Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Config

Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 21

set system host-name bras-lab-01

set system root-authentication encrypted-password


"$6$Fc/jeGcN$dJFuqc2vLhQJs2ehVhAHFjmC7uiDwT1GFNjSnX/enUNBBbTdhXPzVA3kGAqvVdU8a4dAzA
bMxr3YI9nsKKfa//"
set system configuration-database max-db-size 314572800
set system login class rancid-class idle-timeout 5
set system login class rancid-class login-alarms
set system login class rancid-class permissions secret
set system login class rancid-class permissions view
set system login class rancid-class permissions view-configuration
set system login class rancid-class allow-commands "(set cli.*)|(show.*)|(quit)"
set system login class rancid-class deny-commands .*
set system login user abhishek uid 2024
set system login user abhishek class super-user
set system login user abhishek authentication encrypted-password
"$5$m7CD1TX7$tg/wZDxTGtupoAJ2YqWKm7jhYBB7uJQOxsQQhXjqE1B"
set system login user abhishek authentication ssh-rsa "ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAQEAuFMb3BrJ7TJ77N+fYVMSSQEC4p4f+MiYyAJnBCpf8ijmq1wiPvvBYLP
uxu7EooFYL/xWSSCVIHBFdcNzJlalLnUXxviGpU/S5R/H2UDF1x9W3KAngZLqCBl43y0HpGZNMIWEt9Is5w
JfeGKpliTbLYfL10V0yecV/JYrmA7cwa5VnSi6Yn9aTLP+oiD2lB+BRdzBqGRdRZnsnNF0eIRxV6F+65Y1k
U1GUz5yZBZhn8V8W597hxP8E6Vx9IHnpwGlSAXf5V6SFLQ3Q6+m8rYrO4CZ8/4JGB4Vc7AJWIlwBh//w+rN
N1bHqSTgf/kOCAMPIdVuEaWsRg/KrFrwvE+ESw=="
set system login user amilan uid 2010
set system login user amilan class super-user
set system login user amilan authentication encrypted-password
"$6$SMUp0Lk/$URCoVEmoxM/2RnGaucf/B503af4CuJrtsIUlnWFzjBUGgjFzNy8YbeBaiU7JPg3vdbZqPd
KC/kf2Fou6pYd3.0"
set system login user amilan authentication ssh-rsa "ssh-rsa
AAAAB3NzaC1yc2EAAAABIwAAAQEArJlqzAgkO2uaBv1rp2hvKb6ZiHjSHLnHhTy3gPcGFDkekS+CBq6Dqvr
dRRpfOkco0w2wPGN35PLr3BeswLKCUDj3/dfAG0bi1TSylmqIwAmHiTJQ0BgS1PRW10JvxEqYgGd8/J4f4q
f8y/EhCHHS7oB1Wld/MV514hj//NHgUDShw0LUdLBXZ+9vJygOTjySjE4NPtz9F222qVJIVkyMTjG4bdpE+
eqY7j4q4sQ9dB44l3AgVWHW9c42cORf8CCok0Y2brjOnSlXXFjQTxKGgQ3Q0GLWsmSGxqNR9Tp3UQvd70mu
iBpSmAIydHGKC2q4kwRQ/BiYsqZYOOqeVpnlrw=="
set system login user bidhanb uid 2026
set system login user bidhanb class super-user
set system login user bidhanb authentication encrypted-password
"$6$Uyxpf1LQ$rZxgj0KVLH3z8tOYYkX1CYgO.uEJEG9PP5qbDJB67ypnrWb2xT.5rTL18LffP/Pxqlmsg7
gXAxtB3y08QZWEV."
set system login user craju uid 2006
set system login user craju class super-user
set system login user craju authentication encrypted-password
"$6$mWtUHXK6$IAzSunEtpWoVa/cDlX6FVDnioHeHjBDZH1IQB.QHw.6XNR4O0mXe..cHkWAs0o236.f8Hl
yIhj.pcpy1eR.DO1"
set system login user gbijay uid 2011
set system login user gbijay class super-user
set system login user gbijay authentication encrypted-password
"$6$IPMPL5bD$Y9bIeuSHmk.RTP5h/dWeuj1BFATkaUfIINZG.vTE1aD0Z2uL8Jq54ESINjb6cw0qZNTOJQ
anFwqY0OkzsCky21"
set system login user gshyam uid 2000
set system login user gshyam class super-user
set system login user gshyam authentication encrypted-password
"$6$xPGuF79q$uh3VRTB.7BjC0r0oItUXxTFYwlsWK3ZF9eFEyoIxXgZYjJedubHqTqTguxF0aTXV8fO3cB
J2gE5YHvSabZLw0."
set system login user jspace uid 2027
set system login user jspace class super-user
set system login user jspace authentication encrypted-password
"$6$Zhg1Udol$wXTzbNgSk828oVrvvrbG8D5vjR4qFS1E2LcdBgYEfQqE/X2/VZi4KqzXYdNC.hE9BrBJ/9
n7.4Ekzgb0u8RZM."
set system login user junadmin full-name "TACACS Authenticated users with super-
user privileges"
set system login user junadmin uid 2029
set system login user junadmin class super-user
set system login user kijush uid 2016
set system login user kijush class super-user
set system login user kijush authentication encrypted-password
"$6$pVQsVgrS$id39yjau59hfXFqmnzUkm3odCCuznQGu1V2f8fSa3yTSNdusktuhPFdnqVMHafxJDBW1N1
Y2g3zVJcxIbB49G/"
set system login user lab uid 2017
set system login user lab class super-user
set system login user lab authentication encrypted-password
"$6$AbJiNwze$MbLs7bNTM73tC63RleqsoiUMeGhb5BA9dZXPpWsjm0XzHCSIdxI./bj7/oEW/JSc/Qpbp9
ADk4rGEkiBfHY7C/"
set system login user laxman uid 2022
set system login user laxman class super-user
set system login user laxman authentication encrypted-password
"$6$HlwVGX/P$YXnuqnL/5HcPUbOvUmhOHYOPZbRqmewo.F6/cRixNwdA4ckFgfeTDaAAyQDkI33CK8HqwT
42RNHtXirnKI0Y81"
set system login user mhjsakar uid 2020
set system login user mhjsakar class super-user
set system login user mhjsakar authentication encrypted-password
"$6$jaBQ0k1v$cuaBsQ6fva8UneB1O4Ya7kQKU32dSg1Yico2nbnYGuDqENERRyM6YcEYXPFutJtjv2vxTV
0B8ordICPUHNY8a1"
set system login user rancid uid 2015
set system login user rancid class super-user
set system login user rancid authentication encrypted-password
"$1$TFci3GHn$pU3DsQul8vZw6W37cJhYo/"
set system login user saralps uid 2025
set system login user saralps class super-user
set system login user saralps authentication encrypted-password
"$6$Vz50rL/9$XDjdzfVxHCqw8hJlKLaOBjzLL31Tafxoa3lhmBtLe5pu5h.2cs7eP.7NB/7fOpmYN0Egrr
Gc2MZdpjT6.56zw0"
set system login user script uid 2019
set system login user script class super-user
set system login user srijan uid 2028
set system login user srijan class super-user
set system login user srijan authentication encrypted-password
"$6$jVvonUyq$7jc3aNF2f/bRnIu1GR/a6RoL4AhdkEJ4ZoqjvuvKqTnWVF1hwG1movUSLNTYOn1w3DuxBM
0fzRVYaH6ti/18f."
set system login user sthashish uid 2001
set system login user sthashish class super-user
set system login user sthashish authentication encrypted-password
"$6$ML/NZGy5$DWKmg/IL92VuuKjao/fenF.WfQv8iiHGtj68F1.26tcqkJHUxLYp7XN/HPRFdUnipbA55j
46rj/6p4cjgvXxA0"
set system services ftp
set system services ssh root-login allow
set system services ssh protocol-version v2
set system services ssh max-sessions-per-connection 64
set system services extension-service request-response grpc clear-text port 9000
set system services extension-service request-response grpc skip-authentication
set system services netconf ssh
set system services rest http
set system services rest enable-explorer
set system services dhcp-local-server dhcpv6 short-cycle-protection lockout-min-
time 2
set system services dhcp-local-server dhcpv6 short-cycle-protection lockout-max-
time 900
set system services dhcp-local-server dhcpv6 group IPv6 overrides rapid-commit
set system services dhcp-local-server dhcpv6 group IPv6 overrides delegated-pool
Default-v6-pd-pool
set system services dhcp-local-server dhcpv6 group IPv6 overrides delete-binding-
on-renegotiation
deactivate system services dhcp-local-server dhcpv6 group IPv6 overrides delete-
binding-on-renegotiation
set system services dhcp-local-server dhcpv6 group IPv6 overrides asymmetric-lease-
time 1200
set system services dhcp-local-server dhcpv6 group IPv6 overrides asymmetric-
prefix-lease-time 1200
set system services dhcp-local-server dhcpv6 group IPv6 overrides dual-stack dual-
stack-group
set system services dhcp-local-server dhcpv6 group IPv6 interface xe-0/0/0.0
set system services dhcp-local-server dhcpv6 group IPv6 interface xe-1/0/0:1.0
set system services dhcp-local-server dhcpv6 group IPv6 interface ae14.0
set system services dhcp-local-server dhcpv6 group IPv6 interface demux0.0
set system services dhcp-local-server pool-match-order external-authority
set system services dhcp-local-server pool-match-order ip-address-first
set system services dhcp-local-server liveness-detection failure-action clear-
binding-if-interface-up
set system services dhcp-local-server liveness-detection method bfd version
automatic
set system services dhcp-local-server liveness-detection method bfd minimum-
interval 45000
set system services dhcp-local-server liveness-detection method bfd minimum-
receive-interval 60000
set system services dhcp-local-server liveness-detection method bfd multiplier 1
set system services dhcp-local-server liveness-detection method bfd no-adaptation
set system services dhcp-local-server liveness-detection method bfd transmit-
interval minimum-interval 45000
set system services dhcp-local-server liveness-detection method bfd transmit-
interval threshold 60000
set system services dhcp-local-server liveness-detection method bfd detection-time
threshold 66000
set system services dhcp-local-server liveness-detection method bfd session-mode
automatic
set system services dhcp-local-server liveness-detection method bfd holddown-
interval 50
deactivate system services dhcp-local-server liveness-detection
set system services dhcp-local-server overrides client-discover-match incoming-
interface
set system services dhcp-local-server overrides dual-stack dual-stack-group
set system services dhcp-local-server short-cycle-protection lockout-min-time 2
set system services dhcp-local-server short-cycle-protection lockout-max-time 900
set system services dhcp-local-server group IPv4 overrides delete-binding-on-
renegotiation
deactivate system services dhcp-local-server group IPv4 overrides delete-binding-
on-renegotiation
set system services dhcp-local-server group IPv4 overrides asymmetric-lease-time
1200
set system services dhcp-local-server group IPv4 overrides dual-stack dual-stack-
group
set system services dhcp-local-server group IPv4 interface xe-0/0/0.0
set system services dhcp-local-server group IPv4 interface xe-1/0/0:1.0
set system services dhcp-local-server group IPv4 interface ae14.0
set system services dhcp-local-server group IPv4 interface demux0.0
set system services dhcp-local-server dual-stack-group dual-stack-group
authentication password "wlink123$"
set system services dhcp-local-server dual-stack-group dual-stack-group
authentication username-include mac-address
set system services dhcp-local-server dual-stack-group dual-stack-group dynamic-
profile wlink-default-prof
set system services dhcp-local-server dual-stack-group dual-stack-group on-demand-
address-allocation
deactivate system services dhcp-local-server dual-stack-group dual-stack-group on-
demand-address-allocation
set system services dhcp-local-server dual-stack-group dual-stack-group
classification-key mac-address
set system services dhcp-local-server dual-stack-group dual-stack-group
renegotiation-master inet
set system services dhcp-local-server dual-stack-group dual-stack-group
renegotiation-master inet6
set system services dhcp-local-server dual-stack-group dual-stack-group liveness-
detection failure-action clear-binding-if-interface-up
set system services dhcp-local-server dual-stack-group dual-stack-group liveness-
detection method layer2-liveness-detection transmit-interval 300
set system services dhcp-local-server dual-stack-group dual-stack-group liveness-
detection method layer2-liveness-detection max-consecutive-retries 5
deactivate system services dhcp-local-server dual-stack-group dual-stack-group
liveness-detection
set system services dhcp-local-server dual-stack-group dual-stack-group short-
cycle-protection lockout-min-time 2
set system services dhcp-local-server dual-stack-group dual-stack-group short-
cycle-protection lockout-max-time 900
set system services dhcp-local-server no-stale-timer-refresh
set system services subscriber-management traceoptions file test_log1
set system services subscriber-management traceoptions file size 2m
set system services subscriber-management traceoptions file files 20
set system services subscriber-management traceoptions file world-readable
set system services subscriber-management enable
set system time-zone Asia/Kathmandu
set system authentication-order tacplus
set system authentication-order password
set system name-server 202.79.32.4
set system tacplus-server 202.79.32.39 port 49
set system tacplus-server 202.79.32.39 secret "$9$qmQn0BErKWIRVYoGq.0B1"
set system tacplus-server 202.79.32.39 source-address 202.166.192.34
set system tacplus-server 202.166.193.74 port 49
set system tacplus-server 202.166.193.74 secret "$9$OtlA1clxNbgaGdVmT39OBxN-"
set system tacplus-server 202.166.193.74 source-address 202.166.192.34
set system accounting events change-log
set system accounting destination tacplus server 202.79.32.39 port 49
set system accounting destination tacplus server 202.79.32.39 secret
"$9$AUEsp1hM87bY4Xxi.5FAtM8L"
set system accounting destination tacplus server 202.79.32.39 timeout 30
set system accounting destination tacplus server 202.79.32.39 single-connection
set system accounting destination tacplus server 202.166.193.74 port 49
set system accounting destination tacplus server 202.166.193.74 secret
"$9$AUEsp1hM87bY4Xxi.5FAtM8L"
set system accounting destination tacplus server 202.166.193.74 timeout 30
set system accounting destination tacplus server 202.166.193.74 single-connection
set system schema openconfig unhide
set system syslog user * any emergency
set system syslog host 202.79.32.84 any any
set system syslog host 202.79.32.84 port 5140
set system syslog host 202.79.32.84 source-address 202.166.192.34
set system syslog file messages any notice
set system syslog file messages authorization info
set system syslog file interactive-commands interactive-commands any
set system syslog file config-change change-log any
set system syslog file BGP-log any info
set system syslog file BGP-log match BGP_
set system syslog file updown any any
set system syslog file updown match TRAP_LINK
set system syslog file ddos-log any info
set system syslog file ddos-log match DDOS_
set system syslog file default-log-messages any info
set system syslog file default-log-messages match "(requested 'commit' operation)|
(requested 'commit synchronize' operation)|(copying configuration to juniper.save)|
(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link
UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package
-X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|
CFMD_CCM_DEFECT| LFMD_3AH | RPD_MPLS_PATH_BFD|(Master Unchanged, Members Changed)|
(Master Changed, Members Changed)|(Master Detected, Members Changed)|(vc add)|(vc
delete)|(Master detected)|(Master changed)|(Backup detected)|(Backup changed)|
(interface vcp-)"
set system syslog file default-log-messages structured-data
set system syslog log-rotate-frequency 59
set system processes general-authentication-service traceoptions file jauthd
set system processes general-authentication-service traceoptions file size 100m
set system processes general-authentication-service traceoptions file files 10
set system processes general-authentication-service traceoptions flag all
set system processes smg-service traceoptions file smgd
set system processes smg-service traceoptions file size 100m
set system processes smg-service traceoptions file files 10
set system processes smg-service traceoptions level all
set system processes smg-service traceoptions flag all
deactivate system processes smg-service traceoptions
set system processes bbe-mib-daemon traceoptions file bbe-mibd
set system processes bbe-mib-daemon traceoptions file size 100m
set system processes bbe-mib-daemon traceoptions file files 10
set system processes bbe-mib-daemon traceoptions level all
set system processes bbe-mib-daemon traceoptions flag all
deactivate system processes bbe-mib-daemon traceoptions
set system processes dhcp-service traceoptions file jdhcpd
set system processes dhcp-service traceoptions file size 100m
set system processes dhcp-service traceoptions level all
set system processes dhcp-service traceoptions flag packet
set system processes dhcp-service traceoptions flag all
set system ddos-protection protocols dhcpv4 discover recover-time 10
set system ntp server 202.79.32.104
set chassis aggregated-devices ethernet device-count 25
set chassis fpc 0 sampling-instance s1
set chassis fpc 1 pic 0 port 0 number-of-sub-ports 4
set chassis fpc 1 pic 0 port 0 speed 10g
set chassis fpc 1 pic 0 port 2 speed 100g
set chassis fpc 1 pic 0 port 5 speed 100g
set chassis fpc 1 pic 1 port 0 number-of-sub-ports 4
set chassis fpc 1 pic 1 port 0 speed 10g
set chassis fpc 1 pic 1 port 2 speed 100g
set chassis fpc 1 pic 1 port 5 speed 100g
set chassis fpc 1 max-queues 512k
set chassis network-services enhanced-ip
set services analytics streaming-server telemetry-server remote-address 10.21.7.34
set services analytics streaming-server telemetry-server remote-port 9000
set services analytics export-profile export-param local-address 202.166.192.34
set services analytics export-profile export-param local-port 21111
set services analytics export-profile export-param reporting-rate 60
set services analytics export-profile export-param format gpb
set services analytics export-profile export-param transport udp
set services analytics sensor interface-1 server-name telemetry-server
set services analytics sensor interface-1 export-name export-param
set services analytics sensor interface-1 resource
/junos/system/linecard/interface/logical/usage/
set services analytics sensor interface-1 resource-filter xe-*
set services analytics sensor resource-1 server-name telemetry-server
set services analytics sensor resource-1 export-name export-param
set services analytics sensor resource-1 resource
/junos/system/linecard/cpu/memory/
set services flow-monitoring version-ipfix template ipv4 flow-active-timeout 60
set services flow-monitoring version-ipfix template ipv4 flow-inactive-timeout 70
set services flow-monitoring version-ipfix template ipv4 template-refresh-rate
seconds 30
set services flow-monitoring version-ipfix template ipv4 option-refresh-rate
seconds 30
set services flow-monitoring version-ipfix template ipv4 ipv4-template
set access-profile Rad
set interfaces xe-0/2/4 unit 0
set interfaces xe-1/0/0:0 description WAN_jnpr-prera-01_xe-2/0/1
set interfaces xe-1/0/0:0 unit 0 family inet address 202.79.40.6/31
set interfaces xe-1/0/0:0 unit 0 family inet6 address 2400:1a00:0:42::179/127
set interfaces xe-1/0/0:1 description jnpr-prera-01_xe-2/0/3_VPLS
set interfaces xe-1/0/0:1 hierarchical-scheduler maximum-hierarchy-levels 2
set interfaces xe-1/0/0:1 hierarchical-scheduler implicit-hierarchy
set interfaces xe-1/0/0:1 flexible-vlan-tagging
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-prof accept dhcp-v4
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-prof accept dhcp-v6
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-prof ranges 3800-3800,121-121
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-prof ranges 3700-3700,121-121
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-profile accept pppoe
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-profile ranges 3800-3800,120-120
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges dynamic-profile
FtthZoom-svlan-profile ranges 3700-3700,120-120
set interfaces xe-1/0/0:1 auto-configure stacked-vlan-ranges access-profile Rad
set interfaces xe-1/0/0:1 auto-configure remove-when-no-subscribers
set interfaces xe-1/0/0:1 mtu 9192
set interfaces xe-1/0/0:1 encapsulation flexible-ethernet-services
set interfaces xe-1/0/0:1 gigether-options ignore-l3-incompletes
set interfaces xe-1/0/0:2 description gw-jwl-stc-02_BGP_VL1120
set interfaces xe-1/0/0:2 flexible-vlan-tagging
set interfaces xe-1/0/0:2 encapsulation flexible-ethernet-services
set interfaces xe-1/0/0:2 unit 1120 vlan-id 1120
set interfaces xe-1/0/0:2 unit 1120 family inet address 202.166.220.2/24
set interfaces et-1/1/5 description To_X590
set interfaces et-1/1/5 unit 0 family inet address 172.16.16.2/30
set interfaces xe-2/0/0 unit 0 family inet
set interfaces xe-2/0/0 unit 0 family inet6
set interfaces fxp0 unit 0 description MGMT
set interfaces fxp0 unit 0 family inet address 10.10.250.22/23
set interfaces fxp0 unit 0 family inet address 10.0.1.6/24
set interfaces lo0 unit 0 family inet filter input ProtectRE
set interfaces lo0 unit 0 family inet address 202.166.192.34/32
set interfaces lo0 unit 0 family inet address 124.41.255.1/32
set interfaces lo0 unit 0 family inet6 filter input ipv6-ProtectRE
deactivate interfaces lo0 unit 0 family inet6 filter
set interfaces lo0 unit 0 family inet6 address 2400:1a00::34/128
set interfaces lo0 unit 0 family inet6 address 2400:1a00:8001:1::1/128 primary
set interfaces lo0 unit 0 family inet6 address 2400:1a00:8001:1::1/128 preferred
set snmp filter-interfaces interfaces pp0.*
set snmp filter-interfaces interfaces demux0.*
set snmp filter-interfaces all-internal-interfaces
set snmp engine-id use-mac-address
set snmp community 3263all authorization read-only
set snmp community 3263all clients 202.79.32.218/32
set snmp community 3263all clients 202.79.32.51/32
set snmp community 3263all clients 202.79.32.207/32
set snmp community 3263all clients 202.166.193.41/32
set snmp community 3263all clients 202.166.193.42/32
set snmp community 3263all clients 202.166.193.86/32
set snmp community 3263all clients 202.79.32.85/32
set snmp community 3263all clients 202.79.38.61/32
set snmp trap-group logstash destination-port 1062
set snmp trap-group logstash categories authentication
set snmp trap-group logstash categories chassis
set snmp trap-group logstash categories link
set snmp trap-group logstash categories routing
set snmp trap-group logstash categories startup
set snmp trap-group logstash categories rmon-alarm
set snmp trap-group logstash categories configuration
set snmp trap-group logstash categories services
set snmp trap-group logstash targets 202.79.32.200
set snmp trap-group Junos-space targets 202.79.32.12
set snmp trap-group space targets 202.79.38.60
set snmp trap-group space targets 202.79.38.62
set snmp traceoptions file bbe-snmp
set snmp traceoptions file size 100m
set snmp traceoptions file files 10
set snmp traceoptions flag all
set forwarding-options sampling instance s1 input rate 10
set forwarding-options sampling instance s1 family inet output flow-server
202.79.36.101 port 2055
set forwarding-options sampling instance s1 family inet output flow-server
202.79.36.101 version-ipfix template ipv4
set forwarding-options sampling instance s1 family inet output inline-jflow source-
address 202.166.192.34
set policy-options prefix-list IPTV-EDGE-SERVERS 103.213.31.0/24
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.32/29
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.180/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.182/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.192/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.196/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.198/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.200/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.204/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.206/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.212/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.216/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.220/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.222/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.226/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.240/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.242/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.244/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.246/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.250/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.79.40.252/31
set policy-options prefix-list IPTV-EDGE-SERVERS 202.166.192.204/30
set policy-options policy-statement import-routes term T0 from route-filter
0.0.0.0/0 exact
set policy-options policy-statement import-routes term T0 then accept
set policy-options policy-statement import-routes then reject
set policy-options policy-statement ipv6-outbound-routes term default from route-
filter ::/0 exact reject
set policy-options policy-statement ipv6-outbound-routes term static from family
inet6
set policy-options policy-statement ipv6-outbound-routes term static from protocol
static
set policy-options policy-statement ipv6-outbound-routes term static from route-
filter ::/0 upto /48
set policy-options policy-statement ipv6-outbound-routes term static then accept
set policy-options policy-statement ipv6-outbound-routes term direct from family
inet6
set policy-options policy-statement ipv6-outbound-routes term direct from protocol
direct
set policy-options policy-statement ipv6-outbound-routes term direct from route-
filter ::/0 upto /48
set policy-options policy-statement ipv6-outbound-routes term direct then accept
set policy-options policy-statement ipv6-outbound-routes term DHCP_IA-NA from
route-filter 2400:1a00:8001:1::/64 exact
set policy-options policy-statement ipv6-outbound-routes term DHCP_IA-NA then
accept
set policy-options policy-statement ipv6-outbound-routes then reject
set policy-options policy-statement next-hop-self then next-hop self
set policy-options policy-statement outbound-route term T0 from route-filter
0.0.0.0/0 exact
set policy-options policy-statement outbound-route term T0 from route-filter
10.0.1.0/24 exact
set policy-options policy-statement outbound-route term T0 from route-filter
124.41.211.0/24 exact
set policy-options policy-statement outbound-route term T0 from route-filter
202.79.32.0/24 upto /32
set policy-options policy-statement outbound-route term T0 from route-filter
202.79.36.0/24 upto /32
set policy-options policy-statement outbound-route term T0 then reject
set policy-options policy-statement outbound-route term direct from protocol static
set policy-options policy-statement outbound-route term direct then accept
deactivate policy-options policy-statement outbound-route term direct
set policy-options policy-statement outbound-route term test-prefix from route-
filter 124.41.255.0/24 exact
set policy-options policy-statement outbound-route term test-prefix from route-
filter 202.166.192.34/32 exact
set policy-options policy-statement outbound-route term test-prefix then accept
set policy-options policy-statement outbound-route then reject
set class-of-service host-outbound-traffic forwarding-class NC
set class-of-service forwarding-classes queue 0 INTERNET
set class-of-service forwarding-classes queue 0 priority low
set class-of-service forwarding-classes queue 1 IPTV
set class-of-service forwarding-classes queue 1 priority high
set class-of-service forwarding-classes queue 2 VOICE
deactivate class-of-service forwarding-classes queue 2
set class-of-service forwarding-classes queue 3 NC
set class-of-service forwarding-classes queue 3 priority high
set class-of-service rewrite-rules ieee-802.1 pbit-rewrite forwarding-class IPTV
loss-priority low code-point 101
set firewall family inet filter block-frag-in term 1 from packet-length 20
set firewall family inet filter block-frag-in term 1 from fragment-offset-except 0
set firewall family inet filter block-frag-in term 1 from fragment-flags "!more-
fragments"
set firewall family inet filter block-frag-in term 1 then count lenth0-in
set firewall family inet filter block-frag-in term 1 then discard
set firewall family inet filter block-frag-in term 2 then count test-in
set firewall family inet filter block-frag-in term 2 then accept
set firewall family inet filter block-frag-out term 1 from packet-length 20
set firewall family inet filter block-frag-out term 1 from fragment-offset-except 0
set firewall family inet filter block-frag-out term 1 from fragment-flags "!more-
fragments"
set firewall family inet filter block-frag-out term 1 then count lenth0-out
set firewall family inet filter block-frag-out term 1 then discard
set firewall family inet filter block-frag-out term 2 then count test-out
set firewall family inet filter block-frag-out term 2 then accept
set firewall family inet filter internal-ingress-filter term NO-NAT from
destination-address 100.64.0.0/10
set firewall family inet filter internal-ingress-filter term NO-NAT then accept
set firewall family inet filter internal-ingress-filter term 0 from destination-
address 192.168.0.0/16
set firewall family inet filter internal-ingress-filter term 0 from destination-
address 172.16.0.0/12
set firewall family inet filter internal-ingress-filter term 0 from destination-
address 10.0.0.0/8
set firewall family inet filter internal-ingress-filter term 0 then discard
set firewall family inet filter IPTV-TRAFFIC term FROM-EDGE-SERVER from prefix-list
IPTV-EDGE-SERVERS
set firewall family inet filter IPTV-TRAFFIC term FROM-EDGE-SERVER then count IPTV-
TRAFFIC
set firewall family inet filter IPTV-TRAFFIC term FROM-EDGE-SERVER then forwarding-
class IPTV
set firewall family inet filter IPTV-TRAFFIC term FROM-EDGE-SERVER then accept
set firewall family inet filter IPTV-TRAFFIC term FROM-EDGE-SERVER then dscp af41
set firewall family inet filter IPTV-TRAFFIC term DEFAULT then count DEFAULT-
TRAFFIC
set firewall family inet filter IPTV-TRAFFIC term DEFAULT then accept
set firewall family inet6 filter ALLOW-v6-Filter term DHCPv6-accept from next-
header udp
set firewall family inet6 filter ALLOW-v6-Filter term DHCPv6-accept from source-
port 546
set firewall family inet6 filter ALLOW-v6-Filter term DHCPv6-accept from source-
port 547
set firewall family inet6 filter ALLOW-v6-Filter term DHCPv6-accept from
destination-port 546
set firewall family inet6 filter ALLOW-v6-Filter term DHCPv6-accept from
destination-port 547
set firewall family inet6 filter ALLOW-v6-Filter term DHCPv6-accept then accept
set firewall family inet6 filter ALLOW-v6-Filter term ICMPv6-accept from next-
header icmp6
set firewall family inet6 filter ALLOW-v6-Filter term ICMPv6-accept from icmp-type
router-solicit
set firewall family inet6 filter ALLOW-v6-Filter term ICMPv6-accept from icmp-type
neighbor-solicit
set firewall family inet6 filter ALLOW-v6-Filter term ICMPv6-accept from icmp-type
neighbor-advertisement
set firewall family inet6 filter ALLOW-v6-Filter term ICMPv6-accept from icmp-type
router-advertisement
set firewall family inet6 filter ALLOW-v6-Filter term ICMPv6-accept then accept
set firewall family inet6 filter ipv6-ProtectRE term 0 filter ALLOW-v6-Filter
set firewall family inet6 filter ipv6-ProtectRE term 1 from source-address
2400:1a00::/63
set firewall family inet6 filter ipv6-ProtectRE term 1 from source-address
2400:1a00:2::/48
set firewall family inet6 filter ipv6-ProtectRE term 1 from source-address
2400:1a00:0::/48
set firewall family inet6 filter ipv6-ProtectRE term 1 then count
ipv6_RE_protect_count
set firewall family inet6 filter ipv6-ProtectRE term 1 then log
set firewall family inet6 filter ipv6-ProtectRE term 1 then accept
set firewall family inet6 filter ipv6-ProtectRE term 2 from payload-protocol ospf
set firewall family inet6 filter ipv6-ProtectRE term 2 then accept
set firewall family inet6 filter ipv6-ProtectRE term 4 from payload-protocol tcp
set firewall family inet6 filter ipv6-ProtectRE term 4 from port 179
set firewall family inet6 filter ipv6-ProtectRE term 4 then accept
set firewall family inet6 filter ipv6-ProtectRE term icmp6 from payload-protocol
icmp6
set firewall family inet6 filter ipv6-ProtectRE term icmp6 then accept
set firewall family inet6 filter ipv6-ProtectRE term 3 then discard
set firewall policer 32k filter-specific
set firewall policer 32k if-exceeding bandwidth-limit 32k
set firewall policer 32k if-exceeding burst-size-limit 4k
set firewall policer 32k then discard
set firewall filter ProtectRE term 0 filter ALLOW-DHCP
set firewall filter ProtectRE term 1 from source-address 202.79.32.0/24
set firewall filter ProtectRE term 1 from source-address 202.79.40.0/23
set firewall filter ProtectRE term 1 from source-address 202.166.192.0/24
set firewall filter ProtectRE term 1 from source-address 202.79.36.0/24
set firewall filter ProtectRE term 1 from source-address 192.168.1.0/24
set firewall filter ProtectRE term 1 from source-address 202.166.193.64/26
set firewall filter ProtectRE term 1 from source-address 124.41.211.1/32
set firewall filter ProtectRE term 1 from source-address 10.0.1.0/24
set firewall filter ProtectRE term 1 from source-address 202.166.193.32/27
set firewall filter ProtectRE term 1 from source-address 10.12.9.0/24
set firewall filter ProtectRE term 1 from source-address 202.79.36.101/32
set firewall filter ProtectRE term 1 from source-address 202.79.38.61/32
set firewall filter ProtectRE term 1 from source-address 10.10.250.0/23
set firewall filter ProtectRE term 1 from source-address 202.166.220.1/32
set firewall filter ProtectRE term 1 then accept
set firewall filter ProtectRE term 2 from tcp-established
set firewall filter ProtectRE term 2 then accept
set firewall filter ProtectRE term 3 from destination-port bgp
set firewall filter ProtectRE term 3 then accept
set firewall filter ProtectRE term 4 from protocol icmp
set firewall filter ProtectRE term 4 from protocol ospf
set firewall filter ProtectRE term 4 then accept
set firewall filter ProtectRE term 5 then count ProtectRE
set firewall filter ProtectRE term 5 then log
set firewall filter ProtectRE term 5 then discard
set firewall filter ALLOW-DHCP term dhcp-client-accept from source-address
0.0.0.0/32
set firewall filter ALLOW-DHCP term dhcp-client-accept from destination-address
255.255.255.255/32
set firewall filter ALLOW-DHCP term dhcp-client-accept from protocol udp
set firewall filter ALLOW-DHCP term dhcp-client-accept from source-port 68
set firewall filter ALLOW-DHCP term dhcp-client-accept from destination-port 67
set firewall filter ALLOW-DHCP term dhcp-client-accept then accept
set firewall filter ALLOW-DHCP term dhcp-server-accept from protocol udp
set firewall filter ALLOW-DHCP term dhcp-server-accept from source-port 67
set firewall filter ALLOW-DHCP term dhcp-server-accept from source-port 68
set firewall filter ALLOW-DHCP term dhcp-server-accept from destination-port 67
set firewall filter ALLOW-DHCP term dhcp-server-accept from destination-port 68
set firewall filter ALLOW-DHCP term dhcp-server-accept then accept
set access domain-name-server 202.79.32.4
set access domain-name-server-inet 202.79.32.4
set access domain-name-server-inet6 2400:1a00:0:32::165
set access domain-name-server-inet6 2400:1a00:8000:4::73
set access profile Rad authentication-order radius
set access profile Rad radius authentication-server 202.79.32.202
set access profile Rad radius accounting-server 202.79.32.202
set access profile Rad radius options client-authentication-algorithm round-robin
set access profile Rad radius options client-accounting-algorithm round-robin
set access profile Rad session-options client-idle-timeout 10
deactivate access profile Rad session-options client-idle-timeout
set access profile Rad radius-server 202.79.32.51 port 1649
set access profile Rad radius-server 202.79.32.51 accounting-port 1650
set access profile Rad radius-server 202.79.32.51 secret "$9$NB-sg4aUDHmYgGj"
set access profile Rad radius-server 202.79.32.51 max-outstanding-requests 2000
set access profile Rad radius-server 202.79.32.51 source-address 202.166.192.34
set access profile Rad radius-server 202.79.32.201 port 1649
set access profile Rad radius-server 202.79.32.201 accounting-port 1650
set access profile Rad radius-server 202.79.32.201 secret "$9$.mQ3n/tpORz3Au"
set access profile Rad radius-server 202.79.32.201 max-outstanding-requests 2000
set access profile Rad radius-server 202.79.32.201 source-address 202.166.192.34
set access profile Rad radius-server 10.21.8.10 port 1812
set access profile Rad radius-server 10.21.8.10 accounting-port 1813
set access profile Rad radius-server 10.21.8.10 secret
"$9$4OaDiqmTzF/Ygi.P5/9KM8xVwgoJjik"
set access profile Rad radius-server 10.21.8.10 max-outstanding-requests 2000
set access profile Rad radius-server 10.21.8.10 source-address 202.166.192.34
set access profile Rad radius-server 202.79.32.202 port 1649
set access profile Rad radius-server 202.79.32.202 accounting-port 1650
set access profile Rad radius-server 202.79.32.202 secret "$9$.mQ3n/tpORz3Au"
set access profile Rad radius-server 202.79.32.202 max-outstanding-requests 2000
set access profile Rad radius-server 202.79.32.202 source-address 202.166.192.34
set access profile Rad radius-server 202.79.32.224 port 1649
set access profile Rad radius-server 202.79.32.224 accounting-port 1650
set access profile Rad radius-server 202.79.32.224 secret "$9$.mQ3n/tpORz3Au"
set access profile Rad radius-server 202.79.32.224 max-outstanding-requests 2000
set access profile Rad radius-server 202.79.32.224 source-address 202.166.192.34
set access profile Rad radius-server 202.79.32.222 port 1812
set access profile Rad radius-server 202.79.32.222 accounting-port 1813
set access profile Rad radius-server 202.79.32.222 secret "$9$.mQ3n/tpORz3Au"
set access profile Rad radius-server 202.79.32.222 max-outstanding-requests 2000
set access profile Rad radius-server 202.79.32.222 source-address 202.166.192.34
set access profile Rad accounting order radius
set access profile Rad accounting accounting-stop-on-failure
set access profile Rad accounting accounting-stop-on-access-deny
deactivate access profile Rad accounting accounting-stop-on-access-deny
set access profile Rad accounting immediate-update
deactivate access profile Rad accounting immediate-update
set access profile Rad accounting coa-immediate-update
set access profile Rad accounting statistics volume-time
set access address-assignment pool safenet-pool family inet network 124.41.255.0/24
set access address-assignment pool safenet-pool family inet range 0-255 low
124.41.255.2
set access address-assignment pool safenet-pool family inet range 0-255 high
124.41.255.254
set access address-assignment pool safenet-pool family inet dhcp-attributes
maximum-lease-time 3600
set access address-assignment pool safenet-pool family inet dhcp-attributes router
124.41.255.1
set access address-assignment pool Default-v6-pool family inet6 prefix
2400:1a00:8001:1::/64
set access address-assignment pool Default-v6-pool family inet6 range 0-ffff low
2400:1a00:8001:1::2/128
set access address-assignment pool Default-v6-pool family inet6 range 0-ffff high
2400:1a00:8001:1:ffff:ffff:ffff:ffff/128
set access address-assignment pool Default-v6-pool family inet6 dhcp-attributes
dns-server 2400:1a00:0:32::165
set access address-assignment pool Default-v6-pool family inet6 dhcp-attributes
dns-server 2400:1a00:8000:4::73
set access address-assignment pool Default-v6-pool family inet6 dhcp-attributes
valid-lifetime 4800
set access address-assignment pool Default-v6-pool family inet6 dhcp-attributes
preferred-lifetime 3600
set access address-assignment pool Default-v6-pd-pool family inet6 prefix
2400:1a00:8002::/48
set access address-assignment pool Default-v6-pd-pool family inet6 range v6-pd
prefix-length 64
set access address-assignment pool Default-v6-pd-pool family inet6 dhcp-attributes
dns-server 2400:1a00:0:32::165
set access address-assignment pool Default-v6-pd-pool family inet6 dhcp-attributes
dns-server 2400:1a00:8000:4::73
set access address-assignment pool Default-v6-pd-pool family inet6 dhcp-attributes
valid-lifetime 4800
set access address-assignment pool Default-v6-pd-pool family inet6 dhcp-attributes
preferred-lifetime 3600
set access address-assignment pool default-pool family inet network 192.168.0.0/24
set access address-assignment pool default-pool family inet range 0-255 low
192.168.0.2
set access address-assignment pool default-pool family inet range 0-255 high
192.168.0.254
set access address-assignment pool default-pool family inet dhcp-attributes
maximum-lease-time 3600
set access address-assignment pool default-pool family inet dhcp-attributes router
192.168.0.1
set routing-options rib inet6.0 static route 2400:1a00:8002::/48 discard
set routing-options static route 124.41.255.0/24 discard
set routing-options static route 172.16.0.0/12 discard
set routing-options static route 172.16.0.0/12 no-readvertise
set routing-options static route 10.0.0.0/8 discard
set routing-options static route 10.0.0.0/8 no-readvertise
set routing-options static route 192.168.0.0/16 discard
set routing-options static route 192.168.0.0/16 no-readvertise
set routing-options static route 10.21.8.10/32 next-hop 202.79.40.7
set routing-options router-id 202.166.192.34
set routing-options autonomous-system 17501
set protocols ospf area 0.0.0.1 interface lo0.0 passive
set protocols ospf area 0.0.0.1 interface xe-1/0/0:0.0 interface-type p2p
deactivate protocols ospf
set protocols bgp group gw-jwl-stc-01 type internal
set protocols bgp group gw-jwl-stc-01 local-address 202.166.220.2
set protocols bgp group gw-jwl-stc-01 import import-routes
set protocols bgp group gw-jwl-stc-01 export next-hop-self
set protocols bgp group gw-jwl-stc-01 export outbound-route
set protocols bgp group gw-jwl-stc-01 local-as 17501
set protocols bgp group gw-jwl-stc-01 neighbor 202.166.220.1
set protocols ldp explicit-null
set protocols ldp transport-address router-id
set protocols ldp interface xe-1/0/0:0.0
set protocols ldp interface xe-2/1/0.0
set protocols ldp interface lo0.0
set protocols ospf3 area 0.0.0.1 interface lo0.0
set protocols ospf3 area 0.0.0.1 interface xe-1/0/0:0.0 interface-type p2p
set protocols lldp interface all
set dynamic-profiles FtthZoom-svlan-profile routing-instances "$junos-routing-
instance" interface "$junos-interface-name"
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" vlan-tags outer "$junos-stacked-vlan-id"
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" vlan-tags inner "$junos-vlan-id"
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" demux-options underlying-interface "$junos-interface-ifd-name"
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" family pppoe access-concentrator FtthZoom
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" family pppoe duplicate-protection
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" family pppoe dynamic-profile FtthZoom-pp0
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" family pppoe short-cycle-protection lockout-time-min 2
set dynamic-profiles FtthZoom-svlan-profile interfaces demux0 unit "$junos-
interface-unit" family pppoe short-cycle-protection lockout-time-max 1800
set dynamic-profiles wlink-dynamic-prof variables bandwidth default-value 10m
set dynamic-profiles wlink-dynamic-prof variables bandwidth mandatory
set dynamic-profiles wlink-dynamic-prof variables burst default-value 1280000
set dynamic-profiles wlink-dynamic-prof variables burst mandatory
set dynamic-profiles wlink-dynamic-prof variables filter-out uid
set dynamic-profiles wlink-dynamic-prof variables filter-in uid
set dynamic-profiles wlink-dynamic-prof variables pol-out uid
set dynamic-profiles wlink-dynamic-prof variables pol-in uid
set dynamic-profiles wlink-dynamic-prof variables filter-out-v6 uid
set dynamic-profiles wlink-dynamic-prof variables filter-in-v6 uid
set dynamic-profiles wlink-dynamic-prof variables iptv-bandwidth equals
"($bandwidth)/2"
set dynamic-profiles wlink-dynamic-prof variables iptv-bandwidth uid
deactivate dynamic-profiles wlink-dynamic-prof variables iptv-bandwidth
set dynamic-profiles wlink-dynamic-prof variables iptv-burst equals "($burst)/2"
set dynamic-profiles wlink-dynamic-prof variables iptv-burst uid
deactivate dynamic-profiles wlink-dynamic-prof variables iptv-burst
set dynamic-profiles wlink-dynamic-prof variables pol-iptv-out uid
set dynamic-profiles wlink-dynamic-prof variables pol-iptv-in uid
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter input "$filter-in"
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter input precedence 100
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter output "$filter-out"
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter output precedence 100
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter input "$filter-in-v6"
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter input precedence 100
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter output "$filter-out-v6"
set dynamic-profiles wlink-dynamic-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter output precedence 100
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
interface-specific
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term NETTV-DESTINATION from destination-prefix-list IPTV-EDGE-SERVERS
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term NETTV-DESTINATION then policer "$pol-iptv-in"
deactivate dynamic-profiles wlink-dynamic-prof firewall family inet filter
"$filter-in" term NETTV-DESTINATION then policer
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term NETTV-DESTINATION then accept
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term DNS from destination-port 53
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term DNS then policer 32k
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term DNS then next term
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term internet-traffic then service-accounting
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-in"
term internet-traffic then accept
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
interface-specific
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
term NETTV-SOURCE from source-prefix-list IPTV-EDGE-SERVERS
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
term NETTV-SOURCE then policer "$pol-iptv-out"
deactivate dynamic-profiles wlink-dynamic-prof firewall family inet filter
"$filter-out" term NETTV-SOURCE then policer
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
term NETTV-SOURCE then accept
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
term internet-traffic then service-accounting
set dynamic-profiles wlink-dynamic-prof firewall family inet filter "$filter-out"
term internet-traffic then accept
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" interface-specific
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" term DNS-v6 from destination-port 53
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" term DNS-v6 then policer 32k
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" term DNS-v6 then next term
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" term internet-traffic then service-accounting
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-in-
v6" term internet-traffic then accept
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-out-
v6" interface-specific
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-out-
v6" term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-out-
v6" term internet-traffic then service-accounting
set dynamic-profiles wlink-dynamic-prof firewall family inet6 filter "$filter-out-
v6" term internet-traffic then accept
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-in" filter-
specific
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-in" if-
exceeding bandwidth-limit "$iptv-bandwidth"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-in" if-
exceeding burst-size-limit "$iptv-burst"
deactivate dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-in"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-out" filter-
specific
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-out" if-
exceeding bandwidth-limit "$iptv-bandwidth"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-out" if-
exceeding burst-size-limit "$iptv-burst"
deactivate dynamic-profiles wlink-dynamic-prof firewall policer "$pol-iptv-out"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-out" filter-specific
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-out" logical-
interface-policer
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-out" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-out" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-out" then discard
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-in" filter-specific
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-in" logical-
interface-policer
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-in" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-in" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-dynamic-prof firewall policer "$pol-in" then discard
set dynamic-profiles FtthZoom-svlan-prof routing-instances "$junos-routing-
instance" interface "$junos-interface-name"
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 interface-mib
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 unit "$junos-interface-
unit" proxy-arp unrestricted
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 unit "$junos-interface-
unit" vlan-tags outer "$junos-stacked-vlan-id"
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 unit "$junos-interface-
unit" vlan-tags inner "$junos-vlan-id"
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 unit "$junos-interface-
unit" demux-options underlying-interface "$junos-underlying-interface"
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 unit "$junos-interface-
unit" family inet unnumbered-address "$junos-loopback-interface"
set dynamic-profiles FtthZoom-svlan-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 unnumbered-address "$junos-loopback-interface"
set dynamic-profiles FtthZoom-svlan-prof protocols router-advertisement interface
"$junos-interface-name" max-advertisement-interval 15
set dynamic-profiles FtthZoom-svlan-prof protocols router-advertisement interface
"$junos-interface-name" min-advertisement-interval 10
set dynamic-profiles FtthZoom-svlan-prof protocols router-advertisement interface
"$junos-interface-name" managed-configuration
set dynamic-profiles FtthZoom-svlan-prof protocols router-advertisement interface
"$junos-interface-name" dns-server-address 2400:1a00:0:32::165 lifetime 180
set dynamic-profiles FtthZoom routing-instances "$junos-routing-instance" interface
"$junos-interface-name"
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" vlan-
id "$junos-vlan-id"
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" demux-
options underlying-interface "$junos-interface-ifd-name"
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" family
pppoe access-concentrator FtthZoom
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" family
pppoe duplicate-protection
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" family
pppoe dynamic-profile FtthZoom-pp0
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" family
pppoe short-cycle-protection lockout-time-min 2
set dynamic-profiles FtthZoom interfaces demux0 unit "$junos-interface-unit" family
pppoe short-cycle-protection lockout-time-max 1800
set dynamic-profiles FtthZoom-pp0 routing-instances "$junos-routing-instance"
interface "$junos-interface-name"
set dynamic-profiles FtthZoom-pp0 interfaces pp0 interface-mib
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit" ppp-
options pap
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit" ppp-
options authentication pap
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit" ppp-
options ipcp-suggest-dns-option
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
pppoe-options underlying-interface "$junos-underlying-interface"
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
pppoe-options server
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
keepalives interval 30
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
family inet rpf-check
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
family inet unnumbered-address lo0.0
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
family inet6 rpf-check
set dynamic-profiles FtthZoom-pp0 interfaces pp0 unit "$junos-interface-unit"
family inet6 address $junos-ipv6-address
set dynamic-profiles FtthZoom-pp0 protocols router-advertisement interface "$junos-
interface-name" dns-server-address 2400:1a00:8000:4::73 lifetime 1800
set dynamic-profiles FtthZoom-pp0 protocols router-advertisement interface "$junos-
interface-name" prefix $junos-ipv6-ndra-prefix
set dynamic-profiles wlink-default-prof predefined-variable-defaults cos-scheduler-
map SCHED-MAP-DEFAULT
set dynamic-profiles wlink-default-prof routing-instances "$junos-routing-instance"
interface "$junos-interface-name"
set dynamic-profiles wlink-default-prof interfaces demux0 unit "$junos-interface-
unit" family inet unnumbered-address "$junos-loopback-interface"
set dynamic-profiles wlink-default-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 unnumbered-address "$junos-loopback-interface"
set dynamic-profiles wlink-default-prof class-of-service traffic-control-profiles
TC-PROFILE-01 scheduler-map "$junos-cos-scheduler-map"
set dynamic-profiles wlink-default-prof class-of-service interfaces "$junos-
interface-ifd-name" unit "$junos-interface-unit" output-traffic-control-profile TC-
PROFILE-01
set dynamic-profiles wlink-default-prof class-of-service interfaces "$junos-
interface-ifd-name" unit "$junos-interface-unit" rewrite-rules ieee-802.1 pbit-
rewrite
set dynamic-profiles wlink-default-prof class-of-service interfaces "$junos-
interface-ifd-name" unit "$junos-interface-unit" rewrite-rules ieee-802.1 vlan-tag
outer-and-inner
set dynamic-profiles wlink-default-prof class-of-service scheduler-maps SCHED-MAP-
DEFAULT forwarding-class INTERNET scheduler SCHED-INTERNET
set dynamic-profiles wlink-default-prof class-of-service scheduler-maps SCHED-MAP-
DEFAULT forwarding-class IPTV scheduler SCHED-IPTV
set dynamic-profiles wlink-default-prof class-of-service scheduler-maps SCHED-MAP-
DEFAULT forwarding-class NC scheduler SCHED-NC
set dynamic-profiles wlink-default-prof class-of-service schedulers SCHED-INTERNET
priority low
set dynamic-profiles wlink-default-prof class-of-service schedulers SCHED-IPTV
priority high
set dynamic-profiles wlink-default-prof class-of-service schedulers SCHED-NC
priority high
set dynamic-profiles dynamic-profiles
set dynamic-profiles wlink-pppoe-prof variables bandwidth default-value 10m
set dynamic-profiles wlink-pppoe-prof variables bandwidth mandatory
set dynamic-profiles wlink-pppoe-prof variables burst default-value 1280000
set dynamic-profiles wlink-pppoe-prof variables burst mandatory
set dynamic-profiles wlink-pppoe-prof variables filter-out uid
set dynamic-profiles wlink-pppoe-prof variables filter-in uid
set dynamic-profiles wlink-pppoe-prof variables pol-in uid
set dynamic-profiles wlink-pppoe-prof variables pol-out uid
set dynamic-profiles wlink-pppoe-prof variables filter-in-v6 uid
set dynamic-profiles wlink-pppoe-prof variables filter-out-v6 uid
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
targeted-distribution
deactivate dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-
unit" targeted-distribution
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet filter input "$filter-in"
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet filter input precedence 100
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet filter output "$filter-out"
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet filter output precedence 100
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet6 filter input "$filter-in-v6"
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet6 filter input precedence 100
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet6 filter output "$filter-out-v6"
set dynamic-profiles wlink-pppoe-prof interfaces pp0 unit "$junos-interface-unit"
family inet6 filter output precedence 100
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in"
interface-specific
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in" term
DNS from destination-port 53
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in" term
DNS then policer 32k
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in" term
DNS then next term
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in" term
internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in" term
internet-traffic then service-accounting
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-in" term
internet-traffic then accept
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-out"
interface-specific
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-out"
term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-out"
term internet-traffic then service-accounting
set dynamic-profiles wlink-pppoe-prof firewall family inet filter "$filter-out"
term internet-traffic then accept
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
interface-specific
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
term DNS-v6 from destination-port 53
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
term DNS-v6 then policer 32k
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
term DNS-v6 then next term
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
term internet-traffic then service-accounting
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-in-v6"
term internet-traffic then accept
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-out-v6"
interface-specific
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-out-v6"
term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-out-v6"
term internet-traffic then service-accounting
set dynamic-profiles wlink-pppoe-prof firewall family inet6 filter "$filter-out-v6"
term internet-traffic then accept
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-in" filter-specific
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-in" logical-interface-
policer
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-in" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-in" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-in" then discard
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-out" filter-specific
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-out" logical-
interface-policer
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-out" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-out" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-pppoe-prof firewall policer "$pol-out" then discard
set dynamic-profiles wlink-stb-int-prof variables bandwidth default-value 10m
set dynamic-profiles wlink-stb-int-prof variables bandwidth mandatory
set dynamic-profiles wlink-stb-int-prof variables burst default-value 1280000
set dynamic-profiles wlink-stb-int-prof variables burst mandatory
set dynamic-profiles wlink-stb-int-prof variables filter-out uid
set dynamic-profiles wlink-stb-int-prof variables filter-in uid
set dynamic-profiles wlink-stb-int-prof variables pol-out uid
set dynamic-profiles wlink-stb-int-prof variables pol-in uid
set dynamic-profiles wlink-stb-int-prof variables filter-out-v6 uid
set dynamic-profiles wlink-stb-int-prof variables filter-in-v6 uid
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter input "$filter-in"
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter input precedence 100
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter output "$filter-out"
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet filter output precedence 100
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter input "$filter-in-v6"
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter input precedence 100
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter output "$filter-out-v6"
set dynamic-profiles wlink-stb-int-prof interfaces demux0 unit "$junos-interface-
unit" family inet6 filter output precedence 100
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
interface-specific
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
term DNS from destination-port 53
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
term DNS then policer 32k
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
term DNS then next term
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
term internet-traffic then service-accounting
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-in"
term internet-traffic then accept
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-out"
interface-specific
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-out"
term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-out"
term internet-traffic then service-accounting
set dynamic-profiles wlink-stb-int-prof firewall family inet filter "$filter-out"
term internet-traffic then accept
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" interface-specific
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" term DNS-v6 from destination-port 53
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" term DNS-v6 then policer 32k
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" term DNS-v6 then next term
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" term internet-traffic then service-accounting
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-in-
v6" term internet-traffic then accept
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-out-
v6" interface-specific
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-out-
v6" term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-out-
v6" term internet-traffic then service-accounting
set dynamic-profiles wlink-stb-int-prof firewall family inet6 filter "$filter-out-
v6" term internet-traffic then accept
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-in" filter-specific
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-in" logical-
interface-policer
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-in" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-in" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-in" then discard
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-out" filter-specific
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-out" logical-
interface-policer
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-out" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-out" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-stb-int-prof firewall policer "$pol-out" then discard
set dynamic-profiles wlink-single-pipe-prof variables bandwidth default-value 10m
set dynamic-profiles wlink-single-pipe-prof variables bandwidth mandatory
set dynamic-profiles wlink-single-pipe-prof variables burst default-value 1280000
set dynamic-profiles wlink-single-pipe-prof variables burst mandatory
set dynamic-profiles wlink-single-pipe-prof variables filter-out uid
set dynamic-profiles wlink-single-pipe-prof variables filter-in uid
set dynamic-profiles wlink-single-pipe-prof variables pol-out uid
set dynamic-profiles wlink-single-pipe-prof variables pol-in uid
set dynamic-profiles wlink-single-pipe-prof variables filter-out-v6 uid
set dynamic-profiles wlink-single-pipe-prof variables filter-in-v6 uid
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet filter input "$filter-in"
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet filter input precedence 100
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet filter output "$filter-out"
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet filter output precedence 100
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet6 filter input "$filter-in-v6"
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet6 filter input precedence 100
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet6 filter output "$filter-out-v6"
set dynamic-profiles wlink-single-pipe-prof interfaces demux0 unit "$junos-
interface-unit" family inet6 filter output precedence 100
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" interface-specific
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" term DNS from destination-port 53
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" term DNS then policer 32k
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" term DNS then next term
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" term internet-traffic then service-accounting
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
in" term internet-traffic then accept
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
out" interface-specific
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
out" term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
out" term internet-traffic then service-accounting
set dynamic-profiles wlink-single-pipe-prof firewall family inet filter "$filter-
out" term internet-traffic then accept
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" interface-specific
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" term DNS-v6 from destination-port 53
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" term DNS-v6 then policer 32k
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" term DNS-v6 then next term
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" term internet-traffic then policer "$pol-in"
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" term internet-traffic then service-accounting
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
in-v6" term internet-traffic then accept
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
out-v6" interface-specific
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
out-v6" term internet-traffic then policer "$pol-out"
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
out-v6" term internet-traffic then service-accounting
set dynamic-profiles wlink-single-pipe-prof firewall family inet6 filter "$filter-
out-v6" term internet-traffic then accept
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-in" filter-
specific
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-in" logical-
interface-policer
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-in" if-exceeding
bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-in" if-exceeding
burst-size-limit "$burst"
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-in" then discard
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-out" filter-
specific
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-out" logical-
interface-policer
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-out" if-
exceeding bandwidth-limit "$bandwidth"
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-out" if-
exceeding burst-size-limit "$burst"
set dynamic-profiles wlink-single-pipe-prof firewall policer "$pol-out" then
discard

You might also like