cloud_eng_8851_sw
- ssh DHSAVCLSW-06
- The authenticity of host 'dhsavclsw-06 (172.16.200.22)' can't be established.
- RSA key fingerprint is SHA256:WxeG/BB+WPVYNSY4KqmnFZ7Z6jOqLHgnkMTJj6qvjrw.
- RSA key fingerprint is MD5:2c:49:42:ac:9b:48:71:75:8a:9b:27:ca:bf:5c:7e:8f.
- Are you sure you want to continue connecting (yes/no)? yes
- Warning: Permanently added 'dhsavclsw-06,172.16.200.22' (RSA) to the list of known hosts.
- User Authentication
- Enter password:
- Info: The max number of VTY users is 5, the number of current VTY users online is 1, and total number of terminal users online is 1.
- The current login time is 2023-11-29 23:19:41+06:00.
- <DHSAVCLSW-06>
- <DHSAVCLSW-06>
- <DHSAVCLSW-06>
- <DHSAVCLSW-06>
- <DHSAVCLSW-06>
- <DHSAVCLSW-06>sys
- Enter system view, return user view with return command.
- [~DHSAVCLSW-06]
- [~DHSAVCLSW-06]
- [~DHSAVCLSW-06]
- [~DHSAVCLSW-06]dis
- [~DHSAVCLSW-06]display cur
- [~DHSAVCLSW-06]display current-configuration
- !Software Version V300R021C00SPC200
- !Last configuration was updated at 2023-11-30 05:14:46+06:00
- !Last configuration was saved at 2023-11-30 03:05:57+06:00
- !grpc VRPV800R006C00B016D0127-0.0.1
- !kms_feature –
- !md_tlm VRPV800R006C00B016D0127-0.0.1
- !mdcli VRPV800R006C00B016D0127-0.0.1
- !telem VRPV800R006C00B016D0127-0.0.1
- !telemetry VRPV800R006C00B016D0127-0.0.1
- #
- clock timezone GMT add 06:00:00
- #
- sysname DHSAVCLSW-06
- #
- undo ftp server source all-interface
- undo ftp ipv6 server source all-interface
- #
- info-center loghost source Vlanif55
- info-center loghost 172.16.202.22
- info-center timestamp debugging date precision-time tenth-second
- info-center timestamp log date precision-time millisecond
- info-center logbuffer size 1024
- #
- dns server 103.15.246.1
- dns domain summitiig
- #
- drop-profile default
- #
- dcb pfc
- #
- dcb ets-profile default
- #
- ntp server disable
- ntp ipv6 server disable
- ntp server source-interface all disable
- ntp ipv6 server source-interface all disable
- ntp unicast-server 103.15.246.27
- #
- vlan batch 55
- #
- stp instance 0 priority 0
- #
- telnet server disable
- telnet ipv6 server disable
- undo telnet server-source all-interface
- undo telnet ipv6 server-source all-interface
- #
- diffserv domain default
- #
- ip vpn-instance _management_vpn_
- ipv4-family
- #
- vlan 55
- description SW-ACCESS-VLAN
- #
- acl name DEVICE-ACCESS-RTR number 2999
- rule 5 permit source 172.16.201.0 0.0.0.255
- rule 10 permit source 172.16.202.0 0.0.0.255
- rule 15 permit source 103.26.244.0 0.0.0.255
- rule 20 permit source 103.15.244.0 0.0.0.255
- rule 25 permit source 103.199.87.0 0.0.0.255
- rule 30 permit source 103.15.246.0 0.0.0.255
- rule 35 permit source 192.168.0.0 0.0.0.255
- rule 40 permit source 172.16.209.0 0.0.0.255
- rule 45 permit source 172.16.210.0 0.0.0.255
- rule 50 permit source 172.16.204.0 0.0.0.255
- rule 100 deny
- #
- acl name SNMP number 2998
- rule 5 permit source 103.15.245.76 0.0.0.3
- rule 10 permit source 172.16.210.0 0.0.0.255
- rule 15 permit source 103.15.246.224 0.0.0.7
- rule 20 permit source 103.26.244.0 0.0.0.255
- rule 25 permit source 172.16.200.0 0.0.0.255
- rule 30 permit source 172.16.201.0 0.0.0.255
- rule 35 permit source 172.16.202.0 0.0.0.255
- rule 40 permit source 172.16.203.0 0.0.0.255
- rule 45 permit source 192.168.150.0 0.0.0.255
- rule 50 permit source 209.50.158.0 0.0.1.255
- rule 55 permit source 172.16.208.0 0.0.3.255
- rule 60 permit source 172.16.204.0 0.0.0.255
- rule 65 permit source 172.16.209.0 0.0.0.255
- rule 100 deny
- #
- aaa
- authentication-scheme aaa
- authentication-mode local
- authentication-scheme auth_via_hwtacacs
- authentication-mode hwtacacs local
- authentication-scheme auth_via_tacacs
- authentication-mode local hwtacacs
- authentication-scheme default
- authentication-mode local hwtacacs
- authentication-scheme radius
- authentication-mode radius
- authorization-scheme auth_via_tacacs
- authorization-mode local hwtacacs
- authorization-scheme autho_via_hwtacacs
- authorization-mode hwtacacs local
- authorization-scheme default
- authorization-mode local hwtacacs
- accounting-scheme acc_via_hwtacacs
- accounting-mode hwtacacs
- accounting-scheme auth_via_tacacs
- accounting-mode hwtacacs
- accounting-scheme default
- accounting-mode none
- recording-scheme 0
- recording-mode hwtacacs auth_via_tacacs
- recording-scheme 1
- recording-mode hwtacacs auth_via_tacacs
- recording-scheme auth-hwtacacs
- recording-scheme auth_via_tacacs
- recording-mode hwtacacs auth_via_tacacs
- local-user policy security-enhance
- local-aaa-user password policy administrator
- password history record number 0
- password expire 0
- domain default
- authentication-scheme auth_via_tacacs
- accounting-scheme auth_via_tacacs
- authorization-scheme auth_via_tacacs
- hwtacacs-server auth_via_tacacs
- domain default_admin
- authentication-scheme auth_via_hwtacacs
- accounting-scheme acc_via_hwtacacs
- authorization-scheme autho_via_hwtacacs
- hwtacacs-server auth_via_tacacs
- outbound recording-scheme auth-hwtacacs
- cmd recording-scheme auth-hwtacacs
- local-user marufmridul password irreversible-cipher $1d$wOvj:0h`{+~O`“Pu$kEOMB#D</DeL@&RF6G]+0X=A)`#L”!l6F{Dsta]J$
- local-user marufmridul privilege level 3
- local-user marufmridul service-type telnet terminal ssh ftp
- #
- hwtacacs-server template auth_via_tacacs
- hwtacacs-server accounting 172.16.202.21
- hwtacacs-server accounting 172.16.202.34 secondary
- hwtacacs-server authentication 172.16.202.21
- hwtacacs-server authentication 172.16.202.34 secondary
- hwtacacs-server authorization 172.16.202.21
- hwtacacs-server authorization 172.16.202.34 secondary
- hwtacacs-server source-ip 172.16.200.22
- undo hwtacacs-server user-name domain-included
- hwtacacs-server shared-key cipher %+%##!!!!!!!!!“!!!!#!!!!*!!!!)'jxVp-*v&cN5LM,N$20'Ucj&ZqL$<Ix7Y8!!!!!2jp5!!!!!!8!!!!a<WA/slB5Yv5[I3_yic,I]\v<66G|>!!!!!!!!!!%+%#
- #
- license
- #
- interface Vlanif55
- ip address 172.16.200.22 255.255.255.252
- #
- interface MEth0/0/0
- ip binding vpn-instance _management_vpn_
- #
- interface Eth-Trunk15
- description TO-DHUTRAGG-01
- port link-type trunk
- undo port trunk allow-pass vlan 1
- port trunk allow-pass vlan 55
- mode lacp-static
- #
- interface 400GE1/0/1
- #
- interface 400GE1/0/2
- #
- interface 400GE1/0/3
- #
- interface 400GE1/0/4
- #
- interface 400GE1/0/5
- #
- interface 400GE1/0/6
- #
- interface 400GE1/0/7
- device transceiver 100GBASE-FIBER
- #
- interface 400GE1/0/8
- device transceiver 100GBASE-FIBER
- #
- interface 100GE1/0/1
- #
- interface 100GE1/0/2
- #
- interface 100GE1/0/3
- #
- interface 100GE1/0/4
- #
- interface 100GE1/0/5
- #
- interface 100GE1/0/6
- #
- interface 100GE1/0/7
- #
- interface 100GE1/0/8
- #
- interface 100GE1/0/9
- #
- interface 100GE1/0/10
- #
- interface 100GE1/0/11
- #
- interface 100GE1/0/12
- #
- interface 100GE1/0/13
- #
- interface 100GE1/0/14
- #
- interface 100GE1/0/15
- #
- interface 100GE1/0/16
- #
- interface 100GE1/0/17
- #
- interface 100GE1/0/18
- #
- interface 100GE1/0/19
- #
- interface 100GE1/0/20
- #
- interface 100GE1/0/21
- #
- interface 100GE1/0/22
- #
- interface 100GE1/0/23
- #
- interface 100GE1/0/24
- #
- interface 100GE1/0/25
- #
- interface 100GE1/0/26
- #
- interface 100GE1/0/27
- #
- interface 100GE1/0/28
- #
- interface 100GE1/0/29
- eth-trunk 15
- device transceiver 100GBASE-FIBER
- #
- interface 100GE1/0/30
- #
- interface 100GE1/0/31
- #
- interface 100GE1/0/32
- eth-trunk 15
- #
- interface NULL0
- #
- ip route-static 0.0.0.0 0.0.0.0 172.16.200.21 preference 1
- #
- snmp-agent
- snmp-agent local-engineid 800007DB035CE747FEF711
- snmp-agent community read cipher %@%##!!!!!!!!!”!!!!#!!!!*!!!!)'jxVp-*v&Tz@#@;[63)6F=+:~Zf2Mg'tS&!!!!!2jp5!!!!!!U!!!!+@gHB0;Tc~R7hJ%HsM~!Lx'DYkA“;7E)Rg4,#Ui%C*@gB\2CZHvI@UNfz.U@PsL$:!!!!!!!!!!!!!!!%@%# alias __CommunityAliasName_01_56514
- #
- snmp-agent sys-info contact SCL-IIG-TEAM
- snmp-agent sys-info location SAVAR-DATA CENTER
- snmp-agent sys-info version all
- #
- snmp-agent protocol source-interface Vlanif55
- snmp-agent protocol source-status all-interface
- undo snmp-agent protocol source-status ipv6 all-interface
- #
- undo snmp-agent proxy protocol source-status all-interface
- undo snmp-agent proxy protocol source-status ipv6 all-interface
- #
- snmp-agent trap enable
- #
- stelnet server enable
- ssh server-source -i Vlanif55
- undo ssh server-source all-interface
- undo ssh ipv6 server-source all-interface
- ssh authorization-type default aaa
- #
- ssh server cipher aes256_gcm aes128_gcm aes256_ctr aes192_ctr aes128_ctr
- ssh server hmac sha2_512 sha2_256
- ssh server key-exchange dh_group_exchange_sha256 dh_group16_sha512 curve25519_sha256
- #
- ssh server publickey rsa_sha2_256 rsa_sha2_512
- #
- ssh server dh-exchange min-len 3072
- #
- ssh client first-time enable
- #
- ssh client publickey rsa_sha2_256 rsa_sha2_512
- #
- ssh client cipher aes256_gcm aes128_gcm aes256_ctr aes192_ctr aes128_ctr
- ssh client hmac sha2_512 sha2_256
- ssh client key-exchange dh_group_exchange_sha256 dh_group16_sha512 curve25519_sha256
- #
- command-privilege level 1 view global display current-configuration
- #
- user-interface con 0
- authentication-mode password
- set authentication password cipher $1d$;7WMQjRuRBY&IPP)$68q8LZjZr)@M)U~\x[wMvqqyQ/|*i=<xJ_90'r}T$
- #
- user-interface vty 0 3
- acl DEVICE-ACCESS-RTR inbound
- authentication-mode aaa
- user privilege level 3
- protocol inbound ssh
- #
- user-interface vty 4
- acl DEVICE-ACCESS-RTR inbound
- authentication-mode aaa
- protocol inbound ssh
- #
- warranty
- #
- return
- [~DHSAVCLSW-06]
cloud_eng_8851_sw.txt · Last modified: 2023/11/29 17:24 by sysadm