Sei sulla pagina 1di 204

Majoma, Zacatecas a 09 de Septiembre de 2019.

MEMORIA TÉCNICA GENERAL


4103P00084/C/2019/0000065 PARQUE FOTOVOLTAICO TULI & HELIOS.
Contenido
1.- DATOS DEL CLIENTE FINAL. ................................................................................................................................ 1
1.1.- PRIMERO DE MAYO CFE. ............................................................................................................................................ 1
1.2.- SE/ ELEVADORA TULI. ................................................................................................................................................. 1
1.3.- SE/ ELEVADORA HELIOS. ............................................................................................................................................ 1
2.- DESCRIPCIÓN. ......................................................................................................................................................... 1
3.- DIAGRAMA LÓGICO DE RED................................................................................................................................. 2
3.1.- SECCIÓN PRIMERO DE MAYO. ............................................................................................................................................... 2
3.2.- SECCIÓN SE/ ELEVADORA. ................................................................................................................................................... 2
3.2.1.- Tuli. ...................................................................................................................................................................... 2
3.2.2.- Helios. .................................................................................................................................................................. 3
3.3.- SECCIÓN O&M TULI-HELIOS. ............................................................................................................................................ 4
4.- INVENTARIO DE EQUIPOS CONFIGURADOS. ................................................................................................... 5
4.1.- SECCIÓN PRIMERO DE MAYO. ............................................................................................................................................... 5
4.1.1 Tuli. ........................................................................................................................................................................... 5
4.1.2 Helios. ....................................................................................................................................................................... 5
4.2.- SECCIÓN SE/ ELEVADORA. ................................................................................................................................................... 6
4.2.1 Tuli. ........................................................................................................................................................................... 6
4.2.2 Helios. ....................................................................................................................................................................... 7
4.3.- SECCIÓN SE/ O&M............................................................................................................................................................ 8
4.3.1 Tuli. ........................................................................................................................................................................... 8
4.3.2 Helios. ..................................................................................................................................................................... 10
5.- SEGMENTO DE RED. ............................................................................................................................................ 12
5.1.- SECCIÓN 1° DE MAYO. ............................................................................................................................................... 12
5.2.- SECCIÓN SE/ ELEVADORA. ................................................................................................................................................. 12
5.2.1 Tuli .......................................................................................................................................................................... 12
5.2.2 Helios ...................................................................................................................................................................... 13
5.3.- SECCIÓN O&M................................................................................................................................................................ 15
5.3.1 Tuli. ......................................................................................................................................................................... 15
5.3.2 Helios. ..................................................................................................................................................................... 15
6.- CREDENCIALES DE ACCESO. ............................................................................................................................ 16
6.1.- SECCIÓN 1° DE MAYO. ............................................................................................................................................... 16
6.2.- SECCIÓN SE/ ELEVADORA......................................................................................................................................... 16
6.2.1. Tuli ....................................................................................................................................................................... 16
6.2.2. Helios. ................................................................................................................................................................. 17
6.3.- SECCIÓN O&M. .......................................................................................................................................................... 17
6.3.1. .Tuli. ..................................................................................................................................................................... 17
6.3.2. Helios. ................................................................................................................................................................. 18
7.- CONEXIONES IMPORTANTES. ............................................................................................................................ 19
7.1.- SECCIÓN PRIMERO DE MAYO. .................................................................................................................................... 19
7.1.1 Tuli. ....................................................................................................................................................................... 19
7.1.2 Helios ................................................................................................................................................................... 20
7.2.- SECCIÓN SE/ ELEVADORA......................................................................................................................................... 21
7.2.1 Tuli. ......................................................................................................................................................................... 21
7.2.2 Helios. ..................................................................................................................................................................... 24
7.3.- SECCIÓN O&M. .......................................................................................................................................................... 26
7.3.1 Tuli. ......................................................................................................................................................................... 26
7.3.2 Helios. ..................................................................................................................................................................... 29
8.- SHOW RUNNING-CONFIG. ................................................................................................................................... 32
8.1.- SECCIÓN PRIMERO DE MAYO. .................................................................................................................................... 32
8.1.1 SW_1°MAYO,01 ................................................................................................................................................. 32
8.1.2 SW_1°MAYO,02 ................................................................................................................................................. 37
8.2.- SECCIÓN SE/ ELEVADORA TULI. ............................................................................................................................... 42
8.2.1 ROUTER1_TULI ................................................................................................................................................. 42
8.2.2 ROUTER2_TULI ................................................................................................................................................. 45
8.2.3 SERVICEMODULE_ROUTER1 ....................................................................................................................... 48
8.2.4 SERVICEMODULE_ROUTER2 ....................................................................................................................... 52
8.2.5 SW_TULI1 ........................................................................................................................................................... 57
8.2.6 SW_TULI2 ........................................................................................................................................................... 61
8.3.- SECCIÓN SE/ ELEVADORA HELIOS............................................................................................................................ 65
8.3.1 CISCO ROUTER1_HELIOS ............................................................................................................................. 65
8.3.2 ROUTER2_HELIOS ........................................................................................................................................... 69
8.3.3 SERVICEMODULE_R1 ..................................................................................................................................... 72
8.3.4 SERVICEMODULE_R2 ..................................................................................................................................... 76
8.3.5 SW_HELIOS1 ..................................................................................................................................................... 81
8.3.6 SW_HELIOS2 ..................................................................................................................................................... 84
8.4.- SECCIÓN O&M TULI................................................................................................................................................... 89
8.4.1 ASATULIPRI ....................................................................................................................................................... 89
8.4.2 ASATULISEC ...................................................................................................................................................... 93
8.4.3 ROUTER1_TULI ................................................................................................................................................. 99
8.4.4 ROUTER2_TULI ...............................................................................................................................................103
8.4.5 SW_CORE_TULI..............................................................................................................................................105
8.4.6 SW_DMZ_TULI ................................................................................................................................................126
8.4.7 SW_ISP_TULI ...................................................................................................................................................130
8.4.8 SW_TULI1 .........................................................................................................................................................133
8.4.9 SW_TULI2 .........................................................................................................................................................138
8.5.- SECCIÓN O&M HELIOS. ...........................................................................................................................................144
8.5.1 ASAHELIOSPRI ...............................................................................................................................................144
8.5.2 ASAHELIOSSEC ..............................................................................................................................................150
8.5.3 ROUTER1_HELIOS .........................................................................................................................................155
8.5.4 ROUTER2_HELIOS .........................................................................................................................................159
8.5.5 SW_CORE_HELIOS........................................................................................................................................163
8.5.6 SW_HELIOS_DMZ ..........................................................................................................................................183
8.5.7 SW_HELIOS_ISP .............................................................................................................................................186
8.5.8 SW_HELIOS1 ...................................................................................................................................................189
8.5.9 SW_HELIOS2 ...................................................................................................................................................194
9.-TELEFONÍA ................................................................................................................................................................. 200
9.1.-CONFIGURACIÓN Y EXTENSIONES TULI. ................................................................................................................................200
9.2.-CONFIGURACIÓN Y EXTENSIONES HELIOS. .............................................................................................................................200
1.- DATOS DEL CLIENTE FINAL.

1.1.- Primero de Mayo CFE.


Razón social: CFE transmisión.
Dirección 1° de Mayo: Calle Km 145, carretera federal 54, tramo Zacatecas Saltillo, S/N, colonia S/N,
CP 98279, Majoma Municipio de Mazapil, Zacatecas.
Teléfono: 449-918-38-33
Encargado del equipo: Ing. Alejandro Romo Guzmán.
Correo: Alejandro.romo@dt.cfe.mx
Teléfono: 493-103-51-94

1.2.- SE/ Elevadora Tuli.


Nombre: TULI ENERGÍAS S. DE R.L. DE C.V
Dirección fiscal: (AV.) Constitución Poniente núm. 444 Col. Centro, Monterrey, Nvo. León
RFC: TEN1409252F0
Dirección donde está instalado el equipo: Carretera Saltillo - Zacatecas KM 146 población
Majoma, Mpo. Mazapil CP. 98279
Nombre del contacto: Ing. Jean Carlos Gómez Alvernia
Teléfono: 55 3437 6898
E-mail: jcarlos@dinandina.com
1

1.3.- SE/ Elevadora Helios.


Nombre: HELIOS GENERACION S. DE R.L. DE C.V.
Dirección fiscal: (AV.) Constitución Poniente núm. 444 Col. Centro, Monterrey, Nvo. León
RFC: HGEl50S226UA
Dirección donde está instalado el equipo: Carretera Saltillo - Zacatecas KM 146 población
Majoma, Mpo. Mazapil CP. 98279
Nombre del contacto: Ing. Jean Carlos Gómez Alvernia
Teléfono: 55 3437 6898
E-mail: jcarlos@dinandina.com

2.- DESCRIPCIÓN.
El siguiente documento parte del requerimiento del cliente por la necesidad de conocer su plataforma
en operación. En este documento podremos encontrar de manera general y resumida lo referente a los
equipos en producción; descripción, inventario, direccionamiento, topología, accesos, entre otros.
3.- DIAGRAMA LÓGICO DE RED.
3.1.- Sección Primero de Mayo.

Imagen 3.1 Diagrama lógico de red sección 1° de Mayo. 2

3.2.- Sección SE/ Elevadora.


3.2.1.- Tuli.

Imagen 3.2 Diagrama lógico de red Elevadora Tuli.


3.2.2.- Helios.

Imagen 3.2.2 Diagrama lógico de red SE//Elevadora Tuli-Helios.


3.3.- Sección O&M TULI-HELIOS.

Imagen 3.3 Diagrama lógico de red edificio O&M.


4.- INVENTARIO DE EQUIPOS CONFIGURADOS.
4.1.- Sección primero de Mayo.
4.1.1 Tuli.

Marca Modelo Serie Descripción Unidad Cantidad


Cisco IE4010 16X1G SFP AND Pieza
IE-4010-16S1 FDO2302U0GE 1
12X10/100/1000 LAN BASE
Cisco GLC-FE-100LX- 1000Mbps Single Mode
Pieza 2
RGD= Rugged SFP 10km

5
4.1.2 Helios.

Marca Modelo Serie Descripción Unidad Cantidad


Cisco IE4010 16X1G SFP AND Pieza
IE-4010-16S1 FDO2302U0FG 1
12X10/100/1000 LAN BASE
Cisco GLC-FE-100LX- 1000Mbps Single Mode
Pieza 2
RGD= Rugged SFP 10km

Nota: Los dos Switch IE4010 suministrados para primero de Mayo tienen la misma
configuración, el Switch 1MAYO_SW1 es el que se encuentra en operación y el 1MAYO_SW2
queda como suministro y respaldo en caso de alguna falla operativa.
4.2.- Sección SE/ Elevadora.

4.2.1 Tuli.
Marca Modelo Descripción Unidad Cantidad
PCI/PCIe CON CORE i7 3.4GHz
Transduction TR-7190-RM-T Pieza 1
CPU Y WINDWS 10 PRO
Cisco CGR2010 security
Cisco CGR-2010-SEC/K9 Pieza 1
bundle w/SEC license PAK

Cisco CGS2520 front/rear


Cisco CGS-2520-24TC cabling w/2GE, 24-10/100 Pieza 2
copper

IP PHONE WITH 2.8"/2.4"


Fortivoice FON-375 DUAL COLOR SCREEN, 16 Pieza 2
PROGRAMMABLE 6

BASE STATIONS SUPPORTS 15


Fortivoice FON-870I Pieza 1
FF-870I-H HANDSETS

TRANSFORMADOR DE
APC APTE10KW01 Pieza 1
AISLAMIENTO WW DE 10 KVA
4.2.2 Helios.

Marca Modelo Descripción Unidad Cantidad


PCI/PCIe CON CORE i7 3.4GHz
Transduction TR-7190-RM-T Pieza 1
CPU Y WINDWS 10 PRO
Cisco CGR2010 security
Cisco CGR-2010-SEC/K9 Pieza 1
bundle w/SEC license PAK

Cisco CGS2520 front/rear


Cisco CGS-2520-24TC cabling w/2GE, 24-10/100 Pieza 2
copper

IP PHONE WITH 2.8"/2.4"


Fortivoice FON-375 DUAL COLOR SCREEN, 16 Pieza 2
PROGRAMMABLE
7
BASE STATIONS SUPPORTS 15
Fortivoice FON-870I Pieza 1
FF-870I-H HANDSETS

TRANSFORMADOR DE
APC APTE10KW01 Pieza 1
AISLAMIENTO WW DE 10 KVA
4.3.- Sección SE/ O&M.
4.3.1 Tuli.

Marca Modelo Serie Descripción Unidad Cantidad

ASA5506-SEC-BUN- ASA 5506 with FirePOWER


Cisco Pieza 2
K9 services and Sec Plus license

FCW2311GH1V Cisco Catalyst 3850 48 Port


Cisco WS-C3850-48F-S Pieza 2
FCW2311GH1V Full PoE IP Base

TRANSFORMADOR DE
APC APTE10KW01 7S1841L00616 Pieza 1
AISLAMIENTO WW DE 10 KVA

Meraki MR33 Cloud Managed 8


Cisco MR33-HW Pieza 1
AP

Servidor de consola de 16
puertos Avocent ACS 8016 con
Avocent ACS8016MDAC-400 0520302628 Pieza 1
fuente de alimentación de CA
doble y módem incorporado

Fortivoive Enterprise-100E, 4X
Fortivoice FVE-100E FO100E5818000182 10/100/1000 ports, 1 X 500 Pieza 1
GB

Fortivoice Enterprise Gateway


Fortivoice FVE-20E4 FO20E44P17000129 20E4, 2 X 10/100 Ports, 4 X Pieza 1
FXO
Marca Modelo Serie Descripción Unidad Cantidad

Fortivoice FON-870I FON8704816000193 Base Station Pieza 1

IP Phone with 2.8"/2.4" dual


Fortivoice FON-375 color screen, 16 Pieza 1
programmable

Amplificador Celular SureCall


SC-POLYSH/O-72-OP- Fusion5S con Antenna Exterior
SureCell Pieza 1
KIT Omnidirrecional e Interior de
Panel SC-PolysH/O-72-OP-KIT

Catalyst 2960L 8 port GigE, 2 x


Cisco WS-C2960L-8TS-LL FCW2304A0SA Pieza 3
1G SFP, LAN Lite

FOC2307T1E3
Cisco CGS2520 front/rear
FOC2307T1E2 9
Cisco CGS-2520-24TC cabling w/2GE, 24-10/100 Pieza 4
FOC2307T1E4
copper
FOC2307T1FJ

SERVIDOR HPE PROLIANT


DL360 GEN10 SCALABLE 4114
HPE 867962-B21 MXQ838051X Pieza 1
10C 2.2 GHZ 13.75 MB 16GB
RAM 85W

SERVIDOR HPE PROLIANT


DL380 GEN10 INTEL XEON-S
4114 10-CORE (2.20GHZ
13.75MB) 32GB (1 X 32GB)
HPE P06421-B21 2M290204C4 DDR4 2666MHZ RDIMM 8 X Pieza 1
HOT PLUG 2.5IN SMALL FORM
FACTOR SMART CARRIER
SMART ARRAY P408I-A NO
OPTICAL 800W
4.3.2 Helios.

Marca Modelo Serie Descripción Unidad Cantidad

ASA5506-SEC-BUN- JMX2313G0BV ASA 5506 with FirePOWER


Cisco Pieza 2
K9 JMX2313G08E services and Sec Plus license

FOC2310X1GC Cisco Catalyst 3850 48 Port


Cisco WS-C3850-48F-S Pieza 2
FOC2310X1G6 Full PoE IP Base

TRANSFORMADOR DE
APC APTE10KW01 7S1841L00617 Pieza 1
AISLAMIENTO WW DE 10 KVA

Meraki MR33 Cloud Managed


Cisco MR33-HW Pieza 1
AP
10
Servidor de consola de 16
puertos Avocent ACS 8016 con
Avocent ACS8016MDAC-400 0520302630 Pieza 1
fuente de alimentación de CA
doble y módem incorporado

Fortivoive Enterprise-100E, 4X
Fortivoice FVE-100E FO100E5818000177 10/100/1000 ports, 1 X 500 Pieza 1
GB

Fortivoice Enterprise Gateway


Fortivoice FVE-20E4 FO20E44P17000109 20E4, 2 X 10/100 Ports, 4 X Pieza 1
FXO

Fortivoice FON-870I FON8704816000090 Base Station Pieza 1

IP Phone with 2.8"/2.4" dual


Fortivoice FON-375 color screen, 16 Pieza 1
programmable
Amplificador Celular SureCall
SC-POLYSH/O-72-OP- Fusion5S con Antenna Exterior
SureCell Pieza 1
KIT Omnidirrecional e Interior de
Panel SC-PolysH/O-72-OP-KIT

FCW2304A0T2 Catalyst 2960L 8 port GigE, 2 x


Cisco WS-C2960L-8TS-LL Pieza 3
FCW2304A0SF 1G SFP, LAN Lite

FOC2231T2SZ Cisco CGS2520 front/rear


Cisco CGS-2520-24TC FOC2307T1FJ cabling w/2GE, 24-10/100 Pieza 4
FOC2228T4JE copper

SERVIDOR HPE PROLIANT


DL360 GEN10 SCALABLE 4114
HPE 867962-B21 MXQ8380386 Pieza 1
10C 2.2 GHZ 13.75 MB 16GB
RAM 85W

SERVIDOR HPE PROLIANT


DL380 GEN10 INTEL XEON-S
4114 10-CORE (2.20GHZ 11
13.75MB) 32GB (1 X 32GB)
HPE P06421-B21 2M2845012W DDR4 2666MHZ RDIMM 8 X Pieza 1
HOT PLUG 2.5IN SMALL FORM
FACTOR SMART CARRIER
SMART ARRAY P408I-A NO
OPTICAL 800W
5.- SEGMENTO DE RED.
5.1.- Sección 1° de Mayo.

SEGMENTOS DE RED
NOMBRE VLAN ID SEGMENTO RED MÁSCARA UBICACIÓN

RED SICLE CFE 1 10.24.21.192 255.255.255.192 SE PMY


RED SEL NUEVA 5 10.124.4.192 255.255.255.192 SE PMY
VLAN ADMINISTRACION 200 192.168.255.0 255.255.255.248 SE PMY
RED COMUNICACIÓN ENTRE SWITCH CISCO IE4010
N/A 10.255.255.0 255.255.255.252 SE PMY
Y FIREWALL PULLNET

5.2.- Sección SE/ Elevadora.


5.2.1 Tuli 12

SEGMENTO
NOMBRE VLAN ID MÁSCARA UBICACIÓN
RED
PUERTO Gi 0/0 DEL SUBESTACION ELEVADORA
SWITCHES SEL ROUTER1_TULI Y 192.168.200.0 255.255.255.0 GABINETES
ROUTER2_TULI COMUNICACIONES DE TULI
COMUNICACIÓN PUERTO Gi 0/1 DEL SUBESTACION ELEVADORA
ROUTER BESTEL ROUTER1_TULI Y 10.85.66.0 255.255.255.240 GABINETES
MPLS ROUTER2_TULI COMUNICACIONES DE TULI
VLAN TELEFONIA SUBESTACION ELEVADORA
CENACE 10.73.250.216 255.255.255.248 GABINETES
25
(FORTIVOICE 20E) COMUNICACIONES DE TULI
SEGMENTO
NOMBRE VLAN ID MÁSCARA UBICACIÓN
RED
VLAN TELEFONIA SUBESTACION ELEVADORA
PÚBLICA 26 10.85.26.0 255.255.255.248 GABINETES
(FORTIVOICE 100E) COMUNICACIONES DE TULI
VLAN SUBESTACION ELEVADORA
ADMINISTRACION 885 10.85.85.0 255.255.255.0 GABINETES
EQUIPOS DE RED COMUNICACIONES DE TULI
PUERTO Gi 0/0/0 DEL SUBESTACION ELEVADORA
SEGMENTO PMEM
ROUTER1_TULI Y 172.31.30.217 255.255.255.248 GABINETES
TULI
ROUTER2_TULI COMUNICACIONES DE TULI
SEGMENTO SUBESTACION ELEVADORA
TELEFONOS O&M 15 10.85.15.0 255.255.255.0 GABINETES
TULI COMUNICACIONES DE TULI

5.2.2 Helios 13

SEGMENTO
NOMBRE VLAN ID MÁSCARA UBICACIÓN
RED

SUBESTACION ELEVADORA
PUERTO Gi 0/0 DEL
GABINETES
SWITCHES SEL ROUTER1_HELIOS Y 192.168.201.0 255.255.255.0
COMUNICACIONES DE
ROUTER2_HELIOS
HELIOS

SUBESTACION ELEVADORA
COMUNICACIÓN PUERTO Gi 0/1 DEL
GABINETES
ROUTER BESTEL ROUTER1_HELIOS Y 10.86.66.0 255.255.255.240
COMUNICACIONES DE
MPLS ROUTER2_HELIOS
HELIOS
SEGMENTO
NOMBRE VLAN ID MÁSCARA UBICACIÓN
RED

SUBESTACION ELEVADORA
VLAN TELEFONIA
GABINETES
CENACE 25 10.73.250.208 255.255.255.248
COMUNICACIONES DE
(FORTIVOICE 20E)
HELIOS

SUBESTACION ELEVADORA
VLAN TELEFONIA
GABINETES
PÚBLICA 26 10.86.26.0 255.255.255.248
COMUNICACIONES DE
(FORTIVOICE 100E)
HELIOS

SUBESTACION ELEVADORA
VLAN
GABINETES
ADMINISTRACION 885 10.86.86.0 255.255.255.0
COMUNICACIONES DE
EQUIPOS DE RED
HELIOS

SUBESTACION ELEVADORA 14
PUERTO Gi 0/0/0 DEL
SEGMENTO PMEM GABINETES
ROUTER1_HELIOS Y 172.31.30.208 255.255.255.248
HELIOS COMUNICACIONES DE
ROUTER2_HELIOS
HELIOS

SUBESTACION ELEVADORA
SEGMENTO
GABINETES
TELEFONOS O&M 15 10.86.15.0 255.255.255.0
COMUNICACIONES DE
HELIOS
HELIOS
5.3.- Sección O&M.
5.3.1 Tuli.
NOMBRE VLAN ID SEGMENTO RED MÁSCARA UBICACIÓN
default 1 N/A N/A

COMUNICACIONES DE TULI
EDIFICIO O&M GABINETES
User_Vlan 5 10.85.5.0 255.255.255.0
Server_Vlan 10 10.85.10.0 255.255.255.0
Phone_Vlan 15 10.85.15.0 255.255.255.0
Substation_Vlan 20 10.85.20.0 255.255.255.0
CENACE_TULI 25 10.73.250.216 255.255.255.248
TEL_PUB_TULI 26 10.85.26.0 255.255.255.248
Guest_Vlan 50 10.85.50.0 255.255.255.0
Security_Vlan 55 10.85.55.0 255.255.255.0
MGMT_Vlan_Tuli 885 10.85.85.0 255.255.255.0

5.3.2 Helios. 15

NOMBRE VLAN ID SEGMENTO RED MÁSCARA UBICACIÓN


default 1 N/A N/A

COMUNICACIONES HELIOS
EDIFICIO O&M GABINETES
User_Vlan 5 10.86.5.0 255.255.255.0
Server_Vlan 10 10.86.10.0 255.255.255.0
Phone_Vlan 15 10.86.15.0 255.255.255.0
Substation_Vlan 20 10.86.20.0 255.255.255.0
CENACE_TULI 25 10.73.250.208 255.255.255.248
TEL_PUB_TULI 26 10.86.26.0 255.255.255.248
Guest_Vlan 50 10.86.50.0 255.255.255.0
Security_Vlan 55 10.86.55.0 255.255.255.0
MGMT_Vlan_Tuli 886 10.86.86.0 255.255.255.0
6.- CREDENCIALES DE ACCESO.

6.1.- Sección 1° de Mayo.

EQUIPO NÚM. SERIE IP DE ADMINISTRACIÓN USUARIO CONTRASEÑA ENABLE CONSOLA

1MAYO_SW1 FDO2302U0GE 192.168.255.1 admin cfe2019 cfe2019 cfe2019


1MAYO_SW2 FDO2302U0FG 192.168.255.1 admin cfe2019 cfe2019 cfe2019

6.2.- Sección SE/ Elevadora.

6.2.1. Tuli

IP DE 16
EQUIPO NÚM. SERIE USUARIO CONTRASEÑA ENABLE CONSOLA
ADMINISTRACIÓN

ROUTER1_TULI FTX2218X00N 10.85.85.2 admin Tul1Zac2019 cfe2019 cfe2019

ROUTER2_TULI FTX2218X00J 10.85.85.3 admin Tul1Zac2019 cfe2019 cfe2019

SW_TULI1 FOC2307T1EC 10.85.85.4 admin Tul1Zac2019 cfe2019 cfe2019

SW_TULI2 FOC2307T1FK 10.85.85.5 admin Tul1Zac2019 cfe2019 cfe2019

FORTIVOICE
FO20E44P17000109 10.73.250.217 admin Tul1Zac2019 N/A N/A
20E

FORTIVOICE
FO100E5818000177 10.85.26.3 admin Tul1Zac2019 N/A N/A
100E
6.2.2. Helios.

IP DE
EQUIPO NÚM. SERIE USUARIO CONTRASEÑA ENABLE CONSOLA
ADMINISTRACIÓN

ROUTER1_HELIOS FTX2218X00K 10.86.86.2 admin H3l10sZ4c2019 cfe2019 cfe2019

ROUTER2_HELIOS FTX2218X00M 10.86.86.3 admin H3l10sZ4c2019 cfe2019 cfe2019

SW_HELIOS1 FOC2307T1FG 10.86.86.4 admin H3l10sZ4c2019 cfe2019 cfe2019

SW_HELIOS2 FOC2307T1FM 10.86.86.5 admin H3l10sZ4c2019 cfe2019 cfe2019

FORTIVOICE 20E FO20E44P17000129 10.73.250.209 admin H3l10sZ4c2019 N/A N/A

FORTIVOICE 100E FO100E5818000182 10.86.26.3 admin H3l10sZ4c2019 N/A N/A

6.3.- Sección O&M. 17

6.3.1. .Tuli.
IP DE
EQUIPO NÚM. SERIE USUARIO CONTRASEÑA ENABLE CONSOLA
ADMINISTRACIÓN

zac-tul-vidsrv 2M290204C4 10.85.85.21 administrator TRRVZ2W7 N/A N/A

zac-tul-vidsrv 2M290204C4 10.85.10.31 administrador TuL1-VIDS3rv? N/A N/A

zac-tul-vmsrv MXQ838051X 10.85.85.22 administrator W3MWN6WD N/A N/A

zac-tul-vmsrv MXQ838051X 10.85.10.32 administrador TuL1-VMS3rv? N/A N/A

zac-tul-vidsrv 2M290204C4 10.85.10.31 OPERADOR 1 Op3&TulVid1? N/A N/A

zac-tul-vidsrv 2M290204C4 10.85.10.31 OPERADOR 2 Op3&TulVid2? N/A N/A


EQUIPO NÚM. SERIE IP DE ADMINISTRACIÓN USUARIO CONTRASEÑA ENABLE CONSOLA
ASATULIPRIMARIO JAD23090HCN 10.85.85.8 admin Tul1#Zac$2019& TULI2018 TULI2018
ASATULISEC JAD23090HD5 10.85.85.9 admin Tul1#Zac$2019& TULI2018 TULI2018
SW_TULI_ISP FCW2304A0S6 10.85.85.6 N/A N/A TULI2018 TULI2018
SW_TULI_DMZ FCW2304A0SA 10.85.85.7 N/A N/A TULI2018 TULI2018

FOC23097ZP9
SW_CORE_TULI 10.85.85.254 N/A N/A TULI2018 TULI2018
FOC23097ZU7

FORTIVOICE 100E FO100E5818000177 10.85.15.1 admin Tul1Zac2019 N/A N/A


https://n127.meraki.com/TULI_OM/n/-
AP CISCO MERAKI Q2PD-L74C-XCGH telecom.tulizac@gmail.com Tul1Z4c#%2019 N/A N/A
xTjyc_b/login/dashboard_login
zac-tul-vmsrv MXQ838051X 10.85.10.32 OPERADOR 1 Op3&uN0? N/A N/A
zac-tul-vmsrv MXQ838051X 10.85.10.32 OPERADOR 2 Op3&D0s? N/A N/A

6.3.2. Helios.

ENABL 18
EQUIPO NÚM. SERIE IP DE ADMINISTRACIÓN USUARIO CONTRASEÑA CONSOLA
E
H3l10s#Z4c$2019 HELIOS
ASAPRIMARIO JAD23090HDU 10.86.86.8 admin HELIOS2018
& 2018
H3l10s#Z4c$2019 HELIOS
ASASECUNSARIO JAD23090HDV 10.86.86.9 admin HELIOS2018
& 2018
HELIOS
SW_HELIOS_ISP FCW2304A0T2 10.86.86.6 N/A N/A HELIOS2018
2018
HELIOS
SW_HELIOS_DMZ FCW2304A0SF 10.86.86.7 N/A N/A HELIOS2018
2018

FOC2310X1GC HELIOS
SW_CORE_HELIOS 10.86.86.254 N/A N/A HELIOS2018
FOC2310X1G6 2018

FO100E5818000
FORTIVOICE 100E 10.86.15.1 admin H3l10sZ4c2019 N/A N/A
182
https://n127.meraki.com/HELI
Q2PD-MMJM- telecom.tulizac@gmai
AP CISCO MERAKI OS_OM/n/MUyCkb_b/login/da Tul1Z4c#%2019 N/A N/A
YXUM l.com
shboard_login
IP DE
EQUIPO NÚM. SERIE USUARIO CONTRASEÑA ENABLE CONSOLA
ADMINISTRACIÓN

zac-hel-vidsrv 2M2845012W 10.86.86.21 administrator KVCX7RQ6 N/A N/A

zac-hel-vidsrv 2M2845012W 10.86.10.31 administrador H3l10S-VIDServ? N/A N/A

zac-hel-vmsrv MXQ8380386 10.86.86.22 administrator 6SQ9668K N/A N/A

zac-hel-vmsrv MXQ8380386 10.86.10.32 administrador H3l10S-VMS3rv? N/A N/A

zac-hel-vidsrv 2M2845012W 10.86.10.31 OPERADOR 1 Op3&HelVid1? N/A N/A

zac-hel-vidsrv 2M2845012W 10.86.10.31 OPERADOR 2 Op3&HelVid2? N/A N/A

zac-hel-vmsrv MXQ8380386 10.86.10.32 OPERADOR 1 Op3&HelVM1? N/A N/A

zac-hel-vmsrv MXQ8380386 10.86.10.32 OPERADOR 2 Op3&HelVM2? N/A N/A


19

7.- CONEXIONES IMPORTANTES.

7.1.- Sección primero de Mayo.

7.1.1 Tuli.

UBICACI DIRECCIÓN
EQUIPO PUERTO CONECTADO HACIA
ÓN IP
1MAYO_S Puerto
GABINETE TULI

GigabitEthernet1/1 SW SEL-2730M 10.124.4.193


W1 Acceso
SE PMY

1MAYO_S Puerto GigabitEthernet1/2 al Puertos disponibles para conectar equipos red nueva gabinetes SEL
W1 Acceso 5 10.124.4.192/26
1MAYO_S Puerto
GigabitEthernet1/6 SW SICLE DE CFE (GarretCom Magnum 6K25)
W1 Acceso
1MAYO_S Puerto GigabitEthernet1/7 al Puertos disponibles para conectar equipos red anterior SICLE CFE
W1 Acceso 10 10.24.21.192/26
1MAYO_S Puerto
GigabitEthernet1/11 Puerto 3 Firewall PULLNET
W1 Acceso
1MAYO_S Puerto
GigabitEthernet1/12 Puerto de administración SW CISCO IE-4010 (192.168.255.1/29)
W1 Acceso
1MAYO_S Puerto GigabitEthernet1/13
Puertos con configuración de default, para recibir SFP´s
W1 Acceso al 28

7.1.2 Helios

UBICACI DIRECCIÓN
EQUIPO PUERTO CONECTADO HACIA
ÓN IP
1MAYO_S Puerto
GigabitEthernet1/1 SW SEL-2730M 10.124.4.193
W2 Acceso
1MAYO_S Puerto GigabitEthernet1/2 al Puertos disponibles para conectar equipos red nueva gabinetes SEL 20
GABINETE HELIOS SE PMY

W2 Acceso 5 10.124.4.192/26
1MAYO_S Puerto
GigabitEthernet1/6 SW SICLE DE CFE (GarretCom Magnum 6K25)
W2 Acceso
1MAYO_S Puerto GigabitEthernet1/7 al Puertos disponibles para conectar equipos red anterior SICLE CFE
W2 Acceso 10 10.24.21.192/26
1MAYO_S Puerto
GigabitEthernet1/11 Puerto 3 Firewall PULLNET
W2 Acceso
1MAYO_S Puerto
GigabitEthernet1/12 Puerto de administración SW CISCO IE-4010 (192.168.255.1/29)
W2 Acceso
1MAYO_S Puerto GigabitEthernet1/13
Puertos con configuración de default, para recibir SFP´s
W2 Acceso al 28
7.2.- Sección SE/ Elevadora.

7.2.1 Tuli.

UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA

ROUTER1_TULI 192.168.200.11/24 GigabitEthernet0/0 Primer SW del anillo SEL Tuli


GABINETE DE COMUNICACIONES

Puerto GigabitEthernet0/1 del


ROUTER1_TULI 10.85.66.4/28 GigabitEthernet0/1
SW_TULI1

Puerto GigabitEthernet0/1 del


ROUTER1_TULI 10.73.250.220/29 GigabitEthernet0/1.25
SW_TULI1

Puerto GigabitEthernet0/1 del


ROUTER1_TULI 10.85.85.2/24 GigabitEthernet0/1.885
SW_TULI1
TULI

21
ROUTER1_TULI 172.31.30.220/29 GigabitEthernet0/0/0 Gabinete RTU Tuli

ROUTER2_TULI 192.168.200.12/24 GigabitEthernet0/0 Último SW del anillo SEL Tuli

Puerto GigabitEthernet0/1 del


ROUTER2_TULI 10.85.66.5/28 GigabitEthernet0/1
SW_TULI2

Puerto GigabitEthernet0/1 del


ROUTER2_TULI 10.73.250.221/29 GigabitEthernet0/1.25
SW_TULI2

Puerto GigabitEthernet0/1 del


ROUTER2_TULI 10.85.85.3/24 GigabitEthernet0/1.885
SW_TULI2
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA

GABINETES DE COMUNICACIONES ROUTER2_TULI 172.31.30.221/29 GigabitEthernet0/0/0 Gabinete RTU Tuli

SW_TULI1 Puerto Trunk FastEthernet0/1 Puerto GigabitEthernet0/1 del


ROUTER1_TULI

SW_TULI1 Puerto Acceso FastEthernet0/2 Router MPLS BESTEL TULI

SW_TULI1 Puerto Acceso VLAN 15 FastEthernet0/17 al 20 VLAN TELEFONOS O&M


TULI
TULI

SW_TULI1 Puerto Acceso VLAN 25 FastEthernet0/21 al 24 RED TELEFONIA CENACE


TULI
22
SW_TULI1 Puerto Trunk GigabitEthernet0/1 Puerto GigabitEthernet0/1 del
SW_TULI2

SW_TULI1 Puerto Acceso VLAN 885 GigabitEthernet0/2 Puerto para administrar


equipos de red y telefonía
TULI

SW_TULI2 Puerto Trunk FastEthernet0/1 Puerto GigabitEthernet0/1 del


ROUTER2_TULI
UBICACIÓN DIRECCIÓN PUERTO CONECTADO HACIA
EQUIPO IP

GABINETES DE COMUNICACIONES TULI SW_TULI2 Puerto Acceso FastEthernet0/2 Router MPLS BESTEL TULI

SW_TULI2 Puerto Acceso VLAN FastEthernet0/17 al RED TELEFONIA PUBLICA TULI


26 20

SW_TULI2 Puerto Acceso VLAN FastEthernet0/17 Puerto 1 FORTIVOICE 100E TULI


26

SW_TULI2 Puerto Acceso VLAN FastEthernet0/18 Puerto 3 SBC BESTEL TULI


26

SW_TULI2 Puerto Acceso VLAN FastEthernet0/21 al RED TELEFONIA CENACE TULI


25 24

SW_TULI2 Puerto Acceso VLAN FastEthernet0/21 Puerto 1 FORTIVOICE 20E TULI


25 23

SW_TULI2 Puerto Trunk GigabitEthernet0/1 Puerto GigabitEthernet0/1 del SW_TULI1

SW_TULI2 Puerto Acceso VLAN GigabitEthernet0/2 Puerto para administrar equipos de red y
885 telefonía TULI
7.2.2 Helios.

UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA


GABINETES DE COMUNICACIONES HELIOS Primer SW del anillo SEL
ROUTER1_HELIOS 192.168.201.11/24 GigabitEthernet0/0
Helios

Puerto GigabitEthernet0/1 del


ROUTER1_HELIOS 10.86.66.4/28 GigabitEthernet0/1
SW_HELIOS1

Puerto GigabitEthernet0/1 del


ROUTER1_HELIOS 10.73.250.212/29 GigabitEthernet0/1.25
SW_HELIOS1

Puerto GigabitEthernet0/1 del


ROUTER1_HELIOS 10.86.86.2/24 GigabitEthernet0/1.885
SW_HELIOS1

ROUTER1_HELIOS 172.31.30.212/29 GigabitEthernet0/0/0 Gabinete RTU HELIOS


24
Último SW del anillo SEL
ROUTER2_HELIOS 192.168.201.12/24 GigabitEthernet0/0
Helios

Puerto GigabitEthernet0/1 del


ROUTER2_HELIOS 10.86.66.5/28 GigabitEthernet0/1
SW_HELIOS2

Puerto GigabitEthernet0/1 del


ROUTER2_HELIOS 10.73.250.213/29 GigabitEthernet0/1.25
SW_HELIOS2

Puerto GigabitEthernet0/1 del


ROUTER2_HELIOS 10.86.86.3/24 GigabitEthernet0/1.885
SW_HELIOS2

ROUTER2_HELIOS 172.31.30.213/29 GigabitEthernet0/0/0 Gabinete RTU Helios


UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA

GABINETES DE COMUNICACIONES HELIOS


Puerto GigabitEthernet0/1 del
SW_HELIOS1 Puerto Trunk FastEthernet0/1
ROUTER1_HELIOS

SW_HELIOS1 Puerto Acceso FastEthernet0/2 Router MPLS BESTEL HELIOS

Puerto Acceso VLAN VLAN TELEFONOS O&M


SW_HELIOS1 FastEthernet0/17 al 20
15 HELIOS

Puerto Acceso VLAN RED TELEFONIA CENACE


SW_HELIOS1 FastEthernet0/21 al 24
25 HELIOS

Puerto GigabitEthernet0/1 del


SW_HELIOS1 Puerto Trunk GigabitEthernet0/1
SW_HELIOS2

Puerto Acceso VLAN Puerto para administrar equipos


SW_HELIOS1 GigabitEthernet0/2
885 de red y telefonía HELIOS 25
Puerto GigabitEthernet0/1 del
SW_HELIOS2 Puerto Trunk FastEthernet0/1
ROUTER2_HELIOS

SW_HELIOS2 Puerto Acceso FastEthernet0/2 Router MPLS BESTEL HELIOS

Puerto Acceso VLAN RED TELEFONIA PUBLICA


SW_HELIOS2 FastEthernet0/17 al 20
26 HELIOS

Puerto Acceso VLAN Puerto 1 FORTIVOICE 100E


SW_TULI2 FastEthernet0/17
26 HELIOS
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA

SW_TULI2 Puerto Acceso VLAN 26 FastEthernet0/18 Puerto 3 SBC BESTEL HELIOS

COMUNICACIONES HELIOS
GABINETES DE RED TELEFONIA CENACE
SW_HELIOS2 Puerto Acceso VLAN 25 FastEthernet0/21 al 24
HELIOS

Puerto 1 FORTIVOICE 20E


SW_HELIOS2 Puerto Acceso VLAN 25 FastEthernet0/21
HELIOS

Puerto GigabitEthernet0/1 del


SW_HELIOS2 Puerto Trunk GigabitEthernet0/1
SW_HELIOS1

Puerto para administrar equipos


SW_HELIOS2 Puerto Acceso VLAN 885 GigabitEthernet0/2
de red y telefonía HELIOS

7.3.- Sección O&M. 26

7.3.1 Tuli.
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA
SW_ISP_TULI Puerto Acceso VLAN 1 GigabitEthernet0/1 Puerto Gi 1/1 ASATULIPRI
COMUNICACIONES TULI

SW_ISP_TULI Puerto Acceso VLAN 1 GigabitEthernet0/2 Puerto Gi 1/1 ASATULISEC


SW_ISP_TULI Puerto Trunk GigabitEthernet0/8 Puerto Gi 2/0/44 SW_CORE_TULI
GABINETES DE

SW_ISP_TULI Puerto Acceso VLAN 1 GigabitEthernet0/9 Puerto Gi 0/0/0 ROUTER_BESTEL


SW_DMZ_TULI Puerto Acceso VLAN 1 GigabitEthernet0/1 Puerto Gi 1/3 ASATULIPRI
SW_DMZ_TULI Puerto Acceso VLAN 1 GigabitEthernet0/2 Puerto Gi 1/3 ASATULISEC
SW_DMZ_TULI Puerto Acceso VLAN 885 GigabitEthernet0/8 Puerto Gi 2/0/45 SW_CORE_TULI
ASATULIPRI 201.148.19.29/29 GigabitEthernet 1/1 SW_ISP_TULI Puerto Gi 0/1
ASATULIPRI 10.85.85.8/24 GigabitEthernet 1/2 SW_CORE_TULI Puerto Gi 1/0/1
ASATULIPRI 10.85.30.254/24 GigabitEthernet 1/3 SW_DMZ_TULI Puerto Gi 0/1
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA
GigabitEthernet 1/4 Puerto GigabitEthernet 1/4 del
ASATULIPRI 10.1.1.1/29
(FAILOVER) ASATULISEC
GigabitEthernet 1/5 Puerto GigabitEthernet 1/5 del
ASATULIPRI 172.27.1.1/29
(STATE FAILOVER) ASATULISEC
Puerto MGMT (Acceso a
ASATULIPRI 10.85.85.10/24 Modulo Cisco SW_CORE_TULI Puerto Gi 1/0/2
GABINETES DE COMUNICACIONES TULI

FirePower)
ASATULISEC 201.148.19.30/29 GigabitEthernet 1/1 SW_ISP_TULI Puerto Gi 0/2
ASATULISEC 10.85.85.9/24 GigabitEthernet 1/2 SW_CORE_TULI Puerto Gi 2/0/1
ASATULISEC 10.85.30.253/24 GigabitEthernet 1/3 SW_DMZ_TULI Puerto Gi 0/2
GigabitEthernet 1/4 Puerto GigabitEthernet 1/4 del
ASATULISEC 10.1.1.2/29
(FAILOVER) ASATULIPRI
GigabitEthernet 1/5 Puerto GigabitEthernet 1/5 del
ASATULISEC 172.27.1.2/29
(STATE FAILOVER) ASATULIPRI
Puerto MGMT (Acceso a
ASATULISEC 10.85.85.10/24 Modulo Cisco SW_CORE_TULI Puerto Gi 2/0/2 27
FirePower)
Puerto GigabitEthernet 1/1 del
SW_CORE_TULI Puerto Acceso VLAN 885 GigabitEthernet 1/0/1
ASATULIPRI
SW_CORE_TULI Puerto Acceso VLAN 885 GigabitEthernet 1/0/2 Puerto MGMT del ASATULPRI (FirePower)
GigabitEthernet 1/0/3 al
SW_CORE_TULI Puerto Acceso VLAN 885 Puertos disponibles VLAN MGMT 885
4
GigabitEthernet 1/0/5 al Puertos disponibles para usuario en Datos
SW_CORE_TULI Puerto Acceso
36 VLAN 5 y Voz VLAN 15
GigabitEthernet 1/0/37 Puertos disponibles para servidores VLAN
SW_CORE_TULI Puerto Acceso
al 45 10
GigabitEthernet 1/0/46 Puertos para puertos iLo servidores VLAN
SW_CORE_TULI Puerto Acceso
al 48 MGMT 885
GigabitEthernet 1/1/1 al Conexión de F.O. enlace primario a
SW_CORE_TULI Puertos Trunk
4 Elevadora
Puerto GigabitEthernet 1/1 del
SW_CORE_TULI Puerto Acceso VLAN 885 GigabitEthernet 2/0/1
ASAHELIOSSEC
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA
Puerto MGMT del ASATULISEC
SW_CORE_TULI Puerto Acceso VLAN 885 GigabitEthernet 2/0/2
(FirePower)
GigabitEthernet 2/0/3 al
SW_CORE_TULI Puerto Acceso VLAN 885 Puertos disponibles VLAN MGMT 885
4
GABINETES DE COMUNICACIONES TULI

GigabitEthernet 2/0/5 al Puertos disponibles para usuario en Datos


SW_CORE_TULI Puerto Acceso
36 VLAN 5 y Voz VLAN 15
GigabitEthernet 2/0/37
SW_CORE_TULI Puerto Acceso Puertos disponibles para CCTV VLAN 55
al 42
Conexión a AP CISCO MERAKI, servicio
SW_CORE_TULI Puerto Trunk GigabitEthernet 2/0/43
VLAN 5 y VLAN 50
SW_CORE_TULI Puerto Trunk GigabitEthernet 2/0/44 Puerto Gi 0/8 SW_ISP_TULI
SW_CORE_TULI Puerto Acceso GigabitEthernet 2/0/45 Puerto Gi 0/8 SW_DMZ_TULI
SW_CORE_TULI Puerto Acceso GigabitEthernet 2/0/46 Puerto 1 FortiVoice 100E VLAN 15
Puerto 3 FortiVoice 100E VLAN 25
SW_CORE_TULI Puerto Acceso GigabitEthernet 2/0/47
Telefonía Cenace
Puerto 2 FortiVoice 100E VLAN 26 SBC 28
SW_CORE_TULI Puerto Acceso GigabitEthernet 2/0/48
Telefonía Pública
GigabitEthernet 2/1/1 al Conexión de F.O. enlace secundario a
SW_CORE_TULI Puertos Trunk
4 Elevadora
Puerto GigabitEthernet 2/0/46
FORTIVOICE 100E Puerto Acceso PORT 1 (VLAN 15)
SW_CORE_TULI
Puerto GigabitEthernet 2/0/48
FORTIVOICE 100E Puerto Acceso PORT 2 (VLAN 26)
SW_CORE_TULI
Puerto GigabitEthernet 2/0/47
FORTIVOICE 100E Puerto Acceso PORT 3 (VLAN 25)
SW_CORE_TULI
Puerto MGMT del ASATULISEC
SW_CORE_TULI Puerto Acceso VLAN 885 GigabitEthernet 2/0/2
(FirePower)
GigabitEthernet 2/0/3 al
SW_CORE_TULI Puerto Acceso VLAN 885 Puertos disponibles VLAN MGMT 885
4
7.3.2 Helios.
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA
SW_HELIOS_ISP Puerto Acceso VLAN 1 GigabitEthernet0/1 Puerto Gi 1/1 ASAHELIOSPRI
SW_HELIOS_ISP Puerto Acceso VLAN 1 GigabitEthernet0/2 Puerto Gi 1/1 ASAHELIOSSEC
SW_HELIOS_ISP Puerto Trunk GigabitEthernet0/8 Puerto Gi 2/0/44 SW_CORE_HELIOS
SW_HELIOS_ISP Puerto Acceso VLAN 1 GigabitEthernet0/9 Puerto Gi 0/0/0 ROUTER_BESTEL
GABINETES DE COMUNICACIONES TULI

SW_HELIOS_DMZ Puerto Acceso VLAN 1 GigabitEthernet0/1 Puerto Gi 1/3 ASAHELIOSPRI


SW_HELIOS_DMZ Puerto Acceso VLAN 1 GigabitEthernet0/2 Puerto Gi 1/3 ASAHELIOSSEC
SW_HELIOS_DMZ Puerto Acceso VLAN 886 GigabitEthernet0/8 Puerto Gi 2/0/45 SW_CORE_HELIOS
GigabitEthernet 1/1
ASAHELIOSPRI 201.148.19.45/29 SW_ISP_HELIOS Puerto Gi 0/1
(OUTSIDEHELIOS)
GigabitEthernet 1/2
ASAHELIOSPRI 10.86.86.8/24 SW_CORE_HELIOS Puerto Gi 1/0/1
(INSIDEHELIOS)
GigabitEthernet 1/3
ASAHELIOSPRI 10.86.30.254/24 SW_DMZ_HELIOS Puerto Gi 0/1
(DMZHELIOS)
GigabitEthernet 1/4 Puerto GigabitEthernet 1/4 del
ASAHELIOSPRI 10.1.2.1/29
(FAILOVER) ASAHELIOSSEC
29
GigabitEthernet 1/5 Puerto GigabitEthernet 1/5 del
ASAHELIOSPRI 172.27.2.1/29
(STATE FAILOVER) ASAHELIOSSEC
Puerto MGMT (Acceso a
ASAHELIOSPRI 10.86.86.10/24 Modulo Cisco SW_CORE_HELIOS Puerto Gi 1/0/2
FirePower)
GigabitEthernet 1/1
ASAHELIOSSEC 201.148.19.46/29 SW_ISP_HELIOS Puerto Gi 0/2
(OUTSIDEHELIOS)
GigabitEthernet 1/2
ASAHELIOSSEC 10.86.86.9/24 SW_CORE_HELIOS Puerto Gi 2/0/1
(INSIDEHELIOS)
GigabitEthernet 1/3
ASAHELIOSSEC 10.86.30.253/24 SW_DMZ_HELIOS Puerto Gi 0/2
(DMZHELIOS)
GigabitEthernet 1/4 Puerto GigabitEthernet 1/4 del
ASAHELIOSSEC 10.1.2.2/29
(FAILOVER) ASAHELIOSPRI
GigabitEthernet 1/5 Puerto GigabitEthernet 1/5 del
ASAHELIOSSEC 172.27.2.2/29 (STATE FAILOVER) ASAHELIOSPRI
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA
Puerto MGMT (Acceso a
ASAHELIOSSEC 10.86.86.10/24 Modulo Cisco SW_CORE_HELIOS Puerto Gi 2/0/2
FirePower)
Puerto GigabitEthernet 1/1 del
SW_CORE_HELIOS Puerto Acceso VLAN 886 GigabitEthernet 1/0/1
ASAHELIOSPRI
Puerto MGMT del ASAHELIOSPRI
SW_CORE_HELIOS Puerto Acceso VLAN 886 GigabitEthernet 1/0/2
GABINETES DE COMUNICACIONES TULI

(FirePower)
GigabitEthernet 1/0/3 al Puertos disponibles VLAN MGMT
SW_CORE_HELIOS Puerto Acceso VLAN 886
4 886
SW_CORE_HELIOS Puerto Acceso GigabitEthernet 1/0/5 Puerto de Prueba sobre VLAN 10
SW_CORE_HELIOS Puerto Acceso GigabitEthernet 1/0/6 Puerto de Prueba sobre VLAN 15
GigabitEthernet 1/0/7 al
SW_CORE_HELIOS Puerto Acceso Puerto de Prueba sobre VLAN 20
12
GigabitEthernet 1/0/13 Puertos disponibles para usuario en
SW_CORE_HELIOS Puerto Acceso
al 36 Datos VLAN 5 y Voz VLAN 15
GigabitEthernet 1/0/37 Puertos disponibles para servidores 30
SW_CORE_HELIOS Puerto Acceso
al 46 VLAN 10
GigabitEthernet 1/0/47 Puertos para puertos iLo servidores
SW_CORE_HELIOS Puerto Acceso
al 48 VLAN MGMT 886
GigabitEthernet 1/1/1 al Conexión de F.O. enlace primario a
SW_CORE_HELIOS Puertos Trunk
4 Elevadora
Puerto GigabitEthernet 1/1 del
SW_CORE_HELIOS Puerto Acceso VLAN 886 GigabitEthernet 2/0/1
ASAHELIOSSEC
Puerto MGMT del ASAHELIOSSEC
SW_CORE_HELIOS Puerto Acceso VLAN 886 GigabitEthernet 2/0/2
(FirePower)
GigabitEthernet 2/0/3 al Puertos disponibles VLAN MGMT
SW_CORE_HELIOS Puerto Acceso VLAN 886
4 886
GigabitEthernet 2/0/5 al
SW_CORE_HELIOS Puerto Acceso Puerto de Prueba sobre VLAN 20
12
GigabitEthernet 2/0/13 Puertos disponibles para usuario en
SW_CORE_HELIOS Puerto Acceso
al 36 Datos VLAN 5 y Voz VLAN 15
GigabitEthernet 2/0/37
SW_CORE_HELIOS Puerto Acceso Puertos en VLAN Default
al 42
UBICACIÓN EQUIPO DIRECCIÓN IP PUERTO CONECTADO HACIA

Conexión a AP CISCO MERAKI,


SW_CORE_HELIOS Puerto Trunk GigabitEthernet 2/0/43
servicio VLAN 5 y VLAN 50

COMUNICACIONES TULI
SW_CORE_HELIOS Puerto Trunk GigabitEthernet 2/0/44 Puerto Gi 0/8 SW_ISP_HELIOS
SW_CORE_HELIOS Puerto Acceso GigabitEthernet 2/0/45 Puerto Gi 0/8 SW_DMZ_HELIOS
SW_CORE_HELIOS Puerto Acceso GigabitEthernet 2/0/46 Puerto 1 FortiVoice 100E VLAN 15
GABINETES DE

Puerto 3 FortiVoice 100E VLAN 25


SW_CORE_HELIOS Puerto Acceso GigabitEthernet 2/0/47
Telefonía Cenace
Puerto 2 FortiVoice 100E VLAN 26
SW_CORE_HELIOS Puerto Acceso GigabitEthernet 2/0/48
SBC Telefonía Pública
GigabitEthernet 2/1/1 al Conexión de F.O. enlace secundario
SW_CORE_HELIOS Puertos Trunk
4 a Elevadora
Puerto GigabitEthernet 2/0/46
FORTIVOICE 100E Puerto Acceso PORT 1 (VLAN 15)
SW_CORE_HELIOS
Puerto GigabitEthernet 2/0/48
FORTIVOICE 100E Puerto Acceso PORT 2 (VLAN 26)
SW_CORE_HELIOS
Puerto GigabitEthernet 2/0/47 31
FORTIVOICE 100E Puerto Acceso PORT 3 (VLAN 25)
SW_CORE_HELIOS
8.- SHOW RUNNING-CONFIG.
El comando show running-conf proporciona los parámetros con los que se encuentre
configurado el equipo Cisco al momento de ejecutarse.

Los parámetros mostrados en esta memoria técnica son con los cuales se encuentra
funcionando óptimamente el sistema de comunicaciones de la S.E. TULI & HELIOS.

8.1.- Sección primero de Mayo.


8.1.1 SW_1°MAYO,01
User Access Verification

Username: admin
Password:
1MAYO_SW1#show run
Building configuration...

Current configuration : 6025 bytes


!
! Last configuration change at 14:48:50 MX Mon Jun 17 2019 by admin
! NVRAM config last updated at 14:49:41 MX Mon Jun 17 2019 by admin
! 32
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 1MAYO_SW1
!
boot-start-marker
boot-end-marker
!
!
!
username admin privilege 15 password 0 cfe2019
no aaa new-model
clock timezone MX -6 0
clock summer-time MX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
system mtu routing 1500
ip routing
no ip cef optimize neighbor resolution
!
!
!
!
!
!
!
!
ptp mode e2etransparent
!
!
crypto pki trustpoint TP-self-signed-2153345024
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2153345024
revocation-check none
rsakeypair TP-self-signed-2153345024
!
!
crypto pki certificate chain TP-self-signed-2153345024
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32313533 33343530 3234301E 170D3131 30333330 30313237
35375A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 31353333 33
34353032 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100DC14 9D3838DE 5C5D52CF 12C20CC0 3E7D486A 4F85C0C3 A55C8508 19B7AEA0
6660EE30 A2C84EAE 473E4F15 8C76AF62 85CC897B 287C6ECA 854667E7 3B20CE28
33F7B4E0 770DB1C2 1F49858C 57222B86 71E114DD F682423E DA18EB53 47205F08
0C786A38 C5614DDB 897483CF 6B418867 472C724B 306976FA C1E675CC 2FA48A6E
AE390203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14BE9BF1 C7A515BE CFEAA0DE AAD6F5CB 74E8B2E8 75301D06
03551D0E 04160414 BE9BF1C7 A515BECF EAA0DEAA D6F5CB74 E8B2E875 300D0609
2A864886 F70D0101 05050003 8181004A 5D981EAC 3BE26EEB 00D34FEA E3F35044
3492E670 AA52EE5C D52093C5 3A486286 D31FF42A 341A4D8D B4B4D7F0 9351ABD1
139793D1 F8405178 5358F804 755DF248 6C938272 07EB1384 520F2090 2B8821B8
DD21E629 EEFDB729 D87E0B85 D2043888 2185DF3E F97A9AB2 DDD737E3 6B2F8C02
8DB15CD3 8B45CF9A 3375AAA5 A0E018
quit
license boot level lanbase
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 1,5,200 priority 4096
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!

!
!
transceiver type all
!
lldp run
!
!
!
!
!
interface GigabitEthernet1/1
description "HACIA_SW_SEL_10.124.4.193"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/2
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5 34
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/3
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/4
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/5
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/6
description "HACIA_SW_SICLE"
spanning-tree portfast edge
!
interface GigabitEthernet1/7
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/8
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/9
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/10
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/11
description HACIA_FW_PULLNET
no switchport
ip address 10.255.255.2 255.255.255.252
! 35
interface GigabitEthernet1/12
switchport access vlan 200
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/13
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/14
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/15
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/16
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/17
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/18
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/19
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/20
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/21
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/22
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/23
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/24
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/25
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/26
description "PUERTOS_DISPONIBLES_PARA_SFPs" 36
!
interface GigabitEthernet1/27
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/28
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface Vlan1
description "DEFAULT_GATEWAY_RED_SICLE_ANTERIOR"
ip address 10.24.21.193 255.255.255.192
!
interface Vlan5
description "DEFAULT_GATEWAY_RED_SICLE_NUEVA"
ip address 10.124.4.254 255.255.255.192
!
interface Vlan200
description "VLAN_ADMINISTRACION_SWITCH_TEMPORAL"
ip address 192.168.255.1 255.255.255.248
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.255.255.1
ip route 10.24.0.0 255.255.0.0 10.255.255.1
ip route 10.124.0.0 255.255.0.0 10.255.255.1
ip route 172.12.0.0 255.255.0.0 10.255.255.1
ip route 172.18.0.0 255.255.0.0 10.255.255.1
!
!
!
!
!
no vstack
!
line con 0
line vty 0 4
exec-timeout 360 0
login local
transport input telnet
line vty 5 15
no login
transport input none
!
! 37
end

1MAYO_SW1#

8.1.2 SW_1°MAYO,02
1MAYO_SW2#show run
Building configuration...

Current configuration : 4547 bytes


!
! Last configuration change at 17:36:48 MX Mon Jun 17 2019 by admin
! NVRAM config last updated at 17:36:46 MX Mon Jun 17 2019 by admin
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname 1MAYO_SW2
!
boot-start-marker
boot-end-marker
!
!
!
username admin privilege 15 password 0 cfe2019
no aaa new-model
clock timezone MX -6 0
clock summer-time MX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
system mtu routing 1500
ip routing
no ip cef optimize neighbor resolution
!
!
!
!
!
!
!
!
ptp mode e2etransparent
!
!
!
license boot level lanbase
! 38
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 1,5 priority 4096
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!

!
!
transceiver type all
!
lldp run
!
!
!
!
!
interface GigabitEthernet1/1
description "HACIA_SW_SEL_10.124.4.193"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/2
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/3
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/4
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/5
description "RED_SICLE_NUEVA_10.124.4.192"
switchport access vlan 5
switchport mode access 39
spanning-tree portfast edge
!
interface GigabitEthernet1/6
description "HACIA_SW_SICLE"
spanning-tree portfast edge
!
interface GigabitEthernet1/7
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/8
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/9
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/10
description "RED_SICLE_ANTERIOR_10.24.21.192"
spanning-tree portfast edge
!
interface GigabitEthernet1/11
description HACIA_FW_PULLNET
no switchport
ip address 10.255.255.2 255.255.255.252
!
interface GigabitEthernet1/12
switchport access vlan 200
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet1/13
description "PUERTOS_DISPONIBLES_PARA_SFPs"
switchport access vlan 5
switchport mode access
!
interface GigabitEthernet1/14
description "PUERTOS_DISPONIBLES_PARA_SFPs"
switchport access vlan 5
switchport mode access
!
interface GigabitEthernet1/15
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/16
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/17 40
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/18
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/19
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/20
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/21
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/22
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/23
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/24
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/25
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/26
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/27
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface GigabitEthernet1/28
description "PUERTOS_DISPONIBLES_PARA_SFPs"
!
interface Vlan1
description "DEFAULT_GATEWAY_RED_SICLE_ANTERIOR"
ip address 10.24.21.193 255.255.255.192
!
interface Vlan5
description "DEFAULT_GATEWAY_RED_SICLE_NUEVA"
ip address 10.124.4.254 255.255.255.192
!
interface Vlan200
description "VLAN_ADMINISTRACION_SWITCH_TEMPORAL"
ip address 192.168.255.1 255.255.255.248
!
ip forward-protocol nd
ip http server 41
ip http authentication local
ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.255.255.1
ip route 10.24.0.0 255.255.0.0 10.255.255.1
ip route 10.124.0.0 255.255.0.0 10.255.255.1
ip route 172.12.0.0 255.255.0.0 10.255.255.1
ip route 172.18.0.0 255.255.0.0 10.255.255.1
!
!
!
!
!
no vstack
!
line con 0
line vty 0 4
exec-timeout 360 0
login local
transport input telnet
line vty 5 15
exec-timeout 0 0
no login
transport input none
!
!
end

1MAYO_SW2#

8.2.- Sección SE/ Elevadora Tuli.


8.2.1 ROUTER1_TULI
Building configuration...

Current configuration : 4000 bytes


!
! Last configuration change at 17:34:35 UTC Sat May 18 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTER1_TULI
!
boot-start-marker 42
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-2088090504
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2088090504
revocation-check none
rsakeypair TP-self-signed-2088090504
!
!
crypto pki certificate chain TP-self-signed-2088090504
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32303838 30393035 3034301E 170D3139 30353132 31373230
30345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 30383830
39303530 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A467 72813C69 197FEFB2 260839F9 20CD6A01 9877AA73 15506A8A 79ED0B13
24BE4A09 06B0D89C E447BC67 B8A2FC0D 3103FA12 52907572 C8B06B08 83BDB7D2
53322201 A96958FA 6448E8ED C0E9C537 57B22B0E 1899B32F 0DFC5593 1B5998FA
AD0E2B17 DEC92078 BD3DC3D3 4CA49DF5 BA421E62 B1CA771E D37576D1 B65FC690
9BB10203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14A21499 CC52B5DD A0C5536B C9FEF952 20E87CE2 01301D06
03551D0E 04160414 A21499CC 52B5DDA0 C5536BC9 FEF95220 E87CE201 300D0609
2A864886 F70D0101 05050003 81810080 5C756263 9BAFFCD8 DA9D612E 9F024519
8D370492 3BAC92AF EBDE285A 2369ABB4 59A4F408 4AB30490 2117389E 6B854BB8
D4ECCE4A 28FC8A50 74E8B814 61FE0282 CB462089 86E8FEC7 DCF6E97D A0BD6BCC
1EBF55B3 7D063C13 D9C57DF7 6D85E516 EA4DA5F6 72ACAE65 0BF6DAA8 5D3D0C0E 43
464734CB B39C0988 955472E5 CBE087
quit
license udi pid CGR-2010/K9 sn FTX2218X00N
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
ip address 192.168.200.11 255.255.255.0
standby 0 ip 192.168.200.1
standby 0 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.85.66.4 255.255.255.240
standby 2 ip 10.85.66.6
standby 2 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.220 255.255.255.248
standby 3 ip 10.73.250.222
standby 3 priority 50
!
interface GigabitEthernet0/1.885
description VLAN MANAGEMENT
encapsulation dot1Q 885
ip address 10.85.85.2 255.255.255.0
standby 4 ip 10.85.85.1
standby 4 priority 50
!
interface GigabitEthernet0/0/0
ip address 172.31.30.220 255.255.255.248
standby 1 ip 172.31.30.222
standby 1 priority 50
no negotiation auto
! 44
ip forward-protocol nd
!
no ip http server
ip http authentication local
no ip http secure-server
!
ip route 10.73.10.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.2
ip route 10.73.24.0 255.255.255.224 10.85.66.1
ip route 10.73.26.0 255.255.255.0 10.85.66.1
ip route 10.73.111.0 255.255.255.0 10.85.66.1
ip route 10.74.10.0 255.255.255.0 10.85.66.2
ip route 10.74.20.0 255.255.255.0 10.85.66.2
ip route 10.74.24.0 255.255.255.224 10.85.66.2
ip route 10.74.26.0 255.255.255.0 10.85.66.2
ip route 10.113.0.0 255.255.0.0 10.85.66.1
ip route 10.114.0.0 255.255.0.0 10.85.66.2
ip route 172.12.30.0 255.255.255.0 10.85.66.1
ip route 172.18.33.0 255.255.255.0 10.85.66.2
ip route 172.30.30.216 255.255.255.248 10.85.66.1
ip route 172.30.45.216 255.255.255.248 10.85.66.2
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
!
scheduler allocate 20000 1000
! 45
end
ROUTER1_TULI#

8.2.2 ROUTER2_TULI
Building configuration...

Current configuration : 2264 bytes


!
! Last configuration change at 17:31:59 UTC Sat May 18 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTER2_TULI
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
license udi pid CGR-2010/K9 sn FTX2218X00J
!
!
!
!
! 46
!
!
!
interface GigabitEthernet0/0
ip address 192.168.200.12 255.255.255.0
standby 0 ip 192.168.200.1
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.85.66.5 255.255.255.240
standby 2 ip 10.85.66.6
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.221 255.255.255.248
standby 3 ip 10.73.250.222
!
interface GigabitEthernet0/1.885
description VLAN MANAGEMENT
encapsulation dot1Q 885
ip address 10.85.85.3 255.255.255.0
standby 4 ip 10.85.85.1
!
interface GigabitEthernet0/0/0
ip address 172.31.30.221 255.255.255.248
standby 1 ip 172.31.30.222
no negotiation auto
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 10.73.10.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.2
ip route 10.73.24.0 255.255.255.224 10.85.66.1
ip route 10.73.26.0 255.255.255.0 10.85.66.1
ip route 10.73.111.0 255.255.255.0 10.85.66.1
ip route 10.74.10.0 255.255.255.0 10.85.66.2
ip route 10.74.20.0 255.255.255.0 10.85.66.2 47
ip route 10.74.24.0 255.255.255.224 10.85.66.2
ip route 10.74.26.0 255.255.255.0 10.85.66.2
ip route 10.113.0.0 255.255.0.0 10.85.66.1
ip route 10.114.0.0 255.255.0.0 10.85.66.2
ip route 172.12.30.0 255.255.255.0 10.85.66.1
ip route 172.18.33.0 255.255.255.0 10.85.66.2
ip route 172.30.30.216 255.255.255.248 10.85.66.1
ip route 172.30.45.216 255.255.255.248 10.85.66.2
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
!
scheduler allocate 20000 1000
!
end
ROUTER2_TULI#

8.2.3 SERVICEMODULE_ROUTER1
ROUTER1_TULI#service-module gi 0/0/0 sess
ROUTER1_TULI#service-module gi 0/0/0 session
Trying 172.31.30.220, 2003 ... Open

SWITCH_R1_TULI>enable
SWITCH_R1_TULI#show run
Building configuration...

Current configuration : 4779 bytes 48


!
! Last configuration change at 22:54:46 UTC Wed May 15 2019
! NVRAM config last updated at 22:54:43 UTC Wed May 15 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SWITCH_R1_TULI
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
!
crypto pki trustpoint TP-self-signed-1780919808
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1780919808
revocation-check none
rsakeypair TP-self-signed-1780919808
!
!
crypto pki certificate chain TP-self-signed-1780919808
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31373830 39313938 3038301E 170D3139 30333035 32323333
34385A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 37383039
31393830 3830819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100BC07 7CB0F1BA 6D6E8074 A53A13E1 444E8C59 CE8D1426 A4A195BE 5016D272 49
925BA91D CB5F1C57 112B2432 E23EF82A E41C3CE6 C1D1609A BA783AD6 26A8A951
3513A54B E4D6D65C B3230FD3 14FF4D6F 78043EAA 27216653 0D4838C2 A31FC3B1
53816A8C 336D82E1 723CBF89 F7CCF670 661153CB 89661085 A3EEDA69 E70670B6
87B70203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14B1D5F2 07BA8696 20F03E38 9BC24415 C0A8ECE3 46301D06
03551D0E 04160414 B1D5F207 BA869620 F03E389B C24415C0 A8ECE346 300D0609
2A864886 F70D0101 05050003 81810040 9A6A3F08 1CF7B162 D481C540 7D92CD28
354795A6 D0EC471D CFCAC70C 0851A628 1BBF4192 76C453B7 F0E8C074 F84BF029
B0E64AFB C6B41272 E5A861BB 8124EF5F 7A6749CA D0B38C9B FF58F929 338FE14E
8E8C966E 7EA5DA8A 7BA8D26D 3653024B FFEBC44E E568FC77 BA1CBEA5 35FBAC00
51D22BA5 22BFE5E2 04E13A68 967CD3
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface Port-channel1
description EQUIPOS RTU TULI
!
interface Port-channel48
description Internal backplane interface. Use caution while changing the configuration
switchport mode trunk
speed 100
!
interface FastEthernet0/1
description EQUIPOS RTU TULI
channel-group 1 mode auto 50
!
interface FastEthernet0/2
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/3
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/4
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/10
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/11
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/12
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
! 51
interface FastEthernet0/13
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/14
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/15
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/16
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
!
ip http server
ip http secure-server
ip forward-protocol nd
!
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
!
!
!
line con 0
speed 115200
flowcontrol software
line vty 0 4
login 52
line vty 5 15
login
!
!
end
SWITCH_R1_TULI#

8.2.4 SERVICEMODULE_ROUTER2
ROUTER2_TULI#service-module gi 0/0/0 session
Trying 172.31.30.221, 2003 ... Open

SWITCH_R2_TULI>
SWITCH_R2_TULI>enable
SWITCH_R2_TULI#show run
Building configuration...

Current configuration : 4779 bytes


!
! Last configuration change at 22:57:34 UTC Wed May 15 2019
! NVRAM config last updated at 22:57:35 UTC Wed May 15 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SWITCH_R2_TULI
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
! 53
!
crypto pki trustpoint TP-self-signed-3132331392
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3132331392
revocation-check none
rsakeypair TP-self-signed-3132331392
!
!
crypto pki certificate chain TP-self-signed-3132331392
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33313332 33333133 3932301E 170D3139 30333035 32323332
34345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 31333233
33313339 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100D935 921F93B7 CB1EBFB2 8EE4FD4D D9747218 DA5FA90C E2B4A3B3 2A2EDDD9
5DEA41B9 54688171 F21E8682 8D84AAA2 B591C175 A8269988 2204AC0C 9D9B904E
BF96F9DE F2EC2645 DD830379 2C4BB77F 67B02497 6F4FBF4A 90FAC208 6D607B3E
4A012E3D 95A9879C 1BBC3E72 9F78DB6E 30375C64 38D6760D 806DFCFF E5925ED0
1C550203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14EF827D A268B8E9 BC2FF85B 618F0F15 C36958D2 BF301D06
03551D0E 04160414 EF827DA2 68B8E9BC 2FF85B61 8F0F15C3 6958D2BF 300D0609
2A864886 F70D0101 05050003 8181006B E332CB46 76279125 14E842BE FE9E7467
85F5C535 71E107FC C8726347 9538A0FA 6377F4D6 55E1A6C0 F1E3DFFE 4B85C354
8A4F4278 34805C48 618C2621 94D3861E 51CA24E9 8BA3A88C 3D209E49 1A928BBD
65F2FABC 75F8621B 23C384E5 E9DD610E 69ADA676 745B8068 951AEB90 5D861A2B
C13E8ADD 27CB8919 9B7DACC1 12D5C8
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
!
!
!
!
! 54
!
!
!
!
!
!
interface Port-channel1
description EQUIPOS RTU TULI
!
interface Port-channel48
description Internal backplane interface. Use caution while changing the configuration
switchport mode trunk
speed 100
!
interface FastEthernet0/1
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/2
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/3
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/4
description EQUIPOS RTU TULI
channel-group 1 mode auto
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/10
description Member of internal backplane interface Port-channel48. Use caution while changing the 55
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/11
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/12
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/13
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/14
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/15
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/16
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address 56
!
ip http server
ip http secure-server
ip forward-protocol nd
!
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
!
!
!
line con 0
speed 115200
flowcontrol software
line vty 0 4
login
line vty 5 15
login
!
!
end
SWITCH_R2_TULI#
8.2.5 SW_TULI1
Building configuration...

Current configuration : 3877 bytes


!
! Last configuration change at 18:11:43 UTC Thu Mar 4 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_TULI1
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
57
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-274115968
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-274115968
revocation-check none
rsakeypair TP-self-signed-274115968
!
!
crypto pki certificate chain TP-self-signed-274115968
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32373431 31353936 38301E17 0D393330 33303130 30303130
315A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3237 34313135
39363830 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
B1AD7414 1F84A133 9C3A1A4C DA6EDB44 8E0E86E3 6743E609 159A20D4 5DECD241
88EB1664 12E7A2B2 6F7C5897 C11ADBEA B17C6429 669306D8 4CA57E5A 06667949
514127D0 C99DFC4A 337DB78B BBC9E560 60D1EFAE 63D31F05 39751C24 B1CA057F
8D6F797F E4B91D4A 17E343F7 EC864951 89B88B37 AA508609 731DF7E3 C996D1F9
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 1680143B F9B02A17 A3B0961D C9633093 F88ED460 715F3130 1D060355
1D0E0416 04143BF9 B02A17A3 B0961DC9 633093F8 8ED46071 5F31300D 06092A86
4886F70D 01010505 00038181 00ADBC2E 4C874343 8AE71EA9 08BCC06C 8F3D3226
19CE9CA3 8AD64F00 363804B8 08B2EF29 877B596D DE29AE35 D8920F83 79F56162
1EA1D3E0 B5D89544 ED245E91 53B35974 62C7E97F 847A397B 3E07F630 8ACBEC10
DD654C9B D46063F5 20A87443 C7FB6BF7 FB51C0F1 657292BC 7679EC6D 57938DBD
057F508F 8106F315 CC10EF62 2A
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating 58
syslog not-operating
notifies not-operating
!
!
!
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description ROUTER BESTEL
switchport mode trunk
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14 59
!
interface FastEthernet0/15
!
interface FastEthernet0/16
switchport access vlan 15
!
interface FastEthernet0/17
switchport access vlan 15
!
interface FastEthernet0/18
switchport access vlan 15
!
interface FastEthernet0/19
switchport access vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/21
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/22
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/23
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/24
switchport access vlan 25
spanning-tree portfast edge
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
switchport access vlan 885
!
interface Vlan1
no ip address
! 60
interface Vlan100
ip address 192.168.201.1 255.255.255.0
!
interface Vlan885
description VLAN MGMT
ip address 10.85.85.4 255.255.255.0
!
ip http server
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
line vty 0 4
no login
transport input all
line vty 5 15
login
!
!
end
SW_TULI1#
8.2.6 SW_TULI2
Building configuration...

Current configuration : 4063 bytes


!
! Last configuration change at 18:23:56 UTC Thu Mar 4 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_TULI2
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
61
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-1328283136
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1328283136
revocation-check none
rsakeypair TP-self-signed-1328283136
!
!
crypto pki certificate chain TP-self-signed-1328283136
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31333238 32383331 3336301E 170D3933 30333031 30303031
30305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 33323832
38333133 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B8C4 A62D7055 1394613D A28D9754 144B789B 1B0D0BFB E621F7A3 1D305F57
419A7117 FF4CE3B0 391E9876 DF510AA9 D6FC3EE5 9F07965A 8D3FE016 A0685D98
E32A32DC C3649368 78E39053 16FE6D75 89FCF65C D807EA2A A9D9860B 31D5F132
918860C9 C5C48B0F D94778B5 4775ABF5 6BADC590 1BD00523 6354D93A 901F5E78
822D0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14E8A1CA 6117B2C0 062F1A3A C2D7D31B 339104D2 2B301D06
03551D0E 04160414 E8A1CA61 17B2C006 2F1A3AC2 D7D31B33 9104D22B 300D0609
2A864886 F70D0101 05050003 8181009C C539AB67 BD46061B A6FE26FF 1315E814
1AFCEC0B AB56B331 126679D1 85783943 7C9EC0EA 5EAC4BFB CD68D9A1 25BA5A66
731FE1C5 2317F317 2F10901A 62C0DD7A D27CBD6F A425604D 96C25D62 7260FAA3
16A2B2EC 02D05F28 1647BBA9 5DBE05CF 92BF3107 F2F54A06 6F313339 DBD8A10D
AEAB90C3 8D9F410C 2A27172F 7D9073
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating 62
syslog not-operating
notifies not-operating
!
!
!
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description ROUTER BESTEL
switchport mode trunk
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14 63
!
interface FastEthernet0/15
!
interface FastEthernet0/16
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/17
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/18
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/19
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/21
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/22
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/23
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/24
switchport access vlan 25
spanning-tree portfast edge
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
switchport access vlan 885
! 64
interface Vlan1
no ip address
!
interface Vlan15
ip address 10.85.15.1 255.255.255.0
!
interface Vlan26
ip address 10.85.26.1 255.255.255.248
!
interface Vlan100
ip address 192.168.201.2 255.255.255.0
!
interface Vlan885
ip address 10.85.85.5 255.255.255.0
!
ip http server
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
line vty 0 4
no login
transport input all
line vty 5 15
login
!
!
end
SW_TULI2#

8.3.- Sección SE/ Elevadora Helios.

8.3.1 CISCO ROUTER1_HELIOS


Building configuration...
Current configuration: 6140 bytes
!
! Last configuration change at 17:48:05 UTC Sat May 18 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
! 65
hostname ROUTER1_HELIOS
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
enable password <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
!
!
ip domain name yourdomain.com
no ipv6 cef
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-735621196
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-735621196
revocation-check none
rsakeypair TP-self-signed-735621196
!
!
crypto pki certificate chain TP-self-signed-735621196
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 37333536 32313139 36301E17 0D313830 35303231 36353833
345A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3733 35363231
31393630 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
8ABED9C5 BE28DFB1 BD395ACB 4E7879DA 5F8D5365 4C270DE2 3B46C9C9 2497FCF2
A38ED40A 6CA4C593 A372300C B1DF6FB2 9C31FC35 3158BADB 1220A82C 541D750A
AD0371CD 085D21A2 4B42A723 BE7EB3C5 4500321A 2C6D1F0F 78076406 5D9F1CD3
738E567D D2F9D1B5 3EC01967 9573F08D 64123229 CD0077EB 55657412 FFB032E1
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 16801448 2CDE87A8 10F3831E AA7B4C58 B9F208E3 D9980530 1D060355
1D0E0416 0414482C DE87A810 F3831EAA 7B4C58B9 F208E3D9 9805300D 06092A86
4886F70D 01010505 00038181 00530521 7F3EE6C7 5EAED418 AB4234F7 43EE65BF
B980C67C 5C79491E 7ECFB37C 8B85E413 13A8C58E 08E942F3 C38A0897 B49B6C5B
82940519 F16E4816 42B2FB12 BFE10C93 099F0581 CD2E8888 9A987E97 099483B3 66
275EE5BE 68ADB414 556A6B62 3634A3FF BF172FED 72D7AE56 3F7D5955 C4870731
8A122939 C8C2A91D 6214481E 0A
quit
license udi pid CGR-2010/K9 sn FTX2218X00K
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
description $ETH-LAN$$ETH-SW-LAUNCH$$INTF-INFO-GE 0/0$
ip address 192.168.201.11 255.255.255.0
standby 0 ip 192.168.201.1
standby 0 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.86.66.4 255.255.255.240
standby 2 ip 10.86.66.6
standby 2 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.212 255.255.255.248
standby 3 ip 10.73.250.214
standby 3 priority 50
!
interface GigabitEthernet0/1.885
description VLAN MAGNAGEMENT
encapsulation dot1Q 885
ip address 10.86.86.2 255.255.255.0
standby 4 ip 10.86.86.1
standby 4 priority 50
!
interface GigabitEthernet0/0/0
ip address 172.31.30.212 255.255.255.248
standby 1 ip 172.31.30.214
standby 1 priority 50
no negotiation auto
!
ip forward-protocol nd 67
!
ip http server
ip http access-class 23
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip route 10.73.10.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.2
ip route 10.73.24.0 255.255.255.224 10.86.66.1
ip route 10.73.26.0 255.255.255.0 10.86.66.1
ip route 10.73.111.0 255.255.255.0 10.86.66.1
ip route 10.74.10.0 255.255.255.0 10.86.66.2
ip route 10.74.20.0 255.255.255.0 10.86.66.2
ip route 10.74.24.0 255.255.255.224 10.86.66.2
ip route 10.74.26.0 255.255.255.0 10.86.66.2
ip route 10.113.0.0 255.255.0.0 10.86.66.1
ip route 10.114.0.0 255.255.0.0 10.86.66.2
ip route 172.12.30.0 255.255.255.0 10.86.66.1
ip route 172.18.33.0 255.255.255.0 10.86.66.2
ip route 172.30.45.208 255.255.255.248 10.86.66.2
ip route 173.30.30.208 255.255.255.248 10.86.66.1
!
access-list 23 permit 10.10.10.0 0.0.0.7
!
!
!
control-plane
!
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device


and it provides the default username "cisco" for one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username <myuser> privilege 15 secret 0 <mypassword>

Replace <myuser> and <mypassword> with the username and password you want to
use. 68

-----------------------------------------------------------------------
^C
banner login ^C
-----------------------------------------------------------------------
Cisco Configuration Professional (Cisco CP) is installed on this device.
This feature requires the one-time use of the username "cisco" with the
password "cisco". These default credentials have a privilege level of 15.

YOU MUST USE CISCO CP or the CISCO IOS CLI TO CHANGE THESE PUBLICLY-KNOWN
CREDENTIALS

Here are the Cisco IOS commands.

username <myuser> privilege 15 secret 0 <mypassword>


no username cisco

Replace <myuser> and <mypassword> with the username and password you want
to use.

IF YOU DO NOT CHANGE THE PUBLICLY-KNOWN CREDENTIALS, YOU WILL NOT BE ABLE
TO LOG INTO THE DEVICE AGAIN AFTER YOU HAVE LOGGED OFF.

For more information about Cisco CP please follow the instructions in the
QUICK START GUIDE for your router or go to http://www.cisco.com/go/ciscocp
-----------------------------------------------------------------------
^C
!
line con 0
login local
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
line vty 5 15
access-class 23 in
privilege level 15
login local
transport input telnet ssh
!
scheduler allocate 20000 1000 69
!
end
ROUTER1_HELIOS#

8.3.2 ROUTER2_HELIOS
Building configuration...

Current configuration : 2276 bytes


!
! Last configuration change at 17:49:48 UTC Sat May 18 2019 by admin
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTER2_HELIOS
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
license udi pid CGR-2010/K9 sn FTX2218X00M
!
!
!
!
!
!
!
! 70
interface GigabitEthernet0/0
ip address 192.168.201.12 255.255.255.0
standby 0 ip 192.168.201.1
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.86.66.5 255.255.255.240
standby 2 ip 10.86.66.6
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.213 255.255.255.248
standby 3 ip 10.73.250.214
!
interface GigabitEthernet0/1.885
description VLAN MAGNAGEMENT
encapsulation dot1Q 885
ip address 10.86.86.3 255.255.255.0
standby 4 ip 10.86.86.1
!
interface GigabitEthernet0/0/0
ip address 172.31.30.213 255.255.255.248
standby 1 ip 172.31.30.214
no negotiation auto
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip route 10.73.10.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.2
ip route 10.73.24.0 255.255.255.224 10.86.66.1
ip route 10.73.26.0 255.255.255.0 10.86.66.1
ip route 10.73.111.0 255.255.255.0 10.86.66.1
ip route 10.74.10.0 255.255.255.0 10.86.66.2
ip route 10.74.20.0 255.255.255.0 10.86.66.2
ip route 10.74.24.0 255.255.255.224 10.86.66.2
ip route 10.74.26.0 255.255.255.0 10.86.66.2
ip route 10.113.0.0 255.255.0.0 10.86.66.1
ip route 10.114.0.0 255.255.0.0 10.86.66.2
ip route 172.12.30.0 255.255.255.0 10.86.66.1
ip route 172.18.33.0 255.255.255.0 10.86.66.2 71
ip route 172.30.45.208 255.255.255.248 10.86.66.2
ip route 173.30.30.208 255.255.255.248 10.86.66.1
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
!
scheduler allocate 20000 1000
!
end

ROUTER2_HELIOS#

8.3.3 SERVICEMODULE_R1
ROUTER1_HELIOS#service-module gi 0/0/0 session
Trying 172.31.30.212, 2003 ... Open

SWITCH_R1_HELIOS>ena
SWITCH_R1_HELIOS#show run
Building configuration...

Current configuration : 4756 bytes


!
! Last configuration change at 22:47:50 UTC Wed May 15 2019
! NVRAM config last updated at 22:47:46 UTC Wed May 15 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec 72
no service password-encryption
!
hostname SWITCH_R1_HELIOS
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
!
crypto pki trustpoint TP-self-signed-1780527232
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1780527232
revocation-check none
rsakeypair TP-self-signed-1780527232
!
!
crypto pki certificate chain TP-self-signed-1780527232
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31373830 35323732 3332301E 170D3139 30353134 31373234
35335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 37383035
32373233 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A9C9 9ACBEACF A9C71F09 FF7728D1 87751F81 DA02097F 0491449A 4204154E
70862E55 5C72924D AABD8E61 1C3A40F0 5AE19C9C FEA73517 ECC448FA C8EFF11F
189FC8DD E49D0EF6 1E79D65D D2E813F0 AF1AFF20 4488CB18 EA348EFC 4E9E0AF4
51CC4E28 A0437BD9 2235FEBC E27A4656 376E0B51 D27FAC9F AF59E18F 1CEF6882
9B8B0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14F9DB6B 57D1596F ED4165E7 DE8D9563 27E2DE4E 36301D06
03551D0E 04160414 F9DB6B57 D1596FED 4165E7DE 8D956327 E2DE4E36 300D0609
2A864886 F70D0101 05050003 81810075 2E1695FE 9487FE2F 03B263A4 9F63AA59
070B08A1 BB5B40C9 1DD091C4 BC8EBFC4 9417DD12 D0BB027C BE640323 6ADA828B 73
3D1E0298 E03F35BF 1B7C7682 8543B9FD 7D11B1E1 46F603B6 48FF7063 A22160B0
8A9F3A86 5AD9683B 06B0A06C 546B5D2F E62C7058 3A3F355A 78E65E29 04B26DD1
19E9BA66 876531CA 41AF575A CF6C0B
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface Port-channel48
description Internal backplane interface. Use caution while changing the configuration
switchport mode trunk
speed 100
!
interface FastEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/2
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/3
switchport mode trunk
channel-group 1 mode auto 74
!
interface FastEthernet0/4
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/10
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/11
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/12
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/13
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/14
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration 75
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/15
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/16
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
shutdown
!
ip http server
ip http secure-server
ip forward-protocol nd
!
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
!
!
!
line con 0
speed 115200
flowcontrol software
line vty 0 4
login
line vty 5 15
login
!
!
end
SWITCH_R1_HELIOS#

76
8.3.4 SERVICEMODULE_R2
ROUTER2_HELIOS#servi
ROUTER2_HELIOS#service-module gi 0/0/0 session
Trying 172.31.30.213, 2003 ... Open

SWITCH_R2_HELIOS>
SWITCH_R2_HELIOS>
SWITCH_R2_HELIOS>ENABLE
SWITCH_R2_HELIOS#show run
Building configuration...

Current configuration : 4756 bytes


!
! Last configuration change at 22:46:43 UTC Wed May 15 2019
! NVRAM config last updated at 22:46:46 UTC Wed May 15 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SWITCH_R2_HELIOS
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
!
crypto pki trustpoint TP-self-signed-1781463424
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1781463424
revocation-check none 77
rsakeypair TP-self-signed-1781463424
!
!
crypto pki certificate chain TP-self-signed-1781463424
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31373831 34363334 3234301E 170D3933 30333031 30303031
31385A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 37383134
36333432 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100C23E E216716A 1BA05EA2 7060007D 4DE29F6C D0EE5E07 42199DE4 3CA22BE2
A3E099A6 B32F8765 9E4450A4 E9FA109E BA38A2C5 C5F04762 8F979EA8 D8062B31
1865B0FF 1425C332 AC0B2268 42CBF8CD 65A313B7 CCDB8B0C 286EF86F 40421EB6
D520FE2B 51A2DB59 0EA77EF4 C8F6F00A 2BC0C8A1 B99CE791 5E985E26 1DC45119
C6430203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14D80B67 506993AA BD1C3E98 95994ECB ED8913EF E3301D06
03551D0E 04160414 D80B6750 6993AABD 1C3E9895 994ECBED 8913EFE3 300D0609
2A864886 F70D0101 05050003 81810031 94556493 3F13974A 70D1E695 D7ADC9C8
171C3034 E5C1377A C75BE490 896CBB82 706582E6 8BBEA62C A34C908F 58C65961
39B46F59 0CF8A15C 95F39D17 F5CD0701 1BBFBC13 3D10C952 3E1E9DEA A69D2731
D2EC46B8 8B495A41 FDDA0EF0 9A7CAE9D DCC6EACF 7E887962 CEAE6EE5 0EB1D1E9
512F5FC5 B8619EB2 739DC5B4 B123AC
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
!
!
!
!
!
!
!
!
!
! 78
!
interface Port-channel1
switchport mode trunk
!
interface Port-channel48
description Internal backplane interface. Use caution while changing the configuration
switchport mode trunk
speed 100
!
interface FastEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/2
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/3
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/4
switchport mode trunk
channel-group 1 mode auto
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/10
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/11 79
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/12
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/13
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/14
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/15
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface FastEthernet0/16
description Member of internal backplane interface Port-channel48. Use caution while changing the
configuration
switchport mode trunk
channel-group 48 mode on
!
interface GigabitEthernet0/1
!
interface GigabitEthernet0/2
!
interface Vlan1
no ip address
shutdown
!
ip http server
ip http secure-server
ip forward-protocol nd 80
!
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
!
!
!
line con 0
speed 115200
flowcontrol software
line vty 0 4
login
line vty 5 15
login
!
!
End

SWITCH_R2_HELIOS#
8.3.5 SW_HELIOS1
Building configuration...

Current configuration : 3605 bytes


!
! Last configuration change at 20:45:07 UTC Wed Mar 3 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_HELIOS1
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
81
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-2684825984
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2684825984
revocation-check none
rsakeypair TP-self-signed-2684825984
!
!
crypto pki certificate chain TP-self-signed-2684825984
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363834 38323539 3834301E 170D3933 30333031 30303031
30315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36383438
32353938 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100DB76 13B22ADA AA4CBF7D 0C6B70E0 3DC17A35 796E48E7 EB55F79B 56B7E54C
B6C49D49 658653B8 7796959F 458C943F 83FFF148 327CE677 D992D625 33D34664
9230A008 C0D7E0D6 A17CE3A0 9C35A9B4 09DB8F2D 031AE78B 0C81CF42 34CD4D0A
FCE34334 47614C40 B983F610 57534654 C9ECE27E 01F30C06 683A0685 2BCDCC17
81750203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14C35368 A1385CD0 A0FE26EE 9F62D43C C88E44F2 86301D06
03551D0E 04160414 C35368A1 385CD0A0 FE26EE9F 62D43CC8 8E44F286 300D0609
2A864886 F70D0101 05050003 81810029 0E5714D5 4DEBE56A C02EB922 3CA57B50
9C70ED87 06E368E4 021A3322 797A2EC8 FB9BA9C2 3CF1B27B F339A858 33003DE2
21DE4DB6 DD6AF54B AAE60270 A41A6904 A66F92A8 7B44EAB2 39A6A719 6888D52B
D890FC8F DB7DBF10 EFC481CF 9889559D A377EBD3 0483B267 B8CDFA2F C6BC42C2
A5F8EB10 696D9C3C 4F4356CE 4DED6C
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating 82
syslog not-operating
notifies not-operating
!
!
!
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description ROUTER BESTEL
switchport mode trunk
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14 83
!
interface FastEthernet0/15
!
interface FastEthernet0/16
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
switchport access vlan 25
!
interface FastEthernet0/21
switchport access vlan 25
!
interface FastEthernet0/22
switchport access vlan 25
!
interface FastEthernet0/23
switchport access vlan 25
!
interface FastEthernet0/24
switchport access vlan 25
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
switchport access vlan 885
!
interface Vlan1
no ip address
!
interface Vlan100
ip address 192.168.202.1 255.255.255.0
!
interface Vlan885
description VLAN MGMT
ip address 10.86.86.4 255.255.255.0
!
ip http server
ip http secure-server
ip forward-protocol nd 84
!
!
!
line con 0
line vty 0 4
no login
transport input all
line vty 5 15
login
!
!
end
SW_HELIOS1#

8.3.6 SW_HELIOS2
Building configuration...

Current configuration : 3887 bytes


!
! Last configuration change at 21:00:12 UTC Wed Mar 3 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_HELIOS2
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
! 85
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-2684824576
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2684824576
revocation-check none
rsakeypair TP-self-signed-2684824576
!
!
crypto pki certificate chain TP-self-signed-2684824576
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363834 38323435 3736301E 170D3933 30333031 30303031
30325A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36383438
32343537 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A96C DBFCA377 4C88D5D5 E50D508C BF529FDB B18B84DC CC9D9502 83F07C7D
5783B6CD 2020C8C6 6D6EA350 735A5AD3 4ED61B9C D7312B79 28F8B4F2 C82E097A
3AD0C3D9 9AB7F417 7B357D08 4B314C0F BD2BD419 E5E4A854 849F0141 57EF73A7
7000271B 2A1CE864 1EEACBB6 E0ED9313 9B429112 74B5BCCD 5A5DDDD7 0018A647
5BCF0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14EA0443 6CB4E7F0 6DF1053F D70788DE C614E231 12301D06
03551D0E 04160414 EA04436C B4E7F06D F1053FD7 0788DEC6 14E23112 300D0609
2A864886 F70D0101 05050003 81810057 6E45433E 846022DA D7817C95 25B23F72
E0DC7CBE D5C17E66 2D911488 94C79C5B ED09D04E 42B40638 FA0EBE0A 390984EB
93C12BC0 A3137F06 EB480AD6 DF9133BD 908F5475 F003A96E DA5CD3CF 83842963
4DED6A94 B407DD96 96232DD5 8D21F82D 06E97827 22EB9047 7F46D3E5 D15DEAE5
FEAA65D1 1DCEF040 B491072D E3B539
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
transceiver type all
vlan internal allocation policy ascending 86
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description ROUTER BESTEL
switchport mode trunk
!
interface FastEthernet0/2
!
interface FastEthernet0/3
!
interface FastEthernet0/4
!
interface FastEthernet0/5
!
interface FastEthernet0/6
!
interface FastEthernet0/7
!
interface FastEthernet0/8
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
!
interface FastEthernet0/12
!
interface FastEthernet0/13
!
interface FastEthernet0/14
!
interface FastEthernet0/15
!
interface FastEthernet0/16
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/17 87
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/18
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/19
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 25
!
interface FastEthernet0/21
switchport access vlan 25
!
interface FastEthernet0/22
switchport access vlan 25
!
interface FastEthernet0/23
switchport access vlan 25
!
interface FastEthernet0/24
switchport access vlan 25
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
switchport access vlan 885
!
interface Vlan1
no ip address
!
interface Vlan26
ip address 10.86.26.1 255.255.255.248
!
interface Vlan100
ip address 192.168.202.2 255.255.255.0
!
interface Vlan885
description VLAN MGMT
ip address 10.86.86.5 255.255.255.0
! 88
ip http server
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
line vty 0 4
no login
transport input all
line vty 5 15
login
!
!
end
SW_HELIOS2#
8.4.- Sección O&M Tuli.

8.4.1 ASATULIPRI
------------------ show running-config ------------------

: Saved

:
: Serial Number: JAD23090HCN

: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.8(2)
!
hostname ASATULIPRI
enable password <removed> pbkdf2
names

!
interface GigabitEthernet1/1
nameif outsidetuli
security-level 0
ip address 201.148.19.29 255.255.255.248 standby 201.148.19.30
!
interface GigabitEthernet1/2 89
nameif insidetuli
security-level 100
ip address 10.85.85.8 255.255.255.0 standby 10.85.85.9
!
interface GigabitEthernet1/3
nameif dmztuli
security-level 50
ip address 10.85.30.254 255.255.255.0 standby 10.85.30.253
!
interface GigabitEthernet1/4
description LAN Failover Interface
!
interface GigabitEthernet1/5
description STATE Failover Interface
!
interface GigabitEthernet1/6
bridge-group 1
nameif inside_5
security-level 100
!
interface GigabitEthernet1/7
bridge-group 1
nameif inside_6
security-level 100
!
interface GigabitEthernet1/8
bridge-group 1
nameif inside_7
security-level 100
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
!
interface BVI1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
same-security-traffic permit inter-interface
object network obj_any1
subnet 0.0.0.0 0.0.0.0
object network obj_any2
subnet 0.0.0.0 0.0.0.0
object network obj_any3
subnet 0.0.0.0 0.0.0.0 90
object network obj_any4
subnet 0.0.0.0 0.0.0.0
object network obj_any5
subnet 0.0.0.0 0.0.0.0
object network obj_any6
subnet 0.0.0.0 0.0.0.0
object network obj_any7
subnet 0.0.0.0 0.0.0.0
object network User_Vlan
subnet 10.85.5.0 255.255.255.0
object network INSIDE-TULI
subnet 192.168.254.0 255.255.255.248
object network Sever_Vlan
subnet 10.85.10.0 255.255.255.0
object network Phone_Vlan
subnet 10.85.15.0 255.255.255.0
object network Substation_Vlan
subnet 10.85.20.0 255.255.255.0
object network Security_Vlan
subnet 10.85.55.0 255.255.255.0
object-group network DM_INLINE_NETWORK_1
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Sever_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
object-group network DM_INLINE_NETWORK_2
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Sever_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
access-list OUTSIDE_TULI extended permit ip any any
access-list INSIDE_TULI extended deny ip object-group DM_INLINE_NETWORK_2 10.85.30.0
255.255.255.0
access-list INSIDE_TULI extended permit ip any any
access-list DMZ_TULI extended deny ip 10.85.30.0 255.255.255.0 object-group
DM_INLINE_NETWORK_1
access-list DMZ_TULI extended permit ip any any
pager lines 24
logging asdm informational
mtu outsidetuli 1500
mtu insidetuli 1500
mtu dmztuli 1500
mtu inside_5 1500
mtu inside_6 1500
mtu inside_7 1500
failover
failover lan unit primary 91
failover lan interface folink GigabitEthernet1/4
failover polltime unit msec 200 holdtime msec 800
failover key *****
failover link statelink GigabitEthernet1/5
failover interface ip folink 10.1.1.1 255.255.255.248 standby 10.1.1.2
failover interface ip statelink 172.27.1.1 255.255.255.248 standby 172.27.1.2
no monitor-interface inside
icmp unreachable rate-limit 1 burst-size 1
icmp permit any insidetuli
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
nat (insidetuli,outsidetuli) after-auto source dynamic any interface
nat (dmztuli,outsidetuli) after-auto source dynamic any interface
access-group OUTSIDE_TULI in interface outsidetuli
access-group INSIDE_TULI in interface insidetuli
access-group DMZ_TULI in interface dmztuli
route outsidetuli 0.0.0.0 0.0.0.0 201.148.19.25 1
route insidetuli 10.85.5.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.10.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.15.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.20.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.50.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.55.0 255.255.255.0 10.85.85.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication login-history
http server enable
http 192.168.1.0 255.255.255.0 inside_7
http 0.0.0.0 0.0.0.0 insidetuli
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck 92
ssh 0.0.0.0 0.0.0.0 insidetuli
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outsidetuli


!

dhcpd address 192.168.1.5-192.168.1.254 inside


dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
dynamic-access-policy-record DfltAccessPolicy
username admin password <removed> privilege 15
!
class-map global-class
match any
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
class global-class 93
sfr fail-open
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:d78f5bfaeb4056580365c55e2037a19d
: end

Cannot open disk0:/csco_config/97/bookmarks/index.ini

8.4.2 ASATULISEC

------------------ show running-config ------------------

: Saved

:
: Serial Number: JAD23090HD5
: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.8(2)
!
hostname ASATULISEC
enable password <removed> pbkdf2
names

!
interface GigabitEthernet1/1
nameif outsidetuli
security-level 0
ip address 201.148.19.29 255.255.255.248 standby 201.148.19.30
!
interface GigabitEthernet1/2
nameif insidetuli
security-level 100
ip address 10.85.85.8 255.255.255.0 standby 10.85.85.9
!
interface GigabitEthernet1/3
nameif dmztuli
security-level 50
ip address 10.85.30.254 255.255.255.0 standby 10.85.30.253
!
interface GigabitEthernet1/4 94
description LAN Failover Interface
!
interface GigabitEthernet1/5
description STATE Failover Interface
!
interface GigabitEthernet1/6
bridge-group 1
nameif inside_5
security-level 100
!
interface GigabitEthernet1/7
bridge-group 1
nameif inside_6
security-level 100
!
interface GigabitEthernet1/8
bridge-group 1
nameif inside_7
security-level 100
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
!
interface BVI1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
same-security-traffic permit inter-interface
object network obj_any1
subnet 0.0.0.0 0.0.0.0
object network obj_any2
subnet 0.0.0.0 0.0.0.0
object network obj_any3
subnet 0.0.0.0 0.0.0.0
object network obj_any4
subnet 0.0.0.0 0.0.0.0
object network obj_any5
subnet 0.0.0.0 0.0.0.0 95
object network obj_any6
subnet 0.0.0.0 0.0.0.0
object network obj_any7
subnet 0.0.0.0 0.0.0.0
object network User_Vlan
subnet 10.85.5.0 255.255.255.0
object network INSIDE-TULI
subnet 192.168.254.0 255.255.255.248
object network Sever_Vlan
subnet 10.85.10.0 255.255.255.0
object network Phone_Vlan
subnet 10.85.15.0 255.255.255.0
object network Substation_Vlan
subnet 10.85.20.0 255.255.255.0
object network Security_Vlan
subnet 10.85.55.0 255.255.255.0
object-group network DM_INLINE_NETWORK_1
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Sever_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
object-group network DM_INLINE_NETWORK_2
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Sever_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
access-list OUTSIDE_TULI extended permit ip any any
access-list INSIDE_TULI extended deny ip object-group DM_INLINE_NETWORK_2 10.85.30.0
255.255.255.0
access-list INSIDE_TULI extended permit ip any any
access-list DMZ_TULI extended deny ip 10.85.30.0 255.255.255.0 object-group
DM_INLINE_NETWORK_1
access-list DMZ_TULI extended permit ip any any
pager lines 24
logging asdm informational
mtu outsidetuli 1500
mtu insidetuli 1500
mtu dmztuli 1500
mtu inside_5 1500
mtu inside_6 1500
mtu inside_7 1500 96
failover
failover lan unit secondary
failover lan interface folink GigabitEthernet1/4
failover polltime unit msec 200 holdtime msec 800
failover key *****
failover link statelink GigabitEthernet1/5
failover interface ip folink 10.1.1.1 255.255.255.248 standby 10.1.1.2
failover interface ip statelink 172.27.1.1 255.255.255.248 standby 172.27.1.2
no monitor-interface inside
no monitor-interface service-module
icmp unreachable rate-limit 1 burst-size 1
icmp permit any insidetuli
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
nat (insidetuli,outsidetuli) after-auto source dynamic any interface
nat (dmztuli,outsidetuli) after-auto source dynamic any interface
access-group OUTSIDE_TULI in interface outsidetuli
access-group INSIDE_TULI in interface insidetuli
access-group DMZ_TULI in interface dmztuli
route outsidetuli 0.0.0.0 0.0.0.0 201.148.19.25 1
route insidetuli 10.85.5.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.10.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.15.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.20.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.50.0 255.255.255.0 10.85.85.254 1
route insidetuli 10.85.55.0 255.255.255.0 10.85.85.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication login-history
http server enable 97
http 192.168.1.0 255.255.255.0 inside_7
http 0.0.0.0 0.0.0.0 insidetuli
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh 0.0.0.0 0.0.0.0 insidetuli
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outsidetuli


!
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
dynamic-access-policy-record DfltAccessPolicy
username admin password <removed> privilege 15
!
class-map global-class
match any
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras 98
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect icmp
class global-class
sfr fail-open
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:fd08b4a5c926b3b40bb94f4ac586dbfa
: end
8.4.3 ROUTER1_TULI

------------------ show running-config ------------------

Building configuration...

Current configuration : 4486 bytes


!
! Last configuration change at 20:09:27 UTC Sat Aug 31 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTER1_TULI
!
boot-start-marker
boot-end-marker
!
! 99
enable password <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-2088090504
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2088090504
revocation-check none
rsakeypair TP-self-signed-2088090504
!
!
crypto pki certificate chain TP-self-signed-2088090504
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32303838 30393035 3034301E 170D3139 30353132 31373230
30345A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 30383830
39303530 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A467 72813C69 197FEFB2 260839F9 20CD6A01 9877AA73 15506A8A 79ED0B13
24BE4A09 06B0D89C E447BC67 B8A2FC0D 3103FA12 52907572 C8B06B08 83BDB7D2
53322201 A96958FA 6448E8ED C0E9C537 57B22B0E 1899B32F 0DFC5593 1B5998FA
AD0E2B17 DEC92078 BD3DC3D3 4CA49DF5 BA421E62 B1CA771E D37576D1 B65FC690
9BB10203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14A21499 CC52B5DD A0C5536B C9FEF952 20E87CE2 01301D06
03551D0E 04160414 A21499CC 52B5DDA0 C5536BC9 FEF95220 E87CE201 300D0609
2A864886 F70D0101 05050003 81810080 5C756263 9BAFFCD8 DA9D612E 9F024519
8D370492 3BAC92AF EBDE285A 2369ABB4 59A4F408 4AB30490 2117389E 6B854BB8
D4ECCE4A 28FC8A50 74E8B814 61FE0282 CB462089 86E8FEC7 DCF6E97D A0BD6BCC
1EBF55B3 7D063C13 D9C57DF7 6D85E516 EA4DA5F6 72ACAE65 0BF6DAA8 5D3D0C0E
464734CB B39C0988 955472E5 CBE087 100
quit
license udi pid CGR-2010/K9 sn FTX2218X00N
!
!
username admin privilege 15 secret 5 <removed>
!
!
!
!
!
!
interface GigabitEthernet0/0
ip address 192.168.200.11 255.255.255.0
ip nat inside
ip virtual-reassembly in
standby 200 ip 192.168.200.1
standby 200 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.85.66.4 255.255.255.240
ip nat outside
ip virtual-reassembly in
standby 2 ip 10.85.66.6
standby 2 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.220 255.255.255.248
standby 3 ip 10.73.250.222
standby 3 priority 50
!
interface GigabitEthernet0/1.885
description VLAN MANAGEMENT
encapsulation dot1Q 885
ip address 10.85.85.2 255.255.255.0
standby 4 ip 10.85.85.1
standby 4 priority 50 101
!
interface GigabitEthernet0/0/0
ip address 172.31.30.220 255.255.255.248
standby 1 ip 172.31.30.222
standby 1 priority 50
no negotiation auto
arp timeout 1
!
ip forward-protocol nd
!
no ip http server
ip http authentication local
no ip http secure-server
!
ip nat inside source static tcp 192.168.200.111 4712 172.31.30.218 4712 extendable no-alias
ip route 10.73.10.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.2
ip route 10.73.24.0 255.255.255.224 10.85.66.1
ip route 10.73.26.0 255.255.255.0 10.85.66.1
ip route 10.73.111.0 255.255.255.0 10.85.66.1
ip route 10.74.10.0 255.255.255.0 10.85.66.2
ip route 10.74.20.0 255.255.255.0 10.85.66.2
ip route 10.74.24.0 255.255.255.224 10.85.66.2
ip route 10.74.26.0 255.255.255.0 10.85.66.2
ip route 10.85.5.0 255.255.255.0 10.85.85.254
ip route 10.85.10.0 255.255.255.0 10.85.85.254
ip route 10.85.20.0 255.255.255.0 10.85.85.254
ip route 10.113.0.0 255.255.0.0 10.85.66.1
ip route 10.114.0.0 255.255.0.0 10.85.66.2
ip route 172.12.30.0 255.255.255.0 10.85.66.1
ip route 172.18.33.0 255.255.255.0 10.85.66.2
ip route 172.30.30.216 255.255.255.248 10.85.66.1
ip route 172.30.45.216 255.255.255.248 10.85.66.2
ip route 192.168.65.0 255.255.255.0 192.168.200.202
ip route 192.168.239.0 255.255.255.0 192.168.200.202
!
!
!
!
control-plane
!
! 102
!
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
!
scheduler allocate 20000 1000
!
end
8.4.4 ROUTER2_TULI
------------------ show running-config ------------------

Building configuration...

Current configuration : 2701 bytes


!
! Last configuration change at 20:10:51 UTC Sat Aug 31 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname ROUTER2_TULI
!
boot-start-marker
boot-end-marker
!
!
enable password <removed>
!
no aaa new-model
! 103
ip cef
!
!
!
!
!
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
license udi pid CGR-2010/K9 sn FTX2218X00J
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
ip address 192.168.200.12 255.255.255.0
ip nat inside
ip virtual-reassembly in
standby 200 ip 192.168.200.1
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.85.66.5 255.255.255.240
ip nat outside
ip virtual-reassembly in
standby 2 ip 10.85.66.6
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.221 255.255.255.248
standby 3 ip 10.73.250.222
!
interface GigabitEthernet0/1.885
description VLAN MANAGEMENT
encapsulation dot1Q 885
ip address 10.85.85.3 255.255.255.0 104
standby 4 ip 10.85.85.1
!
interface GigabitEthernet0/0/0
ip address 172.31.30.221 255.255.255.248
standby 1 ip 172.31.30.222
no negotiation auto
arp timeout 1
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip nat inside source static tcp 192.168.200.111 4712 172.31.30.218 4712 extendable no-alias
ip route 10.73.10.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.1
ip route 10.73.20.0 255.255.255.0 10.85.66.2
ip route 10.73.24.0 255.255.255.224 10.85.66.1
ip route 10.73.26.0 255.255.255.0 10.85.66.1
ip route 10.73.111.0 255.255.255.0 10.85.66.1
ip route 10.74.10.0 255.255.255.0 10.85.66.2
ip route 10.74.20.0 255.255.255.0 10.85.66.2
ip route 10.74.24.0 255.255.255.224 10.85.66.2
ip route 10.74.26.0 255.255.255.0 10.85.66.2
ip route 10.85.5.0 255.255.255.0 10.85.85.254
ip route 10.85.10.0 255.255.255.0 10.85.85.254
ip route 10.85.20.0 255.255.255.0 10.85.85.254
ip route 10.113.0.0 255.255.0.0 10.85.66.1
ip route 10.114.0.0 255.255.0.0 10.85.66.2
ip route 172.12.30.0 255.255.255.0 10.85.66.1
ip route 172.18.33.0 255.255.255.0 10.85.66.2
ip route 172.30.30.216 255.255.255.248 10.85.66.1
ip route 172.30.45.216 255.255.255.248 10.85.66.2
ip route 192.168.65.0 255.255.255.0 192.168.200.202
ip route 192.168.239.0 255.255.255.0 192.168.200.202
!
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none 105
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
!
scheduler allocate 20000 1000
!
End

8.4.5 SW_CORE_TULI

------------------ show running-config ------------------

Building configuration...

Current configuration : 21622 bytes


!
! Last configuration change at 17:49:53 MEX Sat Aug 31 2019
! NVRAM config last updated at 17:48:47 MEX Sat Aug 31 2019
!
version 16.6
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service unsupported-transceiver
no platform punt-keepalive disable-kernel-core
!
hostname SW_CORE_TULI
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable password <removed> 106
!
no aaa new-model
clock timezone MEX -6 0
clock summer-time MEX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
switch 1 provision ws-c3850-48p
switch 2 provision ws-c3850-48p
!
!
!
!
ip routing
!
ip dhcp excluded-address 10.85.5.201 10.85.5.254
ip dhcp excluded-address 10.85.10.201 10.85.10.254
ip dhcp excluded-address 10.85.20.201 10.85.20.254
ip dhcp excluded-address 10.85.85.1 10.85.85.20
ip dhcp excluded-address 10.85.85.30 10.85.85.254
ip dhcp excluded-address 10.85.50.250 10.85.50.254
!
ip dhcp pool VLAN5
network 10.85.5.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.85.5.254
lease 0 12
!
ip dhcp pool VLAN10
network 10.85.10.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.85.10.254
lease 0 12
!
ip dhcp pool VLAN20
network 10.85.20.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.85.20.254
lease 0 12
!
ip dhcp pool VLAN885
network 10.85.85.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.85.85.254
lease 0 1
! 107
ip dhcp pool VLAN50
network 10.85.50.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.85.50.254
lease 0 8
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-2118726172
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2118726172
revocation-check none
rsakeypair TP-self-signed-2118726172
!
!
crypto pki certificate chain TP-self-signed-2118726172
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32313138 37323631 3732301E 170D3139 30383230 32313035
33335A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 31313837
32363137 32308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100E1BD FB7A4654 2EB46C11 C33023AC 17FB874D 17322D68 6D0F0DD9
950D682A C0C20ACB A59FBF21 622D0275 133029B2 AEA9E7FD 19E21BB5 91111669
25648119 111BD33A 423DB1E9 22DD1D15 8E0B22AB F582E21A ED52A7CA 3572578B
A5F42A08 4A11B73D D9886A15 D964805F 796552BC 4F4A8D55 8C219926 CAE7EAFF
A96D5B6F 7A51CC8A 705B6D27 C6021264 9E2E436F B19417BD AFA6D0B4 BB7441CB
B5A4EB96 C9DB1F3F 1E52EF3B 4CC67307 A1FBC82A 08EFA1F1 D5950095 1ED5BB2A
DF426964 A1644008 0E045E17 E0915E2E FF4E1C10 81BD7A2F C33ECF4B 53924330
994C8D7E 40907403 FE9C8F67 2DAC33F0 712DF689 895ADD7D 9074EB13 6CA24580
642FA0C2 E8050203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 141EC465 E7496F31 17EF1E3F 8BA71C1A 07446459
74301D06 03551D0E 04160414 1EC465E7 496F3117 EF1E3F8B A71C1A07 44645974
300D0609 2A864886 F70D0101 05050003 82010100 C5804D4C 7E122777 3A9DB703
CA38BE34 D45974D3 805AE14E 8968D9E1 7347B7D6 3D575D2B 8BFF61A1 62806B65
E267D838 8F08E0A1 54B58F93 F408A4BA DE10805E AE719DC1 1089EFE7 807C3AE7 108
68480BEA FFB56371 968F9158 F1007E49 E8B7D7CB 5549A988 852F5E36 05475994
9AAA0444 EF3EC05C 309A6440 71EA687C AEDB5667 631DB312 C0F573D2 405B77D7
2F94BEBE 8101FBBE 45D16D2C 325E49E0 07772FF4 2593D402 F5C91861 1FC14AAA
43E6B2A3 BEE28F68 C1CB7A77 A1254396 F3C358E5 2EF63EFF 10FEA573 D070D852
00B4698A 115316F2 465F98C8 8D4A8D20 48B053FA ECC8F64E FC31748B 28766643
F015A907 D9D25F27 006DC4B8 1BC2ACF5 82C929D6
quit
!
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 1,5,10,15,20,25-26,50,55,201,885 priority 0
no errdisable detect cause gbic-invalid
!
username admin privilege 15 secret 5 <removed>
!
redundancy
mode sso
!
!
transceiver type all
monitoring
!
!
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data, LOGGING
class-map match-any system-cpp-default
description DHCP Snooping, EWLC control, EWCL data
class-map match-any system-cpp-police-sys-data
description Learning cache ovfl, Crypto Control, Exception, EGR Exception, NFL SAMPLED
DATA, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station 109
description MCAST END STATION
class-map match-any system-cpp-police-multicast
description Transit Traffic and MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-system-critical
description System Critical and Gold
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
speed 1000
negotiation auto
!
interface GigabitEthernet1/0/1
description Conexion Puerto Gi 1/2 INSIDETULI CISCO ASA PRIMARIO 110
switchport access vlan 885
spanning-tree portfast
!
interface GigabitEthernet1/0/2
description Conexion FirePower Puerto MGMT CISCO ASA PRIMARIO
switchport access vlan 885
spanning-tree portfast
!
interface GigabitEthernet1/0/3
description Conexion Interface INSIDETULI CISCO ASA PRIM
switchport access vlan 885
spanning-tree portfast
!
interface GigabitEthernet1/0/4
description Conexion Interface INSIDETULI CISCO ASA PRIM
switchport access vlan 885
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/7
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/9 111
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/12
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/15
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 5 112
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/21
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 5
switchport mode access 113
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/25
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/26
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/27
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/28
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/29
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/30
switchport access vlan 5
switchport mode access
switchport voice vlan 15 114
spanning-tree portfast
!
interface GigabitEthernet1/0/31
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/32
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/33
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/34
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/35
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/36
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/37
switchport access vlan 10
switchport mode access
spanning-tree portfast
! 115
interface GigabitEthernet1/0/38
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/39
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/40
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/41
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/42
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/43
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/44
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/45
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/46
switchport access vlan 885
switchport mode access 116
spanning-tree portfast
!
interface GigabitEthernet1/0/47
switchport access vlan 885
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/48
description Puerto iLo
switchport access vlan 885
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/1/1
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface GigabitEthernet1/1/2
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface GigabitEthernet1/1/3
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface GigabitEthernet1/1/4
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface GigabitEthernet2/0/1
description Conexion Puerto Gi 1/2 INSIDETULI CISCO ASA SECUNDARIO
switchport access vlan 885
switchport mode access
spanning-tree portfast
! 117
interface GigabitEthernet2/0/2
description Conexion FirePower Puerto MGMT CISCO ASA SECUNDARIO
switchport access vlan 885
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/3
description Conexion Interface INSIDETULI CISCO ASA SECUNDARIO
switchport access vlan 885
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/4
description Conexion Interface INSIDETULI CISCO ASA SECUNDARIO
switchport access vlan 885
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/5
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/6
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/7
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/8
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/9 118
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/10
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/11
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/12
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/13
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/14
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/15
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/16
switchport access vlan 5 119
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/17
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/18
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/19
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/20
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/21
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/22
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/23
switchport access vlan 5
switchport mode access 120
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/24
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/25
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/26
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/27
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/28
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/29
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/30
switchport access vlan 5
switchport mode access
switchport voice vlan 15 121
spanning-tree portfast
!
interface GigabitEthernet2/0/31
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/32
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/33
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/34
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/35
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/36
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/37
switchport access vlan 55
switchport mode access
spanning-tree portfast
! 122
interface GigabitEthernet2/0/38
switchport access vlan 55
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/39
switchport access vlan 55
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/40
switchport access vlan 55
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/41
switchport access vlan 55
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/42
switchport access vlan 55
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/43
description CISCO MERAKI AP TULI
switchport trunk native vlan 5
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet2/0/44
description Hacia SW_ISP_TULI
switchport mode trunk
!
interface GigabitEthernet2/0/45
description Hacia SW_DMZ_TULI
switchport access vlan 885
switchport mode access
!
interface GigabitEthernet2/0/46
description Conexion PORT1 FORTIVOICE100E TULI
switchport access vlan 15 123
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/47
description Conexion PORT3 FORTIVOICE100E TULI
switchport access vlan 25
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/48
description Conexion PORT2 FORTIVOICE100E TULI
switchport access vlan 26
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/1/1
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O
switchport mode trunk
!
interface GigabitEthernet2/1/2
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O
switchport mode trunk
!
interface GigabitEthernet2/1/3
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O
switchport mode trunk
!
interface GigabitEthernet2/1/4
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O
switchport mode trunk
!
interface TenGigabitEthernet2/1/1
!
interface TenGigabitEthernet2/1/2
!
interface TenGigabitEthernet2/1/3
!
interface TenGigabitEthernet2/1/4
!
interface Vlan1
no ip address
shutdown
! 124
interface Vlan5
description User_Vlan
ip address 10.85.5.254 255.255.255.0
!
interface Vlan10
description Server Vlan
ip address 10.85.10.254 255.255.255.0
!
interface Vlan15
description Phone_Vlan
ip address 10.85.15.254 255.255.255.0
!
interface Vlan20
description Substation_Vlan
ip address 10.85.20.254 255.255.255.0
!
interface Vlan26
description Conexion con SBC Telefonia Publica
ip address 10.85.26.1 255.255.255.248
!
interface Vlan50
ip address 10.85.50.254 255.255.255.0
ip access-group Vlan50 in
!
interface Vlan55
description Security_Vlan
ip address 10.85.55.254 255.255.255.0
ip access-group Vlan55 in
!
interface Vlan885
description VLAN MGMT TULI
ip address 10.85.85.254 255.255.255.0
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 10.85.85.8
ip route 192.168.200.0 255.255.255.0 10.85.85.1
!
ip access-list extended Vlan50
deny ip 10.86.50.0 0.0.0.255 10.86.5.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.10.0 0.0.0.255 125
deny ip 10.86.50.0 0.0.0.255 10.86.20.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.15.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.55.0 0.0.0.255
permit ip any any
ip access-list extended Vlan55
deny ip 10.86.55.0 0.0.0.255 10.86.5.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.10.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.20.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.15.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.50.0 0.0.0.255
permit ip any any
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
password <removed>
length 35
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password <removed>
no login
transport input all
line vty 5 15
password <removed>
no login
transport input all
!
ntp master 2
ntp server 200.23.51.102
!
mac address-table notification mac-move
!
!
!
!
! 126
End

8.4.6 SW_DMZ_TULI

------------------ show running-config ------------------

Building configuration...

Current configuration : 3444 bytes


!
! Last configuration change at 23:23:10 UTC Fri Aug 30 2019
! NVRAM config last updated at 23:15:04 UTC Fri Aug 30 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_DMZ_TULI
!
boot-start-marker
boot-end-marker
!
enable password <removed>
!
no aaa new-model
!
!
ip domain-name cisco.com
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-2377577472
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2377577472 127
revocation-check none
rsakeypair TP-self-signed-2377577472
!
!
crypto pki certificate chain TP-self-signed-2377577472
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32333737 35373734 3732301E 170D3139 30383238 31373538
33395A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 33373735
37373437 3230819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
810093A5 A4F21798 F23F0700 2A9D73E8 C81095EF 083D0B5E B88D2043 3BAC2858
88F2610E EE24437B 1F15F43A BE82C105 8971AD30 B1525FD4 6AC47BA6 A2068F63
ACD1895D 93EF0E34 003E5BF8 8F54FC57 C1CD1D19 C563DBF1 F58858C8 7B9C31B7
5D154380 97C6549E 27DBAA2B 85CB5F6C 50388D4C EFD3959F 4699BC65 A1C98D3C
4DC30203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14F40223 7FDBDE40 E900DB8E D5DF5FA5 5F63B936 6D301D06
03551D0E 04160414 F402237F DBDE40E9 00DB8ED5 DF5FA55F 63B9366D 300D0609
2A864886 F70D0101 05050003 81810079 52D4D912 42812910 EF53609D 53D94D28
40910417 42637ED6 ED8F0E9C CCC6AD2A 96C0E9E6 89F890F6 2794BF5E 28A34792
11950335 24240E58 4E7B12B3 6438A782 E3D0EC4B BAA5DDEB 3202AB86 9315A907
4E97A0A3 54E06E70 26AD2643 4F8E296F DCB51076 73A53C2C D971C4C8 F8990AA2
99BD4403 8828BD50 F27DA395 7D1882
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 885 priority 49152
!
!
!
!
!
!
!
interface GigabitEthernet0/1
description Conexion Puerto Gi0/3 ASA5506-X PRIMARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/2
description Conexion Puerto Gi0/3 ASA5506-X SECUNDARIO 128
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/3
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/4
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/6
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/7
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/8
description Puerto MGMT Tuli
switchport access vlan 885
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/9
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/10
switchport mode access
spanning-tree portfast edge
!
interface Vlan1
no ip address
shutdown
!
interface Vlan885
ip address 10.85.85.7 255.255.255.0 129
!
ip http server
ip http secure-server
ip ssh version 2
!
!
!
no vstack
!
line con 0
password <removed>
line vty 0 4
password <removed>
no login
transport input all
line vty 5 15
password <removed>
no login
!
end
8.4.7 SW_ISP_TULI

------------------ show running-config ------------------

Building configuration...

Current configuration : 3490 bytes


!
! Last configuration change at 23:24:17 UTC Fri Aug 30 2019
! NVRAM config last updated at 23:24:15 UTC Fri Aug 30 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_ISP_TULI
!
boot-start-marker
boot-end-marker 130
!
enable password <removed>
!
no aaa new-model
!
!
ip domain-name cisco.com
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-2377578496
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2377578496
revocation-check none
rsakeypair TP-self-signed-2377578496
!
!
crypto pki certificate chain TP-self-signed-2377578496
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32333737 35373834 3936301E 170D3139 30383238 31383031
35305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 33373735
37383439 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
81009695 32429A72 596272D3 F5A96460 960028A6 234E6CCD D2E89589 1356BF9C
9EA6679C C54EB01B 4B1D79E3 5F6A68EE 720A4779 00A86CEA 6163F5DC 8D1670D5
4B59BAA9 267B52EF 4732E9CD 7834A950 0A6D4F17 462D1D49 FF23AA17 578F76F7
EB2D148D 481B3362 EE47381A B02B7824 48DB0D93 85516385 49883063 8194DF79
CC1D0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 149A75C7 C1695BB1 03817D57 DA57BDF7 84A0076D AC301D06
03551D0E 04160414 9A75C7C1 695BB103 817D57DA 57BDF784 A0076DAC 300D0609
2A864886 F70D0101 05050003 81810074 9F422C14 DDBF7344 07F40982 3240B782
380C7404 5C3604AD E85A6FD0 448D4B7C D5F775B7 9C6EEC45 17EB7C2A 4EDC7555
6DB5D933 1BC86A8E 3FFAB691 A0B8A1A9 10D40A69 3154C727 0E61A5A3 E9C7EA3B
021C154F 92641BC5 EB8BB76E 1E43A572 072F40A9 60127D95 0DA6A513 0B79A00B
98E6A383 D5A627E3 28EB8D16 B39908
quit
! 131
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 1,885 priority 49152
!
!
!
!
!
!
!
interface GigabitEthernet0/1
description Conexion Puerto Gi0/1 ASA5506-X PRIMARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/2
description Conexion Puerto Gi0/1 ASA5506-X SECUNDARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/3
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/4
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/6
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/7
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/8
description Puerto MGMT Tuli
switchport trunk allowed vlan 1,885 132
switchport mode trunk
spanning-tree portfast edge
!
interface GigabitEthernet0/9
description ENLACE F.O. INTERNET BESTEL TULI
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/10
switchport mode access
spanning-tree portfast edge
!
interface Vlan1
no ip address
!
interface Vlan885
ip address 10.85.85.6 255.255.255.0
!
ip http server
ip http secure-server
ip ssh version 2
!
!
!
no vstack
!
line con 0
password <removed>
line vty 0 4
password <removed>
no login
transport input all
line vty 5 15
password <removed>
no login
!
End

8.4.8 SW_TULI1

------------------ show running-config ------------------ 133

Building configuration...

Current configuration : 4916 bytes


!
! Last configuration change at 05:23:21 UTC Wed Apr 14 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_TULI1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 <removed>
enable password <removed>
!
username admin privilege 15 secret 5 <removed>
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-274115968
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-274115968
revocation-check none
rsakeypair TP-self-signed-274115968
! 134
!
crypto pki certificate chain TP-self-signed-274115968
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32373431 31353936 38301E17 0D393330 33303130 30303130
315A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3237 34313135
39363830 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
B1AD7414 1F84A133 9C3A1A4C DA6EDB44 8E0E86E3 6743E609 159A20D4 5DECD241
88EB1664 12E7A2B2 6F7C5897 C11ADBEA B17C6429 669306D8 4CA57E5A 06667949
514127D0 C99DFC4A 337DB78B BBC9E560 60D1EFAE 63D31F05 39751C24 B1CA057F
8D6F797F E4B91D4A 17E343F7 EC864951 89B88B37 AA508609 731DF7E3 C996D1F9
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 1680143B F9B02A17 A3B0961D C9633093 F88ED460 715F3130 1D060355
1D0E0416 04143BF9 B02A17A3 B0961DC9 633093F8 8ED46071 5F31300D 06092A86
4886F70D 01010505 00038181 00ADBC2E 4C874343 8AE71EA9 08BCC06C 8F3D3226
19CE9CA3 8AD64F00 363804B8 08B2EF29 877B596D DE29AE35 D8920F83 79F56162
1EA1D3E0 B5D89544 ED245E91 53B35974 62C7E97F 847A397B 3E07F630 8ACBEC10
DD654C9B D46063F5 20A87443 C7FB6BF7 FB51C0F1 657292BC 7679EC6D 57938DBD
057F508F 8106F315 CC10EF62 2A
quit
!
spanning-tree mode rapid-pvst
spanning-tree portfast edge bpdufilter default
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
! 135
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description ROUTER BESTEL
switchport mode trunk
spanning-tree portfast edge
!
interface FastEthernet0/2
spanning-tree portfast edge
!
interface FastEthernet0/3
spanning-tree portfast edge
!
interface FastEthernet0/4
spanning-tree portfast edge
!
interface FastEthernet0/5
spanning-tree portfast edge
!
interface FastEthernet0/6
spanning-tree portfast edge
!
interface FastEthernet0/7
spanning-tree portfast edge
!
interface FastEthernet0/8
spanning-tree portfast edge
!
interface FastEthernet0/9
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/10
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/11
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge 136
!
interface FastEthernet0/12
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/13
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/14
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/15
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/16
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/17
switchport access vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/18
switchport access vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/19
switchport access vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/21 137
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/22
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/23
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/24
switchport access vlan 25
spanning-tree portfast edge
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan885
description VLAN MGMT
ip address 10.85.85.4 255.255.255.0
!
ip http server
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
password <removed>
login
line vty 0 4
password <removed>
login
transport input all
line vty 5 15 138
password <removed>
login
!
!
End

8.4.9 SW_TULI2

------------------ show running-config ------------------

Building configuration...

Current configuration : 5115 bytes


!
! Last configuration change at 06:37:12 UTC Wed Apr 14 1993
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_TULI2
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 <removed>
enable password <removed>
!
username admin privilege 15 secret 5 <removed>
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent 139
!
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-1328283136
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1328283136
revocation-check none
rsakeypair TP-self-signed-1328283136
!
!
crypto pki certificate chain TP-self-signed-1328283136
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31333238 32383331 3336301E 170D3933 30333031 30303031
30305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 33323832
38333133 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100B8C4 A62D7055 1394613D A28D9754 144B789B 1B0D0BFB E621F7A3 1D305F57
419A7117 FF4CE3B0 391E9876 DF510AA9 D6FC3EE5 9F07965A 8D3FE016 A0685D98
E32A32DC C3649368 78E39053 16FE6D75 89FCF65C D807EA2A A9D9860B 31D5F132
918860C9 C5C48B0F D94778B5 4775ABF5 6BADC590 1BD00523 6354D93A 901F5E78
822D0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14E8A1CA 6117B2C0 062F1A3A C2D7D31B 339104D2 2B301D06
03551D0E 04160414 E8A1CA61 17B2C006 2F1A3AC2 D7D31B33 9104D22B 300D0609
2A864886 F70D0101 05050003 8181009C C539AB67 BD46061B A6FE26FF 1315E814
1AFCEC0B AB56B331 126679D1 85783943 7C9EC0EA 5EAC4BFB CD68D9A1 25BA5A66
731FE1C5 2317F317 2F10901A 62C0DD7A D27CBD6F A425604D 96C25D62 7260FAA3
16A2B2EC 02D05F28 1647BBA9 5DBE05CF 92BF3107 F2F54A06 6F313339 DBD8A10D
AEAB90C3 8D9F410C 2A27172F 7D9073
quit
!
spanning-tree mode rapid-pvst
spanning-tree portfast edge bpdufilter default
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
! 140
!
!
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description ROUTER BESTEL
switchport mode trunk
spanning-tree portfast edge
!
interface FastEthernet0/2
spanning-tree portfast edge
!
interface FastEthernet0/3
spanning-tree portfast edge
!
interface FastEthernet0/4
spanning-tree portfast edge
!
interface FastEthernet0/5
spanning-tree portfast edge
!
interface FastEthernet0/6
spanning-tree portfast edge
!
interface FastEthernet0/7
spanning-tree portfast edge
!
interface FastEthernet0/8
spanning-tree portfast edge
!
interface FastEthernet0/9
switchport access vlan 20
switchport voice vlan 15 141
spanning-tree portfast edge
!
interface FastEthernet0/10
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/11
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/12
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/13
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/14
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/15
switchport access vlan 20
switchport voice vlan 15
load-interval 30
macro description cisco-cg-ied
spanning-tree portfast edge
!
interface FastEthernet0/16
switchport access vlan 20
switchport voice vlan 15
load-interval 30
macro description cisco-cg-ied
spanning-tree portfast edge
!
interface FastEthernet0/17
switchport access vlan 26 142
spanning-tree portfast edge
!
interface FastEthernet0/18
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/19
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/21
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/22
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/23
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/24
switchport access vlan 25
spanning-tree portfast edge
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan15
ip address 10.85.15.1 255.255.255.0
! 143
interface Vlan26
ip address 10.85.26.1 255.255.255.248
!
interface Vlan885
ip address 10.85.85.5 255.255.255.0
!
ip http server
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
password <removed>
login
line vty 0 4
password <removed>
login
transport input all
line vty 5 15
password <removed>
login
!
!
End

8.5.- Sección O&M Helios.

8.5.1 ASAHELIOSPRI

------------------ show running-config ------------------

: Saved

:
: Serial Number: JAD23090HDU
: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.8(2)
! 144
hostname ASAHELIOSPRI
enable password <removed> pbkdf2
names

!
interface GigabitEthernet1/1
nameif outsidehelios
security-level 0
ip address 201.148.19.45 255.255.255.248 standby 201.148.19.46
!
interface GigabitEthernet1/2
nameif insidehelios
security-level 100
ip address 10.86.86.8 255.255.255.0 standby 10.86.86.9
!
interface GigabitEthernet1/3
nameif dmzhelios
security-level 50
ip address 10.86.30.254 255.255.255.0 standby 10.86.30.253
!
interface GigabitEthernet1/4
description LAN Failover Interface
!
interface GigabitEthernet1/5
description STATE Failover Interface
!
interface GigabitEthernet1/6
bridge-group 1
nameif inside_5
security-level 100
!
interface GigabitEthernet1/7
bridge-group 1
nameif inside_6
security-level 100
!
interface GigabitEthernet1/8
bridge-group 1
nameif inside_7
security-level 100
!
interface Management1/1
management-only 145
no nameif
no security-level
no ip address
!
interface BVI1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
ftp mode passive
clock timezone MEX -6
clock summer-time MEX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
same-security-traffic permit inter-interface
object network obj_any1
subnet 0.0.0.0 0.0.0.0
object network obj_any2
subnet 0.0.0.0 0.0.0.0
object network obj_any3
subnet 0.0.0.0 0.0.0.0
object network obj_any4
subnet 0.0.0.0 0.0.0.0
object network obj_any5
subnet 0.0.0.0 0.0.0.0
object network obj_any6
subnet 0.0.0.0 0.0.0.0
object network obj_any7
subnet 0.0.0.0 0.0.0.0
object network User_Vlan
subnet 10.86.5.0 255.255.255.0
object network Server_Vlan
subnet 10.86.10.0 255.255.255.0
object network Phone_Vlan
subnet 10.86.15.0 255.255.255.0
object network Substation_Vlan
subnet 10.86.20.0 255.255.255.0
object network Security_Vlan
subnet 10.86.55.0 255.255.255.0
object network INSIDE-HELIOS
subnet 192.168.255.0 255.255.255.248
object-group network DM_INLINE_NETWORK_1
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Server_Vlan 146
network-object object Substation_Vlan
network-object object User_Vlan
object-group network DM_INLINE_NETWORK_2
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Server_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
object-group network DM_INLINE_NETWORK_3
network-object 10.86.30.0 255.255.255.0
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Server_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
access-list dmzhelios_access_in extended deny ip 10.86.30.0 255.255.255.0 object-group
DM_INLINE_NETWORK_2
access-list dmzhelios_access_in extended permit ip any any
access-list insidehelios_access_in extended deny ip object-group DM_INLINE_NETWORK_1
10.86.30.0 255.255.255.0
access-list insidehelios_access_in extended permit ip any any
access-list OUTSIDE_HELIOS extended permit ip object-group DM_INLINE_NETWORK_3 any
access-list OUTSIDE_HELIOS extended permit ip any any
access-list PRUEBA_FPOWER extended permit ip 10.86.86.0 255.255.255.0 any
pager lines 24
logging enable
logging asdm informational
mtu outsidehelios 1500
mtu insidehelios 1500
mtu dmzhelios 1500
mtu inside_5 1500
mtu inside_6 1500
mtu inside_7 1500
failover
failover lan unit primary
failover lan interface folink GigabitEthernet1/4
failover polltime unit msec 200 holdtime msec 800
failover key *****
failover link statelink GigabitEthernet1/5
failover interface ip folink 10.1.2.1 255.255.255.248 standby 10.1.2.2
failover interface ip statelink 172.27.2.1 255.255.255.248 standby 172.27.2.2
no monitor-interface inside
icmp unreachable rate-limit 1 burst-size 1 147
icmp permit any insidehelios
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
nat (insidehelios,outsidehelios) after-auto source dynamic any interface
nat (dmzhelios,outsidehelios) after-auto source dynamic any interface
access-group OUTSIDE_HELIOS in interface outsidehelios
access-group insidehelios_access_in in interface insidehelios
access-group dmzhelios_access_in in interface dmzhelios
route outsidehelios 0.0.0.0 0.0.0.0 201.148.19.41 1
route insidehelios 10.86.5.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.10.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.15.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.20.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.50.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.55.0 255.255.255.0 10.86.86.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication login-history
http server enable
http 192.168.1.0 255.255.255.0 inside_5
http 192.168.1.0 255.255.255.0 inside_6
http 192.168.1.0 255.255.255.0 inside_7
http 0.0.0.0 0.0.0.0 insidehelios
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck 148
ssh 0.0.0.0 0.0.0.0 insidehelios
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outsidehelios


!
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 200.23.51.102 source outsidehelios prefer
dynamic-access-policy-record DfltAccessPolicy
username admin password <removed> privilege 15
!
class-map global-class
match access-list PRUEBA_FPOWER
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip 149
inspect netbios
inspect tftp
inspect ip-options
class global-class
sfr fail-open
!
service-policy global_policy global
prompt hostname context

no call-home reporting anonymous


Cryptochecksum:940787a10958d37514d3c6b84716625f
: end
8.5.2 ASAHELIOSSEC

------------------ show running-config ------------------

: Saved
:
: Serial Number: JAD23090HDV
: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)
:
ASA Version 9.8(2)
!
hostname ASAHELIOSPRI
enable password <removed> pbkdf2
names

!
interface GigabitEthernet1/1
nameif outsidehelios
security-level 0
ip address 201.148.19.45 255.255.255.248 standby 201.148.19.46
! 150
interface GigabitEthernet1/2
nameif insidehelios
security-level 100
ip address 10.86.86.8 255.255.255.0 standby 10.86.86.9
!
interface GigabitEthernet1/3
nameif dmzhelios
security-level 50
ip address 10.86.30.254 255.255.255.0 standby 10.86.30.253
!
interface GigabitEthernet1/4
description LAN Failover Interface
!
interface GigabitEthernet1/5
description STATE Failover Interface
!
interface GigabitEthernet1/6
bridge-group 1
nameif inside_5
security-level 100
!
interface GigabitEthernet1/7
bridge-group 1
nameif inside_6
security-level 100
!
interface GigabitEthernet1/8
bridge-group 1
nameif inside_7
security-level 100
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
!
interface BVI1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
ftp mode passive 151
clock timezone MEX -6
clock summer-time MEX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
same-security-traffic permit inter-interface
object network obj_any1
subnet 0.0.0.0 0.0.0.0
object network obj_any2
subnet 0.0.0.0 0.0.0.0
object network obj_any3
subnet 0.0.0.0 0.0.0.0
object network obj_any4
subnet 0.0.0.0 0.0.0.0
object network obj_any5
subnet 0.0.0.0 0.0.0.0
object network obj_any6
subnet 0.0.0.0 0.0.0.0
object network obj_any7
subnet 0.0.0.0 0.0.0.0
object network User_Vlan
subnet 10.86.5.0 255.255.255.0
object network Server_Vlan
subnet 10.86.10.0 255.255.255.0
object network Phone_Vlan
subnet 10.86.15.0 255.255.255.0
object network Substation_Vlan
subnet 10.86.20.0 255.255.255.0
object network Security_Vlan
subnet 10.86.55.0 255.255.255.0
object network INSIDE-HELIOS
subnet 192.168.255.0 255.255.255.248
object-group network DM_INLINE_NETWORK_1
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Server_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
object-group network DM_INLINE_NETWORK_2
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Server_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
object-group network DM_INLINE_NETWORK_3
network-object 10.86.30.0 255.255.255.0 152
network-object object Phone_Vlan
network-object object Security_Vlan
network-object object Server_Vlan
network-object object Substation_Vlan
network-object object User_Vlan
access-list dmzhelios_access_in extended deny ip 10.86.30.0 255.255.255.0 object-group
DM_INLINE_NETWORK_2
access-list dmzhelios_access_in extended permit ip any any
access-list insidehelios_access_in extended deny ip object-group DM_INLINE_NETWORK_1
10.86.30.0 255.255.255.0
access-list insidehelios_access_in extended permit ip any any
access-list OUTSIDE_HELIOS extended permit ip object-group DM_INLINE_NETWORK_3 any
access-list OUTSIDE_HELIOS extended permit ip any any
access-list PRUEBA_FPOWER extended permit ip 10.86.86.0 255.255.255.0 any
pager lines 24
logging enable
logging asdm informational
mtu outsidehelios 1500
mtu insidehelios 1500
mtu dmzhelios 1500
mtu inside_5 1500
mtu inside_6 1500
mtu inside_7 1500
failover
failover lan unit secondary
failover lan interface folink GigabitEthernet1/4
failover polltime unit msec 200 holdtime msec 800
failover key *****
failover link statelink GigabitEthernet1/5
failover interface ip folink 10.1.2.1 255.255.255.248 standby 10.1.2.2
failover interface ip statelink 172.27.2.1 255.255.255.248 standby 172.27.2.2
no monitor-interface inside
icmp unreachable rate-limit 1 burst-size 1
icmp permit any insidehelios
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
arp rate-limit 16384
!
nat (insidehelios,outsidehelios) after-auto source dynamic any interface
nat (dmzhelios,outsidehelios) after-auto source dynamic any interface
access-group OUTSIDE_HELIOS in interface outsidehelios
access-group insidehelios_access_in in interface insidehelios 153
access-group dmzhelios_access_in in interface dmzhelios
route outsidehelios 0.0.0.0 0.0.0.0 201.148.19.41 1
route insidehelios 10.86.5.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.10.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.15.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.20.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.50.0 255.255.255.0 10.86.86.254 1
route insidehelios 10.86.55.0 255.255.255.0 10.86.86.254 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
timeout conn-holddown 0:00:15
timeout igp stale-route 0:01:10
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
aaa authentication login-history
http server enable
http 192.168.1.0 255.255.255.0 inside_5
http 192.168.1.0 255.255.255.0 inside_6
http 192.168.1.0 255.255.255.0 inside_7
http 0.0.0.0 0.0.0.0 insidehelios
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
telnet timeout 5
ssh stricthostkeycheck
ssh 0.0.0.0 0.0.0.0 insidehelios
ssh timeout 5
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcpd auto_config outsidehelios


!
dhcpd address 192.168.1.5-192.168.1.254 inside
dhcpd enable inside 154
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 200.23.51.102 source outsidehelios prefer
dynamic-access-policy-record DfltAccessPolicy
username admin password <removed> privilege 15
!
class-map global-class
match access-list PRUEBA_FPOWER
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
no tcp-inspection
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
class global-class
sfr fail-open
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:28ca2b82a2e280bc13f5cf3243affa12 155
: end

8.5.3 ROUTER1_HELIOS

------------------ show running-config ------------------

Building configuration...

Current configuration : 4708 bytes


!
! Last configuration change at 20:52:33 UTC Sat Aug 31 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ROUTER1_HELIOS
!
boot-start-marker
boot-end-marker
!
!
logging buffered 51200 warnings
enable password 7 <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
!
!
ip domain name yourdomain.com
no ipv6 cef
multilink bundle-name authenticated
!
!
! 156
crypto pki trustpoint TP-self-signed-735621196
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-735621196
revocation-check none
rsakeypair TP-self-signed-735621196
!
!
crypto pki certificate chain TP-self-signed-735621196
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 37333536 32313139 36301E17 0D313830 35303231 36353833
345A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3733 35363231
31393630 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
8ABED9C5 BE28DFB1 BD395ACB 4E7879DA 5F8D5365 4C270DE2 3B46C9C9 2497FCF2
A38ED40A 6CA4C593 A372300C B1DF6FB2 9C31FC35 3158BADB 1220A82C 541D750A
AD0371CD 085D21A2 4B42A723 BE7EB3C5 4500321A 2C6D1F0F 78076406 5D9F1CD3
738E567D D2F9D1B5 3EC01967 9573F08D 64123229 CD0077EB 55657412 FFB032E1
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 16801448 2CDE87A8 10F3831E AA7B4C58 B9F208E3 D9980530 1D060355
1D0E0416 0414482C DE87A810 F3831EAA 7B4C58B9 F208E3D9 9805300D 06092A86
4886F70D 01010505 00038181 00530521 7F3EE6C7 5EAED418 AB4234F7 43EE65BF
B980C67C 5C79491E 7ECFB37C 8B85E413 13A8C58E 08E942F3 C38A0897 B49B6C5B
82940519 F16E4816 42B2FB12 BFE10C93 099F0581 CD2E8888 9A987E97 099483B3
275EE5BE 68ADB414 556A6B62 3634A3FF BF172FED 72D7AE56 3F7D5955 C4870731
8A122939 C8C2A91D 6214481E 0A
quit
license udi pid CGR-2010/K9 sn FTX2218X00K
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
ip address 192.168.201.11 255.255.255.0
ip nat inside
ip virtual-reassembly in
standby 0 ip 192.168.201.1
standby 0 priority 50 157
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.86.66.4 255.255.255.240
ip nat outside
ip virtual-reassembly in
standby 2 ip 10.86.66.6
standby 2 priority 50
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.212 255.255.255.248
standby 3 ip 10.73.250.214
standby 3 priority 50
!
interface GigabitEthernet0/1.886
description VLAN MAGNAGEMENT
encapsulation dot1Q 886
ip address 10.86.86.2 255.255.255.0
standby 4 ip 10.86.86.1
standby 4 priority 50
!
interface GigabitEthernet0/0/0
ip address 172.31.30.212 255.255.255.248
standby 1 ip 172.31.30.214
standby 1 priority 50
no negotiation auto
arp timeout 1
!
ip forward-protocol nd
!
no ip http server
ip http access-class 23
ip http authentication local
no ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source static tcp 192.168.201.111 4712 172.31.30.210 4712 extendable no-alias 158
ip route 10.73.10.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.2
ip route 10.73.24.0 255.255.255.224 10.86.66.1
ip route 10.73.26.0 255.255.255.0 10.86.66.1
ip route 10.73.111.0 255.255.255.0 10.86.66.1
ip route 10.74.10.0 255.255.255.0 10.86.66.2
ip route 10.74.20.0 255.255.255.0 10.86.66.2
ip route 10.74.24.0 255.255.255.224 10.86.66.2
ip route 10.74.26.0 255.255.255.0 10.86.66.2
ip route 10.86.5.0 255.255.255.0 10.86.86.254
ip route 10.86.10.0 255.255.255.0 10.86.86.254
ip route 10.86.20.0 255.255.255.0 10.86.86.254
ip route 10.113.0.0 255.255.0.0 10.86.66.1
ip route 10.114.0.0 255.255.0.0 10.86.66.2
ip route 172.12.30.0 255.255.255.0 10.86.66.1
ip route 172.18.33.0 255.255.255.0 10.86.66.2
ip route 172.30.45.208 255.255.255.248 10.86.66.2
ip route 173.30.30.208 255.255.255.248 10.86.66.1
ip route 192.168.65.0 255.255.255.0 192.168.201.202
ip route 192.168.239.0 255.255.255.0 192.168.201.202
!
access-list 23 permit 10.10.10.0 0.0.0.7
!
!
!
control-plane
!
!
!
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all 159
line vty 5 15
access-class 23 in
privilege level 15
login local
transport input telnet ssh
!
scheduler allocate 20000 1000
!
End

8.5.4 ROUTER2_HELIOS

------------------ show running-config ------------------

Building configuration...

Current configuration : 2701 bytes


!
! Last configuration change at 20:47:44 UTC Sat Aug 31 2019
version 15.2
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname ROUTER2_HELIOS
!
boot-start-marker
boot-end-marker
!
!
enable password 7 <removed>
!
no aaa new-model
!
ip cef
!
!
!
!
! 160
!
no ipv6 cef
multilink bundle-name authenticated
!
!
!
!
license udi pid CGR-2010/K9 sn FTX2218X00M
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
ip address 192.168.201.12 255.255.255.0
ip nat inside
ip virtual-reassembly in
standby 0 ip 192.168.201.1
duplex auto
speed auto
!
interface GigabitEthernet0/1
description HACIA ROUTER BESTEL
ip address 10.86.66.5 255.255.255.240
ip nat outside
ip virtual-reassembly in
standby 2 ip 10.86.66.6
duplex auto
speed auto
!
interface GigabitEthernet0/1.25
description VLAN TELEFONIA CENACE
encapsulation dot1Q 25
ip address 10.73.250.213 255.255.255.248
standby 3 ip 10.73.250.214
!
interface GigabitEthernet0/1.886
description VLAN MAGNAGEMENT
encapsulation dot1Q 886
ip address 10.86.86.3 255.255.255.0 161
standby 4 ip 10.86.86.1
!
interface GigabitEthernet0/0/0
ip address 172.31.30.213 255.255.255.248
standby 1 ip 172.31.30.214
no negotiation auto
arp timeout 1
!
ip forward-protocol nd
!
no ip http server
no ip http secure-server
!
ip nat inside source static tcp 192.168.201.111 4712 172.31.30.210 4712 extendable no-alias
ip route 10.73.10.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.1
ip route 10.73.20.0 255.255.255.0 10.86.66.2
ip route 10.73.24.0 255.255.255.224 10.86.66.1
ip route 10.73.26.0 255.255.255.0 10.86.66.1
ip route 10.73.111.0 255.255.255.0 10.86.66.1
ip route 10.74.10.0 255.255.255.0 10.86.66.2
ip route 10.74.20.0 255.255.255.0 10.86.66.2
ip route 10.74.24.0 255.255.255.224 10.86.66.2
ip route 10.74.26.0 255.255.255.0 10.86.66.2
ip route 10.86.5.0 255.255.255.0 10.86.86.254
ip route 10.86.10.0 255.255.255.0 10.86.86.254
ip route 10.86.20.0 255.255.255.0 10.86.86.254
ip route 10.113.0.0 255.255.0.0 10.86.66.1
ip route 10.114.0.0 255.255.0.0 10.86.66.2
ip route 172.12.30.0 255.255.255.0 10.86.66.1
ip route 172.18.33.0 255.255.255.0 10.86.66.2
ip route 172.30.45.208 255.255.255.248 10.86.66.2
ip route 173.30.30.208 255.255.255.248 10.86.66.1
ip route 192.168.65.0 255.255.255.0 192.168.201.202
ip route 192.168.239.0 255.255.255.0 192.168.201.202
!
!
!
!
control-plane
!
!
! 162
line con 0
line aux 0
line 3
no activation-character
no exec
transport preferred none
transport input all
transport output pad telnet rlogin lapb-ta mop udptn v120 ssh
stopbits 1
flowcontrol software
line vty 0 4
no login
transport input all
!
scheduler allocate 20000 1000
!
end
8.5.5 SW_CORE_HELIOS

------------------ show running-config ------------------

Building configuration...

Current configuration : 21297 bytes


!
! Last configuration change at 16:39:25 MEX Sat Aug 31 2019
! NVRAM config last updated at 16:29:16 MEX Sat Aug 31 2019
!
version 16.6
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service unsupported-transceiver
no platform punt-keepalive disable-kernel-core
!
hostname SW_CORE_HELIOS
! 163
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable password <removed>
!
no aaa new-model
clock timezone MEX -6 0
clock summer-time MEX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
switch 1 provision ws-c3850-48p
switch 2 provision ws-c3850-48p
!
!
!
!
ip routing
!
ip dhcp excluded-address 10.86.5.201 10.86.5.254
ip dhcp excluded-address 10.86.10.201 10.86.10.254
ip dhcp excluded-address 10.86.20.201 10.86.20.254
ip dhcp excluded-address 10.86.86.1 10.86.86.20
ip dhcp excluded-address 10.86.86.30 10.86.86.254
ip dhcp excluded-address 10.86.50.250 10.86.50.254
!
ip dhcp pool VLAN5
network 10.86.5.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.86.5.254
lease 0 12
!
ip dhcp pool VLAN10
network 10.86.10.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.86.10.254
lease 0 12
!
ip dhcp pool VLAN20
network 10.86.20.0 255.255.255.0 164
dns-server 8.8.8.8 8.8.4.4
default-router 10.86.20.254
lease 0 12
!
ip dhcp pool VLAN886
network 10.86.86.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.86.86.254
lease 0 2
!
ip dhcp pool VLAN50
network 10.86.50.0 255.255.255.0
dns-server 8.8.8.8 8.8.4.4
default-router 10.86.50.254
lease 0 8
!
!
!
!
!
!
!
!
!
crypto pki trustpoint TP-self-signed-4193882547
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4193882547
revocation-check none
rsakeypair TP-self-signed-4193882547
!
!
crypto pki certificate chain TP-self-signed-4193882547
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34313933 38383235 3437301E 170D3139 30383233 31353239
32365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 31393338
38323534 37308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100C577 B9307BB7 8F372ACA 402C10DC FFEC1101 791748DB 1752F253
B1693E1A 702E0F99 E69EE505 B9F5CD96 2961AABF 8424610F BDBD30D8 A920A29A
92DF70AC DE69AA94 C0A3FA92 3BBC67EE 30512E3B 6F1C5F0F E8483EFB EE5B074E
52590858 71F4029E BA14EFBB 652D0A98 6017E1E7 59B72F01 00FA984D 9CC8B4C7 165
1A104BF5 D2037665 5C0D96DC 9CD5740C A2118F7A D5E134B4 5BCCD52C EAAF79F5
293B0D04 F3DFCCD0 5B3A55FD 77F9E8B6 21269781 7A601EE6 5955C404 3FDF17DE
6F4E9991 EB977D20 2810E7F1 9ED2025A C0B398F2 3AC72547 9F517558 0554A866
75BE08A9 5A231E61 A00F3946 337F22AB 5092384B 36A62346 8104F610 C6ABE8EA
CCF8C537 CE890203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 1407114F 888B377A 0608AFD8 680777D8 008A2ED5
99301D06 03551D0E 04160414 07114F88 8B377A06 08AFD868 0777D800 8A2ED599
300D0609 2A864886 F70D0101 05050003 82010100 0D83639F 803E1157 F7ABE08B
E810FBDB 5C4BA55E 8441F921 F6C1F8CD 29CC1543 62EF04E4 A3B59D04 F499E89F
D9B78EB0 0F943F48 5C26B660 84E26B90 47F26E05 6F545C4F 45358A20 32DE440A
DBC98733 0622DCF3 0F760724 EEBE43CC 29D5CD79 1C98F34D 5F816FC0 80F505AF
49287202 2671F303 1671DDD7 8F37F7DD F4A2B3E4 5A22DD80 6D3E432A D58B1E23
677530DA F2AE0E14 A971C749 E95DB02E B267B3C6 58BC0A27 06E9409B 91006357
B9F28A55 52C29D2C 95CAE72B 611A7BFB 88C17E44 C476BCE7 B0E0940D F47E8E74
B41CBA8E D5F394F2 0F2E9C4D 80C4402F 11EA0F06 9C773889 06D916EF D928800C
365601AA 7069DE95 81541394 DD6B1280 FCEB0917
quit
!
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 5,10,15,20,25-26,50,55,886 priority 0
no errdisable detect cause gbic-invalid
!
username admin privilege 15 password 0 <removed>
!
redundancy
mode sso
!
!
transceiver type all
monitoring
!
!
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data, LOGGING
class-map match-any system-cpp-default
description DHCP Snooping, EWLC control, EWCL data 166
class-map match-any system-cpp-police-sys-data
description Learning cache ovfl, Crypto Control, Exception, EGR Exception, NFL SAMPLED
DATA, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-multicast
description Transit Traffic and MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-system-critical
description System Critical and Gold
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
! 167
macro auto device phone VOICE_VLAN=15
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
speed 1000
negotiation auto
!
interface GigabitEthernet1/0/1
description Conexion Interface INSIDEHELIOS CISCO ASA PRIM
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/2
description Conexion FirePower Puerto MGMT CISCO ASA PRIMARIO
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/3
description Conexion Interface INSIDEHELIOS CISCO ASA PRIM
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/4
description Conexion Interface INSIDEHELIOS CISCO ASA PRIM
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/5
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/6
switchport access vlan 15
switchport mode access
spanning-tree portfast
! 168
interface GigabitEthernet1/0/7
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/8
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/9
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/10
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/11
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/12
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/13
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/14
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/15 169
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/16
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/17
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/18
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/19
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/20
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/21
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/22
switchport access vlan 5 170
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/23
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/24
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/25
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/26
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/27
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/28
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/29
switchport access vlan 5
switchport mode access 171
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/30
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/31
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/32
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/33
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/34
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/35
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet1/0/36
switchport access vlan 5
switchport mode access
switchport voice vlan 15 172
spanning-tree portfast
!
interface GigabitEthernet1/0/37
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/38
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/39
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/40
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/41
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/42
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/43
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/44
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/45 173
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/46
switchport access vlan 10
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/47
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/0/48
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet1/1/1
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface GigabitEthernet1/1/2
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface GigabitEthernet1/1/3
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface GigabitEthernet1/1/4
description Conexion SW ELEVADORA ENLACE PRIMARIO F.O.
switchport mode trunk
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
! 174
interface GigabitEthernet2/0/1
description Conexion Inteface INSIDEHELIOS CISCO ASA SECUNDARIO
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/2
description Conexion FirePower Puerto MGMT CISCO ASA SECUNDARIO
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/3
description Conexion Inteface INSIDEHELIOS CISCO ASA SECUNDARIO
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/4
description Conexion Inteface INSIDEHELIOS CISCO ASA SECUNDARIO
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/5
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/6
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/7
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/8
switchport access vlan 20
switchport mode access
spanning-tree portfast 175
!
interface GigabitEthernet2/0/9
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/10
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/11
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/12
switchport access vlan 20
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/13
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/14
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/15
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/16
switchport access vlan 5
switchport mode access
switchport voice vlan 15 176
spanning-tree portfast
!
interface GigabitEthernet2/0/17
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/18
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/19
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/20
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/21
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/22
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/23
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast 177
!
interface GigabitEthernet2/0/24
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/25
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/26
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/27
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/28
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/29
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/30
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
! 178
interface GigabitEthernet2/0/31
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/32
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/33
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/34
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/35
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/36
switchport access vlan 5
switchport mode access
switchport voice vlan 15
spanning-tree portfast
!
interface GigabitEthernet2/0/37
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/38
switchport mode access
spanning-tree portfast 179
!
interface GigabitEthernet2/0/39
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/40
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/41
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/42
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/43
description CISCO MERAKI AP HELIOS
switchport trunk native vlan 5
switchport mode trunk
spanning-tree portfast
!
interface GigabitEthernet2/0/44
description Hacia SW_ISP_HELIOS
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/45
description Hacia SW_DMZ_HELIOS
switchport access vlan 886
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/46
description Conexion PORT1 FORTIVOICE100E
switchport access vlan 15
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/47
description Conexion PORT3 FORTIVOICE100E 180
switchport access vlan 25
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/0/48
description Conexion PORT2 FORTIVOICE100E
switchport access vlan 26
switchport mode access
spanning-tree portfast
!
interface GigabitEthernet2/1/1
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O.
switchport mode trunk
!
interface GigabitEthernet2/1/2
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O.
switchport mode trunk
!
interface GigabitEthernet2/1/3
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O.
switchport mode trunk
!
interface GigabitEthernet2/1/4
description Conexion SW ELEVADORA ENLACE SECUNDARIO F.O.
switchport mode trunk
!
interface TenGigabitEthernet2/1/1
!
interface TenGigabitEthernet2/1/2
!
interface TenGigabitEthernet2/1/3
!
interface TenGigabitEthernet2/1/4
!
interface Vlan1
description Hacia Interface Inside Cisco ASA5506-X
ip address 192.168.255.3 255.255.255.248
!
interface Vlan5
description User_Vlan
ip address 10.86.5.254 255.255.255.0
!
interface Vlan10 181
description Server Vlan
ip address 10.86.10.254 255.255.255.0
!
interface Vlan15
description Phone_Vlan
ip address 10.86.15.254 255.255.255.0
!
interface Vlan20
description Substation_Vlan
ip address 10.86.20.254 255.255.255.0
!
interface Vlan26
description Conexion con SBC Telefonia Publica
ip address 10.86.26.1 255.255.255.248
!
interface Vlan50
description Guest_Vlan WiFi
ip address 10.86.50.254 255.255.255.0
ip access-group Vlan50 in
!
interface Vlan55
description Security_Vlan
ip address 10.86.55.254 255.255.255.0
ip access-group Vlan55 in
!
interface Vlan886
description VLAN MGMT
ip address 10.86.86.254 255.255.255.0
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 10.86.86.8
ip route 192.168.201.0 255.255.255.0 10.86.86.1
!
ip access-list extended Vlan50
deny ip 10.86.50.0 0.0.0.255 10.86.5.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.10.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.20.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.15.0 0.0.0.255
deny ip 10.86.50.0 0.0.0.255 10.86.55.0 0.0.0.255
permit ip any any 182
ip access-list extended Vlan55
deny ip 10.86.55.0 0.0.0.255 10.86.5.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.10.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.20.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.15.0 0.0.0.255
deny ip 10.86.55.0 0.0.0.255 10.86.50.0 0.0.0.255
permit ip any any
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
password <removed>
stopbits 1
line aux 0
stopbits 1
line vty 0 4
password <removed>
no login
transport input telnet
line vty 5 15
password <removed>
login
!
ntp master 2
ntp server 200.23.51.102
!
mac address-table notification mac-move
!
!
!
!
!
End

8.5.6 SW_HELIOS_DMZ

183
------------------ show running-config ------------------

Building configuration...

Current configuration : 2059 bytes


!
! Last configuration change at 17:25:23 MEX Sat Aug 31 2019 by admin
! NVRAM config last updated at 17:25:20 MEX Sat Aug 31 2019 by admin
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_HELIOS_DMZ
!
boot-start-marker
boot-end-marker
!
enable password <removed>
!
username admin privilege 15 secret 5 <removed>
no aaa new-model
clock timezone MEX -6 0
clock summer-time MEX recurring 1 Sun Apr 2:00 last Sun Oct 2:00
!
!
ip domain-name cisco.com
!
!
!
!
!
!
!
!
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 886 priority 49152
! 184
!
!
!
!
!
!
interface GigabitEthernet0/1
description Conexion Puerto Gi0/3 ASA5506-X PRIMARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/2
description Conexion Puerto Gi0/3 ASA5506-X SECUNDARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/3
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/4
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/6
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/7
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/8
description Puerto MGMT Helios
switchport access vlan 886
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/9 185
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/10
switchport mode access
spanning-tree portfast edge
!
interface Vlan1
no ip address
!
interface Vlan886
ip address 10.86.86.7 255.255.255.0
!
ip http server
ip http secure-server
ip ssh version 2
!
!
!
no vstack
!
line con 0
password <removed>
line vty 0 4
password <removed>
no login
transport input all
line vty 5 15
password <removed>
no login
transport input ssh
!
ntp master 2
ntp server 200.23.51.102
end

8.5.7 SW_HELIOS_ISP

------------------ show running-config ------------------

186
Building configuration...

Current configuration : 1977 bytes


!
! Last configuration change at 22:23:54 UTC Sat Aug 31 2019 by admin
! NVRAM config last updated at 22:24:10 UTC Sat Aug 31 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service internal
!
hostname SW_HELIOS_ISP
!
boot-start-marker
boot-end-marker
!
enable password <removed>
!
username admin privilege 15 secret 5 <removed>
no aaa new-model
!
!
ip domain-name cisco.com
!
!
!
!
!
!
!
!
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 886 priority 49152
no errdisable detect cause gbic-invalid
!
!
!
! 187
!
!
!
interface GigabitEthernet0/1
description Conexion Puerto Gi0/1 ASA5506-X PRIMARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/2
description Conexion Puerto Gi0/1 ASA5506-X SECUNDARIO
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/3
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/4
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/5
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/6
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/7
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/8
description Puerto MGMT Helios
switchport access vlan 886
switchport mode access
spanning-tree portfast edge
!
interface GigabitEthernet0/9
switchport mode access
spanning-tree portfast edge
! 188
interface GigabitEthernet0/10
switchport mode access
spanning-tree portfast edge
!
interface Vlan1
no ip address
!
interface Vlan886
ip address 10.86.86.6 255.255.255.0
!
ip http server
ip http secure-server
ip ssh version 2
!
!
!
no vstack
!
line con 0
password <removed>
line vty 0 4
password <removed>
login
transport input all
line vty 5 15
password <removed>
no login
transport input ssh
!
End

8.5.8 SW_HELIOS1

------------------ show running-config ------------------

Building configuration...

Current configuration : 5119 bytes


!
! Last configuration change at 20:53:04 UTC Sat Aug 31 2019 189
! NVRAM config last updated at 20:52:53 UTC Sat Aug 31 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_HELIOS1
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 <removed>
enable password <removed>
!
username admin privilege 15 secret 5 <removed>
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
!
!
no ip cef
!
crypto pki trustpoint TP-self-signed-2684825984
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2684825984
revocation-check none
rsakeypair TP-self-signed-2684825984
!
!
crypto pki certificate chain TP-self-signed-2684825984
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363834 38323539 3834301E 170D3933 30333031 30303031 190
30315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36383438
32353938 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100DB76 13B22ADA AA4CBF7D 0C6B70E0 3DC17A35 796E48E7 EB55F79B 56B7E54C
B6C49D49 658653B8 7796959F 458C943F 83FFF148 327CE677 D992D625 33D34664
9230A008 C0D7E0D6 A17CE3A0 9C35A9B4 09DB8F2D 031AE78B 0C81CF42 34CD4D0A
FCE34334 47614C40 B983F610 57534654 C9ECE27E 01F30C06 683A0685 2BCDCC17
81750203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14C35368 A1385CD0 A0FE26EE 9F62D43C C88E44F2 86301D06
03551D0E 04160414 C35368A1 385CD0A0 FE26EE9F 62D43CC8 8E44F286 300D0609
2A864886 F70D0101 05050003 81810029 0E5714D5 4DEBE56A C02EB922 3CA57B50
9C70ED87 06E368E4 021A3322 797A2EC8 FB9BA9C2 3CF1B27B F339A858 33003DE2
21DE4DB6 DD6AF54B AAE60270 A41A6904 A66F92A8 7B44EAB2 39A6A719 6888D52B
D890FC8F DB7DBF10 EFC481CF 9889559D A377EBD3 0483B267 B8CDFA2F C6BC42C2
A5F8EB10 696D9C3C 4F4356CE 4DED6C
quit
!
spanning-tree mode rapid-pvst
spanning-tree portfast edge bpdufilter default
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
!
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description Conexion a -> ROUTER1_HELIOS
switchport mode trunk 191
spanning-tree portfast edge
!
interface FastEthernet0/2
description Conexion a -> HELIOS_ZACATECAS_ZAPOPAN_MPLS
spanning-tree portfast edge
!
interface FastEthernet0/3
spanning-tree portfast edge
!
interface FastEthernet0/4
spanning-tree portfast edge
!
interface FastEthernet0/5
spanning-tree portfast edge
!
interface FastEthernet0/6
spanning-tree portfast edge
!
interface FastEthernet0/7
spanning-tree portfast edge
!
interface FastEthernet0/8
spanning-tree portfast edge
!
interface FastEthernet0/9
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/10
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/11
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/12
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge 192
!
interface FastEthernet0/13
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/14
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/15
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/16
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/17
spanning-tree portfast edge
!
interface FastEthernet0/18
spanning-tree portfast edge
!
interface FastEthernet0/19
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/21
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/22
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/23 193
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/24
switchport access vlan 25
spanning-tree portfast edge
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
description ENLACE PRIMARIO F.O. ELEVADROA-EDIF O&M
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan100
ip address 192.168.202.1 255.255.255.0
!
interface Vlan886
description VLAN MGMT
ip address 10.86.86.4 255.255.255.0
!
ip http server
ip http authentication local
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
password <removed>
login
line vty 0 4
password <removed>
login
transport input all
line vty 5 15
password <removed>
login
! 194
!
End

8.5.9 SW_HELIOS2

------------------ show running-config ------------------

Building configuration...

Current configuration : 5266 bytes


!
! Last configuration change at 20:54:19 UTC Sat Aug 31 2019
! NVRAM config last updated at 20:54:27 UTC Sat Aug 31 2019
!
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname SW_HELIOS2
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 <removed>
enable password <removed>
!
username admin privilege 15 secret 5 <removed>
no aaa new-model
system mtu routing 1500
!
!
!
!
!
ptp mode p2ptransparent
!
! 195
!
no ip cef
!
crypto pki trustpoint TP-self-signed-2684824576
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2684824576
revocation-check none
rsakeypair TP-self-signed-2684824576
!
!
crypto pki certificate chain TP-self-signed-2684824576
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32363834 38323435 3736301E 170D3933 30333031 30303031
30325A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 36383438
32343537 3630819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A96C DBFCA377 4C88D5D5 E50D508C BF529FDB B18B84DC CC9D9502 83F07C7D
5783B6CD 2020C8C6 6D6EA350 735A5AD3 4ED61B9C D7312B79 28F8B4F2 C82E097A
3AD0C3D9 9AB7F417 7B357D08 4B314C0F BD2BD419 E5E4A854 849F0141 57EF73A7
7000271B 2A1CE864 1EEACBB6 E0ED9313 9B429112 74B5BCCD 5A5DDDD7 0018A647
5BCF0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14EA0443 6CB4E7F0 6DF1053F D70788DE C614E231 12301D06
03551D0E 04160414 EA04436C B4E7F06D F1053FD7 0788DEC6 14E23112 300D0609
2A864886 F70D0101 05050003 81810057 6E45433E 846022DA D7817C95 25B23F72
E0DC7CBE D5C17E66 2D911488 94C79C5B ED09D04E 42B40638 FA0EBE0A 390984EB
93C12BC0 A3137F06 EB480AD6 DF9133BD 908F5475 F003A96E DA5CD3CF 83842963
4DED6A94 B407DD96 96232DD5 8D21F82D 06E97827 22EB9047 7F46D3E5 D15DEAE5
FEAA65D1 1DCEF040 B491072D E3B539
quit
!
spanning-tree mode rapid-pvst
spanning-tree portfast edge bpdufilter default
spanning-tree extend system-id
!
alarm profile defaultPort
alarm not-operating
syslog not-operating
notifies not-operating
!
!
! 196
!
transceiver type all
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Port-channel1
switchport mode trunk
!
interface FastEthernet0/1
description Conexion a -> ROUTER2_HELIOS
switchport mode trunk
spanning-tree portfast edge
!
interface FastEthernet0/2
description Conexion a -> HELIOS_ZACATECAS_HMO_MPLS
spanning-tree portfast edge
!
interface FastEthernet0/3
spanning-tree portfast edge
!
interface FastEthernet0/4
spanning-tree portfast edge
!
interface FastEthernet0/5
spanning-tree portfast edge
!
interface FastEthernet0/6
spanning-tree portfast edge
!
interface FastEthernet0/7
spanning-tree portfast edge
!
interface FastEthernet0/8
switchport access vlan 886
spanning-tree portfast edge
!
interface FastEthernet0/9
switchport access vlan 20
switchport voice vlan 15 197
spanning-tree portfast edge
!
interface FastEthernet0/10
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/11
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/12
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/13
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/14
switchport access vlan 20
switchport voice vlan 15
spanning-tree portfast edge
!
interface FastEthernet0/15
switchport access vlan 20
switchport voice vlan 15
load-interval 30
macro description cisco-cg-ied
spanning-tree portfast edge
!
interface FastEthernet0/16
switchport access vlan 20
switchport voice vlan 15
load-interval 30
macro description cisco-cg-ied
spanning-tree portfast edge
!
interface FastEthernet0/17
switchport access vlan 26 198
spanning-tree portfast edge
!
interface FastEthernet0/18
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/19
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/20
switchport access vlan 26
spanning-tree portfast edge
!
interface FastEthernet0/21
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/22
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/23
switchport access vlan 25
spanning-tree portfast edge
!
interface FastEthernet0/24
switchport access vlan 25
spanning-tree portfast edge
!
interface GigabitEthernet0/1
switchport mode trunk
channel-group 1 mode auto
!
interface GigabitEthernet0/2
description ENLACE SECUNDARIO F.O. ELEVADROA-EDIF O&M
switchport mode trunk
!
interface Vlan1
no ip address
!
interface Vlan886
description VLAN MGMT 199
ip address 10.86.86.5 255.255.255.0
!
ip http server
ip http authentication local
ip http secure-server
ip forward-protocol nd
!
!
!
line con 0
password <removed>
login
line vty 0 4
password <removed>
login
transport input all
line vty 5 15
password <removed>
login
!
!
End

9.-TELEFONÍA
9.1.-configuración y extensiones Tuli.

EQUIPO MAC DESCRIPCIÓN EXTENSIÓN


FON3755419006530 E8:1C:BA:C4:3C:09 OPERADOR 2 TUE 65
FON3755419006526 E8:1C:BA:C4:3C:05 OPERADOR 3 TUE 66
FON3755419006524 E8:1C:BA:C4:3C:03 OPERADOR 4 TUE 67
FON3755419006522 E8:1C:BA:C4:3C:01 OPERADOR 5 TUE 68
FON3755419006528 E8:1C:BA:C4:3C:07 OPERADOR 6 TUE 1006

FON3755418013176 E8:1C:BA:63:38:BA TEL TUE 1 60


2200-19000-001 00:04:f2:f4:4c:53 CONFERENCIA TULI 61
FON-870i-H 02:EB:6C:47:ED INALAMBRICO 1 TUE 62
FON-870i-H 02:EB:6C:47:DD INALAMBRICO 2 TUE 63
FON-870i-H 02:EB:6C:47:EA INALAMBRICO 3 TUE 64
FO-870i 00:08:7b:0f:f3:ed PRIMARIO
FO-870i 00:08:7b:0f:f4:55 SECUNDARIO
FO-870i 00:08:7b:0f:f3:f0 SECUNFDARIO 200
FON375 e8:1c:ba:63:38:bc TUE 93190

9.2.-configuración y extensiones Helios.

EQUIPO MAC DESCRIPCIÓN EXTENSIÓN


FON3755419006521 E8:1C:BA:C4:3C:00 OPERADOR 2 HEI 50
FON3755419006523 E8:1C:BA:C4:3C:02 OPERADOR 3 HEI 51
FON3755419006525 E8:1C:BA:C4:3C:04 OPERADOR 4 HEI 52
FON3755419006527 E8:1C:BA:C4:3C:06 OPERADOR 5 HEI 53
FON3755419006529 E8:1C:BA:C4:3C:08 OPERADOR 6 HEI 54
FortiFone-375 e8:1c:ba:63:38:bb OPERADOR 1 HEI 2001
FortiFone-870i INALAMBRICO 7 HEI 55
FortiFone-870i INALAMBRICO 8 HEI 56
FortiFone-870i INALAMBRICO 9 HEI 57
POLYCOM 00:04:F2:F4:AD:A2 SALA CONFERENCIA HELIOS 58
FORTIFONE-870 00:08:7b:0f:f4:70 PRIMARIO
FORTIFONE-870 00:08:7b:0f:f3:e8 SECUNDARIO
FORTIFONE-870 00:08:7b:0f:f3:ee SECUNDARIO
10.- PASSWORD CONEXIÓN REDES WIFI EDIFICIO O&M.

SSID PASSWORD

TULI_OM WiFi Tul13ner2019

GUEST_TULI Tul1W1f12019
HELIOS_OM WiFi Hel10sG3n2019
GUEST_HELIOS Hel10sW1f12019

11.- RELACION SFP´S 1GBPS

NOMBRE SWITCH PUERTO GIBIC NUM SERIE GBIC


201
ROUTER_BESTEL_TULI GigabitEthernet0/0/0 CISCO (GLC-LH-SMD) AVJ224933ED
SW_ISP_TULI GigabitEthernet0/9 CISCO (GLC-LH-SMD) AVJ22493811
SW_TULI1 GigabitEthernet0/2 PLANET AG00519200208
SW_TULI2 GigabitEthernet0/2 PLANET AG00519200212

GigabitEthernet1/1/1 PLANET AG00519200205


SW_CORE_TULI
GigabitEthernet2/1/1 PLANET AG00519100671

ROUTER_BESTEL_HELIOS GigabitEthernet0/0/0 CISCO (GLC-LH-SMD) AVJ22493B03

SW_ISP_HELIOS GigabitEthernet0/9 CISCO (GLC-LH-SMD) AVJ22493CTU


SW_HELIOS1 GigabitEthernet0/2 PLANET AG00519200185
SW_HELIOS2 GigabitEthernet0/2 CISCO (GLC-LH-SMD) AVJ22493CU1

GigabitEthernet1/1/1 PLANET AG00519200133


SW_CORE_HELIOS
GigabitEthernet2/1/3 PLANET AG00519200189

Potrebbero piacerti anche