Table Of Contents
Network Diagram and Configuration Files
Router and Firewall Configurations
vpn-jk2-7206-1
vpn-jk2-7206-2
vpn-jk2-asa5510-1
vpn1-2851-1
vpn1-3845-1
vpn4-3800-6
3750-access
Network Diagram and Configuration Files
This chapter contains a topology diagram and the associated router, firewall, and switch configuration files for the devices in this sample implementation. See Figure 1.
Figure 1 Network Diagram
Router and Firewall Configurations
In this section the running configuration files from the routers shown in the previous topology diagram are included as reference.
vpn-jk2-7206-1
This configuration is for the upper WAN aggregation router shown in the topology diagram.
! Last configuration change at 13:06:43 edt Tue Aug 4 2009
! NVRAM config last updated at 13:07:50 edt Tue Aug 4 2009
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
boot system flash disk0:c7200-adventerprisek9-mz.124-15.T5
enable secret 5 [removed]
clock summer-time edt recurring
no ip dhcp use vrf connected
route-target export 100:10
route-target import 100:10
ip host rtp5-esevpn-ios-ca 10.81.0.27
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
multilink bundle-name authenticated
crypto pki trustpoint rtp5-esevpn-ios-ca
enrollment url http://rtp5-esevpn-ios-ca:80
crypto pki certificate chain rtp5-esevpn-ios-ca
3082023A 308201A3 A0030201 0202010D 300D0609 2A864886 F70D0101 04050030
6B310C30 0A060355 04081303 204E4331 11300F06 03550407 13082052 616C6569
419A9E33 E84ABC15 FCCFB1CC EBC1AE94 F07752CC 22A803C7 99AE4097 BA2D
308202AF 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
47DC2CE3 BC3F5F40 32409535 C9E0E6C0 F29D4E
crypto isakmp keepalive 10
crypto isakmp nat keepalive 10
crypto isakmp profile IPVS_Branches_isakmp_profile
description IPVS_Branches_isakmp_profile
ca trust-point rtp5-esevpn-ios-ca
match identity host domain ese.cisco.com
crypto isakmp profile DMVPN_IKE_PROFILE
description DMVPN Profile
ca trust-point rtp5-esevpn-ios-ca
match identity address 64.102.223.24 255.255.255.255
crypto ipsec transform-set 3DES_SHA_TUNNEL esp-3des esp-sha-hmac
crypto ipsec transform-set 3DES_SHA_TRANSPORT esp-3des esp-sha-hmac
crypto ipsec profile DMVPN_IPSEC_PROFILE
set transform-set 3DES_SHA_TRANSPORT
set isakmp-profile DMVPN_IKE_PROFILE
crypto ipsec profile IPVS_Branches_ipsec_profile
description IPVS_Branches_ipsec_profile
set transform-set 3DES_SHA_TRANSPORT 3DES_SHA_TUNNEL
set isakmp-profile IPVS_Branches_isakmp_profile
class-map match-any LOW-LATENCY-DATA
match ip dscp af21 af22 af23
class-map match-any HIGH-THROUGHPUT-DATA
match ip dscp af11 af12 af13
class-map match-all BROADCAST-VIDEO
class-map match-all NETWORK-CONTROL
class-map match-any MULTIMEDIA-CONFERENCING
match ip dscp af41 af42 af43
class-map match-all VOICE
class-map match-all SCAVENGER
class-map match-any CALL-SIGNALING
class HIGH-THROUGHPUT-DATA
class MULTIMEDIA-CONFERENCING
service-policy IPVS_BRANCH
description Loopback for Global RT
ip address 192.168.15.40 255.255.255.255
description DMVPN tunnel/cloud to Branches
ip address 192.168.15.129 255.255.255.192
ip nhrp authentication FOO
ip nhrp map multicast dynamic
ip nhrp map multicast 192.168.15.40
ip nhrp nhs 192.168.15.129
no ip split-horizon eigrp 65
ip summary-address eigrp 65 192.0.2.0 255.255.255.0 5
tunnel mode gre multipoint
tunnel protection ipsec profile IPVS_Branches_ipsec_profile
description DMVPN Tunnel to Enterprise/Internet
ip address 10.81.7.254 255.255.255.240
ip nhrp authentication BAR
ip nhrp map multicast dynamic
ip nhrp map 10.81.7.241 64.102.223.24
ip nhrp map multicast 64.102.223.24
tunnel source FastEthernet0/0
tunnel destination 64.102.223.24
tunnel protection ipsec profile DMVPN_IPSEC_PROFILE
interface FastEthernet0/0
ip address 172.26.157.3 255.255.254.0
interface FastEthernet0/1
interface FastEthernet0/1.90
description ASA DMZ Global
ip address 10.81.7.161 255.255.255.248
standby 0 preempt delay minimum 60
interface FastEthernet0/1.91
description ASA DMZ vrf IPVS
ip address 192.168.15.97 255.255.255.248
standby 0 ip 192.168.15.102
interface FastEthernet0/1.332
description MAN/WAN to Site 130 (vpn1-2851-1)
ip address 192.168.15.45 255.255.255.252
service-policy output 30M
interface FastEthernet0/1.340
description MAN/WAN to Site 140 (vpn1-3845-1)
ip address 192.168.15.13 255.255.255.252
service-policy output 30M
interface FastEthernet0/1.342
description MAN/WAN to Site 140 (vpn1-3845-1)
ip address 192.168.15.77 255.255.255.252
ip summary-address eigrp 65 192.0.2.0 255.255.255.0 5
service-policy output 30M
interface FastEthernet0/1.352
description MAN/WAN to Site 150 (vpn4-3800-6)
ip address 192.168.15.49 255.255.255.252
redistribute static metric 1000 100 255 1 1500 route-map ASA5510_VPN3080
redistribute eigrp 65 metric 1000 100 255 1 1500 route-map Branch_Networks
passive-interface FastEthernet0/1.90
eigrp stub connected redistributed
redistribute eigrp 64 metric 1000 100 255 1 1500 route-map DEFAULT
network 192.168.15.0 0.0.0.63
address-family ipv4 vrf IPVS
redistribute static metric 1000 10 255 1 1500 route-map COMMAND_CENTER
network 192.168.15.64 0.0.0.63
network 192.168.15.128 0.0.0.63
distribute-list route-map Branch_Net_vrf_IPVS_RT in
ip route 10.81.0.27 255.255.255.255 172.26.156.1 name rtp5-esevpn-ios-ca
ip route 10.81.7.56 255.255.255.252 10.81.7.163 name ASA5510
ip route 10.81.254.0 255.255.255.0 172.26.156.1 name NTP_Servers
ip route 64.102.223.16 255.255.255.240 172.26.156.1 name cryptHE
ip route 172.26.0.0 255.255.0.0 172.26.156.1
ip route vrf IPVS 10.81.7.0 255.255.255.0 192.168.15.99 name ASA5510_PAT
ip route vrf IPVS 192.0.2.128 255.255.255.224 192.168.15.99 name ASA5510
ip route vrf IPVS 192.168.15.64 255.255.255.248 192.168.15.99 name VPN3080_pool
ip flow-cache timeout inactive 30
ip flow-cache timeout active 1
ip access-list standard Branch_Net_vrf_IPVS_RT
permit 192.0.2.0 0.0.0.255
ip access-list standard DEFAULT
ip prefix-list ALL_VMSS seq 5 permit 192.0.2.0/24
ip prefix-list ASA5510_VPN3080 seq 5 permit 10.81.7.56/30
ip prefix-list Branch_Net_vrf_IPVS_RT seq 132 permit 192.168.111.0/24
ip prefix-list Branch_Net_vrf_IPVS_RT seq 142 permit 192.168.11.0/24
ip prefix-list Branch_Net_vrf_IPVS_RT seq 152 permit 192.168.211.0/24
ip prefix-list Branch_Networks seq 130 permit 10.81.7.152/29
ip prefix-list Branch_Networks seq 131 permit 192.0.2.0/27
ip prefix-list Branch_Networks seq 132 permit 192.168.111.0/24
ip prefix-list Branch_Networks seq 140 permit 10.81.7.0/29
ip prefix-list Branch_Networks seq 141 permit 192.0.2.64/26
ip prefix-list Branch_Networks seq 142 permit 192.168.11.0/24
ip prefix-list Branch_Networks seq 150 permit 10.81.7.88/29
ip prefix-list Branch_Networks seq 151 permit 192.0.2.32/27
ip prefix-list Branch_Networks seq 152 permit 192.168.211.0/24
ip prefix-list COMMAND_CENTER seq 100 permit 192.0.2.128/25
ip prefix-list COMMAND_CENTER seq 101 permit 10.81.7.0/24
ip prefix-list COMMAND_CENTER seq 102 permit 192.168.15.64/29
ip prefix-list SITE_130 seq 5 permit 192.0.2.0/27
ip prefix-list SITE_140 seq 5 permit 192.0.2.64/26
logging alarm informational
snmp-server enable traps tty
route-map Branch_Net_vrf_IPVS_RT permit 10
match ip address prefix-list Branch_Net_vrf_IPVS_RT
route-map Branch_Net_vrf_IPVS_RT permit 20
match ip address Branch_Net_vrf_IPVS_RT
route-map COMMAND_CENTER permit 10
match ip address prefix-list COMMAND_CENTER
route-map Branch_Networks permit 10
match ip address prefix-list Branch_Networks
route-map DEFAULT permit 10
route-map ASA5510_VPN3080 permit 10
match ip address prefix-list ASA5510_VPN3080
==== This is the WAN/MAN router for IPVS branches
vpn-jk2-7206-2
This configuration is for the bottomWAN aggregation router shown in the topology diagram.
! Last configuration change at 13:10:14 edt Tue Aug 4 2009
! NVRAM config last updated at 13:11:17 edt Tue Aug 4 2009
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
boot system disk0:c7200-adventerprisek9-mz.124-15.T5
enable secret 5 [removed]
clock summer-time edt recurring
route-target export 100:10
route-target import 100:10
ip host rtp5-esevpn-ios-ca 10.81.0.27
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
multilink bundle-name authenticated
crypto pki trustpoint rtp5-esevpn-ios-ca
enrollment url http://rtp5-esevpn-ios-ca:80
crypto pki certificate chain rtp5-esevpn-ios-ca
3082023A 308201A3 A0030201 02020112 300D0609 2A864886 F70D0101 04050030
D2993DBF 32824A8C 420DC983 C5BF7E17 28D1406E 0D937B7D 152C6FB3 D581
308202AF 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
47DC2CE3 BC3F5F40 32409535 C9E0E6C0 F29D4E
crypto isakmp keepalive 10
crypto isakmp nat keepalive 10
crypto isakmp profile IPVS_Branches_isakmp_profile
description IPVS_Branches_isakmp_profile
ca trust-point rtp5-esevpn-ios-ca
match identity host domain ese.cisco.com
crypto ipsec transform-set 3DES_SHA_TUNNEL esp-3des esp-sha-hmac
crypto ipsec transform-set 3DES_SHA_TRANSPORT esp-3des esp-sha-hmac
crypto ipsec transform-set AES_SHA_TUNNEL esp-aes esp-sha-hmac
crypto ipsec transform-set AES_SHA_TRANSPORT esp-aes esp-sha-hmac
crypto ipsec profile IPVS_Branches_ipsec_profile
description IPVS_Branches_ipsec_profile
set transform-set 3DES_SHA_TRANSPORT 3DES_SHA_TUNNEL
set isakmp-profile IPVS_Branches_isakmp_profile
class-map match-any LOW-LATENCY-DATA
match ip dscp af21 af22 af23
class-map match-any HIGH-THROUGHPUT-DATA
match ip dscp af11 af12 af13
class-map match-all BROADCAST-VIDEO
class-map match-all NETWORK-CONTROL
class-map match-any MULTIMEDIA-CONFERENCING
match ip dscp af41 af42 af43
class-map match-all VOICE
class-map match-all SCAVENGER
class-map match-any CALL-SIGNALING
class HIGH-THROUGHPUT-DATA
class MULTIMEDIA-CONFERENCING
service-policy IPVS_BRANCH
description Loopback for Global RT
ip address 192.168.15.41 255.255.255.255
ip address 192.168.15.193 255.255.255.192
ip nhrp authentication FOO
ip nhrp map multicast dynamic
ip nhrp map multicast 192.168.15.41
ip nhrp nhs 192.168.15.193
no ip split-horizon eigrp 65
ip summary-address eigrp 65 192.0.2.0 255.255.255.0 5
tunnel mode gre multipoint
tunnel protection ipsec profile IPVS_Branches_ipsec_profile
interface FastEthernet0/0
ip address 172.26.157.4 255.255.254.0
interface FastEthernet0/1
description MAN/WAN to Branches
interface FastEthernet0/1.90
description ASA DMZ Global
ip address 10.81.7.162 255.255.255.248
standby 0 preempt delay minimum 60
interface FastEthernet0/1.91
description ASA DMZ vrf IPVS
ip address 192.168.15.98 255.255.255.248
standby 0 ip 192.168.15.102
standby 0 preempt delay minimum 60
interface FastEthernet0/1.331
ip address 192.168.15.21 255.255.255.252
service-policy output 30M
interface FastEthernet0/1.341
ip address 192.168.15.25 255.255.255.252
service-policy output 30M
interface FastEthernet0/1.343
ip address 192.168.15.89 255.255.255.252
ip summary-address eigrp 65 192.0.2.0 255.255.255.0 5
service-policy output 30M
interface FastEthernet0/1.351
ip address 192.168.15.29 255.255.255.252
redistribute eigrp 65 metric 1000 100 255 1 1500 route-map Branch_Networks
passive-interface FastEthernet0/1.90
eigrp stub connected redistributed
redistribute eigrp 64 metric 1000 100 255 1 1500 route-map DEFAULT
network 192.168.15.0 0.0.0.63
address-family ipv4 vrf IPVS
redistribute static metric 1000 10 255 1 1500 route-map COMMAND_CENTER
network 192.168.15.64 0.0.0.63
network 192.168.15.192 0.0.0.63
distribute-list route-map Branch_Net_vrf_IPVS_RT in
ip route 10.81.0.27 255.255.255.255 172.26.156.1 name rtp5-esevpn-ios-ca
ip route 10.81.7.56 255.255.255.252 10.81.7.163 name ASA5510
ip route 10.81.254.0 255.255.255.0 172.26.156.1 name NTP_Servers
ip route 64.102.223.16 255.255.255.240 172.26.156.1 name cryptHE
ip route vrf IPVS 10.81.7.0 255.255.255.0 192.168.15.99 name ASA5510_PAT
ip route vrf IPVS 192.0.2.128 255.255.255.224 192.168.15.99 name ASA5510
ip route vrf IPVS 192.168.15.64 255.255.255.248 192.168.15.99 name VPN3080_pool
ip access-list standard Branch_Net_vrf_IPVS_RT
permit 192.0.2.0 0.0.0.255
ip access-list standard DEFAULT
ip prefix-list Branch_Net_vrf_IPVS_RT seq 132 permit 192.168.111.0/24
ip prefix-list Branch_Net_vrf_IPVS_RT seq 142 permit 192.168.11.0/24
ip prefix-list Branch_Net_vrf_IPVS_RT seq 152 permit 192.168.211.0/24
ip prefix-list Branch_Networks seq 130 permit 10.81.7.152/29
ip prefix-list Branch_Networks seq 131 permit 192.0.2.0/27
ip prefix-list Branch_Networks seq 132 permit 192.168.111.0/24
ip prefix-list Branch_Networks seq 140 permit 10.81.7.0/29
ip prefix-list Branch_Networks seq 141 permit 192.0.2.64/26
ip prefix-list Branch_Networks seq 142 permit 192.168.11.0/24
ip prefix-list Branch_Networks seq 150 permit 10.81.7.88/29
ip prefix-list Branch_Networks seq 151 permit 192.0.2.32/27
ip prefix-list Branch_Networks seq 152 permit 192.168.211.0/24
ip prefix-list COMMAND_CENTER seq 100 permit 192.0.2.128/25
ip prefix-list COMMAND_CENTER seq 101 permit 10.81.7.0/24
ip prefix-list COMMAND_CENTER seq 102 permit 192.168.15.64/29
logging alarm informational
route-map Branch_Net_vrf_IPVS_RT permit 10
match ip address prefix-list Branch_Net_vrf_IPVS_RT
route-map Branch_Net_vrf_IPVS_RT permit 20
match ip address Branch_Net_vrf_IPVS_RT
route-map COMMAND_CENTER permit 10
match ip address prefix-list COMMAND_CENTER
route-map Branch_Networks permit 10
match ip address prefix-list Branch_Networks
route-map DEFAULT permit 10
ntp clock-period 17179966
vpn-jk2-asa5510-1
This configuration is for the firewall shown in the topology diagram
: Written by enable_15 at 13:55:41.021 edt Tue Aug 4 2009
hostname vpn-jk2-asa5510-1
domain-name ese.cisco.com
enable password 2KFQnbNIdI.2KYOU encrypted
passwd [removed] encrypted
description Campus_IPVS VLAN 220
ip address 192.0.2.129 255.255.255.224
description DMZ_IPVS VLAN 91
ip address 192.168.15.99 255.255.255.248
description DMZ_Global VLAN 90
ip address 10.81.7.163 255.255.255.248
description DMZ for VPN3080
ip address 10.81.7.58 255.255.255.252
ip address 172.26.156.3 255.255.254.0
boot system disk0:/asa804-k8.bin
clock summer-time edt recurring
dns server-group DefaultDNS
domain-name ese.cisco.com
access-list MANAGEMENT extended permit tcp 10.81.7.0 255.255.255.0 interface FlashNET
access-list IPVS-CC extended permit udp any 192.0.2.128 255.255.255.224 eq syslog
access-list IPVS-CC extended permit udp any host 192.0.2.139 eq snmptrap
access-list IPVS-CC extended permit udp any host 192.0.2.139 eq 7777
access-list IPVS-CC extended permit tcp 192.0.2.0 255.255.255.0 any eq www
access-list INBOUND extended permit esp any host 10.81.7.57
access-list INBOUND extended permit udp any host 10.81.7.57 eq isakmp
access-list INBOUND extended permit udp any host 10.81.7.57 eq 4500
access-list INBOUND extended permit icmp any host 10.81.7.57
logging buffered debugging
icmp unreachable rate-limit 1 burst-size 1
icmp permit any Campus_IPVS
icmp permit any DMZ_Global
icmp permit any DMZ_VPN3080
asdm image disk0:/asdm-61551.bin
global (DMZ_Global) 1 interface
nat (Campus_IPVS) 1 192.0.2.128 255.255.255.224
static (DMZ_VPN3080,DMZ_Global) 192.168.15.56 192.168.15.56 netmask 255.255.255.252
static (Campus_IPVS,DMZ_IPVS) 192.0.2.128 192.0.2.128 netmask 255.255.255.224
static (Campus_IPVS,DMZ_IPVS) 192.168.15.64 192.168.15.64 netmask 255.255.255.248
access-group IPVS-CC in interface DMZ_IPVS
access-group INBOUND in interface DMZ_Global
access-group MANAGEMENT in interface FlashNET control-plane
route DMZ_Global 0.0.0.0 0.0.0.0 10.81.7.166 1
route FlashNET 172.16.0.0 255.240.0.0 172.26.156.1 1
route DMZ_IPVS 192.0.2.0 255.255.255.0 192.168.15.102 1
route DMZ_IPVS 192.168.11.0 255.255.255.0 192.168.15.102 1
route Campus_IPVS 192.168.15.64 255.255.255.248 192.0.2.136 1
route DMZ_IPVS 192.168.111.0 255.255.255.0 192.168.15.102 1
route DMZ_IPVS 192.168.211.0 255.255.255.0 192.168.15.102 1
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http 172.26.156.0 255.255.254.0 FlashNET
http 10.81.7.0 255.255.255.0 FlashNET
snmp-server location ESE Lab
snmp-server contact joel.king@cisco.com
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
telnet 10.81.7.176 255.255.255.248 FlashNET
telnet 172.26.156.0 255.255.254.0 FlashNET
ssh 10.81.7.0 255.255.255.0 FlashNET
ssh 172.26.156.0 255.255.254.0 FlashNET
dhcpd domain ese.cisco.com
dhcpd option 3 ip 192.0.2.129
dhcpd address 192.0.2.140-192.0.2.150 Campus_IPVS
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns migrated_dns_map_1
message-length maximum 512
inspect dns migrated_dns_map_1
service-policy global_policy global
Cryptochecksum:3d4d4e2f06d5a11ff2dd5d5643e862f5
vpn1-2851-1
This configuration is for the branch 2851 model router shown in the topology diagram
! Last configuration change at 13:26:29 edt Tue Aug 4 2009
! NVRAM config last updated at 13:27:56 edt Tue Aug 4 2009
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service udp-small-servers
service tcp-small-servers
enable secret 5 [removed]
clock summer-time edt recurring
crypto pki trustpoint rtp5-esevpn-ios-ca
enrollment url http://rtp5-esevpn-ios-ca:80
crypto pki certificate chain rtp5-esevpn-ios-ca
3082023B 308201A4 A0030201 0202010F 300D0609 2A864886 F70D0101 04050030
32C8325C 8DF24E4B D16823BA AF45A2F8 A6AA3C9C 8E33E400 CBAE2184 09F267
308202AF 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
47DC2CE3 BC3F5F40 32409535 C9E0E6C0 F29D4E
ip dhcp use vrf connected
ip dhcp excluded-address 192.168.111.1 192.168.111.149
ip dhcp excluded-address 192.0.2.17 192.0.2.19
network 192.0.2.16 255.255.255.240
default-router 192.0.2.17
dns-server 64.102.6.247 171.68.226.120
network 192.168.111.0 255.255.255.0
default-router 192.168.111.1
route-target export 100:10
route-target import 100:10
ip host harry 172.26.129.252
ip host rtp5-esevpn-ios-ca 10.81.0.27
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
multilink bundle-name authenticated
username joeking privilege 15 secret 5 [removed]
crypto isakmp keepalive 10
crypto isakmp nat keepalive 10
crypto isakmp profile IPVS_Branches_isakmp_profile
ca trust-point rtp5-esevpn-ios-ca
match identity address 192.168.15.40 255.255.255.255
crypto isakmp profile IPVS_Branches_isakmp_profile_2
ca trust-point rtp5-esevpn-ios-ca
match identity address 192.168.15.41 255.255.255.255
crypto ipsec transform-set AES_SHA_TUNNEL esp-aes esp-sha-hmac
crypto ipsec transform-set 3DES_SHA_TUNNEL esp-3des esp-sha-hmac
crypto ipsec transform-set 3DES_SHA_TRANSPORT esp-3des esp-sha-hmac
crypto ipsec transform-set AES_SHA_TRANSPORT esp-aes esp-sha-hmac
crypto ipsec profile IPVS_Branches_ipsec_profile
description IPVS_Branches_ipsec_profile
set transform-set 3DES_SHA_TRANSPORT 3DES_SHA_TUNNEL
set isakmp-profile IPVS_Branches_isakmp_profile
crypto ipsec profile IPVS_Branches_ipsec_profile_2
set transform-set 3DES_SHA_TRANSPORT 3DES_SHA_TUNNEL
set isakmp-profile IPVS_Branches_isakmp_profile_2
match ip dscp cs2 cs3 cs6 cs7
match ip dscp af41 af42 af43
match ip dscp af31 af32 af33
class-map match-all TELEPRESENCE
class-map match-any LOW-LATENCY-DATA
match ip dscp af21 af22 af23
class-map match-any BRONZE
match ip dscp af11 af12 af13
class-map match-any HIGH-THROUGHPUT-DATA
match ip dscp af11 af12 af13
match access-group name HTTP
class-map match-all BROADCAST-VIDEO
class-map match-all NETWORK-CONTROL
class-map match-any MULTIMEDIA-CONFERENCING
match ip dscp af41 af42 af43
class-map match-any REAL_TIME
class-map match-all VOICE
class-map match-all SCAVENGER
class-map match-any CALL-SIGNALING
class-map match-any MULTIMEDIA-STREAMING
match ip dscp af31 af32 af33
class HIGH-THROUGHPUT-DATA
class MULTIMEDIA-CONFERENCING
service-policy IPVS_BRANCH
policy-map PER_CLASS_SHAPING
police 40000000 conform-action transmit exceed-action transmit
service-policy IPVS_BRANCH
ip address 192.168.15.130 255.255.255.192
ip nhrp authentication FOO
ip nhrp map 192.168.15.129 192.168.15.40
ip nhrp map multicast 192.168.15.40
ip nhrp nhs 192.168.15.129
ip summary-address eigrp 65 192.0.2.0 255.255.255.224 5
tunnel source GigabitEthernet0/1.332
tunnel destination 192.168.15.40
tunnel protection ipsec profile IPVS_Branches_ipsec_profile
ip address 192.168.15.194 255.255.255.192
ip nhrp authentication FOO
ip nhrp map multicast 192.168.15.41
ip nhrp map 192.168.15.193 192.168.15.41
ip nhrp nhs 192.168.15.193
ip summary-address eigrp 65 192.0.2.0 255.255.255.224 5
tunnel source GigabitEthernet0/1.331
tunnel destination 192.168.15.41
tunnel protection ipsec profile IPVS_Branches_ipsec_profile_2
interface GigabitEthernet0/0
interface GigabitEthernet0/0.204
ip address 10.81.7.153 255.255.255.248
interface GigabitEthernet0/0.206
description VLAN 206 for IP Cameras
ip address 192.0.2.17 255.255.255.240
interface GigabitEthernet0/1
interface GigabitEthernet0/1.130
description To vpn-jk3-2651xm-4 Primary WAN
interface GigabitEthernet0/1.254
description iSCSI Management Subnet
ip address 192.168.111.1 255.255.255.0
interface GigabitEthernet0/1.331
ip address 192.168.15.22 255.255.255.252
service-policy output 30M
interface GigabitEthernet0/1.332
ip address 192.168.15.46 255.255.255.252
service-policy output PER_CLASS_SHAPING
interface FastEthernet0/3/0
interface FastEthernet0/3/1
interface FastEthernet0/3/2
interface FastEthernet0/3/3
interface Integrated-Service-Engine1/0
ip address 192.0.2.1 255.255.255.252
service-module external ip address 192.168.111.2 255.255.255.0
service-module ip address 192.0.2.2 255.255.255.252
service-module ip default-gateway 192.0.2.1
service-policy input INGRESS_VMSS
interface Video-Service-Engine2/0
ip address 192.0.2.5 255.255.255.252
service-module ip address 192.0.2.6 255.255.255.252
service-module ip default-gateway 192.0.2.5
ip address 172.26.156.51 255.255.254.0
network 10.81.7.152 0.0.0.7
network 192.168.15.0 0.0.0.63
address-family ipv4 vrf IPVS
network 192.0.2.0 0.0.0.31
network 192.168.15.128 0.0.0.63
network 192.168.15.192 0.0.0.63
ip route 10.81.0.27 255.255.255.255 172.26.156.1 name rtp5-esevpn-ios-ca
ip route 172.26.0.0 255.255.0.0 172.26.156.1 name Miles
ip route 192.168.15.40 255.255.255.255 192.168.15.45 name vpn-jk2-7206-1_Loopback_0
ip route 192.168.15.41 255.255.255.255 192.168.15.21 name vpn-jk2-7206-2_Loopback_0
ip route 64.102.223.16 255.255.255.240 dhcp
ip route 192.5.41.40 255.255.255.254 dhcp
ip flow-cache timeout active 1
ip flow-export destination 172.26.157.11 7777
ip access-list extended HTTP
permit tcp host 192.0.2.2 eq www any
ip access-list extended VSOM
permit tcp host 192.0.2.2 eq www 192.168.16.0 0.0.15.255
permit tcp host 192.0.2.2 eq 443 192.168.16.0 0.0.15.255
ip prefix-list CAMPUS seq 5 permit 192.168.16.0/20
ip sla schedule 219 life forever start-time now
snmp-server enable traps tty
|| || Cisco Systems, Inc.
.:|||||||:.......:|||||||:..
US, Asia & Americas support: + 1 408 526 8888
EMEA support: + 31 020 342 3888
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.
You must have explicit permission to access or configure this
device. All activities performed on this device are logged and
violations of this policy may result in disciplinary action.
Questions regarding this device should be directed to
=== Site 130 === vpn1-2851-1
alias exec analog service-module Video-Service-Engine2/0 session
transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
scheduler allocate 20000 1000
ntp clock-period 17180366
ntp source GigabitEthernet0/0.206
ntp server 192.168.4.1 source GigabitEthernet0/1.130
ntp server 10.81.254.202 source GigabitEthernet0/0.204
ntp server 10.81.254.131 source GigabitEthernet0/0.204
vpn1-3845-1
This configuration is for the branch 3845 model router shown in the topology diagram
! Last configuration change at 13:21:52 edt Tue Aug 4 2009
! NVRAM config last updated at 13:23:50 edt Tue Aug 4 2009
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
no service password-encryption
service udp-small-servers
service tcp-small-servers
boot system flash flash:c3845-adventerprisek9-mz.124-15.T5
boot system flash flash:c3845-adventerprisek9-mz.124-22.T
enable secret 5 [removed]
clock summer-time edt recurring
ip dhcp use vrf connected
ip dhcp excluded-address 192.0.2.97 192.0.2.102
network 10.81.7.0 255.255.255.248
dns-server 64.102.6.247 171.68.226.120
domain-name ese.cisco.com
netbios-name-server 171.68.235.228 171.68.235.229
network 192.0.2.96 255.255.255.224
default-router 192.0.2.97
dns-server 64.102.6.247 171.68.226.120
domain-name ese.cisco.com
route-target export 100:10
route-target import 100:10
ip domain name ese.cisco.com
ip host rtp5-esevpn-ios-ca 10.81.0.27
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
ip dhcp-client default-router distance 239
multilink bundle-name authenticated
key-string 7 00[removed]00
border 192.168.0.1 key-chain PURPLE
interface GigabitEthernet0/1.250 internal
interface GigabitEthernet0/1.210 internal
interface GigabitEthernet0/1.294 external
interface GigabitEthernet0/1.293 external
interface Integrated-Service-Engine3/0 internal
aggregation-type prefix-length 29
master 192.168.0.1 key-chain PURPLE
crypto pki trustpoint rtp5-esevpn-ios-ca
enrollment url http://rtp5-esevpn-ios-ca:80
crypto pki certificate chain rtp5-esevpn-ios-ca
3082023B 308201A4 A0030201 0202010E 300D0609 2A864886 F70D0101 04050030
DE5E201F F1A6CB47 D57C7260 70BE64AD 78656E15 A2EB7E43 9D969FB5 C4233B
308202AF 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
47DC2CE3 BC3F5F40 32409535 C9E0E6C0 F29D4E
username joeking privilege 15 secret 5 [removed]
crypto isakmp keepalive 10
crypto isakmp nat keepalive 10
crypto isakmp profile DMVPN_IKE_PROFILE
description DMVPN Profile
ca trust-point rtp5-esevpn-ios-ca
match identity address 64.102.223.24 255.255.255.255
crypto isakmp profile DMVPN_IKE_PROFILE_2
description DMVPN Profile
ca trust-point rtp5-esevpn-ios-ca
match identity address 64.102.223.25 255.255.255.255
crypto ipsec transform-set 3DES_SHA_TUNNEL esp-3des esp-sha-hmac
crypto ipsec transform-set 3DES_SHA_TRANSPORT esp-3des esp-sha-hmac
crypto ipsec profile DMVPN_IPSEC_PROFILE
set transform-set 3DES_SHA_TRANSPORT
set isakmp-profile DMVPN_IKE_PROFILE
crypto ipsec profile DMVPN_IPSEC_PROFILE_2
set transform-set 3DES_SHA_TRANSPORT
set isakmp-profile DMVPN_IKE_PROFILE_2
class-map match-any LOW-LATENCY-DATA
match ip dscp af21 af22 af23
class-map match-any HIGH-THROUGHPUT-DATA
match ip dscp af11 af12 af13
class-map match-all BROADCAST-VIDEO
class-map match-all NETWORK-CONTROL
class-map match-any MULTIMEDIA-CONFERENCING
match ip dscp af41 af42 af43
class-map match-all VOICE
class-map match-all SCAVENGER
class-map match-any CALL-SIGNALING
class HIGH-THROUGHPUT-DATA
class MULTIMEDIA-CONFERENCING
service-policy IPVS_BRANCH
description for OER peering
ip address 192.168.0.1 255.255.255.255
interface GigabitEthernet0/0
interface GigabitEthernet0/1
interface GigabitEthernet0/1.140
interface GigabitEthernet0/1.210
description IP Camera VLAN
ip address 192.0.2.97 255.255.255.224
interface GigabitEthernet0/1.250
ip address 10.81.7.1 255.255.255.248
interface GigabitEthernet0/1.256
description management interface for iSCSI
ip address 192.168.11.1 255.255.255.0
interface GigabitEthernet0/1.293
description To vpn-jk2-7206-1 for PfR
ip address 192.168.15.6 255.255.255.252
interface GigabitEthernet0/1.294
description To vpn-jk2-7206-1 for PfR
ip address 192.168.15.2 255.255.255.252
interface GigabitEthernet0/1.340
ip address 192.168.15.14 255.255.255.252
interface GigabitEthernet0/1.341
ip address 192.168.15.26 255.255.255.252
interface GigabitEthernet0/1.342
ip address 192.168.15.78 255.255.255.252
ip summary-address eigrp 65 192.0.2.64 255.255.255.192 5
service-policy output 30M
interface GigabitEthernet0/1.343
ip address 192.168.15.90 255.255.255.252
ip summary-address eigrp 65 192.0.2.64 255.255.255.192 5
service-policy output 30M
interface FastEthernet1/0
description connection to Flashnet
interface FastEthernet1/1
interface FastEthernet1/2
interface FastEthernet1/3
interface FastEthernet1/4
interface FastEthernet1/5
interface FastEthernet1/6
interface FastEthernet1/7
interface FastEthernet1/8
interface FastEthernet1/9
interface FastEthernet1/10
interface FastEthernet1/11
interface FastEthernet1/12
interface FastEthernet1/13
interface FastEthernet1/14
interface FastEthernet1/15
interface GigabitEthernet1/0
interface Integrated-Service-Engine2/0
description NME-WAE-522-K9
ip address 192.0.2.69 255.255.255.252
ip wccp redirect exclude in
service-module ip address 192.0.2.70 255.255.255.252
service-module ip default-gateway 192.0.2.69
interface Integrated-Service-Engine3/0
description NME-VMSS-HP32 ip wccp 61 red in 62 red out
ip address 192.0.2.64 255.255.255.254
ip nbar protocol-discovery
service-module external ip address 192.168.11.2 255.255.255.0
service-module ip address 192.0.2.65 255.255.255.254
service-module ip default-gateway 192.0.2.64
ip address 172.26.156.53 255.255.254.0
network 10.81.7.0 0.0.0.7
network 192.168.15.0 0.0.0.63
address-family ipv4 vrf IPVS
network 192.0.2.64 0.0.0.63
network 192.168.15.64 0.0.0.63
ip route 192.168.16.0 255.255.240.0 192.168.15.1 230 name OER_Parent
ip route 192.168.16.0 255.255.240.0 192.168.15.5 230 name OER_Parent
ip route 192.168.32.0 255.255.224.0 192.168.15.1 230 name OER_Parent
ip route 192.168.32.0 255.255.224.0 192.168.15.5 230 name OER_Parent
ip route 64.102.223.16 255.255.255.240 dhcp
ip flow-cache timeout active 1
ip flow-export source Integrated-Service-Engine3/0
ip flow-export destination 172.26.157.11 7777
ip prefix-list CAMPUS seq 5 permit 192.168.16.0/20
udp-jitter 192.168.15.5 14216 source-ip 192.168.15.6 codec g729a codec-numpackets 50
tag VERIFICATION for Vlan 293
ip sla schedule 293 life forever start-time now
udp-jitter 192.168.15.1 14214 source-ip 192.168.15.2 codec g729a codec-numpackets 50
tag VERIFICATION for Vlan 294
ip sla schedule 294 life forever start-time now
snmp-server enable traps tty
match traffic-class prefix-list CAMPUS
set mode select-exit best
set resolve loss priority 1 variance 10
set resolve delay priority 2 variance 10
set active-probe jitter 192.168.16.1 target-port 32014 codec g729a
transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
scheduler allocate 20000 1000
ntp clock-period 17180273
ntp source Integrated-Service-Engine3/0
ntp server 10.81.254.202 source Vlan1
ntp server 10.81.254.131 source Vlan1
vpn4-3800-6
This configuration is for the branch 3825 model router shown in the topology diagram
! ================= vpn4-3800-6 ==================================
! Last configuration change at 13:33:32 edt Tue Aug 4 2009
! NVRAM config last updated at 13:35:16 edt Tue Aug 4 2009
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service udp-small-servers
service tcp-small-servers
enable secret 5 [removed]
clock summer-time edt recurring
ip dhcp use vrf connected
ip dhcp excluded-address 192.168.211.1 192.168.211.149
ip dhcp excluded-address 192.0.2.52
network 192.0.2.48 255.255.255.240
default-router 192.0.2.49
domain-name ese.cisco.com
dns-server 64.102.6.247 171.68.226.120
network 192.168.211.0 255.255.255.0
default-router 192.168.211.1
route-target export 100:10
route-target import 100:10
ip host rtp5-esevpn-ios-ca 10.81.0.27
ip host harry 172.26.129.252
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
multilink bundle-name authenticated
crypto pki trustpoint rtp5-esevpn-ios-ca
enrollment url http://rtp5-esevpn-ios-ca:80
crypto pki certificate chain rtp5-esevpn-ios-ca
3082023B 308201A4 A0030201 02020113 300D0609 2A864886 F70D0101 04050030
6C240A83 ADF2674E D83B7BEF 59A04BC8 A0474C0C 492CAD79 2713CCFA 1783F4
308202AF 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
A9C7FB7B F68000AE 7C8FABF5 24279B82 8A394A91 4DF83555 D2C9D52E 84779C37
47DC2CE3 BC3F5F40 32409535 C9E0E6C0 F29D4E
username joeking privilege 15 secret 5 vpn4-3800-6
username test password 7 vpn4-3800-6
crypto isakmp keepalive 10
crypto isakmp nat keepalive 10
crypto isakmp profile IPVS_Branches_isakmp_profile
ca trust-point rtp5-esevpn-ios-ca
match identity address 192.168.15.40 255.255.255.255
crypto isakmp profile IPVS_Branches_isakmp_profile_2
ca trust-point rtp5-esevpn-ios-ca
match identity address 192.168.15.41 255.255.255.255
crypto ipsec transform-set 3DES_SHA_TUNNEL esp-3des esp-sha-hmac
crypto ipsec transform-set 3DES_SHA_TRANSPORT esp-3des esp-sha-hmac
crypto ipsec transform-set AES_SHA_TUNNEL esp-aes esp-sha-hmac
crypto ipsec transform-set AES_SHA_TRANSPORT esp-aes esp-sha-hmac
crypto ipsec profile IPVS_Branches_ipsec_profile
description IPVS_Branches_ipsec_profile
set transform-set 3DES_SHA_TRANSPORT 3DES_SHA_TUNNEL
set isakmp-profile IPVS_Branches_isakmp_profile
crypto ipsec profile IPVS_Branches_ipsec_profile_2
set transform-set 3DES_SHA_TRANSPORT 3DES_SHA_TUNNEL
set isakmp-profile IPVS_Branches_isakmp_profile_2
class-map match-any LOW-LATENCY-DATA
match ip dscp af21 af22 af23
class-map match-any HIGH-THROUGHPUT-DATA
match ip dscp af11 af12 af13
class-map match-all BROADCAST-VIDEO
class-map match-all NETWORK-CONTROL
class-map match-any MULTIMEDIA-CONFERENCING
match ip dscp af41 af42 af43
class-map match-all VOICE
class-map match-all SCAVENGER
class-map match-any CALL-SIGNALING
class HIGH-THROUGHPUT-DATA
class MULTIMEDIA-CONFERENCING
service-policy IPVS_BRANCH
ip address 192.168.15.131 255.255.255.192
ip nhrp authentication FOO
ip nhrp map 192.168.15.129 192.168.15.40
ip nhrp map multicast 192.168.15.40
ip nhrp nhs 192.168.15.129
ip summary-address eigrp 65 192.0.2.32 255.255.255.224 5
tunnel source GigabitEthernet0/0.352
tunnel destination 192.168.15.40
tunnel protection ipsec profile IPVS_Branches_ipsec_profile
ip address 192.168.15.195 255.255.255.192
ip nhrp authentication FOO
ip nhrp map 192.168.15.193 192.168.15.41
ip nhrp map multicast 192.168.15.41
ip nhrp nhs 192.168.15.193
ip summary-address eigrp 65 192.0.2.32 255.255.255.224 5
tunnel source GigabitEthernet0/0.351
tunnel destination 192.168.15.41
tunnel protection ipsec profile IPVS_Branches_ipsec_profile_2
interface GigabitEthernet0/0
interface GigabitEthernet0/0.150
interface GigabitEthernet0/0.203
description Inside global routing for corporate end-users
ip address 10.81.7.89 255.255.255.248
interface GigabitEthernet0/0.208
description Inside interface for IP Cameras
ip address 192.0.2.49 255.255.255.240
interface GigabitEthernet0/0.258
description iSCSI Management Subnet
ip address 192.168.211.1 255.255.255.0
interface GigabitEthernet0/0.351
description vpn-jk2-7206-2 [Second Head-end]
ip address 192.168.15.30 255.255.255.252
service-policy output 30M
interface GigabitEthernet0/0.352
description vpn-jk2-7206-1 [Primary Head-end]
ip address 192.168.15.50 255.255.255.252
service-policy output 30M
interface GigabitEthernet0/1
interface FastEthernet0/2/0
interface FastEthernet0/2/1
interface FastEthernet0/2/2
interface FastEthernet0/2/3
interface Video-Service-Engine1/0
ip address 192.0.2.37 255.255.255.252
service-module ip address 192.0.2.38 255.255.255.252
service-module ip default-gateway 192.0.2.37
interface Integrated-Service-Engine2/0
ip address 192.0.2.33 255.255.255.252
service-module external ip address 192.168.211.2 255.255.255.0
service-module ip address 192.0.2.34 255.255.255.252
service-module ip default-gateway 192.0.2.33
ip address 172.26.156.105 255.255.254.0
network 10.81.7.88 0.0.0.7
network 192.168.15.0 0.0.0.63
address-family ipv4 vrf IPVS
network 192.0.2.32 0.0.0.31
network 192.168.15.128 0.0.0.127
ip route 10.81.0.27 255.255.255.255 172.26.156.1 name IOS-CA
ip route 192.168.15.40 255.255.255.255 192.168.15.49 name vpn-jk2-7206-1_Loopback_0
ip route 192.168.15.41 255.255.255.255 192.168.15.29 name vpn-jk2-7206-2_Loopback_0
ip route 64.102.223.16 255.255.255.240 dhcp
ip route 192.5.41.40 255.255.255.254 dhcp
ip flow-cache timeout active 1
ip flow-export destination 172.26.157.11 7777
ip access-list extended LOCAL_LOGIN
permit tcp host 192.0.2.33 any eq 2130
snmp-server enable traps tty
192.0.2.32 /30 ISR NM NME-VMSS-HP16
192.0.2.36 /30 EVM-IPVS-16A
192.0.2.40 reserved .40 to .47
192.0.2.48 /28 Reserved for IP Cameras (0.0.0.15)
|| || Cisco Systems, Inc.
.:|||||||:.......:|||||||:..
US, Asia & Americas support: + 1 408 526 8888
EMEA support: + 31 020 342 3888
UNAUTHORIZED ACCESS TO THIS NETWORK DEVICE IS PROHIBITED.
You must have explicit permission to access or configure this
device. All activities performed on this device are logged and
violations of this policy may result in disciplinary action.
transport output lat pad telnet rlogin lapb-ta mop udptn v120 ssh
access-class LOCAL_LOGIN in vrf-also
scheduler allocate 20000 1000
ntp clock-period 17178750
ntp source Integrated-Service-Engine2/0
ntp server 192.168.6.1 source GigabitEthernet0/0.150
ntp server 10.81.254.202 source Vlan1
ntp server 10.81.254.131 source Vlan1
3750-access
This configuration is for an access-layer switch not explicitly shown in the topology diagram. It is a
cisco WS-C3750G-24PS model.
! System image file is "flash:c3750-advipservicesk9-mz.122-44.SE1.bin"
Building configuration...
Current configuration : 6533 bytes
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
switch 1 provision ws-c3750g-24ps
ip multicast-routing distributed
crypto pki trustpoint TP-self-signed-798490880
subject-name cn=IOS-Self-Signed-Certificate-798490880
rsakeypair TP-self-signed-798490880
crypto pki certificate chain TP-self-signed-798490880
certificate self-signed 01
macro name cisco-camera-2500
description Connected to IPVS Camera
#Assign Cisco IPVS Camera in unique Layer 2 VLAN
switchport access vlan $VLAN
#Statically configure Cisco Camera port in access-mode
#Enable Layer 2 Port-Security
#Dynamically register secured IPVS MAC address.
switchport port-security mac-address sticky
#Set maximum allowed secured MAC entry to 1. Default value, but with macro it wi
ll override manual setting.
switchport port-security maximum 1
#Set port security violation action to shutdown physical port. Default setting,
but will macro it will override manual setting.
switchport port-security violation shutdown
#Enable QoS on Cisco Camera port and trust incoming DSCP value.
#Expedite port bring up process by enabling portfast configuration.
#Disable transmitting and receiving STP BPDU frame on Cisco Camera port
spanning-tree bpdufilter enable
description Cisco Video Surveillance 2500 Series IP Camera
switchport access vlan $VLAN
switchport port-security mac-address sticky
switchport port-security maximum 1
switchport port-security violation shutdown
spanning-tree bpdufilter enable
spanning-tree extend system-id
vlan internal allocation policy ascending
class-map match-all HTTP_acl
match access-group name HTTP
class-map match-all HTTP_acl_client
match access-group name HTTP_client
policy-map Viewing_Station
interface GigabitEthernet1/0/1
description trunk to vpn1-2851-1 [vpn-jk2-2948-1]
switchport trunk encapsulation dot1q
interface GigabitEthernet1/0/2
description Cisco Video Surveillance 2500 Series IP Camera
switchport access vlan 208
switchport port-security mac-address sticky
switchport port-security mac-address sticky 001d.e5ea.79d3
macro description CIVS-IPC-2500
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/3
description 4300 IP camera 0021.1bfd.df85
switchport access vlan 220
switchport port-security mac-address sticky
switchport port-security mac-address sticky 0021.1bfd.df85
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/4
description 4300 IP camera 0021.1bfd.df62
switchport access vlan 220
switchport port-security mac-address sticky
switchport port-security mac-address sticky 0021.1bfd.df62
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/5
description Viewing Station
switchport access vlan 208
spanning-tree bpdufilter enable
service-policy input Viewing_Station
interface GigabitEthernet1/0/6
interface GigabitEthernet1/0/7
interface GigabitEthernet1/0/8
interface GigabitEthernet1/0/9
interface GigabitEthernet1/0/10
interface GigabitEthernet1/0/11
description CIVS-IPC-4500-1
switchport access vlan 220
switchport port-security mac-address sticky
switchport port-security mac-address sticky 001e.bdfc.19d6
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/12
description CIVS-IPC-4500-2
switchport access vlan 220
switchport port-security mac-address sticky
switchport port-security mac-address sticky 0021.1bfd.dfc1
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/13
description CIVS-IPC-4500-3
switchport access vlan 220
switchport port-security mac-address sticky
switchport port-security mac-address sticky 001b.53ff.6cb9
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/14
description CIVS-IPC-4500-4
switchport access vlan 220
switchport port-security mac-address sticky
switchport port-security mac-address sticky 001e.bdfc.19c9
spanning-tree bpdufilter enable
interface GigabitEthernet1/0/15
interface GigabitEthernet1/0/16
interface GigabitEthernet1/0/17
interface GigabitEthernet1/0/18
interface GigabitEthernet1/0/19
interface GigabitEthernet1/0/20
interface GigabitEthernet1/0/21
interface GigabitEthernet1/0/22
interface GigabitEthernet1/0/23
interface GigabitEthernet1/0/24
interface GigabitEthernet1/0/25
interface GigabitEthernet1/0/26
interface GigabitEthernet1/0/27
interface GigabitEthernet1/0/28
ip access-list extended HTTP
permit tcp any eq www any
ip access-list extended HTTP_client
permit tcp any any eq www