Table Of Contents
Detailed Full Running Configurations
Data Center
WAN
ASA-WAN-1
ASA-WAN-1_IDS
RWAN-1
RWAN-2
SWAN-1
SWAN-3
Core
RCORE-1
RCORE-2
Aggregation
ASA-DC-1
RAGG-1-RUNNING
RAGG-1-VDC1-RUNNING
RAGG-1-VDC2-RUNNING
RAGG-2-RUNNING
RAGG-2-VDC1-RUNNING
RAGG-2-VDC2-RUNNING
N1KV-1-RUNNING
VSG-TENANT-1-RUNNING
RSERV-1
RSERV-2
Access
SACCESS-1
SACCESS-2
SACCESS-3
SACCESS-4
SACCESS-5
Storage
MDS-DC-1-RUNNING
MDS-DC-2-RUNNING
Internet Edge
WAN
RIE-1
RIE-2
Converged Core/Aggregation
ASA-IE-1
DMZ-IDS-1
DMZ-ASASM
DMZ-ACE-1
DMZ-ACE-1_PCI
RIE-3
Branch
Large Branch
R-A2-LRG-1
R-A2-LRG-2
S-A2-LRG-1
S-A2-LRG-2
S-A2-LRG-3
S-A2-LRG-4
S-A2-LRG-5
Medium Branch
R-A2-MED-1
R-A2-MED-2
S-A2-MED-1
S-A2-MED-3
Small Branch
R-A2-SMALL
S-A2-SMALL
Mini Branch
R-A2-MINI-1
S-A2-MINI-1
S-A2-MINI-2
Convenience
R-A2-CONV-1
S-A2-CONV-1
Managed Service Provider
FW-A2-MSP-1
S-A2-MSP-1
Detailed Full Running Configurations
Data Center
WAN
ASA-WAN-1
domain-name cisco-irn.com
enable password <removed>
interface GigabitEthernet0/0
interface GigabitEthernet0/1
interface GigabitEthernet0/2
interface GigabitEthernet0/3
description LAN/STATE Failover Interface
interface GigabitEthernet0/4
interface GigabitEthernet0/5
interface GigabitEthernet0/6
interface GigabitEthernet0/7
ip address 192.168.11.20 255.255.255.0 standby 192.168.11.21
boot system disk0:/asa911-smp-k8.bin
boot system disk0:/asa900-129-smp-k8.bin
clock summer-time PDT recurring
dns server-group DefaultDNS
domain-name cisco-irn.com
object network AdminStation
object network AdminStation2
object network AdminStation4-bart
description EMC Network Configuration Manager
description Cisco Security Manager
object network AdminStation3
object network ActiveDirectory.cisco-irn.com
object network Stores-ALL
subnet 10.10.0.0 255.255.0.0
description all store networks
description vSphere server for Lab
object network WCSManager
description Wireless Manager
description Data Center VSOM
subnet 192.168.0.0 255.255.0.0
description All of the Data Center
object network RSA-enVision
description RSA EnVision Syslog collector and SIM
description Csico Secure ACS server for TACACS and Radius
description RSA Authentication Manager for SecureID
description HA ISE Server
description ISE server for NAC
description Windows Update Server
object network MSExchange
subnet 192.168.52.0 255.255.255.0
description POS in the Data Center
service tcp destination eq 135
service tcp destination eq 3268
object service LDAP-GC-SSL
service tcp destination eq 3269
object service Kerberos-TCP
service tcp destination eq 88
object service Microsoft-DS-SMB
service tcp destination eq 445
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
service udp destination eq 389
object service RPC-HighPorts
service tcp destination range 1024 65535
object service IP-Protocol-97
description IP protocol 97
service tcp destination eq 1080
service tcp destination eq 8080
service tcp destination eq 3389
description Windows Remote Desktop
description Cisco Prime LMS
object-group network STORE-POS
network-object 10.10.0.0 255.255.0.0
object-group network Admin-Systems
network-object object EMC-NCM
network-object object AdminStation
network-object object AdminStation2
network-object object CSManager
network-object object AdminStation3
network-object object ISE-1
network-object object ISE-2
network-object object LMS
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
network-object 192.168.43.21 255.255.255.255
network-object 192.168.43.22 255.255.255.255
object-group network DC-Wifi-MSE
description Mobility Service Engines
network-object 192.168.43.31 255.255.255.255
network-object 192.168.43.32 255.255.255.255
object-group network DM_INLINE_NETWORK_5
network-object object ISE-1
network-object object ISE-2
network-object object RSA-AM
network-object object TACACS
object-group network DM_INLINE_NETWORK_6
network-object object ISE-1
network-object object ISE-2
object-group network DC-WAAS
description WAE Appliances in Data Center
network-object 192.168.48.10 255.255.255.255
network-object 192.168.49.10 255.255.255.255
network-object 192.168.47.11 255.255.255.255
network-object 192.168.47.12 255.255.255.255
object-group network NTP-Servers
network-object 192.168.62.161 255.255.255.255
network-object 162.168.62.162 255.255.255.255
object-group icmp-type DM_INLINE_ICMP_1
icmp-object time-exceeded
object-group service DM_INLINE_TCP_3 tcp
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
network-object 192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
network-object 192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
network-object 192.168.52.128 255.255.255.240
object-group service HTTPS-8443
service-object tcp destination eq 8443
object-group network DM_INLINE_NETWORK_7
network-object object MSP-DC-1
network-object object PAME-DC-1
object-group service DNS-Resolving
description Domain Name Server
service-object tcp destination eq domain
service-object udp destination eq domain
object-group network DM_INLINE_NETWORK_8
group-object DC-Wifi-Controllers
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
service-object tcp destination eq 5989
service-object tcp destination eq 8000
service-object tcp destination eq 902
service-object tcp destination eq 903
object-group network DM_INLINE_NETWORK_9
network-object object DC-POS
group-object DC-POS-Oracle
group-object DC-POS-Tomax
object-group service TFTP
description Trivial File Transfer
service-object tcp destination eq 69
service-object udp destination eq tftp
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
service-object udp destination eq 12222
service-object udp destination eq 12223
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
service-object udp destination eq 5246
service-object udp destination eq 5247
object-group service DM_INLINE_SERVICE_10
service-object tcp destination eq www
service-object tcp destination eq https
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
service-object udp destination eq 427
service-object tcp destination eq 427
object-group service DM_INLINE_SERVICE_11
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
group-object vCenter-to-ESX4
object-group service CISCO-WAAS
description Ports for Cisco WAAS
service-object tcp destination eq 4050
object-group service Netbios
description Netbios Servers
service-object udp destination eq netbios-dgm
service-object udp destination eq netbios-ns
service-object tcp destination eq netbios-ssn
object-group service Cisco-Mobility
description Mobility ports for Wireless
service-object udp destination eq 16666
service-object udp destination eq 16667
object-group service DM_INLINE_SERVICE_12
group-object Cisco-Mobility
service-object object IP-Protocol-97
service-object tcp destination eq https
service-object udp destination eq isakmp
object-group service DM_INLINE_SERVICE_13
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group network DM_INLINE_NETWORK_2
group-object DC-Wifi-Controllers
network-object object WCSManager
object-group network DM_INLINE_NETWORK_3
network-object object DC-ALL
object-group network DM_INLINE_NETWORK_4
network-object object MSP-DC-1
network-object object PAME-DC-1
object-group service DM_INLINE_SERVICE_2
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object udp destination eq snmp
object-group service DM_INLINE_SERVICE_3
group-object DNS-Resolving
service-object object Kerberos-TCP
service-object object LDAP-GC
service-object object LDAP-GC-SSL
service-object object LDAP-UDP
service-object object Microsoft-DS-SMB
service-object object RPC
service-object object RPC-HighPorts
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq netbios-dgm
service-object udp destination eq ntp
object-group service DM_INLINE_SERVICE_4
service-object tcp destination eq https
service-object tcp destination eq ssh
group-object vCenter-to-ESX4
object-group service DM_INLINE_SERVICE_5
service-object object IP-Protocol-97
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object tcp destination eq telnet
service-object udp destination eq isakmp
object-group service DM_INLINE_SERVICE_6
service-object object RDP
service-object object TCP1080
service-object object TCP8080
service-object icmp echo-reply
service-object tcp destination eq ftp
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
object-group service DM_INLINE_SERVICE_7
service-object object Microsoft-DS-SMB
object-group service DM_INLINE_SERVICE_8
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service DM_INLINE_SERVICE_14
service-object object Microsoft-DS-SMB
object-group service DM_INLINE_SERVICE_15
group-object DNS-Resolving
service-object object Kerberos-TCP
service-object object LDAP-GC
service-object object LDAP-GC-SSL
service-object object LDAP-UDP
service-object object Microsoft-DS-SMB
service-object object RPC
service-object object RPC-HighPorts
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq netbios-dgm
service-object udp destination eq ntp
object-group service DM_INLINE_SERVICE_9
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq domain
object-group service DM_INLINE_TCP_1 tcp
object-group service DM_INLINE_TCP_2 tcp
object-group service DM_INLINE_UDP_1 udp
object-group service DM_INLINE_UDP_2 udp
access-list INSIDE extended permit ip any any
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_2 object-group
Admin-Systems object-group DM_INLINE_NETWORK_3
access-list INSIDE remark Allow Active Directory Domain
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_3 object
ActiveDirectory.cisco-irn.com object Stores-ALL
access-list INSIDE remark VMWare - ESX systems
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_4 object vSphere-1
object Stores-ALL
access-list INSIDE remark Wireless Management to Stores
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_5 object-group
DM_INLINE_NETWORK_2 object Stores-ALL
access-list INSIDE remark Physical security systems
access-list INSIDE extended permit tcp object-group DM_INLINE_NETWORK_4 object Stores-ALL
eq https
access-list INSIDE remark Allow Management of store systems
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_6 object DC-ALL object
Stores-ALL
access-list INSIDE remark WAAS systems
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_7 object-group DC-WAAS
object Stores-ALL
access-list INSIDE remark Voice calls
access-list INSIDE extended permit object-group DM_INLINE_SERVICE_8 object DC-ALL object
Stores-ALL
access-list INSIDE remark Drop and Log all other traffic
access-list INSIDE extended deny ip any any log
access-list OUTSIDE extended permit ip any any
access-list OUTSIDE remark Connectivity validation
access-list OUTSIDE extended permit icmp object Stores-ALL any object-group
DM_INLINE_ICMP_1
access-list OUTSIDE remark Internet Browsing
access-list OUTSIDE extended permit tcp object Stores-ALL any object-group DM_INLINE_TCP_3
access-list OUTSIDE remark Config uploading
access-list OUTSIDE extended permit tcp object Stores-ALL object EMC-NCM eq ssh
access-list OUTSIDE remark Log reporting
access-list OUTSIDE extended permit udp object Stores-ALL object RSA-enVision object-group
DM_INLINE_UDP_1
access-list OUTSIDE remark Authentication and DNS lookup
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_9 object Stores-ALL
object ActiveDirectory.cisco-irn.com
access-list OUTSIDE remark Authentication and authorization
access-list OUTSIDE extended permit tcp object Stores-ALL object TACACS eq tacacs
access-list OUTSIDE remark Time Sync
access-list OUTSIDE extended permit udp object Stores-ALL object-group NTP-Servers eq ntp
access-list OUTSIDE remark Authentication
access-list OUTSIDE extended permit udp object Stores-ALL object-group DM_INLINE_NETWORK_5
object-group DM_INLINE_UDP_2
access-list OUTSIDE remark Authentication web portal
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_10 object Stores-ALL
object-group DM_INLINE_NETWORK_6
access-list OUTSIDE remark VMWare ESX to Data Center
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_11 object Stores-ALL
object vSphere-1
access-list OUTSIDE remark Physical security systems
access-list OUTSIDE extended permit tcp object Stores-ALL object-group DM_INLINE_NETWORK_7
eq https
access-list OUTSIDE remark Wireless control systems
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_12 object Stores-ALL
object-group DM_INLINE_NETWORK_8
access-list OUTSIDE remark Voice calls
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_13 object Stores-ALL
object DC-ALL
access-list OUTSIDE remark WAAS systems
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_14 object Stores-ALL
object-group DC-WAAS
access-list OUTSIDE remark Allow Active Directory Domain
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_15 object Stores-ALL
object ActiveDirectory.cisco-irn.com
access-list OUTSIDE remark Allow Windows Updates
access-list OUTSIDE extended permit tcp object Stores-ALL object MS-Update object-group
DM_INLINE_TCP_1
access-list OUTSIDE remark Allow Mail
access-list OUTSIDE extended permit tcp object Stores-ALL object MSExchange object-group
DM_INLINE_TCP_2
access-list OUTSIDE remark Allow Applications
access-list OUTSIDE extended permit tcp object Stores-ALL object-group DM_INLINE_NETWORK_9
eq https
access-list OUTSIDE remark Drop all other traffic
access-list OUTSIDE extended deny ip any any log
logging host inside 192.168.42.124
logging host inside 192.168.42.139
failover lan unit primary
failover lan interface folink GigabitEthernet0/3
failover link folink GigabitEthernet0/3
failover interface ip folink 192.168.12.20 255.255.255.0 standby 192.168.12.21
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-711.bin
no arp permit-nonconnected
access-group OUTSIDE in interface outside
access-group INSIDE in interface inside
route inside 0.0.0.0 0.0.0.0 192.168.11.60 1
route outside 10.10.0.0 255.255.0.0 192.168.11.1 1
route inside 10.10.0.0 255.255.255.0 192.168.11.60 1
route outside 10.10.1.0 255.255.255.0 192.168.11.2 1
route outside 10.10.2.0 255.255.255.0 192.168.11.3 1
route inside 10.10.3.0 255.255.255.0 192.168.11.60 1
route inside 10.10.4.0 255.255.255.0 192.168.11.60 1
route outside 10.10.254.0 255.255.255.0 192.168.11.3 1
route outside 10.10.255.0 255.255.255.0 192.168.11.2 1
route inside 192.168.0.0 255.255.0.0 192.168.11.10 1
route outside 192.168.1.111 255.255.255.255 192.168.11.2 1
route outside 192.168.1.112 255.255.255.255 192.168.11.3 1
route inside 192.168.20.0 255.255.252.0 192.168.11.60 1
route inside 192.168.24.0 255.255.255.0 192.168.11.60 1
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server RETAIL protocol tacacs+
aaa-server RETAIL (inside) host 192.168.42.131
user-identity default-domain LOCAL
aaa authentication ssh console RETAIL LOCAL
aaa authentication enable console RETAIL LOCAL
aaa authentication http console RETAIL LOCAL
aaa accounting ssh console RETAIL
aaa accounting enable console RETAIL
aaa accounting command privilege 15 RETAIL
aaa authentication secure-http-client
aaa local authentication attempts max-fail 6
aaa authorization exec authentication-server
http server idle-timeout 15
http server session-timeout 60
http 192.168.41.102 255.255.255.255 inside
http 192.168.41.101 255.255.255.255 inside
http 192.168.42.122 255.255.255.255 inside
http 192.168.42.124 255.255.255.255 inside
http 192.168.42.133 255.255.255.255 inside
http 192.168.42.138 255.255.255.255 inside
http 192.168.42.139 255.255.255.255 inside
http 192.168.42.134 255.255.255.255 inside
snmp-server group V3Group v3 priv
snmp-server user csmadmin V3Group v3 encrypted auth sha
9e:72:6a:fa:06:f5:29:f9:8a:87:ce:fa:46:19:a5:80:6c:2d:2e:b8 priv aes 256
9e:72:6a:fa:06:f5:29:f9:8a:87:ce:fa:46:19:a5:80:6c:2d:2e:b8:bb:47:d1:68:d7:39:58:f4:62:f7:
38:36
snmp-server user ciscolms V3Group v3 encrypted auth sha
9e:72:6a:fa:06:f5:29:f9:8a:87:ce:fa:46:19:a5:80:6c:2d:2e:b8 priv aes 256
9e:72:6a:fa:06:f5:29:f9:8a:87:ce:fa:46:19:a5:80:6c:2d:2e:b8:bb:47:d1:68:d7:39:58:f4:62:f7:
38:36
snmp-server host inside 192.168.42.134 version 3 ciscolms
snmp-server host inside 192.168.42.139 version 3 ciscolms
snmp-server host inside 192.168.42.133 version 3 csmadmin
snmp-server location Building SJC-17-1 Aisle 1 Rack 3
snmp-server contact EmployeeA
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
snmp-server enable traps syslog
snmp-server enable traps ipsec start stop
snmp-server enable traps memory-threshold
snmp-server enable traps interface-threshold
snmp-server enable traps remote-access session-threshold-exceeded
snmp-server enable traps connection-limit-reached
snmp-server enable traps cpu threshold rising
snmp-server enable traps ikev2 start stop
snmp-server enable traps nat packet-discard
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
ssh 192.168.41.101 255.255.255.255 inside
ssh 192.168.41.102 255.255.255.255 inside
ssh 192.168.42.122 255.255.255.255 inside
ssh 192.168.42.124 255.255.255.255 inside
ssh 192.168.42.133 255.255.255.255 inside
ssh 192.168.42.138 255.255.255.255 inside
ssh 192.168.42.139 255.255.255.255 inside
ssh 192.168.42.134 255.255.255.255 inside
tls-proxy maximum-session 1000
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 192.168.62.162 source inside
ntp server 192.168.62.161 source inside prefer
ssl encryption aes256-sha1 3des-sha1
username csmadmin password <removed> privilege 15
username retail password <removed> privilege 15
username ciscolms password <removed> privilege 15
username bmcgloth password <removed> privilege 15
class-map inspection_default
match default-inspection-traffic
class-map global-class-PCI
policy-map type inspect dns preset_dns_map
message-length maximum client auto
message-length maximum 512
description IPS inspection policy for Cisco PCI LAB
inspect dns preset_dns_map
ips promiscuous fail-open
service-policy global_policy global
no call-home reporting anonymous
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:74ca008c5477bc602c2080c680584775
ASA-WAN-1_IDS
! ------------------------------
! Current configuration last modified Fri Dec 07 09:38:41 2012
! ------------------------------
! Signature Update S648.0 2012-05-30
! ------------------------------
! ------------------------------
cli-inactivity-timeout 15
! ------------------------------
service event-action-rules rules0
! ------------------------------
host-ip 192.168.11.23/24,192.168.11.10
access-list 192.168.41.101/32
access-list 192.168.41.102/32
access-list 192.168.42.122/32
access-list 192.168.42.124/32
access-list 192.168.42.133/32
access-list 192.168.42.134/32
access-list 192.168.42.138/32
access-list 192.168.42.139/32
login-banner-text WARNING: THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS
ONLY!
dns-primary-server enabled
dns-secondary-server disabled
dns-tertiary-server disabled
standard-time-zone-name PST
ntp-option enabled-ntp-unauthenticated
ntp-server 192.168.62.161
summertime-option recurring
! ------------------------------
! ------------------------------
! ------------------------------
trap-destinations 192.168.42.124
trap-community-name RSAenvision
enable-notifications true
trap-community-name RSAenvision
system-location Building SJC-17-1 Row 1 Rack 1
! ------------------------------
service signature-definition sig0
! ------------------------------
! ------------------------------
service trusted-certificates
! ------------------------------
! ------------------------------
service anomaly-detection ad0
! ------------------------------
service external-product-interface
! ------------------------------
! ------------------------------
service global-correlation
! ------------------------------
server-address 192.168.42.131
console-authentication radius-and-local
default-user-role administrator
! ------------------------------
RWAN-1
! Last configuration change at 01:17:13 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:17:14 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
no platform punt-keepalive disable-kernel-core
security authentication failure rate 2 log
security passwords min-length 7
enable secret 4 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip multicast-routing distributed
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
crypto pki trustpoint TP-self-signed-1264044905
subject-name cn=IOS-Self-Signed-Certificate-1264044905
rsakeypair TP-self-signed-1264044905
crypto pki certificate chain TP-self-signed-1264044905
certificate self-signed 01
notify syslog contenttype plaintext
username retail privilege 15 secret 4 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 4 <removed>
username bmcgloth privilege 15 secret 4 <removed>
username csmadmin privilege 15 secret 4 <removed>
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map DataCenter-LAN-EDGE-OUT
policy-map DataCenter-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
policy-map DataCenter-WAN-EDGE
class MISSION-CRITICAL-DATA
ip address 192.168.1.111 255.255.255.255
interface GigabitEthernet0/0/0
ip address 192.168.11.2 255.255.255.0
standby 1 ip 192.168.11.1
service-policy input DataCenter-LAN-EDGE-IN
service-policy output DataCenter-LAN-EDGE-OUT
interface GigabitEthernet0/0/1
interface GigabitEthernet0/0/2
ip address 10.10.1.6 255.255.255.0
service-policy output DataCenter-WAN-EDGE
interface GigabitEthernet0/0/3
interface GigabitEthernet0
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 192.168.11.60
ip route 10.10.0.0 255.255.0.0 10.10.1.1
ip route 10.10.0.0 255.255.0.0 192.168.11.3 50
ip route 10.10.0.0 255.255.255.0 192.168.11.60
ip route 10.10.2.0 255.255.255.0 192.168.11.3
ip route 10.10.3.0 255.255.255.0 192.168.11.60
ip route 10.10.4.0 255.255.255.0 192.168.11.60
ip route 10.10.110.2 255.255.255.255 192.168.11.3
ip route 10.10.126.2 255.255.255.255 192.168.11.3
ip route 10.10.254.0 255.255.255.0 192.168.11.3
ip route 192.168.0.0 255.255.0.0 192.168.11.10
ip route 192.168.1.112 255.255.255.255 192.168.11.3
ip route 192.168.20.0 255.255.252.0 192.168.11.60
ip route 192.168.24.0 255.255.255.0 192.168.11.60
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip 192.168.52.0 0.0.0.255 any
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 192.168.46.72 eq 8444 host 10.10.49.94
remark --Large store Clock Server to CUAE
permit tcp host 192.168.45.185 eq 8000 host 10.10.49.94
remark ---LiteScape Application---
permit ip host 192.168.46.82 any
permit ip 239.192.0.0 0.0.0.255 any
permit ip host 239.255.255.250 any
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps syslog
snmp-server enable traps flash insertion removal
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 17186047
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
RWAN-2
! Last configuration change at 01:31:03 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:31:04 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
no platform punt-keepalive disable-kernel-core
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PST recurring
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip multicast-routing distributed
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
crypto pki trustpoint TP-self-signed-1414178861
subject-name cn=IOS-Self-Signed-Certificate-1414178861
rsakeypair TP-self-signed-1414178861
crypto pki certificate chain TP-self-signed-1414178861
certificate self-signed 01
notify syslog contenttype plaintext
username retail privilege 15 secret 4 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 4 <removed>
username bmcgloth privilege 15 secret 4 <removed>
username csmadmin privilege 15 secret 4 <removed>
ip address 192.168.1.112 255.255.255.255
interface GigabitEthernet0/0/0
ip address 192.168.11.3 255.255.255.0
standby 1 ip 192.168.11.1
interface GigabitEthernet0/0/1
interface GigabitEthernet0/0/2
ip address 10.10.2.6 255.255.255.0
interface GigabitEthernet0/0/3
interface GigabitEthernet0
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 192.168.11.60
ip route 10.10.0.0 255.255.0.0 10.10.2.1
ip route 10.10.0.0 255.255.0.0 192.168.11.2 50
ip route 10.10.0.0 255.255.255.0 192.168.11.60
ip route 10.10.1.0 255.255.255.0 192.168.11.2
ip route 10.10.3.0 255.255.255.0 192.168.11.60
ip route 10.10.4.0 255.255.255.0 192.168.11.60
ip route 10.10.110.1 255.255.255.255 192.168.11.2
ip route 10.10.126.1 255.255.255.255 192.168.11.2
ip route 10.10.255.0 255.255.255.0 192.168.11.2
ip route 192.168.0.0 255.255.0.0 192.168.11.10
ip route 192.168.1.111 255.255.255.255 192.168.11.2
ip route 192.168.20.0 255.255.252.0 192.168.11.60
ip route 192.168.24.0 255.255.255.0 192.168.11.60
ip tacacs source-interface Loopback0
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps syslog
snmp-server enable traps flash insertion removal
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 17219603
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
SWAN-1
Current configuration : 12174 bytes
! Last configuration change at 14:08:38 PST Fri Dec 21 2012 by bmcgloth
! NVRAM config last updated at 13:54:15 PST Fri Dec 21 2012 by bmcgloth
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
username ciscolms privilege 15 secret 5 <removed>
aaa group server tacacs+ PRIMARY1
aaa authentication login RETAIL group tacacs+ local
aaa authentication login COMPLIANCE group PRIMARY1 local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PST recurring
switch 1 provision ws-c3750x-48p
switch 2 provision ws-c3750x-48p
authentication mac-move permit
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-722491520
subject-name cn=IOS-Self-Signed-Certificate-722491520
rsakeypair TP-self-signed-722491520
crypto pki certificate chain TP-self-signed-722491520
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface GigabitEthernet1/0/1
description Link to RWAN-1 G0-0-0
interface GigabitEthernet1/0/2
description Link to ASA-WAN-1 G0-0
interface GigabitEthernet1/0/48
interface GigabitEthernet1/1/1
interface GigabitEthernet1/1/2
interface GigabitEthernet1/1/3
interface GigabitEthernet1/1/4
interface TenGigabitEthernet1/1/1
interface TenGigabitEthernet1/1/2
interface GigabitEthernet2/0/1
description Link to RWAN-2 G0-0-0
interface GigabitEthernet2/0/2
description Link to ASA-WAN-2 G0-0
interface GigabitEthernet2/0/48
interface GigabitEthernet2/1/1
interface GigabitEthernet2/1/2
interface GigabitEthernet2/1/3
interface GigabitEthernet2/1/4
interface TenGigabitEthernet2/1/1
interface TenGigabitEthernet2/1/2
ip address 192.168.11.14 255.255.255.0
ip default-gateway 192.168.11.10
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip sla enable reaction-alerts
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 192.168.42.139 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 permit 192.168.42.139 log
access-list 88 deny any log
snmp-server group V3Group v3 priv read V3Read write V3Write notify
*tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server view V3Read iso included
snmp-server view V3Write iso included
snmp-server packetsize 8192
snmp-server location Building SJC-17-1 Aisle 2 Rack 3
snmp-server contact Bart McGlothin
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps power-ethernet group 1-4
snmp-server enable traps power-ethernet police
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps energywise
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps rtr
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
snmp-server host 192.168.42.134 version 3 priv ciscolms
snmp-server host 192.168.42.139 version 3 priv ciscolms
snmp-server host 192.168.42.133 version 3 priv csmadmin
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
monitor session 1 source interface Fa1/0/1
monitor session 1 destination interface Fa1/0/48
ntp clock-period 36029318
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
SWAN-3
Current configuration : 12174 bytes
! Last configuration change at 14:08:38 PST Fri Dec 21 2012 by bmcgloth
! NVRAM config last updated at 13:54:15 PST Fri Dec 21 2012 by bmcgloth
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
username ciscolms privilege 15 secret 5 <removed>
aaa group server tacacs+ PRIMARY1
aaa authentication login RETAIL group tacacs+ local
aaa authentication login COMPLIANCE group PRIMARY1 local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PST recurring
switch 1 provision ws-c3750x-48p
switch 2 provision ws-c3750x-48p
authentication mac-move permit
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-722491520
subject-name cn=IOS-Self-Signed-Certificate-722491520
rsakeypair TP-self-signed-722491520
crypto pki certificate chain TP-self-signed-722491520
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface GigabitEthernet1/0/1
description Link to RCORE-2 G1-1
interface GigabitEthernet1/0/2
description Link to ASA-WAN-1 G0-1
interface GigabitEthernet1/0/48
interface GigabitEthernet1/1/1
interface GigabitEthernet1/1/2
interface GigabitEthernet1/1/3
interface GigabitEthernet1/1/4
interface TenGigabitEthernet1/1/1
interface TenGigabitEthernet1/1/2
interface GigabitEthernet2/0/1
description Link to RCORE-1 G1-1
interface GigabitEthernet2/0/2
description Link to ASA-WAN-2 G0-1
interface GigabitEthernet2/0/48
interface GigabitEthernet2/1/1
interface GigabitEthernet2/1/2
interface GigabitEthernet2/1/3
interface GigabitEthernet2/1/4
interface TenGigabitEthernet2/1/1
interface TenGigabitEthernet2/1/2
ip address 192.168.11.14 255.255.255.0
ip default-gateway 192.168.11.10
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip sla enable reaction-alerts
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 192.168.42.139 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 permit 192.168.42.139 log
access-list 88 deny any log
snmp-server group V3Group v3 priv read V3Read write V3Write notify
*tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server view V3Read iso included
snmp-server view V3Write iso included
snmp-server packetsize 8192
snmp-server location Building SJC-17-1 Aisle 2 Rack 3
snmp-server contact Bart McGlothin
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps power-ethernet group 1-4
snmp-server enable traps power-ethernet police
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps energywise
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps rtr
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
snmp-server host 192.168.42.134 version 3 priv ciscolms
snmp-server host 192.168.42.139 version 3 priv ciscolms
snmp-server host 192.168.42.133 version 3 priv csmadmin
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
monitor session 1 source interface Fa1/0/1
monitor session 1 destination interface Fa1/0/48
ntp clock-period 36029318
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Core
RCORE-1
! Last configuration change at 01:37:46 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:37:47 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service counters max age 5
boot system flash disk0:s72033-adventerprisek9_wan-mz.122-33.SXJ.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 mfib hardware-switching replication-mode ingress
mls ip cef load-sharing full simple
no mls acl tcam share-global
mls cef error action freeze
crypto pki trustpoint TP-self-signed-1104
subject-name cn=IOS-Self-Signed-Certificate-1104
rsakeypair TP-self-signed-1104
crypto pki certificate chain TP-self-signed-1104
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree mode rapid-pvst
spanning-tree loopguard default
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
spanning-tree pathcost method long
environment temperature-controlled
diagnostic bootup level minimal
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
vlan internal allocation policy descending
vlan access-log ratelimit 2000
ip address 192.168.1.1 255.255.255.255
ip address 192.168.10.29 255.255.255.252
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
ip ospf network point-to-point
logging event link-status
interface GigabitEthernet1/1
description to DC WAN_SWAN-3
ip address 192.168.11.11 255.255.255.0
standby 0 ip 192.168.11.10
interface GigabitEthernet1/2
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface GigabitEthernet1/5
interface GigabitEthernet1/6
interface GigabitEthernet1/7
interface GigabitEthernet1/8
interface GigabitEthernet1/9
interface GigabitEthernet1/10
interface GigabitEthernet1/11
interface GigabitEthernet1/12
interface GigabitEthernet1/13
interface GigabitEthernet1/14
interface GigabitEthernet1/15
interface GigabitEthernet1/16
interface GigabitEthernet1/17
interface GigabitEthernet1/18
interface GigabitEthernet1/19
interface GigabitEthernet1/20
interface GigabitEthernet1/21
interface GigabitEthernet1/22
interface GigabitEthernet1/23
interface GigabitEthernet1/24
interface GigabitEthernet1/25
interface GigabitEthernet1/26
interface GigabitEthernet1/27
interface GigabitEthernet1/28
interface GigabitEthernet1/29
interface GigabitEthernet1/30
interface GigabitEthernet1/31
interface GigabitEthernet1/32
interface GigabitEthernet1/33
interface GigabitEthernet1/34
interface GigabitEthernet1/35
interface GigabitEthernet1/36
interface GigabitEthernet1/37
interface GigabitEthernet1/38
interface GigabitEthernet1/39
interface GigabitEthernet1/40
interface GigabitEthernet1/41
interface GigabitEthernet1/42
interface GigabitEthernet1/43
interface GigabitEthernet1/44
interface GigabitEthernet1/45
interface GigabitEthernet1/46
interface GigabitEthernet1/47
interface GigabitEthernet1/48
interface TenGigabitEthernet2/1
description 10Gig LINK to RAGG-1 T1/3
ip address 192.168.10.13 255.255.255.252
ip igmp query-interval 125
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
ip ospf network point-to-point
logging event link-status
interface TenGigabitEthernet2/2
description 10Gig LINK to RAGG-2 T1/3
ip address 192.168.10.17 255.255.255.252
ip igmp query-interval 125
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
ip ospf network point-to-point
logging event link-status
interface TenGigabitEthernet2/3
description 10Gig LINK to RCORE-2
channel-group 99 mode active
interface TenGigabitEthernet2/4
description 10Gig LINK to RCORE-2
channel-group 99 mode active
interface TenGigabitEthernet2/5
interface TenGigabitEthernet2/6
interface TenGigabitEthernet2/7
interface TenGigabitEthernet2/8
interface GigabitEthernet5/1
interface GigabitEthernet5/2
interface GigabitEthernet6/1
interface GigabitEthernet6/2
auto-cost reference-bandwidth 10000
redistribute static subnets
passive-interface default
no passive-interface TenGigabitEthernet2/1
no passive-interface TenGigabitEthernet2/2
no passive-interface Port-channel99
network 192.168.0.0 0.0.255.255 area 0
default-information originate metric 20 metric-type 1
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.11.60 name default-to-internet
ip route 10.10.0.0 255.255.0.0 192.168.11.1 name route-to-stores
ip route 10.10.0.0 255.255.255.0 192.168.11.60 name route-to-SP
ip route 10.10.1.0 255.255.255.0 192.168.11.2
ip route 10.10.2.0 255.255.255.0 192.168.11.3
ip route 10.10.110.1 255.255.255.255 192.168.11.2
ip route 10.10.110.2 255.255.255.255 192.168.11.3
ip route 10.10.126.1 255.255.255.255 192.168.11.2
ip route 10.10.126.2 255.255.255.255 192.168.11.3
ip route 10.10.254.0 255.255.255.0 192.168.11.3
ip route 10.10.255.0 255.255.255.0 192.168.11.2
ip route 192.168.1.111 255.255.255.255 192.168.11.2
ip route 192.168.1.112 255.255.255.255 192.168.11.3
ip route 192.168.20.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip route 192.168.21.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip route 192.168.22.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip route 192.168.23.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip pim send-rp-discovery scope 2
ip tacacs source-interface Loopback0
logging source-interface Loopback0
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps MAC-Notification change move threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
mac-address-table aging-time 480
RCORE-2
! Last configuration change at 01:42:02 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:42:02 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service counters max age 5
boot system flash disk1:s72033-adventerprisek9_wan-mz.122-33.SXJ.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed> username bart privilege 15 secret 5
<removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
no alert-group configuration
no alert-group diagnostic
no alert-group environment
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 mfib hardware-switching replication-mode ingress
mls ip cef load-sharing full simple
no mls acl tcam share-global
mls cef error action freeze
crypto pki trustpoint TP-self-signed-1051
subject-name cn=IOS-Self-Signed-Certificate-1051
rsakeypair TP-self-signed-1051
crypto pki certificate chain TP-self-signed-1051
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree mode rapid-pvst
spanning-tree loopguard default
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
spanning-tree pathcost method long
environment temperature-controlled
diagnostic bootup level minimal
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
vlan internal allocation policy descending
vlan access-log ratelimit 2000
ip address 192.168.1.2 255.255.255.255
description link between CORE's
ip address 192.168.10.30 255.255.255.252
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
ip ospf network point-to-point
logging event link-status
interface GigabitEthernet1/1
description to DC WAN_SWAN-3/4
ip address 192.168.11.12 255.255.255.0
standby 0 ip 192.168.11.10
interface GigabitEthernet1/2
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface GigabitEthernet1/5
interface GigabitEthernet1/6
interface GigabitEthernet1/7
interface GigabitEthernet1/8
interface GigabitEthernet1/9
interface GigabitEthernet1/10
interface GigabitEthernet1/11
interface GigabitEthernet1/12
interface GigabitEthernet1/13
interface GigabitEthernet1/14
interface GigabitEthernet1/15
interface GigabitEthernet1/16
interface GigabitEthernet1/17
interface GigabitEthernet1/18
interface GigabitEthernet1/19
interface GigabitEthernet1/20
interface GigabitEthernet1/21
interface GigabitEthernet1/22
interface GigabitEthernet1/23
interface GigabitEthernet1/24
interface GigabitEthernet1/25
interface GigabitEthernet1/26
interface GigabitEthernet1/27
interface GigabitEthernet1/28
interface GigabitEthernet1/29
interface GigabitEthernet1/30
interface GigabitEthernet1/31
interface GigabitEthernet1/32
interface GigabitEthernet1/33
interface GigabitEthernet1/34
interface GigabitEthernet1/35
interface GigabitEthernet1/36
interface GigabitEthernet1/37
interface GigabitEthernet1/38
interface GigabitEthernet1/39
interface GigabitEthernet1/40
interface GigabitEthernet1/41
interface GigabitEthernet1/42
interface GigabitEthernet1/43
interface GigabitEthernet1/44
interface GigabitEthernet1/45
interface GigabitEthernet1/46
interface GigabitEthernet1/47
interface GigabitEthernet1/48
interface TenGigabitEthernet2/1
description 10Gig LINK to RAGG-1 T1/4
ip address 192.168.10.21 255.255.255.252
ip igmp query-interval 125
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
ip ospf network point-to-point
logging event link-status
interface TenGigabitEthernet2/2
description 10Gig LINK to RAGG-2 T1/4
ip address 192.168.10.25 255.255.255.252
ip igmp query-interval 125
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
ip ospf network point-to-point
logging event link-status
interface TenGigabitEthernet2/3
description 10Gig LINK to RCORE-1
channel-group 99 mode active
interface TenGigabitEthernet2/4
description 10Gig LINK to RCORE-1
channel-group 99 mode active
interface TenGigabitEthernet2/5
interface TenGigabitEthernet2/6
interface TenGigabitEthernet2/7
interface TenGigabitEthernet2/8
interface GigabitEthernet5/1
interface GigabitEthernet5/2
interface GigabitEthernet6/1
interface GigabitEthernet6/2
auto-cost reference-bandwidth 10000
redistribute static subnets
passive-interface default
no passive-interface TenGigabitEthernet2/1
no passive-interface TenGigabitEthernet2/2
no passive-interface Port-channel99
network 192.168.0.0 0.0.255.255 area 0
default-information originate metric 22 metric-type 1
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.11.60 name default-to-internet
ip route 10.10.0.0 255.255.0.0 192.168.11.1 name route-to-stores
ip route 10.10.0.0 255.255.255.0 192.168.11.60 name route-to-SP
ip route 10.10.1.0 255.255.255.0 192.168.11.2
ip route 10.10.2.0 255.255.255.0 192.168.11.3
ip route 10.10.110.1 255.255.255.255 192.168.11.2
ip route 10.10.110.2 255.255.255.255 192.168.11.3
ip route 10.10.126.1 255.255.255.255 192.168.11.2
ip route 10.10.126.2 255.255.255.255 192.168.11.3
ip route 10.10.254.0 255.255.255.0 192.168.11.3
ip route 10.10.255.0 255.255.255.0 192.168.11.2
ip route 192.168.20.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip route 192.168.21.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip route 192.168.22.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip route 192.168.23.0 255.255.255.0 192.168.11.60 name route-to-DMZ
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip pim send-rp-discovery scope 2
ip tacacs source-interface Loopback0
logging source-interface Loopback0
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps MAC-Notification change move threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131 timeout 5
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
mac-address-table aging-time 480
Aggregation
ASA-DC-1
ASA Version 8.4(1) <context>
domain-name cisco-irn.com
enable password <removed> encrypted
passwd <removed> encrypted
ip address 192.168.162.21 255.255.255.0 standby 192.168.162.22
dns server-group DefaultDNS
name-server 192.168.42.130
domain-name cisco-irn.com
object-group network AdminStation
network-object 192.168.41.101 255.255.255.255
object-group network AdminStation2
network-object 192.168.41.102 255.255.255.255
object-group network AdminStation4-bart
network-object 10.19.151.99 255.255.255.255
object-group network CSM_INLINE_src_rule_77309411633
description Generated by CS-Manager from src of FirewallRule# 2
(ASA-DC-1-vdc1_v1/mandatory)
group-object AdminStation
group-object AdminStation2
group-object AdminStation4-bart
object-group network DC-ALL
description All of the Data Center
network-object 192.168.0.0 255.255.0.0
object-group network Stores-ALL
description all store networks
network-object 10.10.0.0 255.255.0.0
object-group network CSM_INLINE_dst_rule_77309411633
description Generated by CS-Manager from dst of FirewallRule# 2
(ASA-DC-1-vdc1_v1/mandatory)
object-group network EMC-NCM
description EMC Network Configuration Manager
network-object 192.168.42.122 255.255.255.255
object-group network CSManager
description Cisco Security Manager
network-object 192.168.42.133 255.255.255.255
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
network-object 192.168.42.124 255.255.255.255
object-group network AdminStation3
network-object 192.168.42.138 255.255.255.255
object-group network Admin-Systems
group-object AdminStation
group-object AdminStation2
group-object RSA-enVision
group-object AdminStation3
group-object AdminStation4-bart
object-group network DC-DMZ
description (Optimized by CS-Manager)
network-object 192.168.20.0 255.255.252.0
network-object 192.168.24.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_77309411635
description Generated by CS-Manager from dst of FirewallRule# 3
(ASA-DC-1-vdc1_v1/mandatory)
object-group network CSM_INLINE_src_rule_77309414079
description Generated by CS-Manager from src of FirewallRule# 4
(ASA-DC-1-vdc1_v1/mandatory)
object-group network CSM_INLINE_src_rule_77309414081
description Generated by CS-Manager from src of FirewallRule# 5
(ASA-DC-1-vdc1_v1/mandatory)
object-group network ActiveDirectory.cisco-irn.com
network-object 192.168.42.130 255.255.255.255
object-group network vSphere-1
description vSphere server for Lab
network-object 192.168.41.102 255.255.255.255
object-group network WCSManager
description Wireless Manager
network-object 192.168.43.135 255.255.255.255
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
network-object 192.168.43.21 255.255.255.255
network-object 192.168.43.22 255.255.255.255
object-group network DC-Wifi-MSE
description Mobility Service Engines
network-object 192.168.43.31 255.255.255.255
network-object 192.168.43.32 255.255.255.255
object-group network CSM_INLINE_src_rule_77309411641
description Generated by CS-Manager from src of FirewallRule# 9
(ASA-DC-1-vdc1_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
network-object 192.168.44.111 255.255.255.255
object-group network MSP-DC-1
description Data Center VSOM
network-object 192.168.44.121 255.255.255.255
object-group network CSM_INLINE_src_rule_77309411643
description Generated by CS-Manager from src of FirewallRule# 10
(ASA-DC-1-vdc1_v1/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
network-object 192.168.48.10 255.255.255.255
network-object 192.168.49.10 255.255.255.255
network-object 192.168.47.11 255.255.255.255
network-object 192.168.47.12 255.255.255.255
object-group network CSM_INLINE_src_rule_77309414071
description Generated by CS-Manager from src of FirewallRule# 15
(ASA-DC-1-vdc1_v1/mandatory)
object-group network NTP-Servers
network-object 192.168.62.161 255.255.255.255
network-object 162.168.62.162 255.255.255.255
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
network-object 192.168.42.131 255.255.255.255
object-group network RSA-AM
description RSA Authentication Manager for SecureID
network-object 192.168.42.137 255.255.255.255
object-group network NAC-2
network-object 192.168.42.112 255.255.255.255
object-group network NAC-1
description ISE server for NAC
network-object 192.168.42.111 255.255.255.255
object-group network CSM_INLINE_dst_rule_77309411663
description Generated by CS-Manager from dst of FirewallRule# 25
(ASA-DC-1-vdc1_v1/mandatory)
object-group network CSM_INLINE_dst_rule_77309411665
description Generated by CS-Manager from dst of FirewallRule# 26
(ASA-DC-1-vdc1_v1/mandatory)
object-group network CSM_INLINE_dst_rule_77309411669
description Generated by CS-Manager from dst of FirewallRule# 28
(ASA-DC-1-vdc1_v1/mandatory)
object-group network CSM_INLINE_dst_rule_77309411671
description Generated by CS-Manager from dst of FirewallRule# 29
(ASA-DC-1-vdc1_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network MS-Update
description Windows Update Server
network-object 192.168.42.150 255.255.255.255
object-group network MSExchange
network-object 192.168.42.140 255.255.255.255
object-group network POS-Store-Conv
network-object 10.10.160.81 255.255.255.255
object-group network POS-Store-MSP
network-object 10.10.176.81 255.255.255.255
object-group network POS-Store-SMALL-1
description Small Store POS devices
network-object 10.10.128.81 255.255.255.255
network-object 10.10.128.82 255.255.255.255
object-group network POS-Store-Medium
network-object 10.10.112.81 255.255.255.255
network-object 10.10.125.40 255.255.255.255
object-group network POS-Store-Mini
network-object 10.10.144.81 255.255.255.255
object-group network POS-Store-3g
network-object 10.10.192.82 255.255.255.255
object-group network POS-Store-Large
network-object 10.10.96.81 255.255.255.255
network-object 10.10.96.82 255.255.255.255
object-group network CSM_INLINE_src_rule_77309411683
description Generated by CS-Manager from src of FirewallRule# 35
(ASA-DC-1-vdc1_v1/mandatory)
group-object POS-Store-Conv
group-object POS-Store-MSP
group-object POS-Store-SMALL-1
group-object POS-Store-Medium
group-object POS-Store-Mini
group-object POS-Store-3g
group-object POS-Store-Large
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
network-object 192.168.52.96 255.255.255.224
object-group network DC-POS
description POS in the Data Center
network-object 192.168.52.0 255.255.255.0
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
network-object 192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
network-object 192.168.52.128 255.255.255.240
object-group network CSM_INLINE_dst_rule_77309411683
description Generated by CS-Manager from dst of FirewallRule# 35
(ASA-DC-1-vdc1_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_77309414158
description Generated by CS-Manager from src of FirewallRule# 36
(ASA-DC-1-vdc1_v1/mandatory)
network-object 192.168.22.11 255.255.255.255
network-object 192.168.22.12 255.255.255.255
network-object 192.168.21.0 255.255.255.0
object-group network CSM_INLINE_src_rule_77309414160
description Generated by CS-Manager from src of FirewallRule# 37
(ASA-DC-1-vdc1_v1/mandatory)
network-object 192.168.22.11 255.255.255.255
network-object 192.168.22.12 255.255.255.255
network-object 192.168.21.0 255.255.255.0
object-group network CSM_INLINE_src_rule_77309414162
description Generated by CS-Manager from src of FirewallRule# 38
(ASA-DC-1-vdc1_v1/mandatory)
network-object 192.168.22.11 255.255.255.255
network-object 192.168.22.12 255.255.255.255
network-object 192.168.21.0 255.255.255.0
object-group service HTTPS-8443
service-object tcp destination eq 8443
object-group service CSM_INLINE_svc_rule_77309411635
description Generated by CS-Manager from service of FirewallRule# 3
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq ssh
service-object tcp destination eq https
object-group service CSM_INLINE_svc_rule_77309414079
description Generated by CS-Manager from service of FirewallRule# 4
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq smtp
service-object tcp destination eq https
service-object tcp destination eq ssh
object-group service CSM_INLINE_svc_rule_77309414081
description Generated by CS-Manager from service of FirewallRule# 5
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object tcp destination eq 135
object-group service LDAP-GC
service-object tcp destination eq 3268
object-group service LDAP-GC-SSL
service-object tcp destination eq 3269
object-group service DNS-Resolving
description Domain Name Server
service-object tcp destination eq domain
service-object udp destination eq domain
object-group service Kerberos-TCP
service-object tcp destination eq 88
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
service-object tcp destination eq 445
object-group service LDAP-UDP
service-object udp destination eq 389
object-group service RPC-HighPorts
service-object tcp destination range 1024 65535
object-group service CSM_INLINE_svc_rule_77309411637
description Generated by CS-Manager from service of FirewallRule# 7
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq ntp
service-object udp destination eq netbios-dgm
group-object DNS-Resolving
group-object Kerberos-TCP
group-object Microsoft-DS-SMB
group-object RPC-HighPorts
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
service-object tcp destination eq 5989
service-object tcp destination eq 8000
service-object tcp destination eq 902
service-object tcp destination eq 903
object-group service CSM_INLINE_svc_rule_77309411639
description Generated by CS-Manager from service of FirewallRule# 8
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq https
service-object tcp destination eq ssh
group-object vCenter-to-ESX4
object-group service IP-Protocol-97
description IP protocol 97
object-group service TFTP
description Trivial File Transfer
service-object tcp destination eq 69
service-object udp destination eq tftp
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
service-object udp destination eq 12222
service-object udp destination eq 12223
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
service-object udp destination eq 5246
service-object udp destination eq 5247
object-group service CSM_INLINE_svc_rule_77309411641
description Generated by CS-Manager from service of FirewallRule# 9
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq https
service-object tcp destination eq www
service-object udp destination eq isakmp
service-object tcp destination eq telnet
service-object tcp destination eq ssh
group-object IP-Protocol-97
object-group service TCP1080
service-object tcp destination eq 1080
object-group service TCP8080
service-object tcp destination eq 8080
description Windows Remote Desktop
service-object tcp destination eq 3389
object-group service CSM_INLINE_svc_rule_77309411645
description Generated by CS-Manager from service of FirewallRule# 11
(ASA-DC-1-vdc1_v1/mandatory)
service-object icmp echo-reply
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object tcp destination eq ftp
object-group service CISCO-WAAS
description Ports for Cisco WAAS
service-object tcp destination eq 4050
object-group service Netbios
description Netbios Servers
service-object udp destination eq netbios-dgm
service-object udp destination eq netbios-ns
service-object tcp destination eq netbios-ssn
object-group service CSM_INLINE_svc_rule_77309411647
description Generated by CS-Manager from service of FirewallRule# 12
(ASA-DC-1-vdc1_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_77309411649
description Generated by CS-Manager from service of FirewallRule# 13
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service CSM_INLINE_svc_rule_77309414071
description Generated by CS-Manager from service of FirewallRule# 15
(ASA-DC-1-vdc1_v1/mandatory)
service-object icmp echo-reply
service-object icmp unreachable
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ftp
service-object tcp destination eq ssh
description NTP Protocols
service-object tcp destination eq 123
service-object udp destination eq ntp
object-group service CSM_INLINE_svc_rule_77309414073
description Generated by CS-Manager from service of FirewallRule# 16
(ASA-DC-1-vdc1_v1/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_77309414077
description Generated by CS-Manager from service of FirewallRule# 18
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
object-group service CSM_INLINE_svc_rule_77309411655
description Generated by CS-Manager from service of FirewallRule# 21
(ASA-DC-1-vdc1_v1/mandatory)
service-object udp destination eq snmptrap
service-object udp destination eq snmp
service-object udp destination eq syslog
object-group service CSM_INLINE_svc_rule_77309411657
description Generated by CS-Manager from service of FirewallRule# 22
(ASA-DC-1-vdc1_v1/mandatory)
service-object udp destination eq domain
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
object-group service CSM_INLINE_svc_rule_77309411663
description Generated by CS-Manager from service of FirewallRule# 25
(ASA-DC-1-vdc1_v1/mandatory)
service-object udp destination eq 1812
service-object udp destination eq 1813
object-group service CSM_INLINE_svc_rule_77309411665
description Generated by CS-Manager from service of FirewallRule# 26
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq https
service-object tcp destination eq www
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
service-object udp destination eq 427
service-object tcp destination eq 427
object-group service CSM_INLINE_svc_rule_77309411667
description Generated by CS-Manager from service of FirewallRule# 27
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq https
service-object tcp destination eq www
service-object tcp destination eq ssh
group-object vCenter-to-ESX4
object-group service Cisco-Mobility
description Mobility ports for Wireless
service-object udp destination eq 16666
service-object udp destination eq 16667
object-group service CSM_INLINE_svc_rule_77309411671
description Generated by CS-Manager from service of FirewallRule# 29
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq https
service-object udp destination eq isakmp
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service CSM_INLINE_svc_rule_77309411673
description Generated by CS-Manager from service of FirewallRule# 30
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service CSM_INLINE_svc_rule_77309411675
description Generated by CS-Manager from service of FirewallRule# 31
(ASA-DC-1-vdc1_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_77309411677
description Generated by CS-Manager from service of FirewallRule# 32
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq ntp
service-object udp destination eq netbios-dgm
group-object DNS-Resolving
group-object Kerberos-TCP
group-object Microsoft-DS-SMB
group-object RPC-HighPorts
object-group service CSM_INLINE_svc_rule_77309411679
description Generated by CS-Manager from service of FirewallRule# 33
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq www
service-object tcp destination eq https
object-group service CSM_INLINE_svc_rule_77309411681
description Generated by CS-Manager from service of FirewallRule# 34
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq smtp
service-object tcp destination eq pop3
service-object tcp destination eq imap4
object-group service CSM_INLINE_svc_rule_77309414166
description Generated by CS-Manager from service of FirewallRule# 40
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq smtp
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_77309414172
description Generated by CS-Manager from service of FirewallRule# 43
(ASA-DC-1-vdc1_v1/mandatory)
service-object udp destination eq 1812
service-object udp destination eq 1813
object-group service CSM_INLINE_svc_rule_77309414176
description Generated by CS-Manager from service of FirewallRule# 45
(ASA-DC-1-vdc1_v1/mandatory)
service-object tcp destination eq ssh
service-object tcp destination eq telnet
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq 8880
service-object tcp destination eq 8444
service-object tcp destination eq 5900
service-object tcp destination eq 5800
group-object vCenter-to-ESX4
access-list CSM_FW_ACL_north extended permit ospf 192.168.162.0 255.255.255.0
192.168.162.0 255.255.255.0
access-list CSM_FW_ACL_north extended permit tcp object-group Stores-ALL object-group
EMC-NCM eq ssh
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411655
object-group Stores-ALL object-group RSA-enVision
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411657
object-group Stores-ALL object-group ActiveDirectory.cisco-irn.com
access-list CSM_FW_ACL_north extended permit tcp object-group Stores-ALL object-group
TACACS eq tacacs
access-list CSM_FW_ACL_north extended permit udp object-group Stores-ALL object-group
NTP-Servers eq ntp
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411663
object-group Stores-ALL object-group CSM_INLINE_dst_rule_77309411663
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411665
object-group Stores-ALL object-group CSM_INLINE_dst_rule_77309411665
access-list CSM_FW_ACL_north remark VMWare ESX to Data Center
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411667
object-group Stores-ALL object-group vSphere-1
access-list CSM_FW_ACL_north remark Physical security systems
access-list CSM_FW_ACL_north extended permit tcp object-group Stores-ALL object-group
CSM_INLINE_dst_rule_77309411669 eq https
access-list CSM_FW_ACL_north remark Wireless control systems
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411671
object-group Stores-ALL object-group CSM_INLINE_dst_rule_77309411671
access-list CSM_FW_ACL_north remark Voice calls
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411673
object-group Stores-ALL object-group DC-ALL
access-list CSM_FW_ACL_north remark WAAS systems
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411675
object-group Stores-ALL object-group DC-WAAS
access-list CSM_FW_ACL_north remark Allow Active Directory Domain
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411677
object-group Stores-ALL object-group ActiveDirectory.cisco-irn.com
access-list CSM_FW_ACL_north remark Allow Windows Updates
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411679
object-group Stores-ALL object-group MS-Update
access-list CSM_FW_ACL_north remark Allow Mail
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309411681
object-group Stores-ALL object-group MSExchange
access-list CSM_FW_ACL_north remark Allow Applications
access-list CSM_FW_ACL_north extended permit tcp object-group
CSM_INLINE_src_rule_77309411683 object-group CSM_INLINE_dst_rule_77309411683 eq https
access-list CSM_FW_ACL_north extended permit udp object-group
CSM_INLINE_src_rule_77309414158 object-group NTP-Servers eq ntp
access-list CSM_FW_ACL_north remark - RIE-2
access-list CSM_FW_ACL_north extended permit udp object-group
CSM_INLINE_src_rule_77309414160 object-group RSA-enVision eq syslog
access-list CSM_FW_ACL_north extended permit tcp object-group
CSM_INLINE_src_rule_77309414162 object-group TACACS eq tacacs
access-list CSM_FW_ACL_north extended permit udp 192.168.21.0 255.255.255.0 object-group
ActiveDirectory.cisco-irn.com eq domain
access-list CSM_FW_ACL_north remark Ironport traffic in from DNZ
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309414166
host 192.168.23.68 any
access-list CSM_FW_ACL_north extended permit udp host 192.168.23.68 object-group
RSA-enVision eq syslog
access-list CSM_FW_ACL_north extended permit udp host 192.168.23.68 object-group
NTP-Servers eq ntp
access-list CSM_FW_ACL_north extended permit object-group CSM_INLINE_svc_rule_77309414172
host 192.168.23.68 object-group TACACS
access-list CSM_FW_ACL_north remark Drop all other traffic
access-list CSM_FW_ACL_north extended deny ip any any log
access-list CSM_FW_ACL_south extended permit ospf 192.168.162.0 255.255.255.0
192.168.162.0 255.255.255.0
access-list CSM_FW_ACL_south extended permit ip object-group
CSM_INLINE_src_rule_77309411633 object-group CSM_INLINE_dst_rule_77309411633
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411635
object-group Admin-Systems object-group CSM_INLINE_dst_rule_77309411635
access-list CSM_FW_ACL_south remark Allow services for Ironport apps
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309414079
object-group CSM_INLINE_src_rule_77309414079 192.168.23.64 255.255.255.224
access-list CSM_FW_ACL_south remark Allow traffic to DMZ
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309414081
object-group CSM_INLINE_src_rule_77309414081 host 192.168.20.30
access-list CSM_FW_ACL_south remark Drop unauthorized traffic to DMZ
access-list CSM_FW_ACL_south extended deny ip any 192.168.20.0 255.255.252.0 log
access-list CSM_FW_ACL_south remark Allow Active Directory Domain
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411637
object-group ActiveDirectory.cisco-irn.com object-group Stores-ALL
access-list CSM_FW_ACL_south remark VMWare - ESX systems
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411639
object-group vSphere-1 object-group Stores-ALL
access-list CSM_FW_ACL_south remark Wireless Management to Stores
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411641
object-group CSM_INLINE_src_rule_77309411641 object-group Stores-ALL
access-list CSM_FW_ACL_south remark Physical security systems
access-list CSM_FW_ACL_south extended permit tcp object-group
CSM_INLINE_src_rule_77309411643 object-group Stores-ALL eq https
access-list CSM_FW_ACL_south remark Allow Management of store systems
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411645
object-group DC-ALL object-group Stores-ALL
access-list CSM_FW_ACL_south remark WAAS systems
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411647
object-group DC-WAAS object-group Stores-ALL
access-list CSM_FW_ACL_south remark Voice calls
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309411649
object-group DC-ALL object-group Stores-ALL
access-list CSM_FW_ACL_south extended deny ip any object-group Stores-ALL
access-list CSM_FW_ACL_south remark Allow outbound services for Internet
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309414071
object-group CSM_INLINE_src_rule_77309414071 any
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309414073
object-group ActiveDirectory.cisco-irn.com any
access-list CSM_FW_ACL_south extended permit udp object-group NTP-Servers any eq ntp
access-list CSM_FW_ACL_south remark Allow LDAP out LAB test
access-list CSM_FW_ACL_south extended permit object-group CSM_INLINE_svc_rule_77309414077
object-group PAME-DC-1 any log
access-list CSM_FW_ACL_south remark Drop and Log all other traffic
access-list CSM_FW_ACL_south extended deny ip any any log
logging host south 192.168.42.124
icmp unreachable rate-limit 1 burst-size 1
access-group CSM_FW_ACL_north in interface north
access-group CSM_FW_ACL_south in interface south
route north 0.0.0.0 0.0.0.0 192.168.162.1 1
route south 192.168.38.0 255.255.255.0 192.168.162.7 1
route south 192.168.39.0 255.255.255.0 192.168.162.7 1
route south 192.168.40.0 255.255.255.0 192.168.162.7 1
route south 192.168.41.0 255.255.255.0 192.168.162.7 1
route south 192.168.42.0 255.255.255.0 192.168.162.7 1
route south 192.168.43.0 255.255.255.0 192.168.162.7 1
route south 192.168.44.0 255.255.255.0 192.168.162.7 1
route south 192.168.45.0 255.255.255.0 192.168.162.7 1
route south 192.168.46.0 255.255.255.0 192.168.162.7 1
route south 192.168.52.0 255.255.255.0 192.168.162.7 1
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
aaa-server RETAIL protocol tacacs+
aaa-server RETAIL (south) host 192.168.42.131
aaa authentication ssh console RETAIL LOCAL
aaa authentication enable console RETAIL LOCAL
aaa authentication http console RETAIL LOCAL
aaa accounting ssh console RETAIL
aaa accounting enable console RETAIL
aaa accounting command privilege 15 RETAIL
aaa authentication secure-http-client
aaa local authentication attempts max-fail 6
aaa authorization exec authentication-server
http server idle-timeout 15
http server session-timeout 60
http 10.19.151.99 255.255.255.255 north
http 192.168.41.101 255.255.255.255 south
http 192.168.41.102 255.255.255.255 south
http 192.168.42.122 255.255.255.255 south
http 192.168.42.124 255.255.255.255 south
http 192.168.42.133 255.255.255.255 south
http 192.168.42.138 255.255.255.255 south
ssh 10.19.151.99 255.255.255.255 north
ssh 192.168.41.101 255.255.255.255 south
ssh 192.168.41.102 255.255.255.255 south
ssh 192.168.42.122 255.255.255.255 south
ssh 192.168.42.124 255.255.255.255 south
ssh 192.168.42.133 255.255.255.255 south
ssh 192.168.42.138 255.255.255.255 south
no threat-detection statistics tcp-intercept
username csmadmin password <removed> encrypted privilege 15
username retail password <removed> encrypted privilege 15
username bmcgloth password <removed> encrypted privilege 15
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
message-length maximum client auto
message-length maximum 512
inspect dns preset_dns_map
service-policy global_policy global
Cryptochecksum:70afa3a2a3007db41f3f336aca5cf51d
RAGG-1-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:49:11 2011
limit-resource vlan minimum 16 maximum 4094
limit-resource monitor-session minimum 0 maximum 2
limit-resource monitor-session-erspan-dst minimum 0 maximum 23
limit-resource vrf minimum 2 maximum 1000
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 32 maximum 32
limit-resource u6route-mem minimum 16 maximum 16
limit-resource m4route-mem minimum 48 maximum 48
limit-resource m6route-mem minimum 8 maximum 8
allocate interface Ethernet1/1,Ethernet1/3,Ethernet1/5,Ethernet1/7,Ethernet1/25-32
allocate interface Ethernet2/1-12
limit-resource vlan minimum 16 maximum 4094
limit-resource monitor-session minimum 0 maximum 2
limit-resource monitor-session-erspan-dst minimum 0 maximum 23
limit-resource vrf minimum 2 maximum 1000
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 8 maximum 8
limit-resource u6route-mem minimum 4 maximum 4
limit-resource m4route-mem minimum 8 maximum 8
limit-resource m6route-mem minimum 5 maximum 5
allocate interface Ethernet1/2,Ethernet1/4,Ethernet1/6,Ethernet1/8-24
allocate interface Ethernet2/13-48
limit-resource vlan minimum 16 maximum 4094
limit-resource monitor-session minimum 0 maximum 2
limit-resource monitor-session-erspan-dst minimum 0 maximum 23
limit-resource vrf minimum 2 maximum 1000
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 8 maximum 8
limit-resource u6route-mem minimum 4 maximum 4
limit-resource m4route-mem minimum 8 maximum 8
limit-resource m6route-mem minimum 5 maximum 5
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
username bart password 5 <removed> role network-admin
username emc-ncm password 5 <removed> role network-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip host RAGG-1 192.168.42.36
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
10 permit ip 127.0.0.1/32 192.168.42.36/32
20 permit ip 192.168.41.101/32 192.168.42.36/32
30 permit ip 192.168.41.102/32 192.168.42.36/32
40 permit ip 192.168.42.111/32 192.168.42.36/32
50 permit ip 192.168.42.122/32 192.168.42.36/32
60 permit ip 192.168.42.131/32 192.168.42.36/32
70 permit ip 192.168.42.133/32 192.168.42.36/32
80 permit ip 192.168.42.138/32 192.168.42.36/32
90 permit ip 10.19.151.99/32 192.168.42.36/32
10 permit ip 192.168.42.122/32 192.168.42.36/32
ip access-list copp-system-acl-bgp
10 permit tcp any gt 1024 any eq bgp
20 permit tcp any eq bgp any gt 1024
ipv6 access-list copp-system-acl-bgp6
10 permit tcp any gt 1024 any eq bgp
20 permit tcp any eq bgp any gt 1024
ip access-list copp-system-acl-eigrp
ip access-list copp-system-acl-ftp
10 permit tcp any any eq ftp-data
20 permit tcp any any eq ftp
30 permit tcp any eq ftp-data any
40 permit tcp any eq ftp any
ip access-list copp-system-acl-glbp
10 permit udp any eq 3222 224.0.0.0/24 eq 3222
ip access-list copp-system-acl-hsrp
10 permit udp any 224.0.0.0/24 eq 1985
ip access-list copp-system-acl-icmp
10 permit icmp any any echo
20 permit icmp any any echo-reply
ipv6 access-list copp-system-acl-icmp6
10 permit icmp any any echo-request
20 permit icmp any any echo-reply
ipv6 access-list copp-system-acl-icmp6-msgs
10 permit icmp any any router-advertisement
20 permit icmp any any router-solicitation
30 permit icmp any any nd-na
40 permit icmp any any nd-ns
50 permit icmp any any mld-query
60 permit icmp any any mld-report
70 permit icmp any any mld-reduction
ip access-list copp-system-acl-igmp
10 permit igmp any 224.0.0.0/3
ip access-list copp-system-acl-msdp
10 permit tcp any gt 1024 any eq 639
20 permit tcp any eq 639 any gt 1024
ip access-list copp-system-acl-ntp
10 permit udp any any eq ntp
20 permit udp any eq ntp any
ipv6 access-list copp-system-acl-ntp6
10 permit udp any any eq ntp
20 permit udp any eq ntp any
ip access-list copp-system-acl-ospf
ipv6 access-list copp-system-acl-ospf6
ip access-list copp-system-acl-pim
10 permit pim any 224.0.0.0/24
20 permit udp any any eq pim-auto-rp
ip access-list copp-system-acl-pim-reg
ipv6 access-list copp-system-acl-pim6
10 permit 103 any ff02::d/128
20 permit udp any any eq pim-auto-rp
ip access-list copp-system-acl-radius
10 permit udp any any eq 1812
20 permit udp any any eq 1813
30 permit udp any any eq 1645
40 permit udp any any eq 1646
50 permit udp any eq 1812 any
60 permit udp any eq 1813 any
70 permit udp any eq 1645 any
80 permit udp any eq 1646 any
ipv6 access-list copp-system-acl-radius6
10 permit udp any any eq 1812
20 permit udp any any eq 1813
30 permit udp any any eq 1645
40 permit udp any any eq 1646
50 permit udp any eq 1812 any
60 permit udp any eq 1813 any
70 permit udp any eq 1645 any
80 permit udp any eq 1646 any
ip access-list copp-system-acl-rip
10 permit udp any 224.0.0.0/24 eq rip
ip access-list copp-system-acl-sftp
10 permit tcp any any eq 115
20 permit tcp any eq 115 any
ip access-list copp-system-acl-snmp
10 permit udp any any eq snmp
20 permit udp any any eq snmptrap
ip access-list copp-system-acl-ssh
10 permit tcp any any eq 22
20 permit tcp any eq 22 any
ipv6 access-list copp-system-acl-ssh6
10 permit tcp any any eq 22
20 permit tcp any eq 22 any
ip access-list copp-system-acl-tacacs
10 permit tcp any any eq tacacs
20 permit tcp any eq tacacs any
ipv6 access-list copp-system-acl-tacacs6
10 permit tcp any any eq tacacs
20 permit tcp any eq tacacs any
ip access-list copp-system-acl-telnet
10 permit tcp any any eq telnet
20 permit tcp any any eq 107
30 permit tcp any eq telnet any
40 permit tcp any eq 107 any
ipv6 access-list copp-system-acl-telnet6
10 permit tcp any any eq telnet
20 permit tcp any any eq 107
30 permit tcp any eq telnet any
40 permit tcp any eq 107 any
ip access-list copp-system-acl-tftp
10 permit udp any any eq tftp
20 permit udp any any eq 1758
30 permit udp any eq tftp any
40 permit udp any eq 1758 any
ipv6 access-list copp-system-acl-tftp6
10 permit udp any any eq tftp
20 permit udp any any eq 1758
30 permit udp any eq tftp any
40 permit udp any eq 1758 any
ip access-list copp-system-acl-traceroute
10 permit icmp any any ttl-exceeded
20 permit icmp any any port-unreachable
ip access-list copp-system-acl-undesirable
10 permit udp any any eq 1434
ip access-list copp-system-acl-vpc
10 permit udp any any eq 3200
ip access-list copp-system-acl-vrrp
10 permit 112 any 224.0.0.0/24
class-map type control-plane match-any copp-system-class-critical
match access-group name copp-system-acl-bgp
match access-group name copp-system-acl-bgp6
match access-group name copp-system-acl-eigrp
match access-group name copp-system-acl-igmp
match access-group name copp-system-acl-msdp
match access-group name copp-system-acl-ospf
match access-group name copp-system-acl-ospf6
match access-group name copp-system-acl-pim
match access-group name copp-system-acl-pim6
match access-group name copp-system-acl-rip
match access-group name copp-system-acl-vpc
class-map type control-plane match-any copp-system-class-exception
match exception ip option
match exception ip icmp unreachable
match exception ipv6 option
match exception ipv6 icmp unreachable
class-map type control-plane match-any copp-system-class-important
match access-group name copp-system-acl-glbp
match access-group name copp-system-acl-hsrp
match access-group name copp-system-acl-vrrp
match access-group name copp-system-acl-icmp6-msgs
match access-group name copp-system-acl-pim-reg
class-map type control-plane match-any copp-system-class-management
match access-group name copp-system-acl-ftp
match access-group name copp-system-acl-ntp
match access-group name copp-system-acl-ntp6
match access-group name copp-system-acl-radius
match access-group name copp-system-acl-sftp
match access-group name copp-system-acl-snmp
match access-group name copp-system-acl-ssh
match access-group name copp-system-acl-ssh6
match access-group name copp-system-acl-tacacs
match access-group name copp-system-acl-telnet
match access-group name copp-system-acl-tftp
match access-group name copp-system-acl-tftp6
match access-group name copp-system-acl-radius6
match access-group name copp-system-acl-tacacs6
match access-group name copp-system-acl-telnet6
class-map type control-plane match-any copp-system-class-monitoring
match access-group name copp-system-acl-icmp
match access-group name copp-system-acl-icmp6
match access-group name copp-system-acl-traceroute
class-map type control-plane match-any copp-system-class-normal
class-map type control-plane match-any copp-system-class-redirect
match redirect dhcp-snoop
match redirect arp-inspect
class-map type control-plane match-any copp-system-class-undesirable
match access-group name copp-system-acl-undesirable
policy-map type control-plane copp-system-policy
class copp-system-class-critical
police cir 39600 kbps bc 250 ms conform transmit violate drop
class copp-system-class-important
police cir 1060 kbps bc 1000 ms conform transmit violate drop
class copp-system-class-management
police cir 10000 kbps bc 250 ms conform transmit violate drop
class copp-system-class-normal
police cir 680 kbps bc 250 ms conform transmit violate drop
class copp-system-class-redirect
police cir 280 kbps bc 250 ms conform transmit violate drop
class copp-system-class-monitoring
police cir 130 kbps bc 1000 ms conform transmit violate drop
class copp-system-class-exception
police cir 360 kbps bc 250 ms conform transmit violate drop
class copp-system-class-undesirable
police cir 32 kbps bc 250 ms conform drop violate drop
police cir 100 kbps bc 250 ms conform transmit violate drop
service-policy input copp-system-policy
snmp-server user bart network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm network-admin auth md5 <removed> priv <removed> localizedkey
ntp server 192.168.62.161 use-vrf management
ntp server 192.168.62.162 use-vrf management
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip route 0.0.0.0/0 192.168.42.1
ip address 192.168.42.36/24
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
boot kickstart bootflash:/n7000-s1-kickstart.5.1.2.bin sup-1
boot system bootflash:/n7000-s1-dk9.5.1.2.bin sup-1
boot kickstart bootflash:/n7000-s1-kickstart.5.1.2.bin sup-2
boot system bootflash:/n7000-s1-dk9.5.1.2.bin sup-2
logging server 192.168.42.124 6 use-vrf management
RAGG-1-VDC1-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:50:08 2011
username admin password 5 <removed> role vdc-admin
username retail password 5 <removed> role vdc-admin
username emc-ncm password 5 <removed> role vdc-admin
username bart password 5 <removed> role vdc-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
source-interface loopback0
10 permit ip 127.0.0.1/32 192.168.1.11/32
20 permit ip 192.168.41.101/32 192.168.1.11/32
30 permit ip 192.168.41.102/32 192.168.1.11/32
40 permit ip 192.168.42.111/32 192.168.1.11/32
50 permit ip 192.168.42.122/32 192.168.1.11/32
60 permit ip 192.168.42.131/32 192.168.1.11/32
70 permit ip 192.168.42.133/32 192.168.1.11/32
80 permit ip 192.168.42.138/32 192.168.1.11/32
90 permit ip 10.19.151.99/32 192.168.1.11/32
10 permit ip 192.168.42.122/32 192.168.1.11/32
snmp-server source-interface trap loopback0
snmp-server source-interface inform loopback0
snmp-server user bart vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm vdc-admin auth md5 <removed> priv <removed> localizedkey
no snmp-server enable traps entity entity_mib_change
no snmp-server enable traps entity entity_module_status_change
no snmp-server enable traps entity entity_power_status_change
no snmp-server enable traps entity entity_module_inserted
no snmp-server enable traps entity entity_module_removed
no snmp-server enable traps entity entity_unrecognised_module
no snmp-server enable traps entity entity_fan_status_change
no snmp-server enable traps entity entity_power_out_change
no snmp-server enable traps link linkDown
no snmp-server enable traps link linkUp
no snmp-server enable traps link IETF-extended-linkDown
no snmp-server enable traps link IETF-extended-linkUp
no snmp-server enable traps link cisco-extended-linkDown
no snmp-server enable traps link cisco-extended-linkUp
snmp-server enable traps callhome event-notify
snmp-server enable traps callhome smtp-send-fail
snmp-server enable traps cfs state-change-notif
snmp-server enable traps cfs merge-failure
no snmp-server enable traps rf redundancy_framework
snmp-server enable traps aaa server-state-change
no snmp-server enable traps license notify-license-expiry
no snmp-server enable traps license notify-no-license-for-feature
no snmp-server enable traps license notify-licensefile-missing
no snmp-server enable traps license notify-license-expiry-warning
snmp-server enable traps hsrp state-change
no snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion
no snmp-server enable traps upgrade UpgradeJobStatusNotify
snmp-server enable traps feature-control FeatureOpStatusChange
snmp-server enable traps link cisco-xcvr-mon-status-chg
snmp-server enable traps vtp notifs
snmp-server enable traps vtp vlancreate
snmp-server enable traps vtp vlandelete
snmp-server enable traps bridge newroot
snmp-server enable traps bridge topologychange
snmp-server enable traps stpx inconsistency
snmp-server enable traps stpx root-inconsistency
snmp-server enable traps stpx loop-inconsistency
aaa authentication login default group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip address 192.168.10.61/30
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.0
ip address 192.168.152.3/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 10 forwarding-threshold lower 0 upper 0
ip address 192.168.162.3/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 10 forwarding-threshold lower 0 upper 0
spanning-tree port type network
description 10Gig LINK to RCORE-1 T2/1
logging event port link-status
ip address 192.168.10.14/30
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip ospf network point-to-point
ip router ospf 5 area 0.0.0.0
description 10Gig LINK to RCORE-2 T2/1
logging event port link-status
ip address 192.168.10.22/30
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip ospf network point-to-point
ip router ospf 5 area 0.0.0.0
description to DC-ASA-1 vc1 T0/6
switchport trunk allowed vlan 161
spanning-tree port type normal
description to DC-ASA-1 vc2 T0/8
switchport trunk allowed vlan 151
spanning-tree port type normal
description RAGG-2 vPC Channel link
channel-group 99 mode active
description RAGG-2 vPC Channel link
channel-group 99 mode active
description RAGG-2 vPC Channel link
channel-group 99 mode active
description RAGG-2 vPC Channel link
channel-group 99 mode active
ip address 192.168.1.11/32
ip router ospf 5 area 0.0.0.0
logging server 192.168.42.124 6
logging source-interface loopback 0
area 0.0.0.0 range 192.168.1.11/32
area 0.0.0.0 range 192.168.10.12/30
area 0.0.0.0 range 192.168.10.20/30
area 0.0.0.0 range 192.168.10.60/30
area 0.0.0.81 range 192.168.152.0/24
area 0.0.0.81 range 192.168.162.0/24
area 0.0.0.0 authentication message-digest
area 0.0.0.81 authentication message-digest
timers throttle spf 10 100 5000
auto-cost reference-bandwidth 10000
ip pim ssm range 232.0.0.0/8
RAGG-1-VDC2-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:50:48 2011
username admin password 5 <removed> role vdc-admin
username retail password 5 <removed> role vdc-admin
username bart password 5 <removed> role vdc-admin
username emc-ncm password 5 <removed> role vdc-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
source-interface loopback0
10 permit ip 127.0.0.1/32 192.168.1.31/32
20 permit ip 192.168.41.101/32 192.168.1.31/32
30 permit ip 192.168.41.102/32 192.168.1.31/32
40 permit ip 192.168.42.111/32 192.168.1.31/32
50 permit ip 192.168.42.122/32 192.168.1.31/32
60 permit ip 192.168.42.131/32 192.168.1.31/32
70 permit ip 192.168.42.133/32 192.168.1.31/32
80 permit ip 192.168.42.138/32 192.168.1.31/32
90 permit ip 10.19.151.99/32 192.168.1.31/32
10 permit ip 192.168.42.122/32 192.168.1.31/32
snmp-server source-interface trap loopback0
snmp-server source-interface inform loopback0
snmp-server user bart vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm vdc-admin auth md5 <removed> priv <removed> localizedkey
no snmp-server enable traps entity entity_mib_change
no snmp-server enable traps entity entity_module_status_change
no snmp-server enable traps entity entity_power_status_change
no snmp-server enable traps entity entity_module_inserted
no snmp-server enable traps entity entity_module_removed
no snmp-server enable traps entity entity_unrecognised_module
no snmp-server enable traps entity entity_fan_status_change
no snmp-server enable traps entity entity_power_out_change
no snmp-server enable traps link linkDown
no snmp-server enable traps link linkUp
no snmp-server enable traps link IETF-extended-linkDown
no snmp-server enable traps link IETF-extended-linkUp
no snmp-server enable traps link cisco-extended-linkDown
no snmp-server enable traps link cisco-extended-linkUp
snmp-server enable traps callhome event-notify
snmp-server enable traps callhome smtp-send-fail
snmp-server enable traps cfs state-change-notif
snmp-server enable traps cfs merge-failure
no snmp-server enable traps rf redundancy_framework
snmp-server enable traps aaa server-state-change
no snmp-server enable traps license notify-license-expiry
no snmp-server enable traps license notify-no-license-for-feature
no snmp-server enable traps license notify-licensefile-missing
no snmp-server enable traps license notify-license-expiry-warning
snmp-server enable traps hsrp state-change
no snmp-server enable traps upgrade UpgradeOpNotifyOnCompletion
no snmp-server enable traps upgrade UpgradeJobStatusNotify
snmp-server enable traps feature-control FeatureOpStatusChange
snmp-server enable traps link cisco-xcvr-mon-status-chg
snmp-server enable traps vtp notifs
snmp-server enable traps vtp vlancreate
snmp-server enable traps vtp vlandelete
snmp-server enable traps bridge newroot
snmp-server enable traps bridge topologychange
snmp-server enable traps stpx inconsistency
snmp-server enable traps stpx root-inconsistency
snmp-server enable traps stpx loop-inconsistency
aaa authentication login default group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip route 0.0.0.0/0 192.168.162.1
ip route 192.168.41.0/24 192.168.42.135
ip pim ssm range 232.0.0.0/8
ip pim ssm range 232.0.0.0/8
vlan 151-152,154,161-162,164,180-181
spanning-tree vlan 1 priority 4096
ip prefix-list VLAN41 seq 5 permit 192.168.41.0/24
route-map VLAN41 permit 20
match ip address prefix-list VLAN41
peer-keepalive destination 192.168.10.66 source 192.168.10.65 vrf VPC
description DeviceMgmtHigh
ip address 192.168.36.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
description DeviceMgmtLow
ip address 192.168.37.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
description UIM OS Install only
ip address 192.168.38.201/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
ip address 192.168.40.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
description SHUTDOWN - NOW ROUTE VIA HyTrust
ip address 192.168.41.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
ip address 192.168.42.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
description Wireless Systems
ip address 192.168.43.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
description Wireless Systems
ip address 192.168.44.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
ip address 192.168.45.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
ip address 192.168.52.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
ip address 192.168.152.5/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
ip address 192.168.162.5/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
ip address 192.168.180.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
ip address 192.168.181.3/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
switchport trunk allowed vlan 38,41-42,44
switchport trunk allowed vlan 38,41-42,44
switchport trunk allowed vlan 38,41-45,52
switchport trunk allowed vlan 38,41-45,52
switchport trunk allowed vlan 38,41,45-46
spanning-tree port type edge trunk
switchport trunk allowed vlan 38,41,45-46
spanning-tree port type edge trunk
switchport trunk allowed vlan 36-52
spanning-tree port type network
description F-UCS-1_E2/1 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 11 mode active
description F-UCS-1_E2/2 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 11 mode active
description F-UCS-2_E2/1 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 12 mode active
description F-UCS-2_E2/2 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 12 mode active
description SACCESS-3 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 3 mode active
description SACCESS-3 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 3 mode active
description SACCESS-4 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 4 mode active
description SACCESS-4 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 4 mode active
description SACCESS-1 vPC Channel link
switchport trunk allowed vlan 38,41-42,44
channel-group 1 mode active
description SACCESS-2 vPC Channel link
switchport trunk allowed vlan 38,41-42,44
channel-group 2 mode active
description to RSERV-1 T2/1
switchport trunk allowed vlan 162
spanning-tree port type normal
description to RSERV-1 T2/2
switchport trunk allowed vlan 152
spanning-tree port type normal
description to RSERV-1 T2/5
switchport trunk allowed vlan 41-44,164
spanning-tree port type normal
description to RSERV-1 T2/6
switchport trunk allowed vlan 154
spanning-tree port type normal
description to DC-ASA-1 vc1 T5/1
switchport trunk allowed vlan 162
spanning-tree port type normal
description to DC-ASA-1 vc2 T7/1
switchport trunk allowed vlan 152
spanning-tree port type normal
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
switchport trunk allowed vlan 36-52
description linkstate for vpc
ip address 192.168.10.65/30
ip address 192.168.1.31/32
ip router ospf 5 area 0.0.0.81
logging server 192.168.42.124 6 use-vrf servers1
logging source-interface loopback 0
redistribute static route-map VLAN41
area 0.0.0.81 range 192.168.0.0/16
area 0.0.0.81 range 192.168.162.0/24
area 0.0.0.81 authentication message-digest
timers throttle spf 10 100 5000
area 0.0.0.81 range 192.168.0.0/16
area 0.0.0.81 range 192.168.152.0/24
area 0.0.0.81 authentication message-digest
timers throttle spf 10 100 5000
ip pim ssm range 232.0.0.0/8
RAGG-2-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:52:03 2011
limit-resource vlan minimum 16 maximum 4094
limit-resource monitor-session minimum 0 maximum 2
limit-resource monitor-session-erspan-dst minimum 0 maximum 23
limit-resource vrf minimum 2 maximum 1000
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 32 maximum 32
limit-resource u6route-mem minimum 16 maximum 16
limit-resource m4route-mem minimum 48 maximum 48
limit-resource m6route-mem minimum 8 maximum 8
allocate interface Ethernet1/1,Ethernet1/3,Ethernet1/5,Ethernet1/7,Ethernet1/25-32
allocate interface Ethernet2/1-12
limit-resource vlan minimum 16 maximum 4094
limit-resource monitor-session minimum 0 maximum 2
limit-resource monitor-session-erspan-dst minimum 0 maximum 23
limit-resource vrf minimum 2 maximum 1000
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 8 maximum 8
limit-resource u6route-mem minimum 4 maximum 4
limit-resource m4route-mem minimum 8 maximum 8
limit-resource m6route-mem minimum 5 maximum 5
allocate interface Ethernet1/2,Ethernet1/4,Ethernet1/6,Ethernet1/8-24
allocate interface Ethernet2/13-48
limit-resource vlan minimum 16 maximum 4094
limit-resource monitor-session minimum 0 maximum 2
limit-resource monitor-session-erspan-dst minimum 0 maximum 23
limit-resource vrf minimum 2 maximum 1000
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 8 maximum 8
limit-resource u6route-mem minimum 4 maximum 4
limit-resource m4route-mem minimum 8 maximum 8
limit-resource m6route-mem minimum 5 maximum 5
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
username bart password 5 <removed> role network-admin
username emc-ncm password 5 <removed> role network-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip host RAGG-2 192.168.42.37
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
10 permit ip 127.0.0.1/32 192.168.42.37/32
20 permit ip 192.168.41.101/32 192.168.42.37/32
30 permit ip 192.168.41.102/32 192.168.42.37/32
40 permit ip 192.168.42.111/32 192.168.42.37/32
50 permit ip 192.168.42.122/32 192.168.42.37/32
60 permit ip 192.168.42.131/32 192.168.42.37/32
70 permit ip 192.168.42.133/32 192.168.42.37/32
80 permit ip 192.168.42.138/32 192.168.42.37/32
90 permit ip 10.19.151.99/32 192.168.42.37/32
10 permit ip 192.168.42.122/32 192.168.42.37/32
ip access-list copp-system-acl-bgp
10 permit tcp any gt 1024 any eq bgp
20 permit tcp any eq bgp any gt 1024
ipv6 access-list copp-system-acl-bgp6
10 permit tcp any gt 1024 any eq bgp
20 permit tcp any eq bgp any gt 1024
ip access-list copp-system-acl-eigrp
ip access-list copp-system-acl-ftp
10 permit tcp any any eq ftp-data
20 permit tcp any any eq ftp
30 permit tcp any eq ftp-data any
40 permit tcp any eq ftp any
ip access-list copp-system-acl-glbp
10 permit udp any eq 3222 224.0.0.0/24 eq 3222
ip access-list copp-system-acl-hsrp
10 permit udp any 224.0.0.0/24 eq 1985
ip access-list copp-system-acl-icmp
10 permit icmp any any echo
20 permit icmp any any echo-reply
ipv6 access-list copp-system-acl-icmp6
10 permit icmp any any echo-request
20 permit icmp any any echo-reply
ipv6 access-list copp-system-acl-icmp6-msgs
10 permit icmp any any router-advertisement
20 permit icmp any any router-solicitation
30 permit icmp any any nd-na
40 permit icmp any any nd-ns
50 permit icmp any any mld-query
60 permit icmp any any mld-report
70 permit icmp any any mld-reduction
ip access-list copp-system-acl-igmp
10 permit igmp any 224.0.0.0/3
ip access-list copp-system-acl-msdp
10 permit tcp any gt 1024 any eq 639
20 permit tcp any eq 639 any gt 1024
ip access-list copp-system-acl-ntp
10 permit udp any any eq ntp
20 permit udp any eq ntp any
ipv6 access-list copp-system-acl-ntp6
10 permit udp any any eq ntp
20 permit udp any eq ntp any
ip access-list copp-system-acl-ospf
ipv6 access-list copp-system-acl-ospf6
ip access-list copp-system-acl-pim
10 permit pim any 224.0.0.0/24
20 permit udp any any eq pim-auto-rp
ip access-list copp-system-acl-pim-reg
ipv6 access-list copp-system-acl-pim6
10 permit 103 any ff02::d/128
20 permit udp any any eq pim-auto-rp
ip access-list copp-system-acl-radius
10 permit udp any any eq 1812
20 permit udp any any eq 1813
30 permit udp any any eq 1645
40 permit udp any any eq 1646
50 permit udp any eq 1812 any
60 permit udp any eq 1813 any
70 permit udp any eq 1645 any
80 permit udp any eq 1646 any
ipv6 access-list copp-system-acl-radius6
10 permit udp any any eq 1812
20 permit udp any any eq 1813
30 permit udp any any eq 1645
40 permit udp any any eq 1646
50 permit udp any eq 1812 any
60 permit udp any eq 1813 any
70 permit udp any eq 1645 any
80 permit udp any eq 1646 any
ip access-list copp-system-acl-rip
10 permit udp any 224.0.0.0/24 eq rip
ip access-list copp-system-acl-sftp
10 permit tcp any any eq 115
20 permit tcp any eq 115 any
ip access-list copp-system-acl-snmp
10 permit udp any any eq snmp
20 permit udp any any eq snmptrap
ip access-list copp-system-acl-ssh
10 permit tcp any any eq 22
20 permit tcp any eq 22 any
ipv6 access-list copp-system-acl-ssh6
10 permit tcp any any eq 22
20 permit tcp any eq 22 any
ip access-list copp-system-acl-tacacs
10 permit tcp any any eq tacacs
20 permit tcp any eq tacacs any
ipv6 access-list copp-system-acl-tacacs6
10 permit tcp any any eq tacacs
20 permit tcp any eq tacacs any
ip access-list copp-system-acl-telnet
10 permit tcp any any eq telnet
20 permit tcp any any eq 107
30 permit tcp any eq telnet any
40 permit tcp any eq 107 any
ipv6 access-list copp-system-acl-telnet6
10 permit tcp any any eq telnet
20 permit tcp any any eq 107
30 permit tcp any eq telnet any
40 permit tcp any eq 107 any
ip access-list copp-system-acl-tftp
10 permit udp any any eq tftp
20 permit udp any any eq 1758
30 permit udp any eq tftp any
40 permit udp any eq 1758 any
ipv6 access-list copp-system-acl-tftp6
10 permit udp any any eq tftp
20 permit udp any any eq 1758
30 permit udp any eq tftp any
40 permit udp any eq 1758 any
ip access-list copp-system-acl-traceroute
10 permit icmp any any ttl-exceeded
20 permit icmp any any port-unreachable
ip access-list copp-system-acl-undesirable
10 permit udp any any eq 1434
ip access-list copp-system-acl-vpc
10 permit udp any any eq 3200
ip access-list copp-system-acl-vrrp
10 permit 112 any 224.0.0.0/24
class-map type control-plane match-any copp-system-class-critical
match access-group name copp-system-acl-bgp
match access-group name copp-system-acl-bgp6
match access-group name copp-system-acl-eigrp
match access-group name copp-system-acl-igmp
match access-group name copp-system-acl-msdp
match access-group name copp-system-acl-ospf
match access-group name copp-system-acl-ospf6
match access-group name copp-system-acl-pim
match access-group name copp-system-acl-pim6
match access-group name copp-system-acl-rip
match access-group name copp-system-acl-vpc
class-map type control-plane match-any copp-system-class-exception
match exception ip option
match exception ip icmp unreachable
match exception ipv6 option
match exception ipv6 icmp unreachable
class-map type control-plane match-any copp-system-class-important
match access-group name copp-system-acl-glbp
match access-group name copp-system-acl-hsrp
match access-group name copp-system-acl-vrrp
match access-group name copp-system-acl-icmp6-msgs
match access-group name copp-system-acl-pim-reg
class-map type control-plane match-any copp-system-class-management
match access-group name copp-system-acl-ftp
match access-group name copp-system-acl-ntp
match access-group name copp-system-acl-ntp6
match access-group name copp-system-acl-radius
match access-group name copp-system-acl-sftp
match access-group name copp-system-acl-snmp
match access-group name copp-system-acl-ssh
match access-group name copp-system-acl-ssh6
match access-group name copp-system-acl-tacacs
match access-group name copp-system-acl-telnet
match access-group name copp-system-acl-tftp
match access-group name copp-system-acl-tftp6
match access-group name copp-system-acl-radius6
match access-group name copp-system-acl-tacacs6
match access-group name copp-system-acl-telnet6
class-map type control-plane match-any copp-system-class-monitoring
match access-group name copp-system-acl-icmp
match access-group name copp-system-acl-icmp6
match access-group name copp-system-acl-traceroute
class-map type control-plane match-any copp-system-class-normal
class-map type control-plane match-any copp-system-class-redirect
match redirect dhcp-snoop
match redirect arp-inspect
class-map type control-plane match-any copp-system-class-undesirable
match access-group name copp-system-acl-undesirable
policy-map type control-plane copp-system-policy
class copp-system-class-critical
police cir 39600 kbps bc 250 ms conform transmit violate drop
class copp-system-class-important
police cir 1060 kbps bc 1000 ms conform transmit violate drop
class copp-system-class-management
police cir 10000 kbps bc 250 ms conform transmit violate drop
class copp-system-class-normal
police cir 680 kbps bc 250 ms conform transmit violate drop
class copp-system-class-redirect
police cir 280 kbps bc 250 ms conform transmit violate drop
class copp-system-class-monitoring
police cir 130 kbps bc 1000 ms conform transmit violate drop
class copp-system-class-exception
police cir 360 kbps bc 250 ms conform transmit violate drop
class copp-system-class-undesirable
police cir 32 kbps bc 250 ms conform drop violate drop
police cir 100 kbps bc 250 ms conform transmit violate drop
service-policy input copp-system-policy
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
ntp server 192.168.62.161 use-vrf management
ntp server 192.168.62.162 use-vrf management
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip route 0.0.0.0/0 192.168.42.1
ip address 192.168.42.37/24
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
boot kickstart bootflash:/n7000-s1-kickstart.5.1.2.bin sup-1
boot system bootflash:/n7000-s1-dk9.5.1.2.bin sup-1
boot kickstart bootflash:/n7000-s1-kickstart.5.1.2.bin sup-2
boot system bootflash:/n7000-s1-dk9.5.1.2.bin sup-2
logging server 192.168.42.124 6 use-vrf management
RAGG-2-VDC1-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:52:35 2011
username admin password 5 <removed> role vdc-admin
username retail password 5 <removed> role vdc-admin
username emc-ncm password 5 <removed> role vdc-admin
username bart password 5 <removed> role vdc-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
source-interface loopback0
10 permit ip 127.0.0.1/32 192.168.1.12/32
20 permit ip 192.168.41.101/32 192.168.1.12/32
30 permit ip 192.168.41.102/32 192.168.1.12/32
40 permit ip 192.168.42.111/32 192.168.1.12/32
50 permit ip 192.168.42.122/32 192.168.1.12/32
60 permit ip 192.168.42.131/32 192.168.1.12/32
70 permit ip 192.168.42.133/32 192.168.1.12/32
80 permit ip 192.168.42.138/32 192.168.1.12/32
90 permit ip 10.19.151.99/32 192.168.1.12/32
10 permit ip 192.168.42.122/32 192.168.1.12/32
snmp-server user admin vdc-admin auth md5 <removed> priv <removed> localizedkey
aaa authentication login default group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip address 192.168.10.62/30
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.0
ip address 192.168.152.4/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 10 forwarding-threshold lower 0 upper 0
ip address 192.168.162.4/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 10 forwarding-threshold lower 0 upper 0
spanning-tree port type network
description 10Gig LINK to RCORE-1 T2/2
logging event port link-status
ip address 192.168.10.18/30
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip ospf network point-to-point
ip router ospf 5 area 0.0.0.0
description 10Gig LINK to RCORE-2 T2/2
logging event port link-status
ip address 192.168.10.26/30
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip ospf network point-to-point
ip router ospf 5 area 0.0.0.0
description to DC-ASA-2 vc1 T0/6
switchport trunk allowed vlan 161
spanning-tree port type normal
description to DC-ASA-2 vc2 T0/8
switchport trunk allowed vlan 151
spanning-tree port type normal
description RAGG-1 vPC Channel link
channel-group 99 mode active
description RAGG-1 vPC Channel link
channel-group 99 mode active
description RAGG-1 vPC Channel link
channel-group 99 mode active
description RAGG-1 vPC Channel link
channel-group 99 mode active
ip address 192.168.1.12/32
ip router ospf 5 area 0.0.0.0
logging server 192.168.42.124 6
logging source-interface loopback 0
area 0.0.0.0 range 192.168.1.12/32
area 0.0.0.0 range 192.168.10.12/30
area 0.0.0.0 range 192.168.10.20/30
area 0.0.0.0 range 192.168.10.60/30
area 0.0.0.81 range 192.168.152.0/24
area 0.0.0.81 range 192.168.162.0/24
area 0.0.0.0 authentication message-digest
area 0.0.0.81 authentication message-digest
timers throttle spf 10 100 5000
auto-cost reference-bandwidth 10000
ip pim ssm range 232.0.0.0/8
RAGG-2-VDC2-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:53:03 2011
username admin password 5 <removed> role vdc-admin
username retail password 5 <removed> role vdc-admin
username bart password 5 <removed> role vdc-admin
username emc-ncm password 5 <removed> role vdc-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
source-interface loopback0
10 permit ip 127.0.0.1/32 192.168.1.32/32
20 permit ip 192.168.41.101/32 192.168.1.32/32
30 permit ip 192.168.41.102/32 192.168.1.32/32
40 permit ip 192.168.42.111/32 192.168.1.32/32
50 permit ip 192.168.42.122/32 192.168.1.32/32
60 permit ip 192.168.42.131/32 192.168.1.32/32
70 permit ip 192.168.42.133/32 192.168.1.32/32
80 permit ip 192.168.42.138/32 192.168.1.32/32
90 permit ip 10.19.151.99/32 192.168.1.32/32
10 permit ip 192.168.42.122/32 192.168.1.32/32
snmp-server user admin vdc-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail vdc-admin auth md5 <removed> priv <removed> localizedkey
aaa authentication login default group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip route 0.0.0.0/0 192.168.36.3
ip pim ssm range 232.0.0.0/8
ip pim ssm range 232.0.0.0/8
vlan 151-152,154,161-162,164,180-181
ip prefix-list VLAN41 seq 5 permit 192.168.41.0/24
route-map VLAN41 permit 20
match ip address prefix-list VLAN41
peer-keepalive destination 192.168.10.65 source 192.168.10.66 vrf VPC
ip address 192.168.36.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
description DeviceMgmtHigh
ip address 192.168.37.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
description DeviceMgmtLow
ip address 192.168.38.202/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
description UIM OS Install only
ip address 192.168.40.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
ip address 192.168.41.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 90 forwarding-threshold lower 1 upper 1
description SHUTDOWN - NOW ROUTE VIA HyTrust
ip address 192.168.42.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
ip address 192.168.43.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
description Wireless Systems
ip address 192.168.44.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
description Wireless Systems
ip address 192.168.45.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
ip address 192.168.52.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 105 forwarding-threshold lower 0 upper 0
ip address 192.168.152.6/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
ip address 192.168.162.6/24
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 3 <removed>
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
ip address 192.168.180.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 110 forwarding-threshold lower 0 upper 0
ip address 192.168.181.4/24
ip ospf passive-interface
ip router ospf 5 area 0.0.0.81
authentication text c1sc0
preempt delay minimum 180
priority 120 forwarding-threshold lower 0 upper 0
switchport trunk allowed vlan 38,41-42,44
switchport trunk allowed vlan 38,41-42,44
switchport trunk allowed vlan 38,41-45,52
switchport trunk allowed vlan 38,41-45,52
switchport trunk allowed vlan 38,41,45-46
spanning-tree port type edge trunk
switchport trunk allowed vlan 38,41,45-46
spanning-tree port type edge trunk
switchport trunk allowed vlan 36-52
spanning-tree port type network
description F-UCS-1_E2/1 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 11 mode active
description F-UCS-1_E2/2 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
spanning-tree port type normal
channel-group 11 mode active
description F-UCS-2_E2/1 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 12 mode active
description F-UCS-2_E2/2 vPC Channel link
switchport trunk allowed vlan 38,41,45-46
channel-group 12 mode active
description SACCESS-3 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 3 mode active
description SACCESS-3 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 3 mode active
description SACCESS-4 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 4 mode active
description SACCESS-4 vPC Channel link
switchport trunk allowed vlan 38,41-45,52
channel-group 4 mode active
description SACCESS-1 vPC Channel link
switchport trunk allowed vlan 38,41-42,44
channel-group 1 mode active
description SACCESS-2 vPC Channel link
switchport trunk allowed vlan 38,41-42,44
channel-group 2 mode active
description to RSERV-2 T2/6
spanning-tree port type normal
description to RSERV-2 T2/5
switchport trunk allowed vlan 42,164
description to DC-ASA-2 vc1 T5/1
switchport trunk allowed vlan 152
spanning-tree port type normal
description to DC-ASA-2 vc2 T7/1
switchport trunk allowed vlan 152
spanning-tree port type normal
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description RAGG-2 vPC Channel link
switchport trunk allowed vlan 36-52
channel-group 99 mode active
description SACCESS-5 vPC Channel link
description linkstate for vpc
ip address 192.168.10.66/30
ip address 192.168.1.32/32
ip router ospf 5 area 0.0.0.81
logging server 192.168.42.124 6 use-vrf servers1
logging source-interface loopback 0
area 0.0.0.81 range 192.168.0.0/16
area 0.0.0.81 range 192.168.162.0/24
area 0.0.0.81 authentication message-digest
timers throttle spf 10 100 5000
area 0.0.0.81 range 192.168.0.0/16
area 0.0.0.81 range 192.168.152.0/24
area 0.0.0.81 authentication message-digest
timers throttle spf 10 100 5000
ip pim ssm range 232.0.0.0/8
N1KV-1-RUNNING
!Command: show running-config
!Time: Sat Apr 30 03:02:54 2011
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
banner motd #
WARNING:
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
#
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
aaa group server tacacs+ tacacs
10 permit ip 192.168.42.0/24 any
10 permit ip 192.168.42.0/24 any
host vmware id 414e3537-3441-3255-5838-34353034544b
host vmware id 414e3537-3441-3255-5838-34353034544d
host vmware id 414e3537-3441-3255-5838-333930345046
host vmware id 414e3537-3441-3255-5838-34353034544c
host vmware id 414e3537-3441-3255-5838-333930344e59
host vmware id 414e3537-3441-3255-5838-333830333330
host vmware id 414e3537-3441-3255-5838-333930345057
host vmware id 414e3537-3441-3255-5838-343530345630
host vmware id 414e3537-3441-3255-5838-343530345448
host vmware id 414e3537-3441-3255-5838-333930345048
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail network-admin auth md5 <removed> priv <removed> localizedkey
ntp server 192.168.62.161 use-vrf management
ntp server 192.168.62.162 use-vrf management
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
ip route 0.0.0.0/0 192.168.41.1
port-channel load-balance ethernet source-mac
port-profile default max-ports 32
port-profile type vethernet VLAN38
switchport access vlan 38
port-profile type vethernet VLAN36
switchport access vlan 36
port-profile type vethernet VLAN37
switchport access vlan 37
port-profile type vethernet VLAN39
switchport access vlan 39
port-profile type vethernet VLAN40
switchport access vlan 40
port-profile type vethernet VLAN41
switchport access vlan 41
port-profile type vethernet VLAN42
switchport access vlan 42
port-profile type vethernet VLAN43
switchport access vlan 43
port-profile type vethernet VLAN44
switchport access vlan 44
port-profile type vethernet VLAN45
switchport access vlan 45
port-profile type vethernet VLAN46
switchport access vlan 46
port-profile type vethernet VLAN52
switchport access vlan 52
port-profile type vethernet VLAN64
switchport access vlan 64
port-profile type vethernet VLAN72
switchport access vlan 72
port-profile type vethernet VLAN80
switchport access vlan 80
port-profile type vethernet VLAN81
switchport access vlan 81
port-profile type vethernet VLAN82
switchport access vlan 82
port-profile type vethernet VLAN83
switchport access vlan 83
port-profile type ethernet Unused_Or_Quarantine_Uplink
description Port-group created for Nexus1000V internal usage. Do not use.
port-profile type vethernet Unused_Or_Quarantine_Veth
description Port-group created for Nexus1000V internal usage. Do not use.
port-profile type ethernet sysuplink
switchport trunk allowed vlan 36-83
port-profile type vethernet VSG-DADA-HA
switchport access vlan 41
port-profile type vethernet Tenant-1
vn-service ip-address 192.168.52.11 vlan 52 security-profile SecurityProfile-1
switchport access vlan 41
limit-resource vlan minimum 16 maximum 2049
limit-resource monitor-session minimum 0 maximum 2
limit-resource vrf minimum 16 maximum 8192
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 32 maximum 32
limit-resource u6route-mem minimum 16 maximum 16
limit-resource m4route-mem minimum 58 maximum 58
limit-resource m6route-mem minimum 8 maximum 8
ip address 192.168.41.61/24
inherit port-profile VLAN42
description RSA-Archer,Network Adapter 1
vmware dvport 207 dvswitch uuid "f9 31 3b 50 f5 23 1c a3-34 b1 f1 a6 d6 24 6c c0"
vmware vm mac 0050.56BB.001E
inherit port-profile VSG-DADA-HA
description Nexus1000VSG,Network Adapter 3
vmware dvport 1057 dvswitch uuid "f9 31 3b 50 f5 23 1c a3-34 b1 f1 a6 d6 24 6c c0"
vmware vm mac 0050.56BB.0004
inherit port-profile VSG-DADA-HA
description Nexus1000VSG,Network Adapter 1
vmware dvport 1056 dvswitch uuid "f9 31 3b 50 f5 23 1c a3-34 b1 f1 a6 d6 24 6c c0"
vmware vm mac 0050.56BB.0002
inherit port-profile VLAN52
description POS Terminal,Network Adapter 1
vmware dvport 352 dvswitch uuid "f9 31 3b 50 f5 23 1c a3-34 b1 f1 a6 d6 24 6c c0"
vmware vm mac 0050.56BB.0005
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
boot kickstart bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.4.bin sup-1
boot system bootflash:/nexus-1000v-mz.4.2.1.SV1.4.bin sup-1
boot kickstart bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.4.bin sup-2
boot system bootflash:/nexus-1000v-mz.4.2.1.SV1.4.bin sup-2
remote ip address 192.168.41.102 port 80
vmware dvs uuid "f9 31 3b 50 f5 23 1c a3-34 b1 f1 a6 d6 24 6c c0" datacenter-name Retail
Lab-CMO
registration-ip 192.168.41.65
policy-agent-image bootflash:/vnmc-vsmpa.1.0.1j.bin
logging server 192.168.42.124 7 facility syslog
logging timestamp milliseconds
VSG-TENANT-1-RUNNING
!Command: show running-config
!Time: Sat Apr 30 03:09:08 2011
username admin password 5 <removed> role network-admin
banner motd #
WARNING:
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
#
tacacs-server key 7 " <removed> "
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
aaa group server tacacs+ tacacs
no snmp-server protocol enable
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
ip route 0.0.0.0/0 192.168.41.1
port-channel load-balance ethernet source-mac
port-profile default max-ports 32
limit-resource vlan minimum 16 maximum 2049
limit-resource monitor-session minimum 0 maximum 2
limit-resource vrf minimum 16 maximum 8192
limit-resource port-channel minimum 0 maximum 768
limit-resource u4route-mem minimum 32 maximum 32
limit-resource u6route-mem minimum 16 maximum 16
limit-resource m4route-mem minimum 58 maximum 58
limit-resource m6route-mem minimum 8 maximum 8
ip address 192.168.41.63/24
ip address 192.168.52.11/24
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
boot kickstart bootflash:/nexus-1000v-kickstart-mz.VSG1.1.bin sup-1
boot system bootflash:/nexus-1000v-mz.VSG1.1.bin sup-1
boot kickstart bootflash:/nexus-1000v-kickstart-mz.VSG1.1.bin sup-2
boot system bootflash:/nexus-1000v-mz.VSG1.1.bin sup-2
ip access-list match-local-traffic
security-profile SecurityProfile-1@root/Tenant-1
policy PolicySet-A@root/Tenant-1
custom-attribute vnsporg "root/tenant-1"
security-profile default@root
custom-attribute vnsporg "root"
rule default/default-rule@root
rule PolicyA/allow_ICMP@root/Tenant-1
condition 10 dst.net.ip-address eq 192.168.1.1
condition 11 net.protocol eq 1
rule default/default-rule@root order 2
policy PolicySet-A@root/Tenant-1
rule PolicyA/allow_ICMP@root/Tenant-1 order 101
registration-ip 192.168.41.65
policy-agent-image bootflash:/vnmc-vsgpa.1.0.1j.bin
logging logfile messages 2
logging server 192.168.42.124 6 facility local0
RSERV-1
! Last configuration change at 01:53:06 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:53:07 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service counters max age 5
boot system flash sup-bootdisk:/s72033-adventerprisek9_wan-mz.122-33.SXJ.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
svclc module 4 vlan-group 162,163
svclc vlan-group 162 152,162
svclc vlan-group 163 153,163
intrusion-detection module 9 management-port access-vlan 42
intrusion-detection module 9 data-port 1 trunk allowed-vlan 153,154
intrusion-detection module 9 data-port 2 trunk allowed-vlan 163,164
ip domain-name cisco-irn.com
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 mfib hardware-switching replication-mode ingress
no mls acl tcam share-global
mls cef error action freeze
crypto pki trustpoint TP-self-signed-1027
subject-name cn=IOS-Self-Signed-Certificate-1027
rsakeypair TP-self-signed-1027
crypto pki certificate chain TP-self-signed-1027
certificate self-signed 01
notify syslog contenttype plaintext
diagnostic bootup level minimal
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
vlan internal allocation policy descending
vlan access-log ratelimit 2000
name WAAS_Central_Manager
name NorthSide_facing_ASA_Servers2
name SouthSide_facing_Servers2
name NorthSide_facing_ASA_Servers1
name SouthSide_facing_Servers1
name RSERV-1_to_RAGG-1-VDC-2
ip address 192.168.1.21 255.255.255.255
ip address 192.168.62.161 255.255.255.255
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface GigabitEthernet1/5
interface GigabitEthernet1/6
interface GigabitEthernet1/7
interface GigabitEthernet1/8
interface GigabitEthernet1/9
interface GigabitEthernet1/10
interface GigabitEthernet1/11
interface GigabitEthernet1/12
interface GigabitEthernet1/13
interface GigabitEthernet1/14
interface GigabitEthernet1/15
interface GigabitEthernet1/16
interface TenGigabitEthernet2/1
description to RAGG-1 vdc2 T1/15
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 162
interface TenGigabitEthernet2/2
description to RAGG-1 vdc2 T1/16
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 152
interface TenGigabitEthernet2/3
interface TenGigabitEthernet2/4
interface TenGigabitEthernet2/5
description to RAGG-1 vdc2 T1/17
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 41-44,164,803
interface TenGigabitEthernet2/6
description to RAGG-1 vdc2 T1/18
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 154
interface TenGigabitEthernet2/7
interface TenGigabitEthernet2/8
interface GigabitEthernet5/1
interface GigabitEthernet5/2
interface GigabitEthernet6/1
interface GigabitEthernet6/2
interface GigabitEthernet7/1
interface GigabitEthernet7/2
interface GigabitEthernet7/3
interface GigabitEthernet7/4
interface GigabitEthernet7/5
interface GigabitEthernet7/6
interface GigabitEthernet7/7
interface GigabitEthernet7/8
interface GigabitEthernet7/9
interface GigabitEthernet7/10
interface GigabitEthernet7/11
interface GigabitEthernet7/12
interface GigabitEthernet7/13
interface GigabitEthernet7/14
interface GigabitEthernet7/15
interface GigabitEthernet7/16
interface GigabitEthernet7/17
description WAAS Central Manager
switchport access vlan 47
interface GigabitEthernet7/18
interface GigabitEthernet7/19
interface GigabitEthernet7/20
interface GigabitEthernet7/21
switchport access vlan 43
spanning-tree portfast edge
interface GigabitEthernet7/22
switchport access vlan 43
spanning-tree portfast edge
interface GigabitEthernet7/23
description MDS Management PAME-DC-1
switchport access vlan 44
spanning-tree portfast edge
interface GigabitEthernet7/24
description MDS Management MDS-DC-1_M0
switchport access vlan 41
spanning-tree portfast edge
interface GigabitEthernet7/25
description MDS Management MDS-DC-2_M0
switchport access vlan 41
spanning-tree portfast edge
interface GigabitEthernet7/26
interface GigabitEthernet7/27
switchport access vlan 42
spanning-tree portfast edge
interface GigabitEthernet7/28
interface GigabitEthernet7/29
switchport access vlan 43
spanning-tree portfast edge
interface GigabitEthernet7/30
switchport access vlan 43
spanning-tree portfast edge
interface GigabitEthernet7/31
interface GigabitEthernet7/32
interface GigabitEthernet7/33
switchport access vlan 42
spanning-tree portfast edge
interface GigabitEthernet7/34
interface GigabitEthernet7/35
switchport access vlan 49
interface GigabitEthernet7/36
interface GigabitEthernet7/37
interface GigabitEthernet7/38
interface GigabitEthernet7/39
interface GigabitEthernet7/40
interface GigabitEthernet7/41
interface GigabitEthernet7/42
interface GigabitEthernet7/43
interface GigabitEthernet7/44
interface GigabitEthernet7/45
description hard crossover bridge
interface GigabitEthernet7/46
interface GigabitEthernet7/47
interface GigabitEthernet7/48
description ** South Side facing Servers1 **
ip address 192.168.130.10 255.255.255.252
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
area 81 authentication message-digest
area 81 range 192.168.0.0 255.255.0.0
timers throttle spf 10 100 5000
passive-interface default
no passive-interface Vlan803
network 192.168.0.0 0.0.255.255 area 81
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Loopback0
logging source-interface Loopback0
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps MAC-Notification change move threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp server 171.68.10.80 prefer
mac-address-table aging-time 480
RSERV-2
! Last configuration change at 01:50:12 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:50:13 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service counters max age 5
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
svclc module 4 vlan-group 162,163
svclc vlan-group 162 152,162
svclc vlan-group 163 153,163
intrusion-detection module 9 management-port access-vlan 42
intrusion-detection module 9 data-port 1 trunk allowed-vlan 153,154
intrusion-detection module 9 data-port 2 trunk allowed-vlan 163,164
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 mfib hardware-switching replication-mode ingress
no mls acl tcam share-global
mls cef error action freeze
crypto pki trustpoint TP-self-signed-1027
subject-name cn=IOS-Self-Signed-Certificate-1027
rsakeypair TP-self-signed-1027
crypto pki certificate chain TP-self-signed-1027
certificate self-signed 01
30820241 308201AA A0030201 02020101 300D0609 2A864886 F70D0101 04050030
2B312930 27060355 04031320 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31303237 301E170D 31313034 32313030 30353139 5A170D32
30303130 31303030 3030305A 302B3129 30270603 55040313 20494F53 2D53656C
662D5369 676E6564 2D436572 74696669 63617465 2D313032 3730819F 300D0609
2A864886 F70D0101 01050003 818D0030 81890281 8100A365 80CA486A 1FCC3F72
4B6DDFE1 AA57CE0A 4726554C B0D6B6F3 BC9F3F3A 84AAD96D 0C8D4E07 3E5C42FD
2AB0BA8A 1E5E28AE BDA4FE3A F1A425A6 2D2F09E0 3DC30109 F4561A9B EADC4896
87FD5133 4FEAFA2F C214CB35 11B7AEB6 F0C3DE4F 4453DA89 6177A6D3 9FDA59BA
EE11414E 008C40A8 FF768B0D 0CE97204 82FB71C6 10C30203 010001A3 75307330
0F060355 1D130101 FF040530 030101FF 30200603 551D1104 19301782 15525345
52562D32 2E636973 636F2D69 726E2E63 6F6D301F 0603551D 23041830 16801425
E9402754 9D8FF072 B2B9284C D1157536 23A79C30 1D060355 1D0E0416 041425E9
4027549D 8FF072B2 B9284CD1 15753623 A79C300D 06092A86 4886F70D 01010405
00038181 003EACB3 84C4E98F 65FE3BE2 F4984B3D 908DCF32 E89B4217 6F3444EB
E844C491 A50B817E 508BE874 E4C1FE1E 9A92EDC5 8566CC69 AB760674 E802086B
DDD7DF6A 3964355C 0F88B1AB 52E69373 D25A2877 3379ECAF A8D3DAE8 239C2708
8B1C24DF 4210091C 8C3DF041 7B10147C E399480E 6A7D00DD 64D8AD86 528815E4
notify syslog contenttype plaintext
diagnostic bootup level minimal
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
vlan internal allocation policy descending
vlan access-log ratelimit 2000
name WAAS_Central_Manager
name NorthSide_facing_ASA_Servers2
name SouthSide_facing_Servers2
name NorthSide_facing_ASA_Servers1
name SouthSide_facing_Servers1
name RSERV-2_to_RAGG-2-VDC-2
ip address 192.168.1.22 255.255.255.255
ip address 192.168.62.162 255.255.255.255
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface GigabitEthernet1/5
interface GigabitEthernet1/6
interface GigabitEthernet1/7
interface GigabitEthernet1/8
interface GigabitEthernet1/9
interface GigabitEthernet1/10
interface GigabitEthernet1/11
interface GigabitEthernet1/12
interface GigabitEthernet1/13
interface GigabitEthernet1/14
interface GigabitEthernet1/15
interface GigabitEthernet1/16
interface TenGigabitEthernet2/1
description to RAGG-2 vdc2 T1/15
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 162
interface TenGigabitEthernet2/2
description to RAGG-2 vdc2 T1/16
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 152
interface TenGigabitEthernet2/3
interface TenGigabitEthernet2/4
interface TenGigabitEthernet2/5
description to RAGG-2 vdc2 T1/18
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 41-44,164,804
interface TenGigabitEthernet2/6
description to RAGG-2 vdc2 T1/17
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 154
interface TenGigabitEthernet2/7
interface TenGigabitEthernet2/8
interface GigabitEthernet5/1
interface GigabitEthernet5/2
interface GigabitEthernet6/1
interface GigabitEthernet6/2
interface GigabitEthernet7/1
switchport access vlan 42
interface GigabitEthernet7/2
interface GigabitEthernet7/3
interface GigabitEthernet7/4
interface GigabitEthernet7/5
switchport access vlan 48
interface GigabitEthernet7/6
interface GigabitEthernet7/7
interface GigabitEthernet7/8
interface GigabitEthernet7/9
interface GigabitEthernet7/10
interface GigabitEthernet7/11
interface GigabitEthernet7/12
interface GigabitEthernet7/13
interface GigabitEthernet7/14
interface GigabitEthernet7/15
interface GigabitEthernet7/16
interface GigabitEthernet7/17
interface GigabitEthernet7/18
interface GigabitEthernet7/19
interface GigabitEthernet7/20
interface GigabitEthernet7/21
interface GigabitEthernet7/22
interface GigabitEthernet7/23
switchport access vlan 44
interface GigabitEthernet7/24
interface GigabitEthernet7/25
interface GigabitEthernet7/26
interface GigabitEthernet7/27
switchport access vlan 42
spanning-tree portfast edge
interface GigabitEthernet7/28
interface GigabitEthernet7/29
interface GigabitEthernet7/30
interface GigabitEthernet7/31
interface GigabitEthernet7/32
interface GigabitEthernet7/33
interface GigabitEthernet7/34
interface GigabitEthernet7/35
interface GigabitEthernet7/36
interface GigabitEthernet7/37
interface GigabitEthernet7/38
interface GigabitEthernet7/39
interface GigabitEthernet7/40
interface GigabitEthernet7/41
interface GigabitEthernet7/42
interface GigabitEthernet7/43
interface GigabitEthernet7/44
interface GigabitEthernet7/45
interface GigabitEthernet7/46
interface GigabitEthernet7/47
interface GigabitEthernet7/48
ip address 192.168.42.47 255.255.255.0
description ** South Side facing Servers1 **
ip address 192.168.130.14 255.255.255.252
ip ospf authentication message-digest
ip ospf message-digest-key 1 md5 7 <removed>
area 81 authentication message-digest
area 81 range 192.168.0.0 255.255.0.0
timers throttle spf 10 100 5000
passive-interface default
no passive-interface Vlan804
network 192.168.0.0 0.0.255.255 area 81
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.42.1 255 name backup_default
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Loopback0
logging source-interface Loopback0
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps MAC-Notification change move threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp server 171.68.10.80 prefer
mac-address-table aging-time 480
Access
SACCESS-1
! Last configuration change at 01:58:36 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:58:36 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime localtime show-timezone
service password-encryption
logging buffered 51200 debugging
enable secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username retail privilege 15 secret 5 <removed> username bart privilege 15 secret 5
<removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-112603
subject-name cn=IOS-Self-Signed-Certificate-112603
rsakeypair TP-self-signed-112603
crypto pki certificate chain TP-self-signed-112603
certificate self-signed 01
power redundancy-mode redundant
spanning-tree extend system-id
vlan internal allocation policy ascending
vlan 72,146,164,256,666,1000
description to Aggregation Switches
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 38,41,42,44
logging event link-status
interface GigabitEthernet1/1
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/2
switchport trunk encapsulation dot1q
switchport trunk native vlan 41
spanning-tree portfast trunk
interface GigabitEthernet1/3
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/4
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/5
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/6
description SRV-DC-6=CUAE
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/7
description SRV-DC-7=CCM511
switchport access vlan 45
interface GigabitEthernet1/8
description SRV-DC-8 - Oracle RDBMS 10g
switchport access vlan 64
switchport trunk encapsulation dot1q
switchport trunk native vlan 64
spanning-tree portfast trunk
interface GigabitEthernet1/9
switchport access vlan 44
switchport trunk encapsulation dot1q
interface GigabitEthernet1/10
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/11
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/12
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/13
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/14
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/15
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/16
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/17
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/18
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/19
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/20
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/21
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/22
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/23
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/24
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/25
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/26
description server 14 iLO
switchport access vlan 40
interface GigabitEthernet1/27
description server 15 iLO
switchport access vlan 40
interface GigabitEthernet1/28
description server 16 iLO
switchport access vlan 40
interface GigabitEthernet1/29
description server 18 iLO
switchport access vlan 40
interface GigabitEthernet1/30
description server 19 iLO
switchport access vlan 40
interface GigabitEthernet1/31
description server 20 iLO
switchport access vlan 40
interface GigabitEthernet1/32
description server 21 iLO
switchport access vlan 40
interface GigabitEthernet1/33
description VXML Rouer VEM
switchport access vlan 45
interface GigabitEthernet1/34
description SPAN to SRV-DC-28-NICE VoiceRecorder
switchport trunk encapsulation dot1q
interface GigabitEthernet1/35
description Small store 1800 server e1
switchport access vlan 42
switchport trunk encapsulation dot1q
interface GigabitEthernet1/36
description small store 1800 iLO
switchport access vlan 40
interface GigabitEthernet1/37
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/38
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/39
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/40
description IPcelerate Server
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/41
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/42
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/43
description EMC SAN Mgt-A
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/44
description PRomise SAN M1
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/45
switchport access vlan 42
interface GigabitEthernet1/46
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/47
description Uplink to RSERV-1 Management G7/1
switchport access vlan 42
interface GigabitEthernet1/48
description Uplink to RSERV-2 Management G7/1
switchport access vlan 42
interface TenGigabitEthernet1/49
description Uplink to RAGG-1-VDC2 T1/13
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 38,41,42,44
channel-group 1 mode active
spanning-tree portfast trunk
interface TenGigabitEthernet1/50
description Uplink to RAGG-2-VDC2 T1/13
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 38,41,42,44
channel-group 1 mode active
spanning-tree portfast trunk
ip address 192.168.42.33 255.255.255.0
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.42.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan42
logging source-interface Vlan42
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan42
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps flash insertion removal
snmp-server enable traps cpu threshold
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps hsrp
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
no tacacs-server directed-request
tacacs-server key 7 <removed>
radius-server source-ports 1645-1646
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
monitor session 1 source interface Gi1/33
monitor session 1 destination interface Gi1/34
ntp clock-period 17181001
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
SACCESS-2
! Last configuration change at 01:59:33 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:59:33 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
logging buffered 51200 debugging
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
spanning-tree extend system-id
power redundancy-mode redundant
vlan internal allocation policy ascending
vlan 45-49,52,62,64,72,146,164,256,666,1000
description to Aggregation Switches
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 38,41,42,44
logging event link-status
interface GigabitEthernet1/1
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/2
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/3
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/4
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/5
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/6
description SRV-DC-6=CUAE
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/7
description SRV-DC-7=CCM511
switchport access vlan 45
interface GigabitEthernet1/8
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/9
switchport access vlan 44
switchport trunk encapsulation dot1q
interface GigabitEthernet1/10
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/11
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/12
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/13
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/14
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/15
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/16
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/17
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/18
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/19
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/20
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/21
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/22
switchport trunk encapsulation dot1q
switchport trunk native vlan 4094
spanning-tree portfast trunk
interface GigabitEthernet1/23
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/24
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/25
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/26
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/27
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/28
switchport access vlan 40
interface GigabitEthernet1/29
switchport access vlan 40
interface GigabitEthernet1/30
switchport access vlan 40
interface GigabitEthernet1/31
switchport access vlan 40
interface GigabitEthernet1/32
switchport access vlan 40
interface GigabitEthernet1/33
switchport access vlan 40
interface GigabitEthernet1/34
switchport access vlan 40
interface GigabitEthernet1/35
switchport access vlan 40
interface GigabitEthernet1/36
switchport access vlan 40
interface GigabitEthernet1/37
switchport access vlan 40
interface GigabitEthernet1/38
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/39
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/40
description IPcelerate Server
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/41
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/42
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/43
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/44
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/45
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/46
switchport access vlan 42
switchport trunk encapsulation dot1q
switchport trunk native vlan 42
spanning-tree portfast trunk
interface GigabitEthernet1/47
description TEMP Uplink to RSERV-1 Management G7/2
switchport access vlan 42
interface GigabitEthernet1/48
description TEMP Uplink to RSERV-2 Management G7/2
switchport access vlan 42
interface TenGigabitEthernet1/49
description Uplink to RAGG-1-VDC2 T1/14
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 38,41,42,44
spanning-tree portfast trunk
channel-group 2 mode active
interface TenGigabitEthernet1/50
description Uplink to RAGG-2-VDC2 T1/14
switchport trunk encapsulation dot1q
switchport trunk allowed vlan 38,41,42,44
spanning-tree portfast trunk
channel-group 2 mode active
ip address 192.168.42.34 255.255.255.0
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 192.168.42.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan42
logging source-interface Vlan42
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan42
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps port-security
snmp-server enable traps config
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps flash insertion removal
snmp-server enable traps syslog
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps hsrp
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
radius-server source-ports 1645-1646
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 17181029
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
SACCESS-3
!Command: show running-config
!Time: Sat Apr 30 01:56:18 2011
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
username bart password 5 <removed> role network-admin
username emc-ncm password 5 <removed> role network-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip host SACCESS-3 192.168.41.33
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
10 permit ip 127.0.0.1/32 192.168.41.33/32
20 permit ip 192.168.41.101/32 192.168.41.33/32
30 permit ip 192.168.41.102/32 192.168.41.33/32
40 permit ip 192.168.42.111/32 192.168.41.33/32
50 permit ip 192.168.42.122/32 192.168.41.33/32
60 permit ip 192.168.42.131/32 192.168.41.33/32
70 permit ip 192.168.42.133/32 192.168.41.33/32
80 permit ip 192.168.42.138/32 192.168.41.33/32
90 permit ip 10.19.151.99/32 192.168.41.33/32
10 permit ip 192.168.42.122/32 192.168.41.33/32
class-map type qos class-fcoe
class-map type queuing class-all-flood
class-map type queuing class-ip-multicast
class-map type network-qos class-all-flood
class-map type network-qos class-ip-multicast
snmp-server user bart network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server host 192.168.41.101 traps version 2c public udp-port 2162
no snmp-server enable traps entity entity_mib_change
no snmp-server enable traps entity entity_module_status_change
no snmp-server enable traps entity entity_power_status_change
no snmp-server enable traps entity entity_module_inserted
no snmp-server enable traps entity entity_module_removed
no snmp-server enable traps entity entity_unrecognised_module
no snmp-server enable traps entity entity_fan_status_change
no snmp-server enable traps rf redundancy_framework
snmp-server enable traps entity fru
ntp server 192.168.62.161 use-vrf management
ntp server 192.168.62.162 use-vrf management
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip route 0.0.0.0/0 192.168.41.1
vsan 2 wwn 21:00:00:1b:32:00:ab:0d fcid 0xee0000 area dynamic
vsan 2 wwn 21:00:00:1b:32:00:70:0d fcid 0xee0100 area dynamic
vsan 2 wwn 21:00:00:1b:32:00:33:0c fcid 0xee0200 area dynamic
vsan 2 wwn 21:00:00:1b:32:00:5d:0d fcid 0xee0300 area dynamic
vsan 2 wwn 21:00:00:1b:32:80:0b:10 fcid 0xee0400 area dynamic
vsan 2 wwn 21:00:00:1b:32:80:52:10 fcid 0xee0500 area dynamic
vsan 2 wwn 21:00:00:1b:32:80:da:0f fcid 0xee0600 area dynamic
vsan 2 wwn 21:00:00:1b:32:00:3a:0c fcid 0xee0700 area dynamic
vsan 2 wwn 21:00:00:1b:32:80:f1:0f fcid 0xee0800 area dynamic
vsan 1 wwn 26:01:00:01:55:35:7e:44 fcid 0xee0000 dynamic
vsan 2 wwn 21:00:00:1b:32:00:5e:0d fcid 0xee0900 area dynamic
switchport trunk allowed vlan 38,41-45,52
bind interface Ethernet1/13
bind interface Ethernet1/14
bind interface Ethernet1/15
bind interface Ethernet1/16
bind interface Ethernet1/17
bind interface Ethernet1/18
bind interface Ethernet1/19
bind interface Ethernet1/20
bind interface Ethernet1/21
bind interface Ethernet1/22
bind interface Ethernet1/23
bind interface Ethernet1/24
bind interface Ethernet1/25
bind interface Ethernet1/26
bind interface Ethernet1/27
bind interface Ethernet1/28
bind interface Ethernet1/29
bind interface Ethernet1/30
bind interface Ethernet1/31
bind interface Ethernet1/32
bind interface Ethernet1/5
bind interface Ethernet1/6
bind interface Ethernet1/7
bind interface Ethernet1/8
bind interface Ethernet1/9
bind interface Ethernet1/10
bind interface Ethernet1/11
bind interface Ethernet1/12
vsan 4094 interface vfc505
vsan 4094 interface vfc506
vsan 4094 interface vfc507
vsan 4094 interface vfc508
vsan 4094 interface vfc509
vsan 4094 interface vfc510
switchport description Connection to MDS-DC-1
switchport description Connection to Promise 600 san
description to DC-F-UCS-1 TG0/1
spanning-tree port type network
description to DC-F-UCS-1 TG0/2
spanning-tree port type network
description to DC-F-UCS-2 TG0/3
spanning-tree port type network
description to DC-F-UCS-2 TG0/4
spanning-tree port type network
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
description to RAGG-1-VDC2 TG1/9
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 3 mode active
description to RAGG-1-VDC2 TG1/10
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 3 mode active
description to RAGG-2-VDC2 TG1/11
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 3 mode active
description to RAGG-2-VDC2 TG1/12
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 3 mode active
ip address 192.168.41.33/24
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
system default zone default-zone permit
system default zone distribute full
boot kickstart bootflash:/n5000-uk9-kickstart.5.0.3.N1.1b.bin
boot system bootflash:/n5000-uk9.5.0.3.N1.1b.bin
switchport fcrxbbcredit 1
switchport fcrxbbcredit 2 mode E
logging server 192.168.42.124 6
zone default-zone permit vsan 2
zoneset distribute full vsan 2
!Full Zone Database Section for vsan 2
zone name global_zone vsan 2
member pwwn 26:00:00:01:55:35:7e:44
member pwwn 26:02:00:01:55:35:7e:44
member pwwn 10:00:00:00:c9:75:68:c3
member pwwn 10:00:00:00:c9:77:92:e9
member pwwn 10:00:00:00:c9:77:db:c3
member pwwn 10:00:00:00:c9:77:dc:c3
member pwwn 10:00:00:00:c9:77:dd:bc
member pwwn 21:00:00:1b:32:00:33:0c
member pwwn 21:00:00:1b:32:00:3a:0c
member pwwn 21:00:00:1b:32:00:5d:0d
member pwwn 21:00:00:1b:32:00:5e:0d
member pwwn 21:00:00:1b:32:00:70:0d
member pwwn 21:00:00:1b:32:00:ab:0d
member pwwn 21:00:00:1b:32:80:0b:10
member pwwn 21:00:00:1b:32:80:52:10
member pwwn 21:00:00:1b:32:80:da:0f
member pwwn 21:00:00:1b:32:80:f1:0f
zoneset name promise-2_zs vsan 2
zoneset activate name promise-2_zs vsan 2
SACCESS-4
!Command: show running-config
!Time: Sat Apr 30 01:57:14 2011
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
username emc-ncm password 5 <removed> role network-admin
username bart password 5 <removed> role network-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip host SACCESS-4 192.168.41.34
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
10 permit ip 127.0.0.1/32 192.168.41.34/32
20 permit ip 192.168.41.101/32 192.168.41.34/32
30 permit ip 192.168.41.102/32 192.168.41.34/32
40 permit ip 192.168.42.111/32 192.168.41.34/32
50 permit ip 192.168.42.122/32 192.168.41.34/32
60 permit ip 192.168.42.131/32 192.168.41.34/32
70 permit ip 192.168.42.133/32 192.168.41.34/32
80 permit ip 192.168.42.138/32 192.168.41.34/32
90 permit ip 10.19.151.99/32 192.168.41.34/32
10 permit ip 192.168.42.122/32 192.168.41.34/32
class-map type qos class-fcoe
class-map type queuing class-all-flood
class-map type queuing class-ip-multicast
class-map type network-qos class-all-flood
class-map type network-qos class-ip-multicast
snmp-server user bart network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server enable traps entity fru
no snmp-server enable traps entity entity_mib_change
no snmp-server enable traps entity entity_module_status_change
no snmp-server enable traps entity entity_power_status_change
no snmp-server enable traps entity entity_module_inserted
no snmp-server enable traps entity entity_module_removed
no snmp-server enable traps entity entity_unrecognised_module
no snmp-server enable traps entity entity_fan_status_change
no snmp-server enable traps rf redundancy_framework
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip route 0.0.0.0/0 192.168.41.1
vsan 2 wwn 21:01:00:1b:32:20:5e:0d fcid 0xa20000 area dynamic
vsan 2 wwn 21:01:00:1b:32:20:ab:0d fcid 0xa20100 area dynamic
vsan 2 wwn 21:01:00:1b:32:20:70:0d fcid 0xa20200 area dynamic
vsan 2 wwn 21:01:00:1b:32:20:33:0c fcid 0xa20300 area dynamic
vsan 2 wwn 21:01:00:1b:32:20:5d:0d fcid 0xa20400 area dynamic
vsan 2 wwn 21:01:00:1b:32:a0:0b:10 fcid 0xa20500 area dynamic
vsan 2 wwn 21:01:00:1b:32:a0:52:10 fcid 0xa20600 area dynamic
vsan 2 wwn 21:01:00:1b:32:a0:da:0f fcid 0xa20700 area dynamic
vsan 2 wwn 21:01:00:1b:32:a0:f1:0f fcid 0xa20800 area dynamic
vsan 2 wwn 21:01:00:1b:32:20:3a:0c fcid 0xa20900 area dynamic
switchport trunk allowed vlan 38,41-45,52
bind interface Ethernet1/13
bind interface Ethernet1/14
bind interface Ethernet1/15
bind interface Ethernet1/16
bind interface Ethernet1/17
bind interface Ethernet1/18
bind interface Ethernet1/19
bind interface Ethernet1/20
bind interface Ethernet1/21
bind interface Ethernet1/22
bind interface Ethernet1/23
bind interface Ethernet1/24
bind interface Ethernet1/25
bind interface Ethernet1/26
bind interface Ethernet1/27
bind interface Ethernet1/28
bind interface Ethernet1/29
bind interface Ethernet1/30
bind interface Ethernet1/31
bind interface Ethernet1/32
bind interface Ethernet1/5
bind interface Ethernet1/6
bind interface Ethernet1/7
bind interface Ethernet1/8
bind interface Ethernet1/9
bind interface Ethernet1/10
bind interface Ethernet1/11
bind interface Ethernet1/12
switchport description Connection to MDS-DC-1
switchport description Connection to Promise 600 san
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
spanning-tree port type edge trunk
description to RAGG-2-VDC2 TG1/9
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 4 mode active
description to RAGG-2-VDC2 TG1/10
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 4 mode active
description to RAGG-1-VDC2 TG1/11
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 4 mode active
description to RAGG-1-VDC2 TG1/12
switchport trunk allowed vlan 38,41-45,52
spanning-tree port type network
channel-group 4 mode active
description link to SACCESS-3
description link to SACCESS-3
ip address 192.168.41.34/24
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
boot kickstart bootflash:/n5000-uk9-kickstart.5.0.3.N1.1b.bin
boot system bootflash:/n5000-uk9.5.0.3.N1.1b.bin
logging server 192.168.42.124 6
zone default-zone permit vsan 2
!Full Zone Database Section for vsan 2
zone name global_zone vsan 2
zoneset name promise-2_zs vsan 2
SACCESS-5
! Last configuration change at 02:02:07 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:02:10 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PST recurring
switch 1 provision ws-c3750e-48td
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 65535
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-2654502656
subject-name cn=IOS-Self-Signed-Certificate-2654502656
rsakeypair TP-self-signed-2654502656
crypto pki certificate chain TP-self-signed-2654502656
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
interface GigabitEthernet1/0/1
description SRV-DC-22 iLO
switchport access vlan 40
interface GigabitEthernet1/0/2
description SRV-DC-23 iLO
switchport access vlan 40
interface GigabitEthernet1/0/3
description SRV-DC-24 iLO
switchport access vlan 40
interface GigabitEthernet1/0/4
description SRV-DC-25 iLO
switchport access vlan 40
interface GigabitEthernet1/0/5
description SRV-DC-26 iLO
switchport access vlan 40
interface GigabitEthernet1/0/6
description SRV-DC-27 iLO
switchport access vlan 40
interface GigabitEthernet1/0/7
description SRV-DC-28 iLO
switchport access vlan 40
interface GigabitEthernet1/0/8
description SRV-DC-29 iLO
switchport access vlan 40
interface GigabitEthernet1/0/9
description SRV-DC-30 iLO
switchport access vlan 40
interface GigabitEthernet1/0/10
description SRV-DC-31 iLO
switchport access vlan 40
interface GigabitEthernet1/0/11
description DC-UCSFabric-1-A Mgmt0
switchport access vlan 41
interface GigabitEthernet1/0/12
description DC-UCSFabric-1-B Mgmt0
switchport access vlan 41
interface GigabitEthernet1/0/13
description DC-ASA-1 Mgmt0
switchport access vlan 42
interface GigabitEthernet1/0/14
description DC-ASA-2 Mgmt0
switchport access vlan 42
interface GigabitEthernet1/0/15
interface GigabitEthernet1/0/16
interface GigabitEthernet1/0/17
interface GigabitEthernet1/0/18
interface GigabitEthernet1/0/19
interface GigabitEthernet1/0/20
interface GigabitEthernet1/0/21
interface GigabitEthernet1/0/22
description SRV-DC-22 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/23
description SRV-DC-23 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/24
description SRV-DC-24 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/25
description SRV-DC-25 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/26
description SRV-DC-26 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/27
description SRV-DC-27 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/28
description SRV-DC-28 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/29
description SRV-DC-29 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/30
description SRV-DC-30 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/31
description SRV-DC-31 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/32
description SRV-DC-32 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/33
description SRV-DC-33 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/34
description SRV-DC-34 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/35
description SRV-DC-35 ESXi
switchport access vlan 41
interface GigabitEthernet1/0/36
interface GigabitEthernet1/0/37
description SACCESS-3 Mgmt
switchport access vlan 41
interface GigabitEthernet1/0/38
description SACCESS-4 Mgmt
switchport access vlan 41
interface GigabitEthernet1/0/39
description RCORE-1 Mgmt-a
switchport access vlan 42
interface GigabitEthernet1/0/40
description RCORE-1 Mgmt-b
switchport access vlan 42
interface GigabitEthernet1/0/41
description RCORE-2 Mgmt-a
switchport access vlan 42
interface GigabitEthernet1/0/42
description RCORE-2 Mgmt-b
switchport access vlan 42
interface GigabitEthernet1/0/43
interface GigabitEthernet1/0/44
interface GigabitEthernet1/0/45
interface GigabitEthernet1/0/46
interface GigabitEthernet1/0/47
description Uplink to RAGG-2-vdc2 T2/13
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/48
description Uplink to RAGG-1-vdc2 T2/13
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/49
interface GigabitEthernet1/0/50
interface GigabitEthernet1/0/51
interface GigabitEthernet1/0/52
interface TenGigabitEthernet1/0/1
interface TenGigabitEthernet1/0/2
ip address 192.168.41.222 255.255.255.0
ip address 192.168.42.30 255.255.255.0
ip default-gateway 192.168.42.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan42
ip sla enable reaction-alerts
logging source-interface Vlan42
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan42
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps power-ethernet group 1-4
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131 timeout 5
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36029147
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Storage
MDS-DC-1-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:47:39 2011
system default switchport mode F
description This is a system defined role and applies to all users.
rule 5 permit show feature environment
rule 4 permit show feature hardware
rule 3 permit show feature module
rule 2 permit show feature snmp
rule 1 permit show feature system
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
username emc-ncm password 5 <removed> role network-admin
username bart password 5 <removed> role network-admin
enable secret 5 <removed>
banner motd #WARNING: **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail
**** **** AUTHORIZED USERS ONLY! ****ANY USE OF THIS COMPUTER NETWORK
SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENTTO MONITORING OF SUCH USE AND TO SUCH
ADDITIONAL MONITORING AS MAY BE NECESSARYTO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM
ADMINISTRATOR OR OTHERREPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY
TIME WITHOUTFURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY
OTHERCRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAWENFORCEMENT
OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.UNAUTHORIZED ACCESS IS A VIOLATION
OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.#
ip domain-name cisco-irn.com
ip host MDS-DC-1 192.168.41.51
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
aaa group server radius radius
snmp-server user bart network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user retail network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server host 192.168.41.101 traps version 2c public udp-port 2162
snmp-server host 192.168.42.121 traps version 3 auth public
no snmp-server enable traps entity entity_mib_change
no snmp-server enable traps entity entity_module_status_change
no snmp-server enable traps entity entity_power_status_change
no snmp-server enable traps entity entity_module_inserted
no snmp-server enable traps entity entity_module_removed
no snmp-server enable traps entity entity_unrecognised_module
no snmp-server enable traps entity entity_fan_status_change
no snmp-server enable traps entity entity_power_out_change
no snmp-server enable traps rf redundancy_framework
ntp server 192.168.62.161
ntp server 192.168.62.162
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip access-list 23 permit ip 127.0.0.1 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.41.101 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.41.102 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.42.111 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.42.121 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.42.122 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.42.131 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.42.133 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 192.168.42.138 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 permit ip 10.19.151.99 0.0.0.0 192.168.41.51 0.0.0.0
ip access-list 23 deny ip any any log-deny
vsan 10 name "UIM_VSAN_A_10"
vsan 1 wwn 50:00:40:20:03:fc:44:6a fcid 0x020000 dynamic
vsan 1 wwn 50:00:40:21:03:fc:44:6a fcid 0x020001 dynamic
vsan 1 wwn 21:00:00:e0:8b:19:70:09 fcid 0x020100 area dynamic
vsan 1 wwn 20:89:00:05:30:00:99:de fcid 0x020200 area dynamic
vsan 1 wwn 20:8a:00:05:30:00:99:de fcid 0x020300 area dynamic
vsan 1 wwn 23:00:00:05:30:00:99:e0 fcid 0x020002 dynamic
vsan 1 wwn 23:01:00:05:30:00:99:e0 fcid 0x020003 dynamic
vsan 1 wwn 23:02:00:05:30:00:99:e0 fcid 0x020004 dynamic
vsan 1 wwn 23:03:00:05:30:00:99:e0 fcid 0x020005 dynamic
vsan 1 wwn 23:04:00:05:30:00:99:e0 fcid 0x020006 dynamic
vsan 1 wwn 23:05:00:05:30:00:99:e0 fcid 0x020007 dynamic
vsan 1 wwn 23:06:00:05:30:00:99:e0 fcid 0x020008 dynamic
vsan 1 wwn 23:07:00:05:30:00:99:e0 fcid 0x020009 dynamic
vsan 1 wwn 23:08:00:05:30:00:99:e0 fcid 0x02000a dynamic
vsan 1 wwn 22:02:00:05:30:00:99:e0 fcid 0x02000b dynamic
vsan 1 wwn 22:04:00:05:30:00:99:e0 fcid 0x02000c dynamic
vsan 1 wwn 22:06:00:05:30:00:99:e0 fcid 0x02000d dynamic
vsan 1 wwn 22:08:00:05:30:00:99:e0 fcid 0x02000e dynamic
vsan 1 wwn 22:0a:00:05:30:00:99:e0 fcid 0x02000f dynamic
vsan 1 wwn 22:0c:00:05:30:00:99:e0 fcid 0x020010 dynamic
vsan 1 wwn 10:00:00:00:c9:60:df:80 fcid 0x020011 dynamic
vsan 1 wwn 23:12:00:05:30:00:99:e0 fcid 0x020012 dynamic
vsan 1 wwn 23:13:00:05:30:00:99:e0 fcid 0x020013 dynamic
vsan 1 wwn 23:14:00:05:30:00:99:e0 fcid 0x020014 dynamic
vsan 1 wwn 23:15:00:05:30:00:99:e0 fcid 0x020015 dynamic
vsan 1 wwn 23:17:00:05:30:00:99:e0 fcid 0x020016 dynamic
vsan 1 wwn 23:16:00:05:30:00:99:e0 fcid 0x020017 dynamic
vsan 1 wwn 23:18:00:05:30:00:99:e0 fcid 0x020018 dynamic
vsan 1 wwn 23:19:00:05:30:00:99:e0 fcid 0x020019 dynamic
vsan 1 wwn 11:00:00:00:00:00:00:01 fcid 0x02001a dynamic
vsan 1 wwn 20:00:00:00:00:00:00:01 fcid 0x02001b dynamic
vsan 1 wwn 10:00:00:00:c9:77:94:21 fcid 0x02001c dynamic
vsan 1 wwn 10:00:00:00:c9:77:92:e9 fcid 0x02001d dynamic
vsan 1 wwn 10:00:00:00:c9:77:dd:bc fcid 0x02001e dynamic
vsan 1 wwn 20:41:00:05:9b:73:10:c0 fcid 0x02001f dynamic
vsan 1 wwn 20:41:00:05:9b:73:17:40 fcid 0x020020 dynamic
vsan 1 wwn 10:00:00:00:c9:77:dc:c3 fcid 0x020021 dynamic
vsan 1 wwn 10:00:00:00:c9:75:68:c3 fcid 0x020022 dynamic
vsan 1 wwn 20:4c:00:0d:ec:2d:94:c0 fcid 0x020400 area dynamic
vsan 1 wwn 20:64:00:0d:ec:2d:94:c0 fcid 0x020500 area dynamic
vsan 1 wwn 10:00:00:00:c9:77:db:c3 fcid 0x020023 dynamic
vsan 2 wwn 20:4c:00:0d:ec:2d:94:c0 fcid 0xef0000 area dynamic
vsan 2 wwn 10:00:00:00:c9:75:68:c3 fcid 0xef0100 dynamic
vsan 2 wwn 10:00:00:00:c9:77:dc:c3 fcid 0xef0101 dynamic
vsan 2 wwn 10:00:00:00:c9:77:dd:bc fcid 0xef0102 dynamic
vsan 2 wwn 10:00:00:00:c9:77:db:c3 fcid 0xef0103 dynamic
vsan 2 wwn 10:00:00:00:c9:77:92:e9 fcid 0xef0104 dynamic
vsan 2 wwn 50:06:01:60:46:e0:33:aa fcid 0xef01ef dynamic
vsan 2 wwn 20:41:00:05:9b:73:10:c0 fcid 0xef0105 dynamic
vsan 1 wwn 50:06:01:68:46:e0:33:aa fcid 0x0200ef dynamic
vsan 1 wwn 50:06:01:60:46:e0:33:aa fcid 0x0206ef dynamic
vsan 2 wwn 20:41:00:05:9b:73:17:40 fcid 0xef0106 dynamic
vsan 2 wwn 10:00:00:00:c9:77:94:21 fcid 0xef0107 dynamic
vsan 2 wwn 20:64:00:0d:ec:2d:94:c0 fcid 0xef0200 area dynamic
vsan 2 wwn 50:06:01:68:46:e0:33:aa fcid 0xef03ef dynamic
vsan 10 wwn 50:06:01:60:46:e0:33:aa fcid 0xd800ef dynamic
vsan 10 wwn 20:41:00:05:9b:73:10:c0 fcid 0xd80000 dynamic
vsan 10 wwn 20:41:00:05:9b:73:17:40 fcid 0xd80001 dynamic
vsan 10 wwn 10:00:00:00:c9:77:94:21 fcid 0xd80002 dynamic
vsan 10 wwn 50:06:01:61:46:e0:33:aa fcid 0xd801ef dynamic
vsan 10 wwn 50:06:01:69:46:e0:33:aa fcid 0xd802ef dynamic
vsan 10 wwn 20:42:00:05:9b:73:10:c0 fcid 0xd80003 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:0f fcid 0xd80004 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:18 fcid 0xd80005 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:12 fcid 0xd80006 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:15 fcid 0xd80007 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:19 fcid 0xd80008 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:10 fcid 0xd80009 dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:1c fcid 0xd8000a dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:25 fcid 0xd8000b dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:22 fcid 0xd8000c dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:1f fcid 0xd8000d dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:2b fcid 0xd8000e dynamic
vsan 10 wwn 20:00:00:25:b5:01:11:28 fcid 0xd8000f dynamic
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
ip default-gateway 192.168.41.1
boot kickstart bootflash:/m9500-sf2ek9-kickstart-mzg.5.0.1a.bin.S4 sup-1
boot system bootflash:/m9500-sf2ek9-mzg.5.0.1a.bin.S4 sup-1
boot kickstart bootflash:/m9500-sf2ek9-kickstart-mzg.5.0.1a.bin.S4 sup-2
boot system bootflash:/m9500-sf2ek9-mzg.5.0.1a.bin.S4 sup-2
switchport rate-mode shared
switchport rate-mode dedicated
switchport rate-mode dedicated
logging server 192.168.42.121
logging server 192.168.42.124 6
system default zone default-zone permit
system default zone distribute full
zone default-zone permit vsan 2
zone default-zone permit vsan 10
zoneset distribute full vsan 1-2
zoneset distribute full vsan 10
!Full Zone Database Section for vsan 2
zone name global_zone vsan 2
member pwwn 26:00:00:01:55:35:7e:44
member pwwn 26:02:00:01:55:35:7e:44
member pwwn 10:00:00:00:c9:75:68:c3
member pwwn 10:00:00:00:c9:77:92:e9
member pwwn 10:00:00:00:c9:77:db:c3
member pwwn 10:00:00:00:c9:77:dc:c3
member pwwn 10:00:00:00:c9:77:dd:bc
member pwwn 21:00:00:1b:32:00:33:0c
member pwwn 21:00:00:1b:32:00:3a:0c
member pwwn 21:00:00:1b:32:00:5d:0d
member pwwn 21:00:00:1b:32:00:5e:0d
member pwwn 21:00:00:1b:32:00:70:0d
member pwwn 21:00:00:1b:32:00:ab:0d
member pwwn 21:00:00:1b:32:80:0b:10
member pwwn 21:00:00:1b:32:80:52:10
member pwwn 21:00:00:1b:32:80:da:0f
member pwwn 21:00:00:1b:32:80:f1:0f
zoneset name promise-2_zs vsan 2
zoneset activate name promise-2_zs vsan 2
!Full Zone Database Section for vsan 10
zone name UIM_20000025B5011112_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011110_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011112_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011110_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011112_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011110_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011112_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011110_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011115_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011116_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011115_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011116_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011115_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011116_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011115_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011116_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111A_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011119_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111A_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011119_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111A_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011119_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111A_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011119_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111D_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111C_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111D_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111C_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111D_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111C_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111D_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111C_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111F_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011120_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111F_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011120_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111F_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011120_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111F_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011120_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011123_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011122_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011123_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011122_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011123_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011122_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011123_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011122_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011125_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011126_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011125_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011126_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011125_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011126_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011125_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011126_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011129_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011128_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011129_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011128_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011129_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011128_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011129_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011128_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501112B_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501112C_5006016946E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501112B_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501112C_5006016846E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501112B_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501112C_5006016046E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501112B_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501112C_5006016146E033AA vsan 10
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:61:46:e0:33:aa
zoneset name UIM_ZONESET_A vsan 10
member UIM_20000025B5011112_5006016046E033AA
member UIM_20000025B5011110_5006016046E033AA
member UIM_20000025B5011112_5006016946E033AA
member UIM_20000025B5011110_5006016946E033AA
member UIM_20000025B5011112_5006016846E033AA
member UIM_20000025B5011110_5006016846E033AA
member UIM_20000025B5011112_5006016146E033AA
member UIM_20000025B5011110_5006016146E033AA
member UIM_20000025B5011115_5006016846E033AA
member UIM_20000025B5011116_5006016846E033AA
member UIM_20000025B5011115_5006016146E033AA
member UIM_20000025B5011116_5006016146E033AA
member UIM_20000025B5011115_5006016946E033AA
member UIM_20000025B5011116_5006016946E033AA
member UIM_20000025B5011115_5006016046E033AA
member UIM_20000025B5011116_5006016046E033AA
member UIM_20000025B501111A_5006016946E033AA
member UIM_20000025B5011119_5006016946E033AA
member UIM_20000025B501111A_5006016146E033AA
member UIM_20000025B5011119_5006016146E033AA
member UIM_20000025B501111A_5006016846E033AA
member UIM_20000025B5011119_5006016846E033AA
member UIM_20000025B501111A_5006016046E033AA
member UIM_20000025B5011119_5006016046E033AA
member UIM_20000025B501111D_5006016146E033AA
member UIM_20000025B501111C_5006016146E033AA
member UIM_20000025B501111D_5006016846E033AA
member UIM_20000025B501111C_5006016846E033AA
member UIM_20000025B501111D_5006016946E033AA
member UIM_20000025B501111C_5006016946E033AA
member UIM_20000025B501111D_5006016046E033AA
member UIM_20000025B501111C_5006016046E033AA
member UIM_20000025B501111F_5006016146E033AA
member UIM_20000025B5011120_5006016146E033AA
member UIM_20000025B501111F_5006016946E033AA
member UIM_20000025B5011120_5006016946E033AA
member UIM_20000025B501111F_5006016846E033AA
member UIM_20000025B5011120_5006016846E033AA
member UIM_20000025B501111F_5006016046E033AA
member UIM_20000025B5011120_5006016046E033AA
member UIM_20000025B5011123_5006016946E033AA
member UIM_20000025B5011122_5006016946E033AA
member UIM_20000025B5011123_5006016146E033AA
member UIM_20000025B5011122_5006016146E033AA
member UIM_20000025B5011123_5006016846E033AA
member UIM_20000025B5011122_5006016846E033AA
member UIM_20000025B5011123_5006016046E033AA
member UIM_20000025B5011122_5006016046E033AA
member UIM_20000025B5011125_5006016146E033AA
member UIM_20000025B5011126_5006016146E033AA
member UIM_20000025B5011125_5006016946E033AA
member UIM_20000025B5011126_5006016946E033AA
member UIM_20000025B5011125_5006016846E033AA
member UIM_20000025B5011126_5006016846E033AA
member UIM_20000025B5011125_5006016046E033AA
member UIM_20000025B5011126_5006016046E033AA
member UIM_20000025B5011129_5006016846E033AA
member UIM_20000025B5011128_5006016846E033AA
member UIM_20000025B5011129_5006016046E033AA
member UIM_20000025B5011128_5006016046E033AA
member UIM_20000025B5011129_5006016146E033AA
member UIM_20000025B5011128_5006016146E033AA
member UIM_20000025B5011129_5006016946E033AA
member UIM_20000025B5011128_5006016946E033AA
member UIM_20000025B501112B_5006016946E033AA
member UIM_20000025B501112C_5006016946E033AA
member UIM_20000025B501112B_5006016846E033AA
member UIM_20000025B501112C_5006016846E033AA
member UIM_20000025B501112B_5006016046E033AA
member UIM_20000025B501112C_5006016046E033AA
member UIM_20000025B501112B_5006016146E033AA
member UIM_20000025B501112C_5006016146E033AA
zoneset activate name UIM_ZONESET_A vsan 10
interface GigabitEthernet4/1
interface GigabitEthernet4/2
interface GigabitEthernet4/3
interface GigabitEthernet4/4
ip address 192.168.41.51 255.255.255.0
no system default switchport shutdown
MDS-DC-2-RUNNING
!Command: show running-config
!Time: Sun Apr 24 16:48:05 2011
system default switchport mode F
description This is a system defined role and applies to all users.
rule 5 permit show feature environment
rule 4 permit show feature hardware
rule 3 permit show feature module
rule 2 permit show feature snmp
rule 1 permit show feature system
username admin password 5 <removed> role network-admin
username retail password 5 <removed> role network-admin
username emc-ncm password 5 <removed> role network-admin
username bart password 5 <removed> role network-admin
enable secret 5 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
ip domain-name cisco-irn.com
ip host MDS-DC-2 192.168.41.52
ip host MDS-DC-2 192.168.41.52
tacacs-server key 7 "<removed>"
tacacs-server host 192.168.42.131
aaa group server tacacs+ CiscoACS
aaa group server radius radius
snmp-server user bart network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user admin network-admin auth md5 <removed> localizedkey
snmp-server user retail network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server user emc-ncm network-admin auth md5 <removed> priv <removed> localizedkey
snmp-server host 192.168.41.101 traps version 2c public udp-port 2162
snmp-server host 192.168.42.121 traps version 3 auth public
rmon event 1 log trap public description FATAL(1) owner PMON@FATAL
rmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICAL
rmon event 3 log trap public description ERROR(3) owner PMON@ERROR
rmon event 4 log trap public description WARNING(4) owner PMON@WARNING
rmon event 5 log trap public description INFORMATION(5) owner PMON@INFO
ntp server 192.168.62.161
ntp server 192.168.62.162
aaa authentication login default group CiscoACS
aaa authentication login console group CiscoACS
aaa authorization ssh-certificate default group CiscoACS
aaa accounting default group CiscoACS
aaa authentication login error-enable
ip access-list 23 permit ip 127.0.0.1 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.41.101 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.41.102 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.42.111 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.42.121 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.42.122 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.42.131 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.42.133 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 192.168.42.138 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 permit ip 10.19.151.99 0.0.0.0 192.168.41.52 0.0.0.0
ip access-list 23 deny ip any any log-deny
vsan 11 name "UIM_VSAN_B_11"
vsan 1 wwn 21:01:00:e0:8b:39:35:58 fcid 0x010000 area dynamic
vsan 1 wwn 22:03:00:0d:ec:20:2b:40 fcid 0x010100 area dynamic
vsan 11 wwn 20:41:00:05:9b:73:17:40 fcid 0xd40000 dynamic
vsan 11 wwn 20:42:00:05:9b:73:17:40 fcid 0xd40001 dynamic
vsan 1 wwn 21:00:00:e0:8b:19:35:58 fcid 0x010200 area dynamic
vsan 11 wwn 50:06:01:69:46:e0:33:aa fcid 0xd400ef dynamic
vsan 11 wwn 50:06:01:68:46:e0:33:aa fcid 0xd401ef dynamic
vsan 1 wwn 26:01:00:01:55:35:7e:44 fcid 0x010300 dynamic
vsan 2 wwn 26:01:00:01:55:35:7e:44 fcid 0x890000 dynamic
vsan 2 wwn 20:64:00:0d:ec:38:76:00 fcid 0x890100 area dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:10 fcid 0xd40002 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:19 fcid 0xd40003 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:13 fcid 0xd40004 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:16 fcid 0xd40005 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:1a fcid 0xd40006 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:12 fcid 0xd40007 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:1d fcid 0xd40008 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:26 fcid 0xd40009 dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:23 fcid 0xd4000a dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:20 fcid 0xd4000b dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:2c fcid 0xd4000c dynamic
vsan 11 wwn 20:00:00:25:b5:01:11:29 fcid 0xd4000d dynamic
clock summer-time PST 1 Sun April 02:00 5 Sun Oct 02:00 60
ip default-gateway 192.168.41.1
boot kickstart bootflash:/m9500-sf2ek9-kickstart-mz.5.0.4.bin sup-1
boot system bootflash:/m9500-sf2ek9-mz.5.0.4.bin sup-1
boot kickstart bootflash:/m9500-sf2ek9-kickstart-mz.5.0.4.bin sup-2
boot system bootflash:/m9500-sf2ek9-mz.5.0.4.bin sup-2
logging server 192.168.42.121
logging server 192.168.42.124 6
system default zone default-zone permit
system default zone distribute full
zone default-zone permit vsan 2
zone default-zone permit vsan 11
zoneset distribute full vsan 1-2
zoneset distribute full vsan 11
!Full Zone Database Section for vsan 2
zone name global_zone vsan 2
zoneset name promise-2_zs vsan 2
!Full Zone Database Section for vsan 11
zone name UIM_20000025B5011110_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011112_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011110_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011112_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011110_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011112_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011110_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:10
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011112_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:12
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011116_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011115_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011116_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011115_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011116_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011115_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011116_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:16
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011115_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:15
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011119_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111A_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011119_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111A_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011119_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111A_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011119_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:19
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111A_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1a
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111D_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111C_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111D_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111C_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111D_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111C_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111D_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1d
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111C_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1c
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011120_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501111F_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011120_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501111F_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011120_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501111F_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011120_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:20
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501111F_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:1f
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011122_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011123_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011122_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011123_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011122_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011123_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011122_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:22
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011123_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:23
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011126_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011125_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011126_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011125_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011126_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011125_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011126_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:26
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011125_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:25
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011128_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011129_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B5011128_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011129_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B5011128_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011129_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B5011128_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:28
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B5011129_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:29
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501112C_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501112B_5006016046E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:60:46:e0:33:aa
zone name UIM_20000025B501112C_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501112B_5006016946E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:69:46:e0:33:aa
zone name UIM_20000025B501112C_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501112B_5006016846E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:68:46:e0:33:aa
zone name UIM_20000025B501112C_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2c
member pwwn 50:06:01:61:46:e0:33:aa
zone name UIM_20000025B501112B_5006016146E033AA vsan 11
member pwwn 20:00:00:25:b5:01:11:2b
member pwwn 50:06:01:61:46:e0:33:aa
zoneset name UIM_ZONESET_B vsan 11
member UIM_20000025B5011110_5006016946E033AA
member UIM_20000025B5011112_5006016946E033AA
member UIM_20000025B5011110_5006016046E033AA
member UIM_20000025B5011112_5006016046E033AA
member UIM_20000025B5011110_5006016146E033AA
member UIM_20000025B5011112_5006016146E033AA
member UIM_20000025B5011110_5006016846E033AA
member UIM_20000025B5011112_5006016846E033AA
member UIM_20000025B5011116_5006016046E033AA
member UIM_20000025B5011115_5006016046E033AA
member UIM_20000025B5011116_5006016946E033AA
member UIM_20000025B5011115_5006016946E033AA
member UIM_20000025B5011116_5006016846E033AA
member UIM_20000025B5011115_5006016846E033AA
member UIM_20000025B5011116_5006016146E033AA
member UIM_20000025B5011115_5006016146E033AA
member UIM_20000025B5011119_5006016146E033AA
member UIM_20000025B501111A_5006016146E033AA
member UIM_20000025B5011119_5006016046E033AA
member UIM_20000025B501111A_5006016046E033AA
member UIM_20000025B5011119_5006016946E033AA
member UIM_20000025B501111A_5006016946E033AA
member UIM_20000025B5011119_5006016846E033AA
member UIM_20000025B501111A_5006016846E033AA
member UIM_20000025B501111D_5006016146E033AA
member UIM_20000025B501111C_5006016146E033AA
member UIM_20000025B501111D_5006016846E033AA
member UIM_20000025B501111C_5006016846E033AA
member UIM_20000025B501111D_5006016946E033AA
member UIM_20000025B501111C_5006016946E033AA
member UIM_20000025B501111D_5006016046E033AA
member UIM_20000025B501111C_5006016046E033AA
member UIM_20000025B5011120_5006016846E033AA
member UIM_20000025B501111F_5006016846E033AA
member UIM_20000025B5011120_5006016146E033AA
member UIM_20000025B501111F_5006016146E033AA
member UIM_20000025B5011120_5006016046E033AA
member UIM_20000025B501111F_5006016046E033AA
member UIM_20000025B5011120_5006016946E033AA
member UIM_20000025B501111F_5006016946E033AA
member UIM_20000025B5011122_5006016946E033AA
member UIM_20000025B5011123_5006016946E033AA
member UIM_20000025B5011122_5006016146E033AA
member UIM_20000025B5011123_5006016146E033AA
member UIM_20000025B5011122_5006016046E033AA
member UIM_20000025B5011123_5006016046E033AA
member UIM_20000025B5011122_5006016846E033AA
member UIM_20000025B5011123_5006016846E033AA
member UIM_20000025B5011126_5006016846E033AA
member UIM_20000025B5011125_5006016846E033AA
member UIM_20000025B5011126_5006016946E033AA
member UIM_20000025B5011125_5006016946E033AA
member UIM_20000025B5011126_5006016146E033AA
member UIM_20000025B5011125_5006016146E033AA
member UIM_20000025B5011126_5006016046E033AA
member UIM_20000025B5011125_5006016046E033AA
member UIM_20000025B5011128_5006016946E033AA
member UIM_20000025B5011129_5006016946E033AA
member UIM_20000025B5011128_5006016046E033AA
member UIM_20000025B5011129_5006016046E033AA
member UIM_20000025B5011128_5006016146E033AA
member UIM_20000025B5011129_5006016146E033AA
member UIM_20000025B5011128_5006016846E033AA
member UIM_20000025B5011129_5006016846E033AA
member UIM_20000025B501112C_5006016046E033AA
member UIM_20000025B501112B_5006016046E033AA
member UIM_20000025B501112C_5006016946E033AA
member UIM_20000025B501112B_5006016946E033AA
member UIM_20000025B501112C_5006016846E033AA
member UIM_20000025B501112B_5006016846E033AA
member UIM_20000025B501112C_5006016146E033AA
member UIM_20000025B501112B_5006016146E033AA
zoneset activate name UIM_ZONESET_B vsan 11
ip address 192.168.41.52 255.255.255.0
no system default switchport shutdown
Internet Edge
WAN
RIE-1
Building configuration...
No l4r_shim subsystem is included in this platform.
Current configuration : 16789 bytes
! Last configuration change at 16:43:41 PST Thu Dec 6 2012 by bmcgloth
! NVRAM config last updated at 16:45:21 PST Thu Dec 6 2012 by bmcgloth
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
no platform punt-keepalive disable-kernel-core
security authentication failure rate 2 log
security passwords min-length 7
enable secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
aaa group server tacacs+ PRIMARY1
ip tacacs source-interface GigabitEthernet0/0/1
aaa authentication login COMPLIANCE group PRIMARY1 local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
ip domain name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 multicast rpf use-bgp
multilink bundle-name authenticated
crypto pki trustpoint TP-self-signed-2651906707
subject-name cn=IOS-Self-Signed-Certificate-2651906707
rsakeypair TP-self-signed-2651906707
crypto pki certificate chain TP-self-signed-2651906707
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363531 39303637 3037301E 170D3132 31313036 31323232
33355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36353139
30363730 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100AECB 6BFA1E96 248A2BFB E7B5D97E 9E9F99B1 4A2A7548 89CBC154 14CA1328
5625CD4E 0E7F9D0F 8B0A76D7 48B1A6EB 264E67FE 70BBC476 B21A22C7 6431842D
E5C6FBD1 3E0BBBDF 73A3088C BA6B8172 C32D446F 406F1269 0C4638D5 A422A709
7AF6DCCE 8ACE5CD8 D686075C 46E44292 308E3E34 EFA13429 E198C0CA E8FE7300
2A130203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14EB092C 62224E75 39C28FA2 B39CD19D 58235B24 FB301D06
03551D0E 04160414 EB092C62 224E7539 C28FA2B3 9CD19D58 235B24FB 300D0609
2A864886 F70D0101 05050003 81810077 4AF3549B 69563163 6AB2398F 3068F49F
48284235 25D42BF2 A4C45F09 17AF8EFF 5C92A80E 50AD61C8 C309E328 AE7EA370
02CCC23E 31F1034D 69A35747 C954DFA1 0F08DB33 081F69B4 43D00153 33F03918
68B2FD17 7070FA3C 344CB4D9 AFFE2671 3B7087F0 177F7AF2 DF3F9B1D 08144FC0
1F42863C 4948E425 DFF1C657 1B37D6
notify syslog contenttype plaintext
username retail privilege 15 secret 4 <removed>
username bart privilege 15 secret 4 <removed>
username emc-ncm privilege 15 secret 4 <removed>
username bmcgloth privilege 15 secret 4 <removed>
username csmadmin privilege 15 secret 4 <removed>
username ciscolms privilege 15 secret 4 <removed>
interface GigabitEthernet0/0/0
interface GigabitEthernet0/0/1
description link to RIE-3 G1/1
ip address 192.168.22.11 255.255.255.0
ip access-group INTERNAL-FILTER-IN in
standby 1 ip 192.168.22.10
standby 1 authentication TheCure
standby 2 ipv6 2001:DB8:192:22::10/64
standby 2 authentication TheCure
ipv6 address 2001:DB8:192:22::11/64
ipv6 verify unicast source reachable-via rx
ipv6 traffic-filter IPv6-INTERNAL-FILTER-IN in
interface GigabitEthernet0/0/2
description link to RIE-4 G1/1
interface GigabitEthernet0/0/3
description Link to RSP-3 G0/2
ip address 10.10.3.6 255.255.255.0
ip access-group COARSE-FILTER-INTERNET-IN in
ip access-group COARSE-FILTER-INTERNET-OUT out
ipv6 address 2001:DB8:1010:3::6/64
ipv6 verify unicast source reachable-via rx allow-default
ipv6 traffic-filter IPv6-COARSE-FILTER-INTERNET-IN in
ipv6 traffic-filter IPv6-COARSE-FILTER-INTERNET-OUT out
interface GigabitEthernet0/0/4
interface GigabitEthernet0/0/5
interface GigabitEthernet0
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.10.3.1
ip route 10.10.0.0 255.255.0.0 192.168.22.1
ip route 10.10.0.0 255.255.255.0 10.10.3.1
ip route 10.10.4.0 255.255.255.0 192.168.22.12
ip route 192.168.0.0 255.255.0.0 192.168.22.1
ip tacacs source-interface GigabitEthernet0/0/1
ip access-list extended COARSE-FILTER-INTERNET-IN
remark ---Temporary LAB permit - will remove from PCI GUIDE---
permit ip 10.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255
permit ip 10.0.0.0 0.255.255.255 192.168.0.0 0.0.255.255
permit ip 172.16.0.0 0.15.255.255 10.0.0.0 0.255.255.255
permit ip 172.16.0.0 0.15.255.255 192.168.0.0 0.0.255.255
remark -------------------------------------------------------
remark ---Block Private Networks---
deny ip 10.0.0.0 0.255.255.255 any log
deny ip 172.16.0.0 0.15.255.255 any log
deny ip 192.168.0.0 0.0.255.255 any
remark ---Block Autoconfiguration Networks---
deny ip 169.254.0.0 0.0.255.255 any log
remark ---Block Loopback Networks---
deny ip 127.0.0.0 0.0.255.255 any log
remark ---Block Multicast Networks---
deny ip 224.0.0.0 15.255.255.255 any log
remark ---Block Traffic targeted at DMZ Network Edge Devices---
deny ip any 192.168.22.0 0.0.0.255 log
remark ---Block Spoofing of your networks---
remark enter your IP block here
remark ---Permit all other traffic---
ip access-list extended COARSE-FILTER-INTERNET-OUT
remark ---Block private networks from reaching Internet---
remark ---Temporary LAB permit - will remove from PCI GUIDE---
remark -------------------------------------------------------
remark ---Block Private Networks---
deny ip 10.0.0.0 0.255.255.255 any log
deny ip 172.16.0.0 0.15.255.255 any log
deny ip 192.168.0.0 0.0.255.255 any log
remark ---Block Autoconfiguration Networks---
deny ip 169.254.0.0 0.0.255.255 any log
remark ---Block Loopback Networks---
deny ip 127.0.0.0 0.0.255.255 any log
remark ---Block Multicast Networks---
deny ip 224.0.0.0 15.255.255.255 any log
remark ---Block Traffic targeted at DMZ Network Edge Devices---
deny ip any 192.168.22.0 0.0.0.255 log
remark ---Permit all other traffic---
ip access-list extended INTERNAL-FILTER-IN
remark -------------------------------------------------------
remark ---Permit Admin Management---
permit tcp host 192.168.41.101 host 192.168.22.11 eq 22 log
permit tcp host 192.168.41.102 host 192.168.22.11 eq 22 log
permit tcp host 192.168.42.122 host 192.168.22.11 eq 22 log
permit tcp host 192.168.42.124 host 192.168.22.11 eq 22 log
permit tcp host 192.168.42.131 eq tacacs host 192.168.22.11
permit tcp host 192.168.42.133 host 192.168.22.11 eq 22 log
permit tcp host 192.168.42.139 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.104 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.102 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.103 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.100 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.101 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.98 host 192.168.22.11 eq 22 log
permit tcp host 10.19.151.99 host 192.168.22.11 eq 22 log
permit udp host 192.168.42.122 host 192.168.22.11 eq snmp
permit udp host 192.168.42.124 host 192.168.22.11 eq snmp
permit udp host 192.168.42.133 host 192.168.22.11 eq snmp
permit udp host 192.168.42.139 host 192.168.22.11 eq snmp
remark ---Permit HSRP V2 packets---
permit udp host 192.168.22.12 host 224.0.0.102 eq 1985
remark ---Deny other connections to Edge Router---
deny ip any host 192.168.22.11 log
deny ip any host 192.168.22.10 log
deny ip any host 10.10.0.3 log
remark ---Permit all other traffic to Internet---
logging source-interface GigabitEthernet0/0/1
logging host 192.168.42.124
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 192.168.42.139 log
access-list 23 permit 10.19.151.104 log
access-list 23 permit 10.19.151.102 log
access-list 23 permit 10.19.151.103 log
access-list 23 permit 10.19.151.100 log
access-list 23 permit 10.19.151.101 log
access-list 23 permit 10.19.151.98 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
ipv6 route 2001:DB8:192::/48 2001:DB8:192:22::1
ipv6 route ::/0 2001:DB8:1010:3::1
snmp-server group V3Group v3 priv read V3Read write V3Write
snmp-server view V3Read iso included
snmp-server view V3Write iso included
snmp-server trap-source GigabitEthernet0/0/1
snmp-server packetsize 8192
snmp-server location Building SJC-17-1 Aisle 1 Rack 1
snmp-server contact Bart McGlothin
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps flash insertion removal
snmp-server host 192.168.42.134 version 3 priv <removed>
snmp-server host 192.168.42.139 version 3 priv <removed>
snmp-server host 192.168.42.133 version 3 priv <removed>
address ipv4 192.168.42.131
ipv6 access-list BLOCKALL-IPv6
ipv6 access-list IPv6-COARSE-FILTER-INTERNET-IN
remark ---Temporary LAB permit for use of documentation IPv6 space---
permit ipv6 2001:DB8::/32 2001:DB8::/32
remark --------------------------------------------------------------
remark ---Block all traffic DHCP server -> client---
deny udp any eq 547 any eq 546
remark ---Block all traffic DHCP client -> server---
deny udp any eq 546 any eq 547
remark ---Block all traffic Routing Header Type 0---
deny ipv6 any any routing-type 0
remark ---Accept all ICMPv6 packets for Neighbor Discovery and Path MTU Discovery ---
permit icmp any any nd-na
permit icmp any any nd-ns
permit icmp any any router-advertisement
permit icmp any any router-solicitation
permit icmp any any packet-too-big
permit icmp any any destination-unreachable
permit icmp any any unreachable
permit icmp any any no-route
permit icmp any any echo-reply
permit icmp any any echo-request
permit icmp any any time-exceeded
permit icmp any any parameter-problem
permit icmp any any mld-query
permit icmp any any mld-reduction
permit icmp any any mld-report
permit icmp any any port-unreachable
remark ---Block IETF Documentation Network---
deny ipv6 2001:DB8::/32 any
remark ---Block Spoofing of Your Networks---
deny ipv6 2001:DB8:192::/48 any
remark ---Block Traffic targeted at DMZ Network Edge Devices---
deny ipv6 any 2001:DB8:192:22::/64 log
remark ---Permit Only Assigned Networks to Your Network---
permit ipv6 2000::/3 2001:DB8:192::/48
ipv6 access-list IPv6-COARSE-FILTER-INTERNET-OUT
remark ---Temporary LAB permit for use of documentation IPv6 space---
permit ipv6 2001:DB8::/32 2001:DB8::/32
remark -------------------------------------------------------
remark ---Block private networks from reaching Internet---
remark ---Block IETF reserved Networks---
deny ipv6 FEC0::/10 any log
deny ipv6 FC00::/7 any log
deny ipv6 host :: any log
deny ipv6 ::FFFF:0.0.0.0/96 any log
deny ipv6 2001:DB8::/32 any log
remark ---Block Loopback Address---
deny ipv6 host ::1 any log
remark ---Block Multicast Networks---
deny ipv6 FE00::/7 any log
remark ---Alternate is to Permit Traffic From My Network to Assigned Networks---
permit ipv6 2001:DB8:192::/48 2000::/3
remark ---Explicit Deny for All Other Networks and Log---
ipv6 access-list IPv6-INTERNAL-FILTER-IN
remark -------------------------------------------------------
remark ---Permit HSRP V2 packets---
permit udp host 2001:DB8:192:22::12 eq 2029 host FF02::66 eq 2029
permit udp host FE80::E6D3:F1FF:FE77:A202 eq 2029 host FF02::66 eq 2029
remark ---Deny other connections to Edge Router---
deny ipv6 any 2001:DB8:192:22::/64 log
remark ---Permit My Network Traffic to Assigned Networks---
permit ipv6 2001:DB8:192::/48 2000::/3
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication COMPLIANCE
session-timeout 15 output
ipv6 access-class BLOCKALL-IPv6 in
login authentication COMPLIANCE
session-timeout 15 output
ipv6 access-class BLOCKALL-IPv6 in
login authentication COMPLIANCE
ntp source GigabitEthernet0/0/3
ntp server 171.68.10.80 prefer
RIE-2
Building configuration...
No l4r_shim subsystem is included in this platform.
Current configuration : 15119 bytes
! Last configuration change at 14:30:46 PST Fri Nov 30 2012 by bmcgloth
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
no platform punt-keepalive disable-kernel-core
security authentication failure rate 2 log
security passwords min-length 7
enable secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
aaa group server tacacs+ PRIMARY1
ip tacacs source-interface GigabitEthernet0/0/2
aaa authentication login COMPLIANCE group PRIMARY1 local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
ip domain name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 multicast rpf use-bgp
multilink bundle-name authenticated
notify syslog contenttype plaintext
username retail privilege 15 secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
username bart privilege 15 secret 4 y.Hu5omquu3STdi3Z65rJiGArfomMTMWv75ITNG12f2
username emc-ncm privilege 15 secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
username bmcgloth privilege 15 secret 4 y.Hu5omquu3STdi3Z65rJiGArfomMTMWv75ITNG12f2
username csmadmin privilege 15 secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
username ciscolms privilege 15 secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
interface GigabitEthernet0/0/0
interface GigabitEthernet0/0/1
description link to RIE-3 G1/2
interface GigabitEthernet0/0/2
description link to RIE-4 G1/2
ip address 192.168.22.12 255.255.255.0
ip access-group INTERNAL-FILTER-IN in
standby 1 ip 192.168.22.10
standby 1 authentication TheCure
standby 2 ipv6 2001:DB8:192:22::10/64
standby 2 authentication TheCure
ipv6 address 2001:DB8:192:22::12/64
ipv6 verify unicast source reachable-via rx
ipv6 traffic-filter IPv6-INTERNAL-FILTER-IN in
interface GigabitEthernet0/0/3
description Link to RSP-4 G0/2
cef CEF related information
ipc IPC related information
ipmulticast IP multicast related information
isis CLNS and ISIS related information
mfib MFIB related information
ospf OSPF related information
password Include passwords
rsvp IP RSVP related information
vrrp VRRP related information
wccp WCCP related information
RIE-2#sh tech-support page
RIE-2#sh tech-support page
------------------ show clock ------------------
*14:03:13.372 PST Wed Jan 30 2013
------------------ show version ------------------
Cisco IOS Software, IOS-XE Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.3(1)S,
RELEASE SOFTWARE (fc4)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2012 by Cisco Systems, Inc.
Compiled Tue 27-Nov-12 11:16 by mcpre
IOS XE Version: 03.08.00.S
Cisco IOS-XE software, Copyright (c) 2005-2012 by cisco Systems, Inc.
All rights reserved. Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
RIE-2 uptime is 8 weeks, 5 days, 2 hours, 32 minutes
Uptime for this control processor is 8 weeks, 5 days, 2 hours, 34 minutes
System returned to ROM by reload at 11:27:32 PST Fri Nov 30 2012
System image file is "bootflash:/asr1002x-universalk9.03.08.00.S.153-1.S.SPA.bin"
Last reload reason: Reload Command
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
License Type: Default. No valid license found.
Next reload license Level: ipbase
cisco ASR1002-X (2RU-X) processor with 1140957K/6147K bytes of memory.
Processor board ID SSI16150DLD
6 Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
6684671K bytes of eUSB flash at bootflash:.
Configuration register is 0x2102
------------------ show running-config ------------------
Building configuration...
No l4r_shim subsystem is included in this platform.
Current configuration : 14907 bytes
! Last configuration change at 14:30:46 PST Fri Nov 30 2012 by bmcgloth
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
no platform punt-keepalive disable-kernel-core
security authentication failure rate 2 log
security passwords min-length 7
enable secret 4 4mpXLtxxAt3wHwQSfKdYXXs2NGTp5BcHyPEnpZ9P/Tk
aaa group server tacacs+ PRIMARY1
ip tacacs source-interface GigabitEthernet0/0/2
aaa authentication login COMPLIANCE group PRIMARY1 local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
ip domain name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 multicast rpf use-bgp
multilink bundle-name authenticated
notify syslog contenttype plaintext
username retail privilege 15 secret 4 <removed>
username bart privilege 15 secret 4 <removed>
username emc-ncm privilege 15 secret 4 <removed>
username bmcgloth privilege 15 secret 4 <removed>
username csmadmin privilege 15 secret 4 <removed>
username ciscolms privilege 15 secret 4 <removed>
interface GigabitEthernet0/0/0
interface GigabitEthernet0/0/1
description link to RIE-3 G1/2
interface GigabitEthernet0/0/2
description link to RIE-4 G1/2
ip address 192.168.22.12 255.255.255.0
ip access-group INTERNAL-FILTER-IN in
standby 1 ip 192.168.22.10
standby 1 authentication TheCure
standby 2 ipv6 2001:DB8:192:22::10/64
standby 2 authentication TheCure
ipv6 address 2001:DB8:192:22::12/64
ipv6 verify unicast source reachable-via rx
ipv6 traffic-filter IPv6-INTERNAL-FILTER-IN in
interface GigabitEthernet0/0/3
description Link to RSP-4 G0/2
ip address 10.10.4.6 255.255.255.0
ip access-group COARSE-FILTER-INTERNET-IN in
ip access-group COARSE-FILTER-INTERNET-OUT out
ipv6 address 2001:DB8:1010:4::6/64
ipv6 verify unicast source reachable-via rx
ipv6 traffic-filter IPv6-COARSE-FILTER-INTERNET-IN in
ipv6 traffic-filter IPv6-COARSE-FILTER-INTERNET-OUT out
interface GigabitEthernet0/0/4
interface GigabitEthernet0/0/5
interface GigabitEthernet0
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.10.4.1
ip route 10.10.0.0 255.255.0.0 192.168.22.1
ip route 10.10.0.0 255.255.255.0 10.10.4.1
ip route 10.10.3.0 255.255.255.0 192.168.22.11
ip route 192.168.0.0 255.255.0.0 192.168.22.1
ip access-list extended COARSE-FILTER-INTERNET-IN
remark ---Temporary LAB permit - will remove from PCI GUIDE---
permit ip 10.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255
permit ip 10.0.0.0 0.255.255.255 192.168.0.0 0.0.255.255
permit ip 172.16.0.0 0.15.255.255 10.0.0.0 0.255.255.255
permit ip 172.16.0.0 0.15.255.255 192.168.0.0 0.0.255.255
remark -------------------------------------------------------
remark ---Block Private Networks---
deny ip 10.0.0.0 0.255.255.255 any log
deny ip 172.16.0.0 0.15.255.255 any log
deny ip 192.168.0.0 0.0.255.255 any log
remark ---Block Autoconfiguration Networks---
deny ip 169.254.0.0 0.0.255.255 any log
remark ---Block Loopback Networks---
deny ip 127.0.0.0 0.0.255.255 any log
remark ---Block Multicast Networks---
deny ip 224.0.0.0 15.255.255.255 any log
remark ---Block Traffic targeted at DMZ Network Edge Devices---
deny ip any 192.168.22.0 0.0.0.255 log
remark ---Block Spoofing of your networks---
remark enter your IP block here
deny ip 192.168.20.0 0.0.0.255 any
remark ---Permit all other traffic---
ip access-list extended COARSE-FILTER-INTERNET-OUT
remark ---Block private networks from reaching Internet---
remark ---Temporary LAB permit - will remove from PCI GUIDE---
remark -------------------------------------------------------
remark ---Block Private Networks---
deny ip 10.0.0.0 0.255.255.255 any log
deny ip 172.16.0.0 0.15.255.255 any log
deny ip 192.168.0.0 0.0.255.255 any log
remark ---Block Autoconfiguration Networks---
deny ip 169.254.0.0 0.0.255.255 any log
remark ---Block Loopback Networks---
deny ip 127.0.0.0 0.0.255.255 any log
remark ---Block Multicast Networks---
deny ip 224.0.0.0 15.255.255.255 any log
remark ---Block Traffic targeted at DMZ Network Edge Devices---
deny ip any 192.168.22.0 0.0.0.255 log
remark ---Permit all other traffic---
ip access-list extended INTERNAL-FILTER-IN
remark -------------------------------------------------------
remark ---Permit Admin Management---
permit tcp host 192.168.41.101 host 192.168.22.12 eq 22 log
permit tcp host 192.168.41.102 host 192.168.22.12 eq 22 log
permit tcp host 192.168.42.122 host 192.168.22.12 eq 22 log
permit tcp host 192.168.42.124 host 192.168.22.12 eq 22 log
permit tcp host 192.168.42.131 eq tacacs host 192.168.22.12
permit tcp host 192.168.42.133 host 192.168.22.12 eq 22 log
permit tcp host 192.168.42.139 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.104 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.102 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.103 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.100 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.101 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.98 host 192.168.22.12 eq 22 log
permit tcp host 10.19.151.99 host 192.168.22.12 eq 22 log
permit udp host 192.168.42.122 host 192.168.22.12 eq snmp
permit udp host 192.168.42.124 host 192.168.22.12 eq snmp
permit udp host 192.168.42.133 host 192.168.22.12 eq snmp
permit udp host 192.168.42.139 host 192.168.22.12 eq snmp
remark ---Permit HSRP V2 packets---
permit udp host 192.168.22.11 host 224.0.0.102 eq 1985
remark ---Deny other connections to Edge Router---
deny ip any host 192.168.22.12 log
deny ip any host 192.168.22.10 log
deny ip any host 10.10.0.3 log
remark ---Permit all other traffic to Internet---
logging source-interface GigabitEthernet0/0/2
logging host 192.168.42.124
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 192.168.42.139 log
access-list 23 permit 10.19.151.104 log
access-list 23 permit 10.19.151.102 log
access-list 23 permit 10.19.151.103 log
access-list 23 permit 10.19.151.100 log
access-list 23 permit 10.19.151.101 log
access-list 23 permit 10.19.151.98 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
ipv6 route 2001:DB8:192::/48 2001:DB8:192:22::1
ipv6 route ::/0 2001:DB8:1010:4::1
snmp-server group V3Group v3 priv read V3Read write V3Write
snmp-server view V3Read iso included
snmp-server view V3Write iso included
snmp-server trap-source GigabitEthernet0/0/2
snmp-server packetsize 8192
snmp-server location Building SJC-17-1 Aisle 1 Rack 1
snmp-server contact Bart McGlothin
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps flash insertion removal
snmp-server host 192.168.42.134 version 3 priv <removed>
snmp-server host 192.168.42.139 version 3 priv <removed>
snmp-server host 192.168.42.133 version 3 priv <removed>
address ipv4 192.168.42.131
ipv6 access-list BLOCKALL-IPv6
ipv6 access-list IPv6-COARSE-FILTER-INTERNET-IN
remark --------------------------------------------------------------
remark ---Block all traffic DHCP server -> client---
deny udp any eq 547 any eq 546
remark ---Block all traffic DHCP client -> server---
deny udp any eq 546 any eq 547
remark ---Block all traffic Routing Header Type 0---
deny ipv6 any any routing-type 0
remark ---Accept all ICMPv6 packets for Neighbor Discovery and Path MTU Discovery ---
permit icmp any any nd-na
permit icmp any any nd-ns
permit icmp any any router-advertisement
permit icmp any any router-solicitation
permit icmp any any packet-too-big
permit icmp any any destination-unreachable
permit icmp any any unreachable
permit icmp any any no-route
permit icmp any any echo-reply
permit icmp any any echo-request
permit icmp any any time-exceeded
permit icmp any any parameter-problem
permit icmp any any mld-query
permit icmp any any mld-reduction
permit icmp any any mld-report
permit icmp any any port-unreachable
remark ---Block IETF Documentation Network---
remark - deny ipv6 2001:DB8::/32 any - need for Lab validation
remark ---Block Spoofing of Your Networks---
deny ipv6 2001:DB8:192::/48 any
remark ---Block Traffic targeted at DMZ Network Edge Devices---
deny ipv6 any 2001:DB8:192:22::/64 log
remark ---Permit Only Assigned Networks to Your Network---
permit ipv6 2000::/3 2001:DB8:192::/48
ipv6 access-list IPv6-COARSE-FILTER-INTERNET-OUT
remark ---Temporary LAB permit for use of documentation IPv6 space---
permit ipv6 2001:DB8::/32 2001:DB8::/32
remark -------------------------------------------------------
remark ---Block private networks from reaching Internet---
remark ---Block IETF reserved Networks---
deny ipv6 FEC0::/10 any log
deny ipv6 FC00::/7 any log
deny ipv6 host :: any log
deny ipv6 ::FFFF:0.0.0.0/96 any log
deny ipv6 2001:DB8::/32 any log
remark ---Block Loopback Address---
deny ipv6 host ::1 any log
remark ---Block Multicast Networks---
deny ipv6 FE00::/7 any log
remark ---Alternate is to Permit Traffic From My Network to Assigned Networks---
permit ipv6 2001:DB8:192::/48 2000::/3
remark ---Explicit Deny for All Other Networks and Log---
ipv6 access-list IPv6-INTERNAL-FILTER-IN
remark -------------------------------------------------------
remark ---Permit HSRP V2 packets---
permit udp host 2001:DB8:192:22::11 eq 2029 host FF02::66 eq 2029
permit udp host FE80::E6D3:F1FF:FE77:D901 eq 2029 host FF02::66 eq 2029
remark ---Deny other connections to Edge Router---
deny ipv6 any 2001:DB8:192:22::/64 log
remark ---Permit My Network Traffic to Assigned Networks---
permit ipv6 2001:DB8:192::/48 2000::/3
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication COMPLIANCE
session-timeout 15 output
ipv6 access-class BLOCKALL-IPv6 in
login authentication COMPLIANCE
session-timeout 15 output
ipv6 access-class BLOCKALL-IPv6 in
login authentication COMPLIANCE
ntp source GigabitEthernet0/0/3
ntp server 171.68.10.80 prefer
Converged Core/Aggregation
ASA-IE-1
domain-name cisco-irn.com
enable password WKlYt0jXwtQLFcz7 encrypted
passwd WKlYt0jXwtQLFcz7 encrypted
interface GigabitEthernet0/0
ip address 192.168.21.1 255.255.255.0 standby 192.168.21.2
ipv6 address 2001:db8:192:21::1/64 standby 2001:db8:192:21::2
interface GigabitEthernet0/1
ip address 192.168.11.60 255.255.255.0 standby 192.168.11.62
interface GigabitEthernet0/2
interface GigabitEthernet0/3
description LAN/STATE Failover Interface
interface GigabitEthernet0/4
interface GigabitEthernet0/5
interface GigabitEthernet0/6
interface GigabitEthernet0/7
banner exec **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner exec **** AUTHORIZED USERS ONLY! ****
banner exec ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
banner exec TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE
NECESSARY
banner exec TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
banner exec REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME
WITHOUT
banner exec FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
banner exec CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
banner exec ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
banner exec UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS.
banner login THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
banner asdm **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner asdm **** AUTHORIZED USERS ONLY! ****
banner asdm ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY TO
IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER REPRESENTATIVES OF THE
SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT FURTHER NOTICE OR CONSENT.
UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER CRIMINAL CONDUCT REVEALED BY SUCH USE IS
SUBJECT TO DISCLOSURE TO LAW ENFORCEMENT OFFICIALS AND PROSECUTION TO THE F
banner asdm UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS
boot system disk0:/asa911-smp-k8.bin
clock summer-time PDT recurring
dns domain-lookup outside
dns server-group DefaultDNS
name-server 192.168.42.130
domain-name cisco-irn.com
same-security-traffic permit inter-interface
description Cisco Prime LMS
object network RIE-1_G0-0-1
object network RIE-1_G0-0-1_ipv6
object network RIE-2_G0-0-2
object network RIE-2_G0-0-2_ipv6
object network RIE1+2_HSRP_ipv6
object network RIE1+2_HSRP
object network ASA-IE-1-outside.cisco-irn.com
object network Bart-Admin99
object network DMZ-Network-4
subnet 192.168.20.24 255.255.255.248
object network DMZ-Networks
subnet 192.168.20.0 255.255.252.0
object network DMZ-VIP-30
object network DataCenter-Networks
subnet 192.168.0.0 255.255.0.0
description Private 1918 block
object network EMC-NCM.cisco-irn.com
object network ESA-IE-1.cisco-irn.com
object network ESMA-IE-1.cisco-irn.com
object network EmailSecurityAppliance-Network
subnet 192.168.23.64 255.255.255.240
object network EmailSecurityManager-Network
subnet 192.168.23.80 255.255.255.240
object network FSU.cisco-irn.com
object network InSide-Network
subnet 192.168.21.0 255.255.255.0
object network InternetEdge-Networks
subnet 192.168.20.0 255.255.252.0
object network NTP1.cisco-irn.com
object network NTP2.cisco-irn.com
object network OutSide-Network
subnet 192.168.22.0 255.255.255.0
object network PAME-DC-1.cisco-irn.com
object network RSA-enVision.cisco-irn.com
object network SRV-DC-1.cisco-irn.com
object network SRV-DC-2.cisco-irn.com
object network Branch-Networks
subnet 10.10.0.0 255.255.0.0
object network WebSecurityAppliance-Network
subnet 192.168.23.96 255.255.255.240
object network csmanager.cisco-irn.com
object network tacacs.cisco-irn.com
object network ActiveDirectory
object network LABNTP-1.cisco.com
object network LABNTP-2.cisco.com
object network nist-chicago-NoDNS-
description Chicago, Illinois
object network nist-time-server.eoni.com
description La Grande, Oregon
object network nist.expertsmi.com
description Monroe, Michigan
object network nist.netservicesgroup.com
description Southfield, Michigan
object network nist.time.nosc.us
description Carrollton, Texas
object network nist1-atl.ustiming.org
description Atlanta, Georgia
object network nist1-chi.ustiming.org
description Chicago, Illinois
object network nist1-la.ustiming.org
description Los Angeles, California
object network nist1-lnk.binary.net
description Lincoln, Nebraska
object network nist1-lv.ustiming.org
description Las Vegas, Nevada
object network nist1-nj.ustiming.org
description Bridgewater, NJ
object network nist1-nj2.ustiming.org
description Weehawken, NJ
object network nist1-ny.ustiming.org
description New York City, NY
object network nist1-pa.ustiming.org
object network nist1-sj.ustiming.org
description San Jose, California
object network nist1.aol-ca.symmetricom.com
description Mountain View, California
object network nist1.aol-va.symmetricom.com
description Reston, Virginia
object network nist1.columbiacountyga.gov
description Columbia County, Georgia
object network nist1.symmetricom.com
description San Jose, California
object network nist2-nj2.ustiming.org
description Weehawken, NJ
object network nisttime.carsoncity.k12.mi.us
description Carson City, Michigan
object network ntp-nist.ldsbc.edu
description LDSBC, Salt Lake City, Utah
object network time-a.nist.gov
description NIST, Gaithersburg, Maryland
object network time-a.timefreq.bldrdoc.gov
description NIST, Boulder, Colorado
object network time-b.nist.gov
description NIST, Gaithersburg, Maryland
object network time-b.timefreq.bldrdoc.gov
description NIST, Boulder, Colorado
object network time-c.timefreq.bldrdoc.gov
description NIST, Boulder, Colorado
object network time-d.nist.gov
description NIST, Gaithersburg, Maryland
object network time-nw.nist.gov
description Microsoft, Redmond, Washington
object network utcnist.colorado.edu
description University of Colorado, Boulder
object network utcnist2.colorado.edu
description University of Colorado, Boulder
object network wwv.nist.gov
description WWV, Fort Collins, Colorado
object network ASA-IE-1-outside_ipv6.cisco-irn.com
object network DMZ-VIP-30_ipv6
host 2001:db8:192:20a4::30
object network CiscoLAB10-Network
subnet 10.0.0.0 255.0.0.0
description Private 1918 block
object network CiscoLAB171-Network
subnet 171.68.0.0 255.255.0.0
object network CiscoLAB172-Network
subnet 172.16.0.0 255.240.0.0
description Private 1918 block
object network DMZ-Network-4v6
subnet 2001:db8:192:20a4::/64
object network EmailSecurityAppliance-Networkv6
subnet 2001:db8:192:23a5::/64
object network EmailSecurityManager-Networkv6
subnet 2001:db8:192:23a6::/64
object network InSide-Networkv6
subnet 2001:db8:192:21::/64
object network OutSide-Networkv6
subnet 2001:db8:192:22::/64
object network WebSecurityAppliance-Networkv6
subnet 2001:db8:192:23a7::/64
object network ESA-IE-1.cisco-irn.com_ipv6
host 2001:db8:192:23a5::68
object network ESMA-IE-1.cisco-irn.com_ipv6
host 2001:db8:192:23a6::84
object network WSA-IE-1.cisco-irn.com
object network WSA-IE-1.cisco-irn.com_ipv6
host 2001:db8:192:23a7::100
object network ASASM-DMZ-1.cisco-irn.com
object network ASASM-DMZ-2.cicso-irn.com
object network ASASM-DMZ-1.cisco-irn.com_ipv6
object-group service RDP tcp
object-group protocol TCPUDP
object-group service vCenter-to-ESX4 tcp
description Communication from vCetner to ESX hosts
object-group network NTP-Servers
network-object object NTP1.cisco-irn.com
network-object object NTP2.cisco-irn.com
network-object object ActiveDirectory
object-group network NTP-PublicServers
description Public time.nist.gov servers
network-object object nist-chicago-NoDNS-
network-object object nist-time-server.eoni.com
network-object object nist.expertsmi.com
network-object object nist.netservicesgroup.com
network-object object nist.time.nosc.us
network-object object nist1-atl.ustiming.org
network-object object nist1-chi.ustiming.org
network-object object nist1-la.ustiming.org
network-object object nist1-lnk.binary.net
network-object object nist1-lv.ustiming.org
network-object object nist1-nj.ustiming.org
network-object object nist1-nj2.ustiming.org
network-object object nist1-ny.ustiming.org
network-object object nist1-pa.ustiming.org
network-object object nist1-sj.ustiming.org
network-object object nist1.aol-ca.symmetricom.com
network-object object nist1.aol-va.symmetricom.com
network-object object nist1.columbiacountyga.gov
network-object object nist1.symmetricom.com
network-object object nist2-nj2.ustiming.org
network-object object nisttime.carsoncity.k12.mi.us
network-object object ntp-nist.ldsbc.edu
network-object object time-a.nist.gov
network-object object time-a.timefreq.bldrdoc.gov
network-object object time-b.nist.gov
network-object object time-b.timefreq.bldrdoc.gov
network-object object time-c.timefreq.bldrdoc.gov
network-object object time-d.nist.gov
network-object object time-nw.nist.gov
network-object object utcnist.colorado.edu
network-object object utcnist2.colorado.edu
network-object object wwv.nist.gov
network-object object LABNTP-1.cisco.com
network-object object LABNTP-2.cisco.com
object-group network Admin-Systems
network-object object PrimeLMS
network-object object Bart-Admin99
network-object object EMC-NCM.cisco-irn.com
network-object object RSA-enVision.cisco-irn.com
network-object object SRV-DC-1.cisco-irn.com
network-object object SRV-DC-2.cisco-irn.com
network-object object csmanager.cisco-irn.com
object-group network DM_INLINE_NETWORK_1
network-object object EMC-NCM.cisco-irn.com
network-object object PrimeLMS
network-object object csmanager.cisco-irn.com
object-group network DM_INLINE_NETWORK_2
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network DM_INLINE_NETWORK_3
network-object object EmailSecurityAppliance-Network
network-object object EmailSecurityManager-Network
network-object object WebSecurityAppliance-Network
object-group network DM_INLINE_NETWORK_4
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network DM_INLINE_NETWORK_5
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network DM_INLINE_NETWORK_6
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group icmp-type DM_INLINE_ICMP_1
icmp-object information-reply
icmp-object information-request
icmp-object time-exceeded
object-group service DM_INLINE_TCP_1 tcp
group-object vCenter-to-ESX4
object-group service DM_INLINE_TCP_2 tcp
object-group service DM_INLINE_TCP_3 tcp
object-group service DM_INLINE_TCP_4 tcp
object-group network DM_INLINE_NETWORK_10
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network DM_INLINE_NETWORK_11
network-object object CiscoLAB10-Network
network-object object CiscoLAB171-Network
network-object object CiscoLAB172-Network
object-group network DM_INLINE_NETWORK_12
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network DM_INLINE_NETWORK_7
network-object object RIE-1_G0-0-1
network-object object RIE-2_G0-0-2
network-object object DMZ-Networks
object-group network DM_INLINE_NETWORK_8
network-object object RIE-1_G0-0-1
network-object object RIE-2_G0-0-2
network-object object DMZ-Networks
network-object object ASASM-DMZ-1.cisco-irn.com
network-object object ASASM-DMZ-2.cicso-irn.com
object-group network DM_INLINE_NETWORK_9
network-object object CiscoLAB10-Network
network-object object CiscoLAB171-Network
network-object object CiscoLAB172-Network
object-group service DM_INLINE_TCP_5 tcp
group-object vCenter-to-ESX4
object-group network DM_INLINE_NETWORK_13
network-object object RIE-1_G0-0-1
network-object object RIE-2_G0-0-2
network-object object DMZ-Networks
access-list all extended permit ip any any
access-list OUTSIDE_IN extended permit icmp6 any6 any6
access-list OUTSIDE_IN remark Clientless VPN for IPv6
access-list OUTSIDE_IN extended permit tcp any6 object ASASM-DMZ-1.cisco-irn.com_ipv6 eq
https
access-list OUTSIDE_IN remark Clientless VPN
access-list OUTSIDE_IN extended permit tcp any object ASA-IE-1-outside_ipv6.cisco-irn.com
eq https
access-list OUTSIDE_IN remark DMZ Systems send Syslog messages
access-list OUTSIDE_IN extended permit udp object-group DM_INLINE_NETWORK_7 object
RSA-enVision.cisco-irn.com eq syslog
access-list OUTSIDE_IN remark DMZ Systems Authenticate access
access-list OUTSIDE_IN extended permit tcp object-group DM_INLINE_NETWORK_8 object
tacacs.cisco-irn.com eq tacacs
access-list OUTSIDE_IN remark DMZ Systems Authenticate access
access-list OUTSIDE_IN extended permit object-group TCPUDP object-group
DM_INLINE_NETWORK_13 object ActiveDirectory eq domain
access-list OUTSIDE_IN remark ====LAB ACCESS to TEST===REMOVE===
access-list OUTSIDE_IN extended permit icmp object-group DM_INLINE_NETWORK_9 object-group
DM_INLINE_NETWORK_10
access-list OUTSIDE_IN remark ====LAB ACCESS to TEST===REMOVE===
access-list OUTSIDE_IN extended permit tcp object-group DM_INLINE_NETWORK_11 object-group
DM_INLINE_NETWORK_12 object-group DM_INLINE_TCP_5
access-list OUTSIDE_IN remark Drop all other traffic
access-list OUTSIDE_IN extended deny ip any any log
access-list DROP-ALL extended deny ip any any
access-list INSIDE_IN remark Admin Access to DMZ
access-list INSIDE_IN extended permit tcp object-group Admin-Systems object DMZ-Networks
object-group DM_INLINE_TCP_1
access-list INSIDE_IN remark Manage DMZ Devices
access-list INSIDE_IN extended permit udp object-group DM_INLINE_NETWORK_1 object
DMZ-Networks eq snmp
access-list INSIDE_IN remark Network Time
access-list INSIDE_IN extended permit udp object-group NTP-Servers object-group
NTP-PublicServers eq ntp
access-list INSIDE_IN remark Allow Access to services for Ironport Apps
access-list INSIDE_IN extended permit tcp object-group DM_INLINE_NETWORK_2 object-group
DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_2
access-list INSIDE_IN remark Allow Secure traffic to DMZ
access-list INSIDE_IN extended permit tcp object-group DM_INLINE_NETWORK_4 object
DMZ-VIP-30 object-group DM_INLINE_TCP_3
access-list INSIDE_IN remark - Block non-secure traffic to DMZ
access-list INSIDE_IN extended deny ip any object DMZ-Networks
access-list INSIDE_IN remark Allow outbound services for Internet
access-list INSIDE_IN extended permit icmp object-group DM_INLINE_NETWORK_5 any
object-group DM_INLINE_ICMP_1
access-list INSIDE_IN remark General Internet Browsing
access-list INSIDE_IN extended permit tcp object-group DM_INLINE_NETWORK_6 any
object-group DM_INLINE_TCP_4
access-list INSIDE_IN remark DNS Services
access-list INSIDE_IN extended permit object-group TCPUDP object ActiveDirectory any eq
domain
access-list INSIDE_IN remark Drop and Log all other traffic - END-OF-LINE
access-list INSIDE_IN extended deny ip any any log
access-list all-web webtype permit url any log default
logging buffer-size 1048576
logging asdm-buffer-size 512
logging trap informational
logging asdm informational
logging host inside 192.168.42.124
failover lan unit primary
failover lan interface folink GigabitEthernet0/3
failover link folink GigabitEthernet0/3
failover interface ip folink 192.168.12.31 255.255.255.0 standby 192.168.12.32
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-711.bin
no arp permit-nonconnected
access-group OUTSIDE_IN in interface outside
access-group INSIDE_IN in interface inside
access-group DROP-ALL in interface management
ipv6 icmp permit any echo outside
ipv6 icmp permit any echo-reply outside
ipv6 icmp permit any membership-query inside
ipv6 icmp permit any membership-reduction inside
ipv6 icmp permit any membership-report inside
ipv6 icmp permit any neighbor-advertisement inside
ipv6 icmp permit any neighbor-redirect inside
ipv6 icmp permit any neighbor-solicitation inside
ipv6 icmp permit any packet-too-big inside
ipv6 icmp permit any parameter-problem inside
ipv6 icmp permit any router-advertisement inside
ipv6 icmp permit any router-solicitation inside
ipv6 icmp permit any time-exceeded inside
ipv6 icmp permit any unreachable inside
ipv6 route outside ::/0 2001:db8:192:21::10
route outside 0.0.0.0 0.0.0.0 192.168.21.10 1
route inside 10.10.0.0 255.255.0.0 192.168.11.1 1
route outside 10.10.0.0 255.255.255.0 192.168.21.10 1
route inside 192.168.0.0 255.255.0.0 192.168.11.10 10
route outside 192.168.20.0 255.255.255.0 192.168.21.10 1
route outside 192.168.22.0 255.255.255.0 192.168.21.10 1
route outside 192.168.23.0 255.255.255.0 192.168.21.10 1
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
svc ask enable default webvpn
aaa-server partnerauth protocol radius
aaa-server partnerauth (inside) host 192.168.42.137
aaa-server COMPLIANCE protocol tacacs+
reactivation-mode depletion deadtime 15
aaa-server COMPLIANCE (inside) host 192.168.42.131
user-identity default-domain LOCAL
aaa authentication enable console COMPLIANCE LOCAL
aaa authentication http console COMPLIANCE LOCAL
aaa authentication serial console COMPLIANCE LOCAL
aaa authentication ssh console COMPLIANCE LOCAL
aaa authorization command COMPLIANCE LOCAL
aaa accounting enable console COMPLIANCE
aaa accounting serial console COMPLIANCE
aaa accounting ssh console COMPLIANCE
aaa accounting command COMPLIANCE
aaa authentication secure-http-client
aaa local authentication attempts max-fail 6
aaa authorization exec authentication-server
http server idle-timeout 15
http server session-timeout 15
http 192.168.41.101 255.255.255.255 inside
http 192.168.41.102 255.255.255.255 inside
http 192.168.42.122 255.255.255.255 inside
http 192.168.42.124 255.255.255.255 inside
http 192.168.42.133 255.255.255.255 inside
http 192.168.42.138 255.255.255.255 inside
http 192.168.42.139 255.255.255.255 inside
snmp-server group V3Group v3 priv
snmp-server user ciscolms V3Group v3 encrypted auth sha
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db priv aes 256
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db:88:e3:53:03:7b:f1:02:30:bc:14:
98:e5
snmp-server user csmadmin V3Group v3 encrypted auth sha
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db priv aes 256
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db:88:e3:53:03:7b:f1:02:30:bc:14:
98:e5
snmp-server host inside 192.168.42.134 version 3 ciscolms
snmp-server host inside 192.168.42.139 version 3 ciscolms
snmp-server host inside 192.168.42.133 version 3 csmadmin
snmp-server location Building SJC-17-1 Aisle 2 Rack 3
snmp-server contact EmployeeA
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
snmp-server enable traps syslog
snmp-server enable traps ipsec start stop
snmp-server enable traps memory-threshold
snmp-server enable traps interface-threshold
snmp-server enable traps remote-access session-threshold-exceeded
snmp-server enable traps connection-limit-reached
snmp-server enable traps cpu threshold rising
snmp-server enable traps ikev2 start stop
snmp-server enable traps nat packet-discard
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
ssh 192.168.41.101 255.255.255.255 inside
ssh 192.168.41.102 255.255.255.255 inside
ssh 192.168.42.122 255.255.255.255 inside
ssh 192.168.42.124 255.255.255.255 inside
ssh 192.168.42.133 255.255.255.255 inside
ssh 192.168.42.138 255.255.255.255 inside
ssh 192.168.42.139 255.255.255.255 inside
tls-proxy maximum-session 1000
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 192.168.62.162 source inside
ntp server 192.168.62.161 source inside prefer
ssl encryption 3des-sha1 aes128-sha1 aes256-sha1
smart-tunnel list AllExternalApplications All-Applications * platform windows
group-policy DfltGrpPolicy attributes
smart-tunnel enable AllExternalApplications
group-policy Retail-PCI internal
group-policy Retail-PCI attributes
vpn-tunnel-protocol ssl-clientless
username csmadmin password 9CmOJ.jq4D54PXDW encrypted privilege 15
username retail password XgJyMnijuEPQSGoY encrypted privilege 15
username emc-ncm password 4gFPrpXqWo/ncR1h encrypted privilege 15
username ciscolms password huo2PmvTsMk6Cv1L encrypted privilege 15
username bmcgloth password gITSY3iZ3UnCQoKf encrypted privilege 15
tunnel-group DefaultRAGroup general-attributes
authentication-server-group partnerauth
tunnel-group DefaultWEBVPNGroup general-attributes
authentication-server-group partnerauth
tunnel-group Retail-Lab type remote-access
tunnel-group Retail-Lab general-attributes
authentication-server-group partnerauth LOCAL
default-group-policy Retail-PCI
class-map inspection_default
match default-inspection-traffic
class-map global-class-PCI
policy-map type inspect dns preset_dns_map
message-length maximum client auto
message-length maximum 512
description IPS inspection policy for Cisco PCI LAB
inspect dns preset_dns_map
policy-map type inspect dns migrated_dns_map_1
message-length maximum client auto
message-length maximum 512
service-policy global_policy global
no call-home reporting anonymous
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:d01b4c45ee6507fcc152f2f9e01983b1
DMZ-IDS-1
! ------------------------------
! Current configuration last modified Thu Apr 28 21:34:42 2011
! ------------------------------
! Signature Update S500.0 2010-07-09
! ------------------------------
physical-interfaces GigabitEthernet0/7
subinterface-type inline-vlan-pair
description INT1 vlans 83 and 84
! ------------------------------
! ------------------------------
service event-action-rules rules0
! ------------------------------
host-ip 192.168.21.93/24,192.168.21.1
access-list 10.19.151.99/32
access-list 192.168.41.101/32
access-list 192.168.41.102/32
access-list 192.168.42.122/32
access-list 192.168.42.124/32
access-list 192.168.42.133/32
access-list 192.168.42.138/32
dns-primary-server enabled
dns-secondary-server disabled
dns-tertiary-server disabled
standard-time-zone-name PST
ntp-option enabled-ntp-unauthenticated
ntp-server 192.168.62.161
summertime-option recurring
! ------------------------------
! ------------------------------
! ------------------------------
trap-destinations 192.168.42.124
trap-community-name <removed>
enable-notifications true
trap-community-name <removed>
! ------------------------------
service signature-definition sig0
! ------------------------------
! ------------------------------
service trusted-certificates
! ------------------------------
! ------------------------------
service anomaly-detection ad0
! ------------------------------
service external-product-interface
! ------------------------------
! ------------------------------
service global-correlation
! ------------------------------
server-address 192.168.42.131
console-authentication radius-and-local
default-user-role administrator
! ------------------------------
DMZ-ASASM
domain-name cisco-irn.com
enable password WKlYt0jXwtQLFcz7 encrypted
passwd WKlYt0jXwtQLFcz7 encrypted
ip address 192.168.21.10 255.255.255.0 standby 192.168.21.12
ipv6 address 2001:db8:192:21::10/64 standby 2001:db8:192:21::12
ip address 192.168.22.1 255.255.255.0 standby 192.168.22.2
ipv6 address 2001:db8:192:22::1/64 standby 2001:db8:192:22::3
ip address 192.168.20.25 255.255.255.248 standby 192.168.20.26
ipv6 address 2001:db8:192:20a4::25/64 standby 2001:db8:192:20a4::26
description LAN Failover Interface
description STATE Failover Interface
nameif EmailSecurityAppliance
ip address 192.168.23.65 255.255.255.240 standby 192.168.23.66
ipv6 address 2001:db8:192:23a5::65/64 standby 2001:db8:192:23a5::66
nameif EmailSecurityMgrAppliance
ip address 192.168.23.81 255.255.255.240 standby 192.168.23.82
ipv6 address 2001:db8:192:23a6::81/64 standby 2001:db8:192:23a6::82
nameif WebSecurityAppliance
ip address 192.168.23.97 255.255.255.240 standby 192.168.23.98
ipv6 address 2001:db8:192:23a7::97/64 standby 2001:db8:192:23a7::98
banner exec **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner exec **** AUTHORIZED USERS ONLY! ****
banner exec ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
banner exec TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE
NECESSARY
banner exec TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
banner exec REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME
WITHOUT
banner exec FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
banner exec CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
banner exec ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
banner exec UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS.
banner login THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
banner asdm **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner asdm **** AUTHORIZED USERS ONLY! ****
banner asdm ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
banner asdm TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE
NECESSARY
banner asdm TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
banner asdm REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME
WITHOUT
banner asdm FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
banner asdm CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
banner asdm ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
banner asdm UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS
boot system disk0:/asa911-smp-k8.bin
boot system disk0:/asa901-smp-k8.bin
dns server-group DefaultDNS
name-server 192.168.42.130
domain-name cisco-irn.com
same-security-traffic permit inter-interface
description Cisco Prime LMS
object network RIE-1_G0-0-1
object network RIE-1_G0-0-1_ipv6
object network RIE-2_G0-0-2
object network RIE-2_G0-0-2_ipv6
object network RIE1+2_HSRP_ipv6
object network RIE1+2_HSRP
object network ASA-IE-1-outside.cisco-irn.com
object network Bart-Admin99
object network DMZ-Network-4
subnet 192.168.20.24 255.255.255.248
object network DMZ-Networks
subnet 192.168.20.0 255.255.255.0
object network DMZ-VIP-30
object network DataCenter-Networks
subnet 192.168.0.0 255.255.0.0
description Private 1918 block
object network EMC-NCM.cisco-irn.com
object network ESA-IE-1.cisco-irn.com
object network ESMA-IE-1.cisco-irn.com
object network EmailSecurityAppliance-Network
subnet 192.168.23.64 255.255.255.240
object network EmailSecurityManager-Network
subnet 192.168.23.80 255.255.255.240
object network FSU.cisco-irn.com
object network InSide-Network
subnet 192.168.21.0 255.255.255.0
object network InternetEdge-Networks
subnet 192.168.20.0 255.255.252.0
object network NTP1.cisco-irn.com
object network NTP2.cisco-irn.com
object network OutSide-Network
subnet 192.168.22.0 255.255.255.0
object network PAME-DC-1.cisco-irn.com
object network RSA-enVision.cisco-irn.com
object network SRV-DC-1.cisco-irn.com
object network SRV-DC-2.cisco-irn.com
object network Branch-Networks
subnet 10.10.0.0 255.255.0.0
object network WebSecurityAppliance-Network
subnet 192.168.23.96 255.255.255.240
object network csmanager.cisco-irn.com
object network tacacs.cisco-irn.com
object network ActiveDirectory
object network LABNTP-1.cisco.com
object network LABNTP-2.cisco.com
object network nist-chicago-NoDNS-
description Chicago, Illinois
object network nist-time-server.eoni.com
description La Grande, Oregon
object network nist.expertsmi.com
description Monroe, Michigan
object network nist.netservicesgroup.com
description Southfield, Michigan
object network nist.time.nosc.us
description Carrollton, Texas
object network nist1-atl.ustiming.org
description Atlanta, Georgia
object network nist1-chi.ustiming.org
description Chicago, Illinois
object network nist1-la.ustiming.org
description Los Angeles, California
object network nist1-lnk.binary.net
description Lincoln, Nebraska
object network nist1-lv.ustiming.org
description Las Vegas, Nevada
object network nist1-nj.ustiming.org
description Bridgewater, NJ
object network nist1-nj2.ustiming.org
description Weehawken, NJ
object network nist1-ny.ustiming.org
description New York City, NY
object network nist1-pa.ustiming.org
object network nist1-sj.ustiming.org
description San Jose, California
object network nist1.aol-ca.symmetricom.com
description Mountain View, California
object network nist1.aol-va.symmetricom.com
description Reston, Virginia
object network nist1.columbiacountyga.gov
description Columbia County, Georgia
object network nist1.symmetricom.com
description San Jose, California
object network nist2-nj2.ustiming.org
description Weehawken, NJ
object network nisttime.carsoncity.k12.mi.us
description Carson City, Michigan
object network ntp-nist.ldsbc.edu
description LDSBC, Salt Lake City, Utah
object network time-a.nist.gov
description NIST, Gaithersburg, Maryland
object network time-a.timefreq.bldrdoc.gov
description NIST, Boulder, Colorado
object network time-b.nist.gov
description NIST, Gaithersburg, Maryland
object network time-b.timefreq.bldrdoc.gov
description NIST, Boulder, Colorado
object network time-c.timefreq.bldrdoc.gov
description NIST, Boulder, Colorado
object network time-d.nist.gov
description NIST, Gaithersburg, Maryland
object network time-nw.nist.gov
description Microsoft, Redmond, Washington
object network utcnist.colorado.edu
description University of Colorado, Boulder
object network utcnist2.colorado.edu
description University of Colorado, Boulder
object network wwv.nist.gov
description WWV, Fort Collins, Colorado
object network ASA-IE-1-outside_ipv6.cisco-irn.com
object network DMZ-VIP-30_ipv6
host 2001:db8:192:20a4::30
object network CiscoLAB10-Network
subnet 10.0.0.0 255.0.0.0
description Private 1918 block
object network CiscoLAB171-Network
subnet 171.68.0.0 255.255.0.0
object network CiscoLAB172-Network
subnet 172.16.0.0 255.240.0.0
description Private 1918 block
object network DMZ-Network-4v6
subnet 2001:db8:192:20a4::/64
object network EmailSecurityAppliance-Networkv6
subnet 2001:db8:192:23a5::/64
object network EmailSecurityManager-Networkv6
subnet 2001:db8:192:23a6::/64
object network InSide-Networkv6
subnet 2001:db8:192:21::/64
object network OutSide-Networkv6
subnet 2001:db8:192:22::/64
object network WebSecurityAppliance-Networkv6
subnet 2001:db8:192:23a7::/64
object network ESA-IE-1.cisco-irn.com_ipv6
host 2001:db8:192:23a5::68
object network ESMA-IE-1.cisco-irn.com_ipv6
host 2001:db8:192:23a6::84
object network WSA-IE-1.cisco-irn.com
object network WSA-IE-1.cisco-irn.com_ipv6
host 2001:db8:192:23a7::100
object-group icmp-type DM_INLINE_ICMP_1
icmp-object information-reply
icmp-object time-exceeded
object-group network DM_INLINE_NETWORK_27
network-object object ESA-IE-1.cisco-irn.com
network-object object ESA-IE-1.cisco-irn.com_ipv6
object-group protocol ICMP-v6
object-group network DM_INLINE_NETWORK_20
network-object object ESA-IE-1.cisco-irn.com
network-object object ESA-IE-1.cisco-irn.com_ipv6
object-group service DM_INLINE_SERVICE_1
service-object tcp destination eq https
service-object tcp destination eq ssh
object-group network NTP-Servers
network-object object NTP1.cisco-irn.com
network-object object NTP2.cisco-irn.com
network-object object ActiveDirectory
object-group network DM_INLINE_NETWORK_6
network-object object EmailSecurityAppliance-Network
network-object object EmailSecurityManager-Network
network-object object WebSecurityAppliance-Network
object-group service RDP tcp
object-group service vCenter-to-ESX4 tcp
description Communication from vCetner to ESX hosts
object-group service DM_INLINE_TCP_2 tcp
group-object vCenter-to-ESX4
object-group service DM_INLINE_UDP_1 udp
object-group service DM_INLINE_UDP_2 udp
object-group network DM_INLINE_NETWORK_2
network-object object EMC-NCM.cisco-irn.com
network-object object PrimeLMS
network-object object csmanager.cisco-irn.com
object-group service DM_INLINE_UDP_3 udp
object-group network DM_INLINE_NETWORK_21
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group service DM_INLINE_TCP_3 tcp
object-group network DM_INLINE_NETWORK_22
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network DM_INLINE_NETWORK_23
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group network Admin-Systems
network-object object PrimeLMS
network-object object Bart-Admin99
network-object object EMC-NCM.cisco-irn.com
network-object object RSA-enVision.cisco-irn.com
network-object object SRV-DC-1.cisco-irn.com
network-object object SRV-DC-2.cisco-irn.com
network-object object csmanager.cisco-irn.com
object-group network DM_INLINE_NETWORK_24
network-object object Branch-Networks
network-object object DataCenter-Networks
object-group service DM_INLINE_TCP_4 tcp
object-group service DM_INLINE_TCP_5 tcp
object-group network DM_INLINE_NETWORK_25
network-object object RIE-1_G0-0-1
network-object object RIE-2_G0-0-2
object-group network DM_INLINE_NETWORK_26
network-object object RIE-1_G0-0-1
network-object object RIE-2_G0-0-2
object-group network DM_INLINE_NETWORK_3
network-object object DataCenter-Networks
network-object object Branch-Networks
object-group network NTP-PublicServers
description Public time.nist.gov servers
network-object object LABNTP-1.cisco.com
network-object object LABNTP-2.cisco.com
network-object object nist-chicago-NoDNS-
network-object object nist-time-server.eoni.com
network-object object nist.expertsmi.com
network-object object nist.netservicesgroup.com
network-object object nist.time.nosc.us
network-object object nist1-atl.ustiming.org
network-object object nist1-chi.ustiming.org
network-object object nist1-la.ustiming.org
network-object object nist1-lnk.binary.net
network-object object nist1-lv.ustiming.org
network-object object nist1-nj.ustiming.org
network-object object nist1-nj2.ustiming.org
network-object object nist1-ny.ustiming.org
network-object object nist1-pa.ustiming.org
network-object object nist1-sj.ustiming.org
network-object object nist1.aol-ca.symmetricom.com
network-object object nist1.aol-va.symmetricom.com
network-object object nist1.columbiacountyga.gov
network-object object nist1.symmetricom.com
network-object object nist2-nj2.ustiming.org
network-object object nisttime.carsoncity.k12.mi.us
network-object object ntp-nist.ldsbc.edu
network-object object time-a.nist.gov
network-object object time-a.timefreq.bldrdoc.gov
network-object object time-b.nist.gov
network-object object time-b.timefreq.bldrdoc.gov
network-object object time-c.timefreq.bldrdoc.gov
network-object object time-d.nist.gov
network-object object time-nw.nist.gov
network-object object utcnist.colorado.edu
network-object object utcnist2.colorado.edu
network-object object wwv.nist.gov
object-group network DM_INLINE_NETWORK_4
network-object object DMZ-VIP-30
network-object object DMZ-VIP-30_ipv6
object-group network DM_INLINE_NETWORK_5
network-object object ASA-IE-1-outside.cisco-irn.com
network-object object ASA-IE-1-outside_ipv6.cisco-irn.com
object-group network DM_INLINE_NETWORK_7
network-object object DataCenter-Networks
network-object object Branch-Networks
object-group service DM_INLINE_TCP_1 tcp
group-object vCenter-to-ESX4
object-group network DM_INLINE_NETWORK_8
network-object object CiscoLAB10-Network
network-object object CiscoLAB171-Network
network-object object CiscoLAB172-Network
object-group network DM_INLINE_NETWORK_9
network-object object CiscoLAB10-Network
network-object object CiscoLAB171-Network
network-object object CiscoLAB172-Network
object-group network DM_INLINE_NETWORK_1
network-object object WSA-IE-1.cisco-irn.com
network-object object WSA-IE-1.cisco-irn.com_ipv6
object-group network DM_INLINE_NETWORK_10
network-object object ESMA-IE-1.cisco-irn.com
network-object object ESMA-IE-1.cisco-irn.com_ipv6
object-group network DM_INLINE_NETWORK_11
network-object object WSA-IE-1.cisco-irn.com
network-object object WSA-IE-1.cisco-irn.com_ipv6
object-group network DM_INLINE_NETWORK_12
network-object object ESMA-IE-1.cisco-irn.com
network-object object ESMA-IE-1.cisco-irn.com_ipv6
object-group network DM_INLINE_NETWORK_13
network-object object ESA-IE-1.cisco-irn.com
network-object object ESA-IE-1.cisco-irn.com_ipv6
object-group network DM_INLINE_NETWORK_14
network-object object WebSecurityAppliance-Network
network-object object WebSecurityAppliance-Networkv6
object-group network DM_INLINE_NETWORK_15
network-object object DataCenter-Networks
network-object object Branch-Networks
object-group network DM_INLINE_NETWORK_16
network-object object EmailSecurityManager-Network
network-object object EmailSecurityManager-Networkv6
object-group network DM_INLINE_NETWORK_17
network-object object DataCenter-Networks
network-object object Branch-Networks
object-group network DM_INLINE_NETWORK_18
network-object object EmailSecurityAppliance-Network
network-object object EmailSecurityAppliance-Networkv6
object-group network DM_INLINE_NETWORK_19
network-object object DataCenter-Networks
network-object object Branch-Networks
object-group service DM_INLINE_SERVICE_2
service-object tcp-udp destination eq domain
service-object tcp destination eq smtp
object-group service DM_INLINE_SERVICE_3
service-object tcp-udp destination eq domain
service-object tcp destination eq www
service-object tcp destination eq https
object-group service DM_INLINE_SERVICE_4
service-object tcp-udp destination eq domain
service-object tcp destination eq smtp
object-group service DM_INLINE_SERVICE_5
service-object tcp-udp destination eq domain
service-object tcp destination eq www
service-object tcp destination eq https
object-group service DM_INLINE_SERVICE_6
service-object tcp-udp destination eq domain
service-object tcp destination eq smtp
object-group service DM_INLINE_SERVICE_7
service-object tcp-udp destination eq domain
service-object tcp destination eq smtp
object-group protocol TCPUDP
access-list Ironport-ESA_IN remark IPv6 Discovery-opperation
access-list Ironport-ESA_IN extended permit object-group ICMP-v6 any6 any6
access-list Ironport-ESA_IN remark Block traffic from DMZ to Internal networks
access-list Ironport-ESA_IN extended deny object-group DM_INLINE_SERVICE_7 object-group
DM_INLINE_NETWORK_18 object-group DM_INLINE_NETWORK_19
access-list Ironport-ESA_IN remark DNS lookup and Mail to Internet
access-list Ironport-ESA_IN extended permit object-group DM_INLINE_SERVICE_4 object-group
DM_INLINE_NETWORK_27 any
access-list Ironport-ESA_IN remark Network Time
access-list Ironport-ESA_IN extended permit udp object-group DM_INLINE_NETWORK_13
object-group NTP-PublicServers eq ntp
access-list Ironport-ESA_IN remark Logging
access-list Ironport-ESA_IN extended permit udp object ESA-IE-1.cisco-irn.com object
RSA-enVision.cisco-irn.com eq syslog
access-list Ironport-ESA_IN remark Authentication
access-list Ironport-ESA_IN extended permit udp object ESA-IE-1.cisco-irn.com object
tacacs.cisco-irn.com object-group DM_INLINE_UDP_1
access-list DMZ-WebServers_IN remark IPv6 Discovery-opperation
access-list DMZ-WebServers_IN extended permit object-group ICMP-v6 any6 any6
access-list DMZ-WebServers_IN remark Logging
access-list DMZ-WebServers_IN extended permit udp object DMZ-Networks object
RSA-enVision.cisco-irn.com eq syslog
access-list DMZ-WebServers_IN remark Authentication
access-list DMZ-WebServers_IN extended permit tcp object DMZ-Networks object
tacacs.cisco-irn.com eq tacacs
access-list DMZ-WebServers_IN remark Network Time
access-list DMZ-WebServers_IN extended permit udp object DMZ-Networks object-group
NTP-PublicServers eq ntp
access-list Ironport-ESMA_IN remark IPv6 Discovery-opperation
access-list Ironport-ESMA_IN extended permit object-group ICMP-v6 any6 any6
access-list Ironport-ESMA_IN remark Block traffic from DMZ to Internal networks
access-list Ironport-ESMA_IN extended deny object-group DM_INLINE_SERVICE_6 object-group
DM_INLINE_NETWORK_16 object-group DM_INLINE_NETWORK_17
access-list Ironport-ESMA_IN remark DNS Lookup and Mail relay
access-list Ironport-ESMA_IN extended permit object-group DM_INLINE_SERVICE_2 object-group
DM_INLINE_NETWORK_10 any
access-list Ironport-ESMA_IN remark Network Time
access-list Ironport-ESMA_IN extended permit udp object-group DM_INLINE_NETWORK_12
object-group NTP-PublicServers eq ntp
access-list Ironport-ESMA_IN remark Logging
access-list Ironport-ESMA_IN extended permit udp object ESMA-IE-1.cisco-irn.com object
RSA-enVision.cisco-irn.com eq syslog
access-list Ironport-ESMA_IN remark Authentication
access-list Ironport-ESMA_IN extended permit udp object ESMA-IE-1.cisco-irn.com object
tacacs.cisco-irn.com object-group DM_INLINE_UDP_2
access-list INSIDE remark Admin Access to DMZ
access-list INSIDE extended permit tcp object-group Admin-Systems object
InternetEdge-Networks object-group DM_INLINE_TCP_2
access-list INSIDE remark Manage DMZ Devices
access-list INSIDE extended permit udp object-group DM_INLINE_NETWORK_2 object
InternetEdge-Networks eq snmp
access-list INSIDE remark Network Time
access-list INSIDE extended permit udp object-group NTP-Servers object-group
NTP-PublicServers eq ntp
access-list INSIDE remark Allow Access to services for Ironport Apps
access-list INSIDE extended permit tcp object-group DM_INLINE_NETWORK_22 object-group
DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_3
access-list INSIDE remark Allow Secure traffic to DMZ
access-list INSIDE extended permit tcp object-group DM_INLINE_NETWORK_21 object DMZ-VIP-30
object-group DM_INLINE_TCP_4
access-list INSIDE remark - Block non-secure traffic to DMZ
access-list INSIDE extended deny ip any object InternetEdge-Networks log
access-list INSIDE remark Allow outbound services for Internet
access-list INSIDE extended permit icmp object-group DM_INLINE_NETWORK_23 any object-group
DM_INLINE_ICMP_1
access-list INSIDE remark General Internet Browsing
access-list INSIDE extended permit tcp object-group DM_INLINE_NETWORK_24 any object-group
DM_INLINE_TCP_5
access-list INSIDE remark DNS Services
access-list INSIDE extended permit object-group TCPUDP object ActiveDirectory any eq
domain
access-list INSIDE remark Drop and Log all other traffic - END-OF-LINE
access-list INSIDE extended deny ip any any log
access-list OUTSIDE remark IPv6 Discovery-opperation
access-list OUTSIDE extended permit object-group ICMP-v6 any6 any6
access-list OUTSIDE remark Allow traffic to DMZ e-commerce Server
access-list OUTSIDE extended permit object-group DM_INLINE_SERVICE_1 any object-group
DM_INLINE_NETWORK_4
access-list OUTSIDE remark Mail to Ironport
access-list OUTSIDE extended permit tcp any object-group DM_INLINE_NETWORK_20 eq smtp
access-list OUTSIDE remark Remote Access SSL VPN
access-list OUTSIDE extended permit tcp any object-group DM_INLINE_NETWORK_5 eq https
access-list OUTSIDE remark Allow traffic from edge routers - RIE-1
access-list OUTSIDE extended permit udp object-group DM_INLINE_NETWORK_25 object
RSA-enVision.cisco-irn.com eq syslog
access-list OUTSIDE remark Allow traffic from edge routers - RIE-1
access-list OUTSIDE extended permit tcp object-group DM_INLINE_NETWORK_26 object
tacacs.cisco-irn.com eq tacacs
access-list OUTSIDE remark ====LAB ACCESS to TEST===REMOVE===
access-list OUTSIDE extended permit icmp object-group DM_INLINE_NETWORK_9 object-group
DM_INLINE_NETWORK_7
access-list OUTSIDE remark ====LAB ACCESS TO TEST===REMOVE====
access-list OUTSIDE extended permit tcp object-group DM_INLINE_NETWORK_8 object-group
DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_1
access-list OUTSIDE remark Drop all other traffic
access-list OUTSIDE extended deny ip any any log
access-list Ironport-WSA_IN remark IPv6 Discovery-opperation
access-list Ironport-WSA_IN extended permit object-group ICMP-v6 any6 any6
access-list Ironport-WSA_IN remark Block traffic from DMZ to Internal networks
access-list Ironport-WSA_IN extended deny object-group DM_INLINE_SERVICE_5 object-group
DM_INLINE_NETWORK_14 object-group DM_INLINE_NETWORK_15
access-list Ironport-WSA_IN remark DNS Lookup, Web Surfing
access-list Ironport-WSA_IN extended permit object-group DM_INLINE_SERVICE_3 object-group
DM_INLINE_NETWORK_11 any
access-list Ironport-WSA_IN remark Network Time
access-list Ironport-WSA_IN extended permit udp object-group DM_INLINE_NETWORK_1
object-group NTP-PublicServers eq ntp
access-list Ironport-WSA_IN remark Logging
access-list Ironport-WSA_IN extended permit udp object WSA-IE-1.cisco-irn.com object
RSA-enVision.cisco-irn.com eq syslog
access-list Ironport-WSA_IN remark Authentication
access-list Ironport-WSA_IN extended permit udp object WSA-IE-1.cisco-irn.com object
tacacs.cisco-irn.com object-group DM_INLINE_UDP_3
logging buffer-size 1048576
logging asdm-buffer-size 512
logging asdm informational
logging host inside 192.168.42.124
mtu EmailSecurityAppliance 1500
mtu EmailSecurityMgrAppliance 1500
mtu WebSecurityAppliance 1500
failover lan unit primary
failover lan interface failover Vlan91
failover link statelink Vlan92
failover interface ip failover 192.168.20.13 255.255.255.252 standby 192.168.20.14
failover interface ip statelink 192.168.20.33 255.255.255.252 standby 192.168.20.34
icmp unreachable rate-limit 1 burst-size 1
icmp permit any EmailSecurityAppliance
icmp permit any EmailSecurityMgrAppliance
icmp permit any WebSecurityAppliance
asdm image disk0:/asdm-711.bin
no arp permit-nonconnected
access-group INSIDE in interface inside
access-group OUTSIDE in interface outside
access-group DMZ-WebServers_IN in interface DMZ
access-group Ironport-ESA_IN in interface EmailSecurityAppliance
access-group Ironport-ESMA_IN in interface EmailSecurityMgrAppliance
access-group Ironport-WSA_IN in interface WebSecurityAppliance
ipv6 route DMZ 2001:db8:192:20a1::/64 2001:db8:192:20a4::28
ipv6 route outside ::/0 2001:db8:192:22::10
route outside 0.0.0.0 0.0.0.0 192.168.22.10 1
route inside 10.10.0.0 255.255.0.0 192.168.21.1 1
route outside 10.10.0.0 255.255.255.0 192.168.22.10 1
route outside 10.10.3.0 255.255.255.0 192.168.22.11 1
route outside 10.10.4.0 255.255.255.0 192.168.22.12 1
route inside 192.168.0.0 255.255.0.0 192.168.21.1 1
route DMZ 192.168.20.0 255.255.255.248 192.168.20.28 1
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server COMPLIANCE protocol tacacs+
reactivation-mode depletion deadtime 15
aaa-server COMPLIANCE (inside) host 192.168.42.131
user-identity default-domain LOCAL
aaa authentication enable console COMPLIANCE LOCAL
aaa authentication http console COMPLIANCE LOCAL
aaa authentication ssh console COMPLIANCE LOCAL
aaa authentication serial console COMPLIANCE LOCAL
aaa authorization command COMPLIANCE LOCAL
aaa accounting enable console COMPLIANCE
aaa accounting serial console COMPLIANCE
aaa accounting ssh console COMPLIANCE
aaa accounting command privilege 15 COMPLIANCE
aaa authentication secure-http-client
aaa local authentication attempts max-fail 6
aaa authorization exec authentication-server
http server idle-timeout 15
http server session-timeout 15
http 192.168.41.101 255.255.255.255 inside
http 192.168.41.102 255.255.255.255 inside
http 192.168.42.122 255.255.255.255 inside
http 192.168.42.124 255.255.255.255 inside
http 192.168.42.133 255.255.255.255 inside
http 192.168.42.138 255.255.255.255 inside
http 192.168.42.139 255.255.255.255 inside
snmp-server group Authentication&Encryption v3 priv
snmp-server user ciscolms Authentication&Encryption v3 encrypted auth sha
22:c2:d0:4d:34:22:54:cd:e7:15:55:63:70:0e:b9:49:c6:09:75:17 priv aes 256
22:c2:d0:4d:34:22:54:cd:e7:15:55:63:70:0e:b9:49:c6:09:75:17:14:95:f7:2f:f8:6a:ee:62:d6:03:
7f:db
snmp-server user csmadmin Authentication&Encryption v3 encrypted auth sha
22:c2:d0:4d:34:22:54:cd:e7:15:55:63:70:0e:b9:49:c6:09:75:17 priv aes 256
22:c2:d0:4d:34:22:54:cd:e7:15:55:63:70:0e:b9:49:c6:09:75:17:14:95:f7:2f:f8:6a:ee:62:d6:03:
7f:db
snmp-server host inside 192.168.42.134 version 3 ciscolms
snmp-server host inside 192.168.42.139 version 3 ciscolms
snmp-server host inside 192.168.42.133 version 3 csmadmin
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
ssh 192.168.41.101 255.255.255.255 inside
ssh 192.168.41.102 255.255.255.255 inside
ssh 192.168.42.122 255.255.255.255 inside
ssh 192.168.42.124 255.255.255.255 inside
ssh 192.168.42.133 255.255.255.255 inside
ssh 192.168.42.138 255.255.255.255 inside
ssh 192.168.42.139 255.255.255.255 inside
tls-proxy maximum-session 1000
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl encryption aes256-sha1 aes128-sha1 3des-sha1
username csmadmin password 9CmOJ.jq4D54PXDW encrypted privilege 15
username retail password XgJyMnijuEPQSGoY encrypted privilege 15
username bmcgloth password gITSY3iZ3UnCQoKf encrypted privilege 15
class-map inspection_default
match default-inspection-traffic
service-policy global_policy global
no call-home reporting anonymous
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly 8
subscribe-to-alert-group configuration periodic monthly 8
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:3461835c1b952f647c39ea90dc41d8b4
DMZ-ACE-1
Generating configuration....
logging device-id context-name
logging host 192.168.42.124 udp/514
logging rate-limit 1 120 message 302027
boot system image:c6ace-t1k9-mz.A5_1_2.bin
limit-resource all minimum 0.00 maximum unlimited
limit-resource conc-connections minimum 10.00 maximum unlimited
limit-resource sticky minimum 10.00 maximum unlimited
tacacs-server host 192.168.42.131 key 7 "uaxfalkha"
aaa group server tacacs+ COMPLIANCE
clock timezone standard PST
clock summer-time standard PDT
aaa authentication login default group COMPLIANCE local
aaa authentication login console group COMPLIANCE local
aaa accounting default group COMPLIANCE local
class-map type management match-any remote-mgmt
9 match protocol ssh source-address 192.168.41.102 255.255.255.255
10 match protocol ssh source-address 192.168.42.131 255.255.255.255
30 match protocol icmp any
32 match protocol ssh source-address 192.168.41.101 255.255.255.255
33 match protocol ssh source-address 192.168.42.111 255.255.255.255
34 match protocol ssh source-address 192.168.42.122 255.255.255.255
35 match protocol ssh source-address 192.168.42.124 255.255.255.255
36 match protocol ssh source-address 192.168.42.133 255.255.255.255
37 match protocol ssh source-address 192.168.42.138 255.255.255.255
policy-map type management first-match remote-access
ip address 192.168.21.95 255.255.255.0
service-policy input remote-access
ip address 192.168.20.9 255.255.255.252
peer ip address 192.168.20.10 255.255.255.252
ip route 0.0.0.0 0.0.0.0 192.168.21.1
allocate-interface vlan 82-83
allocate-interface vlan 95
username admin password 5 $1$nCzsvkY0$QKCSN2jtbE8nsgxxeHMKe1 role Admin domain
default-domain
username www password 5 $1$.4drq4sB$qBpfZsTgtJufI865poqTr1 role Admin domain
default-domain
username csmadmin password 5 $1$1VYOv92B$VMTmZoUY0NNcYV1paA1eo0 role Admin domain
default-domain cisco-irn.com
username bmcgloth password 5 $1$IVI7Dovp$tGZ11k6CUpxTAfuI.pAax/ role Admin domain
default-domain cisco-irn.com
username lmsadmin password 5 $1$vnpXp4FR$KrnWUl8lwQYbyxmcKOGc5. role Admin domain
default-domain cisco-irn.com
DMZ-ACE-1_PCI
Generating configuration....
logging device-id context-name
logging host 192.168.42.124 udp/514
logging rate-limit 1 120 message 302027
tacacs-server host 192.168.42.131 key 7 "uaxfalkha"
aaa group server tacacs+ COMPLIANCE
aaa authentication login default group COMPLIANCE local
aaa authentication login console group COMPLIANCE local
aaa accounting default group COMPLIANCE local
access-list in2out line 10 extended permit ip host 192.168.20.2 any
access-list in2out line 12 extended permit ip host 192.168.20.1 any
access-list in2out line 15 extended deny ip any any
access-list out2in line 10 extended permit tcp any host 192.168.20.1 eq ssh
access-list out2in line 11 extended permit tcp any host 192.168.20.2 eq ssh
access-list out2in line 12 extended permit tcp any host 192.168.20.1 eq https
access-list out2in line 13 extended permit tcp any host 192.168.20.2 eq https
access-list out2in line 14 extended permit icmp any host 192.168.20.1
access-list out2in line 15 extended permit icmp any host 192.168.20.2
access-list out2in line 16 extended deny ip any any
access-list out2in_ipv6 line 8 extended permit icmpv6 anyv6 host 2001:db8:192:20a1::1
access-list out2in_ipv6 line 16 extended permit tcp anyv6 host 2001:db8:192:20a1::1 eq ssh
access-list out2in_ipv6 line 24 extended permit tcp anyv6 host 2001:db8:192:20a1::1 eq
https
class-map match-any ECOMVIP
5 match virtual-address 2001:db8:192:20a1::1 tcp eq 22
6 match virtual-address 2001:db8:192:20a1::1 tcp eq https
class-map match-any ECOMVIP_v4
3 match virtual-address 192.168.20.1 tcp eq 22
4 match virtual-address 192.168.20.1 tcp eq https
class-map type management match-any MANAGEMENT
7 match protocol icmp any
8 match protocol ssh source-address 192.168.41.101 255.255.255.255
9 match protocol ssh source-address 192.168.41.102 255.255.255.255
10 match protocol ssh source-address 192.168.42.111 255.255.255.255
11 match protocol ssh source-address 192.168.42.122 255.255.255.255
12 match protocol ssh source-address 192.168.42.124 255.255.255.255
13 match protocol ssh source-address 192.168.42.131 255.255.255.255
14 match protocol ssh source-address 192.168.42.133 255.255.255.255
15 match protocol ssh source-address 192.168.42.138 255.255.255.255
16 match protocol ssh source-address 192.168.42.139 255.255.255.255
class-map type management match-all V6-MGMT
2 match protocol icmpv6 anyv6
policy-map type management first-match MGMT
policy-map type loadbalance first-match ECOMPOLICY
nat dynamic 2 vlan 83 serverfarm primary
insert-http x-forward-for header-value "%is"
policy-map type loadbalance first-match ECOMPOLICY_v4
policy-map multi-match ECOM_MATCH
loadbalance vip inservice
loadbalance policy ECOMPOLICY
loadbalance vip icmp-reply active
loadbalance vip inservice
loadbalance policy ECOMPOLICY_v4
loadbalance vip icmp-reply active
ip address 2001:db8:192:20a4::28/64
ip address 192.168.20.28 255.255.255.248
alias 192.168.20.30 255.255.255.248
peer ip address 192.168.20.29 255.255.255.248
access-group input out2in
access-group input out2in_ipv6
service-policy input ECOM_MATCH
service-policy input MGMT
ip address 192.168.20.4 255.255.255.248
alias 192.168.20.6 255.255.255.248
peer ip address 192.168.20.5 255.255.255.248
access-group input in2out
nat-pool 2 192.168.20.3 192.168.20.3 netmask 255.255.255.248
ip route 0.0.0.0 0.0.0.0 192.168.20.25
ip route ::/0 2001:db8:192:20a4::25
username csmadmin password 5 $1$1VYOv92B$VMTmZoUY0NNcYV1paA1eo0 role Admin domain
default-domain cisco-irn.com
username bmcgloth password 5 $1$IVI7Dovp$tGZ11k6CUpxTAfuI.pAax/ role Admin domain
default-domain cisco-irn.com
username lmsadmin password 5 $1$vnpXp4FR$KrnWUl8lwQYbyxmcKOGc5. role Admin domain
default-domain cisco-irn.com
RIE-3
Building configuration...
Current configuration : 14480 bytes
! Last configuration change at 08:57:09 PST Thu Dec 6 2012 by bmcgloth
! NVRAM config last updated at 08:57:11 PST Thu Dec 6 2012 by bmcgloth
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
service counters max age 5
boot system flash disk0:/s72033-adventerprisek9-mz.151-1.SY.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
enable password 7 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
svclc multiple-vlan-interfaces
svclc module 3 vlan-group 21,82,83,85
firewall multiple-vlan-interfaces
firewall module 7 vlan-group 21,82,200,300
firewall vlan-group 200 22,2305-2307
firewall vlan-group 300 91,92
intrusion-detection module 2 management-port access-vlan 21
intrusion-detection module 2 data-port 1 trunk allowed-vlan 21,83,84,421
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
ipv6 multicast rpf use-bgp
no mls acl tcam share-global
mls cef error action freeze
crypto pki trustpoint TP-self-signed-1014
subject-name cn=IOS-Self-Signed-Certificate-1014
rsakeypair TP-self-signed-1014
crypto pki certificate chain TP-self-signed-1014
certificate self-signed 01
3082023F 308201A8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
2B312930 27060355 04031320 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31303134 301E170D 31313032 31323030 35393332 5A170D32
30303130 31303030 3030305A 302B3129 30270603 55040313 20494F53 2D53656C
662D5369 676E6564 2D436572 74696669 63617465 2D313031 3430819F 300D0609
2A864886 F70D0101 01050003 818D0030 81890281 8100BD3E 21BA6626 B7F82E4E
6B794439 27C36926 27B198DA D92E879D A437284D 4076D650 F671EA49 CC7A9DA4
BC96B207 7807450D A55F5A9B 85CACE8E E9B85199 B84525E5 FBC82F1D 733A1942
C47E1F87 87E1026B CD22859C 52307096 B3A6EEEB BCCB3C20 7F39EBCF 6729C4FC
A13306CF 90815A20 CFA00678 E0856486 3BC8BB88 D51D0203 010001A3 73307130
0F060355 1D130101 FF040530 030101FF 301E0603 551D1104 17301582 13524945
2D332E63 6973636F 2D69726E 2E636F6D 301F0603 551D2304 18301680 14E7FF36
6947643E 752F921F 7674D7DE F1370E50 C6301D06 03551D0E 04160414 E7FF3669
47643E75 2F921F76 74D7DEF1 370E50C6 300D0609 2A864886 F70D0101 04050003
81810080 3C7C2250 36EB62DD 12772E91 E3A2CB7D 3D175E31 611404A1 947D97EA
37E4A5B5 8E888072 B765C977 08C0108C 34FD4AE5 D642F10D 839BE779 F6F2E03F
581EC8E1 012FA710 583A0E9E B97CCFC0 16AB39CE B8E7A5AB E42C38EB 33CD9F4C
1D9D5666 1EF8DC52 22C084B1 1C33DB38 0C9E2045 6EBD8BCD B779B172 0B5BE8F5 E5D9DB
diagnostic bootup level minimal
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
vlan access-log ratelimit 2000
name asasm_Loadbalance_top
name asasm_EmailSecurityAppliance
name asasm_EmailSecurityMgrAppliance
crypto isakmp key <removed> address 128.107.147.109
crypto ipsec transform-set to_fred esp-des esp-md5-hmac
crypto map myvpn 10 ipsec-isakmp
set transform-set to_fred
switchport trunk encapsulation dot1q
ip address 172.26.0.1 255.255.255.0
tunnel destination 128.107.147.109
interface GigabitEthernet1/1
switchport access vlan 22
interface GigabitEthernet1/2
switchport access vlan 22
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface GigabitEthernet1/5
switchport access vlan 21
interface GigabitEthernet1/6
interface GigabitEthernet1/7
interface GigabitEthernet1/8
interface GigabitEthernet1/9
interface GigabitEthernet1/10
interface GigabitEthernet1/11
interface GigabitEthernet1/12
interface GigabitEthernet1/13
description ESA-IE-1 port M
switchport access vlan 2306
spanning-tree portfast edge
interface GigabitEthernet1/14
description ESA-IE-1 port D1
switchport access vlan 2306
spanning-tree portfast edge
interface GigabitEthernet1/15
description ESA-IE-1 port D2
switchport access vlan 2306
spanning-tree portfast edge
interface GigabitEthernet1/16
description ESA-IE-1 port D3
switchport access vlan 2306
spanning-tree portfast edge
interface GigabitEthernet1/17
description WSA-IE-1 port P1
interface GigabitEthernet1/18
description WSA-IE-1 port P2
interface GigabitEthernet1/19
description WSA-IE-1 port T1
interface GigabitEthernet1/20
description WSA-IE-1 port T2
interface GigabitEthernet1/21
description ESA-IE-1 port M
switchport access vlan 2305
spanning-tree portfast edge
interface GigabitEthernet1/22
description ESA-IE-1 port D1
switchport access vlan 2305
spanning-tree portfast edge
interface GigabitEthernet1/23
description ESA-IE-1 port D2
switchport access vlan 2305
spanning-tree portfast edge
interface GigabitEthernet1/24
description ESA-IE-1 port D3
switchport access vlan 2305
spanning-tree portfast edge
interface GigabitEthernet1/25
description WSA-IE-1 port M
switchport access vlan 2307
spanning-tree portfast edge
interface GigabitEthernet1/26
interface GigabitEthernet1/27
interface GigabitEthernet1/28
interface GigabitEthernet1/29
interface GigabitEthernet1/30
interface GigabitEthernet1/31
interface GigabitEthernet1/32
interface GigabitEthernet1/33
interface GigabitEthernet1/34
interface GigabitEthernet1/35
interface GigabitEthernet1/36
interface GigabitEthernet1/37
interface GigabitEthernet1/38
interface GigabitEthernet1/39
interface GigabitEthernet1/40
interface GigabitEthernet1/41
interface GigabitEthernet1/42
interface GigabitEthernet1/43
interface GigabitEthernet1/44
interface GigabitEthernet1/45
interface GigabitEthernet1/46
interface GigabitEthernet1/47
description UPLINK from SIE-1
switchport trunk encapsulation dot1q
interface GigabitEthernet1/48
description UPLINK from SIE-2
switchport trunk encapsulation dot1q
interface GigabitEthernet5/1
switchport trunk encapsulation dot1q
channel-group 99 mode active
interface GigabitEthernet5/2
switchport trunk encapsulation dot1q
channel-group 99 mode active
description RIE-3 Management
ip address 192.168.21.91 255.255.255.0
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha rc4-128-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 192.168.21.10
ip route 10.10.0.0 255.255.0.0 192.168.21.1
ip route 10.10.0.0 255.255.252.0 192.168.21.10
ip route 10.10.192.0 255.255.240.0 172.26.0.2
ip route 192.168.0.0 255.255.0.0 192.168.21.1
ip route 192.168.23.0 255.255.255.0 192.168.21.10
ip tacacs source-interface Vlan21
logging source-interface Vlan21
logging host 192.168.42.124
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 192.168.42.139 log
access-list 23 permit 10.19.151.104 log
access-list 23 permit 10.19.151.102 log
access-list 23 permit 10.19.151.103 log
access-list 23 permit 10.19.151.100 log
access-list 23 permit 10.19.151.101 log
access-list 23 permit 10.19.151.98 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.122 log
access-list 88 deny any log
access-list 101 permit gre host 192.168.21.91 host 128.107.147.109
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 23
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps hsrp
snmp-server enable traps mac-notification move threshold change
snmp-server enable traps ipsla
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 <removed>
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
Branch
Large Branch
R-A2-LRG-1
! Last configuration change at 00:54:49 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 00:54:49 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash0 c3900-universalk9-mz.SPA.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-72006796
subject-name cn=IOS-Self-Signed-Certificate-72006796
crypto pki certificate chain TP-self-signed-72006796
certificate self-signed 03
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip port-map user-8443 port tcp 8443
ip ips config location flash0: retries 1 timeout 1
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect global
parameter-map type inspect Inspect-1
parameter-map type trend-global trend-glob-map
license udi pid C3900-SPE150/K9 sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_81604380995
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_81604381001
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_81604381037
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_81604381039
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_81604381045
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_81604381049
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381059
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381067
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381071
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381150
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_81604381152
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_81604380993
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_81604381021
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381023
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381041
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381043
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_81604381047
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_81604381051
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381150
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_src_rule_81604381152
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group service CSM_INLINE_svc_rule_81604380993
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604380995
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381001
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_81604381003
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_81604381005
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_81604381009
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_81604381011
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service HTTPS-8443
object-group service CSM_INLINE_svc_rule_81604381013
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381015
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_81604381017
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381019
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_81604381021
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381023
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381025
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381027
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381029
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_81604381035
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_81604381037
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381039
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381041
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_81604381043
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_81604381045
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_81604381051
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381053
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381055
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381057
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381059
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381061
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381063
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_81604381065
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network STORE-POS
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
ip ssh authentication-retries 2
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_37
match access-group name CSM_ZBF_CMAP_ACL_37
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_38
match access-group name CSM_ZBF_CMAP_ACL_38
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map BRANCH-LAN-EDGE-OUT
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_25
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_36
class type inspect CSM_ZBF_CLASS_MAP_37
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_24
policy-map type inspect CSM_ZBF_POLICY_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_38
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_15
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_23
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_31
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_30
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
description Store WAN Link
description Bridge link between routers
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_S_R-2-R-LOOPBACK_1 source S_R-2-R destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_R-2-R-S_MGMT_1 source S_R-2-R destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_R-2-R-S_Security_1 source S_R-2-R destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_R-2-R-S_WAAS_1 source S_R-2-R destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_R-2-R-S_WLC-AP_1 source S_R-2-R destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_R-2-R-self_1 source S_R-2-R destination self
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_S_R-2-R-S_Data_1 source S_R-2-R destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Data-W_1 source S_R-2-R destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Guest_1 source S_R-2-R destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_R-2-R-S_Partners_1 source S_R-2-R destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_POS_1 source S_R-2-R destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_POS-W_1 source S_R-2-R destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_Voice_1 source S_R-2-R destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_self-S_R-2-R_1 source self destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_R-2-R_1 source LOOPBACK destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_R-2-R_1 source S_MGMT destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_R-2-R_1 source S_Security destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_R-2-R_1 source S_WAAS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_R-2-R_1 source S_WLC-AP destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-S_R-2-R_1 source S_POS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_R-2-R_1 source S_POS-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_22
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-S_R-2-R_1 source S_Data destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_R-2-R_1 source S_Data-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Guest-S_R-2-R_1 source S_Guest destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Partners-S_R-2-R_1 source S_Partners destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_26
zone-pair security CSM_S_Voice-S_R-2-R_1 source S_Voice destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_27
ip address 10.10.110.1 255.255.255.255
zone-member security LOOPBACK
interface GigabitEthernet0/0
description ROUTER LINK TO SWITCH
interface GigabitEthernet0/0.11
ip address 10.10.96.2 255.255.255.0
ip helper-address 192.168.42.130
ip helper-address 192.168.42.111
zone-member security S_POS
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.12
ip address 10.10.97.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.13
ip address 10.10.98.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.14
ip address 10.10.99.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.15
ip address 10.10.100.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.100.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.16
ip address 10.10.101.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.101.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.17
description WIRELESS-GUEST
ip address 10.10.102.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.102.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.18
description WIRELESS-CONTROL
ip address 10.10.103.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.103.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.19
ip address 10.10.104.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.104.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.20
description SECURITY-SYSTEMS
ip address 10.10.105.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Security
standby 20 ip 10.10.105.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.102
description ROUTER LINK TO
ip address 10.10.110.29 255.255.255.252
zone-member security S_R-2-R
service-policy input BRANCH-LAN-EDGE-IN
interface GigabitEthernet0/0.1000
ip address 10.10.111.2 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.111.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1
interface GigabitEthernet0/1.101
description ROUTER LINK TO
ip address 10.10.110.25 255.255.255.252
zone-member security S_R-2-R
service-policy input BRANCH-LAN-EDGE-IN
interface GigabitEthernet0/2
ip address 10.10.255.96 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
redistribute connected subnets
passive-interface default
no passive-interface GigabitEthernet0/0.102
no passive-interface GigabitEthernet0/1.101
network 10.10.0.0 0.0.255.255 area 10
default-information originate
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.255.11
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_81604380993 object-group
CSM_INLINE_src_rule_81604380993 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381011 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381015 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381019 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381021 object-group
CSM_INLINE_src_rule_81604381021 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_81604381057 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
permit ospf object-group CSM_INLINE_src_rule_81604381150 object-group
CSM_INLINE_dst_rule_81604381150
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_81604381055 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_15
permit ospf object-group CSM_INLINE_src_rule_81604381152 object-group
CSM_INLINE_dst_rule_81604381152
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_81604380995 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604380995
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_81604381001 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381001
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_19
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_81604381035 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381039 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381039
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_81604381005 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_22
permit object-group CSM_INLINE_svc_rule_81604381037 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381037
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381049
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_81604381053 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_81604381045 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381045
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381009 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381013 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381017 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381023 object-group
CSM_INLINE_src_rule_81604381023 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381025 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381027 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381041 object-group
CSM_INLINE_src_rule_81604381041 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_81604381029 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381061 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381063 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_81604381065 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381071
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381067
ip access-list extended CSM_ZBF_CMAP_ACL_37
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_38
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_81604381059 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381059
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_81604381003 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_81604381047 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_81604381051 object-group
CSM_INLINE_src_rule_81604381051 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_81604381043 object-group
CSM_INLINE_src_rule_81604381043 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps flash insertion removal
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps ipsla
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
R-A2-LRG-2
! Last configuration change at 00:59:26 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 01:00:56 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash0 c3900-universalk9-mz.SPA.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-660084654
subject-name cn=IOS-Self-Signed-Certificate-660084654
rsakeypair TP-self-signed-660084654
crypto pki certificate chain TP-self-signed-660084654
certificate self-signed 01
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip port-map user-8443 port tcp 8443
ip ips config location flash0: retries 1 timeout 1
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect global
parameter-map type inspect Inspect-1
parameter-map type trend-global trend-glob-map
license udi pid C3900-SPE150/K9 sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_81604380995
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_81604381001
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_81604381037
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_81604381039
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_81604381045
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_81604381049
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381059
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381067
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381071
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381150
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_81604381152
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_81604380993
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_81604381021
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381023
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381041
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381043
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_81604381047
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_81604381051
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381150
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_src_rule_81604381152
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group service CSM_INLINE_svc_rule_81604380993
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604380995
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381001
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_81604381003
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_81604381005
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_81604381009
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_81604381011
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service HTTPS-8443
object-group service CSM_INLINE_svc_rule_81604381013
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381015
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_81604381017
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381019
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_81604381021
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381023
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381025
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381027
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381029
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_81604381035
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_81604381037
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381039
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381041
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_81604381043
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_81604381045
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_81604381051
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381053
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381055
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381057
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381059
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381061
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381063
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_81604381065
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network STORE-POS
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
ip ssh authentication-retries 2
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_37
match access-group name CSM_ZBF_CMAP_ACL_37
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_38
match access-group name CSM_ZBF_CMAP_ACL_38
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map BRANCH-LAN-EDGE-OUT
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_25
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_36
class type inspect CSM_ZBF_CLASS_MAP_37
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_24
policy-map type inspect CSM_ZBF_POLICY_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_38
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_15
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_23
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_31
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_30
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
description Store WAN Link
description Bridge link between routers
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_S_R-2-R-LOOPBACK_1 source S_R-2-R destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_R-2-R-S_MGMT_1 source S_R-2-R destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_R-2-R-S_Security_1 source S_R-2-R destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_R-2-R-S_WAAS_1 source S_R-2-R destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_R-2-R-S_WLC-AP_1 source S_R-2-R destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_R-2-R-self_1 source S_R-2-R destination self
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_S_R-2-R-S_Data_1 source S_R-2-R destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Data-W_1 source S_R-2-R destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Guest_1 source S_R-2-R destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_R-2-R-S_Partners_1 source S_R-2-R destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_POS_1 source S_R-2-R destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_POS-W_1 source S_R-2-R destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_Voice_1 source S_R-2-R destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_self-S_R-2-R_1 source self destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_R-2-R_1 source LOOPBACK destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_R-2-R_1 source S_MGMT destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_R-2-R_1 source S_Security destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_R-2-R_1 source S_WAAS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_R-2-R_1 source S_WLC-AP destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-S_R-2-R_1 source S_POS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_R-2-R_1 source S_POS-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_22
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-S_R-2-R_1 source S_Data destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_R-2-R_1 source S_Data-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Guest-S_R-2-R_1 source S_Guest destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Partners-S_R-2-R_1 source S_Partners destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_26
zone-pair security CSM_S_Voice-S_R-2-R_1 source S_Voice destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_27
ip address 10.10.110.2 255.255.255.255
zone-member security LOOPBACK
interface GigabitEthernet0/0
interface GigabitEthernet0/0.102
description ROUTER LINK TO
ip address 10.10.110.30 255.255.255.252
zone-member security S_R-2-R
interface GigabitEthernet0/1
description ROUTER LINK TO SWITCH
interface GigabitEthernet0/1.11
ip address 10.10.96.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.12
ip address 10.10.97.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.13
ip address 10.10.98.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.14
ip address 10.10.99.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.15
ip address 10.10.100.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.100.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.16
ip address 10.10.101.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.101.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.17
description WIRELESS-GUEST
ip address 10.10.102.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.102.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.18
description WIRELESS-CONTROL
ip address 10.10.103.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.103.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.19
ip address 10.10.104.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.104.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.20
description SECURITY-SYSTEMS
ip address 10.10.105.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Security
standby 20 ip 10.10.105.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.101
description ROUTER LINK TO
ip address 10.10.110.26 255.255.255.252
zone-member security S_R-2-R
interface GigabitEthernet0/1.1000
ip address 10.10.111.3 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.111.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/2
ip address 10.10.254.96 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
redistribute connected subnets
passive-interface default
no passive-interface GigabitEthernet0/0.102
no passive-interface GigabitEthernet0/1.101
network 10.10.0.0 0.0.255.255 area 10
default-information originate
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.254.11
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_81604380993 object-group
CSM_INLINE_src_rule_81604380993 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381011 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381015 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381019 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381021 object-group
CSM_INLINE_src_rule_81604381021 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_81604381057 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
permit ospf object-group CSM_INLINE_src_rule_81604381150 object-group
CSM_INLINE_dst_rule_81604381150
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_81604381055 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_15
permit ospf object-group CSM_INLINE_src_rule_81604381152 object-group
CSM_INLINE_dst_rule_81604381152
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_81604380995 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604380995
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_81604381001 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381001
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_19
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_81604381035 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381039 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381039
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_81604381005 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_22
permit object-group CSM_INLINE_svc_rule_81604381037 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381037
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381049
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_81604381053 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_81604381045 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381045
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381009 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381013 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381017 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381023 object-group
CSM_INLINE_src_rule_81604381023 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381025 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381027 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381041 object-group
CSM_INLINE_src_rule_81604381041 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_81604381029 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381061 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381063 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_81604381065 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381071
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381067
ip access-list extended CSM_ZBF_CMAP_ACL_37
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_38
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_81604381059 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381059
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_81604381003 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_81604381047 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_81604381051 object-group
CSM_INLINE_src_rule_81604381051 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_81604381043 object-group
CSM_INLINE_src_rule_81604381043 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps flash insertion removal
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps ipsla
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
S-A2-LRG-1
Building configuration...
Current configuration : 21232 bytes
! Last configuration change at 02:39:20 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:39:22 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash bootflash:cat4500e-universalk9.SPA.03.01.00.SG.150-1.XO.bin
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint CISCO_IDEVID_SUDI
rsakeypair CISCO_IDEVID_SUDI
crypto pki trustpoint CISCO_IDEVID_SUDI0
crypto pki trustpoint TP-self-signed-145264
subject-name cn=IOS-Self-Signed-Certificate-145264
rsakeypair TP-self-signed-145264
crypto pki certificate chain CISCO_IDEVID_SUDI
certificate 686CBFDE00000015EFB1
certificate ca 6A6967B3000000000003
crypto pki certificate chain CISCO_IDEVID_SUDI0
certificate ca 5FF87B282B54DC8D42A315B568C9ADFF
crypto pki certificate chain TP-self-signed-145264
certificate self-signed 01
power redundancy-mode redundant
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
ip vrf forwarding Mgmt-vrf
interface TenGigabitEthernet3/1
interface TenGigabitEthernet3/2
interface TenGigabitEthernet3/3
interface TenGigabitEthernet3/4
interface GigabitEthernet5/1
interface GigabitEthernet5/2
interface GigabitEthernet5/3
interface GigabitEthernet5/4
interface GigabitEthernet5/5
interface GigabitEthernet5/6
interface GigabitEthernet5/7
interface GigabitEthernet5/8
interface GigabitEthernet5/9
interface GigabitEthernet5/10
interface GigabitEthernet5/11
interface GigabitEthernet5/12
interface GigabitEthernet5/13
interface GigabitEthernet5/14
interface GigabitEthernet5/15
interface GigabitEthernet5/16
interface GigabitEthernet5/17
interface GigabitEthernet5/18
interface GigabitEthernet5/19
interface GigabitEthernet5/20
interface GigabitEthernet5/21
interface GigabitEthernet5/22
interface GigabitEthernet5/23
interface GigabitEthernet5/24
interface GigabitEthernet5/25
interface GigabitEthernet5/26
interface GigabitEthernet5/27
interface GigabitEthernet5/28
interface GigabitEthernet5/29
interface GigabitEthernet5/30
interface GigabitEthernet5/31
interface GigabitEthernet5/32
interface GigabitEthernet5/33
interface GigabitEthernet5/34
interface GigabitEthernet5/35
interface GigabitEthernet5/36
interface GigabitEthernet5/37
interface GigabitEthernet5/38
interface GigabitEthernet5/39
interface GigabitEthernet5/40
interface GigabitEthernet5/41
interface GigabitEthernet5/42
interface GigabitEthernet5/43
interface GigabitEthernet5/44
interface GigabitEthernet5/45
interface GigabitEthernet5/46
interface GigabitEthernet5/47
interface GigabitEthernet5/48
interface GigabitEthernet6/1
interface GigabitEthernet6/2
interface GigabitEthernet6/3
interface GigabitEthernet6/4
interface GigabitEthernet6/5
interface GigabitEthernet6/6
interface GigabitEthernet6/7
interface GigabitEthernet6/8
interface GigabitEthernet6/9
interface GigabitEthernet6/10
switchport access vlan 20
interface GigabitEthernet6/11
interface GigabitEthernet6/12
interface GigabitEthernet6/13
interface GigabitEthernet6/14
interface GigabitEthernet6/15
interface GigabitEthernet6/16
interface GigabitEthernet6/17
description WLC-A2-LRG-1_G1
switchport access vlan 18
interface GigabitEthernet6/18
description WLC-A2-LRG-1_G2
switchport trunk allowed vlan 14-17
interface GigabitEthernet6/19
interface GigabitEthernet6/20
interface GigabitEthernet6/21
interface GigabitEthernet6/22
interface GigabitEthernet6/23
interface GigabitEthernet6/24
interface GigabitEthernet6/25
interface GigabitEthernet6/26
interface GigabitEthernet6/27
interface GigabitEthernet6/28
interface GigabitEthernet6/29
interface GigabitEthernet6/30
interface GigabitEthernet6/31
interface GigabitEthernet6/32
interface GigabitEthernet6/33
interface GigabitEthernet6/34
interface GigabitEthernet6/35
interface GigabitEthernet6/36
interface GigabitEthernet6/37
interface GigabitEthernet6/38
interface GigabitEthernet6/39
interface GigabitEthernet6/40
interface GigabitEthernet6/41
interface GigabitEthernet6/42
interface GigabitEthernet6/43
interface GigabitEthernet6/44
interface GigabitEthernet6/45
interface GigabitEthernet6/46
interface GigabitEthernet6/47
interface GigabitEthernet6/48
description Management VLAN for Switch
ip address 10.10.111.11 255.255.255.0
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.10.111.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
no snmp-server enable traps license
snmp-server enable traps entity
snmp-server enable traps flash insertion removal
snmp-server enable traps power-ethernet police
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps errdisable
snmp-server enable traps vlan-membership
snmp-server enable traps mac-notification change move threshold
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 17202862
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
S-A2-LRG-2
Building configuration...
Current configuration : 20118 bytes
! Last configuration change at 02:45:12 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:45:13 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash bootflash:cat4500e-universalk9.SPA.03.01.00.SG.150-1.XO.bin
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint CISCO_IDEVID_SUDI
rsakeypair CISCO_IDEVID_SUDI
crypto pki trustpoint CISCO_IDEVID_SUDI0
crypto pki trustpoint TP-self-signed-145261
subject-name cn=IOS-Self-Signed-Certificate-145261
rsakeypair TP-self-signed-145261
crypto pki certificate chain CISCO_IDEVID_SUDI
certificate 6B46CD9B00000015F50E
certificate ca 6A6967B3000000000003
crypto pki certificate chain CISCO_IDEVID_SUDI0
certificate ca 5FF87B282B54DC8D42A315B568C9ADFF
crypto pki certificate chain TP-self-signed-145261
certificate self-signed 01
power redundancy-mode redundant
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
ip vrf forwarding Mgmt-vrf
interface TenGigabitEthernet3/1
interface TenGigabitEthernet3/2
interface TenGigabitEthernet3/3
interface TenGigabitEthernet3/4
interface GigabitEthernet6/1
interface GigabitEthernet6/2
switchport access vlan 17
interface GigabitEthernet6/3
switchport access vlan 17
interface GigabitEthernet6/4
switchport access vlan 17
interface GigabitEthernet6/5
switchport access vlan 17
interface GigabitEthernet6/6
switchport access vlan 17
interface GigabitEthernet6/7
switchport access vlan 17
interface GigabitEthernet6/8
switchport access vlan 17
interface GigabitEthernet6/9
switchport access vlan 17
interface GigabitEthernet6/10
switchport access vlan 20
interface GigabitEthernet6/11
switchport access vlan 17
interface GigabitEthernet6/12
switchport access vlan 17
interface GigabitEthernet6/13
switchport access vlan 17
interface GigabitEthernet6/14
switchport access vlan 17
interface GigabitEthernet6/15
switchport access vlan 17
interface GigabitEthernet6/16
switchport access vlan 17
interface GigabitEthernet6/17
switchport access vlan 17
interface GigabitEthernet6/18
switchport access vlan 17
interface GigabitEthernet6/19
switchport access vlan 17
interface GigabitEthernet6/20
switchport access vlan 17
interface GigabitEthernet6/21
switchport access vlan 17
interface GigabitEthernet6/22
switchport access vlan 17
interface GigabitEthernet6/23
switchport access vlan 17
interface GigabitEthernet6/24
switchport access vlan 17
interface GigabitEthernet6/25
switchport access vlan 17
interface GigabitEthernet6/26
switchport access vlan 17
interface GigabitEthernet6/27
switchport access vlan 17
interface GigabitEthernet6/28
switchport access vlan 17
interface GigabitEthernet6/29
switchport access vlan 17
interface GigabitEthernet6/30
switchport access vlan 17
interface GigabitEthernet6/31
switchport access vlan 17
interface GigabitEthernet6/32
switchport access vlan 17
interface GigabitEthernet6/33
switchport access vlan 17
interface GigabitEthernet6/34
switchport access vlan 17
interface GigabitEthernet6/35
switchport access vlan 17
interface GigabitEthernet6/36
switchport access vlan 17
interface GigabitEthernet6/37
switchport access vlan 17
interface GigabitEthernet6/38
switchport access vlan 17
interface GigabitEthernet6/39
switchport access vlan 17
interface GigabitEthernet6/40
switchport access vlan 17
interface GigabitEthernet6/41
interface GigabitEthernet6/42
interface GigabitEthernet6/43
interface GigabitEthernet6/44
interface GigabitEthernet6/45
interface GigabitEthernet6/46
interface GigabitEthernet6/47
interface GigabitEthernet6/48
description Management VLAN for Switch
ip address 10.10.111.12 255.255.255.0
no ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 10.10.111.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
no snmp-server enable traps license
snmp-server enable traps entity
snmp-server enable traps flash insertion removal
snmp-server enable traps power-ethernet police
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps port-security
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps errdisable
snmp-server enable traps vlan-membership
snmp-server enable traps mac-notification change move threshold
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 17211501
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
S-A2-LRG-3
Building configuration...
Current configuration : 20730 bytes
! Last configuration change at 02:52:21 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:52:23 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
logging monitor informational
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
macro global description dot1x
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authentication dot1x default group radius local
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization network default group radius
aaa authorization auth-proxy default group radius
aaa authorization configuration default group radius
aaa accounting update newinfo
aaa accounting auth-proxy default start-stop group radius
aaa accounting dot1x default start-stop group radius
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
aaa server radius dynamic-author
clock summer-time PSTDST recurring
authentication mac-move permit
ip dhcp snooping vlan 1,11
no ip dhcp snooping information option
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
ip admission name ise proxy http inactivity-time 60
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
cts sxp default source-ip 10.10.111.13
crypto pki trustpoint TP-self-signed-4268543232
subject-name cn=IOS-Self-Signed-Certificate-4268543232
rsakeypair TP-self-signed-4268543232
crypto pki certificate chain TP-self-signed-4268543232
certificate self-signed 01
notify syslog contenttype plaintext
dot1x system-auth-control
ip access-group ACL-DEFAULT in
spanning-tree extend system-id
vlan internal allocation policy ascending
interface GigabitEthernet0/1
interface GigabitEthernet0/2
interface GigabitEthernet0/3
interface GigabitEthernet0/4
description Cisco9971 IP phone
switchport access vlan 11
interface GigabitEthernet0/5
description IP Camera - 4300
switchport access vlan 20
interface GigabitEthernet0/6
switchport access vlan 20
interface GigabitEthernet0/7
interface GigabitEthernet0/8
interface GigabitEthernet0/9
interface GigabitEthernet0/10
interface GigabitEthernet0/11
interface GigabitEthernet0/12
interface GigabitEthernet0/13
interface GigabitEthernet0/14
interface GigabitEthernet0/15
interface GigabitEthernet0/16
interface GigabitEthernet0/17
interface GigabitEthernet0/18
interface GigabitEthernet0/19
interface GigabitEthernet0/20
interface GigabitEthernet0/21
interface GigabitEthernet0/22
interface GigabitEthernet0/23
interface GigabitEthernet0/24
interface GigabitEthernet0/25
description open-mode 802.1x+mab+mda+acl
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/26
description mobile worker
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/27
interface GigabitEthernet0/28
interface GigabitEthernet0/29
interface GigabitEthernet0/30
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/31
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/32
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/33
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/34
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/35
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/36
switchport access vlan 11
ip arp inspection limit rate 1000
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-auth
authentication order dot1x mab webauth
authentication priority dot1x mab
authentication port-control auto
authentication timer reauthenticate server
authentication timer inactivity server
authentication violation restrict
authentication fallback ise
snmp trap mac-notification change added
dot1x timeout tx-period 5
spanning-tree bpduguard enable
ip dhcp snooping limit rate 200
interface GigabitEthernet0/37
interface GigabitEthernet0/38
interface GigabitEthernet0/39
interface GigabitEthernet0/40
interface GigabitEthernet0/41
interface GigabitEthernet0/42
interface GigabitEthernet0/43
interface GigabitEthernet0/44
interface GigabitEthernet0/45
interface GigabitEthernet0/46
interface GigabitEthernet0/47
interface GigabitEthernet0/48
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface TenGigabitEthernet1/1
interface TenGigabitEthernet1/2
description Management VLAN for Switch
ip address 10.10.111.13 255.255.255.0
ip default-gateway 10.10.111.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip access-list extended ACL-ALLOW
ip access-list extended ACL-DEFAULT
permit udp any eq bootpc any eq bootps
permit udp any any eq domain
permit udp any any eq tftp
permit tcp any host 192.168.42.111 eq www
permit tcp any host 192.168.42.111 eq 443
permit tcp any host 192.168.42.112 eq www
permit tcp any host 192.168.42.112 eq 443
permit tcp any host 192.168.42.111 eq 8443
permit tcp any host 192.168.42.112 eq 8443
ip access-list extended ACL-POSTURE-REDIRECT
deny ip any host 192.168.42.111
deny ip any host 192.168.42.130
ip access-list extended ACL-WEBAUTH-REDIRECT
remark Don't match traffic sent to ISE PDP Nodes
deny ip any host 192.168.42.111
deny ip any host 192.168.42.112
deny ip any host 10.35.48.242
deny ip any host 171.71.169.207
ip sla enable reaction-alerts
logging source-interface Vlan1000
logging host 192.168.42.111 transport udp port 20514
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
snmp-server host 192.168.42.111 version 2c retaillabISE dot1x mac-notification snmp
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
radius-server attribute 6 on-for-login-auth
radius-server attribute 6 support-multiple
radius-server attribute 8 include-in-access-req
radius-server dead-criteria time 5 tries 3
radius-server host 192.168.42.111 auth-port 1812 acct-port 1813 key 7 <removed>
radius-server vsa send accounting
radius-server vsa send authentication
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36027134
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
mac address-table notification change interval 0
mac address-table notification change
S-A2-LRG-4
Building configuration...
Current configuration : 26605 bytes
! Last configuration change at 02:56:42 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:56:45 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed> username emc-ncm privilege 15 secret 5
<removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
macro auto device media-player ACCESS_VLAN=12
macro auto device ip-camera ACCESS_VLAN=20
macro auto device phone ACCESS_VLAN=17 VOICE_VLAN=13
macro auto device access-point ACCESS_VLAN=18
macro auto device lightweight-ap ACCESS_VLAN=18
macro auto global processing fallback cdp
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authentication dot1x default group radius local
aaa authorization exec default group tacacs+ if-authenticated
aaa authorization network default group radius
aaa authorization auth-proxy default group radius
aaa accounting update newinfo
aaa accounting dot1x default start-stop group radius
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
authentication mac-move permit
ip domain-name cisco-irn.com
ip host nac-2 192.168.42.112
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
mls qos map policed-dscp 24 26 46 to 0
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue input bandwidth 90 10
mls qos srr-queue input threshold 1 8 16
mls qos srr-queue input threshold 2 34 66
mls qos srr-queue input buffers 67 33
mls qos srr-queue input cos-map queue 1 threshold 2 1
mls qos srr-queue input cos-map queue 1 threshold 3 0
mls qos srr-queue input cos-map queue 2 threshold 1 2
mls qos srr-queue input cos-map queue 2 threshold 2 4 6 7
mls qos srr-queue input cos-map queue 2 threshold 3 3 5
mls qos srr-queue input dscp-map queue 1 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue input dscp-map queue 1 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue input dscp-map queue 1 threshold 3 32
mls qos srr-queue input dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue input dscp-map queue 2 threshold 2 33 34 35 36 37 38 39 48
mls qos srr-queue input dscp-map queue 2 threshold 2 49 50 51 52 53 54 55 56
mls qos srr-queue input dscp-map queue 2 threshold 2 57 58 59 60 61 62 63
mls qos srr-queue input dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue input dscp-map queue 2 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output cos-map queue 1 threshold 3 5
mls qos srr-queue output cos-map queue 2 threshold 3 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 2 4
mls qos srr-queue output cos-map queue 4 threshold 2 1
mls qos srr-queue output cos-map queue 4 threshold 3 0
mls qos srr-queue output dscp-map queue 1 threshold 3 40 41 42 43 44 45 46 47
mls qos srr-queue output dscp-map queue 2 threshold 3 24 25 26 27 28 29 30 31
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 3 threshold 3 32 33 34 35 36 37 38 39
mls qos srr-queue output dscp-map queue 4 threshold 1 8
mls qos srr-queue output dscp-map queue 4 threshold 2 9 10 11 12 13 14 15
mls qos srr-queue output dscp-map queue 4 threshold 3 0 1 2 3 4 5 6 7
mls qos queue-set output 1 threshold 1 138 138 92 138
mls qos queue-set output 1 threshold 2 138 138 92 400
mls qos queue-set output 1 threshold 3 36 77 100 318
mls qos queue-set output 1 threshold 4 20 50 67 400
mls qos queue-set output 2 threshold 1 149 149 100 149
mls qos queue-set output 2 threshold 2 118 118 100 235
mls qos queue-set output 2 threshold 3 41 68 100 272
mls qos queue-set output 2 threshold 4 42 72 100 242
mls qos queue-set output 1 buffers 10 10 26 54
mls qos queue-set output 2 buffers 16 6 17 61
crypto pki trustpoint TP-self-signed-4268542976
subject-name cn=IOS-Self-Signed-Certificate-4268542976
rsakeypair TP-self-signed-4268542976
crypto pki certificate chain TP-self-signed-4268542976
certificate self-signed 01
notify syslog contenttype plaintext
dot1x system-auth-control
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
class-map match-all AutoQoS-VoIP-RTP-Trust
class-map match-all AutoQoS-VoIP-Control-Trust
policy-map AutoQoS-Police-CiscoPhone
class AutoQoS-VoIP-RTP-Trust
police 320000 8000 exceed-action policed-dscp-transmit
class AutoQoS-VoIP-Control-Trust
police 32000 8000 exceed-action policed-dscp-transmit
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
srr-queue bandwidth share 10 10 60 20
macro description CISCO_SWITCH_EVENT
interface GigabitEthernet0/2
switchport trunk encapsulation dot1q
srr-queue bandwidth share 10 10 60 20
macro description CISCO_SWITCH_EVENT
interface GigabitEthernet0/3
switchport trunk encapsulation dot1q
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
switchport port-security aging time 1
switchport port-security violation protect
switchport port-security aging type inactivity
srr-queue bandwidth share 10 10 60 20
macro description CISCO_WIRELESS_LIGHTWEIGHT_AP_EVENT
storm-control broadcast level pps 1k
storm-control multicast level pps 2k
storm-control action trap
spanning-tree bpduguard enable
ip dhcp snooping limit rate 15
interface GigabitEthernet0/4
switchport trunk encapsulation dot1q
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
switchport port-security aging time 1
switchport port-security violation protect
switchport port-security aging type inactivity
srr-queue bandwidth share 10 10 60 20
macro description CISCO_WIRELESS_LIGHTWEIGHT_AP_EVENT
storm-control broadcast level pps 1k
storm-control multicast level pps 2k
storm-control action trap
spanning-tree bpduguard enable
ip dhcp snooping limit rate 15
interface GigabitEthernet0/5
interface GigabitEthernet0/6
interface GigabitEthernet0/7
switchport trunk encapsulation dot1q
srr-queue bandwidth share 10 10 60 20
macro description CISCO_SWITCH_EVENT
interface GigabitEthernet0/8
interface GigabitEthernet0/9
interface GigabitEthernet0/10
interface GigabitEthernet0/11
description Cisco7975 IP phone
switchport port-security maximum 3
switchport port-security maximum 2 vlan access
switchport port-security aging time 1
switchport port-security violation restrict
switchport port-security aging type inactivity
srr-queue bandwidth share 10 10 60 20
mls qos trust device cisco-phone
macro description CISCO_PHONE_EVENT
auto qos voip cisco-phone
storm-control broadcast level pps 1k
storm-control multicast level pps 2k
storm-control action trap
spanning-tree bpduguard enable
service-policy input AutoQoS-Police-CiscoPhone
ip dhcp snooping limit rate 15
interface GigabitEthernet0/12
interface GigabitEthernet0/13
interface GigabitEthernet0/14
interface GigabitEthernet0/15
interface GigabitEthernet0/16
interface GigabitEthernet0/17
interface GigabitEthernet0/18
interface GigabitEthernet0/19
interface GigabitEthernet0/20
interface GigabitEthernet0/21
interface GigabitEthernet0/22
interface GigabitEthernet0/23
interface GigabitEthernet0/24
interface GigabitEthernet0/25
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/26
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/27
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/28
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/29
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/30
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/31
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/32
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/33
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/34
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/35
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/36
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/37
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/38
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/39
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/40
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/41
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/42
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/43
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/44
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/45
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/46
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/47
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet0/48
description open-mode 802.1x+mab+mda+acl
ip access-group ACL-DEFAULT in
authentication event fail action next-method
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
interface GigabitEthernet1/1
interface GigabitEthernet1/2
interface GigabitEthernet1/3
interface GigabitEthernet1/4
interface TenGigabitEthernet1/1
interface TenGigabitEthernet1/2
description Management VLAN for Switch
ip address 10.10.111.14 255.255.255.0
ip default-gateway 10.10.111.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip access-list extended ACL-DEFAULT
permit udp any eq bootpc any eq bootps
permit udp any any eq domain
permit udp any any eq tftp
permit tcp any host 192.168.42.111 eq www
permit tcp any host 192.168.42.111 eq 443
permit tcp any host 192.168.42.112 eq www
permit tcp any host 192.168.42.112 eq 443
permit tcp any host 192.168.42.111 eq 8443
permit tcp any host 192.168.42.112 eq 8443
ip access-list extended ACL-WEBAUTH-REDIRECT
remark Don't match traffic sent to ISE PDP Nodes
deny ip any host 192.168.42.111
deny ip any host 192.168.42.112
deny ip any host 10.35.48.242
remark Don't match traffic sent to remediation services (wwwin-download.cisco.com)
deny ip any host 171.71.169.207
remark Match all other traffic for redirection
ip sla enable reaction-alerts
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
snmp-server host 192.168.42.111 version 2c retaillabISE dot1x mac-notification snmp
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
radius-server dead-criteria time 5 tries 3
radius-server host 192.168.42.111 auth-port 1812 acct-port 1813 key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36027569
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
S-A2-LRG-5
Building configuration...
Current configuration : 10739 bytes
! Last configuration change at 03:00:15 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 03:00:17 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
shell trigger POS-Systems POS-Systems
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
macro global description cisco-desktop
macro auto execute CISCO_LAST_RESORT_EVENT builtin CISCO_AP_AUTO_SMARTPORT ACCESS_VLAN=17
macro auto execute Retail-POS builtin CISCO_PHONE_AUTO_SMARTPORT ACCESS_VLAN=11
VOICE_VLAN=13
macro auto execute POS-Systems remote scp://SMARTPORT@192.168.42.122/POS-Systems.txt
ACCESS_VLAN=11 VOICE_VLAN=13
macro auto mac-address-group Retail-POS
mac-address list 0021.5C02.1DEF
mac-address list 001C.25BE.99C2
macro auto device media-player ACCESS_VLAN=12
macro auto device ip-camera ACCESS_VLAN=20
macro auto device phone ACCESS_VLAN=17 VOICE_VLAN=13
macro auto device access-point ACCESS_VLAN=18
macro auto device lightweight-ap ACCESS_VLAN=18
macro auto global processing fallback cdp
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
mls qos map cos-dscp 0 8 16 24 32 46 48 56
mls qos srr-queue output cos-map queue 1 threshold 3 4 5
mls qos srr-queue output cos-map queue 2 threshold 1 2
mls qos srr-queue output cos-map queue 2 threshold 2 3
mls qos srr-queue output cos-map queue 2 threshold 3 6 7
mls qos srr-queue output cos-map queue 3 threshold 3 0
mls qos srr-queue output cos-map queue 4 threshold 3 1
mls qos srr-queue output dscp-map queue 1 threshold 3 32 33 40 41 42 43 44 45
mls qos srr-queue output dscp-map queue 1 threshold 3 46 47
mls qos srr-queue output dscp-map queue 2 threshold 1 16 17 18 19 20 21 22 23
mls qos srr-queue output dscp-map queue 2 threshold 1 26 27 28 29 30 31 34 35
mls qos srr-queue output dscp-map queue 2 threshold 1 36 37 38 39
mls qos srr-queue output dscp-map queue 2 threshold 2 24
mls qos srr-queue output dscp-map queue 2 threshold 3 48 49 50 51 52 53 54 55
mls qos srr-queue output dscp-map queue 2 threshold 3 56 57 58 59 60 61 62 63
mls qos srr-queue output dscp-map queue 3 threshold 3 0 1 2 3 4 5 6 7
mls qos srr-queue output dscp-map queue 4 threshold 1 8 9 11 13 15
mls qos srr-queue output dscp-map queue 4 threshold 2 10 12 14
mls qos queue-set output 1 threshold 1 100 100 50 200
mls qos queue-set output 1 threshold 2 125 125 100 400
mls qos queue-set output 1 threshold 3 100 100 100 400
mls qos queue-set output 1 threshold 4 60 150 50 200
mls qos queue-set output 1 buffers 15 25 40 20
crypto pki trustpoint TP-self-signed-3964801920
subject-name cn=IOS-Self-Signed-Certificate-3964801920
rsakeypair TP-self-signed-3964801920
crypto pki certificate chain TP-self-signed-3964801920
certificate self-signed 01
spanning-tree extend system-id
vlan internal allocation policy ascending
interface GigabitEthernet0/1
switchport access vlan 17
interface GigabitEthernet0/2
switchport access vlan 17
interface GigabitEthernet0/3
switchport access vlan 17
interface GigabitEthernet0/4
switchport access vlan 17
interface GigabitEthernet0/5
switchport access vlan 17
interface GigabitEthernet0/6
switchport access vlan 17
interface GigabitEthernet0/7
switchport access vlan 17
interface GigabitEthernet0/8
switchport access vlan 17
interface GigabitEthernet0/9
description Uplink to S-A2-LRG-4 G0/7
switchport trunk encapsulation dot1q
srr-queue bandwidth share 1 30 35 5
macro description CISCO_SWITCH_EVENT
interface GigabitEthernet0/10
description Management VLAN for Switch
ip address 10.10.111.15 255.255.255.0
ip default-gateway 10.10.111.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip sla enable reaction-alerts
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131 timeout 5
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 22518292
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Medium Branch
R-A2-MED-1
! Last configuration change at 00:29:32 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 00:29:32 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash0 c2951-universalk9-mz.SPA.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PSTDST recurring
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-1670063162
subject-name cn=IOS-Self-Signed-Certificate-1670063162
rsakeypair TP-self-signed-1670063162
crypto pki certificate chain TP-self-signed-1670063162
certificate self-signed 01
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip ips config location ipstest retries 1 timeout 1
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect global
parameter-map type inspect Inspect-1
parameter-map type trend-global trend-glob-map
license udi pid STARSCREAM sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_81604380995
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_81604381001
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_81604381037
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_81604381039
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_81604381045
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_81604381049
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381059
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381067
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381071
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381150
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_81604381152
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_81604380993
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_81604381021
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381023
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381041
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381043
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_81604381047
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_81604381051
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381150
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_src_rule_81604381152
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group service CSM_INLINE_svc_rule_81604380993
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604380995
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381001
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_81604381003
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_81604381005
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_81604381009
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_81604381011
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service HTTPS-8443
object-group service CSM_INLINE_svc_rule_81604381013
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381015
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_81604381017
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381019
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_81604381021
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381023
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381025
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381027
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381029
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_81604381035
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_81604381037
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381039
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381041
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_81604381043
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_81604381045
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_81604381051
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381053
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381055
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381057
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381059
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381061
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381063
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_81604381065
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network STORE-POS
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
ip ssh authentication-retries 2
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_37
match access-group name CSM_ZBF_CMAP_ACL_37
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_38
match access-group name CSM_ZBF_CMAP_ACL_38
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map BRANCH-LAN-EDGE-OUT
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_25
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_36
class type inspect CSM_ZBF_CLASS_MAP_37
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_24
policy-map type inspect CSM_ZBF_POLICY_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_38
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_15
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_23
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_31
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_30
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
description Store WAN Link
description Bridge link between routers
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_S_R-2-R-LOOPBACK_1 source S_R-2-R destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_R-2-R-S_MGMT_1 source S_R-2-R destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_R-2-R-S_Security_1 source S_R-2-R destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_R-2-R-S_WAAS_1 source S_R-2-R destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_R-2-R-S_WLC-AP_1 source S_R-2-R destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_R-2-R-self_1 source S_R-2-R destination self
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_S_R-2-R-S_Data_1 source S_R-2-R destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Data-W_1 source S_R-2-R destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Guest_1 source S_R-2-R destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_R-2-R-S_Partners_1 source S_R-2-R destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_POS_1 source S_R-2-R destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_POS-W_1 source S_R-2-R destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_Voice_1 source S_R-2-R destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_self-S_R-2-R_1 source self destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_R-2-R_1 source LOOPBACK destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_R-2-R_1 source S_MGMT destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_R-2-R_1 source S_Security destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_R-2-R_1 source S_WAAS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_R-2-R_1 source S_WLC-AP destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-S_R-2-R_1 source S_POS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_R-2-R_1 source S_POS-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_22
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-S_R-2-R_1 source S_Data destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_R-2-R_1 source S_Data-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Guest-S_R-2-R_1 source S_Guest destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Partners-S_R-2-R_1 source S_Partners destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_26
zone-pair security CSM_S_Voice-S_R-2-R_1 source S_Voice destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_27
ip address 10.10.126.1 255.255.255.255
zone-member security LOOPBACK
interface GigabitEthernet0/0
ip address 10.10.255.112 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
interface GigabitEthernet0/1
description ROUTER LINK TO SWITCH
interface GigabitEthernet0/1.11
ip address 10.10.112.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS
standby 11 ip 10.10.112.1
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.12
ip address 10.10.113.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
standby 12 ip 10.10.113.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.13
ip address 10.10.114.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
standby 13 ip 10.10.114.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.14
ip address 10.10.115.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
standby 14 ip 10.10.115.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.15
ip address 10.10.116.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.116.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.16
ip address 10.10.117.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.117.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.17
description WIRELESS-GUEST
ip address 10.10.118.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.118.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.18
description WIRELESS-CONTROL
ip address 10.10.119.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.119.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.19
ip address 10.10.120.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.120.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.20
description SECURITY-SYSTEMS
ip address 10.10.121.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Security
standby 20 ip 10.10.121.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.102
description ROUTER LINK TO
ip address 10.10.126.29 255.255.255.252
zone-member security S_R-2-R
service-policy input BRANCH-LAN-EDGE-IN
interface GigabitEthernet0/1.1000
ip address 10.10.127.2 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.127.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/2
interface GigabitEthernet0/2.101
description ROUTER LINK TO
ip address 10.10.126.25 255.255.255.252
zone-member security S_R-2-R
service-policy input BRANCH-LAN-EDGE-IN
ip address 10.10.126.41 255.255.255.252
zone-member security S_WAAS
service-module ip address 10.10.126.42 255.255.255.252
service-module ip default-gateway 10.10.126.41
description Internal switch interface connected to Service Module
redistribute connected subnets
passive-interface default
no passive-interface GigabitEthernet0/1.102
no passive-interface GigabitEthernet0/2.101
network 10.10.0.0 0.0.255.255 area 10
default-information originate
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.255.11
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_81604380993 object-group
CSM_INLINE_src_rule_81604380993 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381011 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381015 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381019 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381021 object-group
CSM_INLINE_src_rule_81604381021 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_81604381057 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
permit ospf object-group CSM_INLINE_src_rule_81604381150 object-group
CSM_INLINE_dst_rule_81604381150
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_81604381055 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_15
permit ospf object-group CSM_INLINE_src_rule_81604381152 object-group
CSM_INLINE_dst_rule_81604381152
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_81604380995 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604380995
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_81604381001 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381001
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_19
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_81604381035 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381039 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381039
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_81604381005 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_22
permit object-group CSM_INLINE_svc_rule_81604381037 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381037
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381049
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_81604381053 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_81604381045 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381045
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381009 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381013 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381017 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381023 object-group
CSM_INLINE_src_rule_81604381023 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381025 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381027 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381041 object-group
CSM_INLINE_src_rule_81604381041 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_81604381029 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381061 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381063 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_81604381065 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381071
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381067
ip access-list extended CSM_ZBF_CMAP_ACL_37
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_38
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_81604381059 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381059
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_81604381003 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_81604381047 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_81604381051 object-group
CSM_INLINE_src_rule_81604381051 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_81604381043 object-group
CSM_INLINE_src_rule_81604381043 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps flash insertion removal
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps ipsla
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
exception data-corruption buffer truncate
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
R-A2-MED-2
! Last configuration change at 23:30:34 PCTime Fri Apr 29 2011 by retail
! NVRAM config last updated at 23:30:35 PCTime Fri Apr 29 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
boot system flash:c2951-universalk9-mz.SPA.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock timezone PCTime -8 0
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-104836678
subject-name cn=IOS-Self-Signed-Certificate-104836678
crypto pki certificate chain TP-self-signed-104836678
certificate self-signed 02
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip port-map user-8443 port tcp 8443
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect global
parameter-map type inspect Inspect-1
parameter-map type trend-global trend-glob-map
license udi pid CISCO2951/K9 sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_81604380995
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_81604381001
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_81604381037
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_81604381039
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_81604381045
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_81604381049
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381059
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381067
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381071
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_dst_rule_81604381150
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_81604381152
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_81604380993
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_81604381021
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381023
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_81604381041
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381043
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_81604381047
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_81604381051
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
object-group network CSM_INLINE_src_rule_81604381150
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group network CSM_INLINE_src_rule_81604381152
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-HA_v1/mandatory)
10.10.126.0 255.255.255.0
10.10.110.0 255.255.255.0
object-group service CSM_INLINE_svc_rule_81604380993
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604380995
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381001
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_81604381003
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_81604381005
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_81604381009
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_81604381011
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ORACLE-Weblogic
object-group service HTTPS-8443
object-group service CSM_INLINE_svc_rule_81604381013
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381015
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_81604381017
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381019
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_81604381021
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381023
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_81604381025
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381027
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381029
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_81604381035
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_81604381037
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381039
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381041
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_81604381043
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_81604381045
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_81604381051
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381053
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381055
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_81604381057
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381059
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381061
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service CSM_INLINE_svc_rule_81604381063
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_81604381065
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-HA_v1/mandatory)
group-object Microsoft-DS-SMB
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network STORE-POS
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
ip ssh authentication-retries 2
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_37
match access-group name CSM_ZBF_CMAP_ACL_37
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_38
match access-group name CSM_ZBF_CMAP_ACL_38
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map BRANCH-LAN-EDGE-OUT
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_25
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_36
class type inspect CSM_ZBF_CLASS_MAP_37
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_24
policy-map type inspect CSM_ZBF_POLICY_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_38
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_15
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_28
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_14
policy-map type inspect CSM_ZBF_POLICY_MAP_23
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_31
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_30
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
description Store WAN Link
description Bridge link between routers
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_S_R-2-R-LOOPBACK_1 source S_R-2-R destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_R-2-R-S_MGMT_1 source S_R-2-R destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_R-2-R-S_Security_1 source S_R-2-R destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_R-2-R-S_WAAS_1 source S_R-2-R destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_R-2-R-S_WLC-AP_1 source S_R-2-R destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_R-2-R-self_1 source S_R-2-R destination self
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_S_R-2-R-S_Data_1 source S_R-2-R destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Data-W_1 source S_R-2-R destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_Guest_1 source S_R-2-R destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_R-2-R-S_Partners_1 source S_R-2-R destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_R-2-R-S_POS_1 source S_R-2-R destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_POS-W_1 source S_R-2-R destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_R-2-R-S_Voice_1 source S_R-2-R destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_self-S_R-2-R_1 source self destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_R-2-R_1 source LOOPBACK destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_R-2-R_1 source S_MGMT destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_R-2-R_1 source S_Security destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_R-2-R_1 source S_WAAS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_R-2-R_1 source S_WLC-AP destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-S_R-2-R_1 source S_POS destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_R-2-R_1 source S_POS-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_22
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-S_R-2-R_1 source S_Data destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Data-W-S_R-2-R_1 source S_Data-W destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_23
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Guest-S_R-2-R_1 source S_Guest destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_24
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Partners-S_R-2-R_1 source S_Partners destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_25
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_26
zone-pair security CSM_S_Voice-S_R-2-R_1 source S_Voice destination S_R-2-R
service-policy type inspect CSM_ZBF_POLICY_MAP_27
ip address 10.10.126.2 255.255.255.255
zone-member security LOOPBACK
interface GigabitEthernet0/0
ip address 10.10.254.112 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
interface GigabitEthernet0/1
description ROUTER LINK TO SWITCH
interface GigabitEthernet0/1.11
ip address 10.10.112.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS
standby 11 ip 10.10.112.1
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.12
ip address 10.10.113.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
standby 12 ip 10.10.113.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.13
ip address 10.10.114.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
standby 13 ip 10.10.114.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.14
ip address 10.10.115.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
standby 14 ip 10.10.115.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.15
ip address 10.10.116.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.116.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.16
ip address 10.10.117.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.117.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.17
description WIRELESS-GUEST
ip address 10.10.118.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.118.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.18
description WIRELESS-CONTROL
ip address 10.10.119.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.119.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.19
ip address 10.10.120.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.120.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.20
description SECURITY-SYSTEMS
ip address 10.10.121.3 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Security
standby 20 ip 10.10.121.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.101
description ROUTER LINK TO
ip address 10.10.126.26 255.255.255.252
zone-member security S_R-2-R
service-policy input BRANCH-LAN-EDGE-IN
interface GigabitEthernet0/1.1000
ip address 10.10.127.3 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.127.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/2
interface GigabitEthernet0/2.102
description ROUTER LINK TO
ip address 10.10.126.30 255.255.255.252
zone-member security S_R-2-R
service-policy input BRANCH-LAN-EDGE-IN
description Video Survillance VMSS Module
ip address 10.10.126.45 255.255.255.252
zone-member security S_Security
service-module ip address 10.10.126.46 255.255.255.252
!Application: FNDN Running on SM
service-module ip default-gateway 10.10.126.45
description Internal switch interface connected to Service Module
ip address 10.10.126.50 255.255.255.252
zone-member security S_MGMT
service-module ip address 10.10.126.49 255.255.255.252
!Application: SRE-V Running on SMV
service-module ip default-gateway 10.10.126.50
service-module mgf ip address 10.10.125.49 255.255.255.0
description Internal switch interface connected to Service Module
description ESXi Host and Virtual Machines$ES_LAN$
ip address 10.10.125.50 255.255.255.0
zone-member security S_POS
redistribute connected subnets
passive-interface default
no passive-interface GigabitEthernet0/1.101
no passive-interface GigabitEthernet0/2.102
network 10.10.0.0 0.0.255.255 area 10
default-information originate
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.254.11
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_81604380993 object-group
CSM_INLINE_src_rule_81604380993 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381011 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381015 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381019 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381021 object-group
CSM_INLINE_src_rule_81604381021 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_81604381057 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
permit ospf object-group CSM_INLINE_src_rule_81604381150 object-group
CSM_INLINE_dst_rule_81604381150
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_81604381055 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_15
permit ospf object-group CSM_INLINE_src_rule_81604381152 object-group
CSM_INLINE_dst_rule_81604381152
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_81604380995 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604380995
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_81604381001 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381001
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_19
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_81604381035 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381039 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381039
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_81604381005 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_22
permit object-group CSM_INLINE_svc_rule_81604381037 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381037
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381049
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_81604381053 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_81604381045 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381045
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381009 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381013 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381017 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_81604381023 object-group
CSM_INLINE_src_rule_81604381023 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381025 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381027 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_81604381041 object-group
CSM_INLINE_src_rule_81604381041 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_81604381029 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_81604381061 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_81604381063 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_81604381065 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381071
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_81604381067
ip access-list extended CSM_ZBF_CMAP_ACL_37
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_38
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_81604381059 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_81604381059
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_81604381003 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_81604381047 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_81604381051 object-group
CSM_INLINE_src_rule_81604381051 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_81604381043 object-group
CSM_INLINE_src_rule_81604381043 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps flash insertion removal
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps ipsla
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
S-A2-MED-1
Building configuration...
Current configuration : 16629 bytes
! Last configuration change at 02:28:28 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:28:32 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
switch 1 provision ws-c3750x-48p
switch 2 provision ws-c3750x-48p
authentication mac-move permit
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-4271428864
subject-name cn=IOS-Self-Signed-Certificate-4271428864
rsakeypair TP-self-signed-4271428864
crypto pki certificate chain TP-self-signed-4271428864
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface GigabitEthernet1/0/1
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/2
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/3
description Cisco9971 IP phone
switchport access vlan 11
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/4
description Cisco7975 IP phone
switchport access vlan 11
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/5
switchport access vlan 20
interface GigabitEthernet1/0/6
switchport access vlan 20
interface GigabitEthernet1/0/7
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/8
switchport access vlan 17
interface GigabitEthernet1/0/9
switchport access vlan 17
interface GigabitEthernet1/0/10
switchport access vlan 17
interface GigabitEthernet1/0/11
switchport access vlan 17
interface GigabitEthernet1/0/12
switchport access vlan 17
interface GigabitEthernet1/0/13
switchport access vlan 17
interface GigabitEthernet1/0/14
switchport access vlan 17
interface GigabitEthernet1/0/15
switchport access vlan 17
interface GigabitEthernet1/0/16
switchport access vlan 17
interface GigabitEthernet1/0/17
switchport access vlan 17
interface GigabitEthernet1/0/18
switchport access vlan 17
interface GigabitEthernet1/0/19
switchport access vlan 17
interface GigabitEthernet1/0/20
switchport access vlan 17
interface GigabitEthernet1/0/21
switchport access vlan 17
interface GigabitEthernet1/0/22
switchport access vlan 17
interface GigabitEthernet1/0/23
switchport access vlan 17
interface GigabitEthernet1/0/24
switchport access vlan 17
interface GigabitEthernet1/0/25
switchport access vlan 17
interface GigabitEthernet1/0/26
switchport access vlan 17
interface GigabitEthernet1/0/27
switchport access vlan 17
interface GigabitEthernet1/0/28
switchport access vlan 17
interface GigabitEthernet1/0/29
switchport access vlan 17
interface GigabitEthernet1/0/30
switchport access vlan 17
interface GigabitEthernet1/0/31
switchport access vlan 17
interface GigabitEthernet1/0/32
switchport access vlan 17
interface GigabitEthernet1/0/33
switchport access vlan 17
interface GigabitEthernet1/0/34
switchport access vlan 17
interface GigabitEthernet1/0/35
switchport access vlan 17
interface GigabitEthernet1/0/36
switchport access vlan 17
interface GigabitEthernet1/0/37
switchport access vlan 17
interface GigabitEthernet1/0/38
switchport access vlan 17
interface GigabitEthernet1/0/39
switchport access vlan 17
interface GigabitEthernet1/0/40
switchport access vlan 17
interface GigabitEthernet1/0/41
switchport access vlan 17
interface GigabitEthernet1/0/42
switchport access vlan 17
interface GigabitEthernet1/0/43
switchport access vlan 17
interface GigabitEthernet1/0/44
switchport access vlan 17
interface GigabitEthernet1/0/45
switchport access vlan 17
interface GigabitEthernet1/0/46
switchport access vlan 17
interface GigabitEthernet1/0/47
switchport access vlan 17
interface GigabitEthernet1/0/48
switchport access vlan 17
interface GigabitEthernet1/1/1
interface GigabitEthernet1/1/2
interface GigabitEthernet1/1/3
interface GigabitEthernet1/1/4
interface TenGigabitEthernet1/1/1
interface TenGigabitEthernet1/1/2
interface GigabitEthernet2/0/1
switchport trunk encapsulation dot1q
interface GigabitEthernet2/0/2
switchport trunk encapsulation dot1q
interface GigabitEthernet2/0/3
interface GigabitEthernet2/0/4
switchport trunk encapsulation dot1q
interface GigabitEthernet2/0/5
switchport trunk encapsulation dot1q
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
interface GigabitEthernet2/0/6
switchport trunk encapsulation dot1q
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
interface GigabitEthernet2/0/7
switchport trunk encapsulation dot1q
interface GigabitEthernet2/0/8
switchport access vlan 17
interface GigabitEthernet2/0/9
switchport access vlan 17
interface GigabitEthernet2/0/10
switchport access vlan 17
interface GigabitEthernet2/0/11
switchport access vlan 17
interface GigabitEthernet2/0/12
switchport access vlan 17
interface GigabitEthernet2/0/13
switchport access vlan 17
interface GigabitEthernet2/0/14
switchport access vlan 17
interface GigabitEthernet2/0/15
switchport access vlan 17
interface GigabitEthernet2/0/16
switchport access vlan 17
interface GigabitEthernet2/0/17
switchport access vlan 17
interface GigabitEthernet2/0/18
switchport access vlan 17
interface GigabitEthernet2/0/19
switchport access vlan 17
interface GigabitEthernet2/0/20
switchport access vlan 17
interface GigabitEthernet2/0/21
switchport access vlan 17
interface GigabitEthernet2/0/22
switchport access vlan 17
interface GigabitEthernet2/0/23
switchport access vlan 17
interface GigabitEthernet2/0/24
switchport access vlan 17
interface GigabitEthernet2/0/25
switchport access vlan 17
interface GigabitEthernet2/0/26
switchport access vlan 17
interface GigabitEthernet2/0/27
switchport access vlan 17
interface GigabitEthernet2/0/28
switchport access vlan 17
interface GigabitEthernet2/0/29
switchport access vlan 17
interface GigabitEthernet2/0/30
switchport access vlan 17
interface GigabitEthernet2/0/31
switchport access vlan 17
interface GigabitEthernet2/0/32
switchport access vlan 17
interface GigabitEthernet2/0/33
switchport access vlan 17
interface GigabitEthernet2/0/34
switchport access vlan 17
interface GigabitEthernet2/0/35
switchport access vlan 17
interface GigabitEthernet2/0/36
switchport access vlan 17
interface GigabitEthernet2/0/37
switchport access vlan 17
interface GigabitEthernet2/0/38
switchport access vlan 17
interface GigabitEthernet2/0/39
switchport access vlan 17
interface GigabitEthernet2/0/40
switchport access vlan 17
interface GigabitEthernet2/0/41
switchport access vlan 17
interface GigabitEthernet2/0/42
switchport access vlan 17
interface GigabitEthernet2/0/43
switchport access vlan 17
interface GigabitEthernet2/0/44
switchport access vlan 17
interface GigabitEthernet2/0/45
switchport access vlan 17
interface GigabitEthernet2/0/46
switchport access vlan 17
interface GigabitEthernet2/0/47
switchport access vlan 17
interface GigabitEthernet2/0/48
switchport access vlan 17
interface GigabitEthernet2/1/1
interface GigabitEthernet2/1/2
interface GigabitEthernet2/1/3
interface GigabitEthernet2/1/4
interface TenGigabitEthernet2/1/1
interface TenGigabitEthernet2/1/2
description Management VLAN for Switch
ip address 10.10.127.11 255.255.255.0
ip default-gateway 10.10.127.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip sla enable reaction-alerts
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps power-ethernet group 1-4
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36027426
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
S-A2-MED-3
Building configuration...
Current configuration : 8650 bytes
! Last configuration change at 02:34:20 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:34:21 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-1308417408
subject-name cn=IOS-Self-Signed-Certificate-1308417408
rsakeypair TP-self-signed-1308417408
crypto pki certificate chain TP-self-signed-1308417408
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface FastEthernet0/1
switchport access vlan 17
interface FastEthernet0/2
switchport access vlan 17
interface FastEthernet0/3
switchport access vlan 17
interface FastEthernet0/4
switchport access vlan 17
interface FastEthernet0/5
switchport access vlan 17
interface FastEthernet0/6
switchport access vlan 17
interface FastEthernet0/7
switchport access vlan 17
interface FastEthernet0/8
switchport access vlan 17
interface GigabitEthernet0/1
interface GigabitEthernet0/2
description Management VLAN for Switch
ip address 10.10.127.13 255.255.255.0
ip default-gateway 10.10.127.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip sla enable reaction-alerts
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
* **** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO ADMINISTRATOR OR OTHEMIME WITHOUT
NFORCEMENT OFFCIAL NDPRSETHO OF STATEAND FEER^C
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36028775
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Small Branch
R-A2-SMALL
! Last configuration change at 00:44:15 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 00:44:16 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash0 c2900-universalk9-mz.SPA.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip port-map user-8443 port tcp 8443
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect global
parameter-map type inspect Inspect-1
parameter-map type trend-global trend-glob-map
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-503450500
subject-name cn=IOS-Self-Signed-Certificate-503450500
rsakeypair TP-self-signed-503450500
crypto pki certificate chain TP-self-signed-503450500
certificate self-signed 01
license udi pid CISCO2921/K9 sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_68719541425
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_68719541431
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_68719541435
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541457
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541461
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541465
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_73014451187
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_73014451193
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_73014451223
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_68719541409
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_src_rule_68719541427
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_src_rule_68719541429
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_68719541433
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_68719541437
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_73014451215
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_73014451217
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group service CSM_INLINE_svc_rule_68719541409
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541425
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541427
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_68719541429
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_68719541431
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service HTTPS-8443
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_68719541437
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_68719541439
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_68719541455
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541457
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_68719541459
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014451187
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451193
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_73014451195
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_73014451197
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_73014451203
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_73014451205
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_73014451207
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451209
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_73014451211
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451213
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_73014451215
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_73014451217
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ICMP-Requests
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_73014451221
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_73014451223
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451388
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014451393
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451395
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451397
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451404
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451406
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network POS-Store-SMALL-1
description Small Store POS devices
object-group network STORE-POS
group-object POS-Store-SMALL-1
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed> username bmcgloth privilege 15 secret 5
<removed>
username csmadmin privilege 15 secret 5 <removed>
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map BRANCH-LAN-EDGE-OUT
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_28
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_30
class type inspect CSM_ZBF_CLASS_MAP_31
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
policy-map type inspect CSM_ZBF_POLICY_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_30
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_10
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_36
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
description Store WAN Link
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_22
ip address 10.10.142.1 255.255.255.255
zone-member security LOOPBACK
interface GigabitEthernet0/0
description ROUTER LINK TO SWITCH
interface GigabitEthernet0/0.11
ip address 10.10.128.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS
standby 11 ip 10.10.128.1
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.12
ip address 10.10.129.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
standby 12 ip 10.10.129.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.13
ip address 10.10.130.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
standby 13 ip 10.10.130.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.14
ip address 10.10.131.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
standby 14 ip 10.10.131.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.15
ip address 10.10.132.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.132.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.16
ip address 10.10.133.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.133.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.17
description WIRELESS-GUEST
ip address 10.10.134.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.134.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.18
description WIRELESS-CONTROL
ip address 10.10.135.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.135.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.19
ip address 10.10.136.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.136.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.20
description SECURITY-SYSTEMS
ip address 10.10.137.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Security
standby 20 ip 10.10.137.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/0.1000
ip address 10.10.143.2 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.143.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
!Application: Online on SME
interface GigabitEthernet0/1
ip address 10.10.255.128 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
interface GigabitEthernet0/2
ip address 10.10.254.128 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
description Internal switch interface connected to Internal Service Module
zone-member security S_Security
description Internal switch interface connected to Service Module
zone-member security S_POS
passive-interface default
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.255.11
ip route 0.0.0.0 0.0.0.0 10.10.254.11 50
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_68719541409 object-group
CSM_INLINE_src_rule_68719541409 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451205 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451209 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451213 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451215 object-group
CSM_INLINE_src_rule_73014451215 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_68719541455 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_73014451187 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451187
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_73014451193 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451193
ip access-list extended CSM_ZBF_CMAP_ACL_15
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_73014451221 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_68719541425 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541425
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_73014451197 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_19
permit object-group CSM_INLINE_svc_rule_73014451223 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451223
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541435
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_68719541439 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_22
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_73014451388 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_68719541431 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541431
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451203 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451207 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451211 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451217 object-group
CSM_INLINE_src_rule_73014451217 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_73014451393 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_73014451395 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_73014451397 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_73014451404 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_68719541427 object-group
CSM_INLINE_src_rule_68719541427 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_73014451406 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_68719541459 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541465
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541461
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_68719541457 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541457
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_73014451195 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_68719541433 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_68719541437 object-group
CSM_INLINE_src_rule_68719541437 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_68719541429 object-group
CSM_INLINE_src_rule_68719541429 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps flash insertion removal
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps ipsla
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
S-A2-SMALL
Building configuration...
Current configuration : 16143 bytes
! Last configuration change at 02:23:14 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:23:18 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed> username emc-ncm privilege 15 secret 5
<removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
switch 1 provision ws-c2960s-48fps-l
switch 2 provision ws-c2960s-48fps-l
authentication mac-move permit
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-1383908352
subject-name cn=IOS-Self-Signed-Certificate-1383908352
rsakeypair TP-self-signed-1383908352
crypto pki certificate chain TP-self-signed-1383908352
certificate self-signed 01
30820252 308201BB A0030201 02020101 300D0609 2A864886 F70D0101 04050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31333833 39303833 3532301E 170D3131 30343232 30333331
35375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 33383339
30383335 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100BD50 C6915FE3 A1789C0E 11A0BABD EC2528DB 3F8FBCF6 64D90C72 AD2D2A13
A012AB72 F5F9EEDE 4E77EDA9 D3CE6985 BA2246A1 21FF6D61 B8FFC558 331CD608
DB59F546 838396C6 29266AF9 6B968127 75A7CE55 6D0B3734 0454EA42 24E9C995
1AC5D0C3 0850D703 F58A2E82 6FB13D8D 372F03D8 A5B2B577 CDB7A9D5 7AFC40B6
B26B0203 010001A3 7A307830 0F060355 1D130101 FF040530 030101FF 30250603
551D1104 1E301C82 1A532D41 322D536D 616C6C2D 312E6369 73636F2D 69726E2E
636F6D30 1F060355 1D230418 30168014 107F4DD8 762989FE 887F813D 62A1D871
C9A4D3D4 301D0603 551D0E04 16041410 7F4DD876 2989FE88 7F813D62 A1D871C9
A4D3D430 0D06092A 864886F7 0D010104 05000381 810045BF 884709EE FA837D06
262E65C8 865912B1 44D5DE7F 459A7DEF DAEB3D94 B2D5A978 5CCF425E 1FED41CE
2046BA9D 130DE1BD 4A7F3F99 B6AD32CA 3857A088 01083AAB 24557476 73F8AAC6
634964A5 455F4DB2 AC36D64E EA2C71AD 296D82B6 CE1EDCCB 0724DB5D 0D332C10
A17D5B1F E8926DC9 137519A1 521C9155 AF9AF52B 00BD
notify syslog contenttype plaintext
spanning-tree etherchannel guard misconfig
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface GigabitEthernet1/0/1
interface GigabitEthernet1/0/2
interface GigabitEthernet1/0/3
description IP Cameras - 4300
switchport access vlan 20
interface GigabitEthernet1/0/4
switchport access vlan 20
interface GigabitEthernet1/0/5
interface GigabitEthernet1/0/6
switchport access vlan 17
interface GigabitEthernet1/0/7
switchport access vlan 17
interface GigabitEthernet1/0/8
switchport access vlan 17
interface GigabitEthernet1/0/9
switchport access vlan 17
interface GigabitEthernet1/0/10
switchport access vlan 17
interface GigabitEthernet1/0/11
switchport access vlan 17
interface GigabitEthernet1/0/12
switchport access vlan 17
interface GigabitEthernet1/0/13
switchport access vlan 17
interface GigabitEthernet1/0/14
switchport access vlan 17
interface GigabitEthernet1/0/15
switchport access vlan 17
interface GigabitEthernet1/0/16
switchport access vlan 17
interface GigabitEthernet1/0/17
switchport access vlan 17
interface GigabitEthernet1/0/18
switchport access vlan 17
interface GigabitEthernet1/0/19
switchport access vlan 17
interface GigabitEthernet1/0/20
switchport access vlan 17
interface GigabitEthernet1/0/21
switchport access vlan 17
interface GigabitEthernet1/0/22
switchport access vlan 17
interface GigabitEthernet1/0/23
switchport access vlan 17
interface GigabitEthernet1/0/24
switchport access vlan 17
interface GigabitEthernet1/0/25
switchport access vlan 17
interface GigabitEthernet1/0/26
switchport access vlan 17
interface GigabitEthernet1/0/27
switchport access vlan 17
interface GigabitEthernet1/0/28
switchport access vlan 17
interface GigabitEthernet1/0/29
switchport access vlan 17
interface GigabitEthernet1/0/30
switchport access vlan 17
interface GigabitEthernet1/0/31
switchport access vlan 17
interface GigabitEthernet1/0/32
switchport access vlan 17
interface GigabitEthernet1/0/33
switchport access vlan 17
interface GigabitEthernet1/0/34
switchport access vlan 17
interface GigabitEthernet1/0/35
switchport access vlan 17
interface GigabitEthernet1/0/36
switchport access vlan 17
interface GigabitEthernet1/0/37
switchport access vlan 17
interface GigabitEthernet1/0/38
switchport access vlan 17
interface GigabitEthernet1/0/39
switchport access vlan 17
interface GigabitEthernet1/0/40
switchport access vlan 17
interface GigabitEthernet1/0/41
switchport access vlan 17
interface GigabitEthernet1/0/42
switchport access vlan 17
interface GigabitEthernet1/0/43
switchport access vlan 17
interface GigabitEthernet1/0/44
switchport access vlan 17
interface GigabitEthernet1/0/45
switchport access vlan 17
interface GigabitEthernet1/0/46
switchport access vlan 17
interface GigabitEthernet1/0/47
switchport access vlan 17
interface GigabitEthernet1/0/48
switchport access vlan 17
interface GigabitEthernet1/0/49
switchport access vlan 17
interface GigabitEthernet1/0/50
switchport access vlan 17
interface GigabitEthernet1/0/51
switchport access vlan 17
interface GigabitEthernet1/0/52
switchport access vlan 17
interface GigabitEthernet2/0/1
interface GigabitEthernet2/0/2
interface GigabitEthernet2/0/3
description Cisco7975 IP phone
switchport access vlan 11
interface GigabitEthernet2/0/4
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
interface GigabitEthernet2/0/5
description Cisco9971 IP phone
switchport access vlan 11
interface GigabitEthernet2/0/6
switchport access vlan 17
interface GigabitEthernet2/0/7
switchport access vlan 17
interface GigabitEthernet2/0/8
switchport access vlan 17
interface GigabitEthernet2/0/9
switchport access vlan 17
interface GigabitEthernet2/0/10
switchport access vlan 17
interface GigabitEthernet2/0/11
switchport access vlan 17
interface GigabitEthernet2/0/12
switchport access vlan 17
interface GigabitEthernet2/0/13
switchport access vlan 17
interface GigabitEthernet2/0/14
switchport access vlan 17
interface GigabitEthernet2/0/15
switchport access vlan 17
interface GigabitEthernet2/0/16
switchport access vlan 17
interface GigabitEthernet2/0/17
switchport access vlan 17
interface GigabitEthernet2/0/18
switchport access vlan 17
interface GigabitEthernet2/0/19
switchport access vlan 17
interface GigabitEthernet2/0/20
switchport access vlan 17
interface GigabitEthernet2/0/21
switchport access vlan 17
interface GigabitEthernet2/0/22
switchport access vlan 17
interface GigabitEthernet2/0/23
switchport access vlan 17
interface GigabitEthernet2/0/24
switchport access vlan 17
interface GigabitEthernet2/0/25
switchport access vlan 17
interface GigabitEthernet2/0/26
switchport access vlan 17
interface GigabitEthernet2/0/27
switchport access vlan 17
interface GigabitEthernet2/0/28
switchport access vlan 17
interface GigabitEthernet2/0/29
switchport access vlan 17
interface GigabitEthernet2/0/30
switchport access vlan 17
interface GigabitEthernet2/0/31
switchport access vlan 17
interface GigabitEthernet2/0/32
switchport access vlan 17
interface GigabitEthernet2/0/33
switchport access vlan 17
interface GigabitEthernet2/0/34
switchport access vlan 17
interface GigabitEthernet2/0/35
switchport access vlan 17
interface GigabitEthernet2/0/36
switchport access vlan 17
interface GigabitEthernet2/0/37
switchport access vlan 17
interface GigabitEthernet2/0/38
switchport access vlan 17
interface GigabitEthernet2/0/39
switchport access vlan 17
interface GigabitEthernet2/0/40
switchport access vlan 17
interface GigabitEthernet2/0/41
switchport access vlan 17
interface GigabitEthernet2/0/42
switchport access vlan 17
interface GigabitEthernet2/0/43
switchport access vlan 17
interface GigabitEthernet2/0/44
switchport access vlan 17
interface GigabitEthernet2/0/45
switchport access vlan 17
interface GigabitEthernet2/0/46
switchport access vlan 17
interface GigabitEthernet2/0/47
switchport access vlan 17
interface GigabitEthernet2/0/48
switchport access vlan 17
interface GigabitEthernet2/0/49
switchport access vlan 17
interface GigabitEthernet2/0/50
switchport access vlan 17
interface GigabitEthernet2/0/51
switchport access vlan 17
interface GigabitEthernet2/0/52
switchport access vlan 17
description Management VLAN for Switch
ip address 10.10.143.11 255.255.255.0
ip default-gateway 10.10.143.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip sla enable reaction-alerts
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps energywise
snmp-server enable traps entity
snmp-server enable traps power-ethernet group 1-4
snmp-server enable traps power-ethernet police
snmp-server enable traps cpu threshold
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps errdisable
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 22518357
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Mini Branch
R-A2-MINI-1
! Last configuration change at 00:50:32 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 00:50:35 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
boot system flash0 c1900-universalk9-mz.SPA.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
service-module wlan-ap 0 bootimage autonomous
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip port-map user-8443 port tcp 8443
ip ips config location flash0: retries 1 timeout 1
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect Inspect-1
parameter-map type inspect global
parameter-map type trend-global trend-glob-map
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-1721465088
subject-name cn=IOS-Self-Signed-Certificate-1721465088
rsakeypair TP-self-signed-1721465088
crypto pki certificate chain TP-self-signed-1721465088
certificate self-signed 01
license udi pid CISCO1941W-A/K9 sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_68719541425
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_68719541431
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_68719541435
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541457
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541461
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541465
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_73014451187
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_73014451193
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_73014451223
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_68719541409
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_src_rule_68719541427
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_src_rule_68719541429
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_68719541433
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_68719541437
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_73014451215
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_73014451217
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group service CSM_INLINE_svc_rule_68719541409
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541425
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541427
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_68719541429
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_68719541431
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service HTTPS-8443
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_68719541437
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_68719541439
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_68719541455
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541457
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_68719541459
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014451187
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451193
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_73014451195
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_73014451197
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_73014451203
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_73014451205
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_73014451207
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451209
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_73014451211
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451213
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_73014451215
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_73014451217
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ICMP-Requests
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_73014451221
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_73014451223
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451388
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014451393
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451395
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451397
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451404
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451406
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network STORE-POS
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
ip ssh authentication-retries 2
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map type inspect CSM_ZBF_POLICY_S_Security_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_Data_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_Data-W_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_WAN_S_Guest
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_S_WAN_S_Data-W
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_S_Voice_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_Guest_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_MGMT_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS
policy-map type inspect CSM_ZBF_POLICY_LOOPBACK_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_WAAS_S_POS-W
policy-map BRANCH-LAN-EDGE-OUT
policy-map type inspect CSM_ZBF_POLICY_S_WAAS_S_Partners
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_S_WAAS_S_POS
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_28
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_30
class type inspect CSM_ZBF_CLASS_MAP_31
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
policy-map type inspect CSM_ZBF_POLICY_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_30
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_S_MGMT_S_POS
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_10
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_36
policy-map type inspect CSM_ZBF_POLICY_S_Voice_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_Guest_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_S_Partners_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_Security_S_POS
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
policy-map type inspect CSM_ZBF_POLICY_S_Data_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_Data-W_S_POS-W
description Store WAN Link
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_S_WAN_S_Data-W
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_S_WAN_S_Guest
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_LOOPBACK_S_POS-W
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_MGMT_S_POS
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_MGMT_S_POS-W
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Security_S_POS
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Security_S_POS-W
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_WAAS_S_POS
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_WAAS_S_POS-W
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_S_WAAS_S_Partners
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS-W
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Data_S_POS
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Data_S_POS-W
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Data-W_S_POS
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Data-W_S_POS-W
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Guest_S_POS
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Guest_S_POS-W
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Partners_S_POS
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Voice_S_POS
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Voice_S_POS-W
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_22
ip address 10.10.158.1 255.255.255.255
zone-member security LOOPBACK
interface GigabitEthernet0/0
ip address 10.10.255.144 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
description Service module interface to manage the embedded AP
ip address 10.10.158.33 255.255.255.252
zone-member security S_WLC-AP
service-module ip address 10.10.158.34 255.255.255.252
service-module ip default-gateway 10.10.158.33
interface GigabitEthernet0/1
description ROUTER LINK TO SWITCH
interface GigabitEthernet0/1.11
ip address 10.10.144.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS
standby 11 ip 10.10.144.1
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.12
ip address 10.10.145.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
standby 12 ip 10.10.145.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.13
ip address 10.10.146.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
standby 13 ip 10.10.146.1
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.14
ip address 10.10.147.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
standby 14 ip 10.10.147.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.15
ip address 10.10.148.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.148.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.16
ip address 10.10.149.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.149.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.17
description WIRELESS-GUEST
ip address 10.10.150.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.150.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.18
description WIRELESS-CONTROL
ip address 10.10.151.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.151.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.19
ip address 10.10.152.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.152.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.20
zone-member security S_Security
service-policy output BRANCH-LAN-EDGE-OUT
interface GigabitEthernet0/1.1000
ip address 10.10.159.2 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.159.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
interface Wlan-GigabitEthernet0/0
description Internal switch interface connecting to the embedded AP
zone-member security S_WLC-AP
service-module ip address 10.10.158.34 255.255.255.252
service-module ip default-gateway 10.10.158.33
zone-member security S_POS
zone-member security S_POS-W
zone-member security S_MGMT
passive-interface default
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.255.11
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_68719541409 object-group
CSM_INLINE_src_rule_68719541409 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451205 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451209 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451213 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451215 object-group
CSM_INLINE_src_rule_73014451215 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_68719541455 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_73014451187 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451187
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_73014451193 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451193
ip access-list extended CSM_ZBF_CMAP_ACL_15
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_73014451221 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_68719541425 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541425
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_73014451197 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_19
permit object-group CSM_INLINE_svc_rule_73014451223 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451223
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541435
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_68719541439 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_22
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_73014451388 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_68719541431 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541431
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451203 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451207 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451211 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451217 object-group
CSM_INLINE_src_rule_73014451217 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_73014451393 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_73014451395 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_73014451397 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_73014451404 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_68719541427 object-group
CSM_INLINE_src_rule_68719541427 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_73014451406 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_68719541459 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541465
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541461
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_68719541457 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541457
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_73014451195 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_68719541433 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_68719541437 object-group
CSM_INLINE_src_rule_68719541437 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_68719541429 object-group
CSM_INLINE_src_rule_68719541429 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group causer v3 priv
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps flash insertion removal
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server enable traps ipsla
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITACCESS IS A
VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
exception data-corruption buffer truncate
scheduler allocate 20000 1000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
S-A2-MINI-1
Building configuration...
Current configuration : 9017 bytes
! Last configuration change at 02:15:02 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:15:04 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-1919348736
subject-name cn=IOS-Self-Signed-Certificate-1919348736
rsakeypair TP-self-signed-1919348736
crypto pki certificate chain TP-self-signed-1919348736
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface GigabitEthernet0/1
interface GigabitEthernet0/2
switchport access vlan 17
interface GigabitEthernet0/3
switchport access vlan 17
interface GigabitEthernet0/4
switchport access vlan 17
interface GigabitEthernet0/5
switchport access vlan 17
interface GigabitEthernet0/6
switchport access vlan 17
interface GigabitEthernet0/7
switchport access vlan 17
interface GigabitEthernet0/8
description Management VLAN for Switch
ip address 10.10.159.11 255.255.255.0
ip default-gateway 10.10.159.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps energywise
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36028654
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
S-A2-MINI-2
Building configuration...
Current configuration : 9094 bytes
! Last configuration change at 02:19:10 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:19:11 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-1919334912
subject-name cn=IOS-Self-Signed-Certificate-1919334912
rsakeypair TP-self-signed-1919334912
crypto pki certificate chain TP-self-signed-1919334912
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
ip ssh authentication-retries 2
interface GigabitEthernet0/1
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
interface GigabitEthernet0/2
switchport access vlan 17
interface GigabitEthernet0/3
switchport access vlan 17
interface GigabitEthernet0/4
switchport access vlan 17
interface GigabitEthernet0/5
switchport access vlan 17
interface GigabitEthernet0/6
switchport access vlan 17
interface GigabitEthernet0/7
switchport access vlan 17
interface GigabitEthernet0/8
description Management VLAN for Switch
ip address 10.10.159.12 255.255.255.0
ip default-gateway 10.10.159.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps energywise
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36028680
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Convenience
R-A2-CONV-1
! Last configuration change at 00:53:21 PST Sat Apr 30 2011 by retail
! NVRAM config last updated at 00:53:22 PST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime msec localtime show-timezone year
service password-encryption
no service password-recovery
boot system flash c890-universalk9-mz.151-3.T.bin
security authentication failure rate 2 log
security passwords min-length 7
enable secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default
aaa accounting commands 15 default
aaa accounting system default
clock summer-time PST recurring
service-module wlan-ap 0 bootimage autonomous
crypto pki token default removal timeout 0
crypto pki trustpoint TP-self-signed-479252603
subject-name cn=IOS-Self-Signed-Certificate-479252603
rsakeypair TP-self-signed-479252603
crypto pki certificate chain TP-self-signed-479252603
certificate self-signed 01
ip domain name cisco-irn.com
ip name-server 192.168.42.130
ip port-map user-8443 port tcp 8443
ip ips config location flash: retries 1 timeout 1
ip ips signature-category
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
multilink bundle-name authenticated
parameter-map type inspect Inspect-1
parameter-map type inspect global
parameter-map type trend-global trend-glob-map
license udi pid CISCO891W-AGN-N-K9 sn <removed>
notify syslog contenttype plaintext
object-group network ActiveDirectory.cisco-irn.com
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
object-group service CISCO-WAAS
description Ports for Cisco WAAS
object-group network DC-ALL
description All of the Data Center
object-group network Stores-ALL
description all store networks
object-group network CSM_INLINE_dst_rule_68719541425
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network WCSManager
description Wireless Manager
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
object-group network DC-Wifi-MSE
description Mobility Service Engines
object-group network CSM_INLINE_dst_rule_68719541431
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-Wifi-Controllers
object-group network PAME-DC-1
object-group network MSP-DC-1
description Data Center VSOM
object-group network CSM_INLINE_dst_rule_68719541435
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541457
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541461
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_dst_rule_68719541465
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network EMC-NCM
description EMC Network Configuration Manager
object-group network RSA-enVision
description RSA EnVision Syslog collector and SIM
object-group network CSM_INLINE_dst_rule_73014451187
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object RSA-enVision
object-group network TACACS
description Csico Secure ACS server for TACACS and Radius
object-group network RSA-AM
description RSA Authentication Manager for SecureID
object-group network NAC-1
description ISE server for NAC
object-group network CSM_INLINE_dst_rule_73014451193
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object ActiveDirectory.cisco-irn.com
object-group network NAC-2
object-group network CSM_INLINE_dst_rule_73014451223
description Generated by CS-Manager from dst of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-Admin
description DC Admin Systems
object-group network CSManager
description Cisco Security Manager
object-group network CSM_INLINE_src_rule_68719541409
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_src_rule_68719541427
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network CSM_INLINE_src_rule_68719541429
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_68719541433
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-WAAS
description WAE Appliances in Data Center
object-group network CSM_INLINE_src_rule_68719541437
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_73014451215
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group network CSM_INLINE_src_rule_73014451217
description Generated by CS-Manager from src of ZbfInspectRule# 0 (Store-Small/mandatory)
group-object DC-POS-Tomax
group-object DC-POS-Oracle
object-group service CSM_INLINE_svc_rule_68719541409
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541425
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541427
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
object-group service TFTP
description Trivial File Transfer
object-group service IP-Protocol-97
description IP protocol 97
object-group service CSM_INLINE_svc_rule_68719541429
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object IP-Protocol-97
object-group service Cisco-Mobility
description Mobility ports for Wireless
object-group service CSM_INLINE_svc_rule_68719541431
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Cisco-Mobility
group-object IP-Protocol-97
object-group service HTTPS-8443
object-group service Microsoft-DS-SMB
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
object-group service CSM_INLINE_svc_rule_68719541437
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_68719541439
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_68719541455
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_68719541457
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service Netbios
description Netbios Servers
object-group service ORACLE-SIM
description Oracle Store Inventory Management
description Windows Remote Desktop
object-group service Workbrain
object-group service CSM_INLINE_svc_rule_68719541459
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014451187
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451193
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service vCenter-to-ESX4
description Communication from vCetner to ESX hosts
object-group service CSM_INLINE_svc_rule_73014451195
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object vCenter-to-ESX4
object-group service ESX-SLP
description CIM Service Location Protocol (SLP) for VMware systems
object-group service CSM_INLINE_svc_rule_73014451197
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object vCenter-to-ESX4
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
object-group service ORACLE-OAS
description OAS uses one port for HTTP and RMI - 12601.
object-group service CSM_INLINE_svc_rule_73014451203
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_73014451205
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ORACLE-Weblogic
object-group service CSM_INLINE_svc_rule_73014451207
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451209
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service TOMAX-8990
description Tomax Application Port
object-group service CSM_INLINE_svc_rule_73014451211
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451213
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service ICMP-Requests
description ICMP requests
object-group service CSM_INLINE_svc_rule_73014451215
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ICMP-Requests
object-group service CSM_INLINE_svc_rule_73014451217
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object ICMP-Requests
object-group service DNS-Resolving
description Domain Name Server
object-group service CSM_INLINE_svc_rule_73014451221
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_73014451223
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451388
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
group-object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014451393
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451395
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451397
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451404
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group service CSM_INLINE_svc_rule_73014451406
description Generated by CS-Manager from service of ZbfInspectRule# 0
(Store-Small/mandatory)
object-group network DC-Applications
description Applications in the Data Center that are non-PCI related(Optimized by
CS-Manager)
192.168.180.0 255.255.254.0
object-group network DC-Voice
description Data Center Voice
192.168.45.0 255.255.255.0
object-group network MS-Update
description Windows Update Server
object-group network MSExchange
description NTP Protocols
object-group network NTP-Servers
object-group network STORE-POS
object-group network vSphere-1
description vSphere server for Lab
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
ip ssh authentication-retries 2
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_7
match protocol microsoft-ds
match protocol netbios-dgm
match protocol netbios-ns
match protocol oracle-em-vp
match protocol oraclenames
class-map type inspect match-all CSM_ZBF_CLASS_MAP_10
match access-group name CSM_ZBF_CMAP_ACL_10
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_23
match access-group name CSM_ZBF_CMAP_ACL_23
match class-map CSM_ZBF_CMAP_PLMAP_16
class-map type inspect match-all CSM_ZBF_CLASS_MAP_32
match access-group name CSM_ZBF_CMAP_ACL_32
class-map type inspect match-all CSM_ZBF_CLASS_MAP_11
match access-group name CSM_ZBF_CMAP_ACL_11
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_5
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_22
match access-group name CSM_ZBF_CMAP_ACL_22
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-all CSM_ZBF_CLASS_MAP_33
match access-group name CSM_ZBF_CMAP_ACL_33
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-all CSM_ZBF_CLASS_MAP_12
match access-group name CSM_ZBF_CMAP_ACL_12
match class-map CSM_ZBF_CMAP_PLMAP_8
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_15
match protocol netbios-ns
match protocol netbios-dgm
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_21
match access-group name CSM_ZBF_CMAP_ACL_21
match class-map CSM_ZBF_CMAP_PLMAP_15
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_30
match access-group name CSM_ZBF_CMAP_ACL_30
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_9
match protocol syslog-conn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_13
match access-group name CSM_ZBF_CMAP_ACL_13
match class-map CSM_ZBF_CMAP_PLMAP_9
class-map type inspect match-all CSM_ZBF_CLASS_MAP_20
match access-group name CSM_ZBF_CMAP_ACL_20
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_20
match protocol netbios-dgm
match protocol netbios-ns
match protocol netbios-ssn
class-map type inspect match-all CSM_ZBF_CLASS_MAP_31
match access-group name CSM_ZBF_CMAP_ACL_31
match class-map CSM_ZBF_CMAP_PLMAP_20
class-map match-all BRANCH-BULK-DATA
match access-group name BULK-DATA-APPS
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_10
match protocol ldap-admin
class-map type inspect match-all CSM_ZBF_CLASS_MAP_14
match access-group name CSM_ZBF_CMAP_ACL_14
match class-map CSM_ZBF_CMAP_PLMAP_10
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-all CSM_ZBF_CLASS_MAP_27
match access-group name CSM_ZBF_CMAP_ACL_27
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-all CSM_ZBF_CLASS_MAP_36
match access-group name CSM_ZBF_CMAP_ACL_36
match class-map CSM_ZBF_CMAP_PLMAP_22
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_15
match access-group name CSM_ZBF_CMAP_ACL_15
match class-map CSM_ZBF_CMAP_PLMAP_11
class-map type inspect match-all CSM_ZBF_CLASS_MAP_26
match access-group name CSM_ZBF_CMAP_ACL_26
match class-map CSM_ZBF_CMAP_PLMAP_17
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_12
match protocol dhcp-failover
class-map type inspect match-all CSM_ZBF_CLASS_MAP_16
match access-group name CSM_ZBF_CMAP_ACL_16
match class-map CSM_ZBF_CMAP_PLMAP_12
class-map type inspect match-all CSM_ZBF_CLASS_MAP_25
match access-group name CSM_ZBF_CMAP_ACL_25
class-map type inspect match-all CSM_ZBF_CLASS_MAP_34
match access-group name CSM_ZBF_CMAP_ACL_34
class-map type inspect match-all CSM_ZBF_CLASS_MAP_17
match access-group name CSM_ZBF_CMAP_ACL_17
class-map type inspect match-all CSM_ZBF_CLASS_MAP_24
match access-group name CSM_ZBF_CMAP_ACL_24
match class-map CSM_ZBF_CMAP_PLMAP_7
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-all CSM_ZBF_CLASS_MAP_35
match access-group name CSM_ZBF_CMAP_ACL_35
match class-map CSM_ZBF_CMAP_PLMAP_21
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-all CSM_ZBF_CLASS_MAP_18
match access-group name CSM_ZBF_CMAP_ACL_18
match class-map CSM_ZBF_CMAP_PLMAP_13
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_19
match access-group name CSM_ZBF_CMAP_ACL_19
match class-map CSM_ZBF_CMAP_PLMAP_14
class-map type inspect match-all CSM_ZBF_CLASS_MAP_29
match access-group name CSM_ZBF_CMAP_ACL_29
match class-map CSM_ZBF_CMAP_PLMAP_18
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-all CSM_ZBF_CLASS_MAP_28
match access-group name CSM_ZBF_CMAP_ACL_28
match class-map CSM_ZBF_CMAP_PLMAP_19
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_1
match access-group name CSM_ZBF_CMAP_ACL_1
match class-map CSM_ZBF_CMAP_PLMAP_1
class-map type inspect match-all CSM_ZBF_CLASS_MAP_3
match access-group name CSM_ZBF_CMAP_ACL_3
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_2
match access-group name CSM_ZBF_CMAP_ACL_2
match class-map CSM_ZBF_CMAP_PLMAP_2
class-map type inspect match-all CSM_ZBF_CLASS_MAP_5
match access-group name CSM_ZBF_CMAP_ACL_5
match class-map CSM_ZBF_CMAP_PLMAP_4
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_4
match access-group name CSM_ZBF_CMAP_ACL_4
match class-map CSM_ZBF_CMAP_PLMAP_3
class-map type inspect match-all CSM_ZBF_CLASS_MAP_7
match access-group name CSM_ZBF_CMAP_ACL_7
match class-map CSM_ZBF_CMAP_PLMAP_5
class-map type inspect match-all CSM_ZBF_CLASS_MAP_6
match access-group name CSM_ZBF_CMAP_ACL_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_9
match access-group name CSM_ZBF_CMAP_ACL_9
class-map type inspect match-any CSM_ZBF_CMAP_PLMAP_6
class-map type inspect match-all CSM_ZBF_CLASS_MAP_8
match access-group name CSM_ZBF_CMAP_ACL_8
match class-map CSM_ZBF_CMAP_PLMAP_6
class-map match-all BULK-DATA
class-map match-all INTERACTIVE-VIDEO
class-map match-any BRANCH-TRANSACTIONAL-DATA
match protocol http url "*SalesReport*"
match access-group name TRANSACTIONAL-DATA-APPS
class-map match-all BRANCH-MISSION-CRITICAL
match access-group name MISSION-CRITICAL-SERVERS
class-map match-all VOICE
class-map match-all MISSION-CRITICAL-DATA
class-map match-any BRANCH-NET-MGMT
match access-group name NET-MGMT-APPS
class-map match-all ROUTING
class-map match-all SCAVENGER
class-map match-all NET-MGMT
class-map match-any BRANCH-SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-all TRANSACTIONAL-DATA
policy-map type inspect CSM_ZBF_POLICY_S_Security_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_Data_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_Data-W_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_WAN_S_Guest
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_S_WAN_S_Data-W
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_S_Voice_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_Guest_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_MGMT_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS
policy-map type inspect CSM_ZBF_POLICY_LOOPBACK_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_WAAS_S_POS-W
policy-map BRANCH-LAN-EDGE-OUT
policy-map type inspect CSM_ZBF_POLICY_S_WAAS_S_Partners
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_S_WAAS_S_POS
policy-map BRANCH-WAN-EDGE
class MISSION-CRITICAL-DATA
policy-map type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_28
policy-map type inspect CSM_ZBF_POLICY_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_29
class type inspect CSM_ZBF_CLASS_MAP_30
class type inspect CSM_ZBF_CLASS_MAP_31
policy-map type inspect CSM_ZBF_POLICY_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_24
class type inspect CSM_ZBF_CLASS_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
policy-map type inspect CSM_ZBF_POLICY_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_25
class type inspect CSM_ZBF_CLASS_MAP_26
class type inspect CSM_ZBF_CLASS_MAP_27
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
policy-map type inspect CSM_ZBF_POLICY_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_22
policy-map type inspect CSM_ZBF_POLICY_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_23
policy-map type inspect CSM_ZBF_POLICY_MAP_12
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_20
policy-map type inspect CSM_ZBF_POLICY_MAP_21
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_30
class type inspect CSM_ZBF_CLASS_MAP_34
class type inspect CSM_ZBF_CLASS_MAP_35
policy-map type inspect CSM_ZBF_POLICY_S_MGMT_S_POS
policy-map type inspect CSM_ZBF_POLICY_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_21
policy-map type inspect CSM_ZBF_POLICY_MAP_20
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_32
class type inspect CSM_ZBF_CLASS_MAP_33
policy-map type inspect CSM_ZBF_POLICY_MAP_10
policy-map type inspect CSM_ZBF_POLICY_MAP_11
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_18
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
policy-map type inspect CSM_ZBF_POLICY_MAP_22
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_19
class type inspect CSM_ZBF_CLASS_MAP_17
class type inspect CSM_ZBF_CLASS_MAP_36
policy-map type inspect CSM_ZBF_POLICY_S_Voice_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_S_Guest_S_POS-W
policy-map type inspect CSM_ZBF_POLICY_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_13
class type inspect CSM_ZBF_CLASS_MAP_14
class type inspect CSM_ZBF_CLASS_MAP_15
class type inspect CSM_ZBF_CLASS_MAP_16
class type inspect CSM_ZBF_CLASS_MAP_17
policy-map type inspect CSM_ZBF_POLICY_MAP_8
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_12
policy-map type inspect CSM_ZBF_POLICY_MAP_7
class type inspect CSM_ZBF_CLASS_MAP_9
class type inspect CSM_ZBF_CLASS_MAP_10
class type inspect CSM_ZBF_CLASS_MAP_11
policy-map type inspect CSM_ZBF_POLICY_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_5
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_8
policy-map type inspect CSM_ZBF_POLICY_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_6
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_7
policy-map type inspect CSM_ZBF_POLICY_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_3
class type inspect CSM_ZBF_CLASS_MAP_5
policy-map type inspect CSM_ZBF_POLICY_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_4
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_1
class type inspect CSM_ZBF_CLASS_MAP_2
class type inspect CSM_ZBF_CLASS_MAP_3
policy-map type inspect CSM_ZBF_POLICY_S_Partners_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_Security_S_POS
policy-map BRANCH-LAN-EDGE-IN
class BRANCH-MISSION-CRITICAL
class BRANCH-TRANSACTIONAL-DATA
policy-map type inspect CSM_ZBF_POLICY_S_Data_S_POS
policy-map type inspect CSM_ZBF_POLICY_S_Data-W_S_POS-W
description Store WAN Link
description Loopback interface
description VLAN1000 Management
description VLAN20 Physical Security Systems
description VLAN19 WAAS optimization
description VLAN18 Wireless Systems
description VLAN12 Store Data
description VLAN14 Store Wireless Data
description VLAN17 Guest/Public Wireless
description VLAN13 Store Voice
description VLAN16 Partner network
description VLAN 11 POS Data
description VLAN15 Store Wireless POS
zone-pair security CSM_S_WAN-LOOPBACK_1 source S_WAN destination LOOPBACK
service-policy type inspect CSM_ZBF_POLICY_MAP_1
zone-pair security CSM_S_WAN-S_MGMT_1 source S_WAN destination S_MGMT
service-policy type inspect CSM_ZBF_POLICY_MAP_2
zone-pair security CSM_S_WAN-S_Security_1 source S_WAN destination S_Security
service-policy type inspect CSM_ZBF_POLICY_MAP_3
zone-pair security CSM_S_WAN-S_WAAS_1 source S_WAN destination S_WAAS
service-policy type inspect CSM_ZBF_POLICY_MAP_4
zone-pair security CSM_S_WAN-S_WLC-AP_1 source S_WAN destination S_WLC-AP
service-policy type inspect CSM_ZBF_POLICY_MAP_5
zone-pair security CSM_S_WAN-S_Data_1 source S_WAN destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_Data-W_1 source S_WAN destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_S_WAN_S_Data-W
zone-pair security CSM_S_WAN-S_Guest_1 source S_WAN destination S_Guest
service-policy type inspect CSM_ZBF_POLICY_S_WAN_S_Guest
zone-pair security CSM_S_WAN-S_Partners_1 source S_WAN destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_MAP_6
zone-pair security CSM_S_WAN-S_POS_1 source S_WAN destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_POS-W_1 source S_WAN destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_7
zone-pair security CSM_S_WAN-S_Voice_1 source S_WAN destination S_Voice
service-policy type inspect CSM_ZBF_POLICY_MAP_8
zone-pair security CSM_LOOPBACK-S_WAN_1 source LOOPBACK destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_9
zone-pair security CSM_LOOPBACK-S_POS_1 source LOOPBACK destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_LOOPBACK-S_POS-W_1 source LOOPBACK destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_LOOPBACK_S_POS-W
zone-pair security CSM_S_MGMT-S_WAN_1 source S_MGMT destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_11
zone-pair security CSM_S_MGMT-S_POS_1 source S_MGMT destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_MGMT_S_POS
zone-pair security CSM_S_MGMT-S_POS-W_1 source S_MGMT destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_MGMT_S_POS-W
zone-pair security CSM_S_Security-S_WAN_1 source S_Security destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_12
zone-pair security CSM_S_Security-S_POS_1 source S_Security destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Security_S_POS
zone-pair security CSM_S_Security-S_POS-W_1 source S_Security destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Security_S_POS-W
zone-pair security CSM_S_WAAS-S_WAN_1 source S_WAAS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_13
zone-pair security CSM_S_WAAS-S_POS_1 source S_WAAS destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_WAAS_S_POS
zone-pair security CSM_S_WAAS-S_POS-W_1 source S_WAAS destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_WAAS_S_POS-W
zone-pair security CSM_S_WAAS-S_Data_1 source S_WAAS destination S_Data
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Data-W_1 source S_WAAS destination S_Data-W
service-policy type inspect CSM_ZBF_POLICY_MAP_14
zone-pair security CSM_S_WAAS-S_Partners_1 source S_WAAS destination S_Partners
service-policy type inspect CSM_ZBF_POLICY_S_WAAS_S_Partners
zone-pair security CSM_S_WLC-AP-S_WAN_1 source S_WLC-AP destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_15
zone-pair security CSM_S_WLC-AP-S_POS_1 source S_WLC-AP destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS
zone-pair security CSM_S_WLC-AP-S_POS-W_1 source S_WLC-AP destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_WLC-AP_S_POS-W
zone-pair security CSM_S_POS-S_WAN_1 source S_POS destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_16
zone-pair security CSM_S_POS-W-S_WAN_1 source S_POS-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_17
zone-pair security CSM_S_POS-W-S_POS_1 source S_POS-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_MAP_18
zone-pair security CSM_S_Data-S_POS_1 source S_Data destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Data_S_POS
zone-pair security CSM_S_Data-S_POS-W_1 source S_Data destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Data_S_POS-W
zone-pair security CSM_S_Data-S_WAN_1 source S_Data destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_Data-W-S_POS_1 source S_Data-W destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Data-W_S_POS
zone-pair security CSM_S_Data-W-S_POS-W_1 source S_Data-W destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Data-W_S_POS-W
zone-pair security CSM_S_Data-W-S_WAN_1 source S_Data-W destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_19
zone-pair security CSM_S_Guest-S_POS_1 source S_Guest destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Guest_S_POS
zone-pair security CSM_S_Guest-S_POS-W_1 source S_Guest destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Guest_S_POS-W
zone-pair security CSM_S_Guest-S_WAN_1 source S_Guest destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_20
zone-pair security CSM_S_Partners-S_POS_1 source S_Partners destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Partners_S_POS
zone-pair security CSM_S_Partners-S_POS-W_1 source S_Partners destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_MAP_10
zone-pair security CSM_S_Partners-S_WAN_1 source S_Partners destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_21
zone-pair security CSM_S_Voice-S_POS_1 source S_Voice destination S_POS
service-policy type inspect CSM_ZBF_POLICY_S_Voice_S_POS
zone-pair security CSM_S_Voice-S_POS-W_1 source S_Voice destination S_POS-W
service-policy type inspect CSM_ZBF_POLICY_S_Voice_S_POS-W
zone-pair security CSM_S_Voice-S_WAN_1 source S_Voice destination S_WAN
service-policy type inspect CSM_ZBF_POLICY_MAP_22
ip address 10.10.174.1 255.255.255.255
zone-member security LOOPBACK
switchport access vlan 17
switchport access vlan 17
switchport access vlan 17
switchport access vlan 17
switchport access vlan 17
switchport access vlan 17
switchport access vlan 17
interface FastEthernet8.1
interface GigabitEthernet0
ip address 10.10.255.160 255.255.255.0
zone-member security S_WAN
service-policy output BRANCH-WAN-EDGE
description Service module interface to manage the embedded AP
ip address 10.10.174.33 255.255.255.252
zone-member security S_WLC-AP
service-module ip address 10.10.174.34 255.255.255.252
service-module ip default-gateway 10.10.174.33
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
zone-member security S_WLC-AP
service-module ip address 10.10.174.34 255.255.255.252
service-module ip default-gateway 10.10.174.33
zone-member security S_POS
ip address 10.10.160.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS
standby 11 ip 10.10.160.1
ip igmp query-interval 125
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.161.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data
standby 12 ip 10.10.161.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.162.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Voice
standby 13 ip 10.10.162.1
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.163.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Data-W
standby 14 ip 10.10.163.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.164.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_POS-W
standby 15 ip 10.10.164.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.165.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Partners
standby 16 ip 10.10.165.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
description WIRELESS-GUEST
ip address 10.10.166.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Guest
standby 17 ip 10.10.166.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
description WIRELESS-CONTROL
ip address 10.10.167.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WLC-AP
standby 18 ip 10.10.167.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.168.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_WAAS
standby 19 ip 10.10.168.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.169.2 255.255.255.0
ip helper-address 192.168.42.130
zone-member security S_Security
standby 20 ip 10.10.169.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
ip address 10.10.175.2 255.255.255.0
zone-member security S_MGMT
standby 100 ip 10.10.175.1
service-policy input BRANCH-LAN-EDGE-IN
service-policy output BRANCH-LAN-EDGE-OUT
passive-interface default
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip route 0.0.0.0 0.0.0.0 10.10.255.11
ip tacacs source-interface Loopback0
ip access-list extended BULK-DATA-APPS
remark ---File Transfer---
permit tcp any any eq ftp
permit tcp any any eq ftp-data
remark ---E-mail traffic---
permit tcp any any eq smtp
permit tcp any any eq pop3
permit tcp any any eq 143
remark ---other EDM app protocols---
permit tcp any any range 3460 3466
permit tcp any range 3460 3466 any
remark ---messaging services---
permit tcp any any eq 2980
permit tcp any eq 2980 any
remark ---Microsoft file services---
permit tcp any any range 137 139
permit tcp any range 137 139 any
ip access-list extended CSM_ZBF_CMAP_ACL_1
remark Data Center Mgmt to Devices
permit object-group CSM_INLINE_svc_rule_68719541409 object-group
CSM_INLINE_src_rule_68719541409 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_10
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451205 object-group DC-POS-Oracle
object-group STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451209 object-group DC-POS-SAP object-group
STORE-POS
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451213 object-group DC-POS-Tomax
object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_11
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451215 object-group
CSM_INLINE_src_rule_73014451215 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_12
remark Data Center VOICE (wired and Wireless)
permit object-group CSM_INLINE_svc_rule_68719541455 object-group DC-Voice object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_13
remark Syslog and SNMP Alerts
permit object-group CSM_INLINE_svc_rule_73014451187 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451187
ip access-list extended CSM_ZBF_CMAP_ACL_14
remark Store to Data Center Authentications
permit object-group CSM_INLINE_svc_rule_73014451193 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451193
ip access-list extended CSM_ZBF_CMAP_ACL_15
remark Store to Data Center for NTP
permit object-group NTP object-group Stores-ALL object-group NTP-Servers
ip access-list extended CSM_ZBF_CMAP_ACL_16
remark Store to Data Center for DHCP and DNS
permit object-group CSM_INLINE_svc_rule_73014451221 object-group Stores-ALL object-group
ActiveDirectory.cisco-irn.com
ip access-list extended CSM_ZBF_CMAP_ACL_17
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_68719541425 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541425
ip access-list extended CSM_ZBF_CMAP_ACL_18
remark Store UCS E-series server to Data Center vShphere
permit object-group CSM_INLINE_svc_rule_73014451197 object-group Stores-ALL object-group
vSphere-1
ip access-list extended CSM_ZBF_CMAP_ACL_19
permit object-group CSM_INLINE_svc_rule_73014451223 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_73014451223
ip access-list extended CSM_ZBF_CMAP_ACL_2
remark Data Center subscribe to IPS SDEE events
permit tcp object-group RSA-enVision object-group Stores-ALL eq 443
ip access-list extended CSM_ZBF_CMAP_ACL_20
remark Store to Data Center Physical Security
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541435
ip access-list extended CSM_ZBF_CMAP_ACL_21
remark Store WAAS (WAAS Devices need their own zone)
permit object-group CSM_INLINE_svc_rule_68719541439 object-group Stores-ALL object-group
DC-WAAS
ip access-list extended CSM_ZBF_CMAP_ACL_22
remark Store WAAS to Clients and Servers
permit object-group CSM_INLINE_svc_rule_73014451388 object-group Stores-ALL object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_23
remark Store to Data Center wireless controller traffic
permit object-group CSM_INLINE_svc_rule_68719541431 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541431
ip access-list extended CSM_ZBF_CMAP_ACL_24
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451203 object-group STORE-POS object-group
DC-POS-Oracle
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451207 object-group STORE-POS object-group
DC-POS-SAP
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451211 object-group STORE-POS object-group
DC-POS-Tomax
ip access-list extended CSM_ZBF_CMAP_ACL_25
remark Permit POS systems to talk to Data Center Servers
permit object-group CSM_INLINE_svc_rule_73014451217 object-group
CSM_INLINE_src_rule_73014451217 object-group STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_26
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_73014451393 object-group STORE-POS object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_27
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_73014451395 object-group STORE-POS object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_28
remark Permit POS clients to talk to store POS server
permit object-group CSM_INLINE_svc_rule_73014451397 object-group STORE-POS object-group
STORE-POS
ip access-list extended CSM_ZBF_CMAP_ACL_29
remark Store to Data Center for Windows Updates
permit object-group CSM_INLINE_svc_rule_73014451404 object-group Stores-ALL object-group
MS-Update
ip access-list extended CSM_ZBF_CMAP_ACL_3
remark Permit ICMP traffic
permit object-group CSM_INLINE_svc_rule_68719541427 object-group
CSM_INLINE_src_rule_68719541427 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_30
remark Store to Data Center for E-mail
permit object-group CSM_INLINE_svc_rule_73014451406 object-group Stores-ALL object-group
MSExchange
ip access-list extended CSM_ZBF_CMAP_ACL_31
remark Store DATA (wired and Wireless - Access to DC Other applications)
permit object-group CSM_INLINE_svc_rule_68719541459 object-group Stores-ALL object-group
DC-Applications
ip access-list extended CSM_ZBF_CMAP_ACL_32
remark Store GUEST - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541465
ip access-list extended CSM_ZBF_CMAP_ACL_33
remark Store GUEST (access to internet/DMZ web servers)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_34
remark Store PARTNERS - Drop Traffic to Enterprise
permit ip object-group Stores-ALL object-group CSM_INLINE_dst_rule_68719541461
ip access-list extended CSM_ZBF_CMAP_ACL_35
remark Store PARTNERS (wired and wireless - Access to Partner site, Internet VPN)
permit ip object-group Stores-ALL any
ip access-list extended CSM_ZBF_CMAP_ACL_36
remark Store VOICE (wired and Wireless - Acess to corporate wide voice)
permit object-group CSM_INLINE_svc_rule_68719541457 object-group Stores-ALL object-group
CSM_INLINE_dst_rule_68719541457
ip access-list extended CSM_ZBF_CMAP_ACL_4
remark Data Center vSphere to UCS E-series server
permit object-group CSM_INLINE_svc_rule_73014451195 object-group vSphere-1 object-group
Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_5
remark Data Center to Store Physical Security
permit ip object-group CSM_INLINE_src_rule_68719541433 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_6
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_7
remark Data Center WAAS to Store
permit object-group CSM_INLINE_svc_rule_68719541437 object-group
CSM_INLINE_src_rule_68719541437 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_8
remark Data Center Wireless Control to AP's and Controllers in stores
permit object-group CSM_INLINE_svc_rule_68719541429 object-group
CSM_INLINE_src_rule_68719541429 object-group Stores-ALL
ip access-list extended CSM_ZBF_CMAP_ACL_9
remark Data Center Mgmt to Devices
permit object-group RDP object-group DC-Admin object-group STORE-POS
ip access-list extended MISSION-CRITICAL-SERVERS
remark ---POS Applications---
permit ip any 192.168.52.0 0.0.0.255
ip access-list extended NET-MGMT-APPS
remark - Router user Authentication - Identifies TACACS Control traffic
permit tcp any any eq tacacs
permit tcp any eq tacacs any
ip access-list extended TRANSACTIONAL-DATA-APPS
remark ---Workbrain Application---
remark --Large Store Clock Server to Central Clock Application
permit tcp host 10.10.49.94 host 192.168.46.72 eq 8444
remark --Large store Clock Server to CUAE
permit tcp host 10.10.49.94 host 192.168.45.185 eq 8000
remark ---LiteScape Application---
permit ip any host 192.168.46.82
permit ip any 239.192.0.0 0.0.0.255
permit ip any host 239.255.255.250
remark ---Remote Desktop---
permit tcp any any eq 3389
permit tcp any eq 3389 any
permit tcp any 192.168.46.0 0.0.0.255 eq 7777
permit tcp any 192.168.46.0 0.0.0.255 eq 6003
permit tcp any 192.168.46.0 0.0.0.255 range 12401 12500
permit tcp 192.168.46.0 0.0.0.255 eq 7777 any
permit tcp 192.168.46.0 0.0.0.255 eq 6003 any
permit tcp 192.168.46.0 0.0.0.255 range 12401 12500 any
logging source-interface Loopback0
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group causer v3 priv
snmp-server group remoteuser v3 noauth
snmp-server trap-source Loopback0
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps flash insertion removal
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps energywise
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps entity
snmp-server enable traps hsrp
snmp-server enable traps cpu threshold
snmp-server enable traps rsvp
snmp-server enable traps ipsla
snmp-server enable traps syslog
snmp-server enable traps vtp
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server domain-stripping
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
scheduler max-task-time 5000
ntp server 192.168.62.161 prefer
ntp server 192.168.62.162
S-A2-CONV-1
Building configuration...
Current configuration : 8808 bytes
! Last configuration change at 02:11:23 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:11:23 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime localtime show-timezone
service password-encryption
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-3179870208
subject-name cn=IOS-Self-Signed-Certificate-3179870208
rsakeypair TP-self-signed-3179870208
crypto pki certificate chain TP-self-signed-3179870208
certificate self-signed 01
notify syslog contenttype plaintext
spanning-tree extend system-id
vlan internal allocation policy ascending
interface FastEthernet0/1
interface FastEthernet0/2
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
interface FastEthernet0/3
interface FastEthernet0/4
interface FastEthernet0/5
interface FastEthernet0/6
interface FastEthernet0/7
interface FastEthernet0/8
interface GigabitEthernet0/1
description Management VLAN for Switch
ip address 10.10.175.11 255.255.255.0
ip default-gateway 10.10.175.1
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
ip sla enable reaction-alerts
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps dot1x auth-fail-vlan guest-vlan no-auth-fail-vlan no-guest-vlan
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps power-ethernet group 1
snmp-server enable traps power-ethernet police
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps config-ctid
snmp-server enable traps energywise
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps mac-notification change move threshold
snmp-server enable traps vlan-membership
snmp-server enable traps errdisable
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131 timeout 5
tacacs-server directed-request
tacacs-server key 7 <removed>
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36028799
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer
Managed Service Provider
FW-A2-MSP-1
Cisco Adaptive Security Appliance Software Version 9.0(0)129
Device Manager Version 7.0(0)40
Compiled on Wed 03-Oct-12 14:19 PDT by builders
System image file is "disk0:/asa900-129-smp-k8.bin"
Config file at boot was "startup-config"
FW-A2-MSP-1 up 97 days 23 hours
Hardware: ASA5515, 8192 MB RAM, CPU Clarkdale 3058 MHz, 1 CPU (4 cores)
ASA: 4096 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 8192MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB
Encryption hardware device : Cisco ASA-55xx on-board accelerator (revision 0x1)
Boot microcode : CNPx-MC-BOOT-2.00
SSL/IKE microcode : CNPx-MC-SSL-PLUS-T020
IPSec microcode : CNPx-MC-IPSEC-MAIN-0022
Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4
0: Int: Internal-Data0/0 : address is d48c.b54d.9520, irq 11
1: Ext: GigabitEthernet0/0 : address is d48c.b54d.9524, irq 10
2: Ext: GigabitEthernet0/1 : address is d48c.b54d.9521, irq 10
3: Ext: GigabitEthernet0/2 : address is d48c.b54d.9525, irq 5
4: Ext: GigabitEthernet0/3 : address is d48c.b54d.9522, irq 5
5: Ext: GigabitEthernet0/4 : address is d48c.b54d.9526, irq 10
6: Ext: GigabitEthernet0/5 : address is d48c.b54d.9523, irq 10
7: Int: Internal-Data0/1 : address is 0000.0001.0002, irq 0
8: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
9: Int: Internal-Data0/2 : address is 0000.0001.0003, irq 0
10: Ext: Management0/0 : address is d48c.b54d.9520, irq 0
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited perpetual
Maximum VLANs : 100 perpetual
Inside Hosts : Unlimited perpetual
Failover : Active/Active perpetual
Encryption-DES : Enabled perpetual
Encryption-3DES-AES : Enabled perpetual
Security Contexts : 5 perpetual
GTP/GPRS : Disabled perpetual
AnyConnect Premium Peers : 10 perpetual
AnyConnect Essentials : 250 perpetual
Other VPN Peers : 250 perpetual
Total VPN Peers : 250 perpetual
Shared License : Disabled perpetual
AnyConnect for Mobile : Enabled perpetual
AnyConnect for Cisco VPN Phone : Enabled perpetual
Advanced Endpoint Assessment : Enabled perpetual
UC Phone Proxy Sessions : 2 perpetual
Total UC Proxy Sessions : 2 perpetual
Botnet Traffic Filter : Disabled perpetual
Intercompany Media Engine : Enabled perpetual
IPS Module : Enabled perpetual
Cluster : Disabled perpetual
This platform has an ASA 5515 Security Plus license.
Serial Number: FCH162771K6
Running Permanent Activation Key: 0xbb3ac554 0x607ed951 0x5d428d70 0xcec038dc 0x0d09f584
Configuration register is 0x1
Configuration last modified by bmcgloth at 13:15:34.337 PST Fri Dec 21 2012
domain-name cisco-irn.com
enable password WKlYt0jXwtQLFcz7 encrypted
passwd WKlYt0jXwtQLFcz7 encrypted
interface GigabitEthernet0/0
ip address 10.10.255.176 255.255.255.0
interface GigabitEthernet0/1
interface GigabitEthernet0/1.11
ip address 10.10.176.1 255.255.255.0
interface GigabitEthernet0/1.12
ip address 10.10.177.1 255.255.255.0
interface GigabitEthernet0/1.13
ip address 10.10.178.1 255.255.255.0
interface GigabitEthernet0/1.14
ip address 10.10.179.1 255.255.255.0
interface GigabitEthernet0/1.15
ip address 10.10.180.1 255.255.255.0
interface GigabitEthernet0/1.16
ip address 10.10.181.1 255.255.255.0
interface GigabitEthernet0/1.17
ip address 10.10.182.1 255.255.255.0
interface GigabitEthernet0/1.18
ip address 10.10.183.1 255.255.255.0
interface GigabitEthernet0/1.19
ip address 10.10.184.1 255.255.255.0
interface GigabitEthernet0/1.1000
ip address 10.10.191.1 255.255.255.0
interface GigabitEthernet0/2
interface GigabitEthernet0/3
interface GigabitEthernet0/4
interface GigabitEthernet0/5
description IPS management connection
banner exec **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner exec **** AUTHORIZED USERS ONLY! ****
banner exec ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
banner exec TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE
NECESSARY
banner exec TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
banner exec REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME
WITHOUT
banner exec FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
banner exec CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
banner exec ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
banner exec UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS.
banner login THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
banner asdm **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner asdm **** AUTHORIZED USERS ONLY! ****
banner asdm ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH AD
DITIONAL MONITORING AS MAY BE NECESSARY TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM
ADMINISTRATOR OR OTHER REPRESENTATIVES OF T
HE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT FURTHER NOTICE OR CONSENT.
UNAUTHORIZED USE OF THIS SYSTEM AND ANY O
THER CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW ENFORCEMENT
OFFICIALS AND PROSECUTION TO THE F
banner asdm UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS
boot system disk0:/asa900-129-smp-k8.bin
clock summer-time PDT recurring
dns domain-lookup MSP-WAN
dns server-group DefaultDNS
name-server 192.168.42.130
domain-name cisco-irn.com
same-security-traffic permit inter-interface
object network AdminStation
object network AdminStation2
object network AdminStation4-bart
description Cisco Security Manager
object network AdminStation3
object network ActiveDirectory.cisco-irn.com
subnet 192.168.52.0 255.255.255.0
description POS in the Data Center
object network WCSManager
description Wireless Manager
description Data Center VSOM
subnet 192.168.0.0 255.255.0.0
description All of the Data Center
object network RSA-enVision
description RSA EnVision Syslog collector and SIM
description Csico Secure ACS server for TACACS and Radius
description RSA Authentication Manager for SecureID
description ISE server for NAC
description Windows Update Server
object network MSExchange
service tcp destination eq 135
service tcp destination eq 3268
object service LDAP-GC-SSL
service tcp destination eq 3269
object service Kerberos-TCP
service tcp destination eq 88
object service Microsoft-DS-SMB
service tcp destination eq 445
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
service udp destination eq 389
object service RPC-HighPorts
service tcp destination range 1024 65535
object service ORACLE-OAS
service tcp destination eq 12601
description OAS uses one port for HTTP and RMI - 12601.
object service TOMAX-8990
service tcp destination eq 8990
description Tomax Application Port
object service IP-Protocol-97
description IP protocol 97
service tcp destination eq 1080
service tcp destination eq 8080
service tcp destination eq 3389
description Windows Remote Desktop
object-group network CSM_INLINE_src_rule_73014461090
description Generated by CS-Manager from src of FirewallRule# 1 (ASA-Store_V2/mandatory)
network-object object AdminStation
network-object object AdminStation2
network-object object AdminStation4-bart
object-group network Admin-Systems
network-object object AdminStation
network-object object AdminStation2
network-object object CSManager
network-object object AdminStation4-bart
network-object object LMS
network-object object AdminStation3
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
network-object 192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
network-object 192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
network-object 192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_73014461184
description Generated by CS-Manager from src of FirewallRule# 4 (ASA-Store_V2/mandatory)
group-object DC-POS-Tomax
network-object object DC-POS
group-object DC-POS-Oracle
object-group network POS-Store-MSP
network-object 10.10.176.81 255.255.255.255
object-group network CSM_INLINE_dst_rule_73014461438
description Generated by CS-Manager from dst of FirewallRule# 5 (ASA-Store_V2/mandatory)
group-object DC-POS-Tomax
network-object object DC-POS
group-object DC-POS-Oracle
object-group network Store-MSP-POS-net
network-object 10.10.176.0 255.255.255.0
network-object 10.10.180.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_73014461436
description Generated by CS-Manager from dst of FirewallRule# 7 (ASA-Store_V2/mandatory)
group-object DC-POS-Tomax
network-object object DC-POS
group-object DC-POS-Oracle
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
network-object 192.168.43.21 255.255.255.255
network-object 192.168.43.22 255.255.255.255
object-group network DC-Wifi-MSE
description Mobility Service Engines
network-object 192.168.43.31 255.255.255.255
network-object 192.168.43.32 255.255.255.255
object-group network CSM_INLINE_src_rule_73014461098
description Generated by CS-Manager from src of FirewallRule# 8 (ASA-Store_V2/mandatory)
network-object object WCSManager
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_73014461100
description Generated by CS-Manager from src of FirewallRule# 9 (ASA-Store_V2/mandatory)
network-object object PAME-DC-1
network-object object MSP-DC-1
object-group network DC-WAAS
description WAE Appliances in Data Center
network-object 192.168.48.10 255.255.255.255
network-object 192.168.49.10 255.255.255.255
network-object 192.168.47.11 255.255.255.255
network-object 192.168.47.12 255.255.255.255
object-group network NTP-Servers
network-object 192.168.62.161 255.255.255.255
network-object 162.168.62.162 255.255.255.255
object-group network CSM_INLINE_dst_rule_73014461120
description Generated by CS-Manager from dst of FirewallRule# 17 (ASA-Store_V2/mandatory)
network-object object TACACS
network-object object RSA-AM
network-object object NAC-2
network-object object NAC-1
object-group network CSM_INLINE_dst_rule_73014461126
description Generated by CS-Manager from dst of FirewallRule# 18 (ASA-Store_V2/mandatory)
network-object object PAME-DC-1
network-object object MSP-DC-1
object-group network CSM_INLINE_dst_rule_73014461128
description Generated by CS-Manager from dst of FirewallRule# 19 (ASA-Store_V2/mandatory)
group-object DC-Wifi-Controllers
object-group service HTTPS-8443
service-object tcp destination eq 8443
object-group service CSM_INLINE_svc_rule_73014461092
description Generated by CS-Manager from service of FirewallRule# 2
(ASA-Store_V2/mandatory)
service-object tcp destination eq ssh
service-object tcp destination eq https
service-object udp destination eq snmp
object-group service DNS-Resolving
description Domain Name Server
service-object tcp destination eq domain
service-object udp destination eq domain
object-group service CSM_INLINE_svc_rule_73014461094
description Generated by CS-Manager from service of FirewallRule# 3
(ASA-Store_V2/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq ntp
service-object udp destination eq netbios-dgm
service-object object RPC
service-object object LDAP-GC
service-object object LDAP-GC-SSL
service-object object Kerberos-TCP
service-object object Microsoft-DS-SMB
service-object object LDAP-UDP
service-object object RPC-HighPorts
group-object DNS-Resolving
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
service-object tcp destination range 1300 1319
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
service-object tcp destination eq 7001
service-object tcp destination eq 7002
service-object tcp destination eq sqlnet
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
service-object tcp destination eq 2809
service-object tcp destination eq 9443
service-object tcp destination eq 1414
object-group service CSM_INLINE_svc_rule_73014461184
description Generated by CS-Manager from service of FirewallRule# 4
(ASA-Store_V2/mandatory)
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object object ORACLE-OAS
service-object object TOMAX-8990
group-object ORACLE-Weblogic
object-group service TFTP
description Trivial File Transfer
service-object tcp destination eq 69
service-object udp destination eq tftp
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
service-object udp destination eq 12222
service-object udp destination eq 12223
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
service-object udp destination eq 5246
service-object udp destination eq 5247
object-group service CSM_INLINE_svc_rule_73014461098
description Generated by CS-Manager from service of FirewallRule# 8
(ASA-Store_V2/mandatory)
service-object tcp destination eq https
service-object tcp destination eq www
service-object udp destination eq isakmp
service-object tcp destination eq telnet
service-object tcp destination eq ssh
service-object object IP-Protocol-97
object-group service CSM_INLINE_svc_rule_73014461102
description Generated by CS-Manager from service of FirewallRule# 10
(ASA-Store_V2/mandatory)
service-object icmp echo-reply
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object tcp destination eq ftp
service-object object TCP1080
service-object object TCP8080
service-object object RDP
object-group service CISCO-WAAS
description Ports for Cisco WAAS
service-object tcp destination eq 4050
object-group service Netbios
description Netbios Servers
service-object udp destination eq netbios-dgm
service-object udp destination eq netbios-ns
service-object tcp destination eq netbios-ssn
object-group service CSM_INLINE_svc_rule_73014461104
description Generated by CS-Manager from service of FirewallRule# 11
(ASA-Store_V2/mandatory)
service-object object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014461106
description Generated by CS-Manager from service of FirewallRule# 12
(ASA-Store_V2/mandatory)
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service CSM_INLINE_svc_rule_73014461112
description Generated by CS-Manager from service of FirewallRule# 14
(ASA-Store_V2/mandatory)
service-object udp destination eq snmptrap
service-object udp destination eq snmp
service-object udp destination eq syslog
object-group service CSM_INLINE_svc_rule_73014461120
description Generated by CS-Manager from service of FirewallRule# 17
(ASA-Store_V2/mandatory)
service-object udp destination eq 1812
service-object udp destination eq 1813
service-object tcp destination eq https
service-object tcp destination eq www
object-group service Cisco-Mobility
description Mobility ports for Wireless
service-object udp destination eq 16666
service-object udp destination eq 16667
object-group service CSM_INLINE_svc_rule_73014461128
description Generated by CS-Manager from service of FirewallRule# 19
(ASA-Store_V2/mandatory)
service-object tcp destination eq https
service-object udp destination eq isakmp
service-object object IP-Protocol-97
group-object Cisco-Mobility
object-group service CSM_INLINE_svc_rule_73014461130
description Generated by CS-Manager from service of FirewallRule# 20
(ASA-Store_V2/mandatory)
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service CSM_INLINE_svc_rule_73014461132
description Generated by CS-Manager from service of FirewallRule# 21
(ASA-Store_V2/mandatory)
service-object object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014461134
description Generated by CS-Manager from service of FirewallRule# 22
(ASA-Store_V2/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq ntp
service-object udp destination eq netbios-dgm
service-object object RPC
service-object object LDAP-GC
service-object object LDAP-GC-SSL
service-object object Kerberos-TCP
service-object object Microsoft-DS-SMB
service-object object LDAP-UDP
service-object object RPC-HighPorts
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_73014461136
description Generated by CS-Manager from service of FirewallRule# 23
(ASA-Store_V2/mandatory)
service-object tcp destination eq www
service-object tcp destination eq https
object-group service CSM_INLINE_svc_rule_73014461138
description Generated by CS-Manager from service of FirewallRule# 24
(ASA-Store_V2/mandatory)
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq smtp
service-object tcp destination eq pop3
service-object tcp destination eq imap4
object-group network DM_INLINE_NETWORK_2
network-object object NAC-1
network-object object NAC-2
network-object object TACACS
object-group service DM_INLINE_SERVICE_1
service-object icmp6 echo
service-object udp destination eq ntp
object-group service DM_INLINE_SERVICE_2
service-object tcp destination eq tacacs
object-group service DM_INLINE_SERVICE_3
service-object udp destination eq radius
service-object udp destination eq radius-acct
object-group service DM_INLINE_SERVICE_4
service-object udp destination eq snmp
service-object udp destination eq snmptrap
service-object udp destination eq syslog
object-group network DM_INLINE_NETWORK_3
network-object object LMS
network-object object RSA-enVision
access-list OUTSIDE remark LAB Testing
access-list OUTSIDE extended permit ip object-group CSM_INLINE_src_rule_73014461090
10.10.176.0 255.255.248.0
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461092
object-group Admin-Systems 10.10.176.0 255.255.24
8.0
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461092
object-group Admin-Systems host 10.10.255.176
access-list OUTSIDE remark Allow Active Directory Domain
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461094 object
ActiveDirectory.cisco-irn.com 10.10.176.0
255.255.248.0
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461184
object-group CSM_INLINE_src_rule_73014461184 obje
ct-group POS-Store-MSP
access-list OUTSIDE extended deny ip any object-group Store-MSP-POS-net
access-list OUTSIDE extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list OUTSIDE remark Wireless Management to Stores
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461098
object-group CSM_INLINE_src_rule_73014461098 10.1
0.183.0 255.255.255.0
access-list OUTSIDE remark Physical security systems
access-list OUTSIDE extended permit tcp object-group CSM_INLINE_src_rule_73014461100
10.10.191.0 255.255.255.0 eq https
access-list OUTSIDE remark Allow Management of store systems
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461102 object
DC-ALL 10.10.176.0 255.255.248.0
access-list OUTSIDE remark WAAS systems
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461104
object-group DC-WAAS 10.10.184.0 255.255.255.0
access-list OUTSIDE remark Voice calls
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461106 object
DC-ALL 10.10.178.0 255.255.255.0
access-list OUTSIDE extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461112
10.10.176.0 255.255.248.0 object RSA-enVision
access-list OUTSIDE extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq tacacs
access-list OUTSIDE extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers
eq ntp
access-list OUTSIDE remark Drop all other traffic
access-list OUTSIDE extended deny ip any any log
access-list POS remark Allow Applications
access-list POS extended permit tcp object-group POS-Store-MSP object-group
CSM_INLINE_dst_rule_73014461438 eq https
access-list POS extended deny ip any object-group Store-MSP-POS-net
access-list POS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list POS extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers eq
ntp
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461120 10.10.176.0
255.255.248.0 object-group CSM_INLINE_dst
_rule_73014461120
access-list POS remark Allow Active Directory Domain
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461134 10.10.176.0
255.255.248.0 object ActiveDirectory.cisc
o-irn.com
access-list POS remark Allow Windows Updates
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461136 10.10.176.0
255.255.248.0 object MS-Update
access-list POS remark Allow Mail
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461138 10.10.176.0
255.255.248.0 object MSExchange
access-list POS remark Drop all other traffic
access-list POS extended deny ip any any log
access-list WIRELESS-POS remark Allow Applications
access-list WIRELESS-POS extended permit tcp object-group POS-Store-MSP object-group
CSM_INLINE_dst_rule_73014461438 eq https
access-list WIRELESS-POS extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS-POS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list WIRELESS-POS extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS-POS remark Allow Active Directory Domain
access-list WIRELESS-POS extended permit object-group CSM_INLINE_svc_rule_73014461134
10.10.176.0 255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list WIRELESS-POS remark Allow Windows Updates
access-list WIRELESS-POS extended permit object-group CSM_INLINE_svc_rule_73014461136
10.10.176.0 255.255.248.0 object MS-Update
access-list WIRELESS-POS remark Allow Mail
access-list WIRELESS-POS extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list WIRELESS-POS remark Drop all other traffic
access-list WIRELESS-POS extended deny ip any any log
access-list DATA extended deny ip any object-group Store-MSP-POS-net
access-list DATA extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list DATA extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers eq
ntp
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461120 10.10.176.0
255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list DATA remark Allow Active Directory Domain
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461134 10.10.176.0
255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list DATA remark Allow Windows Updates
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461136 10.10.176.0
255.255.248.0 object MS-Update
access-list DATA remark Allow Mail
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461138 10.10.176.0
255.255.248.0 object MSExchange
access-list DATA remark Drop all other traffic
access-list DATA extended deny ip any any log
access-list MANAGEMENT extended deny ip any object-group Store-MSP-POS-net
access-list MANAGEMENT extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list MANAGEMENT extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list MANAGEMENT extended permit object-group CSM_INLINE_svc_rule_73014461112
10.10.176.0 255.255.248.0 object RSA-enVision
access-list MANAGEMENT extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq
tacacs
access-list MANAGEMENT extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list MANAGEMENT extended permit icmp 10.10.176.0 255.255.248.0 object-group
NTP-Servers
access-list MANAGEMENT extended permit object-group CSM_INLINE_svc_rule_73014461120
10.10.176.0 255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list MANAGEMENT remark Physical security systems
access-list MANAGEMENT extended permit tcp 10.10.191.0 255.255.255.0 object-group
CSM_INLINE_dst_rule_73014461126 eq https
access-list MANAGEMENT remark Allow Mail
access-list MANAGEMENT extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list MANAGEMENT remark Drop all other traffic
access-list MANAGEMENT extended deny ip any any log
access-list PARTNER extended deny ip any object-group Store-MSP-POS-net
access-list PARTNER extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list PARTNER extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers
eq ntp
access-list PARTNER extended permit object-group CSM_INLINE_svc_rule_73014461120
10.10.176.0 255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list PARTNER remark Allow Mail
access-list PARTNER extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list PARTNER remark Drop all other traffic
access-list PARTNER extended deny ip any any log
access-list VOICE extended deny ip any object-group Store-MSP-POS-net
access-list VOICE extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list VOICE extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461112 10.10.176.0
255.255.248.0 object RSA-enVision
access-list VOICE extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq tacacs
access-list VOICE extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers
eq ntp
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461120 10.10.176.0
255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list VOICE remark Voice calls
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461130 10.10.178.0
255.255.255.0 object DC-ALL
access-list VOICE remark Allow Mail
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461138 10.10.176.0
255.255.248.0 object MSExchange
access-list VOICE remark Drop all other traffic
access-list VOICE extended deny ip any any log
access-list WAAS extended deny ip any object-group Store-MSP-POS-net
access-list WAAS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list WAAS extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list WAAS extended permit object-group CSM_INLINE_svc_rule_73014461112 10.10.176.0
255.255.248.0 object RSA-enVision
access-list WAAS extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq tacacs
access-list WAAS extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers eq
ntp
access-list WAAS remark WAAS systems
access-list WAAS extended permit object-group CSM_INLINE_svc_rule_73014461132 10.10.184.0
255.255.255.0 object-group DC-WAAS
access-list WAAS remark Allow Active Directory Domain
access-list WAAS extended permit object-group CSM_INLINE_svc_rule_73014461134 10.10.176.0
255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list WAAS remark Drop all other traffic
access-list WAAS extended deny ip any any log
access-list WIRELESS extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list WIRELESS extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS remark Allow Active Directory Domain
access-list WIRELESS extended permit object-group CSM_INLINE_svc_rule_73014461134
10.10.176.0 255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list WIRELESS remark Allow Windows Updates
access-list WIRELESS extended permit object-group CSM_INLINE_svc_rule_73014461136
10.10.176.0 255.255.248.0 object MS-Update
access-list WIRELESS remark Allow Mail
access-list WIRELESS extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list WIRELESS remark Drop all other traffic
access-list WIRELESS extended deny ip any any log
access-list WIRELESS-CONTROL extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS-CONTROL extended deny ip any object-group
CSM_INLINE_dst_rule_73014461436
access-list WIRELESS-CONTROL extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq
ssh
access-list WIRELESS-CONTROL extended permit object-group CSM_INLINE_svc_rule_73014461112
10.10.176.0 255.255.248.0 object RSA-enVision
access-list WIRELESS-CONTROL extended permit tcp 10.10.176.0 255.255.248.0 object TACACS
eq tacacs
access-list WIRELESS-CONTROL extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS-CONTROL extended permit object-group CSM_INLINE_svc_rule_73014461120
10.10.176.0 255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list WIRELESS-CONTROL remark Wireless control systems
access-list WIRELESS-CONTROL extended permit object-group CSM_INLINE_svc_rule_73014461128
10.10.183.0 255.255.255.0 object-group CSM_INLINE_dst_rule_73014461128
access-list WIRELESS-CONTROL remark Drop all other traffic
access-list WIRELESS-CONTROL extended deny ip any any log
access-list WIRELESS-GUEST extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS-GUEST extended deny ip any object-group
CSM_INLINE_dst_rule_73014461436
access-list WIRELESS-GUEST extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS-GUEST remark Drop all other traffic
access-list WIRELESS-GUEST extended deny ip any any log
access-list DROP-ALL extended deny ip any any log disable
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_1
10.10.191.0 255.255.255.0 object-group NTP-Servers log disable
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_2
10.10.191.0 255.255.255.0 object TACACS
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_3
10.10.191.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 log disable
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_4
10.10.191.0 255.255.255.0 object-group DM_INLINE_NETWORK_3 log disable
access-list MANAGEMENT_access_in extended deny ip any any
logging buffer-size 100000
logging trap informational
logging asdm informational
logging host MSP-WAN 192.168.42.124
mtu WIRELESS-CONTROL 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any WIRELESS-POS
icmp permit any WIRELESS-GUEST
icmp permit any WIRELESS-CONTROL
icmp permit any MANAGEMENT
asdm image disk0:/asdm-70040.bin
no arp permit-nonconnected
access-group OUTSIDE in interface MSP-WAN
access-group POS in interface POS
access-group DATA in interface DATA
access-group VOICE in interface VOICE
access-group WIRELESS in interface WIRELESS
access-group WIRELESS-POS in interface WIRELESS-POS
access-group PARTNER in interface PARTNER
access-group WIRELESS-GUEST in interface WIRELESS-GUEST
access-group WIRELESS-CONTROL in interface WIRELESS-CONTROL
access-group WAAS in interface WAAS
access-group MANAGEMENT_access_in in interface MANAGEMENT
access-group DROP-ALL in interface IPS-Mgmt
route MSP-WAN 0.0.0.0 0.0.0.0 10.10.255.11 1
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server RETAIL protocol tacacs+
aaa-server RETAIL (MANAGEMENT) host 192.168.42.131
aaa-server COMPLIANCE protocol tacacs+
aaa-server COMPLIANCE (MSP-WAN) host 192.168.42.131
user-identity default-domain LOCAL
aaa authentication enable console COMPLIANCE LOCAL
aaa authentication http console COMPLIANCE LOCAL
aaa authentication ssh console COMPLIANCE LOCAL
aaa authorization command COMPLIANCE LOCAL
aaa accounting enable console COMPLIANCE
aaa accounting ssh console COMPLIANCE
aaa accounting command privilege 15 COMPLIANCE
aaa authentication secure-http-client
aaa local authentication attempts max-fail 6
aaa authorization exec authentication-server
http server idle-timeout 15
http server session-timeout 15
http 192.168.41.101 255.255.255.255 MSP-WAN
http 192.168.41.102 255.255.255.255 MSP-WAN
http 192.168.42.122 255.255.255.255 MSP-WAN
http 192.168.42.124 255.255.255.255 MSP-WAN
http 192.168.42.133 255.255.255.255 MSP-WAN
http 192.168.42.138 255.255.255.255 MSP-WAN
http 192.168.42.139 255.255.255.255 MSP-WAN
http 192.168.42.134 255.255.255.255 MSP-WAN
snmp-server group V3Group v3 priv
snmp-server user ciscolms V3Group v3 encrypted auth sha
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db priv aes 256
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db:88:e3:53:03:7b:f1:02:30:bc:14:
98:e5
snmp-server user csmadmin V3Group v3 encrypted auth sha
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db priv aes 256
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db:88:e3:53:03:7b:f1:02:30:bc:14:
98:e5
snmp-server host MSP-WAN 192.168.42.134 version 3 ciscolms
snmp-server host MSP-WAN 192.168.42.139 version 3 ciscolms
snmp-server host MSP-WAN 192.168.42.133 version 3 csmadmin
snmp-server location Building SJC-17-1 Aisle 2 Rack 3
snmp-server contact Bart McGlothin
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
snmp-server enable traps syslog
snmp-server enable traps ipsec start stop
snmp-server enable traps memory-threshold
snmp-server enable traps interface-threshold
snmp-server enable traps remote-access session-threshold-exceeded
snmp-server enable traps connection-limit-reached
snmp-server enable traps cpu threshold rising
snmp-server enable traps ikev2 start stop
snmp-server enable traps nat packet-discard
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
ssh 192.168.41.101 255.255.255.255 MSP-WAN
ssh 192.168.41.102 255.255.255.255 MSP-WAN
ssh 192.168.42.122 255.255.255.255 MSP-WAN
ssh 192.168.42.124 255.255.255.255 MSP-WAN
ssh 192.168.42.133 255.255.255.255 MSP-WAN
ssh 192.168.42.138 255.255.255.255 MSP-WAN
ssh 192.168.42.139 255.255.255.255 MSP-WAN
ssh 192.168.42.134 255.255.255.255 MSP-WAN
dhcprelay server 192.168.42.130 MSP-WAN
dhcprelay enable WIRELESS
dhcprelay enable WIRELESS-POS
dhcprelay enable WIRELESS-GUEST
dhcprelay enable WIRELESS-CONTROL
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 192.168.62.162 source MSP-WAN
ntp server 192.168.62.161 source MSP-WAN prefer
ssl encryption aes128-sha1 aes256-sha1 3des-sha1
username csmadmin password 9CmOJ.jq4D54PXDW encrypted privilege 15
username retail password XgJyMnijuEPQSGoY encrypted privilege 15
username jchambers password zkGq5ojduHyZK1bA encrypted privilege 15
username ciscolms password huo2PmvTsMk6Cv1L encrypted privilege 15
username bmcgloth password gITSY3iZ3UnCQoKf encrypted privilege 15
class-map inspection_default
match default-inspection-traffic
class-map global-class-PCI
policy-map type inspect dns preset_dns_map
message-length maximum client auto
message-length maximum 512
description IPS inspection policy for Cisco PCI LAB
inspect dns preset_dns_map
ips promiscuous fail-open
service-policy global_policy global
no call-home reporting anonymous
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:0c17bedaf99e8d7c1ce43105b2a7d2c5
FW-A2-FW-A2-MSP-1# sh ver
Cisco Adaptive Security Appliance Software Version 9.0(0)129
Device Manager Version 7.0(0)40
Compiled on Wed 03-Oct-12 14:19 PDT by builders
System image file is "disk0:/asa900-129-smp-k8.bin"
Config file at boot was "startup-config"
FW-A2-MSP-1 up 97 days 23 hours
Hardware: ASA5515, 8192 MB RAM, CPU Clarkdale 3058 MHz, 1 CPU (4 cores)
ASA: 4096 MB RAM, 1 CPU (1 core)
Internal ATA Compact Flash, 8192MB
BIOS Flash MX25L6445E @ 0xffbb0000, 8192KB
Encryption hardware device : Cisco ASA-55xx on-board accelerator (revision 0x1)
Boot microcode : CNPx-MC-BOOT-2.00
SSL/IKE microcode : CNPx-MC-SSL-PLUS-T020
IPSec microcode : CNPx-MC-IPSEC-MAIN-0022
Number of accelerators: 1
Baseboard Management Controller (revision 0x1) Firmware Version: 2.4
0: Int: Internal-Data0/0 : address is d48c.b54d.9520, irq 11
1: Ext: GigabitEthernet0/0 : address is d48c.b54d.9524, irq 10
2: Ext: GigabitEthernet0/1 : address is d48c.b54d.9521, irq 10
3: Ext: GigabitEthernet0/2 : address is d48c.b54d.9525, irq 5
4: Ext: GigabitEthernet0/3 : address is d48c.b54d.9522, irq 5
5: Ext: GigabitEthernet0/4 : address is d48c.b54d.9526, irq 10
6: Ext: GigabitEthernet0/5 : address is d48c.b54d.9523, irq 10
7: Int: Internal-Data0/1 : address is 0000.0001.0002, irq 0
8: Int: Internal-Control0/0 : address is 0000.0001.0001, irq 0
9: Int: Internal-Data0/2 : address is 0000.0001.0003, irq 0
10: Ext: Management0/0 : address is d48c.b54d.9520, irq 0
Licensed features for this platform:
Maximum Physical Interfaces : Unlimited perpetual
Maximum VLANs : 100 perpetual
Inside Hosts : Unlimited perpetual
Failover : Active/Active perpetual
Encryption-DES : Enabled perpetual
Encryption-3DES-AES : Enabled perpetual
Security Contexts : 5 perpetual
GTP/GPRS : Disabled perpetual
AnyConnect Premium Peers : 10 perpetual
AnyConnect Essentials : 250 perpetual
Other VPN Peers : 250 perpetual
Total VPN Peers : 250 perpetual
Shared License : Disabled perpetual
AnyConnect for Mobile : Enabled perpetual
AnyConnect for Cisco VPN Phone : Enabled perpetual
Advanced Endpoint Assessment : Enabled perpetual
UC Phone Proxy Sessions : 2 perpetual
Total UC Proxy Sessions : 2 perpetual
Botnet Traffic Filter : Disabled perpetual
Intercompany Media Engine : Enabled perpetual
IPS Module : Enabled perpetual
Cluster : Disabled perpetual
This platform has an ASA 5515 Security Plus license.
Serial Number: FCH162771K6
Running Permanent Activation Key: 0xbb3ac554 0x607ed951 0x5d428d70 0xcec038dc 0x0d09f584
Configuration register is 0x1
Configuration last modified by bmcgloth at 13:15:34.337 PST Fri Dec 21 2012
domain-name cisco-irn.com
enable password WKlYt0jXwtQLFcz7 encrypted
passwd WKlYt0jXwtQLFcz7 encrypted
interface GigabitEthernet0/0
ip address 10.10.255.176 255.255.255.0
interface GigabitEthernet0/1
interface GigabitEthernet0/1.11
ip address 10.10.176.1 255.255.255.0
interface GigabitEthernet0/1.12
ip address 10.10.177.1 255.255.255.0
interface GigabitEthernet0/1.13
ip address 10.10.178.1 255.255.255.0
interface GigabitEthernet0/1.14
ip address 10.10.179.1 255.255.255.0
interface GigabitEthernet0/1.15
ip address 10.10.180.1 255.255.255.0
interface GigabitEthernet0/1.16
ip address 10.10.181.1 255.255.255.0
interface GigabitEthernet0/1.17
ip address 10.10.182.1 255.255.255.0
interface GigabitEthernet0/1.18
ip address 10.10.183.1 255.255.255.0
interface GigabitEthernet0/1.19
ip address 10.10.184.1 255.255.255.0
interface GigabitEthernet0/1.1000
ip address 10.10.191.1 255.255.255.0
interface GigabitEthernet0/2
interface GigabitEthernet0/3
interface GigabitEthernet0/4
interface GigabitEthernet0/5
description IPS management connection
banner exec **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner exec **** AUTHORIZED USERS ONLY! ****
banner exec ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
banner exec TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE
NECESSARY
banner exec TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
banner exec REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME
WITHOUT
banner exec FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
banner exec CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
banner exec ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
banner exec UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS.
banner login THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
banner asdm **** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF COMPLIANCE ****
banner asdm **** AUTHORIZED USERS ONLY! ****
banner asdm ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH AD
DITIONAL MONITORING AS MAY BE NECESSARY TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM
ADMINISTRATOR OR OTHER REPRESENTATIVES OF T
HE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT FURTHER NOTICE OR CONSENT.
UNAUTHORIZED USE OF THIS SYSTEM AND ANY O
THER CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW ENFORCEMENT
OFFICIALS AND PROSECUTION TO THE F
banner asdm UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL
LAWS
boot system disk0:/asa900-129-smp-k8.bin
clock summer-time PDT recurring
dns domain-lookup MSP-WAN
dns server-group DefaultDNS
name-server 192.168.42.130
domain-name cisco-irn.com
same-security-traffic permit inter-interface
object network AdminStation
object network AdminStation2
object network AdminStation4-bart
description Cisco Security Manager
object network AdminStation3
object network ActiveDirectory.cisco-irn.com
subnet 192.168.52.0 255.255.255.0
description POS in the Data Center
object network WCSManager
description Wireless Manager
description Data Center VSOM
subnet 192.168.0.0 255.255.0.0
description All of the Data Center
object network RSA-enVision
description RSA EnVision Syslog collector and SIM
description Csico Secure ACS server for TACACS and Radius
description RSA Authentication Manager for SecureID
description ISE server for NAC
description Windows Update Server
object network MSExchange
service tcp destination eq 135
service tcp destination eq 3268
object service LDAP-GC-SSL
service tcp destination eq 3269
object service Kerberos-TCP
service tcp destination eq 88
object service Microsoft-DS-SMB
service tcp destination eq 445
description Microsoft-DS Active Directory, Windows shares Microsoft-DS SMB file sharing
service udp destination eq 389
object service RPC-HighPorts
service tcp destination range 1024 65535
object service ORACLE-OAS
service tcp destination eq 12601
description OAS uses one port for HTTP and RMI - 12601.
object service TOMAX-8990
service tcp destination eq 8990
description Tomax Application Port
object service IP-Protocol-97
description IP protocol 97
service tcp destination eq 1080
service tcp destination eq 8080
service tcp destination eq 3389
description Windows Remote Desktop
object-group network CSM_INLINE_src_rule_73014461090
description Generated by CS-Manager from src of FirewallRule# 1 (ASA-Store_V2/mandatory)
network-object object AdminStation
network-object object AdminStation2
network-object object AdminStation4-bart
object-group network Admin-Systems
network-object object AdminStation
network-object object AdminStation2
network-object object CSManager
network-object object AdminStation4-bart
network-object object LMS
network-object object AdminStation3
object-group network DC-POS-Tomax
description Tomax POS Communication from Store to Data Center
network-object 192.168.52.96 255.255.255.224
object-group network DC-POS-SAP
description SAP POS Communication from Store to Data Center
network-object 192.168.52.144 255.255.255.240
object-group network DC-POS-Oracle
description Oracle POS Communication from Store to Data Center
network-object 192.168.52.128 255.255.255.240
object-group network CSM_INLINE_src_rule_73014461184
description Generated by CS-Manager from src of FirewallRule# 4 (ASA-Store_V2/mandatory)
group-object DC-POS-Tomax
network-object object DC-POS
group-object DC-POS-Oracle
object-group network POS-Store-MSP
network-object 10.10.176.81 255.255.255.255
object-group network CSM_INLINE_dst_rule_73014461438
description Generated by CS-Manager from dst of FirewallRule# 5 (ASA-Store_V2/mandatory)
group-object DC-POS-Tomax
network-object object DC-POS
group-object DC-POS-Oracle
object-group network Store-MSP-POS-net
network-object 10.10.176.0 255.255.255.0
network-object 10.10.180.0 255.255.255.0
object-group network CSM_INLINE_dst_rule_73014461436
description Generated by CS-Manager from dst of FirewallRule# 7 (ASA-Store_V2/mandatory)
group-object DC-POS-Tomax
network-object object DC-POS
group-object DC-POS-Oracle
object-group network DC-Wifi-Controllers
description Central Wireless Controllers for stores
network-object 192.168.43.21 255.255.255.255
network-object 192.168.43.22 255.255.255.255
object-group network DC-Wifi-MSE
description Mobility Service Engines
network-object 192.168.43.31 255.255.255.255
network-object 192.168.43.32 255.255.255.255
object-group network CSM_INLINE_src_rule_73014461098
description Generated by CS-Manager from src of FirewallRule# 8 (ASA-Store_V2/mandatory)
network-object object WCSManager
group-object DC-Wifi-Controllers
object-group network CSM_INLINE_src_rule_73014461100
description Generated by CS-Manager from src of FirewallRule# 9 (ASA-Store_V2/mandatory)
network-object object PAME-DC-1
network-object object MSP-DC-1
object-group network DC-WAAS
description WAE Appliances in Data Center
network-object 192.168.48.10 255.255.255.255
network-object 192.168.49.10 255.255.255.255
network-object 192.168.47.11 255.255.255.255
network-object 192.168.47.12 255.255.255.255
object-group network NTP-Servers
network-object 192.168.62.161 255.255.255.255
network-object 162.168.62.162 255.255.255.255
object-group network CSM_INLINE_dst_rule_73014461120
description Generated by CS-Manager from dst of FirewallRule# 17 (ASA-Store_V2/mandatory)
network-object object TACACS
network-object object RSA-AM
network-object object NAC-2
network-object object NAC-1
object-group network CSM_INLINE_dst_rule_73014461126
description Generated by CS-Manager from dst of FirewallRule# 18 (ASA-Store_V2/mandatory)
network-object object PAME-DC-1
network-object object MSP-DC-1
object-group network CSM_INLINE_dst_rule_73014461128
description Generated by CS-Manager from dst of FirewallRule# 19 (ASA-Store_V2/mandatory)
group-object DC-Wifi-Controllers
object-group service HTTPS-8443
service-object tcp destination eq 8443
object-group service CSM_INLINE_svc_rule_73014461092
description Generated by CS-Manager from service of FirewallRule# 2
(ASA-Store_V2/mandatory)
service-object tcp destination eq ssh
service-object tcp destination eq https
service-object udp destination eq snmp
object-group service DNS-Resolving
description Domain Name Server
service-object tcp destination eq domain
service-object udp destination eq domain
object-group service CSM_INLINE_svc_rule_73014461094
description Generated by CS-Manager from service of FirewallRule# 3
(ASA-Store_V2/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq ntp
service-object udp destination eq netbios-dgm
service-object object RPC
service-object object LDAP-GC
service-object object LDAP-GC-SSL
service-object object Kerberos-TCP
service-object object Microsoft-DS-SMB
service-object object LDAP-UDP
service-object object RPC-HighPorts
group-object DNS-Resolving
object-group service ORACLE-RMI
description RMI TCP ports 1300 and 1301-1319.
service-object tcp destination range 1300 1319
object-group service ORACLE-Weblogic
description HTTP/RMI and HTTPS/RMI-SSL 7001 & 7002. OracleAQ uses 1521.
service-object tcp destination eq 7001
service-object tcp destination eq 7002
service-object tcp destination eq sqlnet
object-group service ORACLE-WAS
description RMI/IIOP over 2809 HTTP over 9443 IBM-MQ 1414
service-object tcp destination eq 2809
service-object tcp destination eq 9443
service-object tcp destination eq 1414
object-group service CSM_INLINE_svc_rule_73014461184
description Generated by CS-Manager from service of FirewallRule# 4
(ASA-Store_V2/mandatory)
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object object ORACLE-OAS
service-object object TOMAX-8990
group-object ORACLE-Weblogic
object-group service TFTP
description Trivial File Transfer
service-object tcp destination eq 69
service-object udp destination eq tftp
object-group service LWAPP
description LWAPP UDP ports 12222 and 12223
service-object udp destination eq 12222
service-object udp destination eq 12223
object-group service CAPWAP
description CAPWAP UDP ports 5246 and 5247
service-object udp destination eq 5246
service-object udp destination eq 5247
object-group service CSM_INLINE_svc_rule_73014461098
description Generated by CS-Manager from service of FirewallRule# 8
(ASA-Store_V2/mandatory)
service-object tcp destination eq https
service-object tcp destination eq www
service-object udp destination eq isakmp
service-object tcp destination eq telnet
service-object tcp destination eq ssh
service-object object IP-Protocol-97
object-group service CSM_INLINE_svc_rule_73014461102
description Generated by CS-Manager from service of FirewallRule# 10
(ASA-Store_V2/mandatory)
service-object icmp echo-reply
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq ssh
service-object tcp destination eq ftp
service-object object TCP1080
service-object object TCP8080
service-object object RDP
object-group service CISCO-WAAS
description Ports for Cisco WAAS
service-object tcp destination eq 4050
object-group service Netbios
description Netbios Servers
service-object udp destination eq netbios-dgm
service-object udp destination eq netbios-ns
service-object tcp destination eq netbios-ssn
object-group service CSM_INLINE_svc_rule_73014461104
description Generated by CS-Manager from service of FirewallRule# 11
(ASA-Store_V2/mandatory)
service-object object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014461106
description Generated by CS-Manager from service of FirewallRule# 12
(ASA-Store_V2/mandatory)
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service CSM_INLINE_svc_rule_73014461112
description Generated by CS-Manager from service of FirewallRule# 14
(ASA-Store_V2/mandatory)
service-object udp destination eq snmptrap
service-object udp destination eq snmp
service-object udp destination eq syslog
object-group service CSM_INLINE_svc_rule_73014461120
description Generated by CS-Manager from service of FirewallRule# 17
(ASA-Store_V2/mandatory)
service-object udp destination eq 1812
service-object udp destination eq 1813
service-object tcp destination eq https
service-object tcp destination eq www
object-group service Cisco-Mobility
description Mobility ports for Wireless
service-object udp destination eq 16666
service-object udp destination eq 16667
object-group service CSM_INLINE_svc_rule_73014461128
description Generated by CS-Manager from service of FirewallRule# 19
(ASA-Store_V2/mandatory)
service-object tcp destination eq https
service-object udp destination eq isakmp
service-object object IP-Protocol-97
group-object Cisco-Mobility
object-group service CSM_INLINE_svc_rule_73014461130
description Generated by CS-Manager from service of FirewallRule# 20
(ASA-Store_V2/mandatory)
service-object tcp-udp destination eq sip
service-object tcp destination eq 2000
object-group service CSM_INLINE_svc_rule_73014461132
description Generated by CS-Manager from service of FirewallRule# 21
(ASA-Store_V2/mandatory)
service-object object Microsoft-DS-SMB
object-group service CSM_INLINE_svc_rule_73014461134
description Generated by CS-Manager from service of FirewallRule# 22
(ASA-Store_V2/mandatory)
service-object tcp destination eq ldap
service-object tcp destination eq ldaps
service-object udp destination eq 88
service-object udp destination eq ntp
service-object udp destination eq netbios-dgm
service-object object RPC
service-object object LDAP-GC
service-object object LDAP-GC-SSL
service-object object Kerberos-TCP
service-object object Microsoft-DS-SMB
service-object object LDAP-UDP
service-object object RPC-HighPorts
group-object DNS-Resolving
object-group service CSM_INLINE_svc_rule_73014461136
description Generated by CS-Manager from service of FirewallRule# 23
(ASA-Store_V2/mandatory)
service-object tcp destination eq www
service-object tcp destination eq https
object-group service CSM_INLINE_svc_rule_73014461138
description Generated by CS-Manager from service of FirewallRule# 24
(ASA-Store_V2/mandatory)
service-object tcp destination eq www
service-object tcp destination eq https
service-object tcp destination eq smtp
service-object tcp destination eq pop3
service-object tcp destination eq imap4
object-group network DM_INLINE_NETWORK_2
network-object object NAC-1
network-object object NAC-2
network-object object TACACS
object-group service DM_INLINE_SERVICE_1
service-object icmp6 echo
service-object udp destination eq ntp
object-group service DM_INLINE_SERVICE_2
service-object tcp destination eq tacacs
object-group service DM_INLINE_SERVICE_3
service-object udp destination eq radius
service-object udp destination eq radius-acct
object-group service DM_INLINE_SERVICE_4
service-object udp destination eq snmp
service-object udp destination eq snmptrap
service-object udp destination eq syslog
object-group network DM_INLINE_NETWORK_3
network-object object LMS
network-object object RSA-enVision
access-list OUTSIDE remark LAB Testing
access-list OUTSIDE extended permit ip object-group CSM_INLINE_src_rule_73014461090
10.10.176.0 255.255.248.0
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461092
object-group Admin-Systems 10.10.176.0 255.255.24
8.0
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461092
object-group Admin-Systems host 10.10.255.176
access-list OUTSIDE remark Allow Active Directory Domain
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461094 object
ActiveDirectory.cisco-irn.com 10.10.176.0
255.255.248.0
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461184
object-group CSM_INLINE_src_rule_73014461184 obje
ct-group POS-Store-MSP
access-list OUTSIDE extended deny ip any object-group Store-MSP-POS-net
access-list OUTSIDE extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list OUTSIDE remark Wireless Management to Stores
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461098
object-group CSM_INLINE_src_rule_73014461098 10.1
0.183.0 255.255.255.0
access-list OUTSIDE remark Physical security systems
access-list OUTSIDE extended permit tcp object-group CSM_INLINE_src_rule_73014461100
10.10.191.0 255.255.255.0 eq https
access-list OUTSIDE remark Allow Management of store systems
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461102 object
DC-ALL 10.10.176.0 255.255.248.0
access-list OUTSIDE remark WAAS systems
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461104
object-group DC-WAAS 10.10.184.0 255.255.255.0
access-list OUTSIDE remark Voice calls
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461106 object
DC-ALL 10.10.178.0 255.255.255.0
access-list OUTSIDE extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list OUTSIDE extended permit object-group CSM_INLINE_svc_rule_73014461112
10.10.176.0 255.255.248.0 object RSA-enVision
access-list OUTSIDE extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq tacacs
access-list OUTSIDE extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers
eq ntp
access-list OUTSIDE remark Drop all other traffic
access-list OUTSIDE extended deny ip any any log
access-list POS remark Allow Applications
access-list POS extended permit tcp object-group POS-Store-MSP object-group
CSM_INLINE_dst_rule_73014461438 eq https
access-list POS extended deny ip any object-group Store-MSP-POS-net
access-list POS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list POS extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers eq
ntp
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461120 10.10.176.0
255.255.248.0 object-group CSM_INLINE_dst
_rule_73014461120
access-list POS remark Allow Active Directory Domain
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461134 10.10.176.0
255.255.248.0 object ActiveDirectory.cisc
o-irn.com
access-list POS remark Allow Windows Updates
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461136 10.10.176.0
255.255.248.0 object MS-Update
access-list POS remark Allow Mail
access-list POS extended permit object-group CSM_INLINE_svc_rule_73014461138 10.10.176.0
255.255.248.0 object MSExchange
access-list POS remark Drop all other traffic
access-list POS extended deny ip any any log
access-list WIRELESS-POS remark Allow Applications
access-list WIRELESS-POS extended permit tcp object-group POS-Store-MSP object-group
CSM_INLINE_dst_rule_73014461438 eq https
access-list WIRELESS-POS extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS-POS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list WIRELESS-POS extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS-POS remark Allow Active Directory Domain
access-list WIRELESS-POS extended permit object-group CSM_INLINE_svc_rule_73014461134
10.10.176.0 255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list WIRELESS-POS remark Allow Windows Updates
access-list WIRELESS-POS extended permit object-group CSM_INLINE_svc_rule_73014461136
10.10.176.0 255.255.248.0 object MS-Update
access-list WIRELESS-POS remark Allow Mail
access-list WIRELESS-POS extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list WIRELESS-POS remark Drop all other traffic
access-list WIRELESS-POS extended deny ip any any log
access-list DATA extended deny ip any object-group Store-MSP-POS-net
access-list DATA extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list DATA extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers eq
ntp
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461120 10.10.176.0
255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list DATA remark Allow Active Directory Domain
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461134 10.10.176.0
255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list DATA remark Allow Windows Updates
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461136 10.10.176.0
255.255.248.0 object MS-Update
access-list DATA remark Allow Mail
access-list DATA extended permit object-group CSM_INLINE_svc_rule_73014461138 10.10.176.0
255.255.248.0 object MSExchange
access-list DATA remark Drop all other traffic
access-list DATA extended deny ip any any log
access-list MANAGEMENT extended deny ip any object-group Store-MSP-POS-net
access-list MANAGEMENT extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list MANAGEMENT extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list MANAGEMENT extended permit object-group CSM_INLINE_svc_rule_73014461112
10.10.176.0 255.255.248.0 object RSA-enVision
access-list MANAGEMENT extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq
tacacs
access-list MANAGEMENT extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list MANAGEMENT extended permit icmp 10.10.176.0 255.255.248.0 object-group
NTP-Servers
access-list MANAGEMENT extended permit object-group CSM_INLINE_svc_rule_73014461120
10.10.176.0 255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list MANAGEMENT remark Physical security systems
access-list MANAGEMENT extended permit tcp 10.10.191.0 255.255.255.0 object-group
CSM_INLINE_dst_rule_73014461126 eq https
access-list MANAGEMENT remark Allow Mail
access-list MANAGEMENT extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list MANAGEMENT remark Drop all other traffic
access-list MANAGEMENT extended deny ip any any log
access-list PARTNER extended deny ip any object-group Store-MSP-POS-net
access-list PARTNER extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list PARTNER extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers
eq ntp
access-list PARTNER extended permit object-group CSM_INLINE_svc_rule_73014461120
10.10.176.0 255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list PARTNER remark Allow Mail
access-list PARTNER extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list PARTNER remark Drop all other traffic
access-list PARTNER extended deny ip any any log
access-list VOICE extended deny ip any object-group Store-MSP-POS-net
access-list VOICE extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list VOICE extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461112 10.10.176.0
255.255.248.0 object RSA-enVision
access-list VOICE extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq tacacs
access-list VOICE extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers
eq ntp
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461120 10.10.176.0
255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list VOICE remark Voice calls
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461130 10.10.178.0
255.255.255.0 object DC-ALL
access-list VOICE remark Allow Mail
access-list VOICE extended permit object-group CSM_INLINE_svc_rule_73014461138 10.10.176.0
255.255.248.0 object MSExchange
access-list VOICE remark Drop all other traffic
access-list VOICE extended deny ip any any log
access-list WAAS extended deny ip any object-group Store-MSP-POS-net
access-list WAAS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list WAAS extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq ssh
access-list WAAS extended permit object-group CSM_INLINE_svc_rule_73014461112 10.10.176.0
255.255.248.0 object RSA-enVision
access-list WAAS extended permit tcp 10.10.176.0 255.255.248.0 object TACACS eq tacacs
access-list WAAS extended permit udp 10.10.176.0 255.255.248.0 object-group NTP-Servers eq
ntp
access-list WAAS remark WAAS systems
access-list WAAS extended permit object-group CSM_INLINE_svc_rule_73014461132 10.10.184.0
255.255.255.0 object-group DC-WAAS
access-list WAAS remark Allow Active Directory Domain
access-list WAAS extended permit object-group CSM_INLINE_svc_rule_73014461134 10.10.176.0
255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list WAAS remark Drop all other traffic
access-list WAAS extended deny ip any any log
access-list WIRELESS extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS extended deny ip any object-group CSM_INLINE_dst_rule_73014461436
access-list WIRELESS extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS remark Allow Active Directory Domain
access-list WIRELESS extended permit object-group CSM_INLINE_svc_rule_73014461134
10.10.176.0 255.255.248.0 object ActiveDirectory.cisco-irn.com
access-list WIRELESS remark Allow Windows Updates
access-list WIRELESS extended permit object-group CSM_INLINE_svc_rule_73014461136
10.10.176.0 255.255.248.0 object MS-Update
access-list WIRELESS remark Allow Mail
access-list WIRELESS extended permit object-group CSM_INLINE_svc_rule_73014461138
10.10.176.0 255.255.248.0 object MSExchange
access-list WIRELESS remark Drop all other traffic
access-list WIRELESS extended deny ip any any log
access-list WIRELESS-CONTROL extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS-CONTROL extended deny ip any object-group
CSM_INLINE_dst_rule_73014461436
access-list WIRELESS-CONTROL extended permit tcp 10.10.176.0 255.255.248.0 object LMS eq
ssh
access-list WIRELESS-CONTROL extended permit object-group CSM_INLINE_svc_rule_73014461112
10.10.176.0 255.255.248.0 object RSA-enVision
access-list WIRELESS-CONTROL extended permit tcp 10.10.176.0 255.255.248.0 object TACACS
eq tacacs
access-list WIRELESS-CONTROL extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS-CONTROL extended permit object-group CSM_INLINE_svc_rule_73014461120
10.10.176.0 255.255.248.0 object-group CSM_INLINE_dst_rule_73014461120
access-list WIRELESS-CONTROL remark Wireless control systems
access-list WIRELESS-CONTROL extended permit object-group CSM_INLINE_svc_rule_73014461128
10.10.183.0 255.255.255.0 object-group CSM_INLINE_dst_rule_73014461128
access-list WIRELESS-CONTROL remark Drop all other traffic
access-list WIRELESS-CONTROL extended deny ip any any log
access-list WIRELESS-GUEST extended deny ip any object-group Store-MSP-POS-net
access-list WIRELESS-GUEST extended deny ip any object-group
CSM_INLINE_dst_rule_73014461436
access-list WIRELESS-GUEST extended permit udp 10.10.176.0 255.255.248.0 object-group
NTP-Servers eq ntp
access-list WIRELESS-GUEST remark Drop all other traffic
access-list WIRELESS-GUEST extended deny ip any any log
access-list DROP-ALL extended deny ip any any log disable
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_1
10.10.191.0 255.255.255.0 object-group NTP-Servers log disable
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_2
10.10.191.0 255.255.255.0 object TACACS
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_3
10.10.191.0 255.255.255.0 object-group DM_INLINE_NETWORK_2 log disable
access-list MANAGEMENT_access_in extended permit object-group DM_INLINE_SERVICE_4
10.10.191.0 255.255.255.0 object-group DM_INLINE_NETWORK_3 log disable
access-list MANAGEMENT_access_in extended deny ip any any
logging buffer-size 100000
logging trap informational
logging asdm informational
logging host MSP-WAN 192.168.42.124
mtu WIRELESS-CONTROL 1500
icmp unreachable rate-limit 1 burst-size 1
icmp permit any WIRELESS-POS
icmp permit any WIRELESS-GUEST
icmp permit any WIRELESS-CONTROL
icmp permit any MANAGEMENT
asdm image disk0:/asdm-70040.bin
no arp permit-nonconnected
access-group OUTSIDE in interface MSP-WAN
access-group POS in interface POS
access-group DATA in interface DATA
access-group VOICE in interface VOICE
access-group WIRELESS in interface WIRELESS
access-group WIRELESS-POS in interface WIRELESS-POS
access-group PARTNER in interface PARTNER
access-group WIRELESS-GUEST in interface WIRELESS-GUEST
access-group WIRELESS-CONTROL in interface WIRELESS-CONTROL
access-group WAAS in interface WAAS
access-group MANAGEMENT_access_in in interface MANAGEMENT
access-group DROP-ALL in interface IPS-Mgmt
route MSP-WAN 0.0.0.0 0.0.0.0 10.10.255.11 1
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa-server RETAIL protocol tacacs+
aaa-server RETAIL (MANAGEMENT) host 192.168.42.131
aaa-server COMPLIANCE protocol tacacs+
aaa-server COMPLIANCE (MSP-WAN) host 192.168.42.131
user-identity default-domain LOCAL
aaa authentication enable console COMPLIANCE LOCAL
aaa authentication http console COMPLIANCE LOCAL
aaa authentication ssh console COMPLIANCE LOCAL
aaa authorization command COMPLIANCE LOCAL
aaa accounting enable console COMPLIANCE
aaa accounting ssh console COMPLIANCE
aaa accounting command privilege 15 COMPLIANCE
aaa authentication secure-http-client
aaa local authentication attempts max-fail 6
aaa authorization exec authentication-server
http server idle-timeout 15
http server session-timeout 15
http 192.168.41.101 255.255.255.255 MSP-WAN
http 192.168.41.102 255.255.255.255 MSP-WAN
http 192.168.42.122 255.255.255.255 MSP-WAN
http 192.168.42.124 255.255.255.255 MSP-WAN
http 192.168.42.133 255.255.255.255 MSP-WAN
http 192.168.42.138 255.255.255.255 MSP-WAN
http 192.168.42.139 255.255.255.255 MSP-WAN
http 192.168.42.134 255.255.255.255 MSP-WAN
snmp-server group V3Group v3 priv
snmp-server user ciscolms V3Group v3 encrypted auth sha
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db priv aes 256
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db:88:e3:53:03:7b:f1:02:30:bc:14:
98:e5
snmp-server user csmadmin V3Group v3 encrypted auth sha
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db priv aes 256
56:bd:0f:20:11:a7:78:6e:08:cc:a9:43:f7:86:0e:ab:04:7c:a7:db:88:e3:53:03:7b:f1:02:30:bc:14:
98:e5
snmp-server host MSP-WAN 192.168.42.134 version 3 ciscolms
snmp-server host MSP-WAN 192.168.42.139 version 3 ciscolms
snmp-server host MSP-WAN 192.168.42.133 version 3 csmadmin
snmp-server location Building SJC-17-1 Aisle 2 Rack 3
snmp-server contact Bart McGlothin
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
snmp-server enable traps syslog
snmp-server enable traps ipsec start stop
snmp-server enable traps memory-threshold
snmp-server enable traps interface-threshold
snmp-server enable traps remote-access session-threshold-exceeded
snmp-server enable traps connection-limit-reached
snmp-server enable traps cpu threshold rising
snmp-server enable traps ikev2 start stop
snmp-server enable traps nat packet-discard
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
ssh 192.168.41.101 255.255.255.255 MSP-WAN
ssh 192.168.41.102 255.255.255.255 MSP-WAN
ssh 192.168.42.122 255.255.255.255 MSP-WAN
ssh 192.168.42.124 255.255.255.255 MSP-WAN
ssh 192.168.42.133 255.255.255.255 MSP-WAN
ssh 192.168.42.138 255.255.255.255 MSP-WAN
ssh 192.168.42.139 255.255.255.255 MSP-WAN
ssh 192.168.42.134 255.255.255.255 MSP-WAN
dhcprelay server 192.168.42.130 MSP-WAN
dhcprelay enable WIRELESS
dhcprelay enable WIRELESS-POS
dhcprelay enable WIRELESS-GUEST
dhcprelay enable WIRELESS-CONTROL
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 192.168.62.162 source MSP-WAN
ntp server 192.168.62.161 source MSP-WAN prefer
ssl encryption aes128-sha1 aes256-sha1 3des-sha1
username csmadmin password 9CmOJ.jq4D54PXDW encrypted privilege 15
username retail password XgJyMnijuEPQSGoY encrypted privilege 15
username jchambers password zkGq5ojduHyZK1bA encrypted privilege 15
username ciscolms password huo2PmvTsMk6Cv1L encrypted privilege 15
username bmcgloth password gITSY3iZ3UnCQoKf encrypted privilege 15
class-map inspection_default
match default-inspection-traffic
class-map global-class-PCI
policy-map type inspect dns preset_dns_map
message-length maximum client auto
message-length maximum 512
description IPS inspection policy for Cisco PCI LAB
inspect dns preset_dns_map
ips promiscuous fail-open
service-policy global_policy global
no call-home reporting anonymous
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:0c17bedaf99e8d7c1ce43105b2a7d2c5
IPS-A2-MSP-1# show configuration
! ------------------------------
! Current configuration last modified Fri Dec 21 12:24:05 2012
! ------------------------------
! Signature Update S648.0 2012-05-30
! ------------------------------
! ------------------------------
cli-inactivity-timeout 15
! ------------------------------
service event-action-rules rules0
! ------------------------------
host-ip 10.10.191.21/24,10.10.191.1
access-list 192.168.41.101/32
access-list 192.168.41.102/32
access-list 192.168.42.122/32
access-list 192.168.42.124/32
access-list 192.168.42.133/32
access-list 192.168.42.134/32
access-list 192.168.42.138/32
access-list 192.168.42.139/32
login-banner-text WARNING: THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS
ONLY!
dns-primary-server enabled
dns-secondary-server disabled
dns-tertiary-server disabled
standard-time-zone-name PST
ntp-option enabled-ntp-unauthenticated
ntp-server 192.168.62.161
summertime-option recurring
! ------------------------------
! ------------------------------
! ------------------------------
trap-destinations 192.168.42.124
trap-community-name RSAenvision
enable-notifications true
trap-community-name RSAenvision
system-location Building SJC-17-1 Row 1 Rack 1
! ------------------------------
service signature-definition sig0
! ------------------------------
! ------------------------------
service trusted-certificates
! ------------------------------
! ------------------------------
service anomaly-detection ad0
! ------------------------------
service external-product-interface
! ------------------------------
! ------------------------------
service global-correlation
! ------------------------------
server-address 192.168.42.131
console-authentication radius-and-local
default-user-role administrator
! ------------------------------
physical-interface PortChannel0/0
S-A2-MSP-1
Building configuration...
Current configuration : 10554 bytes
! Last configuration change at 02:08:19 PSTDST Sat Apr 30 2011 by retail
! NVRAM config last updated at 02:08:21 PSTDST Sat Apr 30 2011 by retail
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime show-timezone
service timestamps log datetime localtime show-timezone
service password-encryption
logging buffered 50000 debugging
enable secret 5 <removed>
username retail privilege 15 secret 5 <removed>
username bart privilege 15 secret 5 <removed>
username emc-ncm privilege 15 secret 5 <removed>
username bmcgloth privilege 15 secret 5 <removed>
username csmadmin privilege 15 secret 5 <removed>
aaa authentication login RETAIL group tacacs+ local
aaa authentication enable default group tacacs+ enable
aaa authorization exec default group tacacs+ if-authenticated
aaa accounting update newinfo
aaa accounting exec default start-stop group tacacs+
aaa accounting commands 15 default start-stop group tacacs+
aaa accounting system default start-stop group tacacs+
clock summer-time PSTDST recurring
ip domain-name cisco-irn.com
ip name-server 192.168.42.130
ip ssh authentication-retries 2
login block-for 1800 attempts 6 within 1800
login quiet-mode access-class 23
crypto pki trustpoint TP-self-signed-4189032704
subject-name cn=IOS-Self-Signed-Certificate-4189032704
rsakeypair TP-self-signed-4189032704
crypto pki certificate chain TP-self-signed-4189032704
certificate self-signed 01
spanning-tree extend system-id
vlan internal allocation policy ascending
interface GigabitEthernet0/1
switchport trunk encapsulation dot1q
interface GigabitEthernet0/2
switchport trunk encapsulation dot1q
switchport trunk native vlan 18
switchport trunk allowed vlan 14-18
interface GigabitEthernet0/3
interface GigabitEthernet0/4
switchport access vlan 17
interface GigabitEthernet0/5
switchport access vlan 17
interface GigabitEthernet0/6
switchport access vlan 17
interface GigabitEthernet0/7
switchport access vlan 17
interface GigabitEthernet0/8
switchport access vlan 17
interface GigabitEthernet0/9
switchport access vlan 17
interface GigabitEthernet0/10
switchport access vlan 17
interface GigabitEthernet0/11
switchport access vlan 17
interface GigabitEthernet0/12
switchport access vlan 17
interface GigabitEthernet0/13
switchport access vlan 17
interface GigabitEthernet0/14
switchport access vlan 17
interface GigabitEthernet0/15
switchport access vlan 17
interface GigabitEthernet0/16
switchport access vlan 17
interface GigabitEthernet0/17
switchport access vlan 17
interface GigabitEthernet0/18
switchport access vlan 17
interface GigabitEthernet0/19
switchport access vlan 17
interface GigabitEthernet0/20
switchport access vlan 17
interface GigabitEthernet0/21
switchport access vlan 17
interface GigabitEthernet0/22
switchport access vlan 17
interface GigabitEthernet0/23
switchport access vlan 17
interface GigabitEthernet0/24
switchport access vlan 17
interface GigabitEthernet0/25
switchport access vlan 17
interface GigabitEthernet0/26
switchport access vlan 17
interface GigabitEthernet0/27
switchport access vlan 17
interface GigabitEthernet0/28
switchport access vlan 17
interface TenGigabitEthernet0/1
interface TenGigabitEthernet0/2
description Management VLAN for Switch
ip address 10.10.191.11 255.255.255.0
ip default-gateway 10.10.191.1
no ip forward-protocol nd
ip http authentication aaa login-authentication RETAIL
ip http secure-ciphersuite 3des-ede-cbc-sha
ip http timeout-policy idle 60 life 86400 requests 10000
ip tacacs source-interface Vlan1000
logging source-interface Vlan1000
access-list 23 permit 192.168.41.101 log
access-list 23 permit 192.168.41.102 log
access-list 23 permit 192.168.42.111 log
access-list 23 permit 192.168.42.122 log
access-list 23 permit 192.168.42.124 log
access-list 23 permit 127.0.0.1 log
access-list 23 permit 192.168.42.131 log
access-list 23 permit 192.168.42.133 log
access-list 23 permit 192.168.42.138 log
access-list 23 permit 10.19.151.99 log
access-list 23 deny any log
access-list 88 permit 192.168.42.124 log
access-list 88 deny any log
snmp-server engineID remote 192.168.42.124 0000000000
snmp-server user remoteuser remoteuser remote 192.168.42.124 v3 access 88
snmp-server user remoteuser remoteuser v3
snmp-server group remoteuser v3 noauth notify *tv.FFFFFFFF.FFFFFFFF.FFFFFFFF.FFFFFFFF0F
snmp-server trap-source Vlan1000
snmp-server packetsize 8192
snmp-server location XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server contact XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart
snmp-server enable traps entity
snmp-server enable traps cpu threshold
snmp-server enable traps power-ethernet group 1
snmp-server enable traps vtp
snmp-server enable traps vlancreate
snmp-server enable traps vlandelete
snmp-server enable traps flash insertion removal
snmp-server enable traps port-security
snmp-server enable traps envmon fan shutdown supply temperature status
snmp-server enable traps config-copy
snmp-server enable traps config
snmp-server enable traps hsrp
snmp-server enable traps rtr
snmp-server enable traps bridge newroot topologychange
snmp-server enable traps syslog
snmp-server enable traps vlan-membership
snmp-server host 192.168.42.124 remoteuser
tacacs-server host 192.168.42.131
tacacs-server directed-request
tacacs-server key 7 <removed>
radius-server source-ports 1645-1646
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
**** THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF CMO Retail ****
**** AUTHORIZED USERS ONLY! ****
ANY USE OF THIS COMPUTER NETWORK SYSTEM SHALL BE DEEMED TO BE EXPRESS CONSENT
TO MONITORING OF SUCH USE AND TO SUCH ADDITIONAL MONITORING AS MAY BE NECESSARY
TO IDENTIFY ANY UNAUTHORIZED USER. THE SYSTEM ADMINISTRATOR OR OTHER
REPRESENTATIVES OF THE SYSTEM OWNER MAY MONITOR SYSTEM USE AT ANY TIME WITHOUT
FURTHER NOTICE OR CONSENT. UNAUTHORIZED USE OF THIS SYSTEM AND ANY OTHER
CRIMINAL CONDUCT REVEALED BY SUCH USE IS SUBJECT TO DISCLOSURE TO LAW
ENFORCEMENT OFFICIALS AND PROSECUTION TO THE FULL EXTENT OF THE LAW.
UNAUTHORIZED ACCESS IS A VIOLATION OF STATE AND FEDERAL,CIVIL AND CRIMINAL LAWS.
THIS SYSTEM IS PRIVATE PROPERTY FOR THE USE OF AUTHORIZED USERS ONLY!
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
session-timeout 15 output
login authentication RETAIL
ntp clock-period 36026372
ntp server 192.168.62.162
ntp server 192.168.62.161 prefer