version 12.4 no service pad service timestamps debug datetime msec service timestamps log datetime msec service password-encryption hostname HSRLAP12 enable secret 5 $1$G9lm$SqUdCnN3pC9xHSs1hRth/0 no aaa new-model resource policy clock timezone gmt -6 clock summer-time s recurring ip subnet-zero ip name-server 10.1.3.2 ip name-server 10.14.2.50 dot11 ssid 101V vlan 1 authentication open authentication key-management wpa wpa-psk ascii 7 065259771F195D4C5645415F55547C7A dot11 ssid White vlan 20 authentication open dot11 network-map power inline negotiation prestandard source username Homeshield privilege 15 password 7 1139390B031A581E class-map match-all _class_SVP0 match ip precedence 5 policy-map SVP class _class_SVP0 set cos 6 bridge irb interface Dot11Radio0 no ip address no ip route-cache encryption vlan 20 key 1 size 128bit 7 CB6B5E135331685355443A705432 transmit-key encryption vlan 20 key 2 size 128bit 7 071D06B1206C2A115B3208534752 encryption vlan 20 key 3 size 128bit 7 3157233F3E06203274905E4A6E16 encryption vlan 20 key 4 size 128bit 7 E646640DC4226E551F59356B3256 encryption vlan 20 mode wep mandatory encryption vlan 1 mode ciphers aes-ccm ssid 101V ssid White antenna gain 7 mbssid speed 1.0 2.0 5.5 basic-11.0 6.0 9.0 12.0 18.0 24.0 36.0 48.0 54.0 packet retries 12 station-role root rts retries 24 beacon dtim-period 3 interface Dot11Radio0.1 encapsulation dot1Q 1 ip address 10.14.2.233 255.255.255.0 no ip route-cache no snmp trap link-status bridge-group 1 bridge-group 1 subscriber-loop-control bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding bridge-group 1 spanning-disabled service-policy input SVP service-policy output SVP interface Dot11Radio0.20 encapsulation dot1Q 20 native no ip route-cache ip address 10.14.3.28 255.255.255.0 no snmp trap link-status bridge-group 20 bridge-group 20 subscriber-loop-control bridge-group 20 block-unknown-source no bridge-group 20 source-learning no bridge-group 20 unicast-flooding bridge-group 20 spanning-disabled interface Dot11Radio1 no ip address no ip route-cache shutdown encryption vlan 20 key 1 size 128bit 7 025FF04F77221B0FB2556D2E605B transmit-key encryption vlan 20 key 2 size 128bit 7 071D06B1206C2A115B3208534752 encryption vlan 20 key 3 size 128bit 7 3157233F3E06203274905E4A6E16 encryption vlan 20 key 4 size 128bit 7 E646640DC4226E551F59356B3256 encryption vlan 20 mode wep mandatory encryption vlan 1 mode ciphers aes-ccm ssid White dfs band 3 block channel dfs station-role root interface Dot11Radio1.1 encapsulation dot1Q 1 no ip route-cache no snmp trap link-status bridge-group 1 bridge-group 1 subscriber-loop-control bridge-group 1 block-unknown-source no bridge-group 1 source-learning no bridge-group 1 unicast-flooding bridge-group 1 spanning-disabled interface Dot11Radio1.20 encapsulation dot1Q 20 native no ip route-cache no snmp trap link-status bridge-group 20 bridge-group 20 subscriber-loop-control bridge-group 20 block-unknown-source no bridge-group 20 source-learning no bridge-group 20 unicast-flooding bridge-group 20 spanning-disabled interface FastEthernet0 no ip address no ip route-cache duplex auto speed auto interface FastEthernet0.1 encapsulation dot1Q 1 ip address 10.14.2.226 255.255.255.0 no ip route-cache no snmp trap link-status bridge-group 1 no bridge-group 1 source-learning bridge-group 1 spanning-disabled service-policy input SVP interface FastEthernet0.20 encapsulation dot1Q 20 native ip address 10.14.3.26 255.255.255.0 no ip route-cache no snmp trap link-status bridge-group 20 no bridge-group 20 source-learning bridge-group 20 spanning-disabled interface BVI1 ip address 10.14.3.26 255.255.255.0 no ip route-cache ip default-gateway 10.14.3.1 ip http server no ip http secure-server ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag bridge 1 route ip banner login ^W A R N I N G ------------- THIS IS A PRIVATE COMPUTER SYSTEM. This computer system including all related equipment, network devices (specifically including Internet access), are provided only for authorized use. All computer systems may be monitored for all lawful purposes, including to ensure that their use is authorized, for management of the system, to facilitate protection against unauthorized access, and to verify security procedures, survivability and operational security. Monitoring includes active attacks by authorized personnel and their entities to test or verify the security of the system. During monitoring, information may be examined, recorded, copied and used for authorized purposes. All information including personal information, placed on or sent over this system may be monitored. Uses of this system, authorized or unauthorized, constitutes consent to monitoring of this system.There is No Privacy on this system. Unauthorized use may subject you to criminal prosecution. Evidence of any such unauthorized use collected during monitoring may be used for admistrative, criminal or other adverse action. Use of this system constitutes consent to monitoring for these purposes.^C line con 0 password 7 07272E414B1A110C121E0F login line vty 0 4 password 7 03347B051207725E login local end