pre-share
integrity-algorithm hmac-sha2-256
prf hmac-sha2-256
ike proposal 50
encryption-algorithm aes-192
dh group14
authentication-algorithm sha2-256
authentication-method pre-share
integrity-algorithm hmac-sha2-256
prf hmac-sha2-256
#
ike peer JBC_Br_DC
undo version 1
pre-shared-key cipher %^%#ElQQY55>."6DJy#|$Ix([;\mY+R,42GI"oQYAzw3%^%#
ike-proposal 50
local-address 10.99.0.73
remote-address 10.99.255.2
rsa encryption-padding oaep
rsa signature-padding pss
undo local-id-preference certificate enable
ikev2 authentication sign-hash sha2-256
#
ipsec policy JBC_BTCL_Br 10 isakmp
security acl 3000
ike-peer JBC_Br_DC
proposal JBC-DC
#
free-rule-template name default_free_rule
#
portal-access-profile name portal_access_profile
#
ip pool LAN_Block
gateway-list 10.71.9.1
network 10.71.9.0 mask 255.255.255.0
excluded-ip-address 10.71.9.2 10.71.9.50
lease day 0 hour 8 minute 0
dns-list 8.8.8.8
#
aaa
authentication-scheme default
authentication-mode local
authentication-scheme radius
authentication-mode radius
authorization-scheme default
authorization-mode local
accounting-scheme default
accounting-mode none
local-aaa-user password policy administrator
password history record number 0
password expire 0
domain default
authentication-scheme default
accounting-scheme default
radius-server default
domain default_admin
authentication-scheme default
accounting-scheme default
local-user admin password irreversible-cipher
$1a$,$m$Z&%-m1$m3if:=M$*(36un5&8Y-/4d=]M.]p]+IBrNRg`031$
local-user admin privilege level 15
local-user admin service-type terminal http
local-user smartbd password irreversible-cipher $1a$AZ<c4~E3cY$y(>.=fvd*!
pM{W*V*lg5N1,X@W%2yHix4j)H'Zx7$
local-user smartbd privilege level 15
local-user smartbd ftp-directory flash:/
local-user smartbd service-type telnet terminal ssh http
#
web
set fast-configuration state disable
user-set Default
user-set VIP
#
firewall zone Local
#
interface Vlanif1
ip address 10.71.9.1 255.255.255.0
dhcp select global
#
interface GigabitEthernet0/0/0
#
interface GigabitEthernet0/0/1
#
interface GigabitEthernet0/0/2
#
interface GigabitEthernet0/0/3
#
interface GigabitEthernet0/0/4
#
interface GigabitEthernet0/0/5
#
interface GigabitEthernet0/0/6
#
interface GigabitEthernet0/0/7
#
interface GigabitEthernet0/0/8
#
interface GigabitEthernet0/0/9
description ## WAN IP##
ipv6 enable
ip address 10.99.0.73 255.255.255.248
ipv6 address auto link-local
ipv6 address auto global default
ipsec policy JBC_BTCL_Br
ipv6 address auto dhcp
#
interface GigabitEthernet0/0/10
description VirtualPort
ipv6 enable
ipv6 address auto link-local
ipv6 address auto global default
ip address dhcp-alloc
ipv6 address auto dhcp
#
interface Cellular0/0/0
#
interface NULL0
#
interface Tunnel0/0/101
description **JBC_Mirpur10_Br_to_DC**
ip address 10.51.0.33 255.255.255.252
tunnel-protocol gre
source 10.99.0.73
destination 10.99.255.2
ospf cost 10
#
cellular profile default
modem auto-recovery dial action modem-reboot fail-times 128
modem auto-recovery icmp-unreachable action modem-reboot
modem auto-recovery services-unavailable action modem-reboot test-times 0 interval
3600
#
ospf 10
area 0.0.0.1
network 10.51.0.32 0.0.0.3
network 10.71.9.0 0.0.0.255
#
undo icmp name timestamp-request receive
#
snmp-agent local-engineid 800007DB03D44F67CD2D09
snmp-agent trap enable
#
ssh client first-time enable
ssh server-source -a 10.99.0.73
#
http secure-server ssl-policy default_policy
http secure-server enable
http server permit interface GigabitEthernet0/0/0
#
ip route-static 10.99.255.0 255.255.255.248 10.99.0.78
#
fib regularly-refresh disable
#
user-interface con 0
authentication-mode password
set authentication password cipher %^%#XkSI(wHe,D,mr~!5;w\U-zc")&BDz;
$T*#Q5QDyLM1sF%ZXf{Jvm":M"P0-;%^%#
user-interface vty 0
authentication-mode aaa
user privilege level 15
user-interface vty 1 4
authentication-mode aaa
#
wlan ac
traffic-profile name default
security-profile name default
security-profile name default-wds
security wpa2 psk pass-phrase %^%#R^Y*Wpr^6U]1>N>k,oS>;x^34Ro!Q8a2MmRz-4J=%^%#
aes
ssid-profile name default
vap-profile name default
wds-profile name default
regulatory-domain-profile name default
air-scan-profile name default
rrm-profile name default
radio-2g-profile name default
radio-5g-profile name default
wids-spoof-profile name default
wids-profile name default
ap-system-profile name default
port-link-profile name default
wired-port-profile name default
ap-group name default
#
dot1x-access-profile name dot1x_access_profile
#
mac-access-profile name mac_access_profile
#
ops
#
autostart
#
secelog
#
ms-channel
#
return

You might also like