專案

一般

配置概況

檔案 » HBB-YiLan-Firewall-E2C-IT_7-2_1396_202401121044.conf

E2C_IT_Firewall_BackupFile_20240112_YL - 俊霖 江, 2024-01-12 16:50

 
#config-version=FGT61F-7.2.4-FW-build1396-230131:opmode=0:vdom=0:user=B10013
#conf_file_ver=154782430880743752
#buildno=1396
#global_vdom=1
config system global
set admin-forticloud-sso-login enable
set admin-server-cert "wildcard.tahoho.com.tw"
set admin-sport 8443
set alias "FortiGate-61F"
set gui-certificates enable
set hostname "HBB-YiLan-Firewall-E2C-IT"
set language trach
set management-port-use-admin-sport disable
set switch-controller enable
set timezone 59
set virtual-switch-vlan enable
end
config system accprofile
edit "prof_admin"
set secfabgrp read-write
set ftviewgrp read-write
set authgrp read-write
set sysgrp read-write
set netgrp read-write
set loggrp read-write
set fwgrp read-write
set vpngrp read-write
set utmgrp read-write
set wanoptgrp read-write
set wifi read-write
next
end
config system np6xlite
edit "np6xlite_0"
next
end
config system interface
edit "wan1"
set vdom "root"
set ip 125.227.184.206 255.255.255.0
set allowaccess ping https http
set type physical
set role wan
set snmp-index 1
next
edit "wan2"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set role wan
set snmp-index 2
next
edit "dmz"
set vdom "root"
set ip 10.10.10.1 255.255.255.0
set allowaccess ping https fgfm fabric
set type physical
set role dmz
set snmp-index 3
next
edit "internal1"
set vdom "root"
set type physical
set snmp-index 10
next
edit "internal2"
set vdom "root"
set type physical
set snmp-index 11
next
edit "internal3"
set vdom "root"
set type physical
set snmp-index 12
next
edit "internal4"
set vdom "root"
set type physical
set snmp-index 13
next
edit "internal5"
set vdom "root"
set type physical
set snmp-index 14
next
edit "a"
set vdom "root"
set type physical
set snmp-index 4
next
edit "b"
set vdom "root"
set type physical
set snmp-index 5
next
edit "modem"
set vdom "root"
set mode pppoe
set status down
set type physical
set snmp-index 6
next
edit "naf.root"
set vdom "root"
set status down
set type tunnel
set src-check disable
set snmp-index 15
next
edit "l2t.root"
set vdom "root"
set type tunnel
set snmp-index 16
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 7
next
edit "internal"
set vdom "root"
set ip 192.168.1.99 255.255.255.0
set allowaccess ping https ssh fgfm fabric
set type hard-switch
set stp enable
set role lan
set snmp-index 8
next
edit "fortilink"
set vdom "root"
set fortilink enable
set ip 169.254.1.1 255.255.255.0
set allowaccess ping fabric
set type aggregate
set member "a" "b"
set lldp-reception enable
set lldp-transmission enable
set snmp-index 9
next
edit "MAN-ES-ATU-BOX"
set vdom "root"
set ip 10.30.40.254 255.255.255.0
set allowaccess ping https snmp http
set type hard-switch
set alias "For MAN-ES ATU-BOX"
set device-identification enable
set lldp-transmission enable
set role lan
set snmp-index 17
next
edit "HBB-E2C-LAN"
set vdom "root"
set ip 10.30.20.254 255.255.255.0
set allowaccess ping https http
set type hard-switch
set device-identification enable
set lldp-transmission enable
set role lan
set snmp-index 18
next
end
config system physical-switch
edit "sw0"
set age-val 0
next
end
config system virtual-switch
edit "internal"
set physical-switch "sw0"
config port
edit "internal1"
next
end
next
edit "MAN-ES-ATU-BOX"
set physical-switch "sw0"
config port
edit "internal4"
next
end
next
edit "HBB-E2C-LAN"
set physical-switch "sw0"
config port
edit "internal2"
next
edit "internal3"
next
edit "internal5"
next
end
next
end
config system custom-language
edit "en"
set filename "en"
next
edit "fr"
set filename "fr"
next
edit "sp"
set filename "sp"
next
edit "pg"
set filename "pg"
next
edit "x-sjis"
set filename "x-sjis"
next
edit "big5"
set filename "big5"
next
edit "GB2312"
set filename "GB2312"
next
edit "euc-kr"
set filename "euc-kr"
next
end
config system admin
edit "admin"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "all"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "all"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "all"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "all"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "all"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-default-dashboard-template "minimal"
set gui-ignore-release-overview-version "7.2.0"
set password ENC SH2tffdhTLulSWqrFQuzeiyWAm2iqY0l+vyDVo/NhbcfXaNnLUsG6Ey+LrxJzc=
next
edit "renhua.gu"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set remote-group "Azure-Remote-User-Group"
set password ENC SH2axpAneunJeFOrisd/lUf607j0ChLK2c27AKZ8o1BNwvP+vhZSJ+qTidyv7E=
next
edit "chaokai.kang"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "狀態"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "資訊安全"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "網路"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "用戶 & 設備"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView 來源"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView 目的地"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView 應用程式"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView 網站"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView 政策"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView 連線會話"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set remote-group "Azure-Remote-User-Group"
set password ENC SH2DMY0FJmodmqRHWz9rEiNtmojWiI0Cvh1h14v+GofSxmqrHkk/dTWypAyZGA=
next
edit "itservice"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set password ENC SH2o9a7QbipbWySjWGLUX2zic0XmgQ3sSbNbxWWL1DAZeyIBj/F5vS+iK3sw4k=
next
edit "B10013"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set remote-group "Azure-Remote-User-Group"
set password ENC SH2DWcneEHQs3UXeDyz3onHqZFQ12IGP+pywJD4R/Bt/GEajSGkyVFDN/pgjMU=
next
end
config system sso-admin
end
config system ha
set override disable
end
config system storage
edit "Internal"
set status enable
set media-status enable
set order 1
set partition "LOGUSEDXC65C02C3"
set device "/dev/sda1"
set size 120186
set usage log
next
end
config system dns
set primary 168.95.1.1
set secondary 168.95.192.1
set protocol cleartext dot
set ssl-certificate "wildcard.tahoho.com.tw"
set server-hostname "gsvr.tahoho.com.tw"
set domain "8.8.8.8"
end
config system replacemsg-image
edit "logo_fnet"
set image-type gif
next
edit "logo_fguard_wf"
set image-type gif
next
edit "logo_v3_fguard_app"
next
end
config system replacemsg mail "partial"
end
config system replacemsg http "url-block"
end
config system replacemsg http "urlfilter-err"
end
config system replacemsg http "infcache-block"
end
config system replacemsg http "http-contenttypeblock"
end
config system replacemsg http "https-invalid-cert-block"
end
config system replacemsg http "https-untrusted-cert-block"
end
config system replacemsg http "https-blocklisted-cert-block"
end
config system replacemsg http "switching-protocols-block"
end
config system replacemsg http "http-antiphish-block"
end
config system replacemsg http "videofilter-block"
end
config system replacemsg webproxy "deny"
end
config system replacemsg webproxy "user-limit"
end
config system replacemsg webproxy "auth-challenge"
end
config system replacemsg webproxy "auth-login-fail"
end
config system replacemsg webproxy "auth-group-info-fail"
end
config system replacemsg webproxy "http-err"
end
config system replacemsg webproxy "auth-ip-blackout"
end
config system replacemsg webproxy "ztna-block"
end
config system replacemsg ftp "ftp-explicit-banner"
end
config system replacemsg fortiguard-wf "ftgd-block"
end
config system replacemsg fortiguard-wf "ftgd-ovrd"
end
config system replacemsg fortiguard-wf "ftgd-quota"
end
config system replacemsg fortiguard-wf "ftgd-warning"
end
config system replacemsg spam "ipblocklist"
end
config system replacemsg spam "smtp-spam-dnsbl"
end
config system replacemsg spam "smtp-spam-feip"
end
config system replacemsg spam "smtp-spam-helo"
end
config system replacemsg spam "smtp-spam-emailblock-to"
end
config system replacemsg spam "smtp-spam-emailblock-from"
end
config system replacemsg spam "smtp-spam-emailblock-subject"
end
config system replacemsg spam "smtp-spam-mimeheader"
end
config system replacemsg spam "reversedns"
end
config system replacemsg spam "smtp-spam-ase"
end
config system replacemsg spam "submit"
end
config system replacemsg alertmail "alertmail-virus"
end
config system replacemsg alertmail "alertmail-block"
end
config system replacemsg alertmail "alertmail-nids-event"
end
config system replacemsg alertmail "alertmail-crit-event"
end
config system replacemsg alertmail "alertmail-disk-full"
end
config system replacemsg admin "pre_admin-disclaimer-text"
end
config system replacemsg admin "post_admin-disclaimer-text"
end
config system replacemsg auth "auth-disclaimer-page-1"
end
config system replacemsg auth "auth-disclaimer-page-2"
end
config system replacemsg auth "auth-disclaimer-page-3"
end
config system replacemsg auth "auth-proxy-reject-page"
end
config system replacemsg auth "auth-reject-page"
end
config system replacemsg auth "auth-login-page"
end
config system replacemsg auth "auth-login-failed-page"
end
config system replacemsg auth "auth-token-login-page"
end
config system replacemsg auth "auth-token-login-failed-page"
end
config system replacemsg auth "auth-success-msg"
end
config system replacemsg auth "auth-challenge-page"
end
config system replacemsg auth "auth-keepalive-page"
end
config system replacemsg auth "auth-portal-page"
end
config system replacemsg auth "auth-password-page"
end
config system replacemsg auth "auth-fortitoken-page"
end
config system replacemsg auth "auth-next-fortitoken-page"
end
config system replacemsg auth "auth-email-token-page"
end
config system replacemsg auth "auth-sms-token-page"
end
config system replacemsg auth "auth-email-harvesting-page"
end
config system replacemsg auth "auth-email-failed-page"
end
config system replacemsg auth "auth-cert-passwd-page"
end
config system replacemsg auth "auth-guest-print-page"
end
config system replacemsg auth "auth-guest-email-page"
end
config system replacemsg auth "auth-success-page"
end
config system replacemsg auth "auth-block-notification-page"
end
config system replacemsg auth "auth-quarantine-page"
end
config system replacemsg auth "auth-qtn-reject-page"
end
config system replacemsg auth "auth-saml-page"
end
config system replacemsg sslvpn "sslvpn-login"
end
config system replacemsg sslvpn "sslvpn-header"
end
config system replacemsg sslvpn "sslvpn-limit"
end
config system replacemsg sslvpn "hostcheck-error"
end
config system replacemsg sslvpn "sslvpn-provision-user"
end
config system replacemsg sslvpn "sslvpn-provision-user-sms"
end
config system replacemsg nac-quar "nac-quar-virus"
end
config system replacemsg nac-quar "nac-quar-dos"
end
config system replacemsg nac-quar "nac-quar-ips"
end
config system replacemsg nac-quar "nac-quar-dlp"
end
config system replacemsg nac-quar "nac-quar-admin"
end
config system replacemsg nac-quar "nac-quar-app"
end
config system replacemsg traffic-quota "per-ip-shaper-block"
end
config system replacemsg utm "virus-html"
end
config system replacemsg utm "client-virus-html"
end
config system replacemsg utm "virus-text"
end
config system replacemsg utm "dlp-html"
end
config system replacemsg utm "dlp-text"
end
config system replacemsg utm "appblk-html"
end
config system replacemsg utm "ipsblk-html"
end
config system replacemsg utm "ipsfail-html"
end
config system replacemsg utm "exe-text"
end
config system replacemsg utm "waf-html"
end
config system replacemsg utm "outbreak-prevention-html"
end
config system replacemsg utm "outbreak-prevention-text"
end
config system replacemsg utm "external-blocklist-html"
end
config system replacemsg utm "external-blocklist-text"
end
config system replacemsg utm "ems-threat-feed-html"
end
config system replacemsg utm "ems-threat-feed-text"
end
config system replacemsg utm "file-filter-html"
end
config system replacemsg utm "file-filter-text"
end
config system replacemsg utm "file-size-text"
end
config system replacemsg utm "transfer-size-text"
end
config system replacemsg utm "internal-error-text"
end
config system replacemsg utm "archive-block-html"
end
config system replacemsg utm "archive-block-text"
end
config system replacemsg utm "file-av-fail-text"
end
config system replacemsg utm "transfer-av-fail-text"
end
config system replacemsg utm "banned-word-html"
end
config system replacemsg utm "banned-word-text"
end
config system replacemsg utm "block-html"
end
config system replacemsg utm "block-text"
end
config system replacemsg utm "decompress-limit-text"
end
config system replacemsg utm "dlp-subject-text"
end
config system replacemsg utm "file-size-html"
end
config system replacemsg utm "client-file-size-html"
end
config system replacemsg utm "inline-scan-timeout-html"
end
config system replacemsg utm "inline-scan-timeout-text"
end
config system replacemsg utm "inline-scan-error-html"
end
config system replacemsg utm "inline-scan-error-text"
end
config system replacemsg utm "icap-block-text"
end
config system replacemsg utm "icap-error-text"
end
config system replacemsg utm "icap-http-error"
end
config system replacemsg icap "icap-req-resp"
end
config system replacemsg automation "automation-email"
end
config system snmp sysinfo
end
config system central-management
set type fortiguard
end
config firewall internet-service-name
edit "Google-Other"
set internet-service-id 65536
next
edit "Google-Web"
set internet-service-id 65537
next
edit "Google-ICMP"
set internet-service-id 65538
next
edit "Google-DNS"
set internet-service-id 65539
next
edit "Google-Outbound_Email"
set internet-service-id 65540
next
edit "Google-SSH"
set internet-service-id 65542
next
edit "Google-FTP"
set internet-service-id 65543
next
edit "Google-NTP"
set internet-service-id 65544
next
edit "Google-Inbound_Email"
set internet-service-id 65545
next
edit "Google-LDAP"
set internet-service-id 65550
next
edit "Google-NetBIOS.Session.Service"
set internet-service-id 65551
next
edit "Google-RTMP"
set internet-service-id 65552
next
edit "Google-NetBIOS.Name.Service"
set internet-service-id 65560
next
edit "Google-Google.Cloud"
set internet-service-id 65641
next
edit "Google-Google.Bot"
set internet-service-id 65643
next
edit "Google-Gmail"
set internet-service-id 65646
next
edit "Meta-Other"
set internet-service-id 131072
next
edit "Meta-Web"
set internet-service-id 131073
next
edit "Meta-ICMP"
set internet-service-id 131074
next
edit "Meta-DNS"
set internet-service-id 131075
next
edit "Meta-Outbound_Email"
set internet-service-id 131076
next
edit "Meta-SSH"
set internet-service-id 131078
next
edit "Meta-FTP"
set internet-service-id 131079
next
edit "Meta-NTP"
set internet-service-id 131080
next
edit "Meta-Inbound_Email"
set internet-service-id 131081
next
edit "Meta-LDAP"
set internet-service-id 131086
next
edit "Meta-NetBIOS.Session.Service"
set internet-service-id 131087
next
edit "Meta-RTMP"
set internet-service-id 131088
next
edit "Meta-NetBIOS.Name.Service"
set internet-service-id 131096
next
edit "Meta-Whatsapp"
set internet-service-id 131184
next
edit "Meta-Instagram"
set internet-service-id 131189
next
edit "Apple-Other"
set internet-service-id 196608
next
edit "Apple-Web"
set internet-service-id 196609
next
edit "Apple-ICMP"
set internet-service-id 196610
next
edit "Apple-DNS"
set internet-service-id 196611
next
edit "Apple-Outbound_Email"
set internet-service-id 196612
next
edit "Apple-SSH"
set internet-service-id 196614
next
edit "Apple-FTP"
set internet-service-id 196615
next
edit "Apple-NTP"
set internet-service-id 196616
next
edit "Apple-Inbound_Email"
set internet-service-id 196617
next
edit "Apple-LDAP"
set internet-service-id 196622
next
edit "Apple-NetBIOS.Session.Service"
set internet-service-id 196623
next
edit "Apple-RTMP"
set internet-service-id 196624
next
edit "Apple-NetBIOS.Name.Service"
set internet-service-id 196632
next
edit "Apple-App.Store"
set internet-service-id 196723
next
edit "Apple-APNs"
set internet-service-id 196747
next
edit "Yahoo-Other"
set internet-service-id 262144
next
edit "Yahoo-Web"
set internet-service-id 262145
next
edit "Yahoo-ICMP"
set internet-service-id 262146
next
edit "Yahoo-DNS"
set internet-service-id 262147
next
edit "Yahoo-Outbound_Email"
set internet-service-id 262148
next
edit "Yahoo-SSH"
set internet-service-id 262150
next
edit "Yahoo-FTP"
set internet-service-id 262151
next
edit "Yahoo-NTP"
set internet-service-id 262152
next
edit "Yahoo-Inbound_Email"
set internet-service-id 262153
next
edit "Yahoo-LDAP"
set internet-service-id 262158
next
edit "Yahoo-NetBIOS.Session.Service"
set internet-service-id 262159
next
edit "Yahoo-RTMP"
set internet-service-id 262160
next
edit "Yahoo-NetBIOS.Name.Service"
set internet-service-id 262168
next
edit "Microsoft-Other"
set internet-service-id 327680
next
edit "Microsoft-Web"
set internet-service-id 327681
next
edit "Microsoft-ICMP"
set internet-service-id 327682
next
edit "Microsoft-DNS"
set internet-service-id 327683
next
edit "Microsoft-Outbound_Email"
set internet-service-id 327684
next
edit "Microsoft-SSH"
set internet-service-id 327686
next
edit "Microsoft-FTP"
set internet-service-id 327687
next
edit "Microsoft-NTP"
set internet-service-id 327688
next
edit "Microsoft-Inbound_Email"
set internet-service-id 327689
next
edit "Microsoft-LDAP"
set internet-service-id 327694
next
edit "Microsoft-NetBIOS.Session.Service"
set internet-service-id 327695
next
edit "Microsoft-RTMP"
set internet-service-id 327696
next
edit "Microsoft-NetBIOS.Name.Service"
set internet-service-id 327704
next
edit "Microsoft-Skype_Teams"
set internet-service-id 327781
next
edit "Microsoft-Office365"
set internet-service-id 327782
next
edit "Microsoft-Azure"
set internet-service-id 327786
next
edit "Microsoft-Bing.Bot"
set internet-service-id 327788
next
edit "Microsoft-Outlook"
set internet-service-id 327791
next
edit "Microsoft-Microsoft.Update"
set internet-service-id 327793
next
edit "Microsoft-Dynamics"
set internet-service-id 327837
next
edit "Microsoft-WNS"
set internet-service-id 327839
next
edit "Microsoft-Office365.Published"
set internet-service-id 327880
next
edit "Amazon-Other"
set internet-service-id 393216
next
edit "Amazon-Web"
set internet-service-id 393217
next
edit "Amazon-ICMP"
set internet-service-id 393218
next
edit "Amazon-DNS"
set internet-service-id 393219
next
edit "Amazon-Outbound_Email"
set internet-service-id 393220
next
edit "Amazon-SSH"
set internet-service-id 393222
next
edit "Amazon-FTP"
set internet-service-id 393223
next
edit "Amazon-NTP"
set internet-service-id 393224
next
edit "Amazon-Inbound_Email"
set internet-service-id 393225
next
edit "Amazon-LDAP"
set internet-service-id 393230
next
edit "Amazon-NetBIOS.Session.Service"
set internet-service-id 393231
next
edit "Amazon-RTMP"
set internet-service-id 393232
next
edit "Amazon-NetBIOS.Name.Service"
set internet-service-id 393240
next
edit "Amazon-AWS"
set internet-service-id 393320
next
edit "Amazon-AWS.WorkSpaces.Gateway"
set internet-service-id 393403
next
edit "eBay-Other"
set internet-service-id 458752
next
edit "eBay-Web"
set internet-service-id 458753
next
edit "eBay-ICMP"
set internet-service-id 458754
next
edit "eBay-DNS"
set internet-service-id 458755
next
edit "eBay-Outbound_Email"
set internet-service-id 458756
next
edit "eBay-SSH"
set internet-service-id 458758
next
edit "eBay-FTP"
set internet-service-id 458759
next
edit "eBay-NTP"
set internet-service-id 458760
next
edit "eBay-Inbound_Email"
set internet-service-id 458761
next
edit "eBay-LDAP"
set internet-service-id 458766
next
edit "eBay-NetBIOS.Session.Service"
set internet-service-id 458767
next
edit "eBay-RTMP"
set internet-service-id 458768
next
edit "eBay-NetBIOS.Name.Service"
set internet-service-id 458776
next
edit "PayPal-Other"
set internet-service-id 524288
next
edit "PayPal-Web"
set internet-service-id 524289
next
edit "PayPal-ICMP"
set internet-service-id 524290
next
edit "PayPal-DNS"
set internet-service-id 524291
next
edit "PayPal-Outbound_Email"
set internet-service-id 524292
next
edit "PayPal-SSH"
set internet-service-id 524294
next
edit "PayPal-FTP"
set internet-service-id 524295
next
edit "PayPal-NTP"
set internet-service-id 524296
next
edit "PayPal-Inbound_Email"
set internet-service-id 524297
next
edit "PayPal-LDAP"
set internet-service-id 524302
next
edit "PayPal-NetBIOS.Session.Service"
set internet-service-id 524303
next
edit "PayPal-RTMP"
set internet-service-id 524304
next
edit "PayPal-NetBIOS.Name.Service"
set internet-service-id 524312
next
edit "Box-Other"
set internet-service-id 589824
next
edit "Box-Web"
set internet-service-id 589825
next
edit "Box-ICMP"
set internet-service-id 589826
next
edit "Box-DNS"
set internet-service-id 589827
next
edit "Box-Outbound_Email"
set internet-service-id 589828
next
edit "Box-SSH"
set internet-service-id 589830
next
edit "Box-FTP"
set internet-service-id 589831
next
edit "Box-NTP"
set internet-service-id 589832
next
edit "Box-Inbound_Email"
set internet-service-id 589833
next
edit "Box-LDAP"
set internet-service-id 589838
next
edit "Box-NetBIOS.Session.Service"
set internet-service-id 589839
next
edit "Box-RTMP"
set internet-service-id 589840
next
edit "Box-NetBIOS.Name.Service"
set internet-service-id 589848
next
edit "Salesforce-Other"
set internet-service-id 655360
next
edit "Salesforce-Web"
set internet-service-id 655361
next
edit "Salesforce-ICMP"
set internet-service-id 655362
next
edit "Salesforce-DNS"
set internet-service-id 655363
next
edit "Salesforce-Outbound_Email"
set internet-service-id 655364
next
edit "Salesforce-SSH"
set internet-service-id 655366
next
edit "Salesforce-FTP"
set internet-service-id 655367
next
edit "Salesforce-NTP"
set internet-service-id 655368
next
edit "Salesforce-Inbound_Email"
set internet-service-id 655369
next
edit "Salesforce-LDAP"
set internet-service-id 655374
next
edit "Salesforce-NetBIOS.Session.Service"
set internet-service-id 655375
next
edit "Salesforce-RTMP"
set internet-service-id 655376
next
edit "Salesforce-NetBIOS.Name.Service"
set internet-service-id 655384
next
edit "Salesforce-Email.Relay"
set internet-service-id 655530
next
edit "Dropbox-Other"
set internet-service-id 720896
next
edit "Dropbox-Web"
set internet-service-id 720897
next
edit "Dropbox-ICMP"
set internet-service-id 720898
next
edit "Dropbox-DNS"
set internet-service-id 720899
next
edit "Dropbox-Outbound_Email"
set internet-service-id 720900
next
edit "Dropbox-SSH"
set internet-service-id 720902
next
edit "Dropbox-FTP"
set internet-service-id 720903
next
edit "Dropbox-NTP"
set internet-service-id 720904
next
edit "Dropbox-Inbound_Email"
set internet-service-id 720905
next
edit "Dropbox-LDAP"
set internet-service-id 720910
next
edit "Dropbox-NetBIOS.Session.Service"
set internet-service-id 720911
next
edit "Dropbox-RTMP"
set internet-service-id 720912
next
edit "Dropbox-NetBIOS.Name.Service"
set internet-service-id 720920
next
edit "Netflix-Other"
set internet-service-id 786432
next
edit "Netflix-Web"
set internet-service-id 786433
next
edit "Netflix-ICMP"
set internet-service-id 786434
next
edit "Netflix-DNS"
set internet-service-id 786435
next
edit "Netflix-Outbound_Email"
set internet-service-id 786436
next
edit "Netflix-SSH"
set internet-service-id 786438
next
edit "Netflix-FTP"
set internet-service-id 786439
next
edit "Netflix-NTP"
set internet-service-id 786440
next
edit "Netflix-Inbound_Email"
set internet-service-id 786441
next
edit "Netflix-LDAP"
set internet-service-id 786446
next
edit "Netflix-NetBIOS.Session.Service"
set internet-service-id 786447
next
edit "Netflix-RTMP"
set internet-service-id 786448
next
edit "Netflix-NetBIOS.Name.Service"
set internet-service-id 786456
next
edit "LinkedIn-Other"
set internet-service-id 851968
next
edit "LinkedIn-Web"
set internet-service-id 851969
next
edit "LinkedIn-ICMP"
set internet-service-id 851970
next
edit "LinkedIn-DNS"
set internet-service-id 851971
next
edit "LinkedIn-Outbound_Email"
set internet-service-id 851972
next
edit "LinkedIn-SSH"
set internet-service-id 851974
next
edit "LinkedIn-FTP"
set internet-service-id 851975
next
edit "LinkedIn-NTP"
set internet-service-id 851976
next
edit "LinkedIn-Inbound_Email"
set internet-service-id 851977
next
edit "LinkedIn-LDAP"
set internet-service-id 851982
next
edit "LinkedIn-NetBIOS.Session.Service"
set internet-service-id 851983
next
edit "LinkedIn-RTMP"
set internet-service-id 851984
next
edit "LinkedIn-NetBIOS.Name.Service"
set internet-service-id 851992
next
edit "Adobe-Other"
set internet-service-id 917504
next
edit "Adobe-Web"
set internet-service-id 917505
next
edit "Adobe-ICMP"
set internet-service-id 917506
next
edit "Adobe-DNS"
set internet-service-id 917507
next
edit "Adobe-Outbound_Email"
set internet-service-id 917508
next
edit "Adobe-SSH"
set internet-service-id 917510
next
edit "Adobe-FTP"
set internet-service-id 917511
next
edit "Adobe-NTP"
set internet-service-id 917512
next
edit "Adobe-Inbound_Email"
set internet-service-id 917513
next
edit "Adobe-LDAP"
set internet-service-id 917518
next
edit "Adobe-NetBIOS.Session.Service"
set internet-service-id 917519
next
edit "Adobe-RTMP"
set internet-service-id 917520
next
edit "Adobe-NetBIOS.Name.Service"
set internet-service-id 917528
next
edit "Adobe-Adobe.Experience.Cloud"
set internet-service-id 917640
next
edit "Oracle-Other"
set internet-service-id 983040
next
edit "Oracle-Web"
set internet-service-id 983041
next
edit "Oracle-ICMP"
set internet-service-id 983042
next
edit "Oracle-DNS"
set internet-service-id 983043
next
edit "Oracle-Outbound_Email"
set internet-service-id 983044
next
edit "Oracle-SSH"
set internet-service-id 983046
next
edit "Oracle-FTP"
set internet-service-id 983047
next
edit "Oracle-NTP"
set internet-service-id 983048
next
edit "Oracle-Inbound_Email"
set internet-service-id 983049
next
edit "Oracle-LDAP"
set internet-service-id 983054
next
edit "Oracle-NetBIOS.Session.Service"
set internet-service-id 983055
next
edit "Oracle-RTMP"
set internet-service-id 983056
next
edit "Oracle-NetBIOS.Name.Service"
set internet-service-id 983064
next
edit "Oracle-Oracle.Cloud"
set internet-service-id 983171
next
edit "Hulu-Other"
set internet-service-id 1048576
next
edit "Hulu-Web"
set internet-service-id 1048577
next
edit "Hulu-ICMP"
set internet-service-id 1048578
next
edit "Hulu-DNS"
set internet-service-id 1048579
next
edit "Hulu-Outbound_Email"
set internet-service-id 1048580
next
edit "Hulu-SSH"
set internet-service-id 1048582
next
edit "Hulu-FTP"
set internet-service-id 1048583
next
edit "Hulu-NTP"
set internet-service-id 1048584
next
edit "Hulu-Inbound_Email"
set internet-service-id 1048585
next
edit "Hulu-LDAP"
set internet-service-id 1048590
next
edit "Hulu-NetBIOS.Session.Service"
set internet-service-id 1048591
next
edit "Hulu-RTMP"
set internet-service-id 1048592
next
edit "Hulu-NetBIOS.Name.Service"
set internet-service-id 1048600
next
edit "Pinterest-Other"
set internet-service-id 1114112
next
edit "Pinterest-Web"
set internet-service-id 1114113
next
edit "Pinterest-ICMP"
set internet-service-id 1114114
next
edit "Pinterest-DNS"
set internet-service-id 1114115
next
edit "Pinterest-Outbound_Email"
set internet-service-id 1114116
next
edit "Pinterest-SSH"
set internet-service-id 1114118
next
edit "Pinterest-FTP"
set internet-service-id 1114119
next
edit "Pinterest-NTP"
set internet-service-id 1114120
next
edit "Pinterest-Inbound_Email"
set internet-service-id 1114121
next
edit "Pinterest-LDAP"
set internet-service-id 1114126
next
edit "Pinterest-NetBIOS.Session.Service"
set internet-service-id 1114127
next
edit "Pinterest-RTMP"
set internet-service-id 1114128
next
edit "Pinterest-NetBIOS.Name.Service"
set internet-service-id 1114136
next
edit "LogMeIn-Other"
set internet-service-id 1179648
next
edit "LogMeIn-Web"
set internet-service-id 1179649
next
edit "LogMeIn-ICMP"
set internet-service-id 1179650
next
edit "LogMeIn-DNS"
set internet-service-id 1179651
next
edit "LogMeIn-Outbound_Email"
set internet-service-id 1179652
next
edit "LogMeIn-SSH"
set internet-service-id 1179654
next
edit "LogMeIn-FTP"
set internet-service-id 1179655
next
edit "LogMeIn-NTP"
set internet-service-id 1179656
next
edit "LogMeIn-Inbound_Email"
set internet-service-id 1179657
next
edit "LogMeIn-LDAP"
set internet-service-id 1179662
next
edit "LogMeIn-NetBIOS.Session.Service"
set internet-service-id 1179663
next
edit "LogMeIn-RTMP"
set internet-service-id 1179664
next
edit "LogMeIn-NetBIOS.Name.Service"
set internet-service-id 1179672
next
edit "LogMeIn-GoTo.Suite"
set internet-service-id 1179767
next
edit "Fortinet-Other"
set internet-service-id 1245184
next
edit "Fortinet-Web"
set internet-service-id 1245185
next
edit "Fortinet-ICMP"
set internet-service-id 1245186
next
edit "Fortinet-DNS"
set internet-service-id 1245187
next
edit "Fortinet-Outbound_Email"
set internet-service-id 1245188
next
edit "Fortinet-SSH"
set internet-service-id 1245190
next
edit "Fortinet-FTP"
set internet-service-id 1245191
next
edit "Fortinet-NTP"
set internet-service-id 1245192
next
edit "Fortinet-Inbound_Email"
set internet-service-id 1245193
next
edit "Fortinet-LDAP"
set internet-service-id 1245198
next
edit "Fortinet-NetBIOS.Session.Service"
set internet-service-id 1245199
next
edit "Fortinet-RTMP"
set internet-service-id 1245200
next
edit "Fortinet-NetBIOS.Name.Service"
set internet-service-id 1245208
next
edit "Fortinet-FortiGuard"
set internet-service-id 1245324
next
edit "Fortinet-FortiMail.Cloud"
set internet-service-id 1245325
next
edit "Fortinet-FortiCloud"
set internet-service-id 1245326
next
edit "Kaspersky-Other"
set internet-service-id 1310720
next
edit "Kaspersky-Web"
set internet-service-id 1310721
next
edit "Kaspersky-ICMP"
set internet-service-id 1310722
next
edit "Kaspersky-DNS"
set internet-service-id 1310723
next
edit "Kaspersky-Outbound_Email"
set internet-service-id 1310724
next
edit "Kaspersky-SSH"
set internet-service-id 1310726
next
edit "Kaspersky-FTP"
set internet-service-id 1310727
next
edit "Kaspersky-NTP"
set internet-service-id 1310728
next
edit "Kaspersky-Inbound_Email"
set internet-service-id 1310729
next
edit "Kaspersky-LDAP"
set internet-service-id 1310734
next
edit "Kaspersky-NetBIOS.Session.Service"
set internet-service-id 1310735
next
edit "Kaspersky-RTMP"
set internet-service-id 1310736
next
edit "Kaspersky-NetBIOS.Name.Service"
set internet-service-id 1310744
next
edit "McAfee-Other"
set internet-service-id 1376256
next
edit "McAfee-Web"
set internet-service-id 1376257
next
edit "McAfee-ICMP"
set internet-service-id 1376258
next
edit "McAfee-DNS"
set internet-service-id 1376259
next
edit "McAfee-Outbound_Email"
set internet-service-id 1376260
next
edit "McAfee-SSH"
set internet-service-id 1376262
next
edit "McAfee-FTP"
set internet-service-id 1376263
next
edit "McAfee-NTP"
set internet-service-id 1376264
next
edit "McAfee-Inbound_Email"
set internet-service-id 1376265
next
edit "McAfee-LDAP"
set internet-service-id 1376270
next
edit "McAfee-NetBIOS.Session.Service"
set internet-service-id 1376271
next
edit "McAfee-RTMP"
set internet-service-id 1376272
next
edit "McAfee-NetBIOS.Name.Service"
set internet-service-id 1376280
next
edit "Symantec-Other"
set internet-service-id 1441792
next
edit "Symantec-Web"
set internet-service-id 1441793
next
edit "Symantec-ICMP"
set internet-service-id 1441794
next
edit "Symantec-DNS"
set internet-service-id 1441795
next
edit "Symantec-Outbound_Email"
set internet-service-id 1441796
next
edit "Symantec-SSH"
set internet-service-id 1441798
next
edit "Symantec-FTP"
set internet-service-id 1441799
next
edit "Symantec-NTP"
set internet-service-id 1441800
next
edit "Symantec-Inbound_Email"
set internet-service-id 1441801
next
edit "Symantec-LDAP"
set internet-service-id 1441806
next
edit "Symantec-NetBIOS.Session.Service"
set internet-service-id 1441807
next
edit "Symantec-RTMP"
set internet-service-id 1441808
next
edit "Symantec-NetBIOS.Name.Service"
set internet-service-id 1441816
next
edit "Symantec-Symantec.Cloud"
set internet-service-id 1441922
next
edit "VMware-Other"
set internet-service-id 1507328
next
edit "VMware-Web"
set internet-service-id 1507329
next
edit "VMware-ICMP"
set internet-service-id 1507330
next
edit "VMware-DNS"
set internet-service-id 1507331
next
edit "VMware-Outbound_Email"
set internet-service-id 1507332
next
edit "VMware-SSH"
set internet-service-id 1507334
next
edit "VMware-FTP"
set internet-service-id 1507335
next
edit "VMware-NTP"
set internet-service-id 1507336
next
edit "VMware-Inbound_Email"
set internet-service-id 1507337
next
edit "VMware-LDAP"
set internet-service-id 1507342
next
edit "VMware-NetBIOS.Session.Service"
set internet-service-id 1507343
next
edit "VMware-RTMP"
set internet-service-id 1507344
next
edit "VMware-NetBIOS.Name.Service"
set internet-service-id 1507352
next
edit "VMware-Workspace.ONE"
set internet-service-id 1507461
next
edit "AOL-Other"
set internet-service-id 1572864
next
edit "AOL-Web"
set internet-service-id 1572865
next
edit "AOL-ICMP"
set internet-service-id 1572866
next
edit "AOL-DNS"
set internet-service-id 1572867
next
edit "AOL-Outbound_Email"
set internet-service-id 1572868
next
edit "AOL-SSH"
set internet-service-id 1572870
next
edit "AOL-FTP"
set internet-service-id 1572871
next
edit "AOL-NTP"
set internet-service-id 1572872
next
edit "AOL-Inbound_Email"
set internet-service-id 1572873
next
edit "AOL-LDAP"
set internet-service-id 1572878
next
edit "AOL-NetBIOS.Session.Service"
set internet-service-id 1572879
next
edit "AOL-RTMP"
set internet-service-id 1572880
next
edit "AOL-NetBIOS.Name.Service"
set internet-service-id 1572888
next
edit "RealNetworks-Other"
set internet-service-id 1638400
next
edit "RealNetworks-Web"
set internet-service-id 1638401
next
edit "RealNetworks-ICMP"
set internet-service-id 1638402
next
edit "RealNetworks-DNS"
set internet-service-id 1638403
next
edit "RealNetworks-Outbound_Email"
set internet-service-id 1638404
next
edit "RealNetworks-SSH"
set internet-service-id 1638406
next
edit "RealNetworks-FTP"
set internet-service-id 1638407
next
edit "RealNetworks-NTP"
set internet-service-id 1638408
next
edit "RealNetworks-Inbound_Email"
set internet-service-id 1638409
next
edit "RealNetworks-LDAP"
set internet-service-id 1638414
next
edit "RealNetworks-NetBIOS.Session.Service"
set internet-service-id 1638415
next
edit "RealNetworks-RTMP"
set internet-service-id 1638416
next
edit "RealNetworks-NetBIOS.Name.Service"
set internet-service-id 1638424
next
edit "Zoho-Other"
set internet-service-id 1703936
next
edit "Zoho-Web"
set internet-service-id 1703937
next
edit "Zoho-ICMP"
set internet-service-id 1703938
next
edit "Zoho-DNS"
set internet-service-id 1703939
next
edit "Zoho-Outbound_Email"
set internet-service-id 1703940
next
edit "Zoho-SSH"
set internet-service-id 1703942
next
edit "Zoho-FTP"
set internet-service-id 1703943
next
edit "Zoho-NTP"
set internet-service-id 1703944
next
edit "Zoho-Inbound_Email"
set internet-service-id 1703945
next
edit "Zoho-LDAP"
set internet-service-id 1703950
next
edit "Zoho-NetBIOS.Session.Service"
set internet-service-id 1703951
next
edit "Zoho-RTMP"
set internet-service-id 1703952
next
edit "Zoho-NetBIOS.Name.Service"
set internet-service-id 1703960
next
edit "Mozilla-Other"
set internet-service-id 1769472
next
edit "Mozilla-Web"
set internet-service-id 1769473
next
edit "Mozilla-ICMP"
set internet-service-id 1769474
next
edit "Mozilla-DNS"
set internet-service-id 1769475
next
edit "Mozilla-Outbound_Email"
set internet-service-id 1769476
next
edit "Mozilla-SSH"
set internet-service-id 1769478
next
edit "Mozilla-FTP"
set internet-service-id 1769479
next
edit "Mozilla-NTP"
set internet-service-id 1769480
next
edit "Mozilla-Inbound_Email"
set internet-service-id 1769481
next
edit "Mozilla-LDAP"
set internet-service-id 1769486
next
edit "Mozilla-NetBIOS.Session.Service"
set internet-service-id 1769487
next
edit "Mozilla-RTMP"
set internet-service-id 1769488
next
edit "Mozilla-NetBIOS.Name.Service"
set internet-service-id 1769496
next
edit "TeamViewer-Other"
set internet-service-id 1835008
next
edit "TeamViewer-Web"
set internet-service-id 1835009
next
edit "TeamViewer-ICMP"
set internet-service-id 1835010
next
edit "TeamViewer-DNS"
set internet-service-id 1835011
next
edit "TeamViewer-Outbound_Email"
set internet-service-id 1835012
next
edit "TeamViewer-SSH"
set internet-service-id 1835014
next
edit "TeamViewer-FTP"
set internet-service-id 1835015
next
edit "TeamViewer-NTP"
set internet-service-id 1835016
next
edit "TeamViewer-Inbound_Email"
set internet-service-id 1835017
next
edit "TeamViewer-LDAP"
set internet-service-id 1835022
next
edit "TeamViewer-NetBIOS.Session.Service"
set internet-service-id 1835023
next
edit "TeamViewer-RTMP"
set internet-service-id 1835024
next
edit "TeamViewer-NetBIOS.Name.Service"
set internet-service-id 1835032
next
edit "TeamViewer-TeamViewer"
set internet-service-id 1835117
next
edit "HP-Other"
set internet-service-id 1900544
next
edit "HP-Web"
set internet-service-id 1900545
next
edit "HP-ICMP"
set internet-service-id 1900546
next
edit "HP-DNS"
set internet-service-id 1900547
next
edit "HP-Outbound_Email"
set internet-service-id 1900548
next
edit "HP-SSH"
set internet-service-id 1900550
next
edit "HP-FTP"
set internet-service-id 1900551
next
edit "HP-NTP"
set internet-service-id 1900552
next
edit "HP-Inbound_Email"
set internet-service-id 1900553
next
edit "HP-LDAP"
set internet-service-id 1900558
next
edit "HP-NetBIOS.Session.Service"
set internet-service-id 1900559
next
edit "HP-RTMP"
set internet-service-id 1900560
next
edit "HP-NetBIOS.Name.Service"
set internet-service-id 1900568
next
edit "HP-Aruba"
set internet-service-id 1900726
next
edit "Cisco-Other"
set internet-service-id 1966080
next
edit "Cisco-Web"
set internet-service-id 1966081
next
edit "Cisco-ICMP"
set internet-service-id 1966082
next
edit "Cisco-DNS"
set internet-service-id 1966083
next
edit "Cisco-Outbound_Email"
set internet-service-id 1966084
next
edit "Cisco-SSH"
set internet-service-id 1966086
next
edit "Cisco-FTP"
set internet-service-id 1966087
next
edit "Cisco-NTP"
set internet-service-id 1966088
next
edit "Cisco-Inbound_Email"
set internet-service-id 1966089
next
edit "Cisco-LDAP"
set internet-service-id 1966094
next
edit "Cisco-NetBIOS.Session.Service"
set internet-service-id 1966095
next
edit "Cisco-RTMP"
set internet-service-id 1966096
next
edit "Cisco-NetBIOS.Name.Service"
set internet-service-id 1966104
next
edit "Cisco-Webex"
set internet-service-id 1966183
next
edit "Cisco-Meraki.Cloud"
set internet-service-id 1966218
next
edit "Cisco-Duo.Security"
set internet-service-id 1966225
next
edit "Cisco-AppDynamic"
set internet-service-id 1966260
next
edit "IBM-Other"
set internet-service-id 2031616
next
edit "IBM-Web"
set internet-service-id 2031617
next
edit "IBM-ICMP"
set internet-service-id 2031618
next
edit "IBM-DNS"
set internet-service-id 2031619
next
edit "IBM-Outbound_Email"
set internet-service-id 2031620
next
edit "IBM-SSH"
set internet-service-id 2031622
next
edit "IBM-FTP"
set internet-service-id 2031623
next
edit "IBM-NTP"
set internet-service-id 2031624
next
edit "IBM-Inbound_Email"
set internet-service-id 2031625
next
edit "IBM-LDAP"
set internet-service-id 2031630
next
edit "IBM-NetBIOS.Session.Service"
set internet-service-id 2031631
next
edit "IBM-RTMP"
set internet-service-id 2031632
next
edit "IBM-NetBIOS.Name.Service"
set internet-service-id 2031640
next
edit "IBM-IBM.Cloud"
set internet-service-id 2031748
next
edit "Citrix-Other"
set internet-service-id 2097152
next
edit "Citrix-Web"
set internet-service-id 2097153
next
edit "Citrix-ICMP"
set internet-service-id 2097154
next
edit "Citrix-DNS"
set internet-service-id 2097155
next
edit "Citrix-Outbound_Email"
set internet-service-id 2097156
next
edit "Citrix-SSH"
set internet-service-id 2097158
next
edit "Citrix-FTP"
set internet-service-id 2097159
next
edit "Citrix-NTP"
set internet-service-id 2097160
next
edit "Citrix-Inbound_Email"
set internet-service-id 2097161
next
edit "Citrix-LDAP"
set internet-service-id 2097166
next
edit "Citrix-NetBIOS.Session.Service"
set internet-service-id 2097167
next
edit "Citrix-RTMP"
set internet-service-id 2097168
next
edit "Citrix-NetBIOS.Name.Service"
set internet-service-id 2097176
next
edit "Twitter-Other"
set internet-service-id 2162688
next
edit "Twitter-Web"
set internet-service-id 2162689
next
edit "Twitter-ICMP"
set internet-service-id 2162690
next
edit "Twitter-DNS"
set internet-service-id 2162691
next
edit "Twitter-Outbound_Email"
set internet-service-id 2162692
next
edit "Twitter-SSH"
set internet-service-id 2162694
next
edit "Twitter-FTP"
set internet-service-id 2162695
next
edit "Twitter-NTP"
set internet-service-id 2162696
next
edit "Twitter-Inbound_Email"
set internet-service-id 2162697
next
edit "Twitter-LDAP"
set internet-service-id 2162702
next
edit "Twitter-NetBIOS.Session.Service"
set internet-service-id 2162703
next
edit "Twitter-RTMP"
set internet-service-id 2162704
next
edit "Twitter-NetBIOS.Name.Service"
set internet-service-id 2162712
next
edit "Dell-Other"
set internet-service-id 2228224
next
edit "Dell-Web"
set internet-service-id 2228225
next
edit "Dell-ICMP"
set internet-service-id 2228226
next
edit "Dell-DNS"
set internet-service-id 2228227
next
edit "Dell-Outbound_Email"
set internet-service-id 2228228
next
edit "Dell-SSH"
set internet-service-id 2228230
next
edit "Dell-FTP"
set internet-service-id 2228231
next
edit "Dell-NTP"
set internet-service-id 2228232
next
edit "Dell-Inbound_Email"
set internet-service-id 2228233
next
edit "Dell-LDAP"
set internet-service-id 2228238
next
edit "Dell-NetBIOS.Session.Service"
set internet-service-id 2228239
next
edit "Dell-RTMP"
set internet-service-id 2228240
next
edit "Dell-NetBIOS.Name.Service"
set internet-service-id 2228248
next
edit "Vimeo-Other"
set internet-service-id 2293760
next
edit "Vimeo-Web"
set internet-service-id 2293761
next
edit "Vimeo-ICMP"
set internet-service-id 2293762
next
edit "Vimeo-DNS"
set internet-service-id 2293763
next
edit "Vimeo-Outbound_Email"
set internet-service-id 2293764
next
edit "Vimeo-SSH"
set internet-service-id 2293766
next
edit "Vimeo-FTP"
set internet-service-id 2293767
next
edit "Vimeo-NTP"
set internet-service-id 2293768
next
edit "Vimeo-Inbound_Email"
set internet-service-id 2293769
next
edit "Vimeo-LDAP"
set internet-service-id 2293774
next
edit "Vimeo-NetBIOS.Session.Service"
set internet-service-id 2293775
next
edit "Vimeo-RTMP"
set internet-service-id 2293776
next
edit "Vimeo-NetBIOS.Name.Service"
set internet-service-id 2293784
next
edit "Redhat-Other"
set internet-service-id 2359296
next
edit "Redhat-Web"
set internet-service-id 2359297
next
edit "Redhat-ICMP"
set internet-service-id 2359298
next
edit "Redhat-DNS"
set internet-service-id 2359299
next
edit "Redhat-Outbound_Email"
set internet-service-id 2359300
next
edit "Redhat-SSH"
set internet-service-id 2359302
next
edit "Redhat-FTP"
set internet-service-id 2359303
next
edit "Redhat-NTP"
set internet-service-id 2359304
next
edit "Redhat-Inbound_Email"
set internet-service-id 2359305
next
edit "Redhat-LDAP"
set internet-service-id 2359310
next
edit "Redhat-NetBIOS.Session.Service"
set internet-service-id 2359311
next
edit "Redhat-RTMP"
set internet-service-id 2359312
next
edit "Redhat-NetBIOS.Name.Service"
set internet-service-id 2359320
next
edit "VK-Other"
set internet-service-id 2424832
next
edit "VK-Web"
set internet-service-id 2424833
next
edit "VK-ICMP"
set internet-service-id 2424834
next
edit "VK-DNS"
set internet-service-id 2424835
next
edit "VK-Outbound_Email"
set internet-service-id 2424836
next
edit "VK-SSH"
set internet-service-id 2424838
next
edit "VK-FTP"
set internet-service-id 2424839
next
edit "VK-NTP"
set internet-service-id 2424840
next
edit "VK-Inbound_Email"
set internet-service-id 2424841
next
edit "VK-LDAP"
set internet-service-id 2424846
next
edit "VK-NetBIOS.Session.Service"
set internet-service-id 2424847
next
edit "VK-RTMP"
set internet-service-id 2424848
next
edit "VK-NetBIOS.Name.Service"
set internet-service-id 2424856
next
edit "TrendMicro-Other"
set internet-service-id 2490368
next
edit "TrendMicro-Web"
set internet-service-id 2490369
next
edit "TrendMicro-ICMP"
set internet-service-id 2490370
next
edit "TrendMicro-DNS"
set internet-service-id 2490371
next
edit "TrendMicro-Outbound_Email"
set internet-service-id 2490372
next
edit "TrendMicro-SSH"
set internet-service-id 2490374
next
edit "TrendMicro-FTP"
set internet-service-id 2490375
next
edit "TrendMicro-NTP"
set internet-service-id 2490376
next
edit "TrendMicro-Inbound_Email"
set internet-service-id 2490377
next
edit "TrendMicro-LDAP"
set internet-service-id 2490382
next
edit "TrendMicro-NetBIOS.Session.Service"
set internet-service-id 2490383
next
edit "TrendMicro-RTMP"
set internet-service-id 2490384
next
edit "TrendMicro-NetBIOS.Name.Service"
set internet-service-id 2490392
next
edit "Tencent-Other"
set internet-service-id 2555904
next
edit "Tencent-Web"
set internet-service-id 2555905
next
edit "Tencent-ICMP"
set internet-service-id 2555906
next
edit "Tencent-DNS"
set internet-service-id 2555907
next
edit "Tencent-Outbound_Email"
set internet-service-id 2555908
next
edit "Tencent-SSH"
set internet-service-id 2555910
next
edit "Tencent-FTP"
set internet-service-id 2555911
next
edit "Tencent-NTP"
set internet-service-id 2555912
next
edit "Tencent-Inbound_Email"
set internet-service-id 2555913
next
edit "Tencent-LDAP"
set internet-service-id 2555918
next
edit "Tencent-NetBIOS.Session.Service"
set internet-service-id 2555919
next
edit "Tencent-RTMP"
set internet-service-id 2555920
next
edit "Tencent-NetBIOS.Name.Service"
set internet-service-id 2555928
next
edit "Ask-Other"
set internet-service-id 2621440
next
edit "Ask-Web"
set internet-service-id 2621441
next
edit "Ask-ICMP"
set internet-service-id 2621442
next
edit "Ask-DNS"
set internet-service-id 2621443
next
edit "Ask-Outbound_Email"
set internet-service-id 2621444
next
edit "Ask-SSH"
set internet-service-id 2621446
next
edit "Ask-FTP"
set internet-service-id 2621447
next
edit "Ask-NTP"
set internet-service-id 2621448
next
edit "Ask-Inbound_Email"
set internet-service-id 2621449
next
edit "Ask-LDAP"
set internet-service-id 2621454
next
edit "Ask-NetBIOS.Session.Service"
set internet-service-id 2621455
next
edit "Ask-RTMP"
set internet-service-id 2621456
next
edit "Ask-NetBIOS.Name.Service"
set internet-service-id 2621464
next
edit "CNN-Other"
set internet-service-id 2686976
next
edit "CNN-Web"
set internet-service-id 2686977
next
edit "CNN-ICMP"
set internet-service-id 2686978
next
edit "CNN-DNS"
set internet-service-id 2686979
next
edit "CNN-Outbound_Email"
set internet-service-id 2686980
next
edit "CNN-SSH"
set internet-service-id 2686982
next
edit "CNN-FTP"
set internet-service-id 2686983
next
edit "CNN-NTP"
set internet-service-id 2686984
next
edit "CNN-Inbound_Email"
set internet-service-id 2686985
next
edit "CNN-LDAP"
set internet-service-id 2686990
next
edit "CNN-NetBIOS.Session.Service"
set internet-service-id 2686991
next
edit "CNN-RTMP"
set internet-service-id 2686992
next
edit "CNN-NetBIOS.Name.Service"
set internet-service-id 2687000
next
edit "Myspace-Other"
set internet-service-id 2752512
next
edit "Myspace-Web"
set internet-service-id 2752513
next
edit "Myspace-ICMP"
set internet-service-id 2752514
next
edit "Myspace-DNS"
set internet-service-id 2752515
next
edit "Myspace-Outbound_Email"
set internet-service-id 2752516
next
edit "Myspace-SSH"
set internet-service-id 2752518
next
edit "Myspace-FTP"
set internet-service-id 2752519
next
edit "Myspace-NTP"
set internet-service-id 2752520
next
edit "Myspace-Inbound_Email"
set internet-service-id 2752521
next
edit "Myspace-LDAP"
set internet-service-id 2752526
next
edit "Myspace-NetBIOS.Session.Service"
set internet-service-id 2752527
next
edit "Myspace-RTMP"
set internet-service-id 2752528
next
edit "Myspace-NetBIOS.Name.Service"
set internet-service-id 2752536
next
edit "Tor-Relay.Node"
set internet-service-id 2818238
next
edit "Tor-Exit.Node"
set internet-service-id 2818243
next
edit "Baidu-Other"
set internet-service-id 2883584
next
edit "Baidu-Web"
set internet-service-id 2883585
next
edit "Baidu-ICMP"
set internet-service-id 2883586
next
edit "Baidu-DNS"
set internet-service-id 2883587
next
edit "Baidu-Outbound_Email"
set internet-service-id 2883588
next
edit "Baidu-SSH"
set internet-service-id 2883590
next
edit "Baidu-FTP"
set internet-service-id 2883591
next
edit "Baidu-NTP"
set internet-service-id 2883592
next
edit "Baidu-Inbound_Email"
set internet-service-id 2883593
next
edit "Baidu-LDAP"
set internet-service-id 2883598
next
edit "Baidu-NetBIOS.Session.Service"
set internet-service-id 2883599
next
edit "Baidu-RTMP"
set internet-service-id 2883600
next
edit "Baidu-NetBIOS.Name.Service"
set internet-service-id 2883608
next
edit "ntp.org-Other"
set internet-service-id 2949120
next
edit "ntp.org-Web"
set internet-service-id 2949121
next
edit "ntp.org-ICMP"
set internet-service-id 2949122
next
edit "ntp.org-DNS"
set internet-service-id 2949123
next
edit "ntp.org-Outbound_Email"
set internet-service-id 2949124
next
edit "ntp.org-SSH"
set internet-service-id 2949126
next
edit "ntp.org-FTP"
set internet-service-id 2949127
next
edit "ntp.org-NTP"
set internet-service-id 2949128
next
edit "ntp.org-Inbound_Email"
set internet-service-id 2949129
next
edit "ntp.org-LDAP"
set internet-service-id 2949134
next
edit "ntp.org-NetBIOS.Session.Service"
set internet-service-id 2949135
next
edit "ntp.org-RTMP"
set internet-service-id 2949136
next
edit "ntp.org-NetBIOS.Name.Service"
set internet-service-id 2949144
next
edit "Proxy-Proxy.Server"
set internet-service-id 3014850
next
edit "Botnet-C&C.Server"
set internet-service-id 3080383
next
edit "Spam-Spamming.Server"
set internet-service-id 3145920
next
edit "Phishing-Phishing.Server"
set internet-service-id 3211457
next
edit "Zendesk-Other"
set internet-service-id 3407872
next
edit "Zendesk-Web"
set internet-service-id 3407873
next
edit "Zendesk-ICMP"
set internet-service-id 3407874
next
edit "Zendesk-DNS"
set internet-service-id 3407875
next
edit "Zendesk-Outbound_Email"
set internet-service-id 3407876
next
edit "Zendesk-SSH"
set internet-service-id 3407878
next
edit "Zendesk-FTP"
set internet-service-id 3407879
next
edit "Zendesk-NTP"
set internet-service-id 3407880
next
edit "Zendesk-Inbound_Email"
set internet-service-id 3407881
next
edit "Zendesk-LDAP"
set internet-service-id 3407886
next
edit "Zendesk-NetBIOS.Session.Service"
set internet-service-id 3407887
next
edit "Zendesk-RTMP"
set internet-service-id 3407888
next
edit "Zendesk-NetBIOS.Name.Service"
set internet-service-id 3407896
next
edit "Zendesk-Zendesk.Suite"
set internet-service-id 3408047
next
edit "DocuSign-Other"
set internet-service-id 3473408
next
edit "DocuSign-Web"
set internet-service-id 3473409
next
edit "DocuSign-ICMP"
set internet-service-id 3473410
next
edit "DocuSign-DNS"
set internet-service-id 3473411
next
edit "DocuSign-Outbound_Email"
set internet-service-id 3473412
next
edit "DocuSign-SSH"
set internet-service-id 3473414
next
edit "DocuSign-FTP"
set internet-service-id 3473415
next
edit "DocuSign-NTP"
set internet-service-id 3473416
next
edit "DocuSign-Inbound_Email"
set internet-service-id 3473417
next
edit "DocuSign-LDAP"
set internet-service-id 3473422
next
edit "DocuSign-NetBIOS.Session.Service"
set internet-service-id 3473423
next
edit "DocuSign-RTMP"
set internet-service-id 3473424
next
edit "DocuSign-NetBIOS.Name.Service"
set internet-service-id 3473432
next
edit "ServiceNow-Other"
set internet-service-id 3538944
next
edit "ServiceNow-Web"
set internet-service-id 3538945
next
edit "ServiceNow-ICMP"
set internet-service-id 3538946
next
edit "ServiceNow-DNS"
set internet-service-id 3538947
next
edit "ServiceNow-Outbound_Email"
set internet-service-id 3538948
next
edit "ServiceNow-SSH"
set internet-service-id 3538950
next
edit "ServiceNow-FTP"
set internet-service-id 3538951
next
edit "ServiceNow-NTP"
set internet-service-id 3538952
next
edit "ServiceNow-Inbound_Email"
set internet-service-id 3538953
next
edit "ServiceNow-LDAP"
set internet-service-id 3538958
next
edit "ServiceNow-NetBIOS.Session.Service"
set internet-service-id 3538959
next
edit "ServiceNow-RTMP"
set internet-service-id 3538960
next
edit "ServiceNow-NetBIOS.Name.Service"
set internet-service-id 3538968
next
edit "GitHub-GitHub"
set internet-service-id 3604638
next
edit "Workday-Other"
set internet-service-id 3670016
next
edit "Workday-Web"
set internet-service-id 3670017
next
edit "Workday-ICMP"
set internet-service-id 3670018
next
edit "Workday-DNS"
set internet-service-id 3670019
next
edit "Workday-Outbound_Email"
set internet-service-id 3670020
next
edit "Workday-SSH"
set internet-service-id 3670022
next
edit "Workday-FTP"
set internet-service-id 3670023
next
edit "Workday-NTP"
set internet-service-id 3670024
next
edit "Workday-Inbound_Email"
set internet-service-id 3670025
next
edit "Workday-LDAP"
set internet-service-id 3670030
next
edit "Workday-NetBIOS.Session.Service"
set internet-service-id 3670031
next
edit "Workday-RTMP"
set internet-service-id 3670032
next
edit "Workday-NetBIOS.Name.Service"
set internet-service-id 3670040
next
edit "HubSpot-Other"
set internet-service-id 3735552
next
edit "HubSpot-Web"
set internet-service-id 3735553
next
edit "HubSpot-ICMP"
set internet-service-id 3735554
next
edit "HubSpot-DNS"
set internet-service-id 3735555
next
edit "HubSpot-Outbound_Email"
set internet-service-id 3735556
next
edit "HubSpot-SSH"
set internet-service-id 3735558
next
edit "HubSpot-FTP"
set internet-service-id 3735559
next
edit "HubSpot-NTP"
set internet-service-id 3735560
next
edit "HubSpot-Inbound_Email"
set internet-service-id 3735561
next
edit "HubSpot-LDAP"
set internet-service-id 3735566
next
edit "HubSpot-NetBIOS.Session.Service"
set internet-service-id 3735567
next
edit "HubSpot-RTMP"
set internet-service-id 3735568
next
edit "HubSpot-NetBIOS.Name.Service"
set internet-service-id 3735576
next
edit "Twilio-Other"
set internet-service-id 3801088
next
edit "Twilio-Web"
set internet-service-id 3801089
next
edit "Twilio-ICMP"
set internet-service-id 3801090
next
edit "Twilio-DNS"
set internet-service-id 3801091
next
edit "Twilio-Outbound_Email"
set internet-service-id 3801092
next
edit "Twilio-SSH"
set internet-service-id 3801094
next
edit "Twilio-FTP"
set internet-service-id 3801095
next
edit "Twilio-NTP"
set internet-service-id 3801096
next
edit "Twilio-Inbound_Email"
set internet-service-id 3801097
next
edit "Twilio-LDAP"
set internet-service-id 3801102
next
edit "Twilio-NetBIOS.Session.Service"
set internet-service-id 3801103
next
edit "Twilio-RTMP"
set internet-service-id 3801104
next
edit "Twilio-NetBIOS.Name.Service"
set internet-service-id 3801112
next
edit "Twilio-Elastic.SIP.Trunking"
set internet-service-id 3801277
next
edit "Coupa-Other"
set internet-service-id 3866624
next
edit "Coupa-Web"
set internet-service-id 3866625
next
edit "Coupa-ICMP"
set internet-service-id 3866626
next
edit "Coupa-DNS"
set internet-service-id 3866627
next
edit "Coupa-Outbound_Email"
set internet-service-id 3866628
next
edit "Coupa-SSH"
set internet-service-id 3866630
next
edit "Coupa-FTP"
set internet-service-id 3866631
next
edit "Coupa-NTP"
set internet-service-id 3866632
next
edit "Coupa-Inbound_Email"
set internet-service-id 3866633
next
edit "Coupa-LDAP"
set internet-service-id 3866638
next
edit "Coupa-NetBIOS.Session.Service"
set internet-service-id 3866639
next
edit "Coupa-RTMP"
set internet-service-id 3866640
next
edit "Coupa-NetBIOS.Name.Service"
set internet-service-id 3866648
next
edit "Atlassian-Other"
set internet-service-id 3932160
next
edit "Atlassian-Web"
set internet-service-id 3932161
next
edit "Atlassian-ICMP"
set internet-service-id 3932162
next
edit "Atlassian-DNS"
set internet-service-id 3932163
next
edit "Atlassian-Outbound_Email"
set internet-service-id 3932164
next
edit "Atlassian-SSH"
set internet-service-id 3932166
next
edit "Atlassian-FTP"
set internet-service-id 3932167
next
edit "Atlassian-NTP"
set internet-service-id 3932168
next
edit "Atlassian-Inbound_Email"
set internet-service-id 3932169
next
edit "Atlassian-LDAP"
set internet-service-id 3932174
next
edit "Atlassian-NetBIOS.Session.Service"
set internet-service-id 3932175
next
edit "Atlassian-RTMP"
set internet-service-id 3932176
next
edit "Atlassian-NetBIOS.Name.Service"
set internet-service-id 3932184
next
edit "Xero-Other"
set internet-service-id 3997696
next
edit "Xero-Web"
set internet-service-id 3997697
next
edit "Xero-ICMP"
set internet-service-id 3997698
next
edit "Xero-DNS"
set internet-service-id 3997699
next
edit "Xero-Outbound_Email"
set internet-service-id 3997700
next
edit "Xero-SSH"
set internet-service-id 3997702
next
edit "Xero-FTP"
set internet-service-id 3997703
next
edit "Xero-NTP"
set internet-service-id 3997704
next
edit "Xero-Inbound_Email"
set internet-service-id 3997705
next
edit "Xero-LDAP"
set internet-service-id 3997710
next
edit "Xero-NetBIOS.Session.Service"
set internet-service-id 3997711
next
edit "Xero-RTMP"
set internet-service-id 3997712
next
edit "Xero-NetBIOS.Name.Service"
set internet-service-id 3997720
next
edit "Zuora-Other"
set internet-service-id 4063232
next
edit "Zuora-Web"
set internet-service-id 4063233
next
edit "Zuora-ICMP"
set internet-service-id 4063234
next
edit "Zuora-DNS"
set internet-service-id 4063235
next
edit "Zuora-Outbound_Email"
set internet-service-id 4063236
next
edit "Zuora-SSH"
set internet-service-id 4063238
next
edit "Zuora-FTP"
set internet-service-id 4063239
next
edit "Zuora-NTP"
set internet-service-id 4063240
next
edit "Zuora-Inbound_Email"
set internet-service-id 4063241
next
edit "Zuora-LDAP"
set internet-service-id 4063246
next
edit "Zuora-NetBIOS.Session.Service"
set internet-service-id 4063247
next
edit "Zuora-RTMP"
set internet-service-id 4063248
next
edit "Zuora-NetBIOS.Name.Service"
set internet-service-id 4063256
next
edit "AdRoll-Other"
set internet-service-id 4128768
next
edit "AdRoll-Web"
set internet-service-id 4128769
next
edit "AdRoll-ICMP"
set internet-service-id 4128770
next
edit "AdRoll-DNS"
set internet-service-id 4128771
next
edit "AdRoll-Outbound_Email"
set internet-service-id 4128772
next
edit "AdRoll-SSH"
set internet-service-id 4128774
next
edit "AdRoll-FTP"
set internet-service-id 4128775
next
edit "AdRoll-NTP"
set internet-service-id 4128776
next
edit "AdRoll-Inbound_Email"
set internet-service-id 4128777
next
edit "AdRoll-LDAP"
set internet-service-id 4128782
next
edit "AdRoll-NetBIOS.Session.Service"
set internet-service-id 4128783
next
edit "AdRoll-RTMP"
set internet-service-id 4128784
next
edit "AdRoll-NetBIOS.Name.Service"
set internet-service-id 4128792
next
edit "Xactly-Other"
set internet-service-id 4194304
next
edit "Xactly-Web"
set internet-service-id 4194305
next
edit "Xactly-ICMP"
set internet-service-id 4194306
next
edit "Xactly-DNS"
set internet-service-id 4194307
next
edit "Xactly-Outbound_Email"
set internet-service-id 4194308
next
edit "Xactly-SSH"
set internet-service-id 4194310
next
edit "Xactly-FTP"
set internet-service-id 4194311
next
edit "Xactly-NTP"
set internet-service-id 4194312
next
edit "Xactly-Inbound_Email"
set internet-service-id 4194313
next
edit "Xactly-LDAP"
set internet-service-id 4194318
next
edit "Xactly-NetBIOS.Session.Service"
set internet-service-id 4194319
next
edit "Xactly-RTMP"
set internet-service-id 4194320
next
edit "Xactly-NetBIOS.Name.Service"
set internet-service-id 4194328
next
edit "Intuit-Other"
set internet-service-id 4259840
next
edit "Intuit-Web"
set internet-service-id 4259841
next
edit "Intuit-ICMP"
set internet-service-id 4259842
next
edit "Intuit-DNS"
set internet-service-id 4259843
next
edit "Intuit-Outbound_Email"
set internet-service-id 4259844
next
edit "Intuit-SSH"
set internet-service-id 4259846
next
edit "Intuit-FTP"
set internet-service-id 4259847
next
edit "Intuit-NTP"
set internet-service-id 4259848
next
edit "Intuit-Inbound_Email"
set internet-service-id 4259849
next
edit "Intuit-LDAP"
set internet-service-id 4259854
next
edit "Intuit-NetBIOS.Session.Service"
set internet-service-id 4259855
next
edit "Intuit-RTMP"
set internet-service-id 4259856
next
edit "Intuit-NetBIOS.Name.Service"
set internet-service-id 4259864
next
edit "Marketo-Other"
set internet-service-id 4325376
next
edit "Marketo-Web"
set internet-service-id 4325377
next
edit "Marketo-ICMP"
set internet-service-id 4325378
next
edit "Marketo-DNS"
set internet-service-id 4325379
next
edit "Marketo-Outbound_Email"
set internet-service-id 4325380
next
edit "Marketo-SSH"
set internet-service-id 4325382
next
edit "Marketo-FTP"
set internet-service-id 4325383
next
edit "Marketo-NTP"
set internet-service-id 4325384
next
edit "Marketo-Inbound_Email"
set internet-service-id 4325385
next
edit "Marketo-LDAP"
set internet-service-id 4325390
next
edit "Marketo-NetBIOS.Session.Service"
set internet-service-id 4325391
next
edit "Marketo-RTMP"
set internet-service-id 4325392
next
edit "Marketo-NetBIOS.Name.Service"
set internet-service-id 4325400
next
edit "Bill-Other"
set internet-service-id 4456448
next
edit "Bill-Web"
set internet-service-id 4456449
next
edit "Bill-ICMP"
set internet-service-id 4456450
next
edit "Bill-DNS"
set internet-service-id 4456451
next
edit "Bill-Outbound_Email"
set internet-service-id 4456452
next
edit "Bill-SSH"
set internet-service-id 4456454
next
edit "Bill-FTP"
set internet-service-id 4456455
next
edit "Bill-NTP"
set internet-service-id 4456456
next
edit "Bill-Inbound_Email"
set internet-service-id 4456457
next
edit "Bill-LDAP"
set internet-service-id 4456462
next
edit "Bill-NetBIOS.Session.Service"
set internet-service-id 4456463
next
edit "Bill-RTMP"
set internet-service-id 4456464
next
edit "Bill-NetBIOS.Name.Service"
set internet-service-id 4456472
next
edit "Shopify-Other"
set internet-service-id 4521984
next
edit "Shopify-Web"
set internet-service-id 4521985
next
edit "Shopify-ICMP"
set internet-service-id 4521986
next
edit "Shopify-DNS"
set internet-service-id 4521987
next
edit "Shopify-Outbound_Email"
set internet-service-id 4521988
next
edit "Shopify-SSH"
set internet-service-id 4521990
next
edit "Shopify-FTP"
set internet-service-id 4521991
next
edit "Shopify-NTP"
set internet-service-id 4521992
next
edit "Shopify-Inbound_Email"
set internet-service-id 4521993
next
edit "Shopify-LDAP"
set internet-service-id 4521998
next
edit "Shopify-NetBIOS.Session.Service"
set internet-service-id 4521999
next
edit "Shopify-RTMP"
set internet-service-id 4522000
next
edit "Shopify-NetBIOS.Name.Service"
set internet-service-id 4522008
next
edit "Shopify-Shopify"
set internet-service-id 4522162
next
edit "MuleSoft-Other"
set internet-service-id 4587520
next
edit "MuleSoft-Web"
set internet-service-id 4587521
next
edit "MuleSoft-ICMP"
set internet-service-id 4587522
next
edit "MuleSoft-DNS"
set internet-service-id 4587523
next
edit "MuleSoft-Outbound_Email"
set internet-service-id 4587524
next
edit "MuleSoft-SSH"
set internet-service-id 4587526
next
edit "MuleSoft-FTP"
set internet-service-id 4587527
next
edit "MuleSoft-NTP"
set internet-service-id 4587528
next
edit "MuleSoft-Inbound_Email"
set internet-service-id 4587529
next
edit "MuleSoft-LDAP"
set internet-service-id 4587534
next
edit "MuleSoft-NetBIOS.Session.Service"
set internet-service-id 4587535
next
edit "MuleSoft-RTMP"
set internet-service-id 4587536
next
edit "MuleSoft-NetBIOS.Name.Service"
set internet-service-id 4587544
next
edit "Cornerstone-Other"
set internet-service-id 4653056
next
edit "Cornerstone-Web"
set internet-service-id 4653057
next
edit "Cornerstone-ICMP"
set internet-service-id 4653058
next
edit "Cornerstone-DNS"
set internet-service-id 4653059
next
edit "Cornerstone-Outbound_Email"
set internet-service-id 4653060
next
edit "Cornerstone-SSH"
set internet-service-id 4653062
next
edit "Cornerstone-FTP"
set internet-service-id 4653063
next
edit "Cornerstone-NTP"
set internet-service-id 4653064
next
edit "Cornerstone-Inbound_Email"
set internet-service-id 4653065
next
edit "Cornerstone-LDAP"
set internet-service-id 4653070
next
edit "Cornerstone-NetBIOS.Session.Service"
set internet-service-id 4653071
next
edit "Cornerstone-RTMP"
set internet-service-id 4653072
next
edit "Cornerstone-NetBIOS.Name.Service"
set internet-service-id 4653080
next
edit "Eventbrite-Other"
set internet-service-id 4718592
next
edit "Eventbrite-Web"
set internet-service-id 4718593
next
edit "Eventbrite-ICMP"
set internet-service-id 4718594
next
edit "Eventbrite-DNS"
set internet-service-id 4718595
next
edit "Eventbrite-Outbound_Email"
set internet-service-id 4718596
next
edit "Eventbrite-SSH"
set internet-service-id 4718598
next
edit "Eventbrite-FTP"
set internet-service-id 4718599
next
edit "Eventbrite-NTP"
set internet-service-id 4718600
next
edit "Eventbrite-Inbound_Email"
set internet-service-id 4718601
next
edit "Eventbrite-LDAP"
set internet-service-id 4718606
next
edit "Eventbrite-NetBIOS.Session.Service"
set internet-service-id 4718607
next
edit "Eventbrite-RTMP"
set internet-service-id 4718608
next
edit "Eventbrite-NetBIOS.Name.Service"
set internet-service-id 4718616
next
edit "Paychex-Other"
set internet-service-id 4784128
next
edit "Paychex-Web"
set internet-service-id 4784129
next
edit "Paychex-ICMP"
set internet-service-id 4784130
next
edit "Paychex-DNS"
set internet-service-id 4784131
next
edit "Paychex-Outbound_Email"
set internet-service-id 4784132
next
edit "Paychex-SSH"
set internet-service-id 4784134
next
edit "Paychex-FTP"
set internet-service-id 4784135
next
edit "Paychex-NTP"
set internet-service-id 4784136
next
edit "Paychex-Inbound_Email"
set internet-service-id 4784137
next
edit "Paychex-LDAP"
set internet-service-id 4784142
next
edit "Paychex-NetBIOS.Session.Service"
set internet-service-id 4784143
next
edit "Paychex-RTMP"
set internet-service-id 4784144
next
edit "Paychex-NetBIOS.Name.Service"
set internet-service-id 4784152
next
edit "NewRelic-Other"
set internet-service-id 4849664
next
edit "NewRelic-Web"
set internet-service-id 4849665
next
edit "NewRelic-ICMP"
set internet-service-id 4849666
next
edit "NewRelic-DNS"
set internet-service-id 4849667
next
edit "NewRelic-Outbound_Email"
set internet-service-id 4849668
next
edit "NewRelic-SSH"
set internet-service-id 4849670
next
edit "NewRelic-FTP"
set internet-service-id 4849671
next
edit "NewRelic-NTP"
set internet-service-id 4849672
next
edit "NewRelic-Inbound_Email"
set internet-service-id 4849673
next
edit "NewRelic-LDAP"
set internet-service-id 4849678
next
edit "NewRelic-NetBIOS.Session.Service"
set internet-service-id 4849679
next
edit "NewRelic-RTMP"
set internet-service-id 4849680
next
edit "NewRelic-NetBIOS.Name.Service"
set internet-service-id 4849688
next
edit "Splunk-Other"
set internet-service-id 4915200
next
edit "Splunk-Web"
set internet-service-id 4915201
next
edit "Splunk-ICMP"
set internet-service-id 4915202
next
edit "Splunk-DNS"
set internet-service-id 4915203
next
edit "Splunk-Outbound_Email"
set internet-service-id 4915204
next
edit "Splunk-SSH"
set internet-service-id 4915206
next
edit "Splunk-FTP"
set internet-service-id 4915207
next
edit "Splunk-NTP"
set internet-service-id 4915208
next
edit "Splunk-Inbound_Email"
set internet-service-id 4915209
next
edit "Splunk-LDAP"
set internet-service-id 4915214
next
edit "Splunk-NetBIOS.Session.Service"
set internet-service-id 4915215
next
edit "Splunk-RTMP"
set internet-service-id 4915216
next
edit "Splunk-NetBIOS.Name.Service"
set internet-service-id 4915224
next
edit "Domo-Other"
set internet-service-id 4980736
next
edit "Domo-Web"
set internet-service-id 4980737
next
edit "Domo-ICMP"
set internet-service-id 4980738
next
edit "Domo-DNS"
set internet-service-id 4980739
next
edit "Domo-Outbound_Email"
set internet-service-id 4980740
next
edit "Domo-SSH"
set internet-service-id 4980742
next
edit "Domo-FTP"
set internet-service-id 4980743
next
edit "Domo-NTP"
set internet-service-id 4980744
next
edit "Domo-Inbound_Email"
set internet-service-id 4980745
next
edit "Domo-LDAP"
set internet-service-id 4980750
next
edit "Domo-NetBIOS.Session.Service"
set internet-service-id 4980751
next
edit "Domo-RTMP"
set internet-service-id 4980752
next
edit "Domo-NetBIOS.Name.Service"
set internet-service-id 4980760
next
edit "FreshBooks-Other"
set internet-service-id 5046272
next
edit "FreshBooks-Web"
set internet-service-id 5046273
next
edit "FreshBooks-ICMP"
set internet-service-id 5046274
next
edit "FreshBooks-DNS"
set internet-service-id 5046275
next
edit "FreshBooks-Outbound_Email"
set internet-service-id 5046276
next
edit "FreshBooks-SSH"
set internet-service-id 5046278
next
edit "FreshBooks-FTP"
set internet-service-id 5046279
next
edit "FreshBooks-NTP"
set internet-service-id 5046280
next
edit "FreshBooks-Inbound_Email"
set internet-service-id 5046281
next
edit "FreshBooks-LDAP"
set internet-service-id 5046286
next
edit "FreshBooks-NetBIOS.Session.Service"
set internet-service-id 5046287
next
edit "FreshBooks-RTMP"
set internet-service-id 5046288
next
edit "FreshBooks-NetBIOS.Name.Service"
set internet-service-id 5046296
next
edit "Tableau-Other"
set internet-service-id 5111808
next
edit "Tableau-Web"
set internet-service-id 5111809
next
edit "Tableau-ICMP"
set internet-service-id 5111810
next
edit "Tableau-DNS"
set internet-service-id 5111811
next
edit "Tableau-Outbound_Email"
set internet-service-id 5111812
next
edit "Tableau-SSH"
set internet-service-id 5111814
next
edit "Tableau-FTP"
set internet-service-id 5111815
next
edit "Tableau-NTP"
set internet-service-id 5111816
next
edit "Tableau-Inbound_Email"
set internet-service-id 5111817
next
edit "Tableau-LDAP"
set internet-service-id 5111822
next
edit "Tableau-NetBIOS.Session.Service"
set internet-service-id 5111823
next
edit "Tableau-RTMP"
set internet-service-id 5111824
next
edit "Tableau-NetBIOS.Name.Service"
set internet-service-id 5111832
next
edit "Druva-Other"
set internet-service-id 5177344
next
edit "Druva-Web"
set internet-service-id 5177345
next
edit "Druva-ICMP"
set internet-service-id 5177346
next
edit "Druva-DNS"
set internet-service-id 5177347
next
edit "Druva-Outbound_Email"
set internet-service-id 5177348
next
edit "Druva-SSH"
set internet-service-id 5177350
next
edit "Druva-FTP"
set internet-service-id 5177351
next
edit "Druva-NTP"
set internet-service-id 5177352
next
edit "Druva-Inbound_Email"
set internet-service-id 5177353
next
edit "Druva-LDAP"
set internet-service-id 5177358
next
edit "Druva-NetBIOS.Session.Service"
set internet-service-id 5177359
next
edit "Druva-RTMP"
set internet-service-id 5177360
next
edit "Druva-NetBIOS.Name.Service"
set internet-service-id 5177368
next
edit "Act-on-Other"
set internet-service-id 5242880
next
edit "Act-on-Web"
set internet-service-id 5242881
next
edit "Act-on-ICMP"
set internet-service-id 5242882
next
edit "Act-on-DNS"
set internet-service-id 5242883
next
edit "Act-on-Outbound_Email"
set internet-service-id 5242884
next
edit "Act-on-SSH"
set internet-service-id 5242886
next
edit "Act-on-FTP"
set internet-service-id 5242887
next
edit "Act-on-NTP"
set internet-service-id 5242888
next
edit "Act-on-Inbound_Email"
set internet-service-id 5242889
next
edit "Act-on-LDAP"
set internet-service-id 5242894
next
edit "Act-on-NetBIOS.Session.Service"
set internet-service-id 5242895
next
edit "Act-on-RTMP"
set internet-service-id 5242896
next
edit "Act-on-NetBIOS.Name.Service"
set internet-service-id 5242904
next
edit "GoodData-Other"
set internet-service-id 5308416
next
edit "GoodData-Web"
set internet-service-id 5308417
next
edit "GoodData-ICMP"
set internet-service-id 5308418
next
edit "GoodData-DNS"
set internet-service-id 5308419
next
edit "GoodData-Outbound_Email"
set internet-service-id 5308420
next
edit "GoodData-SSH"
set internet-service-id 5308422
next
edit "GoodData-FTP"
set internet-service-id 5308423
next
edit "GoodData-NTP"
set internet-service-id 5308424
next
edit "GoodData-Inbound_Email"
set internet-service-id 5308425
next
edit "GoodData-LDAP"
set internet-service-id 5308430
next
edit "GoodData-NetBIOS.Session.Service"
set internet-service-id 5308431
next
edit "GoodData-RTMP"
set internet-service-id 5308432
next
edit "GoodData-NetBIOS.Name.Service"
set internet-service-id 5308440
next
edit "SurveyMonkey-Other"
set internet-service-id 5373952
next
edit "SurveyMonkey-Web"
set internet-service-id 5373953
next
edit "SurveyMonkey-ICMP"
set internet-service-id 5373954
next
edit "SurveyMonkey-DNS"
set internet-service-id 5373955
next
edit "SurveyMonkey-Outbound_Email"
set internet-service-id 5373956
next
edit "SurveyMonkey-SSH"
set internet-service-id 5373958
next
edit "SurveyMonkey-FTP"
set internet-service-id 5373959
next
edit "SurveyMonkey-NTP"
set internet-service-id 5373960
next
edit "SurveyMonkey-Inbound_Email"
set internet-service-id 5373961
next
edit "SurveyMonkey-LDAP"
set internet-service-id 5373966
next
edit "SurveyMonkey-NetBIOS.Session.Service"
set internet-service-id 5373967
next
edit "SurveyMonkey-RTMP"
set internet-service-id 5373968
next
edit "SurveyMonkey-NetBIOS.Name.Service"
set internet-service-id 5373976
next
edit "Cvent-Other"
set internet-service-id 5439488
next
edit "Cvent-Web"
set internet-service-id 5439489
next
edit "Cvent-ICMP"
set internet-service-id 5439490
next
edit "Cvent-DNS"
set internet-service-id 5439491
next
edit "Cvent-Outbound_Email"
set internet-service-id 5439492
next
edit "Cvent-SSH"
set internet-service-id 5439494
next
edit "Cvent-FTP"
set internet-service-id 5439495
next
edit "Cvent-NTP"
set internet-service-id 5439496
next
edit "Cvent-Inbound_Email"
set internet-service-id 5439497
next
edit "Cvent-LDAP"
set internet-service-id 5439502
next
edit "Cvent-NetBIOS.Session.Service"
set internet-service-id 5439503
next
edit "Cvent-RTMP"
set internet-service-id 5439504
next
edit "Cvent-NetBIOS.Name.Service"
set internet-service-id 5439512
next
edit "Blackbaud-Other"
set internet-service-id 5505024
next
edit "Blackbaud-Web"
set internet-service-id 5505025
next
edit "Blackbaud-ICMP"
set internet-service-id 5505026
next
edit "Blackbaud-DNS"
set internet-service-id 5505027
next
edit "Blackbaud-Outbound_Email"
set internet-service-id 5505028
next
edit "Blackbaud-SSH"
set internet-service-id 5505030
next
edit "Blackbaud-FTP"
set internet-service-id 5505031
next
edit "Blackbaud-NTP"
set internet-service-id 5505032
next
edit "Blackbaud-Inbound_Email"
set internet-service-id 5505033
next
edit "Blackbaud-LDAP"
set internet-service-id 5505038
next
edit "Blackbaud-NetBIOS.Session.Service"
set internet-service-id 5505039
next
edit "Blackbaud-RTMP"
set internet-service-id 5505040
next
edit "Blackbaud-NetBIOS.Name.Service"
set internet-service-id 5505048
next
edit "InsideSales-Other"
set internet-service-id 5570560
next
edit "InsideSales-Web"
set internet-service-id 5570561
next
edit "InsideSales-ICMP"
set internet-service-id 5570562
next
edit "InsideSales-DNS"
set internet-service-id 5570563
next
edit "InsideSales-Outbound_Email"
set internet-service-id 5570564
next
edit "InsideSales-SSH"
set internet-service-id 5570566
next
edit "InsideSales-FTP"
set internet-service-id 5570567
next
edit "InsideSales-NTP"
set internet-service-id 5570568
next
edit "InsideSales-Inbound_Email"
set internet-service-id 5570569
next
edit "InsideSales-LDAP"
set internet-service-id 5570574
next
edit "InsideSales-NetBIOS.Session.Service"
set internet-service-id 5570575
next
edit "InsideSales-RTMP"
set internet-service-id 5570576
next
edit "InsideSales-NetBIOS.Name.Service"
set internet-service-id 5570584
next
edit "ServiceMax-Other"
set internet-service-id 5636096
next
edit "ServiceMax-Web"
set internet-service-id 5636097
next
edit "ServiceMax-ICMP"
set internet-service-id 5636098
next
edit "ServiceMax-DNS"
set internet-service-id 5636099
next
edit "ServiceMax-Outbound_Email"
set internet-service-id 5636100
next
edit "ServiceMax-SSH"
set internet-service-id 5636102
next
edit "ServiceMax-FTP"
set internet-service-id 5636103
next
edit "ServiceMax-NTP"
set internet-service-id 5636104
next
edit "ServiceMax-Inbound_Email"
set internet-service-id 5636105
next
edit "ServiceMax-LDAP"
set internet-service-id 5636110
next
edit "ServiceMax-NetBIOS.Session.Service"
set internet-service-id 5636111
next
edit "ServiceMax-RTMP"
set internet-service-id 5636112
next
edit "ServiceMax-NetBIOS.Name.Service"
set internet-service-id 5636120
next
edit "Apptio-Other"
set internet-service-id 5701632
next
edit "Apptio-Web"
set internet-service-id 5701633
next
edit "Apptio-ICMP"
set internet-service-id 5701634
next
edit "Apptio-DNS"
set internet-service-id 5701635
next
edit "Apptio-Outbound_Email"
set internet-service-id 5701636
next
edit "Apptio-SSH"
set internet-service-id 5701638
next
edit "Apptio-FTP"
set internet-service-id 5701639
next
edit "Apptio-NTP"
set internet-service-id 5701640
next
edit "Apptio-Inbound_Email"
set internet-service-id 5701641
next
edit "Apptio-LDAP"
set internet-service-id 5701646
next
edit "Apptio-NetBIOS.Session.Service"
set internet-service-id 5701647
next
edit "Apptio-RTMP"
set internet-service-id 5701648
next
edit "Apptio-NetBIOS.Name.Service"
set internet-service-id 5701656
next
edit "Veracode-Other"
set internet-service-id 5767168
next
edit "Veracode-Web"
set internet-service-id 5767169
next
edit "Veracode-ICMP"
set internet-service-id 5767170
next
edit "Veracode-DNS"
set internet-service-id 5767171
next
edit "Veracode-Outbound_Email"
set internet-service-id 5767172
next
edit "Veracode-SSH"
set internet-service-id 5767174
next
edit "Veracode-FTP"
set internet-service-id 5767175
next
edit "Veracode-NTP"
set internet-service-id 5767176
next
edit "Veracode-Inbound_Email"
set internet-service-id 5767177
next
edit "Veracode-LDAP"
set internet-service-id 5767182
next
edit "Veracode-NetBIOS.Session.Service"
set internet-service-id 5767183
next
edit "Veracode-RTMP"
set internet-service-id 5767184
next
edit "Veracode-NetBIOS.Name.Service"
set internet-service-id 5767192
next
edit "Anaplan-Other"
set internet-service-id 5832704
next
edit "Anaplan-Web"
set internet-service-id 5832705
next
edit "Anaplan-ICMP"
set internet-service-id 5832706
next
edit "Anaplan-DNS"
set internet-service-id 5832707
next
edit "Anaplan-Outbound_Email"
set internet-service-id 5832708
next
edit "Anaplan-SSH"
set internet-service-id 5832710
next
edit "Anaplan-FTP"
set internet-service-id 5832711
next
edit "Anaplan-NTP"
set internet-service-id 5832712
next
edit "Anaplan-Inbound_Email"
set internet-service-id 5832713
next
edit "Anaplan-LDAP"
set internet-service-id 5832718
next
edit "Anaplan-NetBIOS.Session.Service"
set internet-service-id 5832719
next
edit "Anaplan-RTMP"
set internet-service-id 5832720
next
edit "Anaplan-NetBIOS.Name.Service"
set internet-service-id 5832728
next
edit "Rapid7-Other"
set internet-service-id 5898240
next
edit "Rapid7-Web"
set internet-service-id 5898241
next
edit "Rapid7-ICMP"
set internet-service-id 5898242
next
edit "Rapid7-DNS"
set internet-service-id 5898243
next
edit "Rapid7-Outbound_Email"
set internet-service-id 5898244
next
edit "Rapid7-SSH"
set internet-service-id 5898246
next
edit "Rapid7-FTP"
set internet-service-id 5898247
next
edit "Rapid7-NTP"
set internet-service-id 5898248
next
edit "Rapid7-Inbound_Email"
set internet-service-id 5898249
next
edit "Rapid7-LDAP"
set internet-service-id 5898254
next
edit "Rapid7-NetBIOS.Session.Service"
set internet-service-id 5898255
next
edit "Rapid7-RTMP"
set internet-service-id 5898256
next
edit "Rapid7-NetBIOS.Name.Service"
set internet-service-id 5898264
next
edit "AnyDesk-AnyDesk"
set internet-service-id 5963927
next
edit "ESET-Eset.Service"
set internet-service-id 6029426
next
edit "Slack-Other"
set internet-service-id 6094848
next
edit "Slack-Web"
set internet-service-id 6094849
next
edit "Slack-ICMP"
set internet-service-id 6094850
next
edit "Slack-DNS"
set internet-service-id 6094851
next
edit "Slack-Outbound_Email"
set internet-service-id 6094852
next
edit "Slack-SSH"
set internet-service-id 6094854
next
edit "Slack-FTP"
set internet-service-id 6094855
next
edit "Slack-NTP"
set internet-service-id 6094856
next
edit "Slack-Inbound_Email"
set internet-service-id 6094857
next
edit "Slack-LDAP"
set internet-service-id 6094862
next
edit "Slack-NetBIOS.Session.Service"
set internet-service-id 6094863
next
edit "Slack-RTMP"
set internet-service-id 6094864
next
edit "Slack-NetBIOS.Name.Service"
set internet-service-id 6094872
next
edit "Slack-Slack"
set internet-service-id 6095024
next
edit "ADP-Other"
set internet-service-id 6160384
next
edit "ADP-Web"
set internet-service-id 6160385
next
edit "ADP-ICMP"
set internet-service-id 6160386
next
edit "ADP-DNS"
set internet-service-id 6160387
next
edit "ADP-Outbound_Email"
set internet-service-id 6160388
next
edit "ADP-SSH"
set internet-service-id 6160390
next
edit "ADP-FTP"
set internet-service-id 6160391
next
edit "ADP-NTP"
set internet-service-id 6160392
next
edit "ADP-Inbound_Email"
set internet-service-id 6160393
next
edit "ADP-LDAP"
set internet-service-id 6160398
next
edit "ADP-NetBIOS.Session.Service"
set internet-service-id 6160399
next
edit "ADP-RTMP"
set internet-service-id 6160400
next
edit "ADP-NetBIOS.Name.Service"
set internet-service-id 6160408
next
edit "Blackboard-Other"
set internet-service-id 6225920
next
edit "Blackboard-Web"
set internet-service-id 6225921
next
edit "Blackboard-ICMP"
set internet-service-id 6225922
next
edit "Blackboard-DNS"
set internet-service-id 6225923
next
edit "Blackboard-Outbound_Email"
set internet-service-id 6225924
next
edit "Blackboard-SSH"
set internet-service-id 6225926
next
edit "Blackboard-FTP"
set internet-service-id 6225927
next
edit "Blackboard-NTP"
set internet-service-id 6225928
next
edit "Blackboard-Inbound_Email"
set internet-service-id 6225929
next
edit "Blackboard-LDAP"
set internet-service-id 6225934
next
edit "Blackboard-NetBIOS.Session.Service"
set internet-service-id 6225935
next
edit "Blackboard-RTMP"
set internet-service-id 6225936
next
edit "Blackboard-NetBIOS.Name.Service"
set internet-service-id 6225944
next
edit "SAP-Other"
set internet-service-id 6291456
next
edit "SAP-Web"
set internet-service-id 6291457
next
edit "SAP-ICMP"
set internet-service-id 6291458
next
edit "SAP-DNS"
set internet-service-id 6291459
next
edit "SAP-Outbound_Email"
set internet-service-id 6291460
next
edit "SAP-SSH"
set internet-service-id 6291462
next
edit "SAP-FTP"
set internet-service-id 6291463
next
edit "SAP-NTP"
set internet-service-id 6291464
next
edit "SAP-Inbound_Email"
set internet-service-id 6291465
next
edit "SAP-LDAP"
set internet-service-id 6291470
next
edit "SAP-NetBIOS.Session.Service"
set internet-service-id 6291471
next
edit "SAP-RTMP"
set internet-service-id 6291472
next
edit "SAP-NetBIOS.Name.Service"
set internet-service-id 6291480
next
edit "SAP-HANA"
set internet-service-id 6291612
next
edit "SAP-SuccessFactors"
set internet-service-id 6291618
next
edit "Snap-Snapchat"
set internet-service-id 6357108
next
edit "Zoom.us-Zoom.Meeting"
set internet-service-id 6422646
next
edit "Sophos-Other"
set internet-service-id 6488064
next
edit "Sophos-Web"
set internet-service-id 6488065
next
edit "Sophos-ICMP"
set internet-service-id 6488066
next
edit "Sophos-DNS"
set internet-service-id 6488067
next
edit "Sophos-Outbound_Email"
set internet-service-id 6488068
next
edit "Sophos-SSH"
set internet-service-id 6488070
next
edit "Sophos-FTP"
set internet-service-id 6488071
next
edit "Sophos-NTP"
set internet-service-id 6488072
next
edit "Sophos-Inbound_Email"
set internet-service-id 6488073
next
edit "Sophos-LDAP"
set internet-service-id 6488078
next
edit "Sophos-NetBIOS.Session.Service"
set internet-service-id 6488079
next
edit "Sophos-RTMP"
set internet-service-id 6488080
next
edit "Sophos-NetBIOS.Name.Service"
set internet-service-id 6488088
next
edit "Cloudflare-Other"
set internet-service-id 6553600
next
edit "Cloudflare-Web"
set internet-service-id 6553601
next
edit "Cloudflare-ICMP"
set internet-service-id 6553602
next
edit "Cloudflare-DNS"
set internet-service-id 6553603
next
edit "Cloudflare-Outbound_Email"
set internet-service-id 6553604
next
edit "Cloudflare-SSH"
set internet-service-id 6553606
next
edit "Cloudflare-FTP"
set internet-service-id 6553607
next
edit "Cloudflare-NTP"
set internet-service-id 6553608
next
edit "Cloudflare-Inbound_Email"
set internet-service-id 6553609
next
edit "Cloudflare-LDAP"
set internet-service-id 6553614
next
edit "Cloudflare-NetBIOS.Session.Service"
set internet-service-id 6553615
next
edit "Cloudflare-RTMP"
set internet-service-id 6553616
next
edit "Cloudflare-NetBIOS.Name.Service"
set internet-service-id 6553624
next
edit "Cloudflare-CDN"
set internet-service-id 6553737
next
edit "Pexip-Pexip.Meeting"
set internet-service-id 6619256
next
edit "Zscaler-Other"
set internet-service-id 6684672
next
edit "Zscaler-Web"
set internet-service-id 6684673
next
edit "Zscaler-ICMP"
set internet-service-id 6684674
next
edit "Zscaler-DNS"
set internet-service-id 6684675
next
edit "Zscaler-Outbound_Email"
set internet-service-id 6684676
next
edit "Zscaler-SSH"
set internet-service-id 6684678
next
edit "Zscaler-FTP"
set internet-service-id 6684679
next
edit "Zscaler-NTP"
set internet-service-id 6684680
next
edit "Zscaler-Inbound_Email"
set internet-service-id 6684681
next
edit "Zscaler-LDAP"
set internet-service-id 6684686
next
edit "Zscaler-NetBIOS.Session.Service"
set internet-service-id 6684687
next
edit "Zscaler-RTMP"
set internet-service-id 6684688
next
edit "Zscaler-NetBIOS.Name.Service"
set internet-service-id 6684696
next
edit "Zscaler-Zscaler.Cloud"
set internet-service-id 6684793
next
edit "Yandex-Other"
set internet-service-id 6750208
next
edit "Yandex-Web"
set internet-service-id 6750209
next
edit "Yandex-ICMP"
set internet-service-id 6750210
next
edit "Yandex-DNS"
set internet-service-id 6750211
next
edit "Yandex-Outbound_Email"
set internet-service-id 6750212
next
edit "Yandex-SSH"
set internet-service-id 6750214
next
edit "Yandex-FTP"
set internet-service-id 6750215
next
edit "Yandex-NTP"
set internet-service-id 6750216
next
edit "Yandex-Inbound_Email"
set internet-service-id 6750217
next
edit "Yandex-LDAP"
set internet-service-id 6750222
next
edit "Yandex-NetBIOS.Session.Service"
set internet-service-id 6750223
next
edit "Yandex-RTMP"
set internet-service-id 6750224
next
edit "Yandex-NetBIOS.Name.Service"
set internet-service-id 6750232
next
edit "mail.ru-Other"
set internet-service-id 6815744
next
edit "mail.ru-Web"
set internet-service-id 6815745
next
edit "mail.ru-ICMP"
set internet-service-id 6815746
next
edit "mail.ru-DNS"
set internet-service-id 6815747
next
edit "mail.ru-Outbound_Email"
set internet-service-id 6815748
next
edit "mail.ru-SSH"
set internet-service-id 6815750
next
edit "mail.ru-FTP"
set internet-service-id 6815751
next
edit "mail.ru-NTP"
set internet-service-id 6815752
next
edit "mail.ru-Inbound_Email"
set internet-service-id 6815753
next
edit "mail.ru-LDAP"
set internet-service-id 6815758
next
edit "mail.ru-NetBIOS.Session.Service"
set internet-service-id 6815759
next
edit "mail.ru-RTMP"
set internet-service-id 6815760
next
edit "mail.ru-NetBIOS.Name.Service"
set internet-service-id 6815768
next
edit "Alibaba-Other"
set internet-service-id 6881280
next
edit "Alibaba-Web"
set internet-service-id 6881281
next
edit "Alibaba-ICMP"
set internet-service-id 6881282
next
edit "Alibaba-DNS"
set internet-service-id 6881283
next
edit "Alibaba-Outbound_Email"
set internet-service-id 6881284
next
edit "Alibaba-SSH"
set internet-service-id 6881286
next
edit "Alibaba-FTP"
set internet-service-id 6881287
next
edit "Alibaba-NTP"
set internet-service-id 6881288
next
edit "Alibaba-Inbound_Email"
set internet-service-id 6881289
next
edit "Alibaba-LDAP"
set internet-service-id 6881294
next
edit "Alibaba-NetBIOS.Session.Service"
set internet-service-id 6881295
next
edit "Alibaba-RTMP"
set internet-service-id 6881296
next
edit "Alibaba-NetBIOS.Name.Service"
set internet-service-id 6881304
next
edit "Alibaba-Alibaba.Cloud"
set internet-service-id 6881402
next
edit "GoDaddy-Other"
set internet-service-id 6946816
next
edit "GoDaddy-Web"
set internet-service-id 6946817
next
edit "GoDaddy-ICMP"
set internet-service-id 6946818
next
edit "GoDaddy-DNS"
set internet-service-id 6946819
next
edit "GoDaddy-Outbound_Email"
set internet-service-id 6946820
next
edit "GoDaddy-SSH"
set internet-service-id 6946822
next
edit "GoDaddy-FTP"
set internet-service-id 6946823
next
edit "GoDaddy-NTP"
set internet-service-id 6946824
next
edit "GoDaddy-Inbound_Email"
set internet-service-id 6946825
next
edit "GoDaddy-LDAP"
set internet-service-id 6946830
next
edit "GoDaddy-NetBIOS.Session.Service"
set internet-service-id 6946831
next
edit "GoDaddy-RTMP"
set internet-service-id 6946832
next
edit "GoDaddy-NetBIOS.Name.Service"
set internet-service-id 6946840
next
edit "GoDaddy-GoDaddy.Email"
set internet-service-id 6946939
next
edit "Bluejeans-Other"
set internet-service-id 7012352
next
edit "Bluejeans-Web"
set internet-service-id 7012353
next
edit "Bluejeans-ICMP"
set internet-service-id 7012354
next
edit "Bluejeans-DNS"
set internet-service-id 7012355
next
edit "Bluejeans-Outbound_Email"
set internet-service-id 7012356
next
edit "Bluejeans-SSH"
set internet-service-id 7012358
next
edit "Bluejeans-FTP"
set internet-service-id 7012359
next
edit "Bluejeans-NTP"
set internet-service-id 7012360
next
edit "Bluejeans-Inbound_Email"
set internet-service-id 7012361
next
edit "Bluejeans-LDAP"
set internet-service-id 7012366
next
edit "Bluejeans-NetBIOS.Session.Service"
set internet-service-id 7012367
next
edit "Bluejeans-RTMP"
set internet-service-id 7012368
next
edit "Bluejeans-NetBIOS.Name.Service"
set internet-service-id 7012376
next
edit "Bluejeans-Bluejeans.Meeting"
set internet-service-id 7012476
next
edit "Webroot-Webroot.SecureAnywhere"
set internet-service-id 7078013
next
edit "Avast-Other"
set internet-service-id 7143424
next
edit "Avast-Web"
set internet-service-id 7143425
next
edit "Avast-ICMP"
set internet-service-id 7143426
next
edit "Avast-DNS"
set internet-service-id 7143427
next
edit "Avast-Outbound_Email"
set internet-service-id 7143428
next
edit "Avast-SSH"
set internet-service-id 7143430
next
edit "Avast-FTP"
set internet-service-id 7143431
next
edit "Avast-NTP"
set internet-service-id 7143432
next
edit "Avast-Inbound_Email"
set internet-service-id 7143433
next
edit "Avast-LDAP"
set internet-service-id 7143438
next
edit "Avast-NetBIOS.Session.Service"
set internet-service-id 7143439
next
edit "Avast-RTMP"
set internet-service-id 7143440
next
edit "Avast-NetBIOS.Name.Service"
set internet-service-id 7143448
next
edit "Avast-Avast.Security"
set internet-service-id 7143550
next
edit "Wetransfer-Other"
set internet-service-id 7208960
next
edit "Wetransfer-Web"
set internet-service-id 7208961
next
edit "Wetransfer-ICMP"
set internet-service-id 7208962
next
edit "Wetransfer-DNS"
set internet-service-id 7208963
next
edit "Wetransfer-Outbound_Email"
set internet-service-id 7208964
next
edit "Wetransfer-SSH"
set internet-service-id 7208966
next
edit "Wetransfer-FTP"
set internet-service-id 7208967
next
edit "Wetransfer-NTP"
set internet-service-id 7208968
next
edit "Wetransfer-Inbound_Email"
set internet-service-id 7208969
next
edit "Wetransfer-LDAP"
set internet-service-id 7208974
next
edit "Wetransfer-NetBIOS.Session.Service"
set internet-service-id 7208975
next
edit "Wetransfer-RTMP"
set internet-service-id 7208976
next
edit "Wetransfer-NetBIOS.Name.Service"
set internet-service-id 7208984
next
edit "Sendgrid-Sendgrid.Email"
set internet-service-id 7274623
next
edit "Ubiquiti-UniFi"
set internet-service-id 7340160
next
edit "Lifesize-Lifesize.Cloud"
set internet-service-id 7405697
next
edit "Okta-Other"
set internet-service-id 7471104
next
edit "Okta-Web"
set internet-service-id 7471105
next
edit "Okta-ICMP"
set internet-service-id 7471106
next
edit "Okta-DNS"
set internet-service-id 7471107
next
edit "Okta-Outbound_Email"
set internet-service-id 7471108
next
edit "Okta-SSH"
set internet-service-id 7471110
next
edit "Okta-FTP"
set internet-service-id 7471111
next
edit "Okta-NTP"
set internet-service-id 7471112
next
edit "Okta-Inbound_Email"
set internet-service-id 7471113
next
edit "Okta-LDAP"
set internet-service-id 7471118
next
edit "Okta-NetBIOS.Session.Service"
set internet-service-id 7471119
next
edit "Okta-RTMP"
set internet-service-id 7471120
next
edit "Okta-NetBIOS.Name.Service"
set internet-service-id 7471128
next
edit "Okta-Okta"
set internet-service-id 7471307
next
edit "Cybozu-Other"
set internet-service-id 7536640
next
edit "Cybozu-Web"
set internet-service-id 7536641
next
edit "Cybozu-ICMP"
set internet-service-id 7536642
next
edit "Cybozu-DNS"
set internet-service-id 7536643
next
edit "Cybozu-Outbound_Email"
set internet-service-id 7536644
next
edit "Cybozu-SSH"
set internet-service-id 7536646
next
edit "Cybozu-FTP"
set internet-service-id 7536647
next
edit "Cybozu-NTP"
set internet-service-id 7536648
next
edit "Cybozu-Inbound_Email"
set internet-service-id 7536649
next
edit "Cybozu-LDAP"
set internet-service-id 7536654
next
edit "Cybozu-NetBIOS.Session.Service"
set internet-service-id 7536655
next
edit "Cybozu-RTMP"
set internet-service-id 7536656
next
edit "Cybozu-NetBIOS.Name.Service"
set internet-service-id 7536664
next
edit "VNC-Other"
set internet-service-id 7602176
next
edit "VNC-Web"
set internet-service-id 7602177
next
edit "VNC-ICMP"
set internet-service-id 7602178
next
edit "VNC-DNS"
set internet-service-id 7602179
next
edit "VNC-Outbound_Email"
set internet-service-id 7602180
next
edit "VNC-SSH"
set internet-service-id 7602182
next
edit "VNC-FTP"
set internet-service-id 7602183
next
edit "VNC-NTP"
set internet-service-id 7602184
next
edit "VNC-Inbound_Email"
set internet-service-id 7602185
next
edit "VNC-LDAP"
set internet-service-id 7602190
next
edit "VNC-NetBIOS.Session.Service"
set internet-service-id 7602191
next
edit "VNC-RTMP"
set internet-service-id 7602192
next
edit "VNC-NetBIOS.Name.Service"
set internet-service-id 7602200
next
edit "Egnyte-Egnyte"
set internet-service-id 7667846
next
edit "CrowdStrike-CrowdStrike.Falcon.Cloud"
set internet-service-id 7733383
next
edit "Aruba.it-Other"
set internet-service-id 7798784
next
edit "Aruba.it-Web"
set internet-service-id 7798785
next
edit "Aruba.it-ICMP"
set internet-service-id 7798786
next
edit "Aruba.it-DNS"
set internet-service-id 7798787
next
edit "Aruba.it-Outbound_Email"
set internet-service-id 7798788
next
edit "Aruba.it-SSH"
set internet-service-id 7798790
next
edit "Aruba.it-FTP"
set internet-service-id 7798791
next
edit "Aruba.it-NTP"
set internet-service-id 7798792
next
edit "Aruba.it-Inbound_Email"
set internet-service-id 7798793
next
edit "Aruba.it-LDAP"
set internet-service-id 7798798
next
edit "Aruba.it-NetBIOS.Session.Service"
set internet-service-id 7798799
next
edit "Aruba.it-RTMP"
set internet-service-id 7798800
next
edit "Aruba.it-NetBIOS.Name.Service"
set internet-service-id 7798808
next
edit "ISLOnline-Other"
set internet-service-id 7864320
next
edit "ISLOnline-Web"
set internet-service-id 7864321
next
edit "ISLOnline-ICMP"
set internet-service-id 7864322
next
edit "ISLOnline-DNS"
set internet-service-id 7864323
next
edit "ISLOnline-Outbound_Email"
set internet-service-id 7864324
next
edit "ISLOnline-SSH"
set internet-service-id 7864326
next
edit "ISLOnline-FTP"
set internet-service-id 7864327
next
edit "ISLOnline-NTP"
set internet-service-id 7864328
next
edit "ISLOnline-Inbound_Email"
set internet-service-id 7864329
next
edit "ISLOnline-LDAP"
set internet-service-id 7864334
next
edit "ISLOnline-NetBIOS.Session.Service"
set internet-service-id 7864335
next
edit "ISLOnline-RTMP"
set internet-service-id 7864336
next
edit "ISLOnline-NetBIOS.Name.Service"
set internet-service-id 7864344
next
edit "Akamai-CDN"
set internet-service-id 7929993
next
edit "Rackspace-CDN"
set internet-service-id 7995529
next
edit "Instart-CDN"
set internet-service-id 8061065
next
edit "Bitdefender-Other"
set internet-service-id 8126464
next
edit "Bitdefender-Web"
set internet-service-id 8126465
next
edit "Bitdefender-ICMP"
set internet-service-id 8126466
next
edit "Bitdefender-DNS"
set internet-service-id 8126467
next
edit "Bitdefender-Outbound_Email"
set internet-service-id 8126468
next
edit "Bitdefender-SSH"
set internet-service-id 8126470
next
edit "Bitdefender-FTP"
set internet-service-id 8126471
next
edit "Bitdefender-NTP"
set internet-service-id 8126472
next
edit "Bitdefender-Inbound_Email"
set internet-service-id 8126473
next
edit "Bitdefender-LDAP"
set internet-service-id 8126478
next
edit "Bitdefender-NetBIOS.Session.Service"
set internet-service-id 8126479
next
edit "Bitdefender-RTMP"
set internet-service-id 8126480
next
edit "Bitdefender-NetBIOS.Name.Service"
set internet-service-id 8126488
next
edit "Pingdom-Other"
set internet-service-id 8192000
next
edit "Pingdom-Web"
set internet-service-id 8192001
next
edit "Pingdom-ICMP"
set internet-service-id 8192002
next
edit "Pingdom-DNS"
set internet-service-id 8192003
next
edit "Pingdom-Outbound_Email"
set internet-service-id 8192004
next
edit "Pingdom-SSH"
set internet-service-id 8192006
next
edit "Pingdom-FTP"
set internet-service-id 8192007
next
edit "Pingdom-NTP"
set internet-service-id 8192008
next
edit "Pingdom-Inbound_Email"
set internet-service-id 8192009
next
edit "Pingdom-LDAP"
set internet-service-id 8192014
next
edit "Pingdom-NetBIOS.Session.Service"
set internet-service-id 8192015
next
edit "Pingdom-RTMP"
set internet-service-id 8192016
next
edit "Pingdom-NetBIOS.Name.Service"
set internet-service-id 8192024
next
edit "UptimeRobot-Other"
set internet-service-id 8257536
next
edit "UptimeRobot-Web"
set internet-service-id 8257537
next
edit "UptimeRobot-ICMP"
set internet-service-id 8257538
next
edit "UptimeRobot-DNS"
set internet-service-id 8257539
next
edit "UptimeRobot-Outbound_Email"
set internet-service-id 8257540
next
edit "UptimeRobot-SSH"
set internet-service-id 8257542
next
edit "UptimeRobot-FTP"
set internet-service-id 8257543
next
edit "UptimeRobot-NTP"
set internet-service-id 8257544
next
edit "UptimeRobot-Inbound_Email"
set internet-service-id 8257545
next
edit "UptimeRobot-LDAP"
set internet-service-id 8257550
next
edit "UptimeRobot-NetBIOS.Session.Service"
set internet-service-id 8257551
next
edit "UptimeRobot-RTMP"
set internet-service-id 8257552
next
edit "UptimeRobot-NetBIOS.Name.Service"
set internet-service-id 8257560
next
edit "UptimeRobot-UptimeRobot.Monitor"
set internet-service-id 8257709
next
edit "Quovadisglobal-Other"
set internet-service-id 8323072
next
edit "Quovadisglobal-Web"
set internet-service-id 8323073
next
edit "Quovadisglobal-ICMP"
set internet-service-id 8323074
next
edit "Quovadisglobal-DNS"
set internet-service-id 8323075
next
edit "Quovadisglobal-Outbound_Email"
set internet-service-id 8323076
next
edit "Quovadisglobal-SSH"
set internet-service-id 8323078
next
edit "Quovadisglobal-FTP"
set internet-service-id 8323079
next
edit "Quovadisglobal-NTP"
set internet-service-id 8323080
next
edit "Quovadisglobal-Inbound_Email"
set internet-service-id 8323081
next
edit "Quovadisglobal-LDAP"
set internet-service-id 8323086
next
edit "Quovadisglobal-NetBIOS.Session.Service"
set internet-service-id 8323087
next
edit "Quovadisglobal-RTMP"
set internet-service-id 8323088
next
edit "Quovadisglobal-NetBIOS.Name.Service"
set internet-service-id 8323096
next
edit "Splashtop-Splashtop"
set internet-service-id 8388751
next
edit "Zoox-Other"
set internet-service-id 8454144
next
edit "Zoox-Web"
set internet-service-id 8454145
next
edit "Zoox-ICMP"
set internet-service-id 8454146
next
edit "Zoox-DNS"
set internet-service-id 8454147
next
edit "Zoox-Outbound_Email"
set internet-service-id 8454148
next
edit "Zoox-SSH"
set internet-service-id 8454150
next
edit "Zoox-FTP"
set internet-service-id 8454151
next
edit "Zoox-NTP"
set internet-service-id 8454152
next
edit "Zoox-Inbound_Email"
set internet-service-id 8454153
next
edit "Zoox-LDAP"
set internet-service-id 8454158
next
edit "Zoox-NetBIOS.Session.Service"
set internet-service-id 8454159
next
edit "Zoox-RTMP"
set internet-service-id 8454160
next
edit "Zoox-NetBIOS.Name.Service"
set internet-service-id 8454168
next
edit "Skyfii-Other"
set internet-service-id 8519680
next
edit "Skyfii-Web"
set internet-service-id 8519681
next
edit "Skyfii-ICMP"
set internet-service-id 8519682
next
edit "Skyfii-DNS"
set internet-service-id 8519683
next
edit "Skyfii-Outbound_Email"
set internet-service-id 8519684
next
edit "Skyfii-SSH"
set internet-service-id 8519686
next
edit "Skyfii-FTP"
set internet-service-id 8519687
next
edit "Skyfii-NTP"
set internet-service-id 8519688
next
edit "Skyfii-Inbound_Email"
set internet-service-id 8519689
next
edit "Skyfii-LDAP"
set internet-service-id 8519694
next
edit "Skyfii-NetBIOS.Session.Service"
set internet-service-id 8519695
next
edit "Skyfii-RTMP"
set internet-service-id 8519696
next
edit "Skyfii-NetBIOS.Name.Service"
set internet-service-id 8519704
next
edit "CoffeeBean-Other"
set internet-service-id 8585216
next
edit "CoffeeBean-Web"
set internet-service-id 8585217
next
edit "CoffeeBean-ICMP"
set internet-service-id 8585218
next
edit "CoffeeBean-DNS"
set internet-service-id 8585219
next
edit "CoffeeBean-Outbound_Email"
set internet-service-id 8585220
next
edit "CoffeeBean-SSH"
set internet-service-id 8585222
next
edit "CoffeeBean-FTP"
set internet-service-id 8585223
next
edit "CoffeeBean-NTP"
set internet-service-id 8585224
next
edit "CoffeeBean-Inbound_Email"
set internet-service-id 8585225
next
edit "CoffeeBean-LDAP"
set internet-service-id 8585230
next
edit "CoffeeBean-NetBIOS.Session.Service"
set internet-service-id 8585231
next
edit "CoffeeBean-RTMP"
set internet-service-id 8585232
next
edit "CoffeeBean-NetBIOS.Name.Service"
set internet-service-id 8585240
next
edit "Cloud4Wi-Other"
set internet-service-id 8650752
next
edit "Cloud4Wi-Web"
set internet-service-id 8650753
next
edit "Cloud4Wi-ICMP"
set internet-service-id 8650754
next
edit "Cloud4Wi-DNS"
set internet-service-id 8650755
next
edit "Cloud4Wi-Outbound_Email"
set internet-service-id 8650756
next
edit "Cloud4Wi-SSH"
set internet-service-id 8650758
next
edit "Cloud4Wi-FTP"
set internet-service-id 8650759
next
edit "Cloud4Wi-NTP"
set internet-service-id 8650760
next
edit "Cloud4Wi-Inbound_Email"
set internet-service-id 8650761
next
edit "Cloud4Wi-LDAP"
set internet-service-id 8650766
next
edit "Cloud4Wi-NetBIOS.Session.Service"
set internet-service-id 8650767
next
edit "Cloud4Wi-RTMP"
set internet-service-id 8650768
next
edit "Cloud4Wi-NetBIOS.Name.Service"
set internet-service-id 8650776
next
edit "Panda-Panda.Security"
set internet-service-id 8716432
next
edit "Ewon-Talk2M"
set internet-service-id 8781970
next
edit "Nutanix-Nutanix.Cloud"
set internet-service-id 8847507
next
edit "Backblaze-Other"
set internet-service-id 8912896
next
edit "Backblaze-Web"
set internet-service-id 8912897
next
edit "Backblaze-ICMP"
set internet-service-id 8912898
next
edit "Backblaze-DNS"
set internet-service-id 8912899
next
edit "Backblaze-Outbound_Email"
set internet-service-id 8912900
next
edit "Backblaze-SSH"
set internet-service-id 8912902
next
edit "Backblaze-FTP"
set internet-service-id 8912903
next
edit "Backblaze-NTP"
set internet-service-id 8912904
next
edit "Backblaze-Inbound_Email"
set internet-service-id 8912905
next
edit "Backblaze-LDAP"
set internet-service-id 8912910
next
edit "Backblaze-NetBIOS.Session.Service"
set internet-service-id 8912911
next
edit "Backblaze-RTMP"
set internet-service-id 8912912
next
edit "Backblaze-NetBIOS.Name.Service"
set internet-service-id 8912920
next
edit "Extreme-Extreme.Cloud"
set internet-service-id 8978580
next
edit "XING-Other"
set internet-service-id 9043968
next
edit "XING-Web"
set internet-service-id 9043969
next
edit "XING-ICMP"
set internet-service-id 9043970
next
edit "XING-DNS"
set internet-service-id 9043971
next
edit "XING-Outbound_Email"
set internet-service-id 9043972
next
edit "XING-SSH"
set internet-service-id 9043974
next
edit "XING-FTP"
set internet-service-id 9043975
next
edit "XING-NTP"
set internet-service-id 9043976
next
edit "XING-Inbound_Email"
set internet-service-id 9043977
next
edit "XING-LDAP"
set internet-service-id 9043982
next
edit "XING-NetBIOS.Session.Service"
set internet-service-id 9043983
next
edit "XING-RTMP"
set internet-service-id 9043984
next
edit "XING-NetBIOS.Name.Service"
set internet-service-id 9043992
next
edit "Genesys-PureCloud"
set internet-service-id 9109653
next
edit "BlackBerry-Cylance"
set internet-service-id 9175190
next
edit "DigiCert-OCSP"
set internet-service-id 9240728
next
edit "Infomaniak-SwissTransfer"
set internet-service-id 9306265
next
edit "Fuze-Fuze"
set internet-service-id 9371802
next
edit "Truecaller-Truecaller"
set internet-service-id 9437339
next
edit "GlobalSign-OCSP"
set internet-service-id 9502872
next
edit "VeriSign-OCSP"
set internet-service-id 9568408
next
edit "Sony-PlayStation.Network"
set internet-service-id 9633952
next
edit "Acronis-Cyber.Cloud"
set internet-service-id 9699489
next
edit "RingCentral-RingCentral"
set internet-service-id 9765027
next
edit "FSecure-FSecure"
set internet-service-id 9830564
next
edit "Kaseya-Kaseya.Cloud"
set internet-service-id 9896101
next
edit "Shodan-Scanner"
set internet-service-id 9961638
next
edit "Censys-Scanner"
set internet-service-id 10027174
next
edit "Valve-Steam"
set internet-service-id 10092711
next
edit "YouSeeU-Bongo"
set internet-service-id 10158248
next
edit "Cato-Cato.Cloud"
set internet-service-id 10223785
next
edit "SolarWinds-SpamExperts"
set internet-service-id 10289323
next
edit "SolarWinds-Pingdom.Probe"
set internet-service-id 10289326
next
edit "8X8-8X8.Cloud"
set internet-service-id 10354860
next
edit "Zattoo-Zattoo.TV"
set internet-service-id 10420401
next
edit "Datto-Datto.RMM"
set internet-service-id 10485939
next
edit "Barracuda-Barracuda.Cloud"
set internet-service-id 10551477
next
edit "Naver-Line"
set internet-service-id 10617015
next
edit "Disney-Disney+"
set internet-service-id 10682552
next
edit "DNS-DoH_DoT"
set internet-service-id 10748089
next
edit "Quad9-Quad9.Standard.DNS"
set internet-service-id 10813626
next
edit "Stretchoid-Scanner"
set internet-service-id 10879142
next
edit "Poly-RealConnect.Service"
set internet-service-id 10944700
next
edit "Telegram-Telegram"
set internet-service-id 11010249
next
edit "Spotify-Spotify"
set internet-service-id 11075786
next
edit "NextDNS-NextDNS"
set internet-service-id 11141324
next
edit "Fastly-CDN"
set internet-service-id 11206793
next
edit "Neustar-UltraDNS.Probes"
set internet-service-id 11272397
next
edit "Microsoft-Intune"
set internet-service-id 327886
next
edit "Microsoft-Office365.Published.Optimize"
set internet-service-id 327902
next
edit "Microsoft-Office365.Published.Allow"
set internet-service-id 327903
next
edit "Microsoft-Office365.Published.USGOV"
set internet-service-id 327917
next
edit "Microsoft-Azure.Monitor"
set internet-service-id 327958
next
edit "Microsoft-Azure.SQL"
set internet-service-id 327959
next
edit "Microsoft-Azure.AD"
set internet-service-id 327960
next
edit "Microsoft-Azure.Data.Factory"
set internet-service-id 327961
next
edit "Microsoft-Azure.Virtual.Desktop"
set internet-service-id 327962
next
edit "Microsoft-Azure.Power.BI"
set internet-service-id 327963
next
edit "Microsoft-Azure.Connectors"
set internet-service-id 327980
next
edit "Amazon-Twitch"
set internet-service-id 393446
next
edit "Amazon-AWS.GovCloud.US"
set internet-service-id 393452
next
edit "Amazon-AWS.EBS"
set internet-service-id 393470
next
edit "Amazon-AWS.Cloud9"
set internet-service-id 393471
next
edit "Amazon-AWS.DynamoDB"
set internet-service-id 393472
next
edit "Amazon-AWS.Route53"
set internet-service-id 393473
next
edit "Amazon-AWS.S3"
set internet-service-id 393474
next
edit "Amazon-AWS.Kinesis.Video.Streams"
set internet-service-id 393475
next
edit "Amazon-AWS.Global.Accelerator"
set internet-service-id 393476
next
edit "Amazon-AWS.EC2"
set internet-service-id 393477
next
edit "Amazon-AWS.API.Gateway"
set internet-service-id 393478
next
edit "Amazon-AWS.Chime.Voice.Connector"
set internet-service-id 393479
next
edit "Amazon-AWS.Connect"
set internet-service-id 393480
next
edit "Amazon-AWS.CloudFront"
set internet-service-id 393481
next
edit "Amazon-AWS.CodeBuild"
set internet-service-id 393482
next
edit "Amazon-AWS.Chime.Meetings"
set internet-service-id 393483
next
edit "Amazon-AWS.AppFlow"
set internet-service-id 393484
next
edit "Amazon-Amazon.SES"
set internet-service-id 393493
next
edit "Adobe-Adobe.Sign"
set internet-service-id 917776
next
edit "Fortinet-FortiVoice.Cloud"
set internet-service-id 1245432
next
edit "Fortinet-FortiGuard.Secure.DNS"
set internet-service-id 1245454
next
edit "Fortinet-FortiEDR"
set internet-service-id 1245475
next
edit "Fortinet-FortiClient.EMS"
set internet-service-id 1245477
next
edit "Fortinet-FortiWeb.Cloud"
set internet-service-id 1245480
next
edit "Fortinet-FortiSASE"
set internet-service-id 1245481
next
edit "Zoho-Site24x7.Monitor"
set internet-service-id 1704153
next
edit "Cisco-Webex.FedRAMP"
set internet-service-id 1966315
next
edit "Cisco-Secure.Endpoint"
set internet-service-id 1966324
next
edit "Atlassian-Atlassian.Cloud"
set internet-service-id 3932388
next
edit "Atlassian-Atlassian.Notification"
set internet-service-id 3932436
next
edit "Akamai-Linode.Cloud"
set internet-service-id 7930148
next
edit "SolarWinds-SolarWinds.RMM"
set internet-service-id 10289379
next
edit "DNS-Root.Name.Servers"
set internet-service-id 10748156
next
edit "DNS-ARPA.Name.Servers"
set internet-service-id 10748206
next
edit "Malicious-Malicious.Server"
set internet-service-id 11337935
next
edit "NIST-ITS"
set internet-service-id 11403472
next
edit "Jamf-Jamf.Cloud"
set internet-service-id 11469009
next
edit "Alcatel.Lucent-Rainbow"
set internet-service-id 11534546
next
edit "Forcepoint-Forcepoint.Cloud"
set internet-service-id 11600083
next
edit "Datadog-Datadog"
set internet-service-id 11665620
next
edit "Mimecast-Mimecast"
set internet-service-id 11731157
next
edit "MediaFire-Other"
set internet-service-id 11796480
next
edit "MediaFire-Web"
set internet-service-id 11796481
next
edit "MediaFire-ICMP"
set internet-service-id 11796482
next
edit "MediaFire-DNS"
set internet-service-id 11796483
next
edit "MediaFire-Outbound_Email"
set internet-service-id 11796484
next
edit "MediaFire-SSH"
set internet-service-id 11796486
next
edit "MediaFire-FTP"
set internet-service-id 11796487
next
edit "MediaFire-NTP"
set internet-service-id 11796488
next
edit "MediaFire-Inbound_Email"
set internet-service-id 11796489
next
edit "MediaFire-LDAP"
set internet-service-id 11796494
next
edit "MediaFire-NetBIOS.Session.Service"
set internet-service-id 11796495
next
edit "MediaFire-RTMP"
set internet-service-id 11796496
next
edit "MediaFire-NetBIOS.Name.Service"
set internet-service-id 11796504
next
edit "Pandora-Pandora"
set internet-service-id 11862230
next
edit "SiriusXM-SiriusXM"
set internet-service-id 11927767
next
edit "Hopin-Hopin"
set internet-service-id 11993304
next
edit "RedShield-RedShield.Cloud"
set internet-service-id 12058842
next
edit "InterneTTL-Scanner"
set internet-service-id 12124326
next
edit "VadeSecure-VadeSecure.Cloud"
set internet-service-id 12189915
next
edit "Netskope-Netskope.Cloud"
set internet-service-id 12255452
next
edit "ClickMeeting-ClickMeeting"
set internet-service-id 12320989
next
edit "Tenable-Tenable.io.Cloud.Scanner"
set internet-service-id 12386528
next
edit "Vidyo-VidyoCloud"
set internet-service-id 12452065
next
edit "OpenNIC-OpenNIC.DNS"
set internet-service-id 12517602
next
edit "Sectigo-Sectigo"
set internet-service-id 12583141
next
edit "DigitalOcean-DigitalOcean.Platform"
set internet-service-id 12648679
next
edit "Pitney.Bowes-Pitney.Bowes.Data.Center"
set internet-service-id 12714216
next
edit "VPN-Anonymous.VPN"
set internet-service-id 12779753
next
edit "Blockchain-Crypto.Mining.Pool"
set internet-service-id 12845290
next
edit "FactSet-FactSet"
set internet-service-id 12910830
next
edit "Bloomberg-Bloomberg"
set internet-service-id 12976367
next
edit "Five9-Five9"
set internet-service-id 13041904
next
edit "Gigas-Gigas.Cloud"
set internet-service-id 13107441
next
edit "Imperva-Imperva.Cloud.WAF"
set internet-service-id 13172978
next
edit "INAP-INAP"
set internet-service-id 13238515
next
edit "Azion-Azion.Platform"
set internet-service-id 13304053
next
edit "Hurricane.Electric-Hurricane.Electric.Internet.Services"
set internet-service-id 13369590
next
edit "NodePing-NodePing.Probe"
set internet-service-id 13435127
next
edit "Frontline-Frontline"
set internet-service-id 13500665
next
edit "Tally-Tally.ERP"
set internet-service-id 13566202
next
edit "Hosting-Bulletproof.Hosting"
set internet-service-id 13631739
next
edit "Okko-Okko.TV"
set internet-service-id 13697277
next
edit "Voximplant-Voximplant.Platform"
set internet-service-id 13762829
next
edit "OVHcloud-OVHcloud"
set internet-service-id 13828367
next
edit "SentinelOne-SentinelOne.Cloud"
set internet-service-id 13893905
next
edit "Kakao-Kakao.Services"
set internet-service-id 13959442
next
edit "Stripe-Stripe"
set internet-service-id 14024979
next
edit "NetScout-Scanner"
set internet-service-id 14090406
next
edit "Recyber-Scanner"
set internet-service-id 14155942
next
edit "Cyber.Casa-Scanner"
set internet-service-id 14221478
next
edit "GTHost-Dedicated.Instant.Servers"
set internet-service-id 14287132
next
edit "ivi-ivi.Streaming"
set internet-service-id 14352669
next
edit "BinaryEdge-Scanner"
set internet-service-id 14418086
next
edit "Fintech-MarketMap.Terminal"
set internet-service-id 14483742
next
edit "xMatters-xMatters.Platform"
set internet-service-id 14549279
next
edit "Blizzard-Battle.Net"
set internet-service-id 14614816
next
edit "Axon-Evidence"
set internet-service-id 14680353
next
edit "CDN77-CDN"
set internet-service-id 14745737
next
edit "GCore.Labs-CDN"
set internet-service-id 14811273
next
edit "Matrix42-FastViewer"
set internet-service-id 14876962
next
edit "Bunny.net-CDN"
set internet-service-id 14942345
next
edit "StackPath-CDN"
set internet-service-id 15007881
next
edit "Edgio-CDN"
set internet-service-id 15073417
next
edit "CacheFly-CDN"
set internet-service-id 15138953
next
edit "Paylocity-Paylocity"
set internet-service-id 15204646
next
edit "Qualys-Qualys.Cloud.Platform"
set internet-service-id 15270183
next
edit "Dailymotion-Other"
set internet-service-id 15335424
next
edit "Dailymotion-Web"
set internet-service-id 15335425
next
edit "Dailymotion-ICMP"
set internet-service-id 15335426
next
edit "Dailymotion-DNS"
set internet-service-id 15335427
next
edit "Dailymotion-Outbound_Email"
set internet-service-id 15335428
next
edit "Dailymotion-SSH"
set internet-service-id 15335430
next
edit "Dailymotion-FTP"
set internet-service-id 15335431
next
edit "Dailymotion-NTP"
set internet-service-id 15335432
next
edit "Dailymotion-Inbound_Email"
set internet-service-id 15335433
next
edit "Dailymotion-LDAP"
set internet-service-id 15335438
next
edit "Dailymotion-NetBIOS.Session.Service"
set internet-service-id 15335439
next
edit "Dailymotion-RTMP"
set internet-service-id 15335440
next
edit "Dailymotion-NetBIOS.Name.Service"
set internet-service-id 15335448
next
edit "LaunchDarkly-LaunchDarkly.Platform"
set internet-service-id 15401258
next
edit "Medianova-CDN"
set internet-service-id 15466633
next
edit "NetDocuments-NetDocuments.Platform"
set internet-service-id 15532331
next
edit "Vonage-Vonage.Contact.Center"
set internet-service-id 15597869
next
edit "Vonage-Vonage.Video.API"
set internet-service-id 15597872
next
edit "Veritas-Enterprise.Vault.Cloud"
set internet-service-id 15663407
next
edit "UK.NCSC-Scanner"
set internet-service-id 15728806
next
edit "Restream-Restream.Platform"
set internet-service-id 15794481
next
edit "NewRelic-Synthetic.Monitor"
set internet-service-id 4849970
next
edit "ArcticWolf-ArcticWolf.Cloud"
set internet-service-id 15860019
next
edit "CounterPath-Bria"
set internet-service-id 15925556
next
edit "CriminalIP-Scanner"
set internet-service-id 15990950
next
edit "IPFS-IPFS.Gateway"
set internet-service-id 16056629
next
edit "Internet.Census.Group-Scanner"
set internet-service-id 16122022
next
edit "SAP-SAP.Ariba"
set internet-service-id 6291766
next
edit "Microsoft-Teams.Published.Worldwide.Optimize"
set internet-service-id 327991
next
edit "Microsoft-Teams.Published.Worldwide.Allow"
set internet-service-id 327992
next
edit "Microsoft-Azure.Front.Door"
set internet-service-id 327993
next
edit "Performive-Performive.Cloud"
set internet-service-id 16187706
next
edit "Tencent-VooV.Meeting"
set internet-service-id 2556219
next
edit "OneLogin-OneLogin"
set internet-service-id 16253244
next
edit "Shadowserver-Scanner"
set internet-service-id 16318630
next
edit "Turkcell-Suit.Conference"
set internet-service-id 16384317
next
edit "LeakIX-Scanner"
set internet-service-id 16449702
next
edit "Infoblox-BloxOne"
set internet-service-id 16515390
next
edit "Nice-CXone"
set internet-service-id 16580927
next
edit "Hetzner-Hetzner.Hosting.Service"
set internet-service-id 16646464
next
edit "ThreatLocker-ThreatLocker"
set internet-service-id 16712001
next
edit "ZPE-ZPE.Cloud"
set internet-service-id 16777538
next
edit "Datto-Datto.BCDR"
set internet-service-id 10486083
next
edit "ColoCrossing-ColoCrossing.Hosting.Service"
set internet-service-id 16843076
next
edit "Sinch-Mailgun"
set internet-service-id 16908613
next
edit "SpaceX-Starlink"
set internet-service-id 16974150
next
edit "Microsoft-Azure.Service.Bus"
set internet-service-id 328007
next
edit "Ingenuity-Ingenuity.Cloud.Service"
set internet-service-id 17039688
next
edit "Microsoft-Azure.Microsoft.Defender"
set internet-service-id 328009
next
end
config firewall internet-service-definition
end
config wanopt content-delivery-network-rule
edit "vcache://"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.m3u8"
next
end
config content-id
set target hls-manifest
set start-str "/"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mpd"
next
end
config content-id
set target dash-manifest
set start-str "/"
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set target hls-fragment
set start-str "/"
end
next
edit "rule4"
config match-entries
edit 1
set pattern "/*.*"
next
end
config content-id
set target dash-fragment
set start-str "/"
end
next
end
next
edit "vcache://youtube/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "youtube.com"
set category youtube
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
set end-str "&"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
end
next
edit "rule3"
set match-mode any
config match-entries
edit 1
set pattern "/stream_204"
next
edit 2
set pattern "/ptracking"
next
edit 3
set pattern "/get_video_info"
next
end
config content-id
set target youtube-map
set start-str "/"
end
next
end
next
edit "vcache://googlevideo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "googlevideo.com"
set category youtube
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
set end-str "&"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
end
next
edit "rule3"
set match-mode any
config match-entries
edit 1
set pattern "/stream_204"
next
edit 2
set pattern "/ptracking"
next
edit 3
set pattern "/get_video_info"
next
end
config content-id
set target youtube-map
set start-str "/"
end
next
end
next
edit "vcache://metacafe/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "mccont.com" "akvideos.metacafe.com" "cdn.metacafe.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://facebook/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "fbcdn.net" "facebook.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://dailymotion/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "dailymotion.com" "dmcdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/video/*.mp4"
next
edit 2
set pattern "/video/*.flv"
next
edit 3
set pattern "/video/*.ts"
next
edit 4
set pattern "/video/*.on2"
next
edit 5
set pattern "/video/*.aac"
next
edit 6
set pattern "/video/*.h264"
next
edit 7
set pattern "/video/*.h263"
next
edit 8
set pattern "/sec*.mp4"
next
edit 9
set pattern "/sec*.flv"
next
edit 10
set pattern "/sec*.on2"
next
edit 11
set pattern "/sec*.aac"
next
edit 12
set pattern "/sec*.h264"
next
edit 13
set pattern "/sec*.h263"
next
edit 14
set pattern "*.ts"
next
end
config skip-entries
edit 1
set target parameter
set pattern "start=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://break/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "break.com" "0ebe.edgecastcdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/dnet/media/*.flv"
next
edit 2
set pattern "/dnet/media/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "ec_seek=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://msn/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "video.msn.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://llnwd/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "llnwd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.fll"
next
end
config skip-entries
edit 1
set target parameter
set pattern "fs=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://yahoo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "yimg.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.m4s"
next
end
config content-id
set target parameter
set start-str "vid="
end
next
end
next
edit "vcache://myspace/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "myspacecdn.com"
set request-cache-control enable
set response-cache-control enable
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://vimeo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "vimeo.com" "vimeocdn.com" "56skyfiregce-a.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.m4s"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://blip.tv/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "blip.tv"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.m4v"
next
edit 2
set pattern "/*.flv"
next
edit 3
set pattern "/*.mp4"
next
edit 4
set pattern "/*.wmv"
next
edit 5
set pattern "/*.rm"
next
edit 6
set pattern "/*.ram"
next
edit 7
set pattern "/*.mov"
next
edit 8
set pattern "/*.avi"
next
end
config skip-entries
edit 1
set target parameter
set pattern "ms=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://maker.tv/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "videos-f.jwpsrv.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://aol/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "stream.aol.com" "5min.com" "vidiblevod-vh.akamaihd.net" "stg-ec-ore-u.uplynk.com" "vidible.tv"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*timeoffset=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://clipfish/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "clipfish.de" "universal-music.de"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.f4v"
next
edit 3
set pattern "/*.mp4"
next
edit 4
set pattern "/*.m4v"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://cnn/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "cnn-vh.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.flv*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.ts*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://foxnews/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "foxnews.com" "foxnews-f.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set target parameter
set pattern "*Seg*"
next
edit 3
set target parameter
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://discovery/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "discovery.com" "discidevflash-f.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://liveleak/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "edge.liveleak.com" "cdn.liveleak.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.wmv"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://sevenload/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "sevenload.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "aktimeoffset=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://stupidvideos/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "stupidvideos.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://howcast/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "media.howcast.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "start=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://vevo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "vevo.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://ooyala/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "ooyala.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "*Seg*"
next
edit 2
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://ms-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "msads.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://yumenetworks-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "yumenetworks.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://2mdn-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "2mdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://eyewonder-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "eyewonder.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://eyereturn-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "eyereturn.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://serving-sys-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "serving-sys.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://amazonaws-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "amazonaws.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://edgesuite-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "edgesuite.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://gorillanation-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "video.gorillanation.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://youku/"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/youku/*.mp4"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/youku/*.flv"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/youku/*.kux"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule4"
config match-entries
edit 1
set pattern "/youku/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule5"
config match-entries
edit 1
set pattern "/youku/*.flv"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule6"
config match-entries
edit 1
set pattern "/youku/*.kux"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
end
next
edit "vcache://tudou/"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/f4v/*"
next
edit 2
set target parameter
set pattern "*id=tudou*"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*begin=*"
next
end
config content-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
end
next
edit "vcache://cbc/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "cbc.ca" "mobilehls-vh.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
set match-mode any
config match-entries
edit 1
set pattern "*.ts"
next
edit 2
set pattern "*.mp4"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://megaupload/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "megaupload.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/files/*"
next
end
config content-id
set target referrer
set start-str "d="
set start-skip 2
end
next
end
next
edit "update://windowsupdate/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "download.windowsupdate.com"
set request-cache-control enable
set response-cache-control enable
set response-expires enable
set updateserver enable
next
end
config log fortiguard setting
set status enable
end
config log tap-device
edit "default-tap-gui"
set status enable
set port 12121
set format json
config filter
set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set ztna-traffic disable
set anomaly disable
set voip disable
config free-style
edit 1
set category event
set filter "subtype router or VPN"
set filter-type exclude
next
end
end
next
end
config system standalone-cluster
config cluster-peer
end
end
config system fortiguard
set service-account-id "godelchen@tahoho.com.tw"
end
config endpoint-control fctems
edit 1
next
edit 2
next
edit 3
next
edit 4
next
edit 5
next
edit 6
next
edit 7
next
end
config system email-server
set server "notification.fortinet.net"
set port 465
set security smtps
end
config system session-helper
edit 1
set name pptp
set protocol 6
set port 1723
next
edit 2
set name h323
set protocol 6
set port 1720
next
edit 3
set name ras
set protocol 17
set port 1719
next
edit 4
set name tns
set protocol 6
set port 1521
next
edit 5
set name tftp
set protocol 17
set port 69
next
edit 6
set name rtsp
set protocol 6
set port 554
next
edit 7
set name rtsp
set protocol 6
set port 7070
next
edit 8
set name rtsp
set protocol 6
set port 8554
next
edit 9
set name ftp
set protocol 6
set port 21
next
edit 10
set name mms
set protocol 6
set port 1863
next
edit 11
set name pmap
set protocol 6
set port 111
next
edit 12
set name pmap
set protocol 17
set port 111
next
edit 13
set name sip
set protocol 17
set port 5060
next
edit 14
set name dns-udp
set protocol 17
set port 53
next
edit 15
set name rsh
set protocol 6
set port 514
next
edit 16
set name rsh
set protocol 6
set port 512
next
edit 17
set name dcerpc
set protocol 6
set port 135
next
edit 18
set name dcerpc
set protocol 17
set port 135
next
edit 19
set name mgcp
set protocol 17
set port 2427
next
edit 20
set name mgcp
set protocol 17
set port 2727
next
end
config system auto-install
set auto-install-config enable
set auto-install-image enable
end
config system ntp
set ntpsync enable
set server-mode enable
set interface "fortilink"
end
config system ftm-push
set server-cert "Fortinet_Factory"
end
config system automation-trigger
edit "Network Down"
set event-type event-log
set logid 20099
config fields
edit 1
set name "status"
set value "DOWN"
next
end
next
edit "HA Failover"
set event-type ha-failover
next
edit "Reboot"
set event-type reboot
next
edit "FortiAnalyzer Connection Down"
set event-type event-log
set logid 22902
next
edit "License Expired Notification"
set event-type license-near-expiry
set license-type any
next
edit "Compromised Host Quarantine"
next
edit "Incoming Webhook Call"
set event-type incoming-webhook
next
edit "Security Rating Notification"
set event-type security-rating-summary
next
edit "Local Cert Expired Notification"
set description "Default automation trigger configuration for when a local certificate is near expiration."
set event-type local-cert-near-expiry
next
end
config system automation-action
edit "Network Down_email"
set action-type email
set email-subject "Network Down"
next
edit "HA Failover_email"
set action-type email
set email-subject "HA Failover"
next
edit "Reboot_email"
set action-type email
set email-subject "Reboot"
next
edit "FortiAnalyzer Connection Down_ios-notification"
set action-type fortiexplorer-notification
next
edit "License Expired Notification_ios-notification"
set action-type fortiexplorer-notification
next
edit "Compromised Host Quarantine_quarantine"
set action-type quarantine
next
edit "Compromised Host Quarantine_quarantine-forticlient"
set action-type quarantine-forticlient
next
edit "Security Rating Notification_ios-notification"
set action-type fortiexplorer-notification
next
edit "Reboot FortiGate"
set description "Default automation action configuration for rebooting this FortiGate unit."
set action-type system-actions
set system-action reboot
set minimum-interval 300
next
edit "Shutdown FortiGate"
set description "Default automation action configuration for shuting down this FortiGate unit."
set action-type system-actions
set system-action shutdown
next
edit "Backup Config Disk"
set description "Default automation action configuration for backing up the configuration on disk."
set action-type system-actions
set system-action backup-config
next
end
config system automation-stitch
edit "Network Down"
set status disable
set trigger "Network Down"
config actions
edit 1
set action "Network Down_email"
next
end
next
edit "HA Failover"
set status disable
set trigger "HA Failover"
config actions
edit 1
set action "HA Failover_email"
next
end
next
edit "Reboot"
set status disable
set trigger "Reboot"
config actions
edit 1
set action "Reboot_email"
next
end
next
edit "FortiAnalyzer Connection Down"
set trigger "FortiAnalyzer Connection Down"
config actions
edit 1
set action "FortiAnalyzer Connection Down_ios-notification"
next
end
next
edit "License Expired Notification"
set trigger "License Expired Notification"
config actions
edit 1
set action "License Expired Notification_ios-notification"
next
end
next
edit "Compromised Host Quarantine"
set status disable
set trigger "Compromised Host Quarantine"
config actions
edit 1
set action "Compromised Host Quarantine_quarantine"
next
edit 2
set action "Compromised Host Quarantine_quarantine-forticlient"
next
end
next
edit "Incoming Webhook Quarantine"
set status disable
set trigger "Incoming Webhook Call"
config actions
edit 1
set action "Compromised Host Quarantine_quarantine"
next
edit 2
set action "Compromised Host Quarantine_quarantine-forticlient"
next
end
next
edit "Security Rating Notification"
set trigger "Security Rating Notification"
config actions
edit 1
set action "Security Rating Notification_ios-notification"
next
end
next
end
config system federated-upgrade
set status disabled
end
config system ike
set dh-multiprocess disable
end
config system object-tagging
edit "default"
next
end
config switch-controller traffic-policy
edit "quarantine"
set description "Rate control for quarantined traffic"
set guaranteed-bandwidth 163840
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 1
next
edit "sniffer"
set description "Rate control for sniffer mirrored traffic"
set guaranteed-bandwidth 50000
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 2
next
end
config system settings
end
config system dhcp server
edit 1
set dns-service default
set default-gateway 192.168.1.99
set netmask 255.255.255.0
set interface "internal"
config ip-range
edit 1
set start-ip 192.168.1.110
set end-ip 192.168.1.210
next
end
next
edit 2
set ntp-service local
set default-gateway 169.254.1.1
set netmask 255.255.255.0
set interface "fortilink"
config ip-range
edit 1
set start-ip 169.254.1.2
set end-ip 169.254.1.254
next
end
set vci-match enable
set vci-string "FortiSwitch" "FortiExtender"
next
edit 3
set dns-service default
set default-gateway 10.30.20.254
set netmask 255.255.255.0
set interface "HBB-E2C-LAN"
config ip-range
edit 1
set start-ip 10.30.20.100
set end-ip 10.30.20.110
next
end
next
edit 4
set dns-service default
set default-gateway 10.30.40.254
set netmask 255.255.255.0
set interface "MAN-ES-ATU-BOX"
config ip-range
edit 1
set start-ip 10.30.40.100
set end-ip 10.30.40.250
next
end
next
end
config firewall address
edit "none"
set uuid 8a6ff348-7768-51ed-3629-692971363016
set subnet 0.0.0.0 255.255.255.255
next
edit "login.microsoftonline.com"
set uuid 8a701184-7768-51ed-9bb0-e26e28a334ea
set type fqdn
set fqdn "login.microsoftonline.com"
next
edit "login.microsoft.com"
set uuid 8a702b06-7768-51ed-7ba4-6f547f2184d8
set type fqdn
set fqdn "login.microsoft.com"
next
edit "login.windows.net"
set uuid 8a7042b2-7768-51ed-7563-60de208d26bb
set type fqdn
set fqdn "login.windows.net"
next
edit "gmail.com"
set uuid 8a705ab8-7768-51ed-55dc-ab9a93e3c0bd
set type fqdn
set fqdn "gmail.com"
next
edit "wildcard.google.com"
set uuid 8a707246-7768-51ed-dbb9-48d2d65468f7
set type fqdn
set fqdn "*.google.com"
next
edit "wildcard.dropbox.com"
set uuid 8a7089e8-7768-51ed-6b71-4784d26c00c2
set type fqdn
set fqdn "*.dropbox.com"
next
edit "all"
set uuid 8a818996-7768-51ed-5fde-2419080812c8
next
edit "FIREWALL_AUTH_PORTAL_ADDRESS"
set uuid 8a81949a-7768-51ed-286f-6b2ac634f3e8
next
edit "FABRIC_DEVICE"
set uuid 8a819de6-7768-51ed-1ccf-3cdecf2ff51c
set comment "IPv4 addresses of Fabric Devices."
next
edit "SSLVPN_TUNNEL_ADDR1"
set uuid 8a84d966-7768-51ed-469f-5700ee836431
set type iprange
set start-ip 10.212.134.200
set end-ip 10.212.134.210
next
edit "internal"
set uuid 908e77ea-7768-51ed-2e8a-1d1be5abd615
set type interface-subnet
set subnet 192.168.1.99 255.255.255.0
set interface "internal"
next
edit "FCTEMS_ALL_FORTICLOUD_SERVERS"
set uuid 9a12db22-7794-51ed-bda3-84fd793ebcb8
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "HBB-E2C-LAN address"
set uuid 41824c8a-779a-51ed-d57d-78487e4de775
set type interface-subnet
set subnet 10.30.20.254 255.255.255.0
set interface "HBB-E2C-LAN"
next
edit "IT Component"
set uuid 3d077e5c-77a7-51ed-27ee-a4c245e9e9e3
set subnet 10.30.20.110 255.255.255.255
next
edit "AWS"
set uuid 64f5ca86-77a7-51ed-48b0-4da979d41310
set type fqdn
set fqdn "aws.amazon.com"
next
edit "GCP"
set uuid 9c1c0d4a-77a7-51ed-6b02-7a29ca0eee9d
set type fqdn
set fqdn "*.googleapis.com"
next
edit "Git"
set uuid ab515a36-77a7-51ed-eb91-c15926e1ac05
set type fqdn
set fqdn "raw.githubusercontent.com"
next
edit "AWS1"
set uuid ba63b9ba-77a7-51ed-c509-12a96fe758d6
set type fqdn
set fqdn "amazon.com"
next
edit "AWS2"
set uuid c70453be-77a7-51ed-0139-3dfe4d4b7dbf
set type fqdn
set fqdn "*.amazonaws.com"
next
edit "AnyDesk"
set uuid e13b0ca0-77a7-51ed-6f73-d637e0cead1c
set type fqdn
set fqdn "*.net.anydesk.com"
next
edit "GLPI-Server"
set uuid f1035c50-77a7-51ed-2c0f-494c7ee60eef
set type fqdn
set fqdn "glpi.tahoho.com.tw"
next
edit "MANES-ATU-BOX"
set uuid 57b89ea8-80fc-51ed-8d02-f6fde50ef081
set subnet 10.30.40.120 255.255.255.255
next
edit "gmail smtp"
set uuid 372381be-84bf-51ed-b2c1-d9344eb3fb8c
set type fqdn
set fqdn "smtp.gmail.com"
next
edit "EMS_ALL_UNMANAGEABLE_CLIENTS"
set uuid 7ce2ed06-b44a-51ed-feb8-c20b6fbc9b1d
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "EMS_ALL_UNKNOWN_CLIENTS"
set uuid 7ee40874-b44a-51ed-bcf5-124fe34cc3a7
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "Cloud Scada"
set uuid 55f36fa8-b0ee-51ee-5035-0a3f13bd9471
set type fqdn
set fqdn "scadabroker.myvecid.net"
next
edit "Cloud Scada2"
set uuid cd58fa8a-b0ef-51ee-3436-948f2b521fe3
set type fqdn
set fqdn "cloudscada.myvecid.net"
next
edit "time.google.com"
set uuid 86c36108-b0f1-51ee-a273-98c6164422ce
set type fqdn
set fqdn "time.google.com"
next
edit "time.windows.com"
set uuid 9852ba72-b0f1-51ee-1e01-7d34b9ac5893
set type fqdn
set fqdn "time.windows.com"
next
edit "tw.ntp.org.cn"
set uuid a9957608-b0f1-51ee-4c5f-d9f193dddbee
set type fqdn
set fqdn "tw.ntp.org.cn"
next
end
config firewall multicast-address
edit "all"
set start-ip 224.0.0.0
set end-ip 239.255.255.255
next
edit "all_hosts"
set start-ip 224.0.0.1
set end-ip 224.0.0.1
next
edit "all_routers"
set start-ip 224.0.0.2
set end-ip 224.0.0.2
next
edit "Bonjour"
set start-ip 224.0.0.251
set end-ip 224.0.0.251
next
edit "EIGRP"
set start-ip 224.0.0.10
set end-ip 224.0.0.10
next
edit "OSPF"
set start-ip 224.0.0.5
set end-ip 224.0.0.6
next
end
config firewall address6
edit "SSLVPN_TUNNEL_IPv6_ADDR1"
set uuid 8a84eb5e-7768-51ed-e692-29e9ba701e94
set ip6 fdff:ffff::/120
next
edit "all"
set uuid 8a711c50-7768-51ed-eebb-1479e3214caa
next
edit "none"
set uuid 8a71314a-7768-51ed-34ce-6d0a14c3f3c2
set ip6 ::/128
next
end
config firewall multicast-address6
edit "all"
set ip6 ff00::/8
next
end
config firewall addrgrp
edit "G Suite"
set uuid 8a70a680-7768-51ed-6f57-1a5f7c1342df
set member "gmail.com" "wildcard.google.com"
next
edit "Microsoft Office 365"
set uuid 8a70d948-7768-51ed-dca5-906ee06a3a3c
set member "login.microsoftonline.com" "login.microsoft.com" "login.windows.net"
next
end
config firewall wildcard-fqdn custom
edit "cdn-apple"
set uuid a6ebd64e-7791-51ed-2e6f-080b2aeb9e5a
set wildcard-fqdn "*.cdn-apple.com"
next
edit "mzstatic-apple"
set uuid a6ebdb6c-7791-51ed-8034-37e55c7466d5
set wildcard-fqdn "*.mzstatic.com"
next
edit "adobe"
set uuid 8c4c7d3a-7768-51ed-f95f-30a321d43350
set wildcard-fqdn "*.adobe.com"
next
edit "Adobe Login"
set uuid 8c4c8492-7768-51ed-cc99-533d8ece45ce
set wildcard-fqdn "*.adobelogin.com"
next
edit "android"
set uuid 8c4c8b90-7768-51ed-1c8a-887718f4818e
set wildcard-fqdn "*.android.com"
next
edit "apple"
set uuid 8c4c928e-7768-51ed-5dca-917ab16d5659
set wildcard-fqdn "*.apple.com"
next
edit "appstore"
set uuid 8c4c9996-7768-51ed-3b41-35466ba913bd
set wildcard-fqdn "*.appstore.com"
next
edit "auth.gfx.ms"
set uuid 8c4ca09e-7768-51ed-a57d-0842442f317f
set wildcard-fqdn "*.auth.gfx.ms"
next
edit "citrix"
set uuid 8c4ca7f6-7768-51ed-549f-d0340e259f2c
set wildcard-fqdn "*.citrixonline.com"
next
edit "dropbox.com"
set uuid 8c4caefe-7768-51ed-2603-462e0db88c8d
set wildcard-fqdn "*.dropbox.com"
next
edit "eease"
set uuid 8c4cb606-7768-51ed-c1e4-7b0bebd31154
set wildcard-fqdn "*.eease.com"
next
edit "firefox update server"
set uuid 8c4cbd18-7768-51ed-72bf-4df813a91928
set wildcard-fqdn "aus*.mozilla.org"
next
edit "fortinet"
set uuid 8c4cc434-7768-51ed-1a83-71ce06c8fc91
set wildcard-fqdn "*.fortinet.com"
next
edit "googleapis.com"
set uuid 8c4ccb50-7768-51ed-4e29-3a99930d02c0
set wildcard-fqdn "*.googleapis.com"
next
edit "google-drive"
set uuid 8c4cd26c-7768-51ed-de26-1856745d0271
set wildcard-fqdn "*drive.google.com"
next
edit "google-play2"
set uuid 8c4cd99c-7768-51ed-8137-bd14c2e9ea42
set wildcard-fqdn "*.ggpht.com"
next
edit "google-play3"
set uuid 8c4ce0cc-7768-51ed-8a3b-87f8e677b99e
set wildcard-fqdn "*.books.google.com"
next
edit "Gotomeeting"
set uuid 8c4ce7fc-7768-51ed-6287-0ac051ddbaf8
set wildcard-fqdn "*.gotomeeting.com"
next
edit "icloud"
set uuid 8c4cf2d8-7768-51ed-b508-5f0dec113fa5
set wildcard-fqdn "*.icloud.com"
next
edit "itunes"
set uuid 8c4cfa58-7768-51ed-348b-299685e75940
set wildcard-fqdn "*itunes.apple.com"
next
edit "microsoft"
set uuid 8c4d0188-7768-51ed-ae2a-7f48f0f01f98
set wildcard-fqdn "*.microsoft.com"
next
edit "skype"
set uuid 8c4d08b8-7768-51ed-11ab-8874bdec9243
set wildcard-fqdn "*.messenger.live.com"
next
edit "softwareupdate.vmware.com"
set uuid 8c4d0ff2-7768-51ed-05f2-1d0bfcb9e019
set wildcard-fqdn "*.softwareupdate.vmware.com"
next
edit "verisign"
set uuid 8c4d1722-7768-51ed-b930-2563976506db
set wildcard-fqdn "*.verisign.com"
next
edit "Windows update 2"
set uuid 8c4d1e52-7768-51ed-32d8-5cecb3dacd1f
set wildcard-fqdn "*.windowsupdate.com"
next
edit "live.com"
set uuid 8c4d25d2-7768-51ed-646c-9b857c35b99e
set wildcard-fqdn "*.live.com"
next
edit "google-play"
set uuid 8c4d2d16-7768-51ed-027b-c645cdbe8051
set wildcard-fqdn "*play.google.com"
next
edit "update.microsoft.com"
set uuid 8c4d345a-7768-51ed-1cce-1234ca6bcc8a
set wildcard-fqdn "*update.microsoft.com"
next
edit "swscan.apple.com"
set uuid 8c4d3b9e-7768-51ed-2f86-d28495afcb44
set wildcard-fqdn "*swscan.apple.com"
next
edit "autoupdate.opera.com"
set uuid 8c4d433c-7768-51ed-6151-181e1f234230
set wildcard-fqdn "*autoupdate.opera.com"
next
end
config firewall service category
edit "General"
set comment "General services."
next
edit "Web Access"
set comment "Web access."
next
edit "File Access"
set comment "File access."
next
edit "Email"
set comment "Email services."
next
edit "Network Services"
set comment "Network services."
next
edit "Authentication"
set comment "Authentication service."
next
edit "Remote Access"
set comment "Remote access."
next
edit "Tunneling"
set comment "Tunneling service."
next
edit "VoIP, Messaging & Other Applications"
set comment "VoIP, messaging, and other applications."
next
edit "Web Proxy"
set comment "Explicit web proxy."
next
end
config firewall service custom
edit "DNS"
set category "Network Services"
set tcp-portrange 53
set udp-portrange 53
next
edit "HTTP"
set category "Web Access"
set tcp-portrange 80
next
edit "HTTPS"
set category "Web Access"
set tcp-portrange 443
next
edit "IMAP"
set category "Email"
set tcp-portrange 143
next
edit "IMAPS"
set category "Email"
set tcp-portrange 993
next
edit "LDAP"
set category "Authentication"
set tcp-portrange 389
next
edit "DCE-RPC"
set category "Remote Access"
set tcp-portrange 135
set udp-portrange 135
next
edit "POP3"
set category "Email"
set tcp-portrange 110
next
edit "POP3S"
set category "Email"
set tcp-portrange 995
next
edit "SAMBA"
set category "File Access"
set tcp-portrange 139
next
edit "SMTP"
set category "Email"
set tcp-portrange 25
next
edit "SMTPS"
set category "Email"
set tcp-portrange 465
next
edit "KERBEROS"
set category "Authentication"
set tcp-portrange 88 464
set udp-portrange 88 464
next
edit "LDAP_UDP"
set category "Authentication"
set udp-portrange 389
next
edit "SMB"
set category "File Access"
set tcp-portrange 445
next
edit "FTP"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_GET"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_PUT"
set category "File Access"
set tcp-portrange 21
next
edit "ALL"
set category "General"
set protocol IP
next
edit "ALL_TCP"
set category "General"
set tcp-portrange 1-65535
next
edit "ALL_UDP"
set category "General"
set udp-portrange 1-65535
next
edit "ALL_ICMP"
set category "General"
set protocol ICMP
unset icmptype
next
edit "ALL_ICMP6"
set category "General"
set protocol ICMP6
unset icmptype
next
edit "GRE"
set category "Tunneling"
set protocol IP
set protocol-number 47
next
edit "AH"
set category "Tunneling"
set protocol IP
set protocol-number 51
next
edit "ESP"
set category "Tunneling"
set protocol IP
set protocol-number 50
next
edit "AOL"
set tcp-portrange 5190-5194
next
edit "BGP"
set category "Network Services"
set tcp-portrange 179
next
edit "DHCP"
set category "Network Services"
set udp-portrange 67-68
next
edit "FINGER"
set tcp-portrange 79
next
edit "GOPHER"
set tcp-portrange 70
next
edit "H323"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1720 1503
set udp-portrange 1719
next
edit "IKE"
set category "Tunneling"
set udp-portrange 500 4500
next
edit "Internet-Locator-Service"
set tcp-portrange 389
next
edit "IRC"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 6660-6669
next
edit "L2TP"
set category "Tunneling"
set tcp-portrange 1701
set udp-portrange 1701
next
edit "NetMeeting"
set tcp-portrange 1720
next
edit "NFS"
set category "File Access"
set tcp-portrange 111 2049
set udp-portrange 111 2049
next
edit "NNTP"
set tcp-portrange 119
next
edit "NTP"
set category "Network Services"
set tcp-portrange 123
set udp-portrange 123
next
edit "OSPF"
set category "Network Services"
set protocol IP
set protocol-number 89
next
edit "PC-Anywhere"
set category "Remote Access"
set tcp-portrange 5631
set udp-portrange 5632
next
edit "PING"
set category "Network Services"
set protocol ICMP
set icmptype 8
unset icmpcode
next
edit "TIMESTAMP"
set protocol ICMP
set icmptype 13
unset icmpcode
next
edit "INFO_REQUEST"
set protocol ICMP
set icmptype 15
unset icmpcode
next
edit "INFO_ADDRESS"
set protocol ICMP
set icmptype 17
unset icmpcode
next
edit "ONC-RPC"
set category "Remote Access"
set tcp-portrange 111
set udp-portrange 111
next
edit "PPTP"
set category "Tunneling"
set tcp-portrange 1723
next
edit "QUAKE"
set udp-portrange 26000 27000 27910 27960
next
edit "RAUDIO"
set udp-portrange 7070
next
edit "REXEC"
set tcp-portrange 512
next
edit "RIP"
set category "Network Services"
set udp-portrange 520
next
edit "RLOGIN"
set tcp-portrange 513:512-1023
next
edit "RSH"
set tcp-portrange 514:512-1023
next
edit "SCCP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 2000
next
edit "SIP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 5060
set udp-portrange 5060
next
edit "SIP-MSNmessenger"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1863
next
edit "SNMP"
set category "Network Services"
set tcp-portrange 161-162
set udp-portrange 161-162
next
edit "SSH"
set category "Remote Access"
set tcp-portrange 22
next
edit "SYSLOG"
set category "Network Services"
set udp-portrange 514
next
edit "TALK"
set udp-portrange 517-518
next
edit "TELNET"
set category "Remote Access"
set tcp-portrange 23
next
edit "TFTP"
set category "File Access"
set udp-portrange 69
next
edit "MGCP"
set udp-portrange 2427 2727
next
edit "UUCP"
set tcp-portrange 540
next
edit "VDOLIVE"
set tcp-portrange 7000-7010
next
edit "WAIS"
set tcp-portrange 210
next
edit "WINFRAME"
set tcp-portrange 1494 2598
next
edit "X-WINDOWS"
set category "Remote Access"
set tcp-portrange 6000-6063
next
edit "PING6"
set protocol ICMP6
set icmptype 128
unset icmpcode
next
edit "MS-SQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1433 1434
next
edit "MYSQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 3306
next
edit "RDP"
set category "Remote Access"
set tcp-portrange 3389
next
edit "VNC"
set category "Remote Access"
set tcp-portrange 5900
next
edit "DHCP6"
set category "Network Services"
set udp-portrange 546 547
next
edit "SQUID"
set category "Tunneling"
set tcp-portrange 3128
next
edit "SOCKS"
set category "Tunneling"
set tcp-portrange 1080
set udp-portrange 1080
next
edit "WINS"
set category "Remote Access"
set tcp-portrange 1512
set udp-portrange 1512
next
edit "RADIUS"
set category "Authentication"
set udp-portrange 1812 1813
next
edit "RADIUS-OLD"
set udp-portrange 1645 1646
next
edit "CVSPSERVER"
set tcp-portrange 2401
set udp-portrange 2401
next
edit "AFS3"
set category "File Access"
set tcp-portrange 7000-7009
set udp-portrange 7000-7009
next
edit "TRACEROUTE"
set category "Network Services"
set udp-portrange 33434-33535
next
edit "RTSP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 554 7070 8554
set udp-portrange 554
next
edit "MMS"
set tcp-portrange 1755
set udp-portrange 1024-5000
next
edit "NONE"
set tcp-portrange 0
next
edit "webproxy"
set proxy enable
set category "Web Proxy"
set protocol ALL
set tcp-portrange 0-65535:0-65535
next
edit "OPC-UA"
set tcp-portrange 49320 48010
next
edit "MQTT"
set tcp-portrange 8883 443
next
end
config firewall service group
edit "Email Access"
set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS"
next
edit "Web Access"
set member "DNS" "HTTP" "HTTPS"
next
edit "Windows AD"
set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB"
next
edit "Exchange Server"
set member "DCE-RPC" "DNS" "HTTPS"
next
end
config vpn certificate ca
edit "CA_Cert_1"
set ca "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
next
end
config vpn certificate local
edit "Fortinet_CA_SSL"
set password ENC 5e0wlSHmrCMjFzRn31T0b95OBAuDpmz4JDjXTZxxBFxo2+jVerERyPghwzqjfOhSCR+QilNfGr7xDqDMylWDx0ZGU95i7hQCkHM/UXcLmC9lSgUS2sSBjgN8/LyKMsJoQ7CktxNRIF1DXRUzxTBHwIyIdJzBYJW6WHADb2w16gMagskGazR+Z2kT3XlUFBcJ3BqMVw==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQItAU7EubxeyUCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECEPnN9CkO4hEBIIEyJgqhjT53Qgu
BU3QbQcDygfYDEkAv7IGjHhEUEsL7cOrmqEALQCdVI08PoUL45W4QUQgQ5yAqU4x
9PZB6AkNyw3Bgf+CFGv2an2u7rknm5XmFdo2eAf/fBpd/XW2KYaKwBdrjvEY475O
n5XPwUpgr4mRz4xGThWMA//guzEdo56hxITi1unw6jMfX3ISw3mzXwcIcIRIRf5X
z/gt0/jvhTv1IHfHYUWPj9dgHjkemUwzlu3KY/sN+Gq4adGMVLBi/LuZjs1SmBVU
Y16MIwATM+E3qFel+Om6BBIeLTgD+6QwVvcHmMD1VO61HDHQ5FjbUwX+BiG12cra
bvyTA3iIpqcK5CkHBjLX1T2hGrrF9Rc0pcu27TO502EbtbL+yLULbq/t2oEbjzvm
IAs9NkNLmFZ6hFj5SXiP1OE2Ol4KssdiFlNyhdzKy4MYQh6aSKb1xPr9Nreggw6e
/xvtBZxT5YXtEfvK+Lv9UIfCrvpGi8PeFaZIZJBjZIlsvu8xC6QNbvqLGWwTQIzi
wDN4Q8yB0kIwL4yvPtWna0X4UgAoDf/jxWLwtOyXOjTqmFNwMmyHhdKk+yg6FiWG
rtO24b3jJV0Ju6GbTYeVYiwIsG+lUMFHH3i0cat6+zeXLGC6u6OHAYvBmiuA/0DM
00VYBld6hWvpwUSwdBqLUPnEoKo0bFPuODwzo4XtK5tBZxbUtRLtWlPl810FtQU3
zbA6avJqNFyDByC86zPIUfGkM8BXpFfrxHrV2rWL1gx5d03lhPvciajqLijhfb9U
pIRfj402E3jfONPONYws11ri1VWG7+a+PCYl2Kz4rbSHUmiYFb6I5hxAvm8t4D/+
DvSSadSbLYD1Qccl9YgASdOB3YmAf0+Z6wZqzmobhqLTsKm5QwBw054dEc1u/oqk
DiKl3lgMw5DCg7UvVx4xNI5JZitA8n7TUZUro/u3ga1KU2tNYszMdkv024LVtWsZ
+7XhtucJC9NVKm/Ju0okg1AdMCoc0jmDG73T5BUSylqk78ZhdodxxjNfdOvqmmGn
u3NAQWh4f1xO+iJsKbE4pxOCFPcTlB0ajNUie+o7KwOgmfR5SBB98RqGDvQQTUj9
1iwAPScKsobHneiCaYZD3+nfSc/iEinA2rH7ZwYIuSHYW9tieT0Qpgtmf5jeX8bi
k532QaMfhDRuR3FY79d8FgNqG6JiaAFJV43AeyR7jEUYzYyLG+mcn4KQVVY+blSP
IBvQvzJO1pBO6T7vsUD0CyUqkax5E5v1cjmBV56mN5+VFKvpDb7LB3T3TACqCaxM
EVU/lSRXYW5YGXEPstqmjfA1/15ayuQyIt3yoc1QA6VHNKIegQAe3I8es48Kk1JV
9+++nIpxZilAu1aH4uuXPpGXDdMqktQ0KCPbLqYqH7HmuOfC2JopgXxC/c633OTG
pKrtwP7SOzsCCpFuscqp1/UP271njNgmATXrJrXa0/xkWdEyalgGHHOfbjjGnvvN
a3Cb0Q3fMmG+HdQ7t9w1Dcll0RvB31n+zI8S8920Lv23KiK3w6sGQ5a8zYqBMFfV
J+vcn+kktq4/AH60CKKVUcHHECvsHt35dUnkEvd6y7cjLA1RxYOuByzWGAOx/szA
hQWhZcYBUtYuSId+8k5tVw==
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_CA_Untrusted"
set password ENC rc+lwtQ+SCvrjj6/2P+QaHiVhWYIN7cIbMzwTWB+8hSlIZop0SNDjkr8d4mdnHOSC9FR0GSgKPnL7AVRIiApN74zeQF7DJSJpeKwof5iQJMnEQxNCak4cJyY4E6rdCeLHaWoqyHZQzQZAPw1m+NH7fQaN6r4JovPxgc+I6FhLI7u4jyz9KpE7ZnvCIxnUUT+YvYAKg==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL"
set password ENC TlA2FrwEcB6yP6X1BhhM71QCqV5T1mHolqMEx+4LtVmOWFoRT8URuZ7AmZM5lXqHP4AD7obOzOSP3i6cOtXZM7UDyXin9T1lPFoqLXgA6lnnbOh45OghOR0j+j2p4G9pswIiRcyU76W3MLV19pLVVVbIyg2IFVPfA/Mun922q0EQkGmFbZqJA+7BHYiS+1LWdCOPUg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIXbU90EZwHakCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECNK9I+CwppR3BIIEyEcPevNuzT8F
zv9VZVEQpevT4TtZAXGkFCIN1nBsXH+xJZ+VCICVOCttvcs5xq+RC+z39i3eNG6x
59Vh1Sec2WlJoD7J3mfrL2efh0xPpLzypRA7VONCjwN3SrVL4w4VPb5Y0bOelxwU
k38+FsoAyHaapSobYRHBTnIhnzxDLEA03aFVGK8Mn3KAEnrIkhBBxmKL3H9s/+Am
27vOCvseJ6r6Zzk9VYh5WYR/vYOjB4aJGqsv1NtJIU8NAJWUphPFZLyC4xHNzHtE
Q9LL5lzTDpOaVgTa9i7DXfbPU+UMYsL7cJc0W0uYecs6PzhSMLYgasKyTPTBhyGr
UamNBbxNu/B0QYOr8enAtN6/z13IEEEO2/Z9y0TiNm1BJEZfOzNS8cvc2m/j0AvR
AJmtfn/9aighMt/rt5+gV+GCDuDf8yeLfYcrpWy+T7eSwHa9bCIXJdLTeE6nI2z/
YLg5qGVZSEwG+t0MAKTxbNDVrVp8uGWP7dyzXRJL28KdxEzakId+pQ7GbzCsK1ND
5RffM7FpI5nIvQZF02FXMryn2N2ArlvCbU8oTlDzh+8KojMe+4sRpNcpXEv2bUOi
jK8nEYd5dCy6Jd0UuBTIba6BpGUcSF7pSNJFUKVrGS1FTqKM4RMej953qYmIFELY
8AX8fqea6QUq1OzHU1EMXysqi41gXd0mtXnDf9h/eSGKplT9h0gvdKNGK1j6gaNF
jfObhnt+3EGhCAGTZ2r7bk/Xb/aE8LFjIaUuT5KFfj4EdnKIXj30h7YyTjEewPDN
kog8ZWRVq1LCjwhXY79Yw/CSvKeabPJV83lPIuuBmW1MG/qFRzt2fvvu3FSxI2Ni
x+3VR0BRHwapDwb+tu8/ED1l9daP/vVFSls13ySjOT+245GCWVAYGdRnGMbsUP39
PBoQK2wCSLeNsWZEwiGUxf+ASJEg/svBT7h+3BVwG8lOZ+6fr6i7eWMMbP45UZ7Y
in5Qa330MqV1iW2jt55o12J0in0V/mrF5gm21qbO9JfN67PyGg/XU613pyoI4ZDa
YCudt0tALnyYscGmQJY9Z+5XlZpOwY0c+u41/3/4RgIC1wszOo2LAOOvlGVnHuJE
VfA4xFKyQ/HoDEspuk4uT3/CLFEj4UiQ0qpdcebj6u16tzPlNftbtqad8N1cbLRX
iKGa4HkynF3N+I5n6DZLkBHcFDsmSEDB2Y8PmBLlj0/s26/SNYG/u/PPmmCIOgRS
xDdIt2az6gjihAkemErVVinS5HaXTy8l0TkrB3dgJZhg0HzSKfy2qJmK+6SSj3WN
IZTCiALMe0HwVd4IpWjn2tuN6AUTUmHhCxjnlUsggXHR4dgAcrIjaRUffvyApqJS
KulpyZUwaGIIdzxanQtqdR5ez2rWKRGGMQLfhsjJQs53+Tq9v1Lj2ew39gQXDj9o
uvwF4Ov4Fh0LgJ5sneNxk0hi2AL4TShQ5uSRq9A0gEYrdtBG68/kOG+I+EhsWiuH
t8wwdPwj06+2u5Nqh1/4ayZFpKsB1ZHgeeBv5+R2TiNm91bouCFfbAElJ1fESaxo
ziQ/VvGH62TPgJ8MhSpIgeP4UUhG54B3CmobrVpmWjM0IB0jKKB5nKR2bVi6FtYN
SrdFbS0hoQwR7MLiwPRXKQ==
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIID4DCCAsigAwIBAgIINouUEMkAelIwDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV
BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx
ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM
EEZHVDYxRlRLMjIwMDIwNDgxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu
ZXQuY29tMB4XDTIyMTIwOTAyMjMzNloXDTI1MDMxMzAyMjMzNlowgZ0xCzAJBgNV
BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx
ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM
EEZHVDYxRlRLMjIwMDIwNDgxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu
ZXQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtsLFBAuNUvN/
1LQy9mAI7VkhHMMkhVeLPa+N4tXINcm3P4SVVyFWdjbAGRwNmlDX/iT4H1JB6GQE
AVJRN54DK+1rFIMmBFtO88agMD14e1LvLiFvGHNj+SMG6GMzV96Fz7ivDZt4XkZ9
wT+fqcGgEh8ASmpY14UUUo2HkbVsZSLxNGcis9PTQc+lImyhhJjJBBw8DR2I5S4L
tgwdth3ACSYsIf+wnoJyJwXr52TCj3XUEQjUiC8yEyS7vaKTd4Xy9ZNOftNSXWG7
NpofXCjonKfSWYHB/ixSdpbZUjooxfPc/uwlOC3PFdMHNyvNFV48///oEsrztBPB
VALVfKt0eQIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMB
MA0GCSqGSIb3DQEBCwUAA4IBAQBkbnSYY3fPuniCX70hM4PDyj08OyrAf9nYFPOf
SOmrKBwBrVFQn5Lnfx1vh5NkJOU98RX01ufZQpWpUAIacVyaz44oWEWmHams6XlH
qyQ40CzyLof94rB5YqUzXtE57uOFgsEROK3mNIik8NhWgYQRpV8o+FtbbV+Hhyxw
EhYAlE2HjS2SJrR20Ax8VVachIU44VhO5hab5zep8XgP0Yxqe3n/un0S2MsGTTUn
J++Z7V9NnsZSfdAFeuVQejBxtM4WW4PDlr+UcTPjTqJ2nGk9XyDCapxbP9Z7U3ke
kiQT9P0UWjweAqxR/T7629nuN57qb5b4t41mLy6jyCb+WMDe
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_GUI_Server"
set password ENC Qg0lGFmGzNoJHgCiorPh/ikJ32Z1CZLQOaLGFVyxp6iKF1WhtefDQU+XdX+cGYoDTTGLCQwvbZhQaTR2Ku1XGtEDAcwj5BcJJwiPc71AsjTuwqnMwu6+VNcU0hDQaMYHsGiFnogxinvLSGcn+OS4/ifn1JrA3xefis/MSZsuP77zrJshgyfkMGHkEIj+f5XRb4PuQw==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670570294
next
edit "Fortinet_SSL_RSA1024"
set password ENC YnXX/ijAsbwXhqnCyrS4URhqJg/M6d7lJZ1MUJ1mNiOJphGhQuk/nvqUUV0KFpInfCzDtUGLWJVrFkVdPg0UaZGOVfxqye6wKcVySH/qAjZMU/nNxlJHlbfJFZgrlAunreasTChuXJg06ODDn3ZE/bPEHcFUvday8Md6tjSLv+RHmtxV4TFbRAA/WrE567TS4jRShw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_RSA2048"
set password ENC 9d0ACGkLxCD0zwEI3wMiIiHF4SZk39XNOybnJ/2YPnpxyOig3XDffmiDebIlli66VWjBZROjUt/q0VTQExiXBN21e3P+VMFT5dYtOC4yJf6THnLkxRUjuqBkMaW1HXlZbdPNTtFCYQ9xk160FTrXPTrveQMNbPfw0OsOdFZEFgn/PEOkEiXnpsAefs5YRX7nBab31A==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIz7WbdmDRFMcCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECB9zmFpJTt7/BIIEyAJO3AgqBI2g
nTgjwHJe8hFqlNr3jHh/wX6kxUaEXy27IrvKRkCxxKiuXrWdAlUUPEbTbuzoQ51c
JBZyQnTxVdj5H5cFvXQ8wByyQteSYbRv+JWGKYLHx9fJE1WKL+qKbGGSjJAVhTUL
GtARf3Y8VnoxSKlhKhLJpgLabUs/N89pr/Z5JJ6S+dCX2xWNH1QAjiaSMQmRiYXe
IMdncTAUbguOkVm1xg05+pzutFevnvt1Ep3AikwIaPqoAt0DMPJFOO+nO2Qy/ns2
OArQNk4fc1DVmvTW9bcKIxR/O0u759rbFt56ss+/JBPXfcl+r1Btul9v9D99dyHK
KT2w9VlNKAY6+eB/+DCyzolCB/TyiwEJsxQ92mC62vrKfXJMcvru+++htd6WGFr4
81P6o+KS3KVNVypr/B0wPWjYiggSAOI6Z4DnYsxpnhj0pFSagPvRYz8Cx9I2CfUJ
nTU3p81MhkWUXVPkd+JILkh5Mc49NiTe6ABbdX0EeD4RtrS9DngBPdOk2ImZQYQz
mx4NZz2ZfRFJmAEqMVmr9PTbS8oGl0Vy8rnaYtiDefueXMlDHG5hINZHZMEGgsoj
EKz7Tl/cEEc71AMcGecM2TQqHmr4pVknW8iygafNUBEuZNPc7whI/yOxqw/9ZBFY
/IU+LLdaRCbZzNhPOyDg5ggI5id7ZrpuzGzMOH04TzcX2hYsvQZD95sZDX21F276
KhQ4jWDYfeKDxb4lqvfYeuyElrNPh3KLke0N5SRjxIrgKKbFTEBpudgptCz1W9A7
9pKfn4Q3pFXoot+IduKFbp6y2Jem/7XCnPamdRara2ME3SV6dixdmzB/El7NG0WT
pO/HMGfAJWqG/5oUB5IKiuMqxrqviakQsW9T/nZbrG00bOHSL8fK/jxUufgnCIek
L6R/LIzw+wWptm2BHo1CWAQHKSrdasL0CJKsxx3I7YpbCIdHFf5FbP6QObiUPI7j
p7+FLM/IOz9nfKr7ibEAlakJFxZI87zV0HXMi9bvKHs+s9QOQ4RMHTzD64WDr/Xv
lu4yuAFFM38sdJADY+puhDkpABDcmluXLOhtkni/YHDI3NykNe3iv4FAT8t/AbmP
IxphlEUjR/+aUKiot+W8G9p1xG4TYVGlx5dkzSpUSWxHQ9NtEZLwcf4+rkkfTM5B
ETIFE8rfLVzgNN1AgDAK5kDW7TKqhtwGHaH6w2F0gpzBgJizvW4KGgA/y45YCiQi
rS4o+zIcef0D23JDjA8j1a4jrwPkZ49O+xFeOCmiSSLxEvPGoIpHt15H2SkEl4/a
tYv2FcfJgK8V3EJ3zr0eYUdtHGUWPeDCy5+IiQsdt3VWcwY1t8fmlALgED9RXZDB
DpEqskyYoChSlFwunKh/0xCRnRCTYV6uoFNABMF/DfzxDJ57L5mkRK/vXj6pLlvL
mSLYc7TrZOpbXLW5XKOecmjctX/8aZ/thcLIM+uKaObesAkZ05ieY08ANqmxVnuA
2is3byJPQBIKrdXfL/kM0ZPNIyZZxVZQx1MAPLr0K5/bxqPRPXSh5qMaCrqgHthe
toCmyJvT3JSdcGX4yUGbqgBDAM/j0IxNxbOcFbyyjwk1fyj+PSn9FcEqMEZOWOYX
7okb80Oe+D42qEzJFzcQNg==
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_RSA4096"
set password ENC xj0SKGDMXvy229v3s/d4s5rY2HmbK4jbAC4a10QrdrQvpN+VY6tiL7dRIvd9R9cvEfBgcUfVaHj4BhpUs1d1h1mpSN9YjKCt4fB6v36TT/CJ3s1FyY9DXHhvg2inV/vaULqAeaSb+M8Wv7rDadA2gHJZF+W+8JOdjUlwe38vLgenWlLgW+51c3PTXJexBoAOrYllng==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_DSA1024"
set password ENC B7V9oOYeVo3C79DQwsmHZjNOCGWo0D6OPgQ9Wz2ztPTdOjTaDKKAhBGFhySW+A2KvWVWCbFO8L9g1WeYB1kqc7oZ8wo2llDiR9bhysGJNmWr52HKyFTTP7Zm8sT/jykVxRMtznbiW7oNzcyHBK3/5SlD9Nm/KbaiV9NvewSRjzJIErnQPkupYvz/NEbuKVrwf6c7HA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_DSA2048"
set password ENC trxRE8UFa7eV0aUYcMDm+KC8cgy3PUGf6LRHVVas8Jc1vZ/7UhuFEOXU7WkwDNh7rUR/wWqa6mtNAWo0XLVUAkQm2EQf5mAcULyV8PCW6SJm3QddqngKBgFYyAdJ/opk/6VejE1uiSPCMe46QLFI64h///T8jfDE8WrZ+AoaKjEvoOt9AV5eDrEFVQ3MoCoo9lTBcA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIIFRDCCBOqgAwIBAgIIaaKkZ+UP2W0wCwYJYIZIAWUDBAMCMIGdMQswCQYDVQQG
EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw
DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG
R1Q2MUZUSzIyMDAyMDQ4MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0
LmNvbTAeFw0yMjEyMDkwMjIzNTZaFw0yNTAzMTMwMjIzNTZaMIGdMQswCQYDVQQG
EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw
DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG
R1Q2MUZUSzIyMDAyMDQ4MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0
LmNvbTCCA0YwggI5BgcqhkjOOAQBMIICLAKCAQEAhlNPPhmAn6EoipFsfnpbXGeM
/Y/BymTgOg6mMZonDKC6UnPviwBLQ8NvxILNWOMgv8NSRicaazw+6Iqo3QvrCaqk
S3zdfpvHP4PHe5WBKFxX/U022RphkahZ2rSnHigmCLjIZ/37Uqe3sDkdWX1+lLhX
4hdH/bv97u5Zw7jVj5zQH9gzXzCgAWk9cIIn4RtrxEvGIGZ30501KljvbNH/L3NH
YuGuRVXUffrkc8K53Er2wcUqZOusYOsuklq7PGaxeewjdWmGv/KHJhNH5dui1Dsu
QIh2LTcVgXH/WiyI1SybfC5L85LaV92oEHT8BfKmcoW+sATX32O/Mc5lGtGTpwIh
AILJviNIRglFyR7ILX0xXAPiOCTr1oqaRAGpdQm78JjTAoIBAFMN1Q26fLKXf0cY
+6mgU+VEnbswBXLO/TaAQ4/dfQDROzDfPTT49fAvp1ckMy1FpRyWMa9wSQ8+Se0s
ygwdVF+Nod/ZKctBMY9pWtXxM8hiyGFbb8MI+FcRGR2WeLL/18G2zXHFTSMfRR69
/DbI9YJQJ5V2AF0XUeH5Uf8G7+O1hVOqUZ5P8x4k1np7hHqqwywert6TGZE9VMVW
T8En8RLglnDxPSgCArxWw1OK5FU4z7vRy7cU2rsOVOsL4r0a+4evorZYOGGbtGJr
T2DVOTV9v4IWn2JBeSu5hVuWJd8c/dDe1VBbtlb981iLK68tIQbyG8mljHDjTsWC
Bw6CcVYDggEFAAKCAQAB4ThSs2p3ABKtjmEfTlH6wOno2Or++6ypF1EeBTGSS0Pa
V7EoHULYglH1MIVViWy81yeoj1QGu0VjM+8AJQ6fmYJZ3w2VYwjTvwBWQWgVNZYg
x887eTjfZy2a8ecUIMU8gQ6+2Oj7m+nQ4nchCvIXiOOWQIJ2PqRMUDZTqrFZeW08
uuxsjO2UQEUe+cTZtRd2RXUciG821itVwAI5sKi/lx6hID4qfEl5YZR4ZSSI7UEm
b5oKh+zHVGtil2vLAhXp2DuJC5MO9BlJKDNdrfPHLkT6RI2Xvl/gEZfL/GJuTl7Y
3JsmGYqMih5zluT8tIlhLTxVSh2/diYqSvw1kpBnoyIwIDAJBgNVHRMEAjAAMBMG
A1UdJQQMMAoGCCsGAQUFBwMBMAsGCWCGSAFlAwQDAgNHADBEAiAk3OL1nWrbcMuT
92GVqMDGMBxlEcEHDuTexYfdVpsYmwIgPR209sUJBOSbUmjjrxGlD3GA6De5s0Mb
mna3NwuIEbs=
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_ECDSA256"
set password ENC kqVQeUhHV9J1TXAUrX++h3UGWazP9uEmUlCbu5eeewCChSlDlOuItuKYa4IzYBIPWFP3w1e9WNE/wHqnLygmuIz8yUztcb6p3npiQOmgbH1REMSAvcKgJHHo7R3CtGO7dfWNm3UxcPWYhMWffyMoaW9e4A8Q/n8DP4445KxAxEqw2guPkcKWlF73/XFdUn/1CZ1W3g==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAiW8fyujnZkRAICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI44vkUqgMGNoEgZAikHLXEewsml3m
WBzZzqxSQUwjlQGy8+UPhwWiP1aDpM8TE1y7vofy27I33WdD3CPdhuPd093cyi/O
ohmvWxvmx3wG9XFgDN36oi3QpMn3hr1t4tnEOtccG/BugMaIYWFlBHbtOOI+yJnR
e8T2V0D3cGBx3vyA17uDb+wKMW/KWNtCEExh6p/E/SMUhGTlzFo=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_ECDSA384"
set password ENC ELM0O76pQwBaPytmUeNaukueibFckzh6KGSGzP24Bi0GlQI9aeFBUOA6M5plp/dflt3YEDNP7QX+vCvWVVuCN0jq5yv1TOfW//kxZlmZ9KaXZ1lgvDdPIg0YuPxDQ9eAkyIItydOSlRoTtL2C76jjNrQoa8rw0SX+7Nxh+iC1+z8s0J0EtMTYfwMcbokw/a3Ft/Yhw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBEzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIafsrc5366ooCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECON8BZNZtE/sBIHAnYZQaJCp4t3Y
nE9p5SDDzcbrqC7ZAmq1VfOph3XW2PeAwT9GgZSQgQ4lRvWln9Jr1TPsy8yQGQGB
XyMag2wF8Cv7PYw75hnGzDg26mB9ATjDihpdZVjjA+AiC5R8/0gmNFthvzEBjak8
ducclx5nFXJ+7RUNq0hJr+wpCz0LAjWDYjbJIN2DLiDPt4zFPZ3EU2kcQdhkUJ5Q
umkymE7c0K/gR+S4xVbWG6bT3F/cdN/jL7LPpZxbkYcxRjlo47vz
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIICkTCCAhegAwIBAgIIWOT1OqGLt/MwCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT
AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP
BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH
VDYxRlRLMjIwMDIwNDgxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu
Y29tMB4XDTIyMTIwOTAyMjM1NloXDTI1MDMxMzAyMjM1NlowgZ0xCzAJBgNVBAYT
AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP
BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH
VDYxRlRLMjIwMDIwNDgxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu
Y29tMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEYIXkZafBnfSNKeySJXB48eBYV0wX
2DVWFHVOYA08UiIwN2YI92+NOqZ5Q/uTEOG9HmrOGWBKVhMpaqJJTyC/y5T14jj3
2j7gkDQmZF50P8XdM4rJafu2/elrQ0c/aqRpoyIwIDAJBgNVHRMEAjAAMBMGA1Ud
JQQMMAoGCCsGAQUFBwMBMAoGCCqGSM49BAMCA2gAMGUCMBOyvdawuw/kvqJ1gJMl
vXKPVF1PMOX0N4nT5Wve5DUHVpxwTk9yYfvaJLD9MFFTZgIxAKYTuriqAvvP+JrC
2zhskwD8EvhxpR9S7dqXgW+7Ug0hp5wi3mlTA9xpFCtvyQp/rA==
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_ECDSA521"
set password ENC xEFRO/3bQyz/Q9iI4d2XgxjdzmuY0GdXxUgmhF07LxGNNxrfWqTn7cRmUG3Mo3qgAk13xXFbZ0L28jD7JfXKbo1w+51qrYbBqa6y4DmVlFnahF8krAKZ7E4I3kKbj5BqmqJn66RD2DcsOhzLXmTrMv/LUbuVTW8ljVrlq6x9W3UjrZKOVVCGLbDN6FNSxnTTBG2lAQ==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBSzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIm6/gQ8VN4dYCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECGGXd5jY/a1eBIH4xpxxxSKh39Hq
ORspnemKe0c9VTrreQNxkjyY9f4aJiAzOO0ANLMw1gh2r3/F5E9X6oRSnviNy623
6zkQ9Tiw/pxQQnkRUga0eowsYydNQ37YMuV6oci04tfpsMSAezy2BbSQJmqtnb53
vL3zxHmQDGryB6NSDi6vP7Mrahk9jd1t5/mT2oBIQkGzBmgqvriQjrCSI/qe4jvC
0lB61jAFIfCx7i4mapp6XA0WI27KuFHvrOUNr+7c5o2F5aNW12sE71yd4DboODWm
gxj0kYCQNiN5b7hg9+511nk+xPYKg3I7aYmvqL+z/Lp/UUwl9x6H4SjzlkKBJbs=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_ED25519"
set password ENC jN4RG97haGOgfIIRegc4q7Bdcr4ysCp0Um/mwVht5fanEAsuw+rfDAmzduqMWRt1Qz+BVuod7s/kgF58shjzDINOcC/2Rvl4okycGugwLhjXcsjrfEjhoQ2xcbPT37jkPhodW0EgL+Y4aFIDSnWfJKB9ufK5RZtuVoQOt13EL49FiHz3m2BE6E7Rps+mxXxLQ9pykg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGKME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAh4/lZ2mxzzcAICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIohdyZxVSTtsEOOe9t7+6AhTnWkE8
B5hVyI6Wg01h8h2r8meQnF3Zz245cm7tPBTzm1T+pZqwV6xeAK2HDl9LvqAh
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "Fortinet_SSL_ED448"
set password ENC Ne79gjx/eCSYd4agThtF+45FJAEoEueT7PuyI0+6Ap3Gykhnzc4OFbXyz8qyKLxBI2AMlLmiJo/iqEQf4KH+LegM7iuC09XOOC6K261NIiYywHc1tyE/S+bCnYzpERMUW/LuTnz7EwwZhEu5dTpnidEQLMNDA1rcWaDUi/txVq2A3+WLZPTvQVp5WYhCaUv3P0ZHBw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGiME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAhRaz6SW/3mowICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQINQ6Qx5peIkgEUHTVPAYiFJb9j8IW
zkOd+DPQkgJc67OzRqjXo4ol+Y2aldc+k02c0Q5ZaU4tbRQ6csgYkRyRonTCB7ZW
pM053FLppoxS/O+MaAe4P5RbJeBh
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1670552640
next
edit "wildcard.tahoho.com.tw"
set password ENC uNEVe0bJmBhyDLIeOcDTTcGC+B5RGN7V0v8Ziyj7gnicnSpD7vhZUs919klfs+43FPbFMnTJGbHIh/g7l8AKFYgIji01O9OlR0e7IMvU9umzYdUj7ioS4Jh22lTxRf9my0Ri5bbzOLLgcRirQdIE6yAzoCo/heF+RV3sBRQkOx99nr4u12W1CNpD8lZzqsRHqDkclg==
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set last-updated 1670571489
next
end
config webfilter ftgd-local-cat
edit "custom1"
set id 140
next
edit "custom2"
set id 141
next
end
config ips sensor
edit "default"
set comment "Prevent critical attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "sniffer-profile"
set comment "Monitor IPS attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config entries
edit 1
set severity medium high critical
next
end
next
edit "all_default"
set comment "All predefined signatures with default setting."
config entries
edit 1
next
end
next
edit "all_default_pass"
set comment "All predefined signatures with PASS action."
config entries
edit 1
set action pass
next
end
next
edit "protect_http_server"
set comment "Protect against HTTP server-side vulnerabilities."
config entries
edit 1
set location server
set protocol HTTP
next
end
next
edit "protect_email_server"
set comment "Protect against email server-side vulnerabilities."
config entries
edit 1
set location server
set protocol SMTP POP3 IMAP
next
end
next
edit "protect_client"
set comment "Protect against client-side vulnerabilities."
config entries
edit 1
set location client
next
end
next
edit "high_security"
set comment "Blocks all Critical/High/Medium and some Low severity vulnerabilities"
set block-malicious-url enable
config entries
edit 1
set severity medium high critical
set status enable
set action block
next
edit 2
set severity low
next
end
next
end
config firewall shaper traffic-shaper
edit "high-priority"
set maximum-bandwidth 1048576
set per-policy enable
next
edit "medium-priority"
set maximum-bandwidth 1048576
set priority medium
set per-policy enable
next
edit "low-priority"
set maximum-bandwidth 1048576
set priority low
set per-policy enable
next
edit "guarantee-100kbps"
set guaranteed-bandwidth 100
set maximum-bandwidth 1048576
set per-policy enable
next
edit "shared-1M-pipe"
set maximum-bandwidth 1024
next
end
config firewall proxy-address
edit "IPv4-address"
set uuid a507a25e-7791-51ed-bbd3-7b65d6b26053
set type host-regex
set host-regex "^([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\\.([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])){3}$"
next
edit "IPv6-address"
set uuid a507a8b2-7791-51ed-4e9a-48dfb135c332
set type host-regex
set host-regex "^\\[(([0-9a-f]{0,4}:){1,7}[0-9a-f]{1,4})\\]$"
next
end
config web-proxy global
set proxy-fqdn "default.fqdn"
end
config application list
edit "default"
set comment "Monitor all applications."
config entries
edit 1
set action pass
next
end
next
edit "sniffer-profile"
set comment "Monitor all applications."
unset options
config entries
edit 1
set action pass
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set deep-app-inspection disable
config entries
edit 1
set action pass
set log disable
next
end
next
edit "block-high-risk"
config entries
edit 1
set category 2 6
next
edit 2
set action pass
next
end
next
end
config dlp data-type
edit "keyword"
set pattern "built-in"
next
edit "regex"
set pattern "built-in"
next
edit "hex"
set pattern "built-in"
next
edit "mip-label"
set pattern "^[[:xdigit:]]{8}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{12}$"
set transform "built-in"
next
edit "credit-card"
set pattern "\\b([2-6]{1}\\d{3})[- ]?(\\d{4})[- ]?(\\d{2})[- ]?(\\d{2})[- ]?(\\d{2,4})\\b"
set verify "built-in"
set look-back 20
set transform "\\b\\1[- ]?\\2[- ]?\\3[- ]?\\4[- ]?\\5\\b"
next
edit "ssn-us"
set pattern "\\b(\\d{3})-(\\d{2})-(\\d{4})\\b"
set verify "(?<!-)\\b(?!666|000|9\\d{2})\\d{3}-(?!00)\\d{2}-(?!0{4})\\d{4}\\b(?!-)"
set look-back 12
set transform "\\b\\1-\\2-\\3\\b"
next
end
config dlp dictionary
edit "def-cc-dict"
set uuid b072dac8-7791-51ed-a16f-4f691f70493f
config entries
edit 1
set type "credit-card"
next
end
next
edit "SSN-Sensor-r1d"
set uuid b0734cd8-7791-51ed-f4bb-dca258a0a625
config entries
edit 1
set type "regex"
set pattern "WebEx"
next
end
next
edit "def-ssn-dict"
set uuid b07423a6-7791-51ed-54e8-93a9b356cfd0
config entries
edit 1
set type "ssn-us"
next
end
next
end
config dlp sensor
edit "def-cc-sensor"
config entries
edit 1
set dictionary "def-cc-dict"
next
end
next
edit "SSN-Sensor-r1s"
config entries
edit 1
set dictionary "SSN-Sensor-r1d"
next
end
next
edit "def-ssn-sensor"
config entries
edit 1
set dictionary "def-ssn-dict"
next
end
next
end
config dlp filepattern
edit 1
set name "builtin-patterns"
config entries
edit "*.bat"
next
edit "*.com"
next
edit "*.dll"
next
edit "*.doc"
next
edit "*.exe"
next
edit "*.gz"
next
edit "*.hta"
next
edit "*.ppt"
next
edit "*.rar"
next
edit "*.scr"
next
edit "*.tar"
next
edit "*.tgz"
next
edit "*.vb?"
next
edit "*.wps"
next
edit "*.xl?"
next
edit "*.zip"
next
edit "*.pif"
next
edit "*.cpl"
next
end
next
edit 2
set name "all_executables"
config entries
edit "bat"
set filter-type type
set file-type bat
next
edit "exe"
set filter-type type
set file-type exe
next
edit "elf"
set filter-type type
set file-type elf
next
edit "hta"
set filter-type type
set file-type hta
next
end
next
end
config dlp sensitivity
edit "Private"
next
edit "Critical"
next
edit "Warning"
next
end
config dlp profile
edit "default"
set comment "Default profile."
next
edit "sniffer-profile"
set comment "Log a summary of email and web traffic."
set summary-proto smtp pop3 imap http-get http-post
next
edit "Content_Summary"
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Content_Archive"
set full-archive-proto smtp pop3 imap http-get http-post ftp nntp
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Large-File"
config rule
edit 1
set name "Large-File-Filter"
set proto smtp pop3 imap http-get http-post
set file-size 5120
set action log-only
next
end
next
edit "Credit-Card"
config rule
edit 1
set name "Credit-Card-Filter"
set severity high
set proto smtp pop3 imap http-get http-post
set filter-by sensor
set sensor "def-cc-sensor"
set action log-only
next
edit 2
set name "Credit-Card-Filter"
set severity high
set type message
set proto smtp pop3 imap http-post
set filter-by sensor
set sensor "def-cc-sensor"
set action log-only
next
end
next
edit "SSN-Sensor"
set comment "Match SSN numbers but NOT WebEx invite emails."
config rule
edit 1
set name "SSN-Sensor-Filter"
set severity high
set type message
set proto smtp pop3 imap
set filter-by sensor
set sensor "SSN-Sensor-r1s"
next
edit 2
set name "SSN-Sensor-Filter"
set severity high
set type message
set proto smtp pop3 imap
set filter-by sensor
set sensor "def-ssn-sensor"
set action log-only
next
edit 3
set name "SSN-Sensor-Filter"
set severity high
set proto smtp pop3 imap http-get http-post ftp
set filter-by sensor
set sensor "def-ssn-sensor"
set action log-only
next
end
next
end
config webfilter ips-urlfilter-setting
end
config webfilter ips-urlfilter-setting6
end
config log threat-weight
config web
edit 1
set category 26
set level high
next
edit 2
set category 61
set level high
next
edit 3
set category 86
set level high
next
edit 4
set category 1
set level medium
next
edit 5
set category 3
set level medium
next
edit 6
set category 4
set level medium
next
edit 7
set category 5
set level medium
next
edit 8
set category 6
set level medium
next
edit 9
set category 12
set level medium
next
edit 10
set category 59
set level medium
next
edit 11
set category 62
set level medium
next
edit 12
set category 83
set level medium
next
edit 13
set category 72
next
edit 14
set category 14
next
edit 15
set category 96
set level medium
next
end
config application
edit 1
set category 2
next
edit 2
set category 6
set level medium
next
end
end
config icap profile
edit "default"
config icap-headers
edit 1
set name "X-Authenticated-User"
set content "$user"
next
edit 2
set name "X-Authenticated-Groups"
set content "$local_grp"
next
end
next
end
config user ldap
edit "Azure-LDAP-Secure-Server"
set server "gsvr.tahoho.com.tw"
set server-identity-check disable
set cnid "sAMAccountName"
set dn "dc=tahoho,dc=com,dc=tw"
set type regular
set username "tahoho\\tahotbhq.admin"
set password ENC cGxfbBRqNrVab5JzN14VAi71IwXxPff3OgdcyfJ8sT1+oe18+C11egu2Esaa1UJ9VATWXNoB29zNIR0VnDspgi6YXk9U71X3RWxIzWUOJHPylP/NUl/c0MDNvQXphFImL6RFV4qYec2WhkNdEv6KVVOnL1CZ2pFAHfaJQNzkGOWWC06MRsstwNwvTf7fb+ssPVV9mg==
set secure ldaps
set port 636
next
end
config user fortitoken
edit "FTKMOB2CF2332175"
set license "FTMTRIAL0860894A"
next
edit "FTKMOB2C70C48229"
set license "FTMTRIAL0860894A"
next
end
config user local
edit "guest"
set type password
set passwd ENC 5HVO427FNMt8mxT6jY1H/8L3C2WOs/+1PYwsSX6nosEfGwzPcYGpoxUz/bfE2zsb0p3gAFtS+stBb8p3FF3C9NFKLvLT9QSBJGaNyfCGBXQGsvCHCwKxILI7xQ+Et8ecFQ0kSkCnBPdMZMYeiSmz6877bqGkcqaGmeVEzux1Bm6JBoQeciH5dAsirm8yuXajjbFJZw==
next
edit "renhua.gu"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "chaokai.kang"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "itservice"
set type password
set passwd-time 2022-12-22 14:49:32
set passwd ENC sRhI5QvkdY2nu77cXfOSjaYOEU/IbJXsSMayHYpBFdQcacmTs9g/pp2kGRRO8IQmy+K6WtOIxgpn+XATDPwTz7yvuBVcqmJGKTk1PuAYIRjw3jBw4YYAu8tCiixmutEVwumVkw3c7DRXJ8z3TzQdT07RwTMs1hoP6XNgACwaxicV6E5bkBw2EghFIuq9NXAlQh6dCA==
next
edit "B10013"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "B20012"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
end
config user setting
set auth-cert "Fortinet_Factory"
end
config user group
edit "SSO_Guest_Users"
next
edit "Guest-group"
set member "guest"
next
edit "Azure-Remote-User-Group"
set member "Azure-LDAP-Secure-Server"
config match
edit 1
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Install Domain Servers,CN=Microsoft Exchange System Objects,DC=tahoho,DC=com,DC=tw"
next
edit 2
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Access Control Assistance Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 3
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Account Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 4
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 5
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 6
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncBrowse,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 7
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncOperators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 8
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncPasswordSet,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 9
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Allowed RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 10
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Backup Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 11
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Business Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 12
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cert Publishers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 13
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Certificate Service DCOM Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 14
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=CERTSVC_DCOM_ACCESS,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 15
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cloneable Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 16
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cryptographic Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 17
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Delegated Setup,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 18
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Denied RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 19
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 20
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 21
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Discovery Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 22
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Distributed COM Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 23
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 24
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsUpdateProxy,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 25
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 26
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Computers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 27
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 28
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Guests,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 29
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 30
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 31
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Key Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 32
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 33
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 34
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_BL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 35
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_CY,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 36
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LT,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 37
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LZ,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 38
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 39
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_SL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 40
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_TC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 41
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_WC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 42
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_XD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 43
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_YK,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 44
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 45
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 46
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_public,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 47
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_Manager,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 48
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_PAC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 49
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Event Log Readers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 50
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange All Hosted Organizations,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 51
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Domain Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 52
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Enterprise Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 53
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Servers,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 54
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Trusted Subsystem,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 55
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Windows Permissions,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 56
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ExchangeLegacyInterop,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 57
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Google 雲端硬碟,DC=tahoho,DC=com,DC=tw"
next
edit 58
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Group Policy Creator Owners,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 59
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Guests,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 60
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Help Desk,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 61
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HelpServicesGroup,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 62
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeTeam,DC=tahoho,DC=com,DC=tw"
next
edit 63
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeUsers,DC=tahoho,DC=com,DC=tw"
next
edit 64
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hygiene Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 65
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hyper-V Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 66
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_IUSRS,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 67
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_WPG,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 68
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Incoming Forest Trust Builders,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 69
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Key Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 70
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=MTS Impersonators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 71
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Netmon Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 72
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Network Configuration Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 73
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 74
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Log Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 75
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Monitor Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 76
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 77
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Print Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 78
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Protected Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 79
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Public Folder Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 80
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RAS and IAS Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 81
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Endpoint Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 82
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Management Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 83
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Remote Access Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 84
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 85
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Recipient Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 86
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Records Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 87
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Desktop Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 88
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Management Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 89
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Replicator,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 90
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Schema Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 91
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 92
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 93
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Smart Phone,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 94
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SMEX Admin Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 95
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSFTEUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 96
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSSQLUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 97
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005SQLBrowserUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 98
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServerMSSQLServerADHelperUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 99
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Storage Replica Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 100
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ApiGateway Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 101
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ASN Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 102
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Centralized Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 103
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 104
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHONT $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 105
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 106
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_loc,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 107
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TelnetClients,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 108
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Terminal Server License Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 109
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=UM Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 110
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 111
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=vendor_group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 112
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Veolia Distribution Group,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 113
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=VeoliaSecurityGroup,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 114
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=View-Only Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 115
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Windows Authorization Access Group,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 116
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WINS Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 117
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 118
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Reporters,CN=Users,DC=tahoho,DC=com,DC=tw"
next
end
next
end
config vpn ssl web host-check-software
edit "FortiClient-AV"
set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7"
next
edit "FortiClient-FW"
set type fw
set guid "528CB157-D384-4593-AAAA-E42DFF111CED"
next
edit "FortiClient-AV-Vista"
set guid "385618A6-2256-708E-3FB9-7E98B93F91F9"
next
edit "FortiClient-FW-Vista"
set type fw
set guid "006D9983-6839-71D6-14E6-D7AD47ECD682"
next
edit "FortiClient5-AV"
set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7"
next
edit "AVG-Internet-Security-AV"
set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF"
next
edit "AVG-Internet-Security-FW"
set type fw
set guid "8DECF618-9569-4340-B34A-D78D28969B66"
next
edit "AVG-Internet-Security-AV-Vista-Win7"
set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82"
next
edit "AVG-Internet-Security-FW-Vista-Win7"
set type fw
set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9"
next
edit "CA-Anti-Virus"
set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93"
next
edit "CA-Internet-Security-AV"
set guid "6B98D35F-BB76-41C0-876B-A50645ED099A"
next
edit "CA-Internet-Security-FW"
set type fw
set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3"
next
edit "CA-Internet-Security-AV-Vista-Win7"
set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F"
next
edit "CA-Internet-Security-FW-Vista-Win7"
set type fw
set guid "06D680B0-4024-4FAB-E710-E675E50F6324"
next
edit "CA-Personal-Firewall"
set type fw
set guid "14CB4B80-8E52-45EA-905E-67C1267B4160"
next
edit "F-Secure-Internet-Security-AV"
set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15"
next
edit "F-Secure-Internet-Security-FW"
set type fw
set guid "D4747503-0346-49EB-9262-997542F79BF4"
next
edit "F-Secure-Internet-Security-AV-Vista-Win7"
set guid "15414183-282E-D62C-CA37-EF24860A2F17"
next
edit "F-Secure-Internet-Security-FW-Vista-Win7"
set type fw
set guid "2D7AC0A6-6241-D774-E168-461178D9686C"
next
edit "Kaspersky-AV"
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-FW"
set type fw
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-AV-Vista-Win7"
set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE"
next
edit "Kaspersky-FW-Vista-Win7"
set type fw
set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5"
next
edit "McAfee-Internet-Security-Suite-AV"
set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83"
next
edit "McAfee-Internet-Security-Suite-FW"
set type fw
set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8"
next
edit "McAfee-Internet-Security-Suite-AV-Vista-Win7"
set guid "86355677-4064-3EA7-ABB3-1B136EB04637"
next
edit "McAfee-Internet-Security-Suite-FW-Vista-Win7"
set type fw
set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C"
next
edit "McAfee-Virus-Scan-Enterprise"
set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0"
next
edit "Norton-360-2.0-AV"
set guid "A5F1BC7C-EA33-4247-961C-0217208396C4"
next
edit "Norton-360-2.0-FW"
set type fw
set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3"
next
edit "Norton-360-3.0-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-360-3.0-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-Internet-Security-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Norton-Internet-Security-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Symantec-Endpoint-Protection-AV"
set guid "FB06448E-52B8-493A-90F3-E43226D3305C"
next
edit "Symantec-Endpoint-Protection-FW"
set type fw
set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6"
next
edit "Symantec-Endpoint-Protection-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Symantec-Endpoint-Protection-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Panda-Antivirus+Firewall-2008-AV"
set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A"
next
edit "Panda-Antivirus+Firewall-2008-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Panda-Internet-Security-AV"
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2006~2007-FW"
set type fw
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2008~2009-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Sophos-Anti-Virus"
set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW"
set type fw
set guid "0786E95E-326A-4524-9691-41EF88FB52EA"
next
edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7"
set guid "479CCF92-4960-B3E0-7373-BF453B467D2C"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7"
set type fw
set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57"
next
edit "Trend-Micro-AV"
set guid "7D2296BC-32CC-4519-917E-52E652474AF5"
next
edit "Trend-Micro-FW"
set type fw
set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6"
next
edit "Trend-Micro-AV-Vista-Win7"
set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50"
next
edit "Trend-Micro-FW-Vista-Win7"
set type fw
set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B"
next
edit "ZoneAlarm-AV"
set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF"
next
edit "ZoneAlarm-FW"
set type fw
set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B"
next
edit "ZoneAlarm-AV-Vista-Win7"
set guid "D61596DF-D219-341C-49B3-AD30538CBC5B"
next
edit "ZoneAlarm-FW-Vista-Win7"
set type fw
set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20"
next
edit "ESET-Smart-Security-AV"
set guid "19259FAE-8396-A113-46DB-15B0E7DFA289"
next
edit "ESET-Smart-Security-FW"
set type fw
set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2"
next
end
config vpn ssl web portal
edit "full-access"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set web-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
next
edit "web-access"
set web-mode enable
next
edit "tunnel-access"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
next
end
config vpn ssl settings
set servercert "Fortinet_Factory"
set port 443
end
config voip profile
edit "default"
set comment "Default VoIP profile."
next
edit "strict"
config sip
set malformed-request-line discard
set malformed-header-via discard
set malformed-header-from discard
set malformed-header-to discard
set malformed-header-call-id discard
set malformed-header-cseq discard
set malformed-header-rack discard
set malformed-header-rseq discard
set malformed-header-contact discard
set malformed-header-record-route discard
set malformed-header-route discard
set malformed-header-expires discard
set malformed-header-content-type discard
set malformed-header-content-length discard
set malformed-header-max-forwards discard
set malformed-header-allow discard
set malformed-header-p-asserted-identity discard
set malformed-header-sdp-v discard
set malformed-header-sdp-o discard
set malformed-header-sdp-s discard
set malformed-header-sdp-i discard
set malformed-header-sdp-c discard
set malformed-header-sdp-b discard
set malformed-header-sdp-z discard
set malformed-header-sdp-k discard
set malformed-header-sdp-a discard
set malformed-header-sdp-t discard
set malformed-header-sdp-r discard
set malformed-header-sdp-m discard
end
next
end
config system sdwan
config zone
edit "virtual-wan-link"
next
end
config health-check
edit "Default_DNS"
set system-dns enable
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Office_365"
set server "www.office.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Gmail"
set server "gmail.com"
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 2
next
end
next
edit "Default_AWS"
set server "aws.amazon.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Google Search"
set server "www.google.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_FortiGuard"
set server "fortiguard.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
end
end
config vpn ocvpn
end
config dnsfilter profile
edit "default"
set comment "Default dns filtering."
config ftgd-dns
config filters
edit 1
set category 2
next
edit 2
set category 7
next
edit 3
set category 8
next
edit 4
set category 9
next
edit 5
set category 11
next
edit 6
set category 12
next
edit 7
set category 13
next
edit 8
set category 14
next
edit 9
set category 15
next
edit 10
set category 16
next
edit 11
next
edit 12
set category 57
next
edit 13
set category 63
next
edit 14
set category 64
next
edit 15
set category 65
next
edit 16
set category 66
next
edit 17
set category 67
next
edit 18
set category 26
set action block
next
edit 19
set category 61
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
set block-botnet enable
next
end
config antivirus settings
set machine-learning-detection enable
set grayware enable
end
config antivirus profile
edit "default"
set comment "Scan files and block viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
edit "sniffer-profile"
set comment "Scan files and monitor viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
set outbreak-prevention-archive-scan disable
set external-blocklist-enable-all enable
next
end
config file-filter profile
edit "default"
set comment "File type inspection."
next
edit "sniffer-profile"
set comment "File type inspection."
next
end
config webfilter profile
edit "default"
set comment "Default web filtering."
config ftgd-wf
unset options
config filters
edit 1
set action block
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 12
set action block
next
edit 8
set category 13
set action block
next
edit 9
set category 14
set action block
next
edit 10
set category 15
set action block
next
edit 11
set category 16
set action block
next
edit 12
set category 26
set action block
next
edit 13
set category 57
set action block
next
edit 14
set category 61
set action block
next
edit 15
set category 63
set action block
next
edit 16
set category 64
set action block
next
edit 17
set category 65
set action block
next
edit 18
set category 66
set action block
next
edit 19
set category 67
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
next
edit "sniffer-profile"
set comment "Monitor web traffic."
config ftgd-wf
config filters
edit 1
next
edit 2
set category 1
next
edit 3
set category 2
next
edit 4
set category 3
next
edit 5
set category 4
next
edit 6
set category 5
next
edit 7
set category 6
next
edit 8
set category 7
next
edit 9
set category 8
next
edit 10
set category 9
next
edit 11
set category 11
next
edit 12
set category 12
next
edit 13
set category 13
next
edit 14
set category 14
next
edit 15
set category 15
next
edit 16
set category 16
next
edit 17
set category 17
next
edit 18
set category 18
next
edit 19
set category 19
next
edit 20
set category 20
next
edit 21
set category 23
next
edit 22
set category 24
next
edit 23
set category 25
next
edit 24
set category 26
next
edit 25
set category 28
next
edit 26
set category 29
next
edit 27
set category 30
next
edit 28
set category 31
next
edit 29
set category 33
next
edit 30
set category 34
next
edit 31
set category 35
next
edit 32
set category 36
next
edit 33
set category 37
next
edit 34
set category 38
next
edit 35
set category 39
next
edit 36
set category 40
next
edit 37
set category 41
next
edit 38
set category 42
next
edit 39
set category 43
next
edit 40
set category 44
next
edit 41
set category 46
next
edit 42
set category 47
next
edit 43
set category 48
next
edit 44
set category 49
next
edit 45
set category 50
next
edit 46
set category 51
next
edit 47
set category 52
next
edit 48
set category 53
next
edit 49
set category 54
next
edit 50
set category 55
next
edit 51
set category 56
next
edit 52
set category 57
next
edit 53
set category 58
next
edit 54
set category 59
next
edit 55
set category 61
next
edit 56
set category 62
next
edit 57
set category 63
next
edit 58
set category 64
next
edit 59
set category 65
next
edit 60
set category 66
next
edit 61
set category 67
next
edit 62
set category 68
next
edit 63
set category 69
next
edit 64
set category 70
next
edit 65
set category 71
next
edit 66
set category 72
next
edit 67
set category 75
next
edit 68
set category 76
next
edit 69
set category 77
next
edit 70
set category 78
next
edit 71
set category 79
next
edit 72
set category 80
next
edit 73
set category 81
next
edit 74
set category 82
next
edit 75
set category 83
next
edit 76
set category 84
next
edit 77
set category 85
next
edit 78
set category 86
next
edit 79
set category 87
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
end
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set options block-invalid-url
config ftgd-wf
unset options
config filters
edit 1
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 12
set action block
next
edit 8
set category 13
set action block
next
edit 9
set category 14
set action block
next
edit 10
set category 15
set action block
next
edit 11
set category 16
set action block
next
edit 12
set category 26
set action block
next
edit 13
set category 57
set action block
next
edit 14
set category 61
set action block
next
edit 15
set category 63
set action block
next
edit 16
set category 64
set action block
next
edit 17
set category 65
set action block
next
edit 18
set category 66
set action block
next
edit 19
set category 67
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
end
end
next
edit "monitor-all"
set comment "Monitor and log all visited URLs, flow-based."
config ftgd-wf
unset options
config filters
edit 1
set category 1
next
edit 2
set category 3
next
edit 3
set category 4
next
edit 4
set category 5
next
edit 5
set category 6
next
edit 6
set category 12
next
edit 7
set category 59
next
edit 8
set category 62
next
edit 9
set category 83
next
edit 10
set category 2
next
edit 11
set category 7
next
edit 12
set category 8
next
edit 13
set category 9
next
edit 14
set category 11
next
edit 15
set category 13
next
edit 16
set category 14
next
edit 17
set category 15
next
edit 18
set category 16
next
edit 19
set category 57
next
edit 20
set category 63
next
edit 21
set category 64
next
edit 22
set category 65
next
edit 23
set category 66
next
edit 24
set category 67
next
edit 25
set category 19
next
edit 26
set category 24
next
edit 27
set category 25
next
edit 28
set category 72
next
edit 29
set category 75
next
edit 30
set category 76
next
edit 31
set category 26
next
edit 32
set category 61
next
edit 33
set category 86
next
edit 34
set category 17
next
edit 35
set category 18
next
edit 36
set category 20
next
edit 37
set category 23
next
edit 38
set category 28
next
edit 39
set category 29
next
edit 40
set category 30
next
edit 41
set category 33
next
edit 42
set category 34
next
edit 43
set category 35
next
edit 44
set category 36
next
edit 45
set category 37
next
edit 46
set category 38
next
edit 47
set category 39
next
edit 48
set category 40
next
edit 49
set category 42
next
edit 50
set category 44
next
edit 51
set category 46
next
edit 52
set category 47
next
edit 53
set category 48
next
edit 54
set category 54
next
edit 55
set category 55
next
edit 56
set category 58
next
edit 57
set category 68
next
edit 58
set category 69
next
edit 59
set category 70
next
edit 60
set category 71
next
edit 61
set category 77
next
edit 62
set category 78
next
edit 63
set category 79
next
edit 64
set category 80
next
edit 65
set category 82
next
edit 66
set category 85
next
edit 67
set category 87
next
edit 68
set category 31
next
edit 69
set category 41
next
edit 70
set category 43
next
edit 71
set category 49
next
edit 72
set category 50
next
edit 73
set category 51
next
edit 74
set category 52
next
edit 75
set category 53
next
edit 76
set category 56
next
edit 77
set category 81
next
edit 78
set category 84
next
edit 79
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
end
end
set log-all-url enable
set web-content-log disable
set web-filter-command-block-log disable
set web-filter-cookie-log disable
set web-url-log disable
set web-invalid-domain-log disable
set web-ftgd-err-log disable
next
end
config webfilter search-engine
edit "google"
set hostname ".*\\.google\\..*"
set url "^\\/((custom|search|images|videosearch|webhp)\\?)"
set query "q="
set safesearch url
set safesearch-str "&safe=active"
next
edit "yahoo"
set hostname ".*\\.yahoo\\..*"
set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)"
set query "p="
set safesearch url
set safesearch-str "&vm=r"
next
edit "bing"
set hostname ".*\\.bing\\..*"
set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?"
set query "q="
set safesearch header
next
edit "yandex"
set hostname "yandex\\..*"
set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?"
set query "text="
set safesearch url
set safesearch-str "&family=yes"
next
edit "youtube"
set hostname ".*youtube.*"
set safesearch header
next
edit "baidu"
set hostname ".*\\.baidu\\.com"
set url "^\\/s?\\?"
set query "wd="
next
edit "baidu2"
set hostname ".*\\.baidu\\.com"
set url "^\\/(ns|q|m|i|v)\\?"
set query "word="
next
edit "baidu3"
set hostname "tieba\\.baidu\\.com"
set url "^\\/f\\?"
set query "kw="
next
edit "vimeo"
set hostname ".*vimeo.*"
set url "^\\/search\\?"
set query "q="
set safesearch header
next
edit "yt-scan-1"
set url "www.youtube.com/user/"
set safesearch yt-scan
next
edit "yt-scan-2"
set url "www.youtube.com/youtubei/v1/browse"
set safesearch yt-scan
next
edit "yt-scan-3"
set url "www.youtube.com/youtubei/v1/player"
set safesearch yt-scan
next
edit "yt-scan-4"
set url "www.youtube.com/youtubei/v1/navigator"
set safesearch yt-scan
next
edit "yt-channel"
set url "www.youtube.com/channel"
set safesearch yt-channel
next
edit "yt-pattern"
set url "youtube.com/channel/"
set safesearch yt-pattern
next
edit "twitter"
set hostname "twitter\\.com"
set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName"
set query "variables="
set safesearch translate
set safesearch-str "regex::%22screen_name%22:%22([A-Za-z0-9_]{4,15})%22::twitter.com/\\1"
next
edit "google-translate-1"
set hostname "translate\\.google\\..*"
set url "^\\/translate"
set query "u="
set safesearch translate
set safesearch-str "regex::(?:\\?|&)u=([^&]+)::\\1"
next
edit "google-translate-2"
set hostname ".*\\.translate\\.goog"
set url "^\\/"
set safesearch translate
set safesearch-str "case::google-translate"
next
edit "translate"
set hostname "translate\\.google\\..*"
set url "^\\/translate\\?"
set query "u="
set safesearch translate
next
end
config emailfilter profile
edit "sniffer-profile"
set comment "Malware and phishing URL monitoring."
config imap
end
config pop3
end
config smtp
end
next
edit "default"
set comment "Malware and phishing URL filtering."
config imap
end
config pop3
end
config smtp
end
next
end
config report layout
edit "default"
set title "FortiGate System Analysis Report"
set style-theme "default-report"
set options include-table-of-content view-chart-as-heading
config page
set paper letter
set page-break-before heading1
config header
config header-item
edit 1
set type image
set style "header-image"
set img-src "fortinet_logo_small.png"
next
end
end
config footer
config footer-item
edit 1
set style "footer-text"
set content "FortiGate ${schedule_type} Security Report - Host Name: ${hostname}"
next
edit 2
set style "footer-pageno"
next
end
end
end
config body-item
edit 101
set type image
set style "report-cover1"
set img-src "fortigate_log.png"
next
edit 103
set style "report-cover2"
set content "FortiGate ${schedule_type} Security Report"
next
edit 105
set style "report-cover3"
set content "Report Date: ${started_time}"
next
edit 107
set style "report-cover3"
set content "Data Range: ${report_data_range} (${hostname})"
next
edit 109
set style "report-cover3"
set content "${vdom}"
next
edit 111
set type image
set style "report-cover4"
set img-src "fortinet_logo_small.png"
next
edit 121
set type misc
set misc-component page-break
next
edit 301
set text-component heading1
set content "Bandwidth and Applications"
next
edit 311
set type chart
set chart "traffic.bandwidth.history_c"
next
edit 321
set type chart
set chart "traffic.sessions.history_c"
next
edit 331
set type chart
set chart "traffic.statistics"
next
edit 411
set type chart
set chart "traffic.bandwidth.apps_c"
next
edit 421
set type chart
set chart "traffic.bandwidth.cats_c"
next
edit 511
set type chart
set chart "traffic.bandwidth.users_c"
next
edit 521
set type chart
set chart "traffic.users.history.hour_c"
next
edit 611
set type chart
set chart "traffic.bandwidth.destinations_tab"
next
edit 1001
set text-component heading1
set content "Web Usage"
next
edit 1011
set type chart
set chart "web.allowed-request.sites_c"
next
edit 1021
set type chart
set chart "web.bandwidth.sites_c"
next
edit 1031
set type chart
set chart "web.blocked-request.sites_c"
next
edit 1041
set type chart
set chart "web.blocked-request.users_c"
next
edit 1051
set type chart
set chart "web.requests.users_c"
next
edit 1061
set type chart
set chart "web.bandwidth.users_c"
next
edit 1071
set type chart
set chart "web.bandwidth.stream-sites_c"
next
edit 1301
set text-component heading1
set content "Emails"
next
edit 1311
set type chart
set chart "email.request.senders_c"
next
edit 1321
set type chart
set chart "email.bandwidth.senders_c"
next
edit 1331
set type chart
set chart "email.request.recipients_c"
next
edit 1341
set type chart
set chart "email.bandwidth.recipients_c"
next
edit 1501
set text-component heading1
set content "Threats"
next
edit 1511
set type chart
set top-n 80
set chart "virus.count.viruses_c"
next
edit 1531
set type chart
set top-n 80
set chart "virus.count.users_c"
next
edit 1541
set type chart
set top-n 80
set chart "virus.count.sources_c"
next
edit 1551
set type chart
set chart "virus.count.history_c"
next
edit 1561
set type chart
set top-n 80
set chart "botnet.count_c"
next
edit 1571
set type chart
set top-n 80
set chart "botnet.count.users_c"
next
edit 1581
set type chart
set top-n 80
set chart "botnet.count.sources_c"
next
edit 1591
set type chart
set chart "botnet.count.history_c"
next
edit 1601
set type chart
set top-n 80
set chart "attack.count.attacks_c"
next
edit 1611
set type chart
set top-n 80
set chart "attack.count.victims_c"
next
edit 1621
set type chart
set top-n 80
set chart "attack.count.source_bar_c"
next
edit 1631
set type chart
set chart "attack.count.blocked_attacks_c"
next
edit 1641
set type chart
set chart "attack.count.severity_c"
next
edit 1651
set type chart
set chart "attack.count.history_c"
next
edit 1701
set text-component heading1
set content "VPN Usage"
next
edit 1711
set type chart
set top-n 80
set chart "vpn.bandwidth.static-tunnels_c"
next
edit 1721
set type chart
set top-n 80
set chart "vpn.bandwidth.dynamic-tunnels_c"
next
edit 1731
set type chart
set top-n 80
set chart "vpn.bandwidth.ssl-tunnel.users_c"
next
edit 1741
set type chart
set top-n 80
set chart "vpn.bandwidth.ssl-web.users_c"
next
edit 1901
set text-component heading1
set content "Admin Login and System Events"
next
edit 1911
set type chart
set top-n 80
set chart "event.login.summary_c"
next
edit 1931
set type chart
set top-n 80
set chart "event.failed.login_c"
next
edit 1961
set type chart
set top-n 80
set chart "event.system.group_events_c"
next
end
next
end
config wanopt settings
set host-id "default-id"
end
config wanopt profile
edit "default"
set comments "Default WANopt profile."
next
end
config log memory setting
set status disable
end
config log disk setting
set status enable
end
config log null-device setting
set status disable
end
config firewall schedule recurring
edit "always"
set day sunday monday tuesday wednesday thursday friday saturday
next
edit "none"
next
edit "default-darrp-optimize"
set start 01:00
set end 01:30
set day sunday monday tuesday wednesday thursday friday saturday
next
end
config firewall vip
edit "Hubgrade-Port-49320"
set uuid ca99eeec-80fa-51ed-45f0-beec809b98ae
set extip 125.227.184.206
set mappedip "10.30.20.110"
set extintf "any"
set portforward enable
set extport 49320
set mappedport 49320
next
edit "Hubgrade-Port-48010"
set uuid 65e913de-82a2-51ed-b307-47f33f0e2a3e
set extip 125.227.184.206
set mappedip "10.30.20.110"
set extintf "any"
set portforward enable
set extport 48010
set mappedport 48010
next
end
config firewall ssh local-key
edit "Fortinet_SSH_RSA2048"
set password ENC AAAA4JNuxLOxRBPUAwrOINhgIZcLmtk0QZKMbaPLGGuWByWEVnyLLbM1XZJTJahJeRZpdOXD8ii2T0HfB21an25tp4u3/Lo5KYfq4RsNRP6tNjFqRcO8hgK5delmJ+6kIWQdovqjqu1P9lgg6zRV+kt0E97lXPuFu+cmOJM+nkW49YYDqfzyjca7jQ4Hv/2etzLHDw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABA+K4Pn8Z
NyNC3L3DVvLwS2AAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQCi9YRhIIU0
jw8fatRQAViCOaseIPVXUgNEhs9PJpQkppuDX4uwC0XY9TMU/kmnvHAdT15AvuDMYFQRN+
gG1DrriFi+z8xo/9KB46dPJa7V7VTTdFePut2Ga8k0yqI0OyhXhKv+pkNBAScz5mN8zI4v
oAtyPl7872qM1/hQwnW+IKPW+tYyNtcRByvb4/1BCfRvUdjaY1r/HK6b7u7fQ9cTvNz7nN
NS9qgwFvtBMETqe+3U4TSxEhP+4vZuA6A8a22zu2crmL+avriJotxOqxO/Ya0HEJoApGPA
k5wOjjM/Mhq81TG0/aMI0UHlIlZgYvIqVHGBjK35BdxRAT5s2FnzAAADwM0PKmJmkWgr6Z
QfOYM1umnMqV9dHLDXy4A63BXDn130euHcfEShj/pegDWVnJMjv+S3wS9toMUkMUjbJJ2a
MckMO3p/VGgMAG8QS+O1yIEeMaFxQm827cOE1ZhzPV/TmTl63MrH17XphBr0xkG0cEnWQZ
y6TaT+4U0tU742ilL2JclYczsTd0iBHymDzVWaUknS8EVHwFTWAnZNydZgL9aQl6tr4Kh/
iIhH0CFaLbcWwrz6duqMBXdGSWU7/xKlWofKylnBp4HiDFBTz8th76tvUxF6fsZS+ryIRU
vNyBpJCOZYwsBZz6YoHeDy0d1o979zJRA88ljmSdO/rNIYvORNitjEqM49CpiT5SXDktDf
nZp29TltbDULcep8t/3Lhl4v/XAPXdcUWNxTYth3Q7GnAFfxhcWlF84ULL2oPHyyed66L5
ICxMQ7Le58Rw95BVHXsGa666UgHfC4ccgADUdISnuZsCdmN8qWHxmnMM0HlPmw11H53ygt
xtu+95XYJ9IMlMQUtfXV/I5rzf0MCxSmSLFBs9fARXSvNC411N+MLAkZL3kPwA7uDoc1PR
CviiaZoaZ7jEbQc9hXpC6bcc/3KHS5zZBB/WDWsxpEtDd7eY+7hehuLV3lzwno+7+JNygk
42pQEDRZKVkgkPeRDe5BEBB2SEYh0T62hrzBrCMcWbTtVJ2zqwLj7bz9fvXJLIx2AGpX/k
R33xqlHxdbPUfxtSscANOf3uWlRlP7of99i8XwlYo9nRm/dGsSWp75Gms39yImpAC3sa87
d3uJN+Dz7GJaT4GgwcR+RAn9yBcqjewqpSLfnrAJmIa+5KtyUOHtRMAI4u4xGHZKJi0wIC
bMbBVzCTNolu6BkjoYBRTUFLL7uxnvEZgopGJRG2INNnUfXkF0JpEZgkfx5P3zMwtZJq4L
MOu8WLX3LxznWK9dWDzm0bnL/cZxpyvjTSA6hYqjL7lmItqY+vm3qd3AIzoY1hW+juyUyF
nWuUEYZ6dHEilpRujyfkzETmEs3CX5OiHKOxVmDmSQi5tIQTGFqOzJ8TYFiG8Rb/F6YzYn
GhSum5QN11wCZ8H9ezGR7roNSpIMqjdRF3nhAbaWHGEkX2bBnn7fTlf5dKCPdL3e9091ZA
DM6Xk8CceMwvsu/n4jzoa519D+BuJQM4Dy+ELH/KGe2aPAeYfTxpoldSZyWv2EuKGhxPMA
5wOmXxxY7v3nALGGan3/EnjkrwODy1vTkvvCFEzp9Zs/qhtskkBI+c+tCnVO/aQnSUkZMt
/lX9m9Cg==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCi9YRhIIU0jw8fatRQAViCOaseIPVXUgNEhs9PJpQkppuDX4uwC0XY9TMU/kmnvHAdT15AvuDMYFQRN+gG1DrriFi+z8xo/9KB46dPJa7V7VTTdFePut2Ga8k0yqI0OyhXhKv+pkNBAScz5mN8zI4voAtyPl7872qM1/hQwnW+IKPW+tYyNtcRByvb4/1BCfRvUdjaY1r/HK6b7u7fQ9cTvNz7nNNS9qgwFvtBMETqe+3U4TSxEhP+4vZuA6A8a22zu2crmL+avriJotxOqxO/Ya0HEJoApGPAk5wOjjM/Mhq81TG0/aMI0UHlIlZgYvIqVHGBjK35BdxRAT5s2Fnz"
set source built-in
next
edit "Fortinet_SSH_DSA1024"
set password ENC AAAA4KWhi31w7rsf2GJRT10ChyOjgf1usKfkG8dtHwnZrsjJSJixQSg7ycNkn75VctyatDW4V4tbxpkz92E1Pd4nXriOvTWP20trFwCI9FODDmHu3oUIJ13BrukdkQ+ajPm8JKKEge00O6BpqJoEQYZiS/CDd1ymtIwh8KWtvK83g0x9qX2KirIMiD5t9tv3FATPVA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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=
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-dss 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"
set source built-in
next
edit "Fortinet_SSH_ECDSA256"
set password ENC AAAA4OrDFfz1u/4WMRCO8+rbCNloDbA6S91kfRfuWugunU028tPLDbsWYW3W4sOQnN1naPIkb4YTixqHqqx4ODOT2WsXlRsozqFBSake6wDmpki46z3uZJ3YwKvuMsImFUjl3TOR7PM37aV6FhChRqQUrXBC4ZdhdgZ0QX15YlpIUGwOAhxITZJajLOxbtPrrIfz5A==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABDEO2TvUR
FKmQlK9SM/VeduAAAAEAAAAAEAAABoAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz
dHAyNTYAAABBBH2RiyVkEIW2oXKU6dQpMASS37b02hT9do8g+KnwQz89thPDWV6s3t3rKj
L0meOrGEsvUu3mY+rvXbD9WlO6OH0AAACgFevnlJXu/iqJkH1q3OzGXwZFjooW8pI0682B
qJUAEeKoyUBGkju4nqlDPwPkHIP9rabvpSklclOXOC+tbA9/6rjDToqWG9S6GbEQSmuI5A
2q+FCLYgn90DomZjb3qviMrpDzdEBp1je3S5MkMjy2wE5285FBOSkvzbI883BIJDS/Wh3f
fmqu8ED25n/HT1VlyWoqP4OQw9rVfzOx5Pu72A==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBH2RiyVkEIW2oXKU6dQpMASS37b02hT9do8g+KnwQz89thPDWV6s3t3rKjL0meOrGEsvUu3mY+rvXbD9WlO6OH0="
set source built-in
next
edit "Fortinet_SSH_ECDSA384"
set password ENC AAAA4CbTzAMeExv6jazC58KAqszYs0+Ke3gAhxNwMA9D5CtWstobsslO4WBjrzf7rcHTNUxgpjMHp/tCQvSlCjrnVNa0H/VQEaP8Gxns6wZGK6Moe8LsPBKJSn+zAU4NTR+s46ktFxXCDywQWHZoN3JueUaMj+xU+ZXk1fRpuLwB1tkbN6eQuRa/0+lMH/S40s0nTQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBB7G4v0lq83SANFWiAYcjgyKwNcmWqnAovfdGyEb7nRS/R/O7lUNkKc9yYscyJANPYMfpH7jYknbgr0BGdYh/ltyQYrKWg6UuOBzCKNcSSBZBaJSsbGSUnmnlLwgoOcYrQ=="
set source built-in
next
edit "Fortinet_SSH_ECDSA521"
set password ENC AAAA4NuX0AhtOCDXzI4PG8wTz1OUS1Eki1wWtpDL2mIC1NZRX9MR87Hwrt1Epm4XDVtNXcQRPYgINjOgcmS/xfkigMCTPonhJjarO6pAFpyRwiuMeX4vGWT0sueV6DpWJFZwbZhal4I0Vp85WKiIjHDPkF4odIWp7MOjjd+Ns5JzCpDHaipUZkMpfRI1l7RKeE8tHQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCC04TvZ9
4TdYoxSFjx/YOCAAAAEAAAAAEAAACsAAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlz
dHA1MjEAAACFBAB75h8JDGwneXrbqf+tziN29oTuXEJ7ypWsYpMwMKwCJ4uJATYIBNPseY
Rnwcu9Y8u/2sLFoha3qyukzmaZs539vQFUvEUMe2DjlgH1f7JruePbLupjHGDvyCX778W0
sLhjE/BfnUn699VuLIxkg2V2p+v3iT8kgVChWyuA144VV4UZGgAAAQBDvA0Du8TfNZ472f
tw9btfNsVtqrpNdvBstyXRDMLLRC1Vt++D8AerDNf0A0CipWD2zJMHdTiGHmk6RJFGNhvi
cWPyywAlKnGH4t8fETOiBOuHa3/l6ZPpNyzlBM9vWCkDlawd0mdsjBV5Rqh3jHqFTMUiaV
/we1sPhexfx2tN97HU2USvHaReBqoMyG/X8d7jOP/P4lZdYtsCjROOdh4M3VP9fn9UzMh+
qn4p5QMiHt/mP1Ll5e0aTjsk1v0DkARmx7wP2osR3FodKlhOsgMHG7Tu8AaPV4504DQP4I
lL0302ZAWVSF+SYS+L32ydfyIgXg+wPVUzPzw5IuO9ijZe
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAB75h8JDGwneXrbqf+tziN29oTuXEJ7ypWsYpMwMKwCJ4uJATYIBNPseYRnwcu9Y8u/2sLFoha3qyukzmaZs539vQFUvEUMe2DjlgH1f7JruePbLupjHGDvyCX778W0sLhjE/BfnUn699VuLIxkg2V2p+v3iT8kgVChWyuA144VV4UZGg=="
set source built-in
next
edit "Fortinet_SSH_ED25519"
set password ENC C6K54GNCrHdd8rZzROrS6Dqm0sSzKX9ZCRLEh0HqcVLuIxRoNaIPNKFZgdSaQOjJsNO/OUKWO0oWQ3CJrpnW9bhFT6GoyeExe8P9lmcYNoQY89QpUGSmGZUhJiqt0w9tZ1YMetn58KmDKGPZOFXsb7VfkJcIyEadkqNvE8Uux+zx/fDA7O4n3tKUHv/ch5Vx3NSKtA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABDM9lGA3x
MSjvh7wjilfAvDAAAAEAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAIFjvdmZENKjwEj2x
nl9eq63TwzjwmwOUyBLtgUTb4hwMAAAAkHh1LxwBIKwdl3MLxvmFfzf6WITBhmIJEKiWyA
ma2Gmdw1zI3LMChSj5F2EHEt0ajQksOOQrrnq71YXhBRMIp8Ym1w1j+Ue+J4PmSORLqTTI
5Uc8bzLk2Q3QQGd0zA5s799qyc0m8hwfCOVz5/XRrqnkR+Iuq9cgD/N1E6GFUL8sGFcpkB
cdlYar0NS1NgHXKA==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFjvdmZENKjwEj2xnl9eq63TwzjwmwOUyBLtgUTb4hwM"
set source built-in
next
end
config firewall ssh local-ca
edit "Fortinet_SSH_CA"
set password ENC AAAA4BVMFtcBpc4vbfCWZQv2L7f7l1H/QL9haFAbOwmwTQZl7fAlE2jMMplD5A5rdyXS6eyT4JxdCv52AeaeX8QRWmXPaCk1PCBF+0554LJrPf0pkDxXY5NRZQaeJgp6IRxqdLk8qAA1uSZLVWidftFOXsw6m/rQy+Vwi5OtuacKMRDvTqjrtRIdF+kOPcwftddIsA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDVwZOt/JEmhsnTg56IwwwshNqQhc63liuzq77TCb7j8X8mv0jRdpecGsSkCYqwNQ3ypo1frKORCZ1+tZUrmjriHh7QCTnDSjTPfcqKjPziifIsU8Cdf7iUQiVqZde80jMSmI/6FNvFfH2b0reQEhvTmJsywv2bezZE8XDyrkmJkTrY3N9HOIB5Owun0BZc9hXdb9hoPeXULu5WaeQICh4KNpTtBQSKARvLDZk/ek/JdHwHENIeuQ1L7bk0VKL3DiC0W05d9GT2ilIQ7Vop+1F/7M8nvVS566qssqcJhjsvtuxy0I/B9fqM2GWWEgFsIyPZNG0nxzM9gZ9a073Mas1h"
set source built-in
next
edit "Fortinet_SSH_CA_Untrusted"
set password ENC AAAA4HKsTf/hzN3PX/PCGQ7LAnr3bgxm5tUHFNH+mgxIEKhN7s/0e/k0ccWtMHRGlx07KMleZ2S1aIJh0woUdbFkldFc8K8QG8z8z4o019PQY63AREZlwk/aUM0JCBsOX4RuGgV6G5pHbuKl04EAX+0E9jG/Xas14NNrI/3PmYv/3tONnkHj3WPO0LtS1twEbe5XNQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMUmPlU6aj0iHuknPknw+IbRjw0AjTCi5J3mOQQQesm3SgG0nTCXwKlnyoJ/geNm6hILs2ecAjYpgXTHlG/uKB/PKk8xP6NB7S54Y8QRheqT2aW2ScamnLUgmeNt0lo5UFSpvn688E+Gcm/1lchd63X8AyGQqmQz4IjjSFFaaHhVUIqOf0BtUUAYm/ZvVoUlwZ7nWOmaDEYvdP2Xkapg745Y9HpZsD4Lr1VFWeZJvo+MnIKGRyxLR7n6czsD/MWqCq8zZR8xO4LcZIvPdNZPYESki61T1+jR6fa2PUK+03GNMBZH65xnH8LDQtjA030yTiW/PuG7RxTuwGCMATwcET"
set source built-in
next
end
config firewall ssh setting
set caname "Fortinet_SSH_CA"
set untrusted-caname "Fortinet_SSH_CA_Untrusted"
set hostkey-rsa2048 "Fortinet_SSH_RSA2048"
set hostkey-dsa1024 "Fortinet_SSH_DSA1024"
set hostkey-ecdsa256 "Fortinet_SSH_ECDSA256"
set hostkey-ecdsa384 "Fortinet_SSH_ECDSA384"
set hostkey-ecdsa521 "Fortinet_SSH_ECDSA521"
set hostkey-ed25519 "Fortinet_SSH_ED25519"
end
config firewall profile-protocol-options
edit "default"
set comment "All default services."
config http
set ports 80
unset options
unset post-lang
end
config ftp
set ports 21
set options splice
end
config imap
set ports 143
set options fragmail
end
config mapi
set ports 135
set options fragmail
end
config pop3
set ports 110
set options fragmail
end
config smtp
set ports 25
set options fragmail splice
end
config nntp
set ports 119
set options splice
end
config ssh
unset options
end
config dns
set ports 53
end
config cifs
set ports 445
unset options
end
next
end
config firewall ssl-ssh-profile
edit "deep-inspection"
set comment "Read-only deep inspection profile."
config https
set ports 443
set status deep-inspection
set unsupported-ssl-version allow
end
config ftps
set ports 990
set status deep-inspection
set unsupported-ssl-version allow
end
config imaps
set ports 993
set status deep-inspection
set unsupported-ssl-version allow
end
config pop3s
set ports 995
set status deep-inspection
set unsupported-ssl-version allow
end
config smtps
set ports 465
set status deep-inspection
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "custom-deep-inspection"
set comment "Customizable deep inspection profile."
config https
set ports 443
set status deep-inspection
set unsupported-ssl-version allow
end
config ftps
set ports 990
set status deep-inspection
set unsupported-ssl-version allow
end
config imaps
set ports 993
set status deep-inspection
set unsupported-ssl-version allow
end
config pop3s
set ports 995
set status deep-inspection
set unsupported-ssl-version allow
end
config smtps
set ports 465
set status deep-inspection
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "no-inspection"
set comment "Read-only profile that does no inspection."
config https
set status disable
set unsupported-ssl-version allow
end
config ftps
set status disable
set unsupported-ssl-version allow
end
config imaps
set status disable
set unsupported-ssl-version allow
end
config pop3s
set status disable
set unsupported-ssl-version allow
end
config smtps
set status disable
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
next
edit "certificate-inspection"
set comment "Read-only SSL handshake inspection profile."
config https
set ports 443
set status certificate-inspection
set unsupported-ssl-version allow
end
config ftps
set status disable
set unsupported-ssl-version allow
end
config imaps
set status disable
set unsupported-ssl-version allow
end
config pop3s
set status disable
set unsupported-ssl-version allow
end
config smtps
set status disable
set unsupported-ssl-version allow
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
next
end
config waf profile
edit "default"
config signature
config main-class 100000000
set action block
set severity high
end
config main-class 20000000
end
config main-class 30000000
set status enable
set action block
set severity high
end
config main-class 40000000
end
config main-class 50000000
set status enable
set action block
set severity high
end
config main-class 60000000
end
config main-class 70000000
set status enable
set action block
set severity high
end
config main-class 80000000
set status enable
set severity low
end
config main-class 110000000
set status enable
set severity high
end
config main-class 90000000
set status enable
set action block
set severity high
end
set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002
end
config constraint
config header-length
set status enable
set log enable
set severity low
end
config content-length
set status enable
set log enable
set severity low
end
config param-length
set status enable
set log enable
set severity low
end
config line-length
set status enable
set log enable
set severity low
end
config url-param-length
set status enable
set log enable
set severity low
end
config version
set log enable
end
config method
set action block
set log enable
end
config hostname
set action block
set log enable
end
config malformed
set log enable
end
config max-cookie
set status enable
set log enable
set severity low
end
config max-header-line
set status enable
set log enable
set severity low
end
config max-url-param
set status enable
set log enable
set severity low
end
config max-range-segment
set status enable
set log enable
set severity high
end
end
next
end
config firewall policy
edit 2
set status disable
set name "HBB-E2C-LAN-To-WAN"
set uuid 042dee72-79e6-51ed-3ff0-0e7f327b2350
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set ssl-ssh-profile "certificate-inspection"
set logtraffic all
set nat enable
next
edit 3
set status disable
set name "Testing-HBB-E2C-WAN-To-LAN"
set uuid dc2b3e22-79ed-51ed-d5f2-2bc5080e4965
set srcintf "wan1"
set dstintf "HBB-E2C-LAN"
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set logtraffic disable
next
edit 4
set status disable
set name "Internal"
set uuid 9e6e026a-79f5-51ed-e237-b6acceaacaa0
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set ips-sensor "default"
set nat enable
next
edit 5
set name "GLPI"
set uuid 25a3fd64-7a8e-51ed-1a8a-6cb98d5d0f95
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "GLPI-Server"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set ips-sensor "default"
set nat enable
next
edit 6
set name "AnyDesk"
set uuid b1e83ff2-7a92-51ed-68cd-bdaf212862a3
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "AnyDesk"
set schedule "always"
set service "HTTPS" "HTTP"
set ssl-ssh-profile "certificate-inspection"
set nat enable
next
edit 7
set name "MAN-ES ATU-BOX-To-WAN"
set uuid b686e1c0-80fb-51ed-49fb-1dbbdabb0692
set srcintf "MAN-ES-ATU-BOX"
set dstintf "wan1"
set action accept
set srcaddr "MANES-ATU-BOX"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set logtraffic all
set nat enable
next
edit 8
set name "DNS"
set uuid 84594646-80fd-51ed-1311-27d82477504e
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component" "MANES-ATU-BOX"
set dstaddr "all"
set schedule "always"
set service "DNS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 9
set name "UA Access"
set uuid 040a3a6a-8100-51ed-c4e1-de64c8548327
set srcintf "wan1"
set dstintf "HBB-E2C-LAN"
set action accept
set srcaddr "all"
set dstaddr "Hubgrade-Port-49320" "Hubgrade-Port-48010"
set schedule "always"
set service "OPC-UA"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set ips-sensor "default"
set nat enable
next
edit 10
set name "E2C gmail alarm"
set uuid 740b6502-84be-51ed-1e83-82d3b870f04d
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "gmail smtp"
set schedule "always"
set service "SMTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 11
set name "E2C MQTT"
set uuid b74e7ef0-b0ee-51ee-9918-85e9198a04b2
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "Cloud Scada" "Cloud Scada2"
set schedule "always"
set service "MQTT"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set ips-sensor "default"
set application-list "default"
set nat enable
next
edit 12
set name "E2C"
set uuid de38184e-b0f0-51ee-5c85-1808b87e7b44
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component"
set dstaddr "AWS" "AWS1" "AWS2" "GCP" "Git"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 13
set name "E2C U2484 to NTP Server"
set uuid bf8edac6-b0f1-51ee-7be7-9ab8b1d318ea
set srcintf "HBB-E2C-LAN"
set dstintf "wan1"
set action accept
set srcaddr "IT Component" "MANES-ATU-BOX"
set dstaddr "time.google.com" "time.windows.com" "tw.ntp.org.cn"
set schedule "always"
set service "NTP"
set nat enable
next
end
config switch-controller security-policy 802-1X
edit "802-1X-policy-default"
set user-group "SSO_Guest_Users"
set mac-auth-bypass disable
set open-auth disable
set eap-passthru enable
set eap-auto-untagged-vlans enable
set guest-vlan disable
set auth-fail-vlan disable
set framevid-apply enable
set radius-timeout-overwrite disable
set authserver-timeout-vlan disable
next
end
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh
set internal-allowaccess https ping ssh
next
end
config switch-controller lldp-profile
edit "default"
set med-tlvs inventory-management network-policy location-identification
set auto-isl disable
config med-network-policy
edit "voice"
next
edit "voice-signaling"
next
edit "guest-voice"
next
edit "guest-voice-signaling"
next
edit "softphone-voice"
next
edit "video-conferencing"
next
edit "streaming-video"
next
edit "video-signaling"
next
end
config med-location-service
edit "coordinates"
next
edit "address-civic"
next
edit "elin-number"
next
end
next
edit "default-auto-isl"
next
edit "default-auto-mclag-icl"
set auto-mclag-icl enable
next
end
config switch-controller qos dot1p-map
edit "voice-dot1p"
set priority-0 queue-4
set priority-1 queue-4
set priority-2 queue-3
set priority-3 queue-2
set priority-4 queue-3
set priority-5 queue-1
set priority-6 queue-2
set priority-7 queue-2
next
end
config switch-controller qos ip-dscp-map
edit "voice-dscp"
config map
edit "1"
set cos-queue 1
set value 46
next
edit "2"
set cos-queue 2
set value 24,26,48,56
next
edit "5"
set cos-queue 3
set value 34
next
end
next
end
config switch-controller qos queue-policy
edit "default"
set schedule round-robin
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
next
edit "queue-2"
next
edit "queue-3"
next
edit "queue-4"
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
edit "voice-egress"
set schedule weighted
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
set weight 0
next
edit "queue-2"
set weight 6
next
edit "queue-3"
set weight 37
next
edit "queue-4"
set weight 12
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
end
config switch-controller qos qos-policy
edit "default"
next
edit "voice-qos"
set trust-dot1p-map "voice-dot1p"
set trust-ip-dscp-map "voice-dscp"
set queue-policy "voice-egress"
next
end
config switch-controller storm-control-policy
edit "default"
set description "default storm control on all port"
next
edit "auto-config"
set description "storm control policy for fortilink-isl-icl port"
set storm-control-mode disabled
next
end
config switch-controller auto-config policy
edit "pse"
next
edit "default"
next
edit "default-icl"
set poe-status disable
set igmp-flood-report enable
set igmp-flood-traffic enable
next
end
config switch-controller initial-config template
edit "_default"
set vlanid 1
next
edit "quarantine"
set vlanid 4093
set dhcp-server enable
next
edit "rspan"
set vlanid 4092
set dhcp-server enable
next
edit "voice"
set vlanid 4091
next
edit "video"
set vlanid 4090
next
edit "onboarding"
set vlanid 4089
next
edit "nac_segment"
set vlanid 4088
set dhcp-server enable
next
end
config switch-controller switch-profile
edit "default"
next
end
config switch-controller ptp settings
set mode disable
end
config switch-controller ptp policy
edit "default"
set status enable
next
end
config switch-controller remote-log
edit "syslogd"
next
edit "syslogd2"
next
end
config wireless-controller setting
set darrp-optimize-schedules "default-darrp-optimize"
end
config wireless-controller arrp-profile
edit "arrp-default"
next
end
config wireless-controller wids-profile
edit "default"
set comment "Default WIDS profile."
set ap-scan enable
set ap-bgscan-intv 1
set ap-bgscan-duration 20
set ap-bgscan-idle 0
set wireless-bridge enable
set deauth-broadcast enable
set null-ssid-probe-resp enable
set long-duration-attack enable
set invalid-mac-oui enable
set weak-wep-iv enable
set auth-frame-flood enable
set assoc-frame-flood enable
set spoofed-deauth enable
set asleap-attack enable
set eapol-start-flood enable
set eapol-logoff-flood enable
set eapol-succ-flood enable
set eapol-fail-flood enable
set eapol-pre-succ-flood enable
set eapol-pre-fail-flood enable
next
edit "default-wids-apscan-enabled"
set ap-scan enable
set ap-bgscan-intv 1
set ap-bgscan-duration 20
set ap-bgscan-idle 0
next
end
config wireless-controller ble-profile
edit "fortiap-discovery"
set advertising ibeacon eddystone-uid eddystone-url
set ibeacon-uuid "wtp-uuid"
next
end
config router rip
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ripng
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router static
edit 1
set gateway 125.227.184.254
set device "wan1"
next
end
config router ospf
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ospf6
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router bgp
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "static"
end
config redistribute "isis"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "static"
end
config redistribute6 "isis"
end
end
config router isis
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "static"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "bgp"
end
config redistribute6 "static"
end
end
config router multicast
end
(5-5/6)