Project Supertubes Network Implementation Plan Change History & Revisions Version Date Status 1.0 07/06/04 Initial Draft HIGHLY CONFIDENTIAL CHANGE HISTORY & REVISIONS Section Author Summary of Changes Changes TB n/a “Project Supertubes” n/a Page 1 of 28 Table of Contents CHANGE HISTORY & REVISIONS .................................................................................................................................. 1 TABLE OF CONTENTS ............................................................................................................................................. 2 1. PROJECT DESCRIPTION ................................................................................................................................. 3 2. CONTACT LIST .................................................................................................................................................. 3 3. ASSUMPTIONS / DEPENDENCIES ................................................................................................................. 3 4. INTERNETWORK DESIGN .............................................................................................................................. 4 4.1. 4.2 4.3 DESIGN CONCEPT .............................................................................................................................................. 4 CAPACITY ......................................................................................................................................................... 5 INTERNETWORK DIAGRAMS .............................................................................................................................. 6 5. MANAGEMENT .................................................................................................................................................. 7 6. SECURITY............................................................................................................................................................ 7 7. HARDWARE LIST .............................................................................................................................................. 9 8. INSTALLATION .................................................................................................................................................. 9 9. TEST AND INSTALL. ......................................................................................................................................... 9 10. MIGRATION PROCESS. ........................................................................................................................... 10 11. FALLBACK.................................................................................................................................................. 11 APPENDIX A – ROUTER/SWITCH/COMPONENT CONFIGURATIONS ...................................................... 11 APPENDIX B – INTERFACE AND ROUTING TABLE ....................................................................................... 26 APPENDIX C – CATALYST SWITCH PORT ALLOCATION ........................................................................... 28 HIGHLY CONFIDENTIAL “Project Supertubes” Page 2 of 28 1. Project Description The goal of this project is deploy BT’s Edgeless L2TP product at Centrica’s datacentre at Harbour Exchange and to migrate all existing users deployed on BT Central 155 pipes onto the new service. This document describes the network configuration that will deliver the product and the migration process to populate the new service. 2. Contact List Function Sign Off Review Review Review Name Phil Whelan Tony Beltram Nancy Lee Darren Turnbull Email phil@blatero.com tonybeltram@onetel.net.uk nancy@onetel.net Darren.Turnbull@onetel.co.u k Phone 07766710158 07901 855202 3. Assumptions / Dependencies BT Central L2TP ‘Edgeless’ 622 will be installed at the Harbour Exchange datacentre. The BT Central product will conform to the standards in BT SIN document 412. 2 x 8-port Gigabit modules (WS-X6408A-GBIC) in storage will be deployed to create Gigabit port-density in the core. 3 x Cisco 7206-NPE-G1 routers will be sufficient to terminate the maximum number of DSL users permitted on the 622MB pipe (25,600) If the Cisco routers do not perform as advised, further routers will be sourced and deployed as LNS’s. A new RADIUS platform will be deployed to provide customer AAA service on the new pipe. The current RADIUS platform will continue to be used for existing DLS pipes in the short term. Customers currently receive static IP addresses for their WAN interface. Customers on the new pipe will receive a WAN interface address from a dynamic pool unless they specifically request a static IP. Some customers (‘No-NAT’ users) have static subnet attributes in RADIUS in addition to WAN IP addresses. These subnets will be renumbered from a section of the new range reserved for the purpose. HIGHLY CONFIDENTIAL “Project Supertubes” Page 3 of 28 4. Internetwork Design 4.1. Design Concept L2TP BT will deliver calls to the Onetel LTS farm according to user domain. LTS’s will query Onetel RADIUS to determine the tunnel endpoint. We will deploy 3 LNS’s Each LNS will have two vpdn groups configured with a different virtual template. This will provide two tunnel endpoints per LNS. Additional LNS’s can be deployed if load is too high. RADIUS Customer AAA operations will be via RADIUS RADIUS will be configured with primary and backup tunnel endpoints such that 4 endpoints will always be available should a single LNS fail. The username and password for tunnel authentication will be returned to the LTS by RADIUS. Customers will receive an IP address for their WAN interface from a dynamic pool. The pools will be configured on the LNS from a new RIPE allocation. No-NAT customers will have their static subnets returned as attributes by RADIUS. Connectivity Two delivery routers, SGRS-SP1 and SGRS-SP2 will connect the ISP network to two BT catalyst 3550 switches, SGRS-BT-NTE1 and SGRS-BT-NTE2. LNS’s will have 2 interfaces connected to separate VLANs (50 and 51) routed by the core switches. SGRS-SP1 and SGRS-SP2 will have links to the Onetel core switches, SGRS-CORE1 and SGRS-CORE2. These links will be in VLAN 50. SGRS-SP1 and SGRS-SP2 will be directly connected by a crossover cable. Routing eBGP will be used to route traffic between BT and Onetel networks. SGRS-SP1 and SGRS-SP2 will run iBGP across the dedicated link. Private AS numbers will be used as follows: BT 65500 Onetel 64555 Route exchange between AS 65500 and 64555 will be filtered using filter lists. EIGRP process 10 will provide internal routing for SGRS-SP1, SGRS-SP2 and LNS’s. Routes known in BGP AS 64555 will be redistributed into EIGRP 10 by the SP routers. A distribute list will filter the routes accepted into EIGRP 10. Users’ WAN interfaces will appear as ‘directly connected’ host routes on the LNS’s while they have an active connection. When they disconnect the host route will disappear. The LNS will redistribute the host routes by default into EIGRP. LNS’s will be configured to summarise the user pools on Ethernet interfaces to ensure the host routes do not cause instability in the EIGRP routing domain. IP route attributes returned by RADIUS for ‘No-NAT’ customers will appear to the LNS as static routes. The customer could connect to any LNS. HIGHLY CONFIDENTIAL “Project Supertubes” Page 4 of 28 Private AS 64556 will be created on the LNSs with a full iBGP mesh so that they can share information about No-NAT static routes. LNSs will be configured to redistribute static routes into BGP 64556. Summary routes on the LNS Ethernet interfaces will include the No-NAT ranges. Default routes to border routers in AS12708 are redistributed into EIGRP. SP routers and LNS’s will learn their default gateways in this way. Resilience Hardware will be deployed in two cabinets with separate power supply. Redundant chassis are deployed in the core. At present there are no redundant routing modules. HSRP will be configured for fast failover on the local LAN. RADIUS servers have dual NICs with redundant links to the core. A secondary RADIUS server is deployed as a backup. LNS’s will have two Gigabit Ethernet interfaces patched into separate core switches for resilience. Port allocation on the core switch will be split across Gigabit modules. This will provide resilient uplinks for LNS’s if a chassis or module should fail in the core. BT SIN 412 recommends deploying ‘at least 4 tunnel end-points so as not to cause congestion on equipment at the IPStream PoP site’. We will meet this requirement by deploying 3 LNS’s each with 2 tunnels. This is will ensure that should an LNS fail we can still supply four tunnel endpoints. RADIUS will be configured to round-robin through 4 LNS addresses with each endpoint having a backup on a second router. Two sets of eBGP peers will provide resilient routing between Onetel and BT networks. Two SP routers with uplinks to different core switches provide a resilient path to the core. A dedicated iBGP link between SP routers supplies a redundant path in case of failure of an SP, NTE or its interface/link. Further 622 L2TP installations will be deployed at the ISP’s second datacentre to provide cross site resilience. New pipes will be commissioned as the customer base expands. 4.2 Capacity BT employs a strict policy to limit bandwidth to 622MB. Therefore deploying Gigabit Ethernet throughout will provide sufficient throughput. The maximum number of concurrent users sessions accepted by BT is 25,600. The number of users provisioned on the service will depend on the customer usage profile and the products offered. Each LNS can support a maximum 16,000 simultaneous user sessions. Three LNS’s will give us sufficient capacity for 25,600 users with resilience for loss of a single LNS. Should three LNS’s prove insufficient then further routers can be added as required. Expansion of the service in the long term will be achieved by deploying further L2TP 622 services on identical sets of equipment. Pipes will be divided evenly between two datacentres. HIGHLY CONFIDENTIAL “Project Supertubes” Page 5 of 28 4.3 Internetwork Diagrams WWW SGRS-BDR1 SGRS-BDR2 212.67.120.80/30 .82 212.67.120.84/30 .86 RADIUS .121 VLAN 42 10.240.232.0 .85 .2 .83 .3 HSRP .1 SGRS-CORE1 SGRS-CORE2 .92 .76 .93 HSRP.94 .77 VLAN51 212.67.121.80/28 SGRS LNS1 .81 SGRS LNS2 .65 SGRS LNS3 .82 .66 .83 .67 VLAN 50 212.67.121.64/28 .74 HSRP.78 .75 SGRS-SP1 SGRS-SP2 212.67.121.60/30 212.67.121.16/29 .18 .62 212.67.121.24/29 .61 .17 .25 .26 BT NTE 3550-2 BT NTE 3550-1 BT 212.67.121.32/28 .32 .34 .33 .36 .35 .38 .37 .40 .39 .42 .41 .43 BT LTS Loopback 0 Interfaces Network Infrastructure HIGHLY CONFIDENTIAL “Project Supertubes” Page 6 of 28 MFN AS 6461 BandX AS12885 eBGP eBGP iBGP SGRS-BDR1 SGRS-BDR2 Onetel AS 12708 EIGRP 10 SGRS-CORE1 SGRS-CORE2 REDISTRIBUTE STATIC Onetel AS 64556 SGRS LNS1 SGRS LNS2 iBGP SGRS LNS3 iBGP iBGP Onetel AS 64555 iBGP SGRS-SP1 SGRS-SP2 eBGP eBGP BT AS 65500 BT NTE 3550-2 BT NTE 3550-1 Routing Processes 5. Management Three methods of remote management will be used: SSH via dedicated ISP management circuit. SSH via VPN connection to c3005 concentrator. OOB access via a terminal server 6. Security AAA process will be as follows: HIGHLY CONFIDENTIAL “Project Supertubes” Page 7 of 28 Customers’ PPP sessions will use CHAP/PAP. The BT LAC will determine from the user domain name that the session should be directed at the Onetel LTS cluster. The LTS will do an initial RADIUS query for the address of the L2TP tunnel endpoint (LNS). The LTS will obtain tunnel authentication data from RADIUS. The LNS will have per-vpdn group hostname and passwords configured for tunnel authentication. Once the tunnel is up the LNS will obtain AAA services for user connections via RADIUS. A secondary RADIUS server will be specified for failover. AAA services for vty connections will be via tacacs and command line activity will be logged. The local db will be used for aux and console connections. Industry standard policies will be used to lock down routers, i.e.: The following services will be disabled: Finger PAD MOP Small Servers BOOTP CDP IP Source Route Gratuitous ARP IP Redirect IP Directed Broadcast IP Unreachables HTTP server Vty access will be via SSH and vty line will have access class set. Password encryption service will be enabled. Enable secret will be set. Standard Onetel ISP login banner will be configured. Syslog will be time stamped and stored on a syslog server. SNMP will have access-class applied in addition to filtering in ACLs. RO string will be non-default. RW string will be disabled. Unicast RPF and anti-spoofing ACLs will be enabled on SP routers. ACLs will be deployed: inbound on SGRS-SP1 and SGRS-SP2 links to NTE’s outbound on LNS links to the core. On vty lines MD5 password protection will be used on BGP and HSRP sessions. Filter or distribute lists will be used to control which routes are accepted by neighbour routers. HIGHLY CONFIDENTIAL “Project Supertubes” Page 8 of 28 7. Hardware List Quantity 5 Manufacturer Cisco Model 7206 5 Cisco - 5 Cisco - 12 Cisco 1000-SX GBIC Part Number 7206VXR & NPE-G1 MEM-NPE-G1512MB MEM-NPE-G1FLD64 WS-G5484 Comment 2 x SP, 3 x LNS 2 x 512 MB memory option for 7204 64MB flash option for 7204 Gigabit interface converters. 8. Installation Location The hardware will be installed in Centrica’s datacentre at: 6/7, Harbour Exchange, London, E14 9GE. The installation will occupy 50% of racks H6 and H7. This space will be allocated as follows: Router SGRS-CORE1 SGRS-CORE2 SGRS-SP1 SGRS-SP2 LNS1 LNS2 LNS3 SGRS-NTE-1 SGRS-NTE-2 SHDS1 SHDS2 Rack Number H11 H9 H6 H7 H6 H7 H6 H7 H7 H7 H7 Rack Size Already Installed Already Installed 4U 4U 4U 4U 4U 1U 1U 1U 1U Patching Connectivity will be by Gigabit Ethernet 1000-BaseSX, SC termination. Patching at the datacentre employs a central fibre patch cabinet from which other cabinets can be interconnected. There is sufficient patching available in cabs H11, H9 and H6. A further 12 1000-BaseSX ports will be provided in cab H5. 9. Test and Install. 1. Proof of concept testing. Network design and build under lab conditions. Testing will verify: BGP routing between Onetel and BT AS’s. HIGHLY CONFIDENTIAL “Project Supertubes” Page 9 of 28 Injection of routes from BGP into EIGRP Connectivity to RADIUS. Tunnel establishment between LNS and LTS. Customer AAA operations. Sharing of directly connected and static routes between LNS’s. Routing to customer WAN addresses and static subnets. Successful failover following the loss of a single element (LTS, LNS, NTE, SP, CORE, RADIUS server) 2. Network Install The Network as described above will be built into the datacentre at Harbour Exchange. The new infrastructure will be built onto 2 test switches initially. Routing and connectivity will be verified. The new networks will then be connected to the live core during maintenance window. Routing and connectivity will be verified. 3. Service Trial Test accounst will be created with the user domain @centel.com. BT will configure their platform RADIUS to accept centel.com users and direct them the Onetel LTS farm. The following tests will be conducted: Connectivity to BT LTS routers. Tunnel establishment. User authentication. RADIUS accounting. User connectivity test. End to end test of all services offered to customer. Failover from loss of a single device: LNS, SP, NTE, LTS, RADIUS server. Security posture assement. Verify Whoosh test tool. Verify amendments to user accounts are updated to correct RADIUS platform. 4. Service Live Once the service has been tested and approved we will begin commissioning new customers on the 622 pipe. New customers will be provisioned with username in the centel.com domain. BT platform RADIUS will direct centel.com customers to the Onetel LTS farm. LTS’s will query the new RADIUS platform for AAA. Existing users will continue to be authenticated by the current RADIUS. LDAP will be configured to update the correct RADIUS platform when user records are created or amended. 10. Migration Process. The object of the migration is to redeploy existing customers using BT Central 155MB services onto the new 622 pipe. HIGHLY CONFIDENTIAL “Project Supertubes” Page 10 of 28 Procedure A single 155 pipe will be migrated at a time and the process to move one pipe is as follows: Test accounts will be created on the pipe to be migrated. BT will update their platform RADIUS to direct the user domains on the chosen pipe to the Onetel LTS farm. This work takes 15mins to action and requires 5 days notice. LNS’s will be monitored to ensure that users from the migrated pipe are connecting successfully. Test accounts will be used to verify the service. Users connected at the time when the BT platform RADIUS is updated will remain on the 155 pipe. When they disconnect and make a new connection they will be reconnected to the new service. We can request that BT force disconnections if rates of churn are too low. Impact The migration steps will take approx 1 hour to put in place. Back out will be to reverse the changes and will also take 1 hour to complete. Service disruption will occur while the migration is carried out. Dynamic Pool Sizing The 622 L2TP product has a strictly policed limit of 25,600 simultaneous connections. 12,800 IPs per LNS will guarantee sufficient addresses should an LNS fail. 11. Fallback 1. Network Install Shutdown uplinks to core. 2. Service Live Cease provisioning customers with centel.com address. Redirect centel.com users to an existing 155MB IPStream service. 3. Migration BT to re-route customer domain to IPStream service. Appendix A – Router/Switch/Component Configurations SGRS-LNS1#sh run Building configuration... Current configuration : 5300 bytes ! ! Last configuration change at 11:03:50 GMT Tue Sep 14 2004 by cake ! NVRAM config last updated at 11:05:30 GMT Tue Sep 14 2004 by cake ! version 12.3 HIGHLY CONFIDENTIAL “Project Supertubes” Page 11 of 28 service timestamps debug datetime service timestamps log datetime service password-encryption ! hostname SGRS-LNS1 ! boot-start-marker boot-end-marker ! logging buffered 16284 debugging enable secret 5 $1$sSaP$phP429LUuYCMx4Xo0jHah/ ! username isp3ng password 7 0870195E5917000317074D clock timezone GMT 0 aaa new-model ! ! aaa authentication login default group tacacs+ local aaa authentication login console local aaa authentication enable default enable aaa authentication ppp VPDN group radius aaa authorization exec default group tacacs+ local aaa authorization exec console none aaa authorization commands 1 default group tacacs+ if-authenticated none aaa authorization commands 1 console none aaa authorization commands 15 default group tacacs+ local aaa authorization commands 15 console none aaa authorization network default group tacacs+ if-authenticated aaa authorization network VPDN group radius aaa accounting exec default start-stop group tacacs+ aaa accounting exec console none aaa accounting commands 1 default start-stop group tacacs+ aaa accounting commands 1 console none aaa accounting commands 15 default start-stop group tacacs+ aaa accounting commands 15 console none aaa accounting network default start-stop group tacacs+ aaa accounting network VPDN start-stop group radius aaa accounting connection default start-stop group tacacs+ aaa accounting system default start-stop group tacacs+ aaa session-id common ip subnet-zero ! ! ip cef no ip domain lookup ip host lns3 212.67.121.46 ip host lns2 212.67.121.45 ip host core 212.67.121.92 ! ! ip address-pool local vpdn enable ! vpdn-group 1 accept-dialin protocol any virtual-template 1 terminate-from hostname tunnel44 source-ip 212.67.121.44 l2tp tunnel password 7 09585B0717001B465F ! vpdn-group 2 accept-dialin protocol any virtual-template 2 terminate-from hostname tunnel47 source-ip 212.67.121.47 l2tp tunnel password 7 15061E020A2F27707F ! ! ! ! ! ! ! ! ! ! ! ! HIGHLY CONFIDENTIAL “Project Supertubes” Page 12 of 28 ! ! ! ! ! ! ! ! ! interface Loopback0 ip address 212.67.121.44 255.255.255.255 ! interface Loopback1 ip address 212.67.121.47 255.255.255.255 ! interface GigabitEthernet0/1 description SGRS-CORE-01 VLAN 50 g 4/3 ip address 212.67.121.65 255.255.255.240 duplex full speed 1000 media-type gbic negotiation auto ! interface GigabitEthernet0/2 description SGRS-CORE-02 VLAN 51 g 4/3 ip address 212.67.121.81 255.255.255.240 duplex full speed 1000 media-type gbic negotiation auto ! interface GigabitEthernet0/3 no ip address shutdown duplex auto speed auto media-type rj45 no negotiation auto ! interface Virtual-Template1 ip unnumbered Loopback0 no logging event link-status peer default ip address pool default ppp authentication chap VPDN ppp ipcp mask 255.255.255.255 ! interface Virtual-Template2 ip unnumbered Loopback1 no logging event link-status peer default ip address pool default ppp authentication chap VPDN ! router eigrp 10 network 212.67.121.0 no auto-summary ! router bgp 64556 no synchronization bgp log-neighbor-changes redistribute connected redistribute static neighbor LNS-iBGP peer-group neighbor LNS-iBGP remote-as 64556 neighbor LNS-iBGP update-source Loopback0 neighbor LNS-iBGP version 4 neighbor LNS-iBGP next-hop-self neighbor 212.67.121.45 peer-group LNS-iBGP neighbor 212.67.121.46 peer-group LNS-iBGP no auto-summary ! ip local pool default 212.67.122.0 212.67.122.7 ip classless no ip http server no ip http secure-server ! ! ! ip radius source-interface Loopback0 snmp-server community b0ll0cks RO 60 snmp-server location SGRS, London, UK HIGHLY CONFIDENTIAL “Project Supertubes” Page 13 of 28 snmp-server contact isp@onetel.net.uk snmp-server enable traps tty ! tacacs-server host 10.240.240.100 tacacs-server host 10.240.232.120 tacacs-server directed-request tacacs-server key 7 0822445C000A17021E0E1F ! radius-server host 212.67.118.251 auth-port 1645 acct-port 1646 radius-server key 7 097F5B394D3147420916 ! control-plane ! ! ! ! ! ! gatekeeper shutdown ! banner motd ^CC ___________________________________________________________________ | ONE.TEL ISP - NETWORK | | Mailto: isp@onetel.net.uk | |___________________________________________________________________| | This service is for authorised One.Tel staff only | | WARNING: It is a criminal offence to: | | I. Obtain access to data without authority | | II. Damage, delete, alter or insert data without authority | |___________________________________________________________________| ^C ! line con 0 authorization commands 1 console authorization commands 15 console authorization exec console accounting commands 1 console accounting commands 15 console accounting exec console login authentication console transport preferred all transport output all stopbits 1 line aux 0 transport preferred all transport output all stopbits 1 line vty 0 4 exec-timeout 100 0 password 7 0822455D0A16 transport preferred all transport input all transport output all ! ntp clock-period 17180008 ntp server 212.67.96.135 ! end SGRS-LNS1# SGRS-LNS2#sh run Building configuration... Current configuration : 5236 bytes ! ! Last configuration change at 11:05:53 GMT Tue Sep 14 2004 by cake ! NVRAM config last updated at 11:06:00 GMT Tue Sep 14 2004 by cake ! version 12.3 service timestamps debug datetime service timestamps log datetime service password-encryption ! hostname SGRS-LNS2 ! boot-start-marker boot-end-marker HIGHLY CONFIDENTIAL “Project Supertubes” Page 14 of 28 ! enable secret 5 $1$YctC$sZ9vacnbl8d3pdJ92aASu. ! username isp3ng password 7 03550E1B560124584B0558 clock timezone GMT 0 aaa new-model ! ! aaa authentication login default group tacacs+ local aaa authentication login console local aaa authentication enable default enable aaa authentication ppp VPDN group radius aaa authorization exec default group tacacs+ local aaa authorization exec console none aaa authorization commands 1 default group tacacs+ if-authenticated none aaa authorization commands 1 console none aaa authorization commands 15 default group tacacs+ local aaa authorization commands 15 console none aaa authorization network default group tacacs+ if-authenticated aaa authorization network VPDN group radius aaa accounting exec default start-stop group tacacs+ aaa accounting exec console none aaa accounting commands 1 default start-stop group tacacs+ aaa accounting commands 1 console none aaa accounting commands 15 default start-stop group tacacs+ aaa accounting commands 15 console none aaa accounting network default start-stop group tacacs+ aaa accounting network VPDN start-stop group radius aaa accounting connection default start-stop group tacacs+ aaa accounting system default start-stop group tacacs+ aaa session-id common ip subnet-zero ! ! ip cef no ip domain lookup ip host lns3 212.67.121.46 ip host lns1 212.67.121.44 ip host core 212.67.121.92 ! ! vpdn enable ! vpdn-group 1 accept-dialin protocol any virtual-template 1 terminate-from hostname tunnel45 source-ip 212.67.121.45 l2tp tunnel password 7 15061E020A2F27707D ! vpdn-group 2 accept-dialin protocol any virtual-template 2 terminate-from hostname tunnel48 source-ip 212.67.121.48 l2tp tunnel password 7 08355940071C09434A ! ! ! interface Loopback0 ip address 212.67.121.45 255.255.255.255 ! interface Loopback1 ip address 212.67.121.48 255.255.255.255 ! interface GigabitEthernet0/1 description SGRS-CORE-01 VLAN 50 g 4/2 ip address 212.67.121.66 255.255.255.240 duplex full speed 1000 media-type gbic negotiation auto ! interface GigabitEthernet0/2 description SGRS-CORE-02 VLAN 51 g 4/2 ip address 212.67.121.82 255.255.255.240 duplex full speed 1000 HIGHLY CONFIDENTIAL “Project Supertubes” Page 15 of 28 media-type gbic negotiation auto ! interface GigabitEthernet0/3 no ip address shutdown duplex auto speed auto media-type rj45 no negotiation auto ! interface Virtual-Template1 ip unnumbered Loopback0 no logging event link-status peer default ip address pool default ppp authentication chap VPDN ! interface Virtual-Template2 ip unnumbered Loopback1 no logging event link-status peer default ip address pool default ppp authentication chap VPDN ! router eigrp 10 network 212.67.121.0 no auto-summary ! router bgp 64556 no synchronization bgp log-neighbor-changes redistribute connected redistribute static neighbor LNS-iBGP peer-group neighbor LNS-iBGP remote-as 64556 neighbor LNS-iBGP update-source Loopback0 neighbor LNS-iBGP version 4 neighbor LNS-iBGP next-hop-self neighbor 212.67.121.44 peer-group LNS-iBGP neighbor 212.67.121.46 peer-group LNS-iBGP no auto-summary ! ip local pool default 212.67.122.8 212.67.122.15 ip classless no ip http server no ip http secure-server ! ! ! ip radius source-interface Loopback0 snmp-server community b0ll0cks RO 60 snmp-server location SGRS, London, UK snmp-server contact isp@onetel.net.uk snmp-server enable traps tty ! tacacs-server host 10.240.240.100 tacacs-server host 10.240.232.120 tacacs-server directed-request tacacs-server key 7 0822445C000A17021E0E1F ! radius-server host 212.67.118.251 auth-port 1645 acct-port 1646 key 7 120B04131B1E1F radius-server key 7 0538133F75781E591B1F ! control-plane ! ! ! ! ! ! gatekeeper shutdown ! banner motd ^CC ___________________________________________________________________ | ONE.TEL ISP - NETWORK | | Mailto: isp@onetel.net.uk | |___________________________________________________________________| | This service is for authorised One.Tel staff only | | WARNING: It is a criminal offence to: | | I. Obtain access to data without authority | HIGHLY CONFIDENTIAL “Project Supertubes” Page 16 of 28 | II. Damage, delete, alter or insert data without authority | |___________________________________________________________________| ^C ! line con 0 authorization commands 1 console authorization commands 15 console authorization exec console accounting commands 1 console accounting commands 15 console accounting exec console login authentication console transport preferred all transport output all stopbits 1 line aux 0 transport preferred all transport output all stopbits 1 line vty 0 4 exec-timeout 100 0 password 7 110A1016141D transport preferred all transport input all transport output all ! ntp clock-period 17179971 ntp server 212.67.96.135 ! end SGRS-LNS3#sh run Building configuration... Current configuration : 5235 bytes ! ! Last configuration change at 11:06:21 GMT Tue Sep 14 2004 by cake ! NVRAM config last updated at 11:06:47 GMT Tue Sep 14 2004 by cake ! version 12.3 service timestamps debug datetime service timestamps log datetime service password-encryption ! hostname SGRS-LNS3 ! boot-start-marker boot-end-marker ! enable secret 5 $1$92EL$KVljhPdDst0grdhu6pF5v/ enable password 7 0305 ! username isp3ng password 7 075E745C1E071C11121E4A clock timezone GMT 0 aaa new-model ! ! aaa authentication login default group tacacs+ local aaa authentication login console local aaa authentication enable default enable aaa authentication ppp VPDN group radius aaa authorization exec default group tacacs+ local aaa authorization exec console none aaa authorization commands 1 default group tacacs+ if-authenticated none aaa authorization commands 1 console none aaa authorization commands 15 default group tacacs+ local aaa authorization commands 15 console none aaa authorization network default group tacacs+ if-authenticated aaa authorization network VPDN group radius aaa accounting exec default start-stop group tacacs+ aaa accounting exec console none aaa accounting commands 1 default start-stop group tacacs+ aaa accounting commands 1 console none aaa accounting commands 15 default start-stop group tacacs+ aaa accounting commands 15 console none aaa accounting network default start-stop group tacacs+ aaa accounting network VPDN start-stop group radius aaa accounting connection default start-stop group tacacs+ aaa accounting system default start-stop group tacacs+ HIGHLY CONFIDENTIAL “Project Supertubes” Page 17 of 28 aaa session-id common ip subnet-zero ! ! ip cef no ip domain lookup ip host lns1 212.67.121.44 ip host lns2 212.67.121.45 ip host core 212.67.121.92 ! ! vpdn enable ! vpdn-group 1 accept-dialin protocol any virtual-template 1 terminate-from hostname tunnel46 source-ip 212.67.121.46 l2tp tunnel password 7 1311021C0509087E7D ! vpdn-group 2 accept-dialin protocol any virtual-template 2 terminate-from hostname tunnel49 source-ip 212.67.121.49 l2tp tunnel password 7 071B3442400C15514E ! ! ! ! ! ! interface Loopback0 ip address 212.67.121.46 255.255.255.255 ! interface Loopback1 ip address 212.67.121.49 255.255.255.255 ! interface GigabitEthernet0/1 description SGRS-CORE-01 VLAN 50 g 4/4 ip address 212.67.121.67 255.255.255.240 duplex full speed 1000 media-type gbic negotiation auto ! interface GigabitEthernet0/2 description SGRS-CORE-02 VLAN 51 g 4/4 ip address 212.67.121.83 255.255.255.240 duplex full speed 1000 media-type gbic negotiation auto ! interface GigabitEthernet0/3 no ip address shutdown duplex auto speed auto media-type rj45 no negotiation auto ! interface Virtual-Template1 ip unnumbered Loopback0 no logging event link-status peer default ip address pool default ppp authentication chap VPDN ! interface Virtual-Template2 ip unnumbered Loopback1 no logging event link-status peer default ip address pool default ppp authentication chap VPDN ! router eigrp 10 network 212.67.121.0 no auto-summary ! HIGHLY CONFIDENTIAL “Project Supertubes” Page 18 of 28 router bgp 64556 no synchronization bgp log-neighbor-changes redistribute connected redistribute static neighbor LNS-iBGP peer-group neighbor LNS-iBGP remote-as 64556 neighbor LNS-iBGP update-source Loopback0 neighbor LNS-iBGP version 4 neighbor LNS-iBGP next-hop-self neighbor 212.67.121.44 peer-group LNS-iBGP neighbor 212.67.121.45 peer-group LNS-iBGP no auto-summary ! ip local pool default 212.67.122.16 212.67.122.23 ip classless no ip http server no ip http secure-server ! ! ! ip radius source-interface Loopback0 snmp-server community b0ll0cks RO 60 snmp-server location SGRS, London, UK snmp-server contact isp@onetel.net.uk snmp-server enable traps tty ! tacacs-server host 10.240.240.100 tacacs-server host 10.240.232.120 tacacs-server directed-request tacacs-server key 7 01100E165218141A2D495D ! radius-server host 212.67.118.251 auth-port 1645 acct-port 1646 key 7 06140E25455B1A radius-server key 7 0235116B5F325F714E54 ! control-plane ! ! ! ! ! ! gatekeeper shutdown ! banner motd ^CC ___________________________________________________________________ | ONE.TEL ISP - NETWORK | | Mailto: isp@onetel.net.uk | |___________________________________________________________________| | This service is for authorised One.Tel staff only | | WARNING: It is a criminal offence to: | | I. Obtain access to data without authority | | II. Damage, delete, alter or insert data without authority | |___________________________________________________________________| ^C ! line con 0 authorization commands 1 console authorization commands 15 console authorization exec console accounting commands 1 console accounting commands 15 console accounting exec console login authentication console transport preferred all transport output all stopbits 1 line aux 0 transport preferred all transport output all stopbits 1 line vty 0 4 exec-timeout 100 0 transport preferred all transport input all transport output all ! ntp clock-period 17180068 ntp server 212.67.96.135 HIGHLY CONFIDENTIAL “Project Supertubes” Page 19 of 28 ! end SGRS-LNS3# SGRS-SP1#sh run Building configuration... Current configuration : 4776 bytes ! ! Last configuration change at 11:37:41 UTC Tue Sep 14 2004 by cake ! NVRAM config last updated at 11:37:52 UTC Tue Sep 14 2004 by cake ! version 12.3 service timestamps debug datetime service timestamps log datetime service password-encryption ! hostname SGRS-SP1 ! boot-start-marker boot-end-marker ! enable secret 5 $1$9xf9$kD25BKsTy5eyjaeuDpKt/0 enable password 7 050A ! username isp3ng password 7 075E745C1E071C11121E4A aaa new-model ! ! aaa authentication login default group tacacs+ local aaa authentication login console local aaa authentication enable default enable aaa authorization exec default group tacacs+ local aaa authorization exec console none aaa authorization commands 1 default group tacacs+ if-authenticated none aaa authorization commands 1 console none aaa authorization commands 15 default group tacacs+ local aaa authorization commands 15 console none aaa authorization network default group tacacs+ if-authenticated aaa accounting exec default start-stop group tacacs+ aaa accounting exec console none aaa accounting commands 1 default start-stop group tacacs+ aaa accounting commands 1 console none aaa accounting commands 15 default start-stop group tacacs+ aaa accounting commands 15 console none aaa accounting network default start-stop group tacacs+ aaa accounting connection default start-stop group tacacs+ aaa accounting system default start-stop group tacacs+ aaa session-id common ip subnet-zero ! ! ip cef no ip domain lookup ip host core 212.67.121.92 ip host lns1 212.67.121.44 ip host lns2 212.67.121.45 ip host lns3 212.67.121.46 ip host sp2 212.67.121.62 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! HIGHLY CONFIDENTIAL “Project Supertubes” Page 20 of 28 ! ! ! interface Loopback0 ip address 212.67.121.50 255.255.255.255 ! interface GigabitEthernet0/1 description link to BT-NTE1 ip address 212.67.121.17 255.255.255.248 no ip redirects no ip proxy-arp duplex full speed 1000 media-type gbic negotiation auto no cdp enable ! interface GigabitEthernet0/2 description iBGP link to SGRS-SP2 ip address 212.67.121.61 255.255.255.252 duplex full speed 1000 media-type rj45 no negotiation auto ! interface GigabitEthernet0/3 description SGRS-CORE-01 g 4/1 ip address 212.67.121.74 255.255.255.240 duplex full speed 1000 media-type gbic negotiation auto ! router eigrp 10 redistribute bgp 64555 passive-interface GigabitEthernet0/1 network 212.67.121.0 default-metric 10000 100 255 1 1500 no auto-summary no eigrp log-neighbor-changes ! router bgp 64555 no synchronization bgp log-neighbor-changes neighbor SP-iBGP peer-group neighbor SP-iBGP remote-as 64555 neighbor SP-iBGP version 4 neighbor SP-iBGP next-hop-self neighbor BT-NTE1 peer-group neighbor BT-NTE1 remote-as 65500 neighbor BT-NTE1 password 7 05525F0C2E5E5C00180B1317195454737A71 neighbor BT-NTE1 ebgp-multihop 255 neighbor BT-NTE1 version 4 neighbor BT-NTE1 distribute-list 2 in neighbor 212.67.121.62 peer-group SP-iBGP neighbor 217.32.95.97 peer-group BT-NTE1 no auto-summary ! ip classless ip route 217.32.95.97 255.255.255.255 212.67.121.18 no ip http server no ip http secure-server ! ! ! access-list 2 permit 212.67.121.32 0.0.0.7 access-list 2 permit 212.67.121.40 0.0.0.3 access-list 2 deny any snmp-server community b0ll0cks RO 60 snmp-server location SGRS, London, UK snmp-server contact isp@onetel.net.uk snmp-server enable traps tty ! tacacs-server host 10.240.240.100 tacacs-server host 10.240.232.120 tacacs-server directed-request tacacs-server key 7 104D010B0C04001E000139 ! ! control-plane HIGHLY CONFIDENTIAL “Project Supertubes” Page 21 of 28 ! ! ! ! ! ! gatekeeper shutdown ! banner motd ^CC ___________________________________________________________________ | ONE.TEL ISP - NETWORK | | Mailto: isp@onetel.net.uk | |___________________________________________________________________| | This service is for authorised One.Tel staff only | | WARNING: It is a criminal offence to: | | I. Obtain access to data without authority | | II. Damage, delete, alter or insert data without authority | |___________________________________________________________________| ^C ! line con 0 exec-timeout 100 0 password 7 030752180500 authorization commands 1 console authorization commands 15 console authorization exec console accounting commands 1 console accounting commands 15 console accounting exec console login authentication console transport preferred all transport output all stopbits 1 line aux 0 transport preferred all transport output all stopbits 1 line vty 0 4 exec-timeout 100 0 password 7 00071A150754 transport preferred all transport input all transport output all ! ntp clock-period 17179879 ntp server 212.67.96.135 ! end SGRS-SP1# SGRS-SP2#copy run start Destination filename [startup-config]? Building configuration... [OK] SGRS-SP2#sh run Building configuration... Current configuration : 4688 bytes ! ! Last configuration change at 11:40:12 UTC Tue Sep 14 2004 by cake ! NVRAM config last updated at 11:40:16 UTC Tue Sep 14 2004 by cake ! version 12.3 service timestamps debug datetime service timestamps log datetime service password-encryption ! hostname SGRS-SP2 ! boot-start-marker boot-end-marker ! enable secret 5 $1$kzHx$OkulQHoTtLnhJv867bVAT0 enable password 7 1304 ! username isp3ng password 7 06575A311C400C0D001B53 HIGHLY CONFIDENTIAL “Project Supertubes” Page 22 of 28 aaa new-model ! ! aaa authentication login default group tacacs+ local aaa authentication login console local aaa authentication enable default enable aaa authorization exec default group tacacs+ local aaa authorization exec console none aaa authorization commands 1 default group tacacs+ if-authenticated none aaa authorization commands 1 console none aaa authorization commands 15 default group tacacs+ local aaa authorization commands 15 console none aaa authorization network default group tacacs+ if-authenticated aaa accounting exec default start-stop group tacacs+ aaa accounting exec console none aaa accounting commands 1 default start-stop group tacacs+ aaa accounting commands 1 console none aaa accounting commands 15 default start-stop group tacacs+ aaa accounting commands 15 console none aaa accounting network default start-stop group tacacs+ aaa accounting connection default start-stop group tacacs+ aaa accounting system default start-stop group tacacs+ aaa session-id common ip subnet-zero ! ! ip cef no ip domain lookup ip host lns1 212.67.121.44 ip host lns2 212.67.121.45 ip host lns3 212.67.121.46 ip host core 212.67.121.92 ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! interface Loopback0 ip address 212.67.121.51 255.255.255.255 ! interface GigabitEthernet0/1 description link to BT-NTE1 ip address 212.67.121.25 255.255.255.248 no ip redirects no ip proxy-arp duplex full speed 1000 media-type gbic negotiation auto no cdp enable ! interface GigabitEthernet0/2 description iBGP link to SGRS-SP2 ip address 212.67.121.62 255.255.255.252 duplex full speed 1000 media-type rj45 no negotiation auto ! interface GigabitEthernet0/3 description SGRS-CORE-02 VLAN 50 g 4/1 ip address 212.67.121.75 255.255.255.240 duplex full HIGHLY CONFIDENTIAL “Project Supertubes” Page 23 of 28 speed 1000 media-type gbic negotiation auto ! router eigrp 10 redistribute bgp 64555 passive-interface GigabitEthernet0/1 network 212.67.121.0 default-metric 10000 100 255 1 1500 no auto-summary no eigrp log-neighbor-changes ! router bgp 64555 no synchronization bgp log-neighbor-changes neighbor SP-iBGP peer-group neighbor SP-iBGP remote-as 64555 neighbor SP-iBGP version 4 neighbor SP-iBGP next-hop-self neighbor BT-NTE1 peer-group neighbor BT-NTE1 remote-as 65500 neighbor BT-NTE1 password 7 035D0208091D33454F071D00054A5B55557F neighbor BT-NTE1 ebgp-multihop 255 neighbor BT-NTE1 version 4 neighbor BT-NTE1 distribute-list 2 in neighbor 212.67.121.61 peer-group SP-iBGP neighbor 217.32.95.101 peer-group BT-NTE1 no auto-summary ! ip classless ip route 217.32.95.101 255.255.255.255 212.67.121.26 no ip http server no ip http secure-server ! ! ! access-list 2 permit 212.67.121.32 0.0.0.7 access-list 2 permit 212.67.121.40 0.0.0.3 access-list 2 deny any snmp-server community b0ll0cks RO 60 snmp-server location SGRS, London, UK snmp-server contact isp@onetel.net.uk snmp-server enable traps tty ! tacacs-server host 10.240.240.100 tacacs-server host 10.240.232.120 tacacs-server directed-request tacacs-server key 7 030753190F1C3359420C0A ! ! control-plane ! ! ! ! ! ! gatekeeper shutdown ! banner motd ^CC ___________________________________________________________________ | ONE.TEL ISP - NETWORK | | Mailto: isp@onetel.net.uk | |___________________________________________________________________| | This service is for authorised One.Tel staff only | | WARNING: It is a criminal offence to: | | I. Obtain access to data without authority | | II. Damage, delete, alter or insert data without authority | |___________________________________________________________________| ^C ! line con 0 authorization commands 1 console authorization commands 15 console authorization exec console accounting commands 1 console accounting commands 15 console accounting exec console login authentication console HIGHLY CONFIDENTIAL “Project Supertubes” Page 24 of 28 transport preferred all transport output all stopbits 1 line aux 0 transport preferred all transport output all stopbits 1 line vty 0 4 password 7 0820 transport preferred all transport input all transport output all ! ntp clock-period 17179932 ntp server 212.67.96.135 ! end SGRS-SP2# HIGHLY CONFIDENTIAL “Project Supertubes” Page 25 of 28 Appendix B – Interface and Routing Table Router Interface IP Address Gig 0/1 SGRS-SP1 212.67.121.17 Gig 0/1 SGRS-NTE-1 212.67.121.18 Gig 0/1 SGRS-SP2 212.67.121.25 Gig 0/1 SGRS-NTE-2 212.67.121.26 Lo 0 BT-LTS-1 212.67.121.32 Lo 0 BT-LTS-2 212.67.121.33 Lo 0 BT-LTS-3 212.67.121.34 Lo 0 BT-LTS-4 212.67.121.35 Lo 0 BT-LTS-5 212.67.121.36 Lo 0 BT-LTS-6 212.67.121.37 Lo 0 BT-LTS-7 212.67.121.38 Lo 0 BT-LTS-8 212.67.121.39 Lo 0 BT-LTS-9 212.67.121.40 Lo 0 BT-LTS-10 212.67.121.41 Lo 0 BT-LTS-11 212.67.121.42 Lo 0 BT-LTS-12 212.67.121.43 Lo 0 SGRS-LNS1 212.67.121.44 Lo 0 SGRS-LNS2 212.67.121.45 Lo 0 SGRS-LNS3 212.67.121.46 Lo 1 SGRS-LNS1 212.67.121.47 Lo 1 SGRS-LNS2 212.67.121.48 Lo 1 SGRS-LNS3 Lo 0 212.67.121.49 212.67.121.50 Lo 0 212.67.121.51 Gig 0/2 212.67.121.61 SGRS-SP1 SGRS-SP2 SGRS-SP1 HIGHLY CONFIDENTIAL Mask 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.25 5 255.255.255.24 “Project Supertubes” Routing Protocol eBGP eBGP eBGP eBGP (BT) (BT) (BT) (BT) (BT) (BT) (BT) (BT) (BT) (BT) (BT) (BT) EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP iBGP Page 26 of 28 Gig 0/2 SGRS-SP2 212.67.121.62 Gig 0/0 SGRS-LNS1 212.67.121.65 Gig 0/0 SGRS-LNS2 212.67.121.66 Gig 0/0 SGRS-LNS3 212.67.121.67 Gig 0/3 SGRS-SP1 212.67.121.74 Gig 0/3 SGRS-SP2 212.67.121.75 VLAN 50 SGRS-CORE1 212.67.121.76 VLAN 50 SGRS-CORE2 212.67.121.77 VLAN 50 HSRP 212.67.121.78 Gig 0/1 SGRS-LNS1 212.67.121.81 Gig 0/1 SGRS-LNS2 212.67.121.82 Gig 0/1 SGRS-LNS3 212.67.121.83 VLAN 51 SGRS-CORE1 212.67.121.92 VLAN 51 SGRS-CORE2 212.67.121.93 VLAN 51 HSRP HIGHLY CONFIDENTIAL 212.67.121.94 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 255.255.255.24 8 “Project Supertubes” iBGP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP EIGRP Page 27 of 28 Appendix C – Catalyst Switch Port Allocation Router SGRS-SP1 LNS1 LNS2 LNS3 SGRS-SP2 LNS1 LNS2 LNS3 Interface Gig 0/3 Gig 0/1 Gig 0/1 Gig 0/1 Gig 0/3 Gig 0/2 Gig 0/2 Gig 0/2 HIGHLY CONFIDENTIAL VLAN 50 50 50 50 50 51 51 51 Switch Port CORE1 Gig 4/1 CORE1 Gig 4/2 CORE1 Gig 4/3 CORE1 Gig 4/4 CORE2 Gig 4/1 CORE2 Gig 4/2 CORE2 Gig 4/3 CORE2 Gig 4/4 “Project Supertubes” Page 28 of 28