#config-version=FGVMK6-7.4.0-FW-build2360-230509:opmode=0:vdom=0:user=admin #conf_file_ver=2805287954802465 #buildno=2360 #global_vdom=1 config system global set alias "FortiGate-VM64-KVM" set hostname "B2" set timezone 80 end config system accprofile edit "prof_admin" set secfabgrp read-write set ftviewgrp read-write set authgrp read-write set sysgrp read-write set netgrp read-write set loggrp read-write set fwgrp read-write set vpngrp read-write set utmgrp read-write set wanoptgrp read-write set wifi read-write next edit "nologout" set secfabgrp read-write set ftviewgrp read-write set authgrp read-write set sysgrp read-write set netgrp read-write set loggrp read-write set fwgrp read-write set vpngrp read-write set utmgrp read-write set wanoptgrp read-write set wifi read-write set admintimeout-override enable set admintimeout 0 next end config system interface edit "port1" set vdom "root" set ip 10.4.0.1 255.255.255.0 set allowaccess ping https ssh http fgfm set type physical set snmp-index 1 set ip-managed-by-fortiipam disable next edit "port2" set vdom "root" set ip 4.4.4.4 255.255.255.0 set allowaccess ping set bfd enable set type physical set snmp-index 2 set ip-managed-by-fortiipam disable next edit "port3" set vdom "root" set ip 14.14.14.14 255.255.255.0 set allowaccess ping set bfd enable set type physical set snmp-index 3 set ip-managed-by-fortiipam disable next edit "port4" set vdom "root" set status down set type physical set snmp-index 4 set ip-managed-by-fortiipam disable next edit "port5" set vdom "root" set ip 192.168.100.23 255.255.255.0 set allowaccess fgfm set type physical set snmp-index 5 next edit "port6" set vdom "root" set ip 192.168.200.23 255.255.255.0 set allowaccess https ssh http set type physical set snmp-index 6 next edit "naf.root" set vdom "root" set type tunnel set src-check disable set snmp-index 7 next edit "l2t.root" set vdom "root" set type tunnel set snmp-index 8 next edit "ssl.root" set vdom "root" set type tunnel set alias "SSL VPN interface" set snmp-index 9 next edit "fortilink" set vdom "root" set fortilink enable set ip 10.255.1.1 255.255.255.0 set allowaccess ping fabric set type aggregate set lldp-reception enable set lldp-transmission enable set snmp-index 10 next edit "HUB1-VPN1" set vdom "root" set type tunnel set snmp-index 112 set interface "port2" next edit "HUB1-VPN2" set vdom "root" set type tunnel set snmp-index 113 set interface "port3" next edit "HUB2-VPN1" set vdom "root" set type tunnel set snmp-index 114 set interface "port2" next edit "HUB2-VPN2" set vdom "root" set type tunnel set snmp-index 115 set interface "port3" next edit "Branch2-Lo" set vdom "root" set ip 172.29.100.2 255.255.255.255 set allowaccess ping set type loopback set snmp-index 116 next end config system custom-language edit "en" set filename "en" next edit "fr" set filename "fr" next edit "sp" set filename "sp" next edit "pg" set filename "pg" next edit "x-sjis" set filename "x-sjis" next edit "big5" set filename "big5" next edit "GB2312" set filename "GB2312" next edit "euc-kr" set filename "euc-kr" next end config system admin edit "admin" set accprofile "super_admin" set vdom "root" config gui-dashboard edit 1 set name "Status" set vdom "root" set permanent enable config widget edit 1 set width 1 set height 1 next edit 2 set type licinfo set x-pos 1 set width 1 set height 1 next edit 3 set type vminfo set x-pos 2 set width 1 set height 1 next edit 4 set type forticloud set x-pos 3 set width 1 set height 1 next edit 5 set type security-fabric set x-pos 4 set width 1 set height 1 next edit 6 set type admins set x-pos 5 set width 1 set height 1 next edit 7 set type cpu-usage set x-pos 6 set width 2 set height 1 next edit 8 set type memory-usage set x-pos 7 set width 2 set height 1 next edit 9 set type sessions set x-pos 8 set width 2 set height 1 next end next edit 2 set name "Security" set vdom "root" config widget edit 1 set type fortiview set width 2 set height 1 set fortiview-type "compromisedHosts" set fortiview-sort-by "verdict" set fortiview-timeframe "hour" set fortiview-visualization "table" next edit 2 set type fortiview set x-pos 1 set width 2 set height 1 set fortiview-type "threats" set fortiview-sort-by "threatLevel" set fortiview-timeframe "hour" set fortiview-visualization "table" next edit 3 set type device-vulnerability set x-pos 2 set width 2 set height 1 next end next edit 3 set name "Network" set vdom "root" config widget edit 1 set type routing set width 2 set height 1 set router-view-type "staticdynamic" next edit 2 set type dhcp set x-pos 1 set width 2 set height 1 next edit 3 set type virtual-wan set x-pos 2 set width 2 set height 1 next edit 4 set type ipsec-vpn set x-pos 3 set width 2 set height 1 next edit 5 set type ssl-vpn set x-pos 4 set width 1 set height 1 next end next edit 4 set name "Assets & Identities" set vdom "root" config widget edit 1 set type device-inventory set width 2 set height 1 next edit 2 set type identities set x-pos 1 set width 2 set height 1 next edit 3 set type firewall-user set x-pos 2 set width 2 set height 1 next edit 4 set type quarantine set x-pos 3 set width 2 set height 1 next edit 5 set type nac-vlans set x-pos 4 set width 2 set height 1 next end next edit 5 set name "WiFi" set vdom "root" config widget edit 1 set type ap-status set width 2 set height 1 next edit 2 set type channel-utilization set x-pos 1 set width 2 set height 1 set wifi-band "both" next edit 3 set type clients-by-ap set x-pos 2 set width 2 set height 1 set wifi-band "both" next edit 4 set type client-signal-strength set x-pos 3 set width 2 set height 1 set wifi-band "both" next edit 5 set type rogue-ap set x-pos 4 set width 2 set height 1 next edit 6 set type historical-clients set x-pos 5 set width 2 set height 1 set wifi-band "both" next edit 7 set type interfering-ssids set x-pos 6 set width 2 set height 1 set wifi-band "both" next edit 8 set type wifi-login-failures set x-pos 7 set width 2 set height 1 next end next edit 6 set name "FortiView Sources" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "source" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 7 set name "FortiView Destinations" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "destination" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 8 set name "FortiView Applications" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "application" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 9 set name "FortiView Web Sites" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "website" set fortiview-sort-by "sessions" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 10 set name "FortiView Policies" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "policy" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 11 set name "FortiView Sessions" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "realtimeSessions" set fortiview-sort-by "bytes" set fortiview-timeframe "realtime" set fortiview-visualization "table" next end next end set gui-vdom-menu-favorites "SD-WAN" "dashboard_3" set gui-ignore-release-overview-version "7.4.0" set password ENC SH2GI9LBGBwwmne3xOLYX3051EAK/T6VwYcCepQmbTsHCVJTUdSdtl8juMiNDc= next end config system sso-admin end config system ha set override disable end config system auto-scale end config system dns set primary 96.45.45.45 set secondary 96.45.46.46 end config system replacemsg-image edit "logo_fnet" next edit "logo_fguard_wf" next edit "logo_v3_fguard_app" next end config system replacemsg mail "partial" end config system replacemsg http "url-block" end config system replacemsg http "urlfilter-err" end config system replacemsg http "infcache-block" end config system replacemsg http "http-contenttypeblock" end config system replacemsg http "https-invalid-cert-block" end config system replacemsg http "https-untrusted-cert-block" end config system replacemsg http "https-blocklisted-cert-block" end config system replacemsg http "switching-protocols-block" end config system replacemsg http "http-antiphish-block" end config system replacemsg http "videofilter-block" end config system replacemsg webproxy "deny" end config system replacemsg webproxy "user-limit" end config system replacemsg webproxy "auth-challenge" end config system replacemsg webproxy "auth-login-fail" end config system replacemsg webproxy "auth-group-info-fail" end config system replacemsg webproxy "http-err" end config system replacemsg webproxy "auth-ip-blackout" end config system replacemsg webproxy "ztna-block" end config system replacemsg ftp "ftp-explicit-banner" end config system replacemsg fortiguard-wf "ftgd-block" end config system replacemsg fortiguard-wf "ftgd-ovrd" end config system replacemsg fortiguard-wf "ftgd-quota" end config system replacemsg fortiguard-wf "ftgd-warning" end config system replacemsg spam "ipblocklist" end config system replacemsg spam "smtp-spam-dnsbl" end config system replacemsg spam "smtp-spam-feip" end config system replacemsg spam "smtp-spam-helo" end config system replacemsg spam "smtp-spam-emailblock-to" end config system replacemsg spam "smtp-spam-emailblock-from" end config system replacemsg spam "smtp-spam-emailblock-subject" end config system replacemsg spam "smtp-spam-mimeheader" end config system replacemsg spam "reversedns" end config system replacemsg spam "smtp-spam-ase" end config system replacemsg spam "submit" end config system replacemsg alertmail "alertmail-virus" end config system replacemsg alertmail "alertmail-block" end config system replacemsg alertmail "alertmail-nids-event" end config system replacemsg alertmail "alertmail-crit-event" end config system replacemsg alertmail "alertmail-disk-full" end config system replacemsg admin "pre_admin-disclaimer-text" end config system replacemsg admin "post_admin-disclaimer-text" end config system replacemsg auth "auth-disclaimer-page-1" end config system replacemsg auth "auth-disclaimer-page-2" end config system replacemsg auth "auth-disclaimer-page-3" end config system replacemsg auth "auth-proxy-reject-page" end config system replacemsg auth "auth-reject-page" end config system replacemsg auth "auth-login-page" end config system replacemsg auth "auth-login-failed-page" end config system replacemsg auth "auth-token-login-page" end config system replacemsg auth "auth-token-login-failed-page" end config system replacemsg auth "auth-success-msg" end config system replacemsg auth "auth-challenge-page" end config system replacemsg auth "auth-keepalive-page" end config system replacemsg auth "auth-portal-page" end config system replacemsg auth "auth-password-page" end config system replacemsg auth "auth-fortitoken-page" end config system replacemsg auth "auth-next-fortitoken-page" end config system replacemsg auth "auth-email-token-page" end config system replacemsg auth "auth-sms-token-page" end config system replacemsg auth "auth-email-harvesting-page" end config system replacemsg auth "auth-email-failed-page" end config system replacemsg auth "auth-cert-passwd-page" end config system replacemsg auth "auth-guest-print-page" end config system replacemsg auth "auth-guest-email-page" end config system replacemsg auth "auth-success-page" end config system replacemsg auth "auth-block-notification-page" end config system replacemsg auth "auth-quarantine-page" end config system replacemsg auth "auth-qtn-reject-page" end config system replacemsg auth "auth-saml-page" end config system replacemsg sslvpn "sslvpn-login" end config system replacemsg sslvpn "sslvpn-header" end config system replacemsg sslvpn "sslvpn-limit" end config system replacemsg sslvpn "hostcheck-error" end config system replacemsg sslvpn "sslvpn-provision-user" end config system replacemsg sslvpn "sslvpn-provision-user-sms" end config system replacemsg nac-quar "nac-quar-virus" end config system replacemsg nac-quar "nac-quar-dos" end config system replacemsg nac-quar "nac-quar-ips" end config system replacemsg nac-quar "nac-quar-dlp" end config system replacemsg nac-quar "nac-quar-admin" end config system replacemsg nac-quar "nac-quar-app" end config system replacemsg traffic-quota "per-ip-shaper-block" end config system replacemsg utm "virus-html" end config system replacemsg utm "client-virus-html" end config system replacemsg utm "virus-text" end config system replacemsg utm "dlp-html" end config system replacemsg utm "dlp-text" end config system replacemsg utm "appblk-html" end config system replacemsg utm "ipsblk-html" end config system replacemsg utm "ipsfail-html" end config system replacemsg utm "exe-text" end config system replacemsg utm "waf-html" end config system replacemsg utm "outbreak-prevention-html" end config system replacemsg utm "outbreak-prevention-text" end config system replacemsg utm "external-blocklist-html" end config system replacemsg utm "external-blocklist-text" end config system replacemsg utm "ems-threat-feed-html" end config system replacemsg utm "ems-threat-feed-text" end config system replacemsg utm "file-filter-html" end config system replacemsg utm "file-filter-text" end config system replacemsg utm "file-size-text" end config system replacemsg utm "transfer-size-text" end config system replacemsg utm "internal-error-text" end config system replacemsg utm "archive-block-html" end config system replacemsg utm "archive-block-text" end config system replacemsg utm "file-av-fail-text" end config system replacemsg utm "transfer-av-fail-text" end config system replacemsg utm "banned-word-html" end config system replacemsg utm "banned-word-text" end config system replacemsg utm "block-html" end config system replacemsg utm "block-text" end config system replacemsg utm "decompress-limit-text" end config system replacemsg utm "dlp-subject-text" end config system replacemsg utm "file-size-html" end config system replacemsg utm "client-file-size-html" end config system replacemsg utm "inline-scan-timeout-html" end config system replacemsg utm "inline-scan-timeout-text" end config system replacemsg utm "inline-scan-error-html" end config system replacemsg utm "inline-scan-error-text" end config system replacemsg utm "icap-block-text" end config system replacemsg utm "icap-error-text" end config system replacemsg utm "icap-http-error" end config system replacemsg icap "icap-req-resp" end config system replacemsg automation "automation-email" end config system snmp sysinfo end config system central-management set type fortimanager set serial-number "FMG-VMTM23016697" set fmg "::ffff:192.168.100.99" end config firewall internet-service-name edit "Google-Other" set internet-service-id 65536 next edit "Google-Web" set internet-service-id 65537 next edit "Google-ICMP" set internet-service-id 65538 next edit "Google-DNS" set internet-service-id 65539 next edit "Google-Outbound_Email" set internet-service-id 65540 next edit "Google-SSH" set internet-service-id 65542 next edit "Google-FTP" set internet-service-id 65543 next edit "Google-NTP" set internet-service-id 65544 next edit "Google-Inbound_Email" set internet-service-id 65545 next edit "Google-LDAP" set internet-service-id 65550 next edit "Google-NetBIOS.Session.Service" set internet-service-id 65551 next edit "Google-RTMP" set internet-service-id 65552 next edit "Google-NetBIOS.Name.Service" set internet-service-id 65560 next edit "Google-Google.Cloud" set internet-service-id 65641 next edit "Google-Google.Bot" set internet-service-id 65643 next edit "Google-Gmail" set internet-service-id 65646 next edit "Meta-Other" set internet-service-id 131072 next edit "Meta-Web" set internet-service-id 131073 next edit "Meta-ICMP" set internet-service-id 131074 next edit "Meta-DNS" set internet-service-id 131075 next edit "Meta-Outbound_Email" set internet-service-id 131076 next edit "Meta-SSH" set internet-service-id 131078 next edit "Meta-FTP" set internet-service-id 131079 next edit "Meta-NTP" set internet-service-id 131080 next edit "Meta-Inbound_Email" set internet-service-id 131081 next edit "Meta-LDAP" set internet-service-id 131086 next edit "Meta-NetBIOS.Session.Service" set internet-service-id 131087 next edit "Meta-RTMP" set internet-service-id 131088 next edit "Meta-NetBIOS.Name.Service" set internet-service-id 131096 next edit "Meta-Whatsapp" set internet-service-id 131184 next edit "Meta-Instagram" set internet-service-id 131189 next edit "Apple-Other" set internet-service-id 196608 next edit "Apple-Web" set internet-service-id 196609 next edit "Apple-ICMP" set internet-service-id 196610 next edit "Apple-DNS" set internet-service-id 196611 next edit "Apple-Outbound_Email" set internet-service-id 196612 next edit "Apple-SSH" set internet-service-id 196614 next edit "Apple-FTP" set internet-service-id 196615 next edit "Apple-NTP" set internet-service-id 196616 next edit "Apple-Inbound_Email" set internet-service-id 196617 next edit "Apple-LDAP" set internet-service-id 196622 next edit "Apple-NetBIOS.Session.Service" set internet-service-id 196623 next edit "Apple-RTMP" set internet-service-id 196624 next edit "Apple-NetBIOS.Name.Service" set internet-service-id 196632 next edit "Apple-App.Store" set internet-service-id 196723 next edit "Apple-APNs" set internet-service-id 196747 next edit "Yahoo-Other" set internet-service-id 262144 next edit "Yahoo-Web" set internet-service-id 262145 next edit "Yahoo-ICMP" set internet-service-id 262146 next edit "Yahoo-DNS" set internet-service-id 262147 next edit "Yahoo-Outbound_Email" set internet-service-id 262148 next edit "Yahoo-SSH" set internet-service-id 262150 next edit "Yahoo-FTP" set internet-service-id 262151 next edit "Yahoo-NTP" set internet-service-id 262152 next edit "Yahoo-Inbound_Email" set internet-service-id 262153 next edit "Yahoo-LDAP" set internet-service-id 262158 next edit "Yahoo-NetBIOS.Session.Service" set internet-service-id 262159 next edit "Yahoo-RTMP" set internet-service-id 262160 next edit "Yahoo-NetBIOS.Name.Service" set internet-service-id 262168 next edit "Microsoft-Other" set internet-service-id 327680 next edit "Microsoft-Web" set internet-service-id 327681 next edit "Microsoft-ICMP" set internet-service-id 327682 next edit "Microsoft-DNS" set internet-service-id 327683 next edit "Microsoft-Outbound_Email" set internet-service-id 327684 next edit "Microsoft-SSH" set internet-service-id 327686 next edit "Microsoft-FTP" set internet-service-id 327687 next edit "Microsoft-NTP" set internet-service-id 327688 next edit "Microsoft-Inbound_Email" set internet-service-id 327689 next edit "Microsoft-LDAP" set internet-service-id 327694 next edit "Microsoft-NetBIOS.Session.Service" set internet-service-id 327695 next edit "Microsoft-RTMP" set internet-service-id 327696 next edit "Microsoft-NetBIOS.Name.Service" set internet-service-id 327704 next edit "Microsoft-Skype_Teams" set internet-service-id 327781 next edit "Microsoft-Office365" set internet-service-id 327782 next edit "Microsoft-Azure" set internet-service-id 327786 next edit "Microsoft-Bing.Bot" set internet-service-id 327788 next edit "Microsoft-Outlook" set internet-service-id 327791 next edit "Microsoft-Microsoft.Update" set internet-service-id 327793 next edit "Microsoft-Dynamics" set internet-service-id 327837 next edit "Microsoft-WNS" set internet-service-id 327839 next edit "Microsoft-Office365.Published" set internet-service-id 327880 next edit "Microsoft-Intune" set internet-service-id 327886 next edit "Microsoft-Office365.Published.Optimize" set internet-service-id 327902 next edit "Microsoft-Office365.Published.Allow" set internet-service-id 327903 next edit "Microsoft-Office365.Published.USGOV" set internet-service-id 327917 next edit "Microsoft-Azure.Monitor" set internet-service-id 327958 next edit "Microsoft-Azure.SQL" set internet-service-id 327959 next edit "Microsoft-Azure.AD" set internet-service-id 327960 next edit "Microsoft-Azure.Data.Factory" set internet-service-id 327961 next edit "Microsoft-Azure.Virtual.Desktop" set internet-service-id 327962 next edit "Microsoft-Azure.Power.BI" set internet-service-id 327963 next edit "Amazon-Other" set internet-service-id 393216 next edit "Amazon-Web" set internet-service-id 393217 next edit "Amazon-ICMP" set internet-service-id 393218 next edit "Amazon-DNS" set internet-service-id 393219 next edit "Amazon-Outbound_Email" set internet-service-id 393220 next edit "Amazon-SSH" set internet-service-id 393222 next edit "Amazon-FTP" set internet-service-id 393223 next edit "Amazon-NTP" set internet-service-id 393224 next edit "Amazon-Inbound_Email" set internet-service-id 393225 next edit "Amazon-LDAP" set internet-service-id 393230 next edit "Amazon-NetBIOS.Session.Service" set internet-service-id 393231 next edit "Amazon-RTMP" set internet-service-id 393232 next edit "Amazon-NetBIOS.Name.Service" set internet-service-id 393240 next edit "Amazon-AWS" set internet-service-id 393320 next edit "Amazon-AWS.WorkSpaces.Gateway" set internet-service-id 393403 next edit "Amazon-Twitch" set internet-service-id 393446 next edit "Amazon-AWS.GovCloud.US" set internet-service-id 393452 next edit "Amazon-AWS.EBS" set internet-service-id 393470 next edit "Amazon-AWS.Cloud9" set internet-service-id 393471 next edit "Amazon-AWS.DynamoDB" set internet-service-id 393472 next edit "Amazon-AWS.Route53" set internet-service-id 393473 next edit "Amazon-AWS.S3" set internet-service-id 393474 next edit "Amazon-AWS.Kinesis.Video.Streams" set internet-service-id 393475 next edit "Amazon-AWS.Global.Accelerator" set internet-service-id 393476 next edit "Amazon-AWS.EC2" set internet-service-id 393477 next edit "Amazon-AWS.API.Gateway" set internet-service-id 393478 next edit "Amazon-AWS.Chime.Voice.Connector" set internet-service-id 393479 next edit "Amazon-AWS.Connect" set internet-service-id 393480 next edit "Amazon-AWS.CloudFront" set internet-service-id 393481 next edit "Amazon-AWS.CodeBuild" set internet-service-id 393482 next edit "Amazon-AWS.Chime.Meetings" set internet-service-id 393483 next edit "Amazon-AWS.AppFlow" set internet-service-id 393484 next edit "Amazon-Amazon.SES" set internet-service-id 393493 next edit "eBay-Other" set internet-service-id 458752 next edit "eBay-Web" set internet-service-id 458753 next edit "eBay-ICMP" set internet-service-id 458754 next edit "eBay-DNS" set internet-service-id 458755 next edit "eBay-Outbound_Email" set internet-service-id 458756 next edit "eBay-SSH" set internet-service-id 458758 next edit "eBay-FTP" set internet-service-id 458759 next edit "eBay-NTP" set internet-service-id 458760 next edit "eBay-Inbound_Email" set internet-service-id 458761 next edit "eBay-LDAP" set internet-service-id 458766 next edit "eBay-NetBIOS.Session.Service" set internet-service-id 458767 next edit "eBay-RTMP" set internet-service-id 458768 next edit "eBay-NetBIOS.Name.Service" set internet-service-id 458776 next edit "PayPal-Other" set internet-service-id 524288 next edit "PayPal-Web" set internet-service-id 524289 next edit "PayPal-ICMP" set internet-service-id 524290 next edit "PayPal-DNS" set internet-service-id 524291 next edit "PayPal-Outbound_Email" set internet-service-id 524292 next edit "PayPal-SSH" set internet-service-id 524294 next edit "PayPal-FTP" set internet-service-id 524295 next edit "PayPal-NTP" set internet-service-id 524296 next edit "PayPal-Inbound_Email" set internet-service-id 524297 next edit "PayPal-LDAP" set internet-service-id 524302 next edit "PayPal-NetBIOS.Session.Service" set internet-service-id 524303 next edit "PayPal-RTMP" set internet-service-id 524304 next edit "PayPal-NetBIOS.Name.Service" set internet-service-id 524312 next edit "Box-Other" set internet-service-id 589824 next edit "Box-Web" set internet-service-id 589825 next edit "Box-ICMP" set internet-service-id 589826 next edit "Box-DNS" set internet-service-id 589827 next edit "Box-Outbound_Email" set internet-service-id 589828 next edit "Box-SSH" set internet-service-id 589830 next edit "Box-FTP" set internet-service-id 589831 next edit "Box-NTP" set internet-service-id 589832 next edit "Box-Inbound_Email" set internet-service-id 589833 next edit "Box-LDAP" set internet-service-id 589838 next edit "Box-NetBIOS.Session.Service" set internet-service-id 589839 next edit "Box-RTMP" set internet-service-id 589840 next edit "Box-NetBIOS.Name.Service" set internet-service-id 589848 next edit "Salesforce-Other" set internet-service-id 655360 next edit "Salesforce-Web" set internet-service-id 655361 next edit "Salesforce-ICMP" set internet-service-id 655362 next edit "Salesforce-DNS" set internet-service-id 655363 next edit "Salesforce-Outbound_Email" set internet-service-id 655364 next edit "Salesforce-SSH" set internet-service-id 655366 next edit "Salesforce-FTP" set internet-service-id 655367 next edit "Salesforce-NTP" set internet-service-id 655368 next edit "Salesforce-Inbound_Email" set internet-service-id 655369 next edit "Salesforce-LDAP" set internet-service-id 655374 next edit "Salesforce-NetBIOS.Session.Service" set internet-service-id 655375 next edit "Salesforce-RTMP" set internet-service-id 655376 next edit "Salesforce-NetBIOS.Name.Service" set internet-service-id 655384 next edit "Salesforce-Email.Relay" set internet-service-id 655530 next edit "Dropbox-Other" set internet-service-id 720896 next edit "Dropbox-Web" set internet-service-id 720897 next edit "Dropbox-ICMP" set internet-service-id 720898 next edit "Dropbox-DNS" set internet-service-id 720899 next edit "Dropbox-Outbound_Email" set internet-service-id 720900 next edit "Dropbox-SSH" set internet-service-id 720902 next edit "Dropbox-FTP" set internet-service-id 720903 next edit "Dropbox-NTP" set internet-service-id 720904 next edit "Dropbox-Inbound_Email" set internet-service-id 720905 next edit "Dropbox-LDAP" set internet-service-id 720910 next edit "Dropbox-NetBIOS.Session.Service" set internet-service-id 720911 next edit "Dropbox-RTMP" set internet-service-id 720912 next edit "Dropbox-NetBIOS.Name.Service" set internet-service-id 720920 next edit "Netflix-Other" set internet-service-id 786432 next edit "Netflix-Web" set internet-service-id 786433 next edit "Netflix-ICMP" set internet-service-id 786434 next edit "Netflix-DNS" set internet-service-id 786435 next edit "Netflix-Outbound_Email" set internet-service-id 786436 next edit "Netflix-SSH" set internet-service-id 786438 next edit "Netflix-FTP" set internet-service-id 786439 next edit "Netflix-NTP" set internet-service-id 786440 next edit "Netflix-Inbound_Email" set internet-service-id 786441 next edit "Netflix-LDAP" set internet-service-id 786446 next edit "Netflix-NetBIOS.Session.Service" set internet-service-id 786447 next edit "Netflix-RTMP" set internet-service-id 786448 next edit "Netflix-NetBIOS.Name.Service" set internet-service-id 786456 next edit "LinkedIn-Other" set internet-service-id 851968 next edit "LinkedIn-Web" set internet-service-id 851969 next edit "LinkedIn-ICMP" set internet-service-id 851970 next edit "LinkedIn-DNS" set internet-service-id 851971 next edit "LinkedIn-Outbound_Email" set internet-service-id 851972 next edit "LinkedIn-SSH" set internet-service-id 851974 next edit "LinkedIn-FTP" set internet-service-id 851975 next edit "LinkedIn-NTP" set internet-service-id 851976 next edit "LinkedIn-Inbound_Email" set internet-service-id 851977 next edit "LinkedIn-LDAP" set internet-service-id 851982 next edit "LinkedIn-NetBIOS.Session.Service" set internet-service-id 851983 next edit "LinkedIn-RTMP" set internet-service-id 851984 next edit "LinkedIn-NetBIOS.Name.Service" set internet-service-id 851992 next edit "Adobe-Other" set internet-service-id 917504 next edit "Adobe-Web" set internet-service-id 917505 next edit "Adobe-ICMP" set internet-service-id 917506 next edit "Adobe-DNS" set internet-service-id 917507 next edit "Adobe-Outbound_Email" set internet-service-id 917508 next edit "Adobe-SSH" set internet-service-id 917510 next edit "Adobe-FTP" set internet-service-id 917511 next edit "Adobe-NTP" set internet-service-id 917512 next edit "Adobe-Inbound_Email" set internet-service-id 917513 next edit "Adobe-LDAP" set internet-service-id 917518 next edit "Adobe-NetBIOS.Session.Service" set internet-service-id 917519 next edit "Adobe-RTMP" set internet-service-id 917520 next edit "Adobe-NetBIOS.Name.Service" set internet-service-id 917528 next edit "Adobe-Adobe.Experience.Cloud" set internet-service-id 917640 next edit "Adobe-Adobe.Sign" set internet-service-id 917776 next edit "Oracle-Other" set internet-service-id 983040 next edit "Oracle-Web" set internet-service-id 983041 next edit "Oracle-ICMP" set internet-service-id 983042 next edit "Oracle-DNS" set internet-service-id 983043 next edit "Oracle-Outbound_Email" set internet-service-id 983044 next edit "Oracle-SSH" set internet-service-id 983046 next edit "Oracle-FTP" set internet-service-id 983047 next edit "Oracle-NTP" set internet-service-id 983048 next edit "Oracle-Inbound_Email" set internet-service-id 983049 next edit "Oracle-LDAP" set internet-service-id 983054 next edit "Oracle-NetBIOS.Session.Service" set internet-service-id 983055 next edit "Oracle-RTMP" set internet-service-id 983056 next edit "Oracle-NetBIOS.Name.Service" set internet-service-id 983064 next edit "Oracle-Oracle.Cloud" set internet-service-id 983171 next edit "Hulu-Other" set internet-service-id 1048576 next edit "Hulu-Web" set internet-service-id 1048577 next edit "Hulu-ICMP" set internet-service-id 1048578 next edit "Hulu-DNS" set internet-service-id 1048579 next edit "Hulu-Outbound_Email" set internet-service-id 1048580 next edit "Hulu-SSH" set internet-service-id 1048582 next edit "Hulu-FTP" set internet-service-id 1048583 next edit "Hulu-NTP" set internet-service-id 1048584 next edit "Hulu-Inbound_Email" set internet-service-id 1048585 next edit "Hulu-LDAP" set internet-service-id 1048590 next edit "Hulu-NetBIOS.Session.Service" set internet-service-id 1048591 next edit "Hulu-RTMP" set internet-service-id 1048592 next edit "Hulu-NetBIOS.Name.Service" set internet-service-id 1048600 next edit "Pinterest-Other" set internet-service-id 1114112 next edit "Pinterest-Web" set internet-service-id 1114113 next edit "Pinterest-ICMP" set internet-service-id 1114114 next edit "Pinterest-DNS" set internet-service-id 1114115 next edit "Pinterest-Outbound_Email" set internet-service-id 1114116 next edit "Pinterest-SSH" set internet-service-id 1114118 next edit "Pinterest-FTP" set internet-service-id 1114119 next edit "Pinterest-NTP" set internet-service-id 1114120 next edit "Pinterest-Inbound_Email" set internet-service-id 1114121 next edit "Pinterest-LDAP" set internet-service-id 1114126 next edit "Pinterest-NetBIOS.Session.Service" set internet-service-id 1114127 next edit "Pinterest-RTMP" set internet-service-id 1114128 next edit "Pinterest-NetBIOS.Name.Service" set internet-service-id 1114136 next edit "LogMeIn-Other" set internet-service-id 1179648 next edit "LogMeIn-Web" set internet-service-id 1179649 next edit "LogMeIn-ICMP" set internet-service-id 1179650 next edit "LogMeIn-DNS" set internet-service-id 1179651 next edit "LogMeIn-Outbound_Email" set internet-service-id 1179652 next edit "LogMeIn-SSH" set internet-service-id 1179654 next edit "LogMeIn-FTP" set internet-service-id 1179655 next edit "LogMeIn-NTP" set internet-service-id 1179656 next edit "LogMeIn-Inbound_Email" set internet-service-id 1179657 next edit "LogMeIn-LDAP" set internet-service-id 1179662 next edit "LogMeIn-NetBIOS.Session.Service" set internet-service-id 1179663 next edit "LogMeIn-RTMP" set internet-service-id 1179664 next edit "LogMeIn-NetBIOS.Name.Service" set internet-service-id 1179672 next edit "LogMeIn-GoTo.Suite" set internet-service-id 1179767 next edit "Fortinet-Other" set internet-service-id 1245184 next edit "Fortinet-Web" set internet-service-id 1245185 next edit "Fortinet-ICMP" set internet-service-id 1245186 next edit "Fortinet-DNS" set internet-service-id 1245187 next edit "Fortinet-Outbound_Email" set internet-service-id 1245188 next edit "Fortinet-SSH" set internet-service-id 1245190 next edit "Fortinet-FTP" set internet-service-id 1245191 next edit "Fortinet-NTP" set internet-service-id 1245192 next edit "Fortinet-Inbound_Email" set internet-service-id 1245193 next edit "Fortinet-LDAP" set internet-service-id 1245198 next edit "Fortinet-NetBIOS.Session.Service" set internet-service-id 1245199 next edit "Fortinet-RTMP" set internet-service-id 1245200 next edit "Fortinet-NetBIOS.Name.Service" set internet-service-id 1245208 next edit "Fortinet-FortiGuard" set internet-service-id 1245324 next edit "Fortinet-FortiMail.Cloud" set internet-service-id 1245325 next edit "Fortinet-FortiCloud" set internet-service-id 1245326 next edit "Fortinet-FortiVoice.Cloud" set internet-service-id 1245432 next edit "Fortinet-FortiGuard.Secure.DNS" set internet-service-id 1245454 next edit "Fortinet-FortiEDR" set internet-service-id 1245475 next edit "Kaspersky-Other" set internet-service-id 1310720 next edit "Kaspersky-Web" set internet-service-id 1310721 next edit "Kaspersky-ICMP" set internet-service-id 1310722 next edit "Kaspersky-DNS" set internet-service-id 1310723 next edit "Kaspersky-Outbound_Email" set internet-service-id 1310724 next edit "Kaspersky-SSH" set internet-service-id 1310726 next edit "Kaspersky-FTP" set internet-service-id 1310727 next edit "Kaspersky-NTP" set internet-service-id 1310728 next edit "Kaspersky-Inbound_Email" set internet-service-id 1310729 next edit "Kaspersky-LDAP" set internet-service-id 1310734 next edit "Kaspersky-NetBIOS.Session.Service" set internet-service-id 1310735 next edit "Kaspersky-RTMP" set internet-service-id 1310736 next edit "Kaspersky-NetBIOS.Name.Service" set internet-service-id 1310744 next edit "McAfee-Other" set internet-service-id 1376256 next edit "McAfee-Web" set internet-service-id 1376257 next edit "McAfee-ICMP" set internet-service-id 1376258 next edit "McAfee-DNS" set internet-service-id 1376259 next edit "McAfee-Outbound_Email" set internet-service-id 1376260 next edit "McAfee-SSH" set internet-service-id 1376262 next edit "McAfee-FTP" set internet-service-id 1376263 next edit "McAfee-NTP" set internet-service-id 1376264 next edit "McAfee-Inbound_Email" set internet-service-id 1376265 next edit "McAfee-LDAP" set internet-service-id 1376270 next edit "McAfee-NetBIOS.Session.Service" set internet-service-id 1376271 next edit "McAfee-RTMP" set internet-service-id 1376272 next edit "McAfee-NetBIOS.Name.Service" set internet-service-id 1376280 next edit "Symantec-Other" set internet-service-id 1441792 next edit "Symantec-Web" set internet-service-id 1441793 next edit "Symantec-ICMP" set internet-service-id 1441794 next edit "Symantec-DNS" set internet-service-id 1441795 next edit "Symantec-Outbound_Email" set internet-service-id 1441796 next edit "Symantec-SSH" set internet-service-id 1441798 next edit "Symantec-FTP" set internet-service-id 1441799 next edit "Symantec-NTP" set internet-service-id 1441800 next edit "Symantec-Inbound_Email" set internet-service-id 1441801 next edit "Symantec-LDAP" set internet-service-id 1441806 next edit "Symantec-NetBIOS.Session.Service" set internet-service-id 1441807 next edit "Symantec-RTMP" set internet-service-id 1441808 next edit "Symantec-NetBIOS.Name.Service" set internet-service-id 1441816 next edit "Symantec-Symantec.Cloud" set internet-service-id 1441922 next edit "VMware-Other" set internet-service-id 1507328 next edit "VMware-Web" set internet-service-id 1507329 next edit "VMware-ICMP" set internet-service-id 1507330 next edit "VMware-DNS" set internet-service-id 1507331 next edit "VMware-Outbound_Email" set internet-service-id 1507332 next edit "VMware-SSH" set internet-service-id 1507334 next edit "VMware-FTP" set internet-service-id 1507335 next edit "VMware-NTP" set internet-service-id 1507336 next edit "VMware-Inbound_Email" set internet-service-id 1507337 next edit "VMware-LDAP" set internet-service-id 1507342 next edit "VMware-NetBIOS.Session.Service" set internet-service-id 1507343 next edit "VMware-RTMP" set internet-service-id 1507344 next edit "VMware-NetBIOS.Name.Service" set internet-service-id 1507352 next edit "VMware-Workspace.ONE" set internet-service-id 1507461 next edit "AOL-Other" set internet-service-id 1572864 next edit "AOL-Web" set internet-service-id 1572865 next edit "AOL-ICMP" set internet-service-id 1572866 next edit "AOL-DNS" set internet-service-id 1572867 next edit "AOL-Outbound_Email" set internet-service-id 1572868 next edit "AOL-SSH" set internet-service-id 1572870 next edit "AOL-FTP" set internet-service-id 1572871 next edit "AOL-NTP" set internet-service-id 1572872 next edit "AOL-Inbound_Email" set internet-service-id 1572873 next edit "AOL-LDAP" set internet-service-id 1572878 next edit "AOL-NetBIOS.Session.Service" set internet-service-id 1572879 next edit "AOL-RTMP" set internet-service-id 1572880 next edit "AOL-NetBIOS.Name.Service" set internet-service-id 1572888 next edit "RealNetworks-Other" set internet-service-id 1638400 next edit "RealNetworks-Web" set internet-service-id 1638401 next edit "RealNetworks-ICMP" set internet-service-id 1638402 next edit "RealNetworks-DNS" set internet-service-id 1638403 next edit "RealNetworks-Outbound_Email" set internet-service-id 1638404 next edit "RealNetworks-SSH" set internet-service-id 1638406 next edit "RealNetworks-FTP" set internet-service-id 1638407 next edit "RealNetworks-NTP" set internet-service-id 1638408 next edit "RealNetworks-Inbound_Email" set internet-service-id 1638409 next edit "RealNetworks-LDAP" set internet-service-id 1638414 next edit "RealNetworks-NetBIOS.Session.Service" set internet-service-id 1638415 next edit "RealNetworks-RTMP" set internet-service-id 1638416 next edit "RealNetworks-NetBIOS.Name.Service" set internet-service-id 1638424 next edit "Zoho-Other" set internet-service-id 1703936 next edit "Zoho-Web" set internet-service-id 1703937 next edit "Zoho-ICMP" set internet-service-id 1703938 next edit "Zoho-DNS" set internet-service-id 1703939 next edit "Zoho-Outbound_Email" set internet-service-id 1703940 next edit "Zoho-SSH" set internet-service-id 1703942 next edit "Zoho-FTP" set internet-service-id 1703943 next edit "Zoho-NTP" set internet-service-id 1703944 next edit "Zoho-Inbound_Email" set internet-service-id 1703945 next edit "Zoho-LDAP" set internet-service-id 1703950 next edit "Zoho-NetBIOS.Session.Service" set internet-service-id 1703951 next edit "Zoho-RTMP" set internet-service-id 1703952 next edit "Zoho-NetBIOS.Name.Service" set internet-service-id 1703960 next edit "Zoho-Site24x7.Monitor" set internet-service-id 1704153 next edit "Mozilla-Other" set internet-service-id 1769472 next edit "Mozilla-Web" set internet-service-id 1769473 next edit "Mozilla-ICMP" set internet-service-id 1769474 next edit "Mozilla-DNS" set internet-service-id 1769475 next edit "Mozilla-Outbound_Email" set internet-service-id 1769476 next edit "Mozilla-SSH" set internet-service-id 1769478 next edit "Mozilla-FTP" set internet-service-id 1769479 next edit "Mozilla-NTP" set internet-service-id 1769480 next edit "Mozilla-Inbound_Email" set internet-service-id 1769481 next edit "Mozilla-LDAP" set internet-service-id 1769486 next edit "Mozilla-NetBIOS.Session.Service" set internet-service-id 1769487 next edit "Mozilla-RTMP" set internet-service-id 1769488 next edit "Mozilla-NetBIOS.Name.Service" set internet-service-id 1769496 next edit "TeamViewer-Other" set internet-service-id 1835008 next edit "TeamViewer-Web" set internet-service-id 1835009 next edit "TeamViewer-ICMP" set internet-service-id 1835010 next edit "TeamViewer-DNS" set internet-service-id 1835011 next edit "TeamViewer-Outbound_Email" set internet-service-id 1835012 next edit "TeamViewer-SSH" set internet-service-id 1835014 next edit "TeamViewer-FTP" set internet-service-id 1835015 next edit "TeamViewer-NTP" set internet-service-id 1835016 next edit "TeamViewer-Inbound_Email" set internet-service-id 1835017 next edit "TeamViewer-LDAP" set internet-service-id 1835022 next edit "TeamViewer-NetBIOS.Session.Service" set internet-service-id 1835023 next edit "TeamViewer-RTMP" set internet-service-id 1835024 next edit "TeamViewer-NetBIOS.Name.Service" set internet-service-id 1835032 next edit "TeamViewer-TeamViewer" set internet-service-id 1835117 next edit "HP-Other" set internet-service-id 1900544 next edit "HP-Web" set internet-service-id 1900545 next edit "HP-ICMP" set internet-service-id 1900546 next edit "HP-DNS" set internet-service-id 1900547 next edit "HP-Outbound_Email" set internet-service-id 1900548 next edit "HP-SSH" set internet-service-id 1900550 next edit "HP-FTP" set internet-service-id 1900551 next edit "HP-NTP" set internet-service-id 1900552 next edit "HP-Inbound_Email" set internet-service-id 1900553 next edit "HP-LDAP" set internet-service-id 1900558 next edit "HP-NetBIOS.Session.Service" set internet-service-id 1900559 next edit "HP-RTMP" set internet-service-id 1900560 next edit "HP-NetBIOS.Name.Service" set internet-service-id 1900568 next edit "HP-Aruba" set internet-service-id 1900726 next edit "Cisco-Other" set internet-service-id 1966080 next edit "Cisco-Web" set internet-service-id 1966081 next edit "Cisco-ICMP" set internet-service-id 1966082 next edit "Cisco-DNS" set internet-service-id 1966083 next edit "Cisco-Outbound_Email" set internet-service-id 1966084 next edit "Cisco-SSH" set internet-service-id 1966086 next edit "Cisco-FTP" set internet-service-id 1966087 next edit "Cisco-NTP" set internet-service-id 1966088 next edit "Cisco-Inbound_Email" set internet-service-id 1966089 next edit "Cisco-LDAP" set internet-service-id 1966094 next edit "Cisco-NetBIOS.Session.Service" set internet-service-id 1966095 next edit "Cisco-RTMP" set internet-service-id 1966096 next edit "Cisco-NetBIOS.Name.Service" set internet-service-id 1966104 next edit "Cisco-Webex" set internet-service-id 1966183 next edit "Cisco-Meraki.Cloud" set internet-service-id 1966218 next edit "Cisco-Duo.Security" set internet-service-id 1966225 next edit "Cisco-AppDynamic" set internet-service-id 1966260 next edit "Cisco-Webex.FedRAMP" set internet-service-id 1966315 next edit "Cisco-Secure.Endpoint" set internet-service-id 1966324 next edit "IBM-Other" set internet-service-id 2031616 next edit "IBM-Web" set internet-service-id 2031617 next edit "IBM-ICMP" set internet-service-id 2031618 next edit "IBM-DNS" set internet-service-id 2031619 next edit "IBM-Outbound_Email" set internet-service-id 2031620 next edit "IBM-SSH" set internet-service-id 2031622 next edit "IBM-FTP" set internet-service-id 2031623 next edit "IBM-NTP" set internet-service-id 2031624 next edit "IBM-Inbound_Email" set internet-service-id 2031625 next edit "IBM-LDAP" set internet-service-id 2031630 next edit "IBM-NetBIOS.Session.Service" set internet-service-id 2031631 next edit "IBM-RTMP" set internet-service-id 2031632 next edit "IBM-NetBIOS.Name.Service" set internet-service-id 2031640 next edit "IBM-IBM.Cloud" set internet-service-id 2031748 next edit "Citrix-Other" set internet-service-id 2097152 next edit "Citrix-Web" set internet-service-id 2097153 next edit "Citrix-ICMP" set internet-service-id 2097154 next edit "Citrix-DNS" set internet-service-id 2097155 next edit "Citrix-Outbound_Email" set internet-service-id 2097156 next edit "Citrix-SSH" set internet-service-id 2097158 next edit "Citrix-FTP" set internet-service-id 2097159 next edit "Citrix-NTP" set internet-service-id 2097160 next edit "Citrix-Inbound_Email" set internet-service-id 2097161 next edit "Citrix-LDAP" set internet-service-id 2097166 next edit "Citrix-NetBIOS.Session.Service" set internet-service-id 2097167 next edit "Citrix-RTMP" set internet-service-id 2097168 next edit "Citrix-NetBIOS.Name.Service" set internet-service-id 2097176 next edit "Twitter-Other" set internet-service-id 2162688 next edit "Twitter-Web" set internet-service-id 2162689 next edit "Twitter-ICMP" set internet-service-id 2162690 next edit "Twitter-DNS" set internet-service-id 2162691 next edit "Twitter-Outbound_Email" set internet-service-id 2162692 next edit "Twitter-SSH" set internet-service-id 2162694 next edit "Twitter-FTP" set internet-service-id 2162695 next edit "Twitter-NTP" set internet-service-id 2162696 next edit "Twitter-Inbound_Email" set internet-service-id 2162697 next edit "Twitter-LDAP" set internet-service-id 2162702 next edit "Twitter-NetBIOS.Session.Service" set internet-service-id 2162703 next edit "Twitter-RTMP" set internet-service-id 2162704 next edit "Twitter-NetBIOS.Name.Service" set internet-service-id 2162712 next edit "Dell-Other" set internet-service-id 2228224 next edit "Dell-Web" set internet-service-id 2228225 next edit "Dell-ICMP" set internet-service-id 2228226 next edit "Dell-DNS" set internet-service-id 2228227 next edit "Dell-Outbound_Email" set internet-service-id 2228228 next edit "Dell-SSH" set internet-service-id 2228230 next edit "Dell-FTP" set internet-service-id 2228231 next edit "Dell-NTP" set internet-service-id 2228232 next edit "Dell-Inbound_Email" set internet-service-id 2228233 next edit "Dell-LDAP" set internet-service-id 2228238 next edit "Dell-NetBIOS.Session.Service" set internet-service-id 2228239 next edit "Dell-RTMP" set internet-service-id 2228240 next edit "Dell-NetBIOS.Name.Service" set internet-service-id 2228248 next edit "Vimeo-Other" set internet-service-id 2293760 next edit "Vimeo-Web" set internet-service-id 2293761 next edit "Vimeo-ICMP" set internet-service-id 2293762 next edit "Vimeo-DNS" set internet-service-id 2293763 next edit "Vimeo-Outbound_Email" set internet-service-id 2293764 next edit "Vimeo-SSH" set internet-service-id 2293766 next edit "Vimeo-FTP" set internet-service-id 2293767 next edit "Vimeo-NTP" set internet-service-id 2293768 next edit "Vimeo-Inbound_Email" set internet-service-id 2293769 next edit "Vimeo-LDAP" set internet-service-id 2293774 next edit "Vimeo-NetBIOS.Session.Service" set internet-service-id 2293775 next edit "Vimeo-RTMP" set internet-service-id 2293776 next edit "Vimeo-NetBIOS.Name.Service" set internet-service-id 2293784 next edit "Redhat-Other" set internet-service-id 2359296 next edit "Redhat-Web" set internet-service-id 2359297 next edit "Redhat-ICMP" set internet-service-id 2359298 next edit "Redhat-DNS" set internet-service-id 2359299 next edit "Redhat-Outbound_Email" set internet-service-id 2359300 next edit "Redhat-SSH" set internet-service-id 2359302 next edit "Redhat-FTP" set internet-service-id 2359303 next edit "Redhat-NTP" set internet-service-id 2359304 next edit "Redhat-Inbound_Email" set internet-service-id 2359305 next edit "Redhat-LDAP" set internet-service-id 2359310 next edit "Redhat-NetBIOS.Session.Service" set internet-service-id 2359311 next edit "Redhat-RTMP" set internet-service-id 2359312 next edit "Redhat-NetBIOS.Name.Service" set internet-service-id 2359320 next edit "VK-Other" set internet-service-id 2424832 next edit "VK-Web" set internet-service-id 2424833 next edit "VK-ICMP" set internet-service-id 2424834 next edit "VK-DNS" set internet-service-id 2424835 next edit "VK-Outbound_Email" set internet-service-id 2424836 next edit "VK-SSH" set internet-service-id 2424838 next edit "VK-FTP" set internet-service-id 2424839 next edit "VK-NTP" set internet-service-id 2424840 next edit "VK-Inbound_Email" set internet-service-id 2424841 next edit "VK-LDAP" set internet-service-id 2424846 next edit "VK-NetBIOS.Session.Service" set internet-service-id 2424847 next edit "VK-RTMP" set internet-service-id 2424848 next edit "VK-NetBIOS.Name.Service" set internet-service-id 2424856 next edit "TrendMicro-Other" set internet-service-id 2490368 next edit "TrendMicro-Web" set internet-service-id 2490369 next edit "TrendMicro-ICMP" set internet-service-id 2490370 next edit "TrendMicro-DNS" set internet-service-id 2490371 next edit "TrendMicro-Outbound_Email" set internet-service-id 2490372 next edit "TrendMicro-SSH" set internet-service-id 2490374 next edit "TrendMicro-FTP" set internet-service-id 2490375 next edit "TrendMicro-NTP" set internet-service-id 2490376 next edit "TrendMicro-Inbound_Email" set internet-service-id 2490377 next edit "TrendMicro-LDAP" set internet-service-id 2490382 next edit "TrendMicro-NetBIOS.Session.Service" set internet-service-id 2490383 next edit "TrendMicro-RTMP" set internet-service-id 2490384 next edit "TrendMicro-NetBIOS.Name.Service" set internet-service-id 2490392 next edit "Tencent-Other" set internet-service-id 2555904 next edit "Tencent-Web" set internet-service-id 2555905 next edit "Tencent-ICMP" set internet-service-id 2555906 next edit "Tencent-DNS" set internet-service-id 2555907 next edit "Tencent-Outbound_Email" set internet-service-id 2555908 next edit "Tencent-SSH" set internet-service-id 2555910 next edit "Tencent-FTP" set internet-service-id 2555911 next edit "Tencent-NTP" set internet-service-id 2555912 next edit "Tencent-Inbound_Email" set internet-service-id 2555913 next edit "Tencent-LDAP" set internet-service-id 2555918 next edit "Tencent-NetBIOS.Session.Service" set internet-service-id 2555919 next edit "Tencent-RTMP" set internet-service-id 2555920 next edit "Tencent-NetBIOS.Name.Service" set internet-service-id 2555928 next edit "Ask-Other" set internet-service-id 2621440 next edit "Ask-Web" set internet-service-id 2621441 next edit "Ask-ICMP" set internet-service-id 2621442 next edit "Ask-DNS" set internet-service-id 2621443 next edit "Ask-Outbound_Email" set internet-service-id 2621444 next edit "Ask-SSH" set internet-service-id 2621446 next edit "Ask-FTP" set internet-service-id 2621447 next edit "Ask-NTP" set internet-service-id 2621448 next edit "Ask-Inbound_Email" set internet-service-id 2621449 next edit "Ask-LDAP" set internet-service-id 2621454 next edit "Ask-NetBIOS.Session.Service" set internet-service-id 2621455 next edit "Ask-RTMP" set internet-service-id 2621456 next edit "Ask-NetBIOS.Name.Service" set internet-service-id 2621464 next edit "CNN-Other" set internet-service-id 2686976 next edit "CNN-Web" set internet-service-id 2686977 next edit "CNN-ICMP" set internet-service-id 2686978 next edit "CNN-DNS" set internet-service-id 2686979 next edit "CNN-Outbound_Email" set internet-service-id 2686980 next edit "CNN-SSH" set internet-service-id 2686982 next edit "CNN-FTP" set internet-service-id 2686983 next edit "CNN-NTP" set internet-service-id 2686984 next edit "CNN-Inbound_Email" set internet-service-id 2686985 next edit "CNN-LDAP" set internet-service-id 2686990 next edit "CNN-NetBIOS.Session.Service" set internet-service-id 2686991 next edit "CNN-RTMP" set internet-service-id 2686992 next edit "CNN-NetBIOS.Name.Service" set internet-service-id 2687000 next edit "Myspace-Other" set internet-service-id 2752512 next edit "Myspace-Web" set internet-service-id 2752513 next edit "Myspace-ICMP" set internet-service-id 2752514 next edit "Myspace-DNS" set internet-service-id 2752515 next edit "Myspace-Outbound_Email" set internet-service-id 2752516 next edit "Myspace-SSH" set internet-service-id 2752518 next edit "Myspace-FTP" set internet-service-id 2752519 next edit "Myspace-NTP" set internet-service-id 2752520 next edit "Myspace-Inbound_Email" set internet-service-id 2752521 next edit "Myspace-LDAP" set internet-service-id 2752526 next edit "Myspace-NetBIOS.Session.Service" set internet-service-id 2752527 next edit "Myspace-RTMP" set internet-service-id 2752528 next edit "Myspace-NetBIOS.Name.Service" set internet-service-id 2752536 next edit "Tor-Relay.Node" set internet-service-id 2818238 next edit "Tor-Exit.Node" set internet-service-id 2818243 next edit "Baidu-Other" set internet-service-id 2883584 next edit "Baidu-Web" set internet-service-id 2883585 next edit "Baidu-ICMP" set internet-service-id 2883586 next edit "Baidu-DNS" set internet-service-id 2883587 next edit "Baidu-Outbound_Email" set internet-service-id 2883588 next edit "Baidu-SSH" set internet-service-id 2883590 next edit "Baidu-FTP" set internet-service-id 2883591 next edit "Baidu-NTP" set internet-service-id 2883592 next edit "Baidu-Inbound_Email" set internet-service-id 2883593 next edit "Baidu-LDAP" set internet-service-id 2883598 next edit "Baidu-NetBIOS.Session.Service" set internet-service-id 2883599 next edit "Baidu-RTMP" set internet-service-id 2883600 next edit "Baidu-NetBIOS.Name.Service" set internet-service-id 2883608 next edit "ntp.org-Other" set internet-service-id 2949120 next edit "ntp.org-Web" set internet-service-id 2949121 next edit "ntp.org-ICMP" set internet-service-id 2949122 next edit "ntp.org-DNS" set internet-service-id 2949123 next edit "ntp.org-Outbound_Email" set internet-service-id 2949124 next edit "ntp.org-SSH" set internet-service-id 2949126 next edit "ntp.org-FTP" set internet-service-id 2949127 next edit "ntp.org-NTP" set internet-service-id 2949128 next edit "ntp.org-Inbound_Email" set internet-service-id 2949129 next edit "ntp.org-LDAP" set internet-service-id 2949134 next edit "ntp.org-NetBIOS.Session.Service" set internet-service-id 2949135 next edit "ntp.org-RTMP" set internet-service-id 2949136 next edit "ntp.org-NetBIOS.Name.Service" set internet-service-id 2949144 next edit "Proxy-Proxy.Server" set internet-service-id 3014850 next edit "Botnet-C&C.Server" set internet-service-id 3080383 next edit "Spam-Spamming.Server" set internet-service-id 3145920 next edit "Phishing-Phishing.Server" set internet-service-id 3211457 next edit "Zendesk-Other" set internet-service-id 3407872 next edit "Zendesk-Web" set internet-service-id 3407873 next edit "Zendesk-ICMP" set internet-service-id 3407874 next edit "Zendesk-DNS" set internet-service-id 3407875 next edit "Zendesk-Outbound_Email" set internet-service-id 3407876 next edit "Zendesk-SSH" set internet-service-id 3407878 next edit "Zendesk-FTP" set internet-service-id 3407879 next edit "Zendesk-NTP" set internet-service-id 3407880 next edit "Zendesk-Inbound_Email" set internet-service-id 3407881 next edit "Zendesk-LDAP" set internet-service-id 3407886 next edit "Zendesk-NetBIOS.Session.Service" set internet-service-id 3407887 next edit "Zendesk-RTMP" set internet-service-id 3407888 next edit "Zendesk-NetBIOS.Name.Service" set internet-service-id 3407896 next edit "Zendesk-Zendesk.Suite" set internet-service-id 3408047 next edit "DocuSign-Other" set internet-service-id 3473408 next edit "DocuSign-Web" set internet-service-id 3473409 next edit "DocuSign-ICMP" set internet-service-id 3473410 next edit "DocuSign-DNS" set internet-service-id 3473411 next edit "DocuSign-Outbound_Email" set internet-service-id 3473412 next edit "DocuSign-SSH" set internet-service-id 3473414 next edit "DocuSign-FTP" set internet-service-id 3473415 next edit "DocuSign-NTP" set internet-service-id 3473416 next edit "DocuSign-Inbound_Email" set internet-service-id 3473417 next edit "DocuSign-LDAP" set internet-service-id 3473422 next edit "DocuSign-NetBIOS.Session.Service" set internet-service-id 3473423 next edit "DocuSign-RTMP" set internet-service-id 3473424 next edit "DocuSign-NetBIOS.Name.Service" set internet-service-id 3473432 next edit "ServiceNow-Other" set internet-service-id 3538944 next edit "ServiceNow-Web" set internet-service-id 3538945 next edit "ServiceNow-ICMP" set internet-service-id 3538946 next edit "ServiceNow-DNS" set internet-service-id 3538947 next edit "ServiceNow-Outbound_Email" set internet-service-id 3538948 next edit "ServiceNow-SSH" set internet-service-id 3538950 next edit "ServiceNow-FTP" set internet-service-id 3538951 next edit "ServiceNow-NTP" set internet-service-id 3538952 next edit "ServiceNow-Inbound_Email" set internet-service-id 3538953 next edit "ServiceNow-LDAP" set internet-service-id 3538958 next edit "ServiceNow-NetBIOS.Session.Service" set internet-service-id 3538959 next edit "ServiceNow-RTMP" set internet-service-id 3538960 next edit "ServiceNow-NetBIOS.Name.Service" set internet-service-id 3538968 next edit "GitHub-GitHub" set internet-service-id 3604638 next edit "Workday-Other" set internet-service-id 3670016 next edit "Workday-Web" set internet-service-id 3670017 next edit "Workday-ICMP" set internet-service-id 3670018 next edit "Workday-DNS" set internet-service-id 3670019 next edit "Workday-Outbound_Email" set internet-service-id 3670020 next edit "Workday-SSH" set internet-service-id 3670022 next edit "Workday-FTP" set internet-service-id 3670023 next edit "Workday-NTP" set internet-service-id 3670024 next edit "Workday-Inbound_Email" set internet-service-id 3670025 next edit "Workday-LDAP" set internet-service-id 3670030 next edit "Workday-NetBIOS.Session.Service" set internet-service-id 3670031 next edit "Workday-RTMP" set internet-service-id 3670032 next edit "Workday-NetBIOS.Name.Service" set internet-service-id 3670040 next edit "HubSpot-Other" set internet-service-id 3735552 next edit "HubSpot-Web" set internet-service-id 3735553 next edit "HubSpot-ICMP" set internet-service-id 3735554 next edit "HubSpot-DNS" set internet-service-id 3735555 next edit "HubSpot-Outbound_Email" set internet-service-id 3735556 next edit "HubSpot-SSH" set internet-service-id 3735558 next edit "HubSpot-FTP" set internet-service-id 3735559 next edit "HubSpot-NTP" set internet-service-id 3735560 next edit "HubSpot-Inbound_Email" set internet-service-id 3735561 next edit "HubSpot-LDAP" set internet-service-id 3735566 next edit "HubSpot-NetBIOS.Session.Service" set internet-service-id 3735567 next edit "HubSpot-RTMP" set internet-service-id 3735568 next edit "HubSpot-NetBIOS.Name.Service" set internet-service-id 3735576 next edit "Twilio-Other" set internet-service-id 3801088 next edit "Twilio-Web" set internet-service-id 3801089 next edit "Twilio-ICMP" set internet-service-id 3801090 next edit "Twilio-DNS" set internet-service-id 3801091 next edit "Twilio-Outbound_Email" set internet-service-id 3801092 next edit "Twilio-SSH" set internet-service-id 3801094 next edit "Twilio-FTP" set internet-service-id 3801095 next edit "Twilio-NTP" set internet-service-id 3801096 next edit "Twilio-Inbound_Email" set internet-service-id 3801097 next edit "Twilio-LDAP" set internet-service-id 3801102 next edit "Twilio-NetBIOS.Session.Service" set internet-service-id 3801103 next edit "Twilio-RTMP" set internet-service-id 3801104 next edit "Twilio-NetBIOS.Name.Service" set internet-service-id 3801112 next edit "Twilio-Elastic.SIP.Trunking" set internet-service-id 3801277 next edit "Coupa-Other" set internet-service-id 3866624 next edit "Coupa-Web" set internet-service-id 3866625 next edit "Coupa-ICMP" set internet-service-id 3866626 next edit "Coupa-DNS" set internet-service-id 3866627 next edit "Coupa-Outbound_Email" set internet-service-id 3866628 next edit "Coupa-SSH" set internet-service-id 3866630 next edit "Coupa-FTP" set internet-service-id 3866631 next edit "Coupa-NTP" set internet-service-id 3866632 next edit "Coupa-Inbound_Email" set internet-service-id 3866633 next edit "Coupa-LDAP" set internet-service-id 3866638 next edit "Coupa-NetBIOS.Session.Service" set internet-service-id 3866639 next edit "Coupa-RTMP" set internet-service-id 3866640 next edit "Coupa-NetBIOS.Name.Service" set internet-service-id 3866648 next edit "Atlassian-Other" set internet-service-id 3932160 next edit "Atlassian-Web" set internet-service-id 3932161 next edit "Atlassian-ICMP" set internet-service-id 3932162 next edit "Atlassian-DNS" set internet-service-id 3932163 next edit "Atlassian-Outbound_Email" set internet-service-id 3932164 next edit "Atlassian-SSH" set internet-service-id 3932166 next edit "Atlassian-FTP" set internet-service-id 3932167 next edit "Atlassian-NTP" set internet-service-id 3932168 next edit "Atlassian-Inbound_Email" set internet-service-id 3932169 next edit "Atlassian-LDAP" set internet-service-id 3932174 next edit "Atlassian-NetBIOS.Session.Service" set internet-service-id 3932175 next edit "Atlassian-RTMP" set internet-service-id 3932176 next edit "Atlassian-NetBIOS.Name.Service" set internet-service-id 3932184 next edit "Atlassian-Atlassian.Cloud" set internet-service-id 3932388 next edit "Atlassian-Atlassian.Notification" set internet-service-id 3932436 next edit "Xero-Other" set internet-service-id 3997696 next edit "Xero-Web" set internet-service-id 3997697 next edit "Xero-ICMP" set internet-service-id 3997698 next edit "Xero-DNS" set internet-service-id 3997699 next edit "Xero-Outbound_Email" set internet-service-id 3997700 next edit "Xero-SSH" set internet-service-id 3997702 next edit "Xero-FTP" set internet-service-id 3997703 next edit "Xero-NTP" set internet-service-id 3997704 next edit "Xero-Inbound_Email" set internet-service-id 3997705 next edit "Xero-LDAP" set internet-service-id 3997710 next edit "Xero-NetBIOS.Session.Service" set internet-service-id 3997711 next edit "Xero-RTMP" set internet-service-id 3997712 next edit "Xero-NetBIOS.Name.Service" set internet-service-id 3997720 next edit "Zuora-Other" set internet-service-id 4063232 next edit "Zuora-Web" set internet-service-id 4063233 next edit "Zuora-ICMP" set internet-service-id 4063234 next edit "Zuora-DNS" set internet-service-id 4063235 next edit "Zuora-Outbound_Email" set internet-service-id 4063236 next edit "Zuora-SSH" set internet-service-id 4063238 next edit "Zuora-FTP" set internet-service-id 4063239 next edit "Zuora-NTP" set internet-service-id 4063240 next edit "Zuora-Inbound_Email" set internet-service-id 4063241 next edit "Zuora-LDAP" set internet-service-id 4063246 next edit "Zuora-NetBIOS.Session.Service" set internet-service-id 4063247 next edit "Zuora-RTMP" set internet-service-id 4063248 next edit "Zuora-NetBIOS.Name.Service" set internet-service-id 4063256 next edit "AdRoll-Other" set internet-service-id 4128768 next edit "AdRoll-Web" set internet-service-id 4128769 next edit "AdRoll-ICMP" set internet-service-id 4128770 next edit "AdRoll-DNS" set internet-service-id 4128771 next edit "AdRoll-Outbound_Email" set internet-service-id 4128772 next edit "AdRoll-SSH" set internet-service-id 4128774 next edit "AdRoll-FTP" set internet-service-id 4128775 next edit "AdRoll-NTP" set internet-service-id 4128776 next edit "AdRoll-Inbound_Email" set internet-service-id 4128777 next edit "AdRoll-LDAP" set internet-service-id 4128782 next edit "AdRoll-NetBIOS.Session.Service" set internet-service-id 4128783 next edit "AdRoll-RTMP" set internet-service-id 4128784 next edit "AdRoll-NetBIOS.Name.Service" set internet-service-id 4128792 next edit "Xactly-Other" set internet-service-id 4194304 next edit "Xactly-Web" set internet-service-id 4194305 next edit "Xactly-ICMP" set internet-service-id 4194306 next edit "Xactly-DNS" set internet-service-id 4194307 next edit "Xactly-Outbound_Email" set internet-service-id 4194308 next edit "Xactly-SSH" set internet-service-id 4194310 next edit "Xactly-FTP" set internet-service-id 4194311 next edit "Xactly-NTP" set internet-service-id 4194312 next edit "Xactly-Inbound_Email" set internet-service-id 4194313 next edit "Xactly-LDAP" set internet-service-id 4194318 next edit "Xactly-NetBIOS.Session.Service" set internet-service-id 4194319 next edit "Xactly-RTMP" set internet-service-id 4194320 next edit "Xactly-NetBIOS.Name.Service" set internet-service-id 4194328 next edit "Intuit-Other" set internet-service-id 4259840 next edit "Intuit-Web" set internet-service-id 4259841 next edit "Intuit-ICMP" set internet-service-id 4259842 next edit "Intuit-DNS" set internet-service-id 4259843 next edit "Intuit-Outbound_Email" set internet-service-id 4259844 next edit "Intuit-SSH" set internet-service-id 4259846 next edit "Intuit-FTP" set internet-service-id 4259847 next edit "Intuit-NTP" set internet-service-id 4259848 next edit "Intuit-Inbound_Email" set internet-service-id 4259849 next edit "Intuit-LDAP" set internet-service-id 4259854 next edit "Intuit-NetBIOS.Session.Service" set internet-service-id 4259855 next edit "Intuit-RTMP" set internet-service-id 4259856 next edit "Intuit-NetBIOS.Name.Service" set internet-service-id 4259864 next edit "Marketo-Other" set internet-service-id 4325376 next edit "Marketo-Web" set internet-service-id 4325377 next edit "Marketo-ICMP" set internet-service-id 4325378 next edit "Marketo-DNS" set internet-service-id 4325379 next edit "Marketo-Outbound_Email" set internet-service-id 4325380 next edit "Marketo-SSH" set internet-service-id 4325382 next edit "Marketo-FTP" set internet-service-id 4325383 next edit "Marketo-NTP" set internet-service-id 4325384 next edit "Marketo-Inbound_Email" set internet-service-id 4325385 next edit "Marketo-LDAP" set internet-service-id 4325390 next edit "Marketo-NetBIOS.Session.Service" set internet-service-id 4325391 next edit "Marketo-RTMP" set internet-service-id 4325392 next edit "Marketo-NetBIOS.Name.Service" set internet-service-id 4325400 next edit "Bill-Other" set internet-service-id 4456448 next edit "Bill-Web" set internet-service-id 4456449 next edit "Bill-ICMP" set internet-service-id 4456450 next edit "Bill-DNS" set internet-service-id 4456451 next edit "Bill-Outbound_Email" set internet-service-id 4456452 next edit "Bill-SSH" set internet-service-id 4456454 next edit "Bill-FTP" set internet-service-id 4456455 next edit "Bill-NTP" set internet-service-id 4456456 next edit "Bill-Inbound_Email" set internet-service-id 4456457 next edit "Bill-LDAP" set internet-service-id 4456462 next edit "Bill-NetBIOS.Session.Service" set internet-service-id 4456463 next edit "Bill-RTMP" set internet-service-id 4456464 next edit "Bill-NetBIOS.Name.Service" set internet-service-id 4456472 next edit "Shopify-Other" set internet-service-id 4521984 next edit "Shopify-Web" set internet-service-id 4521985 next edit "Shopify-ICMP" set internet-service-id 4521986 next edit "Shopify-DNS" set internet-service-id 4521987 next edit "Shopify-Outbound_Email" set internet-service-id 4521988 next edit "Shopify-SSH" set internet-service-id 4521990 next edit "Shopify-FTP" set internet-service-id 4521991 next edit "Shopify-NTP" set internet-service-id 4521992 next edit "Shopify-Inbound_Email" set internet-service-id 4521993 next edit "Shopify-LDAP" set internet-service-id 4521998 next edit "Shopify-NetBIOS.Session.Service" set internet-service-id 4521999 next edit "Shopify-RTMP" set internet-service-id 4522000 next edit "Shopify-NetBIOS.Name.Service" set internet-service-id 4522008 next edit "Shopify-Shopify" set internet-service-id 4522162 next edit "MuleSoft-Other" set internet-service-id 4587520 next edit "MuleSoft-Web" set internet-service-id 4587521 next edit "MuleSoft-ICMP" set internet-service-id 4587522 next edit "MuleSoft-DNS" set internet-service-id 4587523 next edit "MuleSoft-Outbound_Email" set internet-service-id 4587524 next edit "MuleSoft-SSH" set internet-service-id 4587526 next edit "MuleSoft-FTP" set internet-service-id 4587527 next edit "MuleSoft-NTP" set internet-service-id 4587528 next edit "MuleSoft-Inbound_Email" set internet-service-id 4587529 next edit "MuleSoft-LDAP" set internet-service-id 4587534 next edit "MuleSoft-NetBIOS.Session.Service" set internet-service-id 4587535 next edit "MuleSoft-RTMP" set internet-service-id 4587536 next edit "MuleSoft-NetBIOS.Name.Service" set internet-service-id 4587544 next edit "Cornerstone-Other" set internet-service-id 4653056 next edit "Cornerstone-Web" set internet-service-id 4653057 next edit "Cornerstone-ICMP" set internet-service-id 4653058 next edit "Cornerstone-DNS" set internet-service-id 4653059 next edit "Cornerstone-Outbound_Email" set internet-service-id 4653060 next edit "Cornerstone-SSH" set internet-service-id 4653062 next edit "Cornerstone-FTP" set internet-service-id 4653063 next edit "Cornerstone-NTP" set internet-service-id 4653064 next edit "Cornerstone-Inbound_Email" set internet-service-id 4653065 next edit "Cornerstone-LDAP" set internet-service-id 4653070 next edit "Cornerstone-NetBIOS.Session.Service" set internet-service-id 4653071 next edit "Cornerstone-RTMP" set internet-service-id 4653072 next edit "Cornerstone-NetBIOS.Name.Service" set internet-service-id 4653080 next edit "Eventbrite-Other" set internet-service-id 4718592 next edit "Eventbrite-Web" set internet-service-id 4718593 next edit "Eventbrite-ICMP" set internet-service-id 4718594 next edit "Eventbrite-DNS" set internet-service-id 4718595 next edit "Eventbrite-Outbound_Email" set internet-service-id 4718596 next edit "Eventbrite-SSH" set internet-service-id 4718598 next edit "Eventbrite-FTP" set internet-service-id 4718599 next edit "Eventbrite-NTP" set internet-service-id 4718600 next edit "Eventbrite-Inbound_Email" set internet-service-id 4718601 next edit "Eventbrite-LDAP" set internet-service-id 4718606 next edit "Eventbrite-NetBIOS.Session.Service" set internet-service-id 4718607 next edit "Eventbrite-RTMP" set internet-service-id 4718608 next edit "Eventbrite-NetBIOS.Name.Service" set internet-service-id 4718616 next edit "Paychex-Other" set internet-service-id 4784128 next edit "Paychex-Web" set internet-service-id 4784129 next edit "Paychex-ICMP" set internet-service-id 4784130 next edit "Paychex-DNS" set internet-service-id 4784131 next edit "Paychex-Outbound_Email" set internet-service-id 4784132 next edit "Paychex-SSH" set internet-service-id 4784134 next edit "Paychex-FTP" set internet-service-id 4784135 next edit "Paychex-NTP" set internet-service-id 4784136 next edit "Paychex-Inbound_Email" set internet-service-id 4784137 next edit "Paychex-LDAP" set internet-service-id 4784142 next edit "Paychex-NetBIOS.Session.Service" set internet-service-id 4784143 next edit "Paychex-RTMP" set internet-service-id 4784144 next edit "Paychex-NetBIOS.Name.Service" set internet-service-id 4784152 next edit "NewRelic-Other" set internet-service-id 4849664 next edit "NewRelic-Web" set internet-service-id 4849665 next edit "NewRelic-ICMP" set internet-service-id 4849666 next edit "NewRelic-DNS" set internet-service-id 4849667 next edit "NewRelic-Outbound_Email" set internet-service-id 4849668 next edit "NewRelic-SSH" set internet-service-id 4849670 next edit "NewRelic-FTP" set internet-service-id 4849671 next edit "NewRelic-NTP" set internet-service-id 4849672 next edit "NewRelic-Inbound_Email" set internet-service-id 4849673 next edit "NewRelic-LDAP" set internet-service-id 4849678 next edit "NewRelic-NetBIOS.Session.Service" set internet-service-id 4849679 next edit "NewRelic-RTMP" set internet-service-id 4849680 next edit "NewRelic-NetBIOS.Name.Service" set internet-service-id 4849688 next edit "Splunk-Other" set internet-service-id 4915200 next edit "Splunk-Web" set internet-service-id 4915201 next edit "Splunk-ICMP" set internet-service-id 4915202 next edit "Splunk-DNS" set internet-service-id 4915203 next edit "Splunk-Outbound_Email" set internet-service-id 4915204 next edit "Splunk-SSH" set internet-service-id 4915206 next edit "Splunk-FTP" set internet-service-id 4915207 next edit "Splunk-NTP" set internet-service-id 4915208 next edit "Splunk-Inbound_Email" set internet-service-id 4915209 next edit "Splunk-LDAP" set internet-service-id 4915214 next edit "Splunk-NetBIOS.Session.Service" set internet-service-id 4915215 next edit "Splunk-RTMP" set internet-service-id 4915216 next edit "Splunk-NetBIOS.Name.Service" set internet-service-id 4915224 next edit "Domo-Other" set internet-service-id 4980736 next edit "Domo-Web" set internet-service-id 4980737 next edit "Domo-ICMP" set internet-service-id 4980738 next edit "Domo-DNS" set internet-service-id 4980739 next edit "Domo-Outbound_Email" set internet-service-id 4980740 next edit "Domo-SSH" set internet-service-id 4980742 next edit "Domo-FTP" set internet-service-id 4980743 next edit "Domo-NTP" set internet-service-id 4980744 next edit "Domo-Inbound_Email" set internet-service-id 4980745 next edit "Domo-LDAP" set internet-service-id 4980750 next edit "Domo-NetBIOS.Session.Service" set internet-service-id 4980751 next edit "Domo-RTMP" set internet-service-id 4980752 next edit "Domo-NetBIOS.Name.Service" set internet-service-id 4980760 next edit "FreshBooks-Other" set internet-service-id 5046272 next edit "FreshBooks-Web" set internet-service-id 5046273 next edit "FreshBooks-ICMP" set internet-service-id 5046274 next edit "FreshBooks-DNS" set internet-service-id 5046275 next edit "FreshBooks-Outbound_Email" set internet-service-id 5046276 next edit "FreshBooks-SSH" set internet-service-id 5046278 next edit "FreshBooks-FTP" set internet-service-id 5046279 next edit "FreshBooks-NTP" set internet-service-id 5046280 next edit "FreshBooks-Inbound_Email" set internet-service-id 5046281 next edit "FreshBooks-LDAP" set internet-service-id 5046286 next edit "FreshBooks-NetBIOS.Session.Service" set internet-service-id 5046287 next edit "FreshBooks-RTMP" set internet-service-id 5046288 next edit "FreshBooks-NetBIOS.Name.Service" set internet-service-id 5046296 next edit "Tableau-Other" set internet-service-id 5111808 next edit "Tableau-Web" set internet-service-id 5111809 next edit "Tableau-ICMP" set internet-service-id 5111810 next edit "Tableau-DNS" set internet-service-id 5111811 next edit "Tableau-Outbound_Email" set internet-service-id 5111812 next edit "Tableau-SSH" set internet-service-id 5111814 next edit "Tableau-FTP" set internet-service-id 5111815 next edit "Tableau-NTP" set internet-service-id 5111816 next edit "Tableau-Inbound_Email" set internet-service-id 5111817 next edit "Tableau-LDAP" set internet-service-id 5111822 next edit "Tableau-NetBIOS.Session.Service" set internet-service-id 5111823 next edit "Tableau-RTMP" set internet-service-id 5111824 next edit "Tableau-NetBIOS.Name.Service" set internet-service-id 5111832 next edit "Druva-Other" set internet-service-id 5177344 next edit "Druva-Web" set internet-service-id 5177345 next edit "Druva-ICMP" set internet-service-id 5177346 next edit "Druva-DNS" set internet-service-id 5177347 next edit "Druva-Outbound_Email" set internet-service-id 5177348 next edit "Druva-SSH" set internet-service-id 5177350 next edit "Druva-FTP" set internet-service-id 5177351 next edit "Druva-NTP" set internet-service-id 5177352 next edit "Druva-Inbound_Email" set internet-service-id 5177353 next edit "Druva-LDAP" set internet-service-id 5177358 next edit "Druva-NetBIOS.Session.Service" set internet-service-id 5177359 next edit "Druva-RTMP" set internet-service-id 5177360 next edit "Druva-NetBIOS.Name.Service" set internet-service-id 5177368 next edit "Act-on-Other" set internet-service-id 5242880 next edit "Act-on-Web" set internet-service-id 5242881 next edit "Act-on-ICMP" set internet-service-id 5242882 next edit "Act-on-DNS" set internet-service-id 5242883 next edit "Act-on-Outbound_Email" set internet-service-id 5242884 next edit "Act-on-SSH" set internet-service-id 5242886 next edit "Act-on-FTP" set internet-service-id 5242887 next edit "Act-on-NTP" set internet-service-id 5242888 next edit "Act-on-Inbound_Email" set internet-service-id 5242889 next edit "Act-on-LDAP" set internet-service-id 5242894 next edit "Act-on-NetBIOS.Session.Service" set internet-service-id 5242895 next edit "Act-on-RTMP" set internet-service-id 5242896 next edit "Act-on-NetBIOS.Name.Service" set internet-service-id 5242904 next edit "GoodData-Other" set internet-service-id 5308416 next edit "GoodData-Web" set internet-service-id 5308417 next edit "GoodData-ICMP" set internet-service-id 5308418 next edit "GoodData-DNS" set internet-service-id 5308419 next edit "GoodData-Outbound_Email" set internet-service-id 5308420 next edit "GoodData-SSH" set internet-service-id 5308422 next edit "GoodData-FTP" set internet-service-id 5308423 next edit "GoodData-NTP" set internet-service-id 5308424 next edit "GoodData-Inbound_Email" set internet-service-id 5308425 next edit "GoodData-LDAP" set internet-service-id 5308430 next edit "GoodData-NetBIOS.Session.Service" set internet-service-id 5308431 next edit "GoodData-RTMP" set internet-service-id 5308432 next edit "GoodData-NetBIOS.Name.Service" set internet-service-id 5308440 next edit "SurveyMonkey-Other" set internet-service-id 5373952 next edit "SurveyMonkey-Web" set internet-service-id 5373953 next edit "SurveyMonkey-ICMP" set internet-service-id 5373954 next edit "SurveyMonkey-DNS" set internet-service-id 5373955 next edit "SurveyMonkey-Outbound_Email" set internet-service-id 5373956 next edit "SurveyMonkey-SSH" set internet-service-id 5373958 next edit "SurveyMonkey-FTP" set internet-service-id 5373959 next edit "SurveyMonkey-NTP" set internet-service-id 5373960 next edit "SurveyMonkey-Inbound_Email" set internet-service-id 5373961 next edit "SurveyMonkey-LDAP" set internet-service-id 5373966 next edit "SurveyMonkey-NetBIOS.Session.Service" set internet-service-id 5373967 next edit "SurveyMonkey-RTMP" set internet-service-id 5373968 next edit "SurveyMonkey-NetBIOS.Name.Service" set internet-service-id 5373976 next edit "Cvent-Other" set internet-service-id 5439488 next edit "Cvent-Web" set internet-service-id 5439489 next edit "Cvent-ICMP" set internet-service-id 5439490 next edit "Cvent-DNS" set internet-service-id 5439491 next edit "Cvent-Outbound_Email" set internet-service-id 5439492 next edit "Cvent-SSH" set internet-service-id 5439494 next edit "Cvent-FTP" set internet-service-id 5439495 next edit "Cvent-NTP" set internet-service-id 5439496 next edit "Cvent-Inbound_Email" set internet-service-id 5439497 next edit "Cvent-LDAP" set internet-service-id 5439502 next edit "Cvent-NetBIOS.Session.Service" set internet-service-id 5439503 next edit "Cvent-RTMP" set internet-service-id 5439504 next edit "Cvent-NetBIOS.Name.Service" set internet-service-id 5439512 next edit "Blackbaud-Other" set internet-service-id 5505024 next edit "Blackbaud-Web" set internet-service-id 5505025 next edit "Blackbaud-ICMP" set internet-service-id 5505026 next edit "Blackbaud-DNS" set internet-service-id 5505027 next edit "Blackbaud-Outbound_Email" set internet-service-id 5505028 next edit "Blackbaud-SSH" set internet-service-id 5505030 next edit "Blackbaud-FTP" set internet-service-id 5505031 next edit "Blackbaud-NTP" set internet-service-id 5505032 next edit "Blackbaud-Inbound_Email" set internet-service-id 5505033 next edit "Blackbaud-LDAP" set internet-service-id 5505038 next edit "Blackbaud-NetBIOS.Session.Service" set internet-service-id 5505039 next edit "Blackbaud-RTMP" set internet-service-id 5505040 next edit "Blackbaud-NetBIOS.Name.Service" set internet-service-id 5505048 next edit "InsideSales-Other" set internet-service-id 5570560 next edit "InsideSales-Web" set internet-service-id 5570561 next edit "InsideSales-ICMP" set internet-service-id 5570562 next edit "InsideSales-DNS" set internet-service-id 5570563 next edit "InsideSales-Outbound_Email" set internet-service-id 5570564 next edit "InsideSales-SSH" set internet-service-id 5570566 next edit "InsideSales-FTP" set internet-service-id 5570567 next edit "InsideSales-NTP" set internet-service-id 5570568 next edit "InsideSales-Inbound_Email" set internet-service-id 5570569 next edit "InsideSales-LDAP" set internet-service-id 5570574 next edit "InsideSales-NetBIOS.Session.Service" set internet-service-id 5570575 next edit "InsideSales-RTMP" set internet-service-id 5570576 next edit "InsideSales-NetBIOS.Name.Service" set internet-service-id 5570584 next edit "ServiceMax-Other" set internet-service-id 5636096 next edit "ServiceMax-Web" set internet-service-id 5636097 next edit "ServiceMax-ICMP" set internet-service-id 5636098 next edit "ServiceMax-DNS" set internet-service-id 5636099 next edit "ServiceMax-Outbound_Email" set internet-service-id 5636100 next edit "ServiceMax-SSH" set internet-service-id 5636102 next edit "ServiceMax-FTP" set internet-service-id 5636103 next edit "ServiceMax-NTP" set internet-service-id 5636104 next edit "ServiceMax-Inbound_Email" set internet-service-id 5636105 next edit "ServiceMax-LDAP" set internet-service-id 5636110 next edit "ServiceMax-NetBIOS.Session.Service" set internet-service-id 5636111 next edit "ServiceMax-RTMP" set internet-service-id 5636112 next edit "ServiceMax-NetBIOS.Name.Service" set internet-service-id 5636120 next edit "Apptio-Other" set internet-service-id 5701632 next edit "Apptio-Web" set internet-service-id 5701633 next edit "Apptio-ICMP" set internet-service-id 5701634 next edit "Apptio-DNS" set internet-service-id 5701635 next edit "Apptio-Outbound_Email" set internet-service-id 5701636 next edit "Apptio-SSH" set internet-service-id 5701638 next edit "Apptio-FTP" set internet-service-id 5701639 next edit "Apptio-NTP" set internet-service-id 5701640 next edit "Apptio-Inbound_Email" set internet-service-id 5701641 next edit "Apptio-LDAP" set internet-service-id 5701646 next edit "Apptio-NetBIOS.Session.Service" set internet-service-id 5701647 next edit "Apptio-RTMP" set internet-service-id 5701648 next edit "Apptio-NetBIOS.Name.Service" set internet-service-id 5701656 next edit "Veracode-Other" set internet-service-id 5767168 next edit "Veracode-Web" set internet-service-id 5767169 next edit "Veracode-ICMP" set internet-service-id 5767170 next edit "Veracode-DNS" set internet-service-id 5767171 next edit "Veracode-Outbound_Email" set internet-service-id 5767172 next edit "Veracode-SSH" set internet-service-id 5767174 next edit "Veracode-FTP" set internet-service-id 5767175 next edit "Veracode-NTP" set internet-service-id 5767176 next edit "Veracode-Inbound_Email" set internet-service-id 5767177 next edit "Veracode-LDAP" set internet-service-id 5767182 next edit "Veracode-NetBIOS.Session.Service" set internet-service-id 5767183 next edit "Veracode-RTMP" set internet-service-id 5767184 next edit "Veracode-NetBIOS.Name.Service" set internet-service-id 5767192 next edit "Anaplan-Other" set internet-service-id 5832704 next edit "Anaplan-Web" set internet-service-id 5832705 next edit "Anaplan-ICMP" set internet-service-id 5832706 next edit "Anaplan-DNS" set internet-service-id 5832707 next edit "Anaplan-Outbound_Email" set internet-service-id 5832708 next edit "Anaplan-SSH" set internet-service-id 5832710 next edit "Anaplan-FTP" set internet-service-id 5832711 next edit "Anaplan-NTP" set internet-service-id 5832712 next edit "Anaplan-Inbound_Email" set internet-service-id 5832713 next edit "Anaplan-LDAP" set internet-service-id 5832718 next edit "Anaplan-NetBIOS.Session.Service" set internet-service-id 5832719 next edit "Anaplan-RTMP" set internet-service-id 5832720 next edit "Anaplan-NetBIOS.Name.Service" set internet-service-id 5832728 next edit "Rapid7-Other" set internet-service-id 5898240 next edit "Rapid7-Web" set internet-service-id 5898241 next edit "Rapid7-ICMP" set internet-service-id 5898242 next edit "Rapid7-DNS" set internet-service-id 5898243 next edit "Rapid7-Outbound_Email" set internet-service-id 5898244 next edit "Rapid7-SSH" set internet-service-id 5898246 next edit "Rapid7-FTP" set internet-service-id 5898247 next edit "Rapid7-NTP" set internet-service-id 5898248 next edit "Rapid7-Inbound_Email" set internet-service-id 5898249 next edit "Rapid7-LDAP" set internet-service-id 5898254 next edit "Rapid7-NetBIOS.Session.Service" set internet-service-id 5898255 next edit "Rapid7-RTMP" set internet-service-id 5898256 next edit "Rapid7-NetBIOS.Name.Service" set internet-service-id 5898264 next edit "AnyDesk-AnyDesk" set internet-service-id 5963927 next edit "ESET-Eset.Service" set internet-service-id 6029426 next edit "Slack-Other" set internet-service-id 6094848 next edit "Slack-Web" set internet-service-id 6094849 next edit "Slack-ICMP" set internet-service-id 6094850 next edit "Slack-DNS" set internet-service-id 6094851 next edit "Slack-Outbound_Email" set internet-service-id 6094852 next edit "Slack-SSH" set internet-service-id 6094854 next edit "Slack-FTP" set internet-service-id 6094855 next edit "Slack-NTP" set internet-service-id 6094856 next edit "Slack-Inbound_Email" set internet-service-id 6094857 next edit "Slack-LDAP" set internet-service-id 6094862 next edit "Slack-NetBIOS.Session.Service" set internet-service-id 6094863 next edit "Slack-RTMP" set internet-service-id 6094864 next edit "Slack-NetBIOS.Name.Service" set internet-service-id 6094872 next edit "Slack-Slack" set internet-service-id 6095024 next edit "ADP-Other" set internet-service-id 6160384 next edit "ADP-Web" set internet-service-id 6160385 next edit "ADP-ICMP" set internet-service-id 6160386 next edit "ADP-DNS" set internet-service-id 6160387 next edit "ADP-Outbound_Email" set internet-service-id 6160388 next edit "ADP-SSH" set internet-service-id 6160390 next edit "ADP-FTP" set internet-service-id 6160391 next edit "ADP-NTP" set internet-service-id 6160392 next edit "ADP-Inbound_Email" set internet-service-id 6160393 next edit "ADP-LDAP" set internet-service-id 6160398 next edit "ADP-NetBIOS.Session.Service" set internet-service-id 6160399 next edit "ADP-RTMP" set internet-service-id 6160400 next edit "ADP-NetBIOS.Name.Service" set internet-service-id 6160408 next edit "Blackboard-Other" set internet-service-id 6225920 next edit "Blackboard-Web" set internet-service-id 6225921 next edit "Blackboard-ICMP" set internet-service-id 6225922 next edit "Blackboard-DNS" set internet-service-id 6225923 next edit "Blackboard-Outbound_Email" set internet-service-id 6225924 next edit "Blackboard-SSH" set internet-service-id 6225926 next edit "Blackboard-FTP" set internet-service-id 6225927 next edit "Blackboard-NTP" set internet-service-id 6225928 next edit "Blackboard-Inbound_Email" set internet-service-id 6225929 next edit "Blackboard-LDAP" set internet-service-id 6225934 next edit "Blackboard-NetBIOS.Session.Service" set internet-service-id 6225935 next edit "Blackboard-RTMP" set internet-service-id 6225936 next edit "Blackboard-NetBIOS.Name.Service" set internet-service-id 6225944 next edit "SAP-Other" set internet-service-id 6291456 next edit "SAP-Web" set internet-service-id 6291457 next edit "SAP-ICMP" set internet-service-id 6291458 next edit "SAP-DNS" set internet-service-id 6291459 next edit "SAP-Outbound_Email" set internet-service-id 6291460 next edit "SAP-SSH" set internet-service-id 6291462 next edit "SAP-FTP" set internet-service-id 6291463 next edit "SAP-NTP" set internet-service-id 6291464 next edit "SAP-Inbound_Email" set internet-service-id 6291465 next edit "SAP-LDAP" set internet-service-id 6291470 next edit "SAP-NetBIOS.Session.Service" set internet-service-id 6291471 next edit "SAP-RTMP" set internet-service-id 6291472 next edit "SAP-NetBIOS.Name.Service" set internet-service-id 6291480 next edit "SAP-HANA" set internet-service-id 6291612 next edit "SAP-SuccessFactors" set internet-service-id 6291618 next edit "Snap-Snapchat" set internet-service-id 6357108 next edit "Zoom.us-Zoom.Meeting" set internet-service-id 6422646 next edit "Sophos-Other" set internet-service-id 6488064 next edit "Sophos-Web" set internet-service-id 6488065 next edit "Sophos-ICMP" set internet-service-id 6488066 next edit "Sophos-DNS" set internet-service-id 6488067 next edit "Sophos-Outbound_Email" set internet-service-id 6488068 next edit "Sophos-SSH" set internet-service-id 6488070 next edit "Sophos-FTP" set internet-service-id 6488071 next edit "Sophos-NTP" set internet-service-id 6488072 next edit "Sophos-Inbound_Email" set internet-service-id 6488073 next edit "Sophos-LDAP" set internet-service-id 6488078 next edit "Sophos-NetBIOS.Session.Service" set internet-service-id 6488079 next edit "Sophos-RTMP" set internet-service-id 6488080 next edit "Sophos-NetBIOS.Name.Service" set internet-service-id 6488088 next edit "Cloudflare-Other" set internet-service-id 6553600 next edit "Cloudflare-Web" set internet-service-id 6553601 next edit "Cloudflare-ICMP" set internet-service-id 6553602 next edit "Cloudflare-DNS" set internet-service-id 6553603 next edit "Cloudflare-Outbound_Email" set internet-service-id 6553604 next edit "Cloudflare-SSH" set internet-service-id 6553606 next edit "Cloudflare-FTP" set internet-service-id 6553607 next edit "Cloudflare-NTP" set internet-service-id 6553608 next edit "Cloudflare-Inbound_Email" set internet-service-id 6553609 next edit "Cloudflare-LDAP" set internet-service-id 6553614 next edit "Cloudflare-NetBIOS.Session.Service" set internet-service-id 6553615 next edit "Cloudflare-RTMP" set internet-service-id 6553616 next edit "Cloudflare-NetBIOS.Name.Service" set internet-service-id 6553624 next edit "Cloudflare-CDN" set internet-service-id 6553737 next edit "Pexip-Pexip.Meeting" set internet-service-id 6619256 next edit "Zscaler-Other" set internet-service-id 6684672 next edit "Zscaler-Web" set internet-service-id 6684673 next edit "Zscaler-ICMP" set internet-service-id 6684674 next edit "Zscaler-DNS" set internet-service-id 6684675 next edit "Zscaler-Outbound_Email" set internet-service-id 6684676 next edit "Zscaler-SSH" set internet-service-id 6684678 next edit "Zscaler-FTP" set internet-service-id 6684679 next edit "Zscaler-NTP" set internet-service-id 6684680 next edit "Zscaler-Inbound_Email" set internet-service-id 6684681 next edit "Zscaler-LDAP" set internet-service-id 6684686 next edit "Zscaler-NetBIOS.Session.Service" set internet-service-id 6684687 next edit "Zscaler-RTMP" set internet-service-id 6684688 next edit "Zscaler-NetBIOS.Name.Service" set internet-service-id 6684696 next edit "Zscaler-Zscaler.Cloud" set internet-service-id 6684793 next edit "Yandex-Other" set internet-service-id 6750208 next edit "Yandex-Web" set internet-service-id 6750209 next edit "Yandex-ICMP" set internet-service-id 6750210 next edit "Yandex-DNS" set internet-service-id 6750211 next edit "Yandex-Outbound_Email" set internet-service-id 6750212 next edit "Yandex-SSH" set internet-service-id 6750214 next edit "Yandex-FTP" set internet-service-id 6750215 next edit "Yandex-NTP" set internet-service-id 6750216 next edit "Yandex-Inbound_Email" set internet-service-id 6750217 next edit "Yandex-LDAP" set internet-service-id 6750222 next edit "Yandex-NetBIOS.Session.Service" set internet-service-id 6750223 next edit "Yandex-RTMP" set internet-service-id 6750224 next edit "Yandex-NetBIOS.Name.Service" set internet-service-id 6750232 next edit "mail.ru-Other" set internet-service-id 6815744 next edit "mail.ru-Web" set internet-service-id 6815745 next edit "mail.ru-ICMP" set internet-service-id 6815746 next edit "mail.ru-DNS" set internet-service-id 6815747 next edit "mail.ru-Outbound_Email" set internet-service-id 6815748 next edit "mail.ru-SSH" set internet-service-id 6815750 next edit "mail.ru-FTP" set internet-service-id 6815751 next edit "mail.ru-NTP" set internet-service-id 6815752 next edit "mail.ru-Inbound_Email" set internet-service-id 6815753 next edit "mail.ru-LDAP" set internet-service-id 6815758 next edit "mail.ru-NetBIOS.Session.Service" set internet-service-id 6815759 next edit "mail.ru-RTMP" set internet-service-id 6815760 next edit "mail.ru-NetBIOS.Name.Service" set internet-service-id 6815768 next edit "Alibaba-Other" set internet-service-id 6881280 next edit "Alibaba-Web" set internet-service-id 6881281 next edit "Alibaba-ICMP" set internet-service-id 6881282 next edit "Alibaba-DNS" set internet-service-id 6881283 next edit "Alibaba-Outbound_Email" set internet-service-id 6881284 next edit "Alibaba-SSH" set internet-service-id 6881286 next edit "Alibaba-FTP" set internet-service-id 6881287 next edit "Alibaba-NTP" set internet-service-id 6881288 next edit "Alibaba-Inbound_Email" set internet-service-id 6881289 next edit "Alibaba-LDAP" set internet-service-id 6881294 next edit "Alibaba-NetBIOS.Session.Service" set internet-service-id 6881295 next edit "Alibaba-RTMP" set internet-service-id 6881296 next edit "Alibaba-NetBIOS.Name.Service" set internet-service-id 6881304 next edit "Alibaba-Alibaba.Cloud" set internet-service-id 6881402 next edit "GoDaddy-Other" set internet-service-id 6946816 next edit "GoDaddy-Web" set internet-service-id 6946817 next edit "GoDaddy-ICMP" set internet-service-id 6946818 next edit "GoDaddy-DNS" set internet-service-id 6946819 next edit "GoDaddy-Outbound_Email" set internet-service-id 6946820 next edit "GoDaddy-SSH" set internet-service-id 6946822 next edit "GoDaddy-FTP" set internet-service-id 6946823 next edit "GoDaddy-NTP" set internet-service-id 6946824 next edit "GoDaddy-Inbound_Email" set internet-service-id 6946825 next edit "GoDaddy-LDAP" set internet-service-id 6946830 next edit "GoDaddy-NetBIOS.Session.Service" set internet-service-id 6946831 next edit "GoDaddy-RTMP" set internet-service-id 6946832 next edit "GoDaddy-NetBIOS.Name.Service" set internet-service-id 6946840 next edit "GoDaddy-GoDaddy.Email" set internet-service-id 6946939 next edit "Bluejeans-Other" set internet-service-id 7012352 next edit "Bluejeans-Web" set internet-service-id 7012353 next edit "Bluejeans-ICMP" set internet-service-id 7012354 next edit "Bluejeans-DNS" set internet-service-id 7012355 next edit "Bluejeans-Outbound_Email" set internet-service-id 7012356 next edit "Bluejeans-SSH" set internet-service-id 7012358 next edit "Bluejeans-FTP" set internet-service-id 7012359 next edit "Bluejeans-NTP" set internet-service-id 7012360 next edit "Bluejeans-Inbound_Email" set internet-service-id 7012361 next edit "Bluejeans-LDAP" set internet-service-id 7012366 next edit "Bluejeans-NetBIOS.Session.Service" set internet-service-id 7012367 next edit "Bluejeans-RTMP" set internet-service-id 7012368 next edit "Bluejeans-NetBIOS.Name.Service" set internet-service-id 7012376 next edit "Bluejeans-Bluejeans.Meeting" set internet-service-id 7012476 next edit "Webroot-Webroot.SecureAnywhere" set internet-service-id 7078013 next edit "Avast-Other" set internet-service-id 7143424 next edit "Avast-Web" set internet-service-id 7143425 next edit "Avast-ICMP" set internet-service-id 7143426 next edit "Avast-DNS" set internet-service-id 7143427 next edit "Avast-Outbound_Email" set internet-service-id 7143428 next edit "Avast-SSH" set internet-service-id 7143430 next edit "Avast-FTP" set internet-service-id 7143431 next edit "Avast-NTP" set internet-service-id 7143432 next edit "Avast-Inbound_Email" set internet-service-id 7143433 next edit "Avast-LDAP" set internet-service-id 7143438 next edit "Avast-NetBIOS.Session.Service" set internet-service-id 7143439 next edit "Avast-RTMP" set internet-service-id 7143440 next edit "Avast-NetBIOS.Name.Service" set internet-service-id 7143448 next edit "Avast-Avast.Security" set internet-service-id 7143550 next edit "Wetransfer-Other" set internet-service-id 7208960 next edit "Wetransfer-Web" set internet-service-id 7208961 next edit "Wetransfer-ICMP" set internet-service-id 7208962 next edit "Wetransfer-DNS" set internet-service-id 7208963 next edit "Wetransfer-Outbound_Email" set internet-service-id 7208964 next edit "Wetransfer-SSH" set internet-service-id 7208966 next edit "Wetransfer-FTP" set internet-service-id 7208967 next edit "Wetransfer-NTP" set internet-service-id 7208968 next edit "Wetransfer-Inbound_Email" set internet-service-id 7208969 next edit "Wetransfer-LDAP" set internet-service-id 7208974 next edit "Wetransfer-NetBIOS.Session.Service" set internet-service-id 7208975 next edit "Wetransfer-RTMP" set internet-service-id 7208976 next edit "Wetransfer-NetBIOS.Name.Service" set internet-service-id 7208984 next edit "Sendgrid-Sendgrid.Email" set internet-service-id 7274623 next edit "Ubiquiti-UniFi" set internet-service-id 7340160 next edit "Lifesize-Lifesize.Cloud" set internet-service-id 7405697 next edit "Okta-Other" set internet-service-id 7471104 next edit "Okta-Web" set internet-service-id 7471105 next edit "Okta-ICMP" set internet-service-id 7471106 next edit "Okta-DNS" set internet-service-id 7471107 next edit "Okta-Outbound_Email" set internet-service-id 7471108 next edit "Okta-SSH" set internet-service-id 7471110 next edit "Okta-FTP" set internet-service-id 7471111 next edit "Okta-NTP" set internet-service-id 7471112 next edit "Okta-Inbound_Email" set internet-service-id 7471113 next edit "Okta-LDAP" set internet-service-id 7471118 next edit "Okta-NetBIOS.Session.Service" set internet-service-id 7471119 next edit "Okta-RTMP" set internet-service-id 7471120 next edit "Okta-NetBIOS.Name.Service" set internet-service-id 7471128 next edit "Okta-Okta" set internet-service-id 7471307 next edit "Cybozu-Other" set internet-service-id 7536640 next edit "Cybozu-Web" set internet-service-id 7536641 next edit "Cybozu-ICMP" set internet-service-id 7536642 next edit "Cybozu-DNS" set internet-service-id 7536643 next edit "Cybozu-Outbound_Email" set internet-service-id 7536644 next edit "Cybozu-SSH" set internet-service-id 7536646 next edit "Cybozu-FTP" set internet-service-id 7536647 next edit "Cybozu-NTP" set internet-service-id 7536648 next edit "Cybozu-Inbound_Email" set internet-service-id 7536649 next edit "Cybozu-LDAP" set internet-service-id 7536654 next edit "Cybozu-NetBIOS.Session.Service" set internet-service-id 7536655 next edit "Cybozu-RTMP" set internet-service-id 7536656 next edit "Cybozu-NetBIOS.Name.Service" set internet-service-id 7536664 next edit "VNC-Other" set internet-service-id 7602176 next edit "VNC-Web" set internet-service-id 7602177 next edit "VNC-ICMP" set internet-service-id 7602178 next edit "VNC-DNS" set internet-service-id 7602179 next edit "VNC-Outbound_Email" set internet-service-id 7602180 next edit "VNC-SSH" set internet-service-id 7602182 next edit "VNC-FTP" set internet-service-id 7602183 next edit "VNC-NTP" set internet-service-id 7602184 next edit "VNC-Inbound_Email" set internet-service-id 7602185 next edit "VNC-LDAP" set internet-service-id 7602190 next edit "VNC-NetBIOS.Session.Service" set internet-service-id 7602191 next edit "VNC-RTMP" set internet-service-id 7602192 next edit "VNC-NetBIOS.Name.Service" set internet-service-id 7602200 next edit "Egnyte-Egnyte" set internet-service-id 7667846 next edit "CrowdStrike-CrowdStrike.Falcon.Cloud" set internet-service-id 7733383 next edit "Aruba.it-Other" set internet-service-id 7798784 next edit "Aruba.it-Web" set internet-service-id 7798785 next edit "Aruba.it-ICMP" set internet-service-id 7798786 next edit "Aruba.it-DNS" set internet-service-id 7798787 next edit "Aruba.it-Outbound_Email" set internet-service-id 7798788 next edit "Aruba.it-SSH" set internet-service-id 7798790 next edit "Aruba.it-FTP" set internet-service-id 7798791 next edit "Aruba.it-NTP" set internet-service-id 7798792 next edit "Aruba.it-Inbound_Email" set internet-service-id 7798793 next edit "Aruba.it-LDAP" set internet-service-id 7798798 next edit "Aruba.it-NetBIOS.Session.Service" set internet-service-id 7798799 next edit "Aruba.it-RTMP" set internet-service-id 7798800 next edit "Aruba.it-NetBIOS.Name.Service" set internet-service-id 7798808 next edit "ISLOnline-Other" set internet-service-id 7864320 next edit "ISLOnline-Web" set internet-service-id 7864321 next edit "ISLOnline-ICMP" set internet-service-id 7864322 next edit "ISLOnline-DNS" set internet-service-id 7864323 next edit "ISLOnline-Outbound_Email" set internet-service-id 7864324 next edit "ISLOnline-SSH" set internet-service-id 7864326 next edit "ISLOnline-FTP" set internet-service-id 7864327 next edit "ISLOnline-NTP" set internet-service-id 7864328 next edit "ISLOnline-Inbound_Email" set internet-service-id 7864329 next edit "ISLOnline-LDAP" set internet-service-id 7864334 next edit "ISLOnline-NetBIOS.Session.Service" set internet-service-id 7864335 next edit "ISLOnline-RTMP" set internet-service-id 7864336 next edit "ISLOnline-NetBIOS.Name.Service" set internet-service-id 7864344 next edit "Akamai-CDN" set internet-service-id 7929993 next edit "Akamai-Linode.Cloud" set internet-service-id 7930148 next edit "Rackspace-CDN" set internet-service-id 7995529 next edit "Instart-CDN" set internet-service-id 8061065 next edit "Bitdefender-Other" set internet-service-id 8126464 next edit "Bitdefender-Web" set internet-service-id 8126465 next edit "Bitdefender-ICMP" set internet-service-id 8126466 next edit "Bitdefender-DNS" set internet-service-id 8126467 next edit "Bitdefender-Outbound_Email" set internet-service-id 8126468 next edit "Bitdefender-SSH" set internet-service-id 8126470 next edit "Bitdefender-FTP" set internet-service-id 8126471 next edit "Bitdefender-NTP" set internet-service-id 8126472 next edit "Bitdefender-Inbound_Email" set internet-service-id 8126473 next edit "Bitdefender-LDAP" set internet-service-id 8126478 next edit "Bitdefender-NetBIOS.Session.Service" set internet-service-id 8126479 next edit "Bitdefender-RTMP" set internet-service-id 8126480 next edit "Bitdefender-NetBIOS.Name.Service" set internet-service-id 8126488 next edit "Pingdom-Other" set internet-service-id 8192000 next edit "Pingdom-Web" set internet-service-id 8192001 next edit "Pingdom-ICMP" set internet-service-id 8192002 next edit "Pingdom-DNS" set internet-service-id 8192003 next edit "Pingdom-Outbound_Email" set internet-service-id 8192004 next edit "Pingdom-SSH" set internet-service-id 8192006 next edit "Pingdom-FTP" set internet-service-id 8192007 next edit "Pingdom-NTP" set internet-service-id 8192008 next edit "Pingdom-Inbound_Email" set internet-service-id 8192009 next edit "Pingdom-LDAP" set internet-service-id 8192014 next edit "Pingdom-NetBIOS.Session.Service" set internet-service-id 8192015 next edit "Pingdom-RTMP" set internet-service-id 8192016 next edit "Pingdom-NetBIOS.Name.Service" set internet-service-id 8192024 next edit "UptimeRobot-Other" set internet-service-id 8257536 next edit "UptimeRobot-Web" set internet-service-id 8257537 next edit "UptimeRobot-ICMP" set internet-service-id 8257538 next edit "UptimeRobot-DNS" set internet-service-id 8257539 next edit "UptimeRobot-Outbound_Email" set internet-service-id 8257540 next edit "UptimeRobot-SSH" set internet-service-id 8257542 next edit "UptimeRobot-FTP" set internet-service-id 8257543 next edit "UptimeRobot-NTP" set internet-service-id 8257544 next edit "UptimeRobot-Inbound_Email" set internet-service-id 8257545 next edit "UptimeRobot-LDAP" set internet-service-id 8257550 next edit "UptimeRobot-NetBIOS.Session.Service" set internet-service-id 8257551 next edit "UptimeRobot-RTMP" set internet-service-id 8257552 next edit "UptimeRobot-NetBIOS.Name.Service" set internet-service-id 8257560 next edit "UptimeRobot-UptimeRobot.Monitor" set internet-service-id 8257709 next edit "Quovadisglobal-Other" set internet-service-id 8323072 next edit "Quovadisglobal-Web" set internet-service-id 8323073 next edit "Quovadisglobal-ICMP" set internet-service-id 8323074 next edit "Quovadisglobal-DNS" set internet-service-id 8323075 next edit "Quovadisglobal-Outbound_Email" set internet-service-id 8323076 next edit "Quovadisglobal-SSH" set internet-service-id 8323078 next edit "Quovadisglobal-FTP" set internet-service-id 8323079 next edit "Quovadisglobal-NTP" set internet-service-id 8323080 next edit "Quovadisglobal-Inbound_Email" set internet-service-id 8323081 next edit "Quovadisglobal-LDAP" set internet-service-id 8323086 next edit "Quovadisglobal-NetBIOS.Session.Service" set internet-service-id 8323087 next edit "Quovadisglobal-RTMP" set internet-service-id 8323088 next edit "Quovadisglobal-NetBIOS.Name.Service" set internet-service-id 8323096 next edit "Splashtop-Splashtop" set internet-service-id 8388751 next edit "Zoox-Other" set internet-service-id 8454144 next edit "Zoox-Web" set internet-service-id 8454145 next edit "Zoox-ICMP" set internet-service-id 8454146 next edit "Zoox-DNS" set internet-service-id 8454147 next edit "Zoox-Outbound_Email" set internet-service-id 8454148 next edit "Zoox-SSH" set internet-service-id 8454150 next edit "Zoox-FTP" set internet-service-id 8454151 next edit "Zoox-NTP" set internet-service-id 8454152 next edit "Zoox-Inbound_Email" set internet-service-id 8454153 next edit "Zoox-LDAP" set internet-service-id 8454158 next edit "Zoox-NetBIOS.Session.Service" set internet-service-id 8454159 next edit "Zoox-RTMP" set internet-service-id 8454160 next edit "Zoox-NetBIOS.Name.Service" set internet-service-id 8454168 next edit "Skyfii-Other" set internet-service-id 8519680 next edit "Skyfii-Web" set internet-service-id 8519681 next edit "Skyfii-ICMP" set internet-service-id 8519682 next edit "Skyfii-DNS" set internet-service-id 8519683 next edit "Skyfii-Outbound_Email" set internet-service-id 8519684 next edit "Skyfii-SSH" set internet-service-id 8519686 next edit "Skyfii-FTP" set internet-service-id 8519687 next edit "Skyfii-NTP" set internet-service-id 8519688 next edit "Skyfii-Inbound_Email" set internet-service-id 8519689 next edit "Skyfii-LDAP" set internet-service-id 8519694 next edit "Skyfii-NetBIOS.Session.Service" set internet-service-id 8519695 next edit "Skyfii-RTMP" set internet-service-id 8519696 next edit "Skyfii-NetBIOS.Name.Service" set internet-service-id 8519704 next edit "CoffeeBean-Other" set internet-service-id 8585216 next edit "CoffeeBean-Web" set internet-service-id 8585217 next edit "CoffeeBean-ICMP" set internet-service-id 8585218 next edit "CoffeeBean-DNS" set internet-service-id 8585219 next edit "CoffeeBean-Outbound_Email" set internet-service-id 8585220 next edit "CoffeeBean-SSH" set internet-service-id 8585222 next edit "CoffeeBean-FTP" set internet-service-id 8585223 next edit "CoffeeBean-NTP" set internet-service-id 8585224 next edit "CoffeeBean-Inbound_Email" set internet-service-id 8585225 next edit "CoffeeBean-LDAP" set internet-service-id 8585230 next edit "CoffeeBean-NetBIOS.Session.Service" set internet-service-id 8585231 next edit "CoffeeBean-RTMP" set internet-service-id 8585232 next edit "CoffeeBean-NetBIOS.Name.Service" set internet-service-id 8585240 next edit "Cloud4Wi-Other" set internet-service-id 8650752 next edit "Cloud4Wi-Web" set internet-service-id 8650753 next edit "Cloud4Wi-ICMP" set internet-service-id 8650754 next edit "Cloud4Wi-DNS" set internet-service-id 8650755 next edit "Cloud4Wi-Outbound_Email" set internet-service-id 8650756 next edit "Cloud4Wi-SSH" set internet-service-id 8650758 next edit "Cloud4Wi-FTP" set internet-service-id 8650759 next edit "Cloud4Wi-NTP" set internet-service-id 8650760 next edit "Cloud4Wi-Inbound_Email" set internet-service-id 8650761 next edit "Cloud4Wi-LDAP" set internet-service-id 8650766 next edit "Cloud4Wi-NetBIOS.Session.Service" set internet-service-id 8650767 next edit "Cloud4Wi-RTMP" set internet-service-id 8650768 next edit "Cloud4Wi-NetBIOS.Name.Service" set internet-service-id 8650776 next edit "Panda-Panda.Security" set internet-service-id 8716432 next edit "Ewon-Talk2M" set internet-service-id 8781970 next edit "Nutanix-Nutanix.Cloud" set internet-service-id 8847507 next edit "Backblaze-Other" set internet-service-id 8912896 next edit "Backblaze-Web" set internet-service-id 8912897 next edit "Backblaze-ICMP" set internet-service-id 8912898 next edit "Backblaze-DNS" set internet-service-id 8912899 next edit "Backblaze-Outbound_Email" set internet-service-id 8912900 next edit "Backblaze-SSH" set internet-service-id 8912902 next edit "Backblaze-FTP" set internet-service-id 8912903 next edit "Backblaze-NTP" set internet-service-id 8912904 next edit "Backblaze-Inbound_Email" set internet-service-id 8912905 next edit "Backblaze-LDAP" set internet-service-id 8912910 next edit "Backblaze-NetBIOS.Session.Service" set internet-service-id 8912911 next edit "Backblaze-RTMP" set internet-service-id 8912912 next edit "Backblaze-NetBIOS.Name.Service" set internet-service-id 8912920 next edit "Extreme-Extreme.Cloud" set internet-service-id 8978580 next edit "XING-Other" set internet-service-id 9043968 next edit "XING-Web" set internet-service-id 9043969 next edit "XING-ICMP" set internet-service-id 9043970 next edit "XING-DNS" set internet-service-id 9043971 next edit "XING-Outbound_Email" set internet-service-id 9043972 next edit "XING-SSH" set internet-service-id 9043974 next edit "XING-FTP" set internet-service-id 9043975 next edit "XING-NTP" set internet-service-id 9043976 next edit "XING-Inbound_Email" set internet-service-id 9043977 next edit "XING-LDAP" set internet-service-id 9043982 next edit "XING-NetBIOS.Session.Service" set internet-service-id 9043983 next edit "XING-RTMP" set internet-service-id 9043984 next edit "XING-NetBIOS.Name.Service" set internet-service-id 9043992 next edit "Genesys-PureCloud" set internet-service-id 9109653 next edit "BlackBerry-Cylance" set internet-service-id 9175190 next edit "DigiCert-OCSP" set internet-service-id 9240728 next edit "Infomaniak-SwissTransfer" set internet-service-id 9306265 next edit "Fuze-Fuze" set internet-service-id 9371802 next edit "Truecaller-Truecaller" set internet-service-id 9437339 next edit "GlobalSign-OCSP" set internet-service-id 9502872 next edit "VeriSign-OCSP" set internet-service-id 9568408 next edit "Sony-PlayStation.Network" set internet-service-id 9633952 next edit "Acronis-Cyber.Cloud" set internet-service-id 9699489 next edit "RingCentral-RingCentral" set internet-service-id 9765027 next edit "FSecure-FSecure" set internet-service-id 9830564 next edit "Kaseya-Kaseya.Cloud" set internet-service-id 9896101 next edit "Shodan-Scanner" set internet-service-id 9961638 next edit "Censys-Scanner" set internet-service-id 10027174 next edit "Valve-Steam" set internet-service-id 10092711 next edit "YouSeeU-Bongo" set internet-service-id 10158248 next edit "Cato-Cato.Cloud" set internet-service-id 10223785 next edit "SolarWinds-SpamExperts" set internet-service-id 10289323 next edit "SolarWinds-Pingdom.Probe" set internet-service-id 10289326 next edit "SolarWinds-SolarWinds.RMM" set internet-service-id 10289379 next edit "8X8-8X8.Cloud" set internet-service-id 10354860 next edit "Zattoo-Zattoo.TV" set internet-service-id 10420401 next edit "Datto-Datto.RMM" set internet-service-id 10485939 next edit "Barracuda-Barracuda.Cloud" set internet-service-id 10551477 next edit "Naver-Line" set internet-service-id 10617015 next edit "Disney-Disney+" set internet-service-id 10682552 next edit "DNS-DoH_DoT" set internet-service-id 10748089 next edit "DNS-Root.Name.Servers" set internet-service-id 10748156 next edit "Quad9-Quad9.Standard.DNS" set internet-service-id 10813626 next edit "Stretchoid-Scanner" set internet-service-id 10879142 next edit "Poly-RealConnect.Service" set internet-service-id 10944700 next edit "Telegram-Telegram" set internet-service-id 11010249 next edit "Spotify-Spotify" set internet-service-id 11075786 next edit "NextDNS-NextDNS" set internet-service-id 11141324 next edit "Fastly-CDN" set internet-service-id 11206793 next edit "Neustar-UltraDNS.Probes" set internet-service-id 11272397 next edit "Malicious-Malicious.Server" set internet-service-id 11337935 next edit "NIST-ITS" set internet-service-id 11403472 next edit "Jamf-Jamf.Cloud" set internet-service-id 11469009 next edit "Alcatel.Lucent-Rainbow" set internet-service-id 11534546 next edit "Forcepoint-Forcepoint.Cloud" set internet-service-id 11600083 next edit "Datadog-Datadog" set internet-service-id 11665620 next edit "Mimecast-Mimecast" set internet-service-id 11731157 next edit "MediaFire-Other" set internet-service-id 11796480 next edit "MediaFire-Web" set internet-service-id 11796481 next edit "MediaFire-ICMP" set internet-service-id 11796482 next edit "MediaFire-DNS" set internet-service-id 11796483 next edit "MediaFire-Outbound_Email" set internet-service-id 11796484 next edit "MediaFire-SSH" set internet-service-id 11796486 next edit "MediaFire-FTP" set internet-service-id 11796487 next edit "MediaFire-NTP" set internet-service-id 11796488 next edit "MediaFire-Inbound_Email" set internet-service-id 11796489 next edit "MediaFire-LDAP" set internet-service-id 11796494 next edit "MediaFire-NetBIOS.Session.Service" set internet-service-id 11796495 next edit "MediaFire-RTMP" set internet-service-id 11796496 next edit "MediaFire-NetBIOS.Name.Service" set internet-service-id 11796504 next edit "Pandora-Pandora" set internet-service-id 11862230 next edit "SiriusXM-SiriusXM" set internet-service-id 11927767 next edit "Hopin-Hopin" set internet-service-id 11993304 next edit "RedShield-RedShield.Cloud" set internet-service-id 12058842 next edit "InterneTTL-Scanner" set internet-service-id 12124326 next edit "VadeSecure-VadeSecure.Cloud" set internet-service-id 12189915 next edit "Netskope-Netskope.Cloud" set internet-service-id 12255452 next edit "ClickMeeting-ClickMeeting" set internet-service-id 12320989 next edit "Tenable-Tenable.io.Cloud.Scanner" set internet-service-id 12386528 next edit "Vidyo-VidyoCloud" set internet-service-id 12452065 next edit "OpenNIC-OpenNIC.DNS" set internet-service-id 12517602 next edit "Sectigo-Sectigo" set internet-service-id 12583141 next edit "DigitalOcean-DigitalOcean.Platform" set internet-service-id 12648679 next edit "Pitney.Bowes-Pitney.Bowes.Data.Center" set internet-service-id 12714216 next edit "VPN-Anonymous.VPN" set internet-service-id 12779753 next edit "Blockchain-Crypto.Mining.Pool" set internet-service-id 12845290 next edit "FactSet-FactSet" set internet-service-id 12910830 next edit "Bloomberg-Bloomberg" set internet-service-id 12976367 next edit "Five9-Five9" set internet-service-id 13041904 next edit "Gigas-Gigas.Cloud" set internet-service-id 13107441 next edit "Imperva-Imperva.Cloud.WAF" set internet-service-id 13172978 next edit "INAP-INAP" set internet-service-id 13238515 next edit "Azion-Azion.Platform" set internet-service-id 13304053 next edit "Hurricane.Electric-Hurricane.Electric.Internet.Services" set internet-service-id 13369590 next edit "NodePing-NodePing.Probe" set internet-service-id 13435127 next edit "Frontline-Frontline" set internet-service-id 13500665 next edit "Tally-Tally.ERP" set internet-service-id 13566202 next edit "Hosting-Bulletproof.Hosting" set internet-service-id 13631739 next edit "Okko-Okko.TV" set internet-service-id 13697277 next edit "Voximplant-Voximplant.Platform" set internet-service-id 13762829 next edit "OVHcloud-OVHcloud" set internet-service-id 13828367 next edit "SentinelOne-SentinelOne.Cloud" set internet-service-id 13893905 next edit "Kakao-Kakao.Services" set internet-service-id 13959442 next edit "Stripe-Stripe" set internet-service-id 14024979 next edit "NetScout-Scanner" set internet-service-id 14090406 next edit "Recyber-Scanner" set internet-service-id 14155942 next edit "Cyber.Casa-Scanner" set internet-service-id 14221478 next edit "GTHost-Dedicated.Instant.Servers" set internet-service-id 14287132 next edit "ivi-ivi.Streaming" set internet-service-id 14352669 next edit "BinaryEdge-Scanner" set internet-service-id 14418086 next edit "Fintech-MarketMap.Terminal" set internet-service-id 14483742 next edit "xMatters-xMatters.Platform" set internet-service-id 14549279 next edit "Blizzard-Battle.Net" set internet-service-id 14614816 next edit "Axon-Evidence" set internet-service-id 14680353 next edit "CDN77-CDN" set internet-service-id 14745737 next edit "GCore.Labs-CDN" set internet-service-id 14811273 next edit "Matrix42-FastViewer" set internet-service-id 14876962 next edit "Bunny.net-CDN" set internet-service-id 14942345 next edit "StackPath-CDN" set internet-service-id 15007881 next edit "Edgio-CDN" set internet-service-id 15073417 next edit "CacheFly-CDN" set internet-service-id 15138953 next edit "Microsoft-Azure.Connectors" set internet-service-id 327980 next edit "Microsoft-Teams.Published.Worldwide.Optimize" set internet-service-id 327991 next edit "Microsoft-Teams.Published.Worldwide.Allow" set internet-service-id 327992 next edit "Microsoft-Azure.Front.Door" set internet-service-id 327993 next edit "Fortinet-FortiClient.EMS" set internet-service-id 1245477 next edit "Fortinet-FortiWeb.Cloud" set internet-service-id 1245480 next edit "Fortinet-FortiSASE" set internet-service-id 1245481 next edit "Tencent-VooV.Meeting" set internet-service-id 2556219 next edit "NewRelic-Synthetic.Monitor" set internet-service-id 4849970 next edit "SAP-SAP.Ariba" set internet-service-id 6291766 next edit "Datto-Datto.BCDR" set internet-service-id 10486083 next edit "DNS-ARPA.Name.Servers" set internet-service-id 10748206 next edit "Paylocity-Paylocity" set internet-service-id 15204646 next edit "Qualys-Qualys.Cloud.Platform" set internet-service-id 15270183 next edit "Dailymotion-Other" set internet-service-id 15335424 next edit "Dailymotion-Web" set internet-service-id 15335425 next edit "Dailymotion-ICMP" set internet-service-id 15335426 next edit "Dailymotion-DNS" set internet-service-id 15335427 next edit "Dailymotion-Outbound_Email" set internet-service-id 15335428 next edit "Dailymotion-SSH" set internet-service-id 15335430 next edit "Dailymotion-FTP" set internet-service-id 15335431 next edit "Dailymotion-NTP" set internet-service-id 15335432 next edit "Dailymotion-Inbound_Email" set internet-service-id 15335433 next edit "Dailymotion-LDAP" set internet-service-id 15335438 next edit "Dailymotion-NetBIOS.Session.Service" set internet-service-id 15335439 next edit "Dailymotion-RTMP" set internet-service-id 15335440 next edit "Dailymotion-NetBIOS.Name.Service" set internet-service-id 15335448 next edit "LaunchDarkly-LaunchDarkly.Platform" set internet-service-id 15401258 next edit "Medianova-CDN" set internet-service-id 15466633 next edit "NetDocuments-NetDocuments.Platform" set internet-service-id 15532331 next edit "Vonage-Vonage.Contact.Center" set internet-service-id 15597869 next edit "Vonage-Vonage.Video.API" set internet-service-id 15597872 next edit "Veritas-Enterprise.Vault.Cloud" set internet-service-id 15663407 next edit "UK.NCSC-Scanner" set internet-service-id 15728806 next edit "Restream-Restream.Platform" set internet-service-id 15794481 next edit "ArcticWolf-ArcticWolf.Cloud" set internet-service-id 15860019 next edit "CounterPath-Bria" set internet-service-id 15925556 next edit "CriminalIP-Scanner" set internet-service-id 15990950 next edit "IPFS-IPFS.Gateway" set internet-service-id 16056629 next edit "Internet.Census.Group-Scanner" set internet-service-id 16122022 next edit "Performive-Performive.Cloud" set internet-service-id 16187706 next edit "OneLogin-OneLogin" set internet-service-id 16253244 next edit "Shadowserver-Scanner" set internet-service-id 16318630 next edit "Turkcell-Suit.Conference" set internet-service-id 16384317 next edit "LeakIX-Scanner" set internet-service-id 16449702 next edit "Infoblox-BloxOne" set internet-service-id 16515390 next edit "Nice-CXone" set internet-service-id 16580927 next edit "Hetzner-Hetzner.Hosting.Service" set internet-service-id 16646464 next edit "ThreatLocker-ThreatLocker" set internet-service-id 16712001 next edit "ZPE-ZPE.Cloud" set internet-service-id 16777538 next edit "ColoCrossing-ColoCrossing.Hosting.Service" set internet-service-id 16843076 next edit "Sinch-Mailgun" set internet-service-id 16908613 next edit "SpaceX-Starlink" set internet-service-id 16974150 next end config firewall internet-service-definition end config wanopt content-delivery-network-rule edit "vcache://" set comment "Static entries are not allowed to change except disable." set response-expires enable set text-response-vcache disable config rules edit "rule1" config match-entries edit 1 set pattern "/*.m3u8" next end config content-id set target hls-manifest set start-str "/" end next edit "rule2" config match-entries edit 1 set pattern "/*.mpd" next end config content-id set target dash-manifest set start-str "/" end next edit "rule3" config match-entries edit 1 set pattern "/*.ts" next end config content-id set target hls-fragment set start-str "/" end next edit "rule4" config match-entries edit 1 set pattern "/*.*" next end config content-id set target dash-fragment set start-str "/" end next end next edit "vcache://youtube/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "youtube.com" set category youtube set text-response-vcache disable config rules edit "rule1" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 set end-str "&" end next edit "rule2" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 end next edit "rule3" set match-mode any config match-entries edit 1 set pattern "/stream_204" next edit 2 set pattern "/ptracking" next edit 3 set pattern "/get_video_info" next end config content-id set target youtube-map set start-str "/" end next end next edit "vcache://googlevideo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "googlevideo.com" set category youtube set text-response-vcache disable config rules edit "rule1" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 set end-str "&" end next edit "rule2" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 end next edit "rule3" set match-mode any config match-entries edit 1 set pattern "/stream_204" next edit 2 set pattern "/ptracking" next edit 3 set pattern "/get_video_info" next end config content-id set target youtube-map set start-str "/" end next end next edit "vcache://metacafe/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "mccont.com" "akvideos.metacafe.com" "cdn.metacafe.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://facebook/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "fbcdn.net" "facebook.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://dailymotion/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "dailymotion.com" "dmcdn.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/video/*.mp4" next edit 2 set pattern "/video/*.flv" next edit 3 set pattern "/video/*.ts" next edit 4 set pattern "/video/*.on2" next edit 5 set pattern "/video/*.aac" next edit 6 set pattern "/video/*.h264" next edit 7 set pattern "/video/*.h263" next edit 8 set pattern "/sec*.mp4" next edit 9 set pattern "/sec*.flv" next edit 10 set pattern "/sec*.on2" next edit 11 set pattern "/sec*.aac" next edit 12 set pattern "/sec*.h264" next edit 13 set pattern "/sec*.h263" next edit 14 set pattern "*.ts" next end config skip-entries edit 1 set target parameter set pattern "start=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://break/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "break.com" "0ebe.edgecastcdn.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/dnet/media/*.flv" next edit 2 set pattern "/dnet/media/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "ec_seek=*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.mp4*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://msn/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "video.msn.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://llnwd/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "llnwd.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.fll" next end config skip-entries edit 1 set target parameter set pattern "fs=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://yahoo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "yimg.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.m4s" next end config content-id set target parameter set start-str "vid=" end next end next edit "vcache://myspace/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "myspacecdn.com" set request-cache-control enable set response-cache-control enable set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://vimeo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "vimeo.com" "vimeocdn.com" "56skyfiregce-a.akamaihd.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.m4s" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://blip.tv/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "blip.tv" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.m4v" next edit 2 set pattern "/*.flv" next edit 3 set pattern "/*.mp4" next edit 4 set pattern "/*.wmv" next edit 5 set pattern "/*.rm" next edit 6 set pattern "/*.ram" next edit 7 set pattern "/*.mov" next edit 8 set pattern "/*.avi" next end config skip-entries edit 1 set target parameter set pattern "ms=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://maker.tv/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "videos-f.jwpsrv.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://aol/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "stream.aol.com" "5min.com" "vidiblevod-vh.akamaihd.net" "stg-ec-ore-u.uplynk.com" "vidible.tv" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "*timeoffset=*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://clipfish/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "clipfish.de" "universal-music.de" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.f4v" next edit 3 set pattern "/*.mp4" next edit 4 set pattern "/*.m4v" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://cnn/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "cnn-vh.akamaihd.net" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.flv*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.mp4*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule3" config match-entries edit 1 set pattern "/*.ts*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://foxnews/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "foxnews.com" "foxnews-f.akamaihd.net" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.mp4*" next edit 2 set target parameter set pattern "*Seg*" next edit 3 set target parameter set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://discovery/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "discovery.com" "discidevflash-f.akamaihd.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://liveleak/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "edge.liveleak.com" "cdn.liveleak.com" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.flv" next edit 2 set target parameter set pattern "*seek=0" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.mp4" next edit 2 set target parameter set pattern "*seek=0" next end config content-id set start-str "/" set start-skip 1 end next edit "rule3" config match-entries edit 1 set pattern "/*.wmv" next edit 2 set target parameter set pattern "*seek=0" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://sevenload/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "sevenload.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "aktimeoffset=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://stupidvideos/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "stupidvideos.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://howcast/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "media.howcast.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "start=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://vevo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "vevo.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://ooyala/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "ooyala.com" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "*Seg*" next edit 2 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://ms-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "msads.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://yumenetworks-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "yumenetworks.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://2mdn-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "2mdn.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://eyewonder-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "eyewonder.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://eyereturn-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "eyereturn.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://serving-sys-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "serving-sys.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://amazonaws-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "amazonaws.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://edgesuite-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "edgesuite.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://gorillanation-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "video.gorillanation.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://youku/" set comment "Static entries are not allowed to change except disable." set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/youku/*.mp4" next edit 2 set target parameter set pattern "*start=0" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule2" config match-entries edit 1 set pattern "/youku/*.flv" next edit 2 set target parameter set pattern "*start=0" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule3" config match-entries edit 1 set pattern "/youku/*.kux" next edit 2 set target parameter set pattern "*start=0" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule4" config match-entries edit 1 set pattern "/youku/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "*start=*" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule5" config match-entries edit 1 set pattern "/youku/*.flv" next end config skip-entries edit 1 set target parameter set pattern "*start=*" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule6" config match-entries edit 1 set pattern "/youku/*.kux" next end config skip-entries edit 1 set target parameter set pattern "*start=*" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next end next edit "vcache://tudou/" set comment "Static entries are not allowed to change except disable." set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/f4v/*" next edit 2 set target parameter set pattern "*id=tudou*" next end config skip-entries edit 1 set target parameter set pattern "*begin=*" next end config content-id set start-str "/" set start-skip 1 set start-direction backward end next end next edit "vcache://cbc/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "cbc.ca" "mobilehls-vh.akamaihd.net" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "*.mp4*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" set match-mode any config match-entries edit 1 set pattern "*.ts" next edit 2 set pattern "*.mp4" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://megaupload/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "megaupload.com" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/files/*" next end config content-id set target referrer set start-str "d=" set start-skip 2 end next end next edit "update://windowsupdate/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "download.windowsupdate.com" set request-cache-control enable set response-cache-control enable set response-expires enable set updateserver enable next end config log fortiguard setting set status enable end config system standalone-cluster config cluster-peer end end config system fortiguard set service-account-id "logicalissocresponse@je.logicalis.com" set update-server-location usa end config endpoint-control fctems edit 1 next edit 2 next edit 3 next edit 4 next edit 5 next edit 6 next edit 7 next end config system email-server set server "notification.fortinet.net" set port 465 set security smtps end config system session-helper edit 1 set name pptp set protocol 6 set port 1723 next edit 2 set name h323 set protocol 6 set port 1720 next edit 3 set name ras set protocol 17 set port 1719 next edit 4 set name tns set protocol 6 set port 1521 next edit 5 set name tftp set protocol 17 set port 69 next edit 6 set name rtsp set protocol 6 set port 554 next edit 7 set name rtsp set protocol 6 set port 7070 next edit 8 set name rtsp set protocol 6 set port 8554 next edit 9 set name ftp set protocol 6 set port 21 next edit 10 set name mms set protocol 6 set port 1863 next edit 11 set name pmap set protocol 6 set port 111 next edit 12 set name pmap set protocol 17 set port 111 next edit 13 set name sip set protocol 17 set port 5060 next edit 14 set name dns-udp set protocol 17 set port 53 next edit 15 set name rsh set protocol 6 set port 514 next edit 16 set name rsh set protocol 6 set port 512 next edit 17 set name dcerpc set protocol 6 set port 135 next edit 18 set name dcerpc set protocol 17 set port 135 next edit 19 set name mgcp set protocol 17 set port 2427 next edit 20 set name mgcp set protocol 17 set port 2727 next end config system auto-install set auto-install-config enable set auto-install-image enable end config system ntp set ntpsync enable set server-mode enable set interface "fortilink" end config system ftm-push set server-cert "Fortinet_Factory" end config system automation-trigger edit "Compromised Host" set description "An incident of compromise has been detected on a host endpoint." next edit "Any Security Rating Notification" set description "A security rating summary report has been generated." set event-type security-rating-summary set report-type any next edit "AV & IPS DB update" set description "The antivirus and IPS database has been updated." set event-type virus-ips-db-updated next edit "Configuration Change" set description "An administrator\'s session that changed a FortiGate\'s configuration has ended." set event-type config-change next edit "Conserve Mode" set description "A FortiGate has entered conserve mode due to low memory." set event-type low-memory next edit "HA Failover" set description "A HA failover has occurred." set event-type ha-failover next edit "High CPU" set description "A FortiGate has high CPU usage." set event-type high-cpu next edit "License Expiry" set description "A FortiGate license is near expiration." set event-type license-near-expiry set license-type any next edit "Reboot" set description "A FortiGate is rebooted." set event-type reboot next edit "Anomaly Logs" set description "An anomalous event has occurred." set event-type anomaly-logs next edit "IPS Logs" set description "An IPS event has occurred." set event-type ips-logs next edit "SSH Logs" set description "An SSH event has occurred." set event-type ssh-logs next edit "Traffic Violation" set description "A traffic policy has been violated." set event-type traffic-violation next edit "Virus Logs" set description "A virus event has occurred." set event-type virus-logs next edit "Webfilter Violation" set description "A webfilter policy has been violated." set event-type webfilter-violation next edit "Admin Login" set description "A FortiOS event with specified log ID has occurred." set event-type event-log set logid 32001 next edit "Incoming Webhook Call" set description "An incoming webhook call is received" set event-type incoming-webhook next edit "Weekly Trigger" set trigger-type scheduled set trigger-frequency weekly set trigger-weekday tuesday set trigger-hour 10 next edit "FortiAnalyzer Connection Down" set description "A FortiAnalyzer connection is down." set event-type event-log set logid 22902 next edit "Network Down" set description "A network connection is down." set event-type event-log set logid 20099 config fields edit 1 set name "status" set value "DOWN" next end next edit "Local Certificate Expiry" set description "A local certificate is near expiration." set event-type local-cert-near-expiry next edit "Auto Firmware upgrade" set description "Automatic firmware upgrade." set event-type event-log set logid 22094 22095 next end config system automation-action edit "Access Layer Quarantine" set description "Quarantine the MAC address on access layer devices (FortiSwitch and FortiAP)." set action-type quarantine next edit "FortiClient Quarantine" set description "Use FortiClient EMS to quarantine the endpoint device." set action-type quarantine-forticlient next edit "FortiNAC Quarantine" set description "Use FortiNAC to quarantine the endpoint device." set action-type quarantine-fortinac next edit "IP Ban" set description "Ban the IP address specified in the automation trigger event." set action-type ban-ip next edit "FortiExplorer Notification" set description "Automation action configuration for sending a notification to any FortiExplorer mobile application." set action-type fortiexplorer-notification next edit "Email Notification" set description "Send a custom email to the specified recipient(s)." set action-type email set forticare-email enable set email-subject "%%log.logdesc%%" next edit "CLI Script - System Status" set description "Execute a CLI script to return the system status." set action-type cli-script set script "get system status" set accprofile "super_admin_readonly" next edit "Reboot FortiGate" set description "Reboot this FortiGate unit." set action-type system-actions set system-action reboot set minimum-interval 300 next edit "Shutdown FortiGate" set description "Shut down this FortiGate unit." set action-type system-actions set system-action shutdown next edit "Backup Config Disk" set description "Backup the configuration on disk." set action-type system-actions set system-action backup-config next end config system automation-stitch edit "Network Down" set description "Send an email when a network goes down." set status disable set trigger "Network Down" config actions edit 1 set action "Email Notification" next end next edit "HA Failover" set description "Send an email when a HA failover is detected." set status disable set trigger "HA Failover" config actions edit 1 set action "Email Notification" next end next edit "Reboot" set description "Send an email when a FortiGate is rebooted." set status disable set trigger "Reboot" config actions edit 1 set action "Email Notification" next end next edit "FortiAnalyzer Connection Down" set description "Send a email notification when the connection to FortiAnalyzer is lost." set trigger "FortiAnalyzer Connection Down" config actions edit 1 set action "Email Notification" next end next edit "License Expired Notification" set description "Send a email notification when a license is near expiration." set trigger "License Expiry" config actions edit 1 set action "Email Notification" next end next edit "Compromised Host Quarantine" set description "Quarantine a compromised host on FortiAPs, FortiSwitches, and FortiClient EMS." set status disable set trigger "Compromised Host" config actions edit 1 set action "Access Layer Quarantine" next edit 2 set action "FortiClient Quarantine" next end next edit "Incoming Webhook Quarantine" set description "Quarantine a provided MAC address on FortiAPs, FortiSwitches, and FortiClient EMS using an Incoming Webhook." set status disable set trigger "Incoming Webhook Call" config actions edit 1 set action "Access Layer Quarantine" next edit 2 set action "FortiClient Quarantine" next end next edit "Security Rating Notification" set description "Send a email notification when a new Security Rating report is available." set trigger "Any Security Rating Notification" config actions edit 1 set action "Email Notification" next end next edit "Firmware upgrade notification" set description "Automatic firmware upgrade notification." set trigger "Auto Firmware upgrade" config actions edit 1 set action "Email Notification" next end next end config system federated-upgrade set status disabled end config dpdk global set multiqueue disable set sleep-on-idle disable set elasticbuffer disable set per-session-accounting traffic-log-only set ipsec-offload disable set hugepage-percentage 30 set mbufpool-percentage 25 end config dpdk cpus set rx-cpus "all" set vnp-cpus "all" set ips-cpus "all" set tx-cpus "all" end config system ike end config system ipam config pools edit "default-pool" set subnet 172.31.0.0 255.255.0.0 next edit "lan-pool" set subnet 192.168.0.0 255.255.0.0 next end config rules edit "role-lan" set device "*" set interface "*" set role lan set pool "lan-pool" set dhcp enable next end end config system object-tagging edit "default" next end config switch-controller traffic-policy edit "quarantine" set description "Rate control for quarantined traffic" set guaranteed-bandwidth 163840 set guaranteed-burst 8192 set maximum-burst 163840 set cos-queue 0 set id 1 next edit "sniffer" set description "Rate control for sniffer mirrored traffic" set guaranteed-bandwidth 50000 set guaranteed-burst 8192 set maximum-burst 163840 set cos-queue 0 set id 2 next end config system settings set gui-allow-unnamed-policy enable set gui-multiple-interface-policy enable end config system dhcp server edit 1 set ntp-service local set default-gateway 10.255.1.1 set netmask 255.255.255.0 set interface "fortilink" config ip-range edit 1 set start-ip 10.255.1.2 set end-ip 10.255.1.254 next end set vci-match enable set vci-string "FortiSwitch" "FortiExtender" next edit 2 set dns-service default set default-gateway 10.4.0.1 set netmask 255.255.255.0 set interface "port1" config ip-range edit 1 set start-ip 10.4.0.10 set end-ip 10.4.0.254 next end next end config firewall address edit "all" set uuid 1052c146-7738-51ee-b08a-1d7d9114e3d5 next edit "FIREWALL_AUTH_PORTAL_ADDRESS" set uuid 1052c394-7738-51ee-2b1c-12d12e500fb8 next edit "FABRIC_DEVICE" set uuid 1052c556-7738-51ee-63ef-b3d1e164737f set comment "IPv4 addresses of Fabric Devices." next edit "SSLVPN_TUNNEL_ADDR1" set uuid 10544340-7738-51ee-078d-f4c976cca5a4 set type iprange set start-ip 10.212.134.200 set end-ip 10.212.134.210 next edit "EMS_ALL_UNMANAGEABLE_CLIENTS" set uuid 42dc11da-7738-51ee-21fa-db30ebbc0d1f set type dynamic set sub-type ems-tag set dirty clean next edit "EMS_ALL_UNKNOWN_CLIENTS" set uuid 42dc43e4-7738-51ee-51d8-c3b26f366b0d set type dynamic set sub-type ems-tag set dirty clean next edit "FCTEMS_ALL_FORTICLOUD_SERVERS" set uuid 5de0c0e8-7738-51ee-8424-9be770ce3d04 set type dynamic set sub-type ems-tag set dirty clean next edit "B1_10.3.0.0/16" set uuid 2b6685e0-77c8-51ee-d17e-743e110d945e set subnet 10.3.0.0 255.255.0.0 next edit "B2_10.4.0.0/16" set uuid 4bb272dc-77c8-51ee-f09a-b18859d3591d set subnet 10.4.0.0 255.255.0.0 next edit "HUB1_10.1.0.0/16" set uuid 85569676-77c8-51ee-b68d-5e86c5e8aa9f set subnet 10.1.0.0 255.255.0.0 next edit "HUB2_10.2.0.0/16" set uuid dc736cf4-77c8-51ee-c970-61ec245a72cc set subnet 10.2.0.0 255.255.0.0 next end config firewall multicast-address edit "all" set start-ip 224.0.0.0 set end-ip 239.255.255.255 next end config firewall address6 edit "SSLVPN_TUNNEL_IPv6_ADDR1" set uuid 1054478c-7738-51ee-3019-fdea98b84721 set ip6 fdff:ffff::/120 next edit "all" set uuid f97cf036-7737-51ee-0468-0fedab91f7b8 next end config firewall multicast-address6 edit "all" set ip6 ff00::/8 next end config firewall wildcard-fqdn custom edit "adobe" set uuid f9f25b6e-7737-51ee-05ce-fd5ab2ec3df5 set wildcard-fqdn "*.adobe.com" next edit "Adobe Login" set uuid f9f25d26-7737-51ee-78d9-fda96d26d463 set wildcard-fqdn "*.adobelogin.com" next edit "android" set uuid f9f25e5c-7737-51ee-e30f-a31b03f9921f set wildcard-fqdn "*.android.com" next edit "apple" set uuid f9f25f88-7737-51ee-e6ad-2d4bddbad5d6 set wildcard-fqdn "*.apple.com" next edit "appstore" set uuid f9f260e6-7737-51ee-7867-4bded6670088 set wildcard-fqdn "*.appstore.com" next edit "auth.gfx.ms" set uuid f9f26212-7737-51ee-fe82-9ce6a49f2146 set wildcard-fqdn "*.auth.gfx.ms" next edit "citrix" set uuid f9f2633e-7737-51ee-4a57-8034906555fd set wildcard-fqdn "*.citrixonline.com" next edit "dropbox.com" set uuid f9f26492-7737-51ee-fd90-8b42b6ba440c set wildcard-fqdn "*.dropbox.com" next edit "eease" set uuid f9f265be-7737-51ee-bf64-1b520c787f1b set wildcard-fqdn "*.eease.com" next edit "firefox update server" set uuid f9f267a8-7737-51ee-6ef4-c775cea8b0c2 set wildcard-fqdn "aus*.mozilla.org" next edit "fortinet" set uuid f9f268f2-7737-51ee-7fec-939ef0f71da8 set wildcard-fqdn "*.fortinet.com" next edit "googleapis.com" set uuid f9f26a64-7737-51ee-bacd-c32b548c19f3 set wildcard-fqdn "*.googleapis.com" next edit "google-drive" set uuid f9f26b90-7737-51ee-b002-277ec2b48e39 set wildcard-fqdn "*drive.google.com" next edit "google-play2" set uuid f9f26cbc-7737-51ee-3e54-edbdda8872c6 set wildcard-fqdn "*.ggpht.com" next edit "google-play3" set uuid f9f26de8-7737-51ee-27f2-8ac3d71f06ae set wildcard-fqdn "*.books.google.com" next edit "Gotomeeting" set uuid f9f26f50-7737-51ee-22f8-0b39d0fbbd64 set wildcard-fqdn "*.gotomeeting.com" next edit "icloud" set uuid f9f27144-7737-51ee-edd7-7d3aaa65bf5f set wildcard-fqdn "*.icloud.com" next edit "itunes" set uuid f9f2734c-7737-51ee-12e3-6f7f0a9de72d set wildcard-fqdn "*itunes.apple.com" next edit "microsoft" set uuid f9f274b4-7737-51ee-fdab-2e08cd98a63b set wildcard-fqdn "*.microsoft.com" next edit "skype" set uuid f9f275e0-7737-51ee-6e3e-c1afed030f97 set wildcard-fqdn "*.messenger.live.com" next edit "softwareupdate.vmware.com" set uuid f9f27716-7737-51ee-3b42-9d497df83ec8 set wildcard-fqdn "*.softwareupdate.vmware.com" next edit "verisign" set uuid f9f27842-7737-51ee-8783-4db224d65f5c set wildcard-fqdn "*.verisign.com" next edit "Windows update 2" set uuid f9f279a0-7737-51ee-f746-e6cf35d8419f set wildcard-fqdn "*.windowsupdate.com" next edit "live.com" set uuid f9f27f4a-7737-51ee-8c8b-164173f993f8 set wildcard-fqdn "*.live.com" next edit "google-play" set uuid f9f2809e-7737-51ee-1e80-38635b7cc5db set wildcard-fqdn "*play.google.com" next edit "update.microsoft.com" set uuid f9f2821a-7737-51ee-489d-ef084b134023 set wildcard-fqdn "*update.microsoft.com" next edit "swscan.apple.com" set uuid f9f28350-7737-51ee-b296-ec9a5ca330ab set wildcard-fqdn "*swscan.apple.com" next edit "autoupdate.opera.com" set uuid f9f28486-7737-51ee-7046-bcbb2379b842 set wildcard-fqdn "*autoupdate.opera.com" next edit "cdn-apple" set uuid f9f285bc-7737-51ee-7748-f57214fc5cea set wildcard-fqdn "*.cdn-apple.com" next edit "mzstatic-apple" set uuid f9f28724-7737-51ee-663e-cf83abbc0c3f set wildcard-fqdn "*.mzstatic.com" next end config firewall service category edit "General" set comment "General services." next edit "Web Access" set comment "Web access." next edit "File Access" set comment "File access." next edit "Email" set comment "Email services." next edit "Network Services" set comment "Network services." next edit "Authentication" set comment "Authentication service." next edit "Remote Access" set comment "Remote access." next edit "Tunneling" set comment "Tunneling service." next edit "VoIP, Messaging & Other Applications" set comment "VoIP, messaging, and other applications." next edit "Web Proxy" set comment "Explicit web proxy." next end config firewall service custom edit "DNS" set category "Network Services" set tcp-portrange 53 set udp-portrange 53 next edit "HTTP" set category "Web Access" set tcp-portrange 80 next edit "HTTPS" set category "Web Access" set tcp-portrange 443 next edit "IMAP" set category "Email" set tcp-portrange 143 next edit "IMAPS" set category "Email" set tcp-portrange 993 next edit "LDAP" set category "Authentication" set tcp-portrange 389 next edit "DCE-RPC" set category "Remote Access" set tcp-portrange 135 set udp-portrange 135 next edit "POP3" set category "Email" set tcp-portrange 110 next edit "POP3S" set category "Email" set tcp-portrange 995 next edit "SAMBA" set category "File Access" set tcp-portrange 139 next edit "SMTP" set category "Email" set tcp-portrange 25 next edit "SMTPS" set category "Email" set tcp-portrange 465 next edit "KERBEROS" set category "Authentication" set tcp-portrange 88 464 set udp-portrange 88 464 next edit "LDAP_UDP" set category "Authentication" set udp-portrange 389 next edit "SMB" set category "File Access" set tcp-portrange 445 next edit "FTP" set category "File Access" set tcp-portrange 21 next edit "FTP_GET" set category "File Access" set tcp-portrange 21 next edit "FTP_PUT" set category "File Access" set tcp-portrange 21 next edit "ALL" set category "General" set protocol IP next edit "ALL_TCP" set category "General" set tcp-portrange 1-65535 next edit "ALL_UDP" set category "General" set udp-portrange 1-65535 next edit "ALL_ICMP" set category "General" set protocol ICMP unset icmptype next edit "ALL_ICMP6" set category "General" set protocol ICMP6 unset icmptype next edit "GRE" set category "Tunneling" set protocol IP set protocol-number 47 next edit "AH" set category "Tunneling" set protocol IP set protocol-number 51 next edit "ESP" set category "Tunneling" set protocol IP set protocol-number 50 next edit "AOL" set tcp-portrange 5190-5194 next edit "BGP" set category "Network Services" set tcp-portrange 179 next edit "DHCP" set category "Network Services" set udp-portrange 67-68 next edit "FINGER" set tcp-portrange 79 next edit "GOPHER" set tcp-portrange 70 next edit "H323" set category "VoIP, Messaging & Other Applications" set tcp-portrange 1720 1503 set udp-portrange 1719 next edit "IKE" set category "Tunneling" set udp-portrange 500 4500 next edit "Internet-Locator-Service" set tcp-portrange 389 next edit "IRC" set category "VoIP, Messaging & Other Applications" set tcp-portrange 6660-6669 next edit "L2TP" set category "Tunneling" set tcp-portrange 1701 set udp-portrange 1701 next edit "NetMeeting" set tcp-portrange 1720 next edit "NFS" set category "File Access" set tcp-portrange 111 2049 set udp-portrange 111 2049 next edit "NNTP" set tcp-portrange 119 next edit "NTP" set category "Network Services" set tcp-portrange 123 set udp-portrange 123 next edit "OSPF" set category "Network Services" set protocol IP set protocol-number 89 next edit "PC-Anywhere" set category "Remote Access" set tcp-portrange 5631 set udp-portrange 5632 next edit "PING" set category "Network Services" set protocol ICMP set icmptype 8 unset icmpcode next edit "TIMESTAMP" set protocol ICMP set icmptype 13 unset icmpcode next edit "INFO_REQUEST" set protocol ICMP set icmptype 15 unset icmpcode next edit "INFO_ADDRESS" set protocol ICMP set icmptype 17 unset icmpcode next edit "ONC-RPC" set category "Remote Access" set tcp-portrange 111 set udp-portrange 111 next edit "PPTP" set category "Tunneling" set tcp-portrange 1723 next edit "QUAKE" set udp-portrange 26000 27000 27910 27960 next edit "RAUDIO" set udp-portrange 7070 next edit "REXEC" set tcp-portrange 512 next edit "RIP" set category "Network Services" set udp-portrange 520 next edit "RLOGIN" set tcp-portrange 513:512-1023 next edit "RSH" set tcp-portrange 514:512-1023 next edit "SCCP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 2000 next edit "SIP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 5060 set udp-portrange 5060 next edit "SIP-MSNmessenger" set category "VoIP, Messaging & Other Applications" set tcp-portrange 1863 next edit "SNMP" set category "Network Services" set tcp-portrange 161-162 set udp-portrange 161-162 next edit "SSH" set category "Remote Access" set tcp-portrange 22 next edit "SYSLOG" set category "Network Services" set udp-portrange 514 next edit "TALK" set udp-portrange 517-518 next edit "TELNET" set category "Remote Access" set tcp-portrange 23 next edit "TFTP" set category "File Access" set udp-portrange 69 next edit "MGCP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 2428 set udp-portrange 2427 2727 next edit "UUCP" set tcp-portrange 540 next edit "VDOLIVE" set tcp-portrange 7000-7010 next edit "WAIS" set tcp-portrange 210 next edit "WINFRAME" set tcp-portrange 1494 2598 next edit "X-WINDOWS" set category "Remote Access" set tcp-portrange 6000-6063 next edit "PING6" set protocol ICMP6 set icmptype 128 unset icmpcode next edit "MS-SQL" set category "VoIP, Messaging & Other Applications" set tcp-portrange 1433 1434 next edit "MYSQL" set category "VoIP, Messaging & Other Applications" set tcp-portrange 3306 next edit "RDP" set category "Remote Access" set tcp-portrange 3389 next edit "VNC" set category "Remote Access" set tcp-portrange 5900 next edit "DHCP6" set category "Network Services" set udp-portrange 546 547 next edit "SQUID" set category "Tunneling" set tcp-portrange 3128 next edit "SOCKS" set category "Tunneling" set tcp-portrange 1080 set udp-portrange 1080 next edit "WINS" set category "Remote Access" set tcp-portrange 1512 set udp-portrange 1512 next edit "RADIUS" set category "Authentication" set udp-portrange 1812 1813 next edit "RADIUS-OLD" set udp-portrange 1645 1646 next edit "CVSPSERVER" set tcp-portrange 2401 set udp-portrange 2401 next edit "AFS3" set category "File Access" set tcp-portrange 7000-7009 set udp-portrange 7000-7009 next edit "TRACEROUTE" set category "Network Services" set udp-portrange 33434-33535 next edit "RTSP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 554 7070 8554 set udp-portrange 554 next edit "MMS" set tcp-portrange 1755 set udp-portrange 1024-5000 next edit "NONE" set tcp-portrange 0 next edit "webproxy" set proxy enable set category "Web Proxy" set protocol ALL set tcp-portrange 0-65535:0-65535 next end config firewall service group edit "Email Access" set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" next edit "Web Access" set member "DNS" "HTTP" "HTTPS" next edit "Windows AD" set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB" next edit "Exchange Server" set member "DCE-RPC" "DNS" "HTTPS" next end config vpn certificate ca edit "root_CA2" set ca "-----BEGIN CERTIFICATE----- MIIDADCCAeigAwIBAgIgOTJDNDhERjI3N0JGRkM0MEMzRTI5RDJCRDFCM0Q1RjEw DQYJKoZIhvcNAQEFBQAwKzEWMBQGA1UEChMNRm9ydGluZXQgTHRkLjERMA8GA1UE AxMIRm9ydGluZXQwHhcNMjMxMDI0MDc1NDI2WhcNMzMxMDI4MDc1NDI2WjArMRYw FAYDVQQKEw1Gb3J0aW5ldCBMdGQuMREwDwYDVQQDEwhGb3J0aW5ldDCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAORd+qowMXN+UlN8//Y/bkvLzX4mkBsQ GK/e80ajUVve1YM/1ugkbt+EPp/IynzQEhJV0AiJZZ24VY2tZyKxORgRRf1gKSGb hI4bxfR0gatEbwedBGVoFOm/QEf0+bsKF5vuvriTxgsc73ULxrgjZ3loneAVTyvB GbbFY6F9AdSl6+SV8rWcdq3bSH28JAzXi7+gztkJ1tjP7AGsmN2OqwTcHx0wHBJp tOBwi9nFy2ztft9m1fb0XM2QMyuIDfzkuOTQzDYLO2IuvLonq/AoXCrYkVaMxcfx N2IUAP3PChwtuHg4dl2rcbbgt5AcOGMPhif9mcnuXd2Fro3SFpanK7cCAwEAAaMQ MA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAoLa8O+dYDBoWYuRk Kosg+1ss4GfP9igVS2XlPpDGMMrRxAk6ss94OL2y1rE6XftyDxkabbard4SRqgvk Z6j8ytOUpSiZUOG6jhT3/qDbmqJtou1Hir7uJyEt9Rq9/FwECR06OeI93VOu3C3g QF0HNzN0rStP7JLGwAe34S5iajuA419uwNblwWm+qpFh7hXI+H5UGyLdTntwX9Mu 5C9SVPeILaU7jbIDDHvDRfTcNLCreCi5uUo8M2x4HE/OozaCqKWaqy3i7Vw0NxXE iTqBFCTy2H401pqZq1Ht/46C0+Mlz0M1HsjQqNU7tBmlntqd/MrR/XR7H9ahYukh uuE4oQ== -----END CERTIFICATE-----" set range global next end config vpn certificate local edit "Fortinet_CA_SSL" set password ENC VUYtcFrcxJrxLjBzTWLuY0FfHLC7sbhYl4UFOot0yOVZiuEW+/5banboK0DeE9ZSSBLgxEpTXhvgp45W9A2M9LE5FCzdsdiGi8jsDHvFTmEjkn4zCb75ZfHdsBRP//2VqHaow+hdVMFzld3hud2lPioigOvKA7CgPT/Cyjm+RXRJ6DRSZND2TN2vAAhsuAt87vkldg== set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQI8AEfkngCRToCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECFogXNutm2sGBIIEyHZ7X7xdvfMl rEDmkGzrGPQvPrHUw6f+yHRyD1Z6u0cFAaNl34peKn9ZYBqbxsb5L3/8FJqd+qGV zeJJt7Y3SS6GazEVs7Ex8Z5HMqiL6/PiQCSy67XeIRrViIcAM13ltwGTfBFq4UGb g5vN2SibS7ea0QlIlLS2dfFSx+kkhMLdMqVDmpD56vOXSggwlsuIWG8BUSk/q5AG bVs+iT9j2Zd04BMoMXpQQip9TgMhzHc2bej57FrE3MWVl9Y6VHhtaFjI6cbnTN0/ 8fKhFy9UsVqSN9TcmGNXm9TTQ3uQ9N8DZwR+HbV3O7cyaTn6HntfFL03pzcNY8sg IguOaOFqR0oo41c5Ky+FANCPTrCVGbnBwGIh7xMQFaMbhy5Y8ZwIY4iF0A9AR+rd BMzOSDBY9VarTYAEI3SUNA33P9lSQCznPN76ZbdyMZreTkvdyxNIufBE64EjvQLA NBvFEHpmlidUA8FUi+c4RysvVf+ixEnuU7VYZzAiTbVFH2h1GEI4/oLuH5xKfLKw r4Obuxye93Xdj6q9NaqLsClgmo+wz3QaO9GlPjO/KB2Hm40COdAL4PPb1GTkulGx BHvfUHmahezHUvfu1fTGmMxN6EFVXWIiAmmLrNvzGtWcTErez2KsPqsbBfYteUC6 kcE3GFyt534O3lW40lWTMlAkw52bhtDLkYi3u3jTTcY68XgUsFgN/12TrprMyGCp x87zbJbieDSxy5TsluanfWT+OQ9NORCNtOlV2CkKnQfxqxyw0Gd02QahA4xMPex6 bfb3WokV0qJsJ+6e9FRUR/AsE1mAA6FDWx0kXzr8vRuaYos4vO9KVGV4cqiC9NAO SeKM9Rkb69uvUdj5Y32RxJ9HRtiQIpY+QGWBpQ0bCx86E7KrbBPBpDc/2A8mzDDG O5UIZh6ah235bBTokkY+5QFbe1fJOOSb9SpcxV4RkYw7zrjbJ8qKbp2aXf5Avmhr ru8R/Xu/fgZAOQQleial9uGqfpDjZW6jE0SOQov5dOHE41RD+cw8E82pOZKUrZEg Qxe059bwJap0ey2BIbHZ+0XLM1iKMipkfV9d63Ck0AcYR6Y1luR2bU3b1MklUMN6 POy4PAWAODFikvP48QiunSiRILC0zfUkGQSlDDIGiw9n5Gl5BkVS7oib6Ma0fBDG l2yIyLY05g1qbguyJojfTuR7ChYWUGVO7WiUO2riWfULEie78A13env4AGbq73El NsL7tcmvxuCV0zDDVZzzakC+g9e6JNZrrHJ9YRMSQt33rf8FxwXyF4H9/h1CuLpK TahXOhN7iZ48PYi2KlT4InRMCQ3++IbKKjfgJihEEUWw2M81npl9yTOBq6gd34yv uyAHJOTF2CqkrsppxnD0mHJrnAPOlsQzXBJhR5mzk6O4ipHb5nxknbyRU/j0Z2p9 /PFL4kO4/fqqzetX7YzHmV8lHEkRIWn8zlbyGtmflFcoyNNqzkEmbDjgGNd/gS0j X5IQoFQHPsszqTsvww6oOvqkAg8ZWLmGLp/myzLDfpCvOXsKNLBlMxb/j0Qd38Hh Phg8ugQUygJ0Paf+D5kLehuHfARqK2e9y5Y6Lqiro+cm3ar0PVIjb+ch8/VkJ9tN czeorA8ZGZnsqyp1Q8eheg== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID8zCCAtugAwIBAgIIOPxegaeyoLcwDQYJKoZIhvcNAQELBQAwgakxCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp dHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1 cHBvcnRAZm9ydGluZXQuY29tMB4XDTIzMTAzMTA5NTkyN1oXDTMzMTAzMTA5NTky N1owgakxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQH DAlTdW5ueXZhbGUxETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZp Y2F0ZSBBdXRob3JpdHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkq hkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAqji7UUbkV1aQj3uEL5F8lpZBQqANy32C1Vz9lvNiN6Hw U7qGT3mE00RpZokOIDD0KEZLiRvm625PuRoPGoMTLiFqrU8tTzIONmlods9kTW43 Jf/Q9rr9mpdMjrhGJdKwizzM91R/NvGQH5dTjGsoQaCO2G+RAsyrA+ssAT+fhzXz qe5B3HJy3JjpE/bkx7BtzeZumRqjozR5+eZ4U/rFVCGYL8zklOKPogSzkbr1Z03N OtfteY0RDoNQF2BOKHJf+Fvo5DC4m/9uymT9StwW1IxfrHQVlGB6/qloWKyFKDH3 NEocp74jzns8RJBntrN30CnW9HTQP+/ijnx5MjW7DwIDAQABox0wGzAMBgNVHRME BTADAQH/MAsGA1UdDwQEAwICBDANBgkqhkiG9w0BAQsFAAOCAQEAYQan8wpxqNef uHyhjD/K+fvGBEGPf+mNiFRbiEIsqLxtxSDJAinJc25ab/Tb7wF8/DUsx2Ys95Uy rjYHS5Sk1MDZziB/Q4TOAPYhx6EZO+LwvShrvPpL6eX2bxC65kgy3f0azCt9wuhH XPTJaLC4+PlKO3OWY0n9hznveUJBX0Hmg+PBfxl9Op15DWBZBWj6DUwSn0JWZ6Gh H2442x2q1VuXwYu1Nfa/Egp3PgrGsw4lF2Aey+oLVpTVcA6CJIBXwbX/sl2IAa34 A5ukfbD7DMjV27YHUlCcJseOVcVWmBQ9yyCQagnA9zVvXB1P5GumYh/iu1U6cJQu +b7Pv9Hh4w== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679269 next edit "Fortinet_CA_Untrusted" set password ENC SsCOwRbhJSP0hB/SThkT3r0Iz6UcoeN2StZlNQQ+H0LaWXdWcKIfEkxN/3EWj1z5FkW2irISKxzWmLowGkD3/9rqwQkPDCMENLBfvymxar2XrVvi0vstpNj578f2XX6BbLli2qNStlNhVh2mbcomAiuttWd06Ufm5iENzIE86gwqg/4mAPqFfIrMp8U3u7427FCTMw== set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIhwrJ4HZ8DGoCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECHDDeQvsmJXoBIIEyLb49uA7puGL X2Zdhbh7tLwTjot4UR4R8XE3HlhDxSvDMJqHQ0JW8X+oRAWiPIpqP8QhwT+cDEhs /PPyVeDCo9Sf++XED/N7VkJrNOHPMrqyhU2HCJS/9XLeMWEI6pD6PRj/HTkOGRG1 DjyGPpgNItZ64uluZLI5DvRjN3EObrm+XSDziCmyq/frcGM5OAzSS2ZGdw/8tIbZ FRLpPXBMRTg03Ret+uLASAWVNBjvo6zNRd9vDZnpkhf0a2eTUmeE/mOBz/7oJNxE fQ61sTsmhR4e3cdU0aMQkJ6Dy51PEYMlexQKSVlsL8uGDfqSgkJxZg20W6EMkVbh +ojFABg6L8Jh+/hY4vWupDi2Akz1lb4F2Y5hyvQTIzvhs8yaY7O0c0iqNZf2Q58m MKudAbf3p4a4nhQ4NLjiBsk6FJdalkt/RTf2oY77YGEYnZGMURsGiVvZf/WPMK2C 7hpq6FGRPb5//sBYyrTPbDO57ukqA/YgN/r1XP6CVjkJYxLxnXf4L7SsV2XCBsuc gRknkmlbDqquMi7ZIhrnw27gk0d+JlLlHSsnPrVXWpWzUW8lfN5M5aoDCMvwvZA1 HFQZT192rio6IrxJziGDdubJeoIfPXP1bOxTcMPGKCBKl9BkQXrc/CIqLgLR+JoM qhX9csjQNhhHkMkGSDR3Y8oeeHzIr7Wt2DTFIeRGTB8RYf8FPJXHUgrGoY39Qd9D 7Yc818WJK0wdFN7pFRi6Sa+c96IyYsc//JNMBNz+wOLZnt9DKEXCo8Yu2J7lrdpc FbsfEiAUnsQu72+lE/A65pMIHebWbej9zncliE9qS35VHiHB4HWSfhajBAJJBCLO 7pwmUWR4lcf6W7QvndqZ79ZYcbMEy+jRKS5JzsQKzAKxLeW7rmnsctldCt9+ZLje 9ipmt9Ns1q+obW3TcbSFRdYnJjvgtdVDcH8RSQa+zthXvpiZH5UgWLCozE8nLe0z NcXWQ3ajpYmi1mQt8hrtzN/pv3qPNcMKSoxaqRM3UK8ohlgyFV/J907fcXaOHOLj /JyWwRlg06yDP5TcQ/8leuy7HVir/U+3Ejuxm88ssawiARXNcxcjDhREVnOM/wKe U1v1xZyZJePpz651Uo4AZYdw8n0J1OkRX7bSoAHL41YtthRfEg0NZ7wybOdfVfaZ 6is5VLdYdmgbH5PNFXlnu8cNqA9lvCCvn40ewVtNeJCwnc//7tw8b52q75hESvmo cBCUGqRz+C/k0yRZMXIBcCxjlVk2UhQ2NtwuKmKliVjUE+UFKz1h5efnWp36vYIC vduPW8bVcCb5VF4cXJqsKARBM+yLNsPsBVoy5h0XgKJrybpQ3UscpepFUSvVxUDm lOAB+Moigxrpt1UEGwFMFE4iTnAKFZ4P9tBH0KcNySCJqQVovJIRQtZK1IWKaB6P aha1idP9PtYqDbQfdzZ8P0UCwDONl1LqaD8hm7MHJAwEAi7lIiytTRTcq6lo2iGi +CqvTfqIcu2kUFhManobutjbPLYlRIWBpIsIDNaoQliqWNGrwNLkFJmk3/xowbQx D3Cj4lEuOcSLPNPKMyXv2NofReogSh8ojaAdcZVr/X/zNbeFTz6VeXW4/cwLcrUL eWePKbHO3LMu4gV0cQumcQ== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID/TCCAuWgAwIBAgIIXd6LvkQNC9kwDQYJKoZIhvcNAQELBQAwga4xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp dHkxHjAcBgNVBAMMFUZvcnRpbmV0IFVudHJ1c3RlZCBDQTEjMCEGCSqGSIb3DQEJ ARYUc3VwcG9ydEBmb3J0aW5ldC5jb20wHhcNMjMxMDMxMDk1OTMyWhcNMzMxMDMx MDk1OTMyWjCBrjELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQ BgNVBAcMCVN1bm55dmFsZTERMA8GA1UECgwIRm9ydGluZXQxHjAcBgNVBAsMFUNl cnRpZmljYXRlIEF1dGhvcml0eTEeMBwGA1UEAwwVRm9ydGluZXQgVW50cnVzdGVk IENBMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAN/QBzi08qaBxqZDZ11iYEJascG4n/qX 6k6ty2sRPOYySJH5Hp/a6XorFMjLHnA9vwhslXUuCl2b1RpJASO0+QE2eGpbwfYX RtD5CT7ADOzBza0fpz1b1n3ub5w3P51sq/a7DyVrF76CR4GXnKNcZ6GaP5MKUhRr EloIxPgAnV2Z9sx3gaAaHBAV/ktyKSmaiSdIa5gc3+Hi+Zvj875OwJCNkBTZ90Ud szXD/yMiZxBvNO6hFhuurWVD9bzGV0UagSh3InJuJ4p0f0ZqJOOWLeeD3VgDQcXQ T5IzPw0WFots5sqkyxfK/BhaUQ+xXYu4eSD6BZUfIMrdvfdWYGVn0AsCAwEAAaMd MBswDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQELBQADggEB AFu9dR2Tej+RXz0A3QPiKNTZxnEwRvlKO7cOBYKmGBB+UnpmxOJaWyHMx8BQa7Kd AWjVVKkTko2lTNxzVP2ccB2MtEzsFBPZUHefPSxVbfbLpsE0TUt2hb23b+W43yaV MZtw/cOyYDzVkvWR3oQ3iAUe57Y8XFaZhUVN30WWW9Ujie86RWzV0L9Js4BiXfn+ oaOwGztDfmKX69B5rCfjFT8ENrN7Ra4vxT4L5RrhkOOBxdLLuxvquKbZLYJcwQxu bwW9LmVJd8wauTJveJf4uH7uVq1PDaITSC5VIKVTsoUa1kC8hc0frJfd8sOgkSQ0 g9MwjTuZG1xs+7nPyFuT8Og= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679269 next edit "Fortinet_SSL" set password ENC V3aQg9SXnkERcuFGwBTgLXtt9t4rmqUfuM8Nd1K8/CS77wA5Yr7HZ4/H3zA5F63hN611ghvCJ1SwT6+qE4Vo9rtDEwidN1TD7KC7AKFjeJl/51AaZ1orCTyWDBpYm2g+1/7EHEhXwLLUEL1r+DYwk4X0651rR7DSNrSVJD5tFCJOT050hCEm0DZNMRbvv9ExOegGkw== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQILrUDKY+dknMCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECLbIHrTLZfo5BIIEyJbbev7vfivl 3rPi6F8SmQ861ZUqcDkjAKGQNLdSohwGwp9xNUID8rojD8mIsU7K+Id/+r9gsOmB QtQojqZITB8xeQZw5q1lmj7O/gUAZKCDcJUqXCURNTgamRTmcP7xR58WZTOjhhGt Md9NVZvPQ9UN9Sad/DblWLYFrTC9vjbop3HLw0dBF7ZoMr0k8bQgN6oHMBgDSywG cJKknCYX0Eh281CNzL7wMCGYZ0sgU9wuCUpqC3Z7GljCqGc/GJnpxoyxLe3lUT0n jjxOclarkOy1bojA+m6Neu1WdtnQwtDnf0zeoXvxk/tT9K4J1GhGvIAgEpup2s+e vTKJQM4FaOLT+TqZfYQ2lNSPpTA76RGvDRfPcr6u6WqDi+/Y6HhaDmn24BtgDXlT j2qqXvt9J8i3TX3FTNiD4YeZyg0+HPx9RLmImK0EXKhPIiynQvSFzXynf2AYhDYU gpvwT0Hs6Nn9pZoVaMG9fjMeuqWzWbvf8jCmRVx9RmTqlDN9ia2nhPEKp9b8DFY5 UjPKjvw8nH6gZWSkvEUcbsv7tvlpLcRMdRmotwVx+aVbWFNOfz/PgyGLuC7lrtIV +ZmXU6Z+wMo/a17Mwof/t4+N0I0VHtwjKuUFzd1jmnW/VUuRRwxNd0SDBfvYOUn/ o/myjJy9I2LMUVYg6c0GF+gZyn8cjHR7TYR7HUAEen89dAOJLD8KEW1Vzdp05RuT 04Eiwez2bjiMTsVhBI0Dr4kQG7Pz8MZtq4tEAmXi8PxySPEKjBi/LHTg+TGllYDT THDMCMXWd7xUmfDoyZzn9SHJXUbwiYSkiJ+NizI6B6/Qmu4EUhinf6ZzgQcHisRZ 0TEVoeJwqmkxsyHwRwhgifR/h6CcZ2jzNcOruazGrh3idvPptFU3SkdNFiqlSV9Y J58PFGWq16hoy36zumCXhivXO++MgVoCMUxL2H5RcqUxyFpv62nInoMujrkrGUS7 nY2tGVTZD43lb+ZUSHWbjj93wKlmv9As0Xu+ZEf5Jr2NyZDuNMu8m+NiOR1N2TOl XmKofGmVN5APAE2eT9E/qNkxbXUcwxY4REpZyCpi3zEeJkqpX5u5jWEjKnW/xCwW ZAXcVLZa4zWzvalYVI/Fqdam4I87JDaF3urTssUYEx6WSrGYEqV4sebx0c+iG9ME KHXO+jNTpVCB3Te3yvOfGTqKJVLhyIr85UkFwb2eOTaLG+2+O87tjtdGQ3MrVOUm qNdTCfsjOR6STY4gah4fGevkU+GxS+t/JZDr/mvsX4W4qYvSe1p4huLyET7T+FSr uqFc4P+jyLsTYuriXlXS4nHpyccZa7pY+6Ey8HtjmTfTLVimtyctVr3EcO+ra3wB WDtBWaoPdV2Fn5cyUJWzDJAGVEu9ACGUMBhn3DXNfetb0ekd37cqrG23eCdLl0d0 4DQfTjoXUERwsEKV8OqYBqF51MJAbARhSeDGsvs6PMPl/Y7EI5pXZpMifunA64Qb ts5csFTtMEcxkj6zVVy3ZLrD5fS9WNT5oNBRVw9q8fsCCEIXZS1iYTbr7WtL2iAB bWl+BB7ZKi4EMJGFkF6NF/O/OUV75oe6e8rwrlqmYrOZTboNpeGPBvCneADB9+uz yKfSwIar0a1Dnr5K4Ons7A== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID4DCCAsigAwIBAgIIcbVaySi7b6UwDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTkzNloXDTI2MDIwMjA5NTkzNlowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuZY2MgO+dSCC oqqC6fAMfaFDYYiVRqY9QuIfdufOys/Iqo0u1sKfCiZ2q4edvc5WO6eGwFLeYLPZ VYoSnpxLMNas/y1nx0+1ng3eHgpjk19a9scnyBDWmVSebsJ7pgT4gdBx8dclyFD+ oqccHyn8zRh6aqwVVQT3QFVNkBGLBUFhmtbJBEaud78TnHvXKd9tBpDKuRqlKRgh Tkc2EhSe2MxYDZCWaZv+q9nmESm6bOltLW/Ue+Lt5rWRHx/w8Gi9Ixz1tZ06vSv/ GfjXQB/9ygWpIFDI82PWhdnMOSzWV/SqB8ZA4F35xoX8kJawZ51Vv+BcKYqtvN+1 ivfmeydiowIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMB MA0GCSqGSIb3DQEBCwUAA4IBAQBBs/U3SLYQhptSwSFyGk1YPDVGIV0XceuvYtvI nI6ioVlgN+UdK1PcSvOPx6ZS0RWPrDFFCveae8UcyA6wGLiCG39iIElxt6vo5NPq bxh85xxlKP9Pc+w9anrSjGMtxgnHwLxfMbUXmk4lGEXlOPOfFNflsg5phfffmNrw M/1UXJwwaQKtkxc7Qgqu1Gz2D5RjzdHo4On/SbvOW00gZWJ8XEB4L/1PHt++yDO5 VEMEP6gIz3h/UVUNjq/bk4Y9pzozkUdbu11Fb8+ilAzAB2YVPfWka8kZxdT5Jqmg sgg5r1sKuVrznXJL5pVaJtVpUUhhAFRpu2IRwOI7GFMwS71q -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679271 next edit "Fortinet_GUI_Server" set password ENC S+bT45M/l21Hh6SMn2GcnXBJL9X4tUbSllTS9jqKebLptP3WqjCzrZwAKW5ginEhEtDyqhmcZaGi3n6ModyajH0TxhQ5af3C4YTf7VdNYlC2GfjyZLzLjVzyRp2FMwZyAL7K6Qp2t3WOH+wH1ITiTmgXMbInnaKUrGRFDuDnjcFEgaRmCxCeX3vh8dDaA59c/LCmHg== set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIJnDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIQ5AeoOSRaFMCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECM937v15NgJOBIIJSBureRIMGLVx 84Nir1XYTNxXtqXiO+vC373IvaG6AE05AfB1YZ5BE5XgFb4yHgyYm2IfA+laTk43 FX2gxwFofOQsjFh3XVpwABYMnRdQgAIVjcKBfPqX+DinhtEARWidRUW1cBWpM57Y tJ9k3DgTM+YCjg1oE+xJQv/yywk0bQxI+M1aVe8ynRWVZ4V871IimgdeWYJ2h1v2 hODvOHx0MKiGVom74mRH/H/NroJdK9f/DJJEIXGjjj/aAm0KlwCcXBrhQCBS/s/2 4VMKMxzPxZpvz21C8O3EuVoPPijw96mGjffv6tuNg1PSbfDVWQU+8TAur5ZfmuYj f2yrumwh1/2gK3FpKc9ZxIrKcoa6UIWmJP5aV42nIoM1NULNWVf2KpwvrOf8LBWS WohaoYxIpqYbiP+YlngZk0g00aL6nwFpY1mley4K9N771dYY47wbN6zGKx2kI1oz 6KktOVe0+uukgvxm1rhj//hkMHmFygimXOka8IHfUp8Z/32WZQ9GWIAAGs9lu54H HaeiKWn8N48rCSnX1ZvCcnWVrvpT76ZTyf7/gMyoQKwBt6BMNVWUUFk7z0D5y+Xk M8xC1URtLPdqOSfNxZ3ru9oB0QOrmHg99tOiaKUEDDu7fcsKjilNeSbp0XsLqL7g zXsAmyrXkCG140GZ1QR0HKpml4RJkMzUEP11sgguvPe9TJjAP/jgVACtt4BZULj2 NyT6Op6jSrBo0l36rvH2h0pm4nKCoz+12SFL7RCTU36GtE9CHwAH7cWL3NR+I/A+ 5sSvkdHLHec1ZZs8kk35UnHOBegsFR0p1Y2FvU99xgJs2FgP0JKCaUUBo8PjIaQs dm8Etwjb1giFEFJrqtqdUXvi8J/6V7Oy7z/i749sOsUxpf6tPdp+HCYKto7at+X1 74Iw9ckpluYjZ0CpEmodqrDY3QYvcxkyemByz0l7YoBA7lG5TuVUHgPfR+f9Rtui qLGRrIhXJ3eW93Y1tdmI58tfGBTi7RrC2TVZtI0c3EKxFYFKQZICoZk3p1HWGgXn kyLd6Kp2UlPslC+5o/kEOo7gHIcg1OijbUSbmpl1/8M/LgNnd1xfhevXe9PVxiRE JWB6J4HLqrTJED3x/VRtKSmtDMU1sB69s75yMk6X2VMd7H4B5RA1yINmYr1oPTDa g+XoSPjiXSWqQ8xW/0A9ENJvLT84hc1LfyaONILgtlan84SKlJHkzPjcZifBvhrU uo+QUsAJRF/PB9DR39QXKjal7jHJVmZjF810jMTwzZxTpY9h2y2aKyo9nXvJEkmA Tf7bklcAHy1lR/65EuQiAYq56VFOi8IN7VWNDzogMq9Unv5+8RzTro9ukSqXdqNi lvUAi5xzxEN220KCsdzSx9JLxdMoyJ+lU+OpyA7U5s487LeYfHOFWtLfU5s/Otrp I2Am13J9gkeH4lvnFPXQ62WGzj5HcxT5MBEzTVkGx4nF5pMBS42gKegAeFztc2p4 iBsya+AhqIn9SAtkgBeNgjk9oVBUch27eZo6z+ZeNS2HsXiEQSvkU8/d6HvMmrhI 08QqXpX8r+z+eftp+Pr/dXwydcZnOtow39lD4hfczHrEddycmRJDsS6Uoj8x3cZj XgW8CnC+WelKApx3QIM8We5DHpq8CUjFc1zl9LVkT74wh+Z+mou6ae/Bwcjwhjsj Pe96KCZ2BpvoB4GkHkghZT1IwLekgvqsB2nlBX/qnCMHh6fvtGmpLf422yeM/uvr ENq8CJPxKMia4fz8d19cCo56zuvF39lLQM7zUPdJDju61lvPtvVpUtG57OtcRsOr r4weL6gzfPJS8aKnG5CDiaWp936JcxtXzCYOY9Y+u6DvMXI5Fdf5Zmz5gl6APkHi id9iRGMEbxkTGDveHE6xE19KkaEy/JcwagaBlE3Rvssr/bzLPhjhFoLpjIdbzuB9 0sXYn080xp9l0tsmwtF/6OvN0XTI9oNBR6Aay5e0d4sgZNSjkfR5NXaxnCJvIfP6 U35D9CrF9z28pHxsCEMAmxqrI94voIiPkzqI3y1GcJQwW/vhFwd7Dc+S8H4SuivV /GSOGV1CLboNA91JZ0W7sOtfVf1DP0hddfMijd3Ep7lA/nuweW+qa19ZwEQO6d8C CxQhzJGuRI+P5bSz1f/ey60uDncByEEgQck+8J2WJgoCG1G7ICAutYcitXGEDCVX BhNkrRJOGnOLpnjyyJ8NC5EA/JuyldwMRnQK9yMeKgICy03X35hEtnroDwRYIsP2 B6Kn4YuTVsM2yQPH0PhhnIVcIXU1kSQeJLwEhxCdLUhZatRU1h+mT/r/TMEfhIds iCcVGK6j3KTr8KaQWfVaEgMvF0ZIoGIEv3PKShNEwV2VIOaopD4tOuzG13LVGYYV kRTlyf3tnjv1IbKRgRNA2zOoIMCekSbVJuLElJgYHojAxi+xEKpgF0HV/oh4XrVW kQeK3ja9o63WGL1c+Ykiul+nhgNkOVgY68IlEMFEG+XBd73IuwZQnHEcFmwBywwZ bfIuxg+FBWc9Vay+a/MdJxr/YFjlQTArj4RZcS89XlSd0KxuhUPOop9XFUA3fHFl LIv8M2MdOXP1CiL3eqh8Xl79DQtQpVPY0sOYyuiwQivBkaKGJb2L5ieFYT1Rc1Si wsj18bpj5YOTaJsFMyfZ36wCoBwsMvJP+iKwy1qg0XMOL8NQ9s3p6WDZaRnobo6K nA+ls0DxiWvAN+DXCVIywzKyZldWgfQ1U0gDpv6dNE9XqBTb4NVhI5GxS3/8bjl4 I3jI07dzd8KKgvlm6iRBjbMz3vy4KBNHcoH1AIdOHljCPjOOrkKx6YUCy1azHZsj lJvlLMW0UT6rA9zRGIJNz+D3f6Sa5U8G1y0+vIJ6B5bRIE9XnOpQGgwqDHLv3vO5 4gEfK+IZDnu2FgpxgPgQKUkAAOolLXPN3zQbvFAdZR4lq/27L7lbcOFm2eJz7kby L8jqTaotLMzVpq97+MaXiGCzKkU4LC4KQ80478AZgCLQ6LSu6t+xJvniEZ6STESG 0+MyF4E7kP9wIVFisfha+XKr7YPIvMF68BzzBdL9vszWv98swaETwNZJelCNphLr ChCQ0BZIqXzTdFoq21/sse4bqC8btjyO2IaYmhsFnwhUO84ZhH9T6bGk2W9xjPSG VNt8ZgEfinv1Ekt4/hTBNA== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIF1TCCBL2gAwIBAgIIM/jlHU4ZkfUwDQYJKoZIhvcNAQELBQAwgakxCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp dHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1 cHBvcnRAZm9ydGluZXQuY29tMB4XDTIzMTAzMTE3MjUzN1oXDTI2MDIwMjE3MjUz N1owdjELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcM CVN1bm55dmFsZTEWMBQGA1UECgwNRm9ydGluZXQgTHRkLjESMBAGA1UECwwJRm9y dGlHYXRlMRIwEAYDVQQDDAlGb3J0aUdhdGUwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQCWPX6jJi3mvkpEfr5Eek6GeTBVAzwrArBHygnp9awmoDpcpfA+ /tP5x5VGTJP9eM8+eV/ZyZ8eyqCjMSyiNtIN1TOz6D765T3vpH3OMYxzgmI1gekZ MtXjP6AhumebFFPzTT/ixkudWL09SrsuzYnaw8F1relhEs2dkDbVye26JcBmwLcG o9jnO0bd6bMyaMDwROBLc7rrxw3LfujDsghtdMnSjWdWVYqmvCJUqpaz2ENimMLQ SuG736jNrA5LS2xoO2CRvg4+FixgaPtCClPlvQBA7nDixBPttaWEu068Dok6r3VU aUjnAvxZdhVmGgjL/EJVD/V4yTSoYaUttkIjwjhVqYkpLbUE/qzdEjlCZaI1RA/w Aqcx1ywf4Y79anWSZLk5/Ari+wewcZ19ZwnyHU9Uwi1WXRAW0jJ1kX+CtBDVYZw0 OBBM7Azqn08RsaTZi4KZfS06XOQdqrMTz+TRcimBYf0xqkTgo1/tJGPdkLJ8EVlK pesiexNYzrxl1mBeubemg8Si5tGVxJ6h0Ptii8eOhpx7Eqa2MITvS4vEMePTAc4M K54hzUVOpZPXFq70+yKg1oXca0E9e03ImXB0h+vIkFwbjXcyjX/ORFMMYPVU+UFP zppURuIfet8hrixYtAVu/3lj1qvaRRa9QrCKVeoMVjkKdBrXiohMAcFMgwIDAQAB o4IBMTCCAS0wCQYDVR0TBAIwADATBgNVHSUEDDAKBggrBgEFBQcDATALBgNVHQ8E BAMCB4AwHQYDVR0OBBYEFP9+XyhEKnKdOiFvtw+gYhCZ2lfOMIHHBgNVHSMEgb8w gbyhga+kgawwgakxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIw EAYDVQQHDAlTdW5ueXZhbGUxETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVD ZXJ0aWZpY2F0ZSBBdXRob3JpdHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDQx IzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tggg4/F6Bp7KgtzAV BgNVHREEDjAMhwQKBAABhwTAqMgXMA0GCSqGSIb3DQEBCwUAA4IBAQBkQJmauqpn pgy2RIICeI7hOoKqSQBWN+5YymhZmQuOvYPjhDi2RF80DcUZPbUKXsfQ1QQwzW2E IbUyRP2I0xFZa/sNFpA/UVdMRUx94YWR2n3SEiSoYL5J+Tih9SxdNV4XaKX/9VUt ztMQffExqTWSdTymk/z36ak/PBujzHY80mQG19bABNT2gVEqFC/azA/1GVgd10ye RGwm4oPAWzwmX/UYMW8kd3ZGcc8wXCkWC+NlPHuqesrDXbC6dNTSN/khGa7jOAfi 10ESJjOWrPIOph9f7mtfDeIeT+ciBND7tdAi/pu275GAmSWsM8u8XQuTvYRieA/Y V6JkEvhrXmpC -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679271 next edit "Fortinet_SSL_RSA1024" set password ENC HxqOpwoT5GVXbFCpSQmsZ5SO0QkzZ/SOXt8ub5UnJ7t/mQMsjvcKnI01r0A1NZIbrxmFm9PnKyvvVWUlc4z2jKCoV2rPfY0EmvfPP5p/2sr5X3B+LSbl3NUV05S/TyH6fqklQBabWHI2F1S/hsPZq0iQ7PEpQqv/qoSnHFa8qxI2rVaYEEmXs5wD/I/2+KHPa4VacQ== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIC1DBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIcW8u18+0v9QCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECIgSRf1PUt9mBIICgLEOGGjNUyw8 inQbUmJ0Tp9G88lsdUrsCWPoCPQ83LPm8dJ1zExOLeBevSnB9bIIsGVsCNnWvysQ HxWgSQ+GvYcXXPV44vNMNDbpotakPWpvOchvT+V8SLIe6J8wlweCh18P9fSbVDaz dGJ6gWFaEXM4OMAM2fiNOcIaWwsCFRN5UPAgKuNGVYPaSGnwh/yjVS1GDW+zas/n qLZxQxGiXKnF80B/fZx06WNiNIQW3K2+8aL7IVHfIa6Mp68/zNbqSgcny691vBs2 i9Q1gXhrPcH50dvDwdQbJ9HN5o5P0dCTMH4KkPnpNqSDedGgys+UJbELtBLhZZYG riTlhaCAkf5b8G5AtzLk/WNUpG7qJ3W/fxry+tZyZTbXnOg3RgipDjNelrDXAbTD v/chhejMz9ZZKmgQC3qq3NYJDPz/fWe0CDQo+V07sj2F2aYeUtBptLENgqHCCK0b hvpDuFnWjGjrnJslxeE0GQk9A0GNfGvktmdwJ+G1LVTqP8v0PpN3m9qKWH2d+YaB DmTm3zDxnhtjIaSWzIY6uDV8bZoySP3gqLFShTJ2IlOX23yH41gUz7xafL0ZYaqL 1X7v1Kj0W76LVKIl5pSimxXsD8t7BO19/w4R4HzNStA1ofd5H7PL0bHPAS1eZW4H 9Fc2psFxfSO67tMCxelJB9tpGEwGY2z3PBUVDkWL+B4gzNDMkWAF1ECmmrcb0JAe 2MAcKcTNsAn7/ZsU8lwuXIfhN1BCZ4Q5EfNKqqD9m9on0sWABGXH2jpUS5PmH1CQ u/Oz4u1yad237YjDl96t7jKsdpoW+Ank+3W2PyUHDWzEq33zbIVDXJSpxJ3HpFE8 0wKSihR6N8Y= -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIC2zCCAkSgAwIBAgIID41wtEhbXckwDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTkzNloXDTI2MDIwMjA5NTkzNlowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDfqA0ZrLi2K6KvTL2I HMo49SHKg7o00SBYxvr8B+vxSlmqU6OqcJRVQ+eFIjqzS9U/t+NGcSpSCZtISxF7 tM9QXQsbNUgnI4oNWFfC4S6thZ7diu72zA805OCblPPSVLPK1lSic4bMKzDaxj/R cGNklQlkKriznffpJdAtsxHFawIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQM MAoGCCsGAQUFBwMBMA0GCSqGSIb3DQEBCwUAA4GBAAy8hEXIqpP2qNVeaPl9qaVW pt0OXaYDXFhYr57DdD0A1VRXlRegeaPjf4TcP5Drs3+4t+peGWccOarn7hj9RlZt ewxsYf0wZgFm9+yu2T2k166i44+JeaJO8s695hxDqGg6d9Ntu3PyqBBYvxSF7AeM mcoMmg1ZeW1plY+N3Eff -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679272 next edit "Fortinet_SSL_RSA2048" set password ENC kh3Cwaj+MrLz1BaXq9sSDYzAtorebbcWC5d++CPNZSnTL/TTjn8mnTduAatM45Y+9DGIKWNlUvKopKGFmAdS+usXpA4A5GnwB+v+4mBx6r0VLmQ/pn6Wg07mVsXCr47l3CMeTC4MShi5xOTPeCNMLE+f522TX0DRVlBMhWoqeAXrSrmn+akt57kCHgpPssTeflZI4w== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIoHwmTBUPV2QCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECCbIRuA8TA5PBIIEyMVwGYDzYS9B 18BH7ccPb7se0UBnn+Oo46XGbkd9hrcV8fLf3yx2n05XODf2Yja6CSG6DBEOPpqZ NLk5l0/0wdr2P4tGj5v+I6toVtuFBHYqnaltpzVziqmqiwi6K6bAfcJlKhs/F76u RYgnEQlj9n4HEACaWJBInRYpLvzEhXSrJVs3V9gOh+D0madiqcwQ98UT2gZ3H6NU 6NK6jEP1Nqlgv+2sCJX0Fy6b19wCxsD/grCo+SMzRCrQCL/+qjo0ZlhMaGj8pnVT RI5l/bgYDX0/8nw06Zn95fmouAurWpvC35xRee5pLifZjT5DzEW/8ZAsrxz0q903 Ggxdv+yV53SRnlVNBGkMq0sgJ104bVwmjXi2MAbU++w58tPrSjsfBTTwQhC6xUgB zAfNXmrBr6sg5kJcIhYF42A3TCnYLlF+zrD1wBoTJOaQz5kpH6QjsRMUg5RZt/bJ HyhBWQkWqY5HXMyXfxk+9QyruousHvtVlGTh/LV2HQCOX9BxipEfSmSqly8/bO4D QctBrmLlb130mIbTwhBeIeHbaKiHhQDqaVNOgJ8EQJZ3sEgPf3IB6PJWQlGJvNJY A15rTqCW9jevpB5RVs6X9E3ZnrdUvoJ3d5E2W4cuNgCbYZSV85jCWoRofYZaH677 zuEeLU9/NvSCQpn657vQjsQocgS2tAHqU2zRqeH631WzvpIDcx6dMqo22KWdXa2s x/+Mljrro78IZZWdSVMQP/uMkr0PGswnWZz+Tw0HWeoT4qDt7wz07OqnHNiiQrXt i3fRzilV4fm6el76Jy/0coN0FiiofHeQ4Ea/IZ7ic15EHY77UdnqWlXS/Z8vY1uy v72SY8XkNK0ZH16kgbHcB9I3Nawwn/ZXrHaNG9THlUrs4Dyqsjmqg/VKcbR5LmYm Qf8K63YJcKd0jxaqtKI3FVRxEelHEOmlmqyYjo7Lp3lDh5n1m2GRqZ8xXMOJAprb CuY/BP/g7YH4JObgFg1d6OnRBVQCx/Vt9qaXzKHGV56kDrakWfQBkao5awxaPTx6 gVua1122rEk0bJhga5wPfCTHHa8zbOStr13Q0q9bteLSKLE8To1YWaT0nwxAjdo+ oPcnqIPSlwW7RRCt2zyJ8ZmFGl/3DG5bquRGsw6JxnoTZMGEL/fo31zPU/FM/GNQ hb3XdSfnO7DALWUyf+bHI3J2chZymS5oD7EvkFodLSi8/PWin78W6QFVdxZ9hCBB zuXMNUTye2noiYT+kQtfL5kMxHvrh7zMq90DAPMi+4jY4XfmHEpT0v7BFEJp3vuI v5gM5EJpUm1jUYw5DAl3/s5orLIbZ7JEVuEe1ZzZ94hYXJzbX9qxthoGLT2nhgfC qRMab8Jwlg+umP4744MflRwazwmvbMe/O+oh27ZiGxF/4JSbOL6ySGruT+jTjwFF bHL8FPOmYyRfuR57xRUXRC5T+1EVvvICJGPJZtA9/c79tlWS32aRAmqVErZ8gHI9 E9e2NX20iXyj2efqKEjrnYSgIbVpWjWeoYUS1tHKDUOQMwpz9cyldUxaIN2cXKiK KcDcY2JQU5xz4QsZAWBkYghmxXBeLhmWY2iX+Ykx1FEf7gmWpcAC6uqgBJpvBMxZ dmlKkh7rH/0r3A/AJG8kog== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID4DCCAsigAwIBAgIIIdIJIgT/BZUwDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTk0MFoXDTI2MDIwMjA5NTk0MFowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoxJF7c282FiV eBVjuAQBB8/RsCIuXLeVOWboVGlfPjoDrVIM/Y1+8cQxcb1cbiwLbz7lSiKEgPS0 HAECtkFzWjOxISyPsr2eLG6+J+Xn0aMWQBy0CS2M34wFdNXn4ZWYu910FJaHA72k vLNSwQ4ly/6LImv+ArMieJxbv+b0o/7PBL7HGDjLgzcahTPJs6IrCl4hFnRilmKa dQs1Pm38dMZxTd7+h3TqHo+5L0xpzj2o8SrVZ1iOOdhZIbyxf79qTlEoIG3u80qb FTVcGMb4SUy+Famna5CXc9cetiJMoR6ZvwzsLYXk8gseEoSHmk/sbhflTRuhgmyb Es1RJfY9GwIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMB MA0GCSqGSIb3DQEBCwUAA4IBAQA3SdmtotpMaApjCmoeWP0NEyC18YWUAYabg3rR 4Vq2VCs7ozSzK2DRWZ9fJf28wRRjllQgsfPkUwDAHPmNcDRhdEtAyIomqhaUGlIs Vi6/Mw4wl1Zwuo/51Y6chrAN5ZvJqAhpzpVC0vRXIVX1yQN7PZJMsnMVK3IGe6j8 wcxTfL1mOqCvdi27IaimjE8RG9wZd8HRAbKLfMV7c6nAtp2A25iOZ2PDQUr3mjPD 1T21ICWA6v3q8AlZZjvDtGmZA1KEQX8jWnLUQncIgvk+5xI3+6U/CWGOBnJhEz6J P7IqQwJ4h4cr+QBYAebkPQqGUvZsHo71Ss8TCjkf5pGn2hTR -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679272 next edit "Fortinet_SSL_RSA4096" set password ENC NtL97vgimUyQ+N+Nx40JOo7gxuhhK5scZqAZQy1f7PANPF8bjpvY9gt/l1+6y+Ob/NzgAVfGnZ9Ii0D30a2NQBrY8AWHf/Qt7ks2paoFd+lMKsRgXFZ/AYEhe6CSa4q6mdXz+xj4yVh4ECKgp7cxu8TAYHYAlAasYE6BqeSKLETxQ2sw5WI4/Dr3gI0FC/eCFbbYxQ== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIJnDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIpjoojl9gOMkCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECCms3F2uAhreBIIJSK89GcgEl+ZP lyxYXeGcVQ9hMbL2K8kX6E0d3TqICpivK6KorU5S5nhE/zUmoiiME7rFLY5vq+cq vV1MTeirJBglUjKjMHPniuO42i68hAVkxE4r1ymNOCgELSPdDDdnfYd0r2rGu4+k oJcuU6xvxsVkYsaK6TMpSN/Rq921S4nuDMoBNo3KuoklAk/E/869muiS8iJo64Fa QW1uUIhv/ea7Z84L2xZ4rS5lZUIoHF8L52MX86+xh5dNpRH6AD9JAUfP3Z49iD7o qfUL8rHoZfa6KYfTKSAnMiNS/AzM56nf9gY/mysX8RtXAHrvAi0ybpIOKC16qNz9 JFUG7j3CYx6trxI+0HybvLu53cn/XHJxla/n6msqUIj1iSsgmBKrdBEYu5swVgNz KL3+ksyNJzpc1CHk5iwRuLJqRNgDJHK1+SAo7V6kdcqzNd9GA3MaVcHS4hqsyU3P d88N+Wgs9g2FnoC84Xdm/XmjIKsmqNTu5HPnPga3y9HgJN3MBK3d597wQW+7uHsy KrTI6Ms7X0dLLhzBDzkEnRoXGXBKtDrezqKbgA6/FaSHeZawh8J39mGauEG+mmDf nW0baw1Wm1xU0kFXkS4DZ4JkI9XHxwhlXN5Mc7fVAX1iA8n6oMqS9Hee/wG1sUtL aWyw8K1TctBXlQBLE4+Gy1pVwqVCoNVRiwpvjH6CEB8FlloIy4vdT6IulONMVi2g i+ye1G+KiwpasUOCtLaABYgc/KCphPstIP7JCNc+t2v+GRcVE19bqGrbAqiBO/n6 qaHzyZiv56Ty4qQzA8RJ7yGCTXfx3vgAXIP5VNILCSlVGAiD2kamd9yT25dczesF O51xXxAHbwtTPItsXfI6ETa471ek7M3TKJuibJbWbvvOyxaiEtgw4QAif5XO4qWx E0wChGPUzRl0nUbbOdD6dCOtLCCh+CDeJ6mWKuxCa8GxKQdcgguvJcL/UYm4qfSx NYefaHuge2fuTBl13Qy0znwuwR9b9HkIO6ZahhnyFm2uV2MoeGA3HoFiNCJFqXKK 6pKpwwW4/VQVGAFyxSPxRNrY9g7ZHCZKUV88m1bCFF3/128CK/sQObvuzjWlLR5g Q/2Ea3eRuzexdo7jxGyJn5abPcIbNZmevufCgC8fXN7CLI1NyfMsb5MoYT8wv2Aj tFLhfaWWIFo9U24oQj0OzrEWUtKpBcUNRBwo8V0pl4cQLjenmVEpHS8JonCL+Lz+ 7zwGYvdVX0X/xTjZHwrSfpaa+BcmOqovsuVrXw5xPuZGGGlbEjDyjvWJcVIXjHnU 0kRtriaU4ZnaUb1hwHJJ8CWRZ3nwMgZXnJnArszcMAS42sYU/pAgD8VzEIlfrifI TsaTCjz7Qd0WQa+3MSkPScCLs5DXm0et6gcwyllmZWrbibGLcGJ8B6z5RcHgqgLJ w4tPZoDFBRWTMXPpOuDDAI7tR5su7CjavYYTdE+VuYy1WPzHfbHOG24G2xDlAurF F8AViNhvBNIOKjWI0cQhvlavw7eDdi2JfHZ8Tl23+LiPVExXcIID4ZZFREA0zQcL kmL8UPU/u0/DQ0WX1xvN2VAQV1h3yfGQzrBgUid+DE/qOBYjQARos6RkisagHRbK oQt0pT54gxQrq2x6OVkaHYyP0Yv4sZrJIg3Y04zYs613et4KlcFMn0VZwCPaBHR2 8TJg87DU/EHRryJJWeIPa9ihofGF3cf7urb4uKn5WFBx7qsB1qxz4/7o44EcD0Xg SnDkmJK/bb4MMHG5H6HPwS90cfescxFhZvkblahSx3XoXCMp8q1bG1FUxTfaTQ+s Evwjq0VsxTABu5AdVIgA16Axbxh8Z6z1sW8Kx/z3uQpEb3rPEyo4aJ94e21jlMxW 2FlaTRhyKV7APOLmlRI4WZn87Bi0DXXuo916ud87Ha7ernH1pZGTYu7ToDadQZDG 1eP7DzXehXc+IJ53TqRs3eM4vae64+82P+lR0pq1bMGaPSnJ4wIFe5CKhVTkTxWO HwmOrTt/gY3lbHL1KtdmiGzAXM+7XbgRk4NQXQMnkTKN+Q0am5IMaV38ieEgoezk YZ297zq2FNmk0Un5dRYc7T/dPCqRQOSB2o2gDXFVfdO5A04BbcrXb30CIQ7pun5E ddnh43YgvMbgiZmD1i2k2/2YDx0/N1s2CciKnUezDgIPllZzzHcQGtx+dxA3UQ7Q mtCizGt/5bBPUPqHI3FPRa8jwbK8qnDRuz6+MopD9ZRCQU/1e++mgCPk45SbqNd6 +0klQrOQzokGOFhHeG8/df9HyeGsEnfNGqxWTkWDWXWzItqWwD1drWgWLu27XAMX r07tY5hVkYEX4bgibIQsxEPvTDi2uwy+CZXMLmVQxO24C5wcfhoT7v2nrYi7fbGy 7YTBAYprtg1Kqo/8X5qazP6/Rb4iNfVXXInKjXpShs3Zmqgxs4x4gpN5y919Hdb9 0gIH3RX+fjlUTOhAmD1IsWZzRR91xiBDiN2hcYZ1WbE7OM6RubBN/xg3DgZhCKyI +vhFVrZmDzUXrQpOnUShlpVp7dmU6hJuPz8CLf8l/SGIvE/muKvL9fhs3Hf5rFbA LVfwXv2nl95p/W2V+hfEzfFQ9dZiw8iMWnacNmfxcmWFFx/lkLJAug3Bk+nWH7dW yLfegC6PpmcjABEwy4p0dPVaQuUEUzrN+WqD81UjucwIi0g5JkBRgVVuMPpZEZ0M tZgdoEhGp6L0vX9XHnLRpDGBdUEF6VOlWhxYfoht2Zvgp/noVpLo/kZcgbpGQ+kQ TShUY+DvBMo/SRjX//G11HDghy044AFbQSKgbWlzwtvg52gkQEe1o3bBDRt5wHa5 jiWZ/YnH9sZXBGM6iMNLQarKTiKgStGS9MWR3mwOSXRA/YfajnSSx4C0AMl7YFVL ie8HPjOxb1ufR/p9f7TxtPnAjlSGQN9ajUYl3O1AmcGaJ3olkLP4LlebyOZDRqHE Qr578h/DatyaB+wFblJ9omtcuvMaxnwkZDM84vPVeBc3CVuumpmXDKLDYM1SErkf 0/VzjRCn+kIQ3hKE36/wGqVd7q8M3dre5V5urVL52PuKhDU3LDGCvgGjjyEi5J6k DMHVriePveIeh96jr0PZ0zkdXnjwOSADwl031uKUTLufadkYkETGtkhcWNXP45Wz wQpUqNW/o5mlCzslOsviCQ== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIF4DCCA8igAwIBAgIIdy2lkiBjUKswDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTk0NFoXDTI2MDIwMjA5NTk0NFowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxcvWBLw4L+M4 KaveMqmfQ3NQpClj1VHuvWBJwT+/7d4J4VCHQKzWDW1ctWbWqqMzl7y82UgDyt1K 0dFJoClhH1Mc2S0vTu10SiAnq/0qXW0L1BJYoWHWoZxmA6QmRWkNsn9RGjVvp4Mu V6/lECtSVmA1i91DicRJ40WlwS9ZrCZASZMLdzGIJdbnrf5M06luIdLni1JFPkEw PZh9dogsccexNTiWQpCeSRueJZ8CqFP///hv1BqtEPvnHVqiMmNMXKbNW3PTipMA LWhutZJxlCLTERX+aPetPTqTQlqM8kMftZeQAMlU128FF5BTdnU+rG6eyNuTAFK5 h4K6/E1ks3Q5P5N9iae4SmLpJVlcJ52tMtDKYIawxaGCIw1bqaa1Jlampkm7tQHG LJWWdMIAk0nh+DihsuGqWkx7bbJHcYlTqTe76Y4cP5iOxRQA2c0RykxbrZYRQV1f c2tuERbTjXR0anA1x2DpvHCREuBdVhbUYbfbLpRnEBRnhKgIkYEXkZHsSdPQ8ely R2jAwmec2VKusHDbq7KnHKRCsmOFxIFbHbuDyl8AxnG5/70IdFEFKhbagfR9SbPQ 7TbcmdPR7B34u4YCi0ttuEiGtc0sdC98Sb1BB26tZHCD3TDRQZWagfywMXO1Dl2Q luLlo2kejw0PL78PyH43PAPHumJ3pAECAwEAAaMiMCAwCQYDVR0TBAIwADATBgNV HSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQsFAAOCAgEAUwC2A6IMbVLNm3TN ORAOC2qxL74pGR9fFluSZTc+6FibAed9HtUT4SmumN1NDMmUnacfS46UyDoucWjA k7D2avN7mq9vum9rzQq8SSHj2u8om6Xf+m5WubSgGEykzIxNJPgETLbFXyPrjXmn kKortIzqLrgojMFzLlI9+zcNbAZMjsVsofulouhdH6Cq7iE2Dp3zRJGRAAFJIZ4K Kaxg5/MpcOWPt/OrLtgC/Cdng0aYr2L7/SfC0cYjP9FYo9xtdeVXYbmw5G4MyUSl 0Fu1l6e44Fs6LtCCx7Ojmx5agqq/tlZ38vksr2QdGeuGm6RQegJ4ZLcVT9F3rvNU 6Oer9QNRsmFcxviBGiGI+sSsnJLClZrdejO6t5k5t7pZey/MuAsAB5FaKj7QMV9K +nMf3LpTrI+W07dRNWK81QNWgUxBLaZ6d3rmd15FKuw7GZkUx+NGWKIfBky/JdTO 1VBEpzxoiIOuCbTRDUVSnLFEu2H+oOqFb/UZvYc7Hz0RCTnGopLDCCEue6suKw4X HCICN338VwEiyBCa2cZHOU+Nl5hqruJTi6ctSI7EsFKjbAXuRCg2/G81kfccIBr5 MDbSIdMapqgGHS1tDQ6BCHaVB4Mj31wD1vp1UdIZPHXzhu2U+VfBIOkEn8ZjMFXm 80sxn140sy1THzQhzwv2WqgcmGo= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679273 next edit "Fortinet_SSL_DSA1024" set password ENC z7924PXdO68G+ahPnozk5JZzxn+BNth4wnGmZcV7v5dzTJEwsWe0aPLhiCbpr0WyAb2MR5alfDawYmIIc44+0w/MNnMsvA2eZYC4hQztx7Vram/8Bx12dfFGnKg2qETJqIs98hcRjORUIofXi6H7pCUm82cJBMZUvfAGE4nO+mhWn/TMUcg98Hf3MZkVMf1+7Fd+Ew== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIBpDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIMeJnxWttNc8CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECNZWMFshoE5TBIIBUCocrqJA4meS e8ZHzJU2ttXp9tltuSOBlIocj2nzQ1TzwxiyzJJ2ajIxNJ/PA7zgyEHOSyl8A0f9 NwJghCpscHkzPLpgRvYAeEI+SyzxtnXiSKRqT38yRv7TiauKN8JkU4iSOtwd+Dzv 9swMvVp5blGUytjTKXf7HI2oIgL/wtB94+4Fg6H8Zjn8tsWga5cwLj6tRIJCZ2Dl D6ZuQYh1OyO2Nk8IrvQlF+kXYnvbazLzMDqFTar6jzgiyJjSMQr/MoTL6zWVKpwF 61P6uPEjs/hOJ59GT2bBtrHaDc3iAqyQGUEeqktMFjAqU/RLc31dCIXiY9jAG+dS 8Q3brM00RTJWn813yA0E3UF/LPHd8kUxZ9Up9JTbqSwgJRUd4gZkkbQxomdIVU+U 2108sjGAUoon9bXJkQg4Y/KdSq8ry1T5q8YD3Llc9bMfdN/n8kLlUA== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIDnjCCA1qgAwIBAgIILQFn3Asn88QwCwYJYIZIAWUDBAMCMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTAeFw0yMzEwMzEwOTU5NDVaFw0yNjAyMDIwOTU5NDVaMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTCCAbYwggErBgcqhkjOOAQBMIIBHgKBgQDj//A+NBIRHpP7NioPCA1BIfUk sifrZVVUtjgNIYpuySIRXleothrWoHQ3MuxIv+pgzI/r/t73vcFyuVL097KY4BtF v3huz8FvU0Izgq9LiJCZ9c3GRx5Z4jmr5giRlRXpIZ70nvdxQlEkfgRckXJ4EQzS 17vYhbG6WNGOnI+2/QIVAOGSoaZejOg+/ygJInJCbelwKRWjAoGAM29O9eVEleZt 7ga1UM0Q8rd30sYS5oxO/oiYHfOjaQ2ETPbUsLt2sTcV5nrat/NxuDh8pUmyHqgM zXicNlQzkL5mBTXViRczaYExpYuoibS9ZXWEuz+TkHs/ldJ2r44axCxJ3pAdNnGq QotzJGVc1AFYqyyzWJ8hjVRuWeGUj3UDgYQAAoGABABzKSSHIKcg8qMIcJ9RHIC/ Ig5wQAb8hAnZbMCjblE6iXOTikGGQhNje+cCllVPnG16D9U0Z9D87lbQ+7ya3bCi d9YUVaGBQADq0OJvBNMRG4yuamqZKK2OjrJJxVFsMMGu6zOnpvDsPHkwRfN0IJOL hPn6Q9P0eR85zFHYMpajIjAgMAkGA1UdEwQCMAAwEwYDVR0lBAwwCgYIKwYBBQUH AwEwCwYJYIZIAWUDBAMCAzEAMC4CFQCzZ1fk8DEHvEdLJfKNgAwPVQbR1QIVAKw9 hlMcORGGU6UCYIFBMVOqd3pz -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679274 next edit "Fortinet_SSL_DSA2048" set password ENC c6pYqvlHXBD/j4kbmf4czFBiQET4OVcdVlV+RvxTh265Gk9gfbvRJHwACsUdB8Qo8MfNtDRDO8tFpvUStijxTrV1glrgyjdqchyPXx9TFPimaCpXsHRn+y7p2nXHy5I/ICtUCuvzVJcL8cNT5Kml5hxy99nmAfltjj+65nM65j4/kF+jcdlexzLBGGRRdtlk59zRMg== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIICxDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQILqgPpOo5cOUCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECFQjd77iU1k1BIICcLfzKLI/boVf yO77wE96NsMTy2hbaZSbC8WmavDpSKtk8ieU9vcsgmV+kT8gWAopX3hriNImLgIF +uObgDOvyfW8zTM9zaWI0YbFIFzCCD43VUu9XxzwfjNABKnXZAnssvK6NA34u3RQ XhKMlFokJER9k4gh+tS94/zLdbEW/0jO7p9cfPa0F1l8F+yJWYMRDWqGhJp7ALIp w3uhnEkt0Bl9Fx2X4r2y+g4fW+SYyTQKvUThi35Iipn0xyio2kYu2SeZIps+a76a RFtIjuHsgWfMRLlhgTF/rGWUwoUqKm+qMxgjTc6soFxFPRJ7rCZDXgQn1hL/6Bze G0yoR9P2nsfmbfTj0g7x0utTLtsdFPzLR7LEnpxDhDuLgMAT4iLMgpuP6qcJpp+b Gm3zZFTw1dh4RcsS5+WZaxWrj9CuYwFRcZJBB9AQdaO7AfDbWePitHoyaWleC89T LLOBO77oiVtrnvggMfp5mzVJBDEEgqfpMuqNRid6pX7n97O9R1pqOMbtrOvKyhGK rSfmIuTK1cMf/QCWso2hoSAQo4AL1XCoBFmtNpOd2zZ4DBBrUVqEZVzqGE9OpZ5G MZksSdGb2jhdGr6YtcK9NdN9Q1xSigGZa/+DFy5jhe7OSBa/26iYxsX6bt58nGIt Z5JCZHH28xIT1EkhRvu4SlVKn/Js0BHQhPUbMKQwOkIhfutAAteNAYaCuMN8COKM 4qQo7A6uTohhPyxpgRaYimZvFndhknG6yJf4AvFb41ap4J+7sZtDyz/CXLhUPCIg ot4hLeIYRObjZ6S6Nd8Z357tsgFSXasIbQoCTzXxsFIsaieoPB0YlA== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIFRTCCBOugAwIBAgIIRKfLNiJiUK0wCwYJYIZIAWUDBAMCMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTAeFw0yMzEwMzEwOTU5NDZaFw0yNjAyMDIwOTU5NDZaMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTCCA0cwggI5BgcqhkjOOAQBMIICLAKCAQEA1lOoS0NwLZgzZ4sN1VkW37q9 iAC6CuO/YNvU+nFUGK/cf4DHMUOF/6LgxzFjE/axZdMBMiK8bjpXoj98aTs4jwpP XGDv0KfS+pEd69ClPzk9MC4PD2RK7R1mLBn0k/pttaZyfgOnnyl4Ah1uvBcDALJE r74PzsGMzITC0Njqbo63y5JJaxqyg2rvZC6DcTDyuqYK/Qput486+diptuJ78FwS h8Bun8Hly/mhCA+6D6t/URUSyQZMQ9j42v+Oy7HdpQGX/XVRtlfyWFvs6ry6Q2qo ReLRNcF4w/cCbVyXXrUGiYPv+CiFxQSspEI8uGu4OGw3LQ22q3YoDrt13sxsgQIh AOCC+E+za68kLBC9NMwqIZZuil7DxcO6ka0lzpaC/XfZAoIBAAedYbZ2NsMB4qv7 qzOGFxXXtinb+aGPviXvI1eGDqnxPlKIgf1vsfZb8kywHTzRdqr15GDmMBUG6Qv2 BibzBqBDMl7lz4+pb8fFGED+ynxdH/TRMMGtpRs6o0p57lrWYSTYKIrEWY4aqy1m +QGRFlb5fZXT85GeK6DKdX/SA9j2fsY16UljdiwJpQ833JXxowfoNhGH5UvkxMRa y3QsINqaI/+zSQKHFqhilvOe6OOhRPxS9wScRJFbfQIKTYGAkUjkZv9rms4FxbF3 jlox2PMBlCZ7Q/XpEhqp/e3ei/LMdl+DXjdK19aDqLtbOm5i1cAY0y8nRLYFuH3E EhcV248DggEGAAKCAQEAwU44Ol6Y4mRv65zl6tjUtH0s+pEgL7EQHRP95o2a/pu1 C8CqZGWOg2VZoilUcrNWxtkTNbRILPYWT1o3ANYJM2us6/OARty9e4lzQBktVGq3 vpKUBRzDu7RRVzQLFEi9hGRlJal/ekEvMgg/8EZnwnaxUH9V4X6zqWJMJTtjEQ28 bdXgo/lYQ5V+pYdQghXfpqpyLMvaOFiZZtyC0hqiWA09C0FkJO72sOdZtISd/84n TLzvGj03IG565tSJq0ROf9ulUWW6XJdajUSytA4qmtZ7S1wD3nDlPGZeC82Y5r5m juCHYC/gXJzDP3uArPJyEVoSTtjT5wPOScxKAkbKdqMiMCAwCQYDVR0TBAIwADAT BgNVHSUEDDAKBggrBgEFBQcDATALBglghkgBZQMEAwIDRwAwRAIgVsIIRjRPOicn FzIw2NOlDEbkCOZa3ke+mr0BMPV3YUoCIDbThcvd/1IBwfHqh/I6PWcvnsSCS3nm NJnewWJ2sT0z -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679275 next edit "Fortinet_SSL_ECDSA256" set password ENC eZl0fIl9aYEJJhQAvcj1joeaxYds97cTmqexeBvpnIC07m2qQyE8/w8dZr83vkY6EUlVYAZA7MD395Cia6IY507N6q51qEuTzwRJX0kCh7EHkvCG9AzkNZEjbxib1ninG/IFFUv2zKXbAMc26k7qX4+Jc4GzakjdxZZOlkLFHBA6o/uh6i/b8xtC7ijw+G5GNLth+g== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAgVy8CezD3iKgICCAAw DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIXRgRtJuiftAEgZAMKF/cNddxIK7x ossNpk8vnNiXU1T3aGtqWYxp/lF+VImmD5VwpP7UjljSvcSNBizsLa8EfrKF1G3M qAnU7F7QHzeeTdLmrW3RI7v9QQ5ZuWjwcbi7VHWRLUh/NKKsYpF6Q4TZTDuRdcC2 GpS0q1XGmjhesGV37oJMrNhSqAoQeKSM5wAy+xbrY61gWgcRn6U= -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICVDCCAfqgAwIBAgIIL8/snzuexVwwCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMB4XDTIzMTAzMTA5NTk0NloXDTI2MDIwMjA5NTk0NlowgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEBAWG4cm9cySmuOaebWSCNN4O 6MrR+gFTrRI01uFwzzMRQUla7fTFQg/WgZXwM5KqfZOvhVZutZX/QhB2C/3VdqMi MCAwCQYDVR0TBAIwADATBgNVHSUEDDAKBggrBgEFBQcDATAKBggqhkjOPQQDAgNI ADBFAiBGxh7zNSjtFP8DFTcsVJsru2nh6rrpqEYbpZfrNgh0VQIhAOAfqjNxa1PH dRTPjEsjiGmQn02NHwe8IQRDP1ff5d2/ -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679276 next edit "Fortinet_SSL_ECDSA384" set password ENC 6Vh2RoOdTwgC3Q1UtX+f9bxP5/IoT5MeQUCU+7iVFNgtSjZzMfi+34YOxGj9JG3k/mJ7+SYyt6P1Ei5PCVQQMkeQH58uy9zQ6yYY26E9t7D0zSvd/nheC1vkGVyAAsLuZHoyi5+7YQErmwIqJC80yVYD60sh2GEknsYqC6ap2TNEcp1bWFhttEU7QkaqVk2aCW4i/w== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIBEzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQI67mN0jZ/oj0CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECNrHA9ZJZnlZBIHA+HNPuOv2tadv rRY2ntim6IzaM9u0VYaSTReHad2kdr0np+Lghixdl7mhhUraQ7B31PvqLIKP3ypX mlCtd+1UYRaYdXhhSRDCvRvpSEpnK8mi/GYiTEpwheb7pDzLwwq+8GAOD6UHE+Yd ZMaAkHkkjCJlqDXR9Tn+OeHJdnNJljQIPAX5tGk8756ptiedSEkKreFrM5xejPKd AJ+ATg3j3K8zJyluvVYgvTAaq494TS1v/kTEn6sqdpQlqT2qPrOl -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICkTCCAhegAwIBAgIIbBnjzWLtexgwCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMB4XDTIzMTAzMTA5NTk0NloXDTI2MDIwMjA5NTk0NlowgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEmdkzZMGkPJnDplTelKZZpLzMZ915 zkcmNwjJmSG0MhH3feMTkfWSCRVGYtgdqhGC+Gp6tIGduGIZkUH1jFOw8XTJrSie Bewwj3btEF1fc6t3ZZ6dQCbYotJVsHNl44wAoyIwIDAJBgNVHRMEAjAAMBMGA1Ud JQQMMAoGCCsGAQUFBwMBMAoGCCqGSM49BAMCA2gAMGUCMDsXL9qj40mWBT/RnHye t+u+hNLJE1BICqp8I1KubmlTUIcT/nq3CnNucusYjmAqSQIxAP3bJVf5WoWr/9yk 1NiT2LMPJA7MNU8clGoARGVwO9yqAYcnPOFGHArHGjB7pbHqog== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679276 next edit "Fortinet_SSL_ECDSA521" set password ENC sV0rgb3UieUP0OdO3Dw5FuljP7uO1FpD/EXRpMfqxNQHNhAOEn7HRt7e6Weo5QfIM+VkczCkquo5UnkAbOXb/a30uQrfykf7PfdaTPcgjVPxmBAuLJNTzJ8lu+NKJqyeE70Sk0yq+mbs9Fqa+fSZiy4Cyd8umD77Le9xbJBDBHDoztul4ulnhSs6abWv0eIt7njyNw== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIBSzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQI0B3O+wUXI/sCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECMAOaqIc6MU2BIH496MpBTxDVa81 W3sski7aPWjohOIlbWtvjCHw9MhAUqAKTnPQ5MygJu7bNEynW1MHuD8bLjwzLUFa 8BGiMA+y2tkWdlpnKMDnkl90HGfv3MjApdNBemrklibhKRQR7knbJH3+8EU9qs1f fjG0lIVWrcikYwRCXQdMNAwFQ6TGWtYVtQLQcnxjWq8Fe7fsBouHAqbYQIVPiJRM DF8xERtzgWffNmcySSCZL4EXRLu+hxXX7MlL2qyvmvXDttwUVlyXRtYYyKbBV2bP x7k/n4ksTVRU3v+Ka21J/43faABVAxlDTMTwrG43Z/ebconlkP6t0hAtsfBJnP8= -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIC3DCCAj2gAwIBAgIIZzPTdJo6q2EwCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMB4XDTIzMTAzMTA5NTk0NloXDTI2MDIwMjA5NTk0NlowgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDQxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQA39ZMXipPOWzcsnYdJchunzeu R3rvSwFBTrqEXOOKlvXXOL/1ApI0P1Lu0T8MxrR6WM3uUpk6BazoLhDG1B0jVrAB YpbYhGofigIa/ZdA2AOGWP5zvTyPBvEMk2UaNd8rKby4g+Lpbl6kiiHrz0SqrFVt /UGS6VsPbOA6nbhb3kQuA6CjIjAgMAkGA1UdEwQCMAAwEwYDVR0lBAwwCgYIKwYB BQUHAwEwCgYIKoZIzj0EAwIDgYwAMIGIAkIA7uN7pHDi9xaPfCx+D2rJt6EdpRs0 8sUXRwxiDmWgcMFipNi0PND7MqacdnXbbxmWPf2onAvs7t7M3h9M9GE0g3YCQgCQ D8woOO2KyKfA/qa9lCdvE8wCiMokgqirGcguFTnQibHhiT3zlma+1sO9WST7CHuA Up1sKW585kzBisWQ4ZbamA== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679277 next edit "Fortinet_SSL_ED25519" set password ENC Qdty86mbkPoFdBdyJrrNhiTyIUirIgryzd78ThskT0DaDefHc/DdrQehLQsvWYifUbWAGoe96nOPb/Gxvub29vFjJQIM8QKsTCdrpnT19kQW+c533QMtiFqksdXZ0LwubX/TDQYCFs8PKIO9Ia8WUJUb3FGn8fxIOH7AzlMIwNAPsfmP62Xi3FcO7fFbPDTFn/semA== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIGKME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAg70kOy0RWVbQICCAAw DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIs7PNEADpIWIEOJLcIoqR+PPq6Peo wfrY/1EAI3iRbaLhBMBs2qeG56/dPBR28AN1zBhSwAOXiK4XChFvnu1+bzeu -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICFDCCAcagAwIBAgIIabL/KYm6f0owBQYDK2VwMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAe Fw0yMzEwMzEwOTU5NDZaFw0yNjAyMDIwOTU5NDZaMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAq MAUGAytlcAMhAIg/0qml/5C3lzuK6azaPRaULyu4BrKkgFCHjuNHUr7QoyIwIDAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMBMAUGAytlcANBAIpWgIOpWys5 ivi5OxNs+AOsxOz1lJcyImnzeL4/O3vk9+qfq6sme/oUK5l6MaYcTjo8t3HtMF26 UeAnstJxwQU= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679278 next edit "Fortinet_SSL_ED448" set password ENC ORfDiU0hmVY3twroNn0j49spdu8Rq89q0eLzNWMQgmPFwfiHVqCvqWgx5OvbDZcwYr5vV+59+aSM5PISJkjiMlelljZbuk7CI/6g8JsTZa69Xf2R0kyughdygZjO9bdzwigN72b/YeUmNw1NvCNV5nvSbA4hVQa31lS7pPeLH3sSZiOk6gy/Nvf7fIt3S8OqJ7/lag== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIGiME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAh5nEfdrDgXHQICCAAw DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIqMyT+Ecx+VMEUASP6VK66DhgRNmE uVo6hnGYqqyrOHuLfSwu6LqF7bkh37UAryzl7N8V0frdusttI9qZngSkPxgSjZRw RRYG0h8MM9HFCtXSj8P2A1/pM+Jp -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICXzCCAd+gAwIBAgIIe/onALKU1BEwBQYDK2VxMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAe Fw0yMzEwMzEwOTU5NDZaFw0yNjAyMDIwOTU5NDZaMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQ0MSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTBD MAUGAytlcQM6AONmISUWHTcfKEYXjZxtsBH5/3zn613WdcbxgjWgWe5Q5WDKOljG xwf4qYR8FEmRxpjZldahtiregKMiMCAwCQYDVR0TBAIwADATBgNVHSUEDDAKBggr BgEFBQcDATAFBgMrZXEDcwCkkn07WmXIy4tv88km1pS1vx8RP57ftIIo9nU9E51S NIm5QrDXSQKjCfIQDo99qf0TzGcsb4oX9ICjl0xTgY3Vo3q6Jlg47CCB9DMOxYaV rKmbR7zSFPCsn60dzBlgsFszvMES7p4k+HEcVAQ9fiYoMAA= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679278 next end config ips sensor edit "default" set comment "Prevent critical attacks." config entries edit 1 set severity medium high critical next end next edit "sniffer-profile" set comment "Monitor IPS attacks." config entries edit 1 set severity medium high critical next end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." config entries edit 1 set severity medium high critical next end next end config firewall proxy-address edit "IPv4-address" set uuid 1052dca8-7738-51ee-fed3-b2b33346872b set type host-regex set host-regex "^([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\\.([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])){3}$" next edit "IPv6-address" set uuid 1052de9c-7738-51ee-f26b-e869c1d3e049 set type host-regex set host-regex "^\\[(([0-9a-f]{0,4}:){1,7}[0-9a-f]{1,4})\\]$" next end config web-proxy global set proxy-fqdn "default.fqdn" end config application list edit "default" set comment "Monitor all applications." config entries edit 1 set action pass next end next edit "sniffer-profile" set comment "Monitor all applications." unset options config entries edit 1 set action pass next end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." set deep-app-inspection disable config entries edit 1 set action pass set log disable next end next end config dlp data-type edit "keyword" next edit "regex" next edit "hex" next edit "mip-label" next edit "credit-card" next edit "ssn-us" next end config dlp profile edit "default" set comment "Default profile." next edit "sniffer-profile" set comment "Log a summary of email and web traffic." set summary-proto smtp pop3 imap http-get http-post next end config webfilter ips-urlfilter-setting end config webfilter ips-urlfilter-setting6 end config log threat-weight config web edit 1 set category 26 set level high next edit 2 set category 61 set level high next edit 3 set category 86 set level high next edit 4 set category 1 set level medium next edit 5 set category 3 set level medium next edit 6 set category 4 set level medium next edit 7 set category 5 set level medium next edit 8 set category 6 set level medium next edit 9 set category 12 set level medium next edit 10 set category 59 set level medium next edit 11 set category 62 set level medium next edit 12 set category 83 set level medium next edit 13 set category 72 next edit 14 set category 14 next edit 15 set category 96 set level medium next end config application edit 1 set category 2 next edit 2 set category 6 set level medium next end end config icap profile edit "default" config icap-headers edit 1 set name "X-Authenticated-User" set content "$auth_user_uri" set base64-encoding enable next edit 2 set name "X-Authenticated-Groups" set content "$auth_group_uri" set base64-encoding enable next end next end config user fortitoken edit "FTKMOB3A5151174B" set license "FTMTRIAL027FDE62" next edit "FTKMOB3A6AC1B7A0" set license "FTMTRIAL027FDE62" next end config user setting set auth-cert "Fortinet_Factory" end config user group edit "SSO_Guest_Users" next end config vpn ssl settings set servercert '' set port 443 end config voip profile edit "default" set comment "Default VoIP profile." config sip end next end config system sdwan set status enable config zone edit "virtual-wan-link" next edit "WAN1" next edit "WAN2" next edit "HUB1" next edit "HUB2" next edit "DIA-Internet" next end config members edit 1 set interface "port2" set zone "DIA-Internet" set gateway 3.3.3.254 next edit 2 set interface "port3" set zone "DIA-Internet" set gateway 13.13.13.254 next edit 3 set interface "HUB1-VPN1" set zone "HUB1" next edit 4 set interface "HUB1-VPN2" set zone "HUB1" next edit 5 set interface "HUB2-VPN1" set zone "HUB2" next edit 6 set interface "HUB2-VPN2" set zone "HUB2" next end config health-check edit "HUB1_HC" set server "172.29.100.253" set update-cascade-interface disable set update-static-route disable set sla-fail-log-period 10 set sla-pass-log-period 10 set members 3 4 config sla edit 1 set latency-threshold 255 set jitter-threshold 55 set packetloss-threshold 1 next end next edit "HUB2_HC" set server "172.29.100.252" set update-cascade-interface disable set update-static-route disable set sla-fail-log-period 10 set sla-pass-log-period 10 set members 5 6 config sla edit 1 set latency-threshold 255 set jitter-threshold 55 set packetloss-threshold 1 next end next edit "Google_Internet" set server "8.8.8.8" set members 1 2 next end config service edit 1 set name "H1" set mode sla set dst "HUB1_10.1.0.0/16" "B1_10.3.0.0/16" set src "B2_10.4.0.0/16" config sla edit "HUB1_HC" set id 1 next end set priority-zone "HUB1" next edit 2 set name "H2" set mode sla set dst "HUB2_10.2.0.0/16" "B1_10.3.0.0/16" set src "B2_10.4.0.0/16" config sla edit "HUB2_HC" set id 1 next end set priority-zone "HUB2" next edit 4 set name "Branch1-via-Hub1" set mode sla set dst "B1_10.3.0.0/16" set src "B2_10.4.0.0/16" config sla edit "HUB1_HC" set id 1 next end set priority-members 3 4 set priority-zone "HUB1" next edit 3 set name "Branch1-via-Hub2" set mode sla set dst "B1_10.3.0.0/16" set src "B2_10.4.0.0/16" config sla edit "HUB2_HC" set id 1 next end set priority-members 5 6 set priority-zone "HUB2" next end end config vpn ipsec phase1-interface edit "HUB1-VPN1" set interface "port2" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes256-sha256 set add-route disable set localid "Branch2" set comments "VPN: HUB1-VPN1 [Created by IPSEC Template]" set idle-timeout enable set auto-discovery-receiver enable set auto-discovery-shortcuts dependent set network-overlay enable set network-id 1 set remote-gw 1.1.1.1 set psksecret ENC ** next edit "HUB1-VPN2" set interface "port3" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes256-sha256 set add-route disable set localid "Branch2" set comments "VPN: HUB1-VPN2 [Created by IPSEC Template]" set idle-timeout enable set auto-discovery-receiver enable set auto-discovery-shortcuts dependent set network-overlay enable set network-id 2 set remote-gw 11.11.11.11 set psksecret ENC ** next edit "HUB2-VPN1" set interface "port2" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes256-sha256 set add-route disable set localid "Branch2" set comments "VPN: HUB2-VPN1 [Created by IPSEC Template]" set idle-timeout enable set auto-discovery-receiver enable set auto-discovery-shortcuts dependent set network-overlay enable set network-id 5 set remote-gw 2.2.2.2 set psksecret ENC ** next edit "HUB2-VPN2" set interface "port3" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes256-sha256 set add-route disable set localid "Branch2" set comments "VPN: HUB2-VPN2 [Created by IPSEC Template]" set idle-timeout enable set auto-discovery-receiver enable set auto-discovery-shortcuts dependent set network-overlay enable set network-id 6 set remote-gw 12.12.12.12 set psksecret ENC ** next end config vpn ipsec phase2-interface edit "HUB1-VPN1" set phase1name "HUB1-VPN1" set proposal aes256-sha256 set auto-negotiate enable set comments "VPN: HUB1-VPN1 [Created by IPSEC Template]" next edit "HUB1-VPN2" set phase1name "HUB1-VPN2" set proposal aes256-sha256 set auto-negotiate enable set comments "VPN: HUB1-VPN2 [Created by IPSEC Template]" next edit "HUB2-VPN1" set phase1name "HUB2-VPN1" set proposal aes256-sha256 set auto-negotiate enable set comments "VPN: HUB2-VPN1 [Created by IPSEC Template]" next edit "HUB2-VPN2" set phase1name "HUB2-VPN2" set proposal aes256-sha256 set auto-negotiate enable set comments "VPN: HUB2-VPN2 [Created by IPSEC Template]" next end config dnsfilter profile edit "default" set comment "Default dns filtering." config ftgd-dns config filters edit 1 set category 2 next edit 2 set category 7 next edit 3 set category 8 next edit 4 set category 9 next edit 5 set category 11 next edit 6 set category 12 next edit 7 set category 13 next edit 8 set category 14 next edit 9 set category 15 next edit 10 set category 16 next edit 11 next edit 12 set category 57 next edit 13 set category 63 next edit 14 set category 64 next edit 15 set category 65 next edit 16 set category 66 next edit 17 set category 67 next edit 18 set category 26 set action block next edit 19 set category 61 set action block next edit 20 set category 86 set action block next edit 21 set category 88 set action block next edit 22 set category 90 set action block next edit 23 set category 91 set action block next edit 24 set category 96 set action block next edit 25 set category 98 set action block next edit 26 set category 99 set action block next end end set block-botnet enable next end config antivirus settings set machine-learning-detection enable set grayware enable end config antivirus profile edit "default" set comment "Scan files and block viruses." config http set av-scan block end config ftp set av-scan block end config imap set av-scan block set executables virus end config pop3 set av-scan block set executables virus end config smtp set av-scan block set executables virus end next edit "sniffer-profile" set comment "Scan files and monitor viruses." config http set av-scan block end config ftp set av-scan block end config imap set av-scan block set executables virus end config pop3 set av-scan block set executables virus end config smtp set av-scan block set executables virus end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." config http set av-scan block end config ftp set av-scan block end config imap set av-scan block set executables virus end config pop3 set av-scan block set executables virus end config smtp set av-scan block set executables virus end next end config file-filter profile edit "default" set comment "File type inspection." next edit "sniffer-profile" set comment "File type inspection." next end config webfilter profile edit "default" set comment "Default web filtering." config ftgd-wf unset options config filters edit 1 set action block next edit 2 set category 2 set action block next edit 3 set category 7 set action block next edit 4 set category 8 set action block next edit 5 set category 9 set action block next edit 6 set category 11 set action block next edit 7 set category 13 set action block next edit 8 set category 14 set action block next edit 9 set category 15 set action block next edit 10 set category 16 set action block next edit 11 set category 26 set action block next edit 12 set category 57 set action block next edit 13 set category 61 set action block next edit 14 set category 63 set action block next edit 15 set category 64 set action block next edit 16 set category 65 set action block next edit 17 set category 66 set action block next edit 18 set category 67 set action block next edit 19 set category 83 set action block next edit 20 set category 86 set action block next edit 21 set category 88 set action block next edit 22 set category 90 set action block next edit 23 set category 91 set action block next edit 24 set category 96 set action block next edit 25 set category 98 set action block next edit 26 set category 99 set action block next edit 27 set category 1 next edit 28 set category 3 next edit 29 set category 4 next edit 30 set category 5 next edit 31 set category 6 next edit 32 set category 12 next edit 33 set category 59 next edit 34 set category 62 next end end next edit "sniffer-profile" set comment "Monitor web traffic." config ftgd-wf config filters edit 1 next edit 2 set category 1 next edit 3 set category 2 next edit 4 set category 3 next edit 5 set category 4 next edit 6 set category 5 next edit 7 set category 6 next edit 8 set category 7 next edit 9 set category 8 next edit 10 set category 9 next edit 11 set category 11 next edit 12 set category 12 next edit 13 set category 13 next edit 14 set category 14 next edit 15 set category 15 next edit 16 set category 16 next edit 17 set category 17 next edit 18 set category 18 next edit 19 set category 19 next edit 20 set category 20 next edit 21 set category 23 next edit 22 set category 24 next edit 23 set category 25 next edit 24 set category 26 next edit 25 set category 28 next edit 26 set category 29 next edit 27 set category 30 next edit 28 set category 31 next edit 29 set category 33 next edit 30 set category 34 next edit 31 set category 35 next edit 32 set category 36 next edit 33 set category 37 next edit 34 set category 38 next edit 35 set category 39 next edit 36 set category 40 next edit 37 set category 41 next edit 38 set category 42 next edit 39 set category 43 next edit 40 set category 44 next edit 41 set category 46 next edit 42 set category 47 next edit 43 set category 48 next edit 44 set category 49 next edit 45 set category 50 next edit 46 set category 51 next edit 47 set category 52 next edit 48 set category 53 next edit 49 set category 54 next edit 50 set category 55 next edit 51 set category 56 next edit 52 set category 57 next edit 53 set category 58 next edit 54 set category 59 next edit 55 set category 61 next edit 56 set category 62 next edit 57 set category 63 next edit 58 set category 64 next edit 59 set category 65 next edit 60 set category 66 next edit 61 set category 67 next edit 62 set category 68 next edit 63 set category 69 next edit 64 set category 70 next edit 65 set category 71 next edit 66 set category 72 next edit 67 set category 75 next edit 68 set category 76 next edit 69 set category 77 next edit 70 set category 78 next edit 71 set category 79 next edit 72 set category 80 next edit 73 set category 81 next edit 74 set category 82 next edit 75 set category 83 next edit 76 set category 84 next edit 77 set category 85 next edit 78 set category 86 next edit 79 set category 87 next edit 80 set category 88 next edit 81 set category 89 next edit 82 set category 90 next edit 83 set category 91 next edit 84 set category 92 next edit 85 set category 93 next edit 86 set category 94 next edit 87 set category 95 next edit 88 set category 96 next edit 89 set category 97 next edit 90 set category 98 next edit 91 set category 99 next end end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." set options block-invalid-url config ftgd-wf unset options config filters edit 1 set action block next edit 2 set category 2 set action block next edit 3 set category 7 set action block next edit 4 set category 8 set action block next edit 5 set category 9 set action block next edit 6 set category 11 set action block next edit 7 set category 13 set action block next edit 8 set category 14 set action block next edit 9 set category 15 set action block next edit 10 set category 16 set action block next edit 11 set category 26 set action block next edit 12 set category 57 set action block next edit 13 set category 61 set action block next edit 14 set category 63 set action block next edit 15 set category 64 set action block next edit 16 set category 65 set action block next edit 17 set category 66 set action block next edit 18 set category 67 set action block next edit 19 set category 83 set action block next edit 20 set category 86 set action block next edit 21 set category 88 set action block next edit 22 set category 90 set action block next edit 23 set category 91 set action block next edit 24 set category 96 set action block next edit 25 set category 98 set action block next edit 26 set category 99 set action block next edit 27 set category 1 next edit 28 set category 3 next edit 29 set category 4 next edit 30 set category 5 next edit 31 set category 6 next edit 32 set category 12 next edit 33 set category 59 next edit 34 set category 62 next end end next end config webfilter search-engine edit "google" set hostname ".*\\.google\\..*" set url "^\\/((custom|search|images|videosearch|webhp)\\?)" set query "q=" set safesearch url set safesearch-str "&safe=active" next edit "yahoo" set hostname ".*\\.yahoo\\..*" set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" set query "p=" set safesearch url set safesearch-str "&vm=r" next edit "bing" set hostname ".*\\.bing\\..*" set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" set query "q=" set safesearch header next edit "yandex" set hostname "yandex\\..*" set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" set query "text=" set safesearch url set safesearch-str "&family=yes" next edit "youtube" set hostname ".*youtube.*" set safesearch header next edit "baidu" set hostname ".*\\.baidu\\.com" set url "^\\/s?\\?" set query "wd=" next edit "baidu2" set hostname ".*\\.baidu\\.com" set url "^\\/(ns|q|m|i|v)\\?" set query "word=" next edit "baidu3" set hostname "tieba\\.baidu\\.com" set url "^\\/f\\?" set query "kw=" next edit "vimeo" set hostname ".*vimeo.*" set url "^\\/search\\?" set query "q=" set safesearch header next edit "yt-scan-1" set url "www.youtube.com/user/" set safesearch yt-scan next edit "yt-scan-2" set url "www.youtube.com/youtubei/v1/browse" set safesearch yt-scan next edit "yt-scan-3" set url "www.youtube.com/youtubei/v1/player" set safesearch yt-scan next edit "yt-scan-4" set url "www.youtube.com/youtubei/v1/navigator" set safesearch yt-scan next edit "yt-channel" set url "www.youtube.com/channel" set safesearch yt-channel next edit "yt-pattern" set url "youtube.com/channel/" set safesearch yt-pattern next edit "twitter" set hostname "twitter\\.com" set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" set query "variables=" set safesearch translate set safesearch-str "regex::%22screen_name%22:%22([A-Za-z0-9_]{4,15})%22::twitter.com/\\1" next edit "google-translate-1" set hostname "translate\\.google\\..*" set url "^\\/translate" set query "u=" set safesearch translate set safesearch-str "regex::(?:\\?|&)u=([^&]+)::\\1" next edit "google-translate-2" set hostname ".*\\.translate\\.goog" set url "^\\/" set safesearch translate set safesearch-str "case::google-translate" next end config emailfilter profile edit "sniffer-profile" set comment "Malware and phishing URL monitoring." config imap end config pop3 end config smtp end next edit "default" set comment "Malware and phishing URL filtering." config imap end config pop3 end config smtp end next end config wanopt settings set host-id "default-id" end config wanopt profile edit "default" set comments "Default WANopt profile." next end config log memory setting set status enable end config log null-device setting set status disable end config log setting set fwpolicy-implicit-log enable end config firewall schedule recurring edit "always" set day sunday monday tuesday wednesday thursday friday saturday next edit "default-darrp-optimize" set start 01:00 set end 01:30 set day sunday monday tuesday wednesday thursday friday saturday next end config firewall ssh local-key edit "Fortinet_SSH_RSA2048" set password ENC n7jH3vHK6fJ9IrJi8UOMu+oVsBt06ydVlWsfes2P3lzQQx3srChirs57xVNZM4zfP90lhfZKVMCdDeTcviHj3PyuFvr31USrpFb8gg5w4cuGoBimx9XRWDsZGlLwEn3uPm5strtR0f0/7a5p4nZ+HE6rgKig4zuhmjfNz2iFtkq0lWNhOoe1YJqszf+NGCrbcDPdYg== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBSCLh/Ia EMjvnYAeTUX756AAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQC+kQMiorz8 AtNZ7/Mj8TiJLxrhwKW1xCc5l+K7kcilYNyMGrMRkJYUd3wxS5FOvdpZgcNnDJrjYpVCuC YVI9xniVj/c8C+siDqv371d14wWKSZXQdGo3lZJOJsZWZfwwf1W9R0PNdvGvo/aeDAlHmA E1kgyzXGM5MRE5mKWcXusNZcs9Sy883Tq6nXhLy9tC8/8ZWuwOgiC5LOzQcnqcTiYXcaIi w4rJAEIKeUjpEGIsnkg97TOM9yJHPt1+a6AehqpyB5bPlN+S43YSv5rtMOsdAvjVukgDSl gBbCdarGTxiBWKnpQRNpI9JU2+6AhYcpMHwK+FvQSKIMMr6mm56LAAADwG09X0dL+2CyoL hG4w+5bnlCEMhDULIUmtZeXGJBWW2VQHtv1MIrmn35mudJZwpvBDXYF81sJ/zcTJpLQhd6 4f6anh+YHKpG2xxQmmEqgXJsrSFFcP3TOAFT7CsqY6RnF/P4hGBVrPsD9cR9/0JO/8gaui R15i2bkbuzlCwk2PN5pfHE6NDvD5S1RJVR4Ex4kD1JJO5JWzK0W7xvcCRI1tqwjKosHkQm 6DeUsUCYQfARqSGVMmjrt22qRTgIMwqggEZL+/Ms+Ywj2jj+phbpSRPOrdhgYgF+1s7OfC JmPUlvfC7kwmtTTFQ3Nvg9OWw09rA5yY6ymXRAlO8U8egz5EEwkNZKXIfXBFC1xqf1zVQl neunRFrCFCXeguoIXFRrfaKniSVqLGC7nPiAeI1ElFokRQDWmKh0qzX7Rru+HD96rIkdwB HpZnJhHwP6jVtUx9V7hqHlHVVu+wn1vJDlVIp97+rm0Mpq38NPtoLYYxCaytpy+YvnQIGX sjmbNtTfjQRrFhMGM8X+wFkbOoDxknHUmxOYauLCeM/Fu5ZooBZA8ZGZz6Q+67kAa43pzY qzwXFWe/ndyyBaHi5QuJjpNW3XU9aIb8vjrdbrhrnI5ARvQyQnRgtsYnZ1OuissAN3XkcS JDfm//vEpxij1pKHCa8V4SXytlXbYPmfMeRV4HcNcgkTJJn6YKi2yBbxezKQM2LmpOCTde pht7lB9sRq5sI4zfls3l+6B4nGaM7Aglkuqm14bQ1IrLkzLaQJSKozv3gZlPNoHF/9lu7C RFt2kcB3hh63/AICCFbQ08pNfPQTCGzYUQRhjiMrEMtSXchgQxuw9RNlNnUXxKFSSLg4l7 qAcCMVGvSgvRuTv0RqJAiKCGTeDkpF/ikSRGdIA6YF2nBoN6ct9pPXOsKVgM0nKMSZO6G8 4/xUd7bACHPG/CFKRFnoAw8QlBovvhOp4CtwW9F3uvArCb6bfMMozN4zTP0AQ7mPRxt8K3 hDNc9u4kg9nWfuXHIGnr/dnmWNxwbEEhVTD0yw6pcmXP1fiHO0lmS5XdpSYvrckExqmdzW bXXU9UkqZQgBAgGVb4Rr+J79WY8pW6wvKl2Ga/arkVeib0q3Ehljalps8BNTLwpDNPLn22 wgw9gGzFysphOVKVhDgEHwL6KemNU4HkWZp0rwELiUKWDBRz8rnGbcwI+46KpkCacceZFU npC6IEGYnYJkfo2VLsPPEqcBSi6xVWNwfnHgXPcAmo4Shz8qF5+U1elPh5mvqUuD39BLsB hv6T3itg== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC+kQMiorz8AtNZ7/Mj8TiJLxrhwKW1xCc5l+K7kcilYNyMGrMRkJYUd3wxS5FOvdpZgcNnDJrjYpVCuCYVI9xniVj/c8C+siDqv371d14wWKSZXQdGo3lZJOJsZWZfwwf1W9R0PNdvGvo/aeDAlHmAE1kgyzXGM5MRE5mKWcXusNZcs9Sy883Tq6nXhLy9tC8/8ZWuwOgiC5LOzQcnqcTiYXcaIiw4rJAEIKeUjpEGIsnkg97TOM9yJHPt1+a6AehqpyB5bPlN+S43YSv5rtMOsdAvjVukgDSlgBbCdarGTxiBWKnpQRNpI9JU2+6AhYcpMHwK+FvQSKIMMr6mm56L" set source built-in next edit "Fortinet_SSH_DSA1024" set password ENC 12X8Fu3AUledc02EmJm8/Ih8HZuRV53GuwGzofcctVXXRZhVajrTt64MM+fsgklLiFQnEebXLt+/H5ExIj5ZBLbbmfEQUeImglLRFmr4Ss8enG7BT5lfmn/ngJb1xFFAf8QM7M1CIEClkcpbR7m0k6RmGwDKykJ6TlgQjB2PQhPHdtD5iLb0HXSeLIjsu5X51qggGw== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCRxzd+AG zSxKMI3Z9hN3fVAAAAEAAAAAEAAAGxAAAAB3NzaC1kc3MAAACBAOMSKIu2czPOPT+Afhba IZue54MrXJZLwlb57kvytmr3BsdkXN8YT4spGt+rENed9WznFOxW3CiVODXPkxmLDrAP85 J6IH1I8gfO+xe3lDSFJhLyBOuHQFLf8XNswVlnKzgPbuCGCBdCDkMXqC3xXuFa2xensGIP SRmCUUmwFVFtAAAAFQC2/Nxx4m0omS0OLoE01w8v26RtuwAAAIACSwrqqrMNO00JnhMgTg EAy0phTBWZoobK9U66GdIErJhVmDcJrSI8WkbIRJ5yr8N9qYSHXky12iEab+kieP1BHF7c TfN8WOX1hT4voJsUPokBMXyokFgTLSCZN3ki1eV0a+ZfRbSav97q75BBBEQ6QCOEBOv8dI kmkac7u5NqcgAAAIBHEb6ok+roGHTrnhB4DgZblrb3b0wgk9vTFBUtrHLmeIdpR3qvs35j rf0MIKyToKQZ+ioyyfearrXqDzD+Ke/q35YQV1VwfGiWzblvw+ugTTrzYQUhGRhz6GUIrf LzaoD/di0pnFg8mrHg4LKj0qNjNSLAIaY4NlLfP7z1mxDGywAAAeAkS9fd4c67k/wPt5uW B8qLHP7Kge3E4qYWdECmcS2VhlVlXMCh0FojN9md07WvcATCLFxZS71GGVb82Pru4oSwOA iQGgpakr8vNaexf4sVvA9rxnNCQQwe+cj1/q8jt237YrpaWAngX3w+5I/6Ux0IilXdO3sp +V/tsKjBM7PaGk2Rz+c3hKVFh8RMltJ+C/bDoPe8nlc88Ho0TNyzEVKhaYYGbQKj3OawYt 0NB0L5HDJzSnarhZoOzZpLfLFIxR2RDEFp6qcwszUD9PfjA5jORNviMHvzhm1auOfFPoiQ SxI4LDjKSPByPStyXxAIud1jX488cE7bDyUMRcidxHYqRXKk6qm3p62qGiTVBkEX1Od64g 1o3b6pY/RpdjmsV5AtoEimYjwulkHQdVenlVUl/emVE0D/K1AnUYrua5rSgcq//xCMi3L6 p3o04wDoP8euxqGcA+LrYojlqZBgAKF644/zDuw8mJBBeLTHdTcGMhM3m4cvFEewRUKGk8 gzmDI9yAJ7FLul4+QSFtTRMEbu9QkGfbH2RAiQNjbmPKPzX8DjzfYLTsiZ1h4v4A6AMtF/ yp6xh3h51JA7bKrDiqVyhkZnah9XdelgweuCvfhsLqS70kR2V6VR7DgAiSLYd4I= -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-dss 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" set source built-in next edit "Fortinet_SSH_ECDSA256" set password ENC 18T9sLvKX9UEmAE5eC67MMxLeFeEz5Bi6UbDMRU+8oLO4yvMiBbPWnzb3LggEU559OWfFlOE/J6AfvL+2VHkqXu4Y7vWq4ND9EUgsYRuuVwyDbsNNiWsACYGu5lGHdRZ16pL6Dd3iaMNS6a/mAro73CdxwJSjw5QF5ZDlLwxst5aqXCm9mOjuoBzSDWcYDLXaIOqBg== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBKB1Md4F B5bsBNTtlLo/BkAAAAEAAAAAEAAABoAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz dHAyNTYAAABBBMJfowjuUvohiQZUV+yajsVUufh/5LGgYaZJiFP8b+UrNUoj/M1UkxdPaZ KFqk74gFeBBabPNcs1LiiNXFrvyGEAAACgA5sV3RjC5oqdSbW1wQArIOpeMY3gNDLT4+Yj BIok9NOxBX3hesomdle9udy8FauM7p2C+cR+NAyUsNXojVa2tbsAWsQTIGUhUVDGHJdsL/ NPt7zCLwf2O1vUQV19KJy/t8ZWy0Krs0Iz+aUI8PLaXi/GX0ZcsHbxNitj9kDSCuZM7+jX eLpyCaEum1RzDB5dllXPhrDugI0y0wmKG7EQSQ== -----END OPENSSH PRIVATE KEY----- " set public-key "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMJfowjuUvohiQZUV+yajsVUufh/5LGgYaZJiFP8b+UrNUoj/M1UkxdPaZKFqk74gFeBBabPNcs1LiiNXFrvyGE=" set source built-in next edit "Fortinet_SSH_ECDSA384" set password ENC +5GxC/SkrJuGmwPQTr4muJDSYf381b8udBFGv4R3G9QMVKr2xxOtjOzwTtLQ5Q5zAcZ5j7tCz2/lMp2YgoVhSp1uJAaQ0s7dGchXYvX7Uaszg6SDYT0oUXiFZYFie9v8feh/B5hCp9mtfQerx53qxEks5MwyGxOd8wgIBkwdhNNumdRJMSZqIau8K7tJPB1FXHFZKQ== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABA36WHgUQ 9nLP5MiYUuXCwJAAAAEAAAAAEAAACIAAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlz dHAzODQAAABhBJuZXUm5jjwwltjXNtYY9sTzPsWcIJ8fl/QIbrIzAnKkdYQ4pk2W8kPJ4N YgVKc0VK8R0DAg0SU5TaPFUgYbXt+MIXlsOAtd73yisHeD8+0gAmHH7LlZHg2HFrY2G6kl FgAAANCeWK3aQJyMKL7KESO31QLPuwOkiWRTcS92IARZZY4Z3c2wtKicd+Ci39VDhMKTVZ 1JvYHfgZzL7KhbXmUJ+3VsyA/Woim3Hl4LMP9Z/7qNYEtnRnCP1bkwLLZvkewTgsOIlR+k r3SD7LxbiNKjAHp1REgIvaPa2A5eeYZW4rWlfU61NUUlidVc0zxI3KRQUlytfshTYMCAp7 TOjmHpOK0BM2qqvt9sf4K9xFDhneRR8SyBC2tlJ7eMNECp/Apzdfnwe5euS6M1rR7edaOF BN76 -----END OPENSSH PRIVATE KEY----- " set public-key "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBJuZXUm5jjwwltjXNtYY9sTzPsWcIJ8fl/QIbrIzAnKkdYQ4pk2W8kPJ4NYgVKc0VK8R0DAg0SU5TaPFUgYbXt+MIXlsOAtd73yisHeD8+0gAmHH7LlZHg2HFrY2G6klFg==" set source built-in next edit "Fortinet_SSH_ECDSA521" set password ENC 9Bmbx6Ag+sBtA0seg/1smo3aWsvkliQW+5FJGCiq3POaseURPSO/aB8e+iUfJKh/ISmHOTy+Gkly6EzPYvDitTvmlB2MGYzuWkR52Qtcsy18Tzfv5vghoEmqwALSTg+jB8tSH1nXoeqWLtVcykVeWabNc3mdttA0wS3jOTrj+OSJajqCzRAYx66KfmHM6S6vFnVNOA== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBZyTvEX1 q9DFg07+l6wpc2AAAAEAAAAAEAAACsAAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlz dHA1MjEAAACFBAE+nZBSCM182OIGN/brVcnCjfVkyWPFTQgiZBvrmImH2LAZflz79iMSky RVK5IOb/XT63X6T825QlAzpPepW5wEYgCGpI9mBu+F7InUdOOKTsv20BTtaKx8ajo4o0ih NjV0hIhtVXDhpvIWDp7wYpf7wKUzP+K2SrQcpTmQgy3q3OTdBAAAAQBN9a0owWD0ZomcOy TafdLsIIdK8rBR5NU38HXpQ7k0C/BpoXkUs79on0+5YOcGmJ27Kq7ASg73JtbqgqE0NXtX 09gVfJdPIez7dm+8mk5SmPYWnw0hmZafDVbyG20I14TvVA9Qw93ljpS+MJ2lqS+csf0Al2 L7sHNH9AX7DCDni9W283Je2C1/JPg2EUjvVMiHJYDMzqREaKsnnh+TOeHedVPlMx46bDzl GduHnKdRSMkzAFq6A6LtzrUjDHGlGmRPkhC5wIhZwFOryY03D9SExL+EOngqr5FzIOwjyx wDz1XbduzlGNXENYqo0YkcMxVpmAoZMmbhTAdXyfww/ACX -----END OPENSSH PRIVATE KEY----- " set public-key "ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAE+nZBSCM182OIGN/brVcnCjfVkyWPFTQgiZBvrmImH2LAZflz79iMSkyRVK5IOb/XT63X6T825QlAzpPepW5wEYgCGpI9mBu+F7InUdOOKTsv20BTtaKx8ajo4o0ihNjV0hIhtVXDhpvIWDp7wYpf7wKUzP+K2SrQcpTmQgy3q3OTdBA==" set source built-in next edit "Fortinet_SSH_ED25519" set password ENC EVvor4PZcUREqVWKcYqHBqixjWeDN2qwse2V28A/g9ioHhBQrSnsSEFcF+VHqlUTG9PWTWy1vqGQwYJEzKefpVcFDNXDFUuO6Sg1u7f7YjSX2Gbplw7mRCAgM8Xy+mca2EBO2A6MuuqeuZlaKfesCERzzcNtlKAtCrOFthhUzpwrdNuXpwNBV14NkXsJafMNR5HEYQ== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABC35rcuI5 Fwl41d0r9yUBqRAAAAEAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAIO/CaFxWIwWIcIiC VdWI7fikNfMf2gNSF9AaO/IoqmgvAAAAkHNeQlc2kfnwzw9OTr75G+8z4IE2tV6mDd70HU 4R/9Ih0i5A0HRw0J3RjgHKnA39oaZq9s4cKfZX7zpV0ddYMljHtkvsTjoO63q4uvmpDg76 dtsiSPWAGJywuFlKwb9c9dVaUF4I8DStrVUR7l9Y9t0rG8dLAmsHvsp4Xe3huyV+BBA1hh 3Y2dywhRyQGmMqaA== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIO/CaFxWIwWIcIiCVdWI7fikNfMf2gNSF9AaO/Ioqmgv" set source built-in next end config firewall ssh local-ca edit "Fortinet_SSH_CA" set password ENC cxMAeY6Q4ana3ngXS+jZiuaADNxIueOhRTFVUH5tKWPKfNOEX/HfKUZ0u4b2wqUSc30zhgXHKP2lym+2yTxKgxxqowbPPVhd2UBlZ0IrR5t/aVMg0FhsuVtEyQBl6XwoKh/83bnq068NxJkEcB6S1gJTt6hpR/OkeDdIWflvpA/ab406d7oYxN3AfJjlhIOw1fbHpQ== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABCUXHSasM +3wkXqUsW9U6zzAAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQCxb+11/XNR DY0C3WmVhTNF9c3Wj6mg6A89ekqW+lKv6T5cJzoApN1JVWw/Ex6lKLUtw7P33psIc/Htkz AE8uzn/fCsqPRDUqlR1hwAkQ1DyhL71KVSJhleoibbFWU5ap9cwpWZ/GO2HEzQmgg/5rVy sSlf7g/s5Uz93b8Wgev/VoEpetAJhi0zY+tmiMOfUK2H3vSYFfpUZsiwYqbd9tfvb0yMB6 VanKwtpmzx/fP+8FS5dz/n0UacbM8cWeBtLZscGIb6gULIMTxvCHldrCOv008W1yWMjMfL OMlIl5IzdjPJY5YPF747gytbsmbdhKZyWenuj5Fcbot2/o+MaofZAAADwJy1LW1n7Cpnx3 u7B0eWccLlEDFifpTT4Mwq++ttuwV4thR+LZAb9Nf3Yv8QDTxFLpGe99bzLYA9+h8CRnTs 0wOoPtxwsoxGx7VllPcAcquECU00qF1gUDDsUPbVrY2MfDzJwB6vv+UHYqzwQ3ymuP7T4s GwVFbdGuK5ioNxgNt8qMlf4Wob1ZzOjqqIKhCZkSCkt2Kx+Bzb/A3zHZSDBSVcCKib7QtY 6P7f8gW8L8UtTpirj5zv8F75p9jMn4CFyHVJ+ybBAs79lTm5LvsAkw4mMNsyl1jxEKt5tO bCH9mExynkFEXdBrpQURJNOisi5Bf6/FcweGI0xq2Iei7Sp+oYwm5obW/14kQWcWFnTQ30 TdTDkZbXuPfaybBM0y0Nf2gv4cEQ5WGjtHfrTgQa5dp4MNo4HzeFoDxpmNioHqRlIf1SAq afIFf0+Xmu3iBDWj1gsVblnbf2vVZubSI9b66W2N4LFK58X72jzW+AdhlyNDh0fwKOMXby RJF0zgCna34IoCkWmC8RN3AY8ZdyKyKcqdiZgLBzNT7+rBS0wk8euvPQFK5IYRbrH9ePbv 7wWBvs833075xogbfbL03jn2vy0g/ebWXy4WeLhJUPDsagPaUxD1pPzk8Fp5YQeyEzmhQy L2uajZBkyQDhO2DGZ9GYP1uguxCk1BruOaKc/54oUSbMTpZWU9fA24QD5W1kF7ElE7vSb5 SKjk9x7fmrlkgMiV2qneJilh20J1QLRotrlwcmhP9Un0O+P5UVhm6ZtJMB8T8qUsq4nzj4 1jKRcoh6E2khjR8agIl85lK8E1vRb2Wrh4XKAqvLYqhJo4g9dRNgw03a/nu+fDnBRbRSUo dDt0hfbLUVKeM8es5tEu18C4N/EeV0yiNekTtvnRKTlYWjxe1nILLseQhKgl0RomYagpfU jQ763l7utguIZkk4y5hdxFbscFNtgyYDXb5+t+R1ZFnn9PGuU79cm4X8s08H8gpQRtmg4T S6zqvLiUWNA5MyMnBV8m8ZvR/yd3IJaIJmY3+0xeiiCdEi6orZjnxfPAGcjtVqpD/h0dJy wlO1cMBlfXl9raQDSgUSltv0dV1luNUXSFrMzC+ZDnClK+6hqaMPbWakZdo6mbq63sojAp qQcvkNsdC+5yKP4Sd3wnQSx3In1+Ok0gD+R3ZjuLrSh0+cSVlBEozC7q/dtaImo17I3rrX 5NwchmzgAZfHLPxIdwqrdjmcWyWZPWz2z3LnC93kGqgm5cgeHt09WtBDFIJR0TGIpDT0mp VNr9ewmA== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCxb+11/XNRDY0C3WmVhTNF9c3Wj6mg6A89ekqW+lKv6T5cJzoApN1JVWw/Ex6lKLUtw7P33psIc/HtkzAE8uzn/fCsqPRDUqlR1hwAkQ1DyhL71KVSJhleoibbFWU5ap9cwpWZ/GO2HEzQmgg/5rVysSlf7g/s5Uz93b8Wgev/VoEpetAJhi0zY+tmiMOfUK2H3vSYFfpUZsiwYqbd9tfvb0yMB6VanKwtpmzx/fP+8FS5dz/n0UacbM8cWeBtLZscGIb6gULIMTxvCHldrCOv008W1yWMjMfLOMlIl5IzdjPJY5YPF747gytbsmbdhKZyWenuj5Fcbot2/o+MaofZ" set source built-in next edit "Fortinet_SSH_CA_Untrusted" set password ENC jX3YxP/0vPq2Llqr+BJ6LFh48K6xNJHI2zP+CCSPfEGBDQtS96D2n6ePSgLapBwteniIpLvqczmcz8BilgeV6VM15UcwPoF0xEg8v/iWcplljSi1oHCXh0jge9Eq6xMkoxwtO/1AsRSxXiv3bDkXUloC6GVSW/DVQbuKnbs8wr2M7B9xIIIf59ObDxfBQnorJllJgA== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABDrfVuge1 AQsKW8/l3m750MAAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQDj1nOJpQRO Xi+PdLXxrhQo/3F5NzUDhDlVOeceittZikVR5YonEU1mLbfWMrDuOf8DsDFrFokfogTiyE WQh2du8AaM/BhN8yeeCvGLnceUuAEgShpiv04oY0uSMiUzRvtalAu1pq4qT7zD2XDbUV/5 DfkP3d2Va95lakrewSLWBm97dqpGhwL9EDEhGdhxrH6cxJtWm3ahMfIaV+tmjhYBSm0dqp uLHEZHmeyQTAvjgEEpZBSnvN72BNrK7XOsKie1jp2dUjOD2pphYa066jTJtkeMbEh64a+H 2xfQRQOhhKgcv49fsGA4UWTToXboypoCG84dfpZsxPhnn6kZfuG7AAADwMP4Ql2+uSqcva dfqcKD/4kiAgVp1zJ9bFVcaMUOSKYhshzEAvuq9omrFDQsS3vMJvw0ve8M4uiyncfsuy8f CF4b43CjxmxBnwhb2yjy+PFbjFUtCWa+jGKy3VqiZsWtLWrrNG7z4CPmcYgtmPxJ54dMuv 5OIDZ7FA5mCFiMPOsxbaB2K7p+N/iUkaKCuXak7En7btPzz51xyoNlMXs0S/3g0oYmK3pc iQ8sZINDEKf9/kTghR+R322LcUfAJrebaJfIy8qiIH+2mOZ+xGbrR+hOwllUsBn+UT0/+6 buEFaL6mCJoefALq09yPT855Q9rUqRFhuN3Vpqo1eDr+LI+93GtHvhqRUoLOgStd6J+kcL TP7+1l8sNRj3gGsbgCZBTWGHjn6DKHhs9jD8RnOnymwpYE2ngQ8rZ+R/PmrhwUlQKLjdjl lKm46taL8+tdP79zJoV57EWN+gkSZc/AyrpjDVfwasFZIZ2xo3dIBq2ffDYjrrdjLoEg/q RiU8XIUZthrXS8rFt9FzcqSV4FPjm/Qe7g4ybrp9xl5NI6N5r+w95yNWovrLQwwM1mtMbG JYdIft34p36XAoyS4wJL/06UtZZhrzsivCmtTGab+m2V4xk9+q60Hbmy5+pC3Jmybeh0zs gIeGVugyn9d6s2/EGWH+kpYAU3eRh6eJLY7NcnJxirfHD78dJ3bkUMSXXWMGiRgGDRvVT5 EzWT//USU9FXgZjY3KXplLOcccB1mrVNNP83lHlFvEP3C1y+XHDKtkqwxbxrUstlOl+y+D RcoQLBCRJv9FiKgaKzAxxCWmNSzsULvagpq1E45TaUIcPWEVl5P+zvL8De4t8ddA4Y4+hH B+mFTBgz+tAtQVMcEmkzdZMPRwp8Q9Yu48jGtRyg6mNdRhuBShZN5CvxobhDizRD0LhvZ9 D0EK/HYyO9mK+sLgaXrEYNZyd9imtVklW5uqLoDSPfa7/cSd5c2nM73YTJHNGFiQDmY26P djdKl5Dip9AtU9uJbpBjTo04wE7odtAlnuwxy1Np2saS5a1nF1wIx4ojSNvjiZW/LTMLG0 duvh1XT3KPdaR/A1QvDh5YcD/922GEZQwT0DZ4Hpgmox1te0T1C0vSkdGhwKnOSApdtQPS gKDACLAAMwUyWtO6UdU+yvReOvkGSaV2vLct8nx957zB77Ci+QFEWDh22rJgYZ9rGwO4ge WcYw08ec51x/Q7dmKqk08jvkN4aI/y7irl9vMmTtcf/SPWD2Ww9GA9D817SHmCSlv9K7Mx mVsqTkcg== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDj1nOJpQROXi+PdLXxrhQo/3F5NzUDhDlVOeceittZikVR5YonEU1mLbfWMrDuOf8DsDFrFokfogTiyEWQh2du8AaM/BhN8yeeCvGLnceUuAEgShpiv04oY0uSMiUzRvtalAu1pq4qT7zD2XDbUV/5DfkP3d2Va95lakrewSLWBm97dqpGhwL9EDEhGdhxrH6cxJtWm3ahMfIaV+tmjhYBSm0dqpuLHEZHmeyQTAvjgEEpZBSnvN72BNrK7XOsKie1jp2dUjOD2pphYa066jTJtkeMbEh64a+H2xfQRQOhhKgcv49fsGA4UWTToXboypoCG84dfpZsxPhnn6kZfuG7" set source built-in next end config firewall ssh setting set caname "Fortinet_SSH_CA" set untrusted-caname "Fortinet_SSH_CA_Untrusted" set hostkey-rsa2048 "Fortinet_SSH_RSA2048" set hostkey-dsa1024 "Fortinet_SSH_DSA1024" set hostkey-ecdsa256 "Fortinet_SSH_ECDSA256" set hostkey-ecdsa384 "Fortinet_SSH_ECDSA384" set hostkey-ecdsa521 "Fortinet_SSH_ECDSA521" set hostkey-ed25519 "Fortinet_SSH_ED25519" end config firewall profile-protocol-options edit "default" set comment "All default services." config http set ports 80 unset options unset post-lang end config ftp set ports 21 set options splice end config imap set ports 143 set options fragmail end config mapi set ports 135 set options fragmail end config pop3 set ports 110 set options fragmail end config smtp set ports 25 set options fragmail splice end config nntp set ports 119 set options splice end config ssh unset options end config dns set ports 53 end config cifs set ports 445 unset options end next end config firewall ssl-ssh-profile edit "deep-inspection" set comment "Read-only deep inspection profile." config https set ports 443 set status deep-inspection end config ftps set ports 990 set status deep-inspection end config imaps set ports 993 set status deep-inspection end config pop3s set ports 995 set status deep-inspection end config smtps set ports 465 set status deep-inspection end config ssh set ports 22 set status disable end config dot set status disable end config ssl-exempt edit 1 set fortiguard-category 31 next edit 2 set fortiguard-category 33 next edit 3 set type wildcard-fqdn set wildcard-fqdn "adobe" next edit 4 set type wildcard-fqdn set wildcard-fqdn "Adobe Login" next edit 5 set type wildcard-fqdn set wildcard-fqdn "android" next edit 6 set type wildcard-fqdn set wildcard-fqdn "apple" next edit 7 set type wildcard-fqdn set wildcard-fqdn "appstore" next edit 8 set type wildcard-fqdn set wildcard-fqdn "auth.gfx.ms" next edit 9 set type wildcard-fqdn set wildcard-fqdn "citrix" next edit 10 set type wildcard-fqdn set wildcard-fqdn "dropbox.com" next edit 11 set type wildcard-fqdn set wildcard-fqdn "eease" next edit 12 set type wildcard-fqdn set wildcard-fqdn "firefox update server" next edit 13 set type wildcard-fqdn set wildcard-fqdn "fortinet" next edit 14 set type wildcard-fqdn set wildcard-fqdn "googleapis.com" next edit 15 set type wildcard-fqdn set wildcard-fqdn "google-drive" next edit 16 set type wildcard-fqdn set wildcard-fqdn "google-play2" next edit 17 set type wildcard-fqdn set wildcard-fqdn "google-play3" next edit 18 set type wildcard-fqdn set wildcard-fqdn "Gotomeeting" next edit 19 set type wildcard-fqdn set wildcard-fqdn "icloud" next edit 20 set type wildcard-fqdn set wildcard-fqdn "itunes" next edit 21 set type wildcard-fqdn set wildcard-fqdn "microsoft" next edit 22 set type wildcard-fqdn set wildcard-fqdn "skype" next edit 23 set type wildcard-fqdn set wildcard-fqdn "softwareupdate.vmware.com" next edit 24 set type wildcard-fqdn set wildcard-fqdn "verisign" next edit 25 set type wildcard-fqdn set wildcard-fqdn "Windows update 2" next edit 26 set type wildcard-fqdn set wildcard-fqdn "live.com" next edit 27 set type wildcard-fqdn set wildcard-fqdn "google-play" next edit 28 set type wildcard-fqdn set wildcard-fqdn "update.microsoft.com" next edit 29 set type wildcard-fqdn set wildcard-fqdn "swscan.apple.com" next edit 30 set type wildcard-fqdn set wildcard-fqdn "autoupdate.opera.com" next edit 31 set type wildcard-fqdn set wildcard-fqdn "cdn-apple" next edit 32 set type wildcard-fqdn set wildcard-fqdn "mzstatic-apple" next end next edit "custom-deep-inspection" set comment "Customizable deep inspection profile." config https set ports 443 set status deep-inspection end config ftps set ports 990 set status deep-inspection end config imaps set ports 993 set status deep-inspection end config pop3s set ports 995 set status deep-inspection end config smtps set ports 465 set status deep-inspection end config ssh set ports 22 set status disable end config dot set status disable end config ssl-exempt edit 1 set fortiguard-category 31 next edit 2 set fortiguard-category 33 next edit 3 set type wildcard-fqdn set wildcard-fqdn "adobe" next edit 4 set type wildcard-fqdn set wildcard-fqdn "Adobe Login" next edit 5 set type wildcard-fqdn set wildcard-fqdn "android" next edit 6 set type wildcard-fqdn set wildcard-fqdn "apple" next edit 7 set type wildcard-fqdn set wildcard-fqdn "appstore" next edit 8 set type wildcard-fqdn set wildcard-fqdn "auth.gfx.ms" next edit 9 set type wildcard-fqdn set wildcard-fqdn "citrix" next edit 10 set type wildcard-fqdn set wildcard-fqdn "dropbox.com" next edit 11 set type wildcard-fqdn set wildcard-fqdn "eease" next edit 12 set type wildcard-fqdn set wildcard-fqdn "firefox update server" next edit 13 set type wildcard-fqdn set wildcard-fqdn "fortinet" next edit 14 set type wildcard-fqdn set wildcard-fqdn "googleapis.com" next edit 15 set type wildcard-fqdn set wildcard-fqdn "google-drive" next edit 16 set type wildcard-fqdn set wildcard-fqdn "google-play2" next edit 17 set type wildcard-fqdn set wildcard-fqdn "google-play3" next edit 18 set type wildcard-fqdn set wildcard-fqdn "Gotomeeting" next edit 19 set type wildcard-fqdn set wildcard-fqdn "icloud" next edit 20 set type wildcard-fqdn set wildcard-fqdn "itunes" next edit 21 set type wildcard-fqdn set wildcard-fqdn "microsoft" next edit 22 set type wildcard-fqdn set wildcard-fqdn "skype" next edit 23 set type wildcard-fqdn set wildcard-fqdn "softwareupdate.vmware.com" next edit 24 set type wildcard-fqdn set wildcard-fqdn "verisign" next edit 25 set type wildcard-fqdn set wildcard-fqdn "Windows update 2" next edit 26 set type wildcard-fqdn set wildcard-fqdn "live.com" next edit 27 set type wildcard-fqdn set wildcard-fqdn "google-play" next edit 28 set type wildcard-fqdn set wildcard-fqdn "update.microsoft.com" next edit 29 set type wildcard-fqdn set wildcard-fqdn "swscan.apple.com" next edit 30 set type wildcard-fqdn set wildcard-fqdn "autoupdate.opera.com" next edit 31 set type wildcard-fqdn set wildcard-fqdn "cdn-apple" next edit 32 set type wildcard-fqdn set wildcard-fqdn "mzstatic-apple" next end next edit "no-inspection" set comment "Read-only profile that does no inspection." config https set status disable end config ftps set status disable end config imaps set status disable end config pop3s set status disable end config smtps set status disable end config ssh set ports 22 set status disable end config dot set status disable end next edit "certificate-inspection" set comment "Read-only SSL handshake inspection profile." config https set ports 443 set status certificate-inspection end config ftps set status disable end config imaps set status disable end config pop3s set status disable end config smtps set status disable end config ssh set ports 22 set status disable end config dot set status disable end next end config waf profile edit "default" config signature config main-class 100000000 set action block set severity high end config main-class 20000000 end config main-class 30000000 set status enable set action block set severity high end config main-class 40000000 end config main-class 50000000 set status enable set action block set severity high end config main-class 60000000 end config main-class 70000000 set status enable set action block set severity high end config main-class 80000000 set status enable set severity low end config main-class 110000000 set status enable set severity high end config main-class 90000000 set status enable set action block set severity high end set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002 end config constraint config header-length set status enable set log enable set severity low end config content-length set status enable set log enable set severity low end config param-length set status enable set log enable set severity low end config line-length set status enable set log enable set severity low end config url-param-length set status enable set log enable set severity low end config version set log enable end config method set action block set log enable end config hostname set action block set log enable end config malformed set log enable end config max-cookie set status enable set log enable set severity low end config max-header-line set status enable set log enable set severity low end config max-url-param set status enable set log enable set severity low end config max-range-segment set status enable set log enable set severity high end end next end config firewall policy edit 2 set name "VPN-Traffic" set uuid e8add254-78b1-51ee-cab0-5c60b66ef8e3 set srcintf "HUB1" "HUB2" set dstintf "any" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all next edit 3 set name "HubandSpoke" set uuid c2575072-7f22-51ee-4b67-23736f335a9b set srcintf "port1" set dstintf "HUB1" "HUB2" set action accept set srcaddr "B2_10.4.0.0/16" set dstaddr "B1_10.3.0.0/16" "HUB1_10.1.0.0/16" "HUB2_10.2.0.0/16" set schedule "always" set service "ALL" set logtraffic all next edit 1 set name "All" set uuid b1159cae-7812-51ee-dc34-cffb0a5a2a03 set srcintf "port1" set dstintf "any" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all set nat enable next end config switch-controller security-policy 802-1X edit "802-1X-policy-default" set user-group "SSO_Guest_Users" set mac-auth-bypass disable set open-auth disable set eap-passthru enable set eap-auto-untagged-vlans enable set guest-vlan disable set auth-fail-vlan disable set framevid-apply enable set radius-timeout-overwrite disable set authserver-timeout-vlan disable next end config switch-controller security-policy local-access edit "default" set mgmt-allowaccess https ping ssh set internal-allowaccess https ping ssh next end config switch-controller lldp-profile edit "default" set med-tlvs inventory-management network-policy location-identification set auto-isl disable config med-network-policy edit "voice" next edit "voice-signaling" next edit "guest-voice" next edit "guest-voice-signaling" next edit "softphone-voice" next edit "video-conferencing" next edit "streaming-video" next edit "video-signaling" next end config med-location-service edit "coordinates" next edit "address-civic" next edit "elin-number" next end next edit "default-auto-isl" next edit "default-auto-mclag-icl" set auto-mclag-icl enable next end config switch-controller qos dot1p-map edit "voice-dot1p" set priority-0 queue-4 set priority-1 queue-4 set priority-2 queue-3 set priority-3 queue-2 set priority-4 queue-3 set priority-5 queue-1 set priority-6 queue-2 set priority-7 queue-2 next end config switch-controller qos ip-dscp-map edit "voice-dscp" config map edit "1" set cos-queue 1 set value 46 next edit "2" set cos-queue 2 set value 24,26,48,56 next edit "5" set cos-queue 3 set value 34 next end next end config switch-controller qos queue-policy edit "default" set schedule round-robin set rate-by kbps config cos-queue edit "queue-0" next edit "queue-1" next edit "queue-2" next edit "queue-3" next edit "queue-4" next edit "queue-5" next edit "queue-6" next edit "queue-7" next end next edit "voice-egress" set schedule weighted set rate-by kbps config cos-queue edit "queue-0" next edit "queue-1" set weight 0 next edit "queue-2" set weight 6 next edit "queue-3" set weight 37 next edit "queue-4" set weight 12 next edit "queue-5" next edit "queue-6" next edit "queue-7" next end next end config switch-controller qos qos-policy edit "default" next edit "voice-qos" set trust-dot1p-map "voice-dot1p" set trust-ip-dscp-map "voice-dscp" set queue-policy "voice-egress" next end config switch-controller storm-control-policy edit "default" set description "default storm control on all port" next edit "auto-config" set description "storm control policy for fortilink-isl-icl port" set storm-control-mode disabled next end config switch-controller auto-config policy edit "pse" next edit "default" next edit "default-icl" set poe-status disable set igmp-flood-report enable set igmp-flood-traffic enable next end config switch-controller initial-config template edit "_default" set vlanid 1 next edit "quarantine" set vlanid 4093 set dhcp-server enable next edit "rspan" set vlanid 4092 set dhcp-server enable next edit "voice" set vlanid 4091 next edit "video" set vlanid 4090 next edit "onboarding" set vlanid 4089 next edit "nac_segment" set vlanid 4088 set dhcp-server enable next end config switch-controller switch-profile edit "default" next end config switch-controller ptp settings set mode disable end config switch-controller ptp policy edit "default" set status enable next end config switch-controller remote-log edit "syslogd" next edit "syslogd2" next end config wireless-controller setting set darrp-optimize-schedules "default-darrp-optimize" end config wireless-controller wids-profile edit "default" set comment "Default WIDS profile." set ap-scan enable set wireless-bridge enable set deauth-broadcast enable set null-ssid-probe-resp enable set long-duration-attack enable set invalid-mac-oui enable set weak-wep-iv enable set auth-frame-flood enable set assoc-frame-flood enable set spoofed-deauth enable set asleap-attack enable set eapol-start-flood enable set eapol-logoff-flood enable set eapol-succ-flood enable set eapol-fail-flood enable set eapol-pre-succ-flood enable set eapol-pre-fail-flood enable next edit "default-wids-apscan-enabled" set ap-scan enable next end config wireless-controller ble-profile edit "fortiap-discovery" set advertising ibeacon eddystone-uid eddystone-url set ibeacon-uuid "wtp-uuid" next end config router prefix-list edit "all_prefixes" config rule edit 1 set prefix any unset ge unset le next end next end config router route-map edit "port1_only" config rule edit 1 set match-interface "port1" unset set-ip-prefsrc next edit 2 set action deny set match-ip-address "all_prefixes" unset set-ip-prefsrc next end next end config router rip config redistribute "connected" end config redistribute "static" end config redistribute "ospf" end config redistribute "bgp" end config redistribute "isis" end end config router ripng config redistribute "connected" end config redistribute "static" end config redistribute "ospf" end config redistribute "bgp" end config redistribute "isis" end end config router static edit 3 set dst 11.11.11.11 255.255.255.255 set gateway 14.14.14.254 set device "port3" next edit 4 set dst 12.12.12.12 255.255.255.255 set gateway 14.14.14.254 set device "port3" next edit 5 set dst 13.13.13.13 255.255.255.255 set gateway 14.14.14.254 set device "port3" next edit 7 set dst 2.2.2.2 255.255.255.255 set gateway 4.4.4.254 set device "port2" next edit 8 set dst 3.3.3.3 255.255.255.255 set gateway 4.4.4.254 set device "port2" next edit 9 set dst 1.1.1.1 255.255.255.255 set gateway 4.4.4.254 set device "port2" next edit 10 set distance 1 set sdwan-zone "DIA-Internet" next end config router ospf config redistribute "connected" end config redistribute "static" end config redistribute "rip" end config redistribute "bgp" end config redistribute "isis" end end config router ospf6 config redistribute "connected" end config redistribute "static" end config redistribute "rip" end config redistribute "bgp" end config redistribute "isis" end end config router bgp set as 65000 set router-id 172.29.100.2 set ibgp-multipath enable set additional-path enable set recursive-next-hop enable set graceful-restart enable set additional-path-select 255 config neighbor edit "172.31.159.253" set advertisement-interval 1 set capability-graceful-restart enable set link-down-failover enable set soft-reconfiguration enable set description "HUB2-VPN1" set interface "HUB2-VPN1" set remote-as 65000 set connect-timer 10 set additional-path receive next edit "172.31.191.253" set advertisement-interval 1 set capability-graceful-restart enable set link-down-failover enable set soft-reconfiguration enable set description "HUB2-VPN2" set interface "HUB2-VPN2" set remote-as 65000 set connect-timer 10 set additional-path receive next edit "172.31.31.253" set advertisement-interval 1 set capability-graceful-restart enable set link-down-failover enable set soft-reconfiguration enable set description "HUB1-VPN1" set interface "HUB1-VPN1" set remote-as 65000 set connect-timer 10 set additional-path receive next edit "172.31.63.253" set advertisement-interval 1 set capability-graceful-restart enable set link-down-failover enable set soft-reconfiguration enable set description "HUB1-VPN2" set interface "HUB1-VPN2" set remote-as 65000 set connect-timer 10 set additional-path receive next end config redistribute "connected" set status enable set route-map "port1_only" end config redistribute "rip" end config redistribute "ospf" end config redistribute "static" end config redistribute "isis" end config redistribute6 "connected" end config redistribute6 "rip" end config redistribute6 "ospf" end config redistribute6 "static" end config redistribute6 "isis" end end config router isis config redistribute "connected" end config redistribute "rip" end config redistribute "ospf" end config redistribute "bgp" end config redistribute "static" end config redistribute6 "connected" end config redistribute6 "rip" end config redistribute6 "ospf" end config redistribute6 "bgp" end config redistribute6 "static" end end config router multicast end