====== Dan's Wiki/Research Journal ======
This Wiki is a dedicated space for documenting my projects and research!
===== Hypervisors =====
I have decided to document the setup, usage, and performace differences of multiple [[https://en.wikipedia.org/wiki/Hypervisor|hypervisors]].
Hypervisors can be broken down into two types:
* Type-1: Native or bare metal hypervisors
* Type-2: Hosted hypervisors
=== Type-1 ===
Type-1 hypervisors run directly on the host hardware allowing for hardware control and guest OS managability. Guest operating systmes are then run as processes on the host.
{{:user:dshadeck:type_1.png|}}
Examples of Type-1 hypervisors:
* [[http://www.xenproject.org/|Xen]]
* [[http://www.vmware.com/products/esxi-and-esx/overview|VMware ESX & ESXi]]
* [[http://www.microsoft.com/en-us/server-cloud/solutions/virtualization.aspx/Main_Page|Microsoft HyperV]]
=== Type-2 ===
Type-2 hypervisors run on top of existing operating systems much like web browsers or email clients. the hypervisor is then completely dependent upon the host operating system for its functionality.
{{:user:dshadeck:type_2.png|}}
Examples of Type-2 hypervisors:
* [[http://www.vmware.com/products/workstation|VMware Workstation]]
* [[https://www.virtualbox.org/|Oracle Virtualbox]]
=== Basic System Overview ===
To get this project going i decided to use one of my personal servers. This is the system i will be using for all testing as to keep a consistent approach to each hypervisor i test.
System:
* Opteron 1385 Quadcore CPU
* 16GB of 800mhz DDR2
* 6x1TB 7200RPM HDDs
* Software Raid 10
OS:
* Debian 8 (Jessie)
===== KVM =====
The first hypervisor i will be testing is KVM (Kernal Based Virtual Machine)
Step 1. Install KVM & Libvirt from Debian Repository
apt-get install qemu-kvm libvirt-bin
Step 2. To be able to manage virtual machines as a non-root user we will need to add our account to the groups kvm and libvirt
adduser "username" kvm
adduser "username" libvirt
Thats it! Now KVM is ready!
=== Management Options ===
KVM can be managed in multiple ways. The most popular approach is mgmt directly from the Linux CLI using virsh.
(This is why we installed Libvirt)
duder@hyper1:~$ virsh --connect qemu:///system
Welcome to virsh, the virtualization interactive terminal.
Type: 'help' for help with commands
'quit' to quit
virsh # list --all
Id Name State
----------------------------------------------------
2 win7pro running
3 Win2012R2 running
virsh #
virsh # help
Grouped commands:
Domain Management (help keyword 'domain'):
attach-device attach device from an XML file
attach-disk attach disk device
attach-interface attach network interface
autostart autostart a domain
blkdeviotune Set or query a block device I/O tuning parameters.
blkiotune Get or set blkio parameters
blockcommit Start a block commit operation.
blockcopy Start a block copy operation.
blockjob Manage active block operations
blockpull Populate a disk from its backing image.
blockresize Resize block device of domain.
change-media Change media of CD or floppy drive
console connect to the guest console
cpu-baseline compute baseline CPU
cpu-compare compare host CPU with a CPU described by an XML file
cpu-stats show domain cpu statistics
create create a domain from an XML file
define define (but don't start) a domain from an XML file
desc show or set domain's description or title
destroy destroy (stop) a domain
detach-device detach device from an XML file
detach-disk detach disk device
detach-interface detach network interface
domdisplay domain display connection URI
domfsfreeze Freeze domain's mounted filesystems.
domfsthaw Thaw domain's mounted filesystems.
domfstrim Invoke fstrim on domain's mounted filesystems.
domhostname print the domain's hostname
domid convert a domain name or UUID to domain id
domif-setlink set link state of a virtual interface
domiftune get/set parameters of a virtual interface
domjobabort abort active domain job
domjobinfo domain job information
domname convert a domain id or UUID to domain name
dompmsuspend suspend a domain gracefully using power management functions
dompmwakeup wakeup a domain from pmsuspended state
domuuid convert a domain name or id to domain UUID
domxml-from-native Convert native config to domain XML
domxml-to-native Convert domain XML to native config
dump dump the core of a domain to a file for analysis
dumpxml domain information in XML
edit edit XML configuration for a domain
event Domain Events
inject-nmi Inject NMI to the guest
send-key Send keycodes to the guest
send-process-signal Send signals to processes
lxc-enter-namespace LXC Guest Enter Namespace
managedsave managed save of a domain state
managedsave-remove Remove managed save of a domain
memtune Get or set memory parameters
metadata show or set domain's custom XML metadata
migrate migrate domain to another host
migrate-setmaxdowntime set maximum tolerable downtime
migrate-compcache get/set compression cache size
migrate-setspeed Set the maximum migration bandwidth
migrate-getspeed Get the maximum migration bandwidth
numatune Get or set numa parameters
qemu-attach QEMU Attach
qemu-monitor-command QEMU Monitor Command
qemu-monitor-event QEMU Monitor Events
qemu-agent-command QEMU Guest Agent Command
reboot reboot a domain
reset reset a domain
restore restore a domain from a saved state in a file
resume resume a domain
save save a domain state to a file
save-image-define redefine the XML for a domain's saved state file
save-image-dumpxml saved state domain information in XML
save-image-edit edit XML for a domain's saved state file
schedinfo show/set scheduler parameters
screenshot take a screenshot of a current domain console and store it into a file
setmaxmem change maximum memory limit
setmem change memory allocation
setvcpus change number of virtual CPUs
shutdown gracefully shutdown a domain
start start a (previously defined) inactive domain
suspend suspend a domain
ttyconsole tty console
undefine undefine a domain
update-device update device from an XML file
vcpucount domain vcpu counts
vcpuinfo detailed domain vcpu information
vcpupin control or query domain vcpu affinity
emulatorpin control or query domain emulator affinity
vncdisplay vnc display
Domain Monitoring (help keyword 'monitor'):
domblkerror Show errors on block devices
domblkinfo domain block device size information
domblklist list all domain blocks
domblkstat get device block stats for a domain
domcontrol domain control interface state
domif-getlink get link state of a virtual interface
domiflist list all domain virtual interfaces
domifstat get network interface stats for a domain
dominfo domain information
dommemstat get memory statistics for a domain
domstate domain state
domstats get statistics about one or multiple domains
domtime domain time
list list domains
Host and Hypervisor (help keyword 'host'):
allocpages Manipulate pages pool size
capabilities capabilities
cpu-models CPU models
domcapabilities domain capabilities
freecell NUMA free memory
freepages NUMA free pages
hostname print the hypervisor hostname
maxvcpus connection vcpu maximum
node-memory-tune Get or set node memory parameters
nodecpumap node cpu map
nodecpustats Prints cpu stats of the node.
nodeinfo node information
nodememstats Prints memory stats of the node.
nodesuspend suspend the host node for a given time duration
sysinfo print the hypervisor sysinfo
uri print the hypervisor canonical URI
version show version
Interface (help keyword 'interface'):
iface-begin create a snapshot of current interfaces settings, which can be later committed (iface-commit) or restored (iface-rollback)
iface-bridge create a bridge device and attach an existing network device to it
iface-commit commit changes made since iface-begin and free restore point
iface-define define (but don't start) a physical host interface from an XML file
iface-destroy destroy a physical host interface (disable it / "if-down")
iface-dumpxml interface information in XML
iface-edit edit XML configuration for a physical host interface
iface-list list physical host interfaces
iface-mac convert an interface name to interface MAC address
iface-name convert an interface MAC address to interface name
iface-rollback rollback to previous saved configuration created via iface-begin
iface-start start a physical host interface (enable it / "if-up")
iface-unbridge undefine a bridge device after detaching its slave device
iface-undefine undefine a physical host interface (remove it from configuration)
Network Filter (help keyword 'filter'):
nwfilter-define define or update a network filter from an XML file
nwfilter-dumpxml network filter information in XML
nwfilter-edit edit XML configuration for a network filter
nwfilter-list list network filters
nwfilter-undefine undefine a network filter
Networking (help keyword 'network'):
net-autostart autostart a network
net-create create a network from an XML file
net-define define (but don't start) a network from an XML file
net-destroy destroy (stop) a network
net-dhcp-leases print lease info for a given network
net-dumpxml network information in XML
net-edit edit XML configuration for a network
net-event Network Events
net-info network information
net-list list networks
net-name convert a network UUID to network name
net-start start a (previously defined) inactive network
net-undefine undefine a persistent network
net-update update parts of an existing network's configuration
net-uuid convert a network name to network UUID
Node Device (help keyword 'nodedev'):
nodedev-create create a device defined by an XML file on the node
nodedev-destroy destroy (stop) a device on the node
nodedev-detach detach node device from its device driver
nodedev-dumpxml node device details in XML
nodedev-list enumerate devices on this host
nodedev-reattach reattach node device to its device driver
nodedev-reset reset node device
Secret (help keyword 'secret'):
secret-define define or modify a secret from an XML file
secret-dumpxml secret attributes in XML
secret-get-value Output a secret value
secret-list list secrets
secret-set-value set a secret value
secret-undefine undefine a secret
Snapshot (help keyword 'snapshot'):
snapshot-create Create a snapshot from XML
snapshot-create-as Create a snapshot from a set of args
snapshot-current Get or set the current snapshot
snapshot-delete Delete a domain snapshot
snapshot-dumpxml Dump XML for a domain snapshot
snapshot-edit edit XML for a snapshot
snapshot-info snapshot information
snapshot-list List snapshots for a domain
snapshot-parent Get the name of the parent of a snapshot
snapshot-revert Revert a domain to a snapshot
Storage Pool (help keyword 'pool'):
find-storage-pool-sources-as find potential storage pool sources
find-storage-pool-sources discover potential storage pool sources
pool-autostart autostart a pool
pool-build build a pool
pool-create-as create a pool from a set of args
pool-create create a pool from an XML file
pool-define-as define a pool from a set of args
pool-define define (but don't start) a pool from an XML file
pool-delete delete a pool
pool-destroy destroy (stop) a pool
pool-dumpxml pool information in XML
pool-edit edit XML configuration for a storage pool
pool-info storage pool information
pool-list list pools
pool-name convert a pool UUID to pool name
pool-refresh refresh a pool
pool-start start a (previously defined) inactive pool
pool-undefine undefine an inactive pool
pool-uuid convert a pool name to pool UUID
Storage Volume (help keyword 'volume'):
vol-clone clone a volume.
vol-create-as create a volume from a set of args
vol-create create a vol from an XML file
vol-create-from create a vol, using another volume as input
vol-delete delete a vol
vol-download download volume contents to a file
vol-dumpxml vol information in XML
vol-info storage vol information
vol-key returns the volume key for a given volume name or path
vol-list list vols
vol-name returns the volume name for a given volume key or path
vol-path returns the volume path for a given volume name or key
vol-pool returns the storage pool for a given volume key or path
vol-resize resize a vol
vol-upload upload file contents to a volume
vol-wipe wipe a vol
Virsh itself (help keyword 'virsh'):
cd change the current directory
connect (re)connect to hypervisor
echo echo arguments
exit quit this interactive terminal
help print help
pwd print the current directory
quit quit this interactive terminal
virsh #
Another approach is to use managment software. I currently use Virtual Machine Manager.
{{:user:dshadeck:virtmgmt.png?1000|}}
=== What now? ===
I installed KVM at the start of the semester and have yet to switch to another hypervisor!
My next step is to move to a USB bootable Xen hypervisor!
===== Virtual Box =====
This semester i have been using Virtual Box for many things school and personal related. It has become a valuable tool and has changed the way i use computers!
{{:user:dshadeck:vbox1.png|}}
=== Exporting/Importing VMs ===
Exporting is a great feature built into Virtual Box that allows for easy back up of virtual machines.
- Pressing Ctrl+e will launch the Export window. Select the VM you wish to export (In my case Xubuntu 14.04) and when finished select next.{{:user:dshadeck:vboxexp1.png|}}
- Select where to save the VM. Here we can also chose wich version of [[https://en.wikipedia.org/wiki/Open_Virtualization_Format|OVF]] to use. This will save our VM in open virtualization format inside of an OVA (this is essentialy a tar file). Lastly you can select "Write Manifest File" if you would like virtualbox to automaticly run data integrity checks when importing. When finished select next.{{:user:dshadeck:vboxexp2.png|}}
- Enter information describing your VM according to the supplied catagories. When finished select Export.{{:user:dshadeck:vboxexp3.png|}} Exporting is complete!
Now we can use our exported VM to learn about importing!
- Pressing Ctrl+i will launch the import window. Here we can select any virtual machines we have saved in OVF format to import into virtual box. Select next when ready. {{:user:dshadeck:vboximp1.png|}}{{:user:dshadeck:vboximp2.png|}}{{:user:dshadeck:vboximp3.png|}}
- Here we can see all of the predefined settings of our VM. Make sure these settings are compatable with your computer. We also have the option to reinitilize the MAC address of the VMs NICs. when importing the same VM multiple times it is important to select this option to avoid confilcting MACS on your network. When finished select Import to finish.{{:user:dshadeck:vboximp4.png|}}
===== Data Bases =====
This past week i have been spending some time learning about the DB server and how to make the move to Debian 8 and MariaDB as smooth as possible. I learned quickly that backing up all of the databases will be an easy task to accomplish. This can be achieved with something along the lines of this command:
mysqldump --all-databases > all_databases.sql
Where the real problem lies is the compatibility between older versions of MySQL and MariaDB. Because we are running MySQL 5.1 we can only move our database back up to MariaDB 5.5... While this shouldn't be to much of an issue we are really shooting to use MariaDB 10. This is the latest stable version and is packaged in the Debian repos. I have encountered some methods of moving 5.5 database backups to 10 but it looks like a long tedious process. NOT FUN.
=====Datacom=====
title = Simple 3D pie chart
size = 400x300
align = center
bgcolor = #eeeeee
type = pie3d
labelSerie = 2
pieExploded = on
25,46,20,6,3
Jan, Feb, Mar, Apr, May
======EOCE STUFF======
=====RHEL Networking... A Deeper Dive! 12/10/2015=====
====Objective====
The goal of this project was to better understand network interface management on Red Hat Enterprise Linux. This is the main Linux spin i have to use at work (both CentOS and licensed RHEL) and often found myself glancing over man pages and Red Hat documentation. I decided to just take some of my free time and really dig into managing networking with just configuration files (cutting network manager and systemd out of the scenario) to save my self time and headache when switching between versions 5, 6, and 7. In the end i needed to be able to have the following:
- Static addressing
- IPv4 ONLY
- VLAN tagging
- Bridge interface for MGMT
- Bridge interfaces for individual VLANs
The over all biggest thing I needed was to have one interface to attach to multiple KVM guests for MGMT IPs, and individual interfaces for VLANS that could be attached to multiple guest VMs.
====Materials/Reading/Prerequisites====
To prepare myself I built a test KVM hypervisor at work (and at home :D) to attach to multiple guest systems to multiple VLANS and one central MGMT interface.
I took note as to what VLANs I would need the server to communicate with.
I decided to bring up a copy of RHELs documentation online and give it a full read as well as multiple man pages and online resources.
====Background====
In the end i needed to be able to have the following:
- Static addressing
- IPv4 ONLY
- VLAN tagging
- Bridge interface for MGMT
- Bridge interfaces for individual VLANs
The over all biggest thing i needed was to have one interface to attach to multiple KVM guests for MGMT IPs, and individual interfaces for VLANS that could be attached to multiple guest VMs. This would allow virtual servers to communicate to a specific VLAN within our network on one interface and be managed on another.
====Procedure====
===MGMT Bridge===
To start i have two network interfaces
1: lo: mtu 65536 qdisc noqueue state UNKNOWN
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eno1: mtu 1500 qdisc mq state UP qlen 1000
link/ether 00:25:90:f3:21:9a brd ff:ff:ff:ff:ff:ff
3: eno2: mtu 1500 qdisc mq state UP qlen 1000
link/ether 00:25:90:f3:21:9b brd ff:ff:ff:ff:ff:ff
All of these devices can be managed with configuration files located in /etc/sysconfig/network-scripts. These will give us the ability to create, manage, and delete interfaces as we please.
Interface eno1 is going to be used as our management interface. To make KVM happy we need to make a bridge interface that uses this interface. We need to first make sure we have bridge-utils installed. This will give us the ability to used bridged networking!
[root@bencrk1 network-scripts]# yum install bridge-utils
Now we can make a new bridge interface that uses eno1. This can be done by creating a new configuration file with the name of the bridge at the end. Below is an example of my configuration.
[root@bencrk1 network-scripts]# cat ifcfg-br0
DEVICE=br0
ONBOOT=yes
BOOTPROTO=static
#IPADDR=xxx.xxx.xxx.xxx
#NETMASK=xxx.xxx.xxx.xxx
IPV6INIT=no
TYPE=Bridge
NM_CONTROLLED=no
For the sake of this demo i will leave out my IPs. What we have done here is created a bridge interface named br0. It is set to initialize on boot, use a static ip, disable ipv6, and tell the system that it is not to be managed by NetworkManager.
Now we need to set the interface eno1 to be used by the bridge. This is done my editing its configuration file and telling it to use the bridge interface.
DEVICE=eno1
BOOTPROTO=static
HWADDR=
ONBOOT=yes
NETMASK=
GATEWAY=
BRIDGE=br0
TYPE=Ethernet
This was accomplished by simply adding the line BRIDGE=br0!
First bridge interface down!
===VLANs===
Now that we know how to make a bridge we need to learn how to incorporate VLANs into the mix. To do this we need to create VLAN interfaces for each VLAN we need. This is done by creating a interface configuration file with the name of the interface you want to use as well as the VLAN tag for the network. Here is my demo config for our 252 VLAN.
DEVICE=eno2.252
VLAN=yes
ONBOOT=yes
BOOTPROTO=none
NM_CONTROLLED=no
This configuration is very similar to the one above except for one new line. VLAN=yes tells the system that this is a VLAN interface. Simple!
Now we create a bridge interface that takes advantage of our new VLAN interface.
[root@bencrk1 network-scripts]# cat ifcfg-br1.252
DEVICE=br1.252
ONBOOT=yes
BOOTPROTO=static
#IPADDR=xxx.xxx.xxx.xxx
#NETMASK=xxx.xxx.xxx.xxx
IPV6INIT=no
TYPE=Bridge
NM_CONTROLLED=no
Now we tell our VLAN interface that is going to be used by our newly created bridge interface. This is very similar to above!
DEVICE=eno2.252
VLAN=yes
ONBOOT=yes
BOOTPROTO=none
BRIDGE=br1.252
NM_CONTROLLED=no
Now we are complete! We can add these interfaces to our KVM guests and apply IPs.
=====References======
- where you got informative and useful information to help you accomplish this project when you originally worked on it (from Google, other wiki documents on the Lab46 wiki, etc.)
https://access.redhat.com/documentation/en/red-hat-enterprise-linux/
=====DHCP STUFF=====
===DHCP Script===
Cool DHCP config check/status tool i worked on!
#!/bin/bash
#
# dstatus DHCP remote utility SCRIPT
#
. /usr/local/bin/functions
prtime $host $0 Starting
host=`hostname`
BN0=`basename $0`
if [ "$host" = "prtbdhcp2.empacc.net" ] ; then
FILES="dhcpd.conf dhcpd-empiremaster.conf"
CONFFILE=dhcpd-empiremaster.conf
elif [ "$host" = "bncrdhcp2.empacc.net" ] ; then
FILES="dhcpd.conf dhcpd-npmaster.conf"
CONFFILE=dhcpd-npmaster.conf
else
prtime $host $0 Abort Unknown hostname: $host
exit
fi
IAM="$host $BN0"
Tm=`date '+%Y%m%d%H%M'`
TARFILE=bu/dhcp$Tm.tar
function ckident
{
prtime $IAM Cking Ident
sleep 1
cd $DIR1
for File in $FILES
do
if [ -f $File ] ; then
ls -l $File
sum $File
ident $File
sleep 1; echo -
else
echo $IAM $File is not in $DIR1
fi
done
}
function dostat
{
sleep 1; echo -
prtime $IAM DHCP configtest RC=$RC
sleep 1; echo -
service dhcpd status
RC=$?
sleep 1 ; echo -
}
function dostatus
{
# STATUS Production "service dhcpd status"
#
prtime $IAM Checking DHCP Status $DIR1
ckident
sleep 1
service dhcpd configtest
RC=$?
sleep 1; echo -
prtime $IAM DHCP configtest RC=$RC
sleep 1; echo -
service dhcpd status
RC=$?
sleep 1 ; echo -
}
function backupProd
{
if [ "$BN0" = "dbu" ] ; then
DIR1=/etc/dhcp
fi
prtime $IAM Backup via tar Original DHCP Files
cd $DIR1
echo In `pwd`
if [ -d bu ] ; then
echo bu dir ok
else
mkdir bu
fi
echo tar cf $TARFILE $FILES
tar cf $TARFILE $FILES
RC=$?
if [ "$RC" != "0" ] ; then
echo $IAM backupProd Reports an Error RC=$RC
else
echo $IAM backupProd OK RC=$RC
fi
}
function do_tail
{
do_ps
prtime $IAM: Tailing /var/log/messages for dhcp messages
sleep 1
tail -10 /var/log/messages | grep dhcpd
}
function do_ps
{
sleep 2; echo $IAM cking ps for dhcpd
ps -eaf | grep dhcpd | grep -v grep
RC=$?
echo -
echo -
if [ "$RC" != "0" ] ; then
prtime $IAM Status NOT RUNNING RC=$RC
else
prtime $IAM Status Shows OK =$RC
fi
}
function restoreProd
{
prtime $IAM Restoring Original DHCP Files
cd $DIR1
tar xvf $TARFILE
RC=$?
if [ "$RC" != "0" ] ; then
echo $IAM restoreProd Reports an Error RC=$RC
else
echo $IAM restoreProd OK RC=$RC
fi
}
if [ "$BN0" = "dtest" ] ; then
# {
# Backup the current /opt/dhcpdev files
#
prtime $host $BN0 In dtest
DIR0=/tmp
DIR1=/opt/dhcpdev
cd $DIR0
if [ -f $CONFFFILE ] ; then
cd $DIR1
echo IN `pwd`
backupProd
cmd="cp $DIR0/$CONFFILE ."
echo $cmd
$cmd
RC=$?
if [ "$RC" -eq "0" ] ; then
echo $IAM COPY is good RC=$RC
rm -f $DIR0/$CONFFILE
fi
echo -
else
echo $IAM File $DIR0/$CONFFILE not found
echo -
fi
cd $DIR1
ckident
echo $IAM: dhcpd -t -cf dhcpd.conf
dhcpd -t -cf dhcpd.conf
RC=$?
if [ "$RC" -eq "0" ] ; then
echo $IAM `pwd` Test is good RC=$RC
else
echo $IAM Test reports an Error RC=$RC
echo $IAM Restoring Backup
restoreProd
fi
# }
elif [ "$BN0" = "dinstall" ] ; then
# {
# Backup the current /etc/dhcp files
# Copy from /opt/dhcpdev to /etc/dhcp and test and test
#
prtime $IAM Starting
DIR0=/opt/dhcpdev
DIR1=/etc/dhcp
dostatus
cd $DIR0
if [ -f $CONFFFILE ] ; then
cd $DIR1
echo IN `pwd`
backupProd
cmd="cp $DIR0/$CONFFILE ."
echo $cmd
$cmd
RC=$?
if [ "$RC" -eq "0" ] ; then
echo -
else
echo $IAM Copy Failed
fi
else
cd $DIR1
echo $IAM File $DIR0/$CONFFILE not found
sleep 1;echo -
fi
cd $DIR1
service dhcpd restart
RC=$?
if [ "$RC" != "0" ] ; then
echo $IAM `pwd` Status Check failed RC=$RC
exit $RC
fi
echo -; sleep 1
dostatus
if [ "$RC" != "0" ] ; then
echo $IAM `pwd` Status Check failed RC=$RC
restoreProd
else
prtime $IAM Looks good RC=$RC
fi
# }
elif [ "$BN0" = "drestart" ] ; then
#
# Restart Production "service dhcpd restart"
#
prtime $IAM Restart Production "service dhcpd restart"
DIR0=/opt/dhcpdev
DIR1=/etc/dhcp
cd $DIR1
ckident
sleep 1; echo -
service dhcpd status
echo -
echo service dhcpd restart
sleep 2; echo -
service dhcpd status
sleep 1
# tail -10 /var/log/messages
dops
echo -
echo -
# }
elif [ "$BN0" = "dstart" ] ; then
# {
# STATUS Production "service dhcpd status"
#
prtime $IAM START DHCP
DIR1=/etc/dhcp
do_ps
if [ "$RC" = "0" ] ; then
echo DHCPD ALREADY RUNNING
echo -
sleep 1
dostat
exit 1
fi
service dhcpd start
# tail -10 /var/log/messages | grep dhcpd
dostatus
prtime $IAM START DHCP
# }
elif [ "$BN0" = "dstatus" ] ; then
# {
# STATUS Production "service dhcpd status"
#
DIR1=/etc/dhcp
dostatus
# tail -10 /var/log/messages | grep dhcpd
echo -
echo -
do_ps
# }
elif [ "$BN0" = "dstart" ] ; then
# {
# STATUS Production "service dhcpd status"
#
DIR1=/etc/dhcp
dostatus
echo $IAM: service dhcpd start
service dhcpd start
# tail -10 /var/log/messages | grep dhcpd
# }
elif [ "$BN0" = "dstatus" ] ; then
# {
# STATUS Production "service dhcpd status"
#
DIR1=/etc/dhcp
dostatus
# tail -10 /var/log/messages | grep dhcpd
# }
elif [ "$BN0" = "dtail" ] ; then
# {
# Just Tail
#
do_tail
# }
elif [ "$BN0" = "dbu" ] ; then
# {
# Just Perform a back up of the production files
#
prtime $IAM Make a backup of the production dhcp files
DIR1=/etc/dhcp
cd $DIR1
backupProd
# }
elif [ "$BN0" = "dstop" ] ; then
# {
# Just Perform a STOP of DHCP
#
prtime $IAM STOP dhcp
DIR1=/etc/dhcp
cd $DIR1
echo service dhcp stop
echo -
service dhcp stop
RC=$?
sleep 1
echo -
dostatus
# }
else
echo $IAM Unknown command
exit
fi
if [ "$RC" = "0" ] ; then
echo -
prtime $IAM Complete RC=$RC
logger $IAM Complete RC=$RC
else
echo -
echo -
prtime $IAM ERROR RC=$RC
logger $IAM ERROR RC=$RC
fi
exit $RC
===DHCP Conf===
Here are two DHCP configs i helped create. They are a great example of the depths DHCP configuration can go :)
###############################################################################
#
# North Penn Master DHCP Configuration File
#
# $Id: dhcpd-npmaster.conf,v 1.5 2015/10/15 20:24:44 root Exp $
#
# Included from dhcpd.conf
# # adding this line to force copy
#
###############################################################################
#
# History
#
# 2015/10/15 - BD - Initial in-service version - Production start
#
###############################################################################
#
###############################################################################
#
# Global configurations
#
###############################################################################
authoritative;
ddns-update-style ad-hoc;
default-lease-time 172800;
max-lease-time 604800;
allow bootp;
option dhcp-max-message-size 1024;
option ntp-servers us.pool.ntp.org;
# Set this to your domain name
option domain-name "empacc.net";
# Ener your DNS servers separated by commas ','
option domain-name-servers 72.18.56.250, 78.18.48.120;
###############################################################################
#
# IPTV Conditional Access (Verimatrix) configurations
#
###############################################################################
## --- Verimatrix specific option defines
option accp_conf code 131 = array of integer 8;
option option-minerva_bootstring code 240 = text;
option option-vm_ini_url code 241 = text;
option option-vm_ini_ver code 242 = text;
option option-rootcert_boot code 243 = text;
option option-rootcert_ver code 244 = text;
#option option-minerva_common code 245 = text;
###############################################################################
#
# IPTV Set-top configurations
#
###############################################################################
#-----------------------------------------------------------
# -- Option defines For ADB STB
#-----------------------------------------------------------
## --- Define option 131 for multicast address ---
option accp_conf code 131 = array of integer 8;
## --- Define option 240 for the Minerva start string ----
option option-minerva_bootstring code 240 = text;
## --- Define option 245 TR69 reporting configuration string ---
option option-245 code 245 = string;
#-----------------------------------------------------------
#-- ADB Class defines
#-----------------------------------------------------------
## --- ADB 3800W ---##
class "adb3800W-Bootloader" {
match if substring (option vendor-class-identifier, 0, 12) = "minerva3800w";
# Software upgrade though multicast configuration (Preferred method)
# Multicast setup below is: 239.1.2.5 port 4545 with 10 seconds timeout
# NOTE: port number 4545 calculation is 17*256 + 193 = 4545
option accp_conf 239,1,2,5,17,193,10;
}
class "adb3800W-hlcode2" {
match if substring (option vendor-class-identifier, 0, 24) = "udhcp_MRV3X_1_3800W(ADB)";
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -stbm=adb -tbv=5.4 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "21";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "21";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
##--- ADB 5810X ---##
class "adb5810WX-bootloader" {
match if substring (option vendor-class-identifier, 0, 13) = "minerva5810wx";
option accp_conf 239,1,2,7,17,193,10;
}
class "adb5810WX-hlcode" {
match if (substring (option vendor-class-identifier, 0, 24) = "udhcp 1.2.2 (ADB 1.2.20)") or (substring (option vendor-class-identifier, 0, 25) = "udhcp_MRV3X_1_5810WX(ADB)");
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "20";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "20";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
##--- ADB 5721WNX ---##
class "adb5721wnx-minerva-loader" {
match if substring (option vendor-class-identifier, 0, 11) ="ADB-5721WNX";
option accp_conf 239,1,2,11,17,193,10;
}
class "adb5721wnx-minerva-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) ="udhcp_MRV_5721WNX(ADB)";
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "20";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "20";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
##--- ADB 2721W ---##
class "adb2721W-bootloader" {
match if substring (option vendor-class-identifier, 0, 12) ="ADB-2721W";
option accp_conf 239,1,2,13,17,193,10;
}
class "adb2721W-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) ="udhcp_MRV_2721W(ADB)";
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "20";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "20";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
##--- ADB 2721WX ---##
class "adb2721Wx-bootloader" {
match if substring (option vendor-class-identifier, 0, 12) ="ADB-2721WX";
option accp_conf 239,1,2,9,17,193,10;
}
class "adb2721Wx-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) ="udhcp_MRV_2721WX(ADB)";
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "20";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "20";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
##--- ADB 3721WN ---##
class "adb3721WN-bootloader" {
match if substring (option vendor-class-identifier, 0, 12) ="ADB-3721WN";
option accp_conf 239,1,2,15,17,193,10;
}
class "adb3721WN-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) ="udhcp_MRV_3721WN(ADB)";
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "20";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "20";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
#-----------------------------------------------------------------------#
# TEST SET TOP BOX DEFINES #
# #
# Define test box classes with special parameters here #
#-----------------------------------------------------------------------#
class "ADB-TEST" {
match substring (hardware, 1, 6);
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -stbm=adb -tbv=5.7 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "20";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "20";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
subclass "ADB-TEST" 68:63:59:3B:1C:64; # Dan's Desk 2721WX 1
#subclass "ADB-TEST" 00:03:91:BE:38:5E; # Test 1
#subclass "ADB-TEST" 68:63:59:3B:1D:CB; # Test 2
#subclass "ADB-TEST" 68:63:59:3A:CF:30; # Test 3
#subclass "ADB-TEST" 68:63:59:34:96:DF; # Steve 1
#subclass "ADB-TEST" 68:63:59:4F:73:23; # Steve 2
#subclass "ADB-TEST" 68:63:59:4F:15:98; # Steve 3
#subclass "ADB-TEST" 68:63:59:5E:05:22; # Steve 4
#subclass "ADB-TEST" 00:03:91:AD:96:7C; # Steve 5
#subclass "ADB-TEST" 68:63:59:04:21:E4; # Frank Home 1
#subclass "ADB-TEST" 68:63:59:17:66:D8; # Frank Home 2
#subclass "ADB-TEST" 00:03:91:BE:8C:E0; # Frank Home 3
#subclass "ADB-TEST" 68:63:59:3A:CF:57; # Frank Home 4
###############################################################################
#
# Subnet Declarations
#
# NOTE: It is required to have a subnet decleration for local subnet even if
# this dhcp server is not
# serving any addresses on this range
###############################################################################
# Local subnet declaration - no pool required here
subnet 10.68.0.16 netmask 255.255.255.248 {}
# This should handle all STBs (Copperhead, Viper and Amino) on the
# 192.168.5.0 network
# The subnet below can probably be removed per Aaron (10/15/15)
#subnet 172.25.1.0 netmask 255.255.255.0 {
# next-server 172.25.1.150;
# option routers 172.25.1.1;
# option broadcast-address 172.25.1.255;
# pool {
# failover peer "NP-failover";
# range 172.25.1.10 172.25.1.254;
# }
#}
# North Penn Calix C7 Networks
subnet 10.0.0.0 netmask 255.255.0.0 {
next-server 172.25.1.150;
option routers 10.0.0.1;
pool {
failover peer "NP-failover";
range 10.0.3.10 10.0.254.254;
}
}
subnet 11.0.0.0 netmask 255.0.0.0 {
next-server 172.25.1.150;
option routers 11.0.0.1;
pool {
failover peer "NP-failover";
range 11.0.0.10 11.1.0.254;
}
}
subnet 12.0.0.0 netmask 255.0.0.0 {
next-server 172.25.1.150;
option routers 12.0.0.1;
pool {
failover peer "NP-failover";
range 12.0.0.10 12.0.254.254;
}
}
# The subnet below can probably be removed per Aaron (10/15/15)
#subnet 10.192.0.0 netmask 255.255.224.0 {
# next-server 172.25.1.150;
# option routers 10.192.0.1;
# pool {
# failover peer "NP-failover";
# range 10.192.0.2 10.192.31.254;
# }
#}
################################################################################
#
# Internet and VoIP Definitions
#
################################################################################
# AE-ONT options definitions
option space CALIX-ONT-SERVER;
option CALIX-ONT-SERVER.cms-address code 1 = ip-address;
option CALIX-ONT-SERVER.second-tftp-address code 2 = ip-address;
option CALIX-ONT-SERVER.validateMIC code 3 = boolean;
option CALIX-ONT-SERVER.syslog-address code 4 = ip-address;
#AE ONT
class "CalixONT" {
match if substring(hardware,1,3) = 00:06:31;
}
#SIP
subnet 10.224.0.0 netmask 255.255.192.0 {
option subnet-mask 255.255.192.0;
option domain-name-servers 72.18.56.250, 72.18.48.120;
option routers 10.224.0.1;
pool {
failover peer "NP-failover";
range 10.224.4.1 10.224.63.254;
}
}
#Residential Vlan 204
subnet 38.77.12.0 netmask 255.255.252.0 {
option subnet-mask 255.255.252.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 38.77.12.1;
pool {
failover peer "NP-failover";
range 38.77.12.2 38.77.15.254;
}
}
#Residential Vlan 205
subnet 38.77.8.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 38.77.8.1;
pool {
failover peer "NP-failover";
range 38.77.8.10 38.77.9.254;
}
}
#Residential Vlan 206 pool #1
subnet 38.77.10.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 38.77.10.1;
pool {
failover peer "NP-failover";
range 38.77.10.2 38.77.11.254;
}
}
#Residential vlan 211
subnet 38.77.40.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option domain-name-servers 73.18.48.120, 72.18.56.250;
option routers 38.77.40.1;
pool{
failover peer "NP-failover";
range 38.77.40.11 38.77.41.254;
}
}
#Residential Vlan 207
subnet 66.115.78.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 66.115.78.1;
pool {
failover peer "NP-failover";
range 66.115.78.10 66.115.79.254;
}
}
#Residential Vlan 208
subnet 66.115.74.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 66.115.74.1;
pool {
failover peer "NP-failover";
range 66.115.74.2 66.115.74.254;
}
}
#Business Vlan 209
subnet 66.115.75.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 66.115.75.1;
pool {
failover peer "NP-failover";
range 66.115.75.2 66.115.75.254;
}
}
# Not sure what this is used for
subnet 104.255.87.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option domain-name-servers 72.18.48.120, 72.18.56.250;
option routers 104.255.87.1;
pool {
failover peer "NP-failover";
range 104.255.87.2 104.255.87.245;
}
}
subnet 10.85.0.0 netmask 255.255.254.0 {
pool {
allow members of "CalixONT";
option tftp-server-name "10.224.0.2";
option CALIX-ONT-SERVER.second-tftp-address 10.224.0.2;
option routers 10.85.0.1;
vendor-option-space CALIX-ONT-SERVER;
option CALIX-ONT-SERVER.validateMIC off;
option CALIX-ONT-SERVER.cms-address 10.224.0.2;
option CALIX-ONT-SERVER.syslog-address 10.224.0.2;
failover peer "NP-failover";
range 10.85.0.10 10.85.1.254;
}
}
#END
I was blown away at how easy large scale DHCP can be just by using simple configuration methods.
This last one is much larger. I am ashamed to say we are handing private IPS out to customers... Many of the location classes in this file are to hand IPS to our DSL customers.
Some of the more interesting bits are the sections that filter by MAC address for specific vendors to determine what class they fall into. This comes in handy when serving content to different set top box types. As you can see this file has a "test" class. I use this for testing different firmware/software loads to test boxes at my desk, fed directly from an ONT (optical network terminal) unit. I specify each of my test box MAC addresses so that they are statically apart of the test group.
# Empire Master DHCP file
# $Id: dhcpd-empiremaster.conf,v 1.8 2015/10/08 16:51:55 root Exp $
authoritative;
ddns-update-style ad-hoc;
allow bootp;
# Global network parameters
default-lease-time 172800;
max-lease-time 604800;
min-lease-time 86400;
option ntp-servers us.pool.ntp.org;
option domain-name "empacc.net";
option domain-name-servers 72.18.48.120, 72.18.56.250;
option dhcp-max-message-size 1024;
## --- Verimatrix specific option defines
option accp_conf code 131 = array of integer 8;
option option-minerva_bootstring code 240 = text;
option option-vm_ini_url code 241 = text;
option option-vm_ini_ver code 242 = text;
option option-rootcert_boot code 243 = text;
option option-rootcert_ver code 244 = text;
# Conditional classification of Pannaway
# network elements on basis of Ethernet
# vendor prefix or DHCP vendor class id
group {
class "Pannaway.PBG" {
match if (substring (option vendor-class-identifier, 0, 12) = "Pannaway.PBG");
next-server 10.103.255.50;
option root-path "10.103.255.50";
}
class "Pannaway.RGN" {
match if (substring (option vendor-class-identifier, 0, 12) = "Pannaway.RGN");
next-server 10.103.255.50;
option root-path "10.103.255.50";
}
class "Pannaway" {
match if (substring (hardware, 1, 3) = 00:0A:9F);
next-server 10.103.255.50;
option root-path "10.103.255.50";
}
class "RGN.210" {
match if (substring (hardware, 1, 3) = 00:0E:50);
next-server 10.103.255.50;
}
class "RGN.210v6" {
match if (substring (hardware, 1, 3) = 00:14:7f);
next-server 10.103.255.50;
}
class "BEC" {
match if (substring (hardware, 1, 3) = 00:04:ED);
next-server 10.103.255.50;
}
class "RGN.210v6_2" {
match if (substring (hardware, 1, 3) = 00:90:D0);
next-server 10.103.255.50;
}
class "ONT" {
match if (substring (hardware, 1, 3) = 00:06:0D);
next-server 10.103.255.50;
}
class "calix_ont" {
match if (substring (hardware, 1, 3) = 00:06:31);
next-server 172.16.9.175;
}
}
class "laptop"{
match if(substring(hardware,1,6) = 00:11:43:76:88:9d) or (substring(hardware, 1,6)=00:1d:09:ae:8e:07) or (substring(hardware,1,6)=00:11:43:71:83:98);
}
###----------------------------------------------AMINO-------------------------------------------------------------####
###############################################################################
# Extra Options for AMINO option space (used for multicast) #
###############################################################################
option space AMINO;
# These options are defined for communication between STB and the DHCP
# server for the class match (see below). These just need to exist
option AMINO.product code 3 = text;
option AMINO.option code 4 = text;
option AMINO.version code 5 = text;
# Key values needed for booting the Amino STB, configuring network
# based applications and managing upgrades
option AMINO.homepage code 8 = text;
option AMINO.STBrc-mcast-address code 12 = ip-address;
option AMINO.STBrc-mcast-port code 13 = integer 16;
option AMINO.STBrc-unicast-port code 14 = integer 16;
option AMINO.timezone code 16 = text;
option AMINO.mw_args code 18 = text;
option AMINO.mirimon_args code 22 = text;
option AMINO.software_di code 25 = integer 16;
option AMINO.software_uri code 28 = text;
option AMINO.igmp_max_ver code 34 = integer 8;
# This extra options value is a general option for 3rd party or SDK
# customers to easily add their own DHCP options
option AMINO.extra_options code 32 = text;
# Optional different way of providing Minerva middleware argments
# instead of using AMINO.mw_args
option AMINO.middleware code 6 = ip-address;
option AMINO.middleware2 code 17 = ip-address;
# Defining the Classless Static Route Option (see RFC 3442)
option classless-static-routes code 121 = array of integer 8;
# Example:
# Route to 11.0.0.0/255.0.0.0, destination 10.0.0.1
# values = {8, 11, 10, 0, 0, 1}
# Route to 12.1.0.0/255.255.0.0, destination 10.0.0.1
# values = {16, 12, 1, 10, 0, 0, 1}
# Route to 12.2.1.0/255.255.255.0, destination 10.0.0.1
# values = {24, 12, 2, 1, 10, 0, 0, 1}
# Route to 12.3.2.1/255.255.255.255, destination 10.0.0.1
# values = {32, 12, 3, 2, 1, 10, 0, 0, 1}
# Option:
# option classless-static-routes 8, 11, 10, 0, 0, 1, 16, 12, 1, 10, 0,
# 0, 1, 24, 12, 2, 1, 10, 0, 0, 1, 32, 12, 3, 2, 1, 10, 0, 0, 1;
###############################################################################
# class "AMINOx0xx" #
# AMINOx0xx - response to x0xx family STBs during Main and Recovery image boot#
###############################################################################
class "AMINOx0xx"
{
match if (substring( option vendor-class-identifier, 0, 9)="AMINOx0xx");
vendor-option-space AMINO;
option AMINO.mw_args "-bm=0 -ip=172.25.1.150:7780 -asr=/dataservices -stbm=Amino -nnvb=0 -uib=0 -cso=thinkstuff_amino";
# option AMINO.software_uri "igmp://239.1.3.1:4545";
option AMINO.software_uri "http://172.25.1.51/amino/x0x.mcfs";
}
###############################################################################
# class "AMINOx4x" #
# AMINOx4x - response to x4x family STBs during Main and Recovery image boot #
###############################################################################
class "AMINOx4x"
{
match if (substring( option vendor-class-identifier, 0, 8)="AMINOx4x");
vendor-option-space AMINO;
option AMINO.mw_args "-bm=0 -ip=172.25.1.150:7780 -asr=/dataservices -stbm=Amino -nnvb=0 -uib=0 -cso=thinkstuff_amino";
# option AMINO.software_uri "igmp://239.1.3.2:4545";
option AMINO.software_uri "http://172.25.1.51/amino/x4x.mcfs";
}
###############################################################################
# class "AMINOx5x" #
# AMINOx5x - response to x5x family STBs during Main and Recovery image boot #
###############################################################################
class "AMINOx5x"
{
match if (substring( option vendor-class-identifier, 0, 8)="AMINOx5x");
vendor-option-space AMINO;
# option AMINO.mw_args "-bm=0 -ip=172.25.1.150:7780 -asr=/dataservices -stbm=Amino -nnvb=0 -tbv=5.7 -hbip=172.25.1.150:4440 -hbp=5 -cso=thinkstuff_amino";
# option AMINO.mw_args "-ip=172.25.1.150:7780 -eip=172.25.1.150:8500 -cso=thinkstuff_amino -bm=0 -asr=/dataservices -stbm=Amino -nnvb=0";
option AMINO.mw_args "-ip=172.25.1.150:7780 -cso=thinkstuff_amino -bm=0 -asr=/dataservices -stbm=Amino -uib=0";
option AMINO.software_uri "igmp://239.1.3.3:4545";
# option AMINO.software_uri "http://172.25.1.51/amino/x5x.mcfs";
}
###############################
# Option Space for Entone boot
###############################
option space ENTONE;
option ENTONE.SIGNATURE code 99 = text;
option ENTONE.FIRMWARE_VERSION code 100 = text;
option ENTONE.FIRMWARE_FILENAME code 101 = text;
option ENTONE.APP_URL code 102 = text;
option ENTONE.DECODER_APP_FALLBACK code 105 = text;
option ENTONE.ENTONEINI code 106 = text;
option ENTONE.DECODER_LOADER_VERSION code 110 = text;
option ENTONE.DECODER_LOADER_FILENAME code 111 = text;
option ENTONE.DECODER_LOADER_FALLBACK code 112 = text;
option ENTONE.DECODER_APP_VERSION code 113 = text;
option ENTONE.DECODER_APP_FILENAME code 114 = text;
##################
# Entone Set-top Class Definitions
##################
# Amulet 500 series secured
# For BBL
class "ENTONE-ESBOOT-B72-A5"{
match if substring (option vendor-class-identifier, 0, 20)="ENTONE-ESBOOT-B72-A5";
vendor-option-space ENTONE;
option ENTONE.ENTONEINI "http://172.25.1.51/entone/entone_boot.ini";
next-server 172.25.1.150;
}
# Amulet 500 series secured
# For APP
class "ENTONE-ESAPP-B72-A5" {
match if substring (option vendor-class-identifier, 0, 19)="ENTONE-ESAPP-B72-A5";
vendor-option-space ENTONE;
option ENTONE.ENTONEINI "http://172.25.1.51/entone/entone_boot.ini";
next-server 172.25.1.150;
}
####################################################################
# Kamai 500 series secured
# For BBL
class "ENTONE-ESBOOT-B72-K5"{
match if substring (option vendor-class-identifier, 0, 20)="ENTONE-ESBOOT-B72-K5";
vendor-option-space ENTONE;
option ENTONE.ENTONEINI "http://172.25.1.51/entone/entone_boot.ini";
next-server 172.25.1.150;
}
# Amulet 500 series secured
# For APP
class "ENTONE-ESAPP-B72-K5" {
match if substring (option vendor-class-identifier, 0, 19)="ENTONE-ESAPP-B72-K5";
vendor-option-space ENTONE;
option ENTONE.ENTONEINI "http://172.25.1.51/entone/entone_boot.ini";
next-server 172.25.1.150;
}
# ------------------------------------------------------------
# -- Option defines For ADB STB
# -----------------------------------------------------------
## --- Define option 131 for multicast address ---
option accp_conf code 131 = array of integer 8;
## --- Define option 240 for the Minerva start string ----
option option-minerva_bootstring code 240 = text;
option option-245 code 245 = string;
#-----------------------------------------------------------------------#
# 3800W TEST SET TOP BOX DEFINES #
# #
# Define test box class with special parameters here #
# Add individual set-tops as sub-classes #
#-----------------------------------------------------------------------#
class "ADB-TEST-3800W" {
match pick-first-value (substring (hardware, 1, 6));
# Change to boot from test loader and use Minerva 5.4 hl code
option accp_conf 239,1,3,20,17,193,10;
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -uib=0 -stbm=adb -tbv=5.4 -verid=Verimatrix";
}
subclass "ADB-TEST-3800W" 00:03:91:AA:0C:05; # Bentley test box
subclass "ADB-TEST-3800W" 00:03:91:AD:75:66; # Prattsburgh NOC test box
# -----------------------------------------------------------
# -- 3800W Minerva LOADER -----------------------------------
# -----------------------------------------------------------
class "adb3800W-bootloader" {
match if (substring (option vendor-class-identifier, 0, 12) = "minerva3800w");
#Multicast channel configuration 239.38.00.30:4545 with 10 seconds timeout
#NOTE: port number 4545 calculation is 17*256 + 193 = 4545
option accp_conf 239,1,2,5,17,193,10;
}
# -----------------------------------------------------------
# -- 3800W HLCODE -- #
# -----------------------------------------------------------
class "adb3800W-hlcode" {
match if substring (option vendor-class-identifier, 0, 24) = "udhcp_MRV3X_1_3800W(ADB)";
# -- Minerva boot string
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -nnvb=1 -stbm=ADB -tbv=4.1 -hbip=172.25.1.150:4440 -hbp=5 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "36";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "36";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
#-----------------------------------------------------------------------#
# 2721W TEST SET TOP BOX DEFINES #
# #
# Define test box class with special parameters here #
# Add individual set-tops as sub-classes #
#-----------------------------------------------------------------------#
class "ADB-TEST-2721W" {
match pick-first-value (substring (hardware, 1, 6));
# Change to boot from test loader and use Minerva 5.7 hl code
option accp_conf 239,1,3,10,17,193,10;
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -uib=0 -stbm=ADB -tbv=5.7 -verid=Verimatrix";
}
subclass "ADB-TEST-2721W" 68:63:59:8C:E7:01; # Bentley Creek test box
subclass "ADB-TEST-2721W" 68:63:59:4F:98:00; # Prattsburgh NOC test box
# -----------------------------------------------------------
# -- 2721w Minerva LOADER -----------------------------------
# -----------------------------------------------------------
class "adb2721W-bootloader" {
match if substring (option vendor-class-identifier, 0, 12) = "ADB-2721W";
#Multicast channel configuration 239.38.00.30:4545 with 10 seconds timeout
#NOTE: port number 4545 calculation is 17*256 + 193 = 4545
option accp_conf 239,1,2,13,17,193,10;
}
# -----------------------------------------------------------
# -- 2721w HLCODE -- #
# -----------------------------------------------------------
class "adb2721W-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) = "udhcp_MRV_2721W(ADB)";
# -- Minerva boot string
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -stbm=ADB -tbv=5.7 -hbip=172.25.1.150:4440 -hbp=5 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "36";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "36";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
#-----------------------------------------------------------------------#
# 2721WX TEST SET TOP BOX DEFINES #
# #
# Define test box class with special parameters here #
# Add individual set-tops as sub-classes #
#-----------------------------------------------------------------------#
class "ADB-TEST-2721WX" {
match pick-first-value (substring (hardware, 1, 6));
# Changed to boot from Dan's test loader and use Minerva 5.7 hl code
option accp_conf 239,1,3,11,17,193,10;
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -uib=0 -stbm=ADB -tbv=5.7 -verid=Verimatrix";
}
#subclass "ADB-TEST-2721WX" 68:63:59:97:1C:F9; # Bentley Creek test box
subclass "ADB-TEST-2721WX" 68:63:59:3B:1C:64; # Dans desk 1
# -----------------------------------------------------------
# -- 2721wx Minerva LOADER -----------------------------------
# -----------------------------------------------------------
class "adb2721Wx-bootloader" {
match if substring (option vendor-class-identifier, 0, 12) = "ADB-2721WX";
#Multicast channel configuration 239.38.00.30:4545 with 10 seconds timeout
#NOTE: port number 4545 calculation is 17*256 + 193 = 4545
option accp_conf 239,1,2,9,17,193,10;
}
# -----------------------------------------------------------
# -- 2721wx HLCODE -- #
# -----------------------------------------------------------
class "adb2721Wx-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) = "udhcp_MRV_2721WX(ADB)";
# -- Minerva boot string
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -stbm=ADB -tbv=5.7 -hbip=172.25.1.150:4440 -hbp=5 -verid=Verimatrix";
#Verimatrix options
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "36";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "36";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
# -----------------------------------------------------------
# -- ADB-3721WN bootloader class ------------------
# -----------------------------------------------------------
class "adb3721WN-bootloader" {
match if substring (option vendor-class-identifier, 0, 12) ="ADB-3721WN";
# For casting code at 239.1.2.9:4545 with timeout of 10 secs.
option accp_conf 239,1,2,15,17,193,10;
}
# -----------------------------------------------------------
# -- ADB-3721WN application class -----------------
# -----------------------------------------------------------
class "adb3721WN-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) ="udhcp_MRV_3721WN(ADB)";
# -- Minerva boot string
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
}
# -----------------------------------------------------------
# -- ADB-5721WNX bootloader class ------------------
# -----------------------------------------------------------
class "adb5721wnx-minerva-loader" {
match if substring (option vendor-class-identifier, 0, 11) ="ADB-5721WNX";
# For casting code at 239.1.2.9:4545 with timeout of 10 secs.
option accp_conf 239,1,2,11,17,193,10;
}
# -----------------------------------------------------------
# -- ADB-5721WNX application class -----------------
# -----------------------------------------------------------
class "adb5721wnx-minerva-hlcode" {
match if substring (option vendor-class-identifier, 0, 22) ="udhcp_MRV_5721WNX(ADB)";
# -- Minerva boot string
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -hbip=172.25.1.150:4440 -hbp=5 -nnvb=1 -tbv=5.4 -stbm=adb -uib=1 -verid=Verimatrix";
# Verimatrix CA specific options (USED ONLY WHEN VM CA IS USED)
option option-rootcert_boot "http:/172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "36";
option option-vm_ini_url "http:/172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "36";
}
#---------------------------------------------------------------------------------------------------------------------------
#------------------------------------------ADB 5810WX LOADER----------------------------------------------------------------#
#---------------------------------------------------------------------------------------------------------------------------
class "adb5810WX-bootloader" {
match if (substring (option vendor-class-identifier, 0, 13) = "minerva5810wx");
#Multicast channel configuration
option accp_conf 239,1,2,7,17,193,10;
}
#---------------------------------------------------------------------------------------------------------------------------
#---------------------------------------------5810WX HLCODE-----------------------------------------------------------------#
#---------------------------------------------------------------------------------------------------------------------------
class "adb5810WX-hlcode" {
match if (substring (option vendor-class-identifier, 0, 25) = "udhcp_MRV3X_1_5810WX(ADB)");
# -- Minerva boot string
# option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -nnvb=1 -stbm=adb -uib=1 -tbv=4.1 -hbip=172.25.1.150:4440 -hbp=5 -verid=Verimatrix";
option option-minerva_bootstring "-bm=0 -ip=172.25.1.150:7780 -nnvb=1 -stbm=adb -tbv=4.1 -hbip=172.25.1.150:4440 -hbp=5 -verid=Verimatrix";
#Verimatrix changes
option option-vm_ini_url "http://172.25.1.150/vcas/VERIMATRIX.INI";
option option-vm_ini_ver "36";
option option-rootcert_boot "http://172.25.1.150/vcas/rootcert.pem";
option option-rootcert_ver "36";
option option-245 "tr069=http://172.25.1.220:8080/xvucwmp/cwmp";
}
#*****************************************************************************************************
#*****************************************************************************************************
# *
# Subnet, pool and allow declarations - See GPON subnets at the end of DHCP file *
# *
#*****************************************************************************************************
#*****************************************************************************************************
##################### DATA NETWORK POOL SECTION ##########################
#
# Local DHCP server subnets
subnet 10.68.0.0 netmask 255.255.255.248 {}
subnet 10.103.255.48 netmask 255.255.255.252 {}
# VM Server Network - This runs in its own failover pool
subnet 172.17.0.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option routers 172.17.1.254;
option domain-name "empacc.net";
option domain-name-servers 172.16.44.11, 172.16.9.8;
pool {
failover peer "VM-failover";
range 172.17.0.51 172.17.0.254;
}
}
# Prattsburgh subnet
subnet 10.103.0.0 netmask 255.255.252.0 {
option subnet-mask 255.255.252.0;
option routers 10.103.1.1;
pool {
failover peer "Empire-failover";
range 10.103.1.100 10.103.3.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
allow members of "ONT";
}
}
subnet 10.103.4.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.4.1;
pool {
failover peer "Empire-failover";
range 10.103.4.21 10.103.4.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
# Pulteney subnets
subnet 10.103.5.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.5.1;
pool {
failover peer "Empire-failover";
range 10.103.5.80 10.103.5.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.6.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.6.1;
pool {
failover peer "Empire-failover";
range 10.103.6.21 10.103.6.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.7.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.7.1;
pool {
failover peer "Empire-failover";
range 10.103.7.21 10.103.7.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.8.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.8.1;
pool {
failover peer "Empire-failover";
range 10.103.8.21 10.103.8.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.0 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.1;
pool {
failover peer "Empire-failover";
range 172.16.144.2 172.16.144.6;
}
}
# Urbana Subnets
subnet 10.103.9.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.9.1;
pool {
failover peer "Empire-failover";
range 10.103.9.21 10.103.9.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
allow members of "ONT";
}
}
subnet 10.103.10.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.10.1;
pool {
failover peer "Empire-failover";
range 10.103.10.21 10.103.10.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.11.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.11.1;
pool {
failover peer "Empire-failover";
range 10.103.11.21 10.103.11.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.12.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.12.1;
pool {
failover peer "Empire-failover";
range 10.103.12.21 10.103.12.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.8 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.9;
pool {
failover peer "Empire-failover";
range 172.16.144.10 172.16.144.14;
}
}
# Naples Subnets
subnet 10.103.13.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.13.1;
pool {
failover peer "Empire-failover";
range 10.103.13.21 10.103.13.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.14.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.14.1;
pool {
failover peer "Empire-failover";
range 10.103.14.21 10.103.14.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.16 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.17;
pool {
failover peer "Empire-failover";
range 172.16.144.18 172.16.144.22;
}
}
# Italy Subnets
subnet 10.103.15.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.15.1;
pool {
failover peer "Empire-failover";
range 10.103.15.21 10.103.15.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.16.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.16.1;
pool {
failover peer "Empire-failover";
range 10.103.16.21 10.103.16.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.24 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.25;
pool {
failover peer "Empire-failover";
range 172.16.144.26 172.16.144.30;
}
}
# Armstrong Subnets
subnet 10.103.17.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.17.1;
pool {
failover peer "Empire-failover";
range 10.103.17.21 10.103.17.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.103.18.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.18.1;
pool {
failover peer "Empire-failover";
range 10.103.18.21 10.103.18.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.32 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.33;
pool {
failover peer "Empire-failover";
range 172.16.144.34 172.16.144.38;
}
}
# E Hill Subnet
subnet 10.103.19.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.19.1;
pool {
failover peer "Empire-failover";
range 10.103.19.21 10.103.19.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.40 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.41;
pool {
failover peer "Empire-failover";
range 172.16.144.42 172.16.144.46;
}
}
# Elmbois Subnet
subnet 10.103.20.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.20.1;
pool {
failover peer "Empire-failover";
range 10.103.20.21 10.103.20.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.48 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.49;
pool {
failover peer "Empire-failover";
range 172.16.144.50 172.16.144.54;
}
}
# Wheeler Subnet
subnet 10.103.21.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.21.1;
pool {
failover peer "Empire-failover";
range 10.103.21.21 10.103.21.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.56 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.57;
pool {
failover peer "Empire-failover";
range 172.16.144.58 172.16.144.62;
}
}
# Mattoon Subnet
subnet 10.103.22.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.22.1;
pool {
failover peer "Empire-failover";
range 10.103.22.21 10.103.22.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.64 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.65;
pool {
failover peer "Empire-failover";
range 172.16.144.66 172.16.144.70;
}
}
#Bean Station
subnet 10.103.24.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.103.24.1;
pool {
failover peer "Empire-failover";
range 10.103.24.21 10.103.24.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.72 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.73;
pool {
failover peer "Empire-failover";
range 172.16.144.74 172.16.144.78;
}
}
#Bullyhill
subnet 10.103.26.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option routers 10.103.26.1;
pool {
failover peer "Empire-failover";
range 10.103.26.21 10.103.27.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.144.80 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.144.81;
pool {
failover peer "Empire-failover";
range 172.16.144.82 172.16.144.86;
}
}
# Burdett subnets
subnet 10.104.1.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.1.1;
pool {
failover peer "Empire-failover";
range 10.104.1.50 10.104.1.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
allow members of "ONT";
}
}
subnet 10.104.2.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.2.1;
pool {
failover peer "Empire-failover";
range 10.104.2.21 10.104.2.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.3.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.3.1;
pool {
failover peer "Empire-failover";
range 10.104.3.21 10.104.3.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.4.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.4.1;
pool {
failover peer "Empire-failover";
range 10.104.4.21 10.104.4.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
# Lodi Point Subnet
subnet 10.104.5.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.5.1;
pool {
failover peer "Empire-failover";
range 10.104.5.21 10.104.5.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.0 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.1;
pool {
failover peer "Empire-failover";
range 172.16.105.2 172.16.105.6;
}
}
# Lodi Subnet
subnet 10.104.6.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.6.1;
pool {
failover peer "Empire-failover";
range 10.104.6.21 10.104.6.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.7.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.7.1;
pool {
failover peer "Empire-failover";
range 10.104.7.21 10.104.7.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.8 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.9;
pool {
failover peer "Empire-failover";
range 172.16.105.10 172.16.105.14;
}
}
# Caywood Subnet
subnet 10.104.8.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.8.1;
pool {
failover peer "Empire-failover";
range 10.104.8.21 10.104.8.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.9.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.9.1;
pool {
failover peer "Empire-failover";
range 10.104.9.21 10.104.9.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.16 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.17;
pool {
failover peer "Empire-failover";
range 172.16.105.18 172.16.105.22;
}
}
# Valois Subnet
subnet 10.104.10.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.10.1;
pool {
failover peer "Empire-failover";
range 10.104.10.21 10.104.10.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.11.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.11.1;
pool {
failover peer "Empire-failover";
range 10.104.11.21 10.104.11.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.24 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.25;
pool {
failover peer "Empire-failover";
range 172.16.105.26 172.16.105.30;
}
}
# Hector Subnet
subnet 10.104.12.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.12.1;
pool {
failover peer "Empire-failover";
range 10.104.12.21 10.104.12.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.13.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.13.1;
pool {
failover peer "Empire-failover";
range 10.104.13.21 10.104.13.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.32 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.33;
pool {
failover peer "Empire-failover";
range 172.16.105.34 172.16.105.38;
}
}
# Logan Subnet
subnet 10.104.14.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.14.1;
pool {
failover peer "Empire-failover";
range 10.104.14.21 10.104.14.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.40 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.41;
pool {
failover peer "Empire-failover";
range 172.16.105.42 172.16.105.46;
}
}
# Reynoldsville Subnet
subnet 10.104.15.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.15.1;
pool {
failover peer "Empire-failover";
range 10.104.15.21 10.104.15.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.16.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.16.1;
pool {
failover peer "Empire-failover";
range 10.104.16.21 10.104.16.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.48 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.49;
pool {
failover peer "Empire-failover";
range 172.16.105.50 172.16.105.54;
}
}
# Stage Subnet
subnet 10.104.17.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.17.1;
pool {
failover peer "Empire-failover";
range 10.104.17.21 10.104.17.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.18.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.18.1;
pool {
failover peer "Empire-failover";
range 10.104.18.21 10.104.18.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.56 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.57;
pool {
failover peer "Empire-failover";
range 172.16.105.58 172.16.105.62;
}
}
# Lake Subnet
subnet 10.104.19.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.19.1;
pool {
failover peer "Empire-failover";
range 10.104.19.21 10.104.19.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.64 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.65;
pool {
failover peer "Empire-failover";
range 172.16.105.66 172.16.105.70;
}
}
# Odessa Subnet
subnet 10.104.20.0 netmask 255.255.252.0 {
option subnet-mask 255.255.252.0;
option routers 10.104.21.1;
pool {
failover peer "Empire-failover";
range 10.104.21.120 10.104.23.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "ONT";
allow members of "BEC";
}
}
subnet 10.104.24.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.24.1;
pool {
failover peer "Empire-failover";
range 10.104.24.21 10.104.24.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.72 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.73;
pool {
failover peer "Empire-failover";
range 172.16.105.74 172.16.105.78;
}
}
# Alpine Subnet
subnet 10.104.25.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.25.1;
pool {
failover peer "Empire-failover";
range 10.104.25.21 10.104.25.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.26.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.26.1;
pool {
failover peer "Empire-failover";
range 10.104.26.21 10.104.26.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.27.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.27.1;
pool {
failover peer "Empire-failover";
range 10.104.27.21 10.104.27.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.28.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.28.1;
pool {
failover peer "Empire-failover";
range 10.104.28.21 10.104.28.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.80 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.81;
pool {
failover peer "Empire-failover";
range 172.16.105.82 172.16.105.86;
}
}
# Wagner Subnet
subnet 10.104.29.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.29.1;
pool {
failover peer "Empire-failover";
range 10.104.29.21 10.104.29.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.88 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.89;
pool {
failover peer "Empire-failover";
range 172.16.105.90 172.16.105.94;
}
}
#Frost Hill
subnet 10.104.35.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.35.1;
pool {
failover peer "Empire-failover";
range 10.104.35.21 10.104.35.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.112 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.113;
pool {
failover peer "Empire-failover";
range 172.16.105.114 172.16.105.118;
}
}
#Lake Grove
subnet 10.104.36.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.36.1;
pool {
failover peer "Empire-failover";
range 10.104.36.21 10.104.36.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.120 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.121;
pool {
failover peer "Empire-failover";
range 172.16.105.122 172.16.105.126;
}
}
# Auble Subnet
subnet 10.104.30.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.30.1;
pool {
failover peer "Empire-failover";
range 10.104.30.21 10.104.30.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.104.31.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.31.1;
pool {
failover peer "Empire-failover";
range 10.104.31.21 10.104.31.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.96 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.97;
pool {
failover peer "Empire-failover";
range 172.16.105.98 172.16.105.102;
}
}
# East Pembroke Subnets
subnet 10.105.1.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.1.1;
pool {
failover peer "Empire-failover";
range 10.105.1.21 10.105.1.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
allow members of "ONT";
}
}
subnet 10.105.2.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.2.1;
pool {
failover peer "Empire-failover";
range 10.105.2.21 10.105.2.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
}
}
subnet 10.105.3.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.3.1;
pool {
failover peer "Empire-failover";
range 10.105.3.21 10.105.3.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
}
}
subnet 10.105.4.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.4.1;
pool {
failover peer "Empire-failover";
range 10.105.4.21 10.105.4.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
}
}
# North Pembroke Subnets
subnet 10.105.5.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.5.1;
pool {
failover peer "Empire-failover";
range 10.105.5.21 10.105.5.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.105.6.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.6.1;
pool {
failover peer "Empire-failover";
range 10.105.6.21 10.105.6.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
}
}
subnet 172.16.170.0 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.170.1;
pool {
failover peer "Empire-failover";
range 172.16.170.3 172.16.170.6;
}
}
# CO RT 5 Cabinet Subnets
subnet 10.105.7.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.7.1;
pool {
failover peer "Empire-failover";
range 10.105.7.21 10.105.7.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.105.8.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.8.1;
pool {
failover peer "Empire-failover";
range 10.105.8.21 10.105.8.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
}
}
subnet 172.16.170.8 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.170.9;
pool {
failover peer "Empire-failover";
range 172.16.170.11 172.16.170.14;
}
}
# Indian Falls Subnets
subnet 10.105.9.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.9.1;
pool {
failover peer "Empire-failover";
range 10.105.9.21 10.105.9.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 10.105.10.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.10.1;
pool {
failover peer "Empire-failover";
range 10.105.10.21 10.105.10.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
}
}
subnet 172.16.170.16 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.170.17;
pool {
failover peer "Empire-failover";
range 172.16.170.19 172.16.170.22;
}
}
# Wilkinson Subnets
subnet 10.105.11.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.105.11.1;
pool {
failover peer "Empire-failover";
range 10.105.11.21 10.105.11.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.170.24 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.170.25;
pool {
failover peer "Empire-failover";
range 172.16.170.27 172.16.170.30;
}
}
# Stewart Road Subnet
subnet 10.104.33.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.104.33.1;
pool {
failover peer "Empire-failover";
range 10.104.33.21 10.104.33.254;
allow members of "Pannaway.PBG";
allow members of "Pannaway.RGN";
allow members of "Pannaway";
allow members of "RGN.210";
allow members of "RGN.210v6";
allow members of "RGN.210v6_2";
allow members of "BEC";
}
}
subnet 172.16.105.104 netmask 255.255.255.248 {
option subnet-mask 255.255.255.248;
option routers 172.16.105.105;
pool {
failover peer "Empire-failover";
range 172.16.105.106 172.16.105.110;
}
}
######## GPON
# Prattsburgh GPON ONTs
subnet 10.113.0.0 netmask 255.255.252.0 {
option subnet-mask 255.255.252.0;
option routers 10.113.0.1;
pool {
failover peer "Empire-failover";
range 10.113.0.34 10.113.3.254;
allow members of "ONT";
}
}
# Urbana GPON ONTs
subnet 10.113.9.0 netmask 255.255.255.0 {
option subnet-mask 255.255.255.0;
option routers 10.113.9.1;
pool {
failover peer "Empire-failover";
range 10.113.9.34 10.113.9.254;
allow members of "ONT";
}
}
# Odessa GPON ONTs
subnet 10.114.20.0 netmask 255.255.252.0 {
option subnet-mask 255.255.252.0;
option routers 10.114.21.1;
pool {
failover peer "Empire-failover";
range 10.114.21.34 10.114.23.254;
allow members of "ONT";
}
}
# burdett GPON ONTs
subnet 10.114.0.0 netmask 255.255.252.0 {
option subnet-mask 255.255.252.0;
option routers 10.114.0.1;
pool {
failover peer "Empire-failover";
range 10.114.0.34 10.114.3.254;
allow members of "ONT";
allow members of "BEC";
}
}
# burdett Calix GPON ONTs
subnet 10.104.210.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option routers 10.104.210.1;
pool {
failover peer "Empire-failover";
range 10.104.210.75 10.104.211.254;
allow members of "calix_ont";
}
}
# prattsburgh Calix GPON ONTs
subnet 10.103.210.0 netmask 255.255.254.0 {
option subnet-mask 255.255.254.0;
option routers 10.103.210.1;
pool {
failover peer "Empire-failover";
range 10.103.210.75 10.103.211.254;
allow members of "calix_ont";
}
}
####################VIDEO RANGE SECTION###########################
#
# Subnets identified here are for set-top booting
#
#
#Temporary space for Armstrong
subnet 172.25.1.0 netmask 255.255.255.0 {
option routers 172.25.1.1;
option broadcast-address 172.25.1.255;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 172.25.1.200 172.25.1.220;
}
}
# Empire pannaway
# # prattsburgh
subnet 10.103.48.0 netmask 255.255.240.0 {
option routers 10.103.48.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.48.4 10.103.63.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
allow members of "adb2721W-bootloader";
allow members of "adb2721W-hlcode";
allow members of "adb2721Wx-bootloader";
allow members of "adb2721Wx-hlcode";
allow members of "adb3721WN-hlcode";
allow members of "adb3721WN-bootloader";
allow members of "adb5721wnx-minerva-hlcode";
allow members of "adb5721wnx-minerva-loader";
}
}
subnet 10.103.64.0 netmask 255.255.248.0 {
option routers 10.103.64.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.64.4 10.103.71.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.72.0 netmask 255.255.248.0 {
option routers 10.103.72.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.72.4 10.103.79.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
##pulteney
subnet 10.103.80.0 netmask 255.255.252.0 {
option routers 10.103.80.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.80.4 10.103.83.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.84.0 netmask 255.255.252.0 {
option routers 10.103.84.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.84.4 10.103.87.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.88.0 netmask 255.255.252.0 {
option routers 10.103.88.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.88.4 10.103.91.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.92.0 netmask 255.255.252.0 {
option routers 10.103.92.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.92.4 10.103.95.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Urbana
subnet 10.103.96.0 netmask 255.255.252.0 {
option routers 10.103.96.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.96.4 10.103.99.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.100.0 netmask 255.255.252.0 {
option routers 10.103.100.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.100.4 10.103.103.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.104.0 netmask 255.255.252.0 {
option routers 10.103.104.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.104.4 10.103.107.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.108.0 netmask 255.255.252.0 {
option routers 10.103.108.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.108.4 10.103.111.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Naples
subnet 10.103.112.0 netmask 255.255.252.0 {
option routers 10.103.112.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.112.4 10.103.115.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.116.0 netmask 255.255.252.0 {
option routers 10.103.116.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.116.4 10.103.119.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Italy
subnet 10.103.120.0 netmask 255.255.252.0 {
option routers 10.103.120.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.120.4 10.103.123.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Armstrong
subnet 10.103.128.0 netmask 255.255.252.0 {
option routers 10.103.128.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.128.4 10.103.131.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.103.132.0 netmask 255.255.252.0 {
option routers 10.103.132.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.132.4 10.103.135.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#E Hill
subnet 10.103.136.0 netmask 255.255.252.0 {
option routers 10.103.136.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.136.4 10.103.139.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Elmbois
subnet 10.103.140.0 netmask 255.255.252.0 {
option routers 10.103.140.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.140.4 10.103.143.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Wheeler
subnet 10.103.144.0 netmask 255.255.252.0 {
option routers 10.103.144.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.144.4 10.103.147.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Mattoon
subnet 10.103.148.0 netmask 255.255.254.0 {
option routers 10.103.148.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.148.4 10.103.149.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Bean Station
subnet 10.103.152.0 netmask 255.255.252.0 {
option routers 10.103.152.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.152.4 10.103.155.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Bully Hill
subnet 10.103.156.0 netmask 255.255.252.0 {
option routers 10.103.156.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.103.156.4 10.103.159.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Burdett CO
##Burdett
subnet 10.104.48.0 netmask 255.255.252.0 {
option routers 10.104.48.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.48.4 10.104.51.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
allow members of "adb2721W-bootloader";
allow members of "adb2721W-hlcode";
allow members of "adb2721Wx-bootloader";
allow members of "adb2721Wx-hlcode";
allow members of "adb3721WN-hlcode";
allow members of "adb3721WN-bootloader";
}
}
subnet 10.104.52.0 netmask 255.255.252.0 {
option routers 10.104.52.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.52.4 10.104.55.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.56.0 netmask 255.255.252.0 {
option routers 10.104.56.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.56.4 10.104.59.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.60.0 netmask 255.255.252.0 {
option routers 10.104.60.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.60.4 10.104.63.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Lodi Point
subnet 10.104.64.0 netmask 255.255.252.0 {
option routers 10.104.64.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.64.4 10.104.67.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Lodi
subnet 10.104.68.0 netmask 255.255.252.0 {
option routers 10.104.68.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.68.4 10.104.71.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.72.0 netmask 255.255.252.0 {
option routers 10.104.72.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.72.4 10.104.75.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Caywood
subnet 10.104.76.0 netmask 255.255.252.0 {
option routers 10.104.76.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.76.4 10.104.79.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.80.0 netmask 255.255.252.0 {
option routers 10.104.80.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.80.4 10.104.83.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Valois
subnet 10.104.84.0 netmask 255.255.252.0 {
option routers 10.104.84.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.84.4 10.104.87.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.88.0 netmask 255.255.252.0 {
option routers 10.104.88.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.88.4 10.104.91.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Hector
subnet 10.104.92.0 netmask 255.255.252.0 {
option routers 10.104.92.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.92.4 10.104.95.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.96.0 netmask 255.255.252.0 {
option routers 10.104.96.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.96.4 10.104.99.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Logan
subnet 10.104.100.0 netmask 255.255.252.0 {
option routers 10.104.100.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.100.4 10.104.103.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Reynoldsville
subnet 10.104.104.0 netmask 255.255.252.0 {
option routers 10.104.104.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.104.4 10.104.107.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.108.0 netmask 255.255.252.0 {
option routers 10.104.108.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.108.4 10.104.111.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Stage
subnet 10.104.112.0 netmask 255.255.252.0 {
option routers 10.104.112.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.112.4 10.104.115.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.116.0 netmask 255.255.252.0 {
option routers 10.104.116.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.116.4 10.104.119.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Lake
subnet 10.104.120.0 netmask 255.255.252.0 {
option routers 10.104.120.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.120.4 10.104.123.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.124.0 netmask 255.255.252.0 {
option routers 10.104.124.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.124.4 10.104.127.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Odessa
subnet 10.104.128.0 netmask 255.255.240.0 {
option routers 10.104.128.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.128.4 10.104.143.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
allow members of "adb2721W-bootloader";
allow members of "adb2721W-hlcode";
allow members of "adb2721Wx-bootloader";
allow members of "adb2721Wx-hlcode";
allow members of "adb3721WN-hlcode";
allow members of "adb3721WN-bootloader";
}
}
#Alpine
subnet 10.104.144.0 netmask 255.255.252.0 {
option routers 10.104.144.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.144.4 10.104.147.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.148.0 netmask 255.255.252.0 {
option routers 10.104.148.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.148.4 10.104.151.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.152.0 netmask 255.255.252.0 {
option routers 10.104.152.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.152.4 10.104.155.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.156.0 netmask 255.255.252.0 {
option routers 10.104.156.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.156.4 10.104.159.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Wagner
subnet 10.104.160.0 netmask 255.255.252.0 {
option routers 10.104.160.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.160.4 10.104.163.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Frost Hill
subnet 10.104.184.0 netmask 255.255.252.0 {
option routers 10.104.184.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.184.4 10.104.187.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Lake Grove
subnet 10.104.188.0 netmask 255.255.252.0 {
option routers 10.104.188.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.188.4 10.104.191.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Auble
subnet 10.104.164.0 netmask 255.255.252.0 {
option routers 10.104.164.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.164.4 10.104.167.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.168.0 netmask 255.255.252.0 {
option routers 10.104.168.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.168.4 10.104.171.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.172.0 netmask 255.255.252.0 {
option routers 10.104.172.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.172.4 10.104.175.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Stewart Rd
subnet 10.104.176.0 netmask 255.255.252.0 {
option routers 10.104.176.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.176.4 10.104.179.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.104.180.0 netmask 255.255.252.0 {
option routers 10.104.180.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.180.4 10.104.183.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Pembroke CO
##East Pembroke
subnet 10.105.48.0 netmask 255.255.252.0 {
option routers 10.105.48.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.48.4 10.105.51.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.52.0 netmask 255.255.252.0 {
option routers 10.105.52.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.52.4 10.105.55.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.56.0 netmask 255.255.252.0 {
option routers 10.105.56.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.56.4 10.105.59.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.60.0 netmask 255.255.252.0 {
option routers 10.105.60.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.60.4 10.105.63.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#North Pembroke
subnet 10.105.64.0 netmask 255.255.252.0 {
option routers 10.105.64.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.64.4 10.105.67.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.68.0 netmask 255.255.252.0 {
option routers 10.105.68.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.68.4 10.105.71.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.72.0 netmask 255.255.252.0 {
option routers 10.105.72.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.72.4 10.105.75.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.76.0 netmask 255.255.252.0 {
option routers 10.105.76.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.76.4 10.105.79.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Indian Falls
subnet 10.105.80.0 netmask 255.255.252.0 {
option routers 10.105.80.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.80.4 10.105.83.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.84.0 netmask 255.255.252.0 {
option routers 10.105.84.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.84.4 10.105.87.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#Wilkinson
subnet 10.105.88.0 netmask 255.255.252.0 {
option routers 10.105.88.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.88.4 10.105.91.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
#CO RT 5 Cabinet
subnet 10.105.92.0 netmask 255.255.252.0 {
option routers 10.105.92.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.92.4 10.105.95.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.96.0 netmask 255.255.252.0 {
option routers 10.105.96.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.96.4 10.105.99.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.100.0 netmask 255.255.252.0 {
option routers 10.105.100.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.100.4 10.105.103.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
subnet 10.105.104.0 netmask 255.255.252.0 {
option routers 10.105.104.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.105.104.4 10.105.107.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
}
}
# Calix - VLAN 302
subnet 10.104.192.0 netmask 255.255.240.0 {
option routers 10.104.192.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.192.100 10.104.207.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
allow members of "adb2721W-bootloader";
allow members of "adb2721W-hlcode";
allow members of "adb2721Wx-bootloader";
allow members of "adb2721Wx-hlcode";
allow members of "adb3721WN-hlcode";
allow members of "adb3721WN-bootloader";
allow members of "adb5721wnx-minerva-hlcode";
allow members of "adb5721wnx-minerva-loader";
allow members of "ADB-TEST-3800W";
allow members of "ADB-TEST-2721W";
allow members of "ADB-TEST-2721WX";
allow members of "AMINOx0xx";
allow members of "AMINOx4x";
allow members of "AMINOx5x";
allow members of "ENTONE-ESBOOT-B72-A5";
allow members of "ENTONE-ESAPP-B72-A5";
allow members of "ENTONE-ESBOOT-B72-K5";
allow members of "ENTONE-ESAPP-B72-K5";
}
}
####NEW Video range - VLAN 301
subnet 10.104.224.0 netmask 255.255.240.0 {
option routers 10.104.224.1;
pool {
failover peer "Empire-failover";
next-server 172.25.1.104;
range 10.104.224.1 10.104.239.254;
allow members of "adb3800W-bootloader";
allow members of "adb3800W-hlcode";
allow members of "adb5810WX-hlcode";
allow members of "adb5810WX-bootloader";
allow members of "adb2721W-bootloader";
allow members of "adb2721W-hlcode";
allow members of "adb2721Wx-bootloader";
allow members of "adb2721Wx-hlcode";
allow members of "adb3721WN-hlcode";
allow members of "adb3721WN-bootloader";
allow members of "ADB-TEST-3800W";
allow members of "ADB-TEST-2721W";
allow members of "ADB-TEST-2721WX";
allow members of "AMINOx0xx";
allow members of "AMINOx4x";
allow members of "AMINOx5x";
allow members of "ENTONE-ESBOOT-B72-A5";
allow members of "ENTONE-ESAPP-B72-A5";
allow members of "ENTONE-ESBOOT-B72-K5";
allow members of "ENTONE-ESAPP-B72-K5";
}
}