반응형

Juniper show command (RSI : request support information)

request support information | no-more
request support information | save RSI_20210208

show system uptime no-forwarding
show version detail no-forwarding
show system core-dumps no-forwarding
show chassis alarms no-forwarding
show chassis hardware detail no-forwarding
show system processes extensive no-forwarding
show pfe statistics error
show pfe statistics traffic
show chassis routing-engine no-forwarding
show chassis environment no-forwarding
show chassis firmware no-forwarding
show chassis fpc detail
show system boot-messages no-forwarding
show system storage no-forwarding
show system virtual-memory no-forwarding
show system buffer no-forwarding
show system queues no-forwarding
show system statistics no-forwarding
show configuration | except SECRET-DATA | display omit
show interfaces extensive no-forwarding
show chassis hardware extensive no-forwarding
show krt queue
show krt state
show route summary
show arp no-resolve
show pfe statistics bridge
show ethernet-switching table
show ethernet-switching interfaces detail
show ethernet-switching mac-learning-log
show vlans extensive
show spanning-tree bridge detail
show spanning-tree interface
show redundant-trunk-group
show lldp neighbors
show dhcp snooping binding
show arp no-resolve
show arp inspection statistics
show dot1x interface
show dot1x interface detail
show pfe statistics bridge
show system services dhcp binding detail
show system services dhcp statistics
show lldp neighbors
show vrrp summary
show chassis firmware
show route forwarding-table
show ipv6 neighbors
show lacp interfaces
show lacp statistics interfaces
show services unified-access-control status
show services unified-access-control authentication-table
show services unified-access-control policies
file show /var/run/dmesg.boot.detail
show virtual-chassis protocol statistics
show virtual-chassis vc-port statistics extensive
show virtual-chassis status
show virtual-chassis vc-port
show virtual-chassis active-topology
show virtual-chassis protocol adjacency
show virtual-chassis protocol database extensive
show virtual-chassis protocol route
show virtual-chassis protocol statistics
show vrrp summary
show virtual-chassis vc-port statistics extensive
show chassis pic-mode
show protection-group ethernet-ring configuration
show protection-group ethernet-ring aps
show protection-group ethernet-ring interface
show protection-group ethernet-ring node-state
show protection-group ethernet-ring statistics detail
show chassis fpc pfe-version
show captive-portal interface
show captive-portal authentication-failed-users

 

 

반응형
반응형

Juniper Troubleshooting Commands

Managing configuration

configure exclusive – to prevent others modifying the while in configuration mode

status – show users currently logged in

compare (filename | rollback n)

#commit | display detail – debug commit
#commit check
#commit comment
#commit confirmed
#commit at [tt:mm | yyyy-mm-dd hh:mm | reboot], to cancel:

clear system [commit | reboot ] - to cancel scheduled state:

show system commit
show configuration ….

#load {set} {merge | replace | override } {relative} [terminal | file] – paste - Ctrl+D to end

show | # compare (filename | rollback n)

show | display set

show | display changed

show | display detail

show | display omit statement

Configuration modification commands:
#annotate “xxxxx” – annotate part of configuration
#activate/deactivate
#copy / delete / rename – works with wildcards, e.g. delete fe*
#rename – string in configuration
#replace pattern
#protect / unprotect a statement

#exit configuration-mode
#quit

show system rollback 10
show system rollback compare 10 12
show system commit

System:

show version {detail}
request system reboot | power-off

file [copy | list | delete | show | rename ]
show system storage

show chassis hardware detail
show chassis alarms
show chassis environment
show chassis craft-interface – show router LED alarms

show configuration | display detail
show system users – who is logged in to the system
request system logout use username – forcefully logout a user
request message all message “log out now”

show system boot-messages – boot log

Interfaces/Hardware:

Display information about memory, CPU temperature, load and uptime:

show chassis routing engine

To viw hardware and SFPs installed in a slot:

General hardware overview

show chassis hardware

Which fpc are in use

show chassis fpc

To display what details of pic intstalled in a slot:

show chassis pic pic-slot 0 fpc-slot 0

To see light levels for fibre interface:

show interfaces diagnostics optics

Logging

#set system syslog file messages any info – to save all log messages to file “messages”

show log messages | match LOGIN | match “Mar 16”
file list detail /var/log = ls –al (to see permitions, etc.)
clear log messages - to clear the contents of the messages file

monitor start messages - live monitoring of messages file
monitor list
monitor stop – to stop all

For more detailed information about a process, under the process level:
#set traceoptions file filenamefil world-readable
#set traceoptions flag all

help syslog – to show information about syslog messages

Security Policies
View security policy:

show security policies from-zone Proxy-DMZ to-zone Inside details

To check if traffic will pass through the security policies (useful when not able to generate traffic):

show security match-policies from-zone Outside to-zone Inside protocol xxx source-ip xxx source-port xxx destination-ip xxx destination-port xxxx

General Monitoring and troubleshooting

monitor traffic interface ge-0/0/0
monitor interface ge-0/0/0

monitor traffic interface ge-0/2/3 matching "proto 89" write-file ospf.cap - matches proto 89 and writes it in ospf.cap
show security flow session ... options
show system statistics – all packet types statistics for a device

test policy

Routing

show route
show route terse - nice concise output with the following information: A-active, Destination, P-protocol, Prf-preference, Metric1,2 Next-hop, AS Patch)
show route protocol [static|direct|ospf]

show route forwarding-table to see active routes in the forwarding table

Troubleshoot OSPF

show route forwarding-table to see active routes in the forwarding table

show route protocol ospf

show ospf overview
show ospf interaces
show ospf neighbor
show ospf dataset detail

show ospf neighbor [extensive]
clear ospf neighbor [192.168.254.225]

show ospf statistics

show ospf interface [extensive]

show ospf route [abr|asbr|extern]

show route protocol ospf

show ospf database [summary|brief]
show ospf database [router|network|netsummary|asbrsummary|extern|nssa]
show ospf database router advertising-router 10.0.3.3 detail
show ospf database router area 0 extensive
show ospf database area 0 lsa-id extensive
clear ospf database purge

show ospf log


show bgp summary
show bgp neighbor 1.1.1.1
show route advertising protocol bgp
show route receiving protocol bgp

To find a range of prefixes in the routing table:

show route 200.10/18

show route terse - better routing output

Troubleshoot NAT

Source

show security nat source summary
show security nat source rule
show security nat source pool

Static

show security nat static rule

Destination

show security nat destination summary
show security nat destination pool
show security nat destination rule

show security flow session

Set Firewall filter to count packtes (see further down)

Firewall

show firewall
show firewall log
clear firewall [all|filter-name|counter-name]
show interfaces filters
show interfaces policers
show policer


Set Firewall Filter to count packets through the SRX:

show interfaces ge-0/0/0

ge-0/0/0 {
unit 0 {
family inet {
filter {
input icmp-filter;
}
address 1.1.1.1/30; ## This address was already set on the interface
}
}
}

show firewall family inet filter icmp-filter

icmp-filter {
term 1 { ## This is the main term which will count the packets.
from {
source-address 3.3.3.3;
destination-address 1.1.1.1;
protocol icmp;
}
then {
count icmp-counter; ## The icmp-counter will show the bytes/packets incrementing
accept; ## This will accept the packets if you don't want them to be dropped. You can use - "drop" or "reject" and/or "log" here.
}
}

Then the Firewall Filter stats can be checked with the
show firewall filter icmp-filter
q
Counter Bytes Packets
icmp-counter 84 1
.
term default { ## This term will ensure that the other traffic is not affected.
accept;
}

}

Packet Flow

Monitor traffic targeting the interface (useful for ping, ssh, etc.)

monitor traffic interface ge-0/0/0 [extensive]

Display live sessions:

show security flow session [destination-port|destination-prefix|source-port|source-prefix] [extensive|brief|summary]

Create packet filter and capture packets:

http://kb.juniper.net/InfoCenter/index?page=content&id=KB11709

forwarding-options {

/* Filename and file properties  */
packet-capture {
    file filename test_capture;
    maximum-capture-size 1000;
}

}
firewall {
/* Capture filter with action sample /
filter CAPTURE_PCAP {
term 1 {
from {
source-address {
1.1.1.1/32;
}
destination-address {
2.2.2.2/32;
}
destination-port 22;
}
then {
sample;
accept;
}
}
term Allow_All {
then accept;
}
}
}
interfaces {
/
Apply the firewall filter on the desired interface for the input and output direction: */
ge-0/0/0
unit 0 {
family inet {
filter {
output CAPTURE_PCAP;
}
address 172.16.46.121/24;
}
}
}
}

File can be found in /var/tmp and opened with Wireshark

file list /var/tmp/ | match test_capture*

On EX Switches Mirror port traffic to remote capture server:

set analyzer employee-monitor input ingress interface ge-0/0/0.0

/* optional sampling ration - 1 of every 200 packets will be forwared */

set analyzer employee-monitor ratio 200

set analyzer employee-monitor output interface ge-0/0/10.0

Alternatively the output can be a vlin. Vlan needs to be specified under VLANs:

set vlans remote-analyzer vlan-id 999


Operational mode flow session monitoring (requires junos 12.1)

monitor security flow file tmp_test [files 2 size 100k match pattern ]
monitor security flow filter source-prefix 10.52.20.0/24 destination->prefix 10.75.0.1 destination-port 389 protocol tcp source-port 12354 temp_test_filter

show monitor security flow

monitor security flow start
monitor security flow stop

clear monitor security flow filter temp_test_filter

file delete /var/log/tmp_test

Tips

set cli timestamp
#set chassis alarm management-ethernet link-down ignore
show interfaces | match "(^Physical.* ge-)|(^Physical.*Up$)"
show version and haiku
Ctrl+R: search history of previous command
use # for the rest of the line in a script to be ignored
Use the save CLI pipe to save output to a local or remote file.
Type 'b' at the more prompt to go backwards one page.
Type '/' at the more prompt to search for a string in the rest of the output.
In configuration mode, type rollback ? to see when previous configurations were committed, and by whom.
In configuration mode, the status command displays who is editing the configuration and where in the hierarchy they are working.
In configuration mode, the delete command with no arguments will delete the entire configuration hierarchy under the current location.
show cli history
help tip cli
To move interface configuration: replace pattern ge-0/0/0 with ge-0/1/0

wildcard delete interfaces ge-0/0/[2-3]

Junos software contains default configurations in a hidden group named junos-defaults. To see them, use the show configuration groups junos-defaults command

test policy policy_name 1.1.1.1/12 – run a router through a policy

To see changes from a particular commit at the past:

show system commit - identify the change you wan to see (e.g. 2), and then
show system rollback compare 3 4


To see the default Junos preconfigure applications:

user@host> show configuration groups junos-defaults applications

패킷을 떠서 확인하는 방법.
명령어는 monitor traffic interface irb.1 write-file ICMP.pcap 입니다.
“write-file”은 hidden command라 ? 키 입력이나 tap 키로 확인되지는 않으나 직접 입력하시면 적용됩니다.

 

반응형
반응형

 

기본 Hadware 정보 및 주요 명령어

uptime : 장비 업타임 확인(부팅이 되고 지난 일 수)

TMOUT=0 : 장비 접속 세션 유지
=> 분 단위이며, 0을 입력하면 시간 제한이 없음

top : IPS의 현재 CPU 정보 확인

cat /proc/cpuinfo : IPS의 CPU 정보 확인

df -h : IPS의 현재 DISK 용량 상태 정보 확인

free : IPS의 현재 Memory 용량 정보 확인

cat /proc/meminfo : IPS의 현재 Memory 사용량 확인

ps -ef : 현재 사용중인 Process 확인

lsmod : 데몬 활성화 / 비활성화 확인
=> IPS의 2세그먼트 기준으로 NIC정보 값이 8이면 데몬 활성화 / 0일 경우 데몬 비활성화 상태

init 0 : 장비 전원 OFF

init 6 : 장비 리부팅

cd /home1/sniper/sniper 디렉토리 이동 후
./sniper : 장비 데몬 ON/OFF
./sniper -v : 현재 IPS 버전 정보 확인
./sniper -O : 현재 IPS SSL버전 정보 확인

Traffic 관련

cd /home1/sniper/sniper 디렉토리 이동 후
./isconfig 혹은 ./wgconfig
=> 장비의 NIC에 따라 명령어 달라짐
=> In, Out 트래픽, 인터페이스 에러, 정책에 의한 Drop 카운트 확인 가능
./isconfig |grep error
=> 점검 시, error값으로 sort하여 이상 유무 확인

Config 백업 관련

cd /home1/sniper 디렉토리 이동 후
cp -rfp config config_YYMMDD : config 파일 복사
tar -cvzf config_YYMMDD.tar.gz config_YYMMDD : config 파일 압축
mv config_YYMMDD.tar.gz /backup : 압축한 config 파일을 /backup 디렉토리로 이동

Log 확인

cat /var/log/messages : IPS 로그 전체 정보 확인

cd /var/log 이동 후
tail -n 숫자 messages : 최근 로그부터 숫자만큼 정보 확인
=> 예를 들어 tail -n 100 messages 명령어인 경우 최근 100개의 로그 메세지 확인 가능

dmesg : 장비 부팅 로그 확인

기타

#df -h
#more /home1/sniper/config/sniper.dat ->제품의 S/N, License 정보
#more /home1/sniper/config/sniper.cfg -> 각종 운영 설정 관련 정보
#sniper_network.sh
#ps -ef|grep sniper
#netstat -na
#cd /home1/sniper/sniper -> #./skill sniper
#cd /home1/sniper/sniper -> #./sniper
#cd /home1/sniper/sniper -> #./nic_setup.sh
#cd /home1/sniper/sniper -> #./wgconfig

WD -i eth0 -s 1600 -w packet.pcap -> 관리포트 패킷 수집

tcpdump -i eth0 -s 1600 -w filename.pcap -> 패킷덤프

auto_create_partition.sh -> HDD장애 시 HDD 교체 후 해당 스크립트를 이용하여 자동으로 Partition 설정함

config_gather -> 설정 정보 확인(결과는 /backup/Config_Gathering/에 txt 파일로 저장됨)

#lspci -> 장착되어 있는 NIC 정보 확인

more /home1/sniper/sniper/is_insmode.sh_ -> mode/speed 등

more /home1/sniper/sniper/sn_insmode.sh_

#/home1/sniper/sniper/sniper -v

rm -rf /home1/sniper/config/master.dat ->> Sniper Daemon Restart 관리자 접속 안될경우

sniper_network.sh eth1

 

 

반응형
반응형

 

SAISEI Config

stm1wins# show running_config
#
#
netflow_sender record
no description
no dynamic
max_flow_rate 0
name record
sample_rate 1
no policies
minimum_flow_size 0
no hidden
minimum_flow_duration 0.000
type csv
exit
#
#
ingress_flow_class games
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class games
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
no applications
minimum_distress 0
name games
no minimum_packets
no maximum_total_bytes
acl
top_host dontcare
no reputation
required_groups games
match_rate_plan
no threat_types
no maximum_duration
exit
ingress_flow_class other
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class other
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
no applications
minimum_distress 0
name other
no minimum_packets
no maximum_total_bytes
acl
top_host dontcare
no reputation
no required_groups
match_rate_plan
no threat_types
no maximum_duration
exit
ingress_flow_class speedtest
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class speedtest
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
no applications
minimum_distress 0
name speedtest
no minimum_packets
no maximum_total_bytes
acl
top_host dontcare
no reputation
required_groups speedtest
match_rate_plan
no threat_types
no maximum_duration
exit
ingress_flow_class streaming
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class streaming
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
no applications
minimum_distress 0
name streaming
no minimum_packets
no maximum_total_bytes
acl
top_host dontcare
no reputation
required_groups streaming
match_rate_plan
no threat_types
no maximum_duration
exit
ingress_flow_class updates
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class updates
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
no applications
minimum_distress 0
name updates
no minimum_packets
no maximum_total_bytes
acl
top_host dontcare
no reputation
required_groups updates
match_rate_plan
no threat_types
no maximum_duration
exit
ingress_flow_class voip
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class voip
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
no applications
minimum_distress 0
name voip
no minimum_packets
no maximum_total_bytes
acl
top_host dontcare
no reputation
required_groups voip
match_rate_plan
no threat_types
no maximum_duration
exit
ingress_flow_class Youtube
geolocation
no minimum_rate
no next_hop_ases
no dynamic
no maximum_packets
egress_flow_class Youtube
no minimum_total_bytes
no excluded_groups
no threat_level
no capture
no bad_source_internal
no maximum_rate
no final_ases
no bad_source_external
no hidden
initial_rate_plan
no minimum_duration
no description
applications youtube
minimum_distress 0
name Youtube
no minimum_packets
no maximum_total_bytes
acl Youtube
top_host dontcare
no reputation
no required_groups
match_rate_plan
no threat_types
no maximum_duration
exit
#
#
egress_policy_map external1.any_epm
no description
no dynamic
no hidden
name external1.any_epm
egress_policy games
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class games
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name games
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy other
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class other
no child_equalisation
downstream_cir 0
host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name other
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy speedtest
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class speedtest
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority override
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name speedtest
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy streaming
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class streaming
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name streaming
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 30.0
exit
egress_policy updates
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class updates
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority background
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name updates
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy voip
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class voip
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name voip
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 10.0
exit
egress_policy Youtube
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class Youtube
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name Youtube
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
exit
egress_policy_map external1_epm
no description
no dynamic
no hidden
name external1_epm
egress_policy games
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class games
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name games
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy other
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class other
no child_equalisation
downstream_cir 0
host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name other
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy speedtest
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class speedtest
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority override
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name speedtest
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy streaming
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class streaming
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name streaming
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 30.0
exit
egress_policy updates
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class updates
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority background
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name updates
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy voip
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class voip
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name voip
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 10.0
exit
egress_policy Youtube
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class Youtube
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name Youtube
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
exit
egress_policy_map internal1.any_epm
no description
no dynamic
no hidden
name internal1.any_epm
egress_policy games
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class games
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name games
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy other
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class other
no child_equalisation
downstream_cir 0
host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name other
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy speedtest
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class speedtest
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority override
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name speedtest
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy streaming
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class streaming
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name streaming
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 30.0
exit
egress_policy updates
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class updates
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority background
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name updates
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy voip
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class voip
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name voip
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 10.0
exit
egress_policy Youtube
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class Youtube
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name Youtube
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
exit
egress_policy_map internal1_epm
no description
no dynamic
no hidden
name internal1_epm
egress_policy games
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class games
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name games
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy other
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class other
no child_equalisation
downstream_cir 0
host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name other
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy speedtest
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class speedtest
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority override
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name speedtest
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy streaming
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class streaming
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name streaming
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 30.0
exit
egress_policy updates
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class updates
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority background
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name updates
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
egress_policy voip
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class voip
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority high
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name voip
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 10.0
exit
egress_policy Youtube
upstream_mir 0
upstream_cir 0
downstream_mir 0
no dynamic
egress_flow_class Youtube
no child_equalisation
downstream_cir 0
no host_equalisation
shaper_margin 10.0
priority normal
no hidden
no description
parent
no rate_multiplier
percent_mir 0.0
no control_peak
name Youtube
no shaped
enabled
secondary_parent
burst_threshold 30
percent_cir 0.0
exit
exit
#
#
management_interface mgmt0
no description
requested_system_interface enp11s0
allowed_subnets 10.0.0.0/8,172.16.0.0/12,192.168.0.0/16
no dynamic
pci_address 0000:0b:00.0
no hidden
name mgmt0
exit
#
#
egress_flow_class games
no hidden
no dynamic
no description
name games
exit
egress_flow_class other
no hidden
no dynamic
no description
name other
exit
egress_flow_class speedtest
no hidden
no dynamic
no description
name speedtest
exit
egress_flow_class streaming
no hidden
no dynamic
no description
name streaming
exit
egress_flow_class updates
no hidden
no dynamic
no description
name updates
exit
egress_flow_class voip
no hidden
no dynamic
no description
name voip
exit
egress_flow_class Youtube
no hidden
no dynamic
no description
name Youtube
exit
#
#
parameter_info internal_host_quiet_limit

exit

parameter_info model

exit

#
#
fib fib0
no parent_fib
no description
no dynamic
no permitted_hosts
no hidden
root
name fib0
exit
#
#
ingress_policy_map external1.any_ipm
no description
no dynamic
no hidden
name external1.any_ipm
ingress_policy games
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name games
reverse
ingress_flow_class games
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy other
sequence 9000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name other
reverse
ingress_flow_class other
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy speedtest
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name speedtest
reverse
ingress_flow_class speedtest
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy streaming
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name streaming
reverse
ingress_flow_class streaming
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy updates
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name updates
reverse
ingress_flow_class updates
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy voip
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name voip
reverse
ingress_flow_class voip
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy Youtube
sequence 1000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name Youtube
reverse
ingress_flow_class Youtube
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
exit
ingress_policy_map external1_ipm
no description
no dynamic
no hidden
name external1_ipm
ingress_policy games
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name games
reverse
ingress_flow_class games
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy other
sequence 9000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name other
reverse
ingress_flow_class other
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy speedtest
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name speedtest
reverse
ingress_flow_class speedtest
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy streaming
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name streaming
reverse
ingress_flow_class streaming
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy updates
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name updates
reverse
ingress_flow_class updates
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy voip
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name voip
reverse
ingress_flow_class voip
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy Youtube
sequence 1000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name Youtube
reverse
ingress_flow_class Youtube
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
exit
ingress_policy_map internal1.any_ipm
no description
no dynamic
no hidden
name internal1.any_ipm
ingress_policy games
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name games
reverse
ingress_flow_class games
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy other
sequence 9000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name other
reverse
ingress_flow_class other
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy speedtest
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name speedtest
reverse
ingress_flow_class speedtest
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy streaming
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name streaming
reverse
ingress_flow_class streaming
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy updates
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name updates
reverse
ingress_flow_class updates
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy voip
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name voip
reverse
ingress_flow_class voip
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy Youtube
sequence 1000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name Youtube
reverse
ingress_flow_class Youtube
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
exit
ingress_policy_map internal1_ipm
no description
no dynamic
no hidden
name internal1_ipm
ingress_policy games
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name games
reverse
ingress_flow_class games
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy other
sequence 9000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name other
reverse
ingress_flow_class other
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy speedtest
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name speedtest
reverse
ingress_flow_class speedtest
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy streaming
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name streaming
reverse
ingress_flow_class streaming
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy updates
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name updates
reverse
ingress_flow_class updates
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy voip
sequence 8000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name voip
reverse
ingress_flow_class voip
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
ingress_policy Youtube
sequence 1000
no dynamic
flow_rate_cap 0
no reverse_path_forward
minimum_delay 0.000
no dscp_rewrite
no postprocess
no hidden
policy_route_interface
no maximum_delay
no description
policy_route_address ::
chargeable dontcare
name Youtube
reverse
ingress_flow_class Youtube
ip_protocol_rewrite 0
no drop
enabled
fixed_rate 0
no no_police
exit
exit
#
#
condition 5M_over
no dynamic
no clearing_filter
no clear_attribute_value
no attribute_value
object_class interface
severity minor
script
delay 00:00:05.000
no hidden
no description
no name_filter
clearing_script
no mail_subject
no groups
no mail_address
no mail_body
no attribute_name
name 5M_over
clear_delay 00:00:01.000
no enabled
filter name=internal1,transmit_rate>500|receive_rate>500
no trap
no restore_attribute_value
exit
condition 90M_over
no dynamic
clearing_filter rate<90000
no clear_attribute_value
no attribute_value
object_class interface
severity minor
script
delay 00:01:00.000
no hidden
no description
no name_filter
clearing_script
no mail_subject
no groups
no mail_address
no mail_body
no attribute_name
name 90M_over
clear_delay 00:00:10.000
no enabled
filter receive_rate>90000
no trap
no restore_attribute_value
exit
condition Total_Rate_Monitorintg
no dynamic
no clearing_filter
no clear_attribute_value
no attribute_value
object_class application
severity minor
script
delay 00:00:30.000
no hidden
no description
no name_filter
clearing_script
mail_subject Application Total Rate exceeded 90Mbps
no groups
mail_address taks@w-ins.net
mail_body Application Total Rate exceeded 90Mbps
no attribute_name
name Total_Rate_Monitorintg
clear_delay 00:01:00.000
no enabled
filter total_rate>90000
no trap
no restore_attribute_value
exit
#
#
interface external1
no secondary_addresses
ingress_policy_map external1_ipm
no dynamic
unmatched_efc
outer_interface
no secondary_peer
dhcp_subnet 0.0.0.0/0
no port_forwarders
proxy_arp
requested_direction external
dhcp_default_gw 0.0.0.0
shaper_margin 10.0
rate 500000
state enabled
fib fib0
dhcp_low_range 0.0.0.0
no default_ipv4_gateway
no address_pools
no hidden
type ethernet
parent_efc
no description
dhcp_default_lease_time 00:00:00.000
primary_address ::/0
peer internal1
dhcp_broadcast_addr 0.0.0.0
no control_peak
name external1
shaped
arp_timeout 00:00:00.000
lag_interface
no dhcp_enabled
dhcp_max_lease_time 00:00:00.000
egress_policy_map external1_epm
dhcp_hi_range 0.0.0.0
no flash_led
exit
interface external1.any
no secondary_addresses
ingress_policy_map external1.any_ipm
no dynamic
outer_interface external1
no secondary_peer
dhcp_subnet 0.0.0.0/0
no port_forwarders
proxy_arp
requested_direction external
dhcp_default_gw 0.0.0.0
shaper_margin 10.0
rate 500000
state enabled
fib fib0
dhcp_low_range 0.0.0.0
no default_ipv4_gateway
no address_pools
no hidden
type vlan
parent_efc
unmatched_efc
no description
dhcp_default_lease_time 00:00:00.000
primary_address ::/0
peer internal1.any
dhcp_broadcast_addr 0.0.0.0
no control_peak
name external1.any
shaped
arp_timeout 00:00:00.000
lag_interface
no dhcp_enabled
dhcp_max_lease_time 00:00:00.000
egress_policy_map external1.any_epm
dhcp_hi_range 0.0.0.0
no flash_led
exit
interface internal1
no secondary_addresses
ingress_policy_map internal1_ipm
no dynamic
unmatched_efc
outer_interface
no secondary_peer
dhcp_subnet 0.0.0.0/0
no port_forwarders
proxy_arp
requested_direction internal
dhcp_default_gw 0.0.0.0
shaper_margin 10.0
rate 500000
state enabled
fib fib0
dhcp_low_range 0.0.0.0
no default_ipv4_gateway
no address_pools
no hidden
type ethernet
parent_efc
no description
dhcp_default_lease_time 00:00:00.000
primary_address ::/0
peer external1
dhcp_broadcast_addr 0.0.0.0
no control_peak
name internal1
shaped
arp_timeout 00:00:00.000
lag_interface
no dhcp_enabled
dhcp_max_lease_time 00:00:00.000
egress_policy_map internal1_epm
dhcp_hi_range 0.0.0.0
no flash_led
exit
interface internal1.any
no secondary_addresses
ingress_policy_map internal1.any_ipm
no dynamic
outer_interface internal1
no secondary_peer
dhcp_subnet 0.0.0.0/0
no port_forwarders
proxy_arp
requested_direction internal
dhcp_default_gw 0.0.0.0
shaper_margin 10.0
rate 500000
state enabled
fib fib0
dhcp_low_range 0.0.0.0
no default_ipv4_gateway
no address_pools
no hidden
type vlan
parent_efc
unmatched_efc
no description
dhcp_default_lease_time 00:00:00.000
primary_address ::/0
peer external1.any
dhcp_broadcast_addr 0.0.0.0
no control_peak
name internal1.any
shaped
arp_timeout 00:00:00.000
lag_interface
no dhcp_enabled
dhcp_max_lease_time 00:00:00.000
egress_policy_map internal1.any_epm
dhcp_hi_range 0.0.0.0
no flash_led
exit
#
#
administrator admin
encrypted_password $5$LBLoJGFsTPCf$ucn5TXXMFfMz.IkZtsT9EV/CKXihes1.Qw/pNMdSQ3B
no description
no dynamic
enabled
privilege superuser
no hidden
name admin
exit
administrator FlowCommand
encrypted_password $5$JUV7L/f1T4Y$Pq88P9JaDQN/0ei.vi6LH4rpE9SMHW2EfuKyAcI4q02
no description
no dynamic
enabled
privilege monitor
no hidden
name FlowCommand
exit
administrator sbbaek
encrypted_password $5$B5P5XoWFL4$Fg3pM7xmrS31UPouJZsbZ1Oq4EuzNG.AUb9DL0DrKg4
no description
no dynamic
enabled
privilege superuser
no hidden
name sbbaek
exit
#
#
application youtube
no track_in_history
priority 10000
no short_lived
protocol youtube
no description
no stop_dpi
no drop
no dynamic
server youtube%e|googlevideo.com|googlevideo.c|googlevideo.co
chargeable dontcare
track_users
no location
groups streaming
map_location
no hidden
no ports
no postprocess
name youtube
exit
#
#
group games
no nested_groups
no description
no dynamic
no track_in_history
no hidden
type app
name games
exit
group p2p
no nested_groups
no description
no dynamic
no track_in_history
no hidden
type app
name p2p
exit
group speedtest
no nested_groups
no description
no dynamic
no track_in_history
no hidden
type app
name speedtest
exit
group streaming
no nested_groups
no description
no dynamic
no track_in_history
no hidden
type app
name streaming
exit
group updates
no nested_groups
no description
no dynamic
no track_in_history
no hidden
type app
name updates
exit
group voip
no nested_groups
no description
no dynamic
no track_in_history
no hidden
type app
name voip
exit
#
#
script USER_LISTENER
no interval
no description
no persistent
file_name user_listener.py
no dynamic
no argument
no days
no start_times
no end_time
directory /etc/stmfiles/files/scripts
no hidden
run_on_boot
name USER_LISTENER
exit
#
#
user User-10.10.100.35
description tak
no dynamic
chargeable_bytes_base 0
quota 0
no track_in_history
no location
no groups
map_location
no hidden
name User-10.10.100.35
exit
#
#
acl Youtube
no subnets
no description
no dynamic
no hidden
no ports
name Youtube
exit
#
#
policy games
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
no host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 8000
no maximum_rate
priority high
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
groups games
percent_mir 0.0
minimum_distress 0
no minimum_rate
name games
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 0.0
burst_threshold 30
attach_to_rate_plan
exit
policy other
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 9000
no maximum_rate
priority normal
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
no groups
percent_mir 0.0
minimum_distress 0
no minimum_rate
name other
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 0.0
burst_threshold 30
attach_to_rate_plan
exit
policy p2p
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 8000
no maximum_rate
priority normal
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
groups p2p
percent_mir 0.0
minimum_distress 0
no minimum_rate
name p2p
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 0.0
burst_threshold 30
attach_to_rate_plan
exit
policy speedtest
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
no host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 8000
no maximum_rate
priority override
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
groups speedtest
percent_mir 0.0
minimum_distress 0
no minimum_rate
name speedtest
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 0.0
burst_threshold 30
attach_to_rate_plan
exit
policy streaming
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
no host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 8000
no maximum_rate
priority high
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
groups streaming
percent_mir 0.0
minimum_distress 0
no minimum_rate
name streaming
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 30.0
burst_threshold 30
attach_to_rate_plan
exit
policy updates
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
no host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 8000
no maximum_rate
priority background
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
groups updates
percent_mir 0.0
minimum_distress 0
no minimum_rate
name updates
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 0.0
burst_threshold 30
attach_to_rate_plan
exit
policy voip
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
no host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 8000
no maximum_rate
priority high
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
no applications
no shaped
groups voip
percent_mir 0.0
minimum_distress 0
no minimum_rate
name voip
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 10.0
burst_threshold 30
attach_to_rate_plan
exit
policy Youtube
geolocation
shared_partition
chargeable dontcare
no next_hop_ases
upstream_cir 0
downstream_mir 0
no dynamic
flow_rate_cap 0
no maximum_packets
no maximum_total_bytes
no excluded_groups
acl
host_downstream_mir 0
downstream_cir 0
no minimum_duration
no host_equalisation
no maximum_delay
shaper_margin 10.0
minimum_delay 0.000
sequence 1000
no maximum_rate
priority normal
no final_ases
no dscp_rewrite
no minimum_total_bytes
no hidden
no maximum_duration
initial_rate_plan
no ports
no subnets
policy_route_interface
host_upstream_cir 0
no description
parent
attach_to_tunnel
no rate_multiplier
attach_to_interface
applications youtube
no shaped
no groups
percent_mir 0.0
minimum_distress 0
no minimum_rate
name Youtube
policy_route_address ::
no threat_level
no minimum_packets
no drop
enabled
host_downstream_cir 0
host_upstream_mir 0
attach_to_access_point
top_host dontcare
no reputation
upstream_mir 0
no threat_types
percent_cir 0.0
burst_threshold 30
attach_to_rate_plan
exit
stm1wins#

 

 

반응형
반응형

Configuration for SRX

root# show |no-more 
system {
     root-authentication {
        encrypted-password “$ABC123"; ## SECRET-DATA
    }
    services {
        ssh;
        telnet;
        }
    syslog {
        archive size 100k files 3;
        user * {
            any emergency;
        }
        file messages {
            any critical;
            authorization info;
        }
        file interactive-commands {
            interactive-commands error;
        }
    }
}
interfaces {
    ge-0/0/0 {
        unit 0 {
            family inet {
                address 100.1.1.2/24;
            }
        }
    }
    ge-0/0/1 {
        unit 0 {
           family inet {
                address 192.168.2.1/24;
            }
        }
    }
    
}
routing-options {
    static {
        route 0.0.0.0/0 next-hop 100.1.1.1;
    }
}

security {
    ike {
        proposal ike-phase1-proposal {
            authentication-method pre-shared-keys;
            dh-group group2;
            authentication-algorithm sha1;
            encryption-algorithm 3des-cbc;
            lifetime-seconds 86400;
        }
        policy ike-phase1-policy {
            mode main;
            proposals ike-phase1-proposal;
            pre-shared-key ascii-text “$ABC123"; ## SECRET-DATA
        }
        gateway gw-chicago {
            ike-policy ike-phase1-policy;
            address 100.1.1.1;
            external-interface ge-0/0/0.0;
        }
    }
    ipsec {
        proposal ipsec-phase2-proposal {
            protocol esp;
            authentication-algorithm hmac-md5-96;
            encryption-algorithm des-cbc;
            lifetime-seconds 28800;
        }
        policy ipsec-phase2-policy {
            perfect-forward-secrecy {
                keys group2;
            }
            proposals ipsec-phase2-proposal;
        }
        vpn ike-vpn-chicago {
            ike {
                gateway gw-chicago;
                ipsec-policy ipsec-phase2-policy;
            }
            establish-tunnels immediately;
        }
        
    }
    policies {
        from-zone trust to-zone untrust {
           policy vpn-tr-untr {
                match {
                    source-address sunnyvale;
                    destination-address chicago;
                    application any;
                }
                then {
                    permit {
                        tunnel {
                            ipsec-vpn ike-vpn-chicago;
                        }
                    }
                }
            }
            
        }
        from-zone untrust to-zone trust {
            policy vpn-untr-tr {
                match {
                    source-address chicago;
                    destination-address sunnyvale;
                    application any;
                }
                then {
                    permit {
                        tunnel {
                            ipsec-vpn ike-vpn-chicago;
                        }
                    }
                }
            }
            
    }
    zones {
        security-zone trust {
            address-book {
                address sunnyvale 192.168.2.0/24;
               
           }
            host-inbound-traffic {
                system-services {
                    all;
                }
            }
            interfaces {
                ge-0/0/1.0;
            }
        }
        security-zone untrust {
            address-book {
                address chicago 192.168.1.0/24;
            }
            host-inbound-traffic {
                system-services {
                    ike;
                }
            }
            interfaces {
                ge-0/0/0.0;
            }
        }
    }

}

VPN Configuration for Cisco ASA

(Only VPN related config included)
Interface Configuration: 
------------------------------------------------------------------------------------------------------------------

!
interface GigabitEthernet0
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 

!
interface GigabitEthernet1
 nameif outside
 security-level 0
 ip address 100.1.1.1 255.255.255.0 
!

Policy Configuration :   ------------------------------------------------------------------------------------------------------------------
access-list s2s extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 

IPSEC/IKE Configuration :
-----------------------------------------------------------------------------------------------------------------
crypto ipsec ikev1 transform-set CISCO esp-des esp-md5-hmac 
crypto map outside_map 20 match address s2s
crypto map outside_map 20 set pfs 
crypto map outside_map 20 set peer 100.1.1.2 
crypto map outside_map 20 set ikev1 transform-set CISCO
crypto map outside_map 20 set security-association lifetime seconds 28800
crypto map outside_map interface outside
crypto isakmp identity address 
no crypto isakmp nat-traversal
crypto ikev1 enable outside
crypto ikev1 policy 20
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400

tunnel-group 100.1.1.2 type ipsec-l2l
tunnel-group 100.1.1.2 ipsec-attributes
ikev1 pre-shared-key *****


Verification of VPN connection
SRX:

root> show security ike sa                        
Index   State  Initiator cookie  Responder cookie  Mode           Remote Address   
778322  UP     8858011cc0881359  e5ecd6302f0306b0  Main           100.1.1.1       

root> show security ipsec sa  
  Total active tunnels: 1
  ID    Algorithm       SPI      Life:sec/kb  Mon vsys Port  Gateway   
  <131073 ESP:des/ md5  fb0a0946 28765/unlim   -   root 500   100.1.1.1       
  >131073 ESP:des/ md5  11f6197b 28765/unlim   -   root 500   100.1.1.1       

root> show security ipsec sa detail                            
  ID: 131073 Virtual-system: root, VPN Name: ike-vpn-chicago
  Local Gateway: 100.1.1.2, Remote Gateway: 100.1.1.1
  Local Identity: ipv4_subnet(any:0,[0..7]=192.168.2.0/24)
  Remote Identity: ipv4_subnet(any:0,[0..7]=192.168.1.0/24)
  Version: IKEv1
    DF-bit: clear
    Policy Name:vpn-tr-untr

    Direction: inbound, SPI: 22abf60, AUX-SPI: 0
                              , VPN Monitoring: -
    Hard lifetime: Expires in 28571 seconds
    Lifesize Remaining:  4607999 kilobytes
    Soft lifetime: Expires in 27982 seconds
    Mode: Tunnel, Type: dynamic, State: installed
    Protocol: ESP, Authentication: hmac-md5-96, Encryption: des-cbc
    Anti-replay service: counter-based enabled, Replay window size: 64

    Direction: outbound, SPI: ccb96ffb, AUX-SPI: 0
                              , VPN Monitoring: -
    Hard lifetime: Expires in 28571 seconds
    Lifesize Remaining:  4607999 kilobytes
    Soft lifetime: Expires in 27982 seconds
    Mode: Tunnel(0 0), Type: dynamic, State: installed
    Protocol: ESP, Authentication: hmac-md5-96, Encryption: des-cbc
    Anti-replay service: counter-based enabled, Replay window size: 64

root> show security ipsec statistics | no-more    
ESP Statistics:
  Encrypted bytes:          1842192
  Decrypted bytes:          1210704
  Encrypted packets:          12144
  Decrypted packets:          12144
AH Statistics:
  Input bytes:                    0
  Output bytes:                   0
  Input packets:                  0
  Output packets:                 0
Errors:
  AH authentication failures: 0, Replay errors: 0
  ESP authentication failures: 0, ESP decryption failures: 0
  Bad headers: 0, Bad trailers: 0

 

반응형
반응형

request chassis cluster failover redundancy-group

request chassis cluster failover node node-number redundancy-group redundancy-group-number
Release Information
Command introduced in Junos OS Release 9.0.

Description
For chassis cluster configurations, initiate manual failover in a redundancy group from one node to the other, which becomes the primary node, and automatically reset the priority of the group to 255. The failover stays in effect until the new primary node becomes unavailable, the threshold of the redundancy group reaches 0, or you use the request chassis cluster failover reset command.

After a manual failover, you must use the request chassis cluster failover reset command before initiating another failover.

Options
node node-number—Number of the chassis cluster node to which the redundancy group fails over.

Range: 0 or 1

redundancy-group group-number—Number of the redundancy group on which to initiate manual failover. Redundancy group 0 is a special group consisting of the two Routing Engines in the chassis cluster.

Range: 0 through 255

Required Privilege Level
maintenance

RELATED DOCUMENTATION
Initiating a Chassis Cluster Manual Redundancy Group Failover

Verifying Chassis Cluster Failover Status

List of Sample Output
request chassis cluster failover redundancy-group
Output Fields
When you enter this command, you are provided feedback on the status of your request.

Sample Output
request chassis cluster failover redundancy-group

user@host> request chassis cluster failover redundancy-group 0 node 1
content_copy zoom_out_map
{primary:node0}

user@host> request chassis cluster failover redundancy-group 0 node 1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Initiated manual failover for redundancy group 0

 

반응형
반응형

웹방화벽 동작 체크 방법

  1. 웹방화벽 게이트웨이로 접속 방법

[root@WIM ~]# ssh wig1 # 웹방화벽 게이트웨이로 접속

(1번 wig1 or 10.1.1.100 2번 wig2 or 10.1.2.100)

root@wig1's password: # root03 입니다.

  1. 체크 스크립트 항목별 설명

[root@WIG1 ~]# cd # 어떤 경로에 위치하더라도 스크립트의 경로로 이동

[root@WIG1 ~]# ./regular_check.sh

ENTER키 치면 한 개씩 항목이 실행되어 경과가 나타납니다.

WI Model : 2030BF # 장비 모델명을 나타냅니다.

eth0 MAC Address : 00:10:F3:0F:BC:1E

장비 eth0 맥어드레스이며 라이선스 갱신시 필요한 값

Gateway License : This is unlimited license for

게이트웨이 동작 라이선스상태

WIG version: 2.1.16_6 # 게이트웨이 펌웨어 버전

HTTP(s) Gateway : OK (Listen Port 8001 80 8080)

                    # 웹방화벽 엔진 상태 및 감시 포트 정보 

Log Agent : OK

                    # 매니저로 로그를 전송을 담당하는 Agent 

Policy Agent : OK

                    # 서버에 적용시 정책을 내려받아 적용하는 Agent 

System Monitoring : OK

                    # 웹방화벽 게이트웨이의 동작 상태를 감시하는 Agent 

Docfilter : OK

                    # 개인정보관련 Agent 

Lan Bypass : OK

                    # Bypass TAB의 동작 상태 

Interface status # 인터페이스에서 처리하는 트래픽양이며 ONE-ARMED에서는 SERVER 포트는 0

Client Device

eth6: rx/tx 4582/4582 Kbps, 737/740 pps

Server Device

eth6: rx/tx 0/0 Kbps, 0/0 pps

CLIENT PORT : eth6 # 인터페이스의 LINK상태

Settings for eth6:

Speed: 1000Mb/s

Duplex: Full

Port: FIBRE

Auto-negotiation: on

Link detected: yes

SERVER PORT: eth6 # 인터페이스 LINK 상태

Settings for eth6:

Speed: 1000Mb/s

Duplex: Full

Port: FIBRE

Auto-negotiation: on

Link detected: yes

CLIENT PORT : eth6 # 인터페이스 관련 Count 값 확인

      RX packets:423616900 errors:0 dropped:0 overruns:0 frame:0 

      TX packets:338826150 errors:0 dropped:0 overruns:0 carrier:0 

      collisions:0 txqueuelen:1000  

      Base address:0xaf00 Memory:fdca0000-fdcc0000  

SERVER PORT: eth6 # 인터페이스 관련 Count 값 확인

RX packets:423616900 errors:0 dropped:0 overruns:0 frame:0

      TX packets:338826150 errors:0 dropped:0 overruns:0 carrier:0 

      collisions:0 txqueuelen:1000  

      Base address:0xaf00 Memory:fdca0000-fdcc0000  

Httpgw Process Status #웹방화벽 엔진이 두개 떠있는지 확인

root 28135 1 0 Jan18 ? 00:00:00 /wig/bin/httpgw

root 28136 28135 5 Jan18 ? 00:47:28 /wig/bin/httpgw

Fail Open Mode : ENABLE # Bypass 모듈의 활성화 상태

WIG Uptime : 08:43:12 up 51 days, 22:36, 1 user, load average: 0.02, 0.03, 0.00

                         # 장비의 지속동작 상태 확인 

Web Server List # 웹방화벽이 처리할 서버 정보 리스트

0.0.0.0 - 255.255.255.255:8001

0.0.0.0 - 255.255.255.255:8080

0.0.0.0 - 255.255.255.255:80

registered server: count 3

Bypass IP Address Count=7 # 바이패스할 IP 리스트

   166.104.117.75 - 166.104.117.75 

   166.104.117.77 - 166.104.117.77 

   121.138.193.186 - 121.138.193.186 

   166.104.157.92 - 166.104.157.92 

   166.104.27.1 - 166.104.27.254 

   166.104.177.1 - 166.104.177.254 

   166.104.96.1 - 166.104.96.254 

[root@WIG1 ~]#

  1. 각 항목별 긴급 대응 방안

웹방화벽 게이트웨이로 접속이 안되는 경우

-. 게이트웨이가 전원ON 상태 인지 확인

( 전원이 ON되지 않는 경우 파워 또는 보드 장애로 예상됨) 

-. 매니저와 게이트웨이간 케이블이 정상적으로 연결되었는지 확인

(LINK상태 및 정확한 포트간 연결 다른 포트에 연결되었거나 케이블 불량 예상)

-. 게이트웨이LCD 창의 메시지의 내용 변화가 있는지 확인

(멈춰있는 경우 다운 상태이므로 강제 재부팅)

eth0 의 MAC이 변화한 경우

-. 게이트웨이의 eth0가 물리적인 장애인 상태에서 재부팅 되면 eth1이 eth0가 되어

변화할 수 있으며 장비 교체 필요함

-. 게이트웨이 동작 라이선스 재발급 요청

게이트웨이 펌웨어 정보 확인

HTTP(s) Gateway 가 Not OK인 경우

[root@WIG1 ~]# killall httpgw 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_httpgw.sh

[root@WIG1 ~]# /wig/bin/process_status.sh 로 다시 동작 상태 확인

Log Agent 가 Not OK인 경우

[root@WIG1 ~]# killall log_agent 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_prog.sh log_agent -p WI -d DL_NONE

[root@WIG1 ~]# /wig/bin/process_status.sh 로 다시 동작 상태 확인

Policy Agent 가 Not OK인 경우

[root@WIG1 ~]# killall policy_agent 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_prog.sh policy_agent DL_NONE

[root@WIG1 ~]# /wig/bin/process_status.sh 로 다시 동작 상태 확인

System Monitoring 가 Not OK인 경우

[root@WIG1 ~]# killall sys_mon 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_prog.sh sys_mon -p WI -d DL_NONE

[root@WIG1 ~]# /wig/bin/process_status.sh 로 다시 동작 상태 확인

Docfilter 가 Not OK인 경우

[root@WIG1 ~]# killall docfilter 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_prog.sh docfilter DL_NONE

[root@WIG1 ~]# /wig/bin/process_status.sh 로 다시 동작 상태 확인

Lan Bypass 가 Not OK인 경우

[root@WIG1 ~]# killall lan_bypass 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_prog.sh lan_bypass DL_NONE

[root@WIG1 ~]# /wig/bin/process_status.sh 로 다시 동작 상태 확인

Interface status

인터페이스에서 처리하는 트래픽양이 나타나며

ONE-ARMED에서는 SERVER 포트의 값은 O으로 나타납니다.

CLIENT포트도 0 인 경우 케이블 Link 상태 또는 L4에서 트래픽이 정상적으로 보내주고 있는지 확인 필요.

CLIENT PORT : eth6

Duplex: Full -> Half 로 나오는 경우 연결된 장비간 설정값을 확인하여 동일한 방식으로 맞춰야 합니다.

Link detected: yes -> no로 나타나는 경우 케이블이 정상적으로 연결되지 않은 상태 입니다.

                      케이블의 양단이 모두 정상적으로 연결되었는지 확인이 필요합니다. 

CLIENT PORT : eth6

인터페이스의 동작 count를 확인

RX packets:423616900 errors:0 dropped:0 overruns:0 frame:0

TX packets:338826150 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX errors가 증가하는 경우 : Duplex가 안맞거나 연결된 장비의 인터페이스 케이블 상태등 확인 필요

TX errors가 증가하는 경우 : 웹방화벽 인터페이스 장애로 추정

Dropped는 네트워크 방화벽 기능이 동작하는 경우 증가 합니다.

Collisions 는 Duplex가 안맞는 경우 발생할 수 있습니다.

모든 카운트는 최초 케이블 연결 또는 부팅시 일부 발생하는 경우가 있습니다.

앞으로 기존 errors,dropped,collision 카운트 값을 기록하여 관리하도록 하겠습니다.

Httpgw Process Status에서 프로세스가 두개가 아닌 경우 정상적으로 처리가 되지 않습니다.

원래 두개로 구성된 이유는 한 개는 두번째 프로세스를 체크하여 없어지면 다시 실행시켜주는 역할이며 실제 웹방화벽 엔진 역할은 두번째 프로세스가 담당하게 되어 있습니다.

최근에는 두번째 프로세스가 안 떠 있는 경우는 드문 경우이며 처리방법은

[root@WIG1 ~]# killall httpgw 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_httpgw.sh

[root@WIG1 ~]# ps –ef | grep httpgw 로 다시 동작 상태 확인

WIG Uptime에서 부팅시킨 일이 없는데 카운트가 1달 이내인 경우

장비가 비정상적으로 리부팅 되거나 전원 케이블 연결등을 확인합니다.

웹방화벽 두대 모두 동일한 시각에 재부팅된 이력이 있는 경우는 외적인 요인으로

전원,UPS등 전원관련 사항을 확인해야 합니다.

1대만 리부팅 된 경우는 지속적인 모니터링이 필요한 상황으로 장비의 장애가 예상됩니다.

Web Server List가 나타나지 않는 경우

웹방화벽 매니저의 정책을 받지 못한 상황이며

[root@WIG1 ~]# killall httpgw 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_httpgw.sh

[root@WIG1 ~]# cat /proc/pdriver/opmode 로 다시 확인 합니다.

Bypass IP Address Count가 나타나지 않는 경우

[root@WIG1 ~]# killall httpgw 를 약 3회 수행

[root@WIG1 ~]# /wig/bin/restart_httpgw.sh

[root@WIG1 ~]# cat /proc/pdriver/opmode 로 다시 확인 합니다.

또는 웹UI상에서 다시 등록 적용 합니다.

위의 상황은 일반적인 상황에서의 처리 방법이며 모든 장애 유형을

상황을 모두 예측하여 기록하기에는 무리가 있습니다. 따라서 HW 오류등에 따른

예상 못한 상황도 발생할 수 있습니다.

 

 

반응형
반응형

Juniper EX4200 VLAN Configuration

http://www.juniper.net/techpubs/en_US/junos11.4/topics/task/configuration/bridging-vlans-ex-series-cli.html

Configuring VLANs for EX Series Switches (CLI Procedure)
EX Series switches use VLANs to make logical groupings of network nodes with their own broadcast domains. VLANs limit the traffic flowing across the entire LAN and reduce collisions and packet retransmissions.
Why Create a VLAN?Create a VLAN Using the Minimum ProcedureCreate a VLAN Using All of the OptionsConfiguration Guidelines for VLANs
Why Create a VLAN?
Some reasons to create VLANs are:
A LAN has more than 200 devices.A LAN has a lot of broadcast traffic.A group of clients requires that a higher-than-average level of security be applied to traffic entering or exiting the group's devices.A group of clients requires that the group's devices receive less broadcast traffic than they are currently receiving, so that data speed across the group is increased.
Create a VLAN Using the Minimum Procedure
Two steps are required to create a VLAN:
Uniquely identify the VLAN. You do this by assigning either a name or an ID (or both) to the VLAN. When you assign just a VLAN name, an ID is generated by Junos OS.Assign at least one switch port interface to the VLAN for communication. All interfaces in a single VLAN are in a single broadcast domain, even if the interfaces are on different switches. You can assign traffic on any switch to a particular VLAN by referencing either the interface sending traffic or the MAC addresses of devices sending traffic.
The following example creates a VLAN using only the two required steps. The VLAN is created with the name employee-vlan. Then, three interfaces are assigned to that VLAN so that the traffic is transmitted among these interfaces.

Note: In this example, you could alternatively assign an ID number to the VLAN. The requirement is that the VLAN have a unique ID.
[edit]
set vlans employee-vlan
set interfaces ge-0/0/1 unit 0 family ethernet-switching vlan members employee-vlan
set interfaces ge-0/0/2 unit 0 family ethernet-switching vlan members employee-vlan
set interfaces ge-0/0/3 unit 0 family ethernet-switching vlan members employee-vlan
In the example, all users connected to the interfaces ge-0/0/1, ge-0/0/2, and ge-0/0/3 can communicate with each other, but not with users on other interfaces in this network. To configure communication between VLANs, you must configure a routed VLAN interface (RVI). See Configuring Routed VLAN Interfaces (CLI Procedure).
Create a VLAN Using All of the Options
To configure a VLAN, follow these steps:
In configuration mode, create the VLAN by setting the unique VLAN name:
[edit]
user@switch# set vlans vlan-nameConfigure the VLAN tag ID or VLAN ID range for the VLAN. (If you assigned a VLAN name, you do not have to do this, because a VLAN ID is assigned automatically, thereby associating the name of the VLAN to an ID number. However, if you want to control the ID numbers, you can assign both a name and an ID.)
[edit]
user@switch# set vlans vlan-name vlan-id vlan-id-number
or
[edit]
user@switch# set vlans vlan-name vlan-range (vlan-id-low) - (vlan-id-high)Assign at least one interface to the VLAN:
[edit]
user@switch# set vlans vlan-name interface interface-name

Note: You can also specify that a trunk interface is a member of all the VLANs that are configured on this switch. When a new VLAN is configured on the switch, this trunk interface automatically becomes a member of the VLAN.(Optional) Create a subnet for the VLAN because all computers that belong to a subnet are addressed with a common, identical, most-significant-bit group in their IP address. This makes it easy to identify VLAN members by their IP addresses. To create the subnet for the VLAN:
[edit interfaces]
user@switch# set vlan unit logical-unit-number family inet address ip-address(Optional) Specify the description of the VLAN:
[edit]
user@switch# set vlans vlan-name description text-description(Optional) To avoid exceeding the maximum number of members allowed in a VLAN, specify the maximum time that an entry can remain in the forwarding table before it ages out:
[edit]
user@switch# set vlans vlan-name mac-table-aging-time time(Optional) For security purposes, specify a VLAN firewall filter to be applied to incoming or outgoing packets:
[edit]
user@switch# set vlans vlan-name filter input-or-output filter-name(Optional) For accounting purposes, enable a counter to track the number of times this VLAN is accessed:
[edit]
user@switch# set vlans vlan-name l3-interface ingress-counting l3-interface-nameConfiguration Guidelines for VLANs
Two steps are required to create a VLAN. You must uniquely identify the VLAN and you must assign at least one switch port interface to the VLAN for communication.
After creating a VLAN, all users all users connected to the interfaces assigned to the VLAN can communicate with each other but not with users on other interfaces in the network. To configure communication between VLANs, you must configure a routed VLAN interface (RVI). See Configuring Routed VLAN Interfaces (CLI Procedure) to create an RVI.
The number of VLANs supported per switch varies for each switch type. Use the command set vlans id vlan-id ? to discover the maximum number of VLANs allowed on a switch. You cannot exceed this VLAN limit because each VLAN is assigned an ID number when it is created. You can, however, exceed the recommended VLAN member maximum . To determine the maximum number of VLAN members allowed on a switch, multiply the VLAN maximum obtained using set vlans id vlan-id ? times 8.
If a switch configuration exceeds the recommended VLAN member maximum, you see a warning message when you commit the configuration. If you ignore the warning and commit such a configuration, the configuration succeeds but you run the risk of crashing the Ethernet switching process (eswd) due to memory allocation failure.
Published: 2011-11-04

 

 

반응형

'업무이야기 > Network' 카테고리의 다른 글

Juniper Troubleshooting Commands  (0) 2021.03.29
Juniper request chassis cluster failover redundancy-group  (0) 2021.03.16
Juniper EX S/W Factory Reset  (0) 2021.01.25
Alteon-5208 Default Config  (0) 2021.01.20
Aruba AP CLI  (0) 2021.01.17

+ Recent posts