Difference between revisions of "DMVPN Service Provider"

From W9CR
Jump to navigation Jump to search
(Created page with "This is a design for a DMVPN/FlexVPN using Cisco IOS-XE. = Goals = [X] - functional [-] - testing, but not working [ ] - to be worked on [X] DMVPN via the hub, no site...")
(No difference)

Revision as of 14:13, 8 July 2025

This is a design for a DMVPN/FlexVPN using Cisco IOS-XE.

Goals

[X] - functional
[-] - testing, but not working
[ ] - to be worked on
[X] DMVPN via the hub, no site to site traffic
[X] DMVPN - IKEv2
[X] DMVPN - aes 256
[X] iBGP between all nodes
[X] iBGP label distribution
[ ] BFD for tunnel interfaces
[ ] BFD for BGP
[ ] BFD for PIM
[X] Multicast on the underlay
[X] Multicast Underlay - anycast RP
[X] L3VPN over BGP
[-] L3VPN over BGP with multicast
[-] L3VPN w/mcast - Anycast RP on Hubs
[X] L3VPN local breakout via NAT
[-] L3VPN local breakout via NAT - failover between FRONT-DOOR and CELL-DOOR VRFs
[ ] L2VPN over BGP
[ ] Failover between FRONT and CELL
[ ] Failover between Core
[ ] Load Balance between cores
[ ] IPv6 DMVPN if needed
[ ] Cellular interface setup
[ ] Security hardening

Diagram

DMVPN Network 1

Design

The basic design is:

Core/P of 2 virtual routers running IOS-XE, each with two multi-point tunnels
   iBGP used for routing, with the cores as RR
   iBGP to distribute labels for MPLS
   global table is the DMVPN underlay only (100.64.0.0/10)
   FRONT-DOOR vrf for tunnels to the internet
   MGMT-VRF for management
   CUST-00000 - L3 VPN w/multicast (192.168.0.0/16)

Edge CE/PE
   Two service provider VRF's
   iBGP sessions to each RR
   IBGP session to the RR loopback for MDT
   FRONT-DOOR for Ethernet uplink
   CELL-DOOR for 4g/5g uplink
   CUST-00000 - L3 VPN w/multicast (192.168.0.0/16)
   global table is the DMVPN underlay only
   PIM for underlay on tunnel interfaces
   All traffic routes via the core, no edge to edge breakout

configs

Core 1

version 17.12
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform qfp utilization monitor load 80
no platform punt-keepalive disable-kernel-core
platform sslvpn use-pd
platform console serial
!
hostname CORE-1
!
boot-start-marker
boot system bootflash:c8000v-universalk9.17.12.04a.SPA.bin
boot-end-marker
!
!
vrf definition CUST-00000
 description Customer 00000 - Mvpn for DAMM radios
 ipv4 multicast multitopology
 rd 64512:0
 route-target export 64512:100000
 route-target import 64512:100000
 !
 address-family ipv4
  mdt default 232.0.1.69
  bgp next-hop Loopback0
 exit-address-family
 !
 address-family ipv4 multicast
  topology customer-000000
   all-interfaces
  !
 exit-address-family
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication login vpnclient local
aaa authorization console
aaa authorization config-commands
aaa authorization exec default local
aaa authorization network localgroups local
!
aaa session-id common
no process cpu autoprofile hog
!
ip vrf FRONT-DOOR
 description Front-Door VRF only for public
 rd 62000:1
!
ip multicast-routing distributed
ip multicast-routing vrf CUST-00000 distributed
ip multicast longest-match
!
no ip domain lookup
ip domain name keekles.org
!
login on-failure log
login on-success log
!
subscriber templating
vtp version 1
!
mpls label mode all-vrfs protocol bgp-vpnv4 per-vrf
no mpls ip propagate-ttl
multilink bundle-name authenticated
!
license udi pid CSR1000V sn 9WCP1VOJDCN
license boot level ax
archive
 log config
  record rc
  logging enable
  logging size 400
 path bootflash:archive/
 maximum 14
 time-period 5
memory free low-watermark processor 71477
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username ${USER1} privilege 15 secret 9 
!
redundancy
!
crypto ikev2 proposal IKEv2-VPN
 encryption aes-cbc-256
 integrity sha512
 group 19
!
crypto ikev2 policy IKEv2-VPN-POLICY
 match fvrf FRONT-DOOR
 proposal IKEv2-VPN
!
crypto ikev2 keyring NOI-DMVPN
 peer REMOTE-ROUTERS
  description REMOTE-ROUTERS
  address 0.0.0.0 0.0.0.0
  pre-shared-key ${PSK}
 !
!
crypto ikev2 profile IKEv2-VPN-PROFILE
 match fvrf FRONT-DOOR
 match address local 23.149.104.20
 match identity remote address 0.0.0.0
 authentication remote pre-share
 authentication local pre-share
 keyring local NOI-DMVPN
 no lifetime certificate
 ivrf FRONT-DOOR
!
crypto ikev2 fragmentation
!
cdp run
!
crypto ipsec transform-set AES256 esp-aes 256 esp-sha512-hmac
 mode transport
!
crypto ipsec profile IPSEC-PROF-DMVPN
 set transform-set AES256
 set ikev2-profile IKEv2-VPN-PROFILE
!
crypto ipsec profile IPSEC-PROF-STATIC
 set transform-set AES256
 set ikev2-profile IKEv2-VPN-PROFILE
!
interface Loopback0
 description PROVIDER-LOOPBACK
 ip address 100.120.0.1 255.255.255.255
 ip pim nbma-mode
 ip pim sparse-mode
 ip igmp join-group 232.0.0.1 source 100.120.0.1
!
interface Loopback1
 description PROVIDER-ANYCAST-RP
 ip address 100.120.1.1 255.255.255.255
 ip pim sparse-mode
!
interface Loopback100000
 description CUST-00000 INTERCONNECT
 vrf forwarding CUST-00000
 ip address 192.168.0.1 255.255.255.255
 ip pim sparse-dense-mode
 ip igmp join-group 226.0.0.1
 shutdown
!
interface Loopback200000
 description CUST-00000 ANYCAST RP
 vrf forwarding CUST-00000
 ip address 192.168.0.0 255.255.255.255
 ip pim nbma-mode
 ip pim sparse-dense-mode
 shutdown
!
interface Tunnel11
 description CORE-1 PRIMARY DMVPN TUNNEL
 ip address 100.122.0.1 255.255.192.0
 no ip redirects
 ip mtu 1400
 ip pim dr-priority 4294967294
 ip pim nbma-mode
 ip pim sparse-mode
 ip nhrp authentication NOI-KEY
 ip nhrp network-id 11
 ip tcp adjust-mss 1360
 cdp enable
 ipv6 mtu 1400
 ipv6 tcp adjust-mss 1340
 ipv6 nhrp authentication NOI-KEY
 ipv6 nhrp network-id 11
 mpls bgp forwarding
 llp nhrp map multicast dynamic
 tunnel source GigabitEthernet1
 tunnel mode gre multipoint
 tunnel key 11
 tunnel vrf FRONT-DOOR
!
interface Tunnel12
 description CORE-1 SECONDARY DMVPN TUNNEL
 ip address 100.122.64.1 255.255.192.0
 no ip redirects
 ip mtu 1400
 ip pim dr-priority 10
 ip pim nbma-mode
 ip pim sparse-mode
 ip nhrp authentication NOI-KEY
 ip nhrp network-id 12
 ip tcp adjust-mss 1360
 shutdown
 cdp enable
 ipv6 mtu 1400
 ipv6 tcp adjust-mss 1340
 ipv6 nhrp authentication NOI-KEY
 ipv6 nhrp network-id 12
 mpls bgp forwarding
 llp nhrp map multicast dynamic
 tunnel source GigabitEthernet1
 tunnel mode gre multipoint
 tunnel key 12
 tunnel vrf FRONT-DOOR
 tunnel protection ipsec profile IPSEC-PROF-DMVPN shared
!
interface Tunnel1122
 description GRE TUNNEL to CORE-2
 ip address 100.120.255.1 255.255.255.252
 no ip redirects
 ip mtu 1452
 ip pim sparse-mode
 shutdown
 cdp enable
 mpls bgp forwarding
 tunnel source GigabitEthernet1
 tunnel destination 23.149.104.21
 tunnel vrf FRONT-DOOR
 tunnel protection ipsec profile IPSEC-PROF-STATIC
!
interface GigabitEthernet1
 ip vrf forwarding FRONT-DOOR
 ip address 23.149.104.20 255.255.255.224
 negotiation auto
 vrrp 12 description VRRP-FOR-NMS
 no mop enabled
 no mop sysid
!
interface GigabitEthernet2
 ip address 100.120.255.130 255.255.255.240
 ip pim sparse-dense-mode
 ip igmp version 3
 negotiation auto
 vrrp 12 description VRRP-FOR-NMS
 vrrp 12 ip 100.120.255.129
 vrrp 12 priority 110
 no mop enabled
 no mop sysid
!
interface GigabitEthernet3
 vrf forwarding CUST-00000
 ip address 192.168.255.1 255.255.255.252
 ip pim sparse-dense-mode
 negotiation auto
 cdp enable
 no mop enabled
 no mop sysid
!
router bgp 64512
 bgp router-id interface Loopback0
 bgp log-neighbor-changes
 bgp listen range 100.120.255.0/30 peer-group HUB
 bgp listen range 100.120.0.0/14 peer-group SPOKES
 neighbor SPOKES peer-group
 neighbor SPOKES remote-as 64512
 neighbor SPOKES ebgp-multihop 255
 neighbor SPOKES transport connection-mode passive
 neighbor SPOKES update-source Loopback0
 neighbor HUB peer-group
 neighbor HUB remote-as 64512
 neighbor 100.120.255.2 remote-as 64512
 neighbor 100.120.255.2 peer-group HUB
 !
 address-family ipv4
  network 0.0.0.0
  redistribute connected
  neighbor SPOKES activate
  neighbor SPOKES send-community both
  neighbor SPOKES route-reflector-client
  neighbor SPOKES next-hop-self all
  neighbor SPOKES send-label
  neighbor HUB activate
  neighbor HUB send-community both
  neighbor HUB next-hop-self
  neighbor HUB send-label
  neighbor 100.120.255.2 activate
 exit-address-family
 !
 address-family vpnv4
  neighbor SPOKES activate
  neighbor SPOKES send-community both
  neighbor SPOKES route-reflector-client
  neighbor SPOKES next-hop-self all
  neighbor HUB activate
  neighbor HUB send-community both
  neighbor 100.120.255.2 activate
 exit-address-family
 !
 address-family ipv4 mdt
  neighbor SPOKES activate
  neighbor SPOKES send-community both
  neighbor SPOKES next-hop-self all
  neighbor HUB activate
  neighbor HUB send-community both
  neighbor HUB next-hop-self all
 exit-address-family
 !
 address-family ipv4 vrf CUST-00000
  redistribute connected route-map CUST-00000-ROUTES
  redistribute static route-map CUST-00000-ROUTES
 exit-address-family
!
ip forward-protocol nd
!
ip pim rp-address 100.120.1.1 override
ip pim send-rp-announce Loopback1 scope 32 group-list 10
ip pim vrf CUST-00000 rp-address 192.168.255.255 override
ip pim vrf CUST-00000 register-source Loopback100000
ip msdp peer 100.120.0.2 connect-source Loopback0
ip msdp cache-sa-state
ip msdp originator-id Loopback0
ip msdp vrf CUST-00000 peer 192.168.0.2 connect-source Loopback100000
ip msdp vrf CUST-00000 cache-sa-state
ip msdp vrf CUST-00000 originator-id Loopback100000
no ip http server
no ip http secure-server
ip http client source-interface Loopback0
ip route 0.0.0.0 0.0.0.0 Null0
ip route vrf CUST-00000 192.168.255.255 255.255.255.255 192.168.255.2
ip route vrf FRONT-DOOR 0.0.0.0 0.0.0.0 23.149.104.1
ip ssh bulk-mode 131072
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh pubkey-chain
  username bryan
   key-hash ssh-rsa FD61A6D6FFD817666D6E420C5E7029CB
   key-hash ssh-ed25519 286A947512A7C2CB9B1E0FAF2D61998B bryan@bryanfields.net
!
ip access-list standard CUST-00000-NEXT-HOP-SELF-ACL
 10 permit 192.168.0.0 0.0.0.255
 20 permit 192.168.255.0 0.0.0.255
ip access-list standard VTY
 10 permit 192.168.0.0 0.0.255.255
 20 permit 100.64.0.0 0.63.255.255
 30 permit 44.98.0.0 0.0.255.255
 40 permit 199.47.174.0 0.0.0.255
 50 permit 23.149.104.0 0.0.0.255
 60 permit 100.120.255.128 0.0.0.7
ip access-list standard snmp-acl
 10 permit 100.120.255.128 0.0.0.7
!
ip access-list standard 10
 10 permit 224.0.0.0 15.255.255.255
ip access-list standard 20
 10 deny   224.0.1.39
 20 deny   224.0.1.40
 30 permit 224.0.0.0 15.255.255.255
ip access-list extended 2000
 10 permit igmp any any
 20 permit pim any any
 30 permit icmp any any
!
route-map CUST-00000-ROUTES permit 10
 match ip address CUST-00000-NEXT-HOP-SELF-ACL
 set ip next-hop 100.120.0.1
!
snmp-server group radio v3 priv access snmp-acl
snmp-server trap-source Loopback0
snmp-server source-interface informs Loopback0
snmp ifmib ifindex persist
!
!
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
!
line con 0
 stopbits 1
line aux 0
line vty 0
 access-class VTY in vrf-also
 exec-timeout 180 0
 transport input ssh
line vty 1
 access-class VTY in vrf-also
 exec-timeout 180 0
 length 0
 transport input ssh
line vty 2 4
 access-class VTY in vrf-also
 exec-timeout 180 0
 transport input ssh
line vty 5 15
 access-class VTY in vrf-also
 exec-timeout 180 0
 transport input ssh
line vty 16 97
 access-class VTY in vrf-also
 transport input ssh
!
call-home
 ! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
 ! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
 contact-email-addr sch-smart-licensing@cisco.com
 profile "CiscoTAC-1"
  active
  destination transport-method http
ntp logging
ntp source GigabitEthernet1
ntp server vrf FRONT-DOOR 45.79.214.107
ntp server vrf FRONT-DOOR 138.236.128.36
ntp server vrf FRONT-DOOR 50.205.57.38
ntp server vrf FRONT-DOOR 144.202.41.38

end

Bryan


version 17.9
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
!
hostname bryan-ir1101
!
boot-start-marker
boot system flash bootflash:ir1101-universalk9.17.09.06.SPA.bin
boot-end-marker
!
!
vrf definition CUST-00000
 description Customer 00000 - Mvpn for DAMM radios
 rd 64512:0
 route-target export 64512:100000
 route-target import 64512:100000
 !
 address-family ipv4
  mdt default 232.0.1.69
  mdt mtu 1400
  bgp next-hop Loopback0
 exit-address-family
!
aaa new-model
!
!
aaa authentication login default local
aaa authentication login vpnclient local
aaa authorization console
aaa authorization config-commands
aaa authorization exec default local
aaa authorization network localgroups local
!
!
aaa session-id common
!
ip vrf FRONT-DOOR
 description Front-Door VRF only for public
 rd 62000:1
!
ip multicast-routing distributed
ip multicast-routing vrf CUST-00000 distributed
!
!
!
!
!
!
ip name-server vrf FRONT-DOOR 1.1.1.1
no ip domain lookup
ip domain name keekles.org
!
ip dhcp pool CUST-00000-00
 vrf CUST-00000
 network 192.168.4.0 255.255.255.0
 default-router 192.168.4.1
 dns-server 1.1.1.1
 lease 0 0 15
!
!
!
login block-for 60 attempts 3 within 30
login delay 3
login on-failure log
login on-success log
ipv6 unicast-routing
!
no mpls ip propagate-ttl
multilink bundle-name authenticated
!
!

license feature hseck9
license udi pid IR1101-K9 sn FCW22260069
license boot level network-advantage
license smart transport callhome
archive
 log config
  record rc
  logging enable
  logging size 400
 path bootflash:archive/
 maximum 14
memory free low-watermark processor 45309
!
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
!
!
username nnnnnn privilege 15 secret 9 
!
redundancy
!
crypto ikev2 proposal IKEv2-VPN
 encryption aes-cbc-256
 integrity sha512
 group 19
!
crypto ikev2 policy IKEv2-VPN-POLICY
 match fvrf FRONT-DOOR
 proposal IKEv2-VPN
!
crypto ikev2 keyring NOI-DMVPN
 peer REMOTE-ROUERS
 !
 peer CORE-1
  description CORE-1
  address 23.149.104.20
  pre-shared-key <PSK>
 !
 peer CORE-2
  description CORE-2
  address 23.149.104.21
  pre-shared-key <PSK>
 !
!
!
crypto ikev2 profile IKEv2-VPN-PROFILE
 match fvrf FRONT-DOOR
 match identity remote address 23.149.104.20 255.255.255.255
 match identity remote address 23.149.104.21 255.255.255.255
 authentication remote pre-share
 authentication local pre-share
 keyring local NOI-DMVPN
 no lifetime certificate
!
crypto ipsec transform-set AES256 esp-aes 256 esp-sha512-hmac
 mode transport
!
crypto ipsec profile IPSEC-PROF-DMVPN
 set transform-set AES256
 set ikev2-profile IKEv2-VPN-PROFILE
!
interface Loopback0
 ip address 100.120.0.64 255.255.255.255
 ip pim sparse-mode
 ip igmp join-group 224.1.1.10
!
interface Tunnel11
 ip address 100.122.0.64 255.255.192.0
 no ip redirects
 ip mtu 1400
 ip pim dr-priority 0
 ip pim sparse-mode
 ip nhrp authentication NOI-KEY
 ip nhrp map 100.122.0.1 23.149.104.20
 ip nhrp map multicast 23.149.104.20
 ip nhrp network-id 11
 ip nhrp nhs 100.122.0.1
 ip tcp adjust-mss 1360
 cdp enable
 ipv6 enable
 ipv6 mtu 1400
 ipv6 tcp adjust-mss 1340
 ipv6 nhrp authentication NOI-KEY
 ipv6 nhrp network-id 11
 mpls bgp forwarding
 llp nhrp map multicast 23.149.104.20
 tunnel source GigabitEthernet0/0/0
 tunnel destination 23.149.104.20
 tunnel key 11
 tunnel vrf FRONT-DOOR
!
interface Tunnel12
 no ip address
 ip pim sparse-mode
!
interface Tunnel21
 ip address 100.123.0.64 255.255.192.0
 no ip redirects
 ip mtu 1400
 ip pim sparse-mode
 ip nhrp authentication NOI-KEY
 ip nhrp map 100.123.0.1 23.149.104.21
 ip nhrp map multicast 23.149.104.21
 ip nhrp network-id 21
 ip nhrp nhs 100.123.0.1
 ip tcp adjust-mss 1360
 shutdown
 cdp enable
 ipv6 enable
 ipv6 mtu 1400
 ipv6 tcp adjust-mss 1340
 ipv6 nhrp authentication NOI-KEY
 ipv6 nhrp network-id 21
 mpls bgp forwarding
 llp nhrp map multicast 23.149.104.21
 tunnel source GigabitEthernet0/0/0
 tunnel destination 23.149.104.21
 tunnel key 21
 tunnel vrf FRONT-DOOR
 tunnel protection ipsec profile IPSEC-PROF-DMVPN ikev2-profile IKEv2-VPN-PROFILE
!
interface GigabitEthernet0/0/0
 ip vrf forwarding FRONT-DOOR
 ip address dhcp
 ip nat outside
 ipv6 dhcp client request vendor
 ipv6 address autoconfig default
!
interface FastEthernet0/0/1
 switchport access vlan 100
 switchport mode access
!
interface FastEthernet0/0/2
!
interface FastEthernet0/0/3
!
interface FastEthernet0/0/4
!
interface Cellular0/1/0
 ip address negotiated
 ip tcp adjust-mss 1460
 dialer in-band
 dialer idle-timeout 0
 dialer watch-group 1
 ipv6 address dhcp
 ipv6 enable
 pulse-time 1
!
interface Cellular0/1/1
 no ip address
 shutdown
!
interface Vlan1
 no ip address
!
interface Vlan100
 vrf forwarding CUST-00000
 ip address 192.168.4.1 255.255.255.0
 ip pim sparse-dense-mode
 ip igmp join-group 226.0.0.64
 ip igmp version 3
 no autostate
!
interface Async0/2/0
 no ip address
 encapsulation scada
!
interface vasileft1
 vrf forwarding CUST-00000
 ip address 100.126.1.1 255.255.255.248
 ip nat inside
 no keepalive
!
interface vasiright1
 ip vrf forwarding FRONT-DOOR
 ip address 100.126.1.2 255.255.255.248
 ip nat inside
 no keepalive
!
router bgp 64512
 bgp router-id interface Loopback0
 bgp log-neighbor-changes
 neighbor 100.120.0.1 remote-as 64512
 neighbor 100.120.0.1 ebgp-multihop 255
 neighbor 100.120.0.1 update-source Loopback0
 neighbor 100.122.0.1 remote-as 64512
 neighbor 100.122.0.1 ebgp-multihop 255
 neighbor 100.123.0.1 remote-as 64512
 neighbor 100.123.0.1 shutdown
 neighbor 100.123.0.1 ebgp-multihop 255
 !
 address-family ipv4
  network 100.120.0.0 mask 255.252.0.0
  redistribute connected
  no neighbor 100.120.0.1 activate
  neighbor 100.122.0.1 activate
  neighbor 100.122.0.1 send-label
  neighbor 100.123.0.1 activate
  neighbor 100.123.0.1 send-label
 exit-address-family
 !
 address-family ipv4 mvpn
 exit-address-family
 !
 address-family vpnv4
  neighbor 100.122.0.1 activate
  neighbor 100.122.0.1 send-community both
  neighbor 100.123.0.1 activate
  neighbor 100.123.0.1 send-community both
 exit-address-family
 !
 address-family vpnv4 multicast
 exit-address-family
 !
 address-family ipv4 mdt
  neighbor 100.120.0.1 activate
  neighbor 100.120.0.1 send-community both
  neighbor 100.122.0.1 activate
  neighbor 100.122.0.1 send-community extended
  neighbor 100.123.0.1 activate
  neighbor 100.123.0.1 send-community extended
 exit-address-family
 !
 address-family ipv4 vrf CUST-00000
  redistribute connected route-map CUST-00000-ROUTES
 exit-address-family
!
ip forward-protocol nd
no ip http server
ip http auth-retry 3 time-window 1
ip http authentication local
ip http secure-server
ip pim rp-address 100.120.1.1 override
ip pim vrf CUST-00000 rp-address 192.168.255.255 override
ip pim vrf CUST-00000 send-rp-announce Vlan100 scope 32 group-list 10
ip pim vrf CUST-00000 send-rp-discovery Vlan100 scope 32
ip pim vrf CUST-00000 register-source BDI100
ip nat inside source list CUST-00000-NAT interface GigabitEthernet0/0/0 vrf FRONT-DOOR overload
ip route vrf CUST-00000 0.0.0.0 0.0.0.0 vasileft1 100.126.1.2
ip route vrf FRONT-DOOR 192.168.4.0 255.255.255.0 vasiright1 100.126.1.1
ip route vrf FRONT-DOOR 0.0.0.0 0.0.0.0 dhcp
ip ssh time-out 60
ip ssh authentication-retries 2
ip ssh version 2
ip ssh pubkey-chain
  username <USER>
   key-hash ssh-ed25519 <hash> 
!
!
ip access-list standard CUST-00000-ROUTE-ACL
 10 permit 192.168.0.0 0.0.255.255
ip access-list standard VTY
 10 permit 192.168.0.0 0.0.255.255
 20 permit 100.64.0.0 0.63.255.255
 30 permit 44.98.0.0 0.0.255.255
 40 permit 199.47.174.0 0.0.0.255
 50 permit 23.149.104.0 0.0.0.255
 60 permit 100.120.255.128 0.0.0.7
ip access-list standard snmp-acl
 10 permit 100.120.255.128 0.0.0.7
!
ip access-list extended CUST-00000-NAT
 10 permit ip 192.168.4.0 0.0.0.255 any
!
ip access-list standard 1
 10 permit any
ip access-list standard 10
 10 permit 224.0.0.0 15.255.255.255
ip access-list standard 20
 10 deny   224.0.1.39
 20 deny   224.0.1.40
 30 permit 224.0.0.0 15.255.255.255
ip access-list extended 101
 10 permit ip any host 23.149.104.20
dialer watch-list 1 ip 5.6.7.8 255.255.255.255
dialer watch-list 1 delay route-check initial 60
dialer-list 1 protocol ip list 1
!
route-map CUST-00000-ROUTES permit 10
 match ip address CUST-00000-ROUTE-ACL
!
snmp-server group radio v3 priv access snmp-acl
snmp-server trap-source Loopback0
snmp-server source-interface informs Loopback0
snmp ifmib ifindex persist
!
line con 0
 stopbits 1
 speed 115200
line 0/0/0
line 0/2/0
line vty 0 4
 access-class VTY in vrf-also
 exec-timeout 180 0
 transport input all
line vty 5 97
 access-class VTY in vrf-also
 exec-timeout 180 0
 transport input all
line vty 98 817
 exec-timeout 180 0
 transport input all
!
call-home
 ! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
 ! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
 contact-email-addr sch-smart-licensing@cisco.com
 source-interface GigabitEthernet0/0/0
 profile "CiscoTAC-1"
  active
  destination transport-method http
ntp logging
ntp master
ntp server vrf FRONT-DOOR 45.79.214.107
ntp server vrf FRONT-DOOR 138.236.128.36
ntp server vrf FRONT-DOOR 162.248.241.94
ntp server vrf FRONT-DOOR 172.104.193.207
ntp server vrf FRONT-DOOR ip pool.ntp.org
end

NO