專案

一般

配置概況

檔案 » HBB-YongKang-Firewall-E2C-IT_7-2_1396_202401121150.conf

E2C_IT_Firewall_BackupFile_20240112_YK - 俊霖 江, 2024-01-12 16:50

 
#config-version=FGT61F-7.2.4-FW-build1396-230131:opmode=0:vdom=0:user=B10013
#conf_file_ver=323340393840935554
#buildno=1396
#global_vdom=1
config system global
set admin-server-cert "wildcard.tahoho.com.tw"
set admin-sport 8443
set admintimeout 60
set alias "FortiGate-61F"
set autorun-log-fsck enable
set gui-certificates enable
set gui-device-latitude "25.032970"
set gui-device-longitude "121.565420"
set hostname "HBB-YongKang-Firewall-E2C-IT"
set language trach
set switch-controller enable
set timezone 59
set virtual-switch-vlan enable
end
config system accprofile
edit "prof_admin"
set secfabgrp read-write
set ftviewgrp read-write
set authgrp read-write
set sysgrp read-write
set netgrp read-write
set loggrp read-write
set fwgrp read-write
set vpngrp read-write
set utmgrp read-write
set wanoptgrp read-write
set wifi read-write
next
end
config system np6xlite
edit "np6xlite_0"
next
end
config system interface
edit "wan1"
set vdom "root"
set ip 61.221.204.100 255.255.255.0
set allowaccess ping https ssh snmp http fgfm
set type physical
set role wan
set snmp-index 1
next
edit "wan2"
set vdom "root"
set mode dhcp
set allowaccess ping fgfm
set type physical
set role wan
set snmp-index 2
next
edit "dmz"
set vdom "root"
set ip 10.10.10.1 255.255.255.0
set allowaccess ping https fgfm fabric
set type physical
set role dmz
set snmp-index 3
next
edit "internal1"
set vdom "root"
set type physical
set snmp-index 4
next
edit "internal2"
set vdom "root"
set type physical
set snmp-index 5
next
edit "internal3"
set vdom "root"
set type physical
set snmp-index 6
next
edit "internal4"
set vdom "root"
set type physical
set snmp-index 7
next
edit "internal5"
set vdom "root"
set type physical
set snmp-index 8
next
edit "a"
set vdom "root"
set type physical
set snmp-index 9
next
edit "b"
set vdom "root"
set type physical
set snmp-index 10
next
edit "modem"
set vdom "root"
set mode pppoe
set status down
set type physical
set snmp-index 11
next
edit "naf.root"
set vdom "root"
set type tunnel
set src-check disable
set snmp-index 12
next
edit "l2t.root"
set vdom "root"
set type tunnel
set snmp-index 13
next
edit "ssl.root"
set vdom "root"
set type tunnel
set alias "SSL VPN interface"
set snmp-index 14
next
edit "internal"
set vdom "root"
set ip 192.167.3.99 255.255.255.0
set allowaccess ping https ssh http fgfm fabric
set type hard-switch
set alias "LAN"
set stp enable
set role lan
set snmp-index 15
next
edit "fortilink"
set vdom "root"
set fortilink enable
set ip 10.255.1.1 255.255.255.0
set allowaccess ping fabric
set type aggregate
set member "a" "b"
set lldp-reception enable
set lldp-transmission enable
set snmp-index 16
next
end
config system physical-switch
edit "sw0"
set age-val 0
next
end
config system virtual-switch
edit "internal"
set physical-switch "sw0"
config port
edit "internal1"
next
edit "internal2"
next
edit "internal3"
next
edit "internal4"
next
edit "internal5"
next
end
next
end
config system custom-language
edit "en"
set filename "en"
next
edit "fr"
set filename "fr"
next
edit "sp"
set filename "sp"
next
edit "pg"
set filename "pg"
next
edit "x-sjis"
set filename "x-sjis"
next
edit "big5"
set filename "big5"
next
edit "GB2312"
set filename "GB2312"
next
edit "euc-kr"
set filename "euc-kr"
next
end
config system admin
edit "admin"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
edit 5
set type admins
set x-pos 3
set width 1
set height 1
set csf-device "FGT61FTK21010507::root"
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set csf-device "all"
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
edit 12
set name "Routing Monitor"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type routing
set width 1
set height 1
set csf-device "FGT61FTK21010507"
set router-view-type "ospfneighbors"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set password ENC SH2K33u7AXW+s0gQwXZTT8u/saJbf7BNvbrZAHD02PvdX3aKoaiP+QcGs/nlE4=
next
edit "coleman.chen"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
set remote-group "RemoteUserGroup"
set password ENC SH2OscybjWsgXwsadLEs5tXpiEf7aR7xITQBESu1XVPoQ5cbnE0EwE2w/NtqbA=
next
edit "B10013"
set remote-auth enable
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set remote-group "RemoteUserGroup"
set password ENC SH2+ptTE0tl2NXAKuOmJ5eTy8+aDqHVkC/QaN0gVdIfo85eDDkxzpKFOFLKOyo=
next
edit "860712"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "狀態"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "資訊安全"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "網路"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "用戶 & 設備"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView 來源"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView 目的地"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView 應用程式"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView 網站"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView 政策"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView 連線會話"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set gui-ignore-release-overview-version "7.2.0"
set password ENC SH2gA/zumAm1rUObMpLJv+Vt/vKj9mAUOw4TvuwVAH+ZuLtEoHnuKPK1Rp9Ef8=
next
edit "itservice"
set accprofile "super_admin"
set vdom "root"
config gui-dashboard
edit 1
set name "Status"
set vdom "root"
set permanent enable
config widget
edit 1
set width 1
set height 1
next
edit 2
set type licinfo
set x-pos 1
set width 1
set height 1
next
edit 3
set type forticloud
set x-pos 2
set width 1
set height 1
next
edit 4
set type security-fabric
set x-pos 3
set width 1
set height 1
next
edit 5
set type admins
set x-pos 4
set width 1
set height 1
next
edit 6
set type cpu-usage
set x-pos 5
set width 2
set height 1
next
edit 7
set type memory-usage
set x-pos 6
set width 2
set height 1
next
edit 8
set type sessions
set x-pos 7
set width 2
set height 1
next
end
next
edit 2
set name "Security"
set vdom "root"
config widget
edit 1
set type fortiview
set width 2
set height 1
set fortiview-type "compromisedHosts"
set fortiview-sort-by "verdict"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 2
set type fortiview
set x-pos 1
set width 2
set height 1
set fortiview-type "threats"
set fortiview-sort-by "threatLevel"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
edit 3
set type vulnerability-summary
set x-pos 2
set width 2
set height 1
next
edit 4
set type host-scan-summary
set x-pos 3
set width 1
set height 1
next
edit 5
set type fortiview
set x-pos 4
set width 2
set height 1
set fortiview-type "endpointDevices"
set fortiview-sort-by "vulnerabilities"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 3
set name "Network"
set vdom "root"
config widget
edit 1
set type routing
set width 2
set height 1
set router-view-type "staticdynamic"
next
edit 2
set type dhcp
set x-pos 1
set width 2
set height 1
next
edit 3
set type virtual-wan
set x-pos 2
set width 2
set height 1
next
edit 4
set type ipsec-vpn
set x-pos 3
set width 2
set height 1
next
edit 5
set type ssl-vpn
set x-pos 4
set width 2
set height 1
next
end
next
edit 4
set name "Users & Devices"
set vdom "root"
config widget
edit 1
set type device-inventory
set width 2
set height 1
set table-visualization "charts"
set device-list-view-type "hardware_vendor"
next
edit 2
set type forticlient
set x-pos 1
set width 2
set height 1
set table-visualization "charts"
set device-list-online "online"
set device-list-telemetry "sending"
set device-list-view-type "interface"
next
edit 3
set type firewall-user
set x-pos 2
set width 2
set height 1
next
edit 4
set type quarantine
set x-pos 3
set width 2
set height 1
next
edit 5
set type nac-vlans
set x-pos 4
set width 2
set height 1
next
end
next
edit 5
set name "WiFi"
set vdom "root"
config widget
edit 1
set type ap-status
set width 2
set height 1
next
edit 2
set type channel-utilization
set x-pos 1
set width 2
set height 1
set wifi-band "both"
next
edit 3
set type clients-by-ap
set x-pos 2
set width 2
set height 1
set wifi-band "both"
next
edit 4
set type client-signal-strength
set x-pos 3
set width 2
set height 1
set wifi-band "both"
next
edit 5
set type rogue-ap
set x-pos 4
set width 2
set height 1
next
edit 6
set type historical-clients
set x-pos 5
set width 2
set height 1
set wifi-band "both"
next
edit 7
set type interfering-ssids
set x-pos 6
set width 2
set height 1
set wifi-band "both"
next
edit 8
set type wifi-login-failures
set x-pos 7
set width 2
set height 1
next
end
next
edit 6
set name "FortiView Sources"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "source"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 7
set name "FortiView Destinations"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "destination"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 8
set name "FortiView Applications"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "application"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 9
set name "FortiView Web Sites"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "website"
set fortiview-sort-by "sessions"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 10
set name "FortiView Policies"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "policy"
set fortiview-sort-by "bytes"
set fortiview-timeframe "hour"
set fortiview-visualization "table"
next
end
next
edit 11
set name "FortiView Sessions"
set vdom "root"
set layout-type standalone
set csf disable
config widget
edit 1
set type fortiview
set width 6
set height 3
set fortiview-type "realtimeSessions"
set fortiview-sort-by "bytes"
set fortiview-timeframe "realtime"
set fortiview-visualization "table"
next
end
next
end
set password ENC SH2lCFfJ7N8SytHY6Mepb+XOtlilexNutMAkccGDEL95ly0Kv3C5dSVnK9ogrM=
next
end
config system sso-admin
end
config system sso-fortigate-cloud-admin
edit "coleman.chen@veolia.com"
set vdom "root"
next
end
config system ha
set override disable
end
config system storage
edit "Internal"
set status enable
set media-status enable
set order 1
set partition "LOGUSEDXD4B73792"
set device "/dev/sda1"
set size 120186
set usage log
next
end
config system dns
set primary 8.8.8.8
set secondary 168.95.192.1
set ssl-certificate "wildcard.tahoho.com.tw"
end
config system replacemsg-image
edit "logo_fnet"
set image-type gif
next
edit "logo_fguard_wf"
set image-type gif
next
edit "logo_v3_fguard_app"
next
end
config system replacemsg mail "partial"
end
config system replacemsg http "url-block"
end
config system replacemsg http "urlfilter-err"
end
config system replacemsg http "infcache-block"
end
config system replacemsg http "http-contenttypeblock"
end
config system replacemsg http "https-invalid-cert-block"
end
config system replacemsg http "https-untrusted-cert-block"
end
config system replacemsg http "https-blocklisted-cert-block"
end
config system replacemsg http "switching-protocols-block"
end
config system replacemsg http "http-antiphish-block"
end
config system replacemsg http "videofilter-block"
end
config system replacemsg webproxy "deny"
end
config system replacemsg webproxy "user-limit"
end
config system replacemsg webproxy "auth-challenge"
end
config system replacemsg webproxy "auth-login-fail"
end
config system replacemsg webproxy "auth-group-info-fail"
end
config system replacemsg webproxy "http-err"
end
config system replacemsg webproxy "auth-ip-blackout"
end
config system replacemsg webproxy "ztna-block"
end
config system replacemsg ftp "ftp-explicit-banner"
end
config system replacemsg fortiguard-wf "ftgd-block"
end
config system replacemsg fortiguard-wf "ftgd-ovrd"
end
config system replacemsg fortiguard-wf "ftgd-quota"
end
config system replacemsg fortiguard-wf "ftgd-warning"
end
config system replacemsg spam "ipblocklist"
end
config system replacemsg spam "smtp-spam-dnsbl"
end
config system replacemsg spam "smtp-spam-feip"
end
config system replacemsg spam "smtp-spam-helo"
end
config system replacemsg spam "smtp-spam-emailblock-to"
end
config system replacemsg spam "smtp-spam-emailblock-from"
end
config system replacemsg spam "smtp-spam-emailblock-subject"
end
config system replacemsg spam "smtp-spam-mimeheader"
end
config system replacemsg spam "reversedns"
end
config system replacemsg spam "smtp-spam-ase"
end
config system replacemsg spam "submit"
end
config system replacemsg alertmail "alertmail-virus"
end
config system replacemsg alertmail "alertmail-block"
end
config system replacemsg alertmail "alertmail-nids-event"
end
config system replacemsg alertmail "alertmail-crit-event"
end
config system replacemsg alertmail "alertmail-disk-full"
end
config system replacemsg admin "pre_admin-disclaimer-text"
end
config system replacemsg admin "post_admin-disclaimer-text"
end
config system replacemsg auth "auth-disclaimer-page-1"
end
config system replacemsg auth "auth-disclaimer-page-2"
end
config system replacemsg auth "auth-disclaimer-page-3"
end
config system replacemsg auth "auth-proxy-reject-page"
end
config system replacemsg auth "auth-reject-page"
end
config system replacemsg auth "auth-login-page"
end
config system replacemsg auth "auth-login-failed-page"
end
config system replacemsg auth "auth-token-login-page"
end
config system replacemsg auth "auth-token-login-failed-page"
end
config system replacemsg auth "auth-success-msg"
end
config system replacemsg auth "auth-challenge-page"
end
config system replacemsg auth "auth-keepalive-page"
end
config system replacemsg auth "auth-portal-page"
end
config system replacemsg auth "auth-password-page"
end
config system replacemsg auth "auth-fortitoken-page"
end
config system replacemsg auth "auth-next-fortitoken-page"
end
config system replacemsg auth "auth-email-token-page"
end
config system replacemsg auth "auth-sms-token-page"
end
config system replacemsg auth "auth-email-harvesting-page"
end
config system replacemsg auth "auth-email-failed-page"
end
config system replacemsg auth "auth-cert-passwd-page"
end
config system replacemsg auth "auth-guest-print-page"
end
config system replacemsg auth "auth-guest-email-page"
end
config system replacemsg auth "auth-success-page"
end
config system replacemsg auth "auth-block-notification-page"
end
config system replacemsg auth "auth-quarantine-page"
end
config system replacemsg auth "auth-qtn-reject-page"
end
config system replacemsg auth "auth-saml-page"
end
config system replacemsg sslvpn "sslvpn-login"
end
config system replacemsg sslvpn "sslvpn-header"
end
config system replacemsg sslvpn "sslvpn-limit"
end
config system replacemsg sslvpn "hostcheck-error"
end
config system replacemsg sslvpn "sslvpn-provision-user"
end
config system replacemsg sslvpn "sslvpn-provision-user-sms"
end
config system replacemsg nac-quar "nac-quar-virus"
end
config system replacemsg nac-quar "nac-quar-dos"
end
config system replacemsg nac-quar "nac-quar-ips"
end
config system replacemsg nac-quar "nac-quar-dlp"
end
config system replacemsg nac-quar "nac-quar-admin"
end
config system replacemsg nac-quar "nac-quar-app"
end
config system replacemsg traffic-quota "per-ip-shaper-block"
end
config system replacemsg utm "virus-html"
end
config system replacemsg utm "client-virus-html"
end
config system replacemsg utm "virus-text"
end
config system replacemsg utm "dlp-html"
end
config system replacemsg utm "dlp-text"
end
config system replacemsg utm "appblk-html"
end
config system replacemsg utm "ipsblk-html"
end
config system replacemsg utm "ipsfail-html"
end
config system replacemsg utm "exe-text"
end
config system replacemsg utm "waf-html"
end
config system replacemsg utm "outbreak-prevention-html"
end
config system replacemsg utm "outbreak-prevention-text"
end
config system replacemsg utm "external-blocklist-html"
end
config system replacemsg utm "external-blocklist-text"
end
config system replacemsg utm "ems-threat-feed-html"
end
config system replacemsg utm "ems-threat-feed-text"
end
config system replacemsg utm "file-filter-html"
end
config system replacemsg utm "file-filter-text"
end
config system replacemsg utm "file-size-text"
end
config system replacemsg utm "transfer-size-text"
end
config system replacemsg utm "internal-error-text"
end
config system replacemsg utm "archive-block-html"
end
config system replacemsg utm "archive-block-text"
end
config system replacemsg utm "file-av-fail-text"
end
config system replacemsg utm "transfer-av-fail-text"
end
config system replacemsg utm "banned-word-html"
end
config system replacemsg utm "banned-word-text"
end
config system replacemsg utm "block-html"
end
config system replacemsg utm "block-text"
end
config system replacemsg utm "decompress-limit-text"
end
config system replacemsg utm "dlp-subject-text"
end
config system replacemsg utm "file-size-html"
end
config system replacemsg utm "client-file-size-html"
end
config system replacemsg utm "inline-scan-timeout-html"
end
config system replacemsg utm "inline-scan-timeout-text"
end
config system replacemsg utm "inline-scan-error-html"
end
config system replacemsg utm "inline-scan-error-text"
end
config system replacemsg utm "icap-block-text"
end
config system replacemsg utm "icap-error-text"
end
config system replacemsg utm "icap-http-error"
end
config system replacemsg icap "icap-req-resp"
end
config system replacemsg automation "automation-email"
end
config system snmp sysinfo
end
config system central-management
set type fortiguard
end
config firewall internet-service-name
edit "Google-Other"
set internet-service-id 65536
next
edit "Google-Web"
set internet-service-id 65537
next
edit "Google-ICMP"
set internet-service-id 65538
next
edit "Google-DNS"
set internet-service-id 65539
next
edit "Google-Outbound_Email"
set internet-service-id 65540
next
edit "Google-SSH"
set internet-service-id 65542
next
edit "Google-FTP"
set internet-service-id 65543
next
edit "Google-NTP"
set internet-service-id 65544
next
edit "Google-Inbound_Email"
set internet-service-id 65545
next
edit "Google-LDAP"
set internet-service-id 65550
next
edit "Google-NetBIOS.Session.Service"
set internet-service-id 65551
next
edit "Google-RTMP"
set internet-service-id 65552
next
edit "Google-NetBIOS.Name.Service"
set internet-service-id 65560
next
edit "Google-Google.Cloud"
set internet-service-id 65641
next
edit "Google-Google.Bot"
set internet-service-id 65643
next
edit "Google-Gmail"
set internet-service-id 65646
next
edit "Meta-Other"
set internet-service-id 131072
next
edit "Meta-Web"
set internet-service-id 131073
next
edit "Meta-ICMP"
set internet-service-id 131074
next
edit "Meta-DNS"
set internet-service-id 131075
next
edit "Meta-Outbound_Email"
set internet-service-id 131076
next
edit "Meta-SSH"
set internet-service-id 131078
next
edit "Meta-FTP"
set internet-service-id 131079
next
edit "Meta-NTP"
set internet-service-id 131080
next
edit "Meta-Inbound_Email"
set internet-service-id 131081
next
edit "Meta-LDAP"
set internet-service-id 131086
next
edit "Meta-NetBIOS.Session.Service"
set internet-service-id 131087
next
edit "Meta-RTMP"
set internet-service-id 131088
next
edit "Meta-NetBIOS.Name.Service"
set internet-service-id 131096
next
edit "Meta-Whatsapp"
set internet-service-id 131184
next
edit "Meta-Instagram"
set internet-service-id 131189
next
edit "Apple-Other"
set internet-service-id 196608
next
edit "Apple-Web"
set internet-service-id 196609
next
edit "Apple-ICMP"
set internet-service-id 196610
next
edit "Apple-DNS"
set internet-service-id 196611
next
edit "Apple-Outbound_Email"
set internet-service-id 196612
next
edit "Apple-SSH"
set internet-service-id 196614
next
edit "Apple-FTP"
set internet-service-id 196615
next
edit "Apple-NTP"
set internet-service-id 196616
next
edit "Apple-Inbound_Email"
set internet-service-id 196617
next
edit "Apple-LDAP"
set internet-service-id 196622
next
edit "Apple-NetBIOS.Session.Service"
set internet-service-id 196623
next
edit "Apple-RTMP"
set internet-service-id 196624
next
edit "Apple-NetBIOS.Name.Service"
set internet-service-id 196632
next
edit "Apple-App.Store"
set internet-service-id 196723
next
edit "Apple-APNs"
set internet-service-id 196747
next
edit "Yahoo-Other"
set internet-service-id 262144
next
edit "Yahoo-Web"
set internet-service-id 262145
next
edit "Yahoo-ICMP"
set internet-service-id 262146
next
edit "Yahoo-DNS"
set internet-service-id 262147
next
edit "Yahoo-Outbound_Email"
set internet-service-id 262148
next
edit "Yahoo-SSH"
set internet-service-id 262150
next
edit "Yahoo-FTP"
set internet-service-id 262151
next
edit "Yahoo-NTP"
set internet-service-id 262152
next
edit "Yahoo-Inbound_Email"
set internet-service-id 262153
next
edit "Yahoo-LDAP"
set internet-service-id 262158
next
edit "Yahoo-NetBIOS.Session.Service"
set internet-service-id 262159
next
edit "Yahoo-RTMP"
set internet-service-id 262160
next
edit "Yahoo-NetBIOS.Name.Service"
set internet-service-id 262168
next
edit "Microsoft-Other"
set internet-service-id 327680
next
edit "Microsoft-Web"
set internet-service-id 327681
next
edit "Microsoft-ICMP"
set internet-service-id 327682
next
edit "Microsoft-DNS"
set internet-service-id 327683
next
edit "Microsoft-Outbound_Email"
set internet-service-id 327684
next
edit "Microsoft-SSH"
set internet-service-id 327686
next
edit "Microsoft-FTP"
set internet-service-id 327687
next
edit "Microsoft-NTP"
set internet-service-id 327688
next
edit "Microsoft-Inbound_Email"
set internet-service-id 327689
next
edit "Microsoft-LDAP"
set internet-service-id 327694
next
edit "Microsoft-NetBIOS.Session.Service"
set internet-service-id 327695
next
edit "Microsoft-RTMP"
set internet-service-id 327696
next
edit "Microsoft-NetBIOS.Name.Service"
set internet-service-id 327704
next
edit "Microsoft-Skype_Teams"
set internet-service-id 327781
next
edit "Microsoft-Office365"
set internet-service-id 327782
next
edit "Microsoft-Azure"
set internet-service-id 327786
next
edit "Microsoft-Bing.Bot"
set internet-service-id 327788
next
edit "Microsoft-Outlook"
set internet-service-id 327791
next
edit "Microsoft-Microsoft.Update"
set internet-service-id 327793
next
edit "Microsoft-Dynamics"
set internet-service-id 327837
next
edit "Microsoft-WNS"
set internet-service-id 327839
next
edit "Microsoft-Office365.Published"
set internet-service-id 327880
next
edit "Microsoft-Intune"
set internet-service-id 327886
next
edit "Microsoft-Office365.Published.Optimize"
set internet-service-id 327902
next
edit "Microsoft-Office365.Published.Allow"
set internet-service-id 327903
next
edit "Microsoft-Office365.Published.USGOV"
set internet-service-id 327917
next
edit "Microsoft-Azure.Monitor"
set internet-service-id 327958
next
edit "Microsoft-Azure.SQL"
set internet-service-id 327959
next
edit "Microsoft-Azure.AD"
set internet-service-id 327960
next
edit "Microsoft-Azure.Data.Factory"
set internet-service-id 327961
next
edit "Microsoft-Azure.Virtual.Desktop"
set internet-service-id 327962
next
edit "Microsoft-Azure.Power.BI"
set internet-service-id 327963
next
edit "Amazon-Other"
set internet-service-id 393216
next
edit "Amazon-Web"
set internet-service-id 393217
next
edit "Amazon-ICMP"
set internet-service-id 393218
next
edit "Amazon-DNS"
set internet-service-id 393219
next
edit "Amazon-Outbound_Email"
set internet-service-id 393220
next
edit "Amazon-SSH"
set internet-service-id 393222
next
edit "Amazon-FTP"
set internet-service-id 393223
next
edit "Amazon-NTP"
set internet-service-id 393224
next
edit "Amazon-Inbound_Email"
set internet-service-id 393225
next
edit "Amazon-LDAP"
set internet-service-id 393230
next
edit "Amazon-NetBIOS.Session.Service"
set internet-service-id 393231
next
edit "Amazon-RTMP"
set internet-service-id 393232
next
edit "Amazon-NetBIOS.Name.Service"
set internet-service-id 393240
next
edit "Amazon-AWS"
set internet-service-id 393320
next
edit "Amazon-AWS.WorkSpaces.Gateway"
set internet-service-id 393403
next
edit "Amazon-Twitch"
set internet-service-id 393446
next
edit "Amazon-AWS.GovCloud.US"
set internet-service-id 393452
next
edit "Amazon-AWS.EBS"
set internet-service-id 393470
next
edit "Amazon-AWS.Cloud9"
set internet-service-id 393471
next
edit "Amazon-AWS.DynamoDB"
set internet-service-id 393472
next
edit "Amazon-AWS.Route53"
set internet-service-id 393473
next
edit "Amazon-AWS.S3"
set internet-service-id 393474
next
edit "Amazon-AWS.Kinesis.Video.Streams"
set internet-service-id 393475
next
edit "Amazon-AWS.Global.Accelerator"
set internet-service-id 393476
next
edit "Amazon-AWS.EC2"
set internet-service-id 393477
next
edit "Amazon-AWS.API.Gateway"
set internet-service-id 393478
next
edit "Amazon-AWS.Chime.Voice.Connector"
set internet-service-id 393479
next
edit "Amazon-AWS.Connect"
set internet-service-id 393480
next
edit "Amazon-AWS.CloudFront"
set internet-service-id 393481
next
edit "Amazon-AWS.CodeBuild"
set internet-service-id 393482
next
edit "Amazon-AWS.Chime.Meetings"
set internet-service-id 393483
next
edit "Amazon-AWS.AppFlow"
set internet-service-id 393484
next
edit "Amazon-Amazon.SES"
set internet-service-id 393493
next
edit "eBay-Other"
set internet-service-id 458752
next
edit "eBay-Web"
set internet-service-id 458753
next
edit "eBay-ICMP"
set internet-service-id 458754
next
edit "eBay-DNS"
set internet-service-id 458755
next
edit "eBay-Outbound_Email"
set internet-service-id 458756
next
edit "eBay-SSH"
set internet-service-id 458758
next
edit "eBay-FTP"
set internet-service-id 458759
next
edit "eBay-NTP"
set internet-service-id 458760
next
edit "eBay-Inbound_Email"
set internet-service-id 458761
next
edit "eBay-LDAP"
set internet-service-id 458766
next
edit "eBay-NetBIOS.Session.Service"
set internet-service-id 458767
next
edit "eBay-RTMP"
set internet-service-id 458768
next
edit "eBay-NetBIOS.Name.Service"
set internet-service-id 458776
next
edit "PayPal-Other"
set internet-service-id 524288
next
edit "PayPal-Web"
set internet-service-id 524289
next
edit "PayPal-ICMP"
set internet-service-id 524290
next
edit "PayPal-DNS"
set internet-service-id 524291
next
edit "PayPal-Outbound_Email"
set internet-service-id 524292
next
edit "PayPal-SSH"
set internet-service-id 524294
next
edit "PayPal-FTP"
set internet-service-id 524295
next
edit "PayPal-NTP"
set internet-service-id 524296
next
edit "PayPal-Inbound_Email"
set internet-service-id 524297
next
edit "PayPal-LDAP"
set internet-service-id 524302
next
edit "PayPal-NetBIOS.Session.Service"
set internet-service-id 524303
next
edit "PayPal-RTMP"
set internet-service-id 524304
next
edit "PayPal-NetBIOS.Name.Service"
set internet-service-id 524312
next
edit "Box-Other"
set internet-service-id 589824
next
edit "Box-Web"
set internet-service-id 589825
next
edit "Box-ICMP"
set internet-service-id 589826
next
edit "Box-DNS"
set internet-service-id 589827
next
edit "Box-Outbound_Email"
set internet-service-id 589828
next
edit "Box-SSH"
set internet-service-id 589830
next
edit "Box-FTP"
set internet-service-id 589831
next
edit "Box-NTP"
set internet-service-id 589832
next
edit "Box-Inbound_Email"
set internet-service-id 589833
next
edit "Box-LDAP"
set internet-service-id 589838
next
edit "Box-NetBIOS.Session.Service"
set internet-service-id 589839
next
edit "Box-RTMP"
set internet-service-id 589840
next
edit "Box-NetBIOS.Name.Service"
set internet-service-id 589848
next
edit "Salesforce-Other"
set internet-service-id 655360
next
edit "Salesforce-Web"
set internet-service-id 655361
next
edit "Salesforce-ICMP"
set internet-service-id 655362
next
edit "Salesforce-DNS"
set internet-service-id 655363
next
edit "Salesforce-Outbound_Email"
set internet-service-id 655364
next
edit "Salesforce-SSH"
set internet-service-id 655366
next
edit "Salesforce-FTP"
set internet-service-id 655367
next
edit "Salesforce-NTP"
set internet-service-id 655368
next
edit "Salesforce-Inbound_Email"
set internet-service-id 655369
next
edit "Salesforce-LDAP"
set internet-service-id 655374
next
edit "Salesforce-NetBIOS.Session.Service"
set internet-service-id 655375
next
edit "Salesforce-RTMP"
set internet-service-id 655376
next
edit "Salesforce-NetBIOS.Name.Service"
set internet-service-id 655384
next
edit "Salesforce-Email.Relay"
set internet-service-id 655530
next
edit "Dropbox-Other"
set internet-service-id 720896
next
edit "Dropbox-Web"
set internet-service-id 720897
next
edit "Dropbox-ICMP"
set internet-service-id 720898
next
edit "Dropbox-DNS"
set internet-service-id 720899
next
edit "Dropbox-Outbound_Email"
set internet-service-id 720900
next
edit "Dropbox-SSH"
set internet-service-id 720902
next
edit "Dropbox-FTP"
set internet-service-id 720903
next
edit "Dropbox-NTP"
set internet-service-id 720904
next
edit "Dropbox-Inbound_Email"
set internet-service-id 720905
next
edit "Dropbox-LDAP"
set internet-service-id 720910
next
edit "Dropbox-NetBIOS.Session.Service"
set internet-service-id 720911
next
edit "Dropbox-RTMP"
set internet-service-id 720912
next
edit "Dropbox-NetBIOS.Name.Service"
set internet-service-id 720920
next
edit "Netflix-Other"
set internet-service-id 786432
next
edit "Netflix-Web"
set internet-service-id 786433
next
edit "Netflix-ICMP"
set internet-service-id 786434
next
edit "Netflix-DNS"
set internet-service-id 786435
next
edit "Netflix-Outbound_Email"
set internet-service-id 786436
next
edit "Netflix-SSH"
set internet-service-id 786438
next
edit "Netflix-FTP"
set internet-service-id 786439
next
edit "Netflix-NTP"
set internet-service-id 786440
next
edit "Netflix-Inbound_Email"
set internet-service-id 786441
next
edit "Netflix-LDAP"
set internet-service-id 786446
next
edit "Netflix-NetBIOS.Session.Service"
set internet-service-id 786447
next
edit "Netflix-RTMP"
set internet-service-id 786448
next
edit "Netflix-NetBIOS.Name.Service"
set internet-service-id 786456
next
edit "LinkedIn-Other"
set internet-service-id 851968
next
edit "LinkedIn-Web"
set internet-service-id 851969
next
edit "LinkedIn-ICMP"
set internet-service-id 851970
next
edit "LinkedIn-DNS"
set internet-service-id 851971
next
edit "LinkedIn-Outbound_Email"
set internet-service-id 851972
next
edit "LinkedIn-SSH"
set internet-service-id 851974
next
edit "LinkedIn-FTP"
set internet-service-id 851975
next
edit "LinkedIn-NTP"
set internet-service-id 851976
next
edit "LinkedIn-Inbound_Email"
set internet-service-id 851977
next
edit "LinkedIn-LDAP"
set internet-service-id 851982
next
edit "LinkedIn-NetBIOS.Session.Service"
set internet-service-id 851983
next
edit "LinkedIn-RTMP"
set internet-service-id 851984
next
edit "LinkedIn-NetBIOS.Name.Service"
set internet-service-id 851992
next
edit "Adobe-Other"
set internet-service-id 917504
next
edit "Adobe-Web"
set internet-service-id 917505
next
edit "Adobe-ICMP"
set internet-service-id 917506
next
edit "Adobe-DNS"
set internet-service-id 917507
next
edit "Adobe-Outbound_Email"
set internet-service-id 917508
next
edit "Adobe-SSH"
set internet-service-id 917510
next
edit "Adobe-FTP"
set internet-service-id 917511
next
edit "Adobe-NTP"
set internet-service-id 917512
next
edit "Adobe-Inbound_Email"
set internet-service-id 917513
next
edit "Adobe-LDAP"
set internet-service-id 917518
next
edit "Adobe-NetBIOS.Session.Service"
set internet-service-id 917519
next
edit "Adobe-RTMP"
set internet-service-id 917520
next
edit "Adobe-NetBIOS.Name.Service"
set internet-service-id 917528
next
edit "Adobe-Adobe.Experience.Cloud"
set internet-service-id 917640
next
edit "Adobe-Adobe.Sign"
set internet-service-id 917776
next
edit "Oracle-Other"
set internet-service-id 983040
next
edit "Oracle-Web"
set internet-service-id 983041
next
edit "Oracle-ICMP"
set internet-service-id 983042
next
edit "Oracle-DNS"
set internet-service-id 983043
next
edit "Oracle-Outbound_Email"
set internet-service-id 983044
next
edit "Oracle-SSH"
set internet-service-id 983046
next
edit "Oracle-FTP"
set internet-service-id 983047
next
edit "Oracle-NTP"
set internet-service-id 983048
next
edit "Oracle-Inbound_Email"
set internet-service-id 983049
next
edit "Oracle-LDAP"
set internet-service-id 983054
next
edit "Oracle-NetBIOS.Session.Service"
set internet-service-id 983055
next
edit "Oracle-RTMP"
set internet-service-id 983056
next
edit "Oracle-NetBIOS.Name.Service"
set internet-service-id 983064
next
edit "Oracle-Oracle.Cloud"
set internet-service-id 983171
next
edit "Hulu-Other"
set internet-service-id 1048576
next
edit "Hulu-Web"
set internet-service-id 1048577
next
edit "Hulu-ICMP"
set internet-service-id 1048578
next
edit "Hulu-DNS"
set internet-service-id 1048579
next
edit "Hulu-Outbound_Email"
set internet-service-id 1048580
next
edit "Hulu-SSH"
set internet-service-id 1048582
next
edit "Hulu-FTP"
set internet-service-id 1048583
next
edit "Hulu-NTP"
set internet-service-id 1048584
next
edit "Hulu-Inbound_Email"
set internet-service-id 1048585
next
edit "Hulu-LDAP"
set internet-service-id 1048590
next
edit "Hulu-NetBIOS.Session.Service"
set internet-service-id 1048591
next
edit "Hulu-RTMP"
set internet-service-id 1048592
next
edit "Hulu-NetBIOS.Name.Service"
set internet-service-id 1048600
next
edit "Pinterest-Other"
set internet-service-id 1114112
next
edit "Pinterest-Web"
set internet-service-id 1114113
next
edit "Pinterest-ICMP"
set internet-service-id 1114114
next
edit "Pinterest-DNS"
set internet-service-id 1114115
next
edit "Pinterest-Outbound_Email"
set internet-service-id 1114116
next
edit "Pinterest-SSH"
set internet-service-id 1114118
next
edit "Pinterest-FTP"
set internet-service-id 1114119
next
edit "Pinterest-NTP"
set internet-service-id 1114120
next
edit "Pinterest-Inbound_Email"
set internet-service-id 1114121
next
edit "Pinterest-LDAP"
set internet-service-id 1114126
next
edit "Pinterest-NetBIOS.Session.Service"
set internet-service-id 1114127
next
edit "Pinterest-RTMP"
set internet-service-id 1114128
next
edit "Pinterest-NetBIOS.Name.Service"
set internet-service-id 1114136
next
edit "LogMeIn-Other"
set internet-service-id 1179648
next
edit "LogMeIn-Web"
set internet-service-id 1179649
next
edit "LogMeIn-ICMP"
set internet-service-id 1179650
next
edit "LogMeIn-DNS"
set internet-service-id 1179651
next
edit "LogMeIn-Outbound_Email"
set internet-service-id 1179652
next
edit "LogMeIn-SSH"
set internet-service-id 1179654
next
edit "LogMeIn-FTP"
set internet-service-id 1179655
next
edit "LogMeIn-NTP"
set internet-service-id 1179656
next
edit "LogMeIn-Inbound_Email"
set internet-service-id 1179657
next
edit "LogMeIn-LDAP"
set internet-service-id 1179662
next
edit "LogMeIn-NetBIOS.Session.Service"
set internet-service-id 1179663
next
edit "LogMeIn-RTMP"
set internet-service-id 1179664
next
edit "LogMeIn-NetBIOS.Name.Service"
set internet-service-id 1179672
next
edit "LogMeIn-GoTo.Suite"
set internet-service-id 1179767
next
edit "Fortinet-Other"
set internet-service-id 1245184
next
edit "Fortinet-Web"
set internet-service-id 1245185
next
edit "Fortinet-ICMP"
set internet-service-id 1245186
next
edit "Fortinet-DNS"
set internet-service-id 1245187
next
edit "Fortinet-Outbound_Email"
set internet-service-id 1245188
next
edit "Fortinet-SSH"
set internet-service-id 1245190
next
edit "Fortinet-FTP"
set internet-service-id 1245191
next
edit "Fortinet-NTP"
set internet-service-id 1245192
next
edit "Fortinet-Inbound_Email"
set internet-service-id 1245193
next
edit "Fortinet-LDAP"
set internet-service-id 1245198
next
edit "Fortinet-NetBIOS.Session.Service"
set internet-service-id 1245199
next
edit "Fortinet-RTMP"
set internet-service-id 1245200
next
edit "Fortinet-NetBIOS.Name.Service"
set internet-service-id 1245208
next
edit "Fortinet-FortiGuard"
set internet-service-id 1245324
next
edit "Fortinet-FortiMail.Cloud"
set internet-service-id 1245325
next
edit "Fortinet-FortiCloud"
set internet-service-id 1245326
next
edit "Fortinet-FortiVoice.Cloud"
set internet-service-id 1245432
next
edit "Fortinet-FortiGuard.Secure.DNS"
set internet-service-id 1245454
next
edit "Fortinet-FortiEDR"
set internet-service-id 1245475
next
edit "Fortinet-FortiClient.EMS"
set internet-service-id 1245477
next
edit "Kaspersky-Other"
set internet-service-id 1310720
next
edit "Kaspersky-Web"
set internet-service-id 1310721
next
edit "Kaspersky-ICMP"
set internet-service-id 1310722
next
edit "Kaspersky-DNS"
set internet-service-id 1310723
next
edit "Kaspersky-Outbound_Email"
set internet-service-id 1310724
next
edit "Kaspersky-SSH"
set internet-service-id 1310726
next
edit "Kaspersky-FTP"
set internet-service-id 1310727
next
edit "Kaspersky-NTP"
set internet-service-id 1310728
next
edit "Kaspersky-Inbound_Email"
set internet-service-id 1310729
next
edit "Kaspersky-LDAP"
set internet-service-id 1310734
next
edit "Kaspersky-NetBIOS.Session.Service"
set internet-service-id 1310735
next
edit "Kaspersky-RTMP"
set internet-service-id 1310736
next
edit "Kaspersky-NetBIOS.Name.Service"
set internet-service-id 1310744
next
edit "McAfee-Other"
set internet-service-id 1376256
next
edit "McAfee-Web"
set internet-service-id 1376257
next
edit "McAfee-ICMP"
set internet-service-id 1376258
next
edit "McAfee-DNS"
set internet-service-id 1376259
next
edit "McAfee-Outbound_Email"
set internet-service-id 1376260
next
edit "McAfee-SSH"
set internet-service-id 1376262
next
edit "McAfee-FTP"
set internet-service-id 1376263
next
edit "McAfee-NTP"
set internet-service-id 1376264
next
edit "McAfee-Inbound_Email"
set internet-service-id 1376265
next
edit "McAfee-LDAP"
set internet-service-id 1376270
next
edit "McAfee-NetBIOS.Session.Service"
set internet-service-id 1376271
next
edit "McAfee-RTMP"
set internet-service-id 1376272
next
edit "McAfee-NetBIOS.Name.Service"
set internet-service-id 1376280
next
edit "Symantec-Other"
set internet-service-id 1441792
next
edit "Symantec-Web"
set internet-service-id 1441793
next
edit "Symantec-ICMP"
set internet-service-id 1441794
next
edit "Symantec-DNS"
set internet-service-id 1441795
next
edit "Symantec-Outbound_Email"
set internet-service-id 1441796
next
edit "Symantec-SSH"
set internet-service-id 1441798
next
edit "Symantec-FTP"
set internet-service-id 1441799
next
edit "Symantec-NTP"
set internet-service-id 1441800
next
edit "Symantec-Inbound_Email"
set internet-service-id 1441801
next
edit "Symantec-LDAP"
set internet-service-id 1441806
next
edit "Symantec-NetBIOS.Session.Service"
set internet-service-id 1441807
next
edit "Symantec-RTMP"
set internet-service-id 1441808
next
edit "Symantec-NetBIOS.Name.Service"
set internet-service-id 1441816
next
edit "Symantec-Symantec.Cloud"
set internet-service-id 1441922
next
edit "VMware-Other"
set internet-service-id 1507328
next
edit "VMware-Web"
set internet-service-id 1507329
next
edit "VMware-ICMP"
set internet-service-id 1507330
next
edit "VMware-DNS"
set internet-service-id 1507331
next
edit "VMware-Outbound_Email"
set internet-service-id 1507332
next
edit "VMware-SSH"
set internet-service-id 1507334
next
edit "VMware-FTP"
set internet-service-id 1507335
next
edit "VMware-NTP"
set internet-service-id 1507336
next
edit "VMware-Inbound_Email"
set internet-service-id 1507337
next
edit "VMware-LDAP"
set internet-service-id 1507342
next
edit "VMware-NetBIOS.Session.Service"
set internet-service-id 1507343
next
edit "VMware-RTMP"
set internet-service-id 1507344
next
edit "VMware-NetBIOS.Name.Service"
set internet-service-id 1507352
next
edit "VMware-Workspace.ONE"
set internet-service-id 1507461
next
edit "AOL-Other"
set internet-service-id 1572864
next
edit "AOL-Web"
set internet-service-id 1572865
next
edit "AOL-ICMP"
set internet-service-id 1572866
next
edit "AOL-DNS"
set internet-service-id 1572867
next
edit "AOL-Outbound_Email"
set internet-service-id 1572868
next
edit "AOL-SSH"
set internet-service-id 1572870
next
edit "AOL-FTP"
set internet-service-id 1572871
next
edit "AOL-NTP"
set internet-service-id 1572872
next
edit "AOL-Inbound_Email"
set internet-service-id 1572873
next
edit "AOL-LDAP"
set internet-service-id 1572878
next
edit "AOL-NetBIOS.Session.Service"
set internet-service-id 1572879
next
edit "AOL-RTMP"
set internet-service-id 1572880
next
edit "AOL-NetBIOS.Name.Service"
set internet-service-id 1572888
next
edit "RealNetworks-Other"
set internet-service-id 1638400
next
edit "RealNetworks-Web"
set internet-service-id 1638401
next
edit "RealNetworks-ICMP"
set internet-service-id 1638402
next
edit "RealNetworks-DNS"
set internet-service-id 1638403
next
edit "RealNetworks-Outbound_Email"
set internet-service-id 1638404
next
edit "RealNetworks-SSH"
set internet-service-id 1638406
next
edit "RealNetworks-FTP"
set internet-service-id 1638407
next
edit "RealNetworks-NTP"
set internet-service-id 1638408
next
edit "RealNetworks-Inbound_Email"
set internet-service-id 1638409
next
edit "RealNetworks-LDAP"
set internet-service-id 1638414
next
edit "RealNetworks-NetBIOS.Session.Service"
set internet-service-id 1638415
next
edit "RealNetworks-RTMP"
set internet-service-id 1638416
next
edit "RealNetworks-NetBIOS.Name.Service"
set internet-service-id 1638424
next
edit "Zoho-Other"
set internet-service-id 1703936
next
edit "Zoho-Web"
set internet-service-id 1703937
next
edit "Zoho-ICMP"
set internet-service-id 1703938
next
edit "Zoho-DNS"
set internet-service-id 1703939
next
edit "Zoho-Outbound_Email"
set internet-service-id 1703940
next
edit "Zoho-SSH"
set internet-service-id 1703942
next
edit "Zoho-FTP"
set internet-service-id 1703943
next
edit "Zoho-NTP"
set internet-service-id 1703944
next
edit "Zoho-Inbound_Email"
set internet-service-id 1703945
next
edit "Zoho-LDAP"
set internet-service-id 1703950
next
edit "Zoho-NetBIOS.Session.Service"
set internet-service-id 1703951
next
edit "Zoho-RTMP"
set internet-service-id 1703952
next
edit "Zoho-NetBIOS.Name.Service"
set internet-service-id 1703960
next
edit "Zoho-Site24x7.Monitor"
set internet-service-id 1704153
next
edit "Mozilla-Other"
set internet-service-id 1769472
next
edit "Mozilla-Web"
set internet-service-id 1769473
next
edit "Mozilla-ICMP"
set internet-service-id 1769474
next
edit "Mozilla-DNS"
set internet-service-id 1769475
next
edit "Mozilla-Outbound_Email"
set internet-service-id 1769476
next
edit "Mozilla-SSH"
set internet-service-id 1769478
next
edit "Mozilla-FTP"
set internet-service-id 1769479
next
edit "Mozilla-NTP"
set internet-service-id 1769480
next
edit "Mozilla-Inbound_Email"
set internet-service-id 1769481
next
edit "Mozilla-LDAP"
set internet-service-id 1769486
next
edit "Mozilla-NetBIOS.Session.Service"
set internet-service-id 1769487
next
edit "Mozilla-RTMP"
set internet-service-id 1769488
next
edit "Mozilla-NetBIOS.Name.Service"
set internet-service-id 1769496
next
edit "TeamViewer-Other"
set internet-service-id 1835008
next
edit "TeamViewer-Web"
set internet-service-id 1835009
next
edit "TeamViewer-ICMP"
set internet-service-id 1835010
next
edit "TeamViewer-DNS"
set internet-service-id 1835011
next
edit "TeamViewer-Outbound_Email"
set internet-service-id 1835012
next
edit "TeamViewer-SSH"
set internet-service-id 1835014
next
edit "TeamViewer-FTP"
set internet-service-id 1835015
next
edit "TeamViewer-NTP"
set internet-service-id 1835016
next
edit "TeamViewer-Inbound_Email"
set internet-service-id 1835017
next
edit "TeamViewer-LDAP"
set internet-service-id 1835022
next
edit "TeamViewer-NetBIOS.Session.Service"
set internet-service-id 1835023
next
edit "TeamViewer-RTMP"
set internet-service-id 1835024
next
edit "TeamViewer-NetBIOS.Name.Service"
set internet-service-id 1835032
next
edit "TeamViewer-TeamViewer"
set internet-service-id 1835117
next
edit "HP-Other"
set internet-service-id 1900544
next
edit "HP-Web"
set internet-service-id 1900545
next
edit "HP-ICMP"
set internet-service-id 1900546
next
edit "HP-DNS"
set internet-service-id 1900547
next
edit "HP-Outbound_Email"
set internet-service-id 1900548
next
edit "HP-SSH"
set internet-service-id 1900550
next
edit "HP-FTP"
set internet-service-id 1900551
next
edit "HP-NTP"
set internet-service-id 1900552
next
edit "HP-Inbound_Email"
set internet-service-id 1900553
next
edit "HP-LDAP"
set internet-service-id 1900558
next
edit "HP-NetBIOS.Session.Service"
set internet-service-id 1900559
next
edit "HP-RTMP"
set internet-service-id 1900560
next
edit "HP-NetBIOS.Name.Service"
set internet-service-id 1900568
next
edit "HP-Aruba"
set internet-service-id 1900726
next
edit "Cisco-Other"
set internet-service-id 1966080
next
edit "Cisco-Web"
set internet-service-id 1966081
next
edit "Cisco-ICMP"
set internet-service-id 1966082
next
edit "Cisco-DNS"
set internet-service-id 1966083
next
edit "Cisco-Outbound_Email"
set internet-service-id 1966084
next
edit "Cisco-SSH"
set internet-service-id 1966086
next
edit "Cisco-FTP"
set internet-service-id 1966087
next
edit "Cisco-NTP"
set internet-service-id 1966088
next
edit "Cisco-Inbound_Email"
set internet-service-id 1966089
next
edit "Cisco-LDAP"
set internet-service-id 1966094
next
edit "Cisco-NetBIOS.Session.Service"
set internet-service-id 1966095
next
edit "Cisco-RTMP"
set internet-service-id 1966096
next
edit "Cisco-NetBIOS.Name.Service"
set internet-service-id 1966104
next
edit "Cisco-Webex"
set internet-service-id 1966183
next
edit "Cisco-Meraki.Cloud"
set internet-service-id 1966218
next
edit "Cisco-Duo.Security"
set internet-service-id 1966225
next
edit "Cisco-AppDynamic"
set internet-service-id 1966260
next
edit "Cisco-Webex.FedRAMP"
set internet-service-id 1966315
next
edit "Cisco-Secure.Endpoint"
set internet-service-id 1966324
next
edit "IBM-Other"
set internet-service-id 2031616
next
edit "IBM-Web"
set internet-service-id 2031617
next
edit "IBM-ICMP"
set internet-service-id 2031618
next
edit "IBM-DNS"
set internet-service-id 2031619
next
edit "IBM-Outbound_Email"
set internet-service-id 2031620
next
edit "IBM-SSH"
set internet-service-id 2031622
next
edit "IBM-FTP"
set internet-service-id 2031623
next
edit "IBM-NTP"
set internet-service-id 2031624
next
edit "IBM-Inbound_Email"
set internet-service-id 2031625
next
edit "IBM-LDAP"
set internet-service-id 2031630
next
edit "IBM-NetBIOS.Session.Service"
set internet-service-id 2031631
next
edit "IBM-RTMP"
set internet-service-id 2031632
next
edit "IBM-NetBIOS.Name.Service"
set internet-service-id 2031640
next
edit "IBM-IBM.Cloud"
set internet-service-id 2031748
next
edit "Citrix-Other"
set internet-service-id 2097152
next
edit "Citrix-Web"
set internet-service-id 2097153
next
edit "Citrix-ICMP"
set internet-service-id 2097154
next
edit "Citrix-DNS"
set internet-service-id 2097155
next
edit "Citrix-Outbound_Email"
set internet-service-id 2097156
next
edit "Citrix-SSH"
set internet-service-id 2097158
next
edit "Citrix-FTP"
set internet-service-id 2097159
next
edit "Citrix-NTP"
set internet-service-id 2097160
next
edit "Citrix-Inbound_Email"
set internet-service-id 2097161
next
edit "Citrix-LDAP"
set internet-service-id 2097166
next
edit "Citrix-NetBIOS.Session.Service"
set internet-service-id 2097167
next
edit "Citrix-RTMP"
set internet-service-id 2097168
next
edit "Citrix-NetBIOS.Name.Service"
set internet-service-id 2097176
next
edit "Twitter-Other"
set internet-service-id 2162688
next
edit "Twitter-Web"
set internet-service-id 2162689
next
edit "Twitter-ICMP"
set internet-service-id 2162690
next
edit "Twitter-DNS"
set internet-service-id 2162691
next
edit "Twitter-Outbound_Email"
set internet-service-id 2162692
next
edit "Twitter-SSH"
set internet-service-id 2162694
next
edit "Twitter-FTP"
set internet-service-id 2162695
next
edit "Twitter-NTP"
set internet-service-id 2162696
next
edit "Twitter-Inbound_Email"
set internet-service-id 2162697
next
edit "Twitter-LDAP"
set internet-service-id 2162702
next
edit "Twitter-NetBIOS.Session.Service"
set internet-service-id 2162703
next
edit "Twitter-RTMP"
set internet-service-id 2162704
next
edit "Twitter-NetBIOS.Name.Service"
set internet-service-id 2162712
next
edit "Dell-Other"
set internet-service-id 2228224
next
edit "Dell-Web"
set internet-service-id 2228225
next
edit "Dell-ICMP"
set internet-service-id 2228226
next
edit "Dell-DNS"
set internet-service-id 2228227
next
edit "Dell-Outbound_Email"
set internet-service-id 2228228
next
edit "Dell-SSH"
set internet-service-id 2228230
next
edit "Dell-FTP"
set internet-service-id 2228231
next
edit "Dell-NTP"
set internet-service-id 2228232
next
edit "Dell-Inbound_Email"
set internet-service-id 2228233
next
edit "Dell-LDAP"
set internet-service-id 2228238
next
edit "Dell-NetBIOS.Session.Service"
set internet-service-id 2228239
next
edit "Dell-RTMP"
set internet-service-id 2228240
next
edit "Dell-NetBIOS.Name.Service"
set internet-service-id 2228248
next
edit "Vimeo-Other"
set internet-service-id 2293760
next
edit "Vimeo-Web"
set internet-service-id 2293761
next
edit "Vimeo-ICMP"
set internet-service-id 2293762
next
edit "Vimeo-DNS"
set internet-service-id 2293763
next
edit "Vimeo-Outbound_Email"
set internet-service-id 2293764
next
edit "Vimeo-SSH"
set internet-service-id 2293766
next
edit "Vimeo-FTP"
set internet-service-id 2293767
next
edit "Vimeo-NTP"
set internet-service-id 2293768
next
edit "Vimeo-Inbound_Email"
set internet-service-id 2293769
next
edit "Vimeo-LDAP"
set internet-service-id 2293774
next
edit "Vimeo-NetBIOS.Session.Service"
set internet-service-id 2293775
next
edit "Vimeo-RTMP"
set internet-service-id 2293776
next
edit "Vimeo-NetBIOS.Name.Service"
set internet-service-id 2293784
next
edit "Redhat-Other"
set internet-service-id 2359296
next
edit "Redhat-Web"
set internet-service-id 2359297
next
edit "Redhat-ICMP"
set internet-service-id 2359298
next
edit "Redhat-DNS"
set internet-service-id 2359299
next
edit "Redhat-Outbound_Email"
set internet-service-id 2359300
next
edit "Redhat-SSH"
set internet-service-id 2359302
next
edit "Redhat-FTP"
set internet-service-id 2359303
next
edit "Redhat-NTP"
set internet-service-id 2359304
next
edit "Redhat-Inbound_Email"
set internet-service-id 2359305
next
edit "Redhat-LDAP"
set internet-service-id 2359310
next
edit "Redhat-NetBIOS.Session.Service"
set internet-service-id 2359311
next
edit "Redhat-RTMP"
set internet-service-id 2359312
next
edit "Redhat-NetBIOS.Name.Service"
set internet-service-id 2359320
next
edit "VK-Other"
set internet-service-id 2424832
next
edit "VK-Web"
set internet-service-id 2424833
next
edit "VK-ICMP"
set internet-service-id 2424834
next
edit "VK-DNS"
set internet-service-id 2424835
next
edit "VK-Outbound_Email"
set internet-service-id 2424836
next
edit "VK-SSH"
set internet-service-id 2424838
next
edit "VK-FTP"
set internet-service-id 2424839
next
edit "VK-NTP"
set internet-service-id 2424840
next
edit "VK-Inbound_Email"
set internet-service-id 2424841
next
edit "VK-LDAP"
set internet-service-id 2424846
next
edit "VK-NetBIOS.Session.Service"
set internet-service-id 2424847
next
edit "VK-RTMP"
set internet-service-id 2424848
next
edit "VK-NetBIOS.Name.Service"
set internet-service-id 2424856
next
edit "TrendMicro-Other"
set internet-service-id 2490368
next
edit "TrendMicro-Web"
set internet-service-id 2490369
next
edit "TrendMicro-ICMP"
set internet-service-id 2490370
next
edit "TrendMicro-DNS"
set internet-service-id 2490371
next
edit "TrendMicro-Outbound_Email"
set internet-service-id 2490372
next
edit "TrendMicro-SSH"
set internet-service-id 2490374
next
edit "TrendMicro-FTP"
set internet-service-id 2490375
next
edit "TrendMicro-NTP"
set internet-service-id 2490376
next
edit "TrendMicro-Inbound_Email"
set internet-service-id 2490377
next
edit "TrendMicro-LDAP"
set internet-service-id 2490382
next
edit "TrendMicro-NetBIOS.Session.Service"
set internet-service-id 2490383
next
edit "TrendMicro-RTMP"
set internet-service-id 2490384
next
edit "TrendMicro-NetBIOS.Name.Service"
set internet-service-id 2490392
next
edit "Tencent-Other"
set internet-service-id 2555904
next
edit "Tencent-Web"
set internet-service-id 2555905
next
edit "Tencent-ICMP"
set internet-service-id 2555906
next
edit "Tencent-DNS"
set internet-service-id 2555907
next
edit "Tencent-Outbound_Email"
set internet-service-id 2555908
next
edit "Tencent-SSH"
set internet-service-id 2555910
next
edit "Tencent-FTP"
set internet-service-id 2555911
next
edit "Tencent-NTP"
set internet-service-id 2555912
next
edit "Tencent-Inbound_Email"
set internet-service-id 2555913
next
edit "Tencent-LDAP"
set internet-service-id 2555918
next
edit "Tencent-NetBIOS.Session.Service"
set internet-service-id 2555919
next
edit "Tencent-RTMP"
set internet-service-id 2555920
next
edit "Tencent-NetBIOS.Name.Service"
set internet-service-id 2555928
next
edit "Ask-Other"
set internet-service-id 2621440
next
edit "Ask-Web"
set internet-service-id 2621441
next
edit "Ask-ICMP"
set internet-service-id 2621442
next
edit "Ask-DNS"
set internet-service-id 2621443
next
edit "Ask-Outbound_Email"
set internet-service-id 2621444
next
edit "Ask-SSH"
set internet-service-id 2621446
next
edit "Ask-FTP"
set internet-service-id 2621447
next
edit "Ask-NTP"
set internet-service-id 2621448
next
edit "Ask-Inbound_Email"
set internet-service-id 2621449
next
edit "Ask-LDAP"
set internet-service-id 2621454
next
edit "Ask-NetBIOS.Session.Service"
set internet-service-id 2621455
next
edit "Ask-RTMP"
set internet-service-id 2621456
next
edit "Ask-NetBIOS.Name.Service"
set internet-service-id 2621464
next
edit "CNN-Other"
set internet-service-id 2686976
next
edit "CNN-Web"
set internet-service-id 2686977
next
edit "CNN-ICMP"
set internet-service-id 2686978
next
edit "CNN-DNS"
set internet-service-id 2686979
next
edit "CNN-Outbound_Email"
set internet-service-id 2686980
next
edit "CNN-SSH"
set internet-service-id 2686982
next
edit "CNN-FTP"
set internet-service-id 2686983
next
edit "CNN-NTP"
set internet-service-id 2686984
next
edit "CNN-Inbound_Email"
set internet-service-id 2686985
next
edit "CNN-LDAP"
set internet-service-id 2686990
next
edit "CNN-NetBIOS.Session.Service"
set internet-service-id 2686991
next
edit "CNN-RTMP"
set internet-service-id 2686992
next
edit "CNN-NetBIOS.Name.Service"
set internet-service-id 2687000
next
edit "Myspace-Other"
set internet-service-id 2752512
next
edit "Myspace-Web"
set internet-service-id 2752513
next
edit "Myspace-ICMP"
set internet-service-id 2752514
next
edit "Myspace-DNS"
set internet-service-id 2752515
next
edit "Myspace-Outbound_Email"
set internet-service-id 2752516
next
edit "Myspace-SSH"
set internet-service-id 2752518
next
edit "Myspace-FTP"
set internet-service-id 2752519
next
edit "Myspace-NTP"
set internet-service-id 2752520
next
edit "Myspace-Inbound_Email"
set internet-service-id 2752521
next
edit "Myspace-LDAP"
set internet-service-id 2752526
next
edit "Myspace-NetBIOS.Session.Service"
set internet-service-id 2752527
next
edit "Myspace-RTMP"
set internet-service-id 2752528
next
edit "Myspace-NetBIOS.Name.Service"
set internet-service-id 2752536
next
edit "Tor-Relay.Node"
set internet-service-id 2818238
next
edit "Tor-Exit.Node"
set internet-service-id 2818243
next
edit "Baidu-Other"
set internet-service-id 2883584
next
edit "Baidu-Web"
set internet-service-id 2883585
next
edit "Baidu-ICMP"
set internet-service-id 2883586
next
edit "Baidu-DNS"
set internet-service-id 2883587
next
edit "Baidu-Outbound_Email"
set internet-service-id 2883588
next
edit "Baidu-SSH"
set internet-service-id 2883590
next
edit "Baidu-FTP"
set internet-service-id 2883591
next
edit "Baidu-NTP"
set internet-service-id 2883592
next
edit "Baidu-Inbound_Email"
set internet-service-id 2883593
next
edit "Baidu-LDAP"
set internet-service-id 2883598
next
edit "Baidu-NetBIOS.Session.Service"
set internet-service-id 2883599
next
edit "Baidu-RTMP"
set internet-service-id 2883600
next
edit "Baidu-NetBIOS.Name.Service"
set internet-service-id 2883608
next
edit "ntp.org-Other"
set internet-service-id 2949120
next
edit "ntp.org-Web"
set internet-service-id 2949121
next
edit "ntp.org-ICMP"
set internet-service-id 2949122
next
edit "ntp.org-DNS"
set internet-service-id 2949123
next
edit "ntp.org-Outbound_Email"
set internet-service-id 2949124
next
edit "ntp.org-SSH"
set internet-service-id 2949126
next
edit "ntp.org-FTP"
set internet-service-id 2949127
next
edit "ntp.org-NTP"
set internet-service-id 2949128
next
edit "ntp.org-Inbound_Email"
set internet-service-id 2949129
next
edit "ntp.org-LDAP"
set internet-service-id 2949134
next
edit "ntp.org-NetBIOS.Session.Service"
set internet-service-id 2949135
next
edit "ntp.org-RTMP"
set internet-service-id 2949136
next
edit "ntp.org-NetBIOS.Name.Service"
set internet-service-id 2949144
next
edit "Proxy-Proxy.Server"
set internet-service-id 3014850
next
edit "Botnet-C&C.Server"
set internet-service-id 3080383
next
edit "Spam-Spamming.Server"
set internet-service-id 3145920
next
edit "Phishing-Phishing.Server"
set internet-service-id 3211457
next
edit "Zendesk-Other"
set internet-service-id 3407872
next
edit "Zendesk-Web"
set internet-service-id 3407873
next
edit "Zendesk-ICMP"
set internet-service-id 3407874
next
edit "Zendesk-DNS"
set internet-service-id 3407875
next
edit "Zendesk-Outbound_Email"
set internet-service-id 3407876
next
edit "Zendesk-SSH"
set internet-service-id 3407878
next
edit "Zendesk-FTP"
set internet-service-id 3407879
next
edit "Zendesk-NTP"
set internet-service-id 3407880
next
edit "Zendesk-Inbound_Email"
set internet-service-id 3407881
next
edit "Zendesk-LDAP"
set internet-service-id 3407886
next
edit "Zendesk-NetBIOS.Session.Service"
set internet-service-id 3407887
next
edit "Zendesk-RTMP"
set internet-service-id 3407888
next
edit "Zendesk-NetBIOS.Name.Service"
set internet-service-id 3407896
next
edit "Zendesk-Zendesk.Suite"
set internet-service-id 3408047
next
edit "DocuSign-Other"
set internet-service-id 3473408
next
edit "DocuSign-Web"
set internet-service-id 3473409
next
edit "DocuSign-ICMP"
set internet-service-id 3473410
next
edit "DocuSign-DNS"
set internet-service-id 3473411
next
edit "DocuSign-Outbound_Email"
set internet-service-id 3473412
next
edit "DocuSign-SSH"
set internet-service-id 3473414
next
edit "DocuSign-FTP"
set internet-service-id 3473415
next
edit "DocuSign-NTP"
set internet-service-id 3473416
next
edit "DocuSign-Inbound_Email"
set internet-service-id 3473417
next
edit "DocuSign-LDAP"
set internet-service-id 3473422
next
edit "DocuSign-NetBIOS.Session.Service"
set internet-service-id 3473423
next
edit "DocuSign-RTMP"
set internet-service-id 3473424
next
edit "DocuSign-NetBIOS.Name.Service"
set internet-service-id 3473432
next
edit "ServiceNow-Other"
set internet-service-id 3538944
next
edit "ServiceNow-Web"
set internet-service-id 3538945
next
edit "ServiceNow-ICMP"
set internet-service-id 3538946
next
edit "ServiceNow-DNS"
set internet-service-id 3538947
next
edit "ServiceNow-Outbound_Email"
set internet-service-id 3538948
next
edit "ServiceNow-SSH"
set internet-service-id 3538950
next
edit "ServiceNow-FTP"
set internet-service-id 3538951
next
edit "ServiceNow-NTP"
set internet-service-id 3538952
next
edit "ServiceNow-Inbound_Email"
set internet-service-id 3538953
next
edit "ServiceNow-LDAP"
set internet-service-id 3538958
next
edit "ServiceNow-NetBIOS.Session.Service"
set internet-service-id 3538959
next
edit "ServiceNow-RTMP"
set internet-service-id 3538960
next
edit "ServiceNow-NetBIOS.Name.Service"
set internet-service-id 3538968
next
edit "GitHub-GitHub"
set internet-service-id 3604638
next
edit "Workday-Other"
set internet-service-id 3670016
next
edit "Workday-Web"
set internet-service-id 3670017
next
edit "Workday-ICMP"
set internet-service-id 3670018
next
edit "Workday-DNS"
set internet-service-id 3670019
next
edit "Workday-Outbound_Email"
set internet-service-id 3670020
next
edit "Workday-SSH"
set internet-service-id 3670022
next
edit "Workday-FTP"
set internet-service-id 3670023
next
edit "Workday-NTP"
set internet-service-id 3670024
next
edit "Workday-Inbound_Email"
set internet-service-id 3670025
next
edit "Workday-LDAP"
set internet-service-id 3670030
next
edit "Workday-NetBIOS.Session.Service"
set internet-service-id 3670031
next
edit "Workday-RTMP"
set internet-service-id 3670032
next
edit "Workday-NetBIOS.Name.Service"
set internet-service-id 3670040
next
edit "HubSpot-Other"
set internet-service-id 3735552
next
edit "HubSpot-Web"
set internet-service-id 3735553
next
edit "HubSpot-ICMP"
set internet-service-id 3735554
next
edit "HubSpot-DNS"
set internet-service-id 3735555
next
edit "HubSpot-Outbound_Email"
set internet-service-id 3735556
next
edit "HubSpot-SSH"
set internet-service-id 3735558
next
edit "HubSpot-FTP"
set internet-service-id 3735559
next
edit "HubSpot-NTP"
set internet-service-id 3735560
next
edit "HubSpot-Inbound_Email"
set internet-service-id 3735561
next
edit "HubSpot-LDAP"
set internet-service-id 3735566
next
edit "HubSpot-NetBIOS.Session.Service"
set internet-service-id 3735567
next
edit "HubSpot-RTMP"
set internet-service-id 3735568
next
edit "HubSpot-NetBIOS.Name.Service"
set internet-service-id 3735576
next
edit "Twilio-Other"
set internet-service-id 3801088
next
edit "Twilio-Web"
set internet-service-id 3801089
next
edit "Twilio-ICMP"
set internet-service-id 3801090
next
edit "Twilio-DNS"
set internet-service-id 3801091
next
edit "Twilio-Outbound_Email"
set internet-service-id 3801092
next
edit "Twilio-SSH"
set internet-service-id 3801094
next
edit "Twilio-FTP"
set internet-service-id 3801095
next
edit "Twilio-NTP"
set internet-service-id 3801096
next
edit "Twilio-Inbound_Email"
set internet-service-id 3801097
next
edit "Twilio-LDAP"
set internet-service-id 3801102
next
edit "Twilio-NetBIOS.Session.Service"
set internet-service-id 3801103
next
edit "Twilio-RTMP"
set internet-service-id 3801104
next
edit "Twilio-NetBIOS.Name.Service"
set internet-service-id 3801112
next
edit "Twilio-Elastic.SIP.Trunking"
set internet-service-id 3801277
next
edit "Coupa-Other"
set internet-service-id 3866624
next
edit "Coupa-Web"
set internet-service-id 3866625
next
edit "Coupa-ICMP"
set internet-service-id 3866626
next
edit "Coupa-DNS"
set internet-service-id 3866627
next
edit "Coupa-Outbound_Email"
set internet-service-id 3866628
next
edit "Coupa-SSH"
set internet-service-id 3866630
next
edit "Coupa-FTP"
set internet-service-id 3866631
next
edit "Coupa-NTP"
set internet-service-id 3866632
next
edit "Coupa-Inbound_Email"
set internet-service-id 3866633
next
edit "Coupa-LDAP"
set internet-service-id 3866638
next
edit "Coupa-NetBIOS.Session.Service"
set internet-service-id 3866639
next
edit "Coupa-RTMP"
set internet-service-id 3866640
next
edit "Coupa-NetBIOS.Name.Service"
set internet-service-id 3866648
next
edit "Atlassian-Other"
set internet-service-id 3932160
next
edit "Atlassian-Web"
set internet-service-id 3932161
next
edit "Atlassian-ICMP"
set internet-service-id 3932162
next
edit "Atlassian-DNS"
set internet-service-id 3932163
next
edit "Atlassian-Outbound_Email"
set internet-service-id 3932164
next
edit "Atlassian-SSH"
set internet-service-id 3932166
next
edit "Atlassian-FTP"
set internet-service-id 3932167
next
edit "Atlassian-NTP"
set internet-service-id 3932168
next
edit "Atlassian-Inbound_Email"
set internet-service-id 3932169
next
edit "Atlassian-LDAP"
set internet-service-id 3932174
next
edit "Atlassian-NetBIOS.Session.Service"
set internet-service-id 3932175
next
edit "Atlassian-RTMP"
set internet-service-id 3932176
next
edit "Atlassian-NetBIOS.Name.Service"
set internet-service-id 3932184
next
edit "Atlassian-Atlassian.Cloud"
set internet-service-id 3932388
next
edit "Atlassian-Atlassian.Notification"
set internet-service-id 3932436
next
edit "Xero-Other"
set internet-service-id 3997696
next
edit "Xero-Web"
set internet-service-id 3997697
next
edit "Xero-ICMP"
set internet-service-id 3997698
next
edit "Xero-DNS"
set internet-service-id 3997699
next
edit "Xero-Outbound_Email"
set internet-service-id 3997700
next
edit "Xero-SSH"
set internet-service-id 3997702
next
edit "Xero-FTP"
set internet-service-id 3997703
next
edit "Xero-NTP"
set internet-service-id 3997704
next
edit "Xero-Inbound_Email"
set internet-service-id 3997705
next
edit "Xero-LDAP"
set internet-service-id 3997710
next
edit "Xero-NetBIOS.Session.Service"
set internet-service-id 3997711
next
edit "Xero-RTMP"
set internet-service-id 3997712
next
edit "Xero-NetBIOS.Name.Service"
set internet-service-id 3997720
next
edit "Zuora-Other"
set internet-service-id 4063232
next
edit "Zuora-Web"
set internet-service-id 4063233
next
edit "Zuora-ICMP"
set internet-service-id 4063234
next
edit "Zuora-DNS"
set internet-service-id 4063235
next
edit "Zuora-Outbound_Email"
set internet-service-id 4063236
next
edit "Zuora-SSH"
set internet-service-id 4063238
next
edit "Zuora-FTP"
set internet-service-id 4063239
next
edit "Zuora-NTP"
set internet-service-id 4063240
next
edit "Zuora-Inbound_Email"
set internet-service-id 4063241
next
edit "Zuora-LDAP"
set internet-service-id 4063246
next
edit "Zuora-NetBIOS.Session.Service"
set internet-service-id 4063247
next
edit "Zuora-RTMP"
set internet-service-id 4063248
next
edit "Zuora-NetBIOS.Name.Service"
set internet-service-id 4063256
next
edit "AdRoll-Other"
set internet-service-id 4128768
next
edit "AdRoll-Web"
set internet-service-id 4128769
next
edit "AdRoll-ICMP"
set internet-service-id 4128770
next
edit "AdRoll-DNS"
set internet-service-id 4128771
next
edit "AdRoll-Outbound_Email"
set internet-service-id 4128772
next
edit "AdRoll-SSH"
set internet-service-id 4128774
next
edit "AdRoll-FTP"
set internet-service-id 4128775
next
edit "AdRoll-NTP"
set internet-service-id 4128776
next
edit "AdRoll-Inbound_Email"
set internet-service-id 4128777
next
edit "AdRoll-LDAP"
set internet-service-id 4128782
next
edit "AdRoll-NetBIOS.Session.Service"
set internet-service-id 4128783
next
edit "AdRoll-RTMP"
set internet-service-id 4128784
next
edit "AdRoll-NetBIOS.Name.Service"
set internet-service-id 4128792
next
edit "Xactly-Other"
set internet-service-id 4194304
next
edit "Xactly-Web"
set internet-service-id 4194305
next
edit "Xactly-ICMP"
set internet-service-id 4194306
next
edit "Xactly-DNS"
set internet-service-id 4194307
next
edit "Xactly-Outbound_Email"
set internet-service-id 4194308
next
edit "Xactly-SSH"
set internet-service-id 4194310
next
edit "Xactly-FTP"
set internet-service-id 4194311
next
edit "Xactly-NTP"
set internet-service-id 4194312
next
edit "Xactly-Inbound_Email"
set internet-service-id 4194313
next
edit "Xactly-LDAP"
set internet-service-id 4194318
next
edit "Xactly-NetBIOS.Session.Service"
set internet-service-id 4194319
next
edit "Xactly-RTMP"
set internet-service-id 4194320
next
edit "Xactly-NetBIOS.Name.Service"
set internet-service-id 4194328
next
edit "Intuit-Other"
set internet-service-id 4259840
next
edit "Intuit-Web"
set internet-service-id 4259841
next
edit "Intuit-ICMP"
set internet-service-id 4259842
next
edit "Intuit-DNS"
set internet-service-id 4259843
next
edit "Intuit-Outbound_Email"
set internet-service-id 4259844
next
edit "Intuit-SSH"
set internet-service-id 4259846
next
edit "Intuit-FTP"
set internet-service-id 4259847
next
edit "Intuit-NTP"
set internet-service-id 4259848
next
edit "Intuit-Inbound_Email"
set internet-service-id 4259849
next
edit "Intuit-LDAP"
set internet-service-id 4259854
next
edit "Intuit-NetBIOS.Session.Service"
set internet-service-id 4259855
next
edit "Intuit-RTMP"
set internet-service-id 4259856
next
edit "Intuit-NetBIOS.Name.Service"
set internet-service-id 4259864
next
edit "Marketo-Other"
set internet-service-id 4325376
next
edit "Marketo-Web"
set internet-service-id 4325377
next
edit "Marketo-ICMP"
set internet-service-id 4325378
next
edit "Marketo-DNS"
set internet-service-id 4325379
next
edit "Marketo-Outbound_Email"
set internet-service-id 4325380
next
edit "Marketo-SSH"
set internet-service-id 4325382
next
edit "Marketo-FTP"
set internet-service-id 4325383
next
edit "Marketo-NTP"
set internet-service-id 4325384
next
edit "Marketo-Inbound_Email"
set internet-service-id 4325385
next
edit "Marketo-LDAP"
set internet-service-id 4325390
next
edit "Marketo-NetBIOS.Session.Service"
set internet-service-id 4325391
next
edit "Marketo-RTMP"
set internet-service-id 4325392
next
edit "Marketo-NetBIOS.Name.Service"
set internet-service-id 4325400
next
edit "Bill-Other"
set internet-service-id 4456448
next
edit "Bill-Web"
set internet-service-id 4456449
next
edit "Bill-ICMP"
set internet-service-id 4456450
next
edit "Bill-DNS"
set internet-service-id 4456451
next
edit "Bill-Outbound_Email"
set internet-service-id 4456452
next
edit "Bill-SSH"
set internet-service-id 4456454
next
edit "Bill-FTP"
set internet-service-id 4456455
next
edit "Bill-NTP"
set internet-service-id 4456456
next
edit "Bill-Inbound_Email"
set internet-service-id 4456457
next
edit "Bill-LDAP"
set internet-service-id 4456462
next
edit "Bill-NetBIOS.Session.Service"
set internet-service-id 4456463
next
edit "Bill-RTMP"
set internet-service-id 4456464
next
edit "Bill-NetBIOS.Name.Service"
set internet-service-id 4456472
next
edit "Shopify-Other"
set internet-service-id 4521984
next
edit "Shopify-Web"
set internet-service-id 4521985
next
edit "Shopify-ICMP"
set internet-service-id 4521986
next
edit "Shopify-DNS"
set internet-service-id 4521987
next
edit "Shopify-Outbound_Email"
set internet-service-id 4521988
next
edit "Shopify-SSH"
set internet-service-id 4521990
next
edit "Shopify-FTP"
set internet-service-id 4521991
next
edit "Shopify-NTP"
set internet-service-id 4521992
next
edit "Shopify-Inbound_Email"
set internet-service-id 4521993
next
edit "Shopify-LDAP"
set internet-service-id 4521998
next
edit "Shopify-NetBIOS.Session.Service"
set internet-service-id 4521999
next
edit "Shopify-RTMP"
set internet-service-id 4522000
next
edit "Shopify-NetBIOS.Name.Service"
set internet-service-id 4522008
next
edit "Shopify-Shopify"
set internet-service-id 4522162
next
edit "MuleSoft-Other"
set internet-service-id 4587520
next
edit "MuleSoft-Web"
set internet-service-id 4587521
next
edit "MuleSoft-ICMP"
set internet-service-id 4587522
next
edit "MuleSoft-DNS"
set internet-service-id 4587523
next
edit "MuleSoft-Outbound_Email"
set internet-service-id 4587524
next
edit "MuleSoft-SSH"
set internet-service-id 4587526
next
edit "MuleSoft-FTP"
set internet-service-id 4587527
next
edit "MuleSoft-NTP"
set internet-service-id 4587528
next
edit "MuleSoft-Inbound_Email"
set internet-service-id 4587529
next
edit "MuleSoft-LDAP"
set internet-service-id 4587534
next
edit "MuleSoft-NetBIOS.Session.Service"
set internet-service-id 4587535
next
edit "MuleSoft-RTMP"
set internet-service-id 4587536
next
edit "MuleSoft-NetBIOS.Name.Service"
set internet-service-id 4587544
next
edit "Cornerstone-Other"
set internet-service-id 4653056
next
edit "Cornerstone-Web"
set internet-service-id 4653057
next
edit "Cornerstone-ICMP"
set internet-service-id 4653058
next
edit "Cornerstone-DNS"
set internet-service-id 4653059
next
edit "Cornerstone-Outbound_Email"
set internet-service-id 4653060
next
edit "Cornerstone-SSH"
set internet-service-id 4653062
next
edit "Cornerstone-FTP"
set internet-service-id 4653063
next
edit "Cornerstone-NTP"
set internet-service-id 4653064
next
edit "Cornerstone-Inbound_Email"
set internet-service-id 4653065
next
edit "Cornerstone-LDAP"
set internet-service-id 4653070
next
edit "Cornerstone-NetBIOS.Session.Service"
set internet-service-id 4653071
next
edit "Cornerstone-RTMP"
set internet-service-id 4653072
next
edit "Cornerstone-NetBIOS.Name.Service"
set internet-service-id 4653080
next
edit "Eventbrite-Other"
set internet-service-id 4718592
next
edit "Eventbrite-Web"
set internet-service-id 4718593
next
edit "Eventbrite-ICMP"
set internet-service-id 4718594
next
edit "Eventbrite-DNS"
set internet-service-id 4718595
next
edit "Eventbrite-Outbound_Email"
set internet-service-id 4718596
next
edit "Eventbrite-SSH"
set internet-service-id 4718598
next
edit "Eventbrite-FTP"
set internet-service-id 4718599
next
edit "Eventbrite-NTP"
set internet-service-id 4718600
next
edit "Eventbrite-Inbound_Email"
set internet-service-id 4718601
next
edit "Eventbrite-LDAP"
set internet-service-id 4718606
next
edit "Eventbrite-NetBIOS.Session.Service"
set internet-service-id 4718607
next
edit "Eventbrite-RTMP"
set internet-service-id 4718608
next
edit "Eventbrite-NetBIOS.Name.Service"
set internet-service-id 4718616
next
edit "Paychex-Other"
set internet-service-id 4784128
next
edit "Paychex-Web"
set internet-service-id 4784129
next
edit "Paychex-ICMP"
set internet-service-id 4784130
next
edit "Paychex-DNS"
set internet-service-id 4784131
next
edit "Paychex-Outbound_Email"
set internet-service-id 4784132
next
edit "Paychex-SSH"
set internet-service-id 4784134
next
edit "Paychex-FTP"
set internet-service-id 4784135
next
edit "Paychex-NTP"
set internet-service-id 4784136
next
edit "Paychex-Inbound_Email"
set internet-service-id 4784137
next
edit "Paychex-LDAP"
set internet-service-id 4784142
next
edit "Paychex-NetBIOS.Session.Service"
set internet-service-id 4784143
next
edit "Paychex-RTMP"
set internet-service-id 4784144
next
edit "Paychex-NetBIOS.Name.Service"
set internet-service-id 4784152
next
edit "NewRelic-Other"
set internet-service-id 4849664
next
edit "NewRelic-Web"
set internet-service-id 4849665
next
edit "NewRelic-ICMP"
set internet-service-id 4849666
next
edit "NewRelic-DNS"
set internet-service-id 4849667
next
edit "NewRelic-Outbound_Email"
set internet-service-id 4849668
next
edit "NewRelic-SSH"
set internet-service-id 4849670
next
edit "NewRelic-FTP"
set internet-service-id 4849671
next
edit "NewRelic-NTP"
set internet-service-id 4849672
next
edit "NewRelic-Inbound_Email"
set internet-service-id 4849673
next
edit "NewRelic-LDAP"
set internet-service-id 4849678
next
edit "NewRelic-NetBIOS.Session.Service"
set internet-service-id 4849679
next
edit "NewRelic-RTMP"
set internet-service-id 4849680
next
edit "NewRelic-NetBIOS.Name.Service"
set internet-service-id 4849688
next
edit "Splunk-Other"
set internet-service-id 4915200
next
edit "Splunk-Web"
set internet-service-id 4915201
next
edit "Splunk-ICMP"
set internet-service-id 4915202
next
edit "Splunk-DNS"
set internet-service-id 4915203
next
edit "Splunk-Outbound_Email"
set internet-service-id 4915204
next
edit "Splunk-SSH"
set internet-service-id 4915206
next
edit "Splunk-FTP"
set internet-service-id 4915207
next
edit "Splunk-NTP"
set internet-service-id 4915208
next
edit "Splunk-Inbound_Email"
set internet-service-id 4915209
next
edit "Splunk-LDAP"
set internet-service-id 4915214
next
edit "Splunk-NetBIOS.Session.Service"
set internet-service-id 4915215
next
edit "Splunk-RTMP"
set internet-service-id 4915216
next
edit "Splunk-NetBIOS.Name.Service"
set internet-service-id 4915224
next
edit "Domo-Other"
set internet-service-id 4980736
next
edit "Domo-Web"
set internet-service-id 4980737
next
edit "Domo-ICMP"
set internet-service-id 4980738
next
edit "Domo-DNS"
set internet-service-id 4980739
next
edit "Domo-Outbound_Email"
set internet-service-id 4980740
next
edit "Domo-SSH"
set internet-service-id 4980742
next
edit "Domo-FTP"
set internet-service-id 4980743
next
edit "Domo-NTP"
set internet-service-id 4980744
next
edit "Domo-Inbound_Email"
set internet-service-id 4980745
next
edit "Domo-LDAP"
set internet-service-id 4980750
next
edit "Domo-NetBIOS.Session.Service"
set internet-service-id 4980751
next
edit "Domo-RTMP"
set internet-service-id 4980752
next
edit "Domo-NetBIOS.Name.Service"
set internet-service-id 4980760
next
edit "FreshBooks-Other"
set internet-service-id 5046272
next
edit "FreshBooks-Web"
set internet-service-id 5046273
next
edit "FreshBooks-ICMP"
set internet-service-id 5046274
next
edit "FreshBooks-DNS"
set internet-service-id 5046275
next
edit "FreshBooks-Outbound_Email"
set internet-service-id 5046276
next
edit "FreshBooks-SSH"
set internet-service-id 5046278
next
edit "FreshBooks-FTP"
set internet-service-id 5046279
next
edit "FreshBooks-NTP"
set internet-service-id 5046280
next
edit "FreshBooks-Inbound_Email"
set internet-service-id 5046281
next
edit "FreshBooks-LDAP"
set internet-service-id 5046286
next
edit "FreshBooks-NetBIOS.Session.Service"
set internet-service-id 5046287
next
edit "FreshBooks-RTMP"
set internet-service-id 5046288
next
edit "FreshBooks-NetBIOS.Name.Service"
set internet-service-id 5046296
next
edit "Tableau-Other"
set internet-service-id 5111808
next
edit "Tableau-Web"
set internet-service-id 5111809
next
edit "Tableau-ICMP"
set internet-service-id 5111810
next
edit "Tableau-DNS"
set internet-service-id 5111811
next
edit "Tableau-Outbound_Email"
set internet-service-id 5111812
next
edit "Tableau-SSH"
set internet-service-id 5111814
next
edit "Tableau-FTP"
set internet-service-id 5111815
next
edit "Tableau-NTP"
set internet-service-id 5111816
next
edit "Tableau-Inbound_Email"
set internet-service-id 5111817
next
edit "Tableau-LDAP"
set internet-service-id 5111822
next
edit "Tableau-NetBIOS.Session.Service"
set internet-service-id 5111823
next
edit "Tableau-RTMP"
set internet-service-id 5111824
next
edit "Tableau-NetBIOS.Name.Service"
set internet-service-id 5111832
next
edit "Druva-Other"
set internet-service-id 5177344
next
edit "Druva-Web"
set internet-service-id 5177345
next
edit "Druva-ICMP"
set internet-service-id 5177346
next
edit "Druva-DNS"
set internet-service-id 5177347
next
edit "Druva-Outbound_Email"
set internet-service-id 5177348
next
edit "Druva-SSH"
set internet-service-id 5177350
next
edit "Druva-FTP"
set internet-service-id 5177351
next
edit "Druva-NTP"
set internet-service-id 5177352
next
edit "Druva-Inbound_Email"
set internet-service-id 5177353
next
edit "Druva-LDAP"
set internet-service-id 5177358
next
edit "Druva-NetBIOS.Session.Service"
set internet-service-id 5177359
next
edit "Druva-RTMP"
set internet-service-id 5177360
next
edit "Druva-NetBIOS.Name.Service"
set internet-service-id 5177368
next
edit "Act-on-Other"
set internet-service-id 5242880
next
edit "Act-on-Web"
set internet-service-id 5242881
next
edit "Act-on-ICMP"
set internet-service-id 5242882
next
edit "Act-on-DNS"
set internet-service-id 5242883
next
edit "Act-on-Outbound_Email"
set internet-service-id 5242884
next
edit "Act-on-SSH"
set internet-service-id 5242886
next
edit "Act-on-FTP"
set internet-service-id 5242887
next
edit "Act-on-NTP"
set internet-service-id 5242888
next
edit "Act-on-Inbound_Email"
set internet-service-id 5242889
next
edit "Act-on-LDAP"
set internet-service-id 5242894
next
edit "Act-on-NetBIOS.Session.Service"
set internet-service-id 5242895
next
edit "Act-on-RTMP"
set internet-service-id 5242896
next
edit "Act-on-NetBIOS.Name.Service"
set internet-service-id 5242904
next
edit "GoodData-Other"
set internet-service-id 5308416
next
edit "GoodData-Web"
set internet-service-id 5308417
next
edit "GoodData-ICMP"
set internet-service-id 5308418
next
edit "GoodData-DNS"
set internet-service-id 5308419
next
edit "GoodData-Outbound_Email"
set internet-service-id 5308420
next
edit "GoodData-SSH"
set internet-service-id 5308422
next
edit "GoodData-FTP"
set internet-service-id 5308423
next
edit "GoodData-NTP"
set internet-service-id 5308424
next
edit "GoodData-Inbound_Email"
set internet-service-id 5308425
next
edit "GoodData-LDAP"
set internet-service-id 5308430
next
edit "GoodData-NetBIOS.Session.Service"
set internet-service-id 5308431
next
edit "GoodData-RTMP"
set internet-service-id 5308432
next
edit "GoodData-NetBIOS.Name.Service"
set internet-service-id 5308440
next
edit "SurveyMonkey-Other"
set internet-service-id 5373952
next
edit "SurveyMonkey-Web"
set internet-service-id 5373953
next
edit "SurveyMonkey-ICMP"
set internet-service-id 5373954
next
edit "SurveyMonkey-DNS"
set internet-service-id 5373955
next
edit "SurveyMonkey-Outbound_Email"
set internet-service-id 5373956
next
edit "SurveyMonkey-SSH"
set internet-service-id 5373958
next
edit "SurveyMonkey-FTP"
set internet-service-id 5373959
next
edit "SurveyMonkey-NTP"
set internet-service-id 5373960
next
edit "SurveyMonkey-Inbound_Email"
set internet-service-id 5373961
next
edit "SurveyMonkey-LDAP"
set internet-service-id 5373966
next
edit "SurveyMonkey-NetBIOS.Session.Service"
set internet-service-id 5373967
next
edit "SurveyMonkey-RTMP"
set internet-service-id 5373968
next
edit "SurveyMonkey-NetBIOS.Name.Service"
set internet-service-id 5373976
next
edit "Cvent-Other"
set internet-service-id 5439488
next
edit "Cvent-Web"
set internet-service-id 5439489
next
edit "Cvent-ICMP"
set internet-service-id 5439490
next
edit "Cvent-DNS"
set internet-service-id 5439491
next
edit "Cvent-Outbound_Email"
set internet-service-id 5439492
next
edit "Cvent-SSH"
set internet-service-id 5439494
next
edit "Cvent-FTP"
set internet-service-id 5439495
next
edit "Cvent-NTP"
set internet-service-id 5439496
next
edit "Cvent-Inbound_Email"
set internet-service-id 5439497
next
edit "Cvent-LDAP"
set internet-service-id 5439502
next
edit "Cvent-NetBIOS.Session.Service"
set internet-service-id 5439503
next
edit "Cvent-RTMP"
set internet-service-id 5439504
next
edit "Cvent-NetBIOS.Name.Service"
set internet-service-id 5439512
next
edit "Blackbaud-Other"
set internet-service-id 5505024
next
edit "Blackbaud-Web"
set internet-service-id 5505025
next
edit "Blackbaud-ICMP"
set internet-service-id 5505026
next
edit "Blackbaud-DNS"
set internet-service-id 5505027
next
edit "Blackbaud-Outbound_Email"
set internet-service-id 5505028
next
edit "Blackbaud-SSH"
set internet-service-id 5505030
next
edit "Blackbaud-FTP"
set internet-service-id 5505031
next
edit "Blackbaud-NTP"
set internet-service-id 5505032
next
edit "Blackbaud-Inbound_Email"
set internet-service-id 5505033
next
edit "Blackbaud-LDAP"
set internet-service-id 5505038
next
edit "Blackbaud-NetBIOS.Session.Service"
set internet-service-id 5505039
next
edit "Blackbaud-RTMP"
set internet-service-id 5505040
next
edit "Blackbaud-NetBIOS.Name.Service"
set internet-service-id 5505048
next
edit "InsideSales-Other"
set internet-service-id 5570560
next
edit "InsideSales-Web"
set internet-service-id 5570561
next
edit "InsideSales-ICMP"
set internet-service-id 5570562
next
edit "InsideSales-DNS"
set internet-service-id 5570563
next
edit "InsideSales-Outbound_Email"
set internet-service-id 5570564
next
edit "InsideSales-SSH"
set internet-service-id 5570566
next
edit "InsideSales-FTP"
set internet-service-id 5570567
next
edit "InsideSales-NTP"
set internet-service-id 5570568
next
edit "InsideSales-Inbound_Email"
set internet-service-id 5570569
next
edit "InsideSales-LDAP"
set internet-service-id 5570574
next
edit "InsideSales-NetBIOS.Session.Service"
set internet-service-id 5570575
next
edit "InsideSales-RTMP"
set internet-service-id 5570576
next
edit "InsideSales-NetBIOS.Name.Service"
set internet-service-id 5570584
next
edit "ServiceMax-Other"
set internet-service-id 5636096
next
edit "ServiceMax-Web"
set internet-service-id 5636097
next
edit "ServiceMax-ICMP"
set internet-service-id 5636098
next
edit "ServiceMax-DNS"
set internet-service-id 5636099
next
edit "ServiceMax-Outbound_Email"
set internet-service-id 5636100
next
edit "ServiceMax-SSH"
set internet-service-id 5636102
next
edit "ServiceMax-FTP"
set internet-service-id 5636103
next
edit "ServiceMax-NTP"
set internet-service-id 5636104
next
edit "ServiceMax-Inbound_Email"
set internet-service-id 5636105
next
edit "ServiceMax-LDAP"
set internet-service-id 5636110
next
edit "ServiceMax-NetBIOS.Session.Service"
set internet-service-id 5636111
next
edit "ServiceMax-RTMP"
set internet-service-id 5636112
next
edit "ServiceMax-NetBIOS.Name.Service"
set internet-service-id 5636120
next
edit "Apptio-Other"
set internet-service-id 5701632
next
edit "Apptio-Web"
set internet-service-id 5701633
next
edit "Apptio-ICMP"
set internet-service-id 5701634
next
edit "Apptio-DNS"
set internet-service-id 5701635
next
edit "Apptio-Outbound_Email"
set internet-service-id 5701636
next
edit "Apptio-SSH"
set internet-service-id 5701638
next
edit "Apptio-FTP"
set internet-service-id 5701639
next
edit "Apptio-NTP"
set internet-service-id 5701640
next
edit "Apptio-Inbound_Email"
set internet-service-id 5701641
next
edit "Apptio-LDAP"
set internet-service-id 5701646
next
edit "Apptio-NetBIOS.Session.Service"
set internet-service-id 5701647
next
edit "Apptio-RTMP"
set internet-service-id 5701648
next
edit "Apptio-NetBIOS.Name.Service"
set internet-service-id 5701656
next
edit "Veracode-Other"
set internet-service-id 5767168
next
edit "Veracode-Web"
set internet-service-id 5767169
next
edit "Veracode-ICMP"
set internet-service-id 5767170
next
edit "Veracode-DNS"
set internet-service-id 5767171
next
edit "Veracode-Outbound_Email"
set internet-service-id 5767172
next
edit "Veracode-SSH"
set internet-service-id 5767174
next
edit "Veracode-FTP"
set internet-service-id 5767175
next
edit "Veracode-NTP"
set internet-service-id 5767176
next
edit "Veracode-Inbound_Email"
set internet-service-id 5767177
next
edit "Veracode-LDAP"
set internet-service-id 5767182
next
edit "Veracode-NetBIOS.Session.Service"
set internet-service-id 5767183
next
edit "Veracode-RTMP"
set internet-service-id 5767184
next
edit "Veracode-NetBIOS.Name.Service"
set internet-service-id 5767192
next
edit "Anaplan-Other"
set internet-service-id 5832704
next
edit "Anaplan-Web"
set internet-service-id 5832705
next
edit "Anaplan-ICMP"
set internet-service-id 5832706
next
edit "Anaplan-DNS"
set internet-service-id 5832707
next
edit "Anaplan-Outbound_Email"
set internet-service-id 5832708
next
edit "Anaplan-SSH"
set internet-service-id 5832710
next
edit "Anaplan-FTP"
set internet-service-id 5832711
next
edit "Anaplan-NTP"
set internet-service-id 5832712
next
edit "Anaplan-Inbound_Email"
set internet-service-id 5832713
next
edit "Anaplan-LDAP"
set internet-service-id 5832718
next
edit "Anaplan-NetBIOS.Session.Service"
set internet-service-id 5832719
next
edit "Anaplan-RTMP"
set internet-service-id 5832720
next
edit "Anaplan-NetBIOS.Name.Service"
set internet-service-id 5832728
next
edit "Rapid7-Other"
set internet-service-id 5898240
next
edit "Rapid7-Web"
set internet-service-id 5898241
next
edit "Rapid7-ICMP"
set internet-service-id 5898242
next
edit "Rapid7-DNS"
set internet-service-id 5898243
next
edit "Rapid7-Outbound_Email"
set internet-service-id 5898244
next
edit "Rapid7-SSH"
set internet-service-id 5898246
next
edit "Rapid7-FTP"
set internet-service-id 5898247
next
edit "Rapid7-NTP"
set internet-service-id 5898248
next
edit "Rapid7-Inbound_Email"
set internet-service-id 5898249
next
edit "Rapid7-LDAP"
set internet-service-id 5898254
next
edit "Rapid7-NetBIOS.Session.Service"
set internet-service-id 5898255
next
edit "Rapid7-RTMP"
set internet-service-id 5898256
next
edit "Rapid7-NetBIOS.Name.Service"
set internet-service-id 5898264
next
edit "AnyDesk-AnyDesk"
set internet-service-id 5963927
next
edit "ESET-Eset.Service"
set internet-service-id 6029426
next
edit "Slack-Other"
set internet-service-id 6094848
next
edit "Slack-Web"
set internet-service-id 6094849
next
edit "Slack-ICMP"
set internet-service-id 6094850
next
edit "Slack-DNS"
set internet-service-id 6094851
next
edit "Slack-Outbound_Email"
set internet-service-id 6094852
next
edit "Slack-SSH"
set internet-service-id 6094854
next
edit "Slack-FTP"
set internet-service-id 6094855
next
edit "Slack-NTP"
set internet-service-id 6094856
next
edit "Slack-Inbound_Email"
set internet-service-id 6094857
next
edit "Slack-LDAP"
set internet-service-id 6094862
next
edit "Slack-NetBIOS.Session.Service"
set internet-service-id 6094863
next
edit "Slack-RTMP"
set internet-service-id 6094864
next
edit "Slack-NetBIOS.Name.Service"
set internet-service-id 6094872
next
edit "Slack-Slack"
set internet-service-id 6095024
next
edit "ADP-Other"
set internet-service-id 6160384
next
edit "ADP-Web"
set internet-service-id 6160385
next
edit "ADP-ICMP"
set internet-service-id 6160386
next
edit "ADP-DNS"
set internet-service-id 6160387
next
edit "ADP-Outbound_Email"
set internet-service-id 6160388
next
edit "ADP-SSH"
set internet-service-id 6160390
next
edit "ADP-FTP"
set internet-service-id 6160391
next
edit "ADP-NTP"
set internet-service-id 6160392
next
edit "ADP-Inbound_Email"
set internet-service-id 6160393
next
edit "ADP-LDAP"
set internet-service-id 6160398
next
edit "ADP-NetBIOS.Session.Service"
set internet-service-id 6160399
next
edit "ADP-RTMP"
set internet-service-id 6160400
next
edit "ADP-NetBIOS.Name.Service"
set internet-service-id 6160408
next
edit "Blackboard-Other"
set internet-service-id 6225920
next
edit "Blackboard-Web"
set internet-service-id 6225921
next
edit "Blackboard-ICMP"
set internet-service-id 6225922
next
edit "Blackboard-DNS"
set internet-service-id 6225923
next
edit "Blackboard-Outbound_Email"
set internet-service-id 6225924
next
edit "Blackboard-SSH"
set internet-service-id 6225926
next
edit "Blackboard-FTP"
set internet-service-id 6225927
next
edit "Blackboard-NTP"
set internet-service-id 6225928
next
edit "Blackboard-Inbound_Email"
set internet-service-id 6225929
next
edit "Blackboard-LDAP"
set internet-service-id 6225934
next
edit "Blackboard-NetBIOS.Session.Service"
set internet-service-id 6225935
next
edit "Blackboard-RTMP"
set internet-service-id 6225936
next
edit "Blackboard-NetBIOS.Name.Service"
set internet-service-id 6225944
next
edit "SAP-Other"
set internet-service-id 6291456
next
edit "SAP-Web"
set internet-service-id 6291457
next
edit "SAP-ICMP"
set internet-service-id 6291458
next
edit "SAP-DNS"
set internet-service-id 6291459
next
edit "SAP-Outbound_Email"
set internet-service-id 6291460
next
edit "SAP-SSH"
set internet-service-id 6291462
next
edit "SAP-FTP"
set internet-service-id 6291463
next
edit "SAP-NTP"
set internet-service-id 6291464
next
edit "SAP-Inbound_Email"
set internet-service-id 6291465
next
edit "SAP-LDAP"
set internet-service-id 6291470
next
edit "SAP-NetBIOS.Session.Service"
set internet-service-id 6291471
next
edit "SAP-RTMP"
set internet-service-id 6291472
next
edit "SAP-NetBIOS.Name.Service"
set internet-service-id 6291480
next
edit "SAP-HANA"
set internet-service-id 6291612
next
edit "SAP-SuccessFactors"
set internet-service-id 6291618
next
edit "Snap-Snapchat"
set internet-service-id 6357108
next
edit "Zoom.us-Zoom.Meeting"
set internet-service-id 6422646
next
edit "Sophos-Other"
set internet-service-id 6488064
next
edit "Sophos-Web"
set internet-service-id 6488065
next
edit "Sophos-ICMP"
set internet-service-id 6488066
next
edit "Sophos-DNS"
set internet-service-id 6488067
next
edit "Sophos-Outbound_Email"
set internet-service-id 6488068
next
edit "Sophos-SSH"
set internet-service-id 6488070
next
edit "Sophos-FTP"
set internet-service-id 6488071
next
edit "Sophos-NTP"
set internet-service-id 6488072
next
edit "Sophos-Inbound_Email"
set internet-service-id 6488073
next
edit "Sophos-LDAP"
set internet-service-id 6488078
next
edit "Sophos-NetBIOS.Session.Service"
set internet-service-id 6488079
next
edit "Sophos-RTMP"
set internet-service-id 6488080
next
edit "Sophos-NetBIOS.Name.Service"
set internet-service-id 6488088
next
edit "Cloudflare-Other"
set internet-service-id 6553600
next
edit "Cloudflare-Web"
set internet-service-id 6553601
next
edit "Cloudflare-ICMP"
set internet-service-id 6553602
next
edit "Cloudflare-DNS"
set internet-service-id 6553603
next
edit "Cloudflare-Outbound_Email"
set internet-service-id 6553604
next
edit "Cloudflare-SSH"
set internet-service-id 6553606
next
edit "Cloudflare-FTP"
set internet-service-id 6553607
next
edit "Cloudflare-NTP"
set internet-service-id 6553608
next
edit "Cloudflare-Inbound_Email"
set internet-service-id 6553609
next
edit "Cloudflare-LDAP"
set internet-service-id 6553614
next
edit "Cloudflare-NetBIOS.Session.Service"
set internet-service-id 6553615
next
edit "Cloudflare-RTMP"
set internet-service-id 6553616
next
edit "Cloudflare-NetBIOS.Name.Service"
set internet-service-id 6553624
next
edit "Cloudflare-CDN"
set internet-service-id 6553737
next
edit "Pexip-Pexip.Meeting"
set internet-service-id 6619256
next
edit "Zscaler-Other"
set internet-service-id 6684672
next
edit "Zscaler-Web"
set internet-service-id 6684673
next
edit "Zscaler-ICMP"
set internet-service-id 6684674
next
edit "Zscaler-DNS"
set internet-service-id 6684675
next
edit "Zscaler-Outbound_Email"
set internet-service-id 6684676
next
edit "Zscaler-SSH"
set internet-service-id 6684678
next
edit "Zscaler-FTP"
set internet-service-id 6684679
next
edit "Zscaler-NTP"
set internet-service-id 6684680
next
edit "Zscaler-Inbound_Email"
set internet-service-id 6684681
next
edit "Zscaler-LDAP"
set internet-service-id 6684686
next
edit "Zscaler-NetBIOS.Session.Service"
set internet-service-id 6684687
next
edit "Zscaler-RTMP"
set internet-service-id 6684688
next
edit "Zscaler-NetBIOS.Name.Service"
set internet-service-id 6684696
next
edit "Zscaler-Zscaler.Cloud"
set internet-service-id 6684793
next
edit "Yandex-Other"
set internet-service-id 6750208
next
edit "Yandex-Web"
set internet-service-id 6750209
next
edit "Yandex-ICMP"
set internet-service-id 6750210
next
edit "Yandex-DNS"
set internet-service-id 6750211
next
edit "Yandex-Outbound_Email"
set internet-service-id 6750212
next
edit "Yandex-SSH"
set internet-service-id 6750214
next
edit "Yandex-FTP"
set internet-service-id 6750215
next
edit "Yandex-NTP"
set internet-service-id 6750216
next
edit "Yandex-Inbound_Email"
set internet-service-id 6750217
next
edit "Yandex-LDAP"
set internet-service-id 6750222
next
edit "Yandex-NetBIOS.Session.Service"
set internet-service-id 6750223
next
edit "Yandex-RTMP"
set internet-service-id 6750224
next
edit "Yandex-NetBIOS.Name.Service"
set internet-service-id 6750232
next
edit "mail.ru-Other"
set internet-service-id 6815744
next
edit "mail.ru-Web"
set internet-service-id 6815745
next
edit "mail.ru-ICMP"
set internet-service-id 6815746
next
edit "mail.ru-DNS"
set internet-service-id 6815747
next
edit "mail.ru-Outbound_Email"
set internet-service-id 6815748
next
edit "mail.ru-SSH"
set internet-service-id 6815750
next
edit "mail.ru-FTP"
set internet-service-id 6815751
next
edit "mail.ru-NTP"
set internet-service-id 6815752
next
edit "mail.ru-Inbound_Email"
set internet-service-id 6815753
next
edit "mail.ru-LDAP"
set internet-service-id 6815758
next
edit "mail.ru-NetBIOS.Session.Service"
set internet-service-id 6815759
next
edit "mail.ru-RTMP"
set internet-service-id 6815760
next
edit "mail.ru-NetBIOS.Name.Service"
set internet-service-id 6815768
next
edit "Alibaba-Other"
set internet-service-id 6881280
next
edit "Alibaba-Web"
set internet-service-id 6881281
next
edit "Alibaba-ICMP"
set internet-service-id 6881282
next
edit "Alibaba-DNS"
set internet-service-id 6881283
next
edit "Alibaba-Outbound_Email"
set internet-service-id 6881284
next
edit "Alibaba-SSH"
set internet-service-id 6881286
next
edit "Alibaba-FTP"
set internet-service-id 6881287
next
edit "Alibaba-NTP"
set internet-service-id 6881288
next
edit "Alibaba-Inbound_Email"
set internet-service-id 6881289
next
edit "Alibaba-LDAP"
set internet-service-id 6881294
next
edit "Alibaba-NetBIOS.Session.Service"
set internet-service-id 6881295
next
edit "Alibaba-RTMP"
set internet-service-id 6881296
next
edit "Alibaba-NetBIOS.Name.Service"
set internet-service-id 6881304
next
edit "Alibaba-Alibaba.Cloud"
set internet-service-id 6881402
next
edit "GoDaddy-Other"
set internet-service-id 6946816
next
edit "GoDaddy-Web"
set internet-service-id 6946817
next
edit "GoDaddy-ICMP"
set internet-service-id 6946818
next
edit "GoDaddy-DNS"
set internet-service-id 6946819
next
edit "GoDaddy-Outbound_Email"
set internet-service-id 6946820
next
edit "GoDaddy-SSH"
set internet-service-id 6946822
next
edit "GoDaddy-FTP"
set internet-service-id 6946823
next
edit "GoDaddy-NTP"
set internet-service-id 6946824
next
edit "GoDaddy-Inbound_Email"
set internet-service-id 6946825
next
edit "GoDaddy-LDAP"
set internet-service-id 6946830
next
edit "GoDaddy-NetBIOS.Session.Service"
set internet-service-id 6946831
next
edit "GoDaddy-RTMP"
set internet-service-id 6946832
next
edit "GoDaddy-NetBIOS.Name.Service"
set internet-service-id 6946840
next
edit "GoDaddy-GoDaddy.Email"
set internet-service-id 6946939
next
edit "Bluejeans-Other"
set internet-service-id 7012352
next
edit "Bluejeans-Web"
set internet-service-id 7012353
next
edit "Bluejeans-ICMP"
set internet-service-id 7012354
next
edit "Bluejeans-DNS"
set internet-service-id 7012355
next
edit "Bluejeans-Outbound_Email"
set internet-service-id 7012356
next
edit "Bluejeans-SSH"
set internet-service-id 7012358
next
edit "Bluejeans-FTP"
set internet-service-id 7012359
next
edit "Bluejeans-NTP"
set internet-service-id 7012360
next
edit "Bluejeans-Inbound_Email"
set internet-service-id 7012361
next
edit "Bluejeans-LDAP"
set internet-service-id 7012366
next
edit "Bluejeans-NetBIOS.Session.Service"
set internet-service-id 7012367
next
edit "Bluejeans-RTMP"
set internet-service-id 7012368
next
edit "Bluejeans-NetBIOS.Name.Service"
set internet-service-id 7012376
next
edit "Bluejeans-Bluejeans.Meeting"
set internet-service-id 7012476
next
edit "Webroot-Webroot.SecureAnywhere"
set internet-service-id 7078013
next
edit "Avast-Other"
set internet-service-id 7143424
next
edit "Avast-Web"
set internet-service-id 7143425
next
edit "Avast-ICMP"
set internet-service-id 7143426
next
edit "Avast-DNS"
set internet-service-id 7143427
next
edit "Avast-Outbound_Email"
set internet-service-id 7143428
next
edit "Avast-SSH"
set internet-service-id 7143430
next
edit "Avast-FTP"
set internet-service-id 7143431
next
edit "Avast-NTP"
set internet-service-id 7143432
next
edit "Avast-Inbound_Email"
set internet-service-id 7143433
next
edit "Avast-LDAP"
set internet-service-id 7143438
next
edit "Avast-NetBIOS.Session.Service"
set internet-service-id 7143439
next
edit "Avast-RTMP"
set internet-service-id 7143440
next
edit "Avast-NetBIOS.Name.Service"
set internet-service-id 7143448
next
edit "Avast-Avast.Security"
set internet-service-id 7143550
next
edit "Wetransfer-Other"
set internet-service-id 7208960
next
edit "Wetransfer-Web"
set internet-service-id 7208961
next
edit "Wetransfer-ICMP"
set internet-service-id 7208962
next
edit "Wetransfer-DNS"
set internet-service-id 7208963
next
edit "Wetransfer-Outbound_Email"
set internet-service-id 7208964
next
edit "Wetransfer-SSH"
set internet-service-id 7208966
next
edit "Wetransfer-FTP"
set internet-service-id 7208967
next
edit "Wetransfer-NTP"
set internet-service-id 7208968
next
edit "Wetransfer-Inbound_Email"
set internet-service-id 7208969
next
edit "Wetransfer-LDAP"
set internet-service-id 7208974
next
edit "Wetransfer-NetBIOS.Session.Service"
set internet-service-id 7208975
next
edit "Wetransfer-RTMP"
set internet-service-id 7208976
next
edit "Wetransfer-NetBIOS.Name.Service"
set internet-service-id 7208984
next
edit "Sendgrid-Sendgrid.Email"
set internet-service-id 7274623
next
edit "Ubiquiti-UniFi"
set internet-service-id 7340160
next
edit "Lifesize-Lifesize.Cloud"
set internet-service-id 7405697
next
edit "Okta-Other"
set internet-service-id 7471104
next
edit "Okta-Web"
set internet-service-id 7471105
next
edit "Okta-ICMP"
set internet-service-id 7471106
next
edit "Okta-DNS"
set internet-service-id 7471107
next
edit "Okta-Outbound_Email"
set internet-service-id 7471108
next
edit "Okta-SSH"
set internet-service-id 7471110
next
edit "Okta-FTP"
set internet-service-id 7471111
next
edit "Okta-NTP"
set internet-service-id 7471112
next
edit "Okta-Inbound_Email"
set internet-service-id 7471113
next
edit "Okta-LDAP"
set internet-service-id 7471118
next
edit "Okta-NetBIOS.Session.Service"
set internet-service-id 7471119
next
edit "Okta-RTMP"
set internet-service-id 7471120
next
edit "Okta-NetBIOS.Name.Service"
set internet-service-id 7471128
next
edit "Okta-Okta"
set internet-service-id 7471307
next
edit "Cybozu-Other"
set internet-service-id 7536640
next
edit "Cybozu-Web"
set internet-service-id 7536641
next
edit "Cybozu-ICMP"
set internet-service-id 7536642
next
edit "Cybozu-DNS"
set internet-service-id 7536643
next
edit "Cybozu-Outbound_Email"
set internet-service-id 7536644
next
edit "Cybozu-SSH"
set internet-service-id 7536646
next
edit "Cybozu-FTP"
set internet-service-id 7536647
next
edit "Cybozu-NTP"
set internet-service-id 7536648
next
edit "Cybozu-Inbound_Email"
set internet-service-id 7536649
next
edit "Cybozu-LDAP"
set internet-service-id 7536654
next
edit "Cybozu-NetBIOS.Session.Service"
set internet-service-id 7536655
next
edit "Cybozu-RTMP"
set internet-service-id 7536656
next
edit "Cybozu-NetBIOS.Name.Service"
set internet-service-id 7536664
next
edit "VNC-Other"
set internet-service-id 7602176
next
edit "VNC-Web"
set internet-service-id 7602177
next
edit "VNC-ICMP"
set internet-service-id 7602178
next
edit "VNC-DNS"
set internet-service-id 7602179
next
edit "VNC-Outbound_Email"
set internet-service-id 7602180
next
edit "VNC-SSH"
set internet-service-id 7602182
next
edit "VNC-FTP"
set internet-service-id 7602183
next
edit "VNC-NTP"
set internet-service-id 7602184
next
edit "VNC-Inbound_Email"
set internet-service-id 7602185
next
edit "VNC-LDAP"
set internet-service-id 7602190
next
edit "VNC-NetBIOS.Session.Service"
set internet-service-id 7602191
next
edit "VNC-RTMP"
set internet-service-id 7602192
next
edit "VNC-NetBIOS.Name.Service"
set internet-service-id 7602200
next
edit "Egnyte-Egnyte"
set internet-service-id 7667846
next
edit "CrowdStrike-CrowdStrike.Falcon.Cloud"
set internet-service-id 7733383
next
edit "Aruba.it-Other"
set internet-service-id 7798784
next
edit "Aruba.it-Web"
set internet-service-id 7798785
next
edit "Aruba.it-ICMP"
set internet-service-id 7798786
next
edit "Aruba.it-DNS"
set internet-service-id 7798787
next
edit "Aruba.it-Outbound_Email"
set internet-service-id 7798788
next
edit "Aruba.it-SSH"
set internet-service-id 7798790
next
edit "Aruba.it-FTP"
set internet-service-id 7798791
next
edit "Aruba.it-NTP"
set internet-service-id 7798792
next
edit "Aruba.it-Inbound_Email"
set internet-service-id 7798793
next
edit "Aruba.it-LDAP"
set internet-service-id 7798798
next
edit "Aruba.it-NetBIOS.Session.Service"
set internet-service-id 7798799
next
edit "Aruba.it-RTMP"
set internet-service-id 7798800
next
edit "Aruba.it-NetBIOS.Name.Service"
set internet-service-id 7798808
next
edit "ISLOnline-Other"
set internet-service-id 7864320
next
edit "ISLOnline-Web"
set internet-service-id 7864321
next
edit "ISLOnline-ICMP"
set internet-service-id 7864322
next
edit "ISLOnline-DNS"
set internet-service-id 7864323
next
edit "ISLOnline-Outbound_Email"
set internet-service-id 7864324
next
edit "ISLOnline-SSH"
set internet-service-id 7864326
next
edit "ISLOnline-FTP"
set internet-service-id 7864327
next
edit "ISLOnline-NTP"
set internet-service-id 7864328
next
edit "ISLOnline-Inbound_Email"
set internet-service-id 7864329
next
edit "ISLOnline-LDAP"
set internet-service-id 7864334
next
edit "ISLOnline-NetBIOS.Session.Service"
set internet-service-id 7864335
next
edit "ISLOnline-RTMP"
set internet-service-id 7864336
next
edit "ISLOnline-NetBIOS.Name.Service"
set internet-service-id 7864344
next
edit "Akamai-CDN"
set internet-service-id 7929993
next
edit "Akamai-Linode.Cloud"
set internet-service-id 7930148
next
edit "Rackspace-CDN"
set internet-service-id 7995529
next
edit "Instart-CDN"
set internet-service-id 8061065
next
edit "Bitdefender-Other"
set internet-service-id 8126464
next
edit "Bitdefender-Web"
set internet-service-id 8126465
next
edit "Bitdefender-ICMP"
set internet-service-id 8126466
next
edit "Bitdefender-DNS"
set internet-service-id 8126467
next
edit "Bitdefender-Outbound_Email"
set internet-service-id 8126468
next
edit "Bitdefender-SSH"
set internet-service-id 8126470
next
edit "Bitdefender-FTP"
set internet-service-id 8126471
next
edit "Bitdefender-NTP"
set internet-service-id 8126472
next
edit "Bitdefender-Inbound_Email"
set internet-service-id 8126473
next
edit "Bitdefender-LDAP"
set internet-service-id 8126478
next
edit "Bitdefender-NetBIOS.Session.Service"
set internet-service-id 8126479
next
edit "Bitdefender-RTMP"
set internet-service-id 8126480
next
edit "Bitdefender-NetBIOS.Name.Service"
set internet-service-id 8126488
next
edit "Pingdom-Other"
set internet-service-id 8192000
next
edit "Pingdom-Web"
set internet-service-id 8192001
next
edit "Pingdom-ICMP"
set internet-service-id 8192002
next
edit "Pingdom-DNS"
set internet-service-id 8192003
next
edit "Pingdom-Outbound_Email"
set internet-service-id 8192004
next
edit "Pingdom-SSH"
set internet-service-id 8192006
next
edit "Pingdom-FTP"
set internet-service-id 8192007
next
edit "Pingdom-NTP"
set internet-service-id 8192008
next
edit "Pingdom-Inbound_Email"
set internet-service-id 8192009
next
edit "Pingdom-LDAP"
set internet-service-id 8192014
next
edit "Pingdom-NetBIOS.Session.Service"
set internet-service-id 8192015
next
edit "Pingdom-RTMP"
set internet-service-id 8192016
next
edit "Pingdom-NetBIOS.Name.Service"
set internet-service-id 8192024
next
edit "UptimeRobot-Other"
set internet-service-id 8257536
next
edit "UptimeRobot-Web"
set internet-service-id 8257537
next
edit "UptimeRobot-ICMP"
set internet-service-id 8257538
next
edit "UptimeRobot-DNS"
set internet-service-id 8257539
next
edit "UptimeRobot-Outbound_Email"
set internet-service-id 8257540
next
edit "UptimeRobot-SSH"
set internet-service-id 8257542
next
edit "UptimeRobot-FTP"
set internet-service-id 8257543
next
edit "UptimeRobot-NTP"
set internet-service-id 8257544
next
edit "UptimeRobot-Inbound_Email"
set internet-service-id 8257545
next
edit "UptimeRobot-LDAP"
set internet-service-id 8257550
next
edit "UptimeRobot-NetBIOS.Session.Service"
set internet-service-id 8257551
next
edit "UptimeRobot-RTMP"
set internet-service-id 8257552
next
edit "UptimeRobot-NetBIOS.Name.Service"
set internet-service-id 8257560
next
edit "UptimeRobot-UptimeRobot.Monitor"
set internet-service-id 8257709
next
edit "Quovadisglobal-Other"
set internet-service-id 8323072
next
edit "Quovadisglobal-Web"
set internet-service-id 8323073
next
edit "Quovadisglobal-ICMP"
set internet-service-id 8323074
next
edit "Quovadisglobal-DNS"
set internet-service-id 8323075
next
edit "Quovadisglobal-Outbound_Email"
set internet-service-id 8323076
next
edit "Quovadisglobal-SSH"
set internet-service-id 8323078
next
edit "Quovadisglobal-FTP"
set internet-service-id 8323079
next
edit "Quovadisglobal-NTP"
set internet-service-id 8323080
next
edit "Quovadisglobal-Inbound_Email"
set internet-service-id 8323081
next
edit "Quovadisglobal-LDAP"
set internet-service-id 8323086
next
edit "Quovadisglobal-NetBIOS.Session.Service"
set internet-service-id 8323087
next
edit "Quovadisglobal-RTMP"
set internet-service-id 8323088
next
edit "Quovadisglobal-NetBIOS.Name.Service"
set internet-service-id 8323096
next
edit "Splashtop-Splashtop"
set internet-service-id 8388751
next
edit "Zoox-Other"
set internet-service-id 8454144
next
edit "Zoox-Web"
set internet-service-id 8454145
next
edit "Zoox-ICMP"
set internet-service-id 8454146
next
edit "Zoox-DNS"
set internet-service-id 8454147
next
edit "Zoox-Outbound_Email"
set internet-service-id 8454148
next
edit "Zoox-SSH"
set internet-service-id 8454150
next
edit "Zoox-FTP"
set internet-service-id 8454151
next
edit "Zoox-NTP"
set internet-service-id 8454152
next
edit "Zoox-Inbound_Email"
set internet-service-id 8454153
next
edit "Zoox-LDAP"
set internet-service-id 8454158
next
edit "Zoox-NetBIOS.Session.Service"
set internet-service-id 8454159
next
edit "Zoox-RTMP"
set internet-service-id 8454160
next
edit "Zoox-NetBIOS.Name.Service"
set internet-service-id 8454168
next
edit "Skyfii-Other"
set internet-service-id 8519680
next
edit "Skyfii-Web"
set internet-service-id 8519681
next
edit "Skyfii-ICMP"
set internet-service-id 8519682
next
edit "Skyfii-DNS"
set internet-service-id 8519683
next
edit "Skyfii-Outbound_Email"
set internet-service-id 8519684
next
edit "Skyfii-SSH"
set internet-service-id 8519686
next
edit "Skyfii-FTP"
set internet-service-id 8519687
next
edit "Skyfii-NTP"
set internet-service-id 8519688
next
edit "Skyfii-Inbound_Email"
set internet-service-id 8519689
next
edit "Skyfii-LDAP"
set internet-service-id 8519694
next
edit "Skyfii-NetBIOS.Session.Service"
set internet-service-id 8519695
next
edit "Skyfii-RTMP"
set internet-service-id 8519696
next
edit "Skyfii-NetBIOS.Name.Service"
set internet-service-id 8519704
next
edit "CoffeeBean-Other"
set internet-service-id 8585216
next
edit "CoffeeBean-Web"
set internet-service-id 8585217
next
edit "CoffeeBean-ICMP"
set internet-service-id 8585218
next
edit "CoffeeBean-DNS"
set internet-service-id 8585219
next
edit "CoffeeBean-Outbound_Email"
set internet-service-id 8585220
next
edit "CoffeeBean-SSH"
set internet-service-id 8585222
next
edit "CoffeeBean-FTP"
set internet-service-id 8585223
next
edit "CoffeeBean-NTP"
set internet-service-id 8585224
next
edit "CoffeeBean-Inbound_Email"
set internet-service-id 8585225
next
edit "CoffeeBean-LDAP"
set internet-service-id 8585230
next
edit "CoffeeBean-NetBIOS.Session.Service"
set internet-service-id 8585231
next
edit "CoffeeBean-RTMP"
set internet-service-id 8585232
next
edit "CoffeeBean-NetBIOS.Name.Service"
set internet-service-id 8585240
next
edit "Cloud4Wi-Other"
set internet-service-id 8650752
next
edit "Cloud4Wi-Web"
set internet-service-id 8650753
next
edit "Cloud4Wi-ICMP"
set internet-service-id 8650754
next
edit "Cloud4Wi-DNS"
set internet-service-id 8650755
next
edit "Cloud4Wi-Outbound_Email"
set internet-service-id 8650756
next
edit "Cloud4Wi-SSH"
set internet-service-id 8650758
next
edit "Cloud4Wi-FTP"
set internet-service-id 8650759
next
edit "Cloud4Wi-NTP"
set internet-service-id 8650760
next
edit "Cloud4Wi-Inbound_Email"
set internet-service-id 8650761
next
edit "Cloud4Wi-LDAP"
set internet-service-id 8650766
next
edit "Cloud4Wi-NetBIOS.Session.Service"
set internet-service-id 8650767
next
edit "Cloud4Wi-RTMP"
set internet-service-id 8650768
next
edit "Cloud4Wi-NetBIOS.Name.Service"
set internet-service-id 8650776
next
edit "Panda-Panda.Security"
set internet-service-id 8716432
next
edit "Ewon-Talk2M"
set internet-service-id 8781970
next
edit "Nutanix-Nutanix.Cloud"
set internet-service-id 8847507
next
edit "Backblaze-Other"
set internet-service-id 8912896
next
edit "Backblaze-Web"
set internet-service-id 8912897
next
edit "Backblaze-ICMP"
set internet-service-id 8912898
next
edit "Backblaze-DNS"
set internet-service-id 8912899
next
edit "Backblaze-Outbound_Email"
set internet-service-id 8912900
next
edit "Backblaze-SSH"
set internet-service-id 8912902
next
edit "Backblaze-FTP"
set internet-service-id 8912903
next
edit "Backblaze-NTP"
set internet-service-id 8912904
next
edit "Backblaze-Inbound_Email"
set internet-service-id 8912905
next
edit "Backblaze-LDAP"
set internet-service-id 8912910
next
edit "Backblaze-NetBIOS.Session.Service"
set internet-service-id 8912911
next
edit "Backblaze-RTMP"
set internet-service-id 8912912
next
edit "Backblaze-NetBIOS.Name.Service"
set internet-service-id 8912920
next
edit "Extreme-Extreme.Cloud"
set internet-service-id 8978580
next
edit "XING-Other"
set internet-service-id 9043968
next
edit "XING-Web"
set internet-service-id 9043969
next
edit "XING-ICMP"
set internet-service-id 9043970
next
edit "XING-DNS"
set internet-service-id 9043971
next
edit "XING-Outbound_Email"
set internet-service-id 9043972
next
edit "XING-SSH"
set internet-service-id 9043974
next
edit "XING-FTP"
set internet-service-id 9043975
next
edit "XING-NTP"
set internet-service-id 9043976
next
edit "XING-Inbound_Email"
set internet-service-id 9043977
next
edit "XING-LDAP"
set internet-service-id 9043982
next
edit "XING-NetBIOS.Session.Service"
set internet-service-id 9043983
next
edit "XING-RTMP"
set internet-service-id 9043984
next
edit "XING-NetBIOS.Name.Service"
set internet-service-id 9043992
next
edit "Genesys-PureCloud"
set internet-service-id 9109653
next
edit "BlackBerry-Cylance"
set internet-service-id 9175190
next
edit "DigiCert-OCSP"
set internet-service-id 9240728
next
edit "Infomaniak-SwissTransfer"
set internet-service-id 9306265
next
edit "Fuze-Fuze"
set internet-service-id 9371802
next
edit "Truecaller-Truecaller"
set internet-service-id 9437339
next
edit "GlobalSign-OCSP"
set internet-service-id 9502872
next
edit "VeriSign-OCSP"
set internet-service-id 9568408
next
edit "Sony-PlayStation.Network"
set internet-service-id 9633952
next
edit "Acronis-Cyber.Cloud"
set internet-service-id 9699489
next
edit "RingCentral-RingCentral"
set internet-service-id 9765027
next
edit "FSecure-FSecure"
set internet-service-id 9830564
next
edit "Kaseya-Kaseya.Cloud"
set internet-service-id 9896101
next
edit "Shodan-Scanner"
set internet-service-id 9961638
next
edit "Censys-Scanner"
set internet-service-id 10027174
next
edit "Valve-Steam"
set internet-service-id 10092711
next
edit "YouSeeU-Bongo"
set internet-service-id 10158248
next
edit "Cato-Cato.Cloud"
set internet-service-id 10223785
next
edit "SolarWinds-SpamExperts"
set internet-service-id 10289323
next
edit "SolarWinds-Pingdom.Probe"
set internet-service-id 10289326
next
edit "SolarWinds-SolarWinds.RMM"
set internet-service-id 10289379
next
edit "8X8-8X8.Cloud"
set internet-service-id 10354860
next
edit "Zattoo-Zattoo.TV"
set internet-service-id 10420401
next
edit "Datto-Datto.RMM"
set internet-service-id 10485939
next
edit "Barracuda-Barracuda.Cloud"
set internet-service-id 10551477
next
edit "Naver-Line"
set internet-service-id 10617015
next
edit "Disney-Disney+"
set internet-service-id 10682552
next
edit "DNS-DoH_DoT"
set internet-service-id 10748089
next
edit "DNS-Root.Name.Servers"
set internet-service-id 10748156
next
edit "Quad9-Quad9.Standard.DNS"
set internet-service-id 10813626
next
edit "Stretchoid-Scanner"
set internet-service-id 10879142
next
edit "Poly-RealConnect.Service"
set internet-service-id 10944700
next
edit "Telegram-Telegram"
set internet-service-id 11010249
next
edit "Spotify-Spotify"
set internet-service-id 11075786
next
edit "NextDNS-NextDNS"
set internet-service-id 11141324
next
edit "Fastly-CDN"
set internet-service-id 11206793
next
edit "Neustar-UltraDNS.Probes"
set internet-service-id 11272397
next
edit "Malicious-Malicious.Server"
set internet-service-id 11337935
next
edit "NIST-ITS"
set internet-service-id 11403472
next
edit "Jamf-Jamf.Cloud"
set internet-service-id 11469009
next
edit "Alcatel.Lucent-Rainbow"
set internet-service-id 11534546
next
edit "Forcepoint-Forcepoint.Cloud"
set internet-service-id 11600083
next
edit "Datadog-Datadog"
set internet-service-id 11665620
next
edit "Mimecast-Mimecast"
set internet-service-id 11731157
next
edit "MediaFire-Other"
set internet-service-id 11796480
next
edit "MediaFire-Web"
set internet-service-id 11796481
next
edit "MediaFire-ICMP"
set internet-service-id 11796482
next
edit "MediaFire-DNS"
set internet-service-id 11796483
next
edit "MediaFire-Outbound_Email"
set internet-service-id 11796484
next
edit "MediaFire-SSH"
set internet-service-id 11796486
next
edit "MediaFire-FTP"
set internet-service-id 11796487
next
edit "MediaFire-NTP"
set internet-service-id 11796488
next
edit "MediaFire-Inbound_Email"
set internet-service-id 11796489
next
edit "MediaFire-LDAP"
set internet-service-id 11796494
next
edit "MediaFire-NetBIOS.Session.Service"
set internet-service-id 11796495
next
edit "MediaFire-RTMP"
set internet-service-id 11796496
next
edit "MediaFire-NetBIOS.Name.Service"
set internet-service-id 11796504
next
edit "Pandora-Pandora"
set internet-service-id 11862230
next
edit "SiriusXM-SiriusXM"
set internet-service-id 11927767
next
edit "Hopin-Hopin"
set internet-service-id 11993304
next
edit "RedShield-RedShield.Cloud"
set internet-service-id 12058842
next
edit "InterneTTL-Scanner"
set internet-service-id 12124326
next
edit "VadeSecure-VadeSecure.Cloud"
set internet-service-id 12189915
next
edit "Netskope-Netskope.Cloud"
set internet-service-id 12255452
next
edit "ClickMeeting-ClickMeeting"
set internet-service-id 12320989
next
edit "Tenable-Tenable.io.Cloud.Scanner"
set internet-service-id 12386528
next
edit "Vidyo-VidyoCloud"
set internet-service-id 12452065
next
edit "OpenNIC-OpenNIC.DNS"
set internet-service-id 12517602
next
edit "Sectigo-Sectigo"
set internet-service-id 12583141
next
edit "DigitalOcean-DigitalOcean.Platform"
set internet-service-id 12648679
next
edit "Pitney.Bowes-Pitney.Bowes.Data.Center"
set internet-service-id 12714216
next
edit "VPN-Anonymous.VPN"
set internet-service-id 12779753
next
edit "Blockchain-Crypto.Mining.Pool"
set internet-service-id 12845290
next
edit "FactSet-FactSet"
set internet-service-id 12910830
next
edit "Bloomberg-Bloomberg"
set internet-service-id 12976367
next
edit "Five9-Five9"
set internet-service-id 13041904
next
edit "Gigas-Gigas.Cloud"
set internet-service-id 13107441
next
edit "Imperva-Imperva.Cloud.WAF"
set internet-service-id 13172978
next
edit "INAP-INAP"
set internet-service-id 13238515
next
edit "Azion-Azion.Platform"
set internet-service-id 13304053
next
edit "Hurricane.Electric-Hurricane.Electric.Internet.Services"
set internet-service-id 13369590
next
edit "NodePing-NodePing.Probe"
set internet-service-id 13435127
next
edit "Frontline-Frontline"
set internet-service-id 13500665
next
edit "Tally-Tally.ERP"
set internet-service-id 13566202
next
edit "Hosting-Bulletproof.Hosting"
set internet-service-id 13631739
next
edit "Okko-Okko.TV"
set internet-service-id 13697277
next
edit "Voximplant-Voximplant.Platform"
set internet-service-id 13762829
next
edit "OVHcloud-OVHcloud"
set internet-service-id 13828367
next
edit "SentinelOne-SentinelOne.Cloud"
set internet-service-id 13893905
next
edit "Kakao-Kakao.Services"
set internet-service-id 13959442
next
edit "Stripe-Stripe"
set internet-service-id 14024979
next
edit "NetScout-Scanner"
set internet-service-id 14090406
next
edit "Recyber-Scanner"
set internet-service-id 14155942
next
edit "Cyber.Casa-Scanner"
set internet-service-id 14221478
next
edit "GTHost-Dedicated.Instant.Servers"
set internet-service-id 14287132
next
edit "ivi-ivi.Streaming"
set internet-service-id 14352669
next
edit "BinaryEdge-Scanner"
set internet-service-id 14418086
next
edit "Fintech-MarketMap.Terminal"
set internet-service-id 14483742
next
edit "xMatters-xMatters.Platform"
set internet-service-id 14549279
next
edit "Blizzard-Battle.Net"
set internet-service-id 14614816
next
edit "Axon-Evidence"
set internet-service-id 14680353
next
edit "CDN77-CDN"
set internet-service-id 14745737
next
edit "GCore.Labs-CDN"
set internet-service-id 14811273
next
edit "Matrix42-FastViewer"
set internet-service-id 14876962
next
edit "Bunny.net-CDN"
set internet-service-id 14942345
next
edit "StackPath-CDN"
set internet-service-id 15007881
next
edit "Edgio-CDN"
set internet-service-id 15073417
next
edit "CacheFly-CDN"
set internet-service-id 15138953
next
edit "Paylocity-Paylocity"
set internet-service-id 15204646
next
edit "Qualys-Qualys.Cloud.Platform"
set internet-service-id 15270183
next
edit "Dailymotion-Other"
set internet-service-id 15335424
next
edit "Dailymotion-Web"
set internet-service-id 15335425
next
edit "Dailymotion-ICMP"
set internet-service-id 15335426
next
edit "Dailymotion-DNS"
set internet-service-id 15335427
next
edit "Dailymotion-Outbound_Email"
set internet-service-id 15335428
next
edit "Dailymotion-SSH"
set internet-service-id 15335430
next
edit "Dailymotion-FTP"
set internet-service-id 15335431
next
edit "Dailymotion-NTP"
set internet-service-id 15335432
next
edit "Dailymotion-Inbound_Email"
set internet-service-id 15335433
next
edit "Dailymotion-LDAP"
set internet-service-id 15335438
next
edit "Dailymotion-NetBIOS.Session.Service"
set internet-service-id 15335439
next
edit "Dailymotion-RTMP"
set internet-service-id 15335440
next
edit "Dailymotion-NetBIOS.Name.Service"
set internet-service-id 15335448
next
edit "Fortinet-FortiWeb.Cloud"
set internet-service-id 1245480
next
edit "Fortinet-FortiSASE"
set internet-service-id 1245481
next
edit "LaunchDarkly-LaunchDarkly.Platform"
set internet-service-id 15401258
next
edit "Medianova-CDN"
set internet-service-id 15466633
next
edit "NetDocuments-NetDocuments.Platform"
set internet-service-id 15532331
next
edit "Microsoft-Azure.Connectors"
set internet-service-id 327980
next
edit "Vonage-Vonage.Contact.Center"
set internet-service-id 15597869
next
edit "DNS-ARPA.Name.Servers"
set internet-service-id 10748206
next
edit "Veritas-Enterprise.Vault.Cloud"
set internet-service-id 15663407
next
edit "UK.NCSC-Scanner"
set internet-service-id 15728806
next
edit "Vonage-Vonage.Video.API"
set internet-service-id 15597872
next
edit "Restream-Restream.Platform"
set internet-service-id 15794481
next
edit "NewRelic-Synthetic.Monitor"
set internet-service-id 4849970
next
edit "ArcticWolf-ArcticWolf.Cloud"
set internet-service-id 15860019
next
edit "CounterPath-Bria"
set internet-service-id 15925556
next
edit "CriminalIP-Scanner"
set internet-service-id 15990950
next
edit "IPFS-IPFS.Gateway"
set internet-service-id 16056629
next
edit "Internet.Census.Group-Scanner"
set internet-service-id 16122022
next
edit "SAP-SAP.Ariba"
set internet-service-id 6291766
next
edit "Microsoft-Teams.Published.Worldwide.Optimize"
set internet-service-id 327991
next
edit "Microsoft-Teams.Published.Worldwide.Allow"
set internet-service-id 327992
next
edit "Microsoft-Azure.Front.Door"
set internet-service-id 327993
next
edit "Performive-Performive.Cloud"
set internet-service-id 16187706
next
edit "Tencent-VooV.Meeting"
set internet-service-id 2556219
next
edit "OneLogin-OneLogin"
set internet-service-id 16253244
next
edit "Shadowserver-Scanner"
set internet-service-id 16318630
next
edit "Turkcell-Suit.Conference"
set internet-service-id 16384317
next
edit "LeakIX-Scanner"
set internet-service-id 16449702
next
edit "Infoblox-BloxOne"
set internet-service-id 16515390
next
edit "Nice-CXone"
set internet-service-id 16580927
next
edit "Hetzner-Hetzner.Hosting.Service"
set internet-service-id 16646464
next
edit "ThreatLocker-ThreatLocker"
set internet-service-id 16712001
next
edit "ZPE-ZPE.Cloud"
set internet-service-id 16777538
next
edit "Datto-Datto.BCDR"
set internet-service-id 10486083
next
edit "ColoCrossing-ColoCrossing.Hosting.Service"
set internet-service-id 16843076
next
edit "Sinch-Mailgun"
set internet-service-id 16908613
next
edit "SpaceX-Starlink"
set internet-service-id 16974150
next
edit "Microsoft-Azure.Service.Bus"
set internet-service-id 328007
next
edit "Ingenuity-Ingenuity.Cloud.Service"
set internet-service-id 17039688
next
edit "Microsoft-Azure.Microsoft.Defender"
set internet-service-id 328009
next
end
config firewall internet-service-definition
end
config wanopt content-delivery-network-rule
edit "vcache://"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.m3u8"
next
end
config content-id
set target hls-manifest
set start-str "/"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mpd"
next
end
config content-id
set target dash-manifest
set start-str "/"
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set target hls-fragment
set start-str "/"
end
next
edit "rule4"
config match-entries
edit 1
set pattern "/*.*"
next
end
config content-id
set target dash-fragment
set start-str "/"
end
next
end
next
edit "vcache://youtube/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "youtube.com"
set category youtube
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
set end-str "&"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
end
next
edit "rule3"
set match-mode any
config match-entries
edit 1
set pattern "/stream_204"
next
edit 2
set pattern "/ptracking"
next
edit 3
set pattern "/get_video_info"
next
end
config content-id
set target youtube-map
set start-str "/"
end
next
end
next
edit "vcache://googlevideo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "googlevideo.com"
set category youtube
set text-response-vcache disable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
set end-str "&"
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/videoplayback"
next
end
config content-id
set target youtube-id
set start-str "v="
set start-skip 2
end
next
edit "rule3"
set match-mode any
config match-entries
edit 1
set pattern "/stream_204"
next
edit 2
set pattern "/ptracking"
next
edit 3
set pattern "/get_video_info"
next
end
config content-id
set target youtube-map
set start-str "/"
end
next
end
next
edit "vcache://metacafe/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "mccont.com" "akvideos.metacafe.com" "cdn.metacafe.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://facebook/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "fbcdn.net" "facebook.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://dailymotion/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "dailymotion.com" "dmcdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/video/*.mp4"
next
edit 2
set pattern "/video/*.flv"
next
edit 3
set pattern "/video/*.ts"
next
edit 4
set pattern "/video/*.on2"
next
edit 5
set pattern "/video/*.aac"
next
edit 6
set pattern "/video/*.h264"
next
edit 7
set pattern "/video/*.h263"
next
edit 8
set pattern "/sec*.mp4"
next
edit 9
set pattern "/sec*.flv"
next
edit 10
set pattern "/sec*.on2"
next
edit 11
set pattern "/sec*.aac"
next
edit 12
set pattern "/sec*.h264"
next
edit 13
set pattern "/sec*.h263"
next
edit 14
set pattern "*.ts"
next
end
config skip-entries
edit 1
set target parameter
set pattern "start=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://break/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "break.com" "0ebe.edgecastcdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/dnet/media/*.flv"
next
edit 2
set pattern "/dnet/media/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "ec_seek=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://msn/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "video.msn.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://llnwd/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "llnwd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.fll"
next
end
config skip-entries
edit 1
set target parameter
set pattern "fs=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://yahoo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "yimg.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.m4s"
next
end
config content-id
set target parameter
set start-str "vid="
end
next
end
next
edit "vcache://myspace/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "myspacecdn.com"
set request-cache-control enable
set response-cache-control enable
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://vimeo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "vimeo.com" "vimeocdn.com" "56skyfiregce-a.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.m4s"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://blip.tv/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "blip.tv"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.m4v"
next
edit 2
set pattern "/*.flv"
next
edit 3
set pattern "/*.mp4"
next
edit 4
set pattern "/*.wmv"
next
edit 5
set pattern "/*.rm"
next
edit 6
set pattern "/*.ram"
next
edit 7
set pattern "/*.mov"
next
edit 8
set pattern "/*.avi"
next
end
config skip-entries
edit 1
set target parameter
set pattern "ms=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://maker.tv/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "videos-f.jwpsrv.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://aol/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "stream.aol.com" "5min.com" "vidiblevod-vh.akamaihd.net" "stg-ec-ore-u.uplynk.com" "vidible.tv"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*timeoffset=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://clipfish/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "clipfish.de" "universal-music.de"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.f4v"
next
edit 3
set pattern "/*.mp4"
next
edit 4
set pattern "/*.m4v"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://cnn/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "cnn-vh.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.flv*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.ts*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://foxnews/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "foxnews.com" "foxnews-f.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.mp4*"
next
edit 2
set target parameter
set pattern "*Seg*"
next
edit 3
set target parameter
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://discovery/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "discovery.com" "discidevflash-f.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://liveleak/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "edge.liveleak.com" "cdn.liveleak.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/*.mp4"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/*.wmv"
next
edit 2
set target parameter
set pattern "*seek=0"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://sevenload/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "sevenload.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "aktimeoffset=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://stupidvideos/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "stupidvideos.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://howcast/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "media.howcast.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "start=*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://vevo/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "vevo.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://ooyala/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "ooyala.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "*Seg*"
next
edit 2
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://ms-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "msads.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://yumenetworks-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "yumenetworks.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://2mdn-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "2mdn.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://eyewonder-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "eyewonder.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://eyereturn-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "eyereturn.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://serving-sys-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "serving-sys.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://amazonaws-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "amazonaws.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://edgesuite-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "edgesuite.net"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://gorillanation-ads/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "video.gorillanation.com"
set response-expires enable
config rules
edit "rule1"
set match-mode any
set skip-rule-mode any
config match-entries
edit 1
set pattern "/*.flv"
next
edit 2
set pattern "/*.mp4"
next
edit 3
set pattern "/*.ts"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://youku/"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/youku/*.mp4"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule2"
config match-entries
edit 1
set pattern "/youku/*.flv"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule3"
config match-entries
edit 1
set pattern "/youku/*.kux"
next
edit 2
set target parameter
set pattern "*start=0"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule4"
config match-entries
edit 1
set pattern "/youku/*.mp4"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule5"
config match-entries
edit 1
set pattern "/youku/*.flv"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
edit "rule6"
config match-entries
edit 1
set pattern "/youku/*.kux"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*start=*"
next
end
config content-id
set target youku-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
end
next
edit "vcache://tudou/"
set comment "Static entries are not allowed to change except disable."
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/f4v/*"
next
edit 2
set target parameter
set pattern "*id=tudou*"
next
end
config skip-entries
edit 1
set target parameter
set pattern "*begin=*"
next
end
config content-id
set start-str "/"
set start-skip 1
set start-direction backward
end
next
end
next
edit "vcache://cbc/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "cbc.ca" "mobilehls-vh.akamaihd.net"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "*.mp4*"
next
edit 2
set pattern "*Seg*"
next
edit 3
set pattern "*Frag*"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
edit "rule2"
set match-mode any
config match-entries
edit 1
set pattern "*.ts"
next
edit 2
set pattern "*.mp4"
next
end
config content-id
set start-str "/"
set start-skip 1
end
next
end
next
edit "vcache://megaupload/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "megaupload.com"
set response-expires enable
config rules
edit "rule1"
config match-entries
edit 1
set pattern "/files/*"
next
end
config content-id
set target referrer
set start-str "d="
set start-skip 2
end
next
end
next
edit "update://windowsupdate/"
set comment "Static entries are not allowed to change except disable."
set host-domain-name-suffix "download.windowsupdate.com"
set request-cache-control enable
set response-cache-control enable
set response-expires enable
set updateserver enable
next
end
config log syslogd setting
set status enable
set server "hb.tahoho.com.tw"
end
config log fortiguard setting
set status enable
set upload-option 1-minute
end
config log tap-device
edit "default-tap-gui"
set status enable
set port 12121
set format json
config filter
set forward-traffic disable
set local-traffic disable
set multicast-traffic disable
set sniffer-traffic disable
set ztna-traffic disable
set anomaly disable
set voip disable
config free-style
edit 1
set category event
set filter "subtype router or VPN"
set filter-type exclude
next
end
end
next
end
config system standalone-cluster
config cluster-peer
end
end
config system fortiguard
set service-account-id "coleman.chen@veolia.com"
end
config endpoint-control fctems
edit 1
next
edit 2
next
edit 3
next
edit 4
next
edit 5
next
edit 6
next
edit 7
next
end
config system email-server
set server "notification.fortinet.net"
set port 465
set security smtps
end
config system session-helper
edit 1
set name pptp
set protocol 6
set port 1723
next
edit 2
set name h323
set protocol 6
set port 1720
next
edit 3
set name ras
set protocol 17
set port 1719
next
edit 4
set name tns
set protocol 6
set port 1521
next
edit 5
set name tftp
set protocol 17
set port 69
next
edit 6
set name rtsp
set protocol 6
set port 554
next
edit 7
set name rtsp
set protocol 6
set port 7070
next
edit 8
set name rtsp
set protocol 6
set port 8554
next
edit 9
set name ftp
set protocol 6
set port 21
next
edit 10
set name mms
set protocol 6
set port 1863
next
edit 11
set name pmap
set protocol 6
set port 111
next
edit 12
set name pmap
set protocol 17
set port 111
next
edit 13
set name sip
set protocol 17
set port 5060
next
edit 14
set name dns-udp
set protocol 17
set port 53
next
edit 15
set name rsh
set protocol 6
set port 514
next
edit 16
set name rsh
set protocol 6
set port 512
next
edit 17
set name dcerpc
set protocol 6
set port 135
next
edit 18
set name dcerpc
set protocol 17
set port 135
next
edit 19
set name mgcp
set protocol 17
set port 2427
next
edit 20
set name mgcp
set protocol 17
set port 2727
next
end
config system auto-install
set auto-install-config enable
set auto-install-image enable
end
config system ntp
set ntpsync enable
set server-mode enable
set interface "fortilink"
end
config system ftm-push
set server-cert "Fortinet_Factory"
end
config system automation-trigger
edit "Network Down"
set description "Default automation trigger configuration for when a network connection goes down."
set event-type event-log
set logid 20099
config fields
edit 1
set name "status"
set value "DOWN"
next
end
next
edit "HA Failover"
set description "Default automation trigger configuration for when an HA failover occurs."
set event-type ha-failover
next
edit "Reboot"
set description "Default automation trigger configuration for when a FortiGate is rebooted."
set event-type reboot
next
edit "FortiAnalyzer Connection Down"
set description "Default automation trigger configuration for when the FortiAnalyzer connection is lost."
set event-type event-log
set logid 22902
next
edit "License Expired Notification"
set description "Default automation trigger configuration for when a license is near expiration."
set event-type license-near-expiry
set license-type any
next
edit "Local Cert Expired Notification"
set description "Default automation trigger configuration for when a local certificate is near expiration."
next
edit "Compromised Host - High"
set description "Default automation trigger configuration for when a high severity compromised host is detected."
next
edit "Incoming Webhook Call"
set description "Default automation trigger configuration for an incoming webhook."
set event-type incoming-webhook
next
edit "Security Rating Notification"
set description "Default automation trigger configuration for when a new Security Rating report is available."
set event-type security-rating-summary
set report-type any
next
end
config system automation-action
edit "Default Email"
set description "Default automation action configuration for sending an email with basic information on the log event."
set action-type email
set email-subject "%%log.logdesc%%"
next
edit "FortiExplorer Notification"
set description "Default automation action configuration for sending a notification to any FortiExplorer mobile application."
set action-type fortiexplorer-notification
next
edit "Quarantine on FortiSwitch + FortiAP"
set description "Default automation action configuration for quarantining a MAC address on FortiSwitches and FortiAPs."
set action-type quarantine
next
edit "Quarantine FortiClient EMS Endpoint"
set description "Default automation action configuration for quarantining a FortiClient EMS endpoing device."
set action-type quarantine-forticlient
next
edit "Reboot FortiGate"
set description "Default automation action configuration for rebooting this FortiGate unit."
set action-type system-actions
set system-action reboot
set minimum-interval 300
next
edit "Shutdown FortiGate"
set description "Default automation action configuration for shuting down this FortiGate unit."
set action-type system-actions
set system-action shutdown
next
edit "Backup Config Disk"
set description "Default automation action configuration for backing up the configuration on disk."
set action-type system-actions
set system-action backup-config
next
end
config system automation-stitch
edit "Network Down"
set description "Default automation stitch to send an email when a network goes down."
set status disable
set trigger "Network Down"
config actions
edit 1
set action "Default Email"
next
end
next
edit "HA Failover"
set description "Default automation stitch to send an email when a HA failover is detected."
set status disable
set trigger "HA Failover"
config actions
edit 1
set action "Default Email"
next
end
next
edit "Reboot"
set description "Default automation stitch to send an email when a FortiGate is rebooted."
set status disable
set trigger "Reboot"
config actions
edit 1
set action "Default Email"
next
end
next
edit "FortiAnalyzer Connection Down"
set description "Default automation stitch to send a FortiExplorer notification when the connection to FortiAnalyzer is lost."
set trigger "FortiAnalyzer Connection Down"
config actions
edit 1
set action "FortiExplorer Notification"
next
end
next
edit "License Expired Notification"
set description "Default automation stitch to send a FortiExplorer notification when a license is near expiration."
set trigger "License Expired Notification"
config actions
edit 1
set action "FortiExplorer Notification"
next
end
next
edit "Compromised Host Quarantine"
set description "Default automation stitch to quarantine a high severity compromised host on FortiAPs, FortiSwitches, and FortiClient EMS."
set status disable
set trigger "Compromised Host - High"
config actions
edit 1
set action "Quarantine on FortiSwitch + FortiAP"
next
edit 2
set action "Quarantine FortiClient EMS Endpoint"
next
end
next
edit "Incoming Webhook Quarantine"
set description "Default automation stitch to quarantine a provided MAC address on FortiAPs, FortiSwitches, and FortiClient EMS using an Incoming Webhook."
set status disable
set trigger "Incoming Webhook Call"
config actions
edit 1
set action "Quarantine on FortiSwitch + FortiAP"
next
edit 2
set action "Quarantine FortiClient EMS Endpoint"
next
end
next
edit "Security Rating Notification"
set description "Default automation stitch to send a FortiExplorer notification when a new Security Rating report is available."
set trigger "Security Rating Notification"
config actions
edit 1
set action "FortiExplorer Notification"
next
end
next
end
config system federated-upgrade
set status failed
set failure-reason reboot-failed
set failure-device "FGT61FTK21010507"
set upgrade-id 6
config node-list
edit "FGT61FTK21010507"
set timing immediate
set setup-time 06:28 2023/06/26 UTC
set upgrade-path 7-2-5
next
end
end
config system ike
end
config system ipam
config pools
edit "default-pool"
set subnet 172.31.0.0 255.255.0.0
next
edit "lan-pool"
set subnet 192.168.0.0 255.255.0.0
next
end
config rules
edit "role-lan"
set device "*"
set interface "*"
set role lan
set pool "lan-pool"
set dhcp enable
next
end
end
config system object-tagging
edit "default"
next
end
config switch-controller traffic-policy
edit "quarantine"
set description "Rate control for quarantined traffic"
set guaranteed-bandwidth 163840
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 1
next
edit "sniffer"
set description "Rate control for sniffer mirrored traffic"
set guaranteed-bandwidth 50000
set guaranteed-burst 8192
set maximum-burst 163840
set cos-queue 0
set id 2
next
end
config system settings
end
config system dhcp server
edit 1
set status disable
set dns-service default
set default-gateway 192.167.3.99
set netmask 255.255.255.0
set interface "internal"
config ip-range
edit 1
set start-ip 192.167.1.110
set end-ip 192.167.1.210
next
end
next
edit 2
set ntp-service local
set default-gateway 10.255.1.1
set netmask 255.255.255.0
set interface "fortilink"
config ip-range
edit 1
set start-ip 10.255.1.2
set end-ip 10.255.1.254
next
end
set vci-match enable
set vci-string "FortiSwitch" "FortiExtender"
next
end
config firewall address
edit "none"
set uuid 03a7a254-38b9-51ed-f678-71067b92e503
set subnet 0.0.0.0 255.255.255.255
next
edit "login.microsoftonline.com"
set uuid 03a7bde8-38b9-51ed-8ff9-4197b15c7705
set type fqdn
set fqdn "login.microsoftonline.com"
next
edit "login.microsoft.com"
set uuid 03a7d800-38b9-51ed-0589-25d44cd37fbc
set type fqdn
set fqdn "login.microsoft.com"
next
edit "login.windows.net"
set uuid 03a7ee26-38b9-51ed-d686-13b2782f05c4
set type fqdn
set fqdn "login.windows.net"
next
edit "gmail.com"
set uuid 03a804d8-38b9-51ed-efa3-6dd51efaa625
set type fqdn
set fqdn "gmail.com"
next
edit "wildcard.google.com"
set uuid 03a81acc-38b9-51ed-86e1-bbfdb37ab96d
set type fqdn
set fqdn "*.google.com"
next
edit "wildcard.dropbox.com"
set uuid 03a830fc-38b9-51ed-dcfb-980d9a1c9562
set type fqdn
set fqdn "*.dropbox.com"
next
edit "all"
set uuid 08f294b2-38b9-51ed-0e8d-5a14d9315a0d
next
edit "FIREWALL_AUTH_PORTAL_ADDRESS"
set uuid 08f29f16-38b9-51ed-a96e-ec06d24d4efa
next
edit "FABRIC_DEVICE"
set uuid 08f2a772-38b9-51ed-7804-f38101bb579c
set comment "IPv4 addresses of Fabric Devices."
next
edit "SSLVPN_TUNNEL_ADDR1"
set uuid 08f621cc-38b9-51ed-e319-2b72643f9290
set type iprange
set start-ip 10.212.134.200
set end-ip 10.212.134.210
next
edit "internal"
set uuid 0b8905f8-38b9-51ed-8a29-a7ea0f9a837e
set type interface-subnet
set subnet 192.167.3.99 255.255.255.0
set interface "internal"
next
edit "FCTEMS_ALL_FORTICLOUD_SERVERS"
set uuid fa9a36d4-38d3-51ed-76bd-e627ef4c2faa
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "IT component"
set uuid 84dbeec2-39ac-51ed-ae5c-e4d5ab21bb4b
set subnet 192.167.3.110 255.255.255.255
next
edit "AWS"
set uuid 274960d4-4526-51ed-672e-33b48095cbe5
set type fqdn
set fqdn "aws.amazon.com"
next
edit "AWS1"
set uuid d94fc55c-4526-51ed-d300-786cbfe2e8cf
set type fqdn
set fqdn "amazon.com"
next
edit "AWS2"
set uuid e981a4f4-4526-51ed-a823-3cc05ecfc391
set type fqdn
set fqdn "*.amazonaws.com"
next
edit "GCP"
set uuid f8e92d90-4526-51ed-1ad8-2e1b31834981
set type fqdn
set fqdn "*.googleapis.com"
next
edit "Git"
set uuid 07a43ea6-4527-51ed-5592-a9cd186a20a9
set type fqdn
set fqdn "raw.githubusercontent.com"
next
edit "Anydesk"
set uuid 14fdf31c-4527-51ed-ca8b-fccad4466758
set type fqdn
set fqdn "*.net.anydesk.com"
next
edit "GLPI-Server"
set uuid ec3b0696-6adc-51ed-9823-48de571efbae
set type fqdn
set fqdn "glpi.tahoho.com.tw"
next
edit "EMS_ALL_UNMANAGEABLE_CLIENTS"
set uuid b1e10c76-c477-51ed-ce6b-ba46ad16d0b5
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "EMS_ALL_UNKNOWN_CLIENTS"
set uuid b53326e8-c477-51ed-905f-bf7f2e400d7c
set type dynamic
set sub-type ems-tag
set dirty clean
next
edit "Cloud Scada"
set uuid ba38518c-b0fc-51ee-979a-fb2a235b76da
set type fqdn
set fqdn "scadabroker.myvecid.net"
next
edit "Cloud Scada2"
set uuid c8df7f58-b0fc-51ee-d956-4d51f4df264b
set type fqdn
set fqdn "cloudscada.myvecid.net"
next
edit "gmail smtp"
set uuid 3eb77bea-b0fd-51ee-a317-5c7ccc5d614c
set type fqdn
set fqdn "smtp.gmail.com"
next
edit "time.google.com"
set uuid 6af7282c-b0fd-51ee-13ba-15b448f2696e
set type fqdn
set fqdn "time.google.com"
next
edit "time.windows.com"
set uuid 75ceda24-b0fd-51ee-b21f-716d2b11fcb5
set type fqdn
set fqdn "time.windows.com"
next
edit "tw.ntp.org.cn"
set uuid 834dccfa-b0fd-51ee-cc41-269f9a9aed14
set type fqdn
set fqdn "tw.ntp.org.cn"
next
end
config firewall multicast-address
edit "all"
set start-ip 224.0.0.0
set end-ip 239.255.255.255
next
edit "all_hosts"
set start-ip 224.0.0.1
set end-ip 224.0.0.1
next
edit "all_routers"
set start-ip 224.0.0.2
set end-ip 224.0.0.2
next
edit "Bonjour"
set start-ip 224.0.0.251
set end-ip 224.0.0.251
next
edit "EIGRP"
set start-ip 224.0.0.10
set end-ip 224.0.0.10
next
edit "OSPF"
set start-ip 224.0.0.5
set end-ip 224.0.0.6
next
end
config firewall address6
edit "SSLVPN_TUNNEL_IPv6_ADDR1"
set uuid 08f62c62-38b9-51ed-98a3-9078db841c98
set ip6 fdff:ffff::/120
next
edit "all"
set uuid 03a8894e-38b9-51ed-a6ff-fbb80b749b3b
next
edit "none"
set uuid 03a89c22-38b9-51ed-e3db-5e5c8db4d52d
set ip6 ::/128
next
end
config firewall multicast-address6
edit "all"
set ip6 ff00::/8
next
end
config firewall addrgrp
edit "G Suite"
set uuid 03a84966-38b9-51ed-080b-4a1fcb0e0864
set member "gmail.com" "wildcard.google.com"
next
edit "Microsoft Office 365"
set uuid 03a8661c-38b9-51ed-51a6-530dd5f01e9f
set member "login.microsoftonline.com" "login.microsoft.com" "login.windows.net"
next
end
config firewall wildcard-fqdn custom
edit "adobe"
set uuid 03b789bc-38b9-51ed-89f5-884618d3cad1
set wildcard-fqdn "*.adobe.com"
next
edit "Adobe Login"
set uuid 03b78f66-38b9-51ed-9539-61f56a833805
set wildcard-fqdn "*.adobelogin.com"
next
edit "android"
set uuid 03b794de-38b9-51ed-7d03-92fabf571d4a
set wildcard-fqdn "*.android.com"
next
edit "apple"
set uuid 03b79a4c-38b9-51ed-5e91-9876c6950afb
set wildcard-fqdn "*.apple.com"
next
edit "appstore"
set uuid 03b79fce-38b9-51ed-11fc-5110dd792c8d
set wildcard-fqdn "*.appstore.com"
next
edit "auth.gfx.ms"
set uuid 03b7a514-38b9-51ed-3db7-4e12aaa33e72
set wildcard-fqdn "*.auth.gfx.ms"
next
edit "citrix"
set uuid 03b7aa5a-38b9-51ed-7568-02389bd35854
set wildcard-fqdn "*.citrixonline.com"
next
edit "dropbox.com"
set uuid 03b7afa0-38b9-51ed-3efe-b9057b7cf0ac
set wildcard-fqdn "*.dropbox.com"
next
edit "eease"
set uuid 03b7b52c-38b9-51ed-f383-d7bb857c6e1a
set wildcard-fqdn "*.eease.com"
next
edit "firefox update server"
set uuid 03b7ba7c-38b9-51ed-3d95-bb519ef53c20
set wildcard-fqdn "aus*.mozilla.org"
next
edit "fortinet"
set uuid 03b7bff4-38b9-51ed-83cc-997380eb5054
set wildcard-fqdn "*.fortinet.com"
next
edit "googleapis.com"
set uuid 03b7c558-38b9-51ed-00e4-eee74eddf660
set wildcard-fqdn "*.googleapis.com"
next
edit "google-drive"
set uuid 03b7cab2-38b9-51ed-42f8-fd5e7bdbc7a5
set wildcard-fqdn "*drive.google.com"
next
edit "google-play2"
set uuid 03b7d048-38b9-51ed-f069-b25b2d279b13
set wildcard-fqdn "*.ggpht.com"
next
edit "google-play3"
set uuid 03b7d5ac-38b9-51ed-2e99-9335fa8f2e4e
set wildcard-fqdn "*.books.google.com"
next
edit "Gotomeeting"
set uuid 03b7db06-38b9-51ed-f3c9-76caedfb760d
set wildcard-fqdn "*.gotomeeting.com"
next
edit "icloud"
set uuid 03b7e470-38b9-51ed-b646-5f1a6fbb6c6f
set wildcard-fqdn "*.icloud.com"
next
edit "itunes"
set uuid 03b7ea10-38b9-51ed-1d74-5c7da92ca6ac
set wildcard-fqdn "*itunes.apple.com"
next
edit "microsoft"
set uuid 03b7ef6a-38b9-51ed-3841-fd503a2e3476
set wildcard-fqdn "*.microsoft.com"
next
edit "skype"
set uuid 03b7f4e2-38b9-51ed-5d96-6d3e5432d97c
set wildcard-fqdn "*.messenger.live.com"
next
edit "softwareupdate.vmware.com"
set uuid 03b7fa3c-38b9-51ed-5851-b57c30058730
set wildcard-fqdn "*.softwareupdate.vmware.com"
next
edit "verisign"
set uuid 03b7fff0-38b9-51ed-5a82-880dfdfb9467
set wildcard-fqdn "*.verisign.com"
next
edit "Windows update 2"
set uuid 03b80540-38b9-51ed-e4d5-b5cd7ea47cdf
set wildcard-fqdn "*.windowsupdate.com"
next
edit "live.com"
set uuid 03b80ac2-38b9-51ed-0594-34ea7dfad119
set wildcard-fqdn "*.live.com"
next
edit "google-play"
set uuid 03b81026-38b9-51ed-81f6-deb546f2fd28
set wildcard-fqdn "*play.google.com"
next
edit "update.microsoft.com"
set uuid 03b815da-38b9-51ed-faff-b9bbcb1f2eaf
set wildcard-fqdn "*update.microsoft.com"
next
edit "swscan.apple.com"
set uuid 03b81b34-38b9-51ed-ce09-1ddb68d1fedc
set wildcard-fqdn "*swscan.apple.com"
next
edit "autoupdate.opera.com"
set uuid 03b820a2-38b9-51ed-bca4-7e61beb91f52
set wildcard-fqdn "*autoupdate.opera.com"
next
edit "cdn-apple"
set uuid 03b82610-38b9-51ed-b8c3-69c9b0ed34d5
set wildcard-fqdn "*.cdn-apple.com"
next
edit "mzstatic-apple"
set uuid 03b82bb0-38b9-51ed-8ea4-6d1b8df42600
set wildcard-fqdn "*.mzstatic.com"
next
end
config firewall service category
edit "General"
set comment "General services."
next
edit "Web Access"
set comment "Web access."
next
edit "File Access"
set comment "File access."
next
edit "Email"
set comment "Email services."
next
edit "Network Services"
set comment "Network services."
next
edit "Authentication"
set comment "Authentication service."
next
edit "Remote Access"
set comment "Remote access."
next
edit "Tunneling"
set comment "Tunneling service."
next
edit "VoIP, Messaging & Other Applications"
set comment "VoIP, messaging, and other applications."
next
edit "Web Proxy"
set comment "Explicit web proxy."
next
end
config firewall service custom
edit "DNS"
set category "Network Services"
set tcp-portrange 53
set udp-portrange 53
next
edit "HTTP"
set category "Web Access"
set tcp-portrange 80
next
edit "HTTPS"
set category "Web Access"
set tcp-portrange 443
next
edit "IMAP"
set category "Email"
set tcp-portrange 143
next
edit "IMAPS"
set category "Email"
set tcp-portrange 993
next
edit "LDAP"
set category "Authentication"
set tcp-portrange 389
next
edit "DCE-RPC"
set category "Remote Access"
set tcp-portrange 135
set udp-portrange 135
next
edit "POP3"
set category "Email"
set tcp-portrange 110
next
edit "POP3S"
set category "Email"
set tcp-portrange 995
next
edit "SAMBA"
set category "File Access"
set tcp-portrange 139
next
edit "SMTP"
set category "Email"
set tcp-portrange 25
next
edit "SMTPS"
set category "Email"
set tcp-portrange 465
next
edit "KERBEROS"
set category "Authentication"
set tcp-portrange 88 464
set udp-portrange 88 464
next
edit "LDAP_UDP"
set category "Authentication"
set udp-portrange 389
next
edit "SMB"
set category "File Access"
set tcp-portrange 445
next
edit "FTP"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_GET"
set category "File Access"
set tcp-portrange 21
next
edit "FTP_PUT"
set category "File Access"
set tcp-portrange 21
next
edit "ALL"
set category "General"
set protocol IP
next
edit "ALL_TCP"
set category "General"
set tcp-portrange 1-65535
next
edit "ALL_UDP"
set category "General"
set udp-portrange 1-65535
next
edit "ALL_ICMP"
set category "General"
set protocol ICMP
unset icmptype
next
edit "ALL_ICMP6"
set category "General"
set protocol ICMP6
unset icmptype
next
edit "GRE"
set category "Tunneling"
set protocol IP
set protocol-number 47
next
edit "AH"
set category "Tunneling"
set protocol IP
set protocol-number 51
next
edit "ESP"
set category "Tunneling"
set protocol IP
set protocol-number 50
next
edit "AOL"
set tcp-portrange 5190-5194
next
edit "BGP"
set category "Network Services"
set tcp-portrange 179
next
edit "DHCP"
set category "Network Services"
set udp-portrange 67-68
next
edit "FINGER"
set tcp-portrange 79
next
edit "GOPHER"
set tcp-portrange 70
next
edit "H323"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1720 1503
set udp-portrange 1719
next
edit "IKE"
set category "Tunneling"
set udp-portrange 500 4500
next
edit "Internet-Locator-Service"
set tcp-portrange 389
next
edit "IRC"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 6660-6669
next
edit "L2TP"
set category "Tunneling"
set tcp-portrange 1701
set udp-portrange 1701
next
edit "NetMeeting"
set tcp-portrange 1720
next
edit "NFS"
set category "File Access"
set tcp-portrange 111 2049
set udp-portrange 111 2049
next
edit "NNTP"
set tcp-portrange 119
next
edit "NTP"
set category "Network Services"
set tcp-portrange 123
set udp-portrange 123
next
edit "OSPF"
set category "Network Services"
set protocol IP
set protocol-number 89
next
edit "PC-Anywhere"
set category "Remote Access"
set tcp-portrange 5631
set udp-portrange 5632
next
edit "PING"
set category "Network Services"
set protocol ICMP
set icmptype 8
unset icmpcode
next
edit "TIMESTAMP"
set protocol ICMP
set icmptype 13
unset icmpcode
next
edit "INFO_REQUEST"
set protocol ICMP
set icmptype 15
unset icmpcode
next
edit "INFO_ADDRESS"
set protocol ICMP
set icmptype 17
unset icmpcode
next
edit "ONC-RPC"
set category "Remote Access"
set tcp-portrange 111
set udp-portrange 111
next
edit "PPTP"
set category "Tunneling"
set tcp-portrange 1723
next
edit "QUAKE"
set udp-portrange 26000 27000 27910 27960
next
edit "RAUDIO"
set udp-portrange 7070
next
edit "REXEC"
set tcp-portrange 512
next
edit "RIP"
set category "Network Services"
set udp-portrange 520
next
edit "RLOGIN"
set tcp-portrange 513:512-1023
next
edit "RSH"
set tcp-portrange 514:512-1023
next
edit "SCCP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 2000
next
edit "SIP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 5060
set udp-portrange 5060
next
edit "SIP-MSNmessenger"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1863
next
edit "SNMP"
set category "Network Services"
set tcp-portrange 161-162
set udp-portrange 161-162
next
edit "SSH"
set category "Remote Access"
set tcp-portrange 22
next
edit "SYSLOG"
set category "Network Services"
set udp-portrange 514
next
edit "TALK"
set udp-portrange 517-518
next
edit "TELNET"
set category "Remote Access"
set tcp-portrange 23
next
edit "TFTP"
set category "File Access"
set udp-portrange 69
next
edit "MGCP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 2428
set udp-portrange 2427 2727
next
edit "UUCP"
set tcp-portrange 540
next
edit "VDOLIVE"
set tcp-portrange 7000-7010
next
edit "WAIS"
set tcp-portrange 210
next
edit "WINFRAME"
set tcp-portrange 1494 2598
next
edit "X-WINDOWS"
set category "Remote Access"
set tcp-portrange 6000-6063
next
edit "PING6"
set protocol ICMP6
set icmptype 128
unset icmpcode
next
edit "MS-SQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 1433 1434
next
edit "MYSQL"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 3306
next
edit "RDP"
set category "Remote Access"
set tcp-portrange 3389
next
edit "VNC"
set category "Remote Access"
set tcp-portrange 5900
next
edit "DHCP6"
set category "Network Services"
set udp-portrange 546 547
next
edit "SQUID"
set category "Tunneling"
set tcp-portrange 3128
next
edit "SOCKS"
set category "Tunneling"
set tcp-portrange 1080
set udp-portrange 1080
next
edit "WINS"
set category "Remote Access"
set tcp-portrange 1512
set udp-portrange 1512
next
edit "RADIUS"
set category "Authentication"
set udp-portrange 1812 1813
next
edit "RADIUS-OLD"
set udp-portrange 1645 1646
next
edit "CVSPSERVER"
set tcp-portrange 2401
set udp-portrange 2401
next
edit "AFS3"
set category "File Access"
set tcp-portrange 7000-7009
set udp-portrange 7000-7009
next
edit "TRACEROUTE"
set category "Network Services"
set udp-portrange 33434-33535
next
edit "RTSP"
set category "VoIP, Messaging & Other Applications"
set tcp-portrange 554 7070 8554
set udp-portrange 554
next
edit "MMS"
set tcp-portrange 1755
set udp-portrange 1024-5000
next
edit "NONE"
set tcp-portrange 0
next
edit "webproxy"
set proxy enable
set category "Web Proxy"
set protocol ALL
set tcp-portrange 0-65535:0-65535
next
edit "OPC UA"
set tcp-portrange 49320
next
edit "MQTT"
set tcp-portrange 8883 443
next
end
config firewall service group
edit "Email Access"
set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS"
next
edit "Web Access"
set member "DNS" "HTTP" "HTTPS"
next
edit "Windows AD"
set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB"
next
edit "Exchange Server"
set member "DCE-RPC" "DNS" "HTTPS"
next
end
config vpn certificate ca
end
config vpn certificate local
edit "Fortinet_CA_SSL"
set password ENC 7mR3gX6Mzdsf3Y2FrFz5L0MK/stv+Go9Iw+nOYvH1zJnmW9QbkmOzSkBvJUR6u1LWLAzSMgrO2q8H7tSulZOWYIj60oufkPUW9knq9zago0GlfYjrfl6jvxv9MpNdda51w1KVvpn9BUfL7/e38WekVFtbGUOe7vs9yIbhwzq1rn44T45wpqOw7pMdTXbRT3Pl9TMew==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_CA_Untrusted"
set password ENC D9yzMw4Np3085DKGM8oioI2Onv9pe3DutaTs29fz/B7aNnEF6LRn2wSejBfkYgS+L3vMJjTVUGCpZkuRGIuzPitWuC72h/2c5AC7NTBHmoDKvA8cRAcJWgQTZul/UW+xwoU5Lqq7XVWsRjVOu7u3Ufy/jS9SqTbxpWGyem+ZEQ116P0U2kIz+jjHKXkMWtvjyAUS4A==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL"
set password ENC n03jhZYVKnuy8Rf2MlQuwXaXwD340MKe0i8mBtiN+iKufWQRro+tEe0dx6IpXQ5NQTI/C3IrKgAVZFRXTApkQi5yWqPon1+MwwxtlRCpD8wzwjBxRRMltHN7h61zcaEU4+sCUaYqUYEWQs7SsMMeurqTSJb2NddxNrDc3Xz4RbL1RKYYa68EbUts9eAzWgcw4SQqEw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_GUI_Server"
set password ENC d57m0URTaajhWOBSJVgmba9nitETHWk+/n0BW0Z4F+NpiYJiBcChiMm4oiHuL2SDUf7SwVEM1TuqT2Z5dEEYVDdxJUM27rN2znrbTOL5P/8f61+AAoPhgLyAtttUb8XA9pRz8bxf1cmu5xK5A2OQXd7y1yLvO18lt0RvKFva+Xmz2gSQtxJgJE0VggFmmYCO0w012A==
set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates."
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_RSA1024"
set password ENC LFoPE3ZsqBnDgT/NCnJrrRFNsTP6VbgIddf4Y+PX8UlL1cImE5UC8X7DZwc2V0WLyqdrB2AWghkA3hoM0/2l8kU6HqvuJwhUaYKpJT+30qkaBq1TjEauecUYaeOu96HIDnnkPZELWVYCKOs2k5dE8y3PzAI+FMutvkf7grmBoRv2aebm4yzGMS8o5B2Kx/zTafUtzw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_RSA2048"
set password ENC qQq335++vsENqewdv6BPHjFeiZhSJyBitL92U+n0b3yhtf09RY/h3/PJ1OsTvjIzcN6Ycyg0rslWy1kVYTmF4FX7xfcepe7iY0oBcYcYRowxZdXyxRD9xO77zD4S60hnCJABkuYqv/R+l3Ny8ySeGkBQLC3DjLKT3n8H3FSXXbFFgJXT3jKreCKALWilANVRyuGENA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----
MIID4DCCAsigAwIBAgIIc12eK+qQwYEwDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV
BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx
ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM
EEZHVDYxRlRLMjEwMTA1MDcxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu
ZXQuY29tMB4XDTIyMDkyMDA3NTA0MloXDTI0MTIyMzA3NTA0MlowgZ0xCzAJBgNV
BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx
ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM
EEZHVDYxRlRLMjEwMTA1MDcxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu
ZXQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnghpFmddXDJg
FP9LNLxpJSHmVfduy3SKZ/2X/HZ2DqZKl6r3oG6EGAGiNlMjf/pUJszUkL5NimRz
wXfuAD0y/0SSIjyrZP5X3sNcm4SFV3vp/MV71pdWZooQ7a5wwPZeQIMZNsy4rrOG
J+e7o/aL5RN3NYSiZ5z+22sI5QEw+6tb4wD7vRuvh9miuiYBkXGOoYHeo5Sxbv9q
CMfJaadS47npvkX7hlumd2GpuGKLtr6bCtY4qVVQSLCJvN/mTMOyeE/PpiFLlgZ2
LZdFMRMbKDLEZbWV2NtmZRWlJ2Z26Q1PDQUA94fhMwl+T9/rKJIX8kco6pk0llVA
T6Lw3aqfzQIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMB
MA0GCSqGSIb3DQEBCwUAA4IBAQCDcx21gZryntPuPfPH3iIz+n+NWAw40Z3fX8An
CBbu7u3AB7UMQ3G3fe+FFyHpDqjjM2ABmwQ1LwFNXWi7wk+cpjyKC1p2qnPkBAqr
9oslJZqqR4nD5UBzA1CAdR3hNnddao0BkZVt5rJjFEj6tRgaALgBpmlDx6MJhbHQ
OIgBVOUo9Q2YtbIzCLtTiRsGFr0SbNxtLyzWKiV60A2rJ0F4AgapQrBOpJ3FhuET
gAIxiGUxD7Z9pfI6B3fPvKuOnt+TTnZ/mHXGsmvgU6LyomjikHz3o3hiOGP4g+8w
WG0kqS/qeLzvXNuKFY37TvcpSO2cnxhfa6LDe9iWcWT4EWK9
-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_RSA4096"
set password ENC dwNLHo9nZ5SeWqSkBoT00f0L0EmmWuWghxXfREyS5ivO8ndT0ulm1pPXcZw9939EFEEQIlpAXj44rE1V6DB3BIIX0x427ytZpyLOuv/3dfqkYTRykbMmKKYysn+Q+PkbQlz/D4jAnUYUeK/7VIyiNGxPDPWtzQpSBJ4ehUc0XXNXgIGT1ydAlep54aoDKoz5wUM/nA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIJpDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIsNuBqQjQtH8CAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECIFrBNA5IgWaBIIJUJjEtLwoqMTH
ss9Nt7UuqBMZ9KtlNABfxn6NLYj8aGkZBhCZNPIqzLpuY3BRa85MyTc4tPXFHgR2
byHog4ymOi+sxfmhOK3Ovnr3iVFArVe3xd5EEd+z4UvlI01GNjN1Y7/p/KfV/aIX
kBoBjgrQWKRCyDoBQHh/jrY6w2Tz1dKW76/3kKJOE4OFInhzS7OvpF9/ST/3pv+W
YZ/3AmfN3dg+JUyB5Jazdp32sDrfhIJnZ5NZWTsOif+KXndh+u+74MWEF8sG572N
AaeEUwSttPxlCgWOuY0fQie7FPQnIVr7wApF+Oz77dKxV7+tvSNX5HEQ/KhBYdJu
v9BCGuEAW0w1pPo9Bpxlo+3VMcXBE68tAkGiNh16ty1KzmI+5LDvbmv1HvPYH89Y
gFw7tG/LR3Xh9Hvc8mM2IPj1yL+f5axCYSpl2xuS5v0c/jugCrJhVwPtXVHQreYh
ubTwKasE9D8S12gfYRsgvN64l440b4FLMV6fFb3k2HU2pJkG8TpBiGqiyuPJo5Bu
jqC16vBvyoIctrMB6ZZoUzsLWI8D3XAiRqslVpKS7HEWPnmWQ+cbh0yKzjVqRRVx
LsEqmrxSd6zxz9/CEasVv0OZ6P2+9c7zM2ACYtd561uSqqgODFCtPGq1wq3j30Op
x7OwzyFIz5qwwd1nlauvhOaSEAR/WxdLuP84LkpmPMXcM6/B+/qoBUCxFwB6+Hkp
RKuks4MkzuBy4P1GDnM524MTHai48e9FV7LBj7bjab35461iktOFVPT0gjBM0gsH
/2oVgFeVpeyKdpy6LReKfb/yW3pJ8LO092i8W3bufAQOE+hPWVcFkobR8mF1ZM1g
g4HDE+8A45uNoLcWUjbvJZYkydJ9bppH+d4GPKTp5zRl3M3rro5nGsOhhdCVDQPw
HbLuWWv+djfhK9pxz05CgxbDr/og4vdxml1Qm14vp4zOCKYUb8lYbIdaAnj2ADhv
DYmq0QsRGcGUYRaKvAbwTuR4CnxCBONvVbSZcuBwFgx7pDK7CE3pMFN7BsCYuq4U
cHvrNWOe4QiEveD9TSSDVoYRYEh5Bl3tUMspJJyCEFdgyDHLSffNGll3VFsl7Aoy
mAsh1e+X6s+4dGX4vUZ2duVrIcwGuOJdPNZWJF4d6+nBUaDOf+99VGl7EUnWZMyV
254spgVgTm/5TVeRdiytQ1PbmMTdDDoVySTxs86RMhNEknyVhj5/3W3hu+PYCbM3
dSR1ziBEthQheWG5JjdcRVUQG69fKWIFoyOglhfRlXkLF3nLuuaO5iC1Gj9NUQK1
NYJVxi1NwdCRKxuAgLNEwtY1geM1PJQJKOUPA5+wnIzRjm4qhLP1Fj7X3ZBqX3zi
r8WF81Awg9bEMKvi1/RtK6MbuRjC5mJKQ4BSEG/8rY/jj4IlsTww8P//3FlKnzfo
Y3UkAZ+DdHt1xOhai1PwYhjanChyH2moX+M7uEZeCIo8X3/stERJ58nHaMfcXmL1
Iox7jc3Q/NFh4LrQxo9+cki8VylNl5jgVqgXot02bAf+wxwoRWSr1+52S/wqgiFy
QSFzKIF389gaYfBrnwmkZ/9m9yPvY8WU3gms+YfeufN80idJ5LmZoZVK/tAt6ahL
9tT9wRTFWG3r/pHAbXtXoB3nVMKrRdcdKJ4OOrbCG3N8Xw7mYVVaIlSGnoBaZ9Ji
a0JBbzupAmOfdG87S5F/I7FV8wBcM9sYSX/A7BB5qAg30/DPuRVQVJUrwtro8Xpb
Dlii2BzU/YWaoTtR8XUGVwGoQw95NDagT21vaGXxlfIVjvrRF2MreL+TIl7t6L1r
zxqOIBl3WuwfoRGhf5pcdqD+pCdJQZgt0GX9/8BwWVk2stuD8otpqVNfnFf5wqR2
Hz8R3WmthWxKMMMN5CCG2lVluZNQrmivi5oXaFyMFdaxokyBOTB6rQjlryVzaLyU
x3nSJfbWziIUfcehT7jrK8uApssaazjUgAT/G5zcAF4hgXQyXyEohYhFqVspEd2V
SX59A8zVmiKuqudfJ6c+lgvza5PH/4WDCUvCPXLzyLbjqpcl5Q+qq0gLNDmsZFGN
T+bK1DwYsE5KWEuu9yh7Dldsf16nHTMjmJAro7TxbhhNB6EtGPBOSXoHSPRzi7u4
8bE+xZGlFdcmz/lZWh/VArIpK3ce3X8T3JnNLqPPgpOkiyg/Erq2x5+DlreowzsR
ZnsHM2/A2r1Oua0Y6qrIDPg5apsBZTB2EYlnUWeo7h03I4h9DAJzP6SwUTtKYhnM
/p7I4OLZjGHhv/2DHBUpaIUJBYOc8Vo3DTOaP9WLVdllPHty+eqXp/VO6spfLStE
EOlBwvNIRGt73lp8bukJmmX1cHhVHvh1WKMfgjKTSxSKheMhz6i52W1XGt0U/Vqe
2FlsZfaft2PVHLas55Gng3RivY5+/MQ8ZnTesyugG5vgF34YfS9oRMIlJ64fqHYv
1IhPBeeak1KZyfIJ9J7NrJxvYsS28EdROdMwe1Ts7jT35Uy5/m9ZzHyxHAOYpNNo
tqjbf9e4IINBfFmjAAg2eV+q9RnTeobA7BemuANkiuS+lTrQPlwQLO5YHNPbP5YI
Cu3Y8q47W28+uKUZgCKChjLcRoPiIopimLEMQeuSrtqLL2aVe8sBFPUvwkxKyn6Z
0iwqipGYjkA0hhe99CREsWNLHVN70U+PSCZsHe6cFE5E5XTSdFTNBKHizkhvFY3f
+hbwHuM/VG+pWrxvpxZNRI1P8lfVIjY+cL1Dt3SXlrcbpPM0k5XJY8Vcw8DArYQX
MyI6wF5snfqU7+1VYFOwjCB/Aplnmk5MIj+Q1GyH13Vu1uIAjM6NmEuED3QLTPsd
Bzp8D7srlwhY+0QEMs84nGkbY1T9CE6Vd898UGolBXR7Yn838RaU8Ev0yM8n1nAt
buYy6AgvOmZDDuIZyxRkZ2O62rZee7jAKXvh2ykgWPInt40a8nbbMPwRZcExOvnR
sgcSh4TMRwMjITzoQmsIq7mK19EM7CpT6746L48vUdI9zn44j4SKWzzxdVbjkGjt
WEBKDTH+GuOj9odd9URQ/VeeeYt0oSugtspqipyzB/qKjjFi4E3gMJi19f6/y5sf
0uP2vDaxHD56eFoCHsIBF4FYVVNYyXkh9kurfusjFlUoP6wp39jdrCeP4J2ldKdI
ThDaUL26jg+uEBABXKswBCdqH1z9vPYl
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_DSA1024"
set password ENC sdbeSy6WaEl9cnN6skYZz+mExm5MF6f3HF0BieTL6SZhFT4Vm6/TVzsiHG/p9uFPZxyh7IeEy4/VhRKk6NQsQ/FbfdZUbDmoA/eX/jUQnoOjL7w1aqWfqifhg62FqSK/EF+6tBuPmiK+UEeR33aYH9csKP5vKtMOScT6mlM0E8CBfgbFZkpFWNULUuMwN5dlHvu7Dg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_DSA2048"
set password ENC vhobHQRRXdIJk8Ax662nh+oblx5Ex+thWgF1AKASaos/80j3obSz401RfkEQoqX0k0aBIBs/CjNj1eUncuJFaWdcIb8hf5QdTJu4Zc+hoqjtvpn7Dvd+AalTsFkJ8rl/Htan3m4WW8WZxnifaTgcPWQ5J71JXPha62sBVcGWGuhBaQe/sAFuET88C8C+JWZ7UOTMkw==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----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-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_ECDSA256"
set password ENC VxGRhMKzdgnsdrZwin4mBs6TY4Nvn2dc8ArHz8aaAYrgx5RpiCmUHebZdcU73HJ1yeTX7OzPs5uHDlObrqb6yzJgdY0bLexZCHOvNK/JGE7dHL710MyQQanq5h/NDCH6NG7WvSQ7jbHpuCDKUlamN0adO1uByPgu/DjAPnxh8ii/UKowiDO/4YRbcfU6YbwXHXNAfQ==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAjq4cFglp5oEAICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQISZRLm1xpZJIEgZDPUQJD1VWQm0us
KEJ5yNkYtQIMEDmL2UyDtZRYZ4NwddO50SxzIPKWsX8cKqnT2CiiB27X4WVG8X40
j3GxMcVs7GXyIgvV3c5hZskvfrjU8+wIG0uVHbVmob42OrQb1WenCA1rEBeAxIm3
F5EQ/OpE42Uw2PX2rilxYqBdKdic4z1DsRZvFISa3YaeIWnmjrE=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_ECDSA384"
set password ENC RPscEnwYmej5fECCrFRtBmoxWv9Pxt5cdmVwxCMWzpqjLhkvJzlGgGlhsK8M2Jf6jgXm2VdZGx6I5pF8jGgeF7Y2k0dlVImGOOgDR8iT00cgX+iS0IER+t/1z+2aAYkOVXIAQ+ErgjQFXl/6f56YkDhlRe9CftXCK9cn3fO+SI/77RO5AgrZgGhwPCmWS+w6fHd+hA==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBEzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIqRMYYYcZVakCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECEATgBw2if2jBIHA4NXn9x1i3czt
7YOLxxIbo1RGXxeLc79MCggmjILfVgLGhftAwz/N+HDhNMGFS1NYmNeKeTveFZiR
XJCUcp9nfrZBV1zW1aZVPokJQTQgwo51K0WROxpymPWTrgm4gk9XeV8NF+eQGVCm
eu8pq5w1dMgSS996RPQjrKfirXZBNyeWBvZwlXCWQFCJtQ/hgw1zlL2YoQeirqvU
TZG/4Yu9FUNnZRhhMbF7RGt26gkgftsxGWi4t0rDuv7NGjGhEh7e
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_ECDSA521"
set password ENC gT8uIkVlYeRzmK2KPvbHtSkTppbZlid1yKAvhb2MhQCHnHhtRFub3srY7C5zQnxJLpPs5+u7GRdU972j05OjcQ+rXwCNrdCDbrDo3bmB/+wo0DfK/4yYi6K8Mbbs92hiLN0QVZ+fyXHvGhrFx5ee8LnEUVwLEM0MnxfWW8flveAdnxIYQy9cZFYJ2EhBuAJqvUGtHQ==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIBSzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIfoj7+t0/AMICAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECOO5W6QfjAF4BIH4GLSbfu4tMdPB
55lX68lRAXM0m1KF2+L2KZjPaw+k/Zv/JZYq2mDe3Pt+8c8m6Hu+6VmLzsRKQduk
ZWPJO7rSRQjkbzcUehDmadg/HJQP3DKcVvbwFOtTmumGPUr1E6h/SKwWqk21ANqG
6HtQtw/mrqVyCKrq5MhTLVSQMofJRMxTNgD3vY1rCyAZDPLAzpw27s2DI0oaNgX6
UPPvJePhXcgUgnv9p9vQPrQ8ZnFSbtYGklHVDjC9VjFx3hFCdSqiXMEB4xv2wTRf
U8+l+ASc/MsAKLpPM0iBZG9EtjcsLhrT96mqVUgGAbyX3YmiotzwjClPykOFbms=
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_ED25519"
set password ENC jSleU/xmOvnbO0Mtkc1jd2eY6srI6XxTTj98HJBK2zVxH1ORpiFBUXuncCA2Mv5dYL8RrvjRsudUS4tmlVk07E9X4MOAQBvnD4S1WjrGXjMOKV38JYepTY19VcsFw+yswITRDwPYg5/vEiN+DkAGkjDjJGdd0CV2KmC2vlig+l0T8Q1vEdfF0fFKAzS5I3PXFOstXg==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGKME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAjewcbzgMR1NgICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIIydr/6j4d4MEOImNQsoZqa2Rk0S6
vDKNWsF8eoM7cZwF0H6EgoS8aunvhnG5NPz4RcOU+1GIAni35R8L0EF0BwGG
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "Fortinet_SSL_ED448"
set password ENC OVlQJILDkkvWiqpLx+BIvCU56Ux+PDA4b5emNlY945A04sGIALXnn4VCrcwjLqUC5r/WpJl+PG4iPK1Xy3wSBgHwAhSUx72tJevPWK8cD1rYztAyeDP8Jy7OXBq+lxZvMRuYg9wnYFPSGEKx/ZQPqI+F9K77qcUsqBo8XGCfEl8c9VK3Zx/iLRODtJofluzrGyOR7g==
set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. "
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIGiME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAgGU3N4GCkt8AICCAAw
DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIOmBnGc1M40YEUCkKiDp9oZQ3kORV
obBIfJboNWQHItNShAyzQhhbjQRS0nr1i+q/5p6DZ73VRdQMNSh0+a15b76naAs+
u+vHcKeFwBzD1PO3Tif4xD6viYHI
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set source factory
set last-updated 1663660279
next
edit "wildcard.tahoho.com.tw"
set password ENC y4smce1kF4XsvxrSC5cAHbaRHBmnCrb7zMuVhKqxurPII56nKtEe68Rc9I4Va9YuCvsgTpoMt3ognGNJOAiRafHhexl0WSVxjDGl32faV7yykBxy/ASh81dJ7ZYd5Eo/4Ky1QDmBnx5EiycsRLFMtV6Es2todp8kyiwTv0X1Awm0CedKC0t7r294VjzVVBABNH1Ufw==
set private-key "-----BEGIN ENCRYPTED PRIVATE KEY-----
MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQINczVmcEaLlcCAggA
MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECNNsn09hsYV5BIIEyFHlN2Mh7v7o
GuFE2ofhWNMtYMs2VeGpD00oCetAWA0IOoelFlaCDRNQC6nxVJEAlC+9IVl2us5R
ZBy5008zZEfu0A9KD9K5zmvgJ3jGgtVFhPxYam9MXoia1H8il3/QcmWLT/ieyEVs
F2/Tm0uXW9PMobsXuP2bBHd72a/gd6LtAL+qgabBXj4uPketgPVHPEmTzB6Ln4gi
KrSHNrAoTJvVh2wDIlxx3ep6PFzZVtb70XARoSxrd66JgQfujZL9HqO7aZLBcvLm
GCIpigStgdh2yJb2qU1SzrhkqXUmWRn+T6eCeduq8j2fkxyQzRdvU6AcwExKXj+I
QDpsqDx58/F6esorOus+o3N2Z5bA1UBVNWRew5v3fcSEbINcWRqhDIpGCIfOSQg9
WJSuY+aGt1NvOho1CE3KC7j3a6RoI5CjPoSwx2gabjRAQJDm1nZ05zqBEy2Aq4uk
FdiYCVyUK2vuoKa4MrTOw0naPSdPqshrL/QXIQyq9Sm3xtIGFRZiukbzVUAAQI8I
Qy00muZJol6F62xWe+79xRr4lbQkhZBAXqE9VEZ7/NmefJ5HV2Gi3PBivmYgB87b
BYUmeEq8KgzHnNswpJ76rIh/44YBzvaXOgEAaKniN0zXWBEUT/MgZLSZhxK1cOGe
pGKDIBVVj8BhxWtMD9kKAwj9C8uqzkNxvEzy2oSFasSRvNCq2L3FMCJMsBh0avZB
CuDUE3tMNJfPtA6I2RzTS36weBTmYLKX1a7hzTqg1V4Rqt/BHpfcR9c4FrauXwSO
W9dwfjD7udyOG9v/CquUyrQcOMKNdrXez96ypPfAt6ItzF9kYPLVpREf8CivS/ZD
SDOiJPIURhKZMTxG/T5lEtLI2I0vgW0504a+B9eG/UslkI+uWCQFiRW4vzf6iOHE
Tse7LNVa35Vg1j5RYQpP+1JaNoYMR9rCuEaJOYXjdRfQ7rPsWGXcEyO4/zWwH8iS
t90jUjnPocpi+2AOaMzNB6UE4hju9j/Pr/vjJaO8/kCE0iJgBZV2pk5mIdghsM0E
YmjWKMfRtWuQNSTD+fJGv74oosH9inYiuPB7r5xUAOHwYprj8/G6JUaTXL6qcsoB
1T4Obgu+l9PNVveqt7SMHXyd98l4JomYONxWwOgEldDtZbGMt4czbzIqD1Rau5Gw
xmiGy613NHFIXNG4ECxyNj6UOmB8aWfRIW2sGEjYl+PcSv+D5GXW9N6YT3Yxzbf3
qepASiL7cRMnl+tjTCuH6ppMfmQXCdUQDFHZAi038ECC1ufsy9TzUwDrNqyMrSwn
T2aJo2iNaUy7JycxX+wISUNFBmEj7v9X/qVO8Mm0Fcy1MVtGCicOGrNe/Ko9z4Og
zKVa4cD9viLQNDAkY03cJpXISETeqbZ5q6t357uou3CeYwBZKRuId0VIq0W8Jmnw
TxzhTjKUQMS9YaV8ndCEWJaMGDZgszikSBSaH8UVT+LpQLAvSIP1rR2nzQFWc5Su
G/85e/SoEkO6zyqDLYcKxBUyvVLKENiPqAf77oD654dQjvf5CghBsy7bE9uUO0rs
gL3+PQ7agi23GBfaZF37SZ7rW1/dvvpDL2MyPsmMuWNEx4EoDdGMGWhyI2ljXPZ1
xCJEsfxP+B+nJo1txd6Xxg==
-----END ENCRYPTED PRIVATE KEY-----"
set certificate "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----"
set range global
set last-updated 1663741865
next
end
config webfilter ftgd-local-cat
edit "custom1"
set id 140
next
edit "custom2"
set id 141
next
end
config ips sensor
edit "default"
set comment "Prevent critical attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "sniffer-profile"
set comment "Monitor IPS attacks."
config entries
edit 1
set severity medium high critical
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config entries
edit 1
set severity medium high critical
next
end
next
edit "all_default"
set comment "All predefined signatures with default setting."
config entries
edit 1
next
end
next
edit "all_default_pass"
set comment "All predefined signatures with PASS action."
config entries
edit 1
set action pass
next
end
next
edit "protect_http_server"
set comment "Protect against HTTP server-side vulnerabilities."
config entries
edit 1
set location server
set protocol HTTP
next
end
next
edit "protect_email_server"
set comment "Protect against email server-side vulnerabilities."
config entries
edit 1
set location server
set protocol SMTP POP3 IMAP
next
end
next
edit "protect_client"
set comment "Protect against client-side vulnerabilities."
config entries
edit 1
set location client
next
end
next
edit "high_security"
set comment "Blocks all Critical/High/Medium and some Low severity vulnerabilities"
set block-malicious-url enable
config entries
edit 1
set severity medium high critical
set status enable
set action block
next
edit 2
set severity low
next
end
next
end
config firewall shaper traffic-shaper
edit "high-priority"
set maximum-bandwidth 1048576
set per-policy enable
next
edit "medium-priority"
set maximum-bandwidth 1048576
set priority medium
set per-policy enable
next
edit "low-priority"
set maximum-bandwidth 1048576
set priority low
set per-policy enable
next
edit "guarantee-100kbps"
set guaranteed-bandwidth 100
set maximum-bandwidth 1048576
set per-policy enable
next
edit "shared-1M-pipe"
set maximum-bandwidth 1024
next
end
config firewall proxy-address
edit "IPv4-address"
set uuid 08f2bc30-38b9-51ed-be44-841a08552c22
set type host-regex
set host-regex "^([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\\.([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])){3}$"
next
edit "IPv6-address"
set uuid 08f2c3e2-38b9-51ed-fddb-06a40f6c17da
set type host-regex
set host-regex "^\\[(([0-9a-f]{0,4}:){1,7}[0-9a-f]{1,4})\\]$"
next
end
config web-proxy global
set proxy-fqdn "default.fqdn"
end
config application list
edit "default"
set comment "Monitor all applications."
config entries
edit 1
set action pass
next
end
next
edit "sniffer-profile"
set comment "Monitor all applications."
unset options
config entries
edit 1
set action pass
next
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set deep-app-inspection disable
config entries
edit 1
set action pass
set log disable
next
end
next
edit "block-high-risk"
config entries
edit 1
set category 2 6
next
edit 2
set action pass
next
end
next
end
config dlp data-type
edit "keyword"
set pattern "built-in"
next
edit "regex"
set pattern "built-in"
next
edit "hex"
set pattern "built-in"
next
edit "mip-label"
set pattern "^[[:xdigit:]]{8}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{4}-[[:xdigit:]]{12}$"
set transform "built-in"
next
edit "credit-card"
set pattern "\\b([2-6]{1}\\d{3})[- ]?(\\d{4})[- ]?(\\d{2})[- ]?(\\d{2})[- ]?(\\d{2,4})\\b"
set verify "built-in"
set look-back 20
set transform "\\b\\1[- ]?\\2[- ]?\\3[- ]?\\4[- ]?\\5\\b"
next
edit "ssn-us"
set pattern "\\b(\\d{3})-(\\d{2})-(\\d{4})\\b"
set verify "(?<!-)\\b(?!666|000|9\\d{2})\\d{3}-(?!00)\\d{2}-(?!0{4})\\d{4}\\b(?!-)"
set look-back 12
set transform "\\b\\1-\\2-\\3\\b"
next
end
config dlp filepattern
edit 1
set name "builtin-patterns"
config entries
edit "*.bat"
next
edit "*.com"
next
edit "*.dll"
next
edit "*.doc"
next
edit "*.exe"
next
edit "*.gz"
next
edit "*.hta"
next
edit "*.ppt"
next
edit "*.rar"
next
edit "*.scr"
next
edit "*.tar"
next
edit "*.tgz"
next
edit "*.vb?"
next
edit "*.wps"
next
edit "*.xl?"
next
edit "*.zip"
next
edit "*.pif"
next
edit "*.cpl"
next
end
next
edit 2
set name "all_executables"
config entries
edit "bat"
set filter-type type
set file-type bat
next
edit "exe"
set filter-type type
set file-type exe
next
edit "elf"
set filter-type type
set file-type elf
next
edit "hta"
set filter-type type
set file-type hta
next
end
next
end
config dlp sensitivity
edit "Private"
next
edit "Critical"
next
edit "Warning"
next
end
config dlp profile
edit "default"
set comment "Default profile."
next
edit "sniffer-profile"
set comment "Log a summary of email and web traffic."
set summary-proto smtp pop3 imap http-get http-post
next
edit "Content_Summary"
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Content_Archive"
set full-archive-proto smtp pop3 imap http-get http-post ftp nntp
set summary-proto smtp pop3 imap http-get http-post ftp nntp
next
edit "Large-File"
next
end
config webfilter ips-urlfilter-setting
end
config webfilter ips-urlfilter-setting6
end
config log threat-weight
config web
edit 1
set category 26
set level high
next
edit 2
set category 61
set level high
next
edit 3
set category 86
set level high
next
edit 4
set category 1
set level medium
next
edit 5
set category 3
set level medium
next
edit 6
set category 4
set level medium
next
edit 7
set category 5
set level medium
next
edit 8
set category 6
set level medium
next
edit 9
set category 12
set level medium
next
edit 10
set category 59
set level medium
next
edit 11
set category 62
set level medium
next
edit 12
set category 83
set level medium
next
edit 13
set category 72
next
edit 14
set category 14
next
edit 15
set category 96
set level medium
next
end
config application
edit 1
set category 2
next
edit 2
set category 6
set level medium
next
end
end
config icap profile
edit "default"
config icap-headers
edit 1
set name "X-Authenticated-User"
set content "$user"
next
edit 2
set name "X-Authenticated-Groups"
set content "$local_grp"
next
end
next
end
config user ldap
edit "Azure-LDAP-Secure-Server"
set server "gsvr.tahoho.com.tw"
set server-identity-check disable
set cnid "sAMAccountName"
set dn "dc=tahoho,dc=com,dc=tw"
set type regular
set username "tahoho\\tahotbhq.admin"
set password ENC cGxfbEt0OG5af7uGwyikW7e38D3oGTvnULwH7DTzqnEKw/cehGwlEv582cu44sxt4lJ08G+r1iurOpd1603dsXgxQqg80XALRYluwoMdadGIBNNUjfKuEdRDh+TpvlTwQQegoqtJEwpxoHXO14dZ5iBYb1eqvWcIWKIuciqsZZTMg+hSUvKJuSMLbh6sCrisEOLlFQ==
set secure ldaps
set port 636
next
end
config user fortitoken
edit "FTKMOB2994C61283"
set license "FTMTRIAL0E355AFC"
next
edit "FTKMOB29E391EECF"
set license "FTMTRIAL0E355AFC"
next
end
config user local
edit "guest"
set type password
set passwd ENC ddIrtWauRxVRjs4ZaH0aWjnRuFqOC9wHnQOfMZvE73HGHU+ffFbBf/zGLLGuV5h1RWi/SVnrXZPt/d0CQAVnZrSWmEw6qvD7MYP3qjf6GKYOwMnO+iOVVGD8dVqqme8R9N/t+m5P19vCnEaAzVVwhZK5JmWwYfrndQy2DVmliVvBQHtd8DPyufIpD51DRt5XL8BnGw==
next
edit "CHEN Godel 陳俊良"
set status disable
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "陳俊良[管理]"
set status disable
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "B10013"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
edit "860712.admin"
set type ldap
set ldap-server "Azure-LDAP-Secure-Server"
next
end
config user setting
set auth-cert "wildcard.tahoho.com.tw"
end
config user group
edit "SSO_Guest_Users"
next
edit "Guest-group"
set member "guest"
next
edit "RemoteUserGroup"
set member "Azure-LDAP-Secure-Server"
config match
edit 1
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Install Domain Servers,CN=Microsoft Exchange System Objects,DC=tahoho,DC=com,DC=tw"
next
edit 2
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Access Control Assistance Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 3
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Account Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 4
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 5
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 6
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncBrowse,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 7
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncOperators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 8
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ADSyncPasswordSet,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 9
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Allowed RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 10
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Backup Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 11
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Business Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 12
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cert Publishers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 13
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Certificate Service DCOM Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 14
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=CERTSVC_DCOM_ACCESS,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 15
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cloneable Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 16
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Cryptographic Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 17
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Delegated Setup,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 18
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Denied RODC Password Replication Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 19
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 20
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DHCP Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 21
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Discovery Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 22
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Distributed COM Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 23
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsAdmins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 24
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=DnsUpdateProxy,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 25
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 26
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Computers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 27
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 28
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Guests,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 29
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Domain Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 30
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 31
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Enterprise Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 32
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 33
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_BL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 34
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_CY,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 35
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LT,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 36
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_LZ,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 37
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 38
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_SL,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 39
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_TC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 40
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_WC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 41
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_XD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 42
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_Buyer_YK,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 43
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 44
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_GROUP_RW,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 45
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_public,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 46
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_Manager,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 47
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ERP_TPE_PAC,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 48
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Event Log Readers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 49
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange All Hosted Organizations,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 50
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Domain Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 51
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Enterprise Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 52
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Servers,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 53
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Trusted Subsystem,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 54
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Exchange Windows Permissions,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 55
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=ExchangeLegacyInterop,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 56
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Google 雲端硬碟,DC=tahoho,DC=com,DC=tw"
next
edit 57
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Group Policy Creator Owners,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 58
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Guests,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 59
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Help Desk,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 60
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HelpServicesGroup,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 61
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeTeam,DC=tahoho,DC=com,DC=tw"
next
edit 62
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=HubgradeUsers,DC=tahoho,DC=com,DC=tw"
next
edit 63
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hygiene Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 64
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Hyper-V Administrators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 65
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_IUSRS,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 66
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=IIS_WPG,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 67
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Incoming Forest Trust Builders,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 68
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=MTS Impersonators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 69
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Netmon Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 70
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Network Configuration Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 71
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 72
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Log Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 73
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Performance Monitor Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 74
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 75
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Print Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 76
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Protected Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 77
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Public Folder Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 78
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RAS and IAS Servers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 79
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Endpoint Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 80
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Management Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 81
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=RDS Remote Access Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 82
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Read-only Domain Controllers,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 83
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Recipient Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 84
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Records Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 85
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Desktop Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 86
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Remote Management Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 87
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Replicator,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 88
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Schema Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 89
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 90
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Server Operators,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 91
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Smart Phone,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 92
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SMEX Admin Group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 93
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSFTEUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 94
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005MSSQLUser$TAHOAD$MICROSOFT\\#\\#SSEE,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 95
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServer2005SQLBrowserUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 96
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=SQLServerMSSQLServerADHelperUser$TAHOAD,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 97
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ApiGateway Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 98
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis ASN Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 99
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Centralized Admins,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 100
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHOAD $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 101
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TAHONT $ Acronis Remote Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 102
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_gbl,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 103
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Technical Dep_loc,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 104
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=TelnetClients,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 105
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Terminal Server License Servers,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 106
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=UM Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 107
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Users,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 108
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=vendor_group,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 109
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Veolia Distribution Group,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 110
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=VeoliaSecurityGroup,OU=Veolia,DC=tahoho,DC=com,DC=tw"
next
edit 111
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=View-Only Organization Management,OU=Microsoft Exchange Security Groups,DC=tahoho,DC=com,DC=tw"
next
edit 112
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=Windows Authorization Access Group,CN=Builtin,DC=tahoho,DC=com,DC=tw"
next
edit 113
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WINS Users,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 114
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Administrators,CN=Users,DC=tahoho,DC=com,DC=tw"
next
edit 115
set server-name "Azure-LDAP-Secure-Server"
set group-name "CN=WSUS Reporters,CN=Users,DC=tahoho,DC=com,DC=tw"
next
end
next
end
config vpn ssl web host-check-software
edit "FortiClient-AV"
set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7"
next
edit "FortiClient-FW"
set type fw
set guid "528CB157-D384-4593-AAAA-E42DFF111CED"
next
edit "FortiClient-AV-Vista"
set guid "385618A6-2256-708E-3FB9-7E98B93F91F9"
next
edit "FortiClient-FW-Vista"
set type fw
set guid "006D9983-6839-71D6-14E6-D7AD47ECD682"
next
edit "FortiClient5-AV"
set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7"
next
edit "AVG-Internet-Security-AV"
set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF"
next
edit "AVG-Internet-Security-FW"
set type fw
set guid "8DECF618-9569-4340-B34A-D78D28969B66"
next
edit "AVG-Internet-Security-AV-Vista-Win7"
set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82"
next
edit "AVG-Internet-Security-FW-Vista-Win7"
set type fw
set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9"
next
edit "CA-Anti-Virus"
set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93"
next
edit "CA-Internet-Security-AV"
set guid "6B98D35F-BB76-41C0-876B-A50645ED099A"
next
edit "CA-Internet-Security-FW"
set type fw
set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3"
next
edit "CA-Internet-Security-AV-Vista-Win7"
set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F"
next
edit "CA-Internet-Security-FW-Vista-Win7"
set type fw
set guid "06D680B0-4024-4FAB-E710-E675E50F6324"
next
edit "CA-Personal-Firewall"
set type fw
set guid "14CB4B80-8E52-45EA-905E-67C1267B4160"
next
edit "F-Secure-Internet-Security-AV"
set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15"
next
edit "F-Secure-Internet-Security-FW"
set type fw
set guid "D4747503-0346-49EB-9262-997542F79BF4"
next
edit "F-Secure-Internet-Security-AV-Vista-Win7"
set guid "15414183-282E-D62C-CA37-EF24860A2F17"
next
edit "F-Secure-Internet-Security-FW-Vista-Win7"
set type fw
set guid "2D7AC0A6-6241-D774-E168-461178D9686C"
next
edit "Kaspersky-AV"
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-FW"
set type fw
set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0"
next
edit "Kaspersky-AV-Vista-Win7"
set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE"
next
edit "Kaspersky-FW-Vista-Win7"
set type fw
set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5"
next
edit "McAfee-Internet-Security-Suite-AV"
set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83"
next
edit "McAfee-Internet-Security-Suite-FW"
set type fw
set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8"
next
edit "McAfee-Internet-Security-Suite-AV-Vista-Win7"
set guid "86355677-4064-3EA7-ABB3-1B136EB04637"
next
edit "McAfee-Internet-Security-Suite-FW-Vista-Win7"
set type fw
set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C"
next
edit "McAfee-Virus-Scan-Enterprise"
set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0"
next
edit "Norton-360-2.0-AV"
set guid "A5F1BC7C-EA33-4247-961C-0217208396C4"
next
edit "Norton-360-2.0-FW"
set type fw
set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3"
next
edit "Norton-360-3.0-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-360-3.0-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV"
set guid "E10A9785-9598-4754-B552-92431C1C35F8"
next
edit "Norton-Internet-Security-FW"
set type fw
set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220"
next
edit "Norton-Internet-Security-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Norton-Internet-Security-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Symantec-Endpoint-Protection-AV"
set guid "FB06448E-52B8-493A-90F3-E43226D3305C"
next
edit "Symantec-Endpoint-Protection-FW"
set type fw
set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6"
next
edit "Symantec-Endpoint-Protection-AV-Vista-Win7"
set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855"
next
edit "Symantec-Endpoint-Protection-FW-Vista-Win7"
set type fw
set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E"
next
edit "Panda-Antivirus+Firewall-2008-AV"
set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A"
next
edit "Panda-Antivirus+Firewall-2008-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Panda-Internet-Security-AV"
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2006~2007-FW"
set type fw
set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0"
next
edit "Panda-Internet-Security-2008~2009-FW"
set type fw
set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8"
next
edit "Sophos-Anti-Virus"
set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW"
set type fw
set guid "0786E95E-326A-4524-9691-41EF88FB52EA"
next
edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7"
set guid "479CCF92-4960-B3E0-7373-BF453B467D2C"
next
edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7"
set type fw
set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57"
next
edit "Trend-Micro-AV"
set guid "7D2296BC-32CC-4519-917E-52E652474AF5"
next
edit "Trend-Micro-FW"
set type fw
set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6"
next
edit "Trend-Micro-AV-Vista-Win7"
set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50"
next
edit "Trend-Micro-FW-Vista-Win7"
set type fw
set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B"
next
edit "ZoneAlarm-AV"
set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF"
next
edit "ZoneAlarm-FW"
set type fw
set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B"
next
edit "ZoneAlarm-AV-Vista-Win7"
set guid "D61596DF-D219-341C-49B3-AD30538CBC5B"
next
edit "ZoneAlarm-FW-Vista-Win7"
set type fw
set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20"
next
edit "ESET-Smart-Security-AV"
set guid "19259FAE-8396-A113-46DB-15B0E7DFA289"
next
edit "ESET-Smart-Security-FW"
set type fw
set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2"
next
end
config vpn ssl web portal
edit "E2C-Hubgrade-YongKang-VPN-Portal"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set web-mode enable
set auto-connect enable
set save-password enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set split-tunneling-routing-address "internal"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
config bookmark-group
edit "gui-bookmarks"
config bookmarks
edit "192.167.3.110"
set apptype rdp
set description "godelchen"
set host "192.167.3.110"
set port 3389
set logon-user "godelchen"
set logon-password ENC Avmh/Jg2qs1WdbaGb9br34op7qn+iRKDiEeKtNpJGh4yuNn2hI3yhi8B2Ii9gGSoyMXkdLeqDO5YurciHEH38O2BKBOtzOVUo4CK0usF1BUCbl88p9q+V6ijGxdHfXRv5gDP+At2feCje6f+WhAePkHOqRt5Qx6jZD6LjjlQmvhUfRD4jq6jb2+pKdFRRJJEfPu7hQ==
next
end
next
end
set heading "E2C-Hubgrade-YongKang-VPN-Porta"
set theme onyx
next
edit "web-access"
set web-mode enable
next
edit "tunnel-access"
set tunnel-mode enable
set ipv6-tunnel-mode enable
set ip-pools "SSLVPN_TUNNEL_ADDR1"
set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
next
end
config vpn ssl settings
set servercert "wildcard.tahoho.com.tw"
set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
set source-interface "wan1"
set source-address "all"
set source-address6 "all"
set default-portal "E2C-Hubgrade-YongKang-VPN-Portal"
config authentication-rule
edit 1
set users "CHEN Godel 陳俊良" "陳俊良[管理]"
set portal "E2C-Hubgrade-YongKang-VPN-Portal"
next
end
end
config vpn ssl web user-bookmark
edit "B10013#RemoteUserGroup"
config bookmarks
edit "IT Firewall"
set url "http://192.167.3.99"
next
end
next
end
config voip profile
edit "default"
set comment "Default VoIP profile."
next
edit "strict"
config sip
set malformed-request-line discard
set malformed-header-via discard
set malformed-header-from discard
set malformed-header-to discard
set malformed-header-call-id discard
set malformed-header-cseq discard
set malformed-header-rack discard
set malformed-header-rseq discard
set malformed-header-contact discard
set malformed-header-record-route discard
set malformed-header-route discard
set malformed-header-expires discard
set malformed-header-content-type discard
set malformed-header-content-length discard
set malformed-header-max-forwards discard
set malformed-header-allow discard
set malformed-header-p-asserted-identity discard
set malformed-header-sdp-v discard
set malformed-header-sdp-o discard
set malformed-header-sdp-s discard
set malformed-header-sdp-i discard
set malformed-header-sdp-c discard
set malformed-header-sdp-b discard
set malformed-header-sdp-z discard
set malformed-header-sdp-k discard
set malformed-header-sdp-a discard
set malformed-header-sdp-t discard
set malformed-header-sdp-r discard
set malformed-header-sdp-m discard
end
next
end
config system sdwan
config zone
edit "virtual-wan-link"
next
end
config health-check
edit "Default_DNS"
set system-dns enable
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Office_365"
set server "www.office.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Gmail"
set server "gmail.com"
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 2
next
end
next
edit "Default_AWS"
set server "aws.amazon.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_Google Search"
set server "www.google.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
edit "Default_FortiGuard"
set server "fortiguard.com"
set protocol http
set interval 1000
set probe-timeout 1000
set recoverytime 10
config sla
edit 1
set latency-threshold 250
set jitter-threshold 50
set packetloss-threshold 5
next
end
next
end
end
config vpn ocvpn
end
config dnsfilter profile
edit "default"
set comment "Default dns filtering."
config ftgd-dns
config filters
edit 1
set category 2
next
edit 2
set category 7
next
edit 3
set category 8
next
edit 4
set category 9
next
edit 5
set category 11
next
edit 6
set category 12
next
edit 7
set category 13
next
edit 8
set category 14
next
edit 9
set category 15
next
edit 10
set category 16
next
edit 11
next
edit 12
set category 57
next
edit 13
set category 63
next
edit 14
set category 64
next
edit 15
set category 65
next
edit 16
set category 66
next
edit 17
set category 67
next
edit 18
set category 26
set action block
next
edit 19
set category 61
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
edit 24
set category 96
set action block
next
edit 25
set category 98
set action block
next
edit 26
set category 99
set action block
next
end
end
set block-botnet enable
next
end
config antivirus settings
set machine-learning-detection enable
set grayware enable
end
config antivirus profile
edit "default"
set comment "Scan files and block viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
next
edit "sniffer-profile"
set comment "Scan files and monitor viruses."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
config http
set av-scan block
end
config ftp
set av-scan block
end
config imap
set av-scan block
set executables virus
end
config pop3
set av-scan block
set executables virus
end
config smtp
set av-scan block
set executables virus
end
next
end
config file-filter profile
edit "default"
set comment "File type inspection."
next
edit "sniffer-profile"
set comment "File type inspection."
next
end
config webfilter profile
edit "default"
set comment "Default web filtering."
config ftgd-wf
unset options
config filters
edit 1
set action block
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 13
set action block
next
edit 8
set category 14
set action block
next
edit 9
set category 15
set action block
next
edit 10
set category 16
set action block
next
edit 11
set category 26
set action block
next
edit 12
set category 57
set action block
next
edit 13
set category 61
set action block
next
edit 14
set category 63
set action block
next
edit 15
set category 64
set action block
next
edit 16
set category 65
set action block
next
edit 17
set category 66
set action block
next
edit 18
set category 67
set action block
next
edit 19
set category 83
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
edit 24
set category 96
set action block
next
edit 25
set category 98
set action block
next
edit 26
set category 99
set action block
next
edit 27
set category 1
next
edit 28
set category 3
next
edit 29
set category 4
next
edit 30
set category 5
next
edit 31
set category 6
next
edit 32
set category 12
next
edit 33
set category 59
next
edit 34
set category 62
next
end
end
next
edit "sniffer-profile"
set comment "Monitor web traffic."
config ftgd-wf
config filters
edit 1
next
edit 2
set category 1
next
edit 3
set category 2
next
edit 4
set category 3
next
edit 5
set category 4
next
edit 6
set category 5
next
edit 7
set category 6
next
edit 8
set category 7
next
edit 9
set category 8
next
edit 10
set category 9
next
edit 11
set category 11
next
edit 12
set category 12
next
edit 13
set category 13
next
edit 14
set category 14
next
edit 15
set category 15
next
edit 16
set category 16
next
edit 17
set category 17
next
edit 18
set category 18
next
edit 19
set category 19
next
edit 20
set category 20
next
edit 21
set category 23
next
edit 22
set category 24
next
edit 23
set category 25
next
edit 24
set category 26
next
edit 25
set category 28
next
edit 26
set category 29
next
edit 27
set category 30
next
edit 28
set category 31
next
edit 29
set category 33
next
edit 30
set category 34
next
edit 31
set category 35
next
edit 32
set category 36
next
edit 33
set category 37
next
edit 34
set category 38
next
edit 35
set category 39
next
edit 36
set category 40
next
edit 37
set category 41
next
edit 38
set category 42
next
edit 39
set category 43
next
edit 40
set category 44
next
edit 41
set category 46
next
edit 42
set category 47
next
edit 43
set category 48
next
edit 44
set category 49
next
edit 45
set category 50
next
edit 46
set category 51
next
edit 47
set category 52
next
edit 48
set category 53
next
edit 49
set category 54
next
edit 50
set category 55
next
edit 51
set category 56
next
edit 52
set category 57
next
edit 53
set category 58
next
edit 54
set category 59
next
edit 55
set category 61
next
edit 56
set category 62
next
edit 57
set category 63
next
edit 58
set category 64
next
edit 59
set category 65
next
edit 60
set category 66
next
edit 61
set category 67
next
edit 62
set category 68
next
edit 63
set category 69
next
edit 64
set category 70
next
edit 65
set category 71
next
edit 66
set category 72
next
edit 67
set category 75
next
edit 68
set category 76
next
edit 69
set category 77
next
edit 70
set category 78
next
edit 71
set category 79
next
edit 72
set category 80
next
edit 73
set category 81
next
edit 74
set category 82
next
edit 75
set category 83
next
edit 76
set category 84
next
edit 77
set category 85
next
edit 78
set category 86
next
edit 79
set category 87
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
edit 88
set category 96
next
edit 89
set category 97
next
edit 90
set category 98
next
edit 91
set category 99
next
end
end
next
edit "wifi-default"
set comment "Default configuration for offloading WiFi traffic."
set options block-invalid-url
config ftgd-wf
unset options
config filters
edit 1
set action block
next
edit 2
set category 2
set action block
next
edit 3
set category 7
set action block
next
edit 4
set category 8
set action block
next
edit 5
set category 9
set action block
next
edit 6
set category 11
set action block
next
edit 7
set category 13
set action block
next
edit 8
set category 14
set action block
next
edit 9
set category 15
set action block
next
edit 10
set category 16
set action block
next
edit 11
set category 26
set action block
next
edit 12
set category 57
set action block
next
edit 13
set category 61
set action block
next
edit 14
set category 63
set action block
next
edit 15
set category 64
set action block
next
edit 16
set category 65
set action block
next
edit 17
set category 66
set action block
next
edit 18
set category 67
set action block
next
edit 19
set category 83
set action block
next
edit 20
set category 86
set action block
next
edit 21
set category 88
set action block
next
edit 22
set category 90
set action block
next
edit 23
set category 91
set action block
next
edit 24
set category 96
set action block
next
edit 25
set category 98
set action block
next
edit 26
set category 99
set action block
next
edit 27
set category 1
next
edit 28
set category 3
next
edit 29
set category 4
next
edit 30
set category 5
next
edit 31
set category 6
next
edit 32
set category 12
next
edit 33
set category 59
next
edit 34
set category 62
next
end
end
next
edit "monitor-all"
set comment "Monitor and log all visited URLs, flow-based."
config ftgd-wf
unset options
config filters
edit 1
set category 1
next
edit 2
set category 3
next
edit 3
set category 4
next
edit 4
set category 5
next
edit 5
set category 6
next
edit 6
set category 12
next
edit 7
set category 59
next
edit 8
set category 62
next
edit 9
set category 83
next
edit 10
set category 2
next
edit 11
set category 7
next
edit 12
set category 8
next
edit 13
set category 9
next
edit 14
set category 11
next
edit 15
set category 13
next
edit 16
set category 14
next
edit 17
set category 15
next
edit 18
set category 16
next
edit 19
set category 57
next
edit 20
set category 63
next
edit 21
set category 64
next
edit 22
set category 65
next
edit 23
set category 66
next
edit 24
set category 67
next
edit 25
set category 19
next
edit 26
set category 24
next
edit 27
set category 25
next
edit 28
set category 72
next
edit 29
set category 75
next
edit 30
set category 76
next
edit 31
set category 26
next
edit 32
set category 61
next
edit 33
set category 86
next
edit 34
set category 17
next
edit 35
set category 18
next
edit 36
set category 20
next
edit 37
set category 23
next
edit 38
set category 28
next
edit 39
set category 29
next
edit 40
set category 30
next
edit 41
set category 33
next
edit 42
set category 34
next
edit 43
set category 35
next
edit 44
set category 36
next
edit 45
set category 37
next
edit 46
set category 38
next
edit 47
set category 39
next
edit 48
set category 40
next
edit 49
set category 42
next
edit 50
set category 44
next
edit 51
set category 46
next
edit 52
set category 47
next
edit 53
set category 48
next
edit 54
set category 54
next
edit 55
set category 55
next
edit 56
set category 58
next
edit 57
set category 68
next
edit 58
set category 69
next
edit 59
set category 70
next
edit 60
set category 71
next
edit 61
set category 77
next
edit 62
set category 78
next
edit 63
set category 79
next
edit 64
set category 80
next
edit 65
set category 82
next
edit 66
set category 85
next
edit 67
set category 87
next
edit 68
set category 31
next
edit 69
set category 41
next
edit 70
set category 43
next
edit 71
set category 49
next
edit 72
set category 50
next
edit 73
set category 51
next
edit 74
set category 52
next
edit 75
set category 53
next
edit 76
set category 56
next
edit 77
set category 81
next
edit 78
set category 84
next
edit 79
next
edit 80
set category 88
next
edit 81
set category 89
next
edit 82
set category 90
next
edit 83
set category 91
next
edit 84
set category 92
next
edit 85
set category 93
next
edit 86
set category 94
next
edit 87
set category 95
next
edit 88
set category 96
next
edit 89
set category 97
next
edit 90
set category 98
next
edit 91
set category 99
next
end
end
set log-all-url enable
set web-content-log disable
set web-filter-command-block-log disable
set web-filter-cookie-log disable
set web-url-log disable
set web-invalid-domain-log disable
set web-ftgd-err-log disable
next
end
config webfilter search-engine
edit "google"
set hostname ".*\\.google\\..*"
set url "^\\/((custom|search|images|videosearch|webhp)\\?)"
set query "q="
set safesearch url
set safesearch-str "&safe=active"
next
edit "yahoo"
set hostname ".*\\.yahoo\\..*"
set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)"
set query "p="
set safesearch url
set safesearch-str "&vm=r"
next
edit "bing"
set hostname ".*\\.bing\\..*"
set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?"
set query "q="
set safesearch header
next
edit "yandex"
set hostname "yandex\\..*"
set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?"
set query "text="
set safesearch url
set safesearch-str "&family=yes"
next
edit "youtube"
set hostname ".*youtube.*"
set safesearch header
next
edit "baidu"
set hostname ".*\\.baidu\\.com"
set url "^\\/s?\\?"
set query "wd="
next
edit "baidu2"
set hostname ".*\\.baidu\\.com"
set url "^\\/(ns|q|m|i|v)\\?"
set query "word="
next
edit "baidu3"
set hostname "tieba\\.baidu\\.com"
set url "^\\/f\\?"
set query "kw="
next
edit "vimeo"
set hostname ".*vimeo.*"
set url "^\\/search\\?"
set query "q="
set safesearch header
next
edit "yt-scan-1"
set url "www.youtube.com/user/"
set safesearch yt-scan
next
edit "yt-scan-2"
set url "www.youtube.com/youtubei/v1/browse"
set safesearch yt-scan
next
edit "yt-scan-3"
set url "www.youtube.com/youtubei/v1/player"
set safesearch yt-scan
next
edit "yt-scan-4"
set url "www.youtube.com/youtubei/v1/navigator"
set safesearch yt-scan
next
edit "yt-channel"
set url "www.youtube.com/channel"
set safesearch yt-channel
next
edit "yt-pattern"
set url "youtube.com/channel/"
set safesearch yt-pattern
next
edit "twitter"
set hostname "twitter\\.com"
set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName"
set query "variables="
set safesearch translate
set safesearch-str "regex::%22screen_name%22:%22([A-Za-z0-9_]{4,15})%22::twitter.com/\\1"
next
edit "google-translate-1"
set hostname "translate\\.google\\..*"
set url "^\\/translate"
set query "u="
set safesearch translate
set safesearch-str "regex::(?:\\?|&)u=([^&]+)::\\1"
next
edit "google-translate-2"
set hostname ".*\\.translate\\.goog"
set url "^\\/"
set safesearch translate
set safesearch-str "case::google-translate"
next
end
config emailfilter profile
edit "sniffer-profile"
set comment "Malware and phishing URL monitoring."
config imap
end
config pop3
end
config smtp
end
next
edit "default"
set comment "Malware and phishing URL filtering."
config imap
end
config pop3
end
config smtp
end
next
end
config report layout
edit "default"
set title "FortiGate System Analysis Report"
set style-theme "default-report"
set options include-table-of-content view-chart-as-heading
config page
set paper letter
set page-break-before heading1
config header
config header-item
edit 1
set type image
set style "header-image"
set img-src "fortinet_logo_small.png"
next
end
end
config footer
config footer-item
edit 1
set style "footer-text"
set content "FortiGate ${schedule_type} Security Report - Host Name: ${hostname}"
next
edit 2
set style "footer-pageno"
next
end
end
end
config body-item
edit 101
set type image
set style "report-cover1"
set img-src "fortigate_log.png"
next
edit 103
set style "report-cover2"
set content "FortiGate ${schedule_type} Security Report"
next
edit 105
set style "report-cover3"
set content "Report Date: ${started_time}"
next
edit 107
set style "report-cover3"
set content "Data Range: ${report_data_range} (${hostname})"
next
edit 109
set style "report-cover3"
set content "${vdom}"
next
edit 111
set type image
set style "report-cover4"
set img-src "fortinet_logo_small.png"
next
edit 121
set type misc
set misc-component page-break
next
edit 301
set text-component heading1
set content "Bandwidth and Applications"
next
edit 311
set type chart
set chart "traffic.bandwidth.history_c"
next
edit 321
set type chart
set chart "traffic.sessions.history_c"
next
edit 331
set type chart
set chart "traffic.statistics"
next
edit 411
set type chart
set chart "traffic.bandwidth.apps_c"
next
edit 421
set type chart
set chart "traffic.bandwidth.cats_c"
next
edit 511
set type chart
set chart "traffic.bandwidth.users_c"
next
edit 521
set type chart
set chart "traffic.users.history.hour_c"
next
edit 611
set type chart
set chart "traffic.bandwidth.destinations_tab"
next
edit 1001
set text-component heading1
set content "Web Usage"
next
edit 1011
set type chart
set chart "web.allowed-request.sites_c"
next
edit 1021
set type chart
set chart "web.bandwidth.sites_c"
next
edit 1031
set type chart
set chart "web.blocked-request.sites_c"
next
edit 1041
set type chart
set chart "web.blocked-request.users_c"
next
edit 1051
set type chart
set chart "web.requests.users_c"
next
edit 1061
set type chart
set chart "web.bandwidth.users_c"
next
edit 1071
set type chart
set chart "web.bandwidth.stream-sites_c"
next
edit 1301
set text-component heading1
set content "Emails"
next
edit 1311
set type chart
set chart "email.request.senders_c"
next
edit 1321
set type chart
set chart "email.bandwidth.senders_c"
next
edit 1331
set type chart
set chart "email.request.recipients_c"
next
edit 1341
set type chart
set chart "email.bandwidth.recipients_c"
next
edit 1501
set text-component heading1
set content "Threats"
next
edit 1511
set type chart
set top-n 80
set chart "virus.count.viruses_c"
next
edit 1531
set type chart
set top-n 80
set chart "virus.count.users_c"
next
edit 1541
set type chart
set top-n 80
set chart "virus.count.sources_c"
next
edit 1551
set type chart
set chart "virus.count.history_c"
next
edit 1561
set type chart
set top-n 80
set chart "botnet.count_c"
next
edit 1571
set type chart
set top-n 80
set chart "botnet.count.users_c"
next
edit 1581
set type chart
set top-n 80
set chart "botnet.count.sources_c"
next
edit 1591
set type chart
set chart "botnet.count.history_c"
next
edit 1601
set type chart
set top-n 80
set chart "attack.count.attacks_c"
next
edit 1611
set type chart
set top-n 80
set chart "attack.count.victims_c"
next
edit 1621
set type chart
set top-n 80
set chart "attack.count.source_bar_c"
next
edit 1631
set type chart
set chart "attack.count.blocked_attacks_c"
next
edit 1641
set type chart
set chart "attack.count.severity_c"
next
edit 1651
set type chart
set chart "attack.count.history_c"
next
edit 1701
set text-component heading1
set content "VPN Usage"
next
edit 1711
set type chart
set top-n 80
set chart "vpn.bandwidth.static-tunnels_c"
next
edit 1721
set type chart
set top-n 80
set chart "vpn.bandwidth.dynamic-tunnels_c"
next
edit 1731
set type chart
set top-n 80
set chart "vpn.bandwidth.ssl-tunnel.users_c"
next
edit 1741
set type chart
set top-n 80
set chart "vpn.bandwidth.ssl-web.users_c"
next
edit 1901
set text-component heading1
set content "Admin Login and System Events"
next
edit 1911
set type chart
set top-n 80
set chart "event.login.summary_c"
next
edit 1931
set type chart
set top-n 80
set chart "event.failed.login_c"
next
edit 1961
set type chart
set top-n 80
set chart "event.system.group_events_c"
next
end
next
end
config wanopt settings
set host-id "default-id"
end
config wanopt profile
edit "default"
set comments "Default WANopt profile."
next
end
config log memory setting
set status disable
end
config log disk setting
set status enable
end
config log null-device setting
set status disable
end
config log setting
set local-in-allow enable
set local-in-deny-unicast enable
set local-in-deny-broadcast enable
end
config firewall schedule recurring
edit "always"
set day sunday monday tuesday wednesday thursday friday saturday
next
edit "none"
next
edit "default-darrp-optimize"
set start 01:00
set end 01:30
set day sunday monday tuesday wednesday thursday friday saturday
next
end
config firewall vip
edit "Hubgrade-Port-49320"
set uuid c0f56352-39ac-51ed-1312-d9da0b3bdac9
set extip 61.221.204.100
set mappedip "192.167.3.110"
set extintf "any"
set portforward enable
set extport 49320
set mappedport 49320
next
end
config firewall ssh local-key
edit "Fortinet_SSH_RSA2048"
set password ENC jdOpVJKuJDVijNguMDVfEyIw+JKX5OZFeXSPIwRr15/nciE2CZ34NwlxQbDoIl1FS+Lc5S7zE1x6IZTX/1MHtsmPfmLnPguhUO6bg4MFCaKKWiPRgtZ/rsUmiIIg8EPPkDUuPHUbsKawU9c0oxIuaj9k0u7CPqVgsHn7IoSgnz0Y94LJgZ1mcQkHpfSkmzja5JiU6A==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDjnwLlG7awZE/FfbENJrz6oGpHeXVhOglA0CxfmV0Nba1+beDmpQWI9gtU2fF7ks/QsMD5TBuQ5VP2UpfazTaR69FaFzADz273Rw56CLKnAp3H236cr+14mUIjQMSpoy1AmQMGTvqJng71NyxsUJ9k/BygUWHkdikIRXU4YUDuTsR1C+IfxHNYXmVezjABzMTyWzUZGSJHAXJhtqg2d5lsA7twsHlBNCfBO+9x/OMqATBgdMrkGPmPM7XhrBIfaxW2JoDjyWdCRSWmk813Eavgr8/bCRKM9RUs3wxh3M/u98uMbZZjoss+b4WgSiGKflnQn/2Asd7ZMMzKQ00iL9px"
set source built-in
next
edit "Fortinet_SSH_DSA1024"
set password ENC sxG01XnOLCDze8Bi82gfHGvh7RY8kU7tY/9d18aeKQfQb+/92SyZy4ipRIER0AgTag+2oLrKzgiNRIO+UmHFYGgqhAc0mPd+7vYU3x91EKvhpFkRxSLtHEqdCLBa0A3YXVNDQCpGiVWI5PwUvKZvd4B0FLSeg+vJJpFE90LIb2uz3Ww2RcYEn/deklZorCXfW/BhkQ==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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=
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-dss AAAAB3NzaC1kc3MAAACBANfGX5gNDXfVz+IF4bTIS7t5x34WoXOaYxa15X+5TzbfKrizOV4G4vEZqk9WoKjMhOFdtgJWEarKvu/FU+5apBaSS1oywU3Iu5wlzky4tg4Rn2AG9A4MaiKp9224hciokp4q1G51j6TfpbElo5QFwb9lJLE76JuYwd6MzFryEg5bAAAAFQDi40L7agUqOtSn1OKJgpQoeDHfWQAAAIAkxMBR/pE0j0P6hT6t4EYLKuVpbjwk7dg5tFdqPDYKs+QCANK0LSqvGmd5CEJbwwEVx46eg54K0NLfUVaFrXYn2O6N3PV6/1v1JLEYq2x++vUI6cuTidwcl+Wls+Wa9nMgiMzOjBU56QN9V7M3BZHRsK/SZFrE8H/nc4Q6ky1f+gAAAIBLZU3svqwJ7qUkrkmNUQ6Q6BzRcsUhp3u3KyiZ+hE2TSVCIFgN+9C9RJjf0/wylo0vtsHIiV2GckK/Xsjn8BWx1P8OOps3lDrLz9Z4BVcQ9T4PmG9NC8LGEj+2OEZF1did3nShwVqfDPFo98M7Gl/eGBTD9ij2jYsfOOsMCk/Hsw=="
set source built-in
next
edit "Fortinet_SSH_ECDSA256"
set password ENC dvQjutJPWopNoOjqvOqszvhnP//HouP0B9iZIDpXlIEAogGKrkzQFK5Mot+jh1NQjwJh9L+5D+0/DrKls6FHlM89+8GIFllUHmKaHKQeBf4fy19nSBBI+6BfBswLNk66mOxOqoYKID6vCUunVqrq5MjX0DHXdhSE/uEprJu1wd7bm2E93QQZgkxl12UW62J4AFjt1w==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABDQAiUBEw
SayYbxhmkO9AgnAAAAEAAAAAEAAABoAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz
dHAyNTYAAABBBCgKKgOv0WgSJxsLoioaIc2qxe+bIAT+xR72ASqRJJi5u7beZNkmzPVTnr
xcNpvmgvvafUcOR4oqljsLNTU91cUAAACgA+tIk5UjBSV7i9F5NSpR9RKxoLoiFATzyr6R
nf4H9xH3Su2A9ama1efQyJihMtz8y1FOiKnB7b33TxMjzvKIpRSx8pixinb4YXu4PdU3yT
QR/cs3/mx/QGkGkYHhWvCxu7lRC+4Vipaq1GIo85Ma4u0jj1oe8CRXybIL96GySHLgfWdk
QCtoWZuXBd27cUusr0FM0K1mTLncuVqd2XHyVQ==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBCgKKgOv0WgSJxsLoioaIc2qxe+bIAT+xR72ASqRJJi5u7beZNkmzPVTnrxcNpvmgvvafUcOR4oqljsLNTU91cU="
set source built-in
next
edit "Fortinet_SSH_ECDSA384"
set password ENC caLtL7rK6Pht/q/E5pvYEi7xPKYZvtb0A3tSMMgUQ+50Y1S8JuaYMsnEmjvYh//N3emXnH2cCEIkZslesFg2md1EU1yfsJCY/c6IMuLd2iBIOF//14bO6Ag1vyi9RaZBi7SOuFGGHgv/+QLnp/kRWUKzpA1nxHSzgM5vYllJrH7nELpW+xsGJaIy2arHIOHIIbY2pA==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBDf+OwIuNjNmzUti+RX7PNg/eK2RVeFkeGfHje0diq+1WrAkC5Btxu5SFduxyljymJFNrlxDFGwRIzlfQqFqAfb3fyP4guXuRzlDPxQWRPL6yWXCE2QpGpvhP/LenWR4jg=="
set source built-in
next
edit "Fortinet_SSH_ECDSA521"
set password ENC 81FbltruS7RrMruxbBGXRxEwKqzFPTRjNmZIqGbfw3pq2uxPlTYxRCRh2h1a0CLN7a3WAFvRV+RnQNkKZBPtmyuj55fYMsVkk3uBN3nHmOu9bXduUfeOu/dpLQKixAN5KKrAhJ3+YWiYuvuzXislPFMBx67XC6u5YynFTeY9vhgnx8bkRWAX11SRs+NtaN+yamQJ1Q==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABC4IewY83
1IoH7gHAxdWOL1AAAAEAAAAAEAAACsAAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlz
dHA1MjEAAACFBADbiA+RWG0TqnDaWdatRVOpaEhXRNTx19Bo0AoCaUVnV+k+IYaZiR9Mx3
N7EFC2a+o7BjNQtT+3vpYKobFFHhXfXQDPhGqYIrPalZLWeA0KtAffeB+nFLnlOGNPrJEV
Y7mxFEpmvMKUHzU2vVVMNRmE6oQA7dtBKh5KZ2tXxZEQUYdz8wAAAQDw9X0zPAlEf0Q+NV
ypblWcLSAUkK5LCmslx7vOKyM9HatDaq5LL8GQvdW3+uuD0y48UsqNemT1kiELp7okOpX7
ojpQLEQE64hKovKFZPo/W7Pa0qKgEX4FYz4f2p/PZXQgNdok7V0YapENsRmzMBeD+WnG0Z
Rc6+uU2/9Sxmq8EBWkLulbJ+LV28qO2vWhEb4SmOFKvbI4vfDufFi6aGtcprtGeCBYhU34
kNE/m7xy9a8Eq96gB6yRB0BIEFDma/oihh5K8/s73Gi7D3vFaIY48dWG8geDARaY4pCtSH
JW4jZRQiskmEPlFaChY66ZTJ+BYdCngIvEwN++mANbxiJR
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBADbiA+RWG0TqnDaWdatRVOpaEhXRNTx19Bo0AoCaUVnV+k+IYaZiR9Mx3N7EFC2a+o7BjNQtT+3vpYKobFFHhXfXQDPhGqYIrPalZLWeA0KtAffeB+nFLnlOGNPrJEVY7mxFEpmvMKUHzU2vVVMNRmE6oQA7dtBKh5KZ2tXxZEQUYdz8w=="
set source built-in
next
edit "Fortinet_SSH_ED25519"
set password ENC M8c0ANGsL+MzAjv78L2ZHEPwuBukeSaBzL7YRXfYXX1nYiGyzZZlHkYheeN5TFQR+oOw4+Uhi4wrcjmKiPPejTvK5zeX819KxClrBKTtUoCVS0JdHerStqkh93QzTVDouF3g9kJRQMAqLV4PQ1tptFdzWEekodV8ueyviCGhWErGchqoFTqK1is7H2N6y+VA8F3Rig==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----
b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABDg1zmTBo
P9stIxTdUrRJktAAAAEAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAIKrys1gujDpcBBTh
QXZBhob9/XH+AoDIyNkqdB5GGRPSAAAAkFLGTCX6OE4Z9tdnqbIXksgeasGfqf2JVzSqoP
BIWf1soRCJW/YiQYTkOnOQm8FX74qo3LFh/oX48Dc6s1ibq5bBG7Xuwyr0X7WkNkv5P1Ou
DeQtzaSH0ykGTbkmzcTy7/W8uJpBvJ9lUOAy2fUDiFufcsZXpvaM+s7tuWkPHo/f7nKXPs
jmnVWbfrj0TFz4AA==
-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKrys1gujDpcBBThQXZBhob9/XH+AoDIyNkqdB5GGRPS"
set source built-in
next
end
config firewall ssh local-ca
edit "Fortinet_SSH_CA"
set password ENC vUxl7J4kvqoLAuXd5Z31ZVzuH+6+tcznz2d5Rlty8V/YPRcY9766/PtQ06VujCi55c+y2kfCHkqgk/LRBn4tHfkHyvGrtbY6SVgWkg8v9eN9uGFY5jbGgJW+6oUUblcsDZWB8Uptb4HaEZUHIrAYFPmq1ikx/FADFlgvmE5Lal4BBHj2bMbm4jRK711p5atFJ5grBw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC1spC3xnVye/KMC2Ns4uqnbRRNKT+BeDFv7JQJrFkxlurOuZWIgeLeqFQwOpVv3Crm5ewtnV1sgln2QK2WlwyJ7yukPO1+g8mAxCu/mg9LMZ+luSE4VmPrMBM0DVh+hRxY+VI2eq1EX2m0zHA/mDyafjk26gAZgbpsW+x8RfwoPmFyokmrWIRDotJzEoK//bxgTQ5oPGLWj2fQeUiKOxSRGc2PZpn59Vc57QqVhBqtODw+Vcg70tG7XXQm62xkypddCZmN+KYDI9ksiDkc3bTmwJsJeQx88qavda9sum20bua2OZwU3mrADVtGgJbVw+myVC5fN6o0gbB+dyzEA0bv"
set source built-in
next
edit "Fortinet_SSH_CA_Untrusted"
set password ENC QK3c4MHYS7pooH3Z9pnXK7Vz5lheW+efcK4Pr4v5JSQK02aemkrW+R9O4wsN1ryErWajkYWbdCKtlLUUPqy8pDTrkPiDHS9wjgQ4P/aKWvyMuwqgesq+HavFxDrgvsHIbRouL/mbZa2bWnThQVJHso2KeiqlIMvXaRqRMqFckdqkKLDUkBJRVBwLnq7rP4HB74Qbgw==
set private-key "-----BEGIN OPENSSH PRIVATE KEY-----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-----END OPENSSH PRIVATE KEY-----
"
set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCiMmxdQF2G4+fwb7LKY1qR53n2RDpoyd5rd+7kC3rUo9dcfaiCF7qwZHc8vUUBaBr4D9Yq9kOJR0c+uDqb7XzMzPWTb5lnxUU1QoyP+X5xZevF32ElJgZFAhtmTdlwpPL1QL6GQGGH+LXhrztVdFiAGJ5jxAj4QrrMAeJ5cluv3xsN+SGRz8De7MP2uV05PwlJpNneQ4yd5w9Ss7NCnmA+m9CwcInYelgF8Po5vQlyHxKhekZp6d55eRlGt4Maktbs5/+3ZRaYSsin4PLMWLQez/7v9ILW/WOx1lpNjMVp9VuVyAdr3HbJRUNgeBeqXVwwccrm8GsPwrhqWw08g3xN"
set source built-in
next
end
config firewall ssh setting
set caname "Fortinet_SSH_CA"
set untrusted-caname "Fortinet_SSH_CA_Untrusted"
set hostkey-rsa2048 "Fortinet_SSH_RSA2048"
set hostkey-dsa1024 "Fortinet_SSH_DSA1024"
set hostkey-ecdsa256 "Fortinet_SSH_ECDSA256"
set hostkey-ecdsa384 "Fortinet_SSH_ECDSA384"
set hostkey-ecdsa521 "Fortinet_SSH_ECDSA521"
set hostkey-ed25519 "Fortinet_SSH_ED25519"
end
config firewall profile-protocol-options
edit "default"
set comment "All default services."
config http
set ports 80
unset options
unset post-lang
end
config ftp
set ports 21
set options splice
end
config imap
set ports 143
set options fragmail
end
config mapi
set ports 135
set options fragmail
end
config pop3
set ports 110
set options fragmail
end
config smtp
set ports 25
set options fragmail splice
end
config nntp
set ports 119
set options splice
end
config ssh
unset options
end
config dns
set ports 53
end
config cifs
set ports 445
unset options
end
next
end
config firewall ssl-ssh-profile
edit "deep-inspection"
set comment "Read-only deep inspection profile."
config https
set ports 443
set status deep-inspection
end
config ftps
set ports 990
set status deep-inspection
end
config imaps
set ports 993
set status deep-inspection
end
config pop3s
set ports 995
set status deep-inspection
end
config smtps
set ports 465
set status deep-inspection
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "custom-deep-inspection"
set comment "Customizable deep inspection profile."
config https
set ports 443
set status deep-inspection
end
config ftps
set ports 990
set status deep-inspection
end
config imaps
set ports 993
set status deep-inspection
end
config pop3s
set ports 995
set status deep-inspection
end
config smtps
set ports 465
set status deep-inspection
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
config ssl-exempt
edit 1
set fortiguard-category 31
next
edit 2
set fortiguard-category 33
next
edit 3
set type wildcard-fqdn
set wildcard-fqdn "adobe"
next
edit 4
set type wildcard-fqdn
set wildcard-fqdn "Adobe Login"
next
edit 5
set type wildcard-fqdn
set wildcard-fqdn "android"
next
edit 6
set type wildcard-fqdn
set wildcard-fqdn "apple"
next
edit 7
set type wildcard-fqdn
set wildcard-fqdn "appstore"
next
edit 8
set type wildcard-fqdn
set wildcard-fqdn "auth.gfx.ms"
next
edit 9
set type wildcard-fqdn
set wildcard-fqdn "citrix"
next
edit 10
set type wildcard-fqdn
set wildcard-fqdn "dropbox.com"
next
edit 11
set type wildcard-fqdn
set wildcard-fqdn "eease"
next
edit 12
set type wildcard-fqdn
set wildcard-fqdn "firefox update server"
next
edit 13
set type wildcard-fqdn
set wildcard-fqdn "fortinet"
next
edit 14
set type wildcard-fqdn
set wildcard-fqdn "googleapis.com"
next
edit 15
set type wildcard-fqdn
set wildcard-fqdn "google-drive"
next
edit 16
set type wildcard-fqdn
set wildcard-fqdn "google-play2"
next
edit 17
set type wildcard-fqdn
set wildcard-fqdn "google-play3"
next
edit 18
set type wildcard-fqdn
set wildcard-fqdn "Gotomeeting"
next
edit 19
set type wildcard-fqdn
set wildcard-fqdn "icloud"
next
edit 20
set type wildcard-fqdn
set wildcard-fqdn "itunes"
next
edit 21
set type wildcard-fqdn
set wildcard-fqdn "microsoft"
next
edit 22
set type wildcard-fqdn
set wildcard-fqdn "skype"
next
edit 23
set type wildcard-fqdn
set wildcard-fqdn "softwareupdate.vmware.com"
next
edit 24
set type wildcard-fqdn
set wildcard-fqdn "verisign"
next
edit 25
set type wildcard-fqdn
set wildcard-fqdn "Windows update 2"
next
edit 26
set type wildcard-fqdn
set wildcard-fqdn "live.com"
next
edit 27
set type wildcard-fqdn
set wildcard-fqdn "google-play"
next
edit 28
set type wildcard-fqdn
set wildcard-fqdn "update.microsoft.com"
next
edit 29
set type wildcard-fqdn
set wildcard-fqdn "swscan.apple.com"
next
edit 30
set type wildcard-fqdn
set wildcard-fqdn "autoupdate.opera.com"
next
edit 31
set type wildcard-fqdn
set wildcard-fqdn "cdn-apple"
next
edit 32
set type wildcard-fqdn
set wildcard-fqdn "mzstatic-apple"
next
end
next
edit "no-inspection"
set comment "Read-only profile that does no inspection."
config https
set status disable
end
config ftps
set status disable
end
config imaps
set status disable
end
config pop3s
set status disable
end
config smtps
set status disable
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
next
edit "certificate-inspection"
set comment "Read-only SSL handshake inspection profile."
config https
set ports 443
set status certificate-inspection
end
config ftps
set status disable
end
config imaps
set status disable
end
config pop3s
set status disable
end
config smtps
set status disable
end
config ssh
set ports 22
set status disable
end
config dot
set status disable
end
next
end
config waf profile
edit "default"
config signature
config main-class 100000000
set action block
set severity high
end
config main-class 20000000
end
config main-class 30000000
set status enable
set action block
set severity high
end
config main-class 40000000
end
config main-class 50000000
set status enable
set action block
set severity high
end
config main-class 60000000
end
config main-class 70000000
set status enable
set action block
set severity high
end
config main-class 80000000
set status enable
set severity low
end
config main-class 110000000
set status enable
set severity high
end
config main-class 90000000
set status enable
set action block
set severity high
end
set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002
end
config constraint
config header-length
set status enable
set log enable
set severity low
end
config content-length
set status enable
set log enable
set severity low
end
config param-length
set status enable
set log enable
set severity low
end
config line-length
set status enable
set log enable
set severity low
end
config url-param-length
set status enable
set log enable
set severity low
end
config version
set log enable
end
config method
set action block
set log enable
end
config hostname
set action block
set log enable
end
config malformed
set log enable
end
config max-cookie
set status enable
set log enable
set severity low
end
config max-header-line
set status enable
set log enable
set severity low
end
config max-url-param
set status enable
set log enable
set severity low
end
config max-range-segment
set status enable
set log enable
set severity high
end
end
next
end
config firewall policy
edit 2
set name "UA access"
set uuid 11330216-39ad-51ed-9aba-007080e99cd4
set srcintf "wan1"
set dstintf "internal"
set action accept
set srcaddr "all"
set dstaddr "Hubgrade-Port-49320"
set schedule "always"
set service "OPC UA"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
next
edit 3
set name "E2C"
set uuid 9d558202-4527-51ed-396f-4ecfafbc92be
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "AWS" "AWS1" "AWS2" "GCP" "Git"
set schedule "always"
set service "HTTP" "HTTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 4
set name "DNS"
set uuid c7ca41f8-4527-51ed-d220-89f4d90cc810
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "all"
set schedule "always"
set service "DNS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 5
set name "Anydesk"
set uuid fd2a9dde-4527-51ed-faa1-8d5c223a26ee
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "Anydesk"
set schedule "always"
set service "HTTPS"
set ssl-ssh-profile "certificate-inspection"
set nat enable
next
edit 1
set status disable
set name "Internal-to-WAN1"
set uuid 0b9c8452-38b9-51ed-4a76-e2cfdef4a0d5
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set ssl-ssh-profile "certificate-inspection"
set logtraffic all
set nat enable
next
edit 6
set name "SSL-VPN"
set uuid 0664dba2-460a-51ed-6e76-3709179e8e23
set srcintf "ssl.root"
set dstintf "internal"
set action accept
set srcaddr "SSLVPN_TUNNEL_ADDR1"
set dstaddr "internal"
set schedule "always"
set service "ALL"
set nat enable
set groups "RemoteUserGroup"
next
edit 7
set name "GLPI"
set uuid fdae400a-6adc-51ed-f886-a846111b99d4
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "GLPI-Server"
set schedule "always"
set service "HTTP" "HTTPS"
set nat enable
next
edit 8
set name "E2C MQTT"
set uuid ae04c2ba-585a-51ee-5fa0-11c0dfd956ac
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "Cloud Scada" "Cloud Scada2"
set schedule "always"
set service "MQTT"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set ips-sensor "default"
set application-list "default"
set nat enable
next
edit 9
set name "E2C Gmail Alarm"
set uuid 4c2b6142-b0fd-51ee-6ff2-0d528597e571
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "gmail smtp"
set schedule "always"
set service "SMTPS"
set utm-status enable
set ssl-ssh-profile "certificate-inspection"
set av-profile "default"
set nat enable
next
edit 10
set name "E2C U2484 to NTP Server"
set uuid 915e2d58-b0fd-51ee-3846-2f7fcb59e1e6
set srcintf "internal"
set dstintf "wan1"
set action accept
set srcaddr "IT component"
set dstaddr "time.google.com" "time.windows.com" "tw.ntp.org.cn"
set schedule "always"
set service "NTP"
set nat enable
next
end
config switch-controller security-policy 802-1X
edit "802-1X-policy-default"
set user-group "SSO_Guest_Users"
set mac-auth-bypass disable
set open-auth disable
set eap-passthru enable
set eap-auto-untagged-vlans enable
set guest-vlan disable
set auth-fail-vlan disable
set framevid-apply enable
set radius-timeout-overwrite disable
set authserver-timeout-vlan disable
next
end
config switch-controller security-policy local-access
edit "default"
set mgmt-allowaccess https ping ssh
set internal-allowaccess https ping ssh
next
end
config switch-controller lldp-profile
edit "default"
set med-tlvs inventory-management network-policy location-identification
set auto-isl disable
config med-network-policy
edit "voice"
next
edit "voice-signaling"
next
edit "guest-voice"
next
edit "guest-voice-signaling"
next
edit "softphone-voice"
next
edit "video-conferencing"
next
edit "streaming-video"
next
edit "video-signaling"
next
end
config med-location-service
edit "coordinates"
next
edit "address-civic"
next
edit "elin-number"
next
end
next
edit "default-auto-isl"
next
edit "default-auto-mclag-icl"
set auto-mclag-icl enable
next
end
config switch-controller qos dot1p-map
edit "voice-dot1p"
set priority-0 queue-4
set priority-1 queue-4
set priority-2 queue-3
set priority-3 queue-2
set priority-4 queue-3
set priority-5 queue-1
set priority-6 queue-2
set priority-7 queue-2
next
end
config switch-controller qos ip-dscp-map
edit "voice-dscp"
config map
edit "1"
set cos-queue 1
set value 46
next
edit "2"
set cos-queue 2
set value 24,26,48,56
next
edit "5"
set cos-queue 3
set value 34
next
end
next
end
config switch-controller qos queue-policy
edit "default"
set schedule round-robin
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
next
edit "queue-2"
next
edit "queue-3"
next
edit "queue-4"
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
edit "voice-egress"
set schedule weighted
set rate-by kbps
config cos-queue
edit "queue-0"
next
edit "queue-1"
set weight 0
next
edit "queue-2"
set weight 6
next
edit "queue-3"
set weight 37
next
edit "queue-4"
set weight 12
next
edit "queue-5"
next
edit "queue-6"
next
edit "queue-7"
next
end
next
end
config switch-controller qos qos-policy
edit "default"
next
edit "voice-qos"
set trust-dot1p-map "voice-dot1p"
set trust-ip-dscp-map "voice-dscp"
set queue-policy "voice-egress"
next
end
config switch-controller storm-control-policy
edit "default"
set description "default storm control on all port"
next
edit "auto-config"
set description "storm control policy for fortilink-isl-icl port"
set storm-control-mode disabled
next
end
config switch-controller auto-config policy
edit "pse"
next
edit "default"
next
edit "default-icl"
set poe-status disable
set igmp-flood-report enable
set igmp-flood-traffic enable
next
end
config switch-controller initial-config template
edit "_default"
set vlanid 1
next
edit "quarantine"
set vlanid 4093
set dhcp-server enable
next
edit "rspan"
set vlanid 4092
set dhcp-server enable
next
edit "voice"
set vlanid 4091
next
edit "video"
set vlanid 4090
next
edit "onboarding"
set vlanid 4089
next
edit "nac_segment"
set vlanid 4088
set dhcp-server enable
next
end
config switch-controller switch-profile
edit "default"
next
end
config switch-controller ptp settings
set mode disable
end
config switch-controller ptp policy
edit "default"
set status enable
next
end
config switch-controller remote-log
edit "syslogd"
next
edit "syslogd2"
next
end
config wireless-controller setting
set darrp-optimize-schedules "default-darrp-optimize"
end
config wireless-controller arrp-profile
edit "arrp-default"
next
end
config wireless-controller wids-profile
edit "default"
set comment "Default WIDS profile."
set ap-scan enable
set wireless-bridge enable
set deauth-broadcast enable
set null-ssid-probe-resp enable
set long-duration-attack enable
set invalid-mac-oui enable
set weak-wep-iv enable
set auth-frame-flood enable
set assoc-frame-flood enable
set spoofed-deauth enable
set asleap-attack enable
set eapol-start-flood enable
set eapol-logoff-flood enable
set eapol-succ-flood enable
set eapol-fail-flood enable
set eapol-pre-succ-flood enable
set eapol-pre-fail-flood enable
next
edit "default-wids-apscan-enabled"
set ap-scan enable
next
end
config wireless-controller ble-profile
edit "fortiap-discovery"
set advertising ibeacon eddystone-uid eddystone-url
set ibeacon-uuid "wtp-uuid"
next
end
config router rip
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ripng
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router static
edit 1
set gateway 61.221.204.254
set device "wan1"
next
end
config router ospf
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router ospf6
config redistribute "connected"
end
config redistribute "static"
end
config redistribute "rip"
end
config redistribute "bgp"
end
config redistribute "isis"
end
end
config router bgp
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "static"
end
config redistribute "isis"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "static"
end
config redistribute6 "isis"
end
end
config router isis
config redistribute "connected"
end
config redistribute "rip"
end
config redistribute "ospf"
end
config redistribute "bgp"
end
config redistribute "static"
end
config redistribute6 "connected"
end
config redistribute6 "rip"
end
config redistribute6 "ospf"
end
config redistribute6 "bgp"
end
config redistribute6 "static"
end
end
config router multicast
end
(6-6/6)