display current-configuration !Software Version V200R003C00SPC300 # sysname Donzhi2_core # FTP server enable # vlan batch 60 62 100 to 103 105 to 109 115 137 200 # stp mode stp stp instance 0 root primary stp bpdu-protection stp disable # lldp enable # undo nap slave enable # clock timezone bj add 08:00:00 # observe-port 2 interface GigabitEthernet0/0/22 # dhcp enable # dhcp snooping enable user-bind static ip-address 192.168.109.249 mac-address bc46-99f6-0126 vlan 109 # bfd # acl number 3001 rule 1 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.100.0 0.0.0 .255 rule 2 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.53 0 rule 3 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.104.0 0.0.0 .255 rule 4 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.0 0.0.0. 255 rule 5 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.125 0 rule 6 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.241 0 rule 7 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.253 0 rule 8 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.250 0 rule 9 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.106.254 0 rule 10 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.88.0 0.0.0 .255 rule 11 permit ip source 192.168.106.227 0 destination 192.168.105.12 0 rule 12 permit ip so urce 192.168.106.140 0 destination 192.168.107.12 0 rule 13 permit ip source 192.168.106.227 0 destination 192.168.10.210 0 rule 14 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.103 0 rule 15 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.23 0 rule 16 permit ip source 192.168.10.18 0 destination 192.168.100.0 0.0.0.255 rule 17 permit ip source 192.168.106.99 0 destination 192.168.10.18 0 rule 18 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.160 0 rule 19 permit ip source 192.168.106.99 0 destination 192.168.10.111 0 rule 19 permit ip source 192.168.106.99 0 destination 192.168.10.111 0 rule 20 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.2 0 rule 21 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.1 0 rule 22 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.24 0 rule 23 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.101 0 rule 24 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.247 0 rule 25 permit ip source 192.168.106.0 0.0.0.255 destination 10.100.4.10 0 rule 26 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.100 0 rule 27 permit ip source 192.168.106.218 0 destination 192.168.10.139 0 rule 28 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.198.0 0.0. .255 rule 29 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.20.251 0 rule 30 permit ip source 192.168.106.217 0 destination 192.168.10.0 0.0.0.255 rule 31 permit ip source 192.168.105.0 0.0.0.255 destination 192.168.198.0 0.0. .255 rule 32 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.18.0 0.0.0 255 rule 33 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.80.0 0.0.0 255 rule 34 permit ip source 192.168.106.197 0 rule 35 permit ip source 192.168.106.10 0 destination 192.168.0.0 0.0.255.255 rule 36 permit ip source 192.168.106.100 0 destination 192.168.0.0 0.0.255.255 rule 37 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.0.252 0 rule 38 permit ip source 192.168.106.243 0 destination 192.168.0.0 0.0.255.255 rule 39 permit ip source 192.168.106.124 0 destination 192.168.10.0 0.0.0.255 rule 40 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.180 0 rule 41 permit ip source 192.168.106.247 0 destination 192.168.0.0 0.0.255.255 rule 42 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.19 0 rule 43 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.105.0 0.0. .255 rule 44 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.158 0 rule 45 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.253 0 rule 46 permit ip source 192.168.106.198 0 rule 47 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.245 0 rule 48 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.202 0 rule 49 permit ip source 192.168.106.188 0 destination 192.168.71.0 0.0.0.255 rule 50 permit ip source 192.168.106.125 0 destination 192.168.10.0 0.0.0.255 rule 51 permit ip source 192.168.106.9 0 destination 192.168.10.0 0.0.0.255 rule 54 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.106.0 0.0. .255 rule 55 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.45 0 rule 56 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.10.27 0 rule 57 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.109.0 0.0. .255 rule 58 permit ip source 192.168.106.188 0 destination 192.168.0.0 0.0.255.255 rule 59 permit ip source 192.168.106.96 0 destination 192.168.107.0 0.0.0.255 rule 60 permit ip source 192.168.106.210 0 destination 192.168.10.160 0 rule 61 permit ip source 192.168.106.174 0 destination 192.168.0.91 0 rule 62 permit ip source 192.168.106.221 0 destination 192.168.10.0 0.0.0.255 rule 63 permit ip source 192.168.10.140 0 destination 192.168.10.0 0.0.0.255 rule 64 permit ip source 192.168.106.99 0 destination 192.168.0.0 0.0.255.255 rule 65 permit ip source 192.168.106.192 0 destination 192.168.10.0 0.0.0.255 rule 66 permit ip source 192.168.106.10 0 rule 67 permit ip source 192.168.106.114 0 destination 192.168.0.0 0.0.255.255 rule 68 permit ip source 192.168.106.205 0 destination 192.168.0.0 0.0.255.255 rule 69 permit ip source 192.168.106.114 0 destination 172.16.0.0 0.0.255.255 rule 70 permit ip source 192.168.106.103 0 destination 192.168.0.0 0.0.0.255 rule 72 permit ip source 192.168.106.92 0 destination 192.168.0.0 0.0.0.255 rule 73 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.101.232 0 rule 74 permit ip source 192.168.106.96 0 destination 192.168.101.0 0.0.0.255 rule 75 permit ip source 192.168.106.252 0 destination 192.168.0.0 0.0.255.255 rule 80 permit ip source 192.168.106.100 0 destination 192.168.100.0 0.0.0.255 rule 81 permit ip source 192.168.106.199 0 destination 192.168.10.0 0.0.0.255 rule 82 permit ip source 192.168.106.124 0 rule 83 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.177.0 0.0. .255 rule 84 permit ip source 192.168.106.0 0.0.0.255 destination 192.168.15.241 0 rule 85 permit ip source 192.168.106.101 0 destination 192.168.0.0 0.0.255.255 rule 86 permit ip source 192.168.106.102 0 destination 192.168.0.0 0.0.255.255 rule 100 permit ip source 192.168.106.77 0 destination 192.168.0.0 0.0.255.255 rule 200 deny ip source 192.168.106.0 0.0.0.255 destination 192.168.0.0 0.0.255 255 cl number 3002 rule 1 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.100.0 0.0.0 255 rule 2 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.0.251 0 rule 3 permit ip source 192.168.107.12 0 destination 192.168.10.214 0 rule 4 permit ip source 192.168.107.12 0 destination 192.168.106.227 0 rule 5 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.10.19 0 rule 6 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.0.19 0 rule 8 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.7.250 0 rule 9 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.0.18 0 rule 10 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.7.251 0 rule 11 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.7.252 0 rule 12 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.8.228 0 rule 13 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.9.254 0 rule 14 permit ip source 192.168.107.0 0.0.0.255 destination 192.168.10.160 0 rule 15 permit ip source 192.168.106.216 0 destination 192.168.20.251 0 rule 17 permit ip source 192.168.107.208 0 destination 192.168.0.1 0 rule 21 permit ip source 192.168.107.246 0 destination 192.168.106.241 0 rule 22 permit ip source 192.168.107.216 0 destination 192.168.0.0 0.0.0.255 rule 25 permit ip source 192.168.106.241 0 destination 192.168.0.0 0.0.0.255 cl number 3003 rule 5 permit icmp source 192.168.60.2 0 destination 192.168.60.1 0 rule 10 permit icmp source 192.168.60.1 0 destination 192.168.60.2 0 cl number 3004 rule 4 deny ip source 192.168.100.137 0 destination 192.168.106.0 0.0.0.255 rule 5 deny ip source 192.168.100.138 0 destination 192.168.106.0 0.0.0.255 rule 6 deny ip source 192.168.100.138 0 destination 192.168.105.0 0.0.0.255 rule 7 deny ip source 192.168.100.137 0 destination 192.168.105.0 0.0.0.255 cl number 3005 rule 50 permit ip source 192.168.108.0 0.0.0.255 # acl number 3006 rule 1 permit ip source 192.168.109.249 0 destination 192.168.100.100 0 rule 2 permit ip source 192.168.109.249 0 destination 192.168.0.1 0 rule 3 permit ip source 192.168.109.249 0 destination 192.168.0.24 0 rule 4 permit ip source 192.168.109.249 0 destination 192.168.18.18 0 rule 5 permit ip source 192.168.109.249 0 destination 192.168.18.19 0 rule 6 permit ip source 192.168.109.249 0 destination 192.168.100.18 0 rule 7 permit ip source 192.168.109.249 0 destination 192.168.100.19 0 rule 8 permit ip source 192.168.109.249 0 destination 192.168.100.22 0 rule 9 permit ip source 192.168.109.249 0 destination 192.168.100.107 0 rule 10 permit ip source 192.168.109.249 0 destination 192.168.100.14 0 rule 100 deny ip source 192.168.109.249 0 # acl number 3007 rule 1 permit ip source 192.168.100.28 0 rule 2 permit ip source 192.168.100.23 0 # acl number 3008 rule 1 permit ip source 192.168.106.243 0 rule 2 permit ip source 192.168.106.133 0 rule 3 permit ip source 192.168.106.197 0 # acl number 3009 rule 1 permit ip source 192.168.101.0 0.0.0.255 destination 192.168.100.0 0.0.0 .255 rule 2 permit ip source 192.168.101.0 0.0.0.255 destination 192.168.0.0 0.0.0.2 55 rule 3 permit ip source 192.168.101.0 0.0.0.255 destination 192.168.10.160 0 rule 4 permit ip source 192.168.101.0 0.0.0.255 destination 192.168.177.0 0.0.0 .255 rule 5 permit ip source 192.168.101.232 0 rule 6 permit ip source 192.168.101.0 0.0.0.255 destination 192.168.101.254 0 rule 200 deny ip source 192.168.101.0 0.0.0.255 destination 192.168.0.0 0.0.255 .255 rule 201 deny ip source 192.168.101.0 0.0.0.255 destination 172.0.0.0 0.16.255. 255 rule 202 deny ip source 192.168.101.0 0.0.0.255 destination 10.0.0.0 0.255.255. 255 # acl number 3307 # acl number 5001 # traffic classifier 1fsafe operator and if-match acl 3006 traffic classifier 6f3001 operator and if-match acl 3001 traffic classifier 6f3002 operator and if-match acl 3002 traffic classifier deny101 operator and if-match acl 3009 traffic classifier jinzhi operator and if-match acl 3004 traffic classifier ping operator and if-match acl 3003 traffic classifier redirct100 operator and if-match acl 3007 traffic classifier testred operator and if-match acl 3008 # traffic behavior 1Fsafe permit traffic behavior 6f3001 permit traffic behavior 6f3002 permit traffic behavior permit permit traffic behavior ping statistic enable traffic behavior testbeb redirect ip-nexthop 192.168.60.1 traffic behavior xl002 deny # traffic policy 1fsafe classifier 1fsafe behavior 1Fsafe traffic policy 6f3001 deny # traffic policy 1fsafe classifier 1fsafe behavior 1Fsafe traffic policy 6f3001 classifier 6f3001 behavior 6f3001 traffic policy 6f3002 classifier 6f3002 behavior 6f3002 traffic policy deny101 classifier deny101 behavior permit traffic policy jinzhi classifier jinzhi behavior xl002 traffic policy ping classifier ping behavior ping traffic policy redirct100 classifier redirct100 behavior testbeb traffic policy testredirect classifier testred behavior testbeb # vlan 60 description <--yidong_zhuanxian--> vlan 100 traffic-policy jinzhi inbound vlan 101 traffic-policy deny101 outbound vlan 106 traffic-policy 6f3001 inbound vlan 107 traffic-policy 6f3002 inbound # ip pool vlan1 gateway-list 192.168.100.100 network 192.168.100.0 mask 255.255.255.0 excluded-ip-address 192.168.100.11 192.168.100.12 excluded-ip-address 192.168.100.18 192.168.100.26 excluded-ip-address 192.168.100.91 192.168.100.95 excluded-ip-address 192.168.100.104 excluded-ip-address 192.168.100.136 excluded-ip-address 192.168.100.250 192.168.100.254 lease day 999 hour 0 minute 0 dns-list 192.168.100.107 202.96.134.133 # ip pool vlan4 gateway-list 192.168.104.254 network 192.168.104.0 mask 255.255.255.0 excluded-ip-address 192.168.104.10 lease day 7 hour 0 minute 0 dns-list 192.168.100.107 202.96.134.133 # ip pool vlan106 gateway-list 192.168.106.254 network 192.168.106.0 mask 255.255.255.0 excluded-ip-address 192.168.106.1 192.168.106.30 excluded-ip-address 192.168.106.96 static-bind ip-address 192.168.106.98 mac-address 4c74-bf28-b42b excluded-ip-address 192.168.106.99 192.168.106.101 static-bind ip-address 192.168.106.197 mac-address d017-c292-d2af lease day 999 hour 0 minute 0 dns-list 192.168.100.107 202.96.134.133 # ip pool vlan107 gateway-list 192.168.107.254 network 192.168.107.0 mask 255.255.255.0 excluded-ip-address 192.168.107.1 192.168.107.20 lease day 30 hour 0 minute 0 dns-list 192.168.100.107 202.96.134.133 # ip pool vlan103 gateway-list 192.168.103.254 network 192.168.103.0 mask 255.255.255.0 excluded-ip-address 192.168.103.1 192.168.103.5 lease day 7 hour 0 minute 0 dns-list 192.168.100.107 202.96.134.133 # ip pool vlan109 gateway-list 192.168.109.254 network 192.168.109.0 mask 255.255.255.0 excluded-ip-address 192.168.109.1 192.168.109.9 excluded-ip-address 192.168.109.11 192.168.109.20 lease day 999 hour 23 minute 59 dns-list 192.168.100.107 192.168.0.101 # ip pool vlan102 gateway-list 192.168.102.254 network 192.168.102.0 mask 255.255.255.0 excluded-ip-address 192.168.102.1 192.168.102.20 lease day 30 hour 23 minute 59 dns-list 192.168.100.107 192.168.0.101 # ip pool vlan101 gateway-list 192.168.101.254 network 192.168.101.0 mask 255.255.255.0 excluded-ip-address 192.168.101.1 192.168.101.30 lease day 30 hour 0 minute 0 dns-list 192.168.100.107 192.168.0.101 # aaa authentication-scheme default authorization-scheme default accounting-scheme default domain default domain default_admin local-user admin password cipher %@%@D3CXV=1,&1uYG8,x,XWL4m6*%@%@ local-user admin privilege level 15 local-user admin ftp-directory flash: local-user admin service-type telnet terminal ftp http local-user dzadmin password cipher %@%@hRvs8GOv\@d]W/1cf@8'4lmC%@%@ local-user dzadmin privilege level 15 local-user dzadmin service-type telnet terminal ssh ftp web http # interface Vlanif1 dhcp select global # interface Vlanif60 ip address 192.168.60.2 255.255.255.0 # interface Vlanif100 ip address 192.168.100.100 255.255.255.0 dhcp select global # interface Vlanif101 ip address 192.168.101.254 255.255.255.0 dhcp select global # interface Vlanif102 ip address 192.168.102.254 255.255.255.0 dhcp select global # interface Vlanif103 ip address 192.168.103.254 255.255.255.0 dhcp select global # interface Vlanif105 # interface Vlanif106 ip address 192.168.106.254 255.255.255.0 dhcp select global # interface Vlanif107 ip address 192.168.107.254 255.255.255.0 dhcp select global # interface Vlanif108 ip address 192.168.108.254 255.255.255.0 # interface Vlanif109 ip address 192.168.109.254 255.255.255.0 dhcp select global interface Vlanif115 ip address 192.168.115.1 255.255.255.0 # interface Vlanif137 ip address 192.168.137.151 255.255.255.224 # interface Vlanif200 ip address 192.168.200.254 255.255.255.0 # interface MEth0/0/1 # interface GigabitEthernet0/0/1 description connect to DIP 3-4 line port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/2 description connect to DIP 1-2 line port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/3 description connect to 6F office port link-type access port default vlan 106 loopback-detect enable loopback-detect action block stp edged-port enable # interface GigabitEthernet0/0/4 description connect to 6f wireless test port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 dhcp snooping enable # interface GigabitEthernet0/0/5 description connect to 3F port link-type access port default vlan 109 loopback-detect enable loopback-detect action block stp edged-port enable traffic-policy 1fsafe inbound dhcp snooping enable # interface GigabitEthernet0/0/6 undo negotiation auto speed 100 description <--yidong_zhuanxian--> port link-type access port default vlan 60 stp edged-port enable traffic-policy ping inbound traffic-policy ping outbound # interface GigabitEthernet0/0/7 description connect to feita firewall port link-type access port default vlan 100 # interface GigabitEthernet0/0/8 port link-type access port default vlan 108 loopback-detect enable loopback-detect action block stp edged-port enable # interface GigabitEthernet0/0/9 port link-type access port default vlan 106 loopback-detect enable loopback-detect action block stp edged-port enable # interface GigabitEthernet0/0/10 description connect to 5f port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet0/0/11 description connect to 4f port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet0/0/12 description Connect to Server1 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 2 to 4094 stp edged-port enable traffic-policy redirct100 inbound # interface GigabitEthernet0/0/13 description connect to DIP wireless right port link-type access port default vlan 107 stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/14 port link-type access port default vlan 106 stp edged-port enable # interface GigabitEthernet0/0/15 description connect to DIP repair port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/16 description connect to 6F jinyi phone line port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/17 description connect to 6F jinyi repair port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/18 port link-type access port default vlan 107 loopback-detect enable loopback-detect action block stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/19 port link-type access port default vlan 107 stp edged-port enable port-isolate enable group 2 # interface GigabitEthernet0/0/20 port link-type access port default vlan 115 # interface GigabitEthernet0/0/21 port link-type access port default vlan 100 stp edged-port enable # interface GigabitEthernet0/0/22 description Connect to server2 port link-type trunk port trunk allow-pass vlan 2 to 4094 # interface GigabitEthernet0/0/23 description connect to 6F office port link-type access port default vlan 106 loopback-detect enable loopback-detect action block stp edged-port enable traffic-policy testredirect inbound # interface GigabitEthernet0/0/24 port link-type trunk port trunk pvid vlan 100 port trunk allow-pass vlan 2 to 4094 stp edged-port enable # interface NULL0 # bfd 1 bind peer-ip 192.168.60.1 source-ip 192.168.60.2 auto commit bfd 1 bind peer-ip 192.168.60.1 source-ip 192.168.60.2 auto commit # ip route-static 0.0.0.0 0.0.0.0 192.168.100.254 ip route-static 10.10.10.0 255.255.255.0 192.168.60.1 ip route-static 10.11.11.0 255.255.255.0 192.168.60.1 ip route-static 10.11.13.0 255.255.255.0 192.168.60.1 preference 10 ip route-static 10.100.0.0 255.255.0.0 192.168.100.253 preference 50 ip route-static 10.100.4.10 255.255.255.255 192.168.100.253 ip route-static 10.100.10.0 255.255.255.0 192.168.100.253 ip route-static 10.232.37.0 255.255.255.0 192.168.137.158 ip route-static 45.249.212.0 255.255.255.0 192.168.100.253 ip route-static 45.249.212.0 255.255.255.0 192.168.60.1 preference 50 track bfd- session 1 ip route-static 100.10.10.0 255.255.255.0 192.168.100.253 ip route-static 121.22.22.246 255.255.255.255 192.168.100.253 ip route-static 172.16.10.0 255.255.255.0 192.168.100.253 ip route-static 172.16.16.1 255.255.255.255 192.168.60.1 ip route-static 172.16.16.2 255.255.255.255 192.168.60.1 ip route-static 172.16.30.0 255.255.255.0 192.168.60.1 ip route-static 172.16.38.0 255.255.255.0 192.168.100.253 ip route-static 172.16.40.0 255.255.255.128 192.168.100.253 ip route-static 172.16.50.0 255.255.254.0 192.168.100.253 ip route-static 172.16.51.118 255.255.255.255 192.168.60.1 ip route-static 172.16.53.0 255.255.255.0 192.168.100.253 ip route-static 172.16.60.0 255.255.254.0 192.168.100.253 ip route-static 172.18.16.0 255.255.255.0 192.168.0.167 ip route-static 172.18.16.0 255.255.255.0 192.168.100.253 preference 50 ip route-static 172.19.16.1 255.255.255.255 192.168.100.253 ip route-static 172.30.44.0 255.255.255.0 192.168.137.158 ip route-static 172.30.46.0 255.255.255.0 192.168.137.158 ip route-static 172.30.48.0 255.255.255.0 192.168.137.158 ip route-static 172.30.58.38 255.255.255.255 192.168.137.158 ip route-static 192.168.0.0 255.255.255.0 192.168.100.253 ip route-static 192.168.4.0 255.255.254.0 192.168.60.1 ip route-static 192.168.6.0 255.255.255.0 192.168.60.1 ip route-static 192.168.6.62 255.255.255.255 192.168.60.1 ip route-static 192.168.6.97 255.255.255.255 192.168.60.1 ip route-static 192.168.7.0 255.255.255.0 192.168.60.1 ip route-static 192.168.7.250 255.255.255.255 192.168.60.1 ip route-static 192.168.7.251 255.255.255.255 192.168.60.1 ip route-static 192.168.7.252 255.255.255.255 192.168.60.1 ip route-static 192.168.8.228 255.255.255.255 192.168.60.1 ip route-static 192.168.9.0 255.255.255.0 192.168.60.1 ip route-static 192.168.9.254 255.255.255.255 192.168.100.253 ip route-static 192.168.10.0 255.255.255.0 192.168.100.253 preference 50 ip route-static 192.168.15.0 255.255.255.0 192.168.100.253 ip route-static 192.168.18.0 255.255.255.0 192.168.100.253 ip route-static 192.168.20.0 255.255.255.0 192.168.100.253 ip route-static 192.168.20.85 255.255.255.255 192.168.60.1 ip route-static 192.168.20.86 255.255.255.255 192.168.60.1 ip route-static 192.168.20.87 255.255.255.255 192.168.60.1 ip route-static 192.168.30.0 255.255.255.0 192.168.100.253 ip route-static 192.168.60.0 255.255.255.0 192.168.100.253 ip route-static 192.168.64.0 255.255.255.0 192.168.100.253 ip route-static 192.168.70.0 255.255.254.0 192.168.100.253 ip route-static 192.168.72.0 255.255.255.0 192.168.100.253 ip route-static 192.168.73.0 255.255.255.0 192.168.100.253 ip route-static 192.168.74.0 255.255.255.0 192.168.100.253 ip route-static 192.168.75.0 255.255.255.0 192.168.100.253 ip route-static 192.168.80.0 255.255.255.0 192.168.100.253 preference 50 ip route-static 192.168.103.0 255.255.255.0 192.168.100.104 ip route-static 192.168.104.0 255.255.255.0 192.168.100.104 ip route-static 192.168.105.0 255.255.255.0 192.168.100.105 ip route-static 192.168.137.0 255.255.255.0 192.168.137.158 ip route-static 192.168.155.224 255.255.255.224 192.168.100.253 ip route-static 192.168.177.0 255.255.255.0 192.168.100.253 ip route-static 192.168.198.0 255.255.255.0 192.168.100.253 # snmp-agent snmp-agent local-engineid 800007DB0368A82860A7C0 snmp-agent community read cipher %$%$*ZSR#5MP@*\:FP!1"Hv3bvGC`tG!Ff>HJ5#uCU/~rmK "vGFbMMS^T9}5f:Du~5!\T1;GGObv%$%$ snmp-agent community read cipher %$%$LOvf~r}n\Vj'-0T]w"P>bvGe"+eB;&[4"2$:oN'ROmi ~vGhb:(/G`qlPGqbv%$%$ snmp-agent community read cipher %$%$8#-H"kiS,Qb3@L79JT2S)$!aXci;UpUs}*yi|d'vC=4 3$!d)'Sv,/Er[~P7)*t$g2GWV!m)$%$%$ snmp-agent sys-info version all snmp-agent target-host inform address udp-domain 192.168.0.69 udp-port 161 param s securityname cipher %@%@S#.JOBcsB-#=t:)8CJ[P)%';%@%@ v2c snmp-agent target-host trap address udp-domain 192.168.100.245 udp-port 161 para ms securityname cipher %@%@l@c>X}uk6QF~a"IJ3!ZPbvJq%@%@ v2c snmp-agent trap enable # user-interface con 0 authentication-mode password set authentication password cipher %@%@.0#g(%z74I;,<3-"fpsYs8RW:G&GY0I=Q@A%i>6c v\RG8RZs%@%@ user-interface vty 0 4 authentication-mode aaa user privilege level 3 user-interface vty 16 20 # return