BGP Router Manager templates for Voneus core and aggregation infrastructure
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

87 lines
3.1 KiB

{{ "system"|progress }} {
root-authentication {
encrypted-password "$6$uC87jp7U$04FIKNRT3VcUzqDiaxKVRVqnQM2c48Q2NpIARsSuKVVK7gezNX92B7261QV.kRHg.yswiDhUY.SF4e/qgRNdL0"; ## SECRET-DATA
}
ports {
console {
log-out-on-disconnect;
type vt100;
}
}
commit synchronize;
login {
message "\n__ _____ _ _ _____ _ _ ____ ____ ___ ___ _ _\n\\ \\ / / _ \\| \\ | | ____| | | / ___| __ _ ___| ___|/ _ \\ ( _ )/ / |\n \\ \\ / / | | | \\| | _| | | | \\___ \\ / _` / __|___ \\ (_) |/ _ \\| | |\n \\ V /| |_| | |\\ | |___| |_| |___) | | (_| \\__ \\___) \\__, | (_) | | |\n \\_/ \\___/|_| \\_|_____|\\___/|____/ \\__,_|___/____/ /_/ \\___/|_|_|\n\n";
user faelix {
full-name "FAELIX NOC";
uid 2000;
class super-user;
authentication {
encrypted-password "$6$4sVD2r4y$PjAIeLZ/tJcDhsQekJI9wU2l4xYf8k6mHuzvLivK2tcFXdcHMjP23Up/oUzMRWiVtEW99foiEWuXG40tL5cHy0";
ssh-ed25519 "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM05RD1X1njHcJvPTGbaCkO7rssp6T8uTCH3b6Sk4MA9 maz@lifting-shadows";
}
}
user voneus {
full-name "Voneus NOC";
uid 2001;
class super-user;
authentication {
encrypted-password "$6$4sVD2r4y$PjAIeLZ/tJcDhsQekJI9wU2l4xYf8k6mHuzvLivK2tcFXdcHMjP23Up/oUzMRWiVtEW99foiEWuXG40tL5cHy0";
}
}
user nomios {
full-name "Nomios NOC";
uid 2002;
class super-user;
authentication {
encrypted-password "$6$4sVD2r4y$PjAIeLZ/tJcDhsQekJI9wU2l4xYf8k6mHuzvLivK2tcFXdcHMjP23Up/oUzMRWiVtEW99foiEWuXG40tL5cHy0";
}
}
}
services {
ssh;
}
authentication-order [ password radius ];
syslog {
file interactive-commands {
interactive-commands any;
}
file messages {
any notice;
authorization info;
}
}
processes {
dhcp-service {
traceoptions {
file dhcp_logfile size 10m;
level all;
flag packet;
}
}
}
domain-name core.voneus.net;
domain-search [ core.voneus.net oob.core.voneus.net netops.voneus.net ];
time-zone Universal;
location country-code UK;
name-server {
9.9.9.9;
1.1.1.1;
8.8.8.8;
}
radius-server {
{% for radius_server, radius_data in device.config_context.get('radius-servers',{}).items() %}
{{ radius_server }} secret "{{ radius_data.get('secret') }}";{% endfor %}
}
accounting {
events [ login change-log interactive-commands ];
destination {
radius;
}
}
ntp {
server 185.134.196.169 prefer; /* leontp.g.faelix.net */
server 195.66.241.2 prefer; /* ntp0.linx.net */
server 195.66.241.3 prefer; /* ntp1.linx.net */
server 195.66.241.10 prefer; /* ntp2.linx.net */
}
}