專案

一般

配置概況

檔案 » HBB-Bali-Firewall-Edge2Cloud_7-2_1396_202401111903.conf

E2C_IT_Firewall_BackupFile_20240112_BL - 俊霖 江, 2024-01-12 16:50

 
#config-version=FGT61F-7.2.4-FW-build1396-230131:opmode=0:vdom=0:user=B10013
#conf_file_ver=343529707959116777
#buildno=1396
#global_vdom=1
config system global
set admin-server-cert "wildcard.tahoho.com.tw"
set admin-sport 8443
set alias "FortiGate-61F"
set autorun-log-fsck enable
set gui-certificates enable
set hostname "HBB-Bali-Firewall-Edge2Cloud"
set language trach
set management-port-use-admin-sport disable
set switch-controller enable
set timezone 04
set virtual-switch-vlan enable
end
config system accprofile
edit "prof_admin"
set secfabgrp read-write
set ftviewgrp read-write
set authgrp read-write
set sysgrp read-write
set netgrp read-write
set loggrp read-write
set fwgrp read-write
set vpngrp read-write
set utmgrp read-write
set wanoptgrp read-write
set wifi read-write
next
end
config system np6xlite
edit "np6xlite_0"
next
end
config system interface
edit "wan1"
set vdom "root"
set ip 61.220.103.116 255.255.255.0
set allowaccess ping https http fgfm
set type physical
set role wan
set snmp-index 1
next
edit "wan2"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set role wan
set snmp-index 2
next
edit "dmz"
set vdom "root"
set ip 10.10.10.1 255.255.255.0
set allowaccess ping https fgfm fabric
set type physical
set role dmz
set snmp-index 3
next
edit "internal1"
set vdom "root"
set type physical
set snmp-index 10
next
edit "internal2"
set vdom "root"
set type physical
set snmp-index 11
next
edit "internal3"
set vdom "root"
set type physical
set snmp-index 12
next
edit "internal4"
set vdom "root"
set type physical
set snmp-index 13
next
edit "internal5"
set vdom "root"
set type physical
set snmp-index 14
next
edit "a"
set vdom "root"
set type physical
set snmp-index 4
next
edit "b"
set vdom "root"
set type physical
set snmp-index 5
next
edit "modem"
set vdom "root"
set mode pppoe
set status down
set type physical
set snmp-index 6
next
edit "naf.root"
set vdom "root"
set type tunnel
set src-check disable
set snmp-index 15
next
edit "l2t.root"
set vdom "root"
set type tunnel
set snmp-index 16
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 7
next
edit "fortilink"
set vdom "root"
set fortilink enable
set ip 169.254.1.1 255.255.255.0
set allowaccess ping fabric
set type aggregate
set member "a" "b"
set lldp-reception enable
set lldp-transmission enable
set snmp-index 9
next
edit "E2C-LAN"
set vdom "root"
set ip 10.50.30.254 255.255.255.0
set allowaccess ping https snmp http fgfm
set type hard-switch
set device-identification enable
set lldp-transmission enable
set role lan
set snmp-index 17
next
end
config system physical-switch
edit "sw0"
set age-val 0
next
end
config system virtual-switch
edit "E2C-LAN"
set physical-switch "sw0"
config port
edit "internal1"
next
edit "internal2"
next
edit "internal3"
next
edit "internal4"
next
edit "internal5"
next
end
next
end
config system custom-language
edit "en"
set filename "en"
next
edit "fr"
set filename "fr"
next
edit "sp"
set filename "sp"
next
edit "pg"
set filename "pg"
next
edit "x-sjis"
set filename "x-sjis"
next
edit "big5"
set filename "big5"
next
edit "GB2312"
set filename "GB2312"
next
edit "euc-kr"
set filename "euc-kr"
next
end
config system admin
edit "admin"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "all"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "all"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "all"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "all"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "all"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set password ENC SH2186R8XctsyKhpCM2yqHUavM44VLTuibCJuocGLb/Pm4xtDhxLIOHAGU0R8U=
next
edit "B10013"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set remote-group "RemoteUserGroup"
set password ENC SH2JTh73EhjdiA8SSVVakMTotArV18HHdyoSMMXheJ987enYmksraro3SYjxgk=
next
edit "itservice"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set password ENC SH2VsO+GQvV89xCsu9WOkpZVzeHVnxKL3ZHE5YvN8M8DKfWmh/HrVQSI5NebtQ=
next
end
config system sso-admin
end
config system ha
set override disable
end
config system storage
edit "Internal"
set status enable
set media-status enable
set order 1
set partition "LOGUSEDXC111B03B"
set device "/dev/sda1"
set size 120186
set usage log
next
end
config system dns
set primary 8.8.8.8
set secondary 8.8.8.8
set ssl-certificate "wildcard.tahoho.com.tw"
end
config system replacemsg-image
edit "logo_fnet"
set image-type gif
next
edit "logo_fguard_wf"
set image-type gif
next
edit "logo_v3_fguard_app"
next
end
config system replacemsg mail "partial"
end
config system replacemsg http "url-block"
end
config system replacemsg http "urlfilter-err"
end
config system replacemsg http "infcache-block"
end
config system replacemsg http "http-contenttypeblock"
end
config system replacemsg http "https-invalid-cert-block"
end
config system replacemsg http "https-untrusted-cert-block"
end
config system replacemsg http "https-blocklisted-cert-block"
end
config system replacemsg http "switching-protocols-block"
end
config system replacemsg http "http-antiphish-block"
end
config system replacemsg http "videofilter-block"
end
config system replacemsg webproxy "deny"
end
config system replacemsg webproxy "user-limit"
end
config system replacemsg webproxy "auth-challenge"
end
config system replacemsg webproxy "auth-login-fail"
end
config system replacemsg webproxy "auth-group-info-fail"
end
config system replacemsg webproxy "http-err"
end
config system replacemsg webproxy "auth-ip-blackout"
end
config system replacemsg webproxy "ztna-block"
end
config system replacemsg ftp "ftp-explicit-banner"
end
config system replacemsg fortiguard-wf "ftgd-block"
end
config system replacemsg fortiguard-wf "ftgd-ovrd"
end
config system replacemsg fortiguard-wf "ftgd-quota"
end
config system replacemsg fortiguard-wf "ftgd-warning"
end
config system replacemsg spam "ipblocklist"
end
config system replacemsg spam "smtp-spam-dnsbl"
end
config system replacemsg spam "smtp-spam-feip"
end
config system replacemsg spam "smtp-spam-helo"
end
config system replacemsg spam "smtp-spam-emailblock-to"
end
config system replacemsg spam "smtp-spam-emailblock-from"
end
config system replacemsg spam "smtp-spam-emailblock-subject"
end
config system replacemsg spam "smtp-spam-mimeheader"
end
config system replacemsg spam "reversedns"
end
config system replacemsg spam "smtp-spam-ase"
end
config system replacemsg spam "submit"
end
config system replacemsg alertmail "alertmail-virus"
end
config system replacemsg alertmail "alertmail-block"
end
config system replacemsg alertmail "alertmail-nids-event"
end
config system replacemsg alertmail "alertmail-crit-event"
end
config system replacemsg alertmail "alertmail-disk-full"
end
config system replacemsg admin "pre_admin-disclaimer-text"
end
config system replacemsg admin "post_admin-disclaimer-text"
end
config system replacemsg auth "auth-disclaimer-page-1"
end
config system replacemsg auth "auth-disclaimer-page-2"
end
config system replacemsg auth "auth-disclaimer-page-3"
end
config system replacemsg auth "auth-proxy-reject-page"
end
config system replacemsg auth "auth-reject-page"
end
config system replacemsg auth "auth-login-page"
end
config system replacemsg auth "auth-login-failed-page"
end
config system replacemsg auth "auth-token-login-page"
end
config system replacemsg auth "auth-token-login-failed-page"
end
config system replacemsg auth "auth-success-msg"
end
config system replacemsg auth "auth-challenge-page"
end
config system replacemsg auth "auth-keepalive-page"
end
config system replacemsg auth "auth-portal-page"
end
config system replacemsg auth "auth-password-page"
end
config system replacemsg auth "auth-fortitoken-page"
end
config system replacemsg auth "auth-next-fortitoken-page"
end
config system replacemsg auth "auth-email-token-page"
end
config system replacemsg auth "auth-sms-token-page"
end
config system replacemsg auth "auth-email-harvesting-page"
end
config system replacemsg auth "auth-email-failed-page"
end
config system replacemsg auth "auth-cert-passwd-page"
end
config system replacemsg auth "auth-guest-print-page"
end
config system replacemsg auth "auth-guest-email-page"
end
config system replacemsg auth "auth-success-page"
end
config system replacemsg auth "auth-block-notification-page"
end
config system replacemsg auth "auth-quarantine-page"
end
config system replacemsg auth "auth-qtn-reject-page"
end
config system replacemsg auth "auth-saml-page"
end
config system replacemsg sslvpn "sslvpn-login"
end
config system replacemsg sslvpn "sslvpn-header"
end
config system replacemsg sslvpn "sslvpn-limit"
end
config system replacemsg sslvpn "hostcheck-error"
end
config system replacemsg sslvpn "sslvpn-provision-user"
end
config system replacemsg sslvpn "sslvpn-provision-user-sms"
end
config system replacemsg nac-quar "nac-quar-virus"
end
config system replacemsg nac-quar "nac-quar-dos"
end
config system replacemsg nac-quar "nac-quar-ips"
end
config system replacemsg nac-quar "nac-quar-dlp"
end
config system replacemsg nac-quar "nac-quar-admin"
end
config system replacemsg nac-quar "nac-quar-app"
end
config system replacemsg traffic-quota "per-ip-shaper-block"
end
config system replacemsg utm "virus-html"
end
config system replacemsg utm "client-virus-html"
end
config system replacemsg utm "virus-text"
end
config system replacemsg utm "dlp-html"
end
config system replacemsg utm "dlp-text"
end
config system replacemsg utm "appblk-html"
end
config system replacemsg utm "ipsblk-html"
end
config system replacemsg utm "ipsfail-html"
end
config system replacemsg utm "exe-text"
end
config system replacemsg utm "waf-html"
end
config system replacemsg utm "outbreak-prevention-html"
end
config system replacemsg utm "outbreak-prevention-text"
end
config system replacemsg utm "external-blocklist-html"
end
config system replacemsg utm "external-blocklist-text"
end
config system replacemsg utm "ems-threat-feed-html"
end
config system replacemsg utm "ems-threat-feed-text"
end
config system replacemsg utm "file-filter-html"
end
config system replacemsg utm "file-filter-text"
end
config system replacemsg utm "file-size-text"
end
config system replacemsg utm "transfer-size-text"
end
config system replacemsg utm "internal-error-text"
end
config system replacemsg utm "archive-block-html"
end
config system replacemsg utm "archive-block-text"
end
config system replacemsg utm "file-av-fail-text"
end
config system replacemsg utm "transfer-av-fail-text"
end
config system replacemsg utm "banned-word-html"
end
config system replacemsg utm "banned-word-text"
end
config system replacemsg utm "block-html"
end
config system replacemsg utm "block-text"
end
config system replacemsg utm "decompress-limit-text"
end
config system replacemsg utm "dlp-subject-text"
end
config system replacemsg utm "file-size-html"
end
config system replacemsg utm "client-file-size-html"
end
config system replacemsg utm "inline-scan-timeout-html"
end
config system replacemsg utm "inline-scan-timeout-text"
end
config system replacemsg utm "inline-scan-error-html"
end
config system replacemsg utm "inline-scan-error-text"
end
config system replacemsg utm "icap-block-text"
end
config system replacemsg utm "icap-error-text"
end
config system replacemsg utm "icap-http-error"
end
config system replacemsg icap "icap-req-resp"
end
config system replacemsg automation "automation-email"
end
config system snmp sysinfo
end
config system central-management
set type fortiguard
end
config firewall internet-service-name
edit "Google-Other"
set internet-service-id 65536
next
edit "Google-Web"
set internet-service-id 65537
next
edit "Google-ICMP"
set internet-service-id 65538
next
edit "Google-DNS"
set internet-service-id 65539
next
edit "Google-Outbound_Email"
set internet-service-id 65540
next
edit "Google-SSH"
set internet-service-id 65542
next
edit "Google-FTP"
set internet-service-id 65543
next
edit "Google-NTP"
set internet-service-id 65544
next
edit "Google-Inbound_Email"
set internet-service-id 65545
next
edit "Google-LDAP"
set internet-service-id 65550
next
edit "Google-NetBIOS.Session.Service"
set internet-service-id 65551
next
edit "Google-RTMP"
set internet-service-id 65552
next
edit "Google-NetBIOS.Name.Service"
set internet-service-id 65560
next
edit "Google-Google.Cloud"
set internet-service-id 65641
next
edit "Google-Google.Bot"
set internet-service-id 65643
next
edit "Google-Gmail"
set internet-service-id 65646
next
edit "Meta-Other"
set internet-service-id 131072
next
edit "Meta-Web"
set internet-service-id 131073
next
edit "Meta-ICMP"
set internet-service-id 131074
next
edit "Meta-DNS"
set internet-service-id 131075
next
edit "Meta-Outbound_Email"
set internet-service-id 131076
next
edit "Meta-SSH"
set internet-service-id 131078
next
edit "Meta-FTP"
set internet-service-id 131079
next
edit "Meta-NTP"
set internet-service-id 131080
next
edit "Meta-Inbound_Email"
set internet-service-id 131081
next
edit "Meta-LDAP"
set internet-service-id 131086
next
edit "Meta-NetBIOS.Session.Service"
set internet-service-id 131087
next
edit "Meta-RTMP"
set internet-service-id 131088
next
edit "Meta-NetBIOS.Name.Service"
set internet-service-id 131096
next
edit "Meta-Whatsapp"
set internet-service-id 131184
next
edit "Meta-Instagram"
set internet-service-id 131189
next
edit "Apple-Other"
set internet-service-id 196608
next
edit "Apple-Web"
set internet-service-id 196609
next
edit "Apple-ICMP"
set internet-service-id 196610
next
edit "Apple-DNS"
set internet-service-id 196611
next
edit "Apple-Outbound_Email"
set internet-service-id 196612
next
edit "Apple-SSH"
set internet-service-id 196614
next
edit "Apple-FTP"
set internet-service-id 196615
next
edit "Apple-NTP"
set internet-service-id 196616
next
edit "Apple-Inbound_Email"
set internet-service-id 196617
next
edit "Apple-LDAP"
set internet-service-id 196622
next
edit "Apple-NetBIOS.Session.Service"
set internet-service-id 196623
next
edit "Apple-RTMP"
set internet-service-id 196624
next
edit "Apple-NetBIOS.Name.Service"
set internet-service-id 196632
next
edit "Apple-App.Store"
set internet-service-id 196723
next
edit "Apple-APNs"
set internet-service-id 196747
next
edit "Yahoo-Other"
set internet-service-id 262144
next
edit "Yahoo-Web"
set internet-service-id 262145
next
edit "Yahoo-ICMP"
set internet-service-id 262146
next
edit "Yahoo-DNS"
set internet-service-id 262147
next
edit "Yahoo-Outbound_Email"
set internet-service-id 262148
next
edit "Yahoo-SSH"
set internet-service-id 262150
next
edit "Yahoo-FTP"
set internet-service-id 262151
next
edit "Yahoo-NTP"
set internet-service-id 262152
next
edit "Yahoo-Inbound_Email"
set internet-service-id 262153
next
edit "Yahoo-LDAP"
set internet-service-id 262158
next
edit "Yahoo-NetBIOS.Session.Service"
set internet-service-id 262159
next
edit "Yahoo-RTMP"
set internet-service-id 262160
next
edit "Yahoo-NetBIOS.Name.Service"
set internet-service-id 262168
next
edit "Microsoft-Other"
set internet-service-id 327680
next
edit "Microsoft-Web"
set internet-service-id 327681
next
edit "Microsoft-ICMP"
set internet-service-id 327682
next
edit "Microsoft-DNS"
set internet-service-id 327683
next
edit "Microsoft-Outbound_Email"
set internet-service-id 327684
next
edit "Microsoft-SSH"
set internet-service-id 327686
next
edit "Microsoft-FTP"
set internet-service-id 327687
next
edit "Microsoft-NTP"
set internet-service-id 327688
next
edit "Microsoft-Inbound_Email"
set internet-service-id 327689
next
edit "Microsoft-LDAP"
set internet-service-id 327694
next
edit "Microsoft-NetBIOS.Session.Service"
set internet-service-id 327695
next
edit "Microsoft-RTMP"
set internet-service-id 327696
next
edit "Microsoft-NetBIOS.Name.Service"
set internet-service-id 327704
next
edit "Microsoft-Skype_Teams"
set internet-service-id 327781
next
edit "Microsoft-Office365"
set internet-service-id 327782
next
edit "Microsoft-Azure"
set internet-service-id 327786
next
edit "Microsoft-Bing.Bot"
set internet-service-id 327788
next
edit "Microsoft-Outlook"
set internet-service-id 327791
next
edit "Microsoft-Microsoft.Update"
set internet-service-id 327793
next
edit "Microsoft-Dynamics"
set internet-service-id 327837
next
edit "Microsoft-WNS"
set internet-service-id 327839
next
edit "Microsoft-Office365.Published"
set internet-service-id 327880
next
edit "Amazon-Other"
set internet-service-id 393216
next
edit "Amazon-Web"
set internet-service-id 393217
next
edit "Amazon-ICMP"
set internet-service-id 393218
next
edit "Amazon-DNS"
set internet-service-id 393219
next
edit "Amazon-Outbound_Email"
set internet-service-id 393220
next
edit "Amazon-SSH"
set internet-service-id 393222
next
edit "Amazon-FTP"
set internet-service-id 393223
next
edit "Amazon-NTP"
set internet-service-id 393224
next
edit "Amazon-Inbound_Email"
set internet-service-id 393225
next
edit "Amazon-LDAP"
set internet-service-id 393230
next
edit "Amazon-NetBIOS.Session.Service"
set internet-service-id 393231
next
edit "Amazon-RTMP"
set internet-service-id 393232
next
edit "Amazon-NetBIOS.Name.Service"
set internet-service-id 393240
next
edit "Amazon-AWS"
set internet-service-id 393320
next
edit "Amazon-AWS.WorkSpaces.Gateway"
set internet-service-id 393403
next
edit "eBay-Other"
set internet-service-id 458752
next
edit "eBay-Web"
set internet-service-id 458753
next
edit "eBay-ICMP"
set internet-service-id 458754
next
edit "eBay-DNS"
set internet-service-id 458755
next
edit "eBay-Outbound_Email"
set internet-service-id 458756
next
edit "eBay-SSH"
set internet-service-id 458758
next
edit "eBay-FTP"
set internet-service-id 458759
next
edit "eBay-NTP"
set internet-service-id 458760
next
edit "eBay-Inbound_Email"
set internet-service-id 458761
next
edit "eBay-LDAP"
set internet-service-id 458766
next
edit "eBay-NetBIOS.Session.Service"
set internet-service-id 458767
next
edit "eBay-RTMP"
set internet-service-id 458768
next
edit "eBay-NetBIOS.Name.Service"
set internet-service-id 458776
next
edit "PayPal-Other"
set internet-service-id 524288
next
edit "PayPal-Web"
set internet-service-id 524289
next
edit "PayPal-ICMP"
set internet-service-id 524290
next
edit "PayPal-DNS"
set internet-service-id 524291
next
edit "PayPal-Outbound_Email"
set internet-service-id 524292
next
edit "PayPal-SSH"
set internet-service-id 524294
next
edit "PayPal-FTP"
set internet-service-id 524295
next
edit "PayPal-NTP"
set internet-service-id 524296
next
edit "PayPal-Inbound_Email"
set internet-service-id 524297
next
edit "PayPal-LDAP"
set internet-service-id 524302
next
edit "PayPal-NetBIOS.Session.Service"
set internet-service-id 524303
next
edit "PayPal-RTMP"
set internet-service-id 524304
next
edit "PayPal-NetBIOS.Name.Service"
set internet-service-id 524312
next
edit "Box-Other"
set internet-service-id 589824
next
edit "Box-Web"
set internet-service-id 589825
next
edit "Box-ICMP"
set internet-service-id 589826
next
edit "Box-DNS"
set internet-service-id 589827
next
edit "Box-Outbound_Email"
set internet-service-id 589828
next
edit "Box-SSH"
set internet-service-id 589830
next
edit "Box-FTP"
set internet-service-id 589831
next
edit "Box-NTP"
set internet-service-id 589832
next
edit "Box-Inbound_Email"
set internet-service-id 589833
next
edit "Box-LDAP"
set internet-service-id 589838
next
edit "Box-NetBIOS.Session.Service"
set internet-service-id 589839
next
edit "Box-RTMP"
set internet-service-id 589840
next
edit "Box-NetBIOS.Name.Service"
set internet-service-id 589848
next
edit "Salesforce-Other"
set internet-service-id 655360
next
edit "Salesforce-Web"
set internet-service-id 655361
next
edit "Salesforce-ICMP"
set internet-service-id 655362
next
edit "Salesforce-DNS"
set internet-service-id 655363
next
edit "Salesforce-Outbound_Email"
set internet-service-id 655364
next
edit "Salesforce-SSH"
set internet-service-id 655366
next
edit "Salesforce-FTP"
set internet-service-id 655367
next
edit "Salesforce-NTP"
set internet-service-id 655368
next
edit "Salesforce-Inbound_Email"
set internet-service-id 655369
next
edit "Salesforce-LDAP"
set internet-service-id 655374
next
edit "Salesforce-NetBIOS.Session.Service"
set internet-service-id 655375
next
edit "Salesforce-RTMP"
set internet-service-id 655376
next
edit "Salesforce-NetBIOS.Name.Service"
set internet-service-id 655384
next
edit "Salesforce-Email.Relay"
set internet-service-id 655530
next
edit "Dropbox-Other"
set internet-service-id 720896
next
edit "Dropbox-Web"
set internet-service-id 720897
next
edit "Dropbox-ICMP"
set internet-service-id 720898
next
edit "Dropbox-DNS"
set internet-service-id 720899
next
edit "Dropbox-Outbound_Email"
set internet-service-id 720900
next
edit "Dropbox-SSH"
set internet-service-id 720902
next
edit "Dropbox-FTP"
set internet-service-id 720903
next
edit "Dropbox-NTP"
set internet-service-id 720904
next
edit "Dropbox-Inbound_Email"
set internet-service-id 720905
next
edit "Dropbox-LDAP"
set internet-service-id 720910
next
edit "Dropbox-NetBIOS.Session.Service"
set internet-service-id 720911
next
edit "Dropbox-RTMP"
set internet-service-id 720912
next
edit "Dropbox-NetBIOS.Name.Service"
set internet-service-id 720920
next
edit "Netflix-Other"
set internet-service-id 786432
next
edit "Netflix-Web"
set internet-service-id 786433
next
edit "Netflix-ICMP"
set internet-service-id 786434
next
edit "Netflix-DNS"
set internet-service-id 786435
next
edit "Netflix-Outbound_Email"
set internet-service-id 786436
next
edit "Netflix-SSH"
set internet-service-id 786438
next
edit "Netflix-FTP"
set internet-service-id 786439
next
edit "Netflix-NTP"
set internet-service-id 786440
next
edit "Netflix-Inbound_Email"
set internet-service-id 786441
next
edit "Netflix-LDAP"
set internet-service-id 786446
next
edit "Netflix-NetBIOS.Session.Service"
set internet-service-id 786447
next
edit "Netflix-RTMP"
set internet-service-id 786448
next
edit "Netflix-NetBIOS.Name.Service"
set internet-service-id 786456
next
edit "LinkedIn-Other"
set internet-service-id 851968
next
edit "LinkedIn-Web"
set internet-service-id 851969
next
edit "LinkedIn-ICMP"
set internet-service-id 851970
next
edit "LinkedIn-DNS"
set internet-service-id 851971
next
edit "LinkedIn-Outbound_Email"
set internet-service-id 851972
next
edit "LinkedIn-SSH"
set internet-service-id 851974
next
edit "LinkedIn-FTP"
set internet-service-id 851975
next
edit "LinkedIn-NTP"
set internet-service-id 851976
next
edit "LinkedIn-Inbound_Email"
set internet-service-id 851977
next
edit "LinkedIn-LDAP"
set internet-service-id 851982
next
edit "LinkedIn-NetBIOS.Session.Service"
set internet-service-id 851983
next
edit "LinkedIn-RTMP"
set internet-service-id 851984
next
edit "LinkedIn-NetBIOS.Name.Service"
set internet-service-id 851992
next
edit "Adobe-Other"
set internet-service-id 917504
next
edit "Adobe-Web"
set internet-service-id 917505
next
edit "Adobe-ICMP"
set internet-service-id 917506
next
edit "Adobe-DNS"
set internet-service-id 917507
next
edit "Adobe-Outbound_Email"
set internet-service-id 917508
next
edit "Adobe-SSH"
set internet-service-id 917510
next
edit "Adobe-FTP"
set internet-service-id 917511
next
edit "Adobe-NTP"
set internet-service-id 917512
next
edit "Adobe-Inbound_Email"
set internet-service-id 917513
next
edit "Adobe-LDAP"
set internet-service-id 917518
next
edit "Adobe-NetBIOS.Session.Service"
set internet-service-id 917519
next
edit "Adobe-RTMP"
set internet-service-id 917520
next
edit "Adobe-NetBIOS.Name.Service"
set internet-service-id 917528
next
edit "Adobe-Adobe.Experience.Cloud"
set internet-service-id 917640
next
edit "Oracle-Other"
set internet-service-id 983040
next
edit "Oracle-Web"
set internet-service-id 983041
next
edit "Oracle-ICMP"
set internet-service-id 983042
next
edit "Oracle-DNS"
set internet-service-id 983043
next
edit "Oracle-Outbound_Email"
set internet-service-id 983044
next
edit "Oracle-SSH"
set internet-service-id 983046
next
edit "Oracle-FTP"
set internet-service-id 983047
next
edit "Oracle-NTP"
set internet-service-id 983048
next
edit "Oracle-Inbound_Email"
set internet-service-id 983049
next
edit "Oracle-LDAP"
set internet-service-id 983054
next
edit "Oracle-NetBIOS.Session.Service"
set internet-service-id 983055
next
edit "Oracle-RTMP"
set internet-service-id 983056
next
edit "Oracle-NetBIOS.Name.Service"
set internet-service-id 983064
next
edit "Oracle-Oracle.Cloud"
set internet-service-id 983171
next
edit "Hulu-Other"
set internet-service-id 1048576
next
edit "Hulu-Web"
set internet-service-id 1048577
next
edit "Hulu-ICMP"
set internet-service-id 1048578
next
edit "Hulu-DNS"
set internet-service-id 1048579
next
edit "Hulu-Outbound_Email"
set internet-service-id 1048580
next
edit "Hulu-SSH"
set internet-service-id 1048582
next
edit "Hulu-FTP"
set internet-service-id 1048583
next
edit "Hulu-NTP"
set internet-service-id 1048584
next
edit "Hulu-Inbound_Email"
set internet-service-id 1048585
next
edit "Hulu-LDAP"
set internet-service-id 1048590
next
edit "Hulu-NetBIOS.Session.Service"
set internet-service-id 1048591
next
edit "Hulu-RTMP"
set internet-service-id 1048592
next
edit "Hulu-NetBIOS.Name.Service"
set internet-service-id 1048600
next
edit "Pinterest-Other"
set internet-service-id 1114112
next
edit "Pinterest-Web"
set internet-service-id 1114113
next
edit "Pinterest-ICMP"
set internet-service-id 1114114
next
edit "Pinterest-DNS"
set internet-service-id 1114115
next
edit "Pinterest-Outbound_Email"
set internet-service-id 1114116
next
edit "Pinterest-SSH"
set internet-service-id 1114118
next
edit "Pinterest-FTP"
set internet-service-id 1114119
next
edit "Pinterest-NTP"
set internet-service-id 1114120
next
edit "Pinterest-Inbound_Email"
set internet-service-id 1114121
next
edit "Pinterest-LDAP"
set internet-service-id 1114126
next
edit "Pinterest-NetBIOS.Session.Service"
set internet-service-id 1114127
next
edit "Pinterest-RTMP"
set internet-service-id 1114128
next
edit "Pinterest-NetBIOS.Name.Service"
set internet-service-id 1114136
next
edit "LogMeIn-Other"
set internet-service-id 1179648
next
edit "LogMeIn-Web"
set internet-service-id 1179649
next
edit "LogMeIn-ICMP"
set internet-service-id 1179650
next
edit "LogMeIn-DNS"
set internet-service-id 1179651
next
edit "LogMeIn-Outbound_Email"
set internet-service-id 1179652
next
edit "LogMeIn-SSH"
set internet-service-id 1179654
next
edit "LogMeIn-FTP"
set internet-service-id 1179655
next
edit "LogMeIn-NTP"
set internet-service-id 1179656
next
edit "LogMeIn-Inbound_Email"
set internet-service-id 1179657
next
edit "LogMeIn-LDAP"
set internet-service-id 1179662
next
edit "LogMeIn-NetBIOS.Session.Service"
set internet-service-id 1179663
next
edit "LogMeIn-RTMP"
set internet-service-id 1179664
next
edit "LogMeIn-NetBIOS.Name.Service"
set internet-service-id 1179672
next
edit "LogMeIn-GoTo.Suite"
set internet-service-id 1179767
next
edit "Fortinet-Other"
set internet-service-id 1245184
next
edit "Fortinet-Web"
set internet-service-id 1245185
next
edit "Fortinet-ICMP"
set internet-service-id 1245186
next
edit "Fortinet-DNS"
set internet-service-id 1245187
next
edit "Fortinet-Outbound_Email"
set internet-service-id 1245188
next
edit "Fortinet-SSH"
set internet-service-id 1245190
next
edit "Fortinet-FTP"
set internet-service-id 1245191
next
edit "Fortinet-NTP"
set internet-service-id 1245192
next
edit "Fortinet-Inbound_Email"
set internet-service-id 1245193
next
edit "Fortinet-LDAP"
set internet-service-id 1245198
next
edit "Fortinet-NetBIOS.Session.Service"
set internet-service-id 1245199
next
edit "Fortinet-RTMP"
set internet-service-id 1245200
next
edit "Fortinet-NetBIOS.Name.Service"
set internet-service-id 1245208
next
edit "Fortinet-FortiGuard"
set internet-service-id 1245324
next
edit "Fortinet-FortiMail.Cloud"
set internet-service-id 1245325
next
edit "Fortinet-FortiCloud"
set internet-service-id 1245326
next
edit "Kaspersky-Other"
set internet-service-id 1310720
next
edit "Kaspersky-Web"
set internet-service-id 1310721
next
edit "Kaspersky-ICMP"
set internet-service-id 1310722
next
edit "Kaspersky-DNS"
set internet-service-id 1310723
next
edit "Kaspersky-Outbound_Email"
set internet-service-id 1310724
next
edit "Kaspersky-SSH"
set internet-service-id 1310726
next
edit "Kaspersky-FTP"
set internet-service-id 1310727
next
edit "Kaspersky-NTP"
set internet-service-id 1310728
next
edit "Kaspersky-Inbound_Email"
set internet-service-id 1310729
next
edit "Kaspersky-LDAP"
set internet-service-id 1310734
next
edit "Kaspersky-NetBIOS.Session.Service"
set internet-service-id 1310735
next
edit "Kaspersky-RTMP"
set internet-service-id 1310736
next
edit "Kaspersky-NetBIOS.Name.Service"
set internet-service-id 1310744
next
edit "McAfee-Other"
set internet-service-id 1376256
next
edit "McAfee-Web"
set internet-service-id 1376257
next
edit "McAfee-ICMP"
set internet-service-id 1376258
next
edit "McAfee-DNS"
set internet-service-id 1376259
next
edit "McAfee-Outbound_Email"
set internet-service-id 1376260
next
edit "McAfee-SSH"
set internet-service-id 1376262
next
edit "McAfee-FTP"
set internet-service-id 1376263
next
edit "McAfee-NTP"
set internet-service-id 1376264
next
edit "McAfee-Inbound_Email"
set internet-service-id 1376265
next
edit "McAfee-LDAP"
set internet-service-id 1376270
next
edit "McAfee-NetBIOS.Session.Service"
set internet-service-id 1376271
next
edit "McAfee-RTMP"
set internet-service-id 1376272
next
edit "McAfee-NetBIOS.Name.Service"
set internet-service-id 1376280
next
edit "Symantec-Other"
set internet-service-id 1441792
next
edit "Symantec-Web"
set internet-service-id 1441793
next
edit "Symantec-ICMP"
set internet-service-id 1441794
next
edit "Symantec-DNS"
set internet-service-id 1441795
next
edit "Symantec-Outbound_Email"
set internet-service-id 1441796
next
edit "Symantec-SSH"
set internet-service-id 1441798
next
edit "Symantec-FTP"
set internet-service-id 1441799
next
edit "Symantec-NTP"
set internet-service-id 1441800
next
edit "Symantec-Inbound_Email"
set internet-service-id 1441801
next
edit "Symantec-LDAP"
set internet-service-id 1441806
next
edit "Symantec-NetBIOS.Session.Service"
set internet-service-id 1441807
next
edit "Symantec-RTMP"
set internet-service-id 1441808
next
edit "Symantec-NetBIOS.Name.Service"
set internet-service-id 1441816
next
edit "Symantec-Symantec.Cloud"
set internet-service-id 1441922
next
edit "VMware-Other"
set internet-service-id 1507328
next
edit "VMware-Web"
set internet-service-id 1507329
next
edit "VMware-ICMP"
set internet-service-id 1507330
next
edit "VMware-DNS"
set internet-service-id 1507331
next
edit "VMware-Outbound_Email"
set internet-service-id 1507332
next
edit "VMware-SSH"
set internet-service-id 1507334
next
edit "VMware-FTP"
set internet-service-id 1507335
next
edit "VMware-NTP"
set internet-service-id 1507336
next
edit "VMware-Inbound_Email"
set internet-service-id 1507337
next
edit "VMware-LDAP"
set internet-service-id 1507342
next
edit "VMware-NetBIOS.Session.Service"
set internet-service-id 1507343
next
edit "VMware-RTMP"
set internet-service-id 1507344
next
edit "VMware-NetBIOS.Name.Service"
set internet-service-id 1507352
next
edit "VMware-Workspace.ONE"
set internet-service-id 1507461
next
edit "AOL-Other"
set internet-service-id 1572864
next
edit "AOL-Web"
set internet-service-id 1572865
next
edit "AOL-ICMP"
set internet-service-id 1572866
next
edit "AOL-DNS"
set internet-service-id 1572867
next
edit "AOL-Outbound_Email"
set internet-service-id 1572868
next
edit "AOL-SSH"
set internet-service-id 1572870
next
edit "AOL-FTP"
set internet-service-id 1572871
next
edit "AOL-NTP"
set internet-service-id 1572872
next
edit "AOL-Inbound_Email"
set internet-service-id 1572873
next
edit "AOL-LDAP"
set internet-service-id 1572878
next
edit "AOL-NetBIOS.Session.Service"
set internet-service-id 1572879
next
edit "AOL-RTMP"
set internet-service-id 1572880
next
edit "AOL-NetBIOS.Name.Service"
set internet-service-id 1572888
next
edit "RealNetworks-Other"
set internet-service-id 1638400
next
edit "RealNetworks-Web"
set internet-service-id 1638401
next
edit "RealNetworks-ICMP"
set internet-service-id 1638402
next
edit "RealNetworks-DNS"
set internet-service-id 1638403
next
edit "RealNetworks-Outbound_Email"
set internet-service-id 1638404
next
edit "RealNetworks-SSH"
set internet-service-id 1638406
next
edit "RealNetworks-FTP"
set internet-service-id 1638407
next
edit "RealNetworks-NTP"
set internet-service-id 1638408
next
edit "RealNetworks-Inbound_Email"
set internet-service-id 1638409
next
edit "RealNetworks-LDAP"
set internet-service-id 1638414
next
edit "RealNetworks-NetBIOS.Session.Service"
set internet-service-id 1638415
next
edit "RealNetworks-RTMP"
set internet-service-id 1638416
next
edit "RealNetworks-NetBIOS.Name.Service"
set internet-service-id 1638424
next
edit "Zoho-Other"
set internet-service-id 1703936
next
edit "Zoho-Web"
set internet-service-id 1703937
next
edit "Zoho-ICMP"
set internet-service-id 1703938
next
edit "Zoho-DNS"
set internet-service-id 1703939
next
edit "Zoho-Outbound_Email"
set internet-service-id 1703940
next
edit "Zoho-SSH"
set internet-service-id 1703942
next
edit "Zoho-FTP"
set internet-service-id 1703943
next
edit "Zoho-NTP"
set internet-service-id 1703944
next
edit "Zoho-Inbound_Email"
set internet-service-id 1703945
next
edit "Zoho-LDAP"
set internet-service-id 1703950
next
edit "Zoho-NetBIOS.Session.Service"
set internet-service-id 1703951
next
edit "Zoho-RTMP"
set internet-service-id 1703952
next
edit "Zoho-NetBIOS.Name.Service"
set internet-service-id 1703960
next
edit "Mozilla-Other"
set internet-service-id 1769472
next
edit "Mozilla-Web"
set internet-service-id 1769473
next
edit "Mozilla-ICMP"
set internet-service-id 1769474
next
edit "Mozilla-DNS"
set internet-service-id 1769475
next
edit "Mozilla-Outbound_Email"
set internet-service-id 1769476
next
edit "Mozilla-SSH"
set internet-service-id 1769478
next
edit "Mozilla-FTP"
set internet-service-id 1769479
next
edit "Mozilla-NTP"
set internet-service-id 1769480
next
edit "Mozilla-Inbound_Email"
set internet-service-id 1769481
next
edit "Mozilla-LDAP"
set internet-service-id 1769486
next
edit "Mozilla-NetBIOS.Session.Service"
set internet-service-id 1769487
next
edit "Mozilla-RTMP"
set internet-service-id 1769488
next
edit "Mozilla-NetBIOS.Name.Service"
set internet-service-id 1769496
next
edit "TeamViewer-Other"
set internet-service-id 1835008
next
edit "TeamViewer-Web"
set internet-service-id 1835009
next
edit "TeamViewer-ICMP"
set internet-service-id 1835010
next
edit "TeamViewer-DNS"
set internet-service-id 1835011
next
edit "TeamViewer-Outbound_Email"
set internet-service-id 1835012
next
edit "TeamViewer-SSH"
set internet-service-id 1835014
next
edit "TeamViewer-FTP"
set internet-service-id 1835015
next
edit "TeamViewer-NTP"
set internet-service-id 1835016
next
edit "TeamViewer-Inbound_Email"
set internet-service-id 1835017
next
edit "TeamViewer-LDAP"
set internet-service-id 1835022
next
edit "TeamViewer-NetBIOS.Session.Service"
set internet-service-id 1835023
next
edit "TeamViewer-RTMP"
set internet-service-id 1835024
next
edit "TeamViewer-NetBIOS.Name.Service"
set internet-service-id 1835032
next
edit "TeamViewer-TeamViewer"
set internet-service-id 1835117
next
edit "HP-Other"
set internet-service-id 1900544
next
edit "HP-Web"
set internet-service-id 1900545
next
edit "HP-ICMP"
set internet-service-id 1900546
next
edit "HP-DNS"
set internet-service-id 1900547
next
edit "HP-Outbound_Email"
set internet-service-id 1900548
next
edit "HP-SSH"
set internet-service-id 1900550
next
edit "HP-FTP"
set internet-service-id 1900551
next
edit "HP-NTP"
set internet-service-id 1900552
next
edit "HP-Inbound_Email"
set internet-service-id 1900553
next
edit "HP-LDAP"
set internet-service-id 1900558
next
edit "HP-NetBIOS.Session.Service"
set internet-service-id 1900559
next
edit "HP-RTMP"
set internet-service-id 1900560
next
edit "HP-NetBIOS.Name.Service"
set internet-service-id 1900568
next
edit "HP-Aruba"
set internet-service-id 1900726
next
edit "Cisco-Other"
set internet-service-id 1966080
next
edit "Cisco-Web"
set internet-service-id 1966081
next
edit "Cisco-ICMP"
set internet-service-id 1966082
next
edit "Cisco-DNS"
set internet-service-id 1966083
next
edit "Cisco-Outbound_Email"
set internet-service-id 1966084
next
edit "Cisco-SSH"
set internet-service-id 1966086
next
edit "Cisco-FTP"
set internet-service-id 1966087
next
edit "Cisco-NTP"
set internet-service-id 1966088
next
edit "Cisco-Inbound_Email"
set internet-service-id 1966089
next
edit "Cisco-LDAP"
set internet-service-id 1966094
next
edit "Cisco-NetBIOS.Session.Service"
set internet-service-id 1966095
next
edit "Cisco-RTMP"
set internet-service-id 1966096
next
edit "Cisco-NetBIOS.Name.Service"
set internet-service-id 1966104
next
edit "Cisco-Webex"
set internet-service-id 1966183
next
edit "Cisco-Meraki.Cloud"
set internet-service-id 1966218
next
edit "Cisco-Duo.Security"
set internet-service-id 1966225
next
edit "Cisco-AppDynamic"
set internet-service-id 1966260
next
edit "IBM-Other"
set internet-service-id 2031616
next
edit "IBM-Web"
set internet-service-id 2031617
next
edit "IBM-ICMP"
set internet-service-id 2031618
next
edit "IBM-DNS"
set internet-service-id 2031619
next
edit "IBM-Outbound_Email"
set internet-service-id 2031620
next
edit "IBM-SSH"
set internet-service-id 2031622
next
edit "IBM-FTP"
set internet-service-id 2031623
next
edit "IBM-NTP"
set internet-service-id 2031624
next
edit "IBM-Inbound_Email"
set internet-service-id 2031625
next
edit "IBM-LDAP"
set internet-service-id 2031630
next
edit "IBM-NetBIOS.Session.Service"
set internet-service-id 2031631
next
edit "IBM-RTMP"
set internet-service-id 2031632
next
edit "IBM-NetBIOS.Name.Service"
set internet-service-id 2031640
next
edit "IBM-IBM.Cloud"
set internet-service-id 2031748
next
edit "Citrix-Other"
set internet-service-id 2097152
next
edit "Citrix-Web"
set internet-service-id 2097153
next
edit "Citrix-ICMP"
set internet-service-id 2097154
next
edit "Citrix-DNS"
set internet-service-id 2097155
next
edit "Citrix-Outbound_Email"
set internet-service-id 2097156
next
edit "Citrix-SSH"
set internet-service-id 2097158
next
edit "Citrix-FTP"
set internet-service-id 2097159
next
edit "Citrix-NTP"
set internet-service-id 2097160
next
edit "Citrix-Inbound_Email"
set internet-service-id 2097161
next
edit "Citrix-LDAP"
set internet-service-id 2097166
next
edit "Citrix-NetBIOS.Session.Service"
set internet-service-id 2097167
next
edit "Citrix-RTMP"
set internet-service-id 2097168
next
edit "Citrix-NetBIOS.Name.Service"
set internet-service-id 2097176
next
edit "Twitter-Other"
set internet-service-id 2162688
next
edit "Twitter-Web"
set internet-service-id 2162689
next
edit "Twitter-ICMP"
set internet-service-id 2162690
next
edit "Twitter-DNS"
set internet-service-id 2162691
next
edit "Twitter-Outbound_Email"
set internet-service-id 2162692
next
edit "Twitter-SSH"
set internet-service-id 2162694
next
edit "Twitter-FTP"
set internet-service-id 2162695
next
edit "Twitter-NTP"
set internet-service-id 2162696
next
edit "Twitter-Inbound_Email"
set internet-service-id 2162697
next
edit "Twitter-LDAP"
set internet-service-id 2162702
next
edit "Twitter-NetBIOS.Session.Service"
set internet-service-id 2162703
next
edit "Twitter-RTMP"
set internet-service-id 2162704
next
edit "Twitter-NetBIOS.Name.Service"
set internet-service-id 2162712
next
edit "Dell-Other"
set internet-service-id 2228224
next
edit "Dell-Web"
set internet-service-id 2228225
next
edit "Dell-ICMP"
set internet-service-id 2228226
next
edit "Dell-DNS"
set internet-service-id 2228227
next
edit "Dell-Outbound_Email"
set internet-service-id 2228228
next
edit "Dell-SSH"
set internet-service-id 2228230
next
edit "Dell-FTP"
set internet-service-id 2228231
next
edit "Dell-NTP"
set internet-service-id 2228232
next
edit "Dell-Inbound_Email"
set internet-service-id 2228233
next
edit "Dell-LDAP"
set internet-service-id 2228238
next
edit "Dell-NetBIOS.Session.Service"
set internet-service-id 2228239
next
edit "Dell-RTMP"
set internet-service-id 2228240
next
edit "Dell-NetBIOS.Name.Service"
set internet-service-id 2228248
next
edit "Vimeo-Other"
set internet-service-id 2293760
next
edit "Vimeo-Web"
set internet-service-id 2293761
next
edit "Vimeo-ICMP"
set internet-service-id 2293762
next
edit "Vimeo-DNS"
set internet-service-id 2293763
next
edit "Vimeo-Outbound_Email"
set internet-service-id 2293764
next
edit "Vimeo-SSH"
set internet-service-id 2293766
next
edit "Vimeo-FTP"
set internet-service-id 2293767
next
edit "Vimeo-NTP"
set internet-service-id 2293768
next
edit "Vimeo-Inbound_Email"
set internet-service-id 2293769
next
edit "Vimeo-LDAP"
set internet-service-id 2293774
next
edit "Vimeo-NetBIOS.Session.Service"
set internet-service-id 2293775
next
edit "Vimeo-RTMP"
set internet-service-id 2293776
next
edit "Vimeo-NetBIOS.Name.Service"
set internet-service-id 2293784
next
edit "Redhat-Other"
set internet-service-id 2359296
next
edit "Redhat-Web"
set internet-service-id 2359297
next
edit "Redhat-ICMP"
set internet-service-id 2359298
next
edit "Redhat-DNS"
set internet-service-id 2359299
next
edit "Redhat-Outbound_Email"
set internet-service-id 2359300
next
edit "Redhat-SSH"
set internet-service-id 2359302
next
edit "Redhat-FTP"
set internet-service-id 2359303
next
edit "Redhat-NTP"
set internet-service-id 2359304
next
edit "Redhat-Inbound_Email"
set internet-service-id 2359305
next
edit "Redhat-LDAP"
set internet-service-id 2359310
next
edit "Redhat-NetBIOS.Session.Service"
set internet-service-id 2359311
next
edit "Redhat-RTMP"
set internet-service-id 2359312
next
edit "Redhat-NetBIOS.Name.Service"
set internet-service-id 2359320
next
edit "VK-Other"
set internet-service-id 2424832
next
edit "VK-Web"
set internet-service-id 2424833
next
edit "VK-ICMP"
set internet-service-id 2424834
next
edit "VK-DNS"
set internet-service-id 2424835
next
edit "VK-Outbound_Email"
set internet-service-id 2424836
next
edit "VK-SSH"
set internet-service-id 2424838
next
edit "VK-FTP"
set internet-service-id 2424839
next
edit "VK-NTP"
set internet-service-id 2424840
next
edit "VK-Inbound_Email"
set internet-service-id 2424841
next
edit "VK-LDAP"
set internet-service-id 2424846
next
edit "VK-NetBIOS.Session.Service"
set internet-service-id 2424847
next
edit "VK-RTMP"
set internet-service-id 2424848
next
edit "VK-NetBIOS.Name.Service"
set internet-service-id 2424856
next
edit "TrendMicro-Other"
set internet-service-id 2490368
next
edit "TrendMicro-Web"
set internet-service-id 2490369
next
edit "TrendMicro-ICMP"
set internet-service-id 2490370
next
edit "TrendMicro-DNS"
set internet-service-id 2490371
next
edit "TrendMicro-Outbound_Email"
set internet-service-id 2490372
next
edit "TrendMicro-SSH"
set internet-service-id 2490374
next
edit "TrendMicro-FTP"
set internet-service-id 2490375
next
edit "TrendMicro-NTP"
set internet-service-id 2490376
next
edit "TrendMicro-Inbound_Email"
set internet-service-id 2490377
next
edit "TrendMicro-LDAP"
set internet-service-id 2490382
next
edit "TrendMicro-NetBIOS.Session.Service"
set internet-service-id 2490383
next
edit "TrendMicro-RTMP"
set internet-service-id 2490384
next
edit "TrendMicro-NetBIOS.Name.Service"
set internet-service-id 2490392
next
edit "Tencent-Other"
set internet-service-id 2555904
next
edit "Tencent-Web"
set internet-service-id 2555905
next
edit "Tencent-ICMP"
set internet-service-id 2555906
next
edit "Tencent-DNS"
set internet-service-id 2555907
next
edit "Tencent-Outbound_Email"
set internet-service-id 2555908
next
edit "Tencent-SSH"
set internet-service-id 2555910
next
edit "Tencent-FTP"
set internet-service-id 2555911
next
edit "Tencent-NTP"
set internet-service-id 2555912
next
edit "Tencent-Inbound_Email"
set internet-service-id 2555913
next
edit "Tencent-LDAP"
set internet-service-id 2555918
next
edit "Tencent-NetBIOS.Session.Service"
set internet-service-id 2555919
next
edit "Tencent-RTMP"
set internet-service-id 2555920
next
edit "Tencent-NetBIOS.Name.Service"
set internet-service-id 2555928
next
edit "Ask-Other"
set internet-service-id 2621440
next
edit "Ask-Web"
set internet-service-id 2621441
next
edit "Ask-ICMP"
set internet-service-id 2621442
next
edit "Ask-DNS"
set internet-service-id 2621443
next
edit "Ask-Outbound_Email"
set internet-service-id 2621444
next
edit "Ask-SSH"
set internet-service-id 2621446
next
edit "Ask-FTP"
set internet-service-id 2621447
next
edit "Ask-NTP"
set internet-service-id 2621448
next
edit "Ask-Inbound_Email"
set internet-service-id 2621449
next
edit "Ask-LDAP"
set internet-service-id 2621454
next
edit "Ask-NetBIOS.Session.Service"
set internet-service-id 2621455
next
edit "Ask-RTMP"
set internet-service-id 2621456
next
edit "Ask-NetBIOS.Name.Service"
set internet-service-id 2621464
next
edit "CNN-Other"
set internet-service-id 2686976
next
edit "CNN-Web"
set internet-service-id 2686977
next
edit "CNN-ICMP"
set internet-service-id 2686978
next
edit "CNN-DNS"
set internet-service-id 2686979
next
edit "CNN-Outbound_Email"
set internet-service-id 2686980
next
edit "CNN-SSH"
set internet-service-id 2686982
next
edit "CNN-FTP"
set internet-service-id 2686983
next
edit "CNN-NTP"
set internet-service-id 2686984
next
edit "CNN-Inbound_Email"
set internet-service-id 2686985
next
edit "CNN-LDAP"
set internet-service-id 2686990
next
edit "CNN-NetBIOS.Session.Service"
set internet-service-id 2686991
next
edit "CNN-RTMP"
set internet-service-id 2686992
next
edit "CNN-NetBIOS.Name.Service"
set internet-service-id 2687000
next
edit "Myspace-Other"
set internet-service-id 2752512
next
edit "Myspace-Web"
set internet-service-id 2752513
next
edit "Myspace-ICMP"
set internet-service-id 2752514
next
edit "Myspace-DNS"
set internet-service-id 2752515
next
edit "Myspace-Outbound_Email"
set internet-service-id 2752516
next
edit "Myspace-SSH"
set internet-service-id 2752518
next
edit "Myspace-FTP"
set internet-service-id 2752519
next
edit "Myspace-NTP"
set internet-service-id 2752520
next
edit "Myspace-Inbound_Email"
set internet-service-id 2752521
next
edit "Myspace-LDAP"
set internet-service-id 2752526
next
edit "Myspace-NetBIOS.Session.Service"
set internet-service-id 2752527
next
edit "Myspace-RTMP"
set internet-service-id 2752528
next
edit "Myspace-NetBIOS.Name.Service"
set internet-service-id 2752536
next
edit "Tor-Relay.Node"
set internet-service-id 2818238
next
edit "Tor-Exit.Node"
set internet-service-id 2818243
next
edit "Baidu-Other"
set internet-service-id 2883584
next
edit "Baidu-Web"
set internet-service-id 2883585
next
edit "Baidu-ICMP"
set internet-service-id 2883586
next
edit "Baidu-DNS"
set internet-service-id 2883587
next
edit "Baidu-Outbound_Email"
set internet-service-id 2883588
next
edit "Baidu-SSH"
set internet-service-id 2883590
next
edit "Baidu-FTP"
set internet-service-id 2883591
next
edit "Baidu-NTP"
set internet-service-id 2883592
next
edit "Baidu-Inbound_Email"
set internet-service-id 2883593
next
edit "Baidu-LDAP"
set internet-service-id 2883598
next
edit "Baidu-NetBIOS.Session.Service"
set internet-service-id 2883599
next
edit "Baidu-RTMP"
set internet-service-id 2883600
next
edit "Baidu-NetBIOS.Name.Service"
set internet-service-id 2883608
next
edit "ntp.org-Other"
set internet-service-id 2949120
next
edit "ntp.org-Web"
set internet-service-id 2949121
next
edit "ntp.org-ICMP"
set internet-service-id 2949122
next
edit "ntp.org-DNS"
set internet-service-id 2949123
next
edit "ntp.org-Outbound_Email"
set internet-service-id 2949124
next
edit "ntp.org-SSH"
set internet-service-id 2949126
next
edit "ntp.org-FTP"
set internet-service-id 2949127
next
edit "ntp.org-NTP"
set internet-service-id 2949128
next
edit "ntp.org-Inbound_Email"
set internet-service-id 2949129
next
edit "ntp.org-LDAP"
set internet-service-id 2949134
next
edit "ntp.org-NetBIOS.Session.Service"
set internet-service-id 2949135
next
edit "ntp.org-RTMP"
set internet-service-id 2949136
next
edit "ntp.org-NetBIOS.Name.Service"
set internet-service-id 2949144
next
edit "Proxy-Proxy.Server"
set internet-service-id 3014850
next
edit "Botnet-C&C.Server"
set internet-service-id 3080383
next
edit "Spam-Spamming.Server"
set internet-service-id 3145920
next
edit "Phishing-Phishing.Server"
set internet-service-id 3211457
next
edit "Zendesk-Other"
set internet-service-id 3407872
next
edit "Zendesk-Web"
set internet-service-id 3407873
next
edit "Zendesk-ICMP"
set internet-service-id 3407874
next
edit "Zendesk-DNS"
set internet-service-id 3407875
next
edit "Zendesk-Outbound_Email"
set internet-service-id 3407876
next
edit "Zendesk-SSH"
set internet-service-id 3407878
next
edit "Zendesk-FTP"
set internet-service-id 3407879
next
edit "Zendesk-NTP"
set internet-service-id 3407880
next
edit "Zendesk-Inbound_Email"
set internet-service-id 3407881
next
edit "Zendesk-LDAP"
set internet-service-id 3407886
next
edit "Zendesk-NetBIOS.Session.Service"
set internet-service-id 3407887
next
edit "Zendesk-RTMP"
set internet-service-id 3407888
next
edit "Zendesk-NetBIOS.Name.Service"
set internet-service-id 3407896
next
edit "Zendesk-Zendesk.Suite"
set internet-service-id 3408047
next
edit "DocuSign-Other"
set internet-service-id 3473408
next
edit "DocuSign-Web"
set internet-service-id 3473409
next
edit "DocuSign-ICMP"
set internet-service-id 3473410
next
edit "DocuSign-DNS"
set internet-service-id 3473411
next
edit "DocuSign-Outbound_Email"
set internet-service-id 3473412
next
edit "DocuSign-SSH"
set internet-service-id 3473414
next
edit "DocuSign-FTP"
set internet-service-id 3473415
next
edit "DocuSign-NTP"
set internet-service-id 3473416
next
edit "DocuSign-Inbound_Email"
set internet-service-id 3473417
next
edit "DocuSign-LDAP"
set internet-service-id 3473422
next
edit "DocuSign-NetBIOS.Session.Service"
set internet-service-id 3473423
next
edit "DocuSign-RTMP"
set internet-service-id 3473424
next
edit "DocuSign-NetBIOS.Name.Service"
set internet-service-id 3473432
next
edit "ServiceNow-Other"
set internet-service-id 3538944
next
edit "ServiceNow-Web"
set internet-service-id 3538945
next
edit "ServiceNow-ICMP"
set internet-service-id 3538946
next
edit "ServiceNow-DNS"
set internet-service-id 3538947
next
edit "ServiceNow-Outbound_Email"
set internet-service-id 3538948
next
edit "ServiceNow-SSH"
set internet-service-id 3538950
next
edit "ServiceNow-FTP"
set internet-service-id 3538951
next
edit "ServiceNow-NTP"
set internet-service-id 3538952
next
edit "ServiceNow-Inbound_Email"
set internet-service-id 3538953
next
edit "ServiceNow-LDAP"
set internet-service-id 3538958
next
edit "ServiceNow-NetBIOS.Session.Service"
set internet-service-id 3538959
next
edit "ServiceNow-RTMP"
set internet-service-id 3538960
next
edit "ServiceNow-NetBIOS.Name.Service"
set internet-service-id 3538968
next
edit "GitHub-GitHub"
set internet-service-id 3604638
next
edit "Workday-Other"
set internet-service-id 3670016
next
edit "Workday-Web"
set internet-service-id 3670017
next
edit "Workday-ICMP"
set internet-service-id 3670018
next
edit "Workday-DNS"
set internet-service-id 3670019
next
edit "Workday-Outbound_Email"
set internet-service-id 3670020
next
edit "Workday-SSH"
set internet-service-id 3670022
next
edit "Workday-FTP"
set internet-service-id 3670023
next
edit "Workday-NTP"
set internet-service-id 3670024
next
edit "Workday-Inbound_Email"
set internet-service-id 3670025
next
edit "Workday-LDAP"
set internet-service-id 3670030
next
edit "Workday-NetBIOS.Session.Service"
set internet-service-id 3670031
next
edit "Workday-RTMP"
set internet-service-id 3670032
next
edit "Workday-NetBIOS.Name.Service"
set internet-service-id 3670040
next
edit "HubSpot-Other"
set internet-service-id 3735552
next
edit "HubSpot-Web"
set internet-service-id 3735553
next
edit "HubSpot-ICMP"
set internet-service-id 3735554
next
edit "HubSpot-DNS"
set internet-service-id 3735555
next
edit "HubSpot-Outbound_Email"
set internet-service-id 3735556
next
edit "HubSpot-SSH"
set internet-service-id 3735558
next
edit "HubSpot-FTP"
set internet-service-id 3735559
next
edit "HubSpot-NTP"
set internet-service-id 3735560
next
edit "HubSpot-Inbound_Email"
set internet-service-id 3735561
next
edit "HubSpot-LDAP"
set internet-service-id 3735566
next
edit "HubSpot-NetBIOS.Session.Service"
set internet-service-id 3735567
next
edit "HubSpot-RTMP"
set internet-service-id 3735568
next
edit "HubSpot-NetBIOS.Name.Service"
set internet-service-id 3735576
next
edit "Twilio-Other"
set internet-service-id 3801088
next
edit "Twilio-Web"
set internet-service-id 3801089
next
edit "Twilio-ICMP"
set internet-service-id 3801090
next
edit "Twilio-DNS"
set internet-service-id 3801091
next
edit "Twilio-Outbound_Email"
set internet-service-id 3801092
next
edit "Twilio-SSH"
set internet-service-id 3801094
next
edit "Twilio-FTP"
set internet-service-id 3801095
next
edit "Twilio-NTP"
set internet-service-id 3801096
next
edit "Twilio-Inbound_Email"
set internet-service-id 3801097
next
edit "Twilio-LDAP"
set internet-service-id 3801102
next
edit "Twilio-NetBIOS.Session.Service"
set internet-service-id 3801103
next
edit "Twilio-RTMP"
set internet-service-id 3801104
next
edit "Twilio-NetBIOS.Name.Service"
set internet-service-id 3801112
next
edit "Twilio-Elastic.SIP.Trunking"
set internet-service-id 3801277
next
edit "Coupa-Other"
set internet-service-id 3866624
next
edit "Coupa-Web"
set internet-service-id 3866625
next
edit "Coupa-ICMP"
set internet-service-id 3866626
next
edit "Coupa-DNS"
set internet-service-id 3866627
next
edit "Coupa-Outbound_Email"
set internet-service-id 3866628
next
edit "Coupa-SSH"
set internet-service-id 3866630
next
edit "Coupa-FTP"
set internet-service-id 3866631
next
edit "Coupa-NTP"
set internet-service-id 3866632
next
edit "Coupa-Inbound_Email"
set internet-service-id 3866633
next
edit "Coupa-LDAP"
set internet-service-id 3866638
next
edit "Coupa-NetBIOS.Session.Service"
set internet-service-id 3866639
next
edit "Coupa-RTMP"
set internet-service-id 3866640
next
edit "Coupa-NetBIOS.Name.Service"
set internet-service-id 3866648
next
edit "Atlassian-Other"
set internet-service-id 3932160
next
edit "Atlassian-Web"
set internet-service-id 3932161
next
edit "Atlassian-ICMP"
set internet-service-id 3932162
next
edit "Atlassian-DNS"
set internet-service-id 3932163
next
edit "Atlassian-Outbound_Email"
set internet-service-id 3932164
next
edit "Atlassian-SSH"
set internet-service-id 3932166
next
edit "Atlassian-FTP"
set internet-service-id 3932167
next
edit "Atlassian-NTP"
set internet-service-id 3932168
next
edit "Atlassian-Inbound_Email"
set internet-service-id 3932169
next
edit "Atlassian-LDAP"
set internet-service-id 3932174
next
edit "Atlassian-NetBIOS.Session.Service"
set internet-service-id 3932175
next
edit "Atlassian-RTMP"
set internet-service-id 3932176
next
edit "Atlassian-NetBIOS.Name.Service"
set internet-service-id 3932184
next
edit "Xero-Other"
set internet-service-id 3997696
next
edit "Xero-Web"
set internet-service-id 3997697
next
edit "Xero-ICMP"
set internet-service-id 3997698
next
edit "Xero-DNS"
set internet-service-id 3997699
next
edit "Xero-Outbound_Email"
set internet-service-id 3997700
next
edit "Xero-SSH"
set internet-service-id 3997702
next
edit "Xero-FTP"
set internet-service-id 3997703
next
edit "Xero-NTP"
set internet-service-id 3997704
next
edit "Xero-Inbound_Email"
set internet-service-id 3997705
next
edit "Xero-LDAP"
set internet-service-id 3997710
next
edit "Xero-NetBIOS.Session.Service"
set internet-service-id 3997711
next
edit "Xero-RTMP"
set internet-service-id 3997712
next
edit "Xero-NetBIOS.Name.Service"
set internet-service-id 3997720
next
edit "Zuora-Other"
set internet-service-id 4063232
next
edit "Zuora-Web"
set internet-service-id 4063233
next
edit "Zuora-ICMP"
set internet-service-id 4063234
next
edit "Zuora-DNS"
set internet-service-id 4063235
next
edit "Zuora-Outbound_Email"
set internet-service-id 4063236
next
edit "Zuora-SSH"
set internet-service-id 4063238
next
edit "Zuora-FTP"
set internet-service-id 4063239
next
edit "Zuora-NTP"
set internet-service-id 4063240
next
edit "Zuora-Inbound_Email"
set internet-service-id 4063241
next
edit "Zuora-LDAP"
set internet-service-id 4063246
next
edit "Zuora-NetBIOS.Session.Service"
set internet-service-id 4063247
next
edit "Zuora-RTMP"
set internet-service-id 4063248
next
edit "Zuora-NetBIOS.Name.Service"
set internet-service-id 4063256
next
edit "AdRoll-Other"
set internet-service-id 4128768
next
edit "AdRoll-Web"
set internet-service-id 4128769
next
edit "AdRoll-ICMP"
set internet-service-id 4128770
next
edit "AdRoll-DNS"
set internet-service-id 4128771
next
edit "AdRoll-Outbound_Email"
set internet-service-id 4128772
next
edit "AdRoll-SSH"
set internet-service-id 4128774
next
edit "AdRoll-FTP"
set internet-service-id 4128775
next
edit "AdRoll-NTP"
set internet-service-id 4128776
next
edit "AdRoll-Inbound_Email"
set internet-service-id 4128777
next
edit "AdRoll-LDAP"
set internet-service-id 4128782
next
edit "AdRoll-NetBIOS.Session.Service"
set internet-service-id 4128783
next
edit "AdRoll-RTMP"
set internet-service-id 4128784
next
edit "AdRoll-NetBIOS.Name.Service"
set internet-service-id 4128792
next
edit "Xactly-Other"
set internet-service-id 4194304
next
edit "Xactly-Web"
set internet-service-id 4194305
next
edit "Xactly-ICMP"
set internet-service-id 4194306
next
edit "Xactly-DNS"
set internet-service-id 4194307
next
edit "Xactly-Outbound_Email"
set internet-service-id 4194308
next
edit "Xactly-SSH"
set internet-service-id 4194310
next
edit "Xactly-FTP"
set internet-service-id 4194311
next
edit "Xactly-NTP"
set internet-service-id 4194312
next
edit "Xactly-Inbound_Email"
set internet-service-id 4194313
next
edit "Xactly-LDAP"
set internet-service-id 4194318
next
edit "Xactly-NetBIOS.Session.Service"
set internet-service-id 4194319
next
edit "Xactly-RTMP"
set internet-service-id 4194320
next
edit "Xactly-NetBIOS.Name.Service"
set internet-service-id 4194328
next
edit "Intuit-Other"
set internet-service-id 4259840
next
edit "Intuit-Web"
set internet-service-id 4259841
next
edit "Intuit-ICMP"
set internet-service-id 4259842
next
edit "Intuit-DNS"
set internet-service-id 4259843
next
edit "Intuit-Outbound_Email"
set internet-service-id 4259844
next
edit "Intuit-SSH"
set internet-service-id 4259846
next
edit "Intuit-FTP"
set internet-service-id 4259847
next
edit "Intuit-NTP"
set internet-service-id 4259848
next
edit "Intuit-Inbound_Email"
set internet-service-id 4259849
next
edit "Intuit-LDAP"
set internet-service-id 4259854
next
edit "Intuit-NetBIOS.Session.Service"
set internet-service-id 4259855
next
edit "Intuit-RTMP"
set internet-service-id 4259856
next
edit "Intuit-NetBIOS.Name.Service"
set internet-service-id 4259864
next
edit "Marketo-Other"
set internet-service-id 4325376
next
edit "Marketo-Web"
set internet-service-id 4325377
next
edit "Marketo-ICMP"
set internet-service-id 4325378
next
edit "Marketo-DNS"
set internet-service-id 4325379
next
edit "Marketo-Outbound_Email"
set internet-service-id 4325380
next
edit "Marketo-SSH"
set internet-service-id 4325382
next
edit "Marketo-FTP"
set internet-service-id 4325383
next
edit "Marketo-NTP"
set internet-service-id 4325384
next
edit "Marketo-Inbound_Email"
set internet-service-id 4325385
next
edit "Marketo-LDAP"
set internet-service-id 4325390
next
edit "Marketo-NetBIOS.Session.Service"
set internet-service-id 4325391
next
edit "Marketo-RTMP"
set internet-service-id 4325392
next
edit "Marketo-NetBIOS.Name.Service"
set internet-service-id 4325400
next
edit "Bill-Other"
set internet-service-id 4456448
next
edit "Bill-Web"
set internet-service-id 4456449
next
edit "Bill-ICMP"
set internet-service-id 4456450
next
edit "Bill-DNS"
set internet-service-id 4456451
next
edit "Bill-Outbound_Email"
set internet-service-id 4456452
next
edit "Bill-SSH"
set internet-service-id 4456454
next
edit "Bill-FTP"
set internet-service-id 4456455
next
edit "Bill-NTP"
set internet-service-id 4456456
next
edit "Bill-Inbound_Email"
set internet-service-id 4456457
next
edit "Bill-LDAP"
set internet-service-id 4456462
next
edit "Bill-NetBIOS.Session.Service"
set internet-service-id 4456463
next
edit "Bill-RTMP"
set internet-service-id 4456464
next
edit "Bill-NetBIOS.Name.Service"
set internet-service-id 4456472
next
edit "Shopify-Other"
set internet-service-id 4521984
next
edit "Shopify-Web"
set internet-service-id 4521985
next
edit "Shopify-ICMP"
set internet-service-id 4521986
next
edit "Shopify-DNS"
set internet-service-id 4521987
next
edit "Shopify-Outbound_Email"
set internet-service-id 4521988
next
edit "Shopify-SSH"
set internet-service-id 4521990
next
edit "Shopify-FTP"
set internet-service-id 4521991
next
edit "Shopify-NTP"
set internet-service-id 4521992
next
edit "Shopify-Inbound_Email"
set internet-service-id 4521993
next
edit "Shopify-LDAP"
set internet-service-id 4521998
next
edit "Shopify-NetBIOS.Session.Service"
set internet-service-id 4521999
next
edit "Shopify-RTMP"
set internet-service-id 4522000
next
edit "Shopify-NetBIOS.Name.Service"
set internet-service-id 4522008
next
edit "Shopify-Shopify"
set internet-service-id 4522162
next
edit "MuleSoft-Other"
set internet-service-id 4587520
next
edit "MuleSoft-Web"
set internet-service-id 4587521
next
edit "MuleSoft-ICMP"
set internet-service-id 4587522
next
edit "MuleSoft-DNS"
set internet-service-id 4587523
next
edit "MuleSoft-Outbound_Email"
set internet-service-id 4587524
next
edit "MuleSoft-SSH"
set internet-service-id 4587526
next
edit "MuleSoft-FTP"
set internet-service-id 4587527
next
edit "MuleSoft-NTP"
set internet-service-id 4587528
next
edit "MuleSoft-Inbound_Email"
set internet-service-id 4587529
next
edit "MuleSoft-LDAP"
set internet-service-id 4587534
next
edit "MuleSoft-NetBIOS.Session.Service"
set internet-service-id 4587535
next
edit "MuleSoft-RTMP"
set internet-service-id 4587536
next
edit "MuleSoft-NetBIOS.Name.Service"
set internet-service-id 4587544
next
edit "Cornerstone-Other"
set internet-service-id 4653056
next
edit "Cornerstone-Web"
set internet-service-id 4653057
next
edit "Cornerstone-ICMP"
set internet-service-id 4653058
next
edit "Cornerstone-DNS"
set internet-service-id 4653059
next
edit "Cornerstone-Outbound_Email"
set internet-service-id 4653060
next
edit "Cornerstone-SSH"
set internet-service-id 4653062
next
edit "Cornerstone-FTP"
set internet-service-id 4653063
next
edit "Cornerstone-NTP"
set internet-service-id 4653064
next
edit "Cornerstone-Inbound_Email"
set internet-service-id 4653065
next
edit "Cornerstone-LDAP"
set internet-service-id 4653070
next
edit "Cornerstone-NetBIOS.Session.Service"
set internet-service-id 4653071
next
edit "Cornerstone-RTMP"
set internet-service-id 4653072
next
edit "Cornerstone-NetBIOS.Name.Service"
set internet-service-id 4653080
next
edit "Eventbrite-Other"
set internet-service-id 4718592
next
edit "Eventbrite-Web"
set internet-service-id 4718593
next
edit "Eventbrite-ICMP"
set internet-service-id 4718594
next
edit "Eventbrite-DNS"
set internet-service-id 4718595
next
edit "Eventbrite-Outbound_Email"
set internet-service-id 4718596
next
edit "Eventbrite-SSH"
set internet-service-id 4718598
next
edit "Eventbrite-FTP"
set internet-service-id 4718599
next
edit "Eventbrite-NTP"
set internet-service-id 4718600
next
edit "Eventbrite-Inbound_Email"
set internet-service-id 4718601
next
edit "Eventbrite-LDAP"
set internet-service-id 4718606
next
edit "Eventbrite-NetBIOS.Session.Service"
set internet-service-id 4718607
next
edit "Eventbrite-RTMP"
set internet-service-id 4718608
next
edit "Eventbrite-NetBIOS.Name.Service"
set internet-service-id 4718616
next
edit "Paychex-Other"
set internet-service-id 4784128
next
edit "Paychex-Web"
set internet-service-id 4784129
next
edit "Paychex-ICMP"
set internet-service-id 4784130
next
edit "Paychex-DNS"
set internet-service-id 4784131
next
edit "Paychex-Outbound_Email"
set internet-service-id 4784132
next
edit "Paychex-SSH"
set internet-service-id 4784134
next
edit "Paychex-FTP"
set internet-service-id 4784135
next
edit "Paychex-NTP"
set internet-service-id 4784136
next
edit "Paychex-Inbound_Email"
set internet-service-id 4784137
next
edit "Paychex-LDAP"
set internet-service-id 4784142
next
edit "Paychex-NetBIOS.Session.Service"
set internet-service-id 4784143
next
edit "Paychex-RTMP"
set internet-service-id 4784144
next
edit "Paychex-NetBIOS.Name.Service"
set internet-service-id 4784152
next
edit "NewRelic-Other"
set internet-service-id 4849664
next
edit "NewRelic-Web"
set internet-service-id 4849665
next
edit "NewRelic-ICMP"
set internet-service-id 4849666
next
edit "NewRelic-DNS"
set internet-service-id 4849667
next
edit "NewRelic-Outbound_Email"
set internet-service-id 4849668
next
edit "NewRelic-SSH"
set internet-service-id 4849670
next
edit "NewRelic-FTP"
set internet-service-id 4849671
next
edit "NewRelic-NTP"
set internet-service-id 4849672
next
edit "NewRelic-Inbound_Email"
set internet-service-id 4849673
next
edit "NewRelic-LDAP"
set internet-service-id 4849678
next
edit "NewRelic-NetBIOS.Session.Service"
set internet-service-id 4849679
next
edit "NewRelic-RTMP"
set internet-service-id 4849680
next
edit "NewRelic-NetBIOS.Name.Service"
set internet-service-id 4849688
next
edit "Splunk-Other"
set internet-service-id 4915200
next
edit "Splunk-Web"
set internet-service-id 4915201
next
edit "Splunk-ICMP"
set internet-service-id 4915202
next
edit "Splunk-DNS"
set internet-service-id 4915203
next
edit "Splunk-Outbound_Email"
set internet-service-id 4915204
next
edit "Splunk-SSH"
set internet-service-id 4915206
next
edit "Splunk-FTP"
set internet-service-id 4915207
next
edit "Splunk-NTP"
set internet-service-id 4915208
next
edit "Splunk-Inbound_Email"
set internet-service-id 4915209
next
edit "Splunk-LDAP"
set internet-service-id 4915214
next
edit "Splunk-NetBIOS.Session.Service"
set internet-service-id 4915215
next
edit "Splunk-RTMP"
set internet-service-id 4915216
next
edit "Splunk-NetBIOS.Name.Service"
set internet-service-id 4915224
next
edit "Domo-Other"
set internet-service-id 4980736
next
edit "Domo-Web"
set internet-service-id 4980737
next
edit "Domo-ICMP"
set internet-service-id 4980738
next
edit "Domo-DNS"
set internet-service-id 4980739
next
edit "Domo-Outbound_Email"
set internet-service-id 4980740
next
edit "Domo-SSH"
set internet-service-id 4980742
next
edit "Domo-FTP"
set internet-service-id 4980743
next
edit "Domo-NTP"
set internet-service-id 4980744
next
edit "Domo-Inbound_Email"
set internet-service-id 4980745
next
edit "Domo-LDAP"
set internet-service-id 4980750
next
edit "Domo-NetBIOS.Session.Service"
set internet-service-id 4980751
next
edit "Domo-RTMP"
set internet-service-id 4980752
next
edit "Domo-NetBIOS.Name.Service"
set internet-service-id 4980760
next
edit "FreshBooks-Other"
set internet-service-id 5046272
next
edit "FreshBooks-Web"
set internet-service-id 5046273
next
edit "FreshBooks-ICMP"
set internet-service-id 5046274
next
edit "FreshBooks-DNS"
set internet-service-id 5046275
next
edit "FreshBooks-Outbound_Email"
set internet-service-id 5046276
next
edit "FreshBooks-SSH"
set internet-service-id 5046278
next
edit "FreshBooks-FTP"
set internet-service-id 5046279
next
edit "FreshBooks-NTP"
set internet-service-id 5046280
next
edit "FreshBooks-Inbound_Email"
set internet-service-id 5046281
next
edit "FreshBooks-LDAP"
set internet-service-id 5046286
next
edit "FreshBooks-NetBIOS.Session.Service"
set internet-service-id 5046287
next
edit "FreshBooks-RTMP"
set internet-service-id 5046288
next
edit "FreshBooks-NetBIOS.Name.Service"
set internet-service-id 5046296
next
edit "Tableau-Other"
set internet-service-id 5111808
next
edit "Tableau-Web"
set internet-service-id 5111809
next
edit "Tableau-ICMP"
set internet-service-id 5111810
next
edit "Tableau-DNS"
set internet-service-id 5111811
next
edit "Tableau-Outbound_Email"
set internet-service-id 5111812
next
edit "Tableau-SSH"
set internet-service-id 5111814
next
edit "Tableau-FTP"
set internet-service-id 5111815
next
edit "Tableau-NTP"
set internet-service-id 5111816
next
edit "Tableau-Inbound_Email"
set internet-service-id 5111817
next
edit "Tableau-LDAP"
set internet-service-id 5111822
next
edit "Tableau-NetBIOS.Session.Service"
set internet-service-id 5111823
next
edit "Tableau-RTMP"
set internet-service-id 5111824
next
edit "Tableau-NetBIOS.Name.Service"
set internet-service-id 5111832
next
edit "Druva-Other"
set internet-service-id 5177344
next
edit "Druva-Web"
set internet-service-id 5177345
next
edit "Druva-ICMP"
set internet-service-id 5177346
next
edit "Druva-DNS"
set internet-service-id 5177347
next
edit "Druva-Outbound_Email"
set internet-service-id 5177348
next
edit "Druva-SSH"
set internet-service-id 5177350
next
edit "Druva-FTP"
set internet-service-id 5177351
next
edit "Druva-NTP"
set internet-service-id 5177352
next
edit "Druva-Inbound_Email"
set internet-service-id 5177353
next
edit "Druva-LDAP"
set internet-service-id 5177358
next
edit "Druva-NetBIOS.Session.Service"
set internet-service-id 5177359
next
edit "Druva-RTMP"
set internet-service-id 5177360
next
edit "Druva-NetBIOS.Name.Service"
set internet-service-id 5177368
next
edit "Act-on-Other"
set internet-service-id 5242880
next
edit "Act-on-Web"
set internet-service-id 5242881
next
edit "Act-on-ICMP"
set internet-service-id 5242882
next
edit "Act-on-DNS"
set internet-service-id 5242883
next
edit "Act-on-Outbound_Email"
set internet-service-id 5242884
next
edit "Act-on-SSH"
set internet-service-id 5242886
next
edit "Act-on-FTP"
set internet-service-id 5242887
next
edit "Act-on-NTP"
set internet-service-id 5242888
next
edit "Act-on-Inbound_Email"
set internet-service-id 5242889
next
edit "Act-on-LDAP"
set internet-service-id 5242894
next
edit "Act-on-NetBIOS.Session.Service"
set internet-service-id 5242895
next
edit "Act-on-RTMP"
set internet-service-id 5242896
next
edit "Act-on-NetBIOS.Name.Service"
set internet-service-id 5242904
next
edit "GoodData-Other"
set internet-service-id 5308416
next
edit "GoodData-Web"
set internet-service-id 5308417
next
edit "GoodData-ICMP"
set internet-service-id 5308418
next
edit "GoodData-DNS"
set internet-service-id 5308419
next
edit "GoodData-Outbound_Email"
set internet-service-id 5308420
next
edit "GoodData-SSH"
set internet-service-id 5308422
next
edit "GoodData-FTP"
set internet-service-id 5308423
next
edit "GoodData-NTP"
set internet-service-id 5308424
next
edit "GoodData-Inbound_Email"
set internet-service-id 5308425
next
edit "GoodData-LDAP"
set internet-service-id 5308430
next
edit "GoodData-NetBIOS.Session.Service"
set internet-service-id 5308431
next
edit "GoodData-RTMP"
set internet-service-id 5308432
next
edit "GoodData-NetBIOS.Name.Service"
set internet-service-id 5308440
next
edit "SurveyMonkey-Other"
set internet-service-id 5373952
next
edit "SurveyMonkey-Web"
set internet-service-id 5373953
next
edit "SurveyMonkey-ICMP"
set internet-service-id 5373954
next
edit "SurveyMonkey-DNS"
set internet-service-id 5373955
next
edit "SurveyMonkey-Outbound_Email"
set internet-service-id 5373956
next
edit "SurveyMonkey-SSH"
set internet-service-id 5373958
next
edit "SurveyMonkey-FTP"
set internet-service-id 5373959
next
edit "SurveyMonkey-NTP"
set internet-service-id 5373960
next
edit "SurveyMonkey-Inbound_Email"
set internet-service-id 5373961
next
edit "SurveyMonkey-LDAP"
set internet-service-id 5373966
next
edit "SurveyMonkey-NetBIOS.Session.Service"
set internet-service-id 5373967
next
edit "SurveyMonkey-RTMP"
set internet-service-id 5373968
next
edit "SurveyMonkey-NetBIOS.Name.Service"
set internet-service-id 5373976
next
edit "Cvent-Other"
set internet-service-id 5439488
next
edit "Cvent-Web"
set internet-service-id 5439489
next
edit "Cvent-ICMP"
set internet-service-id 5439490
next
edit "Cvent-DNS"
set internet-service-id 5439491
next
edit "Cvent-Outbound_Email"
set internet-service-id 5439492
next
edit "Cvent-SSH"
set internet-service-id 5439494
next
edit "Cvent-FTP"
set internet-service-id 5439495
next
edit "Cvent-NTP"
set internet-service-id 5439496
next
edit "Cvent-Inbound_Email"
set internet-service-id 5439497
next
edit "Cvent-LDAP"
set internet-service-id 5439502
next
edit "Cvent-NetBIOS.Session.Service"
set internet-service-id 5439503
next
edit "Cvent-RTMP"
set internet-service-id 5439504
next
edit "Cvent-NetBIOS.Name.Service"
set internet-service-id 5439512
next
edit "Blackbaud-Other"
set internet-service-id 5505024
next
edit "Blackbaud-Web"
set internet-service-id 5505025
next
edit "Blackbaud-ICMP"
set internet-service-id 5505026
next
edit "Blackbaud-DNS"
set internet-service-id 5505027
next
edit "Blackbaud-Outbound_Email"
set internet-service-id 5505028
next
edit "Blackbaud-SSH"
set internet-service-id 5505030
next
edit "Blackbaud-FTP"
set internet-service-id 5505031
next
edit "Blackbaud-NTP"
set internet-service-id 5505032
next
edit "Blackbaud-Inbound_Email"
set internet-service-id 5505033
next
edit "Blackbaud-LDAP"
set internet-service-id 5505038
next
edit "Blackbaud-NetBIOS.Session.Service"
set internet-service-id 5505039
next
edit "Blackbaud-RTMP"
set internet-service-id 5505040
next
edit "Blackbaud-NetBIOS.Name.Service"
set internet-service-id 5505048
next
edit "InsideSales-Other"
set internet-service-id 5570560
next
edit "InsideSales-Web"
set internet-service-id 5570561
next
edit "InsideSales-ICMP"
set internet-service-id 5570562
next
edit "InsideSales-DNS"
set internet-service-id 5570563
next
edit "InsideSales-Outbound_Email"
set internet-service-id 5570564
next
edit "InsideSales-SSH"
set internet-service-id 5570566
next
edit "InsideSales-FTP"
set internet-service-id 5570567
next
edit "InsideSales-NTP"
set internet-service-id 5570568
next
edit "InsideSales-Inbound_Email"
set internet-service-id 5570569
next
edit "InsideSales-LDAP"
set internet-service-id 5570574
next
edit "InsideSales-NetBIOS.Session.Service"
set internet-service-id 5570575
next
edit "InsideSales-RTMP"
set internet-service-id 5570576
next
edit "InsideSales-NetBIOS.Name.Service"
set internet-service-id 5570584
next
edit "ServiceMax-Other"
set internet-service-id 5636096
next
edit "ServiceMax-Web"
set internet-service-id 5636097
next
edit "ServiceMax-ICMP"
set internet-service-id 5636098
next
edit "ServiceMax-DNS"
set internet-service-id 5636099
next
edit "ServiceMax-Outbound_Email"
set internet-service-id 5636100
next
edit "ServiceMax-SSH"
set internet-service-id 5636102
next
edit "ServiceMax-FTP"
set internet-service-id 5636103
next
edit "ServiceMax-NTP"
set internet-service-id 5636104
next
edit "ServiceMax-Inbound_Email"
set internet-service-id 5636105
next
edit "ServiceMax-LDAP"
set internet-service-id 5636110
next
edit "ServiceMax-NetBIOS.Session.Service"
set internet-service-id 5636111
next
edit "ServiceMax-RTMP"
set internet-service-id 5636112
next
edit "ServiceMax-NetBIOS.Name.Service"
set internet-service-id 5636120
next
edit "Apptio-Other"
set internet-service-id 5701632
next
edit "Apptio-Web"
set internet-service-id 5701633
next
edit "Apptio-ICMP"
set internet-service-id 5701634
next
edit "Apptio-DNS"
set internet-service-id 5701635
next
edit "Apptio-Outbound_Email"
set internet-service-id 5701636
next
edit "Apptio-SSH"
set internet-service-id 5701638
next
edit "Apptio-FTP"
set internet-service-id 5701639
next
edit "Apptio-NTP"
set internet-service-id 5701640
next
edit "Apptio-Inbound_Email"
set internet-service-id 5701641
next
edit "Apptio-LDAP"
set internet-service-id 5701646
next
edit "Apptio-NetBIOS.Session.Service"
set internet-service-id 5701647
next
edit "Apptio-RTMP"
set internet-service-id 5701648
next
edit "Apptio-NetBIOS.Name.Service"
set internet-service-id 5701656
next
edit "Veracode-Other"
set internet-service-id 5767168
next
edit "Veracode-Web"
set internet-service-id 5767169
next
edit "Veracode-ICMP"
set internet-service-id 5767170
next
edit "Veracode-DNS"
set internet-service-id 5767171
next
edit "Veracode-Outbound_Email"
set internet-service-id 5767172
next
edit "Veracode-SSH"
set internet-service-id 5767174
next
edit "Veracode-FTP"
set internet-service-id 5767175
next
edit "Veracode-NTP"
set internet-service-id 5767176
next
edit "Veracode-Inbound_Email"
set internet-service-id 5767177
next
edit "Veracode-LDAP"
set internet-service-id 5767182
next
edit "Veracode-NetBIOS.Session.Service"
set internet-service-id 5767183
next
edit "Veracode-RTMP"
set internet-service-id 5767184
next
edit "Veracode-NetBIOS.Name.Service"
set internet-service-id 5767192
next
edit "Anaplan-Other"
set internet-service-id 5832704
next
edit "Anaplan-Web"
set internet-service-id 5832705
next
edit "Anaplan-ICMP"
set internet-service-id 5832706
next
edit "Anaplan-DNS"
set internet-service-id 5832707
next
edit "Anaplan-Outbound_Email"
set internet-service-id 5832708
next
edit "Anaplan-SSH"
set internet-service-id 5832710
next
edit "Anaplan-FTP"
set internet-service-id 5832711
next
edit "Anaplan-NTP"
set internet-service-id 5832712
next
edit "Anaplan-Inbound_Email"
set internet-service-id 5832713
next
edit "Anaplan-LDAP"
set internet-service-id 5832718
next
edit "Anaplan-NetBIOS.Session.Service"
set internet-service-id 5832719
next
edit "Anaplan-RTMP"
set internet-service-id 5832720
next
edit "Anaplan-NetBIOS.Name.Service"
set internet-service-id 5832728
next
edit "Rapid7-Other"
set internet-service-id 5898240
next
edit "Rapid7-Web"
set internet-service-id 5898241
next
edit "Rapid7-ICMP"
set internet-service-id 5898242
next
edit "Rapid7-DNS"
set internet-service-id 5898243
next
edit "Rapid7-Outbound_Email"
set internet-service-id 5898244
next
edit "Rapid7-SSH"
set internet-service-id 5898246
next
edit "Rapid7-FTP"
set internet-service-id 5898247
next
edit "Rapid7-NTP"
set internet-service-id 5898248
next
edit "Rapid7-Inbound_Email"
set internet-service-id 5898249
next
edit "Rapid7-LDAP"
set internet-service-id 5898254
next
edit "Rapid7-NetBIOS.Session.Service"
set internet-service-id 5898255
next
edit "Rapid7-RTMP"
set internet-service-id 5898256
next
edit "Rapid7-NetBIOS.Name.Service"
set internet-service-id 5898264
next
edit "AnyDesk-AnyDesk"
set internet-service-id 5963927
next
edit "ESET-Eset.Service"
set internet-service-id 6029426
next
edit "Slack-Other"
set internet-service-id 6094848
next
edit "Slack-Web"
set internet-service-id 6094849
next
edit "Slack-ICMP"
set internet-service-id 6094850
next
edit "Slack-DNS"
set internet-service-id 6094851
next
edit "Slack-Outbound_Email"
set internet-service-id 6094852
next
edit "Slack-SSH"
set internet-service-id 6094854
next
edit "Slack-FTP"
set internet-service-id 6094855
next
edit "Slack-NTP"
set internet-service-id 6094856
next
edit "Slack-Inbound_Email"
set internet-service-id 6094857
next
edit "Slack-LDAP"
set internet-service-id 6094862
next
edit "Slack-NetBIOS.Session.Service"
set internet-service-id 6094863
next
edit "Slack-RTMP"
set internet-service-id 6094864
next
edit "Slack-NetBIOS.Name.Service"
set internet-service-id 6094872
next
edit "Slack-Slack"
set internet-service-id 6095024
next
edit "ADP-Other"
set internet-service-id 6160384
next
edit "ADP-Web"
set internet-service-id 6160385
next
edit "ADP-ICMP"
set internet-service-id 6160386
next
edit "ADP-DNS"
set internet-service-id 6160387
next
edit "ADP-Outbound_Email"
set internet-service-id 6160388
next
edit "ADP-SSH"
set internet-service-id 6160390
next
edit "ADP-FTP"
set internet-service-id 6160391
next
edit "ADP-NTP"
set internet-service-id 6160392
next
edit "ADP-Inbound_Email"
set internet-service-id 6160393
next
edit "ADP-LDAP"
set internet-service-id 6160398
next
edit "ADP-NetBIOS.Session.Service"
set internet-service-id 6160399
next
edit "ADP-RTMP"
set internet-service-id 6160400
next
edit "ADP-NetBIOS.Name.Service"
set internet-service-id 6160408
next
edit "Blackboard-Other"
set internet-service-id 6225920
next
edit "Blackboard-Web"
set internet-service-id 6225921
next
edit "Blackboard-ICMP"
set internet-service-id 6225922
next
edit "Blackboard-DNS"
set internet-service-id 6225923
next
edit "Blackboard-Outbound_Email"
set internet-service-id 6225924
next
edit "Blackboard-SSH"
set internet-service-id 6225926
next
edit "Blackboard-FTP"
set internet-service-id 6225927
next
edit "Blackboard-NTP"
set internet-service-id 6225928
next
edit "Blackboard-Inbound_Email"
set internet-service-id 6225929
next
edit "Blackboard-LDAP"
set internet-service-id 6225934
next
edit "Blackboard-NetBIOS.Session.Service"
set internet-service-id 6225935
next
edit "Blackboard-RTMP"
set internet-service-id 6225936
next
edit "Blackboard-NetBIOS.Name.Service"
set internet-service-id 6225944
next
edit "SAP-Other"
set internet-service-id 6291456
next
edit "SAP-Web"
set internet-service-id 6291457
next
edit "SAP-ICMP"
set internet-service-id 6291458
next
edit "SAP-DNS"
set internet-service-id 6291459
next
edit "SAP-Outbound_Email"
set internet-service-id 6291460
next
edit "SAP-SSH"
set internet-service-id 6291462
next
edit "SAP-FTP"
set internet-service-id 6291463
next
edit "SAP-NTP"
set internet-service-id 6291464
next
edit "SAP-Inbound_Email"
set internet-service-id 6291465
next
edit "SAP-LDAP"
set internet-service-id 6291470
next
edit "SAP-NetBIOS.Session.Service"
set internet-service-id 6291471
next
edit "SAP-RTMP"
set internet-service-id 6291472
next
edit "SAP-NetBIOS.Name.Service"
set internet-service-id 6291480
next
edit "SAP-HANA"
set internet-service-id 6291612
next
edit "SAP-SuccessFactors"
set internet-service-id 6291618
next
edit "Snap-Snapchat"
set internet-service-id 6357108
next
edit "Zoom.us-Zoom.Meeting"
set internet-service-id 6422646
next
edit "Sophos-Other"
set internet-service-id 6488064
next
edit "Sophos-Web"
set internet-service-id 6488065
next
edit "Sophos-ICMP"
set internet-service-id 6488066
next
edit "Sophos-DNS"
set internet-service-id 6488067
next
edit "Sophos-Outbound_Email"
set internet-service-id 6488068
next
edit "Sophos-SSH"
set internet-service-id 6488070
next
edit "Sophos-FTP"
set internet-service-id 6488071
next
edit "Sophos-NTP"
set internet-service-id 6488072
next
edit "Sophos-Inbound_Email"
set internet-service-id 6488073
next
edit "Sophos-LDAP"
set internet-service-id 6488078
next
edit "Sophos-NetBIOS.Session.Service"
set internet-service-id 6488079
next
edit "Sophos-RTMP"
set internet-service-id 6488080
next
edit "Sophos-NetBIOS.Name.Service"
set internet-service-id 6488088
next
edit "Cloudflare-Other"
set internet-service-id 6553600
next
edit "Cloudflare-Web"
set internet-service-id 6553601
next
edit "Cloudflare-ICMP"
set internet-service-id 6553602
next
edit "Cloudflare-DNS"
set internet-service-id 6553603
next
edit "Cloudflare-Outbound_Email"
set internet-service-id 6553604
next
edit "Cloudflare-SSH"
set internet-service-id 6553606
next
edit "Cloudflare-FTP"
set internet-service-id 6553607
next
edit "Cloudflare-NTP"
set internet-service-id 6553608
next
edit "Cloudflare-Inbound_Email"
set internet-service-id 6553609
next
edit "Cloudflare-LDAP"
set internet-service-id 6553614
next
edit "Cloudflare-NetBIOS.Session.Service"
set internet-service-id 6553615
next
edit "Cloudflare-RTMP"
set internet-service-id 6553616
next
edit "Cloudflare-NetBIOS.Name.Service"
set internet-service-id 6553624
next
edit "Cloudflare-CDN"
set internet-service-id 6553737
next
edit "Pexip-Pexip.Meeting"
set internet-service-id 6619256
next
edit "Zscaler-Other"
set internet-service-id 6684672
next
edit "Zscaler-Web"
set internet-service-id 6684673
next
edit "Zscaler-ICMP"
set internet-service-id 6684674
next
edit "Zscaler-DNS"
set internet-service-id 6684675
next
edit "Zscaler-Outbound_Email"
set internet-service-id 6684676
next
edit "Zscaler-SSH"
set internet-service-id 6684678
next
edit "Zscaler-FTP"
set internet-service-id 6684679
next
edit "Zscaler-NTP"
set internet-service-id 6684680
next
edit "Zscaler-Inbound_Email"
set internet-service-id 6684681
next
edit "Zscaler-LDAP"
set internet-service-id 6684686
next
edit "Zscaler-NetBIOS.Session.Service"
set internet-service-id 6684687
next
edit "Zscaler-RTMP"
set internet-service-id 6684688
next
edit "Zscaler-NetBIOS.Name.Service"
set internet-service-id 6684696
next
edit "Zscaler-Zscaler.Cloud"
set internet-service-id 6684793
next
edit "Yandex-Other"
set internet-service-id 6750208
next
edit "Yandex-Web"
set internet-service-id 6750209
next
edit "Yandex-ICMP"
set internet-service-id 6750210
next
edit "Yandex-DNS"
set internet-service-id 6750211
next
edit "Yandex-Outbound_Email"
set internet-service-id 6750212
next
edit "Yandex-SSH"
set internet-service-id 6750214
next
edit "Yandex-FTP"
set internet-service-id 6750215
next
edit "Yandex-NTP"
set internet-service-id 6750216
next
edit "Yandex-Inbound_Email"
set internet-service-id 6750217
next
edit "Yandex-LDAP"
set internet-service-id 6750222
next
edit "Yandex-NetBIOS.Session.Service"
set internet-service-id 6750223
next
edit "Yandex-RTMP"
set internet-service-id 6750224
next
edit "Yandex-NetBIOS.Name.Service"
set internet-service-id 6750232
next
edit "mail.ru-Other"
set internet-service-id 6815744
next
edit "mail.ru-Web"
set internet-service-id 6815745
next
edit "mail.ru-ICMP"
set internet-service-id 6815746
next
edit "mail.ru-DNS"
set internet-service-id 6815747
next
edit "mail.ru-Outbound_Email"
set internet-service-id 6815748
next
edit "mail.ru-SSH"
set internet-service-id 6815750
next
edit "mail.ru-FTP"
set internet-service-id 6815751
next
edit "mail.ru-NTP"
set internet-service-id 6815752
next
edit "mail.ru-Inbound_Email"
set internet-service-id 6815753
next
edit "mail.ru-LDAP"
set internet-service-id 6815758
next
edit "mail.ru-NetBIOS.Session.Service"
set internet-service-id 6815759
next
edit "mail.ru-RTMP"
set internet-service-id 6815760
next
edit "mail.ru-NetBIOS.Name.Service"
set internet-service-id 6815768
next
edit "Alibaba-Other"
set internet-service-id 6881280
next
edit "Alibaba-Web"
set internet-service-id 6881281
next
edit "Alibaba-ICMP"
set internet-service-id 6881282
next
edit "Alibaba-DNS"
set internet-service-id 6881283
next
edit "Alibaba-Outbound_Email"
set internet-service-id 6881284
next
edit "Alibaba-SSH"
set internet-service-id 6881286
next
edit "Alibaba-FTP"
set internet-service-id 6881287
next
edit "Alibaba-NTP"
set internet-service-id 6881288
next
edit "Alibaba-Inbound_Email"
set internet-service-id 6881289
next
edit "Alibaba-LDAP"
set internet-service-id 6881294
next
edit "Alibaba-NetBIOS.Session.Service"
set internet-service-id 6881295
next
edit "Alibaba-RTMP"
set internet-service-id 6881296
next
edit "Alibaba-NetBIOS.Name.Service"
set internet-service-id 6881304
next
edit "Alibaba-Alibaba.Cloud"
set internet-service-id 6881402
next
edit "GoDaddy-Other"
set internet-service-id 6946816
next
edit "GoDaddy-Web"
set internet-service-id 6946817
next
edit "GoDaddy-ICMP"
set internet-service-id 6946818
next
edit "GoDaddy-DNS"
set internet-service-id 6946819
next
edit "GoDaddy-Outbound_Email"
set internet-service-id 6946820
next
edit "GoDaddy-SSH"
set internet-service-id 6946822
next
edit "GoDaddy-FTP"
set internet-service-id 6946823
next
edit "GoDaddy-NTP"
set internet-service-id 6946824
next
edit "GoDaddy-Inbound_Email"
set internet-service-id 6946825
next
edit "GoDaddy-LDAP"
set internet-service-id 6946830
next
edit "GoDaddy-NetBIOS.Session.Service"
set internet-service-id 6946831
next
edit "GoDaddy-RTMP"
set internet-service-id 6946832
next
edit "GoDaddy-NetBIOS.Name.Service"
set internet-service-id 6946840
next
edit "GoDaddy-GoDaddy.Email"
set internet-service-id 6946939
next
edit "Bluejeans-Other"
set internet-service-id 7012352
next
edit "Bluejeans-Web"
set internet-service-id 7012353
next
edit "Bluejeans-ICMP"
set internet-service-id 7012354
next
edit "Bluejeans-DNS"
set internet-service-id 7012355
next
edit "Bluejeans-Outbound_Email"
set internet-service-id 7012356
next
edit "Bluejeans-SSH"
set internet-service-id 7012358
next
edit "Bluejeans-FTP"
set internet-service-id 7012359
next
edit "Bluejeans-NTP"
set internet-service-id 7012360
next
edit "Bluejeans-Inbound_Email"
set internet-service-id 7012361
next
edit "Bluejeans-LDAP"
set internet-service-id 7012366
next
edit "Bluejeans-NetBIOS.Session.Service"
set internet-service-id 7012367
next
edit "Bluejeans-RTMP"
set internet-service-id 7012368
next
edit "Bluejeans-NetBIOS.Name.Service"
set internet-service-id 7012376
next
edit "Bluejeans-Bluejeans.Meeting"
set internet-service-id 7012476
next
edit "Webroot-Webroot.SecureAnywhere"
set internet-service-id 7078013
next
edit "Avast-Other"
set internet-service-id 7143424
next
edit "Avast-Web"
set internet-service-id 7143425
next
edit "Avast-ICMP"
set internet-service-id 7143426
next
edit "Avast-DNS"
set internet-service-id 7143427
next
edit "Avast-Outbound_Email"
set internet-service-id 7143428
next
edit "Avast-SSH"
set internet-service-id 7143430
next
edit "Avast-FTP"
set internet-service-id 7143431
next
edit "Avast-NTP"
set internet-service-id 7143432
next
edit "Avast-Inbound_Email"
set internet-service-id 7143433
next
edit "Avast-LDAP"
set internet-service-id 7143438
next
edit "Avast-NetBIOS.Session.Service"
set internet-service-id 7143439
next
edit "Avast-RTMP"
set internet-service-id 7143440
next
edit "Avast-NetBIOS.Name.Service"
set internet-service-id 7143448
next
edit "Avast-Avast.Security"
set internet-service-id 7143550
next
edit "Wetransfer-Other"
set internet-service-id 7208960
next
edit "Wetransfer-Web"
set internet-service-id 7208961
next
edit "Wetransfer-ICMP"
set internet-service-id 7208962
next
edit "Wetransfer-DNS"
set internet-service-id 7208963
next
edit "Wetransfer-Outbound_Email"
set internet-service-id 7208964
next
edit "Wetransfer-SSH"
set internet-service-id 7208966
next
edit "Wetransfer-FTP"
set internet-service-id 7208967
next
edit "Wetransfer-NTP"
set internet-service-id 7208968
next
edit "Wetransfer-Inbound_Email"
set internet-service-id 7208969
next
edit "Wetransfer-LDAP"
set internet-service-id 7208974
next
edit "Wetransfer-NetBIOS.Session.Service"
set internet-service-id 7208975
next
edit "Wetransfer-RTMP"
set internet-service-id 7208976
next
edit "Wetransfer-NetBIOS.Name.Service"
set internet-service-id 7208984
next
edit "Sendgrid-Sendgrid.Email"
set internet-service-id 7274623
next
edit "Ubiquiti-UniFi"
set internet-service-id 7340160
next
edit "Lifesize-Lifesize.Cloud"
set internet-service-id 7405697
next
edit "Okta-Other"
set internet-service-id 7471104
next
edit "Okta-Web"
set internet-service-id 7471105
next
edit "Okta-ICMP"
set internet-service-id 7471106
next
edit "Okta-DNS"
set internet-service-id 7471107
next
edit "Okta-Outbound_Email"
set internet-service-id 7471108
next
edit "Okta-SSH"
set internet-service-id 7471110
next
edit "Okta-FTP"
set internet-service-id 7471111
next
edit "Okta-NTP"
set internet-service-id 7471112
next
edit "Okta-Inbound_Email"
set internet-service-id 7471113
next
edit "Okta-LDAP"
set internet-service-id 7471118
next
edit "Okta-NetBIOS.Session.Service"
set internet-service-id 7471119
next
edit "Okta-RTMP"
set internet-service-id 7471120
next
edit "Okta-NetBIOS.Name.Service"
set internet-service-id 7471128
next
edit "Okta-Okta"
set internet-service-id 7471307
next
edit "Cybozu-Other"
set internet-service-id 7536640
next
edit "Cybozu-Web"
set internet-service-id 7536641
next
edit "Cybozu-ICMP"
set internet-service-id 7536642
next
edit "Cybozu-DNS"
set internet-service-id 7536643
next
edit "Cybozu-Outbound_Email"
set internet-service-id 7536644
next
edit "Cybozu-SSH"
set internet-service-id 7536646
next
edit "Cybozu-FTP"
set internet-service-id 7536647
next
edit "Cybozu-NTP"
set internet-service-id 7536648
next
edit "Cybozu-Inbound_Email"
set internet-service-id 7536649
next
edit "Cybozu-LDAP"
set internet-service-id 7536654
next
edit "Cybozu-NetBIOS.Session.Service"
set internet-service-id 7536655
next
edit "Cybozu-RTMP"
set internet-service-id 7536656
next
edit "Cybozu-NetBIOS.Name.Service"
set internet-service-id 7536664
next
edit "VNC-Other"
set internet-service-id 7602176
next
edit "VNC-Web"
set internet-service-id 7602177
next
edit "VNC-ICMP"
set internet-service-id 7602178
next
edit "VNC-DNS"
set internet-service-id 7602179
next
edit "VNC-Outbound_Email"
set internet-service-id 7602180
next
edit "VNC-SSH"
set internet-service-id 7602182
next
edit "VNC-FTP"
set internet-service-id 7602183
next
edit "VNC-NTP"
set internet-service-id 7602184
next
edit "VNC-Inbound_Email"
set internet-service-id 7602185
next
edit "VNC-LDAP"
set internet-service-id 7602190
next
edit "VNC-NetBIOS.Session.Service"
set internet-service-id 7602191
next
edit "VNC-RTMP"
set internet-service-id 7602192
next
edit "VNC-NetBIOS.Name.Service"
set internet-service-id 7602200
next
edit "Egnyte-Egnyte"
set internet-service-id 7667846
next
edit "CrowdStrike-CrowdStrike.Falcon.Cloud"
set internet-service-id 7733383
next
edit "Aruba.it-Other"
set internet-service-id 7798784
next
edit "Aruba.it-Web"
set internet-service-id 7798785
next
edit "Aruba.it-ICMP"
set internet-service-id 7798786
next
edit "Aruba.it-DNS"
set internet-service-id 7798787
next
edit "Aruba.it-Outbound_Email"
set internet-service-id 7798788
next
edit "Aruba.it-SSH"
set internet-service-id 7798790
next
edit "Aruba.it-FTP"
set internet-service-id 7798791
next
edit "Aruba.it-NTP"
set internet-service-id 7798792
next
edit "Aruba.it-Inbound_Email"
set internet-service-id 7798793
next
edit "Aruba.it-LDAP"
set internet-service-id 7798798
next
edit "Aruba.it-NetBIOS.Session.Service"
set internet-service-id 7798799
next
edit "Aruba.it-RTMP"
set internet-service-id 7798800
next
edit "Aruba.it-NetBIOS.Name.Service"
set internet-service-id 7798808
next
edit "ISLOnline-Other"
set internet-service-id 7864320
next
edit "ISLOnline-Web"
set internet-service-id 7864321
next
edit "ISLOnline-ICMP"
set internet-service-id 7864322
next
edit "ISLOnline-DNS"
set internet-service-id 7864323
next
edit "ISLOnline-Outbound_Email"
set internet-service-id 7864324
next
edit "ISLOnline-SSH"
set internet-service-id 7864326
next
edit "ISLOnline-FTP"
set internet-service-id 7864327
next
edit "ISLOnline-NTP"
set internet-service-id 7864328
next
edit "ISLOnline-Inbound_Email"
set internet-service-id 7864329
next
edit "ISLOnline-LDAP"
set internet-service-id 7864334
next
edit "ISLOnline-NetBIOS.Session.Service"
set internet-service-id 7864335
next
edit "ISLOnline-RTMP"
set internet-service-id 7864336
next
edit "ISLOnline-NetBIOS.Name.Service"
set internet-service-id 7864344
next
edit "Akamai-CDN"
set internet-service-id 7929993
next
edit "Rackspace-CDN"
set internet-service-id 7995529
next
edit "Instart-CDN"
set internet-service-id 8061065
next
edit "Bitdefender-Other"
set internet-service-id 8126464
next
edit "Bitdefender-Web"
set internet-service-id 8126465
next
edit "Bitdefender-ICMP"
set internet-service-id 8126466
next
edit "Bitdefender-DNS"
set internet-service-id 8126467
next
edit "Bitdefender-Outbound_Email"
set internet-service-id 8126468
next
edit "Bitdefender-SSH"
set internet-service-id 8126470
next
edit "Bitdefender-FTP"
set internet-service-id 8126471
next
edit "Bitdefender-NTP"
set internet-service-id 8126472
next
edit "Bitdefender-Inbound_Email"
set internet-service-id 8126473
next
edit "Bitdefender-LDAP"
set internet-service-id 8126478
next
edit "Bitdefender-NetBIOS.Session.Service"
set internet-service-id 8126479
next
edit "Bitdefender-RTMP"
set internet-service-id 8126480
next
edit "Bitdefender-NetBIOS.Name.Service"
set internet-service-id 8126488
next
edit "Pingdom-Other"
set internet-service-id 8192000
next
edit "Pingdom-Web"
set internet-service-id 8192001
next
edit "Pingdom-ICMP"
set internet-service-id 8192002
next
edit "Pingdom-DNS"
set internet-service-id 8192003
next
edit "Pingdom-Outbound_Email"
set internet-service-id 8192004
next
edit "Pingdom-SSH"
set internet-service-id 8192006
next
edit "Pingdom-FTP"
set internet-service-id 8192007
next
edit "Pingdom-NTP"
set internet-service-id 8192008
next
edit "Pingdom-Inbound_Email"
set internet-service-id 8192009
next
edit "Pingdom-LDAP"
set internet-service-id 8192014
next
edit "Pingdom-NetBIOS.Session.Service"
set internet-service-id 8192015
next
edit "Pingdom-RTMP"
set internet-service-id 8192016
next
edit "Pingdom-NetBIOS.Name.Service"
set internet-service-id 8192024
next
edit "UptimeRobot-Other"
set internet-service-id 8257536
next
edit "UptimeRobot-Web"
set internet-service-id 8257537
next
edit "UptimeRobot-ICMP"
set internet-service-id 8257538
next
edit "UptimeRobot-DNS"
set internet-service-id 8257539
next
edit "UptimeRobot-Outbound_Email"
set internet-service-id 8257540
next
edit "UptimeRobot-SSH"
set internet-service-id 8257542
next
edit "UptimeRobot-FTP"
set internet-service-id 8257543
next
edit "UptimeRobot-NTP"
set internet-service-id 8257544
next
edit "UptimeRobot-Inbound_Email"
set internet-service-id 8257545
next
edit "UptimeRobot-LDAP"
set internet-service-id 8257550
next
edit "UptimeRobot-NetBIOS.Session.Service"
set internet-service-id 8257551
next
edit "UptimeRobot-RTMP"
set internet-service-id 8257552
next
edit "UptimeRobot-NetBIOS.Name.Service"
set internet-service-id 8257560
next
edit "UptimeRobot-UptimeRobot.Monitor"
set internet-service-id 8257709
next
edit "Quovadisglobal-Other"
set internet-service-id 8323072
next
edit "Quovadisglobal-Web"
set internet-service-id 8323073
next
edit "Quovadisglobal-ICMP"
set internet-service-id 8323074
next
edit "Quovadisglobal-DNS"
set internet-service-id 8323075
next
edit "Quovadisglobal-Outbound_Email"
set internet-service-id 8323076
next
edit "Quovadisglobal-SSH"
set internet-service-id 8323078
next
edit "Quovadisglobal-FTP"
set internet-service-id 8323079
next
edit "Quovadisglobal-NTP"
set internet-service-id 8323080
next
edit "Quovadisglobal-Inbound_Email"
set internet-service-id 8323081
next
edit "Quovadisglobal-LDAP"
set internet-service-id 8323086
next
edit "Quovadisglobal-NetBIOS.Session.Service"
set internet-service-id 8323087
next
edit "Quovadisglobal-RTMP"
set internet-service-id 8323088
next
edit "Quovadisglobal-NetBIOS.Name.Service"
set internet-service-id 8323096
next
edit "Splashtop-Splashtop"
set internet-service-id 8388751
next
edit "Zoox-Other"
set internet-service-id 8454144
next
edit "Zoox-Web"
set internet-service-id 8454145
next
edit "Zoox-ICMP"
set internet-service-id 8454146
next
edit "Zoox-DNS"
set internet-service-id 8454147
next
edit "Zoox-Outbound_Email"
set internet-service-id 8454148
next
edit "Zoox-SSH"
set internet-service-id 8454150
next
edit "Zoox-FTP"
set internet-service-id 8454151
next
edit "Zoox-NTP"
set internet-service-id 8454152
next
edit "Zoox-Inbound_Email"
set internet-service-id 8454153
next
edit "Zoox-LDAP"
set internet-service-id 8454158
next
edit "Zoox-NetBIOS.Session.Service"
set internet-service-id 8454159
next
edit "Zoox-RTMP"
set internet-service-id 8454160
next
edit "Zoox-NetBIOS.Name.Service"
set internet-service-id 8454168
next
edit "Skyfii-Other"
set internet-service-id 8519680
next
edit "Skyfii-Web"
set internet-service-id 8519681
next
edit "Skyfii-ICMP"
set internet-service-id 8519682
next
edit "Skyfii-DNS"
set internet-service-id 8519683
next
edit "Skyfii-Outbound_Email"
set internet-service-id 8519684
next
edit "Skyfii-SSH"
set internet-service-id 8519686
next
edit "Skyfii-FTP"
set internet-service-id 8519687
next
edit "Skyfii-NTP"
set internet-service-id 8519688
next
edit "Skyfii-Inbound_Email"
set internet-service-id 8519689
next
edit "Skyfii-LDAP"
set internet-service-id 8519694
next
edit "Skyfii-NetBIOS.Session.Service"
set internet-service-id 8519695
next
edit "Skyfii-RTMP"
set internet-service-id 8519696
next
edit "Skyfii-NetBIOS.Name.Service"
set internet-service-id 8519704
next
edit "CoffeeBean-Other"
set internet-service-id 8585216
next
edit "CoffeeBean-Web"
set internet-service-id 8585217
next
edit "CoffeeBean-ICMP"
set internet-service-id 8585218
next
edit "CoffeeBean-DNS"
set internet-service-id 8585219
next
edit "CoffeeBean-Outbound_Email"
set internet-service-id 8585220
next
edit "CoffeeBean-SSH"
set internet-service-id 8585222
next
edit "CoffeeBean-FTP"
set internet-service-id 8585223
next
edit "CoffeeBean-NTP"
set internet-service-id 8585224
next
edit "CoffeeBean-Inbound_Email"
set internet-service-id 8585225
next
edit "CoffeeBean-LDAP"
set internet-service-id 8585230
next
edit "CoffeeBean-NetBIOS.Session.Service"
set internet-service-id 8585231
next
edit "CoffeeBean-RTMP"
set internet-service-id 8585232
next
edit "CoffeeBean-NetBIOS.Name.Service"
set internet-service-id 8585240
next
edit "Cloud4Wi-Other"
set internet-service-id 8650752
next
edit "Cloud4Wi-Web"
set internet-service-id 8650753
next
edit "Cloud4Wi-ICMP"
set internet-service-id 8650754
next
edit "Cloud4Wi-DNS"
set internet-service-id 8650755
next
edit "Cloud4Wi-Outbound_Email"
set internet-service-id 8650756
next
edit "Cloud4Wi-SSH"
set internet-service-id 8650758
next
edit "Cloud4Wi-FTP"
set internet-service-id 8650759
next
edit "Cloud4Wi-NTP"
set internet-service-id 8650760
next
edit "Cloud4Wi-Inbound_Email"
set internet-service-id 8650761
next
edit "Cloud4Wi-LDAP"
set internet-service-id 8650766
next
edit "Cloud4Wi-NetBIOS.Session.Service"
set internet-service-id 8650767
next
edit "Cloud4Wi-RTMP"
set internet-service-id 8650768
next
edit "Cloud4Wi-NetBIOS.Name.Service"
set internet-service-id 8650776
next
edit "Panda-Panda.Security"
set internet-service-id 8716432
next
edit "Ewon-Talk2M"
set internet-service-id 8781970
next
edit "Nutanix-Nutanix.Cloud"
set internet-service-id 8847507
next
edit "Backblaze-Other"
set internet-service-id 8912896
next
edit "Backblaze-Web"
set internet-service-id 8912897
next
edit "Backblaze-ICMP"
set internet-service-id 8912898
next
edit "Backblaze-DNS"
set internet-service-id 8912899
next
edit "Backblaze-Outbound_Email"
set internet-service-id 8912900
next
edit "Backblaze-SSH"
set internet-service-id 8912902
next
edit "Backblaze-FTP"
set internet-service-id 8912903
next
edit "Backblaze-NTP"
set internet-service-id 8912904
next
edit "Backblaze-Inbound_Email"
set internet-service-id 8912905
next
edit "Backblaze-LDAP"
set internet-service-id 8912910
next
edit "Backblaze-NetBIOS.Session.Service"
set internet-service-id 8912911
next
edit "Backblaze-RTMP"
set internet-service-id 8912912
next
edit "Backblaze-NetBIOS.Name.Service"
set internet-service-id 8912920
next
edit "Extreme-Extreme.Cloud"
set internet-service-id 8978580
next
edit "XING-Other"
set internet-service-id 9043968
next
edit "XING-Web"
set internet-service-id 9043969
next
edit "XING-ICMP"
set internet-service-id 9043970
next
edit "XING-DNS"
set internet-service-id 9043971
next
edit "XING-Outbound_Email"
set internet-service-id 9043972
next
edit "XING-SSH"
set internet-service-id 9043974
next
edit "XING-FTP"
set internet-service-id 9043975
next
edit "XING-NTP"
set internet-service-id 9043976
next
edit "XING-Inbound_Email"
set internet-service-id 9043977
next
edit "XING-LDAP"
set internet-service-id 9043982
next
edit "XING-NetBIOS.Session.Service"
set internet-service-id 9043983
next
edit "XING-RTMP"
set internet-service-id 9043984
next
edit "XING-NetBIOS.Name.Service"
set internet-service-id 9043992
next
edit "Genesys-PureCloud"
set internet-service-id 9109653
next
edit "BlackBerry-Cylance"
set internet-service-id 9175190
next
edit "DigiCert-OCSP"
set internet-service-id 9240728
next
edit "Infomaniak-SwissTransfer"
set internet-service-id 9306265
next
edit "Fuze-Fuze"
set internet-service-id 9371802
next
edit "Truecaller-Truecaller"
set internet-service-id 9437339
next
edit "GlobalSign-OCSP"
set internet-service-id 9502872
next
edit "VeriSign-OCSP"
set internet-service-id 9568408
next
edit "Sony-PlayStation.Network"
set internet-service-id 9633952
next
edit "Acronis-Cyber.Cloud"
set internet-service-id 9699489
next
edit "RingCentral-RingCentral"
set internet-service-id 9765027
next
edit "FSecure-FSecure"
set internet-service-id 9830564
next
edit "Kaseya-Kaseya.Cloud"
set internet-service-id 9896101
next
edit "Shodan-Scanner"
set internet-service-id 9961638
next
edit "Censys-Scanner"
set internet-service-id 10027174
next
edit "Valve-Steam"
set internet-service-id 10092711
next
edit "YouSeeU-Bongo"
set internet-service-id 10158248
next
edit "Cato-Cato.Cloud"
set internet-service-id 10223785
next
edit "SolarWinds-SpamExperts"
set internet-service-id 10289323
next
edit "SolarWinds-Pingdom.Probe"
set internet-service-id 10289326
next
edit "8X8-8X8.Cloud"
set internet-service-id 10354860
next
edit "Zattoo-Zattoo.TV"
set internet-service-id 10420401
next
edit "Datto-Datto.RMM"
set internet-service-id 10485939
next
edit "Barracuda-Barracuda.Cloud"
set internet-service-id 10551477
next
edit "Naver-Line"
set internet-service-id 10617015
next
edit "Disney-Disney+"
set internet-service-id 10682552
next
edit "DNS-DoH_DoT"
set internet-service-id 10748089
next
edit "Quad9-Quad9.Standard.DNS"
set internet-service-id 10813626
next
edit "Stretchoid-Scanner"
set internet-service-id 10879142
next
edit "Poly-RealConnect.Service"
set internet-service-id 10944700
next
edit "Telegram-Telegram"
set internet-service-id 11010249
next
edit "Spotify-Spotify"
set internet-service-id 11075786
next
edit "NextDNS-NextDNS"
set internet-service-id 11141324
next
edit "Fastly-CDN"
set internet-service-id 11206793
next
edit "Neustar-UltraDNS.Probes"
set internet-service-id 11272397
next
edit "Microsoft-Intune"
set internet-service-id 327886
next
edit "Microsoft-Office365.Published.Optimize"
set internet-service-id 327902
next
edit "Microsoft-Office365.Published.Allow"
set internet-service-id 327903
next
edit "Microsoft-Office365.Published.USGOV"
set internet-service-id 327917
next
edit "Microsoft-Azure.Monitor"
set internet-service-id 327958
next
edit "Microsoft-Azure.SQL"
set internet-service-id 327959
next
edit "Microsoft-Azure.AD"
set internet-service-id 327960
next
edit "Microsoft-Azure.Data.Factory"
set internet-service-id 327961
next
edit "Microsoft-Azure.Virtual.Desktop"
set internet-service-id 327962
next
edit "Microsoft-Azure.Power.BI"
set internet-service-id 327963
next
edit "Microsoft-Azure.Connectors"
set internet-service-id 327980
next
edit "Amazon-Twitch"
set internet-service-id 393446
next
edit "Amazon-AWS.GovCloud.US"
set internet-service-id 393452
next
edit "Amazon-AWS.EBS"
set internet-service-id 393470
next
edit "Amazon-AWS.Cloud9"
set internet-service-id 393471
next
edit "Amazon-AWS.DynamoDB"
set internet-service-id 393472
next
edit "Amazon-AWS.Route53"
set internet-service-id 393473
next
edit "Amazon-AWS.S3"
set internet-service-id 393474
next
edit "Amazon-AWS.Kinesis.Video.Streams"
set internet-service-id 393475
next
edit "Amazon-AWS.Global.Accelerator"
set internet-service-id 393476
next
edit "Amazon-AWS.EC2"
set internet-service-id 393477
next
edit "Amazon-AWS.API.Gateway"
set internet-service-id 393478
next
edit "Amazon-AWS.Chime.Voice.Connector"
set internet-service-id 393479
next
edit "Amazon-AWS.Connect"
set internet-service-id 393480
next
edit "Amazon-AWS.CloudFront"
set internet-service-id 393481
next
edit "Amazon-AWS.CodeBuild"
set internet-service-id 393482
next
edit "Amazon-AWS.Chime.Meetings"
set internet-service-id 393483
next
edit "Amazon-AWS.AppFlow"
set internet-service-id 393484
next
edit "Amazon-Amazon.SES"
set internet-service-id 393493
next
edit "Adobe-Adobe.Sign"
set internet-service-id 917776
next
edit "Fortinet-FortiVoice.Cloud"
set internet-service-id 1245432
next
edit "Fortinet-FortiGuard.Secure.DNS"
set internet-service-id 1245454
next
edit "Fortinet-FortiEDR"
set internet-service-id 1245475
next
edit "Fortinet-FortiClient.EMS"
set internet-service-id 1245477
next
edit "Fortinet-FortiWeb.Cloud"
set internet-service-id 1245480
next
edit "Fortinet-FortiSASE"
set internet-service-id 1245481
next
edit "Zoho-Site24x7.Monitor"
set internet-service-id 1704153
next
edit "Cisco-Webex.FedRAMP"
set internet-service-id 1966315
next
edit "Cisco-Secure.Endpoint"
set internet-service-id 1966324
next
edit "Atlassian-Atlassian.Cloud"
set internet-service-id 3932388
next
edit "Atlassian-Atlassian.Notification"
set internet-service-id 3932436
next
edit "Akamai-Linode.Cloud"
set internet-service-id 7930148
next
edit "SolarWinds-SolarWinds.RMM"
set internet-service-id 10289379
next
edit "DNS-Root.Name.Servers"
set internet-service-id 10748156
next
edit "Malicious-Malicious.Server"
set internet-service-id 11337935
next
edit "NIST-ITS"
set internet-service-id 11403472
next
edit "Jamf-Jamf.Cloud"
set internet-service-id 11469009
next
edit "Alcatel.Lucent-Rainbow"
set internet-service-id 11534546
next
edit "Forcepoint-Forcepoint.Cloud"
set internet-service-id 11600083
next
edit "Datadog-Datadog"
set internet-service-id 11665620
next
edit "Mimecast-Mimecast"
set internet-service-id 11731157
next
edit "MediaFire-Other"
set internet-service-id 11796480
next
edit "MediaFire-Web"
set internet-service-id 11796481
next
edit "MediaFire-ICMP"
set internet-service-id 11796482
next
edit "MediaFire-DNS"
set internet-service-id 11796483
next
edit "MediaFire-Outbound_Email"
set internet-service-id 11796484
next
edit "MediaFire-SSH"
set internet-service-id 11796486
next
edit "MediaFire-FTP"
set internet-service-id 11796487
next
edit "MediaFire-NTP"
set internet-service-id 11796488
next
edit "MediaFire-Inbound_Email"
set internet-service-id 11796489
next
edit "MediaFire-LDAP"
set internet-service-id 11796494
next
edit "MediaFire-NetBIOS.Session.Service"
set internet-service-id 11796495
next
edit "MediaFire-RTMP"
set internet-service-id 11796496
next
edit "MediaFire-NetBIOS.Name.Service"
set internet-service-id 11796504
next
edit "Pandora-Pandora"
set internet-service-id 11862230
next
edit "SiriusXM-SiriusXM"
set internet-service-id 11927767
next
edit "Hopin-Hopin"
set internet-service-id 11993304
next
edit "RedShield-RedShield.Cloud"
set internet-service-id 12058842
next
edit "InterneTTL-Scanner"
set internet-service-id 12124326
next
edit "VadeSecure-VadeSecure.Cloud"
set internet-service-id 12189915
next
edit "Netskope-Netskope.Cloud"
set internet-service-id 12255452
next
edit "ClickMeeting-ClickMeeting"
set internet-service-id 12320989
next
edit "Tenable-Tenable.io.Cloud.Scanner"
set internet-service-id 12386528
next
edit "Vidyo-VidyoCloud"
set internet-service-id 12452065
next
edit "OpenNIC-OpenNIC.DNS"
set internet-service-id 12517602
next
edit "Sectigo-Sectigo"
set internet-service-id 12583141
next
edit "DigitalOcean-DigitalOcean.Platform"
set internet-service-id 12648679
next
edit "Pitney.Bowes-Pitney.Bowes.Data.Center"
set internet-service-id 12714216
next
edit "VPN-Anonymous.VPN"
set internet-service-id 12779753
next
edit "Blockchain-Crypto.Mining.Pool"
set internet-service-id 12845290
next
edit "FactSet-FactSet"
set internet-service-id 12910830
next
edit "Bloomberg-Bloomberg"
set internet-service-id 12976367
next
edit "Five9-Five9"
set internet-service-id 13041904
next
edit "Gigas-Gigas.Cloud"
set internet-service-id 13107441
next
edit "Imperva-Imperva.Cloud.WAF"
set internet-service-id 13172978
next
edit "INAP-INAP"
set internet-service-id 13238515
next
edit "Azion-Azion.Platform"
set internet-service-id 13304053
next
edit "Hurricane.Electric-Hurricane.Electric.Internet.Services"
set internet-service-id 13369590
next
edit "NodePing-NodePing.Probe"
set internet-service-id 13435127
next
edit "Frontline-Frontline"
set internet-service-id 13500665
next
edit "Tally-Tally.ERP"
set internet-service-id 13566202
next
edit "Hosting-Bulletproof.Hosting"
set internet-service-id 13631739
next
edit "Okko-Okko.TV"
set internet-service-id 13697277
next
edit "Voximplant-Voximplant.Platform"
set internet-service-id 13762829
next
edit "OVHcloud-OVHcloud"
set internet-service-id 13828367
next
edit "SentinelOne-SentinelOne.Cloud"
set internet-service-id 13893905
next
edit "Kakao-Kakao.Services"
set internet-service-id 13959442
next
edit "Stripe-Stripe"
set internet-service-id 14024979
next
edit "NetScout-Scanner"
set internet-service-id 14090406
next
edit "Recyber-Scanner"
set internet-service-id 14155942
next
edit "Cyber.Casa-Scanner"
set internet-service-id 14221478
next
edit "GTHost-Dedicated.Instant.Servers"
set internet-service-id 14287132
next
edit "ivi-ivi.Streaming"
set internet-service-id 14352669
next
edit "BinaryEdge-Scanner"
set internet-service-id 14418086
next
edit "Fintech-MarketMap.Terminal"
set internet-service-id 14483742
next
edit "xMatters-xMatters.Platform"
set internet-service-id 14549279
next
edit "Blizzard-Battle.Net"
set internet-service-id 14614816
next
edit "Axon-Evidence"
set internet-service-id 14680353
next
edit "CDN77-CDN"
set internet-service-id 14745737
next
edit "GCore.Labs-CDN"
set internet-service-id 14811273
next
edit "Matrix42-FastViewer"
set internet-service-id 14876962
next
edit "Bunny.net-CDN"
set internet-service-id 14942345
next
edit "StackPath-CDN"
set internet-service-id 15007881
next
edit "Edgio-CDN"
set internet-service-id 15073417
next
edit "CacheFly-CDN"
set internet-service-id 15138953
next
edit "Paylocity-Paylocity"
set internet-service-id 15204646
next
edit "Qualys-Qualys.Cloud.Platform"
set internet-service-id 15270183
next
edit "Dailymotion-Other"
set internet-service-id 15335424
next
edit "Dailymotion-Web"
set internet-service-id 15335425
next
edit "Dailymotion-ICMP"
set internet-service-id 15335426
next
edit "Dailymotion-DNS"
set internet-service-id 15335427
next
edit "Dailymotion-Outbound_Email"
set internet-service-id 15335428
next
edit "Dailymotion-SSH"
set internet-service-id 15335430
next
edit "Dailymotion-FTP"
set internet-service-id 15335431
next
edit "Dailymotion-NTP"
set internet-service-id 15335432
next
edit "Dailymotion-Inbound_Email"
set internet-service-id 15335433
next
edit "Dailymotion-LDAP"
set internet-service-id 15335438
next
edit "Dailymotion-NetBIOS.Session.Service"
set internet-service-id 15335439
next
edit "Dailymotion-RTMP"
set internet-service-id 15335440
next
edit "Dailymotion-NetBIOS.Name.Service"
set internet-service-id 15335448
next
edit "LaunchDarkly-LaunchDarkly.Platform"
set internet-service-id 15401258
next
edit "Medianova-CDN"
set internet-service-id 15466633
next
edit "NetDocuments-NetDocuments.Platform"
set internet-service-id 15532331
next
edit "Vonage-Vonage.Contact.Center"
set internet-service-id 15597869
next
edit "DNS-ARPA.Name.Servers"
set internet-service-id 10748206
next
edit "Veritas-Enterprise.Vault.Cloud"
set internet-service-id 15663407
next
edit "UK.NCSC-Scanner"
set internet-service-id 15728806
next
edit "Vonage-Vonage.Video.API"
set internet-service-id 15597872
next
edit "Restream-Restream.Platform"
set internet-service-id 15794481
next
edit "NewRelic-Synthetic.Monitor"
set internet-service-id 4849970
next
edit "ArcticWolf-ArcticWolf.Cloud"
set internet-service-id 15860019
next
edit "CounterPath-Bria"
set internet-service-id 15925556
next
edit "CriminalIP-Scanner"
set internet-service-id 15990950
next
edit "IPFS-IPFS.Gateway"
set internet-service-id 16056629
next
edit "Internet.Census.Group-Scanner"
set internet-service-id 16122022
next
edit "SAP-SAP.Ariba"
set internet-service-id 6291766
next
edit "Microsoft-Teams.Published.Worldwide.Optimize"
set internet-service-id 327991
next
edit "Microsoft-Teams.Published.Worldwide.Allow"
set internet-service-id 327992
next
edit "Microsoft-Azure.Front.Door"
set internet-service-id 327993
next
edit "Performive-Performive.Cloud"
set internet-service-id 16187706
next
edit "Tencent-VooV.Meeting"
set internet-service-id 2556219
next
edit "OneLogin-OneLogin"
set internet-service-id 16253244
next
edit "Shadowserver-Scanner"
set internet-service-id 16318630
next
edit "Turkcell-Suit.Conference"
set internet-service-id 16384317
next
edit "LeakIX-Scanner"
set internet-service-id 16449702
next
edit "Infoblox-BloxOne"
set internet-service-id 16515390
next
edit "Nice-CXone"
set internet-service-id 16580927
next
edit "Hetzner-Hetzner.Hosting.Service"
set internet-service-id 16646464
next
edit "ThreatLocker-ThreatLocker"
set internet-service-id 16712001
next
edit "ZPE-ZPE.Cloud"
set internet-service-id 16777538
next
edit "Datto-Datto.BCDR"
set internet-service-id 10486083
next
edit "ColoCrossing-ColoCrossing.Hosting.Service"
set internet-service-id 16843076
next
edit "Sinch-Mailgun"
set internet-service-id 16908613
next
edit "SpaceX-Starlink"
set internet-service-id 16974150
next
edit "Microsoft-Azure.Service.Bus"
set internet-service-id 328007
next
edit "Ingenuity-Ingenuity.Cloud.Service"
set internet-service-id 17039688
next
edit "Microsoft-Azure.Microsoft.Defender"
set internet-service-id 328009
next
end
config firewall internet-service-definition
end
config wanopt content-delivery-network-rule
edit "vcache://"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.m3u8"
next
end
config content-id
set target hls-manifest
set start-str "/"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mpd"
next
end
config content-id
set target dash-manifest
set start-str "/"
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set target hls-fragment
set start-str "/"
end
next
edit "rule4"
config match-entries
edit 1
set pattern "/*.*"
next
end
config content-id
set target dash-fragment
set start-str "/"
end
next
end
next
edit "vcache://youtube/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "youtube.com"
set category youtube
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
set end-str "&"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
end
next
edit "rule3"
set match-mode any
config match-entries
edit 1
set pattern "/stream_204"
next
edit 2
set pattern "/ptracking"
next
edit 3
set pattern "/get_video_info"
next
end
config content-id
set target youtube-map
set start-str "/"
end
next
end
next
edit "vcache://googlevideo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "googlevideo.com"
set category youtube
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
set end-str "&"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
end
next
edit "rule3"
set match-mode any
config match-entries
edit 1
set pattern "/stream_204"
next
edit 2
set pattern "/ptracking"
next
edit 3
set pattern "/get_video_info"
next
end
config content-id
set target youtube-map
set start-str "/"
end
next
end
next
edit "vcache://metacafe/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "mccont.com" "akvideos.metacafe.com" "cdn.metacafe.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://facebook/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "fbcdn.net" "facebook.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://dailymotion/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "dailymotion.com" "dmcdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/video/*.mp4"
next
edit 2
set pattern "/video/*.flv"
next
edit 3
set pattern "/video/*.ts"
next
edit 4
set pattern "/video/*.on2"
next
edit 5
set pattern "/video/*.aac"
next
edit 6
set pattern "/video/*.h264"
next
edit 7
set pattern "/video/*.h263"
next
edit 8
set pattern "/sec*.mp4"
next
edit 9
set pattern "/sec*.flv"
next
edit 10
set pattern "/sec*.on2"
next
edit 11
set pattern "/sec*.aac"
next
edit 12
set pattern "/sec*.h264"
next
edit 13
set pattern "/sec*.h263"
next
edit 14
set pattern "*.ts"
next
end
config skip-entries
edit 1
set target parameter
set pattern "start=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://break/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "break.com" "0ebe.edgecastcdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/dnet/media/*.flv"
next
edit 2
set pattern "/dnet/media/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "ec_seek=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://msn/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "video.msn.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://llnwd/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "llnwd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.fll"
next
end
config skip-entries
edit 1
set target parameter
set pattern "fs=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://yahoo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "yimg.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.m4s"
next
end
config content-id
set target parameter
set start-str "vid="
end
next
end
next
edit "vcache://myspace/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "myspacecdn.com"
set request-cache-control enable
set response-cache-control enable
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://vimeo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "vimeo.com" "vimeocdn.com" "56skyfiregce-a.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.m4s"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://blip.tv/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "blip.tv"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.m4v"
next
edit 2
set pattern "/*.flv"
next
edit 3
set pattern "/*.mp4"
next
edit 4
set pattern "/*.wmv"
next
edit 5
set pattern "/*.rm"
next
edit 6
set pattern "/*.ram"
next
edit 7
set pattern "/*.mov"
next
edit 8
set pattern "/*.avi"
next
end
config skip-entries
edit 1
set target parameter
set pattern "ms=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://maker.tv/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "videos-f.jwpsrv.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://aol/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "stream.aol.com" "5min.com" "vidiblevod-vh.akamaihd.net" "stg-ec-ore-u.uplynk.com" "vidible.tv"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*timeoffset=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://clipfish/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "clipfish.de" "universal-music.de"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.f4v"
next
edit 3
set pattern "/*.mp4"
next
edit 4
set pattern "/*.m4v"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://cnn/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "cnn-vh.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.flv*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.ts*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://foxnews/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "foxnews.com" "foxnews-f.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set target parameter
set pattern "*Seg*"
next
edit 3
set target parameter
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://discovery/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "discovery.com" "discidevflash-f.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://liveleak/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "edge.liveleak.com" "cdn.liveleak.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.wmv"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://sevenload/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "sevenload.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "aktimeoffset=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://stupidvideos/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "stupidvideos.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://howcast/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "media.howcast.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "start=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://vevo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "vevo.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://ooyala/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "ooyala.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "*Seg*"
next
edit 2
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://ms-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "msads.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://yumenetworks-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "yumenetworks.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://2mdn-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "2mdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://eyewonder-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "eyewonder.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://eyereturn-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "eyereturn.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://serving-sys-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "serving-sys.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://amazonaws-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "amazonaws.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://edgesuite-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "edgesuite.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://gorillanation-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "video.gorillanation.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://youku/"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/youku/*.mp4"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/youku/*.flv"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/youku/*.kux"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule4"
config match-entries
edit 1
set pattern "/youku/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule5"
config match-entries
edit 1
set pattern "/youku/*.flv"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule6"
config match-entries
edit 1
set pattern "/youku/*.kux"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
end
next
edit "vcache://tudou/"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/f4v/*"
next
edit 2
set target parameter
set pattern "*id=tudou*"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*begin=*"
next
end
config content-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
end
next
edit "vcache://cbc/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "cbc.ca" "mobilehls-vh.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
set match-mode any
config match-entries
edit 1
set pattern "*.ts"
next
edit 2
set pattern "*.mp4"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://megaupload/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "megaupload.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/files/*"
next
end
config content-id
set target referrer
set start-str "d="
set start-skip 2
end
next
end
next
edit "update://windowsupdate/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "download.windowsupdate.com"
set request-cache-control enable
set response-cache-control enable
set response-expires enable
set updateserver enable
next
end
config log syslogd setting
set status enable
set server "hb.tahoho.com.tw"
end
config log fortiguard setting
set status enable
end
config log tap-device
edit "default-tap-gui"
set status enable
set port 12121
set format json
config filter
set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set ztna-traffic disable
set anomaly disable
set voip disable
config free-style
edit 1
set category event
set filter "subtype router or VPN"
set filter-type exclude
next
end
end
next
end
config system standalone-cluster
config cluster-peer
end
end
config system fortiguard
set service-account-id "godelchen@tahoho.com.tw"
end
config endpoint-control fctems
edit 1
next
edit 2
next
edit 3
next
edit 4
next
edit 5
next
edit 6
next
edit 7
next
end
config system email-server
set server "notification.fortinet.net"
set port 465
set security smtps
end
config system session-helper
edit 1
set name pptp
set protocol 6
set port 1723
next
edit 2
set name h323
set protocol 6
set port 1720
next
edit 3
set name ras
set protocol 17
set port 1719
next
edit 4
set name tns
set protocol 6
set port 1521
next
edit 5
set name tftp
set protocol 17
set port 69
next
edit 6
set name rtsp
set protocol 6
set port 554
next
edit 7
set name rtsp
set protocol 6
set port 7070
next
edit 8
set name rtsp
set protocol 6
set port 8554
next
edit 9
set name ftp
set protocol 6
set port 21
next
edit 10
set name mms
set protocol 6
set port 1863
next
edit 11
set name pmap
set protocol 6
set port 111
next
edit 12
set name pmap
set protocol 17
set port 111
next
edit 13
set name sip
set protocol 17
set port 5060
next
edit 14
set name dns-udp
set protocol 17
set port 53
next
edit 15
set name rsh
set protocol 6
set port 514
next
edit 16
set name rsh
set protocol 6
set port 512
next
edit 17
set name dcerpc
set protocol 6
set port 135
next
edit 18
set name dcerpc
set protocol 17
set port 135
next
edit 19
set name mgcp
set protocol 17
set port 2427
next
edit 20
set name mgcp
set protocol 17
set port 2727
next
end
config system auto-install
set auto-install-config enable
set auto-install-image enable
end
config system ntp
set ntpsync enable
set server-mode enable
set interface "fortilink"
end
config system ftm-push
set server-cert "Fortinet_Factory"
end
config system automation-trigger
edit "Network Down"
set event-type event-log
set logid 20099
config fields
edit 1
set name "status"
set value "DOWN"
next
end
next
edit "HA Failover"
set event-type ha-failover
next
edit "Reboot"
set event-type reboot
next
edit "FortiAnalyzer Connection Down"
set event-type event-log
set logid 22902
next
edit "License Expired Notification"
set event-type license-near-expiry
set license-type any
next
edit "Compromised Host Quarantine"
next
edit "Incoming Webhook Call"
set event-type incoming-webhook
next
edit "Security Rating Notification"
set event-type security-rating-summary
next
edit "Local Cert Expired Notification"
set description "Default automation trigger configuration for when a local certificate is near expiration."
set event-type local-cert-near-expiry
next
end
config system automation-action
edit "Network Down_email"
set action-type email
set email-subject "Network Down"
next
edit "HA Failover_email"
set action-type email
set email-subject "HA Failover"
next
edit "Reboot_email"
set action-type email
set email-subject "Reboot"
next
edit "FortiAnalyzer Connection Down_ios-notification"
set action-type fortiexplorer-notification
next
edit "License Expired Notification_ios-notification"
set action-type fortiexplorer-notification
next
edit "Compromised Host Quarantine_quarantine"
set action-type quarantine
next
edit "Compromised Host Quarantine_quarantine-forticlient"
set action-type quarantine-forticlient
next
edit "Security Rating Notification_ios-notification"
set action-type fortiexplorer-notification
next
edit "Reboot FortiGate"
set description "Default automation action configuration for rebooting this FortiGate unit."
set action-type system-actions
set system-action reboot
set minimum-interval 300
next
edit "Shutdown FortiGate"
set description "Default automation action configuration for shuting down this FortiGate unit."
set action-type system-actions
set system-action shutdown
next
edit "Backup Config Disk"
set description "Default automation action configuration for backing up the configuration on disk."
set action-type system-actions
set system-action backup-config
next
end
config system automation-stitch
edit "Network Down"
set status disable
set trigger "Network Down"
config actions
edit 1
set action "Network Down_email"
next
end
next
edit "HA Failover"
set status disable
set trigger "HA Failover"
config actions
edit 1
set action "HA Failover_email"
next
end
next
edit "Reboot"
set status disable
set trigger "Reboot"
config actions
edit 1
set action "Reboot_email"
next
end
next
edit "FortiAnalyzer Connection Down"
set trigger "FortiAnalyzer Connection Down"
config actions
edit 1
set action "FortiAnalyzer Connection Down_ios-notification"
next
end
next
edit "License Expired Notification"
set trigger "License Expired Notification"
config actions
edit 1
set action "License Expired Notification_ios-notification"
next
end
next
edit "Compromised Host Quarantine"
set status disable
set trigger "Compromised Host Quarantine"
config actions
edit 1
set action "Compromised Host Quarantine_quarantine"
next
edit 2
set action "Compromised Host Quarantine_quarantine-forticlient"
next
end
next
edit "Incoming Webhook Quarantine"
set status disable
set trigger "Incoming Webhook Call"
config actions
edit 1
set action "Compromised Host Quarantine_quarantine"
next
edit 2
set action "Compromised Host Quarantine_quarantine-forticlient"
next
end
next
edit "Security Rating Notification"
set trigger "Security Rating Notification"
config actions
edit 1
set action "Security Rating Notification_ios-notification"
next
end
next
end
config system federated-upgrade
set status disabled
end
config system ike
set dh-multiprocess disable
end
config system object-tagging
edit "default"
next
end
config switch-controller traffic-policy
edit "quarantine"
set description "Rate control for quarantined traffic"
set guaranteed-bandwidth 163840
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 1
next
edit "sniffer"
set description "Rate control for sniffer mirrored traffic"
set guaranteed-bandwidth 50000
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 2
next
end
config system settings
end
config system dhcp server
edit 2
set ntp-service local
set default-gateway 169.254.1.1
set netmask 255.255.255.0
set interface "fortilink"
config ip-range
edit 1
set start-ip 169.254.1.2
set end-ip 169.254.1.254
next
end
set vci-match enable
set vci-string "FortiSwitch" "FortiExtender"
next
edit 3
set dns-service default
set default-gateway 10.50.30.254
set netmask 255.255.255.0
set interface "E2C-LAN"
config ip-range
edit 1
set start-ip 10.50.30.100
set end-ip 10.50.30.250
next
end
next
end
config firewall address
edit "none"
set uuid 8240a5de-5664-51ed-d25a-f098175101ab
set subnet 0.0.0.0 255.255.255.255
next
edit "login.microsoftonline.com"
set uuid 8240c42e-5664-51ed-03fa-862e98e8c9db
set type fqdn
set fqdn "login.microsoftonline.com"
next
edit "login.microsoft.com"
set uuid 8240dd6a-5664-51ed-a9f7-309978465635
set type fqdn
set fqdn "login.microsoft.com"
next
edit "login.windows.net"
set uuid 8240f516-5664-51ed-a2d5-491b638f91bf
set type fqdn
set fqdn "login.windows.net"
next
edit "gmail.com"
set uuid 82410d12-5664-51ed-d807-c5f637c8941a
set type fqdn
set fqdn "gmail.com"
next
edit "wildcard.google.com"
set uuid 824124a0-5664-51ed-5a8e-6fd2c029a6b4
set type fqdn
set fqdn "*.google.com"
next
edit "wildcard.dropbox.com"
set uuid 82413c42-5664-51ed-a65e-fb3aa4ded9b7
set type fqdn
set fqdn "*.dropbox.com"
next
edit "all"
set uuid 825230a6-5664-51ed-b381-30d2e11da446
next
edit "FIREWALL_AUTH_PORTAL_ADDRESS"
set uuid 82523baa-5664-51ed-e37a-1f5591f1dcfa
next
edit "FABRIC_DEVICE"
set uuid 8252450a-5664-51ed-7a5f-652c908c6728
set comment "IPv4 addresses of Fabric Devices."
next
edit "SSLVPN_TUNNEL_ADDR1"
set uuid 82557c16-5664-51ed-fab1-5a9c2550ebe9
set type iprange
set start-ip 10.212.134.200
set end-ip 10.212.134.210
next
edit "FCTEMS_ALL_FORTICLOUD_SERVERS"
set uuid 53cb2d90-566a-51ed-54a4-b78d0fe71a7a
set type dynamic
set sub-type ems-tag
next
edit "AWS"
set uuid 18b0be12-56b7-51ed-c865-b58ef885d54e
set type fqdn
set fqdn "aws.amazon.com"
next
edit "AWS1"
set uuid 462c0f36-56b7-51ed-a475-99d2cecc3a50
set type fqdn
set fqdn "amazon.com"
next
edit "AWS2"
set uuid 68bc100a-56b7-51ed-ebb3-33bbdf50f17a
set type fqdn
set fqdn "*.amazonaws.com"
next
edit "GCP"
set uuid 7bef117c-56b7-51ed-cb8a-0c5249dd9c91
set type fqdn
set fqdn "*.googleapis.com"
next
edit "Git"
set uuid 92805374-56b7-51ed-c4a6-f868a0b5ddd8
set type fqdn
set fqdn "raw.githubusercontent.com"
next
edit "Anydesk"
set uuid a62b7426-56b7-51ed-6ddf-d0574465c707
set type fqdn
set fqdn "*.net.anydesk.com"
next
edit "IT Component"
set uuid cd6548aa-56b7-51ed-c611-338f1777896d
set subnet 10.50.30.120 255.255.255.255
next
edit "GLPI-Server"
set uuid 5feb03ba-744d-51ed-f3ef-b707431e56f8
set type fqdn
set fqdn "glpi.tahoho.com.tw"
next
edit "E2C-LAN address"
set uuid 962a3348-8d6a-51ed-911c-681f84854732
set type interface-subnet
set subnet 10.50.30.254 255.255.255.0
set interface "E2C-LAN"
next
edit "EMS_ALL_UNMANAGEABLE_CLIENTS"
set uuid d0fd238c-a457-51ed-6e89-264343b90ecb
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "EMS_ALL_UNKNOWN_CLIENTS"
set uuid d2f491e8-a457-51ed-f9e8-e8b6c987fb87
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "Bali-Waste-Control"
set uuid 7de4d68c-9983-51ee-305e-fe4c0d2b5cb1
set subnet 10.50.30.130 255.255.255.255
next
edit "Utrust Domain"
set uuid db0c0356-a08d-51ee-bfa3-60ff9aff817a
set type fqdn
set fqdn "nwimc-etl.utrust.com.tw"
next
edit "Cloud Scada"
set uuid 37d2aa86-aa16-51ee-ac05-0b82f11913aa
set type fqdn
set fqdn "scadabroker.myvecid.net"
next
edit "Cloud Scada2"
set uuid 5d8fd0ce-b0f5-51ee-53e1-d37a5d7838b8
set type fqdn
set fqdn "cloudscada.myvecid.net"
next
edit "gmail smtp"
set uuid 165e858c-b0f6-51ee-9127-1376757926cb
set type fqdn
set fqdn "smtp.gmail.com"
next
edit "time.google.com"
set uuid 94a24140-b0f6-51ee-453a-25378a74819d
set type fqdn
set fqdn "time.google.com"
next
edit "time.windows.com"
set uuid a7709c68-b0f6-51ee-5746-808c965b72fd
set type fqdn
set fqdn "time.windows.com"
next
edit "tw.ntp.org.cn"
set uuid b475834c-b0f6-51ee-666a-c317064080f8
set type fqdn
set fqdn "tw.ntp.org.cn"
next
end
config firewall multicast-address
edit "all"
set start-ip 224.0.0.0
set end-ip 239.255.255.255
next
edit "all_hosts"
set start-ip 224.0.0.1
set end-ip 224.0.0.1
next
edit "all_routers"
set start-ip 224.0.0.2
set end-ip 224.0.0.2
next
edit "Bonjour"
set start-ip 224.0.0.251
set end-ip 224.0.0.251
next
edit "EIGRP"
set start-ip 224.0.0.10
set end-ip 224.0.0.10
next
edit "OSPF"
set start-ip 224.0.0.5
set end-ip 224.0.0.6
next
end
config firewall address6
edit "SSLVPN_TUNNEL_IPv6_ADDR1"
set uuid 82558de6-5664-51ed-159c-163f1dd9a2e1
set ip6 fdff:ffff::/120
next
edit "all"
set uuid 8241ce82-5664-51ed-277c-4e525cd96653
next
edit "none"
set uuid 8241e368-5664-51ed-aae0-eeeeb7b162a1
set ip6 ::/128
next
end
config firewall multicast-address6
edit "all"
set ip6 ff00::/8
next
end
config firewall addrgrp
edit "G Suite"
set uuid 824158b2-5664-51ed-b36f-837f52bb8606
set member "gmail.com" "wildcard.google.com"
next
edit "Microsoft Office 365"
set uuid 82418b70-5664-51ed-055b-fbb526ce8cab
set member "login.microsoftonline.com" "login.microsoft.com" "login.windows.net"
next
end
config firewall wildcard-fqdn custom
edit "cdn-apple"
set uuid cb7396b6-566a-51ed-d90f-885f07a3beaa
set wildcard-fqdn "*.cdn-apple.com"
next
edit "mzstatic-apple"
set uuid cb739bca-566a-51ed-7248-3e92d9308f99
set wildcard-fqdn "*.mzstatic.com"
next
edit "adobe"
set uuid 841b22c6-5664-51ed-25c6-bedf34fe7156
set wildcard-fqdn "*.adobe.com"
next
edit "Adobe Login"
set uuid 841b2a1e-5664-51ed-2bbe-0936f9ceab1b
set wildcard-fqdn "*.adobelogin.com"
next
edit "android"
set uuid 841b3112-5664-51ed-7f47-8469af0bc1dd
set wildcard-fqdn "*.android.com"
next
edit "apple"
set uuid 841b3810-5664-51ed-2c5e-8af2c4a7bdc6
set wildcard-fqdn "*.apple.com"
next
edit "appstore"
set uuid 841b3f04-5664-51ed-fef6-7ff2b44af801
set wildcard-fqdn "*.appstore.com"
next
edit "auth.gfx.ms"
set uuid 841b460c-5664-51ed-095a-de556ccd0d2f
set wildcard-fqdn "*.auth.gfx.ms"
next
edit "citrix"
set uuid 841b4d0a-5664-51ed-925e-1e65ef8ac176
set wildcard-fqdn "*.citrixonline.com"
next
edit "dropbox.com"
set uuid 841b5412-5664-51ed-f594-3a3a675b8a35
set wildcard-fqdn "*.dropbox.com"
next
edit "eease"
set uuid 841b5b1a-5664-51ed-d44b-ec4d034e7187
set wildcard-fqdn "*.eease.com"
next
edit "firefox update server"
set uuid 841b622c-5664-51ed-64b5-4007a94d0cf1
set wildcard-fqdn "aus*.mozilla.org"
next
edit "fortinet"
set uuid 841b6948-5664-51ed-f144-90baee382b80
set wildcard-fqdn "*.fortinet.com"
next
edit "googleapis.com"
set uuid 841b705a-5664-51ed-431d-a78385539aa6
set wildcard-fqdn "*.googleapis.com"
next
edit "google-drive"
set uuid 841b7776-5664-51ed-40be-1967fa2098cf
set wildcard-fqdn "*drive.google.com"
next
edit "google-play2"
set uuid 841b7e9c-5664-51ed-a9b8-d77c31d3f4d4
set wildcard-fqdn "*.ggpht.com"
next
edit "google-play3"
set uuid 841b85c2-5664-51ed-3798-a4b1b117675e
set wildcard-fqdn "*.books.google.com"
next
edit "Gotomeeting"
set uuid 841b8ce8-5664-51ed-ac1f-3621b20a457c
set wildcard-fqdn "*.gotomeeting.com"
next
edit "icloud"
set uuid 841b97d8-5664-51ed-0ddb-4ebf4534b4ed
set wildcard-fqdn "*.icloud.com"
next
edit "itunes"
set uuid 841b9f62-5664-51ed-97ac-580ebf618781
set wildcard-fqdn "*itunes.apple.com"
next
edit "microsoft"
set uuid 841ba692-5664-51ed-b9dd-b02600610d62
set wildcard-fqdn "*.microsoft.com"
next
edit "skype"
set uuid 841badc2-5664-51ed-707a-ba2ac4ca80c0
set wildcard-fqdn "*.messenger.live.com"
next
edit "softwareupdate.vmware.com"
set uuid 841bb4e8-5664-51ed-fae3-cd42a4949cd6
set wildcard-fqdn "*.softwareupdate.vmware.com"
next
edit "verisign"
set uuid 841bbc18-5664-51ed-e53b-732bf77ab156
set wildcard-fqdn "*.verisign.com"
next
edit "Windows update 2"
set uuid 841bc348-5664-51ed-6d58-166b56043cd8
set wildcard-fqdn "*.windowsupdate.com"
next
edit "live.com"
set uuid 841bcabe-5664-51ed-9fac-f599f268a5ba
set wildcard-fqdn "*.live.com"
next
edit "google-play"
set uuid 841bd1ee-5664-51ed-44f3-1948a87b9ab8
set wildcard-fqdn "*play.google.com"
next
edit "update.microsoft.com"
set uuid 841bd928-5664-51ed-069d-b5b7de0146c7
set wildcard-fqdn "*update.microsoft.com"
next
edit "swscan.apple.com"
set uuid 841be0c6-5664-51ed-e2fd-5cb990bc222e
set wildcard-fqdn "*swscan.apple.com"
next
edit "autoupdate.opera.com"
set uuid 841be878-5664-51ed-cdae-3fb25d692820
set wildcard-fqdn "*autoupdate.opera.com"
next
end
config firewall service category
edit "General"
set comment "General services."
next
edit "Web Access"
set comment "Web access."
next
edit "File Access"
set comment "File access."
next
edit "Email"
set comment "Email services."
next
edit "Network Services"
set comment "Network services."
next
edit "Authentication"
set comment "Authentication service."
next
edit "Remote Access"
set comment "Remote access."
next
edit "Tunneling"
set comment "Tunneling service."
next
edit "VoIP, Messaging & Other Applications"
set comment "VoIP, messaging, and other applications."
next
edit "Web Proxy"
set comment "Explicit web proxy."
next
end
config firewall service custom
edit "DNS"
set category "Network Services"
set tcp-portrange 53
set udp-portrange 53
next
edit "HTTP"
set category "Web Access"
set tcp-portrange 80
next
edit "HTTPS"
set category "Web Access"
set tcp-portrange 443
next
edit "IMAP"
set category "Email"
set tcp-portrange 143
next
edit "IMAPS"
set category "Email"
set tcp-portrange 993
next
edit "LDAP"
set category "Authentication"
set tcp-portrange 389
next
edit "DCE-RPC"
set category "Remote Access"
set tcp-portrange 135
set udp-portrange 135
next
edit "POP3"
set category "Email"
set tcp-portrange 110
next
edit "POP3S"
set category "Email"
set tcp-portrange 995
next
edit "SAMBA"
set category "File Access"
set tcp-portrange 139
next
edit "SMTP"
set category "Email"
set tcp-portrange 25
next
edit "SMTPS"
set category "Email"
set tcp-portrange 465
next
edit "KERBEROS"
set category "Authentication"
set tcp-portrange 88 464
set udp-portrange 88 464
next
edit "LDAP_UDP"
set category "Authentication"
set udp-portrange 389
next
edit "SMB"
set category "File Access"
set tcp-portrange 445
next
edit "FTP"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_GET"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_PUT"
set category "File Access"
set tcp-portrange 21
next
edit "ALL"
set category "General"
set protocol IP
next
edit "ALL_TCP"
set category "General"
set tcp-portrange 1-65535
next
edit "ALL_UDP"
set category "General"
set udp-portrange 1-65535
next
edit "ALL_ICMP"
set category "General"
set protocol ICMP
unset icmptype
next
edit "ALL_ICMP6"
set category "General"
set protocol ICMP6
unset icmptype
next
edit "GRE"
set category "Tunneling"
set protocol IP
set protocol-number 47
next
edit "AH"
set category "Tunneling"
set protocol IP
set protocol-number 51
next
edit "ESP"
set category "Tunneling"
set protocol IP
set protocol-number 50
next
edit "AOL"
set tcp-portrange 5190-5194
next
edit "BGP"
set category "Network Services"
set tcp-portrange 179
next
edit "DHCP"
set category "Network Services"
set udp-portrange 67-68
next
edit "FINGER"
set tcp-portrange 79
next
edit "GOPHER"
set tcp-portrange 70
next
edit "H323"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1720 1503
set udp-portrange 1719
next
edit "IKE"
set category "Tunneling"
set udp-portrange 500 4500
next
edit "Internet-Locator-Service"
set tcp-portrange 389
next
edit "IRC"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 6660-6669
next
edit "L2TP"
set category "Tunneling"
set tcp-portrange 1701
set udp-portrange 1701
next
edit "NetMeeting"
set tcp-portrange 1720
next
edit "NFS"
set category "File Access"
set tcp-portrange 111 2049
set udp-portrange 111 2049
next
edit "NNTP"
set tcp-portrange 119
next
edit "NTP"
set category "Network Services"
set tcp-portrange 123
set udp-portrange 123
next
edit "OSPF"
set category "Network Services"
set protocol IP
set protocol-number 89
next
edit "PC-Anywhere"
set category "Remote Access"
set tcp-portrange 5631
set udp-portrange 5632
next
edit "PING"
set category "Network Services"
set protocol ICMP
set icmptype 8
unset icmpcode
next
edit "TIMESTAMP"
set protocol ICMP
set icmptype 13
unset icmpcode
next
edit "INFO_REQUEST"
set protocol ICMP
set icmptype 15
unset icmpcode
next
edit "INFO_ADDRESS"
set protocol ICMP
set icmptype 17
unset icmpcode
next
edit "ONC-RPC"
set category "Remote Access"
set tcp-portrange 111
set udp-portrange 111
next
edit "PPTP"
set category "Tunneling"
set tcp-portrange 1723
next
edit "QUAKE"
set udp-portrange 26000 27000 27910 27960
next
edit "RAUDIO"
set udp-portrange 7070
next
edit "REXEC"
set tcp-portrange 512
next
edit "RIP"
set category "Network Services"
set udp-portrange 520
next
edit "RLOGIN"
set tcp-portrange 513:512-1023
next
edit "RSH"
set tcp-portrange 514:512-1023
next
edit "SCCP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 2000
next
edit "SIP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 5060
set udp-portrange 5060
next
edit "SIP-MSNmessenger"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1863
next
edit "SNMP"
set category "Network Services"
set tcp-portrange 161-162
set udp-portrange 161-162
next
edit "SSH"
set category "Remote Access"
set tcp-portrange 22
next
edit "SYSLOG"
set category "Network Services"
set udp-portrange 514
next
edit "TALK"
set udp-portrange 517-518
next
edit "TELNET"
set category "Remote Access"
set tcp-portrange 23
next
edit "TFTP"
set category "File Access"
set udp-portrange 69
next
edit "MGCP"
set udp-portrange 2427 2727
next
edit "UUCP"
set tcp-portrange 540
next
edit "VDOLIVE"
set tcp-portrange 7000-7010
next
edit "WAIS"
set tcp-portrange 210
next
edit "WINFRAME"
set tcp-portrange 1494 2598
next
edit "X-WINDOWS"
set category "Remote Access"
set tcp-portrange 6000-6063
next
edit "PING6"
set protocol ICMP6
set icmptype 128
unset icmpcode
next
edit "MS-SQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1433 1434
next
edit "MYSQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 3306
next
edit "RDP"
set category "Remote Access"
set tcp-portrange 3389
next
edit "VNC"
set category "Remote Access"
set tcp-portrange 5900
next
edit "DHCP6"
set category "Network Services"
set udp-portrange 546 547
next
edit "SQUID"
set category "Tunneling"
set tcp-portrange 3128
next
edit "SOCKS"
set category "Tunneling"
set tcp-portrange 1080
set udp-portrange 1080
next
edit "WINS"
set category "Remote Access"
set tcp-portrange 1512
set udp-portrange 1512
next
edit "RADIUS"
set category "Authentication"
set udp-portrange 1812 1813
next
edit "RADIUS-OLD"
set udp-portrange 1645 1646
next
edit "CVSPSERVER"
set tcp-portrange 2401
set udp-portrange 2401
next
edit "AFS3"
set category "File Access"
set tcp-portrange 7000-7009
set udp-portrange 7000-7009
next
edit "TRACEROUTE"
set category "Network Services"
set udp-portrange 33434-33535
next
edit "RTSP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 554 7070 8554
set udp-portrange 554
next
edit "MMS"
set tcp-portrange 1755
set udp-portrange 1024-5000
next
edit "NONE"
set tcp-portrange 0
next
edit "webproxy"
set proxy enable
set category "Web Proxy"
set protocol ALL
set tcp-portrange 0-65535:0-65535
next
edit "OPCUA"
set tcp-portrange 49320
next
edit "MQTT"
set tcp-portrange 8883 443
next
end
config firewall service group
edit "Email Access"
set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS"
next
edit "Web Access"
set member "DNS" "HTTP" "HTTPS"
next
edit "Windows AD"
set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB"
next
edit "Exchange Server"
set member "DCE-RPC" "DNS" "HTTPS"
next
end
config vpn certificate ca
end
config vpn certificate local
edit "Fortinet_CA_SSL"
set password ENC pHsV5Rjih+34rPldDEWk/hLNOFLb0QGQG8hLy0f3caX558JDqIuN6j5wiltwfL0S2X4EQUSrWwg63k6yeuYJxEOXWcyHdHSXQEZJehFIUzZyx+qlAqwfjOX6L9caN3dUZIpxfm4tvZRyqNzgLqgFgJwWDtSXevhtolZQS/hGWe7lHLZWOa9azdwIXbBTqMXXyltOdw==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_CA_Untrusted"
set password ENC 4hKWVLwsOXfnZ9j6sAh8Dgnf4Ap486OwZPnq60IIQw8Innn+DV3BQtyBB3xI4iS2BlDwo2Mz0zLrhT591CtxlAPsrDo4oyMi7VyczZef1WrENkqmz8Ct+o20ZD2IlCeKBywLwiOFzpJVYGVNA1B3aJNBfDdSQKN9lLVzqoLLCDsjKaK6GCjOx/HoqRrIYk2DZKBEaA==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL"
set password ENC dxB2fAn1yQOms0QXEVfpsvgV5uRlYt/XvflQT0BoANPvsuCnIpT0VJw/5oMI45yx0ytyU/THdo4kMN16iOqTTX6KWHdKk7rAGcKjYl5434+CsIo8hwYQh448HN82Dewcc+hDfRddMWnRVUIca65kbzXloVFrvFfYG6khwviuWe/V9DEUgde5mx7rsA+GkBUi6hcqbg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_GUI_Server"
set password ENC xukOjNFV1NBh6Ybu2TFvByxh9Y9VCv+gWWsJEyhKoC13O/kJvM9kpCLN17N/iHRrAzW+rYqFXDZ+R/dZsexmEug0QDd/OJHtxA+yAAc3dqyjAaDwQbtNv5eZwRc6u+ZV5h0uf8rqn7I/irgvYkTJ9qXbBTfGQEOVU7Zxp2uF0U7AvTIv+rMnB8O0nyVaBa0+QYcYnQ==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIIF2zCCBMOgAwIBAgIIBkkOkgWWwQ4wDQYJKoZIhvcNAQELBQAwgakxCzAJBgNV
BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx
ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp
dHkxGTAXBgNVBAMMEEZHVDYxRlRLMjIwMDE0MTkxIzAhBgkqhkiG9w0BCQEWFHN1
cHBvcnRAZm9ydGluZXQuY29tMB4XDTIzMDEwNjAyNDY1MloXDTI1MDQxMDAyNDY1
MlowdjELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcM
CVN1bm55dmFsZTEWMBQGA1UECgwNRm9ydGluZXQgTHRkLjESMBAGA1UECwwJRm9y
dGlHYXRlMRIwEAYDVQQDDAlGb3J0aUdhdGUwggIiMA0GCSqGSIb3DQEBAQUAA4IC
DwAwggIKAoICAQCJo0ExkprWjQUZXUDbJHn9vyqkTXBqFUR117iW/TX8wDir8tUf
w1FDQpmboAp0+T5BGuEsDgvOR8O25ALXGB0gHo+6ya6eXjNuF9vzJ/9OKysDvhWe
oHeoloWOK1uXQPnxURm0w7krIPQMYXaFpGBS726+AQpiRngxTLGL8FSZFLVlRPGR
xqxiSvODJPx7wnr747QgPJ1xxQ/pnlE4a1j9DC4vpj4EzlDe6S5n4xBV/GIcPPHY
yJoZfMTCHLnQvHTKk3b0bqchbCmM1PxKrBKS2XXjCSSwqNWP3iYeucSmlE16q87m
6VcvwrZ5zYyX04pQOL4nxuG7o4TNlvOZRJksKHP8bTsvHJg2Ifwd+6aI6OVzaVv1
Fb16jnDF+VJWv43tg7i92DDWKxEo5zQYkviyloKzqjMEMbfeb2WQT0JZvzYEtc78
OwkFoD8cGTYGtEFM8uWhrvqOKLZPR/+zXsRYXZ/vPw1mO/+YfOFkXN4J42Y9XYmk
AQ/h9wQ1o8S50lXJELaPuJc5rLLa8ePQ+8ZE0fZtPwxyjFXFOmMQnj7jGHm3TOlX
lIQ39Sfh/Zklj4xDG0dW+zbZTMkaZ8vKRXlXIdM/W8DzE/PvZLwRBRiQ4CIQYqXs
rswqJQNnQG8EO2IKUqAL3wropOYgOJLar8J7h2AREX9K8KaOVIZRo1Bl/QIDAQAB
o4IBNzCCATMwCQYDVR0TBAIwADATBgNVHSUEDDAKBggrBgEFBQcDATALBgNVHQ8E
BAMCB4AwHQYDVR0OBBYEFHrf63hQOFX+7aWVFaIIFR4P/PGGMIHHBgNVHSMEgb8w
gbyhga+kgawwgakxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIw
EAYDVQQHDAlTdW5ueXZhbGUxETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVD
ZXJ0aWZpY2F0ZSBBdXRob3JpdHkxGTAXBgNVBAMMEEZHVDYxRlRLMjIwMDE0MTkx
IzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tgghP7rx8LS8yBDAb
BgNVHREEFDAShwQKMh7+hwQKCgoBhwQ93Gd0MA0GCSqGSIb3DQEBCwUAA4IBAQB0
ABJu3v3lY/94nw8VNq/NbQoTG5TnAfoWlSuLO6qpwKGMWzGTeuNy5K5PkVdkVIOZ
e9SIA31GEoP5w+sS5Oj8xA6hd6uoT4oqryWdsLST7W5l4p6DAd5CL3Tj6xQlzG3e
nPwth7V5qB2TcrTkhC5cmtrWXE3puwuCGm+tZnjzsGjkH0WrQfy7jKLNm37P0otn
WNXoH8danbwBGJ69PatYTsJWdY6woPio209W8x5eTJs/SQg9StnDelAmaJIGu38q
5dJOzuH/GOpCCtzJxPuQJAVJAxr+6gpL7SMw6eTsMACwRx04l9o132vPdkKspP5P
9hPTqs/wkOeXRjC0bxEU
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666925216
next
edit "Fortinet_SSL_RSA1024"
set password ENC a8G+Qxm+9LveF/IZWbvx3VkHBNiPiT43iJu/0DCEIpNcS2/uv7h4Lhe6EGkGvKpW0zxFeSKofji+tJFSafXJD52TfbOs2MfF9mRj35FXM5VpwITqLFUiI5iIBoCq3yZjklwBrJNlPPmXzgssyPqEVofZkmA7cwYkNtKZMlD/iTRqnE1piq4xea+ah0maS0ZnSf1SNA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_RSA2048"
set password ENC fvPFlACjCHYrz727zOa3wJ6Duin70yxpI7Glz8zOlQ79onTG2NcB4Hby9V1D7U19pFLHtMRvMDUpr/yHgwAPbAsQqdV+sAY41hpGuRorIWPzc3SKPlzx10I0x3LrliqJhHv3hb8MfaLbMOvfxF33cHvazTOBToXFPiN6lPGUoEecE64FpCKFcyn6vYfeitlxXi1epA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_RSA4096"
set password ENC te1cgytm5cALZ2SXF2pDqJokg0Y9AKqYXGvCTY+9DuPgel7yUD/sKIIjM2cMcQU9Ps3nM/9frNgSUqrGq4Sc3+KvYpEHYl6HPRVJXRr6SFvPuNQdI4w0oHA4+28NUuA9DnZbhcsHGXuLY6EjZpQbSncqb07FXCD2XyPt5UcykQvHKO6WVMXKwUq8V9aznTHTmArGFg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_DSA1024"
set password ENC 34e2wpKSME+D3cN334cKUDW+oUedqQLXrq3qMNaXzK5XiywZqjREWg4umE3A7MuO/okQuSiP8Ewu9D+0WZlAO+2QqB/bx9atMUL1VePzZxOYrWkPGyVqxGJHc3wpr/XoeoyPx05ZO6urrCFmLZr8XskB8ce/qLbxa4+rpgNzkpRVCHg/JEj0bxyN0OzlAcaZfIUquA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIIDnjCCA1ugAwIBAgIIFDNM0XBFw4MwCwYJYIZIAWUDBAMCMIGdMQswCQYDVQQG
EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw
DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG
R1Q2MUZUSzIyMDAxNDE5MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0
LmNvbTAeFw0yMjEwMjgwMjAxNTNaFw0yNTAxMzAwMjAxNTNaMIGdMQswCQYDVQQG
EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw
DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG
R1Q2MUZUSzIyMDAxNDE5MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0
LmNvbTCCAbcwggEsBgcqhkjOOAQBMIIBHwKBgQCkeDn5EAdjcj+QkXC7vrabP2Cc
KkPB3QLxHdoh/s3XpgZY8onEF82Pxe0MHF6PzBbNeu8qp3/cAfCvLtqNm1yXDTdT
gkRcdV5DQwOr4zZ6ng86ojpaw2Lx4sEzM5X4bKOw9gcN3zCMSqkVMrUmekv0GT9h
jTfYTQu6b6KaacI7xwIVAPGbWfHka5GVj3it4nAPekVNnLSPAoGBAIl7KZc/4bkZ
c7mY6JLMmgKm1cjOuwQSmpNYyVs0SfZVXaGU4xUM9DRNnlwWI4bpfrg90Ar2378S
gSRyHC6Srj9b0LQHEInlDYDPBNQh3zrZKbt24d7hEFbd0oarleKTcEIESOFuR5Ly
m6v5qcV+DvNsVuM9WbYuc74M0F0hMa2cA4GEAAKBgH3Tk0ihbNf2dLy2ZrIdh4Pr
vJkVZiXJKzGPVHvTOn47bB/IEG6aeUuMSOOvYA4umnEeblfzqfmZlg7gNGjbT07l
9f9cWFoTUZ+dkTtBhC1jLLhMwRIaN+7u+8qvBZ16+9SBZuMU7IzYQKGZnd+Op0cw
0nyDHHCnKR3U/1oqSAFnoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUF
BwMBMAsGCWCGSAFlAwQDAgMwADAtAhUA04V71/irVO6scWzRGSnXZ9kQqyYCFDoK
XD/pmUnq8CV2/lbN3aoTZbpa
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_DSA2048"
set password ENC dOyMV//0MuM49BvWMHqTPm7Q0FYJ4vanallJBN8Sd+g3YzwwuHv9ROuoZ12Pe4d4vwEwCqq9jHNvHpojuU0akH8NMuYjp8rNnPz0HQI/QqqvhWvWrT5PQ+dZS7t5bdTaGNJlLRFer0ajHx7O0cC0aYCYfswQPps9UT2QK6SUwj/VWZpVhuEdzhf1n9+AgoJ3J1PuMA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_ECDSA256"
set password ENC MUvl3wk+GksbCOIk+BuJBuBlNWalBy1n4OqtKsaYajywTwq9gXXPj5OKjJiSEolXoiZITXyxiEpfjRsYCuJexMNvXyRxeSH98YALFMYQXa4Mw1Fpb0J7L/SHaLxDHdIsLWuRc2CCRncY+moCFeGtM28F9GmSIlSopw21a4EMRbRR6wP6pfnk5zPEFaJW9vuusUXYfg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAhKt2Zt8rWshwICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIqu/RNdq+W4IEgZDuq5nsj5SDxPh3
1NY6KKOUVzNLchHgHz0d+0S2OpuF8FMye3wMRD2BMOaRTrXV0yWR9aFXnU+ieXWT
upwrr669Sy5ZoUmoFeUDlvelXoTtBdJI3bDHW5O8kFSfbhYi3KTdknfkqY8ugABe
cTSa/lsULILb0wC5hDeYBecR8LG2HeCxDRfACdwfvpkOArI6rEI=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_ECDSA384"
set password ENC owDQmA1KKvVX2k6kIC/3Ev26OHhBvYpHiaKDwO2MT7en/IWN+OIcR30TlbXK2eia2VVGKH+8doSH/8u7PjTyN9097gvuWUoplMsoAcfsE2uLITKRn8GTA2y5JD6Et4ngKzss+8wLJ7xkkbvGp5hfvuNL3KzYR6Gth8rJ0M+FzmBHGS/5SwWG+TKEwLBkEHpsANeisQ==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBEzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIErWHlgoy6wQCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECMLwzROjad7rBIHAlNUf30rLpKd3
RQfHKl03EmNgXUbzk136Que04M00i8PrT6JCE3L9jlwUUWKcyNYS/b0GezrQNMZN
dTXwY1BsQvTsgvC35XdNvhAJF60Usn2PDQMThgL0OW5uUeu/d3iQT5LiGRMMJ2Fb
PJMjPZ+nj79Lrdq2N5wz4OELxSvPdJWFWY86Z9ClYVb9WH+ua0khHeyvVDRl57sU
J/aOejw0KGjHmbXd+5+cCaxRDlC6TLqon/VttUqATPsgMOzFui6u
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_ECDSA521"
set password ENC fVk6wpOx8x3o+/iIC48pu+7aYbouDhzo1SWfIWOp8t9MYhl1CpRdV3NXMT5Mp5k3dCUd+l/KtDxsLOKDmPWalAbrN0Brlqn2d7tK1VOyYHpyAOS9imZzfae7xsO8ejYAdKrWKK9THzIOy/61rvHzbSARKSVgUm1JRtVG8fhTsDTsM9VpAUSDHBogDiRGD6WW9DOBNA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBSzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIxJ1YMn1yEUECAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECHRyBI1dJF5rBIH46mYKbYMFxv6U
MoBxYdh1nixxl9uZLWHFqyELaMOY89HLPT0xwTPJPvHJqF47n+lGGWz9ALpvTAxy
2P32sGVBTVp24MByB1E5dfolf6pG++FT7ZAbZPGmirjjlsdHu8h6OnHt5hnz51Ki
+ZGIxJujvdTZzZX+qFAtEs1bfRhzA2dLwI8gIxwh33s4RztxntdRKemZRrRzjsKo
ldN0w2dm/waU8VspCXBd9nHUFGZQrAgs4YnuQrWwjP2FDWMlEH8exXV9NwSQ2KIK
LwAwC+NcT8j/5UKJv0dKci6uOgNzw+NrLNX1TJDg6J6K3N6ng5C3gS3L2QasMz4=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_ED25519"
set password ENC nC3i6YI8Yzf8dtsdkuItGoM/9AeipRvSTCBUXPxw/kvmOfWksJJYKlDPNxLSjf1HakKoDOGkwskaIuzcD1803Qtl7JlThMF1gYRnhXxNqx+zFR+3AfNTlUalrRmiQ5HUulqw7yxyYoMBCB4voWUKqMN+QVyh3XeArSr64IXprm+94qhLSO4rGKpEhfVgoEahcm9VLg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGKME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAjd+89ydsF85AICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIiczelnHWSskEOOExE78qXfDBwe+e
U57xWJLgk1yqHT2O+T+fj3zrNLKGjjnQkz00o9kXS13RNgav+kEge9y+Xi+C
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIICFDCCAcagAwIBAgIIR0W/Wr2ePigwBQYDK2VwMIGdMQswCQYDVQQGEwJVUzET
MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK
DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1Q2MUZU
SzIyMDAxNDE5MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAe
Fw0yMjEwMjgwMjAxNTZaFw0yNTAxMzAwMjAxNTZaMIGdMQswCQYDVQQGEwJVUzET
MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK
DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1Q2MUZU
SzIyMDAxNDE5MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAq
MAUGAytlcAMhAKMFVqeyvXwgWInF98MLi5Rsno3VyqselTevr5QEOYfZoyIwIDAJ
BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMBMAUGAytlcANBAFFPmUaeCxN0
q4Yr/n4PSpgbkRL02BDvLvG77Uj/t0oyHOkMFlmvQsb2+WjD60extyMqHKfLGwzT
fPbdvOSIJgU=
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "Fortinet_SSL_ED448"
set password ENC aaYS8LIuHkm1UT5S+ZDctzTAW3MVJmXcKBdPQhgu4Gl88rmDJsvKCSlM9LCdKaqLZbv/hoqR82myXm/kxMtGzf1N1NNOSJvswC3DHjkDK4d1gLBpx7hxjfW6KiGK7vMS/CrAXC32bXmLYeRFTMORuYqkKiFTEzEtwNF7RQavmi8M8smDu3tOxLm5kysf0tUOFOjPtw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGiME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAiowwjfPcLtYAICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI3Qh3KC9mIEIEUOdGUtKkT4nAV4pA
k4EzaOHXvBX8CuynGdLT8UU+EeZc7jSuhZXzZKx78OojFNGYqg6VvrPoPx89sVxk
N1Utq+BfAKst4NXlVp16n4vFxYhg
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666922519
next
edit "wildcard.tahoho.com.tw"
set password ENC kEAVg8Y86lne/S9w9LvgvsJJ/XOQ1nsQZbBctwZ9QkbKTL8NmXKpdqQl7m6bF5GwekyTWG3DKHgGuUHP+jIrmLiBKAPksgvmAfQ803Ji6GSiLe1amnwAIM5If3Ow05aJ6/WxHWKbx2HYYowxKBumYSa6ph487xYVfjfXWo4nSTCT2gX+b9uTinmxeJEm1xGs3at20A==
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set last-updated 1666930158
next
end
config webfilter ftgd-local-cat
edit "custom1"
set id 140
next
edit "custom2"
set id 141
next
end
config ips sensor
edit "default"
set comment "Prevent critical attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "sniffer-profile"
set comment "Monitor IPS attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config entries
edit 1
set severity medium high critical
next
end
next
edit "all_default"
set comment "All predefined signatures with default setting."
config entries
edit 1
next
end
next
edit "all_default_pass"
set comment "All predefined signatures with PASS action."
config entries
edit 1
set action pass
next
end
next
edit "protect_http_server"
set comment "Protect against HTTP server-side vulnerabilities."
config entries
edit 1
set location server
set protocol HTTP
next
end
next
edit "protect_email_server"
set comment "Protect against email server-side vulnerabilities."
config entries
edit 1
set location server
set protocol SMTP POP3 IMAP
next
end
next
edit "protect_client"
set comment "Protect against client-side vulnerabilities."
config entries
edit 1
set location client
next
end
next
edit "high_security"
set comment "Blocks all Critical/High/Medium and some Low severity vulnerabilities"
set block-malicious-url enable
config entries
edit 1
set severity medium high critical
set status enable
set action block
next
edit 2
set severity low
next
end
next
end
config firewall shaper traffic-shaper
edit "high-priority"
set maximum-bandwidth 1048576
set per-policy enable
next
edit "medium-priority"
set maximum-bandwidth 1048576
set priority medium
set per-policy enable
next
edit "low-priority"
set maximum-bandwidth 1048576
set priority low
set per-policy enable
next
edit "guarantee-100kbps"
set guaranteed-bandwidth 100
set maximum-bandwidth 1048576
set per-policy enable
next
edit "shared-1M-pipe"
set maximum-bandwidth 1024
next
end
config firewall proxy-address
edit "IPv4-address"
set uuid c9882f24-566a-51ed-08c2-3b76aeb0663a
set type host-regex
set host-regex "^([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\\.([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])){3}$"
next
edit "IPv6-address"
set uuid c9883564-566a-51ed-690f-c73e5b1ef1bb
set type host-regex
set host-regex "^\\[(([0-9a-f]{0,4}:){1,7}[0-9a-f]{1,4})\\]$"
next
end
config web-proxy global
set proxy-fqdn "default.fqdn"
end
config application list
edit "default"
set comment "Monitor all applications."
config entries
edit 1
set action pass
next
end
next
edit "sniffer-profile"
set comment "Monitor all applications."
unset options
config entries
edit 1
set action pass
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set deep-app-inspection disable
config entries
edit 1
set action pass
set log disable
next
end
next
edit "block-high-risk"
config entries
edit 1
set category 2 6
next
edit 2
set action pass
next
end
next
end
config dlp data-type
edit "keyword"
set pattern "built-in"
next
edit "regex"
set pattern "built-in"
next
edit "hex"
set pattern "built-in"
next
edit "mip-label"
set pattern "^[[:xdigit:]]{8}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{12}$"
set transform "built-in"
next
edit "credit-card"
set pattern "\\b([2-6]{1}\\d{3})[- ]?(\\d{4})[- ]?(\\d{2})[- ]?(\\d{2})[- ]?(\\d{2,4})\\b"
set verify "built-in"
set look-back 20
set transform "\\b\\1[- ]?\\2[- ]?\\3[- ]?\\4[- ]?\\5\\b"
next
edit "ssn-us"
set pattern "\\b(\\d{3})-(\\d{2})-(\\d{4})\\b"
set verify "(?<!-)\\b(?!666|000|9\\d{2})\\d{3}-(?!00)\\d{2}-(?!0{4})\\d{4}\\b(?!-)"
set look-back 12
set transform "\\b\\1-\\2-\\3\\b"
next
end
config dlp dictionary
edit "def-cc-dict"
set uuid d3cd7dae-566a-51ed-df12-a25301fa4b25
config entries
edit 1
set type "credit-card"
next
end
next
edit "SSN-Sensor-r1d"
set uuid d3cdefbe-566a-51ed-ed85-bf1de445acce
config entries
edit 1
set type "regex"
set pattern "WebEx"
next
end
next
edit "def-ssn-dict"
set uuid d3cec574-566a-51ed-6afd-07165339d7ec
config entries
edit 1
set type "ssn-us"
next
end
next
end
config dlp sensor
edit "def-cc-sensor"
config entries
edit 1
set dictionary "def-cc-dict"
next
end
next
edit "SSN-Sensor-r1s"
config entries
edit 1
set dictionary "SSN-Sensor-r1d"
next
end
next
edit "def-ssn-sensor"
config entries
edit 1
set dictionary "def-ssn-dict"
next
end
next
end
config dlp filepattern
edit 1
set name "builtin-patterns"
config entries
edit "*.bat"
next
edit "*.com"
next
edit "*.dll"
next
edit "*.doc"
next
edit "*.exe"
next
edit "*.gz"
next
edit "*.hta"
next
edit "*.ppt"
next
edit "*.rar"
next
edit "*.scr"
next
edit "*.tar"
next
edit "*.tgz"
next
edit "*.vb?"
next
edit "*.wps"
next
edit "*.xl?"
next
edit "*.zip"
next
edit "*.pif"
next
edit "*.cpl"
next
end
next
edit 2
set name "all_executables"
config entries
edit "bat"
set filter-type type
set file-type bat
next
edit "exe"
set filter-type type
set file-type exe
next
edit "elf"
set filter-type type
set file-type elf
next
edit "hta"
set filter-type type
set file-type hta
next
end
next
end
config dlp sensitivity
edit "Private"
next
edit "Critical"
next
edit "Warning"
next
end
config dlp profile
edit "default"
set comment "Default profile."
next
edit "sniffer-profile"
set comment "Log a summary of email and web traffic."
set summary-proto smtp pop3 imap http-get http-post
next
edit "Content_Summary"
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Content_Archive"
set full-archive-proto smtp pop3 imap http-get http-post ftp nntp
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Large-File"
config rule
edit 1
set name "Large-File-Filter"
set proto smtp pop3 imap http-get http-post
set file-size 5120
set action log-only
next
end
next
edit "Credit-Card"
config rule
edit 1
set name "Credit-Card-Filter"
set severity high
set proto smtp pop3 imap http-get http-post
set filter-by sensor
set sensor "def-cc-sensor"
set action log-only
next
edit 2
set name "Credit-Card-Filter"
set severity high
set type message
set proto smtp pop3 imap http-post
set filter-by sensor
set sensor "def-cc-sensor"
set action log-only
next
end
next
edit "SSN-Sensor"
set comment "Match SSN numbers but NOT WebEx invite emails."
config rule
edit 1
set name "SSN-Sensor-Filter"
set severity high
set type message
set proto smtp pop3 imap
set filter-by sensor
set sensor "SSN-Sensor-r1s"
next
edit 2
set name "SSN-Sensor-Filter"
set severity high
set type message
set proto smtp pop3 imap
set filter-by sensor
set sensor "def-ssn-sensor"
set action log-only
next
edit 3
set name "SSN-Sensor-Filter"
set severity high
set proto smtp pop3 imap http-get http-post ftp
set filter-by sensor
set sensor "def-ssn-sensor"
set action log-only
next
end
next
end
config webfilter ips-urlfilter-setting
end
config webfilter ips-urlfilter-setting6
end
config log threat-weight
config web
edit 1
set category 26
set level high
next
edit 2
set category 61
set level high
next
edit 3
set category 86
set level high
next
edit 4
set category 1
set level medium
next
edit 5
set category 3
set level medium
next
edit 6
set category 4
set level medium
next
edit 7
set category 5
set level medium
next
edit 8
set category 6
set level medium
next
edit 9
set category 12
set level medium
next
edit 10
set category 59
set level medium
next
edit 11
set category 62
set level medium
next
edit 12
set category 83
set level medium
next
edit 13
set category 72
next
edit 14
set category 14
next
edit 15
set category 96
set level medium
next
end
config application
edit 1
set category 2
next
edit 2
set category 6
set level medium
next
end
end
config icap profile
edit "default"
config icap-headers
edit 1
set name "X-Authenticated-User"
set content "$user"
next
edit 2
set name "X-Authenticated-Groups"
set content "$local_grp"
next
end
next
end
config user ldap
edit "Azure-LDAP-Secure-Server"
set server "gsvr.tahoho.com.tw"
set server-identity-check disable
set cnid "sAMAccountName"
set dn "dc=tahoho,dc=com,dc=tw"
set type regular
set username "tahoho\\tahotbhq.admin"
set password ENC cGxfbONrPR6RRijfqVpgHTKWpvmSCUqQvAEkIziB8IstoYYsv8WI8Qddg3c9Xz4/RQL66czO5aSSjaVN78KdSbUjmDi8Ch4tJ7qQN9w0/JZfyfjK7END680FnJLzl+jJXo++OBhwuMw5hZ1l6aREcGrdz0mZmGXWKtaqQcMCWQQoQVPxcufa0PtJ5OsaOPCLVrDTOA==
set secure ldaps
set port 636
next
end
config user fortitoken
edit "FTKMOB2A942F47D7"
set license "FTMTRIAL085C577B"
next
edit "FTKMOB2A44746EAB"
set license "FTMTRIAL085C577B"
next
end
config user local
edit "guest"
set type password
set passwd ENC zcCNytRTlrB+9WHGk+v4fgj6z1M00pEg5vyLzfN8E807KAkQpt4zDcH4YdxRXdt1ZyAMVx9LpkIrdwfoXwwMck1roNqqIzubg+uR9Wi5mE23bAuPbZOOanB+XChSDN97iTJcHb5423BGz8VJYuaAlclEsjC77pspYIq4Af+HmdbxzFXTGgBd8pmzeEBJC9St2lmgUQ==
next
end
config user setting
set auth-cert "Fortinet_Factory"
end
config user group
edit "SSO_Guest_Users"
next
edit "Guest-group"
set member "guest"
next
edit "RemoteUserGroup"
set member "Azure-LDAP-Secure-Server"
config match
edit 1
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Install Domain Servers,CN=Microsoft Exchange System Objects,DC=tahoho,DC=com,DC=tw"
next
edit 2
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Access Control Assistance Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 3
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Account Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 4
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 5
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 6
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncBrowse,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 7
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncOperators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 8
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncPasswordSet,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 9
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Allowed RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 10
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Backup Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 11
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Business Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 12
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cert Publishers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 13
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Certificate Service DCOM Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 14
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=CERTSVC_DCOM_ACCESS,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 15
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cloneable Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 16
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cryptographic Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 17
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Delegated Setup,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 18
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Denied RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 19
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 20
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 21
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Discovery Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 22
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Distributed COM Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 23
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 24
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsUpdateProxy,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 25
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 26
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Computers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 27
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 28
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Guests,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 29
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 30
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 31
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Key Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 32
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 33
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 34
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_BL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 35
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_CY,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 36
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LT,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 37
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LZ,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 38
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 39
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_SL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 40
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_TC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 41
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_WC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 42
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_XD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 43
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_YK,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 44
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 45
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 46
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_public,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 47
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_Manager,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 48
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_PAC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 49
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Event Log Readers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 50
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange All Hosted Organizations,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 51
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Domain Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 52
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Enterprise Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 53
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Servers,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 54
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Trusted Subsystem,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 55
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Windows Permissions,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 56
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ExchangeLegacyInterop,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 57
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Google 雲端硬碟,DC=tahoho,DC=com,DC=tw"
next
edit 58
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Group Policy Creator Owners,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 59
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Guests,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 60
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Help Desk,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 61
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HelpServicesGroup,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 62
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeTeam,DC=tahoho,DC=com,DC=tw"
next
edit 63
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeUsers,DC=tahoho,DC=com,DC=tw"
next
edit 64
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hygiene Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 65
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hyper-V Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 66
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_IUSRS,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 67
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_WPG,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 68
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Incoming Forest Trust Builders,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 69
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Key Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 70
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=MTS Impersonators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 71
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Netmon Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 72
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Network Configuration Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 73
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 74
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Log Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 75
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Monitor Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 76
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 77
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Print Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 78
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Protected Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 79
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Public Folder Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 80
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RAS and IAS Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 81
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Endpoint Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 82
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Management Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 83
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Remote Access Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 84
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 85
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Recipient Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 86
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Records Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 87
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Desktop Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 88
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Management Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 89
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Replicator,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 90
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Schema Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 91
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 92
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 93
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Smart Phone,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 94
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SMEX Admin Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 95
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSFTEUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 96
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSSQLUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 97
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005SQLBrowserUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 98
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServerMSSQLServerADHelperUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 99
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Storage Replica Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 100
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ApiGateway Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 101
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ASN Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 102
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Centralized Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 103
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 104
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHONT $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 105
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 106
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_loc,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 107
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TelnetClients,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 108
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Terminal Server License Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 109
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=UM Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 110
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 111
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=vendor_group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 112
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Veolia Distribution Group,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 113
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=VeoliaSecurityGroup,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 114
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=View-Only Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 115
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Windows Authorization Access Group,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 116
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WINS Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 117
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 118
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Reporters,CN=Users,DC=tahoho,DC=com,DC=tw"
next
end
next
end
config vpn ssl web host-check-software
edit "FortiClient-AV"
set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7"
next
edit "FortiClient-FW"
set type fw
set guid "528CB157-D384-4593-AAAA-E42DFF111CED"
next
edit "FortiClient-AV-Vista"
set guid "385618A6-2256-708E-3FB9-7E98B93F91F9"
next
edit "FortiClient-FW-Vista"
set type fw
set guid "006D9983-6839-71D6-14E6-D7AD47ECD682"
next
edit "FortiClient5-AV"
set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7"
next
edit "AVG-Internet-Security-AV"
set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF"
next
edit "AVG-Internet-Security-FW"
set type fw
set guid "8DECF618-9569-4340-B34A-D78D28969B66"
next
edit "AVG-Internet-Security-AV-Vista-Win7"
set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82"
next
edit "AVG-Internet-Security-FW-Vista-Win7"
set type fw
set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9"
next
edit "CA-Anti-Virus"
set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93"
next
edit "CA-Internet-Security-AV"
set guid "6B98D35F-BB76-41C0-876B-A50645ED099A"
next
edit "CA-Internet-Security-FW"
set type fw
set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3"
next
edit "CA-Internet-Security-AV-Vista-Win7"
set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F"
next
edit "CA-Internet-Security-FW-Vista-Win7"
set type fw
set guid "06D680B0-4024-4FAB-E710-E675E50F6324"
next
edit "CA-Personal-Firewall"
set type fw
set guid "14CB4B80-8E52-45EA-905E-67C1267B4160"
next
edit "F-Secure-Internet-Security-AV"
set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15"
next
edit "F-Secure-Internet-Security-FW"
set type fw
set guid "D4747503-0346-49EB-9262-997542F79BF4"
next
edit "F-Secure-Internet-Security-AV-Vista-Win7"
set guid "15414183-282E-D62C-CA37-EF24860A2F17"
next
edit "F-Secure-Internet-Security-FW-Vista-Win7"
set type fw
set guid "2D7AC0A6-6241-D774-E168-461178D9686C"
next
edit "Kaspersky-AV"
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-FW"
set type fw
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-AV-Vista-Win7"
set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE"
next
edit "Kaspersky-FW-Vista-Win7"
set type fw
set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5"
next
edit "McAfee-Internet-Security-Suite-AV"
set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83"
next
edit "McAfee-Internet-Security-Suite-FW"
set type fw
set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8"
next
edit "McAfee-Internet-Security-Suite-AV-Vista-Win7"
set guid "86355677-4064-3EA7-ABB3-1B136EB04637"
next
edit "McAfee-Internet-Security-Suite-FW-Vista-Win7"
set type fw
set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C"
next
edit "McAfee-Virus-Scan-Enterprise"
set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0"
next
edit "Norton-360-2.0-AV"
set guid "A5F1BC7C-EA33-4247-961C-0217208396C4"
next
edit "Norton-360-2.0-FW"
set type fw
set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3"
next
edit "Norton-360-3.0-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-360-3.0-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-Internet-Security-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Norton-Internet-Security-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Symantec-Endpoint-Protection-AV"
set guid "FB06448E-52B8-493A-90F3-E43226D3305C"
next
edit "Symantec-Endpoint-Protection-FW"
set type fw
set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6"
next
edit "Symantec-Endpoint-Protection-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Symantec-Endpoint-Protection-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Panda-Antivirus+Firewall-2008-AV"
set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A"
next
edit "Panda-Antivirus+Firewall-2008-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Panda-Internet-Security-AV"
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2006~2007-FW"
set type fw
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2008~2009-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Sophos-Anti-Virus"
set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW"
set type fw
set guid "0786E95E-326A-4524-9691-41EF88FB52EA"
next
edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7"
set guid "479CCF92-4960-B3E0-7373-BF453B467D2C"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7"
set type fw
set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57"
next
edit "Trend-Micro-AV"
set guid "7D2296BC-32CC-4519-917E-52E652474AF5"
next
edit "Trend-Micro-FW"
set type fw
set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6"
next
edit "Trend-Micro-AV-Vista-Win7"
set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50"
next
edit "Trend-Micro-FW-Vista-Win7"
set type fw
set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B"
next
edit "ZoneAlarm-AV"
set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF"
next
edit "ZoneAlarm-FW"
set type fw
set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B"
next
edit "ZoneAlarm-AV-Vista-Win7"
set guid "D61596DF-D219-341C-49B3-AD30538CBC5B"
next
edit "ZoneAlarm-FW-Vista-Win7"
set type fw
set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20"
next
edit "ESET-Smart-Security-AV"
set guid "19259FAE-8396-A113-46DB-15B0E7DFA289"
next
edit "ESET-Smart-Security-FW"
set type fw
set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2"
next
end
config vpn ssl web portal
edit "full-access"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set web-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
next
edit "web-access"
set web-mode enable
next
edit "tunnel-access"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
next
end
config vpn ssl settings
set servercert "Fortinet_Factory"
set port 443
end
config voip profile
edit "default"
set comment "Default VoIP profile."
next
edit "strict"
config sip
set malformed-request-line discard
set malformed-header-via discard
set malformed-header-from discard
set malformed-header-to discard
set malformed-header-call-id discard
set malformed-header-cseq discard
set malformed-header-rack discard
set malformed-header-rseq discard
set malformed-header-contact discard
set malformed-header-record-route discard
set malformed-header-route discard
set malformed-header-expires discard
set malformed-header-content-type discard
set malformed-header-content-length discard
set malformed-header-max-forwards discard
set malformed-header-allow discard
set malformed-header-p-asserted-identity discard
set malformed-header-sdp-v discard
set malformed-header-sdp-o discard
set malformed-header-sdp-s discard
set malformed-header-sdp-i discard
set malformed-header-sdp-c discard
set malformed-header-sdp-b discard
set malformed-header-sdp-z discard
set malformed-header-sdp-k discard
set malformed-header-sdp-a discard
set malformed-header-sdp-t discard
set malformed-header-sdp-r discard
set malformed-header-sdp-m discard
end
next
end
config system sdwan
config zone
edit "virtual-wan-link"
next
end
config health-check
edit "Default_DNS"
set system-dns enable
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Office_365"
set server "www.office.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Gmail"
set server "gmail.com"
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 2
next
end
next
edit "Default_AWS"
set server "aws.amazon.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Google Search"
set server "www.google.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_FortiGuard"
set server "fortiguard.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
end
end
config vpn ocvpn
end
config dnsfilter profile
edit "default"
set comment "Default dns filtering."
config ftgd-dns
config filters
edit 1
set category 2
next
edit 2
set category 7
next
edit 3
set category 8
next
edit 4
set category 9
next
edit 5
set category 11
next
edit 6
set category 12
next
edit 7
set category 13
next
edit 8
set category 14
next
edit 9
set category 15
next
edit 10
set category 16
next
edit 11
next
edit 12
set category 57
next
edit 13
set category 63
next
edit 14
set category 64
next
edit 15
set category 65
next
edit 16
set category 66
next
edit 17
set category 67
next
edit 18
set category 26
set action block
next
edit 19
set category 61
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
set block-botnet enable
next
end
config antivirus settings
set machine-learning-detection enable
set grayware enable
end
config antivirus profile
edit "default"
set comment "Scan files and block viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
edit "sniffer-profile"
set comment "Scan files and monitor viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
end
config file-filter profile
edit "default"
set comment "File type inspection."
next
edit "sniffer-profile"
set comment "File type inspection."
next
end
config webfilter profile
edit "default"
set comment "Default web filtering."
config ftgd-wf
unset options
config filters
edit 1
set action block
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 12
set action block
next
edit 8
set category 13
set action block
next
edit 9
set category 14
set action block
next
edit 10
set category 15
set action block
next
edit 11
set category 16
set action block
next
edit 12
set category 26
set action block
next
edit 13
set category 57
set action block
next
edit 14
set category 61
set action block
next
edit 15
set category 63
set action block
next
edit 16
set category 64
set action block
next
edit 17
set category 65
set action block
next
edit 18
set category 66
set action block
next
edit 19
set category 67
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
next
edit "sniffer-profile"
set comment "Monitor web traffic."
config ftgd-wf
config filters
edit 1
next
edit 2
set category 1
next
edit 3
set category 2
next
edit 4
set category 3
next
edit 5
set category 4
next
edit 6
set category 5
next
edit 7
set category 6
next
edit 8
set category 7
next
edit 9
set category 8
next
edit 10
set category 9
next
edit 11
set category 11
next
edit 12
set category 12
next
edit 13
set category 13
next
edit 14
set category 14
next
edit 15
set category 15
next
edit 16
set category 16
next
edit 17
set category 17
next
edit 18
set category 18
next
edit 19
set category 19
next
edit 20
set category 20
next
edit 21
set category 23
next
edit 22
set category 24
next
edit 23
set category 25
next
edit 24
set category 26
next
edit 25
set category 28
next
edit 26
set category 29
next
edit 27
set category 30
next
edit 28
set category 31
next
edit 29
set category 33
next
edit 30
set category 34
next
edit 31
set category 35
next
edit 32
set category 36
next
edit 33
set category 37
next
edit 34
set category 38
next
edit 35
set category 39
next
edit 36
set category 40
next
edit 37
set category 41
next
edit 38
set category 42
next
edit 39
set category 43
next
edit 40
set category 44
next
edit 41
set category 46
next
edit 42
set category 47
next
edit 43
set category 48
next
edit 44
set category 49
next
edit 45
set category 50
next
edit 46
set category 51
next
edit 47
set category 52
next
edit 48
set category 53
next
edit 49
set category 54
next
edit 50
set category 55
next
edit 51
set category 56
next
edit 52
set category 57
next
edit 53
set category 58
next
edit 54
set category 59
next
edit 55
set category 61
next
edit 56
set category 62
next
edit 57
set category 63
next
edit 58
set category 64
next
edit 59
set category 65
next
edit 60
set category 66
next
edit 61
set category 67
next
edit 62
set category 68
next
edit 63
set category 69
next
edit 64
set category 70
next
edit 65
set category 71
next
edit 66
set category 72
next
edit 67
set category 75
next
edit 68
set category 76
next
edit 69
set category 77
next
edit 70
set category 78
next
edit 71
set category 79
next
edit 72
set category 80
next
edit 73
set category 81
next
edit 74
set category 82
next
edit 75
set category 83
next
edit 76
set category 84
next
edit 77
set category 85
next
edit 78
set category 86
next
edit 79
set category 87
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
end
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set options block-invalid-url
config ftgd-wf
unset options
config filters
edit 1
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 12
set action block
next
edit 8
set category 13
set action block
next
edit 9
set category 14
set action block
next
edit 10
set category 15
set action block
next
edit 11
set category 16
set action block
next
edit 12
set category 26
set action block
next
edit 13
set category 57
set action block
next
edit 14
set category 61
set action block
next
edit 15
set category 63
set action block
next
edit 16
set category 64
set action block
next
edit 17
set category 65
set action block
next
edit 18
set category 66
set action block
next
edit 19
set category 67
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
next
edit "monitor-all"
set comment "Monitor and log all visited URLs, flow-based."
config ftgd-wf
unset options
config filters
edit 1
set category 1
next
edit 2
set category 3
next
edit 3
set category 4
next
edit 4
set category 5
next
edit 5
set category 6
next
edit 6
set category 12
next
edit 7
set category 59
next
edit 8
set category 62
next
edit 9
set category 83
next
edit 10
set category 2
next
edit 11
set category 7
next
edit 12
set category 8
next
edit 13
set category 9
next
edit 14
set category 11
next
edit 15
set category 13
next
edit 16
set category 14
next
edit 17
set category 15
next
edit 18
set category 16
next
edit 19
set category 57
next
edit 20
set category 63
next
edit 21
set category 64
next
edit 22
set category 65
next
edit 23
set category 66
next
edit 24
set category 67
next
edit 25
set category 19
next
edit 26
set category 24
next
edit 27
set category 25
next
edit 28
set category 72
next
edit 29
set category 75
next
edit 30
set category 76
next
edit 31
set category 26
next
edit 32
set category 61
next
edit 33
set category 86
next
edit 34
set category 17
next
edit 35
set category 18
next
edit 36
set category 20
next
edit 37
set category 23
next
edit 38
set category 28
next
edit 39
set category 29
next
edit 40
set category 30
next
edit 41
set category 33
next
edit 42
set category 34
next
edit 43
set category 35
next
edit 44
set category 36
next
edit 45
set category 37
next
edit 46
set category 38
next
edit 47
set category 39
next
edit 48
set category 40
next
edit 49
set category 42
next
edit 50
set category 44
next
edit 51
set category 46
next
edit 52
set category 47
next
edit 53
set category 48
next
edit 54
set category 54
next
edit 55
set category 55
next
edit 56
set category 58
next
edit 57
set category 68
next
edit 58
set category 69
next
edit 59
set category 70
next
edit 60
set category 71
next
edit 61
set category 77
next
edit 62
set category 78
next
edit 63
set category 79
next
edit 64
set category 80
next
edit 65
set category 82
next
edit 66
set category 85
next
edit 67
set category 87
next
edit 68
set category 31
next
edit 69
set category 41
next
edit 70
set category 43
next
edit 71
set category 49
next
edit 72
set category 50
next
edit 73
set category 51
next
edit 74
set category 52
next
edit 75
set category 53
next
edit 76
set category 56
next
edit 77
set category 81
next
edit 78
set category 84
next
edit 79
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
end
end
set log-all-url enable
set web-content-log disable
set web-filter-command-block-log disable
set web-filter-cookie-log disable
set web-url-log disable
set web-invalid-domain-log disable
set web-ftgd-err-log disable
next
end
config webfilter search-engine
edit "google"
set hostname ".*\\.google\\..*"
set url "^\\/((custom|search|images|videosearch|webhp)\\?)"
set query "q="
set safesearch url
set safesearch-str "&safe=active"
next
edit "yahoo"
set hostname ".*\\.yahoo\\..*"
set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)"
set query "p="
set safesearch url
set safesearch-str "&vm=r"
next
edit "bing"
set hostname ".*\\.bing\\..*"
set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?"
set query "q="
set safesearch header
next
edit "yandex"
set hostname "yandex\\..*"
set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?"
set query "text="
set safesearch url
set safesearch-str "&family=yes"
next
edit "youtube"
set hostname ".*youtube.*"
set safesearch header
next
edit "baidu"
set hostname ".*\\.baidu\\.com"
set url "^\\/s?\\?"
set query "wd="
next
edit "baidu2"
set hostname ".*\\.baidu\\.com"
set url "^\\/(ns|q|m|i|v)\\?"
set query "word="
next
edit "baidu3"
set hostname "tieba\\.baidu\\.com"
set url "^\\/f\\?"
set query "kw="
next
edit "vimeo"
set hostname ".*vimeo.*"
set url "^\\/search\\?"
set query "q="
set safesearch header
next
edit "yt-scan-1"
set url "www.youtube.com/user/"
set safesearch yt-scan
next
edit "yt-scan-2"
set url "www.youtube.com/youtubei/v1/browse"
set safesearch yt-scan
next
edit "yt-scan-3"
set url "www.youtube.com/youtubei/v1/player"
set safesearch yt-scan
next
edit "yt-scan-4"
set url "www.youtube.com/youtubei/v1/navigator"
set safesearch yt-scan
next
edit "yt-channel"
set url "www.youtube.com/channel"
set safesearch yt-channel
next
edit "yt-pattern"
set url "youtube.com/channel/"
set safesearch yt-pattern
next
edit "twitter"
set hostname "twitter\\.com"
set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName"
set query "variables="
set safesearch translate
set safesearch-str "regex::%22screen_name%22:%22([A-Za-z0-9_]{4,15})%22::twitter.com/\\1"
next
edit "google-translate-1"
set hostname "translate\\.google\\..*"
set url "^\\/translate"
set query "u="
set safesearch translate
set safesearch-str "regex::(?:\\?|&)u=([^&]+)::\\1"
next
edit "google-translate-2"
set hostname ".*\\.translate\\.goog"
set url "^\\/"
set safesearch translate
set safesearch-str "case::google-translate"
next
edit "translate"
set hostname "translate\\.google\\..*"
set url "^\\/translate\\?"
set query "u="
set safesearch translate
next
end
config emailfilter profile
edit "sniffer-profile"
set comment "Malware and phishing URL monitoring."
config imap
end
config pop3
end
config smtp
end
next
edit "default"
set comment "Malware and phishing URL filtering."
config imap
end
config pop3
end
config smtp
end
next
end
config report layout
edit "default"
set title "FortiGate System Analysis Report"
set style-theme "default-report"
set options include-table-of-content view-chart-as-heading
config page
set paper letter
set page-break-before heading1
config header
config header-item
edit 1
set type image
set style "header-image"
set img-src "fortinet_logo_small.png"
next
end
end
config footer
config footer-item
edit 1
set style "footer-text"
set content "FortiGate ${schedule_type} Security Report - Host Name: ${hostname}"
next
edit 2
set style "footer-pageno"
next
end
end
end
config body-item
edit 101
set type image
set style "report-cover1"
set img-src "fortigate_log.png"
next
edit 103
set style "report-cover2"
set content "FortiGate ${schedule_type} Security Report"
next
edit 105
set style "report-cover3"
set content "Report Date: ${started_time}"
next
edit 107
set style "report-cover3"
set content "Data Range: ${report_data_range} (${hostname})"
next
edit 109
set style "report-cover3"
set content "${vdom}"
next
edit 111
set type image
set style "report-cover4"
set img-src "fortinet_logo_small.png"
next
edit 121
set type misc
set misc-component page-break
next
edit 301
set text-component heading1
set content "Bandwidth and Applications"
next
edit 311
set type chart
set chart "traffic.bandwidth.history_c"
next
edit 321
set type chart
set chart "traffic.sessions.history_c"
next
edit 331
set type chart
set chart "traffic.statistics"
next
edit 411
set type chart
set chart "traffic.bandwidth.apps_c"
next
edit 421
set type chart
set chart "traffic.bandwidth.cats_c"
next
edit 511
set type chart
set chart "traffic.bandwidth.users_c"
next
edit 521
set type chart
set chart "traffic.users.history.hour_c"
next
edit 611
set type chart
set chart "traffic.bandwidth.destinations_tab"
next
edit 1001
set text-component heading1
set content "Web Usage"
next
edit 1011
set type chart
set chart "web.allowed-request.sites_c"
next
edit 1021
set type chart
set chart "web.bandwidth.sites_c"
next
edit 1031
set type chart
set chart "web.blocked-request.sites_c"
next
edit 1041
set type chart
set chart "web.blocked-request.users_c"
next
edit 1051
set type chart
set chart "web.requests.users_c"
next
edit 1061
set type chart
set chart "web.bandwidth.users_c"
next
edit 1071
set type chart
set chart "web.bandwidth.stream-sites_c"
next
edit 1301
set text-component heading1
set content "Emails"
next
edit 1311
set type chart
set chart "email.request.senders_c"
next
edit 1321
set type chart
set chart "email.bandwidth.senders_c"
next
edit 1331
set type chart
set chart "email.request.recipients_c"
next
edit 1341
set type chart
set chart "email.bandwidth.recipients_c"
next
edit 1501
set text-component heading1
set content "Threats"
next
edit 1511
set type chart
set top-n 80
set chart "virus.count.viruses_c"
next
edit 1531
set type chart
set top-n 80
set chart "virus.count.users_c"
next
edit 1541
set type chart
set top-n 80
set chart "virus.count.sources_c"
next
edit 1551
set type chart
set chart "virus.count.history_c"
next
edit 1561
set type chart
set top-n 80
set chart "botnet.count_c"
next
edit 1571
set type chart
set top-n 80
set chart "botnet.count.users_c"
next
edit 1581
set type chart
set top-n 80
set chart "botnet.count.sources_c"
next
edit 1591
set type chart
set chart "botnet.count.history_c"
next
edit 1601
set type chart
set top-n 80
set chart "attack.count.attacks_c"
next
edit 1611
set type chart
set top-n 80
set chart "attack.count.victims_c"
next
edit 1621
set type chart
set top-n 80
set chart "attack.count.source_bar_c"
next
edit 1631
set type chart
set chart "attack.count.blocked_attacks_c"
next
edit 1641
set type chart
set chart "attack.count.severity_c"
next
edit 1651
set type chart
set chart "attack.count.history_c"
next
edit 1701
set text-component heading1
set content "VPN Usage"
next
edit 1711
set type chart
set top-n 80
set chart "vpn.bandwidth.static-tunnels_c"
next
edit 1721
set type chart
set top-n 80
set chart "vpn.bandwidth.dynamic-tunnels_c"
next
edit 1731
set type chart
set top-n 80
set chart "vpn.bandwidth.ssl-tunnel.users_c"
next
edit 1741
set type chart
set top-n 80
set chart "vpn.bandwidth.ssl-web.users_c"
next
edit 1901
set text-component heading1
set content "Admin Login and System Events"
next
edit 1911
set type chart
set top-n 80
set chart "event.login.summary_c"
next
edit 1931
set type chart
set top-n 80
set chart "event.failed.login_c"
next
edit 1961
set type chart
set top-n 80
set chart "event.system.group_events_c"
next
end
next
end
config wanopt settings
set host-id "default-id"
end
config wanopt profile
edit "default"
set comments "Default WANopt profile."
next
end
config log memory setting
set status disable
end
config log disk setting
set status enable
end
config log null-device setting
set status disable
end
config log setting
set local-in-allow enable
set local-in-deny-unicast enable
set local-in-deny-broadcast enable
end
config firewall schedule recurring
edit "always"
set day sunday monday tuesday wednesday thursday friday saturday
next
edit "none"
next
edit "default-darrp-optimize"
set start 01:00
set end 01:30
set day sunday monday tuesday wednesday thursday friday saturday
next
end
config firewall vip
edit "UA ACCESS- test"
set uuid 289e539e-8811-51ed-c309-c48e6f9cf8fd
set extip 61.220.103.116
set mappedip "10.50.30.120"
set extintf "wan1"
set portforward enable
set extport 49320
set mappedport 49320
next
end
config firewall ssh local-key
edit "Fortinet_SSH_RSA2048"
set password ENC AAAAcEoN614Z7Jp5CLOL49UPNP0P/1qJlUSRKawBJRwN1tO7GWxZV6yY6XHuunJ1BTgn6pY1orB4R++E1reCO8LM9VjjdrovBG97sdwOEdM5IRZ7F58Das7PgVfhRehgiMW3DdGB3ciF1GNj8mMm6t6mUG3BmU7JTXusQAOPvMmf7cguJleyBwmq76OGKnuQJ6Ayyw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDio/0hx75PNeO0ZtkjpoyfF1Zj9jsXiA5qWQQY0Jq3AoOuJ+Hsp3+nJ7HgjJB5RWVu1tbvjyUdDztK0VFWPvw/4uNZGAlsO7jmNVMS6Fn8+f8ROD7LnaSg3HsAP0TSdN3yqAEoFpTpGqTWWoEmZiLPVMAKF90bwg8qiYaV7IQpF946WbXomaQlw0Qqaiv7voYnHC2gZPLuposHBy2Ge92BLPawai7+/ClQ/HQuY2EDzkw9bCpiCpjn7vScEPkmBSBwRhnTIZ9Qhp+f7n6ynZr2+rKqvqvSLoDPruybauMoJF0DKUIaHITKgzbNoS7yGorDnafa1zdzrB2iP5RhCCRJ"
set source built-in
next
edit "Fortinet_SSH_DSA1024"
set password ENC AAAAcF1A5XmQd8heo2KedWsl2iLJ+nuSIfitIlNdskPaE6wP2fepy/n1uNtQNDlVxqlUKU+xS4PiQ0brD/MgKzhy6oGYrKRaMNKl8mhuPB5qLlVhS2qd4GQwHYizaHxn6C7F6c3ILbpgM8CojbD6FLWAnDyNneuIf2xedjhTARqGrZtlQnXc/53RURlnQMamXSBrPA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-dss 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"
set source built-in
next
edit "Fortinet_SSH_ECDSA256"
set password ENC AAAAcKndtq+7cM4rzq8PXpo7keXqNKg7zg72GeifYy/JoVPXAd/lWR0ZbKXYbt/9J1X37KJ9oCH9VYJRU4ZcUfMQsrS8laXmpDAeWhEs1A07qACPMPnSJSbnvpNO6QlwTUebyX+HfkmwtVvABQQbHZDCRY7TM2ZxKrfjpRcMefoKvFBNnAEXQ5+yaqB1DR6KqtNMiA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABA64OMCFP
e5Npls4BrNWLZxAAAAEAAAAAEAAABoAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz
dHAyNTYAAABBBJOQAybCeNyN8hosy1JkijKPinjc6bjnc2fTLPeqW8peke2leJ0BX4Y2qW
VsCosrbKCAxfczOcdqoNON/KXI66oAAACgLUAHoYzDkNo5SWA9suhczEYaHfIqaeZFs0gw
jYlayzsgrJxzdv3TlPl1rlondfigqahhbactALu3yBVT2oXdYZHUsx8gs+JIGUADJSeyxD
yX4jqnHnLvvVZHGIxeYks+eN5bKCRbJcqos/FtRyld1qvph4qBrN3q7QKt+yXEwNOOd8XX
QokcKqAyudYpWltTYol7o/SoIvXzkAO9Gus6Kg==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBJOQAybCeNyN8hosy1JkijKPinjc6bjnc2fTLPeqW8peke2leJ0BX4Y2qWVsCosrbKCAxfczOcdqoNON/KXI66o="
set source built-in
next
edit "Fortinet_SSH_ECDSA384"
set password ENC AAAAcDUrTs2VZb0+14ugUkLLsPuHlxDHzkt82HfoHgLVfHBnWfdnj9WGcp8ZuIRxfK0KvHHNTmejfP6fxvWNyNSH79sXC6mhaHSd35m1883nGMrYO/6f2ze1fwSg0Wx+D8DxiyeKm9ov+L5ZfCvf4gnf+hf9J3Yql78b5D0VPJCjEKikYp2Rgplu3fV5mbnjQHzMVA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBKEL3ZgeK/ZUf57qyNICLzzimHSXqU2a54bpzd4oNyD2WJobwwV62u5+eB2Gnlu1GAVmdtzLlS0NSf+RpA8jSfPLcnwBeK9vkQi5tQtiV4oE3XWCxKrqK77Yg6aHsVooXg=="
set source built-in
next
edit "Fortinet_SSH_ECDSA521"
set password ENC AAAAcEeXZ22dgqqzXRyXRg+OiIQOsh4odqDN/1MXkjwtcdtG6q6liXTcSjVl+RPLmZ8iW9TDnGOJrV7NVIyEC3sSACISZz4HI/JPO1beTWIlJeij74Hbxb9OMEtOe4gfDEsYR3vDSbz0tpiYepWAxIZo8u8yGcJ708xQovPg/RzBfgnSdtqQGBZ6iDC+llWbT0O5wQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAH2a4MtsDv3VPEIIldkzv/bPWo2Q5uA3T5NbqbUV4Hn3gLvbmi4oU8qv+US/soX0qXkCwNSR0KlPn9UgU7Mdm71iwDkbi2T7VU4ADCnMpJelNnUsqLt1hQ1sFuxbS+pMhGwdiYLAkzEOmQfyuelrUKjwB0StxUObPHGvZUw8Kav+ksHBA=="
set source built-in
next
edit "Fortinet_SSH_ED25519"
set password ENC BKhJcJoFM2BAfM7Wp2o1+BWPj48cadEhiskFU6yXL/4leHM6f2eFLyGG/iq0o3JF4nLag3K5G7GKrrJFOiz9Va15nz8lqvy0Ev5PAfqNS+sG1+wbTLz62/bnk6C4LJ6jpE78zDKJfQGOn430KpTmaywqyKJPlS1N0AsVM+yjRxlXncxvqociKAMw18pLy5bJDZbwOQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCgBIeFo6
xghBGBcYe4vMU8AAAAEAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAIPus8zX0PgyidU2u
pQTfL74JH7IaYD26wZWgZRYTShexAAAAkOtZdubVhuX25w5sdQW2nYahFORbzJ46yr8eZx
c055dhW4TqqB4FdrTy9i8iZu8jGwtcQzUXw0ijzGtDB5RdsI+ERYJL70IbWd7goaqiz+4n
KkeTkLB0MuecI9aWKJGEAHmeRGPDRrH+ha/U3Tst07vtNIVs8FUYdDYsjZ/9fY4baoREFe
ByGUmd56KnwLSSKg==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPus8zX0PgyidU2upQTfL74JH7IaYD26wZWgZRYTShex"
set source built-in
next
end
config firewall ssh local-ca
edit "Fortinet_SSH_CA"
set password ENC AAAAcNielOX0qOGfwqo0n4KBbe3O00/54AVocP5XCcAJoU7IXtylnFdI1lOTCiK6X0v4yCIkLFY1h1PImN44UJU6D/PFusCRlS4CLV/EMRWUnLbvVR6//fxVe1FYy59ArgazctPIE4iwEFViQhxVQw+kepnOwVeiJU6xvlNgux+6MHwPd7cBV8akEvdITKEQ52VzgQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqgVlQAiqaZQ8zHH2qYqCGfhuM4gTz6j7yv2qcgzqet9jwKx2drWFkKxm+gAvIsWSIl/5VcIIMgtjPFmqXjCNSyau7mVsowLBaoTH2Hm6G7Hg16yWsMrR8qBAia6kDGnrXt3IZJOYi1coViCUAUS/yjl9PY3f27z/azkE02ZQLcf4S+S+f/b6vQ8TQmphjZRBWaSIH45FuF/33TlYy66iXvCQB68cCEqkDeN9PuJ4cCA8OjvMLVyhCqhAOGzrfMsHbBP2cenbYP1ZR7DcR6STYMuMm1Sq8x82YUETfzCU9sFS4acqDicijz9swOA2DIhoLvGjgPyp4Vu5pLsGaIJb5"
set source built-in
next
edit "Fortinet_SSH_CA_Untrusted"
set password ENC AAAAcFbpgxTHyBsMVR6b+m0iCAF9YzXdUui5lpQL7/YnoPTksxgja4Xlu0agIoPd0hL/oXAdGCWe1BwN04maNEP/FsKfSeAP4YkYsRJqxQMdhmFNSKtj7iQ2DllQsZgE0v/wVwuMExwRZ10bJiMxO1UUDHUBeljFNQETAipbbjp4bqLf5G4fsLaBaRT95MN6trPPUA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDc4L/Xq/WvlKsH3YUJ464tDGVI3LjzLIxCSur75VKRgmUXFSWSZpeIgzJnGYBwIRa2H5M9venlHhJgoqZdHDVHC+uXuBvqlxkb7ZFB+xB69P0QWXZV5vEn8t1kxdD+azqWnoNxlyHaHDyL5AvBc9eV1pWPWAmtSdfnhE19ZSWwvI0PiVDc6xkgOwK86VJwoQp2wq+7MVx8tx7CILunJOVayJAARBguXTl6WmMoGKoxX8dQoyfPcrwNoQAcvDTDNOMgwNyClDzIkletnHmvY+OFhmPiB9Mfw6Gxu84J0Yrqm3aKcItc+UbxBNp8TuekZbwCRlvAq8U9rXvNki6aytkp"
set source built-in
next
end
config firewall ssh setting
set caname "Fortinet_SSH_CA"
set untrusted-caname "Fortinet_SSH_CA_Untrusted"
set hostkey-rsa2048 "Fortinet_SSH_RSA2048"
set hostkey-dsa1024 "Fortinet_SSH_DSA1024"
set hostkey-ecdsa256 "Fortinet_SSH_ECDSA256"
set hostkey-ecdsa384 "Fortinet_SSH_ECDSA384"
set hostkey-ecdsa521 "Fortinet_SSH_ECDSA521"
set hostkey-ed25519 "Fortinet_SSH_ED25519"
end
config firewall profile-protocol-options
edit "default"
set comment "All default services."
config http
set ports 80
unset options
unset post-lang
end
config ftp
set ports 21
set options splice
end
config imap
set ports 143
set options fragmail
end
config mapi
set ports 135
set options fragmail
end
config pop3
set ports 110
set options fragmail
end
config smtp
set ports 25
set options fragmail splice
end
config nntp
set ports 119
set options splice
end
config ssh
unset options
end
config dns
set ports 53
end
config cifs
set ports 445
unset options
end
next
end
config firewall ssl-ssh-profile
edit "deep-inspection"
set comment "Read-only deep inspection profile."
config https
set ports 443
set status deep-inspection
set unsupported-ssl-version allow
end
config ftps
set ports 990
set status deep-inspection
set unsupported-ssl-version allow
end
config imaps
set ports 993
set status deep-inspection
set unsupported-ssl-version allow
end
config pop3s
set ports 995
set status deep-inspection
set unsupported-ssl-version allow
end
config smtps
set ports 465
set status deep-inspection
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "custom-deep-inspection"
set comment "Customizable deep inspection profile."
config https
set ports 443
set status deep-inspection
set unsupported-ssl-version allow
end
config ftps
set ports 990
set status deep-inspection
set unsupported-ssl-version allow
end
config imaps
set ports 993
set status deep-inspection
set unsupported-ssl-version allow
end
config pop3s
set ports 995
set status deep-inspection
set unsupported-ssl-version allow
end
config smtps
set ports 465
set status deep-inspection
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "no-inspection"
set comment "Read-only profile that does no inspection."
config https
set status disable
set unsupported-ssl-version allow
end
config ftps
set status disable
set unsupported-ssl-version allow
end
config imaps
set status disable
set unsupported-ssl-version allow
end
config pop3s
set status disable
set unsupported-ssl-version allow
end
config smtps
set status disable
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
next
edit "certificate-inspection"
set comment "Read-only SSL handshake inspection profile."
config https
set ports 443
set status certificate-inspection
set unsupported-ssl-version allow
end
config ftps
set status disable
set unsupported-ssl-version allow
end
config imaps
set status disable
set unsupported-ssl-version allow
end
config pop3s
set status disable
set unsupported-ssl-version allow
end
config smtps
set status disable
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
next
end
config waf profile
edit "default"
config signature
config main-class 100000000
set action block
set severity high
end
config main-class 20000000
end
config main-class 30000000
set status enable
set action block
set severity high
end
config main-class 40000000
end
config main-class 50000000
set status enable
set action block
set severity high
end
config main-class 60000000
end
config main-class 70000000
set status enable
set action block
set severity high
end
config main-class 80000000
set status enable
set severity low
end
config main-class 110000000
set status enable
set severity high
end
config main-class 90000000
set status enable
set action block
set severity high
end
set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002
end
config constraint
config header-length
set status enable
set log enable
set severity low
end
config content-length
set status enable
set log enable
set severity low
end
config param-length
set status enable
set log enable
set severity low
end
config line-length
set status enable
set log enable
set severity low
end
config url-param-length
set status enable
set log enable
set severity low
end
config version
set log enable
end
config method
set action block
set log enable
end
config hostname
set action block
set log enable
end
config malformed
set log enable
end
config max-cookie
set status enable
set log enable
set severity low
end
config max-header-line
set status enable
set log enable
set severity low
end
config max-url-param
set status enable
set log enable
set severity low
end
config max-range-segment
set status enable
set log enable
set severity high
end
end
next
end
config firewall policy
edit 6
set name "DNS"
set uuid 5a24e5ec-9241-51ed-15ac-666c2e394042
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "Bali-Waste-Control" "IT Component"
set dstaddr "all"
set schedule "always"
set service "DNS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 1
set name "E2C"
set uuid 896f6458-5664-51ed-6d9e-03ca34b51665
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "AWS" "AWS1" "AWS2" "GCP" "Git"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 2
set name "Anydesk"
set uuid 3ffa284e-6ec4-51ed-1f0d-8f7296dbecc8
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component" "Bali-Waste-Control"
set dstaddr "Anydesk"
set schedule "always"
set service "HTTPS"
set nat enable
next
edit 3
set name "GLPI"
set uuid 811f2a98-744d-51ed-268a-644c6ce745b6
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "all"
set dstaddr "GLPI-Server"
set schedule "always"
set service "HTTP" "HTTPS"
set nat enable
next
edit 5
set status disable
set name "Temp-For-Engineer-Internet"
set uuid c7a0d630-8d69-51ed-a630-784d54eadadc
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 4
set name "ua access"
set uuid 6539345e-8811-51ed-d569-c0747bc778be
set srcintf "wan1"
set dstintf "E2C-LAN"
set action accept
set srcaddr "all"
set dstaddr "UA ACCESS- test"
set schedule "always"
set service "OPCUA"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 8
set name "BaliWasteControlWeb"
set uuid 85eefdfc-a096-51ee-6b8a-2dff4f2afb2f
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "Bali-Waste-Control"
set dstaddr "Utrust Domain"
set schedule "always"
set service "HTTP" "HTTPS" "DNS"
set nat enable
next
edit 9
set name "E2C MQTT"
set uuid 72ec5914-aa16-51ee-0f5b-33e0e68f9b34
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "Cloud Scada" "Cloud Scada2"
set schedule "always"
set service "MQTT"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set ips-sensor "default"
set application-list "default"
set nat enable
next
edit 10
set name "E2C Gmail Alarm"
set uuid 37b05a58-b0f6-51ee-3aa7-08956323862b
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "Bali-Waste-Control" "IT Component"
set dstaddr "gmail smtp"
set schedule "always"
set service "SMTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 11
set name "E2C U2484 to NTP Server"
set uuid cca1d790-b0f6-51ee-27b7-aa420e000698
set srcintf "E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "Bali-Waste-Control" "IT Component"
set dstaddr "time.google.com" "time.windows.com" "tw.ntp.org.cn"
set schedule "always"
set service "NTP"
set nat enable
next
end
config switch-controller security-policy 802-1X
edit "802-1X-policy-default"
set user-group "SSO_Guest_Users"
set mac-auth-bypass disable
set open-auth disable
set eap-passthru enable
set eap-auto-untagged-vlans enable
set guest-vlan disable
set auth-fail-vlan disable
set framevid-apply enable
set radius-timeout-overwrite disable
set authserver-timeout-vlan disable
next
end
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh
set internal-allowaccess https ping ssh
next
end
config switch-controller lldp-profile
edit "default"
set med-tlvs inventory-management network-policy location-identification
set auto-isl disable
config med-network-policy
edit "voice"
next
edit "voice-signaling"
next
edit "guest-voice"
next
edit "guest-voice-signaling"
next
edit "softphone-voice"
next
edit "video-conferencing"
next
edit "streaming-video"
next
edit "video-signaling"
next
end
config med-location-service
edit "coordinates"
next
edit "address-civic"
next
edit "elin-number"
next
end
next
edit "default-auto-isl"
next
edit "default-auto-mclag-icl"
set auto-mclag-icl enable
next
end
config switch-controller qos dot1p-map
edit "voice-dot1p"
set priority-0 queue-4
set priority-1 queue-4
set priority-2 queue-3
set priority-3 queue-2
set priority-4 queue-3
set priority-5 queue-1
set priority-6 queue-2
set priority-7 queue-2
next
end
config switch-controller qos ip-dscp-map
edit "voice-dscp"
config map
edit "1"
set cos-queue 1
set value 46
next
edit "2"
set cos-queue 2
set value 24,26,48,56
next
edit "5"
set cos-queue 3
set value 34
next
end
next
end
config switch-controller qos queue-policy
edit "default"
set schedule round-robin
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
next
edit "queue-2"
next
edit "queue-3"
next
edit "queue-4"
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
edit "voice-egress"
set schedule weighted
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
set weight 0
next
edit "queue-2"
set weight 6
next
edit "queue-3"
set weight 37
next
edit "queue-4"
set weight 12
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
end
config switch-controller qos qos-policy
edit "default"
next
edit "voice-qos"
set trust-dot1p-map "voice-dot1p"
set trust-ip-dscp-map "voice-dscp"
set queue-policy "voice-egress"
next
end
config switch-controller storm-control-policy
edit "default"
set description "default storm control on all port"
next
edit "auto-config"
set description "storm control policy for fortilink-isl-icl port"
set storm-control-mode disabled
next
end
config switch-controller auto-config policy
edit "pse"
next
edit "default"
next
edit "default-icl"
set poe-status disable
set igmp-flood-report enable
set igmp-flood-traffic enable
next
end
config switch-controller initial-config template
edit "_default"
set vlanid 1
next
edit "quarantine"
set vlanid 4093
set dhcp-server enable
next
edit "rspan"
set vlanid 4092
set dhcp-server enable
next
edit "voice"
set vlanid 4091
next
edit "video"
set vlanid 4090
next
edit "onboarding"
set vlanid 4089
next
edit "nac_segment"
set vlanid 4088
set dhcp-server enable
next
end
config switch-controller switch-profile
edit "default"
next
end
config switch-controller ptp settings
set mode disable
end
config switch-controller ptp policy
edit "default"
set status enable
next
end
config switch-controller remote-log
edit "syslogd"
next
edit "syslogd2"
next
end
config wireless-controller setting
set darrp-optimize-schedules "default-darrp-optimize"
end
config wireless-controller arrp-profile
edit "arrp-default"
next
end
config wireless-controller wids-profile
edit "default"
set comment "Default WIDS profile."
set ap-scan enable
set ap-bgscan-intv 1
set ap-bgscan-duration 20
set ap-bgscan-idle 0
set wireless-bridge enable
set deauth-broadcast enable
set null-ssid-probe-resp enable
set long-duration-attack enable
set invalid-mac-oui enable
set weak-wep-iv enable
set auth-frame-flood enable
set assoc-frame-flood enable
set spoofed-deauth enable
set asleap-attack enable
set eapol-start-flood enable
set eapol-logoff-flood enable
set eapol-succ-flood enable
set eapol-fail-flood enable
set eapol-pre-succ-flood enable
set eapol-pre-fail-flood enable
next
edit "default-wids-apscan-enabled"
set ap-scan enable
set ap-bgscan-intv 1
set ap-bgscan-duration 20
set ap-bgscan-idle 0
next
end
config wireless-controller ble-profile
edit "fortiap-discovery"
set advertising ibeacon eddystone-uid eddystone-url
set ibeacon-uuid "wtp-uuid"
next
end
config router rip
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ripng
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router static
edit 1
set gateway 61.220.103.254
set device "wan1"
next
end
config router ospf
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ospf6
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router bgp
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "static"
end
config redistribute "isis"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "static"
end
config redistribute6 "isis"
end
end
config router isis
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "static"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "bgp"
end
config redistribute6 "static"
end
end
config router multicast
end
(1-1/6)