Configuration Templates
Pre-built, production-ready configuration snippets for all major network vendors.
Vendor
Category
OSPF Single Area
Basic OSPF configuration for single area networks
RoutingOSPFEnterprise
router ospf 1
router-id 1.1.1.1
network 10.0.0.0 0.0.0.255 area 0
network 192.168.0.0 0.0.0.255 area 0
passive-interface default
no passive-interface GigabitEthernet0/0VTP Configuration
VLAN Trunking Protocol setup
SwitchingVLANCampus
vtp mode server
vtp domain NETWORK
vtp password MySecurePass
vlan 10,20,30
!
interface GigabitEthernet0/24
switchport mode trunk
switchport trunk encapsulation dot1q
switchport trunk allowed vlan allBGP Dual ISP
BGP configuration for multi-ISP failover
BGPMulti-ISPHA
router bgp 65001
bgp router-id 1.1.1.1
neighbor 203.0.113.1 remote-as 65100
neighbor 203.0.113.1 description ISP-A
neighbor 203.0.113.5 remote-as 65101
neighbor 203.0.113.5 description ISP-B
!
address-family ipv4
redistribute static
neighbor 203.0.113.1 activate
neighbor 203.0.113.5 activate
exit-address-familyFirewall Policy
Basic Fortinet firewall policy
FirewallPolicyFortinet
config firewall policy
edit 1
set name "Allow-Internal-Web"
set srcintf "port1"
set dstintf "port2"
set srcaddr "all"
set dstaddr "all"
set service "HTTP" "HTTPS"
set action accept
set schedule "always"
set logtraffic all
next
endIPsec VPN Phase 1
IPsec VPN IKE phase 1 configuration
VPNIPsecBranch
config vpn ipsec phase1-interface
edit "to-branch"
set interface "wan1"
set ike-version 2
set keylife 28800
set peertype any
set proposal aes256-sha256
set remote-gw 203.0.113.10
set psksecret "MySecureKey123!"
next
endSecurity Zone
Palo Alto Networks security zone configuration
SecurityZonesPalo Alto
set zone trust network layer3 ethernet1/1
set zone untrust network layer3 ethernet1/2
set zone dmz network layer3 ethernet1/3
set network virtual-router default routing-table ip static-route 0.0.0.0/0 nexthop ip-address 203.0.113.1
set rulebase security rules "Allow-Web" from trust to untrust
set rulebase security rules "Allow-Web" source any
set rulebase security rules "Allow-Web" destination any
set rulebase security rules "Allow-Web" action allowVLAN Interface
Arista VLAN and interface configuration
SwitchingVLANArista
vlan 10
name Engineering
!
vlan 20
name Sales
!
interface Vlan10
ip address 10.10.1.1/24
!
interface Vlan20
ip address 10.20.1.1/24
!
interface Ethernet1/1
description "Access Port Engineering"
switchport access vlan 10BGP EVPN
BGP EVPN for data center overlay
BGPEVPNData Center
router bgp 65001
neighbor SPINE peer group
neighbor SPINE remote-as 65000
neighbor SPINE update-source Loopback0
neighbor 192.168.255.1 peer group SPINE
!
address-family evpn
neighbor SPINE activate
!
address-family ipv4
neighbor SPINE activate