專案

一般

配置概況

檔案 » HBB-ShuLin-Firewall-E2C-IT_7-2_1396_202401121126.conf

E2C_IT_Firewall_BackupFile_20240112_SL - 俊霖 江, 2024-01-12 16:50

 
#config-version=FGT60E-7.2.4-FW-build1396-230131:opmode=0:vdom=0:user=B10013
#conf_file_ver=2291386527781762
#buildno=1396
#global_vdom=1
config system global
set admin-server-cert "wildcard.tahoho.com.tw.crt"
set admin-sport 8443
set alias "FGT60ETK19074362"
set gui-certificates enable
set gui-device-latitude "23.885837699862"
set gui-device-longitude "122.16796875"
set hostname "HBB-ShuLin-Firewall-E2C-IT"
set language trach
set switch-controller enable
set timezone 59
set wifi-certificate "wildcard.tahoho.com.tw.crt"
end
config system accprofile
edit "prof_admin"
set secfabgrp read-write
set ftviewgrp read-write
set authgrp read-write
set sysgrp read-write
set netgrp read-write
set loggrp read-write
set fwgrp read-write
set vpngrp read-write
set utmgrp read-write
set wifi read-write
next
end
config system npu
end
config system interface
edit "wan1"
set vdom "root"
set ip 60.251.157.99 255.255.255.0
set allowaccess ping https http fgfm
set type physical
set role wan
set snmp-index 1
next
edit "wan2"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set role wan
set snmp-index 2
next
edit "dmz"
set vdom "root"
set ip 10.10.10.1 255.255.255.0
set allowaccess ping https http fgfm
set type physical
set role dmz
set snmp-index 3
next
edit "internal1"
set vdom "root"
set type physical
set snmp-index 7
next
edit "internal2"
set vdom "root"
set type physical
set snmp-index 8
next
edit "internal3"
set vdom "root"
set type physical
set snmp-index 9
next
edit "internal4"
set vdom "root"
set type physical
set snmp-index 10
next
edit "internal5"
set vdom "root"
set type physical
set snmp-index 11
next
edit "internal6"
set vdom "root"
set type physical
set snmp-index 12
next
edit "internal7"
set vdom "root"
set type physical
set snmp-index 13
next
edit "modem"
set vdom "root"
set mode pppoe
set status down
set type physical
set snmp-index 4
next
edit "naf.root"
set vdom "root"
set type tunnel
set src-check disable
set snmp-index 14
next
edit "l2t.root"
set vdom "root"
set type tunnel
set snmp-index 15
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 5
next
edit "internal"
set vdom "root"
set ip 192.167.3.99 255.255.255.0
set allowaccess ping https ssh http fgfm
set type hard-switch
set stp enable
set device-identification enable
set role lan
set snmp-index 6
next
end
config system physical-switch
edit "sw0"
set age-val 0
next
end
config system virtual-switch
edit "internal"
set physical-switch "sw0"
config port
edit "internal1"
next
edit "internal2"
next
edit "internal3"
next
edit "internal4"
next
edit "internal5"
next
edit "internal6"
next
edit "internal7"
next
end
next
end
config system custom-language
edit "en"
set filename "en"
next
edit "fr"
set filename "fr"
next
edit "sp"
set filename "sp"
next
edit "pg"
set filename "pg"
next
edit "x-sjis"
set filename "x-sjis"
next
edit "big5"
set filename "big5"
next
edit "GB2312"
set filename "GB2312"
next
edit "euc-kr"
set filename "euc-kr"
next
end
config system admin
edit "admin"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Main"
config widget
edit 1
set x-pos 1
set y-pos 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 2
set y-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 3
set y-pos 1
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 4
set y-pos 1
set width 1
set height 1
next
edit 5
set x-pos 5
set y-pos 1
set width 1
set height 1
next
edit 6
set type admins
set x-pos 6
set y-pos 1
set width 1
set height 1
next
edit 7
set type cpu-usage
set x-pos 7
set y-pos 1
set width 2
set height 1
next
edit 8
set type memory-usage
set x-pos 8
set y-pos 1
set width 2
set height 1
next
edit 9
set type sessions
set x-pos 9
set y-pos 1
set width 2
set height 1
next
end
next
edit 2
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 3
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 4
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 6
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "all"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "all"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "all"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "all"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "all"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 7
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 12
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set password ENC SH2o/z611euQdFhYSulB6gnUXDDGNytiw8URJugJCVDh6yNe02OWVTiGs2lJ0Q=
next
edit "coleman.chen"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
set remote-group "RemoteUserGroup"
set password ENC SH2sd68+DvLASurXnM52YwbrSQQIL5ndniKpd2WIfZERGP90ZuGFuGVLP/bfnY=
next
edit "B10013"
set remote-auth enable
set accprofile "super_admin"
set comments "江俊霖"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
set csf-device "FGT60ETK19074362::root"
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set remote-group "RemoteUserGroup"
set password ENC SH22BpFVl85Ep1MhBtP5fLhU66ZvR2pXYdQ+Cd04mnGvc+X+gzP0P0vHnWj6QU=
next
edit "itservice"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set password ENC SH26O9f01StblY9LsVUAkZckwC4xGyBLtFxMWkApmVBVSXlS0gwYTIXCGHoAzc=
next
end
config system sso-admin
end
config system ha
set override disable
end
config system dns
set primary 168.95.1.1
set secondary 8.8.8.8
end
config system replacemsg-image
edit "logo_fnet"
set image-type gif
next
edit "logo_fguard_wf"
set image-type gif
next
edit "logo_v3_fguard_app"
next
edit "logo_fw_auth"
set image-base64 ''
next
edit "logo_v2_fnet"
set image-base64 ''
next
edit "logo_v2_fguard_wf"
set image-base64 ''
next
edit "logo_v2_fguard_app"
set image-base64 ''
next
end
config system replacemsg mail "partial"
end
config system replacemsg http "url-block"
end
config system replacemsg http "urlfilter-err"
end
config system replacemsg http "infcache-block"
end
config system replacemsg http "http-contenttypeblock"
end
config system replacemsg http "https-invalid-cert-block"
end
config system replacemsg http "https-untrusted-cert-block"
end
config system replacemsg http "https-blocklisted-cert-block"
end
config system replacemsg http "switching-protocols-block"
end
config system replacemsg http "http-antiphish-block"
end
config system replacemsg http "videofilter-block"
end
config system replacemsg webproxy "deny"
end
config system replacemsg webproxy "user-limit"
end
config system replacemsg webproxy "auth-challenge"
end
config system replacemsg webproxy "auth-login-fail"
end
config system replacemsg webproxy "auth-group-info-fail"
end
config system replacemsg webproxy "http-err"
end
config system replacemsg webproxy "auth-ip-blackout"
end
config system replacemsg webproxy "ztna-block"
end
config system replacemsg ftp "ftp-explicit-banner"
end
config system replacemsg fortiguard-wf "ftgd-block"
end
config system replacemsg fortiguard-wf "ftgd-ovrd"
end
config system replacemsg fortiguard-wf "ftgd-quota"
end
config system replacemsg fortiguard-wf "ftgd-warning"
end
config system replacemsg spam "ipblocklist"
end
config system replacemsg spam "smtp-spam-dnsbl"
end
config system replacemsg spam "smtp-spam-feip"
end
config system replacemsg spam "smtp-spam-helo"
end
config system replacemsg spam "smtp-spam-emailblock-to"
end
config system replacemsg spam "smtp-spam-emailblock-from"
end
config system replacemsg spam "smtp-spam-emailblock-subject"
end
config system replacemsg spam "smtp-spam-mimeheader"
end
config system replacemsg spam "reversedns"
end
config system replacemsg spam "smtp-spam-ase"
end
config system replacemsg spam "submit"
end
config system replacemsg alertmail "alertmail-virus"
end
config system replacemsg alertmail "alertmail-block"
end
config system replacemsg alertmail "alertmail-nids-event"
end
config system replacemsg alertmail "alertmail-crit-event"
end
config system replacemsg alertmail "alertmail-disk-full"
end
config system replacemsg admin "pre_admin-disclaimer-text"
end
config system replacemsg admin "post_admin-disclaimer-text"
end
config system replacemsg auth "auth-disclaimer-page-1"
end
config system replacemsg auth "auth-disclaimer-page-2"
end
config system replacemsg auth "auth-disclaimer-page-3"
end
config system replacemsg auth "auth-proxy-reject-page"
end
config system replacemsg auth "auth-reject-page"
end
config system replacemsg auth "auth-login-page"
end
config system replacemsg auth "auth-login-failed-page"
end
config system replacemsg auth "auth-token-login-page"
end
config system replacemsg auth "auth-token-login-failed-page"
end
config system replacemsg auth "auth-success-msg"
end
config system replacemsg auth "auth-challenge-page"
end
config system replacemsg auth "auth-keepalive-page"
end
config system replacemsg auth "auth-portal-page"
end
config system replacemsg auth "auth-password-page"
end
config system replacemsg auth "auth-fortitoken-page"
end
config system replacemsg auth "auth-next-fortitoken-page"
end
config system replacemsg auth "auth-email-token-page"
end
config system replacemsg auth "auth-sms-token-page"
end
config system replacemsg auth "auth-email-harvesting-page"
end
config system replacemsg auth "auth-email-failed-page"
end
config system replacemsg auth "auth-cert-passwd-page"
end
config system replacemsg auth "auth-guest-print-page"
end
config system replacemsg auth "auth-guest-email-page"
end
config system replacemsg auth "auth-success-page"
end
config system replacemsg auth "auth-block-notification-page"
end
config system replacemsg auth "auth-quarantine-page"
end
config system replacemsg auth "auth-qtn-reject-page"
end
config system replacemsg auth "auth-saml-page"
end
config system replacemsg sslvpn "sslvpn-login"
end
config system replacemsg sslvpn "sslvpn-header"
end
config system replacemsg sslvpn "sslvpn-limit"
end
config system replacemsg sslvpn "hostcheck-error"
end
config system replacemsg sslvpn "sslvpn-provision-user"
end
config system replacemsg sslvpn "sslvpn-provision-user-sms"
end
config system replacemsg nac-quar "nac-quar-virus"
end
config system replacemsg nac-quar "nac-quar-dos"
end
config system replacemsg nac-quar "nac-quar-ips"
end
config system replacemsg nac-quar "nac-quar-dlp"
end
config system replacemsg nac-quar "nac-quar-admin"
end
config system replacemsg nac-quar "nac-quar-app"
end
config system replacemsg traffic-quota "per-ip-shaper-block"
end
config system replacemsg utm "virus-html"
end
config system replacemsg utm "client-virus-html"
end
config system replacemsg utm "virus-text"
end
config system replacemsg utm "dlp-html"
end
config system replacemsg utm "dlp-text"
end
config system replacemsg utm "appblk-html"
end
config system replacemsg utm "ipsblk-html"
end
config system replacemsg utm "ipsfail-html"
end
config system replacemsg utm "exe-text"
end
config system replacemsg utm "waf-html"
end
config system replacemsg utm "outbreak-prevention-html"
end
config system replacemsg utm "outbreak-prevention-text"
end
config system replacemsg utm "external-blocklist-html"
end
config system replacemsg utm "external-blocklist-text"
end
config system replacemsg utm "ems-threat-feed-html"
end
config system replacemsg utm "ems-threat-feed-text"
end
config system replacemsg utm "file-filter-html"
end
config system replacemsg utm "file-filter-text"
end
config system replacemsg utm "file-size-text"
end
config system replacemsg utm "transfer-size-text"
end
config system replacemsg utm "internal-error-text"
end
config system replacemsg utm "archive-block-html"
end
config system replacemsg utm "archive-block-text"
end
config system replacemsg utm "file-av-fail-text"
end
config system replacemsg utm "transfer-av-fail-text"
end
config system replacemsg utm "banned-word-html"
end
config system replacemsg utm "banned-word-text"
end
config system replacemsg utm "block-html"
end
config system replacemsg utm "block-text"
end
config system replacemsg utm "decompress-limit-text"
end
config system replacemsg utm "dlp-subject-text"
end
config system replacemsg utm "file-size-html"
end
config system replacemsg utm "client-file-size-html"
end
config system replacemsg utm "inline-scan-timeout-html"
end
config system replacemsg utm "inline-scan-timeout-text"
end
config system replacemsg utm "inline-scan-error-html"
end
config system replacemsg utm "inline-scan-error-text"
end
config system replacemsg utm "icap-block-text"
end
config system replacemsg utm "icap-error-text"
end
config system replacemsg utm "icap-http-error"
end
config system replacemsg icap "icap-req-resp"
end
config system replacemsg automation "automation-email"
end
config system snmp sysinfo
end
config system central-management
set type fortiguard
end
config firewall internet-service-name
edit "Google-Other"
set internet-service-id 65536
next
edit "Google-Web"
set internet-service-id 65537
next
edit "Google-DNS"
set internet-service-id 65539
next
edit "Google-Outbound_Email"
set internet-service-id 65540
next
edit "Google-SSH"
set internet-service-id 65542
next
edit "Google-FTP"
set internet-service-id 65543
next
edit "Google-NTP"
set internet-service-id 65544
next
edit "Google-Inbound_Email"
set internet-service-id 65545
next
edit "Google-LDAP"
set internet-service-id 65550
next
edit "Google-NetBIOS.Session.Service"
set internet-service-id 65551
next
edit "Google-RTMP"
set internet-service-id 65552
next
edit "Google-NetBIOS.Name.Service"
set internet-service-id 65560
next
edit "Google-Gmail"
set internet-service-id 65646
next
edit "Meta-Other"
set internet-service-id 131072
next
edit "Meta-Web"
set internet-service-id 131073
next
edit "Meta-DNS"
set internet-service-id 131075
next
edit "Meta-Outbound_Email"
set internet-service-id 131076
next
edit "Meta-FTP"
set internet-service-id 131079
next
edit "Meta-NetBIOS.Session.Service"
set internet-service-id 131087
next
edit "Meta-NetBIOS.Name.Service"
set internet-service-id 131096
next
edit "Apple-Other"
set internet-service-id 196608
next
edit "Apple-Web"
set internet-service-id 196609
next
edit "Apple-DNS"
set internet-service-id 196611
next
edit "Apple-Outbound_Email"
set internet-service-id 196612
next
edit "Apple-SSH"
set internet-service-id 196614
next
edit "Apple-FTP"
set internet-service-id 196615
next
edit "Apple-NTP"
set internet-service-id 196616
next
edit "Apple-Inbound_Email"
set internet-service-id 196617
next
edit "Apple-NetBIOS.Session.Service"
set internet-service-id 196623
next
edit "Apple-NetBIOS.Name.Service"
set internet-service-id 196632
next
edit "Yahoo-Other"
set internet-service-id 262144
next
edit "Yahoo-Web"
set internet-service-id 262145
next
edit "Yahoo-DNS"
set internet-service-id 262147
next
edit "Yahoo-Outbound_Email"
set internet-service-id 262148
next
edit "Yahoo-SSH"
set internet-service-id 262150
next
edit "Yahoo-FTP"
set internet-service-id 262151
next
edit "Yahoo-NTP"
set internet-service-id 262152
next
edit "Yahoo-Inbound_Email"
set internet-service-id 262153
next
edit "Yahoo-LDAP"
set internet-service-id 262158
next
edit "Yahoo-NetBIOS.Session.Service"
set internet-service-id 262159
next
edit "Yahoo-RTMP"
set internet-service-id 262160
next
edit "Yahoo-NetBIOS.Name.Service"
set internet-service-id 262168
next
edit "Microsoft-Other"
set internet-service-id 327680
next
edit "Microsoft-Web"
set internet-service-id 327681
next
edit "Microsoft-DNS"
set internet-service-id 327683
next
edit "Microsoft-Outbound_Email"
set internet-service-id 327684
next
edit "Microsoft-SSH"
set internet-service-id 327686
next
edit "Microsoft-FTP"
set internet-service-id 327687
next
edit "Microsoft-NTP"
set internet-service-id 327688
next
edit "Microsoft-Inbound_Email"
set internet-service-id 327689
next
edit "Microsoft-NetBIOS.Session.Service"
set internet-service-id 327695
next
edit "Microsoft-RTMP"
set internet-service-id 327696
next
edit "Microsoft-NetBIOS.Name.Service"
set internet-service-id 327704
next
edit "Microsoft-Skype_Teams"
set internet-service-id 327781
next
edit "Microsoft-Office365"
set internet-service-id 327782
next
edit "Amazon-Other"
set internet-service-id 393216
next
edit "Amazon-Web"
set internet-service-id 393217
next
edit "Amazon-DNS"
set internet-service-id 393219
next
edit "Amazon-Outbound_Email"
set internet-service-id 393220
next
edit "Amazon-SSH"
set internet-service-id 393222
next
edit "Amazon-FTP"
set internet-service-id 393223
next
edit "Amazon-NTP"
set internet-service-id 393224
next
edit "Amazon-Inbound_Email"
set internet-service-id 393225
next
edit "Amazon-LDAP"
set internet-service-id 393230
next
edit "Amazon-NetBIOS.Session.Service"
set internet-service-id 393231
next
edit "Amazon-RTMP"
set internet-service-id 393232
next
edit "Amazon-NetBIOS.Name.Service"
set internet-service-id 393240
next
edit "eBay-Web"
set internet-service-id 458753
next
edit "eBay-DNS"
set internet-service-id 458755
next
edit "eBay-Outbound_Email"
set internet-service-id 458756
next
edit "eBay-NetBIOS.Name.Service"
set internet-service-id 458776
next
edit "PayPal-Web"
set internet-service-id 524289
next
edit "Salesforce-Other"
set internet-service-id 655360
next
edit "Salesforce-Web"
set internet-service-id 655361
next
edit "Salesforce-DNS"
set internet-service-id 655363
next
edit "Salesforce-Outbound_Email"
set internet-service-id 655364
next
edit "Salesforce-NetBIOS.Session.Service"
set internet-service-id 655375
next
edit "Dropbox-Web"
set internet-service-id 720897
next
edit "Dropbox-DNS"
set internet-service-id 720899
next
edit "Dropbox-NetBIOS.Name.Service"
set internet-service-id 720920
next
edit "Netflix-Web"
set internet-service-id 786433
next
edit "Netflix-DNS"
set internet-service-id 786435
next
edit "LinkedIn-Other"
set internet-service-id 851968
next
edit "LinkedIn-Web"
set internet-service-id 851969
next
edit "LinkedIn-DNS"
set internet-service-id 851971
next
edit "LinkedIn-Outbound_Email"
set internet-service-id 851972
next
edit "LinkedIn-NetBIOS.Name.Service"
set internet-service-id 851992
next
edit "Adobe-Web"
set internet-service-id 917505
next
edit "Adobe-DNS"
set internet-service-id 917507
next
edit "Adobe-Outbound_Email"
set internet-service-id 917508
next
edit "Adobe-FTP"
set internet-service-id 917511
next
edit "Adobe-NetBIOS.Session.Service"
set internet-service-id 917519
next
edit "Adobe-RTMP"
set internet-service-id 917520
next
edit "Adobe-NetBIOS.Name.Service"
set internet-service-id 917528
next
edit "Hulu-Web"
set internet-service-id 1048577
next
edit "Pinterest-Web"
set internet-service-id 1114113
next
edit "Pinterest-DNS"
set internet-service-id 1114115
next
edit "Pinterest-Outbound_Email"
set internet-service-id 1114116
next
edit "LogMeIn-Web"
set internet-service-id 1179649
next
edit "LogMeIn-Outbound_Email"
set internet-service-id 1179652
next
edit "Fortinet-Other"
set internet-service-id 1245184
next
edit "Fortinet-Web"
set internet-service-id 1245185
next
edit "Fortinet-DNS"
set internet-service-id 1245187
next
edit "Fortinet-Outbound_Email"
set internet-service-id 1245188
next
edit "Fortinet-FTP"
set internet-service-id 1245191
next
edit "Fortinet-NTP"
set internet-service-id 1245192
next
edit "Fortinet-Inbound_Email"
set internet-service-id 1245193
next
edit "Fortinet-LDAP"
set internet-service-id 1245198
next
edit "Fortinet-NetBIOS.Name.Service"
set internet-service-id 1245208
next
edit "Fortinet-FortiGuard"
set internet-service-id 1245324
next
edit "Kaspersky-Web"
set internet-service-id 1310721
next
edit "Kaspersky-DNS"
set internet-service-id 1310723
next
edit "Kaspersky-Outbound_Email"
set internet-service-id 1310724
next
edit "Kaspersky-FTP"
set internet-service-id 1310727
next
edit "McAfee-Other"
set internet-service-id 1376256
next
edit "McAfee-Web"
set internet-service-id 1376257
next
edit "McAfee-DNS"
set internet-service-id 1376259
next
edit "McAfee-Outbound_Email"
set internet-service-id 1376260
next
edit "McAfee-FTP"
set internet-service-id 1376263
next
edit "McAfee-NTP"
set internet-service-id 1376264
next
edit "McAfee-NetBIOS.Name.Service"
set internet-service-id 1376280
next
edit "Symantec-Other"
set internet-service-id 1441792
next
edit "Symantec-Web"
set internet-service-id 1441793
next
edit "Symantec-DNS"
set internet-service-id 1441795
next
edit "Symantec-Outbound_Email"
set internet-service-id 1441796
next
edit "Symantec-SSH"
set internet-service-id 1441798
next
edit "Symantec-FTP"
set internet-service-id 1441799
next
edit "Symantec-NTP"
set internet-service-id 1441800
next
edit "Symantec-LDAP"
set internet-service-id 1441806
next
edit "Symantec-NetBIOS.Name.Service"
set internet-service-id 1441816
next
edit "AOL-Other"
set internet-service-id 1572864
next
edit "AOL-Web"
set internet-service-id 1572865
next
edit "AOL-DNS"
set internet-service-id 1572867
next
edit "AOL-Outbound_Email"
set internet-service-id 1572868
next
edit "AOL-SSH"
set internet-service-id 1572870
next
edit "AOL-NTP"
set internet-service-id 1572872
next
edit "AOL-Inbound_Email"
set internet-service-id 1572873
next
edit "AOL-LDAP"
set internet-service-id 1572878
next
edit "AOL-NetBIOS.Session.Service"
set internet-service-id 1572879
next
edit "AOL-NetBIOS.Name.Service"
set internet-service-id 1572888
next
edit "RealNetworks-Web"
set internet-service-id 1638401
next
edit "RealNetworks-DNS"
set internet-service-id 1638403
next
edit "RealNetworks-Outbound_Email"
set internet-service-id 1638404
next
edit "Zoho-Web"
set internet-service-id 1703937
next
edit "Zoho-Outbound_Email"
set internet-service-id 1703940
next
edit "Zoho-Inbound_Email"
set internet-service-id 1703945
next
edit "Cisco-Web"
set internet-service-id 1966081
next
edit "Cisco-DNS"
set internet-service-id 1966083
next
edit "Cisco-Outbound_Email"
set internet-service-id 1966084
next
edit "Cisco-SSH"
set internet-service-id 1966086
next
edit "Cisco-FTP"
set internet-service-id 1966087
next
edit "Cisco-NTP"
set internet-service-id 1966088
next
edit "Cisco-NetBIOS.Session.Service"
set internet-service-id 1966095
next
edit "IBM-Web"
set internet-service-id 2031617
next
edit "IBM-DNS"
set internet-service-id 2031619
next
edit "IBM-Outbound_Email"
set internet-service-id 2031620
next
edit "IBM-SSH"
set internet-service-id 2031622
next
edit "IBM-FTP"
set internet-service-id 2031623
next
edit "IBM-NetBIOS.Name.Service"
set internet-service-id 2031640
next
edit "Citrix-Web"
set internet-service-id 2097153
next
edit "Citrix-DNS"
set internet-service-id 2097155
next
edit "Citrix-Outbound_Email"
set internet-service-id 2097156
next
edit "Citrix-NetBIOS.Name.Service"
set internet-service-id 2097176
next
edit "Twitter-Other"
set internet-service-id 2162688
next
edit "Twitter-Web"
set internet-service-id 2162689
next
edit "Twitter-Outbound_Email"
set internet-service-id 2162692
next
edit "Twitter-NetBIOS.Name.Service"
set internet-service-id 2162712
next
edit "VK-Other"
set internet-service-id 2424832
next
edit "VK-Web"
set internet-service-id 2424833
next
edit "VK-DNS"
set internet-service-id 2424835
next
edit "VK-Outbound_Email"
set internet-service-id 2424836
next
edit "VK-NetBIOS.Name.Service"
set internet-service-id 2424856
next
edit "Ask-Web"
set internet-service-id 2621441
next
edit "Ask-DNS"
set internet-service-id 2621443
next
edit "CNN-Web"
set internet-service-id 2686977
next
edit "CNN-DNS"
set internet-service-id 2686979
next
edit "CNN-Outbound_Email"
set internet-service-id 2686980
next
edit "CNN-FTP"
set internet-service-id 2686983
next
edit "CNN-NetBIOS.Name.Service"
set internet-service-id 2687000
next
edit "Myspace-Web"
set internet-service-id 2752513
next
edit "Myspace-DNS"
set internet-service-id 2752515
next
edit "Myspace-NetBIOS.Name.Service"
set internet-service-id 2752536
next
edit "Tor-Relay.Node"
set internet-service-id 2818238
next
edit "Google-ICMP"
set internet-service-id 65538
next
edit "Google-Google.Cloud"
set internet-service-id 65641
next
edit "Google-Google.Bot"
set internet-service-id 65643
next
edit "Meta-ICMP"
set internet-service-id 131074
next
edit "Meta-SSH"
set internet-service-id 131078
next
edit "Meta-NTP"
set internet-service-id 131080
next
edit "Meta-Inbound_Email"
set internet-service-id 131081
next
edit "Meta-LDAP"
set internet-service-id 131086
next
edit "Meta-RTMP"
set internet-service-id 131088
next
edit "Meta-Whatsapp"
set internet-service-id 131184
next
edit "Meta-Instagram"
set internet-service-id 131189
next
edit "Apple-ICMP"
set internet-service-id 196610
next
edit "Apple-LDAP"
set internet-service-id 196622
next
edit "Apple-RTMP"
set internet-service-id 196624
next
edit "Apple-App.Store"
set internet-service-id 196723
next
edit "Apple-APNs"
set internet-service-id 196747
next
edit "Yahoo-ICMP"
set internet-service-id 262146
next
edit "Microsoft-ICMP"
set internet-service-id 327682
next
edit "Microsoft-LDAP"
set internet-service-id 327694
next
edit "Microsoft-Azure"
set internet-service-id 327786
next
edit "Microsoft-Bing.Bot"
set internet-service-id 327788
next
edit "Microsoft-Outlook"
set internet-service-id 327791
next
edit "Microsoft-Microsoft.Update"
set internet-service-id 327793
next
edit "Microsoft-Dynamics"
set internet-service-id 327837
next
edit "Microsoft-WNS"
set internet-service-id 327839
next
edit "Microsoft-Office365.Published"
set internet-service-id 327880
next
edit "Microsoft-Intune"
set internet-service-id 327886
next
edit "Microsoft-Office365.Published.Optimize"
set internet-service-id 327902
next
edit "Microsoft-Office365.Published.Allow"
set internet-service-id 327903
next
edit "Microsoft-Office365.Published.USGOV"
set internet-service-id 327917
next
edit "Amazon-ICMP"
set internet-service-id 393218
next
edit "Amazon-AWS"
set internet-service-id 393320
next
edit "Amazon-AWS.WorkSpaces.Gateway"
set internet-service-id 393403
next
edit "Amazon-Twitch"
set internet-service-id 393446
next
edit "Amazon-AWS.GovCloud.US"
set internet-service-id 393452
next
edit "eBay-Other"
set internet-service-id 458752
next
edit "eBay-ICMP"
set internet-service-id 458754
next
edit "eBay-SSH"
set internet-service-id 458758
next
edit "eBay-FTP"
set internet-service-id 458759
next
edit "eBay-NTP"
set internet-service-id 458760
next
edit "eBay-Inbound_Email"
set internet-service-id 458761
next
edit "eBay-LDAP"
set internet-service-id 458766
next
edit "eBay-NetBIOS.Session.Service"
set internet-service-id 458767
next
edit "eBay-RTMP"
set internet-service-id 458768
next
edit "PayPal-Other"
set internet-service-id 524288
next
edit "PayPal-ICMP"
set internet-service-id 524290
next
edit "PayPal-DNS"
set internet-service-id 524291
next
edit "PayPal-Outbound_Email"
set internet-service-id 524292
next
edit "PayPal-SSH"
set internet-service-id 524294
next
edit "PayPal-FTP"
set internet-service-id 524295
next
edit "PayPal-NTP"
set internet-service-id 524296
next
edit "PayPal-Inbound_Email"
set internet-service-id 524297
next
edit "PayPal-LDAP"
set internet-service-id 524302
next
edit "PayPal-NetBIOS.Session.Service"
set internet-service-id 524303
next
edit "PayPal-RTMP"
set internet-service-id 524304
next
edit "PayPal-NetBIOS.Name.Service"
set internet-service-id 524312
next
edit "Box-Other"
set internet-service-id 589824
next
edit "Box-Web"
set internet-service-id 589825
next
edit "Box-ICMP"
set internet-service-id 589826
next
edit "Box-DNS"
set internet-service-id 589827
next
edit "Box-Outbound_Email"
set internet-service-id 589828
next
edit "Box-SSH"
set internet-service-id 589830
next
edit "Box-FTP"
set internet-service-id 589831
next
edit "Box-NTP"
set internet-service-id 589832
next
edit "Box-Inbound_Email"
set internet-service-id 589833
next
edit "Box-LDAP"
set internet-service-id 589838
next
edit "Box-NetBIOS.Session.Service"
set internet-service-id 589839
next
edit "Box-RTMP"
set internet-service-id 589840
next
edit "Box-NetBIOS.Name.Service"
set internet-service-id 589848
next
edit "Salesforce-ICMP"
set internet-service-id 655362
next
edit "Salesforce-SSH"
set internet-service-id 655366
next
edit "Salesforce-FTP"
set internet-service-id 655367
next
edit "Salesforce-NTP"
set internet-service-id 655368
next
edit "Salesforce-Inbound_Email"
set internet-service-id 655369
next
edit "Salesforce-LDAP"
set internet-service-id 655374
next
edit "Salesforce-RTMP"
set internet-service-id 655376
next
edit "Salesforce-NetBIOS.Name.Service"
set internet-service-id 655384
next
edit "Salesforce-Email.Relay"
set internet-service-id 655530
next
edit "Dropbox-Other"
set internet-service-id 720896
next
edit "Dropbox-ICMP"
set internet-service-id 720898
next
edit "Dropbox-Outbound_Email"
set internet-service-id 720900
next
edit "Dropbox-SSH"
set internet-service-id 720902
next
edit "Dropbox-FTP"
set internet-service-id 720903
next
edit "Dropbox-NTP"
set internet-service-id 720904
next
edit "Dropbox-Inbound_Email"
set internet-service-id 720905
next
edit "Dropbox-LDAP"
set internet-service-id 720910
next
edit "Dropbox-NetBIOS.Session.Service"
set internet-service-id 720911
next
edit "Dropbox-RTMP"
set internet-service-id 720912
next
edit "Netflix-Other"
set internet-service-id 786432
next
edit "Netflix-ICMP"
set internet-service-id 786434
next
edit "Netflix-Outbound_Email"
set internet-service-id 786436
next
edit "Netflix-SSH"
set internet-service-id 786438
next
edit "Netflix-FTP"
set internet-service-id 786439
next
edit "Netflix-NTP"
set internet-service-id 786440
next
edit "Netflix-Inbound_Email"
set internet-service-id 786441
next
edit "Netflix-LDAP"
set internet-service-id 786446
next
edit "Netflix-NetBIOS.Session.Service"
set internet-service-id 786447
next
edit "Netflix-RTMP"
set internet-service-id 786448
next
edit "Netflix-NetBIOS.Name.Service"
set internet-service-id 786456
next
edit "LinkedIn-ICMP"
set internet-service-id 851970
next
edit "LinkedIn-SSH"
set internet-service-id 851974
next
edit "LinkedIn-FTP"
set internet-service-id 851975
next
edit "LinkedIn-NTP"
set internet-service-id 851976
next
edit "LinkedIn-Inbound_Email"
set internet-service-id 851977
next
edit "LinkedIn-LDAP"
set internet-service-id 851982
next
edit "LinkedIn-NetBIOS.Session.Service"
set internet-service-id 851983
next
edit "LinkedIn-RTMP"
set internet-service-id 851984
next
edit "Adobe-Other"
set internet-service-id 917504
next
edit "Adobe-ICMP"
set internet-service-id 917506
next
edit "Adobe-SSH"
set internet-service-id 917510
next
edit "Adobe-NTP"
set internet-service-id 917512
next
edit "Adobe-Inbound_Email"
set internet-service-id 917513
next
edit "Adobe-LDAP"
set internet-service-id 917518
next
edit "Adobe-Adobe.Experience.Cloud"
set internet-service-id 917640
next
edit "Oracle-Other"
set internet-service-id 983040
next
edit "Oracle-Web"
set internet-service-id 983041
next
edit "Oracle-ICMP"
set internet-service-id 983042
next
edit "Oracle-DNS"
set internet-service-id 983043
next
edit "Oracle-Outbound_Email"
set internet-service-id 983044
next
edit "Oracle-SSH"
set internet-service-id 983046
next
edit "Oracle-FTP"
set internet-service-id 983047
next
edit "Oracle-NTP"
set internet-service-id 983048
next
edit "Oracle-Inbound_Email"
set internet-service-id 983049
next
edit "Oracle-LDAP"
set internet-service-id 983054
next
edit "Oracle-NetBIOS.Session.Service"
set internet-service-id 983055
next
edit "Oracle-RTMP"
set internet-service-id 983056
next
edit "Oracle-NetBIOS.Name.Service"
set internet-service-id 983064
next
edit "Oracle-Oracle.Cloud"
set internet-service-id 983171
next
edit "Hulu-Other"
set internet-service-id 1048576
next
edit "Hulu-ICMP"
set internet-service-id 1048578
next
edit "Hulu-DNS"
set internet-service-id 1048579
next
edit "Hulu-Outbound_Email"
set internet-service-id 1048580
next
edit "Hulu-SSH"
set internet-service-id 1048582
next
edit "Hulu-FTP"
set internet-service-id 1048583
next
edit "Hulu-NTP"
set internet-service-id 1048584
next
edit "Hulu-Inbound_Email"
set internet-service-id 1048585
next
edit "Hulu-LDAP"
set internet-service-id 1048590
next
edit "Hulu-NetBIOS.Session.Service"
set internet-service-id 1048591
next
edit "Hulu-RTMP"
set internet-service-id 1048592
next
edit "Hulu-NetBIOS.Name.Service"
set internet-service-id 1048600
next
edit "Pinterest-Other"
set internet-service-id 1114112
next
edit "Pinterest-ICMP"
set internet-service-id 1114114
next
edit "Pinterest-SSH"
set internet-service-id 1114118
next
edit "Pinterest-FTP"
set internet-service-id 1114119
next
edit "Pinterest-NTP"
set internet-service-id 1114120
next
edit "Pinterest-Inbound_Email"
set internet-service-id 1114121
next
edit "Pinterest-LDAP"
set internet-service-id 1114126
next
edit "Pinterest-NetBIOS.Session.Service"
set internet-service-id 1114127
next
edit "Pinterest-RTMP"
set internet-service-id 1114128
next
edit "Pinterest-NetBIOS.Name.Service"
set internet-service-id 1114136
next
edit "LogMeIn-Other"
set internet-service-id 1179648
next
edit "LogMeIn-ICMP"
set internet-service-id 1179650
next
edit "LogMeIn-DNS"
set internet-service-id 1179651
next
edit "LogMeIn-SSH"
set internet-service-id 1179654
next
edit "LogMeIn-FTP"
set internet-service-id 1179655
next
edit "LogMeIn-NTP"
set internet-service-id 1179656
next
edit "LogMeIn-Inbound_Email"
set internet-service-id 1179657
next
edit "LogMeIn-LDAP"
set internet-service-id 1179662
next
edit "LogMeIn-NetBIOS.Session.Service"
set internet-service-id 1179663
next
edit "LogMeIn-RTMP"
set internet-service-id 1179664
next
edit "LogMeIn-NetBIOS.Name.Service"
set internet-service-id 1179672
next
edit "LogMeIn-GoTo.Suite"
set internet-service-id 1179767
next
edit "Fortinet-ICMP"
set internet-service-id 1245186
next
edit "Fortinet-SSH"
set internet-service-id 1245190
next
edit "Fortinet-NetBIOS.Session.Service"
set internet-service-id 1245199
next
edit "Fortinet-RTMP"
set internet-service-id 1245200
next
edit "Fortinet-FortiMail.Cloud"
set internet-service-id 1245325
next
edit "Fortinet-FortiCloud"
set internet-service-id 1245326
next
edit "Fortinet-FortiVoice.Cloud"
set internet-service-id 1245432
next
edit "Kaspersky-Other"
set internet-service-id 1310720
next
edit "Kaspersky-ICMP"
set internet-service-id 1310722
next
edit "Kaspersky-SSH"
set internet-service-id 1310726
next
edit "Kaspersky-NTP"
set internet-service-id 1310728
next
edit "Kaspersky-Inbound_Email"
set internet-service-id 1310729
next
edit "Kaspersky-LDAP"
set internet-service-id 1310734
next
edit "Kaspersky-NetBIOS.Session.Service"
set internet-service-id 1310735
next
edit "Kaspersky-RTMP"
set internet-service-id 1310736
next
edit "Kaspersky-NetBIOS.Name.Service"
set internet-service-id 1310744
next
edit "McAfee-ICMP"
set internet-service-id 1376258
next
edit "McAfee-SSH"
set internet-service-id 1376262
next
edit "McAfee-Inbound_Email"
set internet-service-id 1376265
next
edit "McAfee-LDAP"
set internet-service-id 1376270
next
edit "McAfee-NetBIOS.Session.Service"
set internet-service-id 1376271
next
edit "McAfee-RTMP"
set internet-service-id 1376272
next
edit "Symantec-ICMP"
set internet-service-id 1441794
next
edit "Symantec-Inbound_Email"
set internet-service-id 1441801
next
edit "Symantec-NetBIOS.Session.Service"
set internet-service-id 1441807
next
edit "Symantec-RTMP"
set internet-service-id 1441808
next
edit "Symantec-Symantec.Cloud"
set internet-service-id 1441922
next
edit "VMware-Other"
set internet-service-id 1507328
next
edit "VMware-Web"
set internet-service-id 1507329
next
edit "VMware-ICMP"
set internet-service-id 1507330
next
edit "VMware-DNS"
set internet-service-id 1507331
next
edit "VMware-Outbound_Email"
set internet-service-id 1507332
next
edit "VMware-SSH"
set internet-service-id 1507334
next
edit "VMware-FTP"
set internet-service-id 1507335
next
edit "VMware-NTP"
set internet-service-id 1507336
next
edit "VMware-Inbound_Email"
set internet-service-id 1507337
next
edit "VMware-LDAP"
set internet-service-id 1507342
next
edit "VMware-NetBIOS.Session.Service"
set internet-service-id 1507343
next
edit "VMware-RTMP"
set internet-service-id 1507344
next
edit "VMware-NetBIOS.Name.Service"
set internet-service-id 1507352
next
edit "VMware-Airwatch"
set internet-service-id 1507461
next
edit "AOL-ICMP"
set internet-service-id 1572866
next
edit "AOL-FTP"
set internet-service-id 1572871
next
edit "AOL-RTMP"
set internet-service-id 1572880
next
edit "RealNetworks-Other"
set internet-service-id 1638400
next
edit "RealNetworks-ICMP"
set internet-service-id 1638402
next
edit "RealNetworks-SSH"
set internet-service-id 1638406
next
edit "RealNetworks-FTP"
set internet-service-id 1638407
next
edit "RealNetworks-NTP"
set internet-service-id 1638408
next
edit "RealNetworks-Inbound_Email"
set internet-service-id 1638409
next
edit "RealNetworks-LDAP"
set internet-service-id 1638414
next
edit "RealNetworks-NetBIOS.Session.Service"
set internet-service-id 1638415
next
edit "RealNetworks-RTMP"
set internet-service-id 1638416
next
edit "RealNetworks-NetBIOS.Name.Service"
set internet-service-id 1638424
next
edit "Zoho-Other"
set internet-service-id 1703936
next
edit "Zoho-ICMP"
set internet-service-id 1703938
next
edit "Zoho-DNS"
set internet-service-id 1703939
next
edit "Zoho-SSH"
set internet-service-id 1703942
next
edit "Zoho-FTP"
set internet-service-id 1703943
next
edit "Zoho-NTP"
set internet-service-id 1703944
next
edit "Zoho-LDAP"
set internet-service-id 1703950
next
edit "Zoho-NetBIOS.Session.Service"
set internet-service-id 1703951
next
edit "Zoho-RTMP"
set internet-service-id 1703952
next
edit "Zoho-NetBIOS.Name.Service"
set internet-service-id 1703960
next
edit "Zoho-Site24x7.Monitor"
set internet-service-id 1704153
next
edit "Mozilla-Other"
set internet-service-id 1769472
next
edit "Mozilla-Web"
set internet-service-id 1769473
next
edit "Mozilla-ICMP"
set internet-service-id 1769474
next
edit "Mozilla-DNS"
set internet-service-id 1769475
next
edit "Mozilla-Outbound_Email"
set internet-service-id 1769476
next
edit "Mozilla-SSH"
set internet-service-id 1769478
next
edit "Mozilla-FTP"
set internet-service-id 1769479
next
edit "Mozilla-NTP"
set internet-service-id 1769480
next
edit "Mozilla-Inbound_Email"
set internet-service-id 1769481
next
edit "Mozilla-LDAP"
set internet-service-id 1769486
next
edit "Mozilla-NetBIOS.Session.Service"
set internet-service-id 1769487
next
edit "Mozilla-RTMP"
set internet-service-id 1769488
next
edit "Mozilla-NetBIOS.Name.Service"
set internet-service-id 1769496
next
edit "TeamViewer-Other"
set internet-service-id 1835008
next
edit "TeamViewer-Web"
set internet-service-id 1835009
next
edit "TeamViewer-ICMP"
set internet-service-id 1835010
next
edit "TeamViewer-DNS"
set internet-service-id 1835011
next
edit "TeamViewer-Outbound_Email"
set internet-service-id 1835012
next
edit "TeamViewer-SSH"
set internet-service-id 1835014
next
edit "TeamViewer-FTP"
set internet-service-id 1835015
next
edit "TeamViewer-NTP"
set internet-service-id 1835016
next
edit "TeamViewer-Inbound_Email"
set internet-service-id 1835017
next
edit "TeamViewer-LDAP"
set internet-service-id 1835022
next
edit "TeamViewer-NetBIOS.Session.Service"
set internet-service-id 1835023
next
edit "TeamViewer-RTMP"
set internet-service-id 1835024
next
edit "TeamViewer-NetBIOS.Name.Service"
set internet-service-id 1835032
next
edit "TeamViewer-TeamViewer"
set internet-service-id 1835117
next
edit "HP-Other"
set internet-service-id 1900544
next
edit "HP-Web"
set internet-service-id 1900545
next
edit "HP-ICMP"
set internet-service-id 1900546
next
edit "HP-DNS"
set internet-service-id 1900547
next
edit "HP-Outbound_Email"
set internet-service-id 1900548
next
edit "HP-SSH"
set internet-service-id 1900550
next
edit "HP-FTP"
set internet-service-id 1900551
next
edit "HP-NTP"
set internet-service-id 1900552
next
edit "HP-Inbound_Email"
set internet-service-id 1900553
next
edit "HP-LDAP"
set internet-service-id 1900558
next
edit "HP-NetBIOS.Session.Service"
set internet-service-id 1900559
next
edit "HP-RTMP"
set internet-service-id 1900560
next
edit "HP-NetBIOS.Name.Service"
set internet-service-id 1900568
next
edit "HP-Aruba"
set internet-service-id 1900726
next
edit "Cisco-Other"
set internet-service-id 1966080
next
edit "Cisco-ICMP"
set internet-service-id 1966082
next
edit "Cisco-Inbound_Email"
set internet-service-id 1966089
next
edit "Cisco-LDAP"
set internet-service-id 1966094
next
edit "Cisco-RTMP"
set internet-service-id 1966096
next
edit "Cisco-NetBIOS.Name.Service"
set internet-service-id 1966104
next
edit "Cisco-Webex"
set internet-service-id 1966183
next
edit "Cisco-Meraki.Cloud"
set internet-service-id 1966218
next
edit "Cisco-Duo.Security"
set internet-service-id 1966225
next
edit "Cisco-AppDynamic"
set internet-service-id 1966260
next
edit "Cisco-Webex.FedRAMP"
set internet-service-id 1966315
next
edit "Cisco-Secure.Endpoint"
set internet-service-id 1966324
next
edit "IBM-Other"
set internet-service-id 2031616
next
edit "IBM-ICMP"
set internet-service-id 2031618
next
edit "IBM-NTP"
set internet-service-id 2031624
next
edit "IBM-Inbound_Email"
set internet-service-id 2031625
next
edit "IBM-LDAP"
set internet-service-id 2031630
next
edit "IBM-NetBIOS.Session.Service"
set internet-service-id 2031631
next
edit "IBM-RTMP"
set internet-service-id 2031632
next
edit "IBM-IBM.Cloud"
set internet-service-id 2031748
next
edit "Citrix-Other"
set internet-service-id 2097152
next
edit "Citrix-ICMP"
set internet-service-id 2097154
next
edit "Citrix-SSH"
set internet-service-id 2097158
next
edit "Citrix-FTP"
set internet-service-id 2097159
next
edit "Citrix-NTP"
set internet-service-id 2097160
next
edit "Citrix-Inbound_Email"
set internet-service-id 2097161
next
edit "Citrix-LDAP"
set internet-service-id 2097166
next
edit "Citrix-NetBIOS.Session.Service"
set internet-service-id 2097167
next
edit "Citrix-RTMP"
set internet-service-id 2097168
next
edit "Twitter-ICMP"
set internet-service-id 2162690
next
edit "Twitter-DNS"
set internet-service-id 2162691
next
edit "Twitter-SSH"
set internet-service-id 2162694
next
edit "Twitter-FTP"
set internet-service-id 2162695
next
edit "Twitter-NTP"
set internet-service-id 2162696
next
edit "Twitter-Inbound_Email"
set internet-service-id 2162697
next
edit "Twitter-LDAP"
set internet-service-id 2162702
next
edit "Twitter-NetBIOS.Session.Service"
set internet-service-id 2162703
next
edit "Twitter-RTMP"
set internet-service-id 2162704
next
edit "Dell-Other"
set internet-service-id 2228224
next
edit "Dell-Web"
set internet-service-id 2228225
next
edit "Dell-ICMP"
set internet-service-id 2228226
next
edit "Dell-DNS"
set internet-service-id 2228227
next
edit "Dell-Outbound_Email"
set internet-service-id 2228228
next
edit "Dell-SSH"
set internet-service-id 2228230
next
edit "Dell-FTP"
set internet-service-id 2228231
next
edit "Dell-NTP"
set internet-service-id 2228232
next
edit "Dell-Inbound_Email"
set internet-service-id 2228233
next
edit "Dell-LDAP"
set internet-service-id 2228238
next
edit "Dell-NetBIOS.Session.Service"
set internet-service-id 2228239
next
edit "Dell-RTMP"
set internet-service-id 2228240
next
edit "Dell-NetBIOS.Name.Service"
set internet-service-id 2228248
next
edit "Vimeo-Other"
set internet-service-id 2293760
next
edit "Vimeo-Web"
set internet-service-id 2293761
next
edit "Vimeo-ICMP"
set internet-service-id 2293762
next
edit "Vimeo-DNS"
set internet-service-id 2293763
next
edit "Vimeo-Outbound_Email"
set internet-service-id 2293764
next
edit "Vimeo-SSH"
set internet-service-id 2293766
next
edit "Vimeo-FTP"
set internet-service-id 2293767
next
edit "Vimeo-NTP"
set internet-service-id 2293768
next
edit "Vimeo-Inbound_Email"
set internet-service-id 2293769
next
edit "Vimeo-LDAP"
set internet-service-id 2293774
next
edit "Vimeo-NetBIOS.Session.Service"
set internet-service-id 2293775
next
edit "Vimeo-RTMP"
set internet-service-id 2293776
next
edit "Vimeo-NetBIOS.Name.Service"
set internet-service-id 2293784
next
edit "Redhat-Other"
set internet-service-id 2359296
next
edit "Redhat-Web"
set internet-service-id 2359297
next
edit "Redhat-ICMP"
set internet-service-id 2359298
next
edit "Redhat-DNS"
set internet-service-id 2359299
next
edit "Redhat-Outbound_Email"
set internet-service-id 2359300
next
edit "Redhat-SSH"
set internet-service-id 2359302
next
edit "Redhat-FTP"
set internet-service-id 2359303
next
edit "Redhat-NTP"
set internet-service-id 2359304
next
edit "Redhat-Inbound_Email"
set internet-service-id 2359305
next
edit "Redhat-LDAP"
set internet-service-id 2359310
next
edit "Redhat-NetBIOS.Session.Service"
set internet-service-id 2359311
next
edit "Redhat-RTMP"
set internet-service-id 2359312
next
edit "Redhat-NetBIOS.Name.Service"
set internet-service-id 2359320
next
edit "VK-ICMP"
set internet-service-id 2424834
next
edit "VK-SSH"
set internet-service-id 2424838
next
edit "VK-FTP"
set internet-service-id 2424839
next
edit "VK-NTP"
set internet-service-id 2424840
next
edit "VK-Inbound_Email"
set internet-service-id 2424841
next
edit "VK-LDAP"
set internet-service-id 2424846
next
edit "VK-NetBIOS.Session.Service"
set internet-service-id 2424847
next
edit "VK-RTMP"
set internet-service-id 2424848
next
edit "TrendMicro-Other"
set internet-service-id 2490368
next
edit "TrendMicro-Web"
set internet-service-id 2490369
next
edit "TrendMicro-ICMP"
set internet-service-id 2490370
next
edit "TrendMicro-DNS"
set internet-service-id 2490371
next
edit "TrendMicro-Outbound_Email"
set internet-service-id 2490372
next
edit "TrendMicro-SSH"
set internet-service-id 2490374
next
edit "TrendMicro-FTP"
set internet-service-id 2490375
next
edit "TrendMicro-NTP"
set internet-service-id 2490376
next
edit "TrendMicro-Inbound_Email"
set internet-service-id 2490377
next
edit "TrendMicro-LDAP"
set internet-service-id 2490382
next
edit "TrendMicro-NetBIOS.Session.Service"
set internet-service-id 2490383
next
edit "TrendMicro-RTMP"
set internet-service-id 2490384
next
edit "TrendMicro-NetBIOS.Name.Service"
set internet-service-id 2490392
next
edit "Tencent-Other"
set internet-service-id 2555904
next
edit "Tencent-Web"
set internet-service-id 2555905
next
edit "Tencent-ICMP"
set internet-service-id 2555906
next
edit "Tencent-DNS"
set internet-service-id 2555907
next
edit "Tencent-Outbound_Email"
set internet-service-id 2555908
next
edit "Tencent-SSH"
set internet-service-id 2555910
next
edit "Tencent-FTP"
set internet-service-id 2555911
next
edit "Tencent-NTP"
set internet-service-id 2555912
next
edit "Tencent-Inbound_Email"
set internet-service-id 2555913
next
edit "Tencent-LDAP"
set internet-service-id 2555918
next
edit "Tencent-NetBIOS.Session.Service"
set internet-service-id 2555919
next
edit "Tencent-RTMP"
set internet-service-id 2555920
next
edit "Tencent-NetBIOS.Name.Service"
set internet-service-id 2555928
next
edit "Ask-Other"
set internet-service-id 2621440
next
edit "Ask-ICMP"
set internet-service-id 2621442
next
edit "Ask-Outbound_Email"
set internet-service-id 2621444
next
edit "Ask-SSH"
set internet-service-id 2621446
next
edit "Ask-FTP"
set internet-service-id 2621447
next
edit "Ask-NTP"
set internet-service-id 2621448
next
edit "Ask-Inbound_Email"
set internet-service-id 2621449
next
edit "Ask-LDAP"
set internet-service-id 2621454
next
edit "Ask-NetBIOS.Session.Service"
set internet-service-id 2621455
next
edit "Ask-RTMP"
set internet-service-id 2621456
next
edit "Ask-NetBIOS.Name.Service"
set internet-service-id 2621464
next
edit "CNN-Other"
set internet-service-id 2686976
next
edit "CNN-ICMP"
set internet-service-id 2686978
next
edit "CNN-SSH"
set internet-service-id 2686982
next
edit "CNN-NTP"
set internet-service-id 2686984
next
edit "CNN-Inbound_Email"
set internet-service-id 2686985
next
edit "CNN-LDAP"
set internet-service-id 2686990
next
edit "CNN-NetBIOS.Session.Service"
set internet-service-id 2686991
next
edit "CNN-RTMP"
set internet-service-id 2686992
next
edit "Myspace-Other"
set internet-service-id 2752512
next
edit "Myspace-ICMP"
set internet-service-id 2752514
next
edit "Myspace-Outbound_Email"
set internet-service-id 2752516
next
edit "Myspace-SSH"
set internet-service-id 2752518
next
edit "Myspace-FTP"
set internet-service-id 2752519
next
edit "Myspace-NTP"
set internet-service-id 2752520
next
edit "Myspace-Inbound_Email"
set internet-service-id 2752521
next
edit "Myspace-LDAP"
set internet-service-id 2752526
next
edit "Myspace-NetBIOS.Session.Service"
set internet-service-id 2752527
next
edit "Myspace-RTMP"
set internet-service-id 2752528
next
edit "Tor-Exit.Node"
set internet-service-id 2818243
next
edit "Baidu-Other"
set internet-service-id 2883584
next
edit "Baidu-Web"
set internet-service-id 2883585
next
edit "Baidu-ICMP"
set internet-service-id 2883586
next
edit "Baidu-DNS"
set internet-service-id 2883587
next
edit "Baidu-Outbound_Email"
set internet-service-id 2883588
next
edit "Baidu-SSH"
set internet-service-id 2883590
next
edit "Baidu-FTP"
set internet-service-id 2883591
next
edit "Baidu-NTP"
set internet-service-id 2883592
next
edit "Baidu-Inbound_Email"
set internet-service-id 2883593
next
edit "Baidu-LDAP"
set internet-service-id 2883598
next
edit "Baidu-NetBIOS.Session.Service"
set internet-service-id 2883599
next
edit "Baidu-RTMP"
set internet-service-id 2883600
next
edit "Baidu-NetBIOS.Name.Service"
set internet-service-id 2883608
next
edit "ntp.org-Other"
set internet-service-id 2949120
next
edit "ntp.org-Web"
set internet-service-id 2949121
next
edit "ntp.org-ICMP"
set internet-service-id 2949122
next
edit "ntp.org-DNS"
set internet-service-id 2949123
next
edit "ntp.org-Outbound_Email"
set internet-service-id 2949124
next
edit "ntp.org-SSH"
set internet-service-id 2949126
next
edit "ntp.org-FTP"
set internet-service-id 2949127
next
edit "ntp.org-NTP"
set internet-service-id 2949128
next
edit "ntp.org-Inbound_Email"
set internet-service-id 2949129
next
edit "ntp.org-LDAP"
set internet-service-id 2949134
next
edit "ntp.org-NetBIOS.Session.Service"
set internet-service-id 2949135
next
edit "ntp.org-RTMP"
set internet-service-id 2949136
next
edit "ntp.org-NetBIOS.Name.Service"
set internet-service-id 2949144
next
edit "Proxy-Proxy.Server"
set internet-service-id 3014850
next
edit "Botnet-C&C.Server"
set internet-service-id 3080383
next
edit "Spam-Spamming.Server"
set internet-service-id 3145920
next
edit "Phishing-Phishing.Server"
set internet-service-id 3211457
next
edit "Zendesk-Other"
set internet-service-id 3407872
next
edit "Zendesk-Web"
set internet-service-id 3407873
next
edit "Zendesk-ICMP"
set internet-service-id 3407874
next
edit "Zendesk-DNS"
set internet-service-id 3407875
next
edit "Zendesk-Outbound_Email"
set internet-service-id 3407876
next
edit "Zendesk-SSH"
set internet-service-id 3407878
next
edit "Zendesk-FTP"
set internet-service-id 3407879
next
edit "Zendesk-NTP"
set internet-service-id 3407880
next
edit "Zendesk-Inbound_Email"
set internet-service-id 3407881
next
edit "Zendesk-LDAP"
set internet-service-id 3407886
next
edit "Zendesk-NetBIOS.Session.Service"
set internet-service-id 3407887
next
edit "Zendesk-RTMP"
set internet-service-id 3407888
next
edit "Zendesk-NetBIOS.Name.Service"
set internet-service-id 3407896
next
edit "Zendesk-Zendesk.Suite"
set internet-service-id 3408047
next
edit "DocuSign-Other"
set internet-service-id 3473408
next
edit "DocuSign-Web"
set internet-service-id 3473409
next
edit "DocuSign-ICMP"
set internet-service-id 3473410
next
edit "DocuSign-DNS"
set internet-service-id 3473411
next
edit "DocuSign-Outbound_Email"
set internet-service-id 3473412
next
edit "DocuSign-SSH"
set internet-service-id 3473414
next
edit "DocuSign-FTP"
set internet-service-id 3473415
next
edit "DocuSign-NTP"
set internet-service-id 3473416
next
edit "DocuSign-Inbound_Email"
set internet-service-id 3473417
next
edit "DocuSign-LDAP"
set internet-service-id 3473422
next
edit "DocuSign-NetBIOS.Session.Service"
set internet-service-id 3473423
next
edit "DocuSign-RTMP"
set internet-service-id 3473424
next
edit "DocuSign-NetBIOS.Name.Service"
set internet-service-id 3473432
next
edit "ServiceNow-Other"
set internet-service-id 3538944
next
edit "ServiceNow-Web"
set internet-service-id 3538945
next
edit "ServiceNow-ICMP"
set internet-service-id 3538946
next
edit "ServiceNow-DNS"
set internet-service-id 3538947
next
edit "ServiceNow-Outbound_Email"
set internet-service-id 3538948
next
edit "ServiceNow-SSH"
set internet-service-id 3538950
next
edit "ServiceNow-FTP"
set internet-service-id 3538951
next
edit "ServiceNow-NTP"
set internet-service-id 3538952
next
edit "ServiceNow-Inbound_Email"
set internet-service-id 3538953
next
edit "ServiceNow-LDAP"
set internet-service-id 3538958
next
edit "ServiceNow-NetBIOS.Session.Service"
set internet-service-id 3538959
next
edit "ServiceNow-RTMP"
set internet-service-id 3538960
next
edit "ServiceNow-NetBIOS.Name.Service"
set internet-service-id 3538968
next
edit "GitHub-GitHub"
set internet-service-id 3604638
next
edit "Workday-Other"
set internet-service-id 3670016
next
edit "Workday-Web"
set internet-service-id 3670017
next
edit "Workday-ICMP"
set internet-service-id 3670018
next
edit "Workday-DNS"
set internet-service-id 3670019
next
edit "Workday-Outbound_Email"
set internet-service-id 3670020
next
edit "Workday-SSH"
set internet-service-id 3670022
next
edit "Workday-FTP"
set internet-service-id 3670023
next
edit "Workday-NTP"
set internet-service-id 3670024
next
edit "Workday-Inbound_Email"
set internet-service-id 3670025
next
edit "Workday-LDAP"
set internet-service-id 3670030
next
edit "Workday-NetBIOS.Session.Service"
set internet-service-id 3670031
next
edit "Workday-RTMP"
set internet-service-id 3670032
next
edit "Workday-NetBIOS.Name.Service"
set internet-service-id 3670040
next
edit "HubSpot-Other"
set internet-service-id 3735552
next
edit "HubSpot-Web"
set internet-service-id 3735553
next
edit "HubSpot-ICMP"
set internet-service-id 3735554
next
edit "HubSpot-DNS"
set internet-service-id 3735555
next
edit "HubSpot-Outbound_Email"
set internet-service-id 3735556
next
edit "HubSpot-SSH"
set internet-service-id 3735558
next
edit "HubSpot-FTP"
set internet-service-id 3735559
next
edit "HubSpot-NTP"
set internet-service-id 3735560
next
edit "HubSpot-Inbound_Email"
set internet-service-id 3735561
next
edit "HubSpot-LDAP"
set internet-service-id 3735566
next
edit "HubSpot-NetBIOS.Session.Service"
set internet-service-id 3735567
next
edit "HubSpot-RTMP"
set internet-service-id 3735568
next
edit "HubSpot-NetBIOS.Name.Service"
set internet-service-id 3735576
next
edit "Twilio-Other"
set internet-service-id 3801088
next
edit "Twilio-Web"
set internet-service-id 3801089
next
edit "Twilio-ICMP"
set internet-service-id 3801090
next
edit "Twilio-DNS"
set internet-service-id 3801091
next
edit "Twilio-Outbound_Email"
set internet-service-id 3801092
next
edit "Twilio-SSH"
set internet-service-id 3801094
next
edit "Twilio-FTP"
set internet-service-id 3801095
next
edit "Twilio-NTP"
set internet-service-id 3801096
next
edit "Twilio-Inbound_Email"
set internet-service-id 3801097
next
edit "Twilio-LDAP"
set internet-service-id 3801102
next
edit "Twilio-NetBIOS.Session.Service"
set internet-service-id 3801103
next
edit "Twilio-RTMP"
set internet-service-id 3801104
next
edit "Twilio-NetBIOS.Name.Service"
set internet-service-id 3801112
next
edit "Twilio-Elastic.SIP.Trunking"
set internet-service-id 3801277
next
edit "Coupa-Other"
set internet-service-id 3866624
next
edit "Coupa-Web"
set internet-service-id 3866625
next
edit "Coupa-ICMP"
set internet-service-id 3866626
next
edit "Coupa-DNS"
set internet-service-id 3866627
next
edit "Coupa-Outbound_Email"
set internet-service-id 3866628
next
edit "Coupa-SSH"
set internet-service-id 3866630
next
edit "Coupa-FTP"
set internet-service-id 3866631
next
edit "Coupa-NTP"
set internet-service-id 3866632
next
edit "Coupa-Inbound_Email"
set internet-service-id 3866633
next
edit "Coupa-LDAP"
set internet-service-id 3866638
next
edit "Coupa-NetBIOS.Session.Service"
set internet-service-id 3866639
next
edit "Coupa-RTMP"
set internet-service-id 3866640
next
edit "Coupa-NetBIOS.Name.Service"
set internet-service-id 3866648
next
edit "Atlassian-Other"
set internet-service-id 3932160
next
edit "Atlassian-Web"
set internet-service-id 3932161
next
edit "Atlassian-ICMP"
set internet-service-id 3932162
next
edit "Atlassian-DNS"
set internet-service-id 3932163
next
edit "Atlassian-Outbound_Email"
set internet-service-id 3932164
next
edit "Atlassian-SSH"
set internet-service-id 3932166
next
edit "Atlassian-FTP"
set internet-service-id 3932167
next
edit "Atlassian-NTP"
set internet-service-id 3932168
next
edit "Atlassian-Inbound_Email"
set internet-service-id 3932169
next
edit "Atlassian-LDAP"
set internet-service-id 3932174
next
edit "Atlassian-NetBIOS.Session.Service"
set internet-service-id 3932175
next
edit "Atlassian-RTMP"
set internet-service-id 3932176
next
edit "Atlassian-NetBIOS.Name.Service"
set internet-service-id 3932184
next
edit "Atlassian-Atlassian.Cloud"
set internet-service-id 3932388
next
edit "Xero-Other"
set internet-service-id 3997696
next
edit "Xero-Web"
set internet-service-id 3997697
next
edit "Xero-ICMP"
set internet-service-id 3997698
next
edit "Xero-DNS"
set internet-service-id 3997699
next
edit "Xero-Outbound_Email"
set internet-service-id 3997700
next
edit "Xero-SSH"
set internet-service-id 3997702
next
edit "Xero-FTP"
set internet-service-id 3997703
next
edit "Xero-NTP"
set internet-service-id 3997704
next
edit "Xero-Inbound_Email"
set internet-service-id 3997705
next
edit "Xero-LDAP"
set internet-service-id 3997710
next
edit "Xero-NetBIOS.Session.Service"
set internet-service-id 3997711
next
edit "Xero-RTMP"
set internet-service-id 3997712
next
edit "Xero-NetBIOS.Name.Service"
set internet-service-id 3997720
next
edit "Zuora-Other"
set internet-service-id 4063232
next
edit "Zuora-Web"
set internet-service-id 4063233
next
edit "Zuora-ICMP"
set internet-service-id 4063234
next
edit "Zuora-DNS"
set internet-service-id 4063235
next
edit "Zuora-Outbound_Email"
set internet-service-id 4063236
next
edit "Zuora-SSH"
set internet-service-id 4063238
next
edit "Zuora-FTP"
set internet-service-id 4063239
next
edit "Zuora-NTP"
set internet-service-id 4063240
next
edit "Zuora-Inbound_Email"
set internet-service-id 4063241
next
edit "Zuora-LDAP"
set internet-service-id 4063246
next
edit "Zuora-NetBIOS.Session.Service"
set internet-service-id 4063247
next
edit "Zuora-RTMP"
set internet-service-id 4063248
next
edit "Zuora-NetBIOS.Name.Service"
set internet-service-id 4063256
next
edit "AdRoll-Other"
set internet-service-id 4128768
next
edit "AdRoll-Web"
set internet-service-id 4128769
next
edit "AdRoll-ICMP"
set internet-service-id 4128770
next
edit "AdRoll-DNS"
set internet-service-id 4128771
next
edit "AdRoll-Outbound_Email"
set internet-service-id 4128772
next
edit "AdRoll-SSH"
set internet-service-id 4128774
next
edit "AdRoll-FTP"
set internet-service-id 4128775
next
edit "AdRoll-NTP"
set internet-service-id 4128776
next
edit "AdRoll-Inbound_Email"
set internet-service-id 4128777
next
edit "AdRoll-LDAP"
set internet-service-id 4128782
next
edit "AdRoll-NetBIOS.Session.Service"
set internet-service-id 4128783
next
edit "AdRoll-RTMP"
set internet-service-id 4128784
next
edit "AdRoll-NetBIOS.Name.Service"
set internet-service-id 4128792
next
edit "Xactly-Other"
set internet-service-id 4194304
next
edit "Xactly-Web"
set internet-service-id 4194305
next
edit "Xactly-ICMP"
set internet-service-id 4194306
next
edit "Xactly-DNS"
set internet-service-id 4194307
next
edit "Xactly-Outbound_Email"
set internet-service-id 4194308
next
edit "Xactly-SSH"
set internet-service-id 4194310
next
edit "Xactly-FTP"
set internet-service-id 4194311
next
edit "Xactly-NTP"
set internet-service-id 4194312
next
edit "Xactly-Inbound_Email"
set internet-service-id 4194313
next
edit "Xactly-LDAP"
set internet-service-id 4194318
next
edit "Xactly-NetBIOS.Session.Service"
set internet-service-id 4194319
next
edit "Xactly-RTMP"
set internet-service-id 4194320
next
edit "Xactly-NetBIOS.Name.Service"
set internet-service-id 4194328
next
edit "Intuit-Other"
set internet-service-id 4259840
next
edit "Intuit-Web"
set internet-service-id 4259841
next
edit "Intuit-ICMP"
set internet-service-id 4259842
next
edit "Intuit-DNS"
set internet-service-id 4259843
next
edit "Intuit-Outbound_Email"
set internet-service-id 4259844
next
edit "Intuit-SSH"
set internet-service-id 4259846
next
edit "Intuit-FTP"
set internet-service-id 4259847
next
edit "Intuit-NTP"
set internet-service-id 4259848
next
edit "Intuit-Inbound_Email"
set internet-service-id 4259849
next
edit "Intuit-LDAP"
set internet-service-id 4259854
next
edit "Intuit-NetBIOS.Session.Service"
set internet-service-id 4259855
next
edit "Intuit-RTMP"
set internet-service-id 4259856
next
edit "Intuit-NetBIOS.Name.Service"
set internet-service-id 4259864
next
edit "Marketo-Other"
set internet-service-id 4325376
next
edit "Marketo-Web"
set internet-service-id 4325377
next
edit "Marketo-ICMP"
set internet-service-id 4325378
next
edit "Marketo-DNS"
set internet-service-id 4325379
next
edit "Marketo-Outbound_Email"
set internet-service-id 4325380
next
edit "Marketo-SSH"
set internet-service-id 4325382
next
edit "Marketo-FTP"
set internet-service-id 4325383
next
edit "Marketo-NTP"
set internet-service-id 4325384
next
edit "Marketo-Inbound_Email"
set internet-service-id 4325385
next
edit "Marketo-LDAP"
set internet-service-id 4325390
next
edit "Marketo-NetBIOS.Session.Service"
set internet-service-id 4325391
next
edit "Marketo-RTMP"
set internet-service-id 4325392
next
edit "Marketo-NetBIOS.Name.Service"
set internet-service-id 4325400
next
edit "Bill-Other"
set internet-service-id 4456448
next
edit "Bill-Web"
set internet-service-id 4456449
next
edit "Bill-ICMP"
set internet-service-id 4456450
next
edit "Bill-DNS"
set internet-service-id 4456451
next
edit "Bill-Outbound_Email"
set internet-service-id 4456452
next
edit "Bill-SSH"
set internet-service-id 4456454
next
edit "Bill-FTP"
set internet-service-id 4456455
next
edit "Bill-NTP"
set internet-service-id 4456456
next
edit "Bill-Inbound_Email"
set internet-service-id 4456457
next
edit "Bill-LDAP"
set internet-service-id 4456462
next
edit "Bill-NetBIOS.Session.Service"
set internet-service-id 4456463
next
edit "Bill-RTMP"
set internet-service-id 4456464
next
edit "Bill-NetBIOS.Name.Service"
set internet-service-id 4456472
next
edit "Shopify-Other"
set internet-service-id 4521984
next
edit "Shopify-Web"
set internet-service-id 4521985
next
edit "Shopify-ICMP"
set internet-service-id 4521986
next
edit "Shopify-DNS"
set internet-service-id 4521987
next
edit "Shopify-Outbound_Email"
set internet-service-id 4521988
next
edit "Shopify-SSH"
set internet-service-id 4521990
next
edit "Shopify-FTP"
set internet-service-id 4521991
next
edit "Shopify-NTP"
set internet-service-id 4521992
next
edit "Shopify-Inbound_Email"
set internet-service-id 4521993
next
edit "Shopify-LDAP"
set internet-service-id 4521998
next
edit "Shopify-NetBIOS.Session.Service"
set internet-service-id 4521999
next
edit "Shopify-RTMP"
set internet-service-id 4522000
next
edit "Shopify-NetBIOS.Name.Service"
set internet-service-id 4522008
next
edit "Shopify-Shopify"
set internet-service-id 4522162
next
edit "MuleSoft-Other"
set internet-service-id 4587520
next
edit "MuleSoft-Web"
set internet-service-id 4587521
next
edit "MuleSoft-ICMP"
set internet-service-id 4587522
next
edit "MuleSoft-DNS"
set internet-service-id 4587523
next
edit "MuleSoft-Outbound_Email"
set internet-service-id 4587524
next
edit "MuleSoft-SSH"
set internet-service-id 4587526
next
edit "MuleSoft-FTP"
set internet-service-id 4587527
next
edit "MuleSoft-NTP"
set internet-service-id 4587528
next
edit "MuleSoft-Inbound_Email"
set internet-service-id 4587529
next
edit "MuleSoft-LDAP"
set internet-service-id 4587534
next
edit "MuleSoft-NetBIOS.Session.Service"
set internet-service-id 4587535
next
edit "MuleSoft-RTMP"
set internet-service-id 4587536
next
edit "MuleSoft-NetBIOS.Name.Service"
set internet-service-id 4587544
next
edit "Cornerstone-Other"
set internet-service-id 4653056
next
edit "Cornerstone-Web"
set internet-service-id 4653057
next
edit "Cornerstone-ICMP"
set internet-service-id 4653058
next
edit "Cornerstone-DNS"
set internet-service-id 4653059
next
edit "Cornerstone-Outbound_Email"
set internet-service-id 4653060
next
edit "Cornerstone-SSH"
set internet-service-id 4653062
next
edit "Cornerstone-FTP"
set internet-service-id 4653063
next
edit "Cornerstone-NTP"
set internet-service-id 4653064
next
edit "Cornerstone-Inbound_Email"
set internet-service-id 4653065
next
edit "Cornerstone-LDAP"
set internet-service-id 4653070
next
edit "Cornerstone-NetBIOS.Session.Service"
set internet-service-id 4653071
next
edit "Cornerstone-RTMP"
set internet-service-id 4653072
next
edit "Cornerstone-NetBIOS.Name.Service"
set internet-service-id 4653080
next
edit "Eventbrite-Other"
set internet-service-id 4718592
next
edit "Eventbrite-Web"
set internet-service-id 4718593
next
edit "Eventbrite-ICMP"
set internet-service-id 4718594
next
edit "Eventbrite-DNS"
set internet-service-id 4718595
next
edit "Eventbrite-Outbound_Email"
set internet-service-id 4718596
next
edit "Eventbrite-SSH"
set internet-service-id 4718598
next
edit "Eventbrite-FTP"
set internet-service-id 4718599
next
edit "Eventbrite-NTP"
set internet-service-id 4718600
next
edit "Eventbrite-Inbound_Email"
set internet-service-id 4718601
next
edit "Eventbrite-LDAP"
set internet-service-id 4718606
next
edit "Eventbrite-NetBIOS.Session.Service"
set internet-service-id 4718607
next
edit "Eventbrite-RTMP"
set internet-service-id 4718608
next
edit "Eventbrite-NetBIOS.Name.Service"
set internet-service-id 4718616
next
edit "Paychex-Other"
set internet-service-id 4784128
next
edit "Paychex-Web"
set internet-service-id 4784129
next
edit "Paychex-ICMP"
set internet-service-id 4784130
next
edit "Paychex-DNS"
set internet-service-id 4784131
next
edit "Paychex-Outbound_Email"
set internet-service-id 4784132
next
edit "Paychex-SSH"
set internet-service-id 4784134
next
edit "Paychex-FTP"
set internet-service-id 4784135
next
edit "Paychex-NTP"
set internet-service-id 4784136
next
edit "Paychex-Inbound_Email"
set internet-service-id 4784137
next
edit "Paychex-LDAP"
set internet-service-id 4784142
next
edit "Paychex-NetBIOS.Session.Service"
set internet-service-id 4784143
next
edit "Paychex-RTMP"
set internet-service-id 4784144
next
edit "Paychex-NetBIOS.Name.Service"
set internet-service-id 4784152
next
edit "NewRelic-Other"
set internet-service-id 4849664
next
edit "NewRelic-Web"
set internet-service-id 4849665
next
edit "NewRelic-ICMP"
set internet-service-id 4849666
next
edit "NewRelic-DNS"
set internet-service-id 4849667
next
edit "NewRelic-Outbound_Email"
set internet-service-id 4849668
next
edit "NewRelic-SSH"
set internet-service-id 4849670
next
edit "NewRelic-FTP"
set internet-service-id 4849671
next
edit "NewRelic-NTP"
set internet-service-id 4849672
next
edit "NewRelic-Inbound_Email"
set internet-service-id 4849673
next
edit "NewRelic-LDAP"
set internet-service-id 4849678
next
edit "NewRelic-NetBIOS.Session.Service"
set internet-service-id 4849679
next
edit "NewRelic-RTMP"
set internet-service-id 4849680
next
edit "NewRelic-NetBIOS.Name.Service"
set internet-service-id 4849688
next
edit "Splunk-Other"
set internet-service-id 4915200
next
edit "Splunk-Web"
set internet-service-id 4915201
next
edit "Splunk-ICMP"
set internet-service-id 4915202
next
edit "Splunk-DNS"
set internet-service-id 4915203
next
edit "Splunk-Outbound_Email"
set internet-service-id 4915204
next
edit "Splunk-SSH"
set internet-service-id 4915206
next
edit "Splunk-FTP"
set internet-service-id 4915207
next
edit "Splunk-NTP"
set internet-service-id 4915208
next
edit "Splunk-Inbound_Email"
set internet-service-id 4915209
next
edit "Splunk-LDAP"
set internet-service-id 4915214
next
edit "Splunk-NetBIOS.Session.Service"
set internet-service-id 4915215
next
edit "Splunk-RTMP"
set internet-service-id 4915216
next
edit "Splunk-NetBIOS.Name.Service"
set internet-service-id 4915224
next
edit "Domo-Other"
set internet-service-id 4980736
next
edit "Domo-Web"
set internet-service-id 4980737
next
edit "Domo-ICMP"
set internet-service-id 4980738
next
edit "Domo-DNS"
set internet-service-id 4980739
next
edit "Domo-Outbound_Email"
set internet-service-id 4980740
next
edit "Domo-SSH"
set internet-service-id 4980742
next
edit "Domo-FTP"
set internet-service-id 4980743
next
edit "Domo-NTP"
set internet-service-id 4980744
next
edit "Domo-Inbound_Email"
set internet-service-id 4980745
next
edit "Domo-LDAP"
set internet-service-id 4980750
next
edit "Domo-NetBIOS.Session.Service"
set internet-service-id 4980751
next
edit "Domo-RTMP"
set internet-service-id 4980752
next
edit "Domo-NetBIOS.Name.Service"
set internet-service-id 4980760
next
edit "FreshBooks-Other"
set internet-service-id 5046272
next
edit "FreshBooks-Web"
set internet-service-id 5046273
next
edit "FreshBooks-ICMP"
set internet-service-id 5046274
next
edit "FreshBooks-DNS"
set internet-service-id 5046275
next
edit "FreshBooks-Outbound_Email"
set internet-service-id 5046276
next
edit "FreshBooks-SSH"
set internet-service-id 5046278
next
edit "FreshBooks-FTP"
set internet-service-id 5046279
next
edit "FreshBooks-NTP"
set internet-service-id 5046280
next
edit "FreshBooks-Inbound_Email"
set internet-service-id 5046281
next
edit "FreshBooks-LDAP"
set internet-service-id 5046286
next
edit "FreshBooks-NetBIOS.Session.Service"
set internet-service-id 5046287
next
edit "FreshBooks-RTMP"
set internet-service-id 5046288
next
edit "FreshBooks-NetBIOS.Name.Service"
set internet-service-id 5046296
next
edit "Tableau-Other"
set internet-service-id 5111808
next
edit "Tableau-Web"
set internet-service-id 5111809
next
edit "Tableau-ICMP"
set internet-service-id 5111810
next
edit "Tableau-DNS"
set internet-service-id 5111811
next
edit "Tableau-Outbound_Email"
set internet-service-id 5111812
next
edit "Tableau-SSH"
set internet-service-id 5111814
next
edit "Tableau-FTP"
set internet-service-id 5111815
next
edit "Tableau-NTP"
set internet-service-id 5111816
next
edit "Tableau-Inbound_Email"
set internet-service-id 5111817
next
edit "Tableau-LDAP"
set internet-service-id 5111822
next
edit "Tableau-NetBIOS.Session.Service"
set internet-service-id 5111823
next
edit "Tableau-RTMP"
set internet-service-id 5111824
next
edit "Tableau-NetBIOS.Name.Service"
set internet-service-id 5111832
next
edit "Druva-Other"
set internet-service-id 5177344
next
edit "Druva-Web"
set internet-service-id 5177345
next
edit "Druva-ICMP"
set internet-service-id 5177346
next
edit "Druva-DNS"
set internet-service-id 5177347
next
edit "Druva-Outbound_Email"
set internet-service-id 5177348
next
edit "Druva-SSH"
set internet-service-id 5177350
next
edit "Druva-FTP"
set internet-service-id 5177351
next
edit "Druva-NTP"
set internet-service-id 5177352
next
edit "Druva-Inbound_Email"
set internet-service-id 5177353
next
edit "Druva-LDAP"
set internet-service-id 5177358
next
edit "Druva-NetBIOS.Session.Service"
set internet-service-id 5177359
next
edit "Druva-RTMP"
set internet-service-id 5177360
next
edit "Druva-NetBIOS.Name.Service"
set internet-service-id 5177368
next
edit "Act-on-Other"
set internet-service-id 5242880
next
edit "Act-on-Web"
set internet-service-id 5242881
next
edit "Act-on-ICMP"
set internet-service-id 5242882
next
edit "Act-on-DNS"
set internet-service-id 5242883
next
edit "Act-on-Outbound_Email"
set internet-service-id 5242884
next
edit "Act-on-SSH"
set internet-service-id 5242886
next
edit "Act-on-FTP"
set internet-service-id 5242887
next
edit "Act-on-NTP"
set internet-service-id 5242888
next
edit "Act-on-Inbound_Email"
set internet-service-id 5242889
next
edit "Act-on-LDAP"
set internet-service-id 5242894
next
edit "Act-on-NetBIOS.Session.Service"
set internet-service-id 5242895
next
edit "Act-on-RTMP"
set internet-service-id 5242896
next
edit "Act-on-NetBIOS.Name.Service"
set internet-service-id 5242904
next
edit "GoodData-Other"
set internet-service-id 5308416
next
edit "GoodData-Web"
set internet-service-id 5308417
next
edit "GoodData-ICMP"
set internet-service-id 5308418
next
edit "GoodData-DNS"
set internet-service-id 5308419
next
edit "GoodData-Outbound_Email"
set internet-service-id 5308420
next
edit "GoodData-SSH"
set internet-service-id 5308422
next
edit "GoodData-FTP"
set internet-service-id 5308423
next
edit "GoodData-NTP"
set internet-service-id 5308424
next
edit "GoodData-Inbound_Email"
set internet-service-id 5308425
next
edit "GoodData-LDAP"
set internet-service-id 5308430
next
edit "GoodData-NetBIOS.Session.Service"
set internet-service-id 5308431
next
edit "GoodData-RTMP"
set internet-service-id 5308432
next
edit "GoodData-NetBIOS.Name.Service"
set internet-service-id 5308440
next
edit "SurveyMonkey-Other"
set internet-service-id 5373952
next
edit "SurveyMonkey-Web"
set internet-service-id 5373953
next
edit "SurveyMonkey-ICMP"
set internet-service-id 5373954
next
edit "SurveyMonkey-DNS"
set internet-service-id 5373955
next
edit "SurveyMonkey-Outbound_Email"
set internet-service-id 5373956
next
edit "SurveyMonkey-SSH"
set internet-service-id 5373958
next
edit "SurveyMonkey-FTP"
set internet-service-id 5373959
next
edit "SurveyMonkey-NTP"
set internet-service-id 5373960
next
edit "SurveyMonkey-Inbound_Email"
set internet-service-id 5373961
next
edit "SurveyMonkey-LDAP"
set internet-service-id 5373966
next
edit "SurveyMonkey-NetBIOS.Session.Service"
set internet-service-id 5373967
next
edit "SurveyMonkey-RTMP"
set internet-service-id 5373968
next
edit "SurveyMonkey-NetBIOS.Name.Service"
set internet-service-id 5373976
next
edit "Cvent-Other"
set internet-service-id 5439488
next
edit "Cvent-Web"
set internet-service-id 5439489
next
edit "Cvent-ICMP"
set internet-service-id 5439490
next
edit "Cvent-DNS"
set internet-service-id 5439491
next
edit "Cvent-Outbound_Email"
set internet-service-id 5439492
next
edit "Cvent-SSH"
set internet-service-id 5439494
next
edit "Cvent-FTP"
set internet-service-id 5439495
next
edit "Cvent-NTP"
set internet-service-id 5439496
next
edit "Cvent-Inbound_Email"
set internet-service-id 5439497
next
edit "Cvent-LDAP"
set internet-service-id 5439502
next
edit "Cvent-NetBIOS.Session.Service"
set internet-service-id 5439503
next
edit "Cvent-RTMP"
set internet-service-id 5439504
next
edit "Cvent-NetBIOS.Name.Service"
set internet-service-id 5439512
next
edit "Blackbaud-Other"
set internet-service-id 5505024
next
edit "Blackbaud-Web"
set internet-service-id 5505025
next
edit "Blackbaud-ICMP"
set internet-service-id 5505026
next
edit "Blackbaud-DNS"
set internet-service-id 5505027
next
edit "Blackbaud-Outbound_Email"
set internet-service-id 5505028
next
edit "Blackbaud-SSH"
set internet-service-id 5505030
next
edit "Blackbaud-FTP"
set internet-service-id 5505031
next
edit "Blackbaud-NTP"
set internet-service-id 5505032
next
edit "Blackbaud-Inbound_Email"
set internet-service-id 5505033
next
edit "Blackbaud-LDAP"
set internet-service-id 5505038
next
edit "Blackbaud-NetBIOS.Session.Service"
set internet-service-id 5505039
next
edit "Blackbaud-RTMP"
set internet-service-id 5505040
next
edit "Blackbaud-NetBIOS.Name.Service"
set internet-service-id 5505048
next
edit "InsideSales-Other"
set internet-service-id 5570560
next
edit "InsideSales-Web"
set internet-service-id 5570561
next
edit "InsideSales-ICMP"
set internet-service-id 5570562
next
edit "InsideSales-DNS"
set internet-service-id 5570563
next
edit "InsideSales-Outbound_Email"
set internet-service-id 5570564
next
edit "InsideSales-SSH"
set internet-service-id 5570566
next
edit "InsideSales-FTP"
set internet-service-id 5570567
next
edit "InsideSales-NTP"
set internet-service-id 5570568
next
edit "InsideSales-Inbound_Email"
set internet-service-id 5570569
next
edit "InsideSales-LDAP"
set internet-service-id 5570574
next
edit "InsideSales-NetBIOS.Session.Service"
set internet-service-id 5570575
next
edit "InsideSales-RTMP"
set internet-service-id 5570576
next
edit "InsideSales-NetBIOS.Name.Service"
set internet-service-id 5570584
next
edit "ServiceMax-Other"
set internet-service-id 5636096
next
edit "ServiceMax-Web"
set internet-service-id 5636097
next
edit "ServiceMax-ICMP"
set internet-service-id 5636098
next
edit "ServiceMax-DNS"
set internet-service-id 5636099
next
edit "ServiceMax-Outbound_Email"
set internet-service-id 5636100
next
edit "ServiceMax-SSH"
set internet-service-id 5636102
next
edit "ServiceMax-FTP"
set internet-service-id 5636103
next
edit "ServiceMax-NTP"
set internet-service-id 5636104
next
edit "ServiceMax-Inbound_Email"
set internet-service-id 5636105
next
edit "ServiceMax-LDAP"
set internet-service-id 5636110
next
edit "ServiceMax-NetBIOS.Session.Service"
set internet-service-id 5636111
next
edit "ServiceMax-RTMP"
set internet-service-id 5636112
next
edit "ServiceMax-NetBIOS.Name.Service"
set internet-service-id 5636120
next
edit "Apptio-Other"
set internet-service-id 5701632
next
edit "Apptio-Web"
set internet-service-id 5701633
next
edit "Apptio-ICMP"
set internet-service-id 5701634
next
edit "Apptio-DNS"
set internet-service-id 5701635
next
edit "Apptio-Outbound_Email"
set internet-service-id 5701636
next
edit "Apptio-SSH"
set internet-service-id 5701638
next
edit "Apptio-FTP"
set internet-service-id 5701639
next
edit "Apptio-NTP"
set internet-service-id 5701640
next
edit "Apptio-Inbound_Email"
set internet-service-id 5701641
next
edit "Apptio-LDAP"
set internet-service-id 5701646
next
edit "Apptio-NetBIOS.Session.Service"
set internet-service-id 5701647
next
edit "Apptio-RTMP"
set internet-service-id 5701648
next
edit "Apptio-NetBIOS.Name.Service"
set internet-service-id 5701656
next
edit "Veracode-Other"
set internet-service-id 5767168
next
edit "Veracode-Web"
set internet-service-id 5767169
next
edit "Veracode-ICMP"
set internet-service-id 5767170
next
edit "Veracode-DNS"
set internet-service-id 5767171
next
edit "Veracode-Outbound_Email"
set internet-service-id 5767172
next
edit "Veracode-SSH"
set internet-service-id 5767174
next
edit "Veracode-FTP"
set internet-service-id 5767175
next
edit "Veracode-NTP"
set internet-service-id 5767176
next
edit "Veracode-Inbound_Email"
set internet-service-id 5767177
next
edit "Veracode-LDAP"
set internet-service-id 5767182
next
edit "Veracode-NetBIOS.Session.Service"
set internet-service-id 5767183
next
edit "Veracode-RTMP"
set internet-service-id 5767184
next
edit "Veracode-NetBIOS.Name.Service"
set internet-service-id 5767192
next
edit "Anaplan-Other"
set internet-service-id 5832704
next
edit "Anaplan-Web"
set internet-service-id 5832705
next
edit "Anaplan-ICMP"
set internet-service-id 5832706
next
edit "Anaplan-DNS"
set internet-service-id 5832707
next
edit "Anaplan-Outbound_Email"
set internet-service-id 5832708
next
edit "Anaplan-SSH"
set internet-service-id 5832710
next
edit "Anaplan-FTP"
set internet-service-id 5832711
next
edit "Anaplan-NTP"
set internet-service-id 5832712
next
edit "Anaplan-Inbound_Email"
set internet-service-id 5832713
next
edit "Anaplan-LDAP"
set internet-service-id 5832718
next
edit "Anaplan-NetBIOS.Session.Service"
set internet-service-id 5832719
next
edit "Anaplan-RTMP"
set internet-service-id 5832720
next
edit "Anaplan-NetBIOS.Name.Service"
set internet-service-id 5832728
next
edit "Rapid7-Other"
set internet-service-id 5898240
next
edit "Rapid7-Web"
set internet-service-id 5898241
next
edit "Rapid7-ICMP"
set internet-service-id 5898242
next
edit "Rapid7-DNS"
set internet-service-id 5898243
next
edit "Rapid7-Outbound_Email"
set internet-service-id 5898244
next
edit "Rapid7-SSH"
set internet-service-id 5898246
next
edit "Rapid7-FTP"
set internet-service-id 5898247
next
edit "Rapid7-NTP"
set internet-service-id 5898248
next
edit "Rapid7-Inbound_Email"
set internet-service-id 5898249
next
edit "Rapid7-LDAP"
set internet-service-id 5898254
next
edit "Rapid7-NetBIOS.Session.Service"
set internet-service-id 5898255
next
edit "Rapid7-RTMP"
set internet-service-id 5898256
next
edit "Rapid7-NetBIOS.Name.Service"
set internet-service-id 5898264
next
edit "AnyDesk-AnyDesk"
set internet-service-id 5963927
next
edit "ESET-Eset.Service"
set internet-service-id 6029426
next
edit "Slack-Other"
set internet-service-id 6094848
next
edit "Slack-Web"
set internet-service-id 6094849
next
edit "Slack-ICMP"
set internet-service-id 6094850
next
edit "Slack-DNS"
set internet-service-id 6094851
next
edit "Slack-Outbound_Email"
set internet-service-id 6094852
next
edit "Slack-SSH"
set internet-service-id 6094854
next
edit "Slack-FTP"
set internet-service-id 6094855
next
edit "Slack-NTP"
set internet-service-id 6094856
next
edit "Slack-Inbound_Email"
set internet-service-id 6094857
next
edit "Slack-LDAP"
set internet-service-id 6094862
next
edit "Slack-NetBIOS.Session.Service"
set internet-service-id 6094863
next
edit "Slack-RTMP"
set internet-service-id 6094864
next
edit "Slack-NetBIOS.Name.Service"
set internet-service-id 6094872
next
edit "Slack-Slack"
set internet-service-id 6095024
next
edit "ADP-Other"
set internet-service-id 6160384
next
edit "ADP-Web"
set internet-service-id 6160385
next
edit "ADP-ICMP"
set internet-service-id 6160386
next
edit "ADP-DNS"
set internet-service-id 6160387
next
edit "ADP-Outbound_Email"
set internet-service-id 6160388
next
edit "ADP-SSH"
set internet-service-id 6160390
next
edit "ADP-FTP"
set internet-service-id 6160391
next
edit "ADP-NTP"
set internet-service-id 6160392
next
edit "ADP-Inbound_Email"
set internet-service-id 6160393
next
edit "ADP-LDAP"
set internet-service-id 6160398
next
edit "ADP-NetBIOS.Session.Service"
set internet-service-id 6160399
next
edit "ADP-RTMP"
set internet-service-id 6160400
next
edit "ADP-NetBIOS.Name.Service"
set internet-service-id 6160408
next
edit "Blackboard-Other"
set internet-service-id 6225920
next
edit "Blackboard-Web"
set internet-service-id 6225921
next
edit "Blackboard-ICMP"
set internet-service-id 6225922
next
edit "Blackboard-DNS"
set internet-service-id 6225923
next
edit "Blackboard-Outbound_Email"
set internet-service-id 6225924
next
edit "Blackboard-SSH"
set internet-service-id 6225926
next
edit "Blackboard-FTP"
set internet-service-id 6225927
next
edit "Blackboard-NTP"
set internet-service-id 6225928
next
edit "Blackboard-Inbound_Email"
set internet-service-id 6225929
next
edit "Blackboard-LDAP"
set internet-service-id 6225934
next
edit "Blackboard-NetBIOS.Session.Service"
set internet-service-id 6225935
next
edit "Blackboard-RTMP"
set internet-service-id 6225936
next
edit "Blackboard-NetBIOS.Name.Service"
set internet-service-id 6225944
next
edit "SAP-Other"
set internet-service-id 6291456
next
edit "SAP-Web"
set internet-service-id 6291457
next
edit "SAP-ICMP"
set internet-service-id 6291458
next
edit "SAP-DNS"
set internet-service-id 6291459
next
edit "SAP-Outbound_Email"
set internet-service-id 6291460
next
edit "SAP-SSH"
set internet-service-id 6291462
next
edit "SAP-FTP"
set internet-service-id 6291463
next
edit "SAP-NTP"
set internet-service-id 6291464
next
edit "SAP-Inbound_Email"
set internet-service-id 6291465
next
edit "SAP-LDAP"
set internet-service-id 6291470
next
edit "SAP-NetBIOS.Session.Service"
set internet-service-id 6291471
next
edit "SAP-RTMP"
set internet-service-id 6291472
next
edit "SAP-NetBIOS.Name.Service"
set internet-service-id 6291480
next
edit "SAP-HANA"
set internet-service-id 6291612
next
edit "SAP-SuccessFactors"
set internet-service-id 6291618
next
edit "Snap-Snapchat"
set internet-service-id 6357108
next
edit "Zoom.us-Zoom.Meeting"
set internet-service-id 6422646
next
edit "Sophos-Other"
set internet-service-id 6488064
next
edit "Sophos-Web"
set internet-service-id 6488065
next
edit "Sophos-ICMP"
set internet-service-id 6488066
next
edit "Sophos-DNS"
set internet-service-id 6488067
next
edit "Sophos-Outbound_Email"
set internet-service-id 6488068
next
edit "Sophos-SSH"
set internet-service-id 6488070
next
edit "Sophos-FTP"
set internet-service-id 6488071
next
edit "Sophos-NTP"
set internet-service-id 6488072
next
edit "Sophos-Inbound_Email"
set internet-service-id 6488073
next
edit "Sophos-LDAP"
set internet-service-id 6488078
next
edit "Sophos-NetBIOS.Session.Service"
set internet-service-id 6488079
next
edit "Sophos-RTMP"
set internet-service-id 6488080
next
edit "Sophos-NetBIOS.Name.Service"
set internet-service-id 6488088
next
edit "Cloudflare-Other"
set internet-service-id 6553600
next
edit "Cloudflare-Web"
set internet-service-id 6553601
next
edit "Cloudflare-ICMP"
set internet-service-id 6553602
next
edit "Cloudflare-DNS"
set internet-service-id 6553603
next
edit "Cloudflare-Outbound_Email"
set internet-service-id 6553604
next
edit "Cloudflare-SSH"
set internet-service-id 6553606
next
edit "Cloudflare-FTP"
set internet-service-id 6553607
next
edit "Cloudflare-NTP"
set internet-service-id 6553608
next
edit "Cloudflare-Inbound_Email"
set internet-service-id 6553609
next
edit "Cloudflare-LDAP"
set internet-service-id 6553614
next
edit "Cloudflare-NetBIOS.Session.Service"
set internet-service-id 6553615
next
edit "Cloudflare-RTMP"
set internet-service-id 6553616
next
edit "Cloudflare-NetBIOS.Name.Service"
set internet-service-id 6553624
next
edit "Cloudflare-CDN"
set internet-service-id 6553737
next
edit "Pexip-Pexip.Meeting"
set internet-service-id 6619256
next
edit "Zscaler-Other"
set internet-service-id 6684672
next
edit "Zscaler-Web"
set internet-service-id 6684673
next
edit "Zscaler-ICMP"
set internet-service-id 6684674
next
edit "Zscaler-DNS"
set internet-service-id 6684675
next
edit "Zscaler-Outbound_Email"
set internet-service-id 6684676
next
edit "Zscaler-SSH"
set internet-service-id 6684678
next
edit "Zscaler-FTP"
set internet-service-id 6684679
next
edit "Zscaler-NTP"
set internet-service-id 6684680
next
edit "Zscaler-Inbound_Email"
set internet-service-id 6684681
next
edit "Zscaler-LDAP"
set internet-service-id 6684686
next
edit "Zscaler-NetBIOS.Session.Service"
set internet-service-id 6684687
next
edit "Zscaler-RTMP"
set internet-service-id 6684688
next
edit "Zscaler-NetBIOS.Name.Service"
set internet-service-id 6684696
next
edit "Zscaler-Zscaler.Cloud"
set internet-service-id 6684793
next
edit "Yandex-Other"
set internet-service-id 6750208
next
edit "Yandex-Web"
set internet-service-id 6750209
next
edit "Yandex-ICMP"
set internet-service-id 6750210
next
edit "Yandex-DNS"
set internet-service-id 6750211
next
edit "Yandex-Outbound_Email"
set internet-service-id 6750212
next
edit "Yandex-SSH"
set internet-service-id 6750214
next
edit "Yandex-FTP"
set internet-service-id 6750215
next
edit "Yandex-NTP"
set internet-service-id 6750216
next
edit "Yandex-Inbound_Email"
set internet-service-id 6750217
next
edit "Yandex-LDAP"
set internet-service-id 6750222
next
edit "Yandex-NetBIOS.Session.Service"
set internet-service-id 6750223
next
edit "Yandex-RTMP"
set internet-service-id 6750224
next
edit "Yandex-NetBIOS.Name.Service"
set internet-service-id 6750232
next
edit "mail.ru-Other"
set internet-service-id 6815744
next
edit "mail.ru-Web"
set internet-service-id 6815745
next
edit "mail.ru-ICMP"
set internet-service-id 6815746
next
edit "mail.ru-DNS"
set internet-service-id 6815747
next
edit "mail.ru-Outbound_Email"
set internet-service-id 6815748
next
edit "mail.ru-SSH"
set internet-service-id 6815750
next
edit "mail.ru-FTP"
set internet-service-id 6815751
next
edit "mail.ru-NTP"
set internet-service-id 6815752
next
edit "mail.ru-Inbound_Email"
set internet-service-id 6815753
next
edit "mail.ru-LDAP"
set internet-service-id 6815758
next
edit "mail.ru-NetBIOS.Session.Service"
set internet-service-id 6815759
next
edit "mail.ru-RTMP"
set internet-service-id 6815760
next
edit "mail.ru-NetBIOS.Name.Service"
set internet-service-id 6815768
next
edit "Alibaba-Other"
set internet-service-id 6881280
next
edit "Alibaba-Web"
set internet-service-id 6881281
next
edit "Alibaba-ICMP"
set internet-service-id 6881282
next
edit "Alibaba-DNS"
set internet-service-id 6881283
next
edit "Alibaba-Outbound_Email"
set internet-service-id 6881284
next
edit "Alibaba-SSH"
set internet-service-id 6881286
next
edit "Alibaba-FTP"
set internet-service-id 6881287
next
edit "Alibaba-NTP"
set internet-service-id 6881288
next
edit "Alibaba-Inbound_Email"
set internet-service-id 6881289
next
edit "Alibaba-LDAP"
set internet-service-id 6881294
next
edit "Alibaba-NetBIOS.Session.Service"
set internet-service-id 6881295
next
edit "Alibaba-RTMP"
set internet-service-id 6881296
next
edit "Alibaba-NetBIOS.Name.Service"
set internet-service-id 6881304
next
edit "Alibaba-Alibaba.Cloud"
set internet-service-id 6881402
next
edit "GoDaddy-Other"
set internet-service-id 6946816
next
edit "GoDaddy-Web"
set internet-service-id 6946817
next
edit "GoDaddy-ICMP"
set internet-service-id 6946818
next
edit "GoDaddy-DNS"
set internet-service-id 6946819
next
edit "GoDaddy-Outbound_Email"
set internet-service-id 6946820
next
edit "GoDaddy-SSH"
set internet-service-id 6946822
next
edit "GoDaddy-FTP"
set internet-service-id 6946823
next
edit "GoDaddy-NTP"
set internet-service-id 6946824
next
edit "GoDaddy-Inbound_Email"
set internet-service-id 6946825
next
edit "GoDaddy-LDAP"
set internet-service-id 6946830
next
edit "GoDaddy-NetBIOS.Session.Service"
set internet-service-id 6946831
next
edit "GoDaddy-RTMP"
set internet-service-id 6946832
next
edit "GoDaddy-NetBIOS.Name.Service"
set internet-service-id 6946840
next
edit "GoDaddy-GoDaddy.Email"
set internet-service-id 6946939
next
edit "Bluejeans-Other"
set internet-service-id 7012352
next
edit "Bluejeans-Web"
set internet-service-id 7012353
next
edit "Bluejeans-ICMP"
set internet-service-id 7012354
next
edit "Bluejeans-DNS"
set internet-service-id 7012355
next
edit "Bluejeans-Outbound_Email"
set internet-service-id 7012356
next
edit "Bluejeans-SSH"
set internet-service-id 7012358
next
edit "Bluejeans-FTP"
set internet-service-id 7012359
next
edit "Bluejeans-NTP"
set internet-service-id 7012360
next
edit "Bluejeans-Inbound_Email"
set internet-service-id 7012361
next
edit "Bluejeans-LDAP"
set internet-service-id 7012366
next
edit "Bluejeans-NetBIOS.Session.Service"
set internet-service-id 7012367
next
edit "Bluejeans-RTMP"
set internet-service-id 7012368
next
edit "Bluejeans-NetBIOS.Name.Service"
set internet-service-id 7012376
next
edit "Bluejeans-Bluejeans.Meeting"
set internet-service-id 7012476
next
edit "Webroot-Webroot.SecureAnywhere"
set internet-service-id 7078013
next
edit "Avast-Other"
set internet-service-id 7143424
next
edit "Avast-Web"
set internet-service-id 7143425
next
edit "Avast-ICMP"
set internet-service-id 7143426
next
edit "Avast-DNS"
set internet-service-id 7143427
next
edit "Avast-Outbound_Email"
set internet-service-id 7143428
next
edit "Avast-SSH"
set internet-service-id 7143430
next
edit "Avast-FTP"
set internet-service-id 7143431
next
edit "Avast-NTP"
set internet-service-id 7143432
next
edit "Avast-Inbound_Email"
set internet-service-id 7143433
next
edit "Avast-LDAP"
set internet-service-id 7143438
next
edit "Avast-NetBIOS.Session.Service"
set internet-service-id 7143439
next
edit "Avast-RTMP"
set internet-service-id 7143440
next
edit "Avast-NetBIOS.Name.Service"
set internet-service-id 7143448
next
edit "Avast-Avast.Security"
set internet-service-id 7143550
next
edit "Wetransfer-Other"
set internet-service-id 7208960
next
edit "Wetransfer-Web"
set internet-service-id 7208961
next
edit "Wetransfer-ICMP"
set internet-service-id 7208962
next
edit "Wetransfer-DNS"
set internet-service-id 7208963
next
edit "Wetransfer-Outbound_Email"
set internet-service-id 7208964
next
edit "Wetransfer-SSH"
set internet-service-id 7208966
next
edit "Wetransfer-FTP"
set internet-service-id 7208967
next
edit "Wetransfer-NTP"
set internet-service-id 7208968
next
edit "Wetransfer-Inbound_Email"
set internet-service-id 7208969
next
edit "Wetransfer-LDAP"
set internet-service-id 7208974
next
edit "Wetransfer-NetBIOS.Session.Service"
set internet-service-id 7208975
next
edit "Wetransfer-RTMP"
set internet-service-id 7208976
next
edit "Wetransfer-NetBIOS.Name.Service"
set internet-service-id 7208984
next
edit "Sendgrid-Sendgrid.Email"
set internet-service-id 7274623
next
edit "Ubiquiti-UniFi"
set internet-service-id 7340160
next
edit "Lifesize-Lifesize.Cloud"
set internet-service-id 7405697
next
edit "Okta-Other"
set internet-service-id 7471104
next
edit "Okta-Web"
set internet-service-id 7471105
next
edit "Okta-ICMP"
set internet-service-id 7471106
next
edit "Okta-DNS"
set internet-service-id 7471107
next
edit "Okta-Outbound_Email"
set internet-service-id 7471108
next
edit "Okta-SSH"
set internet-service-id 7471110
next
edit "Okta-FTP"
set internet-service-id 7471111
next
edit "Okta-NTP"
set internet-service-id 7471112
next
edit "Okta-Inbound_Email"
set internet-service-id 7471113
next
edit "Okta-LDAP"
set internet-service-id 7471118
next
edit "Okta-NetBIOS.Session.Service"
set internet-service-id 7471119
next
edit "Okta-RTMP"
set internet-service-id 7471120
next
edit "Okta-NetBIOS.Name.Service"
set internet-service-id 7471128
next
edit "Okta-Okta"
set internet-service-id 7471307
next
edit "Cybozu-Other"
set internet-service-id 7536640
next
edit "Cybozu-Web"
set internet-service-id 7536641
next
edit "Cybozu-ICMP"
set internet-service-id 7536642
next
edit "Cybozu-DNS"
set internet-service-id 7536643
next
edit "Cybozu-Outbound_Email"
set internet-service-id 7536644
next
edit "Cybozu-SSH"
set internet-service-id 7536646
next
edit "Cybozu-FTP"
set internet-service-id 7536647
next
edit "Cybozu-NTP"
set internet-service-id 7536648
next
edit "Cybozu-Inbound_Email"
set internet-service-id 7536649
next
edit "Cybozu-LDAP"
set internet-service-id 7536654
next
edit "Cybozu-NetBIOS.Session.Service"
set internet-service-id 7536655
next
edit "Cybozu-RTMP"
set internet-service-id 7536656
next
edit "Cybozu-NetBIOS.Name.Service"
set internet-service-id 7536664
next
edit "VNC-Other"
set internet-service-id 7602176
next
edit "VNC-Web"
set internet-service-id 7602177
next
edit "VNC-ICMP"
set internet-service-id 7602178
next
edit "VNC-DNS"
set internet-service-id 7602179
next
edit "VNC-Outbound_Email"
set internet-service-id 7602180
next
edit "VNC-SSH"
set internet-service-id 7602182
next
edit "VNC-FTP"
set internet-service-id 7602183
next
edit "VNC-NTP"
set internet-service-id 7602184
next
edit "VNC-Inbound_Email"
set internet-service-id 7602185
next
edit "VNC-LDAP"
set internet-service-id 7602190
next
edit "VNC-NetBIOS.Session.Service"
set internet-service-id 7602191
next
edit "VNC-RTMP"
set internet-service-id 7602192
next
edit "VNC-NetBIOS.Name.Service"
set internet-service-id 7602200
next
edit "Egnyte-Egnyte"
set internet-service-id 7667846
next
edit "CrowdStrike-CrowdStrike.Cloud"
set internet-service-id 7733383
next
edit "Aruba.it-Other"
set internet-service-id 7798784
next
edit "Aruba.it-Web"
set internet-service-id 7798785
next
edit "Aruba.it-ICMP"
set internet-service-id 7798786
next
edit "Aruba.it-DNS"
set internet-service-id 7798787
next
edit "Aruba.it-Outbound_Email"
set internet-service-id 7798788
next
edit "Aruba.it-SSH"
set internet-service-id 7798790
next
edit "Aruba.it-FTP"
set internet-service-id 7798791
next
edit "Aruba.it-NTP"
set internet-service-id 7798792
next
edit "Aruba.it-Inbound_Email"
set internet-service-id 7798793
next
edit "Aruba.it-LDAP"
set internet-service-id 7798798
next
edit "Aruba.it-NetBIOS.Session.Service"
set internet-service-id 7798799
next
edit "Aruba.it-RTMP"
set internet-service-id 7798800
next
edit "Aruba.it-NetBIOS.Name.Service"
set internet-service-id 7798808
next
edit "ISLOnline-Other"
set internet-service-id 7864320
next
edit "ISLOnline-Web"
set internet-service-id 7864321
next
edit "ISLOnline-ICMP"
set internet-service-id 7864322
next
edit "ISLOnline-DNS"
set internet-service-id 7864323
next
edit "ISLOnline-Outbound_Email"
set internet-service-id 7864324
next
edit "ISLOnline-SSH"
set internet-service-id 7864326
next
edit "ISLOnline-FTP"
set internet-service-id 7864327
next
edit "ISLOnline-NTP"
set internet-service-id 7864328
next
edit "ISLOnline-Inbound_Email"
set internet-service-id 7864329
next
edit "ISLOnline-LDAP"
set internet-service-id 7864334
next
edit "ISLOnline-NetBIOS.Session.Service"
set internet-service-id 7864335
next
edit "ISLOnline-RTMP"
set internet-service-id 7864336
next
edit "ISLOnline-NetBIOS.Name.Service"
set internet-service-id 7864344
next
edit "Akamai-CDN"
set internet-service-id 7929993
next
edit "Rackspace-CDN"
set internet-service-id 7995529
next
edit "Instart-CDN"
set internet-service-id 8061065
next
edit "Bitdefender-Other"
set internet-service-id 8126464
next
edit "Bitdefender-Web"
set internet-service-id 8126465
next
edit "Bitdefender-ICMP"
set internet-service-id 8126466
next
edit "Bitdefender-DNS"
set internet-service-id 8126467
next
edit "Bitdefender-Outbound_Email"
set internet-service-id 8126468
next
edit "Bitdefender-SSH"
set internet-service-id 8126470
next
edit "Bitdefender-FTP"
set internet-service-id 8126471
next
edit "Bitdefender-NTP"
set internet-service-id 8126472
next
edit "Bitdefender-Inbound_Email"
set internet-service-id 8126473
next
edit "Bitdefender-LDAP"
set internet-service-id 8126478
next
edit "Bitdefender-NetBIOS.Session.Service"
set internet-service-id 8126479
next
edit "Bitdefender-RTMP"
set internet-service-id 8126480
next
edit "Bitdefender-NetBIOS.Name.Service"
set internet-service-id 8126488
next
edit "Pingdom-Other"
set internet-service-id 8192000
next
edit "Pingdom-Web"
set internet-service-id 8192001
next
edit "Pingdom-ICMP"
set internet-service-id 8192002
next
edit "Pingdom-DNS"
set internet-service-id 8192003
next
edit "Pingdom-Outbound_Email"
set internet-service-id 8192004
next
edit "Pingdom-SSH"
set internet-service-id 8192006
next
edit "Pingdom-FTP"
set internet-service-id 8192007
next
edit "Pingdom-NTP"
set internet-service-id 8192008
next
edit "Pingdom-Inbound_Email"
set internet-service-id 8192009
next
edit "Pingdom-LDAP"
set internet-service-id 8192014
next
edit "Pingdom-NetBIOS.Session.Service"
set internet-service-id 8192015
next
edit "Pingdom-RTMP"
set internet-service-id 8192016
next
edit "Pingdom-NetBIOS.Name.Service"
set internet-service-id 8192024
next
edit "UptimeRobot-Other"
set internet-service-id 8257536
next
edit "UptimeRobot-Web"
set internet-service-id 8257537
next
edit "UptimeRobot-ICMP"
set internet-service-id 8257538
next
edit "UptimeRobot-DNS"
set internet-service-id 8257539
next
edit "UptimeRobot-Outbound_Email"
set internet-service-id 8257540
next
edit "UptimeRobot-SSH"
set internet-service-id 8257542
next
edit "UptimeRobot-FTP"
set internet-service-id 8257543
next
edit "UptimeRobot-NTP"
set internet-service-id 8257544
next
edit "UptimeRobot-Inbound_Email"
set internet-service-id 8257545
next
edit "UptimeRobot-LDAP"
set internet-service-id 8257550
next
edit "UptimeRobot-NetBIOS.Session.Service"
set internet-service-id 8257551
next
edit "UptimeRobot-RTMP"
set internet-service-id 8257552
next
edit "UptimeRobot-NetBIOS.Name.Service"
set internet-service-id 8257560
next
edit "UptimeRobot-UptimeRobot.Monitor"
set internet-service-id 8257709
next
edit "Quovadisglobal-Other"
set internet-service-id 8323072
next
edit "Quovadisglobal-Web"
set internet-service-id 8323073
next
edit "Quovadisglobal-ICMP"
set internet-service-id 8323074
next
edit "Quovadisglobal-DNS"
set internet-service-id 8323075
next
edit "Quovadisglobal-Outbound_Email"
set internet-service-id 8323076
next
edit "Quovadisglobal-SSH"
set internet-service-id 8323078
next
edit "Quovadisglobal-FTP"
set internet-service-id 8323079
next
edit "Quovadisglobal-NTP"
set internet-service-id 8323080
next
edit "Quovadisglobal-Inbound_Email"
set internet-service-id 8323081
next
edit "Quovadisglobal-LDAP"
set internet-service-id 8323086
next
edit "Quovadisglobal-NetBIOS.Session.Service"
set internet-service-id 8323087
next
edit "Quovadisglobal-RTMP"
set internet-service-id 8323088
next
edit "Quovadisglobal-NetBIOS.Name.Service"
set internet-service-id 8323096
next
edit "Splashtop-Splashtop"
set internet-service-id 8388751
next
edit "Zoox-Other"
set internet-service-id 8454144
next
edit "Zoox-Web"
set internet-service-id 8454145
next
edit "Zoox-ICMP"
set internet-service-id 8454146
next
edit "Zoox-DNS"
set internet-service-id 8454147
next
edit "Zoox-Outbound_Email"
set internet-service-id 8454148
next
edit "Zoox-SSH"
set internet-service-id 8454150
next
edit "Zoox-FTP"
set internet-service-id 8454151
next
edit "Zoox-NTP"
set internet-service-id 8454152
next
edit "Zoox-Inbound_Email"
set internet-service-id 8454153
next
edit "Zoox-LDAP"
set internet-service-id 8454158
next
edit "Zoox-NetBIOS.Session.Service"
set internet-service-id 8454159
next
edit "Zoox-RTMP"
set internet-service-id 8454160
next
edit "Zoox-NetBIOS.Name.Service"
set internet-service-id 8454168
next
edit "Skyfii-Other"
set internet-service-id 8519680
next
edit "Skyfii-Web"
set internet-service-id 8519681
next
edit "Skyfii-ICMP"
set internet-service-id 8519682
next
edit "Skyfii-DNS"
set internet-service-id 8519683
next
edit "Skyfii-Outbound_Email"
set internet-service-id 8519684
next
edit "Skyfii-SSH"
set internet-service-id 8519686
next
edit "Skyfii-FTP"
set internet-service-id 8519687
next
edit "Skyfii-NTP"
set internet-service-id 8519688
next
edit "Skyfii-Inbound_Email"
set internet-service-id 8519689
next
edit "Skyfii-LDAP"
set internet-service-id 8519694
next
edit "Skyfii-NetBIOS.Session.Service"
set internet-service-id 8519695
next
edit "Skyfii-RTMP"
set internet-service-id 8519696
next
edit "Skyfii-NetBIOS.Name.Service"
set internet-service-id 8519704
next
edit "CoffeeBean-Other"
set internet-service-id 8585216
next
edit "CoffeeBean-Web"
set internet-service-id 8585217
next
edit "CoffeeBean-ICMP"
set internet-service-id 8585218
next
edit "CoffeeBean-DNS"
set internet-service-id 8585219
next
edit "CoffeeBean-Outbound_Email"
set internet-service-id 8585220
next
edit "CoffeeBean-SSH"
set internet-service-id 8585222
next
edit "CoffeeBean-FTP"
set internet-service-id 8585223
next
edit "CoffeeBean-NTP"
set internet-service-id 8585224
next
edit "CoffeeBean-Inbound_Email"
set internet-service-id 8585225
next
edit "CoffeeBean-LDAP"
set internet-service-id 8585230
next
edit "CoffeeBean-NetBIOS.Session.Service"
set internet-service-id 8585231
next
edit "CoffeeBean-RTMP"
set internet-service-id 8585232
next
edit "CoffeeBean-NetBIOS.Name.Service"
set internet-service-id 8585240
next
edit "Cloud4Wi-Other"
set internet-service-id 8650752
next
edit "Cloud4Wi-Web"
set internet-service-id 8650753
next
edit "Cloud4Wi-ICMP"
set internet-service-id 8650754
next
edit "Cloud4Wi-DNS"
set internet-service-id 8650755
next
edit "Cloud4Wi-Outbound_Email"
set internet-service-id 8650756
next
edit "Cloud4Wi-SSH"
set internet-service-id 8650758
next
edit "Cloud4Wi-FTP"
set internet-service-id 8650759
next
edit "Cloud4Wi-NTP"
set internet-service-id 8650760
next
edit "Cloud4Wi-Inbound_Email"
set internet-service-id 8650761
next
edit "Cloud4Wi-LDAP"
set internet-service-id 8650766
next
edit "Cloud4Wi-NetBIOS.Session.Service"
set internet-service-id 8650767
next
edit "Cloud4Wi-RTMP"
set internet-service-id 8650768
next
edit "Cloud4Wi-NetBIOS.Name.Service"
set internet-service-id 8650776
next
edit "Panda-Panda.Security"
set internet-service-id 8716432
next
edit "Ewon-Talk2M"
set internet-service-id 8781970
next
edit "Nutanix-Nutanix.Cloud"
set internet-service-id 8847507
next
edit "Backblaze-Other"
set internet-service-id 8912896
next
edit "Backblaze-Web"
set internet-service-id 8912897
next
edit "Backblaze-ICMP"
set internet-service-id 8912898
next
edit "Backblaze-DNS"
set internet-service-id 8912899
next
edit "Backblaze-Outbound_Email"
set internet-service-id 8912900
next
edit "Backblaze-SSH"
set internet-service-id 8912902
next
edit "Backblaze-FTP"
set internet-service-id 8912903
next
edit "Backblaze-NTP"
set internet-service-id 8912904
next
edit "Backblaze-Inbound_Email"
set internet-service-id 8912905
next
edit "Backblaze-LDAP"
set internet-service-id 8912910
next
edit "Backblaze-NetBIOS.Session.Service"
set internet-service-id 8912911
next
edit "Backblaze-RTMP"
set internet-service-id 8912912
next
edit "Backblaze-NetBIOS.Name.Service"
set internet-service-id 8912920
next
edit "Aerohive-Aerohive.Cloud"
set internet-service-id 8978580
next
edit "XING-Other"
set internet-service-id 9043968
next
edit "XING-Web"
set internet-service-id 9043969
next
edit "XING-ICMP"
set internet-service-id 9043970
next
edit "XING-DNS"
set internet-service-id 9043971
next
edit "XING-Outbound_Email"
set internet-service-id 9043972
next
edit "XING-SSH"
set internet-service-id 9043974
next
edit "XING-FTP"
set internet-service-id 9043975
next
edit "XING-NTP"
set internet-service-id 9043976
next
edit "XING-Inbound_Email"
set internet-service-id 9043977
next
edit "XING-LDAP"
set internet-service-id 9043982
next
edit "XING-NetBIOS.Session.Service"
set internet-service-id 9043983
next
edit "XING-RTMP"
set internet-service-id 9043984
next
edit "XING-NetBIOS.Name.Service"
set internet-service-id 9043992
next
edit "Genesys-PureCloud"
set internet-service-id 9109653
next
edit "BlackBerry-Cylance"
set internet-service-id 9175190
next
edit "DigiCert-OCSP"
set internet-service-id 9240728
next
edit "Infomaniak-SwissTransfer"
set internet-service-id 9306265
next
edit "Fuze-Fuze"
set internet-service-id 9371802
next
edit "Truecaller-Truecaller"
set internet-service-id 9437339
next
edit "GlobalSign-OCSP"
set internet-service-id 9502872
next
edit "VeriSign-OCSP"
set internet-service-id 9568408
next
edit "Sony-PlayStation.Network"
set internet-service-id 9633952
next
edit "Acronis-Cyber.Cloud"
set internet-service-id 9699489
next
edit "RingCentral-RingCentral"
set internet-service-id 9765027
next
edit "FSecure-FSecure"
set internet-service-id 9830564
next
edit "Kaseya-Kaseya.Cloud"
set internet-service-id 9896101
next
edit "Shodan-Scanner"
set internet-service-id 9961638
next
edit "Censys-Scanner"
set internet-service-id 10027174
next
edit "Valve-Steam"
set internet-service-id 10092711
next
edit "YouSeeU-Bongo"
set internet-service-id 10158248
next
edit "Cato-Cato.Cloud"
set internet-service-id 10223785
next
edit "SolarWinds-SpamExperts"
set internet-service-id 10289323
next
edit "SolarWinds-Pingdom.Probe"
set internet-service-id 10289326
next
edit "SolarWinds-SolarWinds.RMM"
set internet-service-id 10289379
next
edit "8X8-8X8.Cloud"
set internet-service-id 10354860
next
edit "Zattoo-Zattoo.TV"
set internet-service-id 10420401
next
edit "Datto-Datto.RMM"
set internet-service-id 10485939
next
edit "Barracuda-Barracuda.Cloud"
set internet-service-id 10551477
next
edit "Naver-Line"
set internet-service-id 10617015
next
edit "Disney-Disney+"
set internet-service-id 10682552
next
edit "DNS-DoH_DoT"
set internet-service-id 10748089
next
edit "Quad9-Quad9.Standard.DNS"
set internet-service-id 10813626
next
edit "Stretchoid-Scanner"
set internet-service-id 10879142
next
edit "Poly-RealConnect.Service"
set internet-service-id 10944700
next
edit "Telegram-Telegram"
set internet-service-id 11010249
next
edit "Spotify-Spotify"
set internet-service-id 11075786
next
edit "NextDNS-NextDNS"
set internet-service-id 11141324
next
edit "Fastly-CDN"
set internet-service-id 11206793
next
edit "Neustar-UltraDNS.Probes"
set internet-service-id 11272397
next
edit "Malicious-Malicious.Server"
set internet-service-id 11337935
next
edit "NIST-ITS"
set internet-service-id 11403472
next
edit "Jamf-Jamf.Cloud"
set internet-service-id 11469009
next
edit "Alcatel.Lucent-Rainbow"
set internet-service-id 11534546
next
edit "Forcepoint-Forcepoint.Cloud"
set internet-service-id 11600083
next
edit "Datadog-Datadog"
set internet-service-id 11665620
next
edit "Mimecast-Mimecast"
set internet-service-id 11731157
next
edit "MediaFire-Other"
set internet-service-id 11796480
next
edit "MediaFire-Web"
set internet-service-id 11796481
next
edit "MediaFire-ICMP"
set internet-service-id 11796482
next
edit "MediaFire-DNS"
set internet-service-id 11796483
next
edit "MediaFire-Outbound_Email"
set internet-service-id 11796484
next
edit "MediaFire-SSH"
set internet-service-id 11796486
next
edit "MediaFire-FTP"
set internet-service-id 11796487
next
edit "MediaFire-NTP"
set internet-service-id 11796488
next
edit "MediaFire-Inbound_Email"
set internet-service-id 11796489
next
edit "MediaFire-LDAP"
set internet-service-id 11796494
next
edit "MediaFire-NetBIOS.Session.Service"
set internet-service-id 11796495
next
edit "MediaFire-RTMP"
set internet-service-id 11796496
next
edit "MediaFire-NetBIOS.Name.Service"
set internet-service-id 11796504
next
edit "Pandora-Pandora"
set internet-service-id 11862230
next
edit "SiriusXM-SiriusXM"
set internet-service-id 11927767
next
edit "Hopin-Hopin"
set internet-service-id 11993304
next
edit "RedShield-RedShield.Cloud"
set internet-service-id 12058842
next
edit "InterneTTL-Scanner"
set internet-service-id 12124326
next
edit "VadeSecure-VadeSecure.Cloud"
set internet-service-id 12189915
next
edit "Netskope-Netskope.Cloud"
set internet-service-id 12255452
next
edit "ClickMeeting-ClickMeeting"
set internet-service-id 12320989
next
edit "Tenable-Tenable.io.Cloud.Scanner"
set internet-service-id 12386528
next
edit "Vidyo-VidyoCloud"
set internet-service-id 12452065
next
edit "OpenNIC-OpenNIC.DNS"
set internet-service-id 12517602
next
edit "Sectigo-Sectigo"
set internet-service-id 12583141
next
edit "DigitalOcean-DigitalOcean.Platform"
set internet-service-id 12648679
next
edit "Pitney.Bowes-Pitney.Bowes.Data.Center"
set internet-service-id 12714216
next
edit "VPN-Anonymous.VPN"
set internet-service-id 12779753
next
edit "Blockchain-Crypto.Mining.Pool"
set internet-service-id 12845290
next
edit "FactSet-FactSet"
set internet-service-id 12910830
next
edit "Bloomberg-Bloomberg"
set internet-service-id 12976367
next
edit "Five9-Five9"
set internet-service-id 13041904
next
edit "Gigas-Gigas.Cloud"
set internet-service-id 13107441
next
edit "Imperva-Imperva.Cloud.WAF"
set internet-service-id 13172978
next
edit "INAP-INAP"
set internet-service-id 13238515
next
edit "Azion-Azion.Platform"
set internet-service-id 13304053
next
edit "Hurricane.Electric-Hurricane.Electric.Internet.Services"
set internet-service-id 13369590
next
edit "NodePing-NodePing.Probe"
set internet-service-id 13435127
next
edit "Frontline-Frontline"
set internet-service-id 13500665
next
edit "Tally-Tally.ERP"
set internet-service-id 13566202
next
edit "Hosting-Bulletproof.Hosting"
set internet-service-id 13631739
next
edit "DNS-Root.Name.Servers"
set internet-service-id 10748156
next
edit "Okko-Okko.TV"
set internet-service-id 13697277
next
edit "Voximplant-Voximplant.Platform"
set internet-service-id 13762829
next
edit "Fortinet-FortiGuard.Secure.DNS"
set internet-service-id 1245454
next
edit "OVHcloud-OVHcloud"
set internet-service-id 13828367
next
edit "Adobe-Adobe.Sign"
set internet-service-id 917776
next
edit "SentinelOne-SentinelOne.Cloud"
set internet-service-id 13893905
next
edit "Kakao-Kakao.Services"
set internet-service-id 13959442
next
edit "Stripe-Stripe"
set internet-service-id 14024979
next
edit "NetScout-Scanner"
set internet-service-id 14090406
next
edit "Recyber-Scanner"
set internet-service-id 14155942
next
edit "Cyber.Casa-Scanner"
set internet-service-id 14221478
next
edit "Atlassian-Atlassian.Notification"
set internet-service-id 3932436
next
edit "Amazon-Amazon.SES"
set internet-service-id 393493
next
edit "GTHost-Dedicated.Instant.Servers"
set internet-service-id 14287132
next
edit "ivi-ivi.Streaming"
set internet-service-id 14352669
next
edit "BinaryEdge-Scanner"
set internet-service-id 14418086
next
edit "Fintech-MarketMap.Terminal"
set internet-service-id 14483742
next
edit "xMatters-xMatters.Platform"
set internet-service-id 14549279
next
edit "Blizzard-Battle.Net"
set internet-service-id 14614816
next
edit "Axon-Evidence"
set internet-service-id 14680353
next
edit "CDN77-CDN"
set internet-service-id 14745737
next
edit "GCore.Labs-CDN"
set internet-service-id 14811273
next
edit "Matrix42-FastViewer"
set internet-service-id 14876962
next
edit "Fortinet-FortiEDR"
set internet-service-id 1245475
next
edit "Bunny.net-CDN"
set internet-service-id 14942345
next
edit "Akamai-Linode.Cloud"
set internet-service-id 7930148
next
edit "StackPath-CDN"
set internet-service-id 15007881
next
edit "Edgio-CDN"
set internet-service-id 15073417
next
edit "CacheFly-CDN"
set internet-service-id 15138953
next
edit "Fortinet-FortiClient.EMS"
set internet-service-id 1245477
next
edit "Paylocity-Paylocity"
set internet-service-id 15204646
next
edit "Qualys-Qualys.Cloud.Platform"
set internet-service-id 15270183
next
edit "Dailymotion-Other"
set internet-service-id 15335424
next
edit "Dailymotion-Web"
set internet-service-id 15335425
next
edit "Dailymotion-ICMP"
set internet-service-id 15335426
next
edit "Dailymotion-DNS"
set internet-service-id 15335427
next
edit "Dailymotion-Outbound_Email"
set internet-service-id 15335428
next
edit "Dailymotion-SSH"
set internet-service-id 15335430
next
edit "Dailymotion-FTP"
set internet-service-id 15335431
next
edit "Dailymotion-NTP"
set internet-service-id 15335432
next
edit "Dailymotion-Inbound_Email"
set internet-service-id 15335433
next
edit "Dailymotion-LDAP"
set internet-service-id 15335438
next
edit "Dailymotion-NetBIOS.Session.Service"
set internet-service-id 15335439
next
edit "Dailymotion-RTMP"
set internet-service-id 15335440
next
edit "Dailymotion-NetBIOS.Name.Service"
set internet-service-id 15335448
next
edit "Fortinet-FortiWeb.Cloud"
set internet-service-id 1245480
next
edit "Fortinet-FortiSASE"
set internet-service-id 1245481
next
edit "LaunchDarkly-LaunchDarkly.Platform"
set internet-service-id 15401258
next
edit "Medianova-CDN"
set internet-service-id 15466633
next
edit "NetDocuments-NetDocuments.Platform"
set internet-service-id 15532331
next
edit "Vonage-Vonage.Contact.Center"
set internet-service-id 15597869
next
edit "Microsoft-Azure.Monitor"
set internet-service-id 327958
next
edit "Microsoft-Azure.SQL"
set internet-service-id 327959
next
edit "Microsoft-Azure.AD"
set internet-service-id 327960
next
edit "Microsoft-Azure.Data.Factory"
set internet-service-id 327961
next
edit "Microsoft-Azure.Virtual.Desktop"
set internet-service-id 327962
next
edit "Microsoft-Azure.Power.BI"
set internet-service-id 327963
next
edit "Microsoft-Azure.Connectors"
set internet-service-id 327980
next
edit "Amazon-AWS.EBS"
set internet-service-id 393470
next
edit "Amazon-AWS.Cloud9"
set internet-service-id 393471
next
edit "Amazon-AWS.DynamoDB"
set internet-service-id 393472
next
edit "Amazon-AWS.Route53"
set internet-service-id 393473
next
edit "Amazon-AWS.S3"
set internet-service-id 393474
next
edit "Amazon-AWS.Kinesis.Video.Streams"
set internet-service-id 393475
next
edit "Amazon-AWS.Global.Accelerator"
set internet-service-id 393476
next
edit "Amazon-AWS.EC2"
set internet-service-id 393477
next
edit "Amazon-AWS.API.Gateway"
set internet-service-id 393478
next
edit "Amazon-AWS.Chime.Voice.Connector"
set internet-service-id 393479
next
edit "Amazon-AWS.Connect"
set internet-service-id 393480
next
edit "Amazon-AWS.CloudFront"
set internet-service-id 393481
next
edit "Amazon-AWS.CodeBuild"
set internet-service-id 393482
next
edit "Amazon-AWS.Chime.Meetings"
set internet-service-id 393483
next
edit "Amazon-AWS.AppFlow"
set internet-service-id 393484
next
edit "DNS-ARPA.Name.Servers"
set internet-service-id 10748206
next
edit "Veritas-Enterprise.Vault.Cloud"
set internet-service-id 15663407
next
edit "UK.NCSC-Scanner"
set internet-service-id 15728806
next
edit "Vonage-Vonage.Video.API"
set internet-service-id 15597872
next
edit "Restream-Restream.Platform"
set internet-service-id 15794481
next
edit "NewRelic-Synthetic.Monitor"
set internet-service-id 4849970
next
edit "ArcticWolf-ArcticWolf.Cloud"
set internet-service-id 15860019
next
edit "CounterPath-Bria"
set internet-service-id 15925556
next
edit "CriminalIP-Scanner"
set internet-service-id 15990950
next
end
config firewall internet-service-definition
end
config log syslogd setting
set status enable
set server "hb.tahoho.com.tw"
end
config log tap-device
edit "default-tap-gui"
set status enable
set port 12121
set format json
config filter
set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set ztna-traffic disable
set anomaly disable
set voip disable
config free-style
edit 1
set category event
set filter "subtype router or VPN"
set filter-type exclude
next
end
end
next
end
config system standalone-cluster
config cluster-peer
end
end
config system fortiguard
end
config endpoint-control fctems
edit 1
next
edit 2
next
edit 3
next
edit 4
next
edit 5
next
edit 6
next
edit 7
next
end
config system email-server
set server "notification.fortinet.net"
set port 465
set security smtps
end
config system session-helper
edit 1
set name pptp
set protocol 6
set port 1723
next
edit 2
set name h323
set protocol 6
set port 1720
next
edit 3
set name ras
set protocol 17
set port 1719
next
edit 4
set name tns
set protocol 6
set port 1521
next
edit 5
set name tftp
set protocol 17
set port 69
next
edit 6
set name rtsp
set protocol 6
set port 554
next
edit 7
set name rtsp
set protocol 6
set port 7070
next
edit 8
set name rtsp
set protocol 6
set port 8554
next
edit 9
set name ftp
set protocol 6
set port 21
next
edit 10
set name mms
set protocol 6
set port 1863
next
edit 11
set name pmap
set protocol 6
set port 111
next
edit 12
set name pmap
set protocol 17
set port 111
next
edit 13
set name sip
set protocol 17
set port 5060
next
edit 14
set name dns-udp
set protocol 17
set port 53
next
edit 15
set name rsh
set protocol 6
set port 514
next
edit 16
set name rsh
set protocol 6
set port 512
next
edit 17
set name dcerpc
set protocol 6
set port 135
next
edit 18
set name dcerpc
set protocol 17
set port 135
next
edit 19
set name mgcp
set protocol 17
set port 2427
next
edit 20
set name mgcp
set protocol 17
set port 2727
next
end
config system auto-install
set auto-install-config enable
set auto-install-image enable
end
config system ntp
set ntpsync enable
end
config system ftm-push
set server-cert "Fortinet_Factory"
end
config system automation-trigger
edit "Local Cert Expired Notification"
set description "Default automation trigger configuration for when a local certificate is near expiration."
set event-type local-cert-near-expiry
next
end
config system automation-action
edit "Reboot FortiGate"
set description "Default automation action configuration for rebooting this FortiGate unit."
set action-type system-actions
set system-action reboot
set minimum-interval 300
next
edit "Shutdown FortiGate"
set description "Default automation action configuration for shuting down this FortiGate unit."
set action-type system-actions
set system-action shutdown
next
edit "Backup Config Disk"
set description "Default automation action configuration for backing up the configuration on disk."
set action-type system-actions
set system-action backup-config
next
end
config system federated-upgrade
set status done
set upgrade-id 2
config node-list
edit "FGT60ETK19074362"
set timing immediate
set setup-time 10:13 2022/11/22 UTC
set upgrade-path 7-2-3
next
end
end
config system ike
set dh-multiprocess disable
end
config system object-tagging
edit "default"
next
end
config switch-controller traffic-policy
edit "quarantine"
set description "Rate control for quarantined traffic"
set guaranteed-bandwidth 163840
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 1
next
edit "sniffer"
set description "Rate control for sniffer mirrored traffic"
set guaranteed-bandwidth 50000
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 2
next
end
config system settings
set h323-direct-model enable
end
config firewall address
edit "FABRIC_DEVICE"
set uuid c280435a-20ca-51ec-32cb-51245c70f321
set comment "IPv4 addresses of Fabric Devices."
next
edit "none"
set uuid 8823e112-0565-51ea-d36f-e706e34d16b8
set subnet 0.0.0.0 255.255.255.255
next
edit "all"
set uuid 895009e4-0565-51ea-3fe0-32ef6fe0a3b2
next
edit "FIREWALL_AUTH_PORTAL_ADDRESS"
set uuid 89501542-0565-51ea-4577-283ae704134a
next
edit "SSLVPN_TUNNEL_ADDR1"
set uuid 8952e718-0565-51ea-4393-cad073ac79e8
set type iprange
set start-ip 192.167.3.200
set end-ip 192.167.3.250
next
edit "FCTEMS_ALL_FORTICLOUD_SERVERS"
set uuid f79a919e-20ca-51ec-1910-8036471a7326
set type dynamic
set sub-type ems-tag
next
edit "AWS"
set uuid 5510a75e-080c-51ed-3137-944b1e0a5c33
set type fqdn
set fqdn "aws.amazon.com"
next
edit "GCP"
set uuid e1d8502c-080e-51ed-3d52-afb92af86416
set type fqdn
set fqdn "*.googleapis.com"
next
edit "IT component"
set uuid 94994a18-080f-51ed-6af7-5aa8bfe6ac5d
set subnet 192.167.3.110 255.255.255.255
next
edit "Anydesk"
set uuid 0d95a9d6-08c2-51ed-36fb-6519f169a2da
set type fqdn
set fqdn "*.net.anydesk.com"
next
edit "Internal-Network"
set uuid 164b68a2-4474-51ed-9f6d-b3bdeec78038
set subnet 192.167.3.0 255.255.255.0
next
edit "GLPI-Server"
set uuid 082f87f2-6c61-51ed-3096-34543e3d36f0
set type fqdn
set associated-interface "wan1"
set fqdn "glpi.tahoho.com.tw"
next
edit "Advantech-MQTT-Broker"
set uuid 69ba27b8-7786-51ed-8445-2358e0ed611b
set subnet 20.187.120.82 255.255.255.255
next
edit "Advantech_MQTT Broker_DCCS Server"
set uuid 1e5d486a-79cd-51ed-cbb2-8243fa78d353
set subnet 20.205.0.212 255.255.255.255
next
edit "EMS_ALL_UNMANAGEABLE_CLIENTS"
set uuid 7118106a-caa6-51ed-b0c1-e5b11c255a7d
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "EMS_ALL_UNKNOWN_CLIENTS"
set uuid 753705de-caa6-51ed-f238-192aab3ad4bc
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "time.google.com"
set uuid 245f4f48-3b0f-51ee-709d-1d53772945b7
set type fqdn
set fqdn "time.google.com"
next
edit "time.windows.com"
set uuid 88416532-3b0f-51ee-a4b1-e4b1e22a0daf
set type fqdn
set fqdn "time.windows.com"
next
edit "tw.ntp.org.cn"
set uuid 9efa1cb0-3b0f-51ee-5ec7-fc93123e5849
set type fqdn
set fqdn "tw.ntp.org.cn"
next
edit "Cloud Scada"
set uuid d178d716-ab68-51ee-5e3e-1b514e5feb76
set type fqdn
set fqdn "scadabroker.myvecid.net"
next
edit "Cloud Scada2"
set uuid 8aecc11e-b0f8-51ee-43bc-e9a20491d778
set type fqdn
set fqdn "cloudscada.myvecid.net"
next
edit "AWS1"
set uuid 17a7be60-b0f9-51ee-af41-16972baf17ce
set type fqdn
set fqdn "amazon.com"
next
edit "AWS2"
set uuid 2cff06ec-b0f9-51ee-be8a-77e167829bdc
set type fqdn
set fqdn "*.amazonaws.com"
next
edit "Git"
set uuid 6cb93f3c-b0f9-51ee-957a-a48d43780031
set type fqdn
set fqdn "raw.githubusercontent.com"
next
edit "gmail smtp"
set uuid fc7d0dce-b0f9-51ee-4896-f49b2864f80b
set type fqdn
set fqdn "smtp.gmail.com"
next
end
config firewall multicast-address
edit "all"
set start-ip 224.0.0.0
set end-ip 239.255.255.255
next
edit "all_hosts"
set start-ip 224.0.0.1
set end-ip 224.0.0.1
next
edit "all_routers"
set start-ip 224.0.0.2
set end-ip 224.0.0.2
next
edit "Bonjour"
set start-ip 224.0.0.251
set end-ip 224.0.0.251
next
edit "EIGRP"
set start-ip 224.0.0.10
set end-ip 224.0.0.10
next
edit "OSPF"
set start-ip 224.0.0.5
set end-ip 224.0.0.6
next
end
config firewall address6
edit "SSLVPN_TUNNEL_IPv6_ADDR1"
set uuid 8952fa1e-0565-51ea-ad15-b41dee749960
set ip6 fdff:ffff::/120
next
edit "all"
set uuid 977709f0-0565-51ea-4c6d-c1c27dfcc701
next
edit "none"
set uuid 97774834-0565-51ea-c37a-e617bf570da7
set ip6 ::/128
next
end
config firewall multicast-address6
edit "all"
set ip6 ff00::/8
next
end
config firewall wildcard-fqdn custom
edit "cdn-apple"
set uuid c2981412-20ca-51ec-1179-40a49be8670f
set wildcard-fqdn "*.cdn-apple.com"
next
edit "mzstatic-apple"
set uuid c2981c28-20ca-51ec-9cac-b6859b8913c0
set wildcard-fqdn "*.mzstatic.com"
next
edit "adobe"
set uuid 8959fc4c-0565-51ea-196a-6c4fe154617f
set wildcard-fqdn "*.adobe.com"
next
edit "Adobe Login"
set uuid 895a046c-0565-51ea-9cb2-dc5a0003cce2
set wildcard-fqdn "*.adobelogin.com"
next
edit "android"
set uuid 895a0b92-0565-51ea-8588-4a1d35d7b2a9
set wildcard-fqdn "*.android.com"
next
edit "apple"
set uuid 895a12a4-0565-51ea-af24-97fcc9860987
set wildcard-fqdn "*.apple.com"
next
edit "appstore"
set uuid 895a19b6-0565-51ea-3d3a-d27561e20683
set wildcard-fqdn "*.appstore.com"
next
edit "auth.gfx.ms"
set uuid 895a20d2-0565-51ea-01fa-0d0c3d44143b
set wildcard-fqdn "*.auth.gfx.ms"
next
edit "citrix"
set uuid 895a2898-0565-51ea-3e7a-b5b2188da639
set wildcard-fqdn "*.citrixonline.com"
next
edit "dropbox.com"
set uuid 895a2fbe-0565-51ea-90c2-00baf3ee5ea1
set wildcard-fqdn "*.dropbox.com"
next
edit "eease"
set uuid 895a36e4-0565-51ea-1f2e-da7f3fec5272
set wildcard-fqdn "*.eease.com"
next
edit "firefox update server"
set uuid 895a3df6-0565-51ea-e355-095537e769fc
set wildcard-fqdn "aus*.mozilla.org"
next
edit "fortinet"
set uuid 895a4526-0565-51ea-c7dc-8a26f8ebc029
set wildcard-fqdn "*.fortinet.com"
next
edit "googleapis.com"
set uuid 895a4d28-0565-51ea-2980-5688d49e10e0
set wildcard-fqdn "*.googleapis.com"
next
edit "google-drive"
set uuid 895a5462-0565-51ea-2ec8-5b5070b2f663
set wildcard-fqdn "*drive.google.com"
next
edit "google-play2"
set uuid 895a5b9c-0565-51ea-ee3a-12697029d986
set wildcard-fqdn "*.ggpht.com"
next
edit "google-play3"
set uuid 895a62e0-0565-51ea-5215-a3328e8a44c3
set wildcard-fqdn "*.books.google.com"
next
edit "Gotomeeting"
set uuid 895a6a1a-0565-51ea-4ad2-3bb22ac4ecde
set wildcard-fqdn "*.gotomeeting.com"
next
edit "icloud"
set uuid 895a769a-0565-51ea-df48-16b443fa9b99
set wildcard-fqdn "*.icloud.com"
next
edit "itunes"
set uuid 895a7ea6-0565-51ea-b9a8-bd117479fbd0
set wildcard-fqdn "*itunes.apple.com"
next
edit "microsoft"
set uuid 895a85f4-0565-51ea-7c87-13d8d300c891
set wildcard-fqdn "*.microsoft.com"
next
edit "skype"
set uuid 895a8d38-0565-51ea-574a-cce1a38aa276
set wildcard-fqdn "*.messenger.live.com"
next
edit "softwareupdate.vmware.com"
set uuid 895a9472-0565-51ea-a317-4480abafb573
set wildcard-fqdn "*.softwareupdate.vmware.com"
next
edit "verisign"
set uuid 895a9bc0-0565-51ea-e4e8-5bd2b55004fd
set wildcard-fqdn "*.verisign.com"
next
edit "Windows update 2"
set uuid 895aa304-0565-51ea-0763-a0097c5fc8f4
set wildcard-fqdn "*.windowsupdate.com"
next
edit "live.com"
set uuid 895aaa52-0565-51ea-6a32-d54560b0f643
set wildcard-fqdn "*.live.com"
next
edit "google-play"
set uuid 895ab196-0565-51ea-b9ee-06a5c4bc4557
set wildcard-fqdn "*play.google.com"
next
edit "update.microsoft.com"
set uuid 895ab8ee-0565-51ea-7a9f-063a33a37854
set wildcard-fqdn "*update.microsoft.com"
next
edit "swscan.apple.com"
set uuid 895ac046-0565-51ea-baa8-d00f1dea8ca0
set wildcard-fqdn "*swscan.apple.com"
next
edit "autoupdate.opera.com"
set uuid 895ac794-0565-51ea-57fb-f59368694234
set wildcard-fqdn "*autoupdate.opera.com"
next
end
config firewall service category
edit "General"
set comment "General services."
next
edit "Web Access"
set comment "Web access."
next
edit "File Access"
set comment "File access."
next
edit "Email"
set comment "Email services."
next
edit "Network Services"
set comment "Network services."
next
edit "Authentication"
set comment "Authentication service."
next
edit "Remote Access"
set comment "Remote access."
next
edit "Tunneling"
set comment "Tunneling service."
next
edit "VoIP, Messaging & Other Applications"
set comment "VoIP, messaging, and other applications."
next
edit "Web Proxy"
set comment "Explicit web proxy."
next
end
config firewall service custom
edit "DNS"
set category "Network Services"
set tcp-portrange 53
set udp-portrange 53
next
edit "HTTP"
set category "Web Access"
set tcp-portrange 80
next
edit "HTTPS"
set category "Web Access"
set tcp-portrange 443
next
edit "IMAP"
set category "Email"
set tcp-portrange 143
next
edit "IMAPS"
set category "Email"
set tcp-portrange 993
next
edit "LDAP"
set category "Authentication"
set tcp-portrange 389
next
edit "DCE-RPC"
set category "Remote Access"
set tcp-portrange 135
set udp-portrange 135
next
edit "POP3"
set category "Email"
set tcp-portrange 110
next
edit "POP3S"
set category "Email"
set tcp-portrange 995
next
edit "SAMBA"
set category "File Access"
set tcp-portrange 139
next
edit "SMTP"
set category "Email"
set tcp-portrange 25
next
edit "SMTPS"
set category "Email"
set tcp-portrange 465
next
edit "KERBEROS"
set category "Authentication"
set tcp-portrange 88 464
set udp-portrange 88 464
next
edit "LDAP_UDP"
set category "Authentication"
set udp-portrange 389
next
edit "SMB"
set category "File Access"
set tcp-portrange 445
next
edit "FTP"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_GET"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_PUT"
set category "File Access"
set tcp-portrange 21
next
edit "ALL"
set category "General"
set protocol IP
next
edit "ALL_TCP"
set category "General"
set tcp-portrange 1-65535
next
edit "ALL_UDP"
set category "General"
set udp-portrange 1-65535
next
edit "ALL_ICMP"
set category "General"
set protocol ICMP
unset icmptype
next
edit "ALL_ICMP6"
set category "General"
set protocol ICMP6
unset icmptype
next
edit "GRE"
set category "Tunneling"
set protocol IP
set protocol-number 47
next
edit "AH"
set category "Tunneling"
set protocol IP
set protocol-number 51
next
edit "ESP"
set category "Tunneling"
set protocol IP
set protocol-number 50
next
edit "AOL"
set tcp-portrange 5190-5194
next
edit "BGP"
set category "Network Services"
set tcp-portrange 179
next
edit "DHCP"
set category "Network Services"
set udp-portrange 67-68
next
edit "FINGER"
set tcp-portrange 79
next
edit "GOPHER"
set tcp-portrange 70
next
edit "H323"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1720 1503
set udp-portrange 1719
next
edit "IKE"
set category "Tunneling"
set udp-portrange 500 4500
next
edit "Internet-Locator-Service"
set tcp-portrange 389
next
edit "IRC"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 6660-6669
next
edit "L2TP"
set category "Tunneling"
set tcp-portrange 1701
set udp-portrange 1701
next
edit "NetMeeting"
set tcp-portrange 1720
next
edit "NFS"
set category "File Access"
set tcp-portrange 111 2049
set udp-portrange 111 2049
next
edit "NNTP"
set tcp-portrange 119
next
edit "NTP"
set category "Network Services"
set tcp-portrange 123
set udp-portrange 123
next
edit "OSPF"
set category "Network Services"
set protocol IP
set protocol-number 89
next
edit "PC-Anywhere"
set category "Remote Access"
set tcp-portrange 5631
set udp-portrange 5632
next
edit "PING"
set category "Network Services"
set protocol ICMP
set icmptype 8
unset icmpcode
next
edit "TIMESTAMP"
set protocol ICMP
set icmptype 13
unset icmpcode
next
edit "INFO_REQUEST"
set protocol ICMP
set icmptype 15
unset icmpcode
next
edit "INFO_ADDRESS"
set protocol ICMP
set icmptype 17
unset icmpcode
next
edit "ONC-RPC"
set category "Remote Access"
set tcp-portrange 111
set udp-portrange 111
next
edit "PPTP"
set category "Tunneling"
set tcp-portrange 1723
next
edit "QUAKE"
set udp-portrange 26000 27000 27910 27960
next
edit "RAUDIO"
set udp-portrange 7070
next
edit "REXEC"
set tcp-portrange 512
next
edit "RIP"
set category "Network Services"
set udp-portrange 520
next
edit "RLOGIN"
set tcp-portrange 513:512-1023
next
edit "RSH"
set tcp-portrange 514:512-1023
next
edit "SCCP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 2000
next
edit "SIP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 5060
set udp-portrange 5060
next
edit "SIP-MSNmessenger"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1863
next
edit "SNMP"
set category "Network Services"
set tcp-portrange 161-162
set udp-portrange 161-162
next
edit "SSH"
set category "Remote Access"
set tcp-portrange 22
next
edit "SYSLOG"
set category "Network Services"
set udp-portrange 514
next
edit "TALK"
set udp-portrange 517-518
next
edit "TELNET"
set category "Remote Access"
set tcp-portrange 23
next
edit "TFTP"
set category "File Access"
set udp-portrange 69
next
edit "MGCP"
set udp-portrange 2427 2727
next
edit "UUCP"
set tcp-portrange 540
next
edit "VDOLIVE"
set tcp-portrange 7000-7010
next
edit "WAIS"
set tcp-portrange 210
next
edit "WINFRAME"
set tcp-portrange 1494 2598
next
edit "X-WINDOWS"
set category "Remote Access"
set tcp-portrange 6000-6063
next
edit "PING6"
set protocol ICMP6
set icmptype 128
unset icmpcode
next
edit "MS-SQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1433 1434
next
edit "MYSQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 3306
next
edit "RDP"
set category "Remote Access"
set tcp-portrange 3389
next
edit "VNC"
set category "Remote Access"
set tcp-portrange 5900
next
edit "DHCP6"
set category "Network Services"
set udp-portrange 546 547
next
edit "SQUID"
set category "Tunneling"
set tcp-portrange 3128
next
edit "SOCKS"
set category "Tunneling"
set tcp-portrange 1080
set udp-portrange 1080
next
edit "WINS"
set category "Remote Access"
set tcp-portrange 1512
set udp-portrange 1512
next
edit "RADIUS"
set category "Authentication"
set udp-portrange 1812 1813
next
edit "RADIUS-OLD"
set udp-portrange 1645 1646
next
edit "CVSPSERVER"
set tcp-portrange 2401
set udp-portrange 2401
next
edit "AFS3"
set category "File Access"
set tcp-portrange 7000-7009
set udp-portrange 7000-7009
next
edit "TRACEROUTE"
set category "Network Services"
set udp-portrange 33434-33535
next
edit "RTSP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 554 7070 8554
set udp-portrange 554
next
edit "MMS"
set tcp-portrange 1755
set udp-portrange 1024-5000
next
edit "NONE"
set tcp-portrange 0
next
edit "webproxy"
set proxy enable
set category "Web Proxy"
set protocol ALL
set tcp-portrange 0-65535:0-65535
next
edit "mqtt"
set tcp-portrange 18883 18083 7086
next
edit "UDP53"
set category "Web Access"
set udp-portrange 53
next
edit "MQTT"
set tcp-portrange 8883 443
next
end
config firewall service group
edit "Email Access"
set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS"
next
edit "Web Access"
set member "DNS" "HTTP" "HTTPS"
next
edit "Windows AD"
set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB"
next
edit "Exchange Server"
set member "DCE-RPC" "DNS" "HTTPS"
next
end
config vpn certificate ca
edit "CA_Cert_1"
set ca "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
next
edit "CA_Cert_2"
set ca "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
next
end
config vpn certificate local
edit "Fortinet_CA_SSL"
set password ENC pmK8VLnuOe3hR3DSRmaGH2boH23eSJKKUMHKljRC6lYLMsqfP+pJCJ88wFsb4ZWyHA70K2d2ZJmSLrEcem5pUU3+ylTuagMWrcguxvbsMYH7Oicf/OnGPSs9+2tWuPadBzPluRM+Tutn34brqY4a4keQiR6qy/LsRAR9VZI6wxwxaDTwAmE3DgYqGTJH7XO1EKtBBA==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIgWJjgha3qWICAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECKhPFsP6lUunBIIEyJc59tehaVMZ
5zbf2Ef3qoqaShdEY4TdQggzthRe8Y/xA68ZYv4KkzgN9F3dw/vQw48okRpSTRN6
3R2lMCkgKA1jZo557iplHQkyfdCtjt2Qd1SRHqWWJyAtwNzX5/SO1nGKAmp8gSLD
V1K9kLt07hhQwXsHVF3jJhhBgbp+3Q0EvGLIx6KrN8iF8iZ3HXQ2Vk02Bd7Lo4wq
TQaCtwSjrpVdB9OiW10lI8IBnIfygswDUGm3Olgn/pQLd2p6xPcmi4yXzk0r50EM
wQIpaR/5N+Xrl0/pZz3xkXi7L+6JaduS9dH0fpiBpmyXzlGVUvWwjXFSMTGPJG/5
DXKkWHV3EPnoKCNzwyzcDk3raf9MKp3pRKKyJ0YQlp7w9hJ+lAs6oQ1uYpXjUW4c
XRkEiAyHeBHenuibnSBNWJ6/XyQz/GvIpC4jSjs5FqsLd8kC3Yr7MMXJDS0Il5Sy
ZpoVvDwaBTJSF98aX5qfre8oLbSgwjhWaze1QDk/tWwbdvBFb9uHxX1m/cZ4tTfR
uubCJkWlo9Mw6jWTwMLAix0lYclUkcm9aXVsymEZyJQONENlEWwnoVWpRXSNVmw7
8HEUE+AbTOOx4q+z7+dkCklI4xts/kUg2hvCmGmDxlYY2GAehAo2i0kAy8BXCBiW
hxKBqLnJRks4X/IvlqKTtYu/rot2HQDzrZ0heb6TKH49GJO3SnqtcixwtH5t4wDK
puYJoPU1l8ZOY7MMxa7eIve+0FzaIMW8cdWUD2pJsupPt/vemWHLzHu9rXmGgrNU
BYNOaVwwIl/OpZjC/dpuY+jEXsAvSMOyB9KZS0NAW/kPdBSPaXd213AgRdYep8Vf
IyrFB6e0VhRDUAzRyD8NUxwG/roUAb2js8oLGnumz2cY2HhpLaQXvgDw8n4q4XSf
TuowLsmLdgnjo9GhJfMML5ka8b0VXoTwNI5rXJ8uWb5ZJQ5Os03IUYqPH627147w
yMH1UJtOLS0peflxlL4gK01JMmtiIHnCc0qhmFdGBxP4CtKBrPqjSvJLHixFaYJF
6sr3UPLgNJ0ZJQav2sV8yrrMPd+ou+zs27Xd9+YJvVU3b881itmnTwIweGI5HWT5
hAo0PG5l93AWZ++dN7PrgHmCvKZPjSJ5P2KI/mLwmWgD1uQ3TJGArAltLKtjivxd
sKmO99+8xMVfYZTqoW9cHIfNuvrHb3EcbDo6pIBTCbgvQwIEFk0zPz6gmDluxAie
TQIGEo3S1FjDyHt2lQhXIpbIn5CcAKLxUa4xKBAmGwjxdhvYYdfFyUcOcgYGJrk/
CesS4tlXPnl6AwnLXOzFOhElHgMxW3eqpclwrqsFvXQ61FM41/8QKPrHcXJ4dAAE
VgxKxt+0oQjIohW7+1FRdzxOqgMy5Q4bU7wJhG4To65/FWqWu6IyA7cpGJXDySTQ
jPWaSwO1cA5271uHGC2n6wpvN7NExv5KHLszWDbmluMADMasD5bAAFMM3t6iN6md
c7HL2ejCawj2hsbTHsyaCLgPDsamH1wfCBheMWHYvNxJIp4mU1w+AiZ1qOAwyiMT
y8gjEiqlnEcGmsofcuDEmDYggHuSvlG0aXno1m9CZ/wGLMusTSY73TbWrIwTCPBh
1s6E7hN6dmQc9PJBg2jX5w==
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_CA_Untrusted"
set password ENC 67ndzh71oJqFP0BsKynEDDASX0z5CiDdmUrXH9u9vTQjzYHrE8r9fr8NyNa1WuPsAzcEq/Pet1ZY+Mn4M3yeTPLYBNAO5YBM1u+uyKX/NcxsQUbkl0MrYyxVCpJQzDa+7DZdwyuinml8oLVanBa42JpIV7rA3H2nHbnOxDgI0zLxEPP1aZF2Ic7p3Rl3qzzE7hDNQw==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL"
set password ENC 7TpYyssjmM1xHMY1HJh/Qe2ly5NvT8h8l1SJvVQQJMWrGz+cIGl2Qj0dVtahLtqfJX4rekiPWJ3tJShgU/gXc5zSmQQg4vF3/8vWzWMdUltNGpx8fHHBn85oIF8kwpSnwchhcXyF8vsDGGmU0xLAcKtlBtjcGJqmi3lJN3Lzk2x/b1Z9cQ8bTMJ7pyrMl0Y3j7V7+w==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_GUI_Server"
set password ENC uzaKATA8oH4GnfUEdGGYiKJgLRTym463kEgLUKAnmSOgi77e6r0fu9O/Ds3vpsev3d3DaSFA+6/4LporVO4hPC37BLXUU/NRoWntVhov2zFkd/Wd9+ZXlTKQ5vqWI0xnCj64Z95ex4CRoyHTXGLQ/9CwstXMwp89JPDMv3SLbnZ6FjvNJEMySA0ayzsp/Kd5DMh3Uw==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1666946068
next
edit "Fortinet_SSL_RSA1024"
set password ENC PK5I3QgCfD81QoTIoNR6G1MKT514WQ64ObSKCE4DNP6fJZlB9XzoyrG6shQl1IiSzDqrO1vypqSavBkDnuLaEl/vfjCyBCYxcG1mxj9HMj+nseVLNnhEWyv9ghvoOD/dDTZGJ5k7G6WaivFy0laaqX/Db2WKW5i3XFPsqeYPFV7k4h512zsybnNPwbp99Cgfd3lfYg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL_RSA2048"
set password ENC 0R+kjZjmvWuaVVo49nOIAUcYKJN2pN6U5Xmak7j5HdLevfM/sq0vcKhWe7BAFlnAcNyyTyKNGTcythY0jga3OZxiZwMObMG6FugPaDq2bI1NdAf0fvhDIYdFGqZjyYPNsnBBeI9by6v8VtGG8FhjNrsiiiM0ELCj0NS1kDOgEbByW7WHrbXB91d5BebsrgvkiQ+0aw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL_RSA4096"
set password ENC Y8ZpcDZhL8bwlGofDkaMccnsPLnzLcFMvH8AgEgvWuHS7ddiKcTGeVMeo7XzHWX40iUZ9NmGKhQw1u6yebUFanx/S05IJYvuxMgnC1cfD90lT/acHCNAf/hE6ND2pq8hMccr1Elu8ItYfrMcMY6FvHBGTvCEkczjmYJsCTDdLNjaFIftMod7Le1C7uE0JNGnUgue0w==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1632881575
next
edit "Fortinet_SSL_DSA1024"
set password ENC oOrMmU2LTL0mQon54jRUjKvw3oC2iaOk8CIXSVQN3y3qZ5SwF5xYN+fKlstsuEWRrBUo0+vPVrU9KlGmQxebJv2KDag5Cj/FknT4UdoskPlvEAFv9JINEe0uZBpYSaiZD8Cwg8AbTuunqCr8E4429+cEgXo8isugofthhVxhG26FwQCq7+WOOLPE6HvQIqLsJtO4BQ==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL_DSA2048"
set password ENC wQOo94gf3mDLTG/iiIQyEmwXOdXbSaGK5phdNDXbRYKmaCOpQeos5yQ+BzeeUWOym3TW7YDbZT4a/tlImBcTo7JSEjOw7pAwr4tLd571i0YhpLvp0pJ3AwZHTB07658vhdRGmawiacngyw2spWaJNJ681jBFTpwxKo3QbAG3njXfVY5gXbC4gVSY3PvqjAGv9n7GMQ==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIIFLDCCBNKgAwIBAgIEBRHeqDALBglghkgBZQMEAwIwgZ0xCzAJBgNVBAYTAlVT
MRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAPBgNV
BAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZHVDYw
RVRLMTkwNzQzNjIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29t
MB4XDTE5MTExMjE2MDAxOVoXDTI5MTExMjE2MDAxOVowgZ0xCzAJBgNVBAYTAlVT
MRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAPBgNV
BAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZHVDYw
RVRLMTkwNzQzNjIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29t
MIIDRzCCAjoGByqGSM44BAEwggItAoIBAQCu43cOC9ZBjWxMM4qGIlhS6UwZh2v/
rRifTsGIJieRO3jyZ1laJIxvT37bn64LeVozqCACl2Pq3jZwHAFwbH5pZvkmTsGE
t0+jkPMGR7dYJERIBo5sabiAWKH+m2L8S7vDYFqqrTLI/M4Nq2bEcYtJ0u7qJLEp
2n+EEC7Rn6enBD9g5xquqjsGMcZmsgDR74XvzbU24xkEwY1x0vFNi3LesF2Rp9G4
P2uJKHwQ603pUzzS4xyvykMztJOEqDD8VI5e7Lj4XHujWztpTI1JYYYXcecOFVmo
4TWJDNx0ZFFPl3CibmWssgD2jentfv/fcdH6NtS+v0Ao6h4ofTyicRL/AiEAo0zG
L8+Nkz6kxrTFAwSMDqjgcobiGmVLoqcpbGASQtkCggEBAKPluTNhBgEmd72W704e
aqQkG5IwjCIAuRUVBdA2L1P0DXHgxnJ3RwnyLLec0/QAhrtKqcAJBAPY/96CCttN
jvSHEEE+Bfw9U72aEj0UPntXB82S8xD7YWHywbeLrXzSPLHCfvK0qgTJwxlM+ncX
V1+Ni8dMQ3Kf7Mf1UG1QLYBuhBa/TgLyXRaDiYTwWQGBlVweZEvr5LYQ/+ygyrZk
65jX7+r7i5nRDLTwXLbyQNNo9a3M0DaykoaFJv22cRtEmHWS5hIuhZqAsexUOHKg
YRvrRHUTXYovrAb/YlopgnEYphihO5csCRA0pMEcoAt7cxDcExFqscBLT+pO/RVq
55cDggEFAAKCAQAsDwSXzBk+gqtkdBKLKZmRGBCA/VM8RQ0e4TrmWbPWgpAtWavV
9pFFiaTW0SVJssftGPZQeZNb8fD3fdRrcZqmuz4FDinAHilq7fbozcjroSYZyime
kNVPUqMArZgN0j9VFlUvgJUxbk7XMoJwQkvGFe+8hDPbIRn6FpaWmDL587/aWxJw
DE6XZmEJUmFs05TzSP8i97R8TuO3OKMBFrsNFzikntoxnuh1399ZuiSa3YXZS00N
RaOxOvuoWDBcDMLWflr2DKVRgFN6wTTskI7Z2D23hby6VjQ0AJOQS5NzgQrZoj1V
Z76oKRDgqBRo/QxmaXlvduALPgW0/jfQg5VEow0wCzAJBgNVHRMEAjAAMAsGCWCG
SAFlAwQDAgNHADBEAiA5y0DqRpnY6D5vEDN6OwmQSG7zta+E2gm4t0WX5LkgAQIg
N20EbADlEBvZh2qirwCVPoE2vmfeco162xMm3qnOe98=
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL_ECDSA256"
set password ENC kkYWZWJHyToH9RNB0BgCcrBT/21n8leoByxIPcXm2emLgvisoJd4MEyAl6T28RxrJxr2hfQHEuhVR/TtDI9MzzZUweMpc1tiysfs0lZhrKSSDhDh1OspBO8/yd6cddc9Df7bMPF1aHlmXqpKYQKOr+d6rUjm7QWf8LbqThvIO2hMdkbDQllk6VWb6Jl5BMqEQtkGdA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAjPNG96Tm0gYgICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI8yQYnrDmXKAEgZAXsnoR9iZFi2AL
wR/PiubDWS+wwJjC9g4YyrrcjpZdXUffdaNpmv6j+Pkmk//0syBElQCkX7Kastms
pCS9IjuD7bFZ5bJ/2/xBzlX47/lvAuvKkZbew+zcRpvK5MGQqOLBojgQBXbuuKQk
415b6A0E9ijQskjtmzxOY00bVp607yDz9GsHuSrEIywW5QE2lEw=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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=
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL_ECDSA384"
set password ENC OuD+jmEwG4HWpadbf4Hrkizh5mqHLLa7M5XP7mep0OcnmVhqR+r1o92F5MIg8xl2q6RP0gZ7PH14gYwaVKr/mo+MoBhVXsTjCmTuHkCk5F9pKfi1vLpmEePc4m8+lXgCgIcjPc9/pK2uoXslIHYmNBJE7nzfKJEYU7FZBZvvaet1b1A/Y3+RUiHfWYYQQu/22tsNgg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBEzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIxp1J2FzB6ewCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECOwSdl+RUsobBIHAydTirqSPHDS5
gJGKe1aXNxrkQ5mTna8yx0FzcPn4b1oqJzImQtQFRShiE0FsdPQM1uR47miMKSCj
Hz6QInfGWyTvUA2kGckKAEFVxFtULvNuLXTK35F4qWLpcDa8aWadKzkkTUMMrSnX
TErQ43LzEGegCREVkiWHxz3RtxZgO0wvWVjj/BzBCj2P39HB+xAj6Zw+o+7w+U8n
FKXw1e0UYpMLi7nsN5Z1uwJDLspzJUa2pnrrMujm0DTn8pcleTc3
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1573574422
next
edit "Fortinet_SSL_ECDSA521"
set password ENC eb9n4vNsyEyfJtVW51/fvKjj5Po2d3f3eew1Q8fzO0sGikgUEgGR8AalN/spp+b9eKpfp8nEcNeUuLdxamTH8FnJwXoxkhbFCbp3b2CTbrHRv3KEpCgnK61tXSH3SSG8ZVEDiUz6F86qgzNrTK55O9iRIF/JKr+3oHqinzgOb8LIFrFcjw28ScGrZ50attQuvRq+5Q==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBSzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIiNAGo3EwkWkCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECOXyPgy1HsjlBIH4DIRDT2hKpi27
1AjjwcfivKOTMJ/IlGk5oOo34wsd4+r947gXek6UswfDJvnwcMU5S2xsdFJJh/3d
VjVUuKJZPg9WWQk51JgRgwSqWxmkAXsrg4vEtGd6NQAeQZQEMPrFmRxyl1ET6FeV
d9LWi9Kd0V4O20PFjXoJuTkc3N9XqXq+3ezifR6kyK+gymFxER6qa0821ACAm6iI
I0FIJbpxDsyfPKHmRs6eYhGY2VHF1oVTkN/33wkXRq++xO4DrBto1AF6yehX/Ujf
//IQYP6t3AJ/I9LnVk0rm8oRXIPpD8SxcYHItwFK26qcZvdT86zKeBMjR8QtDnE=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1632881575
next
edit "Fortinet_SSL_ED25519"
set password ENC lRWz4P5+TO24JUgrzsJLjAdW0JCu83Ih9tumnMisSm5XhsRTtbvYXT2Ifn+jeTbi5+Ae6MblGBKQuIcViSjD8xIdTa470AwLhpDrXgAeBwSULl9SEi1mfgS5Pa43kWga7iSJDYZnVcE2r444CyhOe5GgXlojc9MbbpzePrF0Sw5ald/KZsJzXm+e0Dc4sbOcjPyD5A==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGKME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAjPfNzwEzkRBQICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIb48J3JziRKEEOA/TmWbwMyVg1Mba
w/cWZ7KIeNcCHR1AaLJdzecmkIFKvb9/mwx3MRItB1BNttG3gb6jm94F5gve
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1632881575
next
edit "Fortinet_SSL_ED448"
set password ENC djZ0Itb+Cd437h4UznOy+o6y0ui5qx1KXZMAFOOq2p5lppyLGoXcZ4Fbb3M8A7EUzZwtxubiYKmrDax71mlr1sdq38s5zXQ0EY+qU5/9fbdXPl8JgSUm+VQeO21ERxwrJn0Vkhahbujp8DfY6+B7xpQbyL2SDAjVI6M3zgD/P6WyRK+ex2aJN3IzpEpNminj0hYqpw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGiME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAhAotrd4Otk2wICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI0SkgsC8zzWIEUCrHMXzC9avJhjad
SZrVGLffIDppMRuiWeYY6UkRxC7njX79vFUUOwnLyuRv0jkjIzSuvuPuBVSSwna5
3RRnCFVz9DnhSvKYkD2L0d/QiffJ
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIICWzCCAdugAwIBAgIEAvCe8zAFBgMrZXEwgZ0xCzAJBgNVBAYTAlVTMRMwEQYD
VQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAPBgNVBAoMCEZv
cnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZHVDYwRVRLMTkw
NzQzNjIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tMB4XDTIx
MDkyOTAyMTI1MloXDTI0MDEwMjAyMTI1MlowgZ0xCzAJBgNVBAYTAlVTMRMwEQYD
VQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAPBgNVBAoMCEZv
cnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZHVDYwRVRLMTkw
NzQzNjIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tMEMwBQYD
K2VxAzoADIFIzroZY3yZWgPJfRjShFVnhdhuZAzaNpeZIq0pLgBZN2I2lm+SuAiH
K+i6uCPHqSPDd5yUwOiAoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUF
BwMBMAUGAytlcQNzALDqj7se91NSAUquRDVEBEcXs7wUqyB7ChtZL+zYwHXQ1RkB
PytklHuBMfWlpDP2eiVEFQbNnwKEAOv9qPUTUrAImRjB2DTx81sR6FGou4qLG2sZ
7trSaOaneC1iGWALqDpuSvFVcS89MqXUxMo9PuoNAA==
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1632881575
next
edit "wildcard.tahoho.com.tw.crt"
set password ENC EeQw4HglndjS4wi7e7UaGzO/5o+ybFXFwwZEqIZTfsng9vDGjnecYErJtldsAtLUh15TiokufhaowSPMg4EU3tmjcGhStwfzCHWeuV96ccXHOMa949RmDgpWVE8W1V8Y/JPCtbpTm08UO0y0SfRpeSTTREPG8+SYPAN3ZMaziH3amYCUAbySsv7eEAJELWLEl/WUqg==
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set last-updated 1664948887
next
end
config webfilter ftgd-local-cat
edit "custom1"
set id 140
next
edit "custom2"
set id 141
next
end
config ips sensor
edit "default"
set comment "Prevent critical attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "sniffer-profile"
set comment "Monitor IPS attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config entries
edit 1
set severity medium high critical
next
end
next
edit "all_default"
set comment "All predefined signatures with default setting."
config entries
edit 1
next
end
next
edit "all_default_pass"
set comment "All predefined signatures with PASS action."
config entries
edit 1
set action pass
next
end
next
edit "protect_http_server"
set comment "Protect against HTTP server-side vulnerabilities."
config entries
edit 1
set location server
set protocol HTTP
next
end
next
edit "protect_email_server"
set comment "Protect against email server-side vulnerabilities."
config entries
edit 1
set location server
set protocol SMTP POP3 IMAP
next
end
next
edit "protect_client"
set comment "Protect against client-side vulnerabilities."
config entries
edit 1
set location client
next
end
next
edit "high_security"
set comment "Blocks all Critical/High/Medium and some Low severity vulnerabilities"
set block-malicious-url enable
config entries
edit 1
set severity medium high critical
set status enable
set action block
next
edit 2
set severity low
next
end
next
end
config firewall shaper traffic-shaper
edit "high-priority"
set maximum-bandwidth 1048576
set per-policy enable
next
edit "medium-priority"
set maximum-bandwidth 1048576
set priority medium
set per-policy enable
next
edit "low-priority"
set maximum-bandwidth 1048576
set priority low
set per-policy enable
next
edit "guarantee-100kbps"
set guaranteed-bandwidth 100
set maximum-bandwidth 1048576
set per-policy enable
next
edit "shared-1M-pipe"
set maximum-bandwidth 1024
next
end
config firewall proxy-address
edit "IPv4-address"
set uuid 564d694e-569b-51ed-d8b4-4cf412545b78
set type host-regex
set host-regex "^([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\\.([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])){3}$"
next
edit "IPv6-address"
set uuid 564d7394-569b-51ed-c487-2cf48a579340
set type host-regex
set host-regex "^\\[(([0-9a-f]{0,4}:){1,7}[0-9a-f]{1,4})\\]$"
next
end
config web-proxy global
set proxy-fqdn "default.fqdn"
end
config application list
edit "default"
set comment "Monitor all applications."
config entries
edit 1
set action pass
next
end
next
edit "sniffer-profile"
set comment "Monitor all applications."
unset options
config entries
edit 1
set action pass
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set deep-app-inspection disable
config entries
edit 1
set action pass
set log disable
next
end
next
edit "block-high-risk"
config entries
edit 1
set category 2 6
next
edit 2
set action pass
next
end
next
end
config dlp data-type
edit "keyword"
set pattern "built-in"
next
edit "regex"
set pattern "built-in"
next
edit "hex"
set pattern "built-in"
next
edit "mip-label"
set pattern "^[[:xdigit:]]{8}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{12}$"
set transform "built-in"
next
edit "credit-card"
set pattern "\\b([2-6]{1}\\d{3})[- ]?(\\d{4})[- ]?(\\d{2})[- ]?(\\d{2})[- ]?(\\d{2,4})\\b"
set verify "built-in"
set look-back 20
set transform "\\b\\1[- ]?\\2[- ]?\\3[- ]?\\4[- ]?\\5\\b"
next
edit "ssn-us"
set pattern "\\b(\\d{3})-(\\d{2})-(\\d{4})\\b"
set verify "(?<!-)\\b(?!666|000|9\\d{2})\\d{3}-(?!00)\\d{2}-(?!0{4})\\d{4}\\b(?!-)"
set look-back 12
set transform "\\b\\1-\\2-\\3\\b"
next
end
config dlp dictionary
edit "def-cc-dict"
set uuid 6cea26a6-569b-51ed-df67-630c2c7ffa67
config entries
edit 1
set type "credit-card"
next
end
next
edit "SSN-Sensor-r1d"
set uuid 6ceae668-569b-51ed-59c7-2637ecc09ef9
config entries
edit 1
set type "regex"
set pattern "WebEx"
next
end
next
edit "def-ssn-dict"
set uuid 6cec4e54-569b-51ed-1352-dc5f81921655
config entries
edit 1
set type "ssn-us"
next
end
next
end
config dlp sensor
edit "def-cc-sensor"
config entries
edit 1
set dictionary "def-cc-dict"
next
end
next
edit "SSN-Sensor-r1s"
config entries
edit 1
set dictionary "SSN-Sensor-r1d"
next
end
next
edit "def-ssn-sensor"
config entries
edit 1
set dictionary "def-ssn-dict"
next
end
next
end
config dlp filepattern
edit 1
set name "builtin-patterns"
config entries
edit "*.bat"
next
edit "*.com"
next
edit "*.dll"
next
edit "*.doc"
next
edit "*.exe"
next
edit "*.gz"
next
edit "*.hta"
next
edit "*.ppt"
next
edit "*.rar"
next
edit "*.scr"
next
edit "*.tar"
next
edit "*.tgz"
next
edit "*.vb?"
next
edit "*.wps"
next
edit "*.xl?"
next
edit "*.zip"
next
edit "*.pif"
next
edit "*.cpl"
next
end
next
edit 2
set name "all_executables"
config entries
edit "bat"
set filter-type type
set file-type bat
next
edit "exe"
set filter-type type
set file-type exe
next
edit "elf"
set filter-type type
set file-type elf
next
edit "hta"
set filter-type type
set file-type hta
next
end
next
end
config dlp profile
edit "default"
set comment "Default profile."
next
edit "sniffer-profile"
set comment "Log a summary of email and web traffic."
set summary-proto smtp pop3 imap http-get http-post
next
edit "Content_Summary"
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Content_Archive"
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Large-File"
config rule
edit 1
set name "Large-File-Filter"
set proto smtp pop3 imap http-get http-post
set file-size 5120
set action log-only
next
end
next
edit "Credit-Card"
config rule
edit 1
set name "Credit-Card-Filter"
set severity high
set proto smtp pop3 imap http-get http-post
set filter-by sensor
set sensor "def-cc-sensor"
set action log-only
next
edit 2
set name "Credit-Card-Filter"
set severity high
set type message
set proto smtp pop3 imap http-post
set filter-by sensor
set sensor "def-cc-sensor"
set action log-only
next
end
next
edit "SSN-Sensor"
set comment "Match SSN numbers but NOT WebEx invite emails."
config rule
edit 1
set name "SSN-Sensor-Filter"
set severity high
set type message
set proto smtp pop3 imap
set filter-by sensor
set sensor "SSN-Sensor-r1s"
next
edit 2
set name "SSN-Sensor-Filter"
set severity high
set type message
set proto smtp pop3 imap
set filter-by sensor
set sensor "def-ssn-sensor"
set action log-only
next
edit 3
set name "SSN-Sensor-Filter"
set severity high
set proto smtp pop3 imap http-get http-post ftp
set filter-by sensor
set sensor "def-ssn-sensor"
set action log-only
next
end
next
end
config webfilter ips-urlfilter-setting
end
config webfilter ips-urlfilter-setting6
end
config log threat-weight
config web
edit 1
set category 26
set level high
next
edit 2
set category 61
set level high
next
edit 3
set category 86
set level high
next
edit 4
set category 1
set level medium
next
edit 5
set category 3
set level medium
next
edit 6
set category 4
set level medium
next
edit 7
set category 5
set level medium
next
edit 8
set category 6
set level medium
next
edit 9
set category 12
set level medium
next
edit 10
set category 59
set level medium
next
edit 11
set category 62
set level medium
next
edit 12
set category 83
set level medium
next
edit 13
set category 72
next
edit 14
set category 14
next
edit 15
set category 96
set level medium
next
end
config application
edit 1
set category 2
next
edit 2
set category 6
set level medium
next
end
end
config icap profile
edit "default"
next
end
config user ldap
edit "Azure-LDAP-Secure-Server"
set server "104.208.87.203"
set server-identity-check disable
set cnid "sAMAccountName"
set dn "DC=tahoho,DC=com,DC=tw"
set type regular
set username "tahoho\\tahotbhq.admin"
set password ENC MTAwNFwmch2x1OqHP2qbECPV6E7jwwxFcExtnnwCHc1hhQtkLgQOYammG0/qmZ2JqP8HUpXdlhueR6iKI9KBLKzk/guTRBqVC0V/BtmFPecys4Nr5txe8VFGRr6nviY9oktOX1lF+j3QjmzTnVH2NiKG7ScYfqBP6QmPA9+8x+oYedvbedvgcvvqbzqdUv8AIjYp+g==
set secure ldaps
set port 636
next
end
config user fortitoken
edit "FTKMOB19E5BD63E6"
set license "FTMTRIAL0C7EB05F"
next
edit "FTKMOB191C7EFDBA"
set seed "kiNNVRmZ6w67lULkTZ9ZzqOLsCWvbEZ2EoQxGFa/bdSbGXi3Auv+29jPgN3xH0F/mSxmBkGJ2Tyg8ANXOyixoFHtq59mxUckY5kcZH73Bi5MyKj9kM5BVHVhIbosFKOTQyABm/RCipZgakzg4c627uWxjTC6NcOw1P/zdjuSf3X25PDl"
set license "FTMTRIAL0C7EB05F"
set activation-code "EEIKRQ2MVAN6PWA5"
set activation-expire 1665208385
next
end
config user local
edit "guest"
set type password
set passwd ENC IKSqU4/3wTWT2oKJHJsXSlzpDJjOyHwksQQVGG/bphIUxwbjB/yiBEd2vpW8aNK8//8JF0Pv4UYc3AflOvfzWo2GQl8IeefL9mXw5ejCO4iiZU68DlkF1N/tpwuJ8UF8PcZdQ/j5qu94uHZyYRcsxxNG7zcn38VEIT63VFYbaD8hyZbfQ7MRhd6njTIFVXjRXkXLXw==
next
edit "godelchen"
set status disable
set type ldap
set two-factor fortitoken
set fortitoken "FTKMOB191C7EFDBA"
set email-to "godel.chen@veolia.com"
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "B10013"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "860712"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
end
config user setting
set auth-cert "wildcard.tahoho.com.tw.crt"
set auth-secure-http enable
end
config user group
edit "SSO_Guest_Users"
next
edit "Guest-group"
set member "guest"
next
edit "RemoteUserGroup"
set member "Azure-LDAP-Secure-Server"
config match
edit 1
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Install Domain Servers,CN=Microsoft Exchange System Objects,DC=tahoho,DC=com,DC=tw"
next
edit 2
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Access Control Assistance Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 3
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Account Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 4
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 5
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 6
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncBrowse,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 7
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncOperators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 8
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncPasswordSet,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 9
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Allowed RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 10
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Backup Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 11
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Business Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 12
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cert Publishers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 13
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Certificate Service DCOM Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 14
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=CERTSVC_DCOM_ACCESS,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 15
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cloneable Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 16
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cryptographic Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 17
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Delegated Setup,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 18
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Denied RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 19
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 20
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 21
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Discovery Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 22
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Distributed COM Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 23
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 24
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsUpdateProxy,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 25
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 26
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Computers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 27
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 28
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Guests,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 29
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 30
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 31
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 32
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 33
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_BL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 34
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_CY,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 35
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LT,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 36
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LZ,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 37
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 38
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_SL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 39
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_TC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 40
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_WC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 41
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_XD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 42
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_YK,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 43
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 44
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 45
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_public,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 46
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_Manager,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 47
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_PAC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 48
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Event Log Readers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 49
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange All Hosted Organizations,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 50
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Domain Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 51
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Enterprise Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 52
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Servers,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 53
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Trusted Subsystem,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 54
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Windows Permissions,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 55
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ExchangeLegacyInterop,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 56
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Google 雲端硬碟,DC=tahoho,DC=com,DC=tw"
next
edit 57
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Group Policy Creator Owners,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 58
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Guests,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 59
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Help Desk,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 60
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HelpServicesGroup,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 61
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeTeam,DC=tahoho,DC=com,DC=tw"
next
edit 62
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeUsers,DC=tahoho,DC=com,DC=tw"
next
edit 63
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hygiene Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 64
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hyper-V Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 65
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_IUSRS,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 66
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_WPG,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 67
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Incoming Forest Trust Builders,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 68
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=MTS Impersonators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 69
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Netmon Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 70
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Network Configuration Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 71
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 72
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Log Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 73
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Monitor Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 74
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 75
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Print Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 76
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Protected Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 77
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Public Folder Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 78
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RAS and IAS Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 79
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Endpoint Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 80
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Management Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 81
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Remote Access Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 82
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 83
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Recipient Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 84
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Records Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 85
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Desktop Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 86
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Management Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 87
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Replicator,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 88
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Schema Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 89
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 90
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 91
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Smart Phone,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 92
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SMEX Admin Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 93
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSFTEUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 94
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSSQLUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 95
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005SQLBrowserUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 96
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServerMSSQLServerADHelperUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 97
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ApiGateway Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 98
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ASN Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 99
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Centralized Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 100
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 101
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHONT $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 102
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 103
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_loc,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 104
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TelnetClients,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 105
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Terminal Server License Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 106
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=UM Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 107
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 108
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=vendor_group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 109
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Veolia Distribution Group,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 110
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=VeoliaSecurityGroup,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 111
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=View-Only Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 112
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Windows Authorization Access Group,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 113
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WINS Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 114
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 115
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Reporters,CN=Users,DC=tahoho,DC=com,DC=tw"
next
end
next
end
config vpn ssl web host-check-software
edit "FortiClient-AV"
set guid "C86EC76D-5A4C-40E7-BD94-59358E544D81"
next
edit "FortiClient-FW"
set type fw
set guid "528CB157-D384-4593-AAAA-E42DFF111CED"
next
edit "FortiClient-AV-Vista"
set guid "385618A6-2256-708E-3FB9-7E98B93F91F9"
next
edit "FortiClient-FW-Vista"
set type fw
set guid "006D9983-6839-71D6-14E6-D7AD47ECD682"
next
edit "FortiClient-AV-Win7"
set guid "71629DC5-BE6F-CCD3-C5A5-014980643264"
next
edit "AVG-Internet-Security-AV"
set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF"
next
edit "AVG-Internet-Security-FW"
set type fw
set guid "8DECF618-9569-4340-B34A-D78D28969B66"
next
edit "AVG-Internet-Security-AV-Vista-Win7"
set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82"
next
edit "AVG-Internet-Security-FW-Vista-Win7"
set type fw
set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9"
next
edit "CA-Anti-Virus"
set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93"
next
edit "CA-Internet-Security-AV"
set guid "6B98D35F-BB76-41C0-876B-A50645ED099A"
next
edit "CA-Internet-Security-FW"
set type fw
set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3"
next
edit "CA-Internet-Security-AV-Vista-Win7"
set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F"
next
edit "CA-Internet-Security-FW-Vista-Win7"
set type fw
set guid "06D680B0-4024-4FAB-E710-E675E50F6324"
next
edit "CA-Personal-Firewall"
set type fw
set guid "14CB4B80-8E52-45EA-905E-67C1267B4160"
next
edit "F-Secure-Internet-Security-AV"
set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15"
next
edit "F-Secure-Internet-Security-FW"
set type fw
set guid "D4747503-0346-49EB-9262-997542F79BF4"
next
edit "F-Secure-Internet-Security-AV-Vista-Win7"
set guid "15414183-282E-D62C-CA37-EF24860A2F17"
next
edit "F-Secure-Internet-Security-FW-Vista-Win7"
set type fw
set guid "2D7AC0A6-6241-D774-E168-461178D9686C"
next
edit "Kaspersky-AV"
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-FW"
set type fw
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-AV-Vista-Win7"
set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE"
next
edit "Kaspersky-FW-Vista-Win7"
set type fw
set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5"
next
edit "McAfee-Internet-Security-Suite-AV"
set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83"
next
edit "McAfee-Internet-Security-Suite-FW"
set type fw
set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8"
next
edit "McAfee-Internet-Security-Suite-AV-Vista-Win7"
set guid "86355677-4064-3EA7-ABB3-1B136EB04637"
next
edit "McAfee-Internet-Security-Suite-FW-Vista-Win7"
set type fw
set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C"
next
edit "McAfee-Virus-Scan-Enterprise"
set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0"
next
edit "Norton-360-2.0-AV"
set guid "A5F1BC7C-EA33-4247-961C-0217208396C4"
next
edit "Norton-360-2.0-FW"
set type fw
set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3"
next
edit "Norton-360-3.0-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-360-3.0-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-Internet-Security-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Norton-Internet-Security-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Symantec-Endpoint-Protection-AV"
set guid "FB06448E-52B8-493A-90F3-E43226D3305C"
next
edit "Symantec-Endpoint-Protection-FW"
set type fw
set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6"
next
edit "Symantec-Endpoint-Protection-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Symantec-Endpoint-Protection-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Panda-Antivirus+Firewall-2008-AV"
set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A"
next
edit "Panda-Antivirus+Firewall-2008-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Panda-Internet-Security-AV"
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2006~2007-FW"
set type fw
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2008~2009-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Sophos-Anti-Virus"
set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW"
set type fw
set guid "0786E95E-326A-4524-9691-41EF88FB52EA"
next
edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7"
set guid "479CCF92-4960-B3E0-7373-BF453B467D2C"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7"
set type fw
set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57"
next
edit "Trend-Micro-AV"
set guid "7D2296BC-32CC-4519-917E-52E652474AF5"
next
edit "Trend-Micro-FW"
set type fw
set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6"
next
edit "Trend-Micro-AV-Vista-Win7"
set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50"
next
edit "Trend-Micro-FW-Vista-Win7"
set type fw
set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B"
next
edit "ZoneAlarm-AV"
set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF"
next
edit "ZoneAlarm-FW"
set type fw
set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B"
next
edit "ZoneAlarm-AV-Vista-Win7"
set guid "D61596DF-D219-341C-49B3-AD30538CBC5B"
next
edit "ZoneAlarm-FW-Vista-Win7"
set type fw
set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20"
next
edit "ESET-Smart-Security-AV"
set guid "19259FAE-8396-A113-46DB-15B0E7DFA289"
next
edit "ESET-Smart-Security-FW"
set type fw
set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2"
next
end
config vpn ssl web portal
edit "Hubgrade-VPN-ShuLin"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set web-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
config bookmark-group
edit "gui-bookmarks"
next
end
set heading "Hubgrade-VPN-ShuLin"
next
edit "web-access"
set web-mode enable
next
edit "tunnel-access"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
next
end
config vpn ssl settings
set servercert "wildcard.tahoho.com.tw.crt"
set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
set source-interface "wan1"
set source-address "all"
set source-address6 "all"
set default-portal "Hubgrade-VPN-ShuLin"
config authentication-rule
edit 1
set groups "RemoteUserGroup"
set portal "Hubgrade-VPN-ShuLin"
next
end
end
config voip profile
edit "default"
set comment "Default VoIP profile."
next
edit "strict"
config sip
set malformed-request-line discard
set malformed-header-via discard
set malformed-header-from discard
set malformed-header-to discard
set malformed-header-call-id discard
set malformed-header-cseq discard
set malformed-header-rack discard
set malformed-header-rseq discard
set malformed-header-contact discard
set malformed-header-record-route discard
set malformed-header-route discard
set malformed-header-expires discard
set malformed-header-content-type discard
set malformed-header-content-length discard
set malformed-header-max-forwards discard
set malformed-header-allow discard
set malformed-header-p-asserted-identity discard
set malformed-header-sdp-v discard
set malformed-header-sdp-o discard
set malformed-header-sdp-s discard
set malformed-header-sdp-i discard
set malformed-header-sdp-c discard
set malformed-header-sdp-b discard
set malformed-header-sdp-z discard
set malformed-header-sdp-k discard
set malformed-header-sdp-a discard
set malformed-header-sdp-t discard
set malformed-header-sdp-r discard
set malformed-header-sdp-m discard
end
next
end
config system sdwan
config zone
edit "virtual-wan-link"
next
end
end
config vpn ocvpn
end
config dnsfilter profile
edit "default"
set comment "Default dns filtering."
config ftgd-dns
config filters
edit 1
set category 2
next
edit 2
set category 7
next
edit 3
set category 8
next
edit 4
set category 9
next
edit 5
set category 11
next
edit 6
set category 12
next
edit 7
set category 13
next
edit 8
set category 14
next
edit 9
set category 15
next
edit 10
set category 16
next
edit 11
next
edit 12
set category 57
next
edit 13
set category 63
next
edit 14
set category 64
next
edit 15
set category 65
next
edit 16
set category 66
next
edit 17
set category 67
next
edit 18
set category 26
set action block
next
edit 19
set category 61
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
set block-botnet enable
next
end
config antivirus settings
set machine-learning-detection enable
set grayware enable
end
config antivirus profile
edit "default"
set comment "Scan files and block viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
edit "sniffer-profile"
set comment "Scan files and monitor viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
end
config file-filter profile
edit "default"
set comment "File type inspection."
next
edit "sniffer-profile"
set comment "File type inspection."
next
end
config webfilter profile
edit "default"
set comment "Default web filtering."
config ftgd-wf
unset options
config filters
edit 1
set category 2
set action block
next
edit 2
set category 7
set action block
next
edit 3
set category 8
set action block
next
edit 4
set category 9
set action block
next
edit 5
set category 11
set action block
next
edit 6
set category 12
set action block
next
edit 7
set category 13
set action block
next
edit 8
set category 14
set action block
next
edit 9
set category 15
set action block
next
edit 10
set category 16
set action block
next
edit 11
set action block
next
edit 12
set category 57
set action block
next
edit 13
set category 63
set action block
next
edit 14
set category 64
set action block
next
edit 15
set category 65
set action block
next
edit 16
set category 66
set action block
next
edit 17
set category 67
set action block
next
edit 18
set category 26
set action block
next
edit 19
set category 61
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
next
edit "sniffer-profile"
set comment "Monitor web traffic."
config ftgd-wf
config filters
edit 1
next
edit 2
set category 1
next
edit 3
set category 2
next
edit 4
set category 3
next
edit 5
set category 4
next
edit 6
set category 5
next
edit 7
set category 6
next
edit 8
set category 7
next
edit 9
set category 8
next
edit 10
set category 9
next
edit 11
set category 11
next
edit 12
set category 12
next
edit 13
set category 13
next
edit 14
set category 14
next
edit 15
set category 15
next
edit 16
set category 16
next
edit 17
set category 17
next
edit 18
set category 18
next
edit 19
set category 19
next
edit 20
set category 20
next
edit 21
set category 23
next
edit 22
set category 24
next
edit 23
set category 25
next
edit 24
set category 26
next
edit 25
set category 28
next
edit 26
set category 29
next
edit 27
set category 30
next
edit 28
set category 31
next
edit 29
set category 33
next
edit 30
set category 34
next
edit 31
set category 35
next
edit 32
set category 36
next
edit 33
set category 37
next
edit 34
set category 38
next
edit 35
set category 39
next
edit 36
set category 40
next
edit 37
set category 41
next
edit 38
set category 42
next
edit 39
set category 43
next
edit 40
set category 44
next
edit 41
set category 46
next
edit 42
set category 47
next
edit 43
set category 48
next
edit 44
set category 49
next
edit 45
set category 50
next
edit 46
set category 51
next
edit 47
set category 52
next
edit 48
set category 53
next
edit 49
set category 54
next
edit 50
set category 55
next
edit 51
set category 56
next
edit 52
set category 57
next
edit 53
set category 58
next
edit 54
set category 59
next
edit 55
set category 61
next
edit 56
set category 62
next
edit 57
set category 63
next
edit 58
set category 64
next
edit 59
set category 65
next
edit 60
set category 66
next
edit 61
set category 67
next
edit 62
set category 68
next
edit 63
set category 69
next
edit 64
set category 70
next
edit 65
set category 71
next
edit 66
set category 72
next
edit 67
set category 75
next
edit 68
set category 76
next
edit 69
set category 77
next
edit 70
set category 78
next
edit 71
set category 79
next
edit 72
set category 80
next
edit 73
set category 81
next
edit 74
set category 82
next
edit 75
set category 83
next
edit 76
set category 84
next
edit 77
set category 85
next
edit 78
set category 86
next
edit 79
set category 87
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
end
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set options block-invalid-url
config ftgd-wf
unset options
config filters
edit 1
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 12
set action block
next
edit 8
set category 13
set action block
next
edit 9
set category 14
set action block
next
edit 10
set category 15
set action block
next
edit 11
set category 16
set action block
next
edit 12
set category 26
set action block
next
edit 13
set category 57
set action block
next
edit 14
set category 61
set action block
next
edit 15
set category 63
set action block
next
edit 16
set category 64
set action block
next
edit 17
set category 65
set action block
next
edit 18
set category 66
set action block
next
edit 19
set category 67
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
next
edit "monitor-all"
set comment "Monitor and log all visited URLs, flow-based."
config ftgd-wf
unset options
config filters
edit 1
set category 1
next
edit 2
set category 3
next
edit 3
set category 4
next
edit 4
set category 5
next
edit 5
set category 6
next
edit 6
set category 12
next
edit 7
set category 59
next
edit 8
set category 62
next
edit 9
set category 83
next
edit 10
set category 2
next
edit 11
set category 7
next
edit 12
set category 8
next
edit 13
set category 9
next
edit 14
set category 11
next
edit 15
set category 13
next
edit 16
set category 14
next
edit 17
set category 15
next
edit 18
set category 16
next
edit 19
set category 57
next
edit 20
set category 63
next
edit 21
set category 64
next
edit 22
set category 65
next
edit 23
set category 66
next
edit 24
set category 67
next
edit 25
set category 19
next
edit 26
set category 24
next
edit 27
set category 25
next
edit 28
set category 72
next
edit 29
set category 75
next
edit 30
set category 76
next
edit 31
set category 26
next
edit 32
set category 61
next
edit 33
set category 86
next
edit 34
set category 17
next
edit 35
set category 18
next
edit 36
set category 20
next
edit 37
set category 23
next
edit 38
set category 28
next
edit 39
set category 29
next
edit 40
set category 30
next
edit 41
set category 33
next
edit 42
set category 34
next
edit 43
set category 35
next
edit 44
set category 36
next
edit 45
set category 37
next
edit 46
set category 38
next
edit 47
set category 39
next
edit 48
set category 40
next
edit 49
set category 42
next
edit 50
set category 44
next
edit 51
set category 46
next
edit 52
set category 47
next
edit 53
set category 48
next
edit 54
set category 54
next
edit 55
set category 55
next
edit 56
set category 58
next
edit 57
set category 68
next
edit 58
set category 69
next
edit 59
set category 70
next
edit 60
set category 71
next
edit 61
set category 77
next
edit 62
set category 78
next
edit 63
set category 79
next
edit 64
set category 80
next
edit 65
set category 82
next
edit 66
set category 85
next
edit 67
set category 87
next
edit 68
set category 31
next
edit 69
set category 41
next
edit 70
set category 43
next
edit 71
set category 49
next
edit 72
set category 50
next
edit 73
set category 51
next
edit 74
set category 52
next
edit 75
set category 53
next
edit 76
set category 56
next
edit 77
set category 81
next
edit 78
set category 84
next
edit 79
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
end
end
set log-all-url enable
set web-content-log disable
set web-filter-command-block-log disable
set web-filter-cookie-log disable
set web-url-log disable
set web-invalid-domain-log disable
set web-ftgd-err-log disable
next
end
config webfilter search-engine
edit "google"
set hostname ".*\\.google\\..*"
set url "^\\/((custom|search|images|videosearch|webhp)\\?)"
set query "q="
set safesearch url
set safesearch-str "&safe=active"
next
edit "yahoo"
set hostname ".*\\.yahoo\\..*"
set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)"
set query "p="
set safesearch url
set safesearch-str "&vm=r"
next
edit "bing"
set hostname ".*\\.bing\\..*"
set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?"
set query "q="
set safesearch header
next
edit "yandex"
set hostname "yandex\\..*"
set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?"
set query "text="
set safesearch url
set safesearch-str "&family=yes"
next
edit "youtube"
set hostname ".*youtube.*"
set safesearch header
next
edit "baidu"
set hostname ".*\\.baidu\\.com"
set url "^\\/s?\\?"
set query "wd="
next
edit "baidu2"
set hostname ".*\\.baidu\\.com"
set url "^\\/(ns|q|m|i|v)\\?"
set query "word="
next
edit "baidu3"
set hostname "tieba\\.baidu\\.com"
set url "^\\/f\\?"
set query "kw="
next
edit "vimeo"
set hostname ".*vimeo.*"
set url "^\\/search\\?"
set query "q="
set safesearch header
next
edit "yt-scan-1"
set url "www.youtube.com/user/"
set safesearch yt-scan
next
edit "yt-scan-2"
set url "www.youtube.com/youtubei/v1/browse"
set safesearch yt-scan
next
edit "yt-scan-3"
set url "www.youtube.com/youtubei/v1/player"
set safesearch yt-scan
next
edit "yt-scan-4"
set url "www.youtube.com/youtubei/v1/navigator"
set safesearch yt-scan
next
edit "yt-channel"
set url "www.youtube.com/channel"
set safesearch yt-channel
next
edit "yt-pattern"
set url "youtube.com/channel/"
set safesearch yt-pattern
next
edit "twitter"
set hostname "twitter\\.com"
set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName"
set query "variables="
set safesearch translate
set safesearch-str "regex::%22screen_name%22:%22([A-Za-z0-9_]{4,15})%22::twitter.com/\\1"
next
edit "google-translate-1"
set hostname "translate\\.google\\..*"
set url "^\\/translate"
set query "u="
set safesearch translate
set safesearch-str "regex::(?:\\?|&)u=([^&]+)::\\1"
next
edit "google-translate-2"
set hostname ".*\\.translate\\.goog"
set url "^\\/"
set safesearch translate
set safesearch-str "case::google-translate"
next
end
config emailfilter profile
edit "default"
set comment "Malware and phishing URL filtering."
config imap
end
config pop3
end
config smtp
end
next
edit "sniffer-profile"
set comment "Malware and phishing URL monitoring."
config imap
end
config pop3
end
config smtp
end
next
end
config log memory setting
set status enable
end
config log null-device setting
set status disable
end
config log setting
set local-in-allow enable
set local-in-deny-unicast enable
set local-in-deny-broadcast enable
end
config firewall schedule recurring
edit "always"
set day sunday monday tuesday wednesday thursday friday saturday
next
edit "none"
next
end
config firewall vip
edit "MQTT Broker"
set uuid 51ad1b90-01c9-51ed-9adc-0bb1f7af4d16
set extip 60.251.157.99
set mappedip "192.167.3.110"
set extintf "wan1"
set portforward enable
set extport 18883
set mappedport 18883
next
edit "MQTT web"
set uuid e5f21b0e-4a0b-51ed-fd80-ca3982ec793c
set extip 60.251.157.99
set mappedip "192.167.3.110"
set extintf "wan1"
set portforward enable
set extport 18083
set mappedport 18083
next
edit "influxDB"
set uuid e883e266-2d05-51ee-9d96-7026251ecfb7
set extip 60.251.157.99
set mappedip "192.167.3.110"
set extintf "wan1"
set portforward enable
set extport 7086
set mappedport 7086
next
end
config firewall vipgrp
edit "E2C MQTT"
set uuid 56bb4988-4ac4-51ed-ecd1-c6bb27438838
set interface "wan1"
set member "MQTT Broker" "MQTT web" "influxDB"
next
end
config firewall ssh local-key
edit "Fortinet_SSH_RSA2048"
set password ENC UG3gq6ZkunJ/MLt3qGrBpOD9RQmimiWgzmN9EXuzlpBCaRiZefciQnfAdUs0AYwJ1D0nCEQLhhEEuNQYu9jJptqg8OTefmf7QFZtaTxVsry1J8tTgFWu9neJX180Jrvp4QlBvXjSC9lILekhJ8ka4Od3SuMNLzKjs4YfiUs/BXPeujlnDn8TbnxctNL3fGHVQZ27GA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC/CRMDyrNllfSUZeZ5MDbxPA7f8RhbAWW2ZnQwQJXmmDMLhLdVx7R0vLZdn8XZ+qzm9nAzfYxeEMW3jAE6hA3tAqovqVmigAQgHB1VuP580hH6NZvADgh5Ua03GMcIS6rofuWJaqwGZRQDuGesnLFy2avQUStlo539gSlgOubcmexTcSHI13UqMzsveArmc2BPI80di05yuI5gbwo7We+rj5wbgtytnxRdUHkQUR4eX4UOmsL4E7e0l5n31sN7irY/47S0Vw7fIRDoPGFubVM8JmZ5n5IYb0HaT3IW7AzkZhVs+MBb42Bke5M8buf638jlACud08FxMMv02KMhMebR"
set source built-in
next
edit "Fortinet_SSH_DSA1024"
set password ENC gzpyuad3u22LNvXo6I7Ie3lM9Cx8tqkqTxxgmcSZgUAVJglFe+giHiTQxXa66eJYS0TjrIRT5tKBdssd2SaHoLVdGy/n+XFOmRx5doCO1QIHW2u5vCja+uwBAUYS6OX0Ji/2jksaAhBbSh92APvQuaL6Gzf6HFkfsh6eqZECv5UKwnCE2hoObwRuCBIWARWc9MdrxA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCByv9IMm
Z8lCSyM1QVbPfUAAAAEAAAAAEAAAGxAAAAB3NzaC1kc3MAAACBAMFvIV9qenFUjA4wDi5R
3G8bQlqT2/D8QiVRuOktMNDjFeebun5u4rXAggSvF4uxuLr2ru4FadEuAmP8UYH7iPLsNn
TRh6y9Msm6LMLzk/TkQYUqvvu1QzUoeqCf7mjW4w9pQ6IbcOEkywGJNSGDgrCuUzXgKpA3
k3Twqj6LaIgdAAAAFQCUZaZkNAOrS4Sf0IBa9T2d7mayBQAAAIBFwxwpsWPxZARoMiLtIR
uNslZIuitE8VOhf7pQv807fN6ofz20w1bCW/TwxwkketzMjT5i4qgy0hn6P+ANURr9lcl6
wcukvldc5xZrGBiZ6cpLd5MdmQmnMB+i6LlLct5P0KqfxowNrom4FD6rQqMYaNZN472CMV
meL1P3aLvRdAAAAIBiShsGsLppE2MvJiLu4IGoxgCleHJ6cqBvSBld3d6fnrDFluhuafiW
V2BtsjFDnFdEGrh1uvS5nKfcseOEsnaDkKNu9Csicb1k9b2++I36C6H3xd3WtchkCPrQRd
GDlK8ajR2cGRyyCzzerRAR7jfo9tpTin/GoUrIMptkf+wjEwAAAeBJCpC0KFgerYAGmLCO
RM79rOZjTvd8pQ2VNfqqoc44Nu0JnrSS4m0cEAJASzdKYjCzMRoVdOOn4ro226HnTLXek+
XmWIggBySCI4sVEOA5FC2ITdJ0qlB8m0w7tDAOVU2xh+UIFBYyutnkC6Zi1qeJBHzQhKZY
DYF/jnlEFe3EoJzWx0ThYUsHhLNpoe6mnktaQ+rV5OSihws8ZtxaBOq2sK10dMUlQebzUw
3JIAomroe0FIZ9jyG5LMXw1pnAjymGyvmmLiLM24L4GOY9Wfk+P7X3hOEU1DTbugHRfQ4c
hSdj8ZRkQPiSUihC2tsZV7ASqOuWuoiTXKxarNCou9dzybxum/fcIhwjS/HKhjhTJbkoz8
i0e7AxlJHzx6nL5bYoktY7ZbYpYJ4udkxoiuBhGNJ1uXDr16PcO8Ws2ufdlz6enolkY2u9
LHzXf0An2yOWckuGTZhHT24F2KeCNSsXnbTd6zOmKE+xWUcJvUTq319mExcP/OYcMrwyqN
a1+YxxqnjCufaDgZ/KoqPXMrJJDPubiT16VTy6Y7eE1WqJEDneGunKnIEVyF045vpcY8qL
5/ROAcJba6n9guchY178LATbqPnOJ0e1TCZsbQursdmUm6sSeP/ATrgwYdSScQM=
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-dss 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"
set source built-in
next
edit "Fortinet_SSH_ECDSA256"
set password ENC nyWTLzqqfVhINGiVGEPRbFfL0ntUsI0RLTSU9l6N7C7PByS72Quuf+UYDCyOVNQMhApR2yIU2+nlQ25bahwjTc+tHDQrIkYu5lp5tUIigP1yI1iUMZNdGiHaw6/UguEQzuyo8I67rWV8B5NYr/wy7dxr5RqLTil7plFafs+TaVjbzwy+qxZxAQJjBB4U2gb3tG7Ycw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABAjdnIv8S
cu+ws6AZUHJpziAAAAEAAAAAEAAABoAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz
dHAyNTYAAABBBGwjVOhfyM8C9xcuu2o1AO9O0HV7+yJX8+z+++30lN9i++Vp82vY2OnHhD
4XKbjetXnHvnn0Ph65XUzseS3W0Q4AAACgvkM8pI3GNOCgS0wEwbLfJGKryTcCbxTnSJdG
uU5gEDnz74H2bCNaz4UNSu2wXV8w1AHP8PhajZSe7wJAErbWlshv3k4ZfCcbDdfQO4i9Vk
Hx6lc2lxg5dD2I07ifMaHiEEP9zUzvm73ND7mQLIQjFBySJ1/XSnUfCfG5tECYDfL5UMuh
aWFclKQ0OKGQYtKr8D1N5ReO1MB9/ap4vmYZ/g==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGwjVOhfyM8C9xcuu2o1AO9O0HV7+yJX8+z+++30lN9i++Vp82vY2OnHhD4XKbjetXnHvnn0Ph65XUzseS3W0Q4="
set source built-in
next
edit "Fortinet_SSH_ECDSA384"
set password ENC Na3BHMyiXnW79GwW0oRn+AqG0Rbb9Oh4lSfTxlKRy3gRFswxGHj6ttdn5NWnskTu8pgR/ZEGZ5d97/S5j64xciwE1tQPCAS1zMtJaKMuDApZdeeyh83ocxsx+h4feYe3sdGuxstmCGgTeXcZt0yzsQ+geLHxf4Q54bq4m2HdunzYynZese42BqUp4ufpLwf2uIpT8A==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBOCr02cq6yoNpYy0irm2F9mfZxuf8wh4aBbwv2rkB8ifvM7eBbGPKDQ4I2hL4deAI+0qY85tg1zWagTu2pyC7+Z9mo9ZI/htlFv4iHRbjclVd78ZHyKwQXs9zBqYcETP1A=="
set source built-in
next
edit "Fortinet_SSH_ECDSA521"
set password ENC QztppWJvVsiYyjsMsG/YU2LrHcOwNYZ6fH1lMPC3pKZq8eYrp9Zj+ZpQhFVBKmJmvF5p1vT4XFb5NXsYKsnKzbGr4bFNbmfWQYEWNYTP82xtXGfvm69vzaKwHPBPclfmuLui4kIeWKyNUcpDBbnv3iPgJ3M4+8Hq/pkhc2pv1UrLePTYvAgtKseuRK2mZq4w5oQPnQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAAry5XDZe6nesqF1akyiKRABsBe3aYAMzUxJXWIyY9u21srFBEt3ezIh/uDNTyi55merSR8DfdVZx/RWew09uR+bgHWTm6TS1bpKsV1IIlu0x6XzL4SdNR/S0eH1xdUf+e4bBBx12hmo6Lg69qNqnyJH7MWIF9TWLb0ITZ/yffvUpypiQ=="
set source built-in
next
edit "Fortinet_SSH_ED25519"
set password ENC 7yn3AHePaTNrq6GWeIQU5+3agMoI4U3GSQb2GSXRxDexo+AWzsZv7e925kcpEYJNoFgkNSHiJ2j3D5bPaTgOS0Zi5BxI7NnEKAg9DkzENNTbHa365JKVfdC2bLagm/vhvzSEtbiyAOiAQP6kruH7EKSsoL4pKAnjFLj8Or31+r0RDak0G93ugYd6vwFP/+chuZN4sQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBjqXyFVH
SbbjjdsGTqlVitAAAAEAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAIE5DcOK4H+h7D/PM
CMVJQFtC8jzGCuZVFig3rapaN+mPAAAAkL8JYMauzT/nC3x59a8ukqO40Jl1pp0WV+b3J4
oiTvYajqjbWb9ees+jXsd0YdPhWDmVoEems+9MZYv5BcqumV2ftmKUQhx5VCG6txLtkxzj
Z06H6RetvPg7L7DfpDJtoKTDWDYQ8vdDQKTJk7rApvClo1nak5H9WtmEv8krWhc1fkg/jQ
hKCKx9iJmRUY+R7w==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5DcOK4H+h7D/PMCMVJQFtC8jzGCuZVFig3rapaN+mP"
set source built-in
next
end
config firewall ssh local-ca
edit "Fortinet_SSH_CA"
set password ENC E/xgDAA7obiRNqUHq0qUvb44+G8ixLYRMTl+KoYeKf7ZrWxGKx+dskXGzHH9NtOhn5aTE/HMZb2a8O988lrvAn/gqIkTGZIDTeGcvLNWzdMbjlwDPKHR61h/9VuKob0Ay+YgXZY1BJn2Lu7aMlpU0qECPFEINsZEosO9sxxBjtgL17sOKpDlfl7ArhHTD2qwdz/Kuw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCazvIGfiYlqUlHT87qyyEMdul3f6E8AFP8T8aYUIVIw5nVYwZOLWgd6rf76lt25gpTLQbihbZR8CS3jtR0BoAE8Knt/EE/0n0xkwxbeO2XHXYa49c93cH45/dtHFRjpzb1z5UIUw2DnUjqEAiX7vw1dZzHfNeDc3foC1DAaTyDvQOD+Ihj2SNLyiDYsNG5gi6iHzcEWZOKAj31udJxknLFBYSa3a7v2eVAoaVYI5Cnll1uk00mlusFLOomVCurSlQkJizxjXdZdxLn8AvMLYiZ6vSkqeqRbQs2F2nf8JAtAdObEmqk68eSgvixpzm/Tt1K3mhgherOD5wQnTtBUSyD"
set source built-in
next
edit "Fortinet_SSH_CA_Untrusted"
set password ENC XnWlbUfYWbIGc2KE2WF3mYy5bGKXPHHeUkqYA6oNgYGlxYpSntb2ykX9Pr+j/JuYHnN/rvXNS2fvtLRVpQXUAATV+Qc3vFgchBOlvgQvgTSYZh83F442DIgzG2x16vlEJqRv1+IBRKMnnNW8pk62Uke8GQLCiPonx2T+m0o6ZXkb40peU+iQlsyZ9oipwgeVJJdrZw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCsh2rDWVi0GIp7XBdz7ZxGHY2IxBdgvRItkufWOCt6ZwlP32U9CdS4hDDZ2IllHbCSDsagPw9zt+1mAVmV6sxibkLMs3kx3kMA2zSChSQgJ1wAWLgojNy8gcOpon+jo107xFvGJyYqT05ganVYPtbnBPeroOcIQ37yqKUaMZZITyXHClhj/Qeb+t2QUGHJNLaTKJNIGTqKc3C4Ka5kmm9Uq4Tk3FuRItYY2vOUHupkl2CUA3bfyEXAJgi4TkftVbjE+ITPGi+3z+9r4otqFao6o8dQ+sx3rfyxzFmuISqO/uIAtK76owOQV55sf4zCEvt5RiRmtkrB5UoBcBvchvaJ"
set source built-in
next
end
config firewall ssh setting
set caname "Fortinet_SSH_CA"
set untrusted-caname "Fortinet_SSH_CA_Untrusted"
set hostkey-rsa2048 "Fortinet_SSH_RSA2048"
set hostkey-dsa1024 "Fortinet_SSH_DSA1024"
set hostkey-ecdsa256 "Fortinet_SSH_ECDSA256"
set hostkey-ecdsa384 "Fortinet_SSH_ECDSA384"
set hostkey-ecdsa521 "Fortinet_SSH_ECDSA521"
set hostkey-ed25519 "Fortinet_SSH_ED25519"
end
config firewall profile-protocol-options
edit "default"
set comment "All default services."
config http
set ports 80
unset options
unset post-lang
end
config ftp
set ports 21
set options splice
end
config imap
set ports 143
set options fragmail
end
config mapi
set ports 135
set options fragmail
end
config pop3
set ports 110
set options fragmail
end
config smtp
set ports 25
set options fragmail splice
end
config nntp
set ports 119
set options splice
end
config ssh
unset options
end
config dns
set ports 53
end
config cifs
set ports 445
unset options
end
next
end
config firewall ssl-ssh-profile
edit "no-inspection"
set comment "Read-only profile that does no inspection."
config https
set status disable
end
config ftps
set status disable
end
config imaps
set status disable
end
config pop3s
set status disable
end
config smtps
set status disable
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
set unsupported-ssl-version allow
end
next
edit "deep-inspection"
set comment "Read-only deep inspection profile."
config https
set ports 443
set status deep-inspection
set unsupported-ssl-version allow
end
config ftps
set ports 990
set status deep-inspection
set unsupported-ssl-version allow
end
config imaps
set ports 993
set status deep-inspection
set unsupported-ssl-version allow
end
config pop3s
set ports 995
set status deep-inspection
set unsupported-ssl-version allow
end
config smtps
set ports 465
set status deep-inspection
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
set unsupported-ssl-version allow
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "custom-deep-inspection"
set comment "Customizable deep inspection profile."
config https
set ports 443
set status deep-inspection
set unsupported-ssl-version allow
end
config ftps
set ports 990
set status deep-inspection
set unsupported-ssl-version allow
end
config imaps
set ports 993
set status deep-inspection
set unsupported-ssl-version allow
end
config pop3s
set ports 995
set status deep-inspection
set unsupported-ssl-version allow
end
config smtps
set ports 465
set status deep-inspection
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
set unsupported-ssl-version allow
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "certificate-inspection"
set comment "Read-only SSL handshake inspection profile."
config https
set ports 443
set status certificate-inspection
end
config ftps
set status disable
end
config imaps
set status disable
end
config pop3s
set status disable
end
config smtps
set status disable
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
set unsupported-ssl-version allow
end
next
end
config waf profile
edit "default"
config signature
config main-class 100000000
set action block
set severity high
end
config main-class 20000000
end
config main-class 30000000
set status enable
set action block
set severity high
end
config main-class 40000000
end
config main-class 50000000
set status enable
set action block
set severity high
end
config main-class 60000000
end
config main-class 70000000
set status enable
set action block
set severity high
end
config main-class 80000000
set status enable
set severity low
end
config main-class 110000000
set status enable
set severity high
end
config main-class 90000000
set status enable
set action block
set severity high
end
set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002
end
config constraint
config header-length
set status enable
set log enable
set severity low
end
config content-length
set status enable
set log enable
set severity low
end
config param-length
set status enable
set log enable
set severity low
end
config line-length
set status enable
set log enable
set severity low
end
config url-param-length
set status enable
set log enable
set severity low
end
config version
set log enable
end
config method
set action block
set log enable
end
config hostname
set action block
set log enable
end
config malformed
set log enable
end
config max-cookie
set status enable
set log enable
set severity low
end
config max-header-line
set status enable
set log enable
set severity low
end
config max-url-param
set status enable
set log enable
set severity low
end
config max-range-segment
set status enable
set log enable
set severity high
end
end
next
end
config firewall policy
edit 1
set name "E2C "
set uuid 98e2f646-0565-51ea-d0c0-518203405e54
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "AWS" "GCP" "AWS1" "AWS2" "Git"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 4
set name "DNS"
set uuid 639c0150-080d-51ed-bf39-7646edd09b28
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "DNS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
set comments " (Copy of Outward Connection)"
next
edit 3
set name "mqtt_sub"
set uuid 033e89d0-05b6-51ed-ee00-ac1e6a93f11b
set srcintf "wan1"
set dstintf "internal"
set action accept
set srcaddr "all"
set dstaddr "E2C MQTT"
set schedule "always"
set service "mqtt"
set ssl-ssh-profile "certificate-inspection"
next
edit 5
set name "Anydesk"
set uuid 1a530c2c-08c2-51ed-cda0-34778f02a2fe
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "Anydesk"
set schedule "always"
set service "HTTPS"
set nat enable
next
edit 7
set name "GLPI"
set uuid f7325902-6c60-51ed-b923-6943d88db06d
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "GLPI-Server"
set schedule "always"
set service "HTTP" "HTTPS"
set nat enable
next
edit 10
set name "Advantech-Outward-To-DCCS-Server"
set uuid cd69b3e6-8b31-51ed-6aa6-0e1df82ad788
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "Advantech_MQTT Broker_DCCS Server"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 13
set name "Advantech-Outward-To-MQTT-Broker"
set uuid 2cac0c8c-8b32-51ed-45ed-29a045c4f674
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "Advantech-MQTT-Broker"
set schedule "always"
set service "HTTP" "HTTPS" "MQTT"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 14
set name "Advantech-Inward-To-DCCS-Server"
set uuid 8ddb79d4-8b32-51ed-eae7-d3e049f22163
set srcintf "wan1"
set dstintf "internal"
set action accept
set srcaddr "Advantech_MQTT Broker_DCCS Server"
set dstaddr "IT component"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 15
set name "Advantech-Inward-To-MQTT-Broker"
set uuid b72b873e-8b32-51ed-6776-511c06704d58
set srcintf "wan1"
set dstintf "internal"
set action accept
set srcaddr "Advantech-MQTT-Broker"
set dstaddr "IT component"
set schedule "always"
set service "MQTT" "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 11
set name "E2C U2484 to NTP Server"
set uuid 623aaaa6-3b0a-51ee-9f62-9e6276cfece3
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "time.google.com" "time.windows.com" "tw.ntp.org.cn"
set schedule "always"
set service "NTP"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 12
set name "E2C MQTT"
set uuid 4895e3e8-ab69-51ee-842e-47c049b0bb25
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "Cloud Scada" "Cloud Scada2"
set schedule "always"
set service "MQTT"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set application-list "default"
set nat enable
next
edit 16
set name "E2C Gmail Alarm"
set uuid 112a5d62-b0fa-51ee-740c-c329bfa5ada2
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "gmail smtp"
set schedule "always"
set service "SMTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
end
config switch-controller security-policy 802-1X
edit "802-1X-policy-default"
set user-group "SSO_Guest_Users"
set mac-auth-bypass disable
set open-auth disable
set eap-passthru enable
set eap-auto-untagged-vlans enable
set guest-vlan disable
set auth-fail-vlan disable
set framevid-apply enable
set radius-timeout-overwrite disable
set authserver-timeout-vlan disable
next
end
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh
set internal-allowaccess https ping ssh
next
end
config switch-controller lldp-profile
edit "default"
set med-tlvs inventory-management network-policy
set auto-isl disable
config med-network-policy
edit "voice"
next
edit "voice-signaling"
next
edit "guest-voice"
next
edit "guest-voice-signaling"
next
edit "softphone-voice"
next
edit "video-conferencing"
next
edit "streaming-video"
next
edit "video-signaling"
next
end
next
edit "default-auto-isl"
next
edit "default-auto-mclag-icl"
set auto-mclag-icl enable
next
end
config switch-controller qos dot1p-map
edit "voice-dot1p"
set priority-0 queue-4
set priority-1 queue-4
set priority-2 queue-3
set priority-3 queue-2
set priority-4 queue-3
set priority-5 queue-1
set priority-6 queue-2
set priority-7 queue-2
next
end
config switch-controller qos ip-dscp-map
edit "voice-dscp"
config map
edit "1"
set cos-queue 1
set value 46
next
edit "2"
set cos-queue 2
set value 24,26,48,56
next
edit "5"
set cos-queue 3
set value 34
next
end
next
end
config switch-controller qos queue-policy
edit "default"
set schedule round-robin
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
next
edit "queue-2"
next
edit "queue-3"
next
edit "queue-4"
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
edit "voice-egress"
set schedule weighted
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
set weight 0
next
edit "queue-2"
set weight 6
next
edit "queue-3"
set weight 37
next
edit "queue-4"
set weight 12
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
end
config switch-controller qos qos-policy
edit "default"
next
edit "voice-qos"
set trust-dot1p-map "voice-dot1p"
set trust-ip-dscp-map "voice-dscp"
set queue-policy "voice-egress"
next
end
config switch-controller storm-control-policy
edit "default"
set description "default storm control on all port"
next
edit "auto-config"
set description "storm control policy for fortilink-isl-icl port"
set storm-control-mode disabled
next
end
config switch-controller auto-config policy
edit "pse"
next
edit "default"
next
edit "default-icl"
set poe-status disable
set igmp-flood-report enable
set igmp-flood-traffic enable
next
end
config switch-controller initial-config template
edit "_default"
set vlanid 1
next
edit "quarantine"
set vlanid 4093
set dhcp-server enable
next
edit "rspan"
set vlanid 4092
set dhcp-server enable
next
edit "voice"
set vlanid 4091
next
edit "video"
set vlanid 4090
next
edit "onboarding"
set vlanid 4089
next
edit "nac_segment"
set vlanid 4088
set dhcp-server enable
next
end
config switch-controller switch-profile
edit "default"
next
end
config switch-controller ptp settings
set mode disable
end
config switch-controller ptp policy
edit "default"
set status enable
next
end
config switch-controller remote-log
edit "syslogd"
next
edit "syslogd2"
next
end
config wireless-controller setting
set country TW
end
config wireless-controller wids-profile
edit "default"
set comment "Default WIDS profile."
set ap-scan enable
set ap-bgscan-intv 1
set ap-bgscan-duration 20
set ap-bgscan-idle 0
set wireless-bridge enable
set deauth-broadcast enable
set null-ssid-probe-resp enable
set long-duration-attack enable
set invalid-mac-oui enable
set weak-wep-iv enable
set auth-frame-flood enable
set assoc-frame-flood enable
set spoofed-deauth enable
set asleap-attack enable
set eapol-start-flood enable
set eapol-logoff-flood enable
set eapol-succ-flood enable
set eapol-fail-flood enable
set eapol-pre-succ-flood enable
set eapol-pre-fail-flood enable
next
edit "default-wids-apscan-enabled"
set ap-scan enable
set ap-bgscan-intv 1
set ap-bgscan-duration 20
set ap-bgscan-idle 0
next
end
config wireless-controller wtp-profile
edit "FAPU323EV-default"
config platform
set type U323EV
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU321EV-default"
config platform
set type U321EV
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU24JEV-default"
config platform
set type U24JEV
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU223EV-default"
config platform
set type U223EV
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU221EV-default"
config platform
set type U221EV
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU423E-default"
config platform
set type U423E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU422EV-default"
config platform
set type U422EV
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPU421E-default"
config platform
set type U421E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n
end
config radio-2
set band 802.11ac
end
next
edit "FAPS223E-default"
config platform
set type S223E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS221E-default"
config platform
set type S221E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP224E-default"
config platform
set type 224E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP223E-default"
config platform
set type 223E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP222E-default"
config platform
set type 222E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP221E-default"
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP423E-default"
config platform
set type 423E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP421E-default"
config platform
set type 421E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS423E-default"
config platform
set type S423E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS422E-default"
config platform
set type S422E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS421E-default"
config platform
set type S421E
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS323CR-default"
config platform
set type S323CR
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS322CR-default"
config platform
set type S322CR
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS321CR-default"
config platform
set type S321CR
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS313C-default"
config platform
set type S313C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11ac
end
next
edit "FAPS311C-default"
config platform
set type S311C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11ac
end
next
edit "FAPS323C-default"
config platform
set type S323C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS322C-default"
config platform
set type S322C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAPS321C-default"
config platform
set type S321C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP321C-default"
config platform
set type 321C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP223C-default"
config platform
set type 223C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP112D-default"
config platform
set type 112D
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP24D-default"
config platform
set type 24D
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP21D-default"
config platform
set type 21D
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FK214B-default"
config platform
set type 214B
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP224D-default"
config platform
set type 224D
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n-5G
end
config radio-2
set band 802.11n,g-only
end
next
edit "FAP222C-default"
config platform
set type 222C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP25D-default"
config platform
set type 25D
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP221C-default"
config platform
set type 221C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP320C-default"
config platform
set type 320C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11ac
end
next
edit "FAP28C-default"
config platform
set type 28C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP223B-default"
config platform
set type 223B
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n-5G
end
config radio-2
set band 802.11n,g-only
end
next
edit "FAP14C-default"
config platform
set type 14C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP11C-default"
config platform
set type 11C
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP320B-default"
config platform
set type 320B
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n-5G
end
config radio-2
set band 802.11n,g-only
end
next
edit "FAP112B-default"
config platform
set type 112B
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP222B-default"
config platform
set type 222B
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
config radio-2
set band 802.11n-5G
end
next
edit "FAP210B-default"
config platform
set type 210B
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
edit "FAP220B-default"
set handoff-sta-thresh 30
config radio-1
set band 802.11n-5G
end
config radio-2
set band 802.11n,g-only
end
next
edit "AP-11N-default"
config platform
set type AP-11N
end
set handoff-sta-thresh 30
config radio-1
set band 802.11n,g-only
end
next
end
config router rip
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ripng
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router static
edit 1
set gateway 60.251.157.254
set device "wan1"
next
end
config router ospf
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ospf6
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router bgp
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "static"
end
config redistribute "isis"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "static"
end
config redistribute6 "isis"
end
end
config router isis
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "static"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "bgp"
end
config redistribute6 "static"
end
end
config router multicast
end
(3-3/6)