#config-version=FGVMK6-7.4.0-FW-build2360-230509:opmode=0:vdom=0:user=admin #conf_file_ver=2877155642583166 #buildno=2360 #global_vdom=1 config system global set alias "FortiGate-VM64-KVM" set hostname "HUB2" set timezone 04 end config system accprofile edit "prof_admin" set secfabgrp read-write set ftviewgrp read-write set authgrp read-write set sysgrp read-write set netgrp read-write set loggrp read-write set fwgrp read-write set vpngrp read-write set utmgrp read-write set wanoptgrp read-write set wifi read-write next edit "nologout" set secfabgrp read-write set ftviewgrp read-write set authgrp read-write set sysgrp read-write set netgrp read-write set loggrp read-write set fwgrp read-write set vpngrp read-write set utmgrp read-write set wanoptgrp read-write set wifi read-write set admintimeout-override enable set admintimeout 0 next end config system interface edit "port1" set vdom "root" set ip 10.2.0.1 255.255.255.0 set allowaccess ping https ssh http fgfm set type physical set snmp-index 1 set ip-managed-by-fortiipam disable next edit "port2" set vdom "root" set ip 2.2.2.2 255.255.255.0 set allowaccess ping set bfd enable set type physical set snmp-index 2 set ip-managed-by-fortiipam disable next edit "port3" set vdom "root" set ip 12.12.12.12 255.255.255.0 set allowaccess ping set bfd enable set type physical set snmp-index 3 set ip-managed-by-fortiipam disable next edit "port4" set vdom "root" set status down set type physical set snmp-index 4 set ip-managed-by-fortiipam disable next edit "port5" set vdom "root" set ip 192.168.100.21 255.255.255.0 set allowaccess fgfm set type physical set snmp-index 5 next edit "port6" set vdom "root" set ip 192.168.200.21 255.255.255.0 set allowaccess https ssh http set type physical set snmp-index 6 next edit "naf.root" set vdom "root" set type tunnel set src-check disable set snmp-index 7 next edit "l2t.root" set vdom "root" set type tunnel set snmp-index 8 next edit "ssl.root" set vdom "root" set type tunnel set alias "SSL VPN interface" set snmp-index 9 next edit "fortilink" set vdom "root" set fortilink enable set ip 10.255.1.1 255.255.255.0 set allowaccess ping fabric set type aggregate set lldp-reception enable set lldp-transmission enable set snmp-index 10 next edit "VPN1" set vdom "root" set ip 172.31.159.253 255.255.255.255 set type tunnel set remote-ip 172.31.159.254 255.255.224.0 set snmp-index 112 set interface "port2" next edit "VPN2" set vdom "root" set ip 172.31.191.253 255.255.255.255 set type tunnel set remote-ip 172.31.191.254 255.255.224.0 set snmp-index 113 set interface "port3" next edit "HUB2-Lo" set vdom "root" set ip 172.29.100.252 255.255.255.255 set allowaccess ping set type loopback set snmp-index 114 next edit "To-Hub1" set vdom "root" set type tunnel set snmp-index 11 set interface "port2" next end config system custom-language edit "en" set filename "en" next edit "fr" set filename "fr" next edit "sp" set filename "sp" next edit "pg" set filename "pg" next edit "x-sjis" set filename "x-sjis" next edit "big5" set filename "big5" next edit "GB2312" set filename "GB2312" next edit "euc-kr" set filename "euc-kr" next end config system admin edit "admin" set accprofile "super_admin" set vdom "root" config gui-dashboard edit 1 set name "Status" set vdom "root" set permanent enable config widget edit 1 set width 1 set height 1 next edit 2 set type licinfo set x-pos 1 set width 1 set height 1 next edit 3 set type vminfo set x-pos 2 set width 1 set height 1 next edit 4 set type forticloud set x-pos 3 set width 1 set height 1 next edit 5 set type security-fabric set x-pos 4 set width 1 set height 1 next edit 6 set type admins set x-pos 5 set width 1 set height 1 next edit 7 set type cpu-usage set x-pos 6 set width 2 set height 1 next edit 8 set type memory-usage set x-pos 7 set width 2 set height 1 next edit 9 set type sessions set x-pos 8 set width 2 set height 1 next end next edit 2 set name "Security" set vdom "root" config widget edit 1 set type fortiview set width 2 set height 1 set fortiview-type "compromisedHosts" set fortiview-sort-by "verdict" set fortiview-timeframe "hour" set fortiview-visualization "table" next edit 2 set type fortiview set x-pos 1 set width 2 set height 1 set fortiview-type "threats" set fortiview-sort-by "threatLevel" set fortiview-timeframe "hour" set fortiview-visualization "table" next edit 3 set type device-vulnerability set x-pos 2 set width 2 set height 1 next end next edit 3 set name "Network" set vdom "root" config widget edit 1 set type routing set width 2 set height 1 set router-view-type "staticdynamic" next edit 2 set type dhcp set x-pos 1 set width 2 set height 1 next edit 3 set type virtual-wan set x-pos 2 set width 2 set height 1 next edit 4 set type ipsec-vpn set x-pos 3 set width 2 set height 1 next edit 5 set type ssl-vpn set x-pos 4 set width 1 set height 1 next end next edit 4 set name "Assets & Identities" set vdom "root" config widget edit 1 set type device-inventory set width 2 set height 1 next edit 2 set type identities set x-pos 1 set width 2 set height 1 next edit 3 set type firewall-user set x-pos 2 set width 2 set height 1 next edit 4 set type quarantine set x-pos 3 set width 2 set height 1 next edit 5 set type nac-vlans set x-pos 4 set width 2 set height 1 next end next edit 5 set name "WiFi" set vdom "root" config widget edit 1 set type ap-status set width 2 set height 1 next edit 2 set type channel-utilization set x-pos 1 set width 2 set height 1 set wifi-band "both" next edit 3 set type clients-by-ap set x-pos 2 set width 2 set height 1 set wifi-band "both" next edit 4 set type client-signal-strength set x-pos 3 set width 2 set height 1 set wifi-band "both" next edit 5 set type rogue-ap set x-pos 4 set width 2 set height 1 next edit 6 set type historical-clients set x-pos 5 set width 2 set height 1 set wifi-band "both" next edit 7 set type interfering-ssids set x-pos 6 set width 2 set height 1 set wifi-band "both" next edit 8 set type wifi-login-failures set x-pos 7 set width 2 set height 1 next end next edit 6 set name "FortiView Sources" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "source" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 7 set name "FortiView Destinations" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "destination" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 8 set name "FortiView Applications" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "application" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 9 set name "FortiView Web Sites" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "website" set fortiview-sort-by "sessions" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 10 set name "FortiView Policies" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "policy" set fortiview-sort-by "bytes" set fortiview-timeframe "hour" set fortiview-visualization "table" next end next edit 11 set name "FortiView Sessions" set vdom "root" set layout-type standalone set csf disable config widget edit 1 set type fortiview set width 6 set height 3 set fortiview-type "realtimeSessions" set fortiview-sort-by "bytes" set fortiview-timeframe "realtime" set fortiview-visualization "table" next end next end set gui-ignore-release-overview-version "7.4.0" set password ENC SH2l1sysF0S31Z/7FbK4balA3uhqEYDLsxDyLzmp6qC3ZJXza2lDbH45QMvMwk= next end config system sso-admin end config system ha set override disable end config system auto-scale end config system dns set primary 96.45.45.45 set secondary 96.45.46.46 end config system replacemsg-image edit "logo_fnet" next edit "logo_fguard_wf" next edit "logo_v3_fguard_app" next end config system replacemsg mail "partial" end config system replacemsg http "url-block" end config system replacemsg http "urlfilter-err" end config system replacemsg http "infcache-block" end config system replacemsg http "http-contenttypeblock" end config system replacemsg http "https-invalid-cert-block" end config system replacemsg http "https-untrusted-cert-block" end config system replacemsg http "https-blocklisted-cert-block" end config system replacemsg http "switching-protocols-block" end config system replacemsg http "http-antiphish-block" end config system replacemsg http "videofilter-block" end config system replacemsg webproxy "deny" end config system replacemsg webproxy "user-limit" end config system replacemsg webproxy "auth-challenge" end config system replacemsg webproxy "auth-login-fail" end config system replacemsg webproxy "auth-group-info-fail" end config system replacemsg webproxy "http-err" end config system replacemsg webproxy "auth-ip-blackout" end config system replacemsg webproxy "ztna-block" end config system replacemsg ftp "ftp-explicit-banner" end config system replacemsg fortiguard-wf "ftgd-block" end config system replacemsg fortiguard-wf "ftgd-ovrd" end config system replacemsg fortiguard-wf "ftgd-quota" end config system replacemsg fortiguard-wf "ftgd-warning" end config system replacemsg spam "ipblocklist" end config system replacemsg spam "smtp-spam-dnsbl" end config system replacemsg spam "smtp-spam-feip" end config system replacemsg spam "smtp-spam-helo" end config system replacemsg spam "smtp-spam-emailblock-to" end config system replacemsg spam "smtp-spam-emailblock-from" end config system replacemsg spam "smtp-spam-emailblock-subject" end config system replacemsg spam "smtp-spam-mimeheader" end config system replacemsg spam "reversedns" end config system replacemsg spam "smtp-spam-ase" end config system replacemsg spam "submit" end config system replacemsg alertmail "alertmail-virus" end config system replacemsg alertmail "alertmail-block" end config system replacemsg alertmail "alertmail-nids-event" end config system replacemsg alertmail "alertmail-crit-event" end config system replacemsg alertmail "alertmail-disk-full" end config system replacemsg admin "pre_admin-disclaimer-text" end config system replacemsg admin "post_admin-disclaimer-text" end config system replacemsg auth "auth-disclaimer-page-1" end config system replacemsg auth "auth-disclaimer-page-2" end config system replacemsg auth "auth-disclaimer-page-3" end config system replacemsg auth "auth-proxy-reject-page" end config system replacemsg auth "auth-reject-page" end config system replacemsg auth "auth-login-page" end config system replacemsg auth "auth-login-failed-page" end config system replacemsg auth "auth-token-login-page" end config system replacemsg auth "auth-token-login-failed-page" end config system replacemsg auth "auth-success-msg" end config system replacemsg auth "auth-challenge-page" end config system replacemsg auth "auth-keepalive-page" end config system replacemsg auth "auth-portal-page" end config system replacemsg auth "auth-password-page" end config system replacemsg auth "auth-fortitoken-page" end config system replacemsg auth "auth-next-fortitoken-page" end config system replacemsg auth "auth-email-token-page" end config system replacemsg auth "auth-sms-token-page" end config system replacemsg auth "auth-email-harvesting-page" end config system replacemsg auth "auth-email-failed-page" end config system replacemsg auth "auth-cert-passwd-page" end config system replacemsg auth "auth-guest-print-page" end config system replacemsg auth "auth-guest-email-page" end config system replacemsg auth "auth-success-page" end config system replacemsg auth "auth-block-notification-page" end config system replacemsg auth "auth-quarantine-page" end config system replacemsg auth "auth-qtn-reject-page" end config system replacemsg auth "auth-saml-page" end config system replacemsg sslvpn "sslvpn-login" end config system replacemsg sslvpn "sslvpn-header" end config system replacemsg sslvpn "sslvpn-limit" end config system replacemsg sslvpn "hostcheck-error" end config system replacemsg sslvpn "sslvpn-provision-user" end config system replacemsg sslvpn "sslvpn-provision-user-sms" end config system replacemsg nac-quar "nac-quar-virus" end config system replacemsg nac-quar "nac-quar-dos" end config system replacemsg nac-quar "nac-quar-ips" end config system replacemsg nac-quar "nac-quar-dlp" end config system replacemsg nac-quar "nac-quar-admin" end config system replacemsg nac-quar "nac-quar-app" end config system replacemsg traffic-quota "per-ip-shaper-block" end config system replacemsg utm "virus-html" end config system replacemsg utm "client-virus-html" end config system replacemsg utm "virus-text" end config system replacemsg utm "dlp-html" end config system replacemsg utm "dlp-text" end config system replacemsg utm "appblk-html" end config system replacemsg utm "ipsblk-html" end config system replacemsg utm "ipsfail-html" end config system replacemsg utm "exe-text" end config system replacemsg utm "waf-html" end config system replacemsg utm "outbreak-prevention-html" end config system replacemsg utm "outbreak-prevention-text" end config system replacemsg utm "external-blocklist-html" end config system replacemsg utm "external-blocklist-text" end config system replacemsg utm "ems-threat-feed-html" end config system replacemsg utm "ems-threat-feed-text" end config system replacemsg utm "file-filter-html" end config system replacemsg utm "file-filter-text" end config system replacemsg utm "file-size-text" end config system replacemsg utm "transfer-size-text" end config system replacemsg utm "internal-error-text" end config system replacemsg utm "archive-block-html" end config system replacemsg utm "archive-block-text" end config system replacemsg utm "file-av-fail-text" end config system replacemsg utm "transfer-av-fail-text" end config system replacemsg utm "banned-word-html" end config system replacemsg utm "banned-word-text" end config system replacemsg utm "block-html" end config system replacemsg utm "block-text" end config system replacemsg utm "decompress-limit-text" end config system replacemsg utm "dlp-subject-text" end config system replacemsg utm "file-size-html" end config system replacemsg utm "client-file-size-html" end config system replacemsg utm "inline-scan-timeout-html" end config system replacemsg utm "inline-scan-timeout-text" end config system replacemsg utm "inline-scan-error-html" end config system replacemsg utm "inline-scan-error-text" end config system replacemsg utm "icap-block-text" end config system replacemsg utm "icap-error-text" end config system replacemsg utm "icap-http-error" end config system replacemsg icap "icap-req-resp" end config system replacemsg automation "automation-email" end config system snmp sysinfo end config system central-management set type fortimanager set serial-number "FMG-VMTM23016697" set fmg "::ffff:192.168.100.99" end config firewall internet-service-name edit "Google-Other" set internet-service-id 65536 next edit "Google-Web" set internet-service-id 65537 next edit "Google-ICMP" set internet-service-id 65538 next edit "Google-DNS" set internet-service-id 65539 next edit "Google-Outbound_Email" set internet-service-id 65540 next edit "Google-SSH" set internet-service-id 65542 next edit "Google-FTP" set internet-service-id 65543 next edit "Google-NTP" set internet-service-id 65544 next edit "Google-Inbound_Email" set internet-service-id 65545 next edit "Google-LDAP" set internet-service-id 65550 next edit "Google-NetBIOS.Session.Service" set internet-service-id 65551 next edit "Google-RTMP" set internet-service-id 65552 next edit "Google-NetBIOS.Name.Service" set internet-service-id 65560 next edit "Google-Google.Cloud" set internet-service-id 65641 next edit "Google-Google.Bot" set internet-service-id 65643 next edit "Google-Gmail" set internet-service-id 65646 next edit "Meta-Other" set internet-service-id 131072 next edit "Meta-Web" set internet-service-id 131073 next edit "Meta-ICMP" set internet-service-id 131074 next edit "Meta-DNS" set internet-service-id 131075 next edit "Meta-Outbound_Email" set internet-service-id 131076 next edit "Meta-SSH" set internet-service-id 131078 next edit "Meta-FTP" set internet-service-id 131079 next edit "Meta-NTP" set internet-service-id 131080 next edit "Meta-Inbound_Email" set internet-service-id 131081 next edit "Meta-LDAP" set internet-service-id 131086 next edit "Meta-NetBIOS.Session.Service" set internet-service-id 131087 next edit "Meta-RTMP" set internet-service-id 131088 next edit "Meta-NetBIOS.Name.Service" set internet-service-id 131096 next edit "Meta-Whatsapp" set internet-service-id 131184 next edit "Meta-Instagram" set internet-service-id 131189 next edit "Apple-Other" set internet-service-id 196608 next edit "Apple-Web" set internet-service-id 196609 next edit "Apple-ICMP" set internet-service-id 196610 next edit "Apple-DNS" set internet-service-id 196611 next edit "Apple-Outbound_Email" set internet-service-id 196612 next edit "Apple-SSH" set internet-service-id 196614 next edit "Apple-FTP" set internet-service-id 196615 next edit "Apple-NTP" set internet-service-id 196616 next edit "Apple-Inbound_Email" set internet-service-id 196617 next edit "Apple-LDAP" set internet-service-id 196622 next edit "Apple-NetBIOS.Session.Service" set internet-service-id 196623 next edit "Apple-RTMP" set internet-service-id 196624 next edit "Apple-NetBIOS.Name.Service" set internet-service-id 196632 next edit "Apple-App.Store" set internet-service-id 196723 next edit "Apple-APNs" set internet-service-id 196747 next edit "Yahoo-Other" set internet-service-id 262144 next edit "Yahoo-Web" set internet-service-id 262145 next edit "Yahoo-ICMP" set internet-service-id 262146 next edit "Yahoo-DNS" set internet-service-id 262147 next edit "Yahoo-Outbound_Email" set internet-service-id 262148 next edit "Yahoo-SSH" set internet-service-id 262150 next edit "Yahoo-FTP" set internet-service-id 262151 next edit "Yahoo-NTP" set internet-service-id 262152 next edit "Yahoo-Inbound_Email" set internet-service-id 262153 next edit "Yahoo-LDAP" set internet-service-id 262158 next edit "Yahoo-NetBIOS.Session.Service" set internet-service-id 262159 next edit "Yahoo-RTMP" set internet-service-id 262160 next edit "Yahoo-NetBIOS.Name.Service" set internet-service-id 262168 next edit "Microsoft-Other" set internet-service-id 327680 next edit "Microsoft-Web" set internet-service-id 327681 next edit "Microsoft-ICMP" set internet-service-id 327682 next edit "Microsoft-DNS" set internet-service-id 327683 next edit "Microsoft-Outbound_Email" set internet-service-id 327684 next edit "Microsoft-SSH" set internet-service-id 327686 next edit "Microsoft-FTP" set internet-service-id 327687 next edit "Microsoft-NTP" set internet-service-id 327688 next edit "Microsoft-Inbound_Email" set internet-service-id 327689 next edit "Microsoft-LDAP" set internet-service-id 327694 next edit "Microsoft-NetBIOS.Session.Service" set internet-service-id 327695 next edit "Microsoft-RTMP" set internet-service-id 327696 next edit "Microsoft-NetBIOS.Name.Service" set internet-service-id 327704 next edit "Microsoft-Skype_Teams" set internet-service-id 327781 next edit "Microsoft-Office365" set internet-service-id 327782 next edit "Microsoft-Azure" set internet-service-id 327786 next edit "Microsoft-Bing.Bot" set internet-service-id 327788 next edit "Microsoft-Outlook" set internet-service-id 327791 next edit "Microsoft-Microsoft.Update" set internet-service-id 327793 next edit "Microsoft-Dynamics" set internet-service-id 327837 next edit "Microsoft-WNS" set internet-service-id 327839 next edit "Microsoft-Office365.Published" set internet-service-id 327880 next edit "Microsoft-Intune" set internet-service-id 327886 next edit "Microsoft-Office365.Published.Optimize" set internet-service-id 327902 next edit "Microsoft-Office365.Published.Allow" set internet-service-id 327903 next edit "Microsoft-Office365.Published.USGOV" set internet-service-id 327917 next edit "Microsoft-Azure.Monitor" set internet-service-id 327958 next edit "Microsoft-Azure.SQL" set internet-service-id 327959 next edit "Microsoft-Azure.AD" set internet-service-id 327960 next edit "Microsoft-Azure.Data.Factory" set internet-service-id 327961 next edit "Microsoft-Azure.Virtual.Desktop" set internet-service-id 327962 next edit "Microsoft-Azure.Power.BI" set internet-service-id 327963 next edit "Amazon-Other" set internet-service-id 393216 next edit "Amazon-Web" set internet-service-id 393217 next edit "Amazon-ICMP" set internet-service-id 393218 next edit "Amazon-DNS" set internet-service-id 393219 next edit "Amazon-Outbound_Email" set internet-service-id 393220 next edit "Amazon-SSH" set internet-service-id 393222 next edit "Amazon-FTP" set internet-service-id 393223 next edit "Amazon-NTP" set internet-service-id 393224 next edit "Amazon-Inbound_Email" set internet-service-id 393225 next edit "Amazon-LDAP" set internet-service-id 393230 next edit "Amazon-NetBIOS.Session.Service" set internet-service-id 393231 next edit "Amazon-RTMP" set internet-service-id 393232 next edit "Amazon-NetBIOS.Name.Service" set internet-service-id 393240 next edit "Amazon-AWS" set internet-service-id 393320 next edit "Amazon-AWS.WorkSpaces.Gateway" set internet-service-id 393403 next edit "Amazon-Twitch" set internet-service-id 393446 next edit "Amazon-AWS.GovCloud.US" set internet-service-id 393452 next edit "Amazon-AWS.EBS" set internet-service-id 393470 next edit "Amazon-AWS.Cloud9" set internet-service-id 393471 next edit "Amazon-AWS.DynamoDB" set internet-service-id 393472 next edit "Amazon-AWS.Route53" set internet-service-id 393473 next edit "Amazon-AWS.S3" set internet-service-id 393474 next edit "Amazon-AWS.Kinesis.Video.Streams" set internet-service-id 393475 next edit "Amazon-AWS.Global.Accelerator" set internet-service-id 393476 next edit "Amazon-AWS.EC2" set internet-service-id 393477 next edit "Amazon-AWS.API.Gateway" set internet-service-id 393478 next edit "Amazon-AWS.Chime.Voice.Connector" set internet-service-id 393479 next edit "Amazon-AWS.Connect" set internet-service-id 393480 next edit "Amazon-AWS.CloudFront" set internet-service-id 393481 next edit "Amazon-AWS.CodeBuild" set internet-service-id 393482 next edit "Amazon-AWS.Chime.Meetings" set internet-service-id 393483 next edit "Amazon-AWS.AppFlow" set internet-service-id 393484 next edit "Amazon-Amazon.SES" set internet-service-id 393493 next edit "eBay-Other" set internet-service-id 458752 next edit "eBay-Web" set internet-service-id 458753 next edit "eBay-ICMP" set internet-service-id 458754 next edit "eBay-DNS" set internet-service-id 458755 next edit "eBay-Outbound_Email" set internet-service-id 458756 next edit "eBay-SSH" set internet-service-id 458758 next edit "eBay-FTP" set internet-service-id 458759 next edit "eBay-NTP" set internet-service-id 458760 next edit "eBay-Inbound_Email" set internet-service-id 458761 next edit "eBay-LDAP" set internet-service-id 458766 next edit "eBay-NetBIOS.Session.Service" set internet-service-id 458767 next edit "eBay-RTMP" set internet-service-id 458768 next edit "eBay-NetBIOS.Name.Service" set internet-service-id 458776 next edit "PayPal-Other" set internet-service-id 524288 next edit "PayPal-Web" set internet-service-id 524289 next edit "PayPal-ICMP" set internet-service-id 524290 next edit "PayPal-DNS" set internet-service-id 524291 next edit "PayPal-Outbound_Email" set internet-service-id 524292 next edit "PayPal-SSH" set internet-service-id 524294 next edit "PayPal-FTP" set internet-service-id 524295 next edit "PayPal-NTP" set internet-service-id 524296 next edit "PayPal-Inbound_Email" set internet-service-id 524297 next edit "PayPal-LDAP" set internet-service-id 524302 next edit "PayPal-NetBIOS.Session.Service" set internet-service-id 524303 next edit "PayPal-RTMP" set internet-service-id 524304 next edit "PayPal-NetBIOS.Name.Service" set internet-service-id 524312 next edit "Box-Other" set internet-service-id 589824 next edit "Box-Web" set internet-service-id 589825 next edit "Box-ICMP" set internet-service-id 589826 next edit "Box-DNS" set internet-service-id 589827 next edit "Box-Outbound_Email" set internet-service-id 589828 next edit "Box-SSH" set internet-service-id 589830 next edit "Box-FTP" set internet-service-id 589831 next edit "Box-NTP" set internet-service-id 589832 next edit "Box-Inbound_Email" set internet-service-id 589833 next edit "Box-LDAP" set internet-service-id 589838 next edit "Box-NetBIOS.Session.Service" set internet-service-id 589839 next edit "Box-RTMP" set internet-service-id 589840 next edit "Box-NetBIOS.Name.Service" set internet-service-id 589848 next edit "Salesforce-Other" set internet-service-id 655360 next edit "Salesforce-Web" set internet-service-id 655361 next edit "Salesforce-ICMP" set internet-service-id 655362 next edit "Salesforce-DNS" set internet-service-id 655363 next edit "Salesforce-Outbound_Email" set internet-service-id 655364 next edit "Salesforce-SSH" set internet-service-id 655366 next edit "Salesforce-FTP" set internet-service-id 655367 next edit "Salesforce-NTP" set internet-service-id 655368 next edit "Salesforce-Inbound_Email" set internet-service-id 655369 next edit "Salesforce-LDAP" set internet-service-id 655374 next edit "Salesforce-NetBIOS.Session.Service" set internet-service-id 655375 next edit "Salesforce-RTMP" set internet-service-id 655376 next edit "Salesforce-NetBIOS.Name.Service" set internet-service-id 655384 next edit "Salesforce-Email.Relay" set internet-service-id 655530 next edit "Dropbox-Other" set internet-service-id 720896 next edit "Dropbox-Web" set internet-service-id 720897 next edit "Dropbox-ICMP" set internet-service-id 720898 next edit "Dropbox-DNS" set internet-service-id 720899 next edit "Dropbox-Outbound_Email" set internet-service-id 720900 next edit "Dropbox-SSH" set internet-service-id 720902 next edit "Dropbox-FTP" set internet-service-id 720903 next edit "Dropbox-NTP" set internet-service-id 720904 next edit "Dropbox-Inbound_Email" set internet-service-id 720905 next edit "Dropbox-LDAP" set internet-service-id 720910 next edit "Dropbox-NetBIOS.Session.Service" set internet-service-id 720911 next edit "Dropbox-RTMP" set internet-service-id 720912 next edit "Dropbox-NetBIOS.Name.Service" set internet-service-id 720920 next edit "Netflix-Other" set internet-service-id 786432 next edit "Netflix-Web" set internet-service-id 786433 next edit "Netflix-ICMP" set internet-service-id 786434 next edit "Netflix-DNS" set internet-service-id 786435 next edit "Netflix-Outbound_Email" set internet-service-id 786436 next edit "Netflix-SSH" set internet-service-id 786438 next edit "Netflix-FTP" set internet-service-id 786439 next edit "Netflix-NTP" set internet-service-id 786440 next edit "Netflix-Inbound_Email" set internet-service-id 786441 next edit "Netflix-LDAP" set internet-service-id 786446 next edit "Netflix-NetBIOS.Session.Service" set internet-service-id 786447 next edit "Netflix-RTMP" set internet-service-id 786448 next edit "Netflix-NetBIOS.Name.Service" set internet-service-id 786456 next edit "LinkedIn-Other" set internet-service-id 851968 next edit "LinkedIn-Web" set internet-service-id 851969 next edit "LinkedIn-ICMP" set internet-service-id 851970 next edit "LinkedIn-DNS" set internet-service-id 851971 next edit "LinkedIn-Outbound_Email" set internet-service-id 851972 next edit "LinkedIn-SSH" set internet-service-id 851974 next edit "LinkedIn-FTP" set internet-service-id 851975 next edit "LinkedIn-NTP" set internet-service-id 851976 next edit "LinkedIn-Inbound_Email" set internet-service-id 851977 next edit "LinkedIn-LDAP" set internet-service-id 851982 next edit "LinkedIn-NetBIOS.Session.Service" set internet-service-id 851983 next edit "LinkedIn-RTMP" set internet-service-id 851984 next edit "LinkedIn-NetBIOS.Name.Service" set internet-service-id 851992 next edit "Adobe-Other" set internet-service-id 917504 next edit "Adobe-Web" set internet-service-id 917505 next edit "Adobe-ICMP" set internet-service-id 917506 next edit "Adobe-DNS" set internet-service-id 917507 next edit "Adobe-Outbound_Email" set internet-service-id 917508 next edit "Adobe-SSH" set internet-service-id 917510 next edit "Adobe-FTP" set internet-service-id 917511 next edit "Adobe-NTP" set internet-service-id 917512 next edit "Adobe-Inbound_Email" set internet-service-id 917513 next edit "Adobe-LDAP" set internet-service-id 917518 next edit "Adobe-NetBIOS.Session.Service" set internet-service-id 917519 next edit "Adobe-RTMP" set internet-service-id 917520 next edit "Adobe-NetBIOS.Name.Service" set internet-service-id 917528 next edit "Adobe-Adobe.Experience.Cloud" set internet-service-id 917640 next edit "Adobe-Adobe.Sign" set internet-service-id 917776 next edit "Oracle-Other" set internet-service-id 983040 next edit "Oracle-Web" set internet-service-id 983041 next edit "Oracle-ICMP" set internet-service-id 983042 next edit "Oracle-DNS" set internet-service-id 983043 next edit "Oracle-Outbound_Email" set internet-service-id 983044 next edit "Oracle-SSH" set internet-service-id 983046 next edit "Oracle-FTP" set internet-service-id 983047 next edit "Oracle-NTP" set internet-service-id 983048 next edit "Oracle-Inbound_Email" set internet-service-id 983049 next edit "Oracle-LDAP" set internet-service-id 983054 next edit "Oracle-NetBIOS.Session.Service" set internet-service-id 983055 next edit "Oracle-RTMP" set internet-service-id 983056 next edit "Oracle-NetBIOS.Name.Service" set internet-service-id 983064 next edit "Oracle-Oracle.Cloud" set internet-service-id 983171 next edit "Hulu-Other" set internet-service-id 1048576 next edit "Hulu-Web" set internet-service-id 1048577 next edit "Hulu-ICMP" set internet-service-id 1048578 next edit "Hulu-DNS" set internet-service-id 1048579 next edit "Hulu-Outbound_Email" set internet-service-id 1048580 next edit "Hulu-SSH" set internet-service-id 1048582 next edit "Hulu-FTP" set internet-service-id 1048583 next edit "Hulu-NTP" set internet-service-id 1048584 next edit "Hulu-Inbound_Email" set internet-service-id 1048585 next edit "Hulu-LDAP" set internet-service-id 1048590 next edit "Hulu-NetBIOS.Session.Service" set internet-service-id 1048591 next edit "Hulu-RTMP" set internet-service-id 1048592 next edit "Hulu-NetBIOS.Name.Service" set internet-service-id 1048600 next edit "Pinterest-Other" set internet-service-id 1114112 next edit "Pinterest-Web" set internet-service-id 1114113 next edit "Pinterest-ICMP" set internet-service-id 1114114 next edit "Pinterest-DNS" set internet-service-id 1114115 next edit "Pinterest-Outbound_Email" set internet-service-id 1114116 next edit "Pinterest-SSH" set internet-service-id 1114118 next edit "Pinterest-FTP" set internet-service-id 1114119 next edit "Pinterest-NTP" set internet-service-id 1114120 next edit "Pinterest-Inbound_Email" set internet-service-id 1114121 next edit "Pinterest-LDAP" set internet-service-id 1114126 next edit "Pinterest-NetBIOS.Session.Service" set internet-service-id 1114127 next edit "Pinterest-RTMP" set internet-service-id 1114128 next edit "Pinterest-NetBIOS.Name.Service" set internet-service-id 1114136 next edit "LogMeIn-Other" set internet-service-id 1179648 next edit "LogMeIn-Web" set internet-service-id 1179649 next edit "LogMeIn-ICMP" set internet-service-id 1179650 next edit "LogMeIn-DNS" set internet-service-id 1179651 next edit "LogMeIn-Outbound_Email" set internet-service-id 1179652 next edit "LogMeIn-SSH" set internet-service-id 1179654 next edit "LogMeIn-FTP" set internet-service-id 1179655 next edit "LogMeIn-NTP" set internet-service-id 1179656 next edit "LogMeIn-Inbound_Email" set internet-service-id 1179657 next edit "LogMeIn-LDAP" set internet-service-id 1179662 next edit "LogMeIn-NetBIOS.Session.Service" set internet-service-id 1179663 next edit "LogMeIn-RTMP" set internet-service-id 1179664 next edit "LogMeIn-NetBIOS.Name.Service" set internet-service-id 1179672 next edit "LogMeIn-GoTo.Suite" set internet-service-id 1179767 next edit "Fortinet-Other" set internet-service-id 1245184 next edit "Fortinet-Web" set internet-service-id 1245185 next edit "Fortinet-ICMP" set internet-service-id 1245186 next edit "Fortinet-DNS" set internet-service-id 1245187 next edit "Fortinet-Outbound_Email" set internet-service-id 1245188 next edit "Fortinet-SSH" set internet-service-id 1245190 next edit "Fortinet-FTP" set internet-service-id 1245191 next edit "Fortinet-NTP" set internet-service-id 1245192 next edit "Fortinet-Inbound_Email" set internet-service-id 1245193 next edit "Fortinet-LDAP" set internet-service-id 1245198 next edit "Fortinet-NetBIOS.Session.Service" set internet-service-id 1245199 next edit "Fortinet-RTMP" set internet-service-id 1245200 next edit "Fortinet-NetBIOS.Name.Service" set internet-service-id 1245208 next edit "Fortinet-FortiGuard" set internet-service-id 1245324 next edit "Fortinet-FortiMail.Cloud" set internet-service-id 1245325 next edit "Fortinet-FortiCloud" set internet-service-id 1245326 next edit "Fortinet-FortiVoice.Cloud" set internet-service-id 1245432 next edit "Fortinet-FortiGuard.Secure.DNS" set internet-service-id 1245454 next edit "Fortinet-FortiEDR" set internet-service-id 1245475 next edit "Kaspersky-Other" set internet-service-id 1310720 next edit "Kaspersky-Web" set internet-service-id 1310721 next edit "Kaspersky-ICMP" set internet-service-id 1310722 next edit "Kaspersky-DNS" set internet-service-id 1310723 next edit "Kaspersky-Outbound_Email" set internet-service-id 1310724 next edit "Kaspersky-SSH" set internet-service-id 1310726 next edit "Kaspersky-FTP" set internet-service-id 1310727 next edit "Kaspersky-NTP" set internet-service-id 1310728 next edit "Kaspersky-Inbound_Email" set internet-service-id 1310729 next edit "Kaspersky-LDAP" set internet-service-id 1310734 next edit "Kaspersky-NetBIOS.Session.Service" set internet-service-id 1310735 next edit "Kaspersky-RTMP" set internet-service-id 1310736 next edit "Kaspersky-NetBIOS.Name.Service" set internet-service-id 1310744 next edit "McAfee-Other" set internet-service-id 1376256 next edit "McAfee-Web" set internet-service-id 1376257 next edit "McAfee-ICMP" set internet-service-id 1376258 next edit "McAfee-DNS" set internet-service-id 1376259 next edit "McAfee-Outbound_Email" set internet-service-id 1376260 next edit "McAfee-SSH" set internet-service-id 1376262 next edit "McAfee-FTP" set internet-service-id 1376263 next edit "McAfee-NTP" set internet-service-id 1376264 next edit "McAfee-Inbound_Email" set internet-service-id 1376265 next edit "McAfee-LDAP" set internet-service-id 1376270 next edit "McAfee-NetBIOS.Session.Service" set internet-service-id 1376271 next edit "McAfee-RTMP" set internet-service-id 1376272 next edit "McAfee-NetBIOS.Name.Service" set internet-service-id 1376280 next edit "Symantec-Other" set internet-service-id 1441792 next edit "Symantec-Web" set internet-service-id 1441793 next edit "Symantec-ICMP" set internet-service-id 1441794 next edit "Symantec-DNS" set internet-service-id 1441795 next edit "Symantec-Outbound_Email" set internet-service-id 1441796 next edit "Symantec-SSH" set internet-service-id 1441798 next edit "Symantec-FTP" set internet-service-id 1441799 next edit "Symantec-NTP" set internet-service-id 1441800 next edit "Symantec-Inbound_Email" set internet-service-id 1441801 next edit "Symantec-LDAP" set internet-service-id 1441806 next edit "Symantec-NetBIOS.Session.Service" set internet-service-id 1441807 next edit "Symantec-RTMP" set internet-service-id 1441808 next edit "Symantec-NetBIOS.Name.Service" set internet-service-id 1441816 next edit "Symantec-Symantec.Cloud" set internet-service-id 1441922 next edit "VMware-Other" set internet-service-id 1507328 next edit "VMware-Web" set internet-service-id 1507329 next edit "VMware-ICMP" set internet-service-id 1507330 next edit "VMware-DNS" set internet-service-id 1507331 next edit "VMware-Outbound_Email" set internet-service-id 1507332 next edit "VMware-SSH" set internet-service-id 1507334 next edit "VMware-FTP" set internet-service-id 1507335 next edit "VMware-NTP" set internet-service-id 1507336 next edit "VMware-Inbound_Email" set internet-service-id 1507337 next edit "VMware-LDAP" set internet-service-id 1507342 next edit "VMware-NetBIOS.Session.Service" set internet-service-id 1507343 next edit "VMware-RTMP" set internet-service-id 1507344 next edit "VMware-NetBIOS.Name.Service" set internet-service-id 1507352 next edit "VMware-Workspace.ONE" set internet-service-id 1507461 next edit "AOL-Other" set internet-service-id 1572864 next edit "AOL-Web" set internet-service-id 1572865 next edit "AOL-ICMP" set internet-service-id 1572866 next edit "AOL-DNS" set internet-service-id 1572867 next edit "AOL-Outbound_Email" set internet-service-id 1572868 next edit "AOL-SSH" set internet-service-id 1572870 next edit "AOL-FTP" set internet-service-id 1572871 next edit "AOL-NTP" set internet-service-id 1572872 next edit "AOL-Inbound_Email" set internet-service-id 1572873 next edit "AOL-LDAP" set internet-service-id 1572878 next edit "AOL-NetBIOS.Session.Service" set internet-service-id 1572879 next edit "AOL-RTMP" set internet-service-id 1572880 next edit "AOL-NetBIOS.Name.Service" set internet-service-id 1572888 next edit "RealNetworks-Other" set internet-service-id 1638400 next edit "RealNetworks-Web" set internet-service-id 1638401 next edit "RealNetworks-ICMP" set internet-service-id 1638402 next edit "RealNetworks-DNS" set internet-service-id 1638403 next edit "RealNetworks-Outbound_Email" set internet-service-id 1638404 next edit "RealNetworks-SSH" set internet-service-id 1638406 next edit "RealNetworks-FTP" set internet-service-id 1638407 next edit "RealNetworks-NTP" set internet-service-id 1638408 next edit "RealNetworks-Inbound_Email" set internet-service-id 1638409 next edit "RealNetworks-LDAP" set internet-service-id 1638414 next edit "RealNetworks-NetBIOS.Session.Service" set internet-service-id 1638415 next edit "RealNetworks-RTMP" set internet-service-id 1638416 next edit "RealNetworks-NetBIOS.Name.Service" set internet-service-id 1638424 next edit "Zoho-Other" set internet-service-id 1703936 next edit "Zoho-Web" set internet-service-id 1703937 next edit "Zoho-ICMP" set internet-service-id 1703938 next edit "Zoho-DNS" set internet-service-id 1703939 next edit "Zoho-Outbound_Email" set internet-service-id 1703940 next edit "Zoho-SSH" set internet-service-id 1703942 next edit "Zoho-FTP" set internet-service-id 1703943 next edit "Zoho-NTP" set internet-service-id 1703944 next edit "Zoho-Inbound_Email" set internet-service-id 1703945 next edit "Zoho-LDAP" set internet-service-id 1703950 next edit "Zoho-NetBIOS.Session.Service" set internet-service-id 1703951 next edit "Zoho-RTMP" set internet-service-id 1703952 next edit "Zoho-NetBIOS.Name.Service" set internet-service-id 1703960 next edit "Zoho-Site24x7.Monitor" set internet-service-id 1704153 next edit "Mozilla-Other" set internet-service-id 1769472 next edit "Mozilla-Web" set internet-service-id 1769473 next edit "Mozilla-ICMP" set internet-service-id 1769474 next edit "Mozilla-DNS" set internet-service-id 1769475 next edit "Mozilla-Outbound_Email" set internet-service-id 1769476 next edit "Mozilla-SSH" set internet-service-id 1769478 next edit "Mozilla-FTP" set internet-service-id 1769479 next edit "Mozilla-NTP" set internet-service-id 1769480 next edit "Mozilla-Inbound_Email" set internet-service-id 1769481 next edit "Mozilla-LDAP" set internet-service-id 1769486 next edit "Mozilla-NetBIOS.Session.Service" set internet-service-id 1769487 next edit "Mozilla-RTMP" set internet-service-id 1769488 next edit "Mozilla-NetBIOS.Name.Service" set internet-service-id 1769496 next edit "TeamViewer-Other" set internet-service-id 1835008 next edit "TeamViewer-Web" set internet-service-id 1835009 next edit "TeamViewer-ICMP" set internet-service-id 1835010 next edit "TeamViewer-DNS" set internet-service-id 1835011 next edit "TeamViewer-Outbound_Email" set internet-service-id 1835012 next edit "TeamViewer-SSH" set internet-service-id 1835014 next edit "TeamViewer-FTP" set internet-service-id 1835015 next edit "TeamViewer-NTP" set internet-service-id 1835016 next edit "TeamViewer-Inbound_Email" set internet-service-id 1835017 next edit "TeamViewer-LDAP" set internet-service-id 1835022 next edit "TeamViewer-NetBIOS.Session.Service" set internet-service-id 1835023 next edit "TeamViewer-RTMP" set internet-service-id 1835024 next edit "TeamViewer-NetBIOS.Name.Service" set internet-service-id 1835032 next edit "TeamViewer-TeamViewer" set internet-service-id 1835117 next edit "HP-Other" set internet-service-id 1900544 next edit "HP-Web" set internet-service-id 1900545 next edit "HP-ICMP" set internet-service-id 1900546 next edit "HP-DNS" set internet-service-id 1900547 next edit "HP-Outbound_Email" set internet-service-id 1900548 next edit "HP-SSH" set internet-service-id 1900550 next edit "HP-FTP" set internet-service-id 1900551 next edit "HP-NTP" set internet-service-id 1900552 next edit "HP-Inbound_Email" set internet-service-id 1900553 next edit "HP-LDAP" set internet-service-id 1900558 next edit "HP-NetBIOS.Session.Service" set internet-service-id 1900559 next edit "HP-RTMP" set internet-service-id 1900560 next edit "HP-NetBIOS.Name.Service" set internet-service-id 1900568 next edit "HP-Aruba" set internet-service-id 1900726 next edit "Cisco-Other" set internet-service-id 1966080 next edit "Cisco-Web" set internet-service-id 1966081 next edit "Cisco-ICMP" set internet-service-id 1966082 next edit "Cisco-DNS" set internet-service-id 1966083 next edit "Cisco-Outbound_Email" set internet-service-id 1966084 next edit "Cisco-SSH" set internet-service-id 1966086 next edit "Cisco-FTP" set internet-service-id 1966087 next edit "Cisco-NTP" set internet-service-id 1966088 next edit "Cisco-Inbound_Email" set internet-service-id 1966089 next edit "Cisco-LDAP" set internet-service-id 1966094 next edit "Cisco-NetBIOS.Session.Service" set internet-service-id 1966095 next edit "Cisco-RTMP" set internet-service-id 1966096 next edit "Cisco-NetBIOS.Name.Service" set internet-service-id 1966104 next edit "Cisco-Webex" set internet-service-id 1966183 next edit "Cisco-Meraki.Cloud" set internet-service-id 1966218 next edit "Cisco-Duo.Security" set internet-service-id 1966225 next edit "Cisco-AppDynamic" set internet-service-id 1966260 next edit "Cisco-Webex.FedRAMP" set internet-service-id 1966315 next edit "Cisco-Secure.Endpoint" set internet-service-id 1966324 next edit "IBM-Other" set internet-service-id 2031616 next edit "IBM-Web" set internet-service-id 2031617 next edit "IBM-ICMP" set internet-service-id 2031618 next edit "IBM-DNS" set internet-service-id 2031619 next edit "IBM-Outbound_Email" set internet-service-id 2031620 next edit "IBM-SSH" set internet-service-id 2031622 next edit "IBM-FTP" set internet-service-id 2031623 next edit "IBM-NTP" set internet-service-id 2031624 next edit "IBM-Inbound_Email" set internet-service-id 2031625 next edit "IBM-LDAP" set internet-service-id 2031630 next edit "IBM-NetBIOS.Session.Service" set internet-service-id 2031631 next edit "IBM-RTMP" set internet-service-id 2031632 next edit "IBM-NetBIOS.Name.Service" set internet-service-id 2031640 next edit "IBM-IBM.Cloud" set internet-service-id 2031748 next edit "Citrix-Other" set internet-service-id 2097152 next edit "Citrix-Web" set internet-service-id 2097153 next edit "Citrix-ICMP" set internet-service-id 2097154 next edit "Citrix-DNS" set internet-service-id 2097155 next edit "Citrix-Outbound_Email" set internet-service-id 2097156 next edit "Citrix-SSH" set internet-service-id 2097158 next edit "Citrix-FTP" set internet-service-id 2097159 next edit "Citrix-NTP" set internet-service-id 2097160 next edit "Citrix-Inbound_Email" set internet-service-id 2097161 next edit "Citrix-LDAP" set internet-service-id 2097166 next edit "Citrix-NetBIOS.Session.Service" set internet-service-id 2097167 next edit "Citrix-RTMP" set internet-service-id 2097168 next edit "Citrix-NetBIOS.Name.Service" set internet-service-id 2097176 next edit "Twitter-Other" set internet-service-id 2162688 next edit "Twitter-Web" set internet-service-id 2162689 next edit "Twitter-ICMP" set internet-service-id 2162690 next edit "Twitter-DNS" set internet-service-id 2162691 next edit "Twitter-Outbound_Email" set internet-service-id 2162692 next edit "Twitter-SSH" set internet-service-id 2162694 next edit "Twitter-FTP" set internet-service-id 2162695 next edit "Twitter-NTP" set internet-service-id 2162696 next edit "Twitter-Inbound_Email" set internet-service-id 2162697 next edit "Twitter-LDAP" set internet-service-id 2162702 next edit "Twitter-NetBIOS.Session.Service" set internet-service-id 2162703 next edit "Twitter-RTMP" set internet-service-id 2162704 next edit "Twitter-NetBIOS.Name.Service" set internet-service-id 2162712 next edit "Dell-Other" set internet-service-id 2228224 next edit "Dell-Web" set internet-service-id 2228225 next edit "Dell-ICMP" set internet-service-id 2228226 next edit "Dell-DNS" set internet-service-id 2228227 next edit "Dell-Outbound_Email" set internet-service-id 2228228 next edit "Dell-SSH" set internet-service-id 2228230 next edit "Dell-FTP" set internet-service-id 2228231 next edit "Dell-NTP" set internet-service-id 2228232 next edit "Dell-Inbound_Email" set internet-service-id 2228233 next edit "Dell-LDAP" set internet-service-id 2228238 next edit "Dell-NetBIOS.Session.Service" set internet-service-id 2228239 next edit "Dell-RTMP" set internet-service-id 2228240 next edit "Dell-NetBIOS.Name.Service" set internet-service-id 2228248 next edit "Vimeo-Other" set internet-service-id 2293760 next edit "Vimeo-Web" set internet-service-id 2293761 next edit "Vimeo-ICMP" set internet-service-id 2293762 next edit "Vimeo-DNS" set internet-service-id 2293763 next edit "Vimeo-Outbound_Email" set internet-service-id 2293764 next edit "Vimeo-SSH" set internet-service-id 2293766 next edit "Vimeo-FTP" set internet-service-id 2293767 next edit "Vimeo-NTP" set internet-service-id 2293768 next edit "Vimeo-Inbound_Email" set internet-service-id 2293769 next edit "Vimeo-LDAP" set internet-service-id 2293774 next edit "Vimeo-NetBIOS.Session.Service" set internet-service-id 2293775 next edit "Vimeo-RTMP" set internet-service-id 2293776 next edit "Vimeo-NetBIOS.Name.Service" set internet-service-id 2293784 next edit "Redhat-Other" set internet-service-id 2359296 next edit "Redhat-Web" set internet-service-id 2359297 next edit "Redhat-ICMP" set internet-service-id 2359298 next edit "Redhat-DNS" set internet-service-id 2359299 next edit "Redhat-Outbound_Email" set internet-service-id 2359300 next edit "Redhat-SSH" set internet-service-id 2359302 next edit "Redhat-FTP" set internet-service-id 2359303 next edit "Redhat-NTP" set internet-service-id 2359304 next edit "Redhat-Inbound_Email" set internet-service-id 2359305 next edit "Redhat-LDAP" set internet-service-id 2359310 next edit "Redhat-NetBIOS.Session.Service" set internet-service-id 2359311 next edit "Redhat-RTMP" set internet-service-id 2359312 next edit "Redhat-NetBIOS.Name.Service" set internet-service-id 2359320 next edit "VK-Other" set internet-service-id 2424832 next edit "VK-Web" set internet-service-id 2424833 next edit "VK-ICMP" set internet-service-id 2424834 next edit "VK-DNS" set internet-service-id 2424835 next edit "VK-Outbound_Email" set internet-service-id 2424836 next edit "VK-SSH" set internet-service-id 2424838 next edit "VK-FTP" set internet-service-id 2424839 next edit "VK-NTP" set internet-service-id 2424840 next edit "VK-Inbound_Email" set internet-service-id 2424841 next edit "VK-LDAP" set internet-service-id 2424846 next edit "VK-NetBIOS.Session.Service" set internet-service-id 2424847 next edit "VK-RTMP" set internet-service-id 2424848 next edit "VK-NetBIOS.Name.Service" set internet-service-id 2424856 next edit "TrendMicro-Other" set internet-service-id 2490368 next edit "TrendMicro-Web" set internet-service-id 2490369 next edit "TrendMicro-ICMP" set internet-service-id 2490370 next edit "TrendMicro-DNS" set internet-service-id 2490371 next edit "TrendMicro-Outbound_Email" set internet-service-id 2490372 next edit "TrendMicro-SSH" set internet-service-id 2490374 next edit "TrendMicro-FTP" set internet-service-id 2490375 next edit "TrendMicro-NTP" set internet-service-id 2490376 next edit "TrendMicro-Inbound_Email" set internet-service-id 2490377 next edit "TrendMicro-LDAP" set internet-service-id 2490382 next edit "TrendMicro-NetBIOS.Session.Service" set internet-service-id 2490383 next edit "TrendMicro-RTMP" set internet-service-id 2490384 next edit "TrendMicro-NetBIOS.Name.Service" set internet-service-id 2490392 next edit "Tencent-Other" set internet-service-id 2555904 next edit "Tencent-Web" set internet-service-id 2555905 next edit "Tencent-ICMP" set internet-service-id 2555906 next edit "Tencent-DNS" set internet-service-id 2555907 next edit "Tencent-Outbound_Email" set internet-service-id 2555908 next edit "Tencent-SSH" set internet-service-id 2555910 next edit "Tencent-FTP" set internet-service-id 2555911 next edit "Tencent-NTP" set internet-service-id 2555912 next edit "Tencent-Inbound_Email" set internet-service-id 2555913 next edit "Tencent-LDAP" set internet-service-id 2555918 next edit "Tencent-NetBIOS.Session.Service" set internet-service-id 2555919 next edit "Tencent-RTMP" set internet-service-id 2555920 next edit "Tencent-NetBIOS.Name.Service" set internet-service-id 2555928 next edit "Ask-Other" set internet-service-id 2621440 next edit "Ask-Web" set internet-service-id 2621441 next edit "Ask-ICMP" set internet-service-id 2621442 next edit "Ask-DNS" set internet-service-id 2621443 next edit "Ask-Outbound_Email" set internet-service-id 2621444 next edit "Ask-SSH" set internet-service-id 2621446 next edit "Ask-FTP" set internet-service-id 2621447 next edit "Ask-NTP" set internet-service-id 2621448 next edit "Ask-Inbound_Email" set internet-service-id 2621449 next edit "Ask-LDAP" set internet-service-id 2621454 next edit "Ask-NetBIOS.Session.Service" set internet-service-id 2621455 next edit "Ask-RTMP" set internet-service-id 2621456 next edit "Ask-NetBIOS.Name.Service" set internet-service-id 2621464 next edit "CNN-Other" set internet-service-id 2686976 next edit "CNN-Web" set internet-service-id 2686977 next edit "CNN-ICMP" set internet-service-id 2686978 next edit "CNN-DNS" set internet-service-id 2686979 next edit "CNN-Outbound_Email" set internet-service-id 2686980 next edit "CNN-SSH" set internet-service-id 2686982 next edit "CNN-FTP" set internet-service-id 2686983 next edit "CNN-NTP" set internet-service-id 2686984 next edit "CNN-Inbound_Email" set internet-service-id 2686985 next edit "CNN-LDAP" set internet-service-id 2686990 next edit "CNN-NetBIOS.Session.Service" set internet-service-id 2686991 next edit "CNN-RTMP" set internet-service-id 2686992 next edit "CNN-NetBIOS.Name.Service" set internet-service-id 2687000 next edit "Myspace-Other" set internet-service-id 2752512 next edit "Myspace-Web" set internet-service-id 2752513 next edit "Myspace-ICMP" set internet-service-id 2752514 next edit "Myspace-DNS" set internet-service-id 2752515 next edit "Myspace-Outbound_Email" set internet-service-id 2752516 next edit "Myspace-SSH" set internet-service-id 2752518 next edit "Myspace-FTP" set internet-service-id 2752519 next edit "Myspace-NTP" set internet-service-id 2752520 next edit "Myspace-Inbound_Email" set internet-service-id 2752521 next edit "Myspace-LDAP" set internet-service-id 2752526 next edit "Myspace-NetBIOS.Session.Service" set internet-service-id 2752527 next edit "Myspace-RTMP" set internet-service-id 2752528 next edit "Myspace-NetBIOS.Name.Service" set internet-service-id 2752536 next edit "Tor-Relay.Node" set internet-service-id 2818238 next edit "Tor-Exit.Node" set internet-service-id 2818243 next edit "Baidu-Other" set internet-service-id 2883584 next edit "Baidu-Web" set internet-service-id 2883585 next edit "Baidu-ICMP" set internet-service-id 2883586 next edit "Baidu-DNS" set internet-service-id 2883587 next edit "Baidu-Outbound_Email" set internet-service-id 2883588 next edit "Baidu-SSH" set internet-service-id 2883590 next edit "Baidu-FTP" set internet-service-id 2883591 next edit "Baidu-NTP" set internet-service-id 2883592 next edit "Baidu-Inbound_Email" set internet-service-id 2883593 next edit "Baidu-LDAP" set internet-service-id 2883598 next edit "Baidu-NetBIOS.Session.Service" set internet-service-id 2883599 next edit "Baidu-RTMP" set internet-service-id 2883600 next edit "Baidu-NetBIOS.Name.Service" set internet-service-id 2883608 next edit "ntp.org-Other" set internet-service-id 2949120 next edit "ntp.org-Web" set internet-service-id 2949121 next edit "ntp.org-ICMP" set internet-service-id 2949122 next edit "ntp.org-DNS" set internet-service-id 2949123 next edit "ntp.org-Outbound_Email" set internet-service-id 2949124 next edit "ntp.org-SSH" set internet-service-id 2949126 next edit "ntp.org-FTP" set internet-service-id 2949127 next edit "ntp.org-NTP" set internet-service-id 2949128 next edit "ntp.org-Inbound_Email" set internet-service-id 2949129 next edit "ntp.org-LDAP" set internet-service-id 2949134 next edit "ntp.org-NetBIOS.Session.Service" set internet-service-id 2949135 next edit "ntp.org-RTMP" set internet-service-id 2949136 next edit "ntp.org-NetBIOS.Name.Service" set internet-service-id 2949144 next edit "Proxy-Proxy.Server" set internet-service-id 3014850 next edit "Botnet-C&C.Server" set internet-service-id 3080383 next edit "Spam-Spamming.Server" set internet-service-id 3145920 next edit "Phishing-Phishing.Server" set internet-service-id 3211457 next edit "Zendesk-Other" set internet-service-id 3407872 next edit "Zendesk-Web" set internet-service-id 3407873 next edit "Zendesk-ICMP" set internet-service-id 3407874 next edit "Zendesk-DNS" set internet-service-id 3407875 next edit "Zendesk-Outbound_Email" set internet-service-id 3407876 next edit "Zendesk-SSH" set internet-service-id 3407878 next edit "Zendesk-FTP" set internet-service-id 3407879 next edit "Zendesk-NTP" set internet-service-id 3407880 next edit "Zendesk-Inbound_Email" set internet-service-id 3407881 next edit "Zendesk-LDAP" set internet-service-id 3407886 next edit "Zendesk-NetBIOS.Session.Service" set internet-service-id 3407887 next edit "Zendesk-RTMP" set internet-service-id 3407888 next edit "Zendesk-NetBIOS.Name.Service" set internet-service-id 3407896 next edit "Zendesk-Zendesk.Suite" set internet-service-id 3408047 next edit "DocuSign-Other" set internet-service-id 3473408 next edit "DocuSign-Web" set internet-service-id 3473409 next edit "DocuSign-ICMP" set internet-service-id 3473410 next edit "DocuSign-DNS" set internet-service-id 3473411 next edit "DocuSign-Outbound_Email" set internet-service-id 3473412 next edit "DocuSign-SSH" set internet-service-id 3473414 next edit "DocuSign-FTP" set internet-service-id 3473415 next edit "DocuSign-NTP" set internet-service-id 3473416 next edit "DocuSign-Inbound_Email" set internet-service-id 3473417 next edit "DocuSign-LDAP" set internet-service-id 3473422 next edit "DocuSign-NetBIOS.Session.Service" set internet-service-id 3473423 next edit "DocuSign-RTMP" set internet-service-id 3473424 next edit "DocuSign-NetBIOS.Name.Service" set internet-service-id 3473432 next edit "ServiceNow-Other" set internet-service-id 3538944 next edit "ServiceNow-Web" set internet-service-id 3538945 next edit "ServiceNow-ICMP" set internet-service-id 3538946 next edit "ServiceNow-DNS" set internet-service-id 3538947 next edit "ServiceNow-Outbound_Email" set internet-service-id 3538948 next edit "ServiceNow-SSH" set internet-service-id 3538950 next edit "ServiceNow-FTP" set internet-service-id 3538951 next edit "ServiceNow-NTP" set internet-service-id 3538952 next edit "ServiceNow-Inbound_Email" set internet-service-id 3538953 next edit "ServiceNow-LDAP" set internet-service-id 3538958 next edit "ServiceNow-NetBIOS.Session.Service" set internet-service-id 3538959 next edit "ServiceNow-RTMP" set internet-service-id 3538960 next edit "ServiceNow-NetBIOS.Name.Service" set internet-service-id 3538968 next edit "GitHub-GitHub" set internet-service-id 3604638 next edit "Workday-Other" set internet-service-id 3670016 next edit "Workday-Web" set internet-service-id 3670017 next edit "Workday-ICMP" set internet-service-id 3670018 next edit "Workday-DNS" set internet-service-id 3670019 next edit "Workday-Outbound_Email" set internet-service-id 3670020 next edit "Workday-SSH" set internet-service-id 3670022 next edit "Workday-FTP" set internet-service-id 3670023 next edit "Workday-NTP" set internet-service-id 3670024 next edit "Workday-Inbound_Email" set internet-service-id 3670025 next edit "Workday-LDAP" set internet-service-id 3670030 next edit "Workday-NetBIOS.Session.Service" set internet-service-id 3670031 next edit "Workday-RTMP" set internet-service-id 3670032 next edit "Workday-NetBIOS.Name.Service" set internet-service-id 3670040 next edit "HubSpot-Other" set internet-service-id 3735552 next edit "HubSpot-Web" set internet-service-id 3735553 next edit "HubSpot-ICMP" set internet-service-id 3735554 next edit "HubSpot-DNS" set internet-service-id 3735555 next edit "HubSpot-Outbound_Email" set internet-service-id 3735556 next edit "HubSpot-SSH" set internet-service-id 3735558 next edit "HubSpot-FTP" set internet-service-id 3735559 next edit "HubSpot-NTP" set internet-service-id 3735560 next edit "HubSpot-Inbound_Email" set internet-service-id 3735561 next edit "HubSpot-LDAP" set internet-service-id 3735566 next edit "HubSpot-NetBIOS.Session.Service" set internet-service-id 3735567 next edit "HubSpot-RTMP" set internet-service-id 3735568 next edit "HubSpot-NetBIOS.Name.Service" set internet-service-id 3735576 next edit "Twilio-Other" set internet-service-id 3801088 next edit "Twilio-Web" set internet-service-id 3801089 next edit "Twilio-ICMP" set internet-service-id 3801090 next edit "Twilio-DNS" set internet-service-id 3801091 next edit "Twilio-Outbound_Email" set internet-service-id 3801092 next edit "Twilio-SSH" set internet-service-id 3801094 next edit "Twilio-FTP" set internet-service-id 3801095 next edit "Twilio-NTP" set internet-service-id 3801096 next edit "Twilio-Inbound_Email" set internet-service-id 3801097 next edit "Twilio-LDAP" set internet-service-id 3801102 next edit "Twilio-NetBIOS.Session.Service" set internet-service-id 3801103 next edit "Twilio-RTMP" set internet-service-id 3801104 next edit "Twilio-NetBIOS.Name.Service" set internet-service-id 3801112 next edit "Twilio-Elastic.SIP.Trunking" set internet-service-id 3801277 next edit "Coupa-Other" set internet-service-id 3866624 next edit "Coupa-Web" set internet-service-id 3866625 next edit "Coupa-ICMP" set internet-service-id 3866626 next edit "Coupa-DNS" set internet-service-id 3866627 next edit "Coupa-Outbound_Email" set internet-service-id 3866628 next edit "Coupa-SSH" set internet-service-id 3866630 next edit "Coupa-FTP" set internet-service-id 3866631 next edit "Coupa-NTP" set internet-service-id 3866632 next edit "Coupa-Inbound_Email" set internet-service-id 3866633 next edit "Coupa-LDAP" set internet-service-id 3866638 next edit "Coupa-NetBIOS.Session.Service" set internet-service-id 3866639 next edit "Coupa-RTMP" set internet-service-id 3866640 next edit "Coupa-NetBIOS.Name.Service" set internet-service-id 3866648 next edit "Atlassian-Other" set internet-service-id 3932160 next edit "Atlassian-Web" set internet-service-id 3932161 next edit "Atlassian-ICMP" set internet-service-id 3932162 next edit "Atlassian-DNS" set internet-service-id 3932163 next edit "Atlassian-Outbound_Email" set internet-service-id 3932164 next edit "Atlassian-SSH" set internet-service-id 3932166 next edit "Atlassian-FTP" set internet-service-id 3932167 next edit "Atlassian-NTP" set internet-service-id 3932168 next edit "Atlassian-Inbound_Email" set internet-service-id 3932169 next edit "Atlassian-LDAP" set internet-service-id 3932174 next edit "Atlassian-NetBIOS.Session.Service" set internet-service-id 3932175 next edit "Atlassian-RTMP" set internet-service-id 3932176 next edit "Atlassian-NetBIOS.Name.Service" set internet-service-id 3932184 next edit "Atlassian-Atlassian.Cloud" set internet-service-id 3932388 next edit "Atlassian-Atlassian.Notification" set internet-service-id 3932436 next edit "Xero-Other" set internet-service-id 3997696 next edit "Xero-Web" set internet-service-id 3997697 next edit "Xero-ICMP" set internet-service-id 3997698 next edit "Xero-DNS" set internet-service-id 3997699 next edit "Xero-Outbound_Email" set internet-service-id 3997700 next edit "Xero-SSH" set internet-service-id 3997702 next edit "Xero-FTP" set internet-service-id 3997703 next edit "Xero-NTP" set internet-service-id 3997704 next edit "Xero-Inbound_Email" set internet-service-id 3997705 next edit "Xero-LDAP" set internet-service-id 3997710 next edit "Xero-NetBIOS.Session.Service" set internet-service-id 3997711 next edit "Xero-RTMP" set internet-service-id 3997712 next edit "Xero-NetBIOS.Name.Service" set internet-service-id 3997720 next edit "Zuora-Other" set internet-service-id 4063232 next edit "Zuora-Web" set internet-service-id 4063233 next edit "Zuora-ICMP" set internet-service-id 4063234 next edit "Zuora-DNS" set internet-service-id 4063235 next edit "Zuora-Outbound_Email" set internet-service-id 4063236 next edit "Zuora-SSH" set internet-service-id 4063238 next edit "Zuora-FTP" set internet-service-id 4063239 next edit "Zuora-NTP" set internet-service-id 4063240 next edit "Zuora-Inbound_Email" set internet-service-id 4063241 next edit "Zuora-LDAP" set internet-service-id 4063246 next edit "Zuora-NetBIOS.Session.Service" set internet-service-id 4063247 next edit "Zuora-RTMP" set internet-service-id 4063248 next edit "Zuora-NetBIOS.Name.Service" set internet-service-id 4063256 next edit "AdRoll-Other" set internet-service-id 4128768 next edit "AdRoll-Web" set internet-service-id 4128769 next edit "AdRoll-ICMP" set internet-service-id 4128770 next edit "AdRoll-DNS" set internet-service-id 4128771 next edit "AdRoll-Outbound_Email" set internet-service-id 4128772 next edit "AdRoll-SSH" set internet-service-id 4128774 next edit "AdRoll-FTP" set internet-service-id 4128775 next edit "AdRoll-NTP" set internet-service-id 4128776 next edit "AdRoll-Inbound_Email" set internet-service-id 4128777 next edit "AdRoll-LDAP" set internet-service-id 4128782 next edit "AdRoll-NetBIOS.Session.Service" set internet-service-id 4128783 next edit "AdRoll-RTMP" set internet-service-id 4128784 next edit "AdRoll-NetBIOS.Name.Service" set internet-service-id 4128792 next edit "Xactly-Other" set internet-service-id 4194304 next edit "Xactly-Web" set internet-service-id 4194305 next edit "Xactly-ICMP" set internet-service-id 4194306 next edit "Xactly-DNS" set internet-service-id 4194307 next edit "Xactly-Outbound_Email" set internet-service-id 4194308 next edit "Xactly-SSH" set internet-service-id 4194310 next edit "Xactly-FTP" set internet-service-id 4194311 next edit "Xactly-NTP" set internet-service-id 4194312 next edit "Xactly-Inbound_Email" set internet-service-id 4194313 next edit "Xactly-LDAP" set internet-service-id 4194318 next edit "Xactly-NetBIOS.Session.Service" set internet-service-id 4194319 next edit "Xactly-RTMP" set internet-service-id 4194320 next edit "Xactly-NetBIOS.Name.Service" set internet-service-id 4194328 next edit "Intuit-Other" set internet-service-id 4259840 next edit "Intuit-Web" set internet-service-id 4259841 next edit "Intuit-ICMP" set internet-service-id 4259842 next edit "Intuit-DNS" set internet-service-id 4259843 next edit "Intuit-Outbound_Email" set internet-service-id 4259844 next edit "Intuit-SSH" set internet-service-id 4259846 next edit "Intuit-FTP" set internet-service-id 4259847 next edit "Intuit-NTP" set internet-service-id 4259848 next edit "Intuit-Inbound_Email" set internet-service-id 4259849 next edit "Intuit-LDAP" set internet-service-id 4259854 next edit "Intuit-NetBIOS.Session.Service" set internet-service-id 4259855 next edit "Intuit-RTMP" set internet-service-id 4259856 next edit "Intuit-NetBIOS.Name.Service" set internet-service-id 4259864 next edit "Marketo-Other" set internet-service-id 4325376 next edit "Marketo-Web" set internet-service-id 4325377 next edit "Marketo-ICMP" set internet-service-id 4325378 next edit "Marketo-DNS" set internet-service-id 4325379 next edit "Marketo-Outbound_Email" set internet-service-id 4325380 next edit "Marketo-SSH" set internet-service-id 4325382 next edit "Marketo-FTP" set internet-service-id 4325383 next edit "Marketo-NTP" set internet-service-id 4325384 next edit "Marketo-Inbound_Email" set internet-service-id 4325385 next edit "Marketo-LDAP" set internet-service-id 4325390 next edit "Marketo-NetBIOS.Session.Service" set internet-service-id 4325391 next edit "Marketo-RTMP" set internet-service-id 4325392 next edit "Marketo-NetBIOS.Name.Service" set internet-service-id 4325400 next edit "Bill-Other" set internet-service-id 4456448 next edit "Bill-Web" set internet-service-id 4456449 next edit "Bill-ICMP" set internet-service-id 4456450 next edit "Bill-DNS" set internet-service-id 4456451 next edit "Bill-Outbound_Email" set internet-service-id 4456452 next edit "Bill-SSH" set internet-service-id 4456454 next edit "Bill-FTP" set internet-service-id 4456455 next edit "Bill-NTP" set internet-service-id 4456456 next edit "Bill-Inbound_Email" set internet-service-id 4456457 next edit "Bill-LDAP" set internet-service-id 4456462 next edit "Bill-NetBIOS.Session.Service" set internet-service-id 4456463 next edit "Bill-RTMP" set internet-service-id 4456464 next edit "Bill-NetBIOS.Name.Service" set internet-service-id 4456472 next edit "Shopify-Other" set internet-service-id 4521984 next edit "Shopify-Web" set internet-service-id 4521985 next edit "Shopify-ICMP" set internet-service-id 4521986 next edit "Shopify-DNS" set internet-service-id 4521987 next edit "Shopify-Outbound_Email" set internet-service-id 4521988 next edit "Shopify-SSH" set internet-service-id 4521990 next edit "Shopify-FTP" set internet-service-id 4521991 next edit "Shopify-NTP" set internet-service-id 4521992 next edit "Shopify-Inbound_Email" set internet-service-id 4521993 next edit "Shopify-LDAP" set internet-service-id 4521998 next edit "Shopify-NetBIOS.Session.Service" set internet-service-id 4521999 next edit "Shopify-RTMP" set internet-service-id 4522000 next edit "Shopify-NetBIOS.Name.Service" set internet-service-id 4522008 next edit "Shopify-Shopify" set internet-service-id 4522162 next edit "MuleSoft-Other" set internet-service-id 4587520 next edit "MuleSoft-Web" set internet-service-id 4587521 next edit "MuleSoft-ICMP" set internet-service-id 4587522 next edit "MuleSoft-DNS" set internet-service-id 4587523 next edit "MuleSoft-Outbound_Email" set internet-service-id 4587524 next edit "MuleSoft-SSH" set internet-service-id 4587526 next edit "MuleSoft-FTP" set internet-service-id 4587527 next edit "MuleSoft-NTP" set internet-service-id 4587528 next edit "MuleSoft-Inbound_Email" set internet-service-id 4587529 next edit "MuleSoft-LDAP" set internet-service-id 4587534 next edit "MuleSoft-NetBIOS.Session.Service" set internet-service-id 4587535 next edit "MuleSoft-RTMP" set internet-service-id 4587536 next edit "MuleSoft-NetBIOS.Name.Service" set internet-service-id 4587544 next edit "Cornerstone-Other" set internet-service-id 4653056 next edit "Cornerstone-Web" set internet-service-id 4653057 next edit "Cornerstone-ICMP" set internet-service-id 4653058 next edit "Cornerstone-DNS" set internet-service-id 4653059 next edit "Cornerstone-Outbound_Email" set internet-service-id 4653060 next edit "Cornerstone-SSH" set internet-service-id 4653062 next edit "Cornerstone-FTP" set internet-service-id 4653063 next edit "Cornerstone-NTP" set internet-service-id 4653064 next edit "Cornerstone-Inbound_Email" set internet-service-id 4653065 next edit "Cornerstone-LDAP" set internet-service-id 4653070 next edit "Cornerstone-NetBIOS.Session.Service" set internet-service-id 4653071 next edit "Cornerstone-RTMP" set internet-service-id 4653072 next edit "Cornerstone-NetBIOS.Name.Service" set internet-service-id 4653080 next edit "Eventbrite-Other" set internet-service-id 4718592 next edit "Eventbrite-Web" set internet-service-id 4718593 next edit "Eventbrite-ICMP" set internet-service-id 4718594 next edit "Eventbrite-DNS" set internet-service-id 4718595 next edit "Eventbrite-Outbound_Email" set internet-service-id 4718596 next edit "Eventbrite-SSH" set internet-service-id 4718598 next edit "Eventbrite-FTP" set internet-service-id 4718599 next edit "Eventbrite-NTP" set internet-service-id 4718600 next edit "Eventbrite-Inbound_Email" set internet-service-id 4718601 next edit "Eventbrite-LDAP" set internet-service-id 4718606 next edit "Eventbrite-NetBIOS.Session.Service" set internet-service-id 4718607 next edit "Eventbrite-RTMP" set internet-service-id 4718608 next edit "Eventbrite-NetBIOS.Name.Service" set internet-service-id 4718616 next edit "Paychex-Other" set internet-service-id 4784128 next edit "Paychex-Web" set internet-service-id 4784129 next edit "Paychex-ICMP" set internet-service-id 4784130 next edit "Paychex-DNS" set internet-service-id 4784131 next edit "Paychex-Outbound_Email" set internet-service-id 4784132 next edit "Paychex-SSH" set internet-service-id 4784134 next edit "Paychex-FTP" set internet-service-id 4784135 next edit "Paychex-NTP" set internet-service-id 4784136 next edit "Paychex-Inbound_Email" set internet-service-id 4784137 next edit "Paychex-LDAP" set internet-service-id 4784142 next edit "Paychex-NetBIOS.Session.Service" set internet-service-id 4784143 next edit "Paychex-RTMP" set internet-service-id 4784144 next edit "Paychex-NetBIOS.Name.Service" set internet-service-id 4784152 next edit "NewRelic-Other" set internet-service-id 4849664 next edit "NewRelic-Web" set internet-service-id 4849665 next edit "NewRelic-ICMP" set internet-service-id 4849666 next edit "NewRelic-DNS" set internet-service-id 4849667 next edit "NewRelic-Outbound_Email" set internet-service-id 4849668 next edit "NewRelic-SSH" set internet-service-id 4849670 next edit "NewRelic-FTP" set internet-service-id 4849671 next edit "NewRelic-NTP" set internet-service-id 4849672 next edit "NewRelic-Inbound_Email" set internet-service-id 4849673 next edit "NewRelic-LDAP" set internet-service-id 4849678 next edit "NewRelic-NetBIOS.Session.Service" set internet-service-id 4849679 next edit "NewRelic-RTMP" set internet-service-id 4849680 next edit "NewRelic-NetBIOS.Name.Service" set internet-service-id 4849688 next edit "Splunk-Other" set internet-service-id 4915200 next edit "Splunk-Web" set internet-service-id 4915201 next edit "Splunk-ICMP" set internet-service-id 4915202 next edit "Splunk-DNS" set internet-service-id 4915203 next edit "Splunk-Outbound_Email" set internet-service-id 4915204 next edit "Splunk-SSH" set internet-service-id 4915206 next edit "Splunk-FTP" set internet-service-id 4915207 next edit "Splunk-NTP" set internet-service-id 4915208 next edit "Splunk-Inbound_Email" set internet-service-id 4915209 next edit "Splunk-LDAP" set internet-service-id 4915214 next edit "Splunk-NetBIOS.Session.Service" set internet-service-id 4915215 next edit "Splunk-RTMP" set internet-service-id 4915216 next edit "Splunk-NetBIOS.Name.Service" set internet-service-id 4915224 next edit "Domo-Other" set internet-service-id 4980736 next edit "Domo-Web" set internet-service-id 4980737 next edit "Domo-ICMP" set internet-service-id 4980738 next edit "Domo-DNS" set internet-service-id 4980739 next edit "Domo-Outbound_Email" set internet-service-id 4980740 next edit "Domo-SSH" set internet-service-id 4980742 next edit "Domo-FTP" set internet-service-id 4980743 next edit "Domo-NTP" set internet-service-id 4980744 next edit "Domo-Inbound_Email" set internet-service-id 4980745 next edit "Domo-LDAP" set internet-service-id 4980750 next edit "Domo-NetBIOS.Session.Service" set internet-service-id 4980751 next edit "Domo-RTMP" set internet-service-id 4980752 next edit "Domo-NetBIOS.Name.Service" set internet-service-id 4980760 next edit "FreshBooks-Other" set internet-service-id 5046272 next edit "FreshBooks-Web" set internet-service-id 5046273 next edit "FreshBooks-ICMP" set internet-service-id 5046274 next edit "FreshBooks-DNS" set internet-service-id 5046275 next edit "FreshBooks-Outbound_Email" set internet-service-id 5046276 next edit "FreshBooks-SSH" set internet-service-id 5046278 next edit "FreshBooks-FTP" set internet-service-id 5046279 next edit "FreshBooks-NTP" set internet-service-id 5046280 next edit "FreshBooks-Inbound_Email" set internet-service-id 5046281 next edit "FreshBooks-LDAP" set internet-service-id 5046286 next edit "FreshBooks-NetBIOS.Session.Service" set internet-service-id 5046287 next edit "FreshBooks-RTMP" set internet-service-id 5046288 next edit "FreshBooks-NetBIOS.Name.Service" set internet-service-id 5046296 next edit "Tableau-Other" set internet-service-id 5111808 next edit "Tableau-Web" set internet-service-id 5111809 next edit "Tableau-ICMP" set internet-service-id 5111810 next edit "Tableau-DNS" set internet-service-id 5111811 next edit "Tableau-Outbound_Email" set internet-service-id 5111812 next edit "Tableau-SSH" set internet-service-id 5111814 next edit "Tableau-FTP" set internet-service-id 5111815 next edit "Tableau-NTP" set internet-service-id 5111816 next edit "Tableau-Inbound_Email" set internet-service-id 5111817 next edit "Tableau-LDAP" set internet-service-id 5111822 next edit "Tableau-NetBIOS.Session.Service" set internet-service-id 5111823 next edit "Tableau-RTMP" set internet-service-id 5111824 next edit "Tableau-NetBIOS.Name.Service" set internet-service-id 5111832 next edit "Druva-Other" set internet-service-id 5177344 next edit "Druva-Web" set internet-service-id 5177345 next edit "Druva-ICMP" set internet-service-id 5177346 next edit "Druva-DNS" set internet-service-id 5177347 next edit "Druva-Outbound_Email" set internet-service-id 5177348 next edit "Druva-SSH" set internet-service-id 5177350 next edit "Druva-FTP" set internet-service-id 5177351 next edit "Druva-NTP" set internet-service-id 5177352 next edit "Druva-Inbound_Email" set internet-service-id 5177353 next edit "Druva-LDAP" set internet-service-id 5177358 next edit "Druva-NetBIOS.Session.Service" set internet-service-id 5177359 next edit "Druva-RTMP" set internet-service-id 5177360 next edit "Druva-NetBIOS.Name.Service" set internet-service-id 5177368 next edit "Act-on-Other" set internet-service-id 5242880 next edit "Act-on-Web" set internet-service-id 5242881 next edit "Act-on-ICMP" set internet-service-id 5242882 next edit "Act-on-DNS" set internet-service-id 5242883 next edit "Act-on-Outbound_Email" set internet-service-id 5242884 next edit "Act-on-SSH" set internet-service-id 5242886 next edit "Act-on-FTP" set internet-service-id 5242887 next edit "Act-on-NTP" set internet-service-id 5242888 next edit "Act-on-Inbound_Email" set internet-service-id 5242889 next edit "Act-on-LDAP" set internet-service-id 5242894 next edit "Act-on-NetBIOS.Session.Service" set internet-service-id 5242895 next edit "Act-on-RTMP" set internet-service-id 5242896 next edit "Act-on-NetBIOS.Name.Service" set internet-service-id 5242904 next edit "GoodData-Other" set internet-service-id 5308416 next edit "GoodData-Web" set internet-service-id 5308417 next edit "GoodData-ICMP" set internet-service-id 5308418 next edit "GoodData-DNS" set internet-service-id 5308419 next edit "GoodData-Outbound_Email" set internet-service-id 5308420 next edit "GoodData-SSH" set internet-service-id 5308422 next edit "GoodData-FTP" set internet-service-id 5308423 next edit "GoodData-NTP" set internet-service-id 5308424 next edit "GoodData-Inbound_Email" set internet-service-id 5308425 next edit "GoodData-LDAP" set internet-service-id 5308430 next edit "GoodData-NetBIOS.Session.Service" set internet-service-id 5308431 next edit "GoodData-RTMP" set internet-service-id 5308432 next edit "GoodData-NetBIOS.Name.Service" set internet-service-id 5308440 next edit "SurveyMonkey-Other" set internet-service-id 5373952 next edit "SurveyMonkey-Web" set internet-service-id 5373953 next edit "SurveyMonkey-ICMP" set internet-service-id 5373954 next edit "SurveyMonkey-DNS" set internet-service-id 5373955 next edit "SurveyMonkey-Outbound_Email" set internet-service-id 5373956 next edit "SurveyMonkey-SSH" set internet-service-id 5373958 next edit "SurveyMonkey-FTP" set internet-service-id 5373959 next edit "SurveyMonkey-NTP" set internet-service-id 5373960 next edit "SurveyMonkey-Inbound_Email" set internet-service-id 5373961 next edit "SurveyMonkey-LDAP" set internet-service-id 5373966 next edit "SurveyMonkey-NetBIOS.Session.Service" set internet-service-id 5373967 next edit "SurveyMonkey-RTMP" set internet-service-id 5373968 next edit "SurveyMonkey-NetBIOS.Name.Service" set internet-service-id 5373976 next edit "Cvent-Other" set internet-service-id 5439488 next edit "Cvent-Web" set internet-service-id 5439489 next edit "Cvent-ICMP" set internet-service-id 5439490 next edit "Cvent-DNS" set internet-service-id 5439491 next edit "Cvent-Outbound_Email" set internet-service-id 5439492 next edit "Cvent-SSH" set internet-service-id 5439494 next edit "Cvent-FTP" set internet-service-id 5439495 next edit "Cvent-NTP" set internet-service-id 5439496 next edit "Cvent-Inbound_Email" set internet-service-id 5439497 next edit "Cvent-LDAP" set internet-service-id 5439502 next edit "Cvent-NetBIOS.Session.Service" set internet-service-id 5439503 next edit "Cvent-RTMP" set internet-service-id 5439504 next edit "Cvent-NetBIOS.Name.Service" set internet-service-id 5439512 next edit "Blackbaud-Other" set internet-service-id 5505024 next edit "Blackbaud-Web" set internet-service-id 5505025 next edit "Blackbaud-ICMP" set internet-service-id 5505026 next edit "Blackbaud-DNS" set internet-service-id 5505027 next edit "Blackbaud-Outbound_Email" set internet-service-id 5505028 next edit "Blackbaud-SSH" set internet-service-id 5505030 next edit "Blackbaud-FTP" set internet-service-id 5505031 next edit "Blackbaud-NTP" set internet-service-id 5505032 next edit "Blackbaud-Inbound_Email" set internet-service-id 5505033 next edit "Blackbaud-LDAP" set internet-service-id 5505038 next edit "Blackbaud-NetBIOS.Session.Service" set internet-service-id 5505039 next edit "Blackbaud-RTMP" set internet-service-id 5505040 next edit "Blackbaud-NetBIOS.Name.Service" set internet-service-id 5505048 next edit "InsideSales-Other" set internet-service-id 5570560 next edit "InsideSales-Web" set internet-service-id 5570561 next edit "InsideSales-ICMP" set internet-service-id 5570562 next edit "InsideSales-DNS" set internet-service-id 5570563 next edit "InsideSales-Outbound_Email" set internet-service-id 5570564 next edit "InsideSales-SSH" set internet-service-id 5570566 next edit "InsideSales-FTP" set internet-service-id 5570567 next edit "InsideSales-NTP" set internet-service-id 5570568 next edit "InsideSales-Inbound_Email" set internet-service-id 5570569 next edit "InsideSales-LDAP" set internet-service-id 5570574 next edit "InsideSales-NetBIOS.Session.Service" set internet-service-id 5570575 next edit "InsideSales-RTMP" set internet-service-id 5570576 next edit "InsideSales-NetBIOS.Name.Service" set internet-service-id 5570584 next edit "ServiceMax-Other" set internet-service-id 5636096 next edit "ServiceMax-Web" set internet-service-id 5636097 next edit "ServiceMax-ICMP" set internet-service-id 5636098 next edit "ServiceMax-DNS" set internet-service-id 5636099 next edit "ServiceMax-Outbound_Email" set internet-service-id 5636100 next edit "ServiceMax-SSH" set internet-service-id 5636102 next edit "ServiceMax-FTP" set internet-service-id 5636103 next edit "ServiceMax-NTP" set internet-service-id 5636104 next edit "ServiceMax-Inbound_Email" set internet-service-id 5636105 next edit "ServiceMax-LDAP" set internet-service-id 5636110 next edit "ServiceMax-NetBIOS.Session.Service" set internet-service-id 5636111 next edit "ServiceMax-RTMP" set internet-service-id 5636112 next edit "ServiceMax-NetBIOS.Name.Service" set internet-service-id 5636120 next edit "Apptio-Other" set internet-service-id 5701632 next edit "Apptio-Web" set internet-service-id 5701633 next edit "Apptio-ICMP" set internet-service-id 5701634 next edit "Apptio-DNS" set internet-service-id 5701635 next edit "Apptio-Outbound_Email" set internet-service-id 5701636 next edit "Apptio-SSH" set internet-service-id 5701638 next edit "Apptio-FTP" set internet-service-id 5701639 next edit "Apptio-NTP" set internet-service-id 5701640 next edit "Apptio-Inbound_Email" set internet-service-id 5701641 next edit "Apptio-LDAP" set internet-service-id 5701646 next edit "Apptio-NetBIOS.Session.Service" set internet-service-id 5701647 next edit "Apptio-RTMP" set internet-service-id 5701648 next edit "Apptio-NetBIOS.Name.Service" set internet-service-id 5701656 next edit "Veracode-Other" set internet-service-id 5767168 next edit "Veracode-Web" set internet-service-id 5767169 next edit "Veracode-ICMP" set internet-service-id 5767170 next edit "Veracode-DNS" set internet-service-id 5767171 next edit "Veracode-Outbound_Email" set internet-service-id 5767172 next edit "Veracode-SSH" set internet-service-id 5767174 next edit "Veracode-FTP" set internet-service-id 5767175 next edit "Veracode-NTP" set internet-service-id 5767176 next edit "Veracode-Inbound_Email" set internet-service-id 5767177 next edit "Veracode-LDAP" set internet-service-id 5767182 next edit "Veracode-NetBIOS.Session.Service" set internet-service-id 5767183 next edit "Veracode-RTMP" set internet-service-id 5767184 next edit "Veracode-NetBIOS.Name.Service" set internet-service-id 5767192 next edit "Anaplan-Other" set internet-service-id 5832704 next edit "Anaplan-Web" set internet-service-id 5832705 next edit "Anaplan-ICMP" set internet-service-id 5832706 next edit "Anaplan-DNS" set internet-service-id 5832707 next edit "Anaplan-Outbound_Email" set internet-service-id 5832708 next edit "Anaplan-SSH" set internet-service-id 5832710 next edit "Anaplan-FTP" set internet-service-id 5832711 next edit "Anaplan-NTP" set internet-service-id 5832712 next edit "Anaplan-Inbound_Email" set internet-service-id 5832713 next edit "Anaplan-LDAP" set internet-service-id 5832718 next edit "Anaplan-NetBIOS.Session.Service" set internet-service-id 5832719 next edit "Anaplan-RTMP" set internet-service-id 5832720 next edit "Anaplan-NetBIOS.Name.Service" set internet-service-id 5832728 next edit "Rapid7-Other" set internet-service-id 5898240 next edit "Rapid7-Web" set internet-service-id 5898241 next edit "Rapid7-ICMP" set internet-service-id 5898242 next edit "Rapid7-DNS" set internet-service-id 5898243 next edit "Rapid7-Outbound_Email" set internet-service-id 5898244 next edit "Rapid7-SSH" set internet-service-id 5898246 next edit "Rapid7-FTP" set internet-service-id 5898247 next edit "Rapid7-NTP" set internet-service-id 5898248 next edit "Rapid7-Inbound_Email" set internet-service-id 5898249 next edit "Rapid7-LDAP" set internet-service-id 5898254 next edit "Rapid7-NetBIOS.Session.Service" set internet-service-id 5898255 next edit "Rapid7-RTMP" set internet-service-id 5898256 next edit "Rapid7-NetBIOS.Name.Service" set internet-service-id 5898264 next edit "AnyDesk-AnyDesk" set internet-service-id 5963927 next edit "ESET-Eset.Service" set internet-service-id 6029426 next edit "Slack-Other" set internet-service-id 6094848 next edit "Slack-Web" set internet-service-id 6094849 next edit "Slack-ICMP" set internet-service-id 6094850 next edit "Slack-DNS" set internet-service-id 6094851 next edit "Slack-Outbound_Email" set internet-service-id 6094852 next edit "Slack-SSH" set internet-service-id 6094854 next edit "Slack-FTP" set internet-service-id 6094855 next edit "Slack-NTP" set internet-service-id 6094856 next edit "Slack-Inbound_Email" set internet-service-id 6094857 next edit "Slack-LDAP" set internet-service-id 6094862 next edit "Slack-NetBIOS.Session.Service" set internet-service-id 6094863 next edit "Slack-RTMP" set internet-service-id 6094864 next edit "Slack-NetBIOS.Name.Service" set internet-service-id 6094872 next edit "Slack-Slack" set internet-service-id 6095024 next edit "ADP-Other" set internet-service-id 6160384 next edit "ADP-Web" set internet-service-id 6160385 next edit "ADP-ICMP" set internet-service-id 6160386 next edit "ADP-DNS" set internet-service-id 6160387 next edit "ADP-Outbound_Email" set internet-service-id 6160388 next edit "ADP-SSH" set internet-service-id 6160390 next edit "ADP-FTP" set internet-service-id 6160391 next edit "ADP-NTP" set internet-service-id 6160392 next edit "ADP-Inbound_Email" set internet-service-id 6160393 next edit "ADP-LDAP" set internet-service-id 6160398 next edit "ADP-NetBIOS.Session.Service" set internet-service-id 6160399 next edit "ADP-RTMP" set internet-service-id 6160400 next edit "ADP-NetBIOS.Name.Service" set internet-service-id 6160408 next edit "Blackboard-Other" set internet-service-id 6225920 next edit "Blackboard-Web" set internet-service-id 6225921 next edit "Blackboard-ICMP" set internet-service-id 6225922 next edit "Blackboard-DNS" set internet-service-id 6225923 next edit "Blackboard-Outbound_Email" set internet-service-id 6225924 next edit "Blackboard-SSH" set internet-service-id 6225926 next edit "Blackboard-FTP" set internet-service-id 6225927 next edit "Blackboard-NTP" set internet-service-id 6225928 next edit "Blackboard-Inbound_Email" set internet-service-id 6225929 next edit "Blackboard-LDAP" set internet-service-id 6225934 next edit "Blackboard-NetBIOS.Session.Service" set internet-service-id 6225935 next edit "Blackboard-RTMP" set internet-service-id 6225936 next edit "Blackboard-NetBIOS.Name.Service" set internet-service-id 6225944 next edit "SAP-Other" set internet-service-id 6291456 next edit "SAP-Web" set internet-service-id 6291457 next edit "SAP-ICMP" set internet-service-id 6291458 next edit "SAP-DNS" set internet-service-id 6291459 next edit "SAP-Outbound_Email" set internet-service-id 6291460 next edit "SAP-SSH" set internet-service-id 6291462 next edit "SAP-FTP" set internet-service-id 6291463 next edit "SAP-NTP" set internet-service-id 6291464 next edit "SAP-Inbound_Email" set internet-service-id 6291465 next edit "SAP-LDAP" set internet-service-id 6291470 next edit "SAP-NetBIOS.Session.Service" set internet-service-id 6291471 next edit "SAP-RTMP" set internet-service-id 6291472 next edit "SAP-NetBIOS.Name.Service" set internet-service-id 6291480 next edit "SAP-HANA" set internet-service-id 6291612 next edit "SAP-SuccessFactors" set internet-service-id 6291618 next edit "Snap-Snapchat" set internet-service-id 6357108 next edit "Zoom.us-Zoom.Meeting" set internet-service-id 6422646 next edit "Sophos-Other" set internet-service-id 6488064 next edit "Sophos-Web" set internet-service-id 6488065 next edit "Sophos-ICMP" set internet-service-id 6488066 next edit "Sophos-DNS" set internet-service-id 6488067 next edit "Sophos-Outbound_Email" set internet-service-id 6488068 next edit "Sophos-SSH" set internet-service-id 6488070 next edit "Sophos-FTP" set internet-service-id 6488071 next edit "Sophos-NTP" set internet-service-id 6488072 next edit "Sophos-Inbound_Email" set internet-service-id 6488073 next edit "Sophos-LDAP" set internet-service-id 6488078 next edit "Sophos-NetBIOS.Session.Service" set internet-service-id 6488079 next edit "Sophos-RTMP" set internet-service-id 6488080 next edit "Sophos-NetBIOS.Name.Service" set internet-service-id 6488088 next edit "Cloudflare-Other" set internet-service-id 6553600 next edit "Cloudflare-Web" set internet-service-id 6553601 next edit "Cloudflare-ICMP" set internet-service-id 6553602 next edit "Cloudflare-DNS" set internet-service-id 6553603 next edit "Cloudflare-Outbound_Email" set internet-service-id 6553604 next edit "Cloudflare-SSH" set internet-service-id 6553606 next edit "Cloudflare-FTP" set internet-service-id 6553607 next edit "Cloudflare-NTP" set internet-service-id 6553608 next edit "Cloudflare-Inbound_Email" set internet-service-id 6553609 next edit "Cloudflare-LDAP" set internet-service-id 6553614 next edit "Cloudflare-NetBIOS.Session.Service" set internet-service-id 6553615 next edit "Cloudflare-RTMP" set internet-service-id 6553616 next edit "Cloudflare-NetBIOS.Name.Service" set internet-service-id 6553624 next edit "Cloudflare-CDN" set internet-service-id 6553737 next edit "Pexip-Pexip.Meeting" set internet-service-id 6619256 next edit "Zscaler-Other" set internet-service-id 6684672 next edit "Zscaler-Web" set internet-service-id 6684673 next edit "Zscaler-ICMP" set internet-service-id 6684674 next edit "Zscaler-DNS" set internet-service-id 6684675 next edit "Zscaler-Outbound_Email" set internet-service-id 6684676 next edit "Zscaler-SSH" set internet-service-id 6684678 next edit "Zscaler-FTP" set internet-service-id 6684679 next edit "Zscaler-NTP" set internet-service-id 6684680 next edit "Zscaler-Inbound_Email" set internet-service-id 6684681 next edit "Zscaler-LDAP" set internet-service-id 6684686 next edit "Zscaler-NetBIOS.Session.Service" set internet-service-id 6684687 next edit "Zscaler-RTMP" set internet-service-id 6684688 next edit "Zscaler-NetBIOS.Name.Service" set internet-service-id 6684696 next edit "Zscaler-Zscaler.Cloud" set internet-service-id 6684793 next edit "Yandex-Other" set internet-service-id 6750208 next edit "Yandex-Web" set internet-service-id 6750209 next edit "Yandex-ICMP" set internet-service-id 6750210 next edit "Yandex-DNS" set internet-service-id 6750211 next edit "Yandex-Outbound_Email" set internet-service-id 6750212 next edit "Yandex-SSH" set internet-service-id 6750214 next edit "Yandex-FTP" set internet-service-id 6750215 next edit "Yandex-NTP" set internet-service-id 6750216 next edit "Yandex-Inbound_Email" set internet-service-id 6750217 next edit "Yandex-LDAP" set internet-service-id 6750222 next edit "Yandex-NetBIOS.Session.Service" set internet-service-id 6750223 next edit "Yandex-RTMP" set internet-service-id 6750224 next edit "Yandex-NetBIOS.Name.Service" set internet-service-id 6750232 next edit "mail.ru-Other" set internet-service-id 6815744 next edit "mail.ru-Web" set internet-service-id 6815745 next edit "mail.ru-ICMP" set internet-service-id 6815746 next edit "mail.ru-DNS" set internet-service-id 6815747 next edit "mail.ru-Outbound_Email" set internet-service-id 6815748 next edit "mail.ru-SSH" set internet-service-id 6815750 next edit "mail.ru-FTP" set internet-service-id 6815751 next edit "mail.ru-NTP" set internet-service-id 6815752 next edit "mail.ru-Inbound_Email" set internet-service-id 6815753 next edit "mail.ru-LDAP" set internet-service-id 6815758 next edit "mail.ru-NetBIOS.Session.Service" set internet-service-id 6815759 next edit "mail.ru-RTMP" set internet-service-id 6815760 next edit "mail.ru-NetBIOS.Name.Service" set internet-service-id 6815768 next edit "Alibaba-Other" set internet-service-id 6881280 next edit "Alibaba-Web" set internet-service-id 6881281 next edit "Alibaba-ICMP" set internet-service-id 6881282 next edit "Alibaba-DNS" set internet-service-id 6881283 next edit "Alibaba-Outbound_Email" set internet-service-id 6881284 next edit "Alibaba-SSH" set internet-service-id 6881286 next edit "Alibaba-FTP" set internet-service-id 6881287 next edit "Alibaba-NTP" set internet-service-id 6881288 next edit "Alibaba-Inbound_Email" set internet-service-id 6881289 next edit "Alibaba-LDAP" set internet-service-id 6881294 next edit "Alibaba-NetBIOS.Session.Service" set internet-service-id 6881295 next edit "Alibaba-RTMP" set internet-service-id 6881296 next edit "Alibaba-NetBIOS.Name.Service" set internet-service-id 6881304 next edit "Alibaba-Alibaba.Cloud" set internet-service-id 6881402 next edit "GoDaddy-Other" set internet-service-id 6946816 next edit "GoDaddy-Web" set internet-service-id 6946817 next edit "GoDaddy-ICMP" set internet-service-id 6946818 next edit "GoDaddy-DNS" set internet-service-id 6946819 next edit "GoDaddy-Outbound_Email" set internet-service-id 6946820 next edit "GoDaddy-SSH" set internet-service-id 6946822 next edit "GoDaddy-FTP" set internet-service-id 6946823 next edit "GoDaddy-NTP" set internet-service-id 6946824 next edit "GoDaddy-Inbound_Email" set internet-service-id 6946825 next edit "GoDaddy-LDAP" set internet-service-id 6946830 next edit "GoDaddy-NetBIOS.Session.Service" set internet-service-id 6946831 next edit "GoDaddy-RTMP" set internet-service-id 6946832 next edit "GoDaddy-NetBIOS.Name.Service" set internet-service-id 6946840 next edit "GoDaddy-GoDaddy.Email" set internet-service-id 6946939 next edit "Bluejeans-Other" set internet-service-id 7012352 next edit "Bluejeans-Web" set internet-service-id 7012353 next edit "Bluejeans-ICMP" set internet-service-id 7012354 next edit "Bluejeans-DNS" set internet-service-id 7012355 next edit "Bluejeans-Outbound_Email" set internet-service-id 7012356 next edit "Bluejeans-SSH" set internet-service-id 7012358 next edit "Bluejeans-FTP" set internet-service-id 7012359 next edit "Bluejeans-NTP" set internet-service-id 7012360 next edit "Bluejeans-Inbound_Email" set internet-service-id 7012361 next edit "Bluejeans-LDAP" set internet-service-id 7012366 next edit "Bluejeans-NetBIOS.Session.Service" set internet-service-id 7012367 next edit "Bluejeans-RTMP" set internet-service-id 7012368 next edit "Bluejeans-NetBIOS.Name.Service" set internet-service-id 7012376 next edit "Bluejeans-Bluejeans.Meeting" set internet-service-id 7012476 next edit "Webroot-Webroot.SecureAnywhere" set internet-service-id 7078013 next edit "Avast-Other" set internet-service-id 7143424 next edit "Avast-Web" set internet-service-id 7143425 next edit "Avast-ICMP" set internet-service-id 7143426 next edit "Avast-DNS" set internet-service-id 7143427 next edit "Avast-Outbound_Email" set internet-service-id 7143428 next edit "Avast-SSH" set internet-service-id 7143430 next edit "Avast-FTP" set internet-service-id 7143431 next edit "Avast-NTP" set internet-service-id 7143432 next edit "Avast-Inbound_Email" set internet-service-id 7143433 next edit "Avast-LDAP" set internet-service-id 7143438 next edit "Avast-NetBIOS.Session.Service" set internet-service-id 7143439 next edit "Avast-RTMP" set internet-service-id 7143440 next edit "Avast-NetBIOS.Name.Service" set internet-service-id 7143448 next edit "Avast-Avast.Security" set internet-service-id 7143550 next edit "Wetransfer-Other" set internet-service-id 7208960 next edit "Wetransfer-Web" set internet-service-id 7208961 next edit "Wetransfer-ICMP" set internet-service-id 7208962 next edit "Wetransfer-DNS" set internet-service-id 7208963 next edit "Wetransfer-Outbound_Email" set internet-service-id 7208964 next edit "Wetransfer-SSH" set internet-service-id 7208966 next edit "Wetransfer-FTP" set internet-service-id 7208967 next edit "Wetransfer-NTP" set internet-service-id 7208968 next edit "Wetransfer-Inbound_Email" set internet-service-id 7208969 next edit "Wetransfer-LDAP" set internet-service-id 7208974 next edit "Wetransfer-NetBIOS.Session.Service" set internet-service-id 7208975 next edit "Wetransfer-RTMP" set internet-service-id 7208976 next edit "Wetransfer-NetBIOS.Name.Service" set internet-service-id 7208984 next edit "Sendgrid-Sendgrid.Email" set internet-service-id 7274623 next edit "Ubiquiti-UniFi" set internet-service-id 7340160 next edit "Lifesize-Lifesize.Cloud" set internet-service-id 7405697 next edit "Okta-Other" set internet-service-id 7471104 next edit "Okta-Web" set internet-service-id 7471105 next edit "Okta-ICMP" set internet-service-id 7471106 next edit "Okta-DNS" set internet-service-id 7471107 next edit "Okta-Outbound_Email" set internet-service-id 7471108 next edit "Okta-SSH" set internet-service-id 7471110 next edit "Okta-FTP" set internet-service-id 7471111 next edit "Okta-NTP" set internet-service-id 7471112 next edit "Okta-Inbound_Email" set internet-service-id 7471113 next edit "Okta-LDAP" set internet-service-id 7471118 next edit "Okta-NetBIOS.Session.Service" set internet-service-id 7471119 next edit "Okta-RTMP" set internet-service-id 7471120 next edit "Okta-NetBIOS.Name.Service" set internet-service-id 7471128 next edit "Okta-Okta" set internet-service-id 7471307 next edit "Cybozu-Other" set internet-service-id 7536640 next edit "Cybozu-Web" set internet-service-id 7536641 next edit "Cybozu-ICMP" set internet-service-id 7536642 next edit "Cybozu-DNS" set internet-service-id 7536643 next edit "Cybozu-Outbound_Email" set internet-service-id 7536644 next edit "Cybozu-SSH" set internet-service-id 7536646 next edit "Cybozu-FTP" set internet-service-id 7536647 next edit "Cybozu-NTP" set internet-service-id 7536648 next edit "Cybozu-Inbound_Email" set internet-service-id 7536649 next edit "Cybozu-LDAP" set internet-service-id 7536654 next edit "Cybozu-NetBIOS.Session.Service" set internet-service-id 7536655 next edit "Cybozu-RTMP" set internet-service-id 7536656 next edit "Cybozu-NetBIOS.Name.Service" set internet-service-id 7536664 next edit "VNC-Other" set internet-service-id 7602176 next edit "VNC-Web" set internet-service-id 7602177 next edit "VNC-ICMP" set internet-service-id 7602178 next edit "VNC-DNS" set internet-service-id 7602179 next edit "VNC-Outbound_Email" set internet-service-id 7602180 next edit "VNC-SSH" set internet-service-id 7602182 next edit "VNC-FTP" set internet-service-id 7602183 next edit "VNC-NTP" set internet-service-id 7602184 next edit "VNC-Inbound_Email" set internet-service-id 7602185 next edit "VNC-LDAP" set internet-service-id 7602190 next edit "VNC-NetBIOS.Session.Service" set internet-service-id 7602191 next edit "VNC-RTMP" set internet-service-id 7602192 next edit "VNC-NetBIOS.Name.Service" set internet-service-id 7602200 next edit "Egnyte-Egnyte" set internet-service-id 7667846 next edit "CrowdStrike-CrowdStrike.Falcon.Cloud" set internet-service-id 7733383 next edit "Aruba.it-Other" set internet-service-id 7798784 next edit "Aruba.it-Web" set internet-service-id 7798785 next edit "Aruba.it-ICMP" set internet-service-id 7798786 next edit "Aruba.it-DNS" set internet-service-id 7798787 next edit "Aruba.it-Outbound_Email" set internet-service-id 7798788 next edit "Aruba.it-SSH" set internet-service-id 7798790 next edit "Aruba.it-FTP" set internet-service-id 7798791 next edit "Aruba.it-NTP" set internet-service-id 7798792 next edit "Aruba.it-Inbound_Email" set internet-service-id 7798793 next edit "Aruba.it-LDAP" set internet-service-id 7798798 next edit "Aruba.it-NetBIOS.Session.Service" set internet-service-id 7798799 next edit "Aruba.it-RTMP" set internet-service-id 7798800 next edit "Aruba.it-NetBIOS.Name.Service" set internet-service-id 7798808 next edit "ISLOnline-Other" set internet-service-id 7864320 next edit "ISLOnline-Web" set internet-service-id 7864321 next edit "ISLOnline-ICMP" set internet-service-id 7864322 next edit "ISLOnline-DNS" set internet-service-id 7864323 next edit "ISLOnline-Outbound_Email" set internet-service-id 7864324 next edit "ISLOnline-SSH" set internet-service-id 7864326 next edit "ISLOnline-FTP" set internet-service-id 7864327 next edit "ISLOnline-NTP" set internet-service-id 7864328 next edit "ISLOnline-Inbound_Email" set internet-service-id 7864329 next edit "ISLOnline-LDAP" set internet-service-id 7864334 next edit "ISLOnline-NetBIOS.Session.Service" set internet-service-id 7864335 next edit "ISLOnline-RTMP" set internet-service-id 7864336 next edit "ISLOnline-NetBIOS.Name.Service" set internet-service-id 7864344 next edit "Akamai-CDN" set internet-service-id 7929993 next edit "Akamai-Linode.Cloud" set internet-service-id 7930148 next edit "Rackspace-CDN" set internet-service-id 7995529 next edit "Instart-CDN" set internet-service-id 8061065 next edit "Bitdefender-Other" set internet-service-id 8126464 next edit "Bitdefender-Web" set internet-service-id 8126465 next edit "Bitdefender-ICMP" set internet-service-id 8126466 next edit "Bitdefender-DNS" set internet-service-id 8126467 next edit "Bitdefender-Outbound_Email" set internet-service-id 8126468 next edit "Bitdefender-SSH" set internet-service-id 8126470 next edit "Bitdefender-FTP" set internet-service-id 8126471 next edit "Bitdefender-NTP" set internet-service-id 8126472 next edit "Bitdefender-Inbound_Email" set internet-service-id 8126473 next edit "Bitdefender-LDAP" set internet-service-id 8126478 next edit "Bitdefender-NetBIOS.Session.Service" set internet-service-id 8126479 next edit "Bitdefender-RTMP" set internet-service-id 8126480 next edit "Bitdefender-NetBIOS.Name.Service" set internet-service-id 8126488 next edit "Pingdom-Other" set internet-service-id 8192000 next edit "Pingdom-Web" set internet-service-id 8192001 next edit "Pingdom-ICMP" set internet-service-id 8192002 next edit "Pingdom-DNS" set internet-service-id 8192003 next edit "Pingdom-Outbound_Email" set internet-service-id 8192004 next edit "Pingdom-SSH" set internet-service-id 8192006 next edit "Pingdom-FTP" set internet-service-id 8192007 next edit "Pingdom-NTP" set internet-service-id 8192008 next edit "Pingdom-Inbound_Email" set internet-service-id 8192009 next edit "Pingdom-LDAP" set internet-service-id 8192014 next edit "Pingdom-NetBIOS.Session.Service" set internet-service-id 8192015 next edit "Pingdom-RTMP" set internet-service-id 8192016 next edit "Pingdom-NetBIOS.Name.Service" set internet-service-id 8192024 next edit "UptimeRobot-Other" set internet-service-id 8257536 next edit "UptimeRobot-Web" set internet-service-id 8257537 next edit "UptimeRobot-ICMP" set internet-service-id 8257538 next edit "UptimeRobot-DNS" set internet-service-id 8257539 next edit "UptimeRobot-Outbound_Email" set internet-service-id 8257540 next edit "UptimeRobot-SSH" set internet-service-id 8257542 next edit "UptimeRobot-FTP" set internet-service-id 8257543 next edit "UptimeRobot-NTP" set internet-service-id 8257544 next edit "UptimeRobot-Inbound_Email" set internet-service-id 8257545 next edit "UptimeRobot-LDAP" set internet-service-id 8257550 next edit "UptimeRobot-NetBIOS.Session.Service" set internet-service-id 8257551 next edit "UptimeRobot-RTMP" set internet-service-id 8257552 next edit "UptimeRobot-NetBIOS.Name.Service" set internet-service-id 8257560 next edit "UptimeRobot-UptimeRobot.Monitor" set internet-service-id 8257709 next edit "Quovadisglobal-Other" set internet-service-id 8323072 next edit "Quovadisglobal-Web" set internet-service-id 8323073 next edit "Quovadisglobal-ICMP" set internet-service-id 8323074 next edit "Quovadisglobal-DNS" set internet-service-id 8323075 next edit "Quovadisglobal-Outbound_Email" set internet-service-id 8323076 next edit "Quovadisglobal-SSH" set internet-service-id 8323078 next edit "Quovadisglobal-FTP" set internet-service-id 8323079 next edit "Quovadisglobal-NTP" set internet-service-id 8323080 next edit "Quovadisglobal-Inbound_Email" set internet-service-id 8323081 next edit "Quovadisglobal-LDAP" set internet-service-id 8323086 next edit "Quovadisglobal-NetBIOS.Session.Service" set internet-service-id 8323087 next edit "Quovadisglobal-RTMP" set internet-service-id 8323088 next edit "Quovadisglobal-NetBIOS.Name.Service" set internet-service-id 8323096 next edit "Splashtop-Splashtop" set internet-service-id 8388751 next edit "Zoox-Other" set internet-service-id 8454144 next edit "Zoox-Web" set internet-service-id 8454145 next edit "Zoox-ICMP" set internet-service-id 8454146 next edit "Zoox-DNS" set internet-service-id 8454147 next edit "Zoox-Outbound_Email" set internet-service-id 8454148 next edit "Zoox-SSH" set internet-service-id 8454150 next edit "Zoox-FTP" set internet-service-id 8454151 next edit "Zoox-NTP" set internet-service-id 8454152 next edit "Zoox-Inbound_Email" set internet-service-id 8454153 next edit "Zoox-LDAP" set internet-service-id 8454158 next edit "Zoox-NetBIOS.Session.Service" set internet-service-id 8454159 next edit "Zoox-RTMP" set internet-service-id 8454160 next edit "Zoox-NetBIOS.Name.Service" set internet-service-id 8454168 next edit "Skyfii-Other" set internet-service-id 8519680 next edit "Skyfii-Web" set internet-service-id 8519681 next edit "Skyfii-ICMP" set internet-service-id 8519682 next edit "Skyfii-DNS" set internet-service-id 8519683 next edit "Skyfii-Outbound_Email" set internet-service-id 8519684 next edit "Skyfii-SSH" set internet-service-id 8519686 next edit "Skyfii-FTP" set internet-service-id 8519687 next edit "Skyfii-NTP" set internet-service-id 8519688 next edit "Skyfii-Inbound_Email" set internet-service-id 8519689 next edit "Skyfii-LDAP" set internet-service-id 8519694 next edit "Skyfii-NetBIOS.Session.Service" set internet-service-id 8519695 next edit "Skyfii-RTMP" set internet-service-id 8519696 next edit "Skyfii-NetBIOS.Name.Service" set internet-service-id 8519704 next edit "CoffeeBean-Other" set internet-service-id 8585216 next edit "CoffeeBean-Web" set internet-service-id 8585217 next edit "CoffeeBean-ICMP" set internet-service-id 8585218 next edit "CoffeeBean-DNS" set internet-service-id 8585219 next edit "CoffeeBean-Outbound_Email" set internet-service-id 8585220 next edit "CoffeeBean-SSH" set internet-service-id 8585222 next edit "CoffeeBean-FTP" set internet-service-id 8585223 next edit "CoffeeBean-NTP" set internet-service-id 8585224 next edit "CoffeeBean-Inbound_Email" set internet-service-id 8585225 next edit "CoffeeBean-LDAP" set internet-service-id 8585230 next edit "CoffeeBean-NetBIOS.Session.Service" set internet-service-id 8585231 next edit "CoffeeBean-RTMP" set internet-service-id 8585232 next edit "CoffeeBean-NetBIOS.Name.Service" set internet-service-id 8585240 next edit "Cloud4Wi-Other" set internet-service-id 8650752 next edit "Cloud4Wi-Web" set internet-service-id 8650753 next edit "Cloud4Wi-ICMP" set internet-service-id 8650754 next edit "Cloud4Wi-DNS" set internet-service-id 8650755 next edit "Cloud4Wi-Outbound_Email" set internet-service-id 8650756 next edit "Cloud4Wi-SSH" set internet-service-id 8650758 next edit "Cloud4Wi-FTP" set internet-service-id 8650759 next edit "Cloud4Wi-NTP" set internet-service-id 8650760 next edit "Cloud4Wi-Inbound_Email" set internet-service-id 8650761 next edit "Cloud4Wi-LDAP" set internet-service-id 8650766 next edit "Cloud4Wi-NetBIOS.Session.Service" set internet-service-id 8650767 next edit "Cloud4Wi-RTMP" set internet-service-id 8650768 next edit "Cloud4Wi-NetBIOS.Name.Service" set internet-service-id 8650776 next edit "Panda-Panda.Security" set internet-service-id 8716432 next edit "Ewon-Talk2M" set internet-service-id 8781970 next edit "Nutanix-Nutanix.Cloud" set internet-service-id 8847507 next edit "Backblaze-Other" set internet-service-id 8912896 next edit "Backblaze-Web" set internet-service-id 8912897 next edit "Backblaze-ICMP" set internet-service-id 8912898 next edit "Backblaze-DNS" set internet-service-id 8912899 next edit "Backblaze-Outbound_Email" set internet-service-id 8912900 next edit "Backblaze-SSH" set internet-service-id 8912902 next edit "Backblaze-FTP" set internet-service-id 8912903 next edit "Backblaze-NTP" set internet-service-id 8912904 next edit "Backblaze-Inbound_Email" set internet-service-id 8912905 next edit "Backblaze-LDAP" set internet-service-id 8912910 next edit "Backblaze-NetBIOS.Session.Service" set internet-service-id 8912911 next edit "Backblaze-RTMP" set internet-service-id 8912912 next edit "Backblaze-NetBIOS.Name.Service" set internet-service-id 8912920 next edit "Extreme-Extreme.Cloud" set internet-service-id 8978580 next edit "XING-Other" set internet-service-id 9043968 next edit "XING-Web" set internet-service-id 9043969 next edit "XING-ICMP" set internet-service-id 9043970 next edit "XING-DNS" set internet-service-id 9043971 next edit "XING-Outbound_Email" set internet-service-id 9043972 next edit "XING-SSH" set internet-service-id 9043974 next edit "XING-FTP" set internet-service-id 9043975 next edit "XING-NTP" set internet-service-id 9043976 next edit "XING-Inbound_Email" set internet-service-id 9043977 next edit "XING-LDAP" set internet-service-id 9043982 next edit "XING-NetBIOS.Session.Service" set internet-service-id 9043983 next edit "XING-RTMP" set internet-service-id 9043984 next edit "XING-NetBIOS.Name.Service" set internet-service-id 9043992 next edit "Genesys-PureCloud" set internet-service-id 9109653 next edit "BlackBerry-Cylance" set internet-service-id 9175190 next edit "DigiCert-OCSP" set internet-service-id 9240728 next edit "Infomaniak-SwissTransfer" set internet-service-id 9306265 next edit "Fuze-Fuze" set internet-service-id 9371802 next edit "Truecaller-Truecaller" set internet-service-id 9437339 next edit "GlobalSign-OCSP" set internet-service-id 9502872 next edit "VeriSign-OCSP" set internet-service-id 9568408 next edit "Sony-PlayStation.Network" set internet-service-id 9633952 next edit "Acronis-Cyber.Cloud" set internet-service-id 9699489 next edit "RingCentral-RingCentral" set internet-service-id 9765027 next edit "FSecure-FSecure" set internet-service-id 9830564 next edit "Kaseya-Kaseya.Cloud" set internet-service-id 9896101 next edit "Shodan-Scanner" set internet-service-id 9961638 next edit "Censys-Scanner" set internet-service-id 10027174 next edit "Valve-Steam" set internet-service-id 10092711 next edit "YouSeeU-Bongo" set internet-service-id 10158248 next edit "Cato-Cato.Cloud" set internet-service-id 10223785 next edit "SolarWinds-SpamExperts" set internet-service-id 10289323 next edit "SolarWinds-Pingdom.Probe" set internet-service-id 10289326 next edit "SolarWinds-SolarWinds.RMM" set internet-service-id 10289379 next edit "8X8-8X8.Cloud" set internet-service-id 10354860 next edit "Zattoo-Zattoo.TV" set internet-service-id 10420401 next edit "Datto-Datto.RMM" set internet-service-id 10485939 next edit "Barracuda-Barracuda.Cloud" set internet-service-id 10551477 next edit "Naver-Line" set internet-service-id 10617015 next edit "Disney-Disney+" set internet-service-id 10682552 next edit "DNS-DoH_DoT" set internet-service-id 10748089 next edit "DNS-Root.Name.Servers" set internet-service-id 10748156 next edit "Quad9-Quad9.Standard.DNS" set internet-service-id 10813626 next edit "Stretchoid-Scanner" set internet-service-id 10879142 next edit "Poly-RealConnect.Service" set internet-service-id 10944700 next edit "Telegram-Telegram" set internet-service-id 11010249 next edit "Spotify-Spotify" set internet-service-id 11075786 next edit "NextDNS-NextDNS" set internet-service-id 11141324 next edit "Fastly-CDN" set internet-service-id 11206793 next edit "Neustar-UltraDNS.Probes" set internet-service-id 11272397 next edit "Malicious-Malicious.Server" set internet-service-id 11337935 next edit "NIST-ITS" set internet-service-id 11403472 next edit "Jamf-Jamf.Cloud" set internet-service-id 11469009 next edit "Alcatel.Lucent-Rainbow" set internet-service-id 11534546 next edit "Forcepoint-Forcepoint.Cloud" set internet-service-id 11600083 next edit "Datadog-Datadog" set internet-service-id 11665620 next edit "Mimecast-Mimecast" set internet-service-id 11731157 next edit "MediaFire-Other" set internet-service-id 11796480 next edit "MediaFire-Web" set internet-service-id 11796481 next edit "MediaFire-ICMP" set internet-service-id 11796482 next edit "MediaFire-DNS" set internet-service-id 11796483 next edit "MediaFire-Outbound_Email" set internet-service-id 11796484 next edit "MediaFire-SSH" set internet-service-id 11796486 next edit "MediaFire-FTP" set internet-service-id 11796487 next edit "MediaFire-NTP" set internet-service-id 11796488 next edit "MediaFire-Inbound_Email" set internet-service-id 11796489 next edit "MediaFire-LDAP" set internet-service-id 11796494 next edit "MediaFire-NetBIOS.Session.Service" set internet-service-id 11796495 next edit "MediaFire-RTMP" set internet-service-id 11796496 next edit "MediaFire-NetBIOS.Name.Service" set internet-service-id 11796504 next edit "Pandora-Pandora" set internet-service-id 11862230 next edit "SiriusXM-SiriusXM" set internet-service-id 11927767 next edit "Hopin-Hopin" set internet-service-id 11993304 next edit "RedShield-RedShield.Cloud" set internet-service-id 12058842 next edit "InterneTTL-Scanner" set internet-service-id 12124326 next edit "VadeSecure-VadeSecure.Cloud" set internet-service-id 12189915 next edit "Netskope-Netskope.Cloud" set internet-service-id 12255452 next edit "ClickMeeting-ClickMeeting" set internet-service-id 12320989 next edit "Tenable-Tenable.io.Cloud.Scanner" set internet-service-id 12386528 next edit "Vidyo-VidyoCloud" set internet-service-id 12452065 next edit "OpenNIC-OpenNIC.DNS" set internet-service-id 12517602 next edit "Sectigo-Sectigo" set internet-service-id 12583141 next edit "DigitalOcean-DigitalOcean.Platform" set internet-service-id 12648679 next edit "Pitney.Bowes-Pitney.Bowes.Data.Center" set internet-service-id 12714216 next edit "VPN-Anonymous.VPN" set internet-service-id 12779753 next edit "Blockchain-Crypto.Mining.Pool" set internet-service-id 12845290 next edit "FactSet-FactSet" set internet-service-id 12910830 next edit "Bloomberg-Bloomberg" set internet-service-id 12976367 next edit "Five9-Five9" set internet-service-id 13041904 next edit "Gigas-Gigas.Cloud" set internet-service-id 13107441 next edit "Imperva-Imperva.Cloud.WAF" set internet-service-id 13172978 next edit "INAP-INAP" set internet-service-id 13238515 next edit "Azion-Azion.Platform" set internet-service-id 13304053 next edit "Hurricane.Electric-Hurricane.Electric.Internet.Services" set internet-service-id 13369590 next edit "NodePing-NodePing.Probe" set internet-service-id 13435127 next edit "Frontline-Frontline" set internet-service-id 13500665 next edit "Tally-Tally.ERP" set internet-service-id 13566202 next edit "Hosting-Bulletproof.Hosting" set internet-service-id 13631739 next edit "Okko-Okko.TV" set internet-service-id 13697277 next edit "Voximplant-Voximplant.Platform" set internet-service-id 13762829 next edit "OVHcloud-OVHcloud" set internet-service-id 13828367 next edit "SentinelOne-SentinelOne.Cloud" set internet-service-id 13893905 next edit "Kakao-Kakao.Services" set internet-service-id 13959442 next edit "Stripe-Stripe" set internet-service-id 14024979 next edit "NetScout-Scanner" set internet-service-id 14090406 next edit "Recyber-Scanner" set internet-service-id 14155942 next edit "Cyber.Casa-Scanner" set internet-service-id 14221478 next edit "GTHost-Dedicated.Instant.Servers" set internet-service-id 14287132 next edit "ivi-ivi.Streaming" set internet-service-id 14352669 next edit "BinaryEdge-Scanner" set internet-service-id 14418086 next edit "Fintech-MarketMap.Terminal" set internet-service-id 14483742 next edit "xMatters-xMatters.Platform" set internet-service-id 14549279 next edit "Blizzard-Battle.Net" set internet-service-id 14614816 next edit "Axon-Evidence" set internet-service-id 14680353 next edit "CDN77-CDN" set internet-service-id 14745737 next edit "GCore.Labs-CDN" set internet-service-id 14811273 next edit "Matrix42-FastViewer" set internet-service-id 14876962 next edit "Bunny.net-CDN" set internet-service-id 14942345 next edit "StackPath-CDN" set internet-service-id 15007881 next edit "Edgio-CDN" set internet-service-id 15073417 next edit "CacheFly-CDN" set internet-service-id 15138953 next edit "Microsoft-Azure.Connectors" set internet-service-id 327980 next edit "Microsoft-Teams.Published.Worldwide.Optimize" set internet-service-id 327991 next edit "Microsoft-Teams.Published.Worldwide.Allow" set internet-service-id 327992 next edit "Microsoft-Azure.Front.Door" set internet-service-id 327993 next edit "Fortinet-FortiClient.EMS" set internet-service-id 1245477 next edit "Fortinet-FortiWeb.Cloud" set internet-service-id 1245480 next edit "Fortinet-FortiSASE" set internet-service-id 1245481 next edit "Tencent-VooV.Meeting" set internet-service-id 2556219 next edit "NewRelic-Synthetic.Monitor" set internet-service-id 4849970 next edit "SAP-SAP.Ariba" set internet-service-id 6291766 next edit "Datto-Datto.BCDR" set internet-service-id 10486083 next edit "DNS-ARPA.Name.Servers" set internet-service-id 10748206 next edit "Paylocity-Paylocity" set internet-service-id 15204646 next edit "Qualys-Qualys.Cloud.Platform" set internet-service-id 15270183 next edit "Dailymotion-Other" set internet-service-id 15335424 next edit "Dailymotion-Web" set internet-service-id 15335425 next edit "Dailymotion-ICMP" set internet-service-id 15335426 next edit "Dailymotion-DNS" set internet-service-id 15335427 next edit "Dailymotion-Outbound_Email" set internet-service-id 15335428 next edit "Dailymotion-SSH" set internet-service-id 15335430 next edit "Dailymotion-FTP" set internet-service-id 15335431 next edit "Dailymotion-NTP" set internet-service-id 15335432 next edit "Dailymotion-Inbound_Email" set internet-service-id 15335433 next edit "Dailymotion-LDAP" set internet-service-id 15335438 next edit "Dailymotion-NetBIOS.Session.Service" set internet-service-id 15335439 next edit "Dailymotion-RTMP" set internet-service-id 15335440 next edit "Dailymotion-NetBIOS.Name.Service" set internet-service-id 15335448 next edit "LaunchDarkly-LaunchDarkly.Platform" set internet-service-id 15401258 next edit "Medianova-CDN" set internet-service-id 15466633 next edit "NetDocuments-NetDocuments.Platform" set internet-service-id 15532331 next edit "Vonage-Vonage.Contact.Center" set internet-service-id 15597869 next edit "Vonage-Vonage.Video.API" set internet-service-id 15597872 next edit "Veritas-Enterprise.Vault.Cloud" set internet-service-id 15663407 next edit "UK.NCSC-Scanner" set internet-service-id 15728806 next edit "Restream-Restream.Platform" set internet-service-id 15794481 next edit "ArcticWolf-ArcticWolf.Cloud" set internet-service-id 15860019 next edit "CounterPath-Bria" set internet-service-id 15925556 next edit "CriminalIP-Scanner" set internet-service-id 15990950 next edit "IPFS-IPFS.Gateway" set internet-service-id 16056629 next edit "Internet.Census.Group-Scanner" set internet-service-id 16122022 next edit "Performive-Performive.Cloud" set internet-service-id 16187706 next edit "OneLogin-OneLogin" set internet-service-id 16253244 next edit "Shadowserver-Scanner" set internet-service-id 16318630 next edit "Turkcell-Suit.Conference" set internet-service-id 16384317 next edit "LeakIX-Scanner" set internet-service-id 16449702 next edit "Infoblox-BloxOne" set internet-service-id 16515390 next edit "Nice-CXone" set internet-service-id 16580927 next edit "Hetzner-Hetzner.Hosting.Service" set internet-service-id 16646464 next edit "ThreatLocker-ThreatLocker" set internet-service-id 16712001 next edit "ZPE-ZPE.Cloud" set internet-service-id 16777538 next edit "ColoCrossing-ColoCrossing.Hosting.Service" set internet-service-id 16843076 next edit "Sinch-Mailgun" set internet-service-id 16908613 next edit "SpaceX-Starlink" set internet-service-id 16974150 next end config firewall internet-service-definition end config wanopt content-delivery-network-rule edit "vcache://" set comment "Static entries are not allowed to change except disable." set response-expires enable set text-response-vcache disable config rules edit "rule1" config match-entries edit 1 set pattern "/*.m3u8" next end config content-id set target hls-manifest set start-str "/" end next edit "rule2" config match-entries edit 1 set pattern "/*.mpd" next end config content-id set target dash-manifest set start-str "/" end next edit "rule3" config match-entries edit 1 set pattern "/*.ts" next end config content-id set target hls-fragment set start-str "/" end next edit "rule4" config match-entries edit 1 set pattern "/*.*" next end config content-id set target dash-fragment set start-str "/" end next end next edit "vcache://youtube/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "youtube.com" set category youtube set text-response-vcache disable config rules edit "rule1" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 set end-str "&" end next edit "rule2" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 end next edit "rule3" set match-mode any config match-entries edit 1 set pattern "/stream_204" next edit 2 set pattern "/ptracking" next edit 3 set pattern "/get_video_info" next end config content-id set target youtube-map set start-str "/" end next end next edit "vcache://googlevideo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "googlevideo.com" set category youtube set text-response-vcache disable config rules edit "rule1" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 set end-str "&" end next edit "rule2" config match-entries edit 1 set pattern "/videoplayback" next end config content-id set target youtube-id set start-str "v=" set start-skip 2 end next edit "rule3" set match-mode any config match-entries edit 1 set pattern "/stream_204" next edit 2 set pattern "/ptracking" next edit 3 set pattern "/get_video_info" next end config content-id set target youtube-map set start-str "/" end next end next edit "vcache://metacafe/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "mccont.com" "akvideos.metacafe.com" "cdn.metacafe.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://facebook/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "fbcdn.net" "facebook.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://dailymotion/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "dailymotion.com" "dmcdn.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/video/*.mp4" next edit 2 set pattern "/video/*.flv" next edit 3 set pattern "/video/*.ts" next edit 4 set pattern "/video/*.on2" next edit 5 set pattern "/video/*.aac" next edit 6 set pattern "/video/*.h264" next edit 7 set pattern "/video/*.h263" next edit 8 set pattern "/sec*.mp4" next edit 9 set pattern "/sec*.flv" next edit 10 set pattern "/sec*.on2" next edit 11 set pattern "/sec*.aac" next edit 12 set pattern "/sec*.h264" next edit 13 set pattern "/sec*.h263" next edit 14 set pattern "*.ts" next end config skip-entries edit 1 set target parameter set pattern "start=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://break/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "break.com" "0ebe.edgecastcdn.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/dnet/media/*.flv" next edit 2 set pattern "/dnet/media/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "ec_seek=*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.mp4*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://msn/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "video.msn.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://llnwd/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "llnwd.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.fll" next end config skip-entries edit 1 set target parameter set pattern "fs=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://yahoo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "yimg.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.m4s" next end config content-id set target parameter set start-str "vid=" end next end next edit "vcache://myspace/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "myspacecdn.com" set request-cache-control enable set response-cache-control enable set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://vimeo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "vimeo.com" "vimeocdn.com" "56skyfiregce-a.akamaihd.net" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.m4s" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://blip.tv/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "blip.tv" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.m4v" next edit 2 set pattern "/*.flv" next edit 3 set pattern "/*.mp4" next edit 4 set pattern "/*.wmv" next edit 5 set pattern "/*.rm" next edit 6 set pattern "/*.ram" next edit 7 set pattern "/*.mov" next edit 8 set pattern "/*.avi" next end config skip-entries edit 1 set target parameter set pattern "ms=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://maker.tv/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "videos-f.jwpsrv.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://aol/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "stream.aol.com" "5min.com" "vidiblevod-vh.akamaihd.net" "stg-ec-ore-u.uplynk.com" "vidible.tv" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "*timeoffset=*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://clipfish/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "clipfish.de" "universal-music.de" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.f4v" next edit 3 set pattern "/*.mp4" next edit 4 set pattern "/*.m4v" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://cnn/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "cnn-vh.akamaihd.net" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.flv*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.mp4*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule3" config match-entries edit 1 set pattern "/*.ts*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://foxnews/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "foxnews.com" "foxnews-f.akamaihd.net" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.mp4*" next edit 2 set target parameter set pattern "*Seg*" next edit 3 set target parameter set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://discovery/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "discovery.com" "discidevflash-f.akamaihd.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://liveleak/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "edge.liveleak.com" "cdn.liveleak.com" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/*.flv" next edit 2 set target parameter set pattern "*seek=0" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" config match-entries edit 1 set pattern "/*.mp4" next edit 2 set target parameter set pattern "*seek=0" next end config content-id set start-str "/" set start-skip 1 end next edit "rule3" config match-entries edit 1 set pattern "/*.wmv" next edit 2 set target parameter set pattern "*seek=0" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://sevenload/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "sevenload.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "aktimeoffset=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://stupidvideos/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "stupidvideos.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://howcast/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "media.howcast.com" set response-expires enable config rules edit "rule1" set match-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "start=*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://vevo/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "vevo.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://ooyala/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "ooyala.com" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "*Seg*" next edit 2 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://ms-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "msads.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://yumenetworks-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "yumenetworks.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://2mdn-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "2mdn.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://eyewonder-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "eyewonder.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://eyereturn-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "eyereturn.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://serving-sys-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "serving-sys.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://amazonaws-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "amazonaws.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://edgesuite-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "edgesuite.net" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://gorillanation-ads/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "video.gorillanation.com" set response-expires enable config rules edit "rule1" set match-mode any set skip-rule-mode any config match-entries edit 1 set pattern "/*.flv" next edit 2 set pattern "/*.mp4" next edit 3 set pattern "/*.ts" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://youku/" set comment "Static entries are not allowed to change except disable." set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/youku/*.mp4" next edit 2 set target parameter set pattern "*start=0" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule2" config match-entries edit 1 set pattern "/youku/*.flv" next edit 2 set target parameter set pattern "*start=0" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule3" config match-entries edit 1 set pattern "/youku/*.kux" next edit 2 set target parameter set pattern "*start=0" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule4" config match-entries edit 1 set pattern "/youku/*.mp4" next end config skip-entries edit 1 set target parameter set pattern "*start=*" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule5" config match-entries edit 1 set pattern "/youku/*.flv" next end config skip-entries edit 1 set target parameter set pattern "*start=*" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next edit "rule6" config match-entries edit 1 set pattern "/youku/*.kux" next end config skip-entries edit 1 set target parameter set pattern "*start=*" next end config content-id set target youku-id set start-str "/" set start-skip 1 set start-direction backward end next end next edit "vcache://tudou/" set comment "Static entries are not allowed to change except disable." set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/f4v/*" next edit 2 set target parameter set pattern "*id=tudou*" next end config skip-entries edit 1 set target parameter set pattern "*begin=*" next end config content-id set start-str "/" set start-skip 1 set start-direction backward end next end next edit "vcache://cbc/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "cbc.ca" "mobilehls-vh.akamaihd.net" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "*.mp4*" next edit 2 set pattern "*Seg*" next edit 3 set pattern "*Frag*" next end config content-id set start-str "/" set start-skip 1 end next edit "rule2" set match-mode any config match-entries edit 1 set pattern "*.ts" next edit 2 set pattern "*.mp4" next end config content-id set start-str "/" set start-skip 1 end next end next edit "vcache://megaupload/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "megaupload.com" set response-expires enable config rules edit "rule1" config match-entries edit 1 set pattern "/files/*" next end config content-id set target referrer set start-str "d=" set start-skip 2 end next end next edit "update://windowsupdate/" set comment "Static entries are not allowed to change except disable." set host-domain-name-suffix "download.windowsupdate.com" set request-cache-control enable set response-cache-control enable set response-expires enable set updateserver enable next end config system standalone-cluster config cluster-peer end end config system fortiguard set update-server-location usa end config endpoint-control fctems edit 1 next edit 2 next edit 3 next edit 4 next edit 5 next edit 6 next edit 7 next end config system email-server set server "notification.fortinet.net" set port 465 set security smtps end config system session-helper edit 1 set name pptp set protocol 6 set port 1723 next edit 2 set name h323 set protocol 6 set port 1720 next edit 3 set name ras set protocol 17 set port 1719 next edit 4 set name tns set protocol 6 set port 1521 next edit 5 set name tftp set protocol 17 set port 69 next edit 6 set name rtsp set protocol 6 set port 554 next edit 7 set name rtsp set protocol 6 set port 7070 next edit 8 set name rtsp set protocol 6 set port 8554 next edit 9 set name ftp set protocol 6 set port 21 next edit 10 set name mms set protocol 6 set port 1863 next edit 11 set name pmap set protocol 6 set port 111 next edit 12 set name pmap set protocol 17 set port 111 next edit 13 set name sip set protocol 17 set port 5060 next edit 14 set name dns-udp set protocol 17 set port 53 next edit 15 set name rsh set protocol 6 set port 514 next edit 16 set name rsh set protocol 6 set port 512 next edit 17 set name dcerpc set protocol 6 set port 135 next edit 18 set name dcerpc set protocol 17 set port 135 next edit 19 set name mgcp set protocol 17 set port 2427 next edit 20 set name mgcp set protocol 17 set port 2727 next end config system auto-install set auto-install-config enable set auto-install-image enable end config system ntp set ntpsync enable set server-mode enable set interface "fortilink" end config system ftm-push set server-cert "Fortinet_Factory" end config system automation-trigger edit "Compromised Host" set description "An incident of compromise has been detected on a host endpoint." next edit "Any Security Rating Notification" set description "A security rating summary report has been generated." set event-type security-rating-summary set report-type any next edit "AV & IPS DB update" set description "The antivirus and IPS database has been updated." set event-type virus-ips-db-updated next edit "Configuration Change" set description "An administrator\'s session that changed a FortiGate\'s configuration has ended." set event-type config-change next edit "Conserve Mode" set description "A FortiGate has entered conserve mode due to low memory." set event-type low-memory next edit "HA Failover" set description "A HA failover has occurred." set event-type ha-failover next edit "High CPU" set description "A FortiGate has high CPU usage." set event-type high-cpu next edit "License Expiry" set description "A FortiGate license is near expiration." set event-type license-near-expiry set license-type any next edit "Reboot" set description "A FortiGate is rebooted." set event-type reboot next edit "Anomaly Logs" set description "An anomalous event has occurred." set event-type anomaly-logs next edit "IPS Logs" set description "An IPS event has occurred." set event-type ips-logs next edit "SSH Logs" set description "An SSH event has occurred." set event-type ssh-logs next edit "Traffic Violation" set description "A traffic policy has been violated." set event-type traffic-violation next edit "Virus Logs" set description "A virus event has occurred." set event-type virus-logs next edit "Webfilter Violation" set description "A webfilter policy has been violated." set event-type webfilter-violation next edit "Admin Login" set description "A FortiOS event with specified log ID has occurred." set event-type event-log set logid 32001 next edit "Incoming Webhook Call" set description "An incoming webhook call is received" set event-type incoming-webhook next edit "Weekly Trigger" set trigger-type scheduled set trigger-frequency weekly set trigger-weekday tuesday set trigger-hour 10 next edit "FortiAnalyzer Connection Down" set description "A FortiAnalyzer connection is down." set event-type event-log set logid 22902 next edit "Network Down" set description "A network connection is down." set event-type event-log set logid 20099 config fields edit 1 set name "status" set value "DOWN" next end next edit "Local Certificate Expiry" set description "A local certificate is near expiration." set event-type local-cert-near-expiry next edit "Auto Firmware upgrade" set description "Automatic firmware upgrade." set event-type event-log set logid 22094 22095 next end config system automation-action edit "Access Layer Quarantine" set description "Quarantine the MAC address on access layer devices (FortiSwitch and FortiAP)." set action-type quarantine next edit "FortiClient Quarantine" set description "Use FortiClient EMS to quarantine the endpoint device." set action-type quarantine-forticlient next edit "FortiNAC Quarantine" set description "Use FortiNAC to quarantine the endpoint device." set action-type quarantine-fortinac next edit "IP Ban" set description "Ban the IP address specified in the automation trigger event." set action-type ban-ip next edit "FortiExplorer Notification" set description "Automation action configuration for sending a notification to any FortiExplorer mobile application." set action-type fortiexplorer-notification next edit "Email Notification" set description "Send a custom email to the specified recipient(s)." set action-type email set forticare-email enable set email-subject "%%log.logdesc%%" next edit "CLI Script - System Status" set description "Execute a CLI script to return the system status." set action-type cli-script set script "get system status" set accprofile "super_admin_readonly" next edit "Reboot FortiGate" set description "Reboot this FortiGate unit." set action-type system-actions set system-action reboot set minimum-interval 300 next edit "Shutdown FortiGate" set description "Shut down this FortiGate unit." set action-type system-actions set system-action shutdown next edit "Backup Config Disk" set description "Backup the configuration on disk." set action-type system-actions set system-action backup-config next end config system automation-stitch edit "Network Down" set description "Send an email when a network goes down." set status disable set trigger "Network Down" config actions edit 1 set action "Email Notification" next end next edit "HA Failover" set description "Send an email when a HA failover is detected." set status disable set trigger "HA Failover" config actions edit 1 set action "Email Notification" next end next edit "Reboot" set description "Send an email when a FortiGate is rebooted." set status disable set trigger "Reboot" config actions edit 1 set action "Email Notification" next end next edit "FortiAnalyzer Connection Down" set description "Send a email notification when the connection to FortiAnalyzer is lost." set trigger "FortiAnalyzer Connection Down" config actions edit 1 set action "Email Notification" next end next edit "License Expired Notification" set description "Send a email notification when a license is near expiration." set trigger "License Expiry" config actions edit 1 set action "Email Notification" next end next edit "Compromised Host Quarantine" set description "Quarantine a compromised host on FortiAPs, FortiSwitches, and FortiClient EMS." set status disable set trigger "Compromised Host" config actions edit 1 set action "Access Layer Quarantine" next edit 2 set action "FortiClient Quarantine" next end next edit "Incoming Webhook Quarantine" set description "Quarantine a provided MAC address on FortiAPs, FortiSwitches, and FortiClient EMS using an Incoming Webhook." set status disable set trigger "Incoming Webhook Call" config actions edit 1 set action "Access Layer Quarantine" next edit 2 set action "FortiClient Quarantine" next end next edit "Security Rating Notification" set description "Send a email notification when a new Security Rating report is available." set trigger "Any Security Rating Notification" config actions edit 1 set action "Email Notification" next end next edit "Firmware upgrade notification" set description "Automatic firmware upgrade notification." set trigger "Auto Firmware upgrade" config actions edit 1 set action "Email Notification" next end next end config system federated-upgrade set status disabled end config dpdk global set multiqueue disable set sleep-on-idle disable set elasticbuffer disable set per-session-accounting traffic-log-only set ipsec-offload disable set hugepage-percentage 30 set mbufpool-percentage 25 end config dpdk cpus set rx-cpus "all" set vnp-cpus "all" set ips-cpus "all" set tx-cpus "all" end config system ike end config system ipam config pools edit "default-pool" set subnet 172.31.0.0 255.255.0.0 next edit "lan-pool" set subnet 192.168.0.0 255.255.0.0 next end config rules edit "role-lan" set device "*" set interface "*" set role lan set pool "lan-pool" set dhcp enable next end end config system object-tagging edit "default" next end config switch-controller traffic-policy edit "quarantine" set description "Rate control for quarantined traffic" set guaranteed-bandwidth 163840 set guaranteed-burst 8192 set maximum-burst 163840 set cos-queue 0 set id 1 next edit "sniffer" set description "Rate control for sniffer mirrored traffic" set guaranteed-bandwidth 50000 set guaranteed-burst 8192 set maximum-burst 163840 set cos-queue 0 set id 2 next end config system settings set gui-multiple-interface-policy enable end config system dhcp server edit 1 set ntp-service local set default-gateway 10.255.1.1 set netmask 255.255.255.0 set interface "fortilink" config ip-range edit 1 set start-ip 10.255.1.2 set end-ip 10.255.1.254 next end set vci-match enable set vci-string "FortiSwitch" "FortiExtender" next edit 2 set dns-service default set default-gateway 10.2.0.1 set netmask 255.255.255.0 set interface "port1" config ip-range edit 1 set start-ip 10.2.0.10 set end-ip 10.2.0.254 next end next end config firewall address edit "all" set uuid d59a59ec-7737-51ee-c335-5124eaecd5ea next edit "FIREWALL_AUTH_PORTAL_ADDRESS" set uuid d59a625c-7737-51ee-5490-0460a9a5c189 next edit "FABRIC_DEVICE" set uuid d59a643c-7737-51ee-4bd3-410cd58d09b7 set comment "IPv4 addresses of Fabric Devices." next edit "SSLVPN_TUNNEL_ADDR1" set uuid d59d47a6-7737-51ee-485f-34abe1e9581f set type iprange set start-ip 10.212.134.200 set end-ip 10.212.134.210 next edit "EMS_ALL_UNMANAGEABLE_CLIENTS" set uuid 1bdb8d86-7738-51ee-af9a-a10e7c60b943 set type dynamic set sub-type ems-tag set dirty clean next edit "EMS_ALL_UNKNOWN_CLIENTS" set uuid 1bdd2e20-7738-51ee-ded3-d2f994a9c874 set type dynamic set sub-type ems-tag set dirty clean next edit "FCTEMS_ALL_FORTICLOUD_SERVERS" set uuid 31b7d042-7738-51ee-3533-025ed5ea1010 set type dynamic set sub-type ems-tag set dirty clean next edit "B2" set uuid c26a858a-7814-51ee-378a-07d8ee40a074 set subnet 10.4.0.0 255.255.0.0 next edit "H1" set uuid cf7f3306-7814-51ee-f45f-956874bbb4f2 set subnet 10.1.0.0 255.255.0.0 next edit "LAN_10.2.0.0" set uuid 92b56650-7f1e-51ee-619c-3200f25906e8 set subnet 10.2.0.0 255.255.0.0 next edit "To-Hub1_local_subnet_1" set uuid 02900336-821c-51ee-ab35-73cc406ea4ce set allow-routing enable set subnet 10.2.0.0 255.255.255.0 next edit "To-Hub1_remote_subnet_1" set uuid 02c47896-821c-51ee-6c8a-c09864b6762d set allow-routing enable set subnet 10.1.0.0 255.255.255.0 next end config firewall multicast-address edit "all" set start-ip 224.0.0.0 set end-ip 239.255.255.255 next end config firewall address6 edit "SSLVPN_TUNNEL_IPv6_ADDR1" set uuid d59d4ac6-7737-51ee-f4f4-cb0a06bf0f4b set ip6 fdff:ffff::/120 next edit "all" set uuid b4ff4fd0-7737-51ee-756f-99c40bf645dc next end config firewall multicast-address6 edit "all" set ip6 ff00::/8 next end config firewall addrgrp edit "To-Hub1_local" set uuid 02bf23dc-821c-51ee-2ee8-c7d641de9d80 set member "To-Hub1_local_subnet_1" set comment "VPN: To-Hub1 (Created by VPN wizard)" set allow-routing enable next edit "To-Hub1_remote" set uuid 02c92d14-821c-51ee-8afe-c3d238a4e4c8 set member "To-Hub1_remote_subnet_1" set comment "VPN: To-Hub1 (Created by VPN wizard)" set allow-routing enable next end config firewall wildcard-fqdn custom edit "adobe" set uuid b64ea99e-7737-51ee-cd68-59bcea5f2a3d set wildcard-fqdn "*.adobe.com" next edit "Adobe Login" set uuid b64eac1e-7737-51ee-737b-d0a2192eeeb5 set wildcard-fqdn "*.adobelogin.com" next edit "android" set uuid b64eadf4-7737-51ee-ce36-da0b6fa451df set wildcard-fqdn "*.android.com" next edit "apple" set uuid b64eafc0-7737-51ee-132c-ce4c45c10079 set wildcard-fqdn "*.apple.com" next edit "appstore" set uuid b64eb2cc-7737-51ee-574b-f6bd565eecc4 set wildcard-fqdn "*.appstore.com" next edit "auth.gfx.ms" set uuid b64eb524-7737-51ee-fa33-43d0ea551211 set wildcard-fqdn "*.auth.gfx.ms" next edit "citrix" set uuid b64eb768-7737-51ee-993e-5256e4588feb set wildcard-fqdn "*.citrixonline.com" next edit "dropbox.com" set uuid b64eb9f2-7737-51ee-1e5a-6769dc936c71 set wildcard-fqdn "*.dropbox.com" next edit "eease" set uuid b64ebbf0-7737-51ee-c53b-7c3f47c400c7 set wildcard-fqdn "*.eease.com" next edit "firefox update server" set uuid b64eec56-7737-51ee-dea9-180b663331e1 set wildcard-fqdn "aus*.mozilla.org" next edit "fortinet" set uuid b64eee90-7737-51ee-0421-0a27b8e81217 set wildcard-fqdn "*.fortinet.com" next edit "googleapis.com" set uuid b64ef0d4-7737-51ee-349c-b43498bf923d set wildcard-fqdn "*.googleapis.com" next edit "google-drive" set uuid b64ef2be-7737-51ee-e6a3-c3ae7d65a561 set wildcard-fqdn "*drive.google.com" next edit "google-play2" set uuid b64ef4a8-7737-51ee-e299-67451ebaf247 set wildcard-fqdn "*.ggpht.com" next edit "google-play3" set uuid b64ef692-7737-51ee-8794-5dae306cb356 set wildcard-fqdn "*.books.google.com" next edit "Gotomeeting" set uuid b64ef8c2-7737-51ee-6180-64febcb14606 set wildcard-fqdn "*.gotomeeting.com" next edit "icloud" set uuid b64efc00-7737-51ee-45cd-a44bab5beeb4 set wildcard-fqdn "*.icloud.com" next edit "itunes" set uuid b64eff0c-7737-51ee-ceb2-8e123fa26631 set wildcard-fqdn "*itunes.apple.com" next edit "microsoft" set uuid b64f0268-7737-51ee-4e14-b7d0a8150fbc set wildcard-fqdn "*.microsoft.com" next edit "skype" set uuid b64f04de-7737-51ee-6b5f-d944198266b9 set wildcard-fqdn "*.messenger.live.com" next edit "softwareupdate.vmware.com" set uuid b64f0736-7737-51ee-57ee-12e00aa33efd set wildcard-fqdn "*.softwareupdate.vmware.com" next edit "verisign" set uuid b64f095c-7737-51ee-afa1-9c2ea912e5ab set wildcard-fqdn "*.verisign.com" next edit "Windows update 2" set uuid b64f0bd2-7737-51ee-5e10-941b877d268f set wildcard-fqdn "*.windowsupdate.com" next edit "live.com" set uuid b64f0e02-7737-51ee-5539-df184ef125c1 set wildcard-fqdn "*.live.com" next edit "google-play" set uuid b64f103c-7737-51ee-407d-e4bb17a95833 set wildcard-fqdn "*play.google.com" next edit "update.microsoft.com" set uuid b66f7926-7737-51ee-86f1-c2d9640d5042 set wildcard-fqdn "*update.microsoft.com" next edit "swscan.apple.com" set uuid b66f8006-7737-51ee-ca8c-b58f9a6d19b8 set wildcard-fqdn "*swscan.apple.com" next edit "autoupdate.opera.com" set uuid b66f82a4-7737-51ee-aa1f-004a009550bb set wildcard-fqdn "*autoupdate.opera.com" next edit "cdn-apple" set uuid b66f8628-7737-51ee-3f7e-09099c86bee3 set wildcard-fqdn "*.cdn-apple.com" next edit "mzstatic-apple" set uuid b66f89b6-7737-51ee-e9a4-422ed8008e28 set wildcard-fqdn "*.mzstatic.com" next end config firewall service category edit "General" set comment "General services." next edit "Web Access" set comment "Web access." next edit "File Access" set comment "File access." next edit "Email" set comment "Email services." next edit "Network Services" set comment "Network services." next edit "Authentication" set comment "Authentication service." next edit "Remote Access" set comment "Remote access." next edit "Tunneling" set comment "Tunneling service." next edit "VoIP, Messaging & Other Applications" set comment "VoIP, messaging, and other applications." next edit "Web Proxy" set comment "Explicit web proxy." next end config firewall service custom edit "DNS" set category "Network Services" set tcp-portrange 53 set udp-portrange 53 next edit "HTTP" set category "Web Access" set tcp-portrange 80 next edit "HTTPS" set category "Web Access" set tcp-portrange 443 next edit "IMAP" set category "Email" set tcp-portrange 143 next edit "IMAPS" set category "Email" set tcp-portrange 993 next edit "LDAP" set category "Authentication" set tcp-portrange 389 next edit "DCE-RPC" set category "Remote Access" set tcp-portrange 135 set udp-portrange 135 next edit "POP3" set category "Email" set tcp-portrange 110 next edit "POP3S" set category "Email" set tcp-portrange 995 next edit "SAMBA" set category "File Access" set tcp-portrange 139 next edit "SMTP" set category "Email" set tcp-portrange 25 next edit "SMTPS" set category "Email" set tcp-portrange 465 next edit "KERBEROS" set category "Authentication" set tcp-portrange 88 464 set udp-portrange 88 464 next edit "LDAP_UDP" set category "Authentication" set udp-portrange 389 next edit "SMB" set category "File Access" set tcp-portrange 445 next edit "FTP" set category "File Access" set tcp-portrange 21 next edit "FTP_GET" set category "File Access" set tcp-portrange 21 next edit "FTP_PUT" set category "File Access" set tcp-portrange 21 next edit "ALL" set category "General" set protocol IP next edit "ALL_TCP" set category "General" set tcp-portrange 1-65535 next edit "ALL_UDP" set category "General" set udp-portrange 1-65535 next edit "ALL_ICMP" set category "General" set protocol ICMP unset icmptype next edit "ALL_ICMP6" set category "General" set protocol ICMP6 unset icmptype next edit "GRE" set category "Tunneling" set protocol IP set protocol-number 47 next edit "AH" set category "Tunneling" set protocol IP set protocol-number 51 next edit "ESP" set category "Tunneling" set protocol IP set protocol-number 50 next edit "AOL" set tcp-portrange 5190-5194 next edit "BGP" set category "Network Services" set tcp-portrange 179 next edit "DHCP" set category "Network Services" set udp-portrange 67-68 next edit "FINGER" set tcp-portrange 79 next edit "GOPHER" set tcp-portrange 70 next edit "H323" set category "VoIP, Messaging & Other Applications" set tcp-portrange 1720 1503 set udp-portrange 1719 next edit "IKE" set category "Tunneling" set udp-portrange 500 4500 next edit "Internet-Locator-Service" set tcp-portrange 389 next edit "IRC" set category "VoIP, Messaging & Other Applications" set tcp-portrange 6660-6669 next edit "L2TP" set category "Tunneling" set tcp-portrange 1701 set udp-portrange 1701 next edit "NetMeeting" set tcp-portrange 1720 next edit "NFS" set category "File Access" set tcp-portrange 111 2049 set udp-portrange 111 2049 next edit "NNTP" set tcp-portrange 119 next edit "NTP" set category "Network Services" set tcp-portrange 123 set udp-portrange 123 next edit "OSPF" set category "Network Services" set protocol IP set protocol-number 89 next edit "PC-Anywhere" set category "Remote Access" set tcp-portrange 5631 set udp-portrange 5632 next edit "PING" set category "Network Services" set protocol ICMP set icmptype 8 unset icmpcode next edit "TIMESTAMP" set protocol ICMP set icmptype 13 unset icmpcode next edit "INFO_REQUEST" set protocol ICMP set icmptype 15 unset icmpcode next edit "INFO_ADDRESS" set protocol ICMP set icmptype 17 unset icmpcode next edit "ONC-RPC" set category "Remote Access" set tcp-portrange 111 set udp-portrange 111 next edit "PPTP" set category "Tunneling" set tcp-portrange 1723 next edit "QUAKE" set udp-portrange 26000 27000 27910 27960 next edit "RAUDIO" set udp-portrange 7070 next edit "REXEC" set tcp-portrange 512 next edit "RIP" set category "Network Services" set udp-portrange 520 next edit "RLOGIN" set tcp-portrange 513:512-1023 next edit "RSH" set tcp-portrange 514:512-1023 next edit "SCCP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 2000 next edit "SIP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 5060 set udp-portrange 5060 next edit "SIP-MSNmessenger" set category "VoIP, Messaging & Other Applications" set tcp-portrange 1863 next edit "SNMP" set category "Network Services" set tcp-portrange 161-162 set udp-portrange 161-162 next edit "SSH" set category "Remote Access" set tcp-portrange 22 next edit "SYSLOG" set category "Network Services" set udp-portrange 514 next edit "TALK" set udp-portrange 517-518 next edit "TELNET" set category "Remote Access" set tcp-portrange 23 next edit "TFTP" set category "File Access" set udp-portrange 69 next edit "MGCP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 2428 set udp-portrange 2427 2727 next edit "UUCP" set tcp-portrange 540 next edit "VDOLIVE" set tcp-portrange 7000-7010 next edit "WAIS" set tcp-portrange 210 next edit "WINFRAME" set tcp-portrange 1494 2598 next edit "X-WINDOWS" set category "Remote Access" set tcp-portrange 6000-6063 next edit "PING6" set protocol ICMP6 set icmptype 128 unset icmpcode next edit "MS-SQL" set category "VoIP, Messaging & Other Applications" set tcp-portrange 1433 1434 next edit "MYSQL" set category "VoIP, Messaging & Other Applications" set tcp-portrange 3306 next edit "RDP" set category "Remote Access" set tcp-portrange 3389 next edit "VNC" set category "Remote Access" set tcp-portrange 5900 next edit "DHCP6" set category "Network Services" set udp-portrange 546 547 next edit "SQUID" set category "Tunneling" set tcp-portrange 3128 next edit "SOCKS" set category "Tunneling" set tcp-portrange 1080 set udp-portrange 1080 next edit "WINS" set category "Remote Access" set tcp-portrange 1512 set udp-portrange 1512 next edit "RADIUS" set category "Authentication" set udp-portrange 1812 1813 next edit "RADIUS-OLD" set udp-portrange 1645 1646 next edit "CVSPSERVER" set tcp-portrange 2401 set udp-portrange 2401 next edit "AFS3" set category "File Access" set tcp-portrange 7000-7009 set udp-portrange 7000-7009 next edit "TRACEROUTE" set category "Network Services" set udp-portrange 33434-33535 next edit "RTSP" set category "VoIP, Messaging & Other Applications" set tcp-portrange 554 7070 8554 set udp-portrange 554 next edit "MMS" set tcp-portrange 1755 set udp-portrange 1024-5000 next edit "NONE" set tcp-portrange 0 next edit "webproxy" set proxy enable set category "Web Proxy" set protocol ALL set tcp-portrange 0-65535:0-65535 next end config firewall service group edit "Email Access" set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" next edit "Web Access" set member "DNS" "HTTP" "HTTPS" next edit "Windows AD" set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB" next edit "Exchange Server" set member "DCE-RPC" "DNS" "HTTPS" next end config vpn certificate ca edit "root_CA2" set ca "-----BEGIN CERTIFICATE----- MIIDADCCAeigAwIBAgIgOTJDNDhERjI3N0JGRkM0MEMzRTI5RDJCRDFCM0Q1RjEw DQYJKoZIhvcNAQEFBQAwKzEWMBQGA1UEChMNRm9ydGluZXQgTHRkLjERMA8GA1UE AxMIRm9ydGluZXQwHhcNMjMxMDI0MDc1NDI2WhcNMzMxMDI4MDc1NDI2WjArMRYw FAYDVQQKEw1Gb3J0aW5ldCBMdGQuMREwDwYDVQQDEwhGb3J0aW5ldDCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBAORd+qowMXN+UlN8//Y/bkvLzX4mkBsQ GK/e80ajUVve1YM/1ugkbt+EPp/IynzQEhJV0AiJZZ24VY2tZyKxORgRRf1gKSGb hI4bxfR0gatEbwedBGVoFOm/QEf0+bsKF5vuvriTxgsc73ULxrgjZ3loneAVTyvB GbbFY6F9AdSl6+SV8rWcdq3bSH28JAzXi7+gztkJ1tjP7AGsmN2OqwTcHx0wHBJp tOBwi9nFy2ztft9m1fb0XM2QMyuIDfzkuOTQzDYLO2IuvLonq/AoXCrYkVaMxcfx N2IUAP3PChwtuHg4dl2rcbbgt5AcOGMPhif9mcnuXd2Fro3SFpanK7cCAwEAAaMQ MA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAoLa8O+dYDBoWYuRk Kosg+1ss4GfP9igVS2XlPpDGMMrRxAk6ss94OL2y1rE6XftyDxkabbard4SRqgvk Z6j8ytOUpSiZUOG6jhT3/qDbmqJtou1Hir7uJyEt9Rq9/FwECR06OeI93VOu3C3g QF0HNzN0rStP7JLGwAe34S5iajuA419uwNblwWm+qpFh7hXI+H5UGyLdTntwX9Mu 5C9SVPeILaU7jbIDDHvDRfTcNLCreCi5uUo8M2x4HE/OozaCqKWaqy3i7Vw0NxXE iTqBFCTy2H401pqZq1Ht/46C0+Mlz0M1HsjQqNU7tBmlntqd/MrR/XR7H9ahYukh uuE4oQ== -----END CERTIFICATE-----" set range global next end config vpn certificate local edit "Fortinet_CA_SSL" set password ENC Rs+luzknsu/rFvh90Og6QtoBjHfVr3pMlfnCsQ2x78xBqDikE/5qvM42SNysMpsjTpL7Zn4LLDHh36ihWoPFknB8j2z1y0yGErvc2xoI5BsZ/DYW2SXqVFMD5Rc/BDLSbYSSidVkkbD/fSzRy27NBsYS56w8NJk04X26FIpPc3MSrtevyQ4KmEnGuoOPtMg4ZwQ1Rg== set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIeYfdmTw3cYUCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECAfeJtNZBJJMBIIEyPq9zBsYrelv GRsEq031Fmoq2fZGPOHihfuuWdwcS27H2+W49cfYRHfse7f2AoraelVvqblQt0oH xm0d/JFKn9Dw40WYfHat4Y3TrM4ksRXcMJ40BQYGmqM6YpUMosrSxjb+ODMgzS7e AL0JPxG621IzcB8aungYcgfvwepx4X8/Grz0D30wbhipnNF36eQgkq79galFj2mJ j6a8CWZUipKAQYkojcEAK/8ilSd+TcekbXU/0QghkuAtndwGP64SJZKUvoQfICJB cJ/np8vkIXRx4FMU6tuPTmJhSkbYUsmpLDJdW2c+Z8vp95St/HdNkuOue6ixPYRW IVRJ5bh0PZiLCvXliS6mLSkUzYDWLAIRzcbJNA8daxR3wxZJQb1iZlVfSM0RVs+j sliG+D0Pps7TFkGGqK+BKhImLbBrIktdl49hheNUztcbHPb+sFl16jjWm/AoYDQN c3czChEmgAUc+IvJeTT/MwGDC6DcrIHtR9Yxy5F9jM9hinlxhS+JkBpVNhEBQ+tm IeaNfxb8nqK62T2t23PCpD1w65HAVXRRsFWD9iFHjhPtDrRSP3QZq+o6I8J6sUn5 LlZZj2Q6zUK0ixOErdNfY9ocbwaRgIz8tWgKGDsCef1N3Aq22br4DrxqLJlopMk9 LMyHXQxAdglPZ7NlnNq58WLp16kmln3GL4apWFD6ZUo0TOYYMrNyEDkYZbUk0jfp HjpoqBnErHKGsTC9dxNY22h43Sdc11X1+5MBBDQdZOMDpOy3stnRPsF3JWuCK8c+ V9IVZmrmP3Q21GKtGbKzwTe/Qk9xNlZ6JAYIVMLtvT2FcQWw4I9wZQFBAoOGKmIT TFCoPlYoGERnoxhxyph5nlUzfsfe1CTe0TzA2/MsCR0IGxq3gYNk4DaDa897sF2Y bKgQQYXYHsMMksKGXjf7Q1WiOiJk6Az3IwgIxH5PA+832H8Utm/xzCyX+2a6fQNC 0sJ7k0ssICeNHdmdEPRmvQ9YEXMi9EeWTTc9Cq1ABOaVfh5Tf0gMS4FZl/EoK6Ws uk7YTGhOfwfxQD0Cn28H7ZFFK6PPncNfIDGzwb3M1RYhmQADVMXfBx+hB82igLJZ SdDhcXkEdRs6sx5GD9SU4NIWhOWJ/xR0o7wS1rhllCWG+A2jlaWmEe5brXlC5tep KPZpFI58Kafycay1ex1VFiLY0u1ocxQ39ylFZxmC419Tf+p/nTZX1SYvmh6bXKtW qwSWKXu/9L6z3tg9xCe8Q9Yn3KEeSAmIjgfYXlg2xYsEVMpOmAMzz+1j6awKP+Kg t5Yuv2QX1P8LNfFNFqbo7iDk8b8sJ4UQHW033r6RDCnmA6pIe4MYllcTddclreeV DJC/EFAEbng5TJ4rWt+sunpdl5zgOG5GZPOmB/VBUm/JJMHPSXi3Dh2BmWMDXiUz X7DbO9850N4Y18yy2ha1xyt560sN39+HvvmDG5H3vBnwhZgD5//L9It4lPJV0gWE ZoSl6T560I/jfcB8lH8MubyDK9P8H+h90FaQ70LXIEQzmfB4zo5gJTKsTr6cIjit Qz4hKkMNh63VWvf1hmmdPF4I/Ky33jTWy7B7dqi6sA7aRqkPbLfYZNsZDDzLUHD5 9dKipHD1ksjV0vPUIM19+w== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID8zCCAtugAwIBAgIINqrc1Jt8Y6gwDQYJKoZIhvcNAQELBQAwgakxCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp dHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1 cHBvcnRAZm9ydGluZXQuY29tMB4XDTIzMTAzMTA5NTc0NFoXDTMzMTAzMTA5NTc0 NFowgakxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQH DAlTdW5ueXZhbGUxETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZp Y2F0ZSBBdXRob3JpdHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkq hkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tMIIBIjANBgkqhkiG9w0BAQEF AAOCAQ8AMIIBCgKCAQEAiVcxAc4MNpvjDw+f/aN4St9eZZpr7pJLtCU0Qw06kmwZ b/wfWZt/TpV11R1CFZK1NYQ8P9Pxh/kXKOel+xh9GFunSKjkmKNqtqoADdkXusJK +04DLnx8+gvUUWmsfQqoYAbojxPPyn11TjbgqP4np5sBbxs5jZUwmdyQGb/uBwrk XobrOnOXtf2qBexwXrjhe5Ohu9TjGgggnz0JuHVSU2bMm9DWMeeaoKQ4U06YoN8s UhUPgFGGnJb4kmMGpiwPuXOzXurmWsy16R9CTsaxV99IaStnnsPUs3cs3ZbjaWts H9HFe+pGn0cTsNp+00pI4b3Hf6L4GkUGVe+StKC7sQIDAQABox0wGzAMBgNVHRME BTADAQH/MAsGA1UdDwQEAwICBDANBgkqhkiG9w0BAQsFAAOCAQEAEk8UJirWO52W 0QsPskXVdtPHoZjHKnZKfNmf2a7cR7rrqjBi+8iV4R39tMVx3eDCRn6gJogooHgE ESG6SDVBBR7FmwW2ayDgstzSo6jcWv0LVSio2rxKUkMzh9OYgIxR11ECsXY379jK 9p5nkGlHJ/wmZxRkSvONlO81XmrXsACZ+uovPsTZbi7vFJFNdrOoOv5IJxRwcbdn ugt6wxzOCzAsWeWH+WBht6JLdtFNQs+ZkF+7NcFohxHDqtCnFR+bMgeEAexdyM5g G95V3rGwGgUfoyJNZrNQ13JnnEfH7LdHHqD6kCGKrfndeWOlCjzYXd7Fced2FddE kvCuL8LF1w== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679152 next edit "Fortinet_CA_Untrusted" set password ENC PL+UbROqfDjcA1WYa2EsaeCJESMzlOovZMkwM+17boaR1MguvxHTY8U8tXgMTzNmXXbBdHkHji9+PtWDIingUgMsQMPGI4vF00LorUa2/IzadgvmpmhjJiRdw6koHDNjHZ+JGUvrcAWIwDWGChQe6XQl3jPHi+tdr+lngicJO+IkxV0uS8EljOgo9q6D8DsH+9a1/w== set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIyFiTd3Lxl7ACAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECBTtmNBZSnl2BIIEyEmxq210TO+F hCqS8yScK+LPSalxmapgl1WOcL4YjEqvB1966ht8L11jrCRfgeK4/CmLFZQQgZZ5 +QKNdw7TVO56p55KviXw9P6fBfOGlLpnlSnjwfdSMf0zPRxiOfBiEJJzorKkUJuQ EvtLtLBrF3yZJ35599eC2W9eJPMIv2pIBuX7a7w4SGfMJLJUFoI8arPMqc6JzmGi xHgLEQHHGVuCdOAKyBdaOagEDy2EskAY8LGX3vIoVkTloUJ5qQiJfeQkK8KPMn4U XCTuklZceVh9iLKehZt28J80YrC4j7O1lxuCFB9jBc6NHk8uXRq3s8dBQhtxgPSh LZq3rndYwCrb+Wbvup/jqTlMIMUfMFW2d2GENFg6R5N9ZmfMIJFfM8PzYg8S3lVx ngLLANuhfhaLt0PNGJ2aNbF0n+qevJXQoF2CZDar59VWvD7Ng+F+zRScWD8Z1foj NWB1EgyNkhASdC0HxhyzbKr//xbzDqYdS6Ja7io/5e4TK2PAo3F28jaX4MBs4aIm aIFBib6Ulrn2KNTFAVFBX7MWx69HklODv+JigXmvaX4udEr7JO9/zXU9CxsXnYg2 KSBG0Gg8v9G0esqMJ1DtzQ1PIdLeK3m8btpZDb8HLxJGOkFVKseqJD/AdnekyjWl M7DM8Z0HfCbOj9UI4KYrqfpgQWpNaP/LD5rUsZqGXhia6SzXDIr/hVMp4Ti4K0z6 glRa9RuydDbLpuhgfmGMSptyVTXJBrDp+ktT8lrvPb/9jzlDvswUJ5NKOs1RhDXR tWqd94lmLb3mTVUHPdlZP3khsmCZ3cR8O83DH4xJTpfqT9S4S5fEr+Q5OmWTuFEr I6NBZx9t70vp+S0bKArIIeYiRsi0MAD0LO9qtoiqyT/aADOeJoOq2wWKJxzCoOrp BB6BiBagr+RiUOAMs5DKAa9UsThpcrLg08MtoyxC+OeuEz1uhY/br+a9czJV5ixJ mCHtHIV9BBnpousbjP4w4Y7XoGCOC4L8oHXfpVXkk4xcYXr8I5e0KzwiyJsAdJhK v8eeRrp+ufE00/QsCYK5Kj5HSAV7bOWRBap1Z8QlR3JR0NB5ReUNJjxunCy3bU3y Yb3TVlYEIVj1v0fAIjB6DT8zxKANprAEIpZ4YLmUBziImLAkrLOtFGfsAcK4xIJQ ERNu/AL1mcyNz7bBS3e+fzlzt1kHOdDzGrHdeTChzZcNbI8d4ByeS9UzA9WDi5fF aI2pZKIfPUI1mIGIjJ6jtOoQEVw9Fj4Gv/9ncWJtHVFH0P/WzPsPY7fP2lyRT2S9 Tn4XEjaju4aGxHvlL3joPlzJlFdIFqiPFn4jNgkWsq1b//pdTdkLkniaNLQL7kYM 5nEpIR9koJQZO1MmcQHhzw8NJOdZTQWH0adQnKWAPE/5s/RNygeX5jsr7d/umCky yp/hwK4I1elB74cZ1u9Ygf+qz2iWzCz5OYfY1iwardAAPiD8x1G+Z+bDWwoB0ifD qhWr9am0pNjGsUMjf017xm1t162vRLnK2YmmLTIoM1QrEQXcnShH7Ra2Bd+cg8J9 q1i0YAHgtQaH2vO4rDER/yn7LUVJ0LbK5EnppEStUZueUijo/yXnTrzmzqLnK+YO yw+GYu+WYOUbO3teIdTq4A== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID/TCCAuWgAwIBAgIIWPc12gNcH90wDQYJKoZIhvcNAQELBQAwga4xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp dHkxHjAcBgNVBAMMFUZvcnRpbmV0IFVudHJ1c3RlZCBDQTEjMCEGCSqGSIb3DQEJ ARYUc3VwcG9ydEBmb3J0aW5ldC5jb20wHhcNMjMxMDMxMDk1NzQ3WhcNMzMxMDMx MDk1NzQ3WjCBrjELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQ BgNVBAcMCVN1bm55dmFsZTERMA8GA1UECgwIRm9ydGluZXQxHjAcBgNVBAsMFUNl cnRpZmljYXRlIEF1dGhvcml0eTEeMBwGA1UEAwwVRm9ydGluZXQgVW50cnVzdGVk IENBMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTCCASIwDQYJ KoZIhvcNAQEBBQADggEPADCCAQoCggEBALwtknOtdFRoXlvmlJ2yzJ3HwTAVtczQ FjqicIq0spU4lOKeKthysEJEdrb0vNwzQEC1+lQtELmCWfQGnmAljUbmW8Moy7R+ wsOHa2ldugWsJIx2asb/c4z7eEkExxT8ig8P0Cog4ZRkd8Ejfr7yal9HG7eA6QY6 WYX9IAaDg2OdglSN1VKQzfnT0bJUluQ4X/wULjb6O/DvQG3I1L1iQ3MYbuaAtalX 9D8Az1DzQjn8WB21w9rC8eu4pcJk6D77GB0SmjxCdOA78hlHpBpvTyvUhobj1V0o 3ti/vcn12H3LdcWcubr5l75JTsdk7IAu9rop7nC+6zG1q3wJxIQ7oX0CAwEAAaMd MBswDAYDVR0TBAUwAwEB/zALBgNVHQ8EBAMCAgQwDQYJKoZIhvcNAQELBQADggEB ABE9b1WHpacEgSMpCKEEqFdwD5E8EkkoI5L1eqM7bP0cN1tVUVd7o2VOVbvjHzdO VMe4M1AhkAXYqzzUBCqPaHjt/ou9+IMDuQf2V0zAq/wBm+v+3hXC9TQlLGj0kgsW MlijGd5LmEsB49mRhlw9wEDn87XlS0FD+1Y3oOd6bq6e5U0R0pJKs0/G4jST3uZ9 f7IOcC9zQRxjXi932Wn82+wyQJDW/T/O+fx2giQxMgKujv8Z5wWB2VIS43BRRhIa +UMdfihXf0zit8pR6bslSPk/VTEIliNYC42L0Aol7SNsoWSX43yIqTh1pe5SdwFy mlTliLa5u85m5jZ1yuHBSAA= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679152 next edit "Fortinet_SSL" set password ENC 6et97t6L6mgacSCB+A2dzTN3X0Uo0mwD9MeRVkXMxMsWBGG5q2J0uL8u8JEVqL0QZsNLeSZXBIj+k46mA2wu5rJfsI+uzUoYbXzZ+RDKZHwZJ6VmFV3lve4GDYdw3l3q+0U6te5zoRcFo1+UO73Ai946/Q1qeY24ZudHFiothNvg/3FDCl9oI5UoMddtTRgOSLgS6A== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQI4GG9x/836VECAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECJFtx2h0WrSHBIIEyNNfLC/vT9Ba isqMnC6Ixsu+qeuPvRDLHkC/06JHstox7rvLgzKlOiBuhrewoC8QEgj3w+6yKJ9m 300R3vSKBNtvLjxgbvlHVEOH91fBjSkt6CLjjmyCLSgNpdwWUfAMiWfj349E3fbu OV3LEqI/zCL/7Ov90ezyMNuHlgx1Y5gf8OWUZW72FmbP7t6WKV4ysAQ9D2ldfhIr qEFuNVOmdmJ8Uw+Rhcbr8DLayzBBLXZqoO4VO7YS5AMw9x81OkHhUxWKnbf8tmJN H7OHjFGfPU+KqmHkuu5SVjO+pMLbm2GYmH9q7lpyYOQCEqrbVrEkPOMP4xHEhYtQ BhiICFi1NZO8jL0dud0qGTOfNUtyCdEr+KcM2ukCX/n+oIYfaF9hd2xQLq024wVh ulPIna38YItu0v09wRaYv+r5aU2DH+ZcXFtJCcEfNN0zhi7+uFW/sIJrkNPDZ0AU Y8XN095j3dyPbqX55Ifsu+AH+7X6aegdAkIwFh127cnpFbF2NWnglAqt3peuQdJQ fcMvinsVNZQgodKdlDvvh/jVdVFFC1vJiQgK12Mx2eaPDZ3/bXrtNSpPC7We0+Sg E08xprWo/mFmgkMkjk7zxKtokDfphThkbgj/D5i1aA4UJENBmhr7ZFT1Db6+HjcW 0aYPS+hdwntrI2Xp7MoGQEgIhTcGxFqQNejewYlndSYqIwUPYUdLlt90Z6hKLiWo SjYuWTymRkGzbdoqwMQQ2VPnHlXhteWxIBHOw+YzcW5LinvysH2eA0hUnD2k6BpX cWdn6VqLR1vh2XWNN5EQ8ptclGUKsIPz1WqjxfRIguWXbjned51lFMiT4dMVxEcD j4lat74EpwvF3t84k3m5KUjfgGDlqv7HcpjFLoj5RIijvldECMLOhFu5IWd3Mz5u mxUPoh2veUJ+L357SHSFE+X8LTnqFPjp/lAPXr/EziXUYTxxl6ynB9JBraIxLbtc csuSDej6uhz6HpITh//FA4WSk0kkrz6gQ3oucPrCW579bPT0ex0tGFYe+U8IrmuU /JVmF0NTSHQaio0a/JUSpWemai1IoLcvFnB82XKV7fpofmjBFu2+TlKv1ouAbu6Y 0J8JnaXF/ChwytUX3zzIWX6XqeOet8beTLRGb01gr/WPQnGd6Zv97uqXOOJgAgPK /fk8pvV8hzYuvryIl//Z6BmSWj7aOgXGaOj3pLrDQ2aCoCc0B0tGrJq360rKZAWp i3kqtsCRu86xcp1qC45BYnG451H7r8UgUTK4lE0P5X4quIneXehH9zU9ttfPTQLb XJAa5JNzBCOdetsL3AP8FnajTNmHIRBtNRYzDWwOkKDAeFW3NIhH7kPVKJvYCSe6 kV8kHbUVoxe2hKhH6YmzgQz+JbhvIlUZ6VLFC5B320cXx8cvohlGJndUAjzpLqHJ 93PUrBmk1YrUqZWI8UkOnjSgdlm/YUMSHzQAFglk/RT0/NZvaz65GLRZGklO4mwf Sw0ZuDZGUcNZnI/wZf3RNVoL/ojlpJzBW2HQkM+c3tZku/Fq/tpWIGYAW3swRFaI eXh69JD/iS8TjqmyAz9yCzFIsNd0A5pkXWxJo6rdZnFkSmTbIfSbu3KWOhxNtSfA 1lasZ2ip3AZgMnp2ynuJfg== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID4DCCAsigAwIBAgIIDCflBeIU3i4wDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTc1MloXDTI2MDIwMjA5NTc1MlowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr9/HISpCL2p0 JDqmGSqtMVP0tKWQxHXqMoLCVT6GwwaR2j8tnaD0jJX9p4IR5moXkHAhHsvkJv83 VDjbwcBMHNCANlRMCqTgS8DTTfPGfEELK9mHKowy6lxJp1sEmW+DLO8n8NDlSpF6 WISNmLGlhel50UIw1hFoAAonUkbPkhEp7eW6HjR3QgHWbG1rVKDn9qtF2tcQ5zHa Q5szQbM7Hz74UvqWb29DRmgB/1GXmfAwWW2312daXMCKwq+Ubwi2i8jeTmNrQ8vM +EFQnoU5Rpwm670F+5TyTRMhue5Vmmkx1iitBjMqc0QgRzBmu+JpYHKWXj/vi6ke 0stlxXMwbwIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMB MA0GCSqGSIb3DQEBCwUAA4IBAQBx8aj0l8OP6L6T/Y4DBiBtvGTP5LLmhUT53jPu alzp2iLD2qAqTyDo/7Kue3Zgnsirl+wvYgjsF6l2EZ0/SK1TlO3/SzbSTbl7mPre u659KFy/BQLafTbBbXSDl0bkQOh8qGrAA1r4P9Lz1vLlMTUiHHSaAfl7IZnDAaCM faTitkM/dN71OKFFNU6xZcDfjI1AIIOSxSIffJQyAY5OEUsw5DH8s9De1S3sNP2R GevpX41rJrMieso+NIAYB3AUT6D/GoQQxlkXHx1xqzwdaXCIUEHm/UFWXAidCiwH 9j5QALnf9V6dOLRZOCL7SmfpybaM9GzQe7f7L6elPkrUTFMd -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679153 next edit "Fortinet_GUI_Server" set password ENC 50mbvpZDpRw9XsRJtjtObB9mM9txGVF0BYxpN/L+pJ1pCLXiytUBy6ikMm6TwfDIjo/T/WJP8CaqVamFmWg4C6mQbIqLfGk3YLERbUb7QIonUJzvXXGWchBUmmlLjMxvPtD2RmM+2nuHEqBtQQO7oRfq33SX9VNI7d/OY62pHrHZb0xVNDNWaCsN0JzhtvVIYzLlew== set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIJnDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIKZCGJndYprcCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECE3WskSEx4ApBIIJSIMXqwbwHfx1 MfpyB1tgoqik+SU5mfnbSNTBjsm+pCOX8+iD2661mWGLwiOCglx8uaLPafNlumJg 1Nm2Qn1PjJcrAdgfaAwg0GREWrP0MqeOYJiuOU8k8Zhd+QNl0TN6KklkLZiWttM8 yPCiWeGc6Xlq8eCCAkMjMF9knkSc3guAUfjTs24MILsZSbXgFMkniMebMtjedN00 dDurGlv9kxvuulf3ZE2h1ORhx+dgw4PsWAPMsklt6ZD/Cy5yz11S2NUXs0eAXQAA p5hqomMR6Ac84ObjAZICFxBIr/+5SGmqhpH6ly9Qm/+U5pz+pV9oykLzsn4PMXfU Mh8O5K8ng4gol3Y7MYTLTlfxk1IwXngZNKaoH+D51L4pnoszB2pP/JTyknQIcEiB GEsr//vkiCPrHkCOfldmddvjyGNeW18onk1UCI75HJifNC94cv52f6vx51ERl0p2 3uHmrLBH/CzGzcWKS+e7u8EIA0Yzsrkc1AIlrsSfHsas8RLATPU8YC5+HilFsdcF tzYEQrFT1ZkVefiG3bDalRk8YVAJAUTKYe14Qw9LUN/4N7VP2d/wIuKo8bJiegFI vRwauZWWdeoWF0QNX4Z/KbNcO9yMFMnA5mD+BJETFFoU3ykSxsuJ6qOvC8FaM8tp l5AwJab2WnYnU7gBIDYN4fCrWNlOCqbetHqiHqFTSXx9dSdkbl+RZ8+t+DkQxwjV toXSSVySWeSKhCWcZd65fO2P4hhHxeJXJXnh48vCy3uGWTPhamW0NBoqohiX3q8K 41evZd2WhqsCea44wm7vXs/wZ/7D2kFTz8RQj38MxUnmSECOBRTXNkBdywXaEAj/ /7Nz2He8j4yeWbxNzmrJfo/8dz2LbyWvYxGWcpOojNh5OBLIzQ0WUfSZlGduYZ3i hBEvH0rPjdrQl90vAsK0FMgNvXzOMEt0EzP5TolHaIa66QzZcdp5PWHU6t1/r6gn kFPjFceLclXBzQhzjaflY5l5MLiniFB74Ud0KJjOF5DtgJOhhjhP4BML0bQiXtzu cTbtRoOIZJ1wmcJHeQBlT2ZIFvzXKTUvdLJfkcyyRs8el+sqhkZimz4E2MwNnTFt M6mW3NzRiC5DVNVCc2sgb0vf4AgTscDc4fr+bVBuhJBv25SV0chLokKjS6nMN1w5 K4bSkfuP5C4YhHQB8CfTsq22H1kLtcyKHaWqIwU+/MB0XiEFbfV9+S+DpeLdr2D7 U9n7gkuEnV1T8YbhSb1ZyNwTcIu39+eAMz5PAA3ktol/Qe3aSFbM1oHpVpdxhqkI Gz+XAfrlw41bGEm9KzaD+tdpqTryfDbqEoAUq9ksj659WOusjvJIXh+OrqAFWecS V5gCGxDEbEvGdLdHkZi/lXy2lc+0klPlJQ3mMLTh7JJhrcnjDBkjHv83p21XqqSt yOKf2yVR7UE2L+Vv/TJCTWql3eoZSfPw6Vhc1cOn5lofcuxRS7ym2usfVeOisGKI wGJ2qS5rhUbtKiYJt92B03bZ5/zeS7HZR7E0Yc2pCzE6k2MP/YIAjY+EXAcwH36y /B9oYBn5Lqh4CrisH5fBJNccezQbSEi8Y/Exjz0wqwcoyTdqC/AhBoLCdHAs/b/Z Y1aD0RZxrFaw9dlhCVluXRkMn60I2E6mILiLylOfBltqVLmAlDPO4rHKPJOFPPWk gaLF8z7+KzB2gpaVNCJbZWMZ8JMSMzxH6qFuKnlzD7eP40HIuRqlsS9N+dh5BvBj PxC+v750rx9QcZxmyu9vgvNtFc8noV0nTRx5i2gH4f/2Luvy72TxXf0UbQPe+bda XAQkRYZx1G/fUvd/RQNuF2lblXhnA4Sid4sBs5tWWeUcFjpVG4amT5y9Kz/3v0zX vwPdKMXjW130niRd4OrZLqRxAMY1VmKwHl4jLEChhKj5R4lV61zD6HrovMf7e/4L V92b0VUiUhtxx5nqOeCDtTSbhVMpJinTjjc3rlGMJwUOjxt/5xhei6gmmbsv3kdb P6hkEBHo3bmPdpBQ34d6fRN0aQqmY5JBeDkl9EVYU+CqurUyI7Y6ItYLRR+nEDtG L3ILkqrVG8DSOM7qxkhQdErVYzLF6AtZ9Kq/ai+YsePsiqNiHZaugXXDoK/M3MAN YPQoHkHEp5HvwL+z+jm9MrEGjbUdZuiG+VsF2JURra7EeZXd+JZ6AVB6J2Dnb6rI aw7ZJhyZwXl6PK1dsf3JbjOGkwDhuZOkhaUX/KvFtnnZNHiUhpKG1a0NE46CAAlQ kcY0D/2bOkYJd5oq7SLaKbmt2pEnUTonWXgvBGR15MT5hgH5ZpWrmuF+i5mP7AYm OccA3lUXmF1lVkPAthRCqOyApqCDVFxO7O8qBMbt9sMkQkagwo6SqVbm2dTH6CF4 J75awccCCQOiN7Az/HB0c6EO4YSeMp6nLMWpq4l6Ja5ljyeQHQB+eUvuPBuRu3nU IR42upL/zUf5PiuQ0sKnph+LGnXjo8Leaaq8sjhoxgCo1QsNVY2P2wigaJyOihPU P6B//JzhXK6ag0Gs/49zcIK2c/yN7JJX8gpjvSg4a4xX/BUzHg6zyyrLenLmdlfL hNkgdFyk9leix3g8sZ6MHO506v6ePIRIM09NDpJvMdZrrWpixSlGtrefDgD/lsmi xaGYqz73OuQYnqvMTgvNnkjzQH7P/g9ACWojVf6qv3pWe5687BQMS5UBlj73fiJt FpRoIPCZM/FmWmORgTqvrJQz3rpsRupcIZv+aV79HpYFJUD18DFLFF1VHUaM74ZU ktKxMxvxF+0t9R36qc8CHZhmC+020VyPIwOXUP7rHQerfh7Zb4G1Z/Cj8mbl42/e 9FRZLLtEjsGCCKPrp91ba+5+6+5gMU1do6sjTWhp/3G2SMcxW5dC1UiLqhftR3ph 7J8Vnwn9+xPX/E1szghtzt61D//cWB/LHDNYCSf5iBqYyMQ2Y20+8KPOxyv7BJiD xnhRTXWZOmaFM9oSiiS96T1izmwVaD/gs10zhDCIWaOh5wOehPdnZBiZay5AM9K6 0XsKco1VgytPSCXBDXo8Om5VZQn2cOxkYJpeZn8ZOnAYQ2CT3VfbCNa/Xr8xD2/5 kVKKal+NZZ0CN2WiN4+2bCT4VL54O4ipG+em2X5NtqSDaVEh65Qm7E2zUBiYUzwG M603PQxmfJR3d2tFsivfnQ== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIF1TCCBL2gAwIBAgIIa3B+bXRsCsAwDQYJKoZIhvcNAQELBQAwgakxCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVDZXJ0aWZpY2F0ZSBBdXRob3Jp dHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1 cHBvcnRAZm9ydGluZXQuY29tMB4XDTIzMTAzMTE3MjM1OVoXDTI2MDIwMjE3MjM1 OVowdjELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExEjAQBgNVBAcM CVN1bm55dmFsZTEWMBQGA1UECgwNRm9ydGluZXQgTHRkLjESMBAGA1UECwwJRm9y dGlHYXRlMRIwEAYDVQQDDAlGb3J0aUdhdGUwggIiMA0GCSqGSIb3DQEBAQUAA4IC DwAwggIKAoICAQCb5BOHYseQket5KrqpPp6+Qlev7Jqn/t/1y2O5fJVWFTW9pU/k a8oEmB1b7zy0F3fsSHkB7i8ulnt78P7wX3K2ViwLD8hQE7HAxgmS6sRbLZlNNALM zkCY+GKEmkwNOObgJofw05TCPVZKgx7Crums9LMdCX8JJEgwVRSNJpg1EzlMJHzM yrIFl6qWdb7ZOyNDIwTIAHbpjUCUNzRifWxyffrWD+lyzdpLyV4D9k0DTY9zfhim +S1W4dXw4Vsibg6lR3egjIVjQ/+biUqSCGYmQFhSwvg7OdKWjN/K/s0BbntV8N0R WpvNWSgNq4S4Rv3iMTFFlM7sxeSaCcLY3kdkinOCbRxzclhgPmVGfzB94V4Xw+xA 4nok6E55dpyiMnHdGsGxp1l1ESC8rsyHIwwGQXiHtDNU2g5hExb9uw2y3WJdb3P5 D5FlFj8JAKKyyHP6Nr73Q1PyNDHcS0TetfrsWpCGZ2qLUuadoUMNIHp/odddMtW4 6rhSRa+++iyGh/qwZaQh9n9mNsMP+80S9D/ld1yNEPI7eNdMCfhOpkLjkO03+8WE Zhwihx6taLhM+m58VPoMCw+Vkm8++D5Cf/1fegcsEBRvhIvIE3T/1IVNsdfLRAS0 YEmWYttLxPeZmoWHAJtDJiykLTjD+YU5yFq621VyRirhddrfSyP6AKJEuwIDAQAB o4IBMTCCAS0wCQYDVR0TBAIwADATBgNVHSUEDDAKBggrBgEFBQcDATALBgNVHQ8E BAMCB4AwHQYDVR0OBBYEFCJW1m6Zf/TfgOALFjg6V8wiE1oQMIHHBgNVHSMEgb8w gbyhga+kgawwgakxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIw EAYDVQQHDAlTdW5ueXZhbGUxETAPBgNVBAoMCEZvcnRpbmV0MR4wHAYDVQQLDBVD ZXJ0aWZpY2F0ZSBBdXRob3JpdHkxGTAXBgNVBAMMEEZHVk0wMlRNMjMwMTU3NDIx IzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQuY29tggg2qtzUm3xjqDAV BgNVHREEDjAMhwQKAgABhwTAqMgVMA0GCSqGSIb3DQEBCwUAA4IBAQCE5X6C4Knx 7Z29ncPF6+rhBSY1/nnPOyJn2WmA+LKHyEYZDzuTINiXOeOZCzhdWNuCi/uWyLtS vbzM8OhWQEaF7T9KwoGouMvJv8IoO0ao7kpACOILYgmlIMlwkEB37ZXV6jJQGUzB oqmTADSujI3H/ePIKh6utc2tMEFJyJxK48mxp870ybfqYNSv1d8Id6AxoVoIEq29 ymVoZl/NE44SkI8sBd/rbLepmwS7phrnN/WivBTmrwf1lI5hc5PeGMllNCQ2sNQN FB0Ud2X9lEoWDYZNGp5UY/NYZAxFoFAjaHpyP0dn5qf9P+zTCeik6rNXAMPCBME9 O0Id3tOcdIZp -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679153 next edit "Fortinet_SSL_RSA1024" set password ENC o48tZtCG3OOfnM46Ax+r2zx7VsOgudcA72Yx2saKprg8xKZa67N/2z8RqebtPc35ZPjfA3RgDhE2nK7THTfHAGoUXbRvFTi4UDrbT0IDpQnc+gfHxDiPRCwU81XN0Uv30bPB2bVWVzVOpBKJjsuz2nGEmi9zm75J9AcZeA7L3mysWdmuKuYLDzmCzhPk73fLo8fQog== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIC1DBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIczxtfT+nb58CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECIc2HNUfuYBRBIICgMgIjaS8IPuk FPT9zice7BlsAFgmfkwSWQJZyCqYLyumVK1e1hA216RJqhwZXHoO4/akc7+TzUYV 2JuwqFAVFTkUptXnJhKCTSWTHrMhHhGOsh2SMyc1huCS2CuqfpUv6eXZY2+M2Jh7 toRwx/AlZ6ryZsTD6bmyCYHy8BWpfWIZkvIYA77OBFLyig+vtL753yNFaNFcQH/m 0T7t1C3Moht/3D58NRrFWMFQ60lzbkkmCXREGtJlYEcsWWznDKFb/KFx/hCMuR5f FsYMgdZjznpaVEhv3yExmIrFnZD4foQVbjevPOsSuMaTfvOsoQDCQ1oUUx42mQ64 dBBvWMxBe91c1rv3mHDnG5bJR0EHYxAPu0pAdCLRqv71NCT0QEgktS44BaG928ya AuE/reBFOIoIvnb/bj7IAK0Umt1n/8291btPMGRPXE0luoocoAc6aBduUGh7S8Iq ALVbn9P6hRUeM7qe5gJDlfavnIBej0bfK74GiiVfI3nC4cW0NH/9r7sYX+pufuzj gX1hvobg3/pcLrgYXi/AnSpLzikypQodMHev9Sd+A38iPXYG74QcQ0XgbFvJdne/ 0/WEtCHLLv94cQgo0Uh8e2nrXoUkgRDY/I//oOt7zZRofymlX58pFxl05mE2Dgjr 83n4eubirqEnUthzXndnJ8zBmyZ6VmHn/Y/3qUzrEFoRmii00LGtnjarwhiyiP/e 3/mavZdsw8dkfYHLWxj1Eup7neI3IK5D3ZxvuMCsNzqB5w/XMy9LnpTWdeLpziLo vLlU/nB4MNbOf9q3Sowrix/3+yvYgjpnX/5vRQ/MueuQ2E4btgwGSoa8Tno5kla8 6+klXfKLzQ0= -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIC2zCCAkSgAwIBAgIIBzNU9Ca3nkswDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTc1MloXDTI2MDIwMjA5NTc1MlowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDKd6q2ndQ7I98xn6JP 8SmNTyBRePt60YXGtebLG3+/WLZoj/66qEU4gSLaONH+AyKCLWMlxDksPZooKOFQ V4/hrhT0fFWU7DdWAgSdENgZmWQM86SzojFOAWajtPITYwReVu8zwyRgfADB1fgN 0YQQExlMvOBwPkc9KMVudjIgVwIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQM MAoGCCsGAQUFBwMBMA0GCSqGSIb3DQEBCwUAA4GBAAcYejh6wAhVFJKd7Ezu6AT/ A0RnKKjNWMgvxjPYVYKPd782iPpvJ9arllSP462yyXH0HF3+taRTKPr/QUKGhXDM VIGSi5Yx5OuGzbN1teH/ZuR0BFOvO7vsFPRntX6PeO7WymUhRtwBQSF9ykyIMG/5 q9/B8d4B2UaWO03cQhHe -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679154 next edit "Fortinet_SSL_RSA2048" set password ENC +Oom6GSX/pwOZttvwTP5hEiXMd1vmYqXlY9jokHV3EO20TCrMl9ESg8Ul8CXgASqcSfz3aXMnCi33zTe2VZ/VSyLzl1OWR9BaJCztXGxI4Tyd7KMvLmxpfY4eygYjmsrTQw7hwNaV6KmRCcWpRF+LhomcMWWxFn4TxlK3KpXMtcfNvQa7wpGSgANVY9pu2JCDwxIrQ== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIFHDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIa3ZHrrL+bS4CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECB2TktTmPOW4BIIEyOuo/4yIuHjp egvBEGId8jlTDSL3agzFi65zvOZEIGynW+wjF/huOcmtOiu9KwNj+coNZmkzxeUe ua6pGkDN4owLUJzdodMr+Xa/Dh7RWG2Y3fTICFYH6WWi6KWG+QN4E9tM6zVbHkYe t1Ahc3K9JoAheA0zJNYa1nHznlnc0r4aBDz0tg5Jg4onxjkEO7oa356ZukiaZOJa lP449YmPKDlo8tJT2T6/obVxXidb0Ttn/XHVNFFuLQOMXrOgpGHO1WdfvJvg4EAI wvFEQ3do1RMJU83u9vPis+e0TKN8UJSuJCIlO3YUHnnoRiSUUu1nrwtcF92hXj5n dofx9NlfV4xdV+7oIas2STVGtCwVfxjf1MxExN52glB/2XdF2PXp+nPU1VbSxLhQ 8js+zbxb1C0/VF1lAhyAx7OYasMR2UXeh7lcK5uyTb2MhFRMr0zYQ6XN6ZZf2IAX bVkWf5Ir2nihjtSyLJtp9+3gg3gTur+Zct4qwfxfRXsMwe/toMyUfEZzGTIRaUNn fbMDd72MNvChkjPtqrWydrqTKoufKGFcseSIw4jc9MqSW6ChvFb4BbNyzPyfhV6e 8gTIBMUL1xXPeDbXw3bLnuBbmtwuBYE1OYmgdJfdRSz/Fh6/dnjN+qL/Z8cULG/R Ij42NkaVpFuJpYXeVea5Y8mrVkx8bXEbZHRqEtJ6a5FP0Bu4VI50eDc8aWXQIyLN Rkk/qzOdFuarxLs38UqiQQuoBhUD3DzZwNIg79kLwJZqdHB3aPZWyHpRR1nmZ9S2 m08jFXrV45lwMeR9sP9+Pq7oCxKkf41B5avrBoPXHDP7KpJUAD+5z4gFNrFk81NM SKyy77EWuN4Hd+eD0xS7EGwqJLtMnw51Pov71AGHwe0CumPgkVDsjhMZe2FbvUie YkaNYpA4+3CKmZTh11LBPIFh64e2C7CZ6hj0ppLaETii7oD3/xFmgMSvZFpxYw30 MlsndttuR9NhDmQWIyakSZUaJQm1lQM/EzeNONAMdjFdy05oMx4flJhJUILVn/05 elO8NfQHEMg571BQMCJ468klfz25Vz9BeaHFoNLeOWjasgaUrXThKmNiDrM9OKdw bq3bT7Fq+yBwdii5sg/k+c1k/tXJp+PumKhnSx2QVtbwaogeXrp5WmWYfA96VEkn mK5TW7gTUn9wZ4HZrEd4+hM4Vzpq8dzWuQjjCdGONsa/UZdQt2bNRGBZ0sPUNdkV 0k06yo+44ft7T80MQNGE59UZIEmOzX+r1IxURK98Y8Auuet429f+xGCz8ButETb6 Qe9w4Xb6D7LV0c9SkE9uFQy/iGyvQ2/ntRFoglgkxfWksNYymhtXTNRzD7NYUxIj wctH+egeHkZzE35mSly36vcvOXihO/gDWtxnyl48T+5JdYydDeupKBQpxTNYv2pr 4gZ2YA3V0CEUa2x3nO63FpVab+746ZPfE1MksLvOcn2pFi+WkWQ51Bqec0B97kr3 YNSsQ1C5CEU+hK5bkziCAifA858OyMh5SKHxW5C6u7Q1VKPGdbZVqhJgjeaqZjIZ kLvoOUPiYV2QNVDn3xkyrJr11WvGUjWVpNTRvN+ExHWHeFKp52xHEndUb7WIShWn 4A4Vp/7Jml3TU7fR4U9rCA== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIID4DCCAsigAwIBAgIIGb4GoY3SVvswDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTc1OFoXDTI2MDIwMjA5NTc1OFowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAy3/lfOc6/jtU Wazr2k/8kgKncLHT3MAT0x5mvgNT8hWE9GCuOKx7fHGLXbctH50xFAkRkwlCB1Dz Dhgdf//FP54tUUpfFzt3UqtSKmuafMMwmHmcQ4hVOiC6eRfymwTOxxyHPWvnFYgm nWph6qohS4ciOpEXhTKNrQeHKFqt/nkzupawn5gs6e2FItjM0HJpdtqRQFcuygKo O1hXlYuCs1pNu2iqI69UgDycKCTpDs+5ZxnVoQ9o6A5VQgohZIcVe4PVgvIU36jY WwvPIjO5LFziF2jcWJ3wRJQ6SYVYh05g7GVKpK54jl6Jen0RziKLhT5fRy3bRarv rF0HOEGySQIDAQABoyIwIDAJBgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMB MA0GCSqGSIb3DQEBCwUAA4IBAQAKovErgmsoLNfMg8b7qRv5QQTjwe6DB3o8K3J3 S1tTVYOKCPtrnw1yPbXvV+NNhYzpwb2rs0ZG1oEfpkx7R/CYOlU37w8FeGFvaHtC ysp3UwG1xRXhMePU7ng/MmTBTW69kfkNoKqPV3OE2QWjiAYsjhAJyZUPR38Z/HF/ 79FIm3qwX4Sg0siOYaFVOQwyQUa+aOj2ZoC3VhiOcI07o9U00D/SZm52BWd2y1D7 BDGjaBUbNDyLvuCgolP0QtuMLLhHl2KaD9o3CjLxOlQ4axCSWbj+uCbfqZpASUT3 kzI2dB2kXR84U1LigRd/xhBe9znERLal6IrnfLTGlgm4begT -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679155 next edit "Fortinet_SSL_RSA4096" set password ENC D+hcINlOPgDPVpe+N0ujlQsVT70POF8KB6ZnKxipDEcfN0LPzOLPdKiz0qcv5QfyGWL5NT1sCUEhx7spBMwuhAq89DQnzCzpb7dwBWZzjHzBhqO6OCw+dL9cNp2IFIs8uKJB9lGiwenomv2aQPHoxOrA9cPCl3OGZbVFFoTG6G/hgIENlfG6mCMY4DNMNks9NQSS4g== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIJpDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIrPYmQdNsZW8CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECPNdCoiM3Q5sBIIJUHo4VVHxazMB VMMcTCOnxGOcYUd+dDxKFXAkACxQlYW3+bAsL7dU+2YSFS4fjPDqQIZEE0oNKn0b o9tAdCKOuVuPd86DEEhemmcVcXngZjTu7TSrWVmLh76ZMv9xbKtbW2i6Rvym/atM 23D3dqJ59z+4fNn6EH7m6robVPXw13ww7MiRTqNSORHhYqIOz1CE1koAOGpmD5aa GtGMtchhX0g+EMpz+pQLZPyuYn62/14pdRVOBozpVxttudJRKB0twkIeG0LbVF56 7CS4dz8NtqEO7t/SFo3P0FW+gpyZuuvViSE3jIpM4JZg48mixmsL9fChW7krYjXm AtIpwHUsF+CdV1YypBY4W3plBp6/M2fnKIrzouOQ9mN+Rt99qa33Wnk3U2UotEg/ DPWEf2+fTk/JN6NqP+F4JlfO6SZXoigfDqmvyr/LFjVGCHVXZu2DRnfjVPfYNg2c R5/jgbSf5Uz6oR/KFPMg0J+d89f1lphTq9UeL2L2xOlPFhNCG/sQ7UtdvSKJmBjm B0Rnj2CeZ+NChC9/brGeokxXf02xCJoTRxX4e7/X9NfFr7AaclUP9rOZNSSW5qdK L8GM3AuRi8Putvlc2FepEXnDqYGNQC980ObNG7FkM405tue59lZH+bGTx1RMCTZU DgyRq/goXBP4R3ucVmyNPdZbgYz33EgT2LxKn5L5kNGHd63mu466zRqqferB1+ir BJWUprHmeAjPQmPE2/GBNX6bnGh9db43olBsM/HZ/66OTGwwWejptE10VFLtP0bP E830XBMKbj6Td5cp57a4SxYSU+Boul2UaVxB1O1Yq0fwDI43V31fQ8yhWXj9+N35 FQV6xBFmjq9E1YofozpwW+PoSExYE6Wu8rFRXDM7Ndeka/hgOREzm4hsf8xkD977 yaUh3jhh9R5l6YOJvmfMMaSd6Q0Vi0RTgVK+4sBYgEVtIO5YJP7HR9HoWF6UdS0U vmFk4XW/grZJiKKQwRcLsMJR//cLYm22U1nAIDs9Tyc+4Bi5UXadFOsWjsK1vw2j N8e66zp1LlkXSDwlPAaxQbE8JYMAhOQ/PfVz+gqshKwVGf3wQWGtt7OLzgp5nuRF 2wCaIldkRtEdjvb7NMs002aZfCcUHlmiK2FTZYrv92omvAC84ooH+yB3Zid6KGxf mUEoS7R1Nbldhbcd/Mm9hyUUV5qlQgMNMdrKEqa0SdiO2War3y8QpIcT0mQ5DnLL GGzC4pmmMhcuUFypTdxiGGpWFJZovqbKG0rAYy0gZ9iJBJoeYkp3vuCrewVIwiSk 9uDZSBbrlurLNLvuz42SONCoeawVNcoJYbrJYHQtw7YSQyHpl/D7aiPeiDFD+bZF DrkfQIS5B6jcjn+7XxtqhMKhCQQQVx6/NZAuYOg49wAVwYe8/kypNTG4/cYhtlu+ BWVsXMpJjydScqI+pToE1Sjf/YsaNZWlt9IBoEqZ0wZLAxPPQeVdXz52OlkWf8IS +6OcObJGktClQTNwIJEFg3QZfo5CVMZQZN4UsM/oKJfWlMbfSJJPkwuTw6/+JI3z ZbIRKBd1svcb5K8fU4L4dhzezoRrJvBj3fE2FnHZIDiBPPO/Z9SebSwfIiGqR0nq eKxCX0L8Ja6j47RMEzuRzzR048CBjTEJ9kECjvrPrGIRCj6pwBtX7Wla0zhqqEed 0VjULsjWoKDc5Eep7Xg86kGyuKZA00ktto7+t/61C+QliooAjsMGfYwzFHe16fNj d66YlaeJq2Zf6avqqDtAQ8+BDDTZUHGkd1v37sxMMFxOXRvOXhyfEfWPywDLCyli fatP6YCsOwRwllItNuKzMlFdtjv3gQxjw+msMuFaMIupIaSPjc6aNIvqvT+VDDGM Dw1SXBd/0Vz68OwlEY9t00VT4uGj/gn5W8gewY8f8dweyRAp9MUESb5FrODemdsj yJ8jYyGkmidFcByL6FWaSlsC2+VJd9KpKUAGL3hWqV+zo7ohjs9TWZFsgNKz9Uwf V9tx9aBYNK73wuiW5mTmeDbp9ke7ZQJ54u8SnwuH6KMVFIZ7aR3wV1/N2Xa8+LCZ kRqJ/ZCzbRMF0ti4otb+Ss6Gkc/N3HQSb64ycFFGjzrZIX6m1qd9napB1JCDfWJT LlDehZyK2A9lnj777kLfAhbWH28TDz1tl7sZOUqv6ARuN1DalrLq203BOqVoL0+2 Lopkhn9hby2v0asd+LkS2mFAk11BXgIl8sT6uq7byOfoipNAx40k3QwAU6r9UN1k fLQmXdXn7E6FZwYjy2qc/U/po5oov11tuuotw48Tp8+XQjP/4XAucH4zYEDbNRaF DFeKf3CVkk9FBZ8EOG9x2bklR8sC+JgT/ukSBmIEBo+nobpH7G3yiBFZTf4GljQ0 b5JJ4qtW7iIIUgwtw2AJi7sda9zJMP31mLN8/TdW9HHg4tvdw+vKTu8mD0c6Eu/R dRRPNbp1pJ52BciP8p3dCQsma99ZA80i2frADx1EYFnklZLD6sQlxk0+SxXjDLi6 ALTA4sbZ1vImPiwQBHfNYB99r7fwDRdLSouijJvdlJ6PkEvxC5DNBI+sbwtnh9yS kpFsOJ/GNVAM6gFtLF6cfompODzkraPmF1Rsfs7Skkzs8G0uKhvvbOtCP2u7AFee /HPG+hLfzma6XywK/GrWAol+I6tUcJj79JE2ZGzWDba+qZeyTs/VpXcA94LjerPN BIAVxGNJCcYTGdqXBmKPmwRlATl1breJ/oV9j7sgrTLto/uk9kg68+b3Y8JmrqPo FCOPSJ4Edud/yCkE85bGq+2D7/71eq6neDvFzWvFoG3XdYAA8Z2WYuTrUPxeK/Yo 7o7gnvoQwLA8BH5lToiXDR7wCTOBdwjsquT8u+K8A3+oOpR794KLfmLmrszjFp/a ianFSO2sfCm3cAoVez+i4MXjI89EOiLwP/ACDBbjUDqsmuNgqT5k6zcjiNUFQy5m AZ8bIfYSy+5yk5f1Fy1H90bnwM7zMrebemN0RPtYg1z6WPGdoEybYPObU2J+lUhC SQ0vQQAOkekxUqvwkBHnqCBUioonKQzdi39l7schhhKipUCVdDmGdG2p69RFzAjq UZLXraPiI4Px6MqtXy8k+WrI/pb8Ca04GGOmzeN5aBIeVZgov9pLIPaYbTuKmlbs bbd9DxZsqp1VwkQG74VOcpQjTr3uMFqC -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIF4DCCA8igAwIBAgIISqWPbSVxEfMwDQYJKoZIhvcNAQELBQAwgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMB4XDTIzMTAzMTA5NTgxMVoXDTI2MDIwMjA5NTgxMVowgZ0xCzAJBgNV BAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUx ETAPBgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMM EEZHVk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGlu ZXQuY29tMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAll1bpCMV8dsx Hy0vHSOpoBkgqcG+WKdLUgB93Wupx49fsLlUWTETabutW0eMimFd+S2qUJKAYGPK 7aTXMd6fUe5PoHG54AAr/3u2WReBBN90eB3Nx0uH51TEd+u+3VILKUH3claHvUOl CwBHoxYrVEbH4WCEChRUog9imyMMETV7YmR8QEFUwJ97R8dj2MdLUAKV8uxkkYKT 6wSWSjTx85XMWtAjGWNFPafcrsN0tK3xJdtjXYIvLnyRUDOaYeC71ZC6YAXsq+6d r4IGnVn5dbxOcFW6Vqb5eeVTSHhw2CI3Dn57hUrquLEG4+SBd5T3WN901Qq9Dai4 EVRLOejhO13GRxtCKInU1jLOt5M6IskYeUzh8XrCZtwbrbd87B8+j3D3rdCjSA6E BZp0hm27kQ6AAU5gChwDM2Doc/IznGsfMRYBxDwcrR7OwjbRCXryjgI1gUMKrxbo 9LVfg6MRmRVEHhGeO+i1CiyhGAlrUDXfIGMsohqQ4pHD+HrvzasNm1/2Q2Sat/De PwpoUuWb4I0vqFUbT/C29wmk1cB+nzY48yZOpaSjf3d990NfkWoOHgKh1/k54rAb CfgSf7sH2N73kEiLaD70nUCcwctLuHL28mAUDrxtcvwCYXl9fOLB34T72IAHdWqZ t/+LG9MFLHTXwiZ3jbElzz+kb+TQby0CAwEAAaMiMCAwCQYDVR0TBAIwADATBgNV HSUEDDAKBggrBgEFBQcDATANBgkqhkiG9w0BAQsFAAOCAgEAh57ckcASEm9TpxV/ 3uYjJgd9QIf0DMitPQLCI5kiIGEB2+7TzPh4tfAW+N7Med5DIGEKODFAv5tV1+KG SeY5bd4c25PehKGbpPdIvJdVGQEL3TbTl/dzdJqR1Be9xCUNvked/iGDP5/5V5mU 8U4ROSDleEmJricAmZY6XXzuFHXjBtLEj1u5+WUlos8AFkulTDlpu9c5NDWtUWC7 l0d1ycjtiEZ6LdSOw6QY1rfFDG4b12sFo6VzkmLJ+fajeefd+ebDq7xRSqqJC/mY 1BMlXWA0xnqUZTwJqlwJ7AfxON0dg3YMZw+jIwBhB1aY1lVNuFWsFdJFFBChdZQ0 HfB44878uSpp9hVpT0kAxtLspEeE+870AFm187f6FGUJDLX8gPeo0JpYQeUBbS0W pyLAWCrCoh9Q7FNUdQOz2DO3FJoU7wRq6qsay8JrkqkYCnmj1ABNMwujk8cc4077 0AfYu0pQRKh4HxMRwbsMwF8Yp1Z9KsjI5FkpqNWvDkuU8/G0jRBtglxb7YwPxyLQ PNgxl+ctt955uPALpCMjPqBhGImeJRGMI7EtN7zvcZjXlVfubUB1/kuVIhW7qNcK jpQa1FFSwcNkfAjyC22wW/qVf/e3BK9yudKwBvBDC+nSuRxvchl+sQABnxcpNqWF UKI/6Nvhwad7LAyf3PGlyFYxHl8= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679156 next edit "Fortinet_SSL_DSA1024" set password ENC qDeCVKUgj7UaSVfh6ul/Wp3ZokscMl4YxKBqT93Fou/erJCQt2tE2x+9YuUBD7THJa6dfBxuTHXtRMoGj67fawHEV8meq/4gRK3GLyQKdcFdreEE6ilfoTK2vyHXKlQCTxGphh7UuNUo8FYa4CRMnECgqoc15MlxTg/3iDlPFBLPsUvOurN+1ykEBdCdpxxyRL0jCg== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIBpDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIIH0dkBABhh0CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECEnBiOrSEgWmBIIBUOuC15kuqAY8 RdlpD96RNQLxQ3TQ2/ql2Cw/IYSDIWRFbX6UHrKNanV63eGIESGOM1t6Fl+rtnaV ip24WZKXN2jqJF3D2V0o83/VHKHjwRYDT1j11G5slzsuQeF1XsiWqZLXocFE9VTa LEgSzUrmpSW4AE6K8zzqGr/GBjyZrwo9lfV2PNCJZuVdCF9OsLualsEQe5OGGaM8 0e6xJ0BFKHmYKUZxP/pb0FfcNXoflDexzvb/ZdXQCc3+c5RkVGjFpVWjjUED8+uR QeKE0b5NeciPTHn7OyXuDsEdWsNRQKnONX/GI1z2CcQGzvVseS7EKzcMyqZhV79T gxaGSzfsStjem9XueZiic+11DvQPHuDKKUATmmm5B2B9UXgG1UONrtulX+vDVtuc 2eyNx9y6ROwaBbjvcQmrj66H+G2jxbRB/OTBs7VBpQHO+P2zRIoMKg== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIDnDCCA1qgAwIBAgIIb8voUeML6y4wCwYJYIZIAWUDBAMCMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTAeFw0yMzEwMzEwOTU4MTFaFw0yNjAyMDIwOTU4MTFaMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTCCAbYwggErBgcqhkjOOAQBMIIBHgKBgQCoOPMoDaakM//83Em/BR8G/fmQ 9fL5/zyxRvbTi6JP4fxHEtb9TOKVbXIcGJypXghropoycfpcyicoB0gJVWz9vn1G obs/OUQiEYJza9JfrVO6YdTDiEAG0NlTfBgi0BGhOHtNB7IxKn5ryCIhFYMLAvW1 tfJwdXa5t9CbnP4c+QIVAMl1GOf7yrhlCsiFU9ZO6ppBSl8FAoGAcmRilxt/vKTE rhMEPv2kFDcLsXMMXMUzlv/CGVVv7TzV+e9qvifCAwJ9TYdMKqobM+7ojvfv6fU5 PV3TqFDndeYqPWVWJ0oc7A879N0vIjZsONxkIdNJ5tBIoXpSLkZDKqfZauw4pSts Hpu/XgWGHbt1nU+vucskGoCnchBmalsDgYQAAoGAGkgblG+NDP8DG7GT1DkC89mu DzZHDBPv6CnaqvI7rptZo/lM07hPNi6prZoCy6ZSuvbP8vCwJnsuqbkKQUNR5Pot TdXC97reDX/lBuoWCYRKgEXf2CJ2uiFhAOrjl3IlT4sVN2OAmIE76iuB4NYm8tOw 3HBJuz2M9Cn8UYdSsqSjIjAgMAkGA1UdEwQCMAAwEwYDVR0lBAwwCgYIKwYBBQUH AwEwCwYJYIZIAWUDBAMCAy8AMCwCFGhuuncem0j5SDj1aOFVEoMeU2FEAhRFs++Q jGfDvGQsBqRUG0+fsX/jRg== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679157 next edit "Fortinet_SSL_DSA2048" set password ENC Dpp8qsiwR3MpBadQ4eiHWjMjjaaIV85GWNALmQ7fKUjxp45vgOG4/BpCRI1AFc2GHGNSTlMWtYxF7wv2rXwg5O0ye1nLl858JUTof4ziDZTA7YJm2WzTsHpM0V8YKFffJVkzeFELCJ7BxDF3+WXlS5lAvgBDOruD728+srlhggb0uRSgD8Tw/4Kox4284R8jGs11Yg== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIICxDBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIabD6Dac4p/0CAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECLsU9Vz5qksOBIICcJWhg55861Et IpS8gCED83iPcLVIVacZZHXS0qn5IeuAa9jBGzDE06+FnnIzXD+inB9CFp0cOPpO awC0w/koFt2Oh5zS1nJjWVxgKMiJK9HzlwjPj8d2SdfgPmAdH7xXjub0B7B27rv/ 3fyY3KWBlbRxcrLbvjFTUJL6dJuzxXAZF2ZzhsJza86RKuC/shQzxxtZtInt5kLj JZLQqjEzUM/XaZw7Lar3ulBHOshxH4ns/Dl6logZjSaQWkZTRXM157d/UK/wgIjP /4kTgwkKePfRCEv6Xr9ykvrdsacLDuUC89Ukm5C+4PkSatqKQZ+gIoV93WyWBFlR F4ZE7I3hk4cMd8kVA8kf75k3tMvLddZN9BgJsAdMJGmlfw5D1jJOT/9dBmt/93YQ HpYrjNOiuKHDYSuI4DKXhElpW9o8IESIruTj0a/dz0KEfWvFWdNlPn4Q3xIJUgmi PlrHLYjvWlmY9xStZU9MzLfe9ngkf5HERphwk6wx0LXo194qe/toWVxreYSs7urw Nr/xAXprreZ0PJ3HOaKE/SjAgTVz10O6qa8dC7T1R2Ks0Wc3cqFuE9WNXvh1fIqm KVc0HFV8BZ7a1YTSttcZLx7BMyxRtC7NcSWU0Jm1uBMkn7y9ydKa5U4AP9membKK 4IK4KKh0EF7qWPbh/8ijS+ztCsEdVruM1IjIrj6t49UGAS9qcAiBcdKVs2TsRsXC /hcy2Ddth6tbU+Og5k18sEMvz3QiC/fqFCFfU1kbUlXLpC+qCq9zNVzewtZhcImL W/kIbH4JUAGtjDWhH7+bcLYBxjDXPUBEn5GH9feJ9sIIT5ji3ATs7w== -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIFRTCCBOugAwIBAgIIOQNj9Ei+qcMwCwYJYIZIAWUDBAMCMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTAeFw0yMzEwMzEwOTU4MTFaFw0yNjAyMDIwOTU4MTFaMIGdMQswCQYDVQQG EwJVUzETMBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREw DwYDVQQKDAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBG R1ZNMDJUTTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0 LmNvbTCCA0cwggI5BgcqhkjOOAQBMIICLAKCAQEAwicTuPJylIzgmZLUKfVvMNr+ PEFc5CM6mHVM1q20ONT5EwxdvssGjgvXMoIxWv1EBUT45RtGPu6HeaOM4JxPSPbe lNGcYfAmzBq3yZPg36B2urP4QzW0HO+PhNl3DY/T/fkyhRhYCWbLs+V78Z6ggyLf DxQ9ACXG2Y9YcUZEZz8humFDtAvo/dThDYjlA2HWbThF7MmbCvyX+TUYyoY/8/Py 9qJJO/kKvObKLZzJQPeEzsrygow3TVx0xJB2dA9MW3K5augb+kBTds8vDh47Ml7Z w21Q3HgdLBufrb4cKYXe8jwrQb1MzzWhRhR0sn0Nou+aidP0rcYbAx3GglK3aQIh AO60acP5dizRHD/3bue6yim4Ka+2V+gJaOSzw9tzal3zAoIBAH3KdniKaOHJuMI9 RIxyb25URiw0MasLN6MBT3xmALrCuk/gcAOB/7XZc1TX+nfVt7EiLEnwXAjWUA9A 783w6sIz+44rQ7Rw9EklfD/rcfEW7X3PAJn0kklLfBuCNndYdeDk2jjeSCsjuV6y sp3zZk0hGDC6QOyFlnlYiv2dgmPXmdDKm9GzxyZoyCDkmS9zDUbeZg8o/PQVDBlF majadubnmho9zXbk2erNyMZ1hZM+hkaGGt23WH9nMmPRw9y6adB3sipCM1rgm442 kwIMVNXLwmB7kcPOLaC/j2p968IbXMgmS20k7he0l2whY7EkPN1vldLzSUBXH6P5 O+pjOnUDggEGAAKCAQEAunAUhHcDg3xj3y4fDvg/qIlz2irOaIXdBG5Vgl/A6O1V f6FID+u3rfmBBlM11O61BZz04Q3gJDKiwvB5JQ2lU8Gjr7s/nYDjxFXuVD9XaMBc gG+HcrUo2XXPrU1UxwIsfoNrTWegCxKWSMN36JRpiGCrTZgrS/AjA4WAzw3gtroh 4Pd0IFJ7uMzXH35JoW+4TNVwiGasWVM1L4j4SVM5IByKDcG+nWUlUefNm9n7VG1X y5FqtIFxIl/ijkGZd6NFV+5f9wpJE6k9lSIKYJ5+gx74Ki9Z4/q3YKss1MbUy9B/ BqPkHrmy+1tzLSR0d46mJNS9b08Th/uXEAyEKAt0p6MiMCAwCQYDVR0TBAIwADAT BgNVHSUEDDAKBggrBgEFBQcDATALBglghkgBZQMEAwIDRwAwRAIgDi3wW+AFomlZ VtstfZ/CHYpj7V4KwQN1h2ktcQ0n7S4CIF1alBg4N/9wXSDPxXCfqjTreLp6N+O6 ZwFSk27Sa9j0 -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679159 next edit "Fortinet_SSL_ECDSA256" set password ENC Y/15orTAOdshcqRGwh8ygE7y/PxxLriFTUHrUb8U28rVEEScTuMFmLYr77uIXfjkH4NBt2T/UQJgtcRJ004LeI3a6NCDeFodKnkkKwztkgcNpQ4cW3rWXQ025o1QSuS4/DTDdqs50XD0AKEvHUXlbPrCW+e5BWjEHgdQJHO0DbatnIWhDlZqjEP4qP//BDWo0nCkAQ== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIHjME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAg7HSXqAqdwdQICCAAw DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIvPXcO6k8QqEEgZD4wFyS+Y4zx7nU VHDtLIjkJNk4ku0n67FvDhUkHIpMr+CFT0EuKnCuVf+49G32/3ao/op1EW3x3OV5 MXl4e5SKer6iAg5CXgLk6YzxqYuMef4xipGzLiOwhci6tA35nm04T1ETUut8uH9x RpvRgbY5uf6OxVkCYeSCyD6h/fg2PkXUimXFiE3825o0hAS+CN8= -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICVTCCAfqgAwIBAgIIYCKlakyaYn4wCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMB4XDTIzMTAzMTA5NTgxMloXDTI2MDIwMjA5NTgxMlowgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEVZ+CMqckESOQ6jWDkfz/jiaP /zB4Di2VxhVhrWU+SVVHOqylrGPGUl597b85s9qLS+QDROYxC1f7D52AaJ3+MKMi MCAwCQYDVR0TBAIwADATBgNVHSUEDDAKBggrBgEFBQcDATAKBggqhkjOPQQDAgNJ ADBGAiEA+cQn8b61K/WVNvEbJG7iZ4lCnZx4k5i4rt1joH68BS4CIQDaQvkbRGaj kx2Ix0wR2aV+J74ocZhROTeCO8CAeum+Sw== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679160 next edit "Fortinet_SSL_ECDSA384" set password ENC 9oEbsvTzqR/q97MjSktZQ4vrQx5+O2271l0M15s9SN13lTaLObC00KrK9f8FrnTfdd9Hf+uj+racUGcB5xq67rjT3GmOhjpt272iYGfXOLyk4mHdzg/DyJsPHIHncuON4xANW2bxRU/RoTlRlB/sXqBerUbeJZJZi+YKFLiCg2pSx+RuitZV7ASHOaaWWB6zRRb5VA== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIBEzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQIV4rBzsUlaBoCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECEDQre3nw5PPBIHAjzGvweZNN4hn L+zz/0o75+qMs/0lqG9yl8e7PxjTOQY1TMY2no61QDK9wM1yOABCZVPBXnTnNohT RXwVXWQiiOWJDlIsZbHAxSjWeqsS5x8pYQqb0/fibfdsHLBOUN3iR9ttpx2NIsap 3DGmZD/8DVrBp8M+QbDMf4cU2SHTFnG8bFzVdqUtVnw9udsOaOmG+dXemIlekpL1 OSxHns05fwwVDlyRgm5WMzsoWksy0kZ5WdSN9+F90oMdhWtbXdGi -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICkTCCAhegAwIBAgIIOUq4ZPZa7wMwCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMB4XDTIzMTAzMTA5NTgxMloXDTI2MDIwMjA5NTgxMlowgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEBxGg+UosK6syVxnx/c1NHrCILXTF 4RswNOQXRIGvVCGmo1Yj0Cqv8Z9tnNYVgj+K4frYkjKVsIUOUbmOvs71DAIx4xNT 3gH2Y9ySaH4ObtdNLKcT0VnEVu3/Rx2Gx8D3oyIwIDAJBgNVHRMEAjAAMBMGA1Ud JQQMMAoGCCsGAQUFBwMBMAoGCCqGSM49BAMCA2gAMGUCMQDjc1hwRyE13XFzBLgv dnFQ4EH48fpLLydlebyhwQcqkdkzLhpZNt6IG4GI5WqoV4YCMH2UmIcshx18UYIC TAdAk9r3EL0CJCghaSI8M+eJSI7k9pNrZK0TR62/cKjYDgdM7w== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679160 next edit "Fortinet_SSL_ECDSA521" set password ENC b3DNsBSvXq5ENDS1khLijdNknHaevd2boc3Ns/7dfVgIj4eGwS4M7LDuxY7vQ+2mOWLT90lyMYe+ROBSGSf1wRQHFVa2yysC0u7ice/MsFWOk/I+5LFmbKjOzA1xFPBKHbSQ2GgBz3l3Fa5i1lOqjrgd73Y6dDd9xi4Y5zLPVKL2FIRCx/KZXbnCxt89COXiM3CZLg== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIIBSzBOBgkqhkiG9w0BBQ0wQTApBgkqhkiG9w0BBQwwHAQI2VtJYimoAiQCAggA MAwGCCqGSIb3DQIJBQAwFAYIKoZIhvcNAwcECGSRVH3KWYluBIH4o7DZQ/gwLWRf x7e/OKTY2sQZ40Pfe0e0e6al/S5t1ntkWlTREwohXuLo7vewsem2JLsHyBIeiOdQ IYEFgvVRpih/RJeQW+VHBEXzqX1t42UjQct6Zc48rUsSaucnxi9BFrzXBzEe+sBf NJ1L9Y53zflln90usJ78IDDQOwbtgUzhZJmqGPymno2njBXEh6avzJs+yzwWPO2r FwlQQLOGIPwRSX7NKuhC1/m9IBD10Cebf529cARCk8zEYAfO+rISehsO/b10WKvc tifKEhVs9jVPI/8s3AEajmaFDFS/1E7pWxsK3rGRuDQBIGjgjOH6N+vY9wumYDQ= -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIIC3DCCAj2gAwIBAgIIIBXrmGOHkjowCgYIKoZIzj0EAwIwgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMB4XDTIzMTAzMTA5NTgxMloXDTI2MDIwMjA5NTgxMlowgZ0xCzAJBgNVBAYT AlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRIwEAYDVQQHDAlTdW5ueXZhbGUxETAP BgNVBAoMCEZvcnRpbmV0MRIwEAYDVQQLDAlGb3J0aUdhdGUxGTAXBgNVBAMMEEZH Vk0wMlRNMjMwMTU3NDIxIzAhBgkqhkiG9w0BCQEWFHN1cHBvcnRAZm9ydGluZXQu Y29tMIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQBFmVpD3+4+pk10GIVOHCyeFTM e+CvSNv9iWeVpFbxdfo7uPg4AAzTpTXNXU5l6coIBmZ9S3Obleewu+vJvzL2TikB Pepy1j6rsiuoRi3whtQcbanZ6LNrckjGDz3wqPWyI283p8ZB2oH4hb5efNUgd8ry BHwic6JOpcmnmKehPRHaafGjIjAgMAkGA1UdEwQCMAAwEwYDVR0lBAwwCgYIKwYB BQUHAwEwCgYIKoZIzj0EAwIDgYwAMIGIAkIApDQqOpSjrvHcv/i+EP0QCGpAlP/g RgYDLBaE6wjs9mIFmAQh2rwZif42I87jWHiiecciyLuSjPvFOtsuUgOkRc0CQgCp cMCF3kxDhEQ74RIhJo35+34yQ4uT/1jcH5znXvF3twIoN9lw6V3GD+r8ACcwIpBX VQ0V67yTEpXRkIiw0pF77g== -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679161 next edit "Fortinet_SSL_ED25519" set password ENC kiHrN/XlAJTvb8N5Aj6sLKNvI1zcZl8LpGUiTQpEemy/zbfStSPbaaarESCorN9ua11Ic9HBPc41IScsbtyoXZD0vh1XG6Q55DKbuDmcbCa4P+38jav2fmQgw3dAB9+/4+z1x2LKiHo1d8b/1qw9MIaiUo9La458rWtuG5fnKKP5pqB1/hFMBuJoP6pHYromoimZ9w== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIGKME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAhXNtg3JWuKFgICCAAw DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQI8/omXG/BwbIEOEA1quj9ZTfnV8Fi Zie1yyuyVU6E0Vjy/qqJuFD2egq2omosoOgLlwDfpAzWhDVI1XGTqAH/Q+/9 -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICFDCCAcagAwIBAgIIAhddFiWr8OYwBQYDK2VwMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAe Fw0yMzEwMzEwOTU4MTJaFw0yNjAyMDIwOTU4MTJaMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAq MAUGAytlcAMhAMrG5M/AIcegnU6Ccd1hR8CxiYrbXpwhVWaL//Yjm7C6oyIwIDAJ BgNVHRMEAjAAMBMGA1UdJQQMMAoGCCsGAQUFBwMBMAUGAytlcANBACPZ7i6MhFTs cu5uGIhE/K3hzhlfT29aA+UXweUSKY89g3nNuxly32vnZ0zUNkjHeXUfJMrdlY1O hrgwkt/whAE= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679162 next edit "Fortinet_SSL_ED448" set password ENC u3IdMXExffAw6XiCBcfEnMJRsQua8Qa5h85QAaJty0T8zCVKYlnbU1mjeCWy5ckHYRSNpujAQ7kR8UwVhldiwKkDedox8sKDp1sHRt4+5gFIFrKoh075tlb7Kd2VrPQkO3E0GpEkD6bZjGu/2iTk3ylvJPCalRZKZRsUDcPoy9jZojpqKGABNec0NApkTE1ku/2Yvg== set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " set private-key "-----BEGIN ENCRYPTED PRIVATE KEY----- MIGiME4GCSqGSIb3DQEFDTBBMCkGCSqGSIb3DQEFDDAcBAgljm0+8/SpTAICCAAw DAYIKoZIhvcNAgkFADAUBggqhkiG9w0DBwQIMMFbWLxyCBsEUGdDIv789YLtcShm 5GNLfHcl5Gg+Ys+QQcoPSQWBYoYB8wJBamCWYloo8S9FtFUHemRg1o9MZZC1f5Lq 7UPLflFGPdjkWmAi8OHo3mniPdTj -----END ENCRYPTED PRIVATE KEY-----" set certificate "-----BEGIN CERTIFICATE----- MIICXzCCAd+gAwIBAgIIGxRTFQ/GkYMwBQYDK2VxMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTAe Fw0yMzEwMzEwOTU4MTJaFw0yNjAyMDIwOTU4MTJaMIGdMQswCQYDVQQGEwJVUzET MBEGA1UECAwKQ2FsaWZvcm5pYTESMBAGA1UEBwwJU3Vubnl2YWxlMREwDwYDVQQK DAhGb3J0aW5ldDESMBAGA1UECwwJRm9ydGlHYXRlMRkwFwYDVQQDDBBGR1ZNMDJU TTIzMDE1NzQyMSMwIQYJKoZIhvcNAQkBFhRzdXBwb3J0QGZvcnRpbmV0LmNvbTBD MAUGAytlcQM6AExzFj3bzTG7KYgM0ciOWYeS39HkS3WPU539iHkiau0RrkQfMMx3 oHvX3ZX3K0X4BRp+yKQh4b1fgKMiMCAwCQYDVR0TBAIwADATBgNVHSUEDDAKBggr BgEFBQcDATAFBgMrZXEDcwBetepvMy/hcSg7gRsPTy4ttY3lq84oUW3dN7fN4vvf /YVkQHKFZLE9XU6dsnYnLhxbdvLu9h/tGgBLcu+/Dt+e2FOnoJEZ5X+1VIY1B5QV eWaCdQKgIuuADbX9dr9Q4a0BgA+bUROipXJZh2PJ+muvGQA= -----END CERTIFICATE-----" set range global set source factory set last-updated 1698679163 next end config ips sensor edit "default" set comment "Prevent critical attacks." config entries edit 1 set severity medium high critical next end next edit "sniffer-profile" set comment "Monitor IPS attacks." config entries edit 1 set severity medium high critical next end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." config entries edit 1 set severity medium high critical next end next end config firewall proxy-address edit "IPv4-address" set uuid d59a963c-7737-51ee-b164-72104cc4edb2 set type host-regex set host-regex "^([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])(\\.([0-9]|[1-9][0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])){3}$" next edit "IPv6-address" set uuid d59a98d0-7737-51ee-3840-6ee354781585 set type host-regex set host-regex "^\\[(([0-9a-f]{0,4}:){1,7}[0-9a-f]{1,4})\\]$" next end config web-proxy global set proxy-fqdn "default.fqdn" end config application list edit "default" set comment "Monitor all applications." config entries edit 1 set action pass next end next edit "sniffer-profile" set comment "Monitor all applications." unset options config entries edit 1 set action pass next end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." set deep-app-inspection disable config entries edit 1 set action pass set log disable next end next end config dlp data-type edit "keyword" next edit "regex" next edit "hex" next edit "mip-label" next edit "credit-card" next edit "ssn-us" next end config dlp profile edit "default" set comment "Default profile." next edit "sniffer-profile" set comment "Log a summary of email and web traffic." set summary-proto smtp pop3 imap http-get http-post next end config webfilter ips-urlfilter-setting end config webfilter ips-urlfilter-setting6 end config log threat-weight config web edit 1 set category 26 set level high next edit 2 set category 61 set level high next edit 3 set category 86 set level high next edit 4 set category 1 set level medium next edit 5 set category 3 set level medium next edit 6 set category 4 set level medium next edit 7 set category 5 set level medium next edit 8 set category 6 set level medium next edit 9 set category 12 set level medium next edit 10 set category 59 set level medium next edit 11 set category 62 set level medium next edit 12 set category 83 set level medium next edit 13 set category 72 next edit 14 set category 14 next edit 15 set category 96 set level medium next end config application edit 1 set category 2 next edit 2 set category 6 set level medium next end end config icap profile edit "default" config icap-headers edit 1 set name "X-Authenticated-User" set content "$auth_user_uri" set base64-encoding enable next edit 2 set name "X-Authenticated-Groups" set content "$auth_group_uri" set base64-encoding enable next end next end config user fortitoken edit "FTKMOB3AAE46198E" set license "FTMTRIAL01250EA5" next edit "FTKMOB3AEB4E2CE4" set license "FTMTRIAL01250EA5" next end config user setting set auth-cert "Fortinet_Factory" end config user group edit "SSO_Guest_Users" next end config vpn ssl settings set servercert '' set port 443 end config voip profile edit "default" set comment "Default VoIP profile." config sip end next end config system sdwan set status enable config zone edit "virtual-wan-link" next edit "DIA-Out" next end config members edit 1 set interface "port2" set zone "DIA-Out" set gateway 2.2.2.254 next edit 2 set interface "port3" set zone "DIA-Out" set gateway 12.12.12.254 next end config health-check edit "Default_DNS" set system-dns enable set interval 1000 set probe-timeout 1000 set recoverytime 10 config sla edit 1 set latency-threshold 250 set jitter-threshold 50 set packetloss-threshold 5 next end next edit "Default_Office_365" set server "www.office.com" set protocol http set interval 1000 set probe-timeout 1000 set recoverytime 10 config sla edit 1 set latency-threshold 250 set jitter-threshold 50 set packetloss-threshold 5 next end next edit "Default_Gmail" set server "gmail.com" set interval 1000 set probe-timeout 1000 set recoverytime 10 config sla edit 1 set latency-threshold 250 set jitter-threshold 50 set packetloss-threshold 2 next end next edit "Default_AWS" set server "aws.amazon.com" set protocol http set interval 1000 set probe-timeout 1000 set recoverytime 10 config sla edit 1 set latency-threshold 250 set jitter-threshold 50 set packetloss-threshold 5 next end next edit "Default_Google Search" set server "www.google.com" set protocol http set interval 1000 set probe-timeout 1000 set recoverytime 10 config sla edit 1 set latency-threshold 250 set jitter-threshold 50 set packetloss-threshold 5 next end next edit "Default_FortiGuard" set server "fortiguard.com" set protocol http set interval 1000 set probe-timeout 1000 set recoverytime 10 config sla edit 1 set latency-threshold 250 set jitter-threshold 50 set packetloss-threshold 5 next end next edit "Internet_Google" set server "8.8.8.8" set members 1 2 next end config service edit 1 set name "DIA_Internet" set mode sla set dst "all" set src "LAN_10.2.0.0" config sla edit "Default_Google Search" set id 1 next end set priority-members 1 2 set priority-zone "DIA-Out" next end end config vpn ipsec phase1-interface edit "VPN1" set type dynamic set interface "port2" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes256-sha256 set add-route disable set dpd on-idle set comments "VPN: VPN1 [Created by IPSEC Template]" set auto-discovery-sender enable set network-overlay enable set network-id 5 set ipv4-start-ip 172.31.128.1 set ipv4-end-ip 172.31.159.252 set ipv4-netmask 255.255.224.0 set psksecret ENC ** set dpd-retryinterval 60 next edit "VPN2" set type dynamic set interface "port3" set ike-version 2 set peertype any set net-device disable set mode-cfg enable set proposal aes256-sha256 set add-route disable set dpd on-idle set comments "VPN: VPN2 [Created by IPSEC Template]" set auto-discovery-sender enable set network-overlay enable set network-id 6 set ipv4-start-ip 172.31.160.1 set ipv4-end-ip 172.31.191.252 set ipv4-netmask 255.255.224.0 set psksecret ENC ** set dpd-retryinterval 60 next edit "To-Hub1" set interface "port2" set peertype any set net-device disable set proposal aes128-sha256 aes256-sha256 aes128-sha1 aes256-sha1 set comments "VPN: To-Hub1 (Created by VPN wizard)" set wizard-type static-fortigate set remote-gw 1.1.1.1 set psksecret ENC ** next end config vpn ipsec phase2-interface edit "VPN1" set phase1name "VPN1" set proposal aes256-sha256 set comments "VPN: VPN1 [Created by IPSEC Template]" next edit "VPN2" set phase1name "VPN2" set proposal aes256-sha256 set comments "VPN: VPN2 [Created by IPSEC Template]" next edit "To-Hub1" set phase1name "To-Hub1" set proposal aes128-sha1 aes256-sha1 aes128-sha256 aes256-sha256 aes128gcm aes256gcm chacha20poly1305 set comments "VPN: To-Hub1 (Created by VPN wizard)" set src-addr-type name set dst-addr-type name set src-name "To-Hub1_local" set dst-name "To-Hub1_remote" next end config dnsfilter profile edit "default" set comment "Default dns filtering." config ftgd-dns config filters edit 1 set category 2 next edit 2 set category 7 next edit 3 set category 8 next edit 4 set category 9 next edit 5 set category 11 next edit 6 set category 12 next edit 7 set category 13 next edit 8 set category 14 next edit 9 set category 15 next edit 10 set category 16 next edit 11 next edit 12 set category 57 next edit 13 set category 63 next edit 14 set category 64 next edit 15 set category 65 next edit 16 set category 66 next edit 17 set category 67 next edit 18 set category 26 set action block next edit 19 set category 61 set action block next edit 20 set category 86 set action block next edit 21 set category 88 set action block next edit 22 set category 90 set action block next edit 23 set category 91 set action block next edit 24 set category 96 set action block next edit 25 set category 98 set action block next edit 26 set category 99 set action block next end end set block-botnet enable next end config antivirus settings set machine-learning-detection enable set grayware enable end config antivirus profile edit "default" set comment "Scan files and block viruses." config http set av-scan block end config ftp set av-scan block end config imap set av-scan block set executables virus end config pop3 set av-scan block set executables virus end config smtp set av-scan block set executables virus end next edit "sniffer-profile" set comment "Scan files and monitor viruses." config http set av-scan block end config ftp set av-scan block end config imap set av-scan block set executables virus end config pop3 set av-scan block set executables virus end config smtp set av-scan block set executables virus end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." config http set av-scan block end config ftp set av-scan block end config imap set av-scan block set executables virus end config pop3 set av-scan block set executables virus end config smtp set av-scan block set executables virus end next end config file-filter profile edit "default" set comment "File type inspection." next edit "sniffer-profile" set comment "File type inspection." next end config webfilter profile edit "default" set comment "Default web filtering." config ftgd-wf unset options config filters edit 1 set action block next edit 2 set category 2 set action block next edit 3 set category 7 set action block next edit 4 set category 8 set action block next edit 5 set category 9 set action block next edit 6 set category 11 set action block next edit 7 set category 13 set action block next edit 8 set category 14 set action block next edit 9 set category 15 set action block next edit 10 set category 16 set action block next edit 11 set category 26 set action block next edit 12 set category 57 set action block next edit 13 set category 61 set action block next edit 14 set category 63 set action block next edit 15 set category 64 set action block next edit 16 set category 65 set action block next edit 17 set category 66 set action block next edit 18 set category 67 set action block next edit 19 set category 83 set action block next edit 20 set category 86 set action block next edit 21 set category 88 set action block next edit 22 set category 90 set action block next edit 23 set category 91 set action block next edit 24 set category 96 set action block next edit 25 set category 98 set action block next edit 26 set category 99 set action block next edit 27 set category 1 next edit 28 set category 3 next edit 29 set category 4 next edit 30 set category 5 next edit 31 set category 6 next edit 32 set category 12 next edit 33 set category 59 next edit 34 set category 62 next end end next edit "sniffer-profile" set comment "Monitor web traffic." config ftgd-wf config filters edit 1 next edit 2 set category 1 next edit 3 set category 2 next edit 4 set category 3 next edit 5 set category 4 next edit 6 set category 5 next edit 7 set category 6 next edit 8 set category 7 next edit 9 set category 8 next edit 10 set category 9 next edit 11 set category 11 next edit 12 set category 12 next edit 13 set category 13 next edit 14 set category 14 next edit 15 set category 15 next edit 16 set category 16 next edit 17 set category 17 next edit 18 set category 18 next edit 19 set category 19 next edit 20 set category 20 next edit 21 set category 23 next edit 22 set category 24 next edit 23 set category 25 next edit 24 set category 26 next edit 25 set category 28 next edit 26 set category 29 next edit 27 set category 30 next edit 28 set category 31 next edit 29 set category 33 next edit 30 set category 34 next edit 31 set category 35 next edit 32 set category 36 next edit 33 set category 37 next edit 34 set category 38 next edit 35 set category 39 next edit 36 set category 40 next edit 37 set category 41 next edit 38 set category 42 next edit 39 set category 43 next edit 40 set category 44 next edit 41 set category 46 next edit 42 set category 47 next edit 43 set category 48 next edit 44 set category 49 next edit 45 set category 50 next edit 46 set category 51 next edit 47 set category 52 next edit 48 set category 53 next edit 49 set category 54 next edit 50 set category 55 next edit 51 set category 56 next edit 52 set category 57 next edit 53 set category 58 next edit 54 set category 59 next edit 55 set category 61 next edit 56 set category 62 next edit 57 set category 63 next edit 58 set category 64 next edit 59 set category 65 next edit 60 set category 66 next edit 61 set category 67 next edit 62 set category 68 next edit 63 set category 69 next edit 64 set category 70 next edit 65 set category 71 next edit 66 set category 72 next edit 67 set category 75 next edit 68 set category 76 next edit 69 set category 77 next edit 70 set category 78 next edit 71 set category 79 next edit 72 set category 80 next edit 73 set category 81 next edit 74 set category 82 next edit 75 set category 83 next edit 76 set category 84 next edit 77 set category 85 next edit 78 set category 86 next edit 79 set category 87 next edit 80 set category 88 next edit 81 set category 89 next edit 82 set category 90 next edit 83 set category 91 next edit 84 set category 92 next edit 85 set category 93 next edit 86 set category 94 next edit 87 set category 95 next edit 88 set category 96 next edit 89 set category 97 next edit 90 set category 98 next edit 91 set category 99 next end end next edit "wifi-default" set comment "Default configuration for offloading WiFi traffic." set options block-invalid-url config ftgd-wf unset options config filters edit 1 set action block next edit 2 set category 2 set action block next edit 3 set category 7 set action block next edit 4 set category 8 set action block next edit 5 set category 9 set action block next edit 6 set category 11 set action block next edit 7 set category 13 set action block next edit 8 set category 14 set action block next edit 9 set category 15 set action block next edit 10 set category 16 set action block next edit 11 set category 26 set action block next edit 12 set category 57 set action block next edit 13 set category 61 set action block next edit 14 set category 63 set action block next edit 15 set category 64 set action block next edit 16 set category 65 set action block next edit 17 set category 66 set action block next edit 18 set category 67 set action block next edit 19 set category 83 set action block next edit 20 set category 86 set action block next edit 21 set category 88 set action block next edit 22 set category 90 set action block next edit 23 set category 91 set action block next edit 24 set category 96 set action block next edit 25 set category 98 set action block next edit 26 set category 99 set action block next edit 27 set category 1 next edit 28 set category 3 next edit 29 set category 4 next edit 30 set category 5 next edit 31 set category 6 next edit 32 set category 12 next edit 33 set category 59 next edit 34 set category 62 next end end next end config webfilter search-engine edit "google" set hostname ".*\\.google\\..*" set url "^\\/((custom|search|images|videosearch|webhp)\\?)" set query "q=" set safesearch url set safesearch-str "&safe=active" next edit "yahoo" set hostname ".*\\.yahoo\\..*" set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" set query "p=" set safesearch url set safesearch-str "&vm=r" next edit "bing" set hostname ".*\\.bing\\..*" set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" set query "q=" set safesearch header next edit "yandex" set hostname "yandex\\..*" set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" set query "text=" set safesearch url set safesearch-str "&family=yes" next edit "youtube" set hostname ".*youtube.*" set safesearch header next edit "baidu" set hostname ".*\\.baidu\\.com" set url "^\\/s?\\?" set query "wd=" next edit "baidu2" set hostname ".*\\.baidu\\.com" set url "^\\/(ns|q|m|i|v)\\?" set query "word=" next edit "baidu3" set hostname "tieba\\.baidu\\.com" set url "^\\/f\\?" set query "kw=" next edit "vimeo" set hostname ".*vimeo.*" set url "^\\/search\\?" set query "q=" set safesearch header next edit "yt-scan-1" set url "www.youtube.com/user/" set safesearch yt-scan next edit "yt-scan-2" set url "www.youtube.com/youtubei/v1/browse" set safesearch yt-scan next edit "yt-scan-3" set url "www.youtube.com/youtubei/v1/player" set safesearch yt-scan next edit "yt-scan-4" set url "www.youtube.com/youtubei/v1/navigator" set safesearch yt-scan next edit "yt-channel" set url "www.youtube.com/channel" set safesearch yt-channel next edit "yt-pattern" set url "youtube.com/channel/" set safesearch yt-pattern next edit "twitter" set hostname "twitter\\.com" set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" set query "variables=" set safesearch translate set safesearch-str "regex::%22screen_name%22:%22([A-Za-z0-9_]{4,15})%22::twitter.com/\\1" next edit "google-translate-1" set hostname "translate\\.google\\..*" set url "^\\/translate" set query "u=" set safesearch translate set safesearch-str "regex::(?:\\?|&)u=([^&]+)::\\1" next edit "google-translate-2" set hostname ".*\\.translate\\.goog" set url "^\\/" set safesearch translate set safesearch-str "case::google-translate" next end config emailfilter profile edit "sniffer-profile" set comment "Malware and phishing URL monitoring." config imap end config pop3 end config smtp end next edit "default" set comment "Malware and phishing URL filtering." config imap end config pop3 end config smtp end next end config wanopt settings set host-id "default-id" end config wanopt profile edit "default" set comments "Default WANopt profile." next end config log memory setting set status enable end config log null-device setting set status disable end config log setting set fwpolicy-implicit-log enable end config firewall schedule recurring edit "always" set day sunday monday tuesday wednesday thursday friday saturday next edit "default-darrp-optimize" set start 01:00 set end 01:30 set day sunday monday tuesday wednesday thursday friday saturday next end config firewall ssh local-key edit "Fortinet_SSH_RSA2048" set password ENC +z5+2wkXEkIQlv5SCU/2L2x8P82rKqHojbCH/nWym1181bBphMKBDR6osorq6ocOoEkSjsuO+TEeb+LrODQLmBRk9HZg3HyCeTuWwP0FXh2m+kLy6GuK6TnCQDkuTaBwn8d9cPGFGbe6+cHRUxFWW4nMN9CJeQX2Znnwn1xJFAIXUhFEkSkBsYrd//0ywHwcVUcxPw== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBahanz2Q yGZjjt6W+X4QyCAAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQC8afLHvVPl euBPs5PNsQnPb5F7vOe3JgcrFjrc9hhFYMF5AQGjV/XswGLrzx9A7PLVfVpvToEBCH8eZy Xzy/AG1HfKcsgHL5rUb/B12vFmrtSaEzMiV41s08Lpa7h0nGe7EYPfLSJU5BCcAXtAe0lQ ar6fp2z23YeybBGIXdKnfPWo+hsLNRblIKzjjSWngjJKaJOkq4LN9tD4a28Ol/896bNR6m Y0e63oFwXhPZ/vtoGyyoIw/yR965WR0N1J3C4VSkeBqs5MFN5iinUEkFJ8EW1XO/1KnAZt JOfufbzz2WyY25tf80H2XlX92r3fC2CbUuA/ST9d2YqXshqsiFchAAADwCFVMbg8UlwtPg zo5OCaAJCWxFKMNf1DxWwN1Qg1RvDTxELUthupVpVVsbjNxhV9XZml1k9Y9IRvMVZw+usj Gxfr4+FVzgrd+wFT+A27QBt0mn1CdNnXTNP1ZD0V3SyMSjep+H5/vQ7filzQ5pT1lgfWAH Kz8O3MkgJLJLEnQSYFN6WSBLlP4oQ1c6vSFdhnr+STr14PS2zpZxm0XUpQ4r6DmZ0l8met 2zKemiTG745/0MOQzCfQT/USoEsSJM2cF1ow8Y34CZYwsat79i8aNrsVmX8pFzBsSTPgkD OxDg3OvuXLQHHDMySSg1B3TPPsL2+zMX6ySnTjw/mKRiGtrthRlpfj8Ol6xsGMTmtnN/U2 I8biS47GUh7XkB7WKrFj3byQIXtSSs4ObOkgxTiGg9awQfa8ZN1wNx06qt1LW68ijPZ1QZ wOqhfdZIwLjh0M1PJxQcAo0v2BOKTlrXGQthLpdqGZCM6/ULoizsBhF6n4SVY7g7uf+9cL WNT+wdvurQCReXBvrfEktAJ9iciZ8akEmSo7rLAUe5DouuBIG0KyV70rZdBXy1aC69YHNt ulEreHP5E8RffFJlJvE9SfsPpI4FhYlR1Y4qetUORzqbgqxbSoUEDEvCK+l4kkYR3kASGh gvVHr2SIIJ+eWSva0k+ROe700//L+HgVGvW6B2vcxYW10TDW70M55ISw7ci8AQdUKxVO4B 3D5Yl8B83YG5wTCiDblMmj+Wv8jkPam6L9Qy9CbsIQ3Qc0ohPJxEhHsk1qZqaWHmwOafG4 rfZSHDYS9dsBYRQJL4b4G+uwMk4+6jRZF/DxqUZ1AhA2dpnEQHocgCw91GfA9ToDjOxGVh WKK5Z2bkL7iIuci6ucNBIWfCmNYArh4abJd604+X1lMIgXewD083b+GoLcj78680DSueVR 98xyfmIzX4CTSaTl1USBeLvCRa7nG6wxELf4u3prBCgYh38WcYUOetVi9SKqggZWPsB2QH GN7F9umYsBmJ+nIcrEtyDEjqmbVTLnRxf/5kFGHWA8cgI3VCnv4NWIDRhxr5X6w6vqvt+V N4jdSZhPuAxqF+eQSnMm3MplDYlEZdEOicGTpQVLxGqkb+sM3bTXmh2COrE4XqiGjv81CP kBm9QZSHEC82X0hlRauc4HIuM5YMQy1bitKmTmqsEQJuGqQEmY5ugRiJME3klIAAKBDJtT F8Kfk+9OjUakSJ/6LYAoSkZiHn6mFrX5u0ydgDMEU3eJfc1ggVLBIHqCWoZs+mkmwHNcOS Z5682Gxw== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC8afLHvVPleuBPs5PNsQnPb5F7vOe3JgcrFjrc9hhFYMF5AQGjV/XswGLrzx9A7PLVfVpvToEBCH8eZyXzy/AG1HfKcsgHL5rUb/B12vFmrtSaEzMiV41s08Lpa7h0nGe7EYPfLSJU5BCcAXtAe0lQar6fp2z23YeybBGIXdKnfPWo+hsLNRblIKzjjSWngjJKaJOkq4LN9tD4a28Ol/896bNR6mY0e63oFwXhPZ/vtoGyyoIw/yR965WR0N1J3C4VSkeBqs5MFN5iinUEkFJ8EW1XO/1KnAZtJOfufbzz2WyY25tf80H2XlX92r3fC2CbUuA/ST9d2YqXshqsiFch" set source built-in next edit "Fortinet_SSH_DSA1024" set password ENC 4eExdL7a5vAqXFlFrMxERAgF0ML4eldS70FjJULT3PhEFeMoL9Er6sEhNeLhn6UNlFDDB/I7IZ3gRnaB2hxZCkQN4aPY5Pg0suITHpkXg3b/EoDMG4SYY9A2P+qH+8dgd0Ms66zwqJ+q9NPTkxoKpz2+ngZMFWYRqEmfk5E+byVvvlDqlqveBcpH6RNqNd/XB9EGtA== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABB+lpNUv8 lSxAi6hWFKeq3DAAAAEAAAAAEAAAGyAAAAB3NzaC1kc3MAAACBAKONjXFbA57mYvY8D+J6 v+f8RJPESheMTnsCtAsVftEc0Ye+G8Hk7jEfDLPvdB+KixWwRYdRyDf5qYC80IbQT1n77P qgomytcxB3GUrpHA6cZZB1lUbccX2Qi0g7+LjYSRMKyWpnCzUuq+B/LnvSArtokqD2Qvqx XNDnD1wclExbAAAAFQDFtK5Zj/xTIssgibLwm9ytjpPLBwAAAIEAl5Y0Phxtq0zHBSxZ3a dWHK4y7ZnvyeQd5UCUCwwpVfaepKWMpurh3FprlwfDIHb83DWZ+7V7rP+YE61HLVIFPIMG 7GL1YfAaEY4CE0gW2Lxiw8YClnPU9kf02FWPSPO8tzEDAnV7wGoKPqsbL53ZMKuCI3S3fK 3UpgF3NjwTxwYAAACAV7c0aSjjJ6wcnUvGx/U6MoDk2TjPdulm73qW2Ljge+3NaK8DndcR dR1emNhmLnt1QwsI8LMbuELBTgVBJxaVrt5wIKeCKkSxUuKfHWoEpsHCPLcmSOMXfzFlC0 Yq1O07U9SnzK0b2lCnT7QBC5UncUNBAjaAb10Vum0oKdYMV8EAAAHgbIJVhBoFRazctcqF qwveefNSAnuOBxOIyel/7MGE1D7KDY22Tw0ZBaJPsAEVMwcmGKjavUrqCfWxRjo3JqR2xX E6D+J6lEH2wURooOCQ3oo714maUdSgHJ45ZX2FsYj8Jv4KITOgJ2I/TYHSU6zvTenDYHGY Aa+Yba4MzeWWQn2HPdIKpt8/lq3trelU3fIrbuoE3DgSDcgNShjveTmvtvTYVfNSM5o6tg 1nWEB/c59mrpBDQbTdcUzZNb/4p9Xh9ekEhzMl0bXbKEeZPo7/vUuimRNCoh5lUi3ELlD1 g06jIHgKEDukOrnjRSqL1wQBYLznH3I508l2OLKaYrrfGfiuapc7PhD3JtkCUxenROW6wc dTLv301EuxCv6vz9h3vqq4hLUtFoZSr6J0LLQ8YnH2sJ+O6cAdtUn43v7nK6u5bPRTmovp ixUfEZNWpflaSsBmzp6HpsZiUAccBcljlSHn3pzXo8zGqXqSymCZ/gguHnsv8MiMEEQefH N5QVfj8lOYYuaWKxyidvFjQNAlbXKmoLtTZSSErzV58abr65wxvwSUNaUtJdD0gKWi11Bh Los9Sbd+s2arU0xZxP58fF0rQiTZgyMC0AJrOgYKmP1gTdYrNsLfLoI/p/8nLDd5 -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-dss 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" set source built-in next edit "Fortinet_SSH_ECDSA256" set password ENC JtC8Mtbn2AwIS8u91QJIpX2O6ywBpJO4cV4euXlIJemP6+DDQ/W2NzJR1ok3FKrbUx6AiRCvxRH1XJiJNFD2WxAEKdYTmsq9WnFdytukozU/e7Tr69SyEgIvE55Kmc2VnaXY2QC3a2IBX0HZxnoNRZk+NQ0EFXEyFebu4XHNbPyGNLjKLHAS4E/2XPanOCwMdKiGug== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBUEIWEdm oozt8xqR83pnhGAAAAEAAAAAEAAABoAAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlz dHAyNTYAAABBBFbZAYtkHoDs7X0XWcQpFY7+QgWo3jZCKMOLchir/36XAkXcDpRTZDblVE sWCHpmvDNOyqvjlOp91MqB4ng7RSAAAACgtg4TKDJwZIdiJUlXihWRhXzweC9Qw/yTPIHl 9XlNRlNWkcqpv+XCnv8uShUY+RVCDryrQ7p8Z+Wk/6oSS1gMdtrVBECtqJi+8z1n2LDldf Kes5Idch9zeg57J5l5Vp+ZuL7DCg71IX0I0dZzrJ3AGPw0ARGrQqn5rq4y+QIbwfQAOpTQ QA/wUx0QYa/Q4Dtr9BsWu1saLA9nn2sNYABRCA== -----END OPENSSH PRIVATE KEY----- " set public-key "ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFbZAYtkHoDs7X0XWcQpFY7+QgWo3jZCKMOLchir/36XAkXcDpRTZDblVEsWCHpmvDNOyqvjlOp91MqB4ng7RSA=" set source built-in next edit "Fortinet_SSH_ECDSA384" set password ENC lHNRbm+CQFsjzjEcDbNH5DQuNstuyzSZ/sV4Gpd1NegogM7AbVC32/ro41gyFCr4hA2WQmBJT9Q0TA+63b7OQI0d5y6BePAnmfE35i/7HrJ6Os/a6JevkRRwuA5r/Y2C/M8XtC4gji/xzvo2oXeSOqLBVzVO3sahSfg+lgRDrQcaqYn2F/u43yVFY15BvS6eXZRFGA== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABAxpY0S/K RHWVlpa60tytDFAAAAEAAAAAEAAACIAAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlz dHAzODQAAABhBD4w+PkTKfTlh4/dMIcEdbi4oymAJjA+yrpGFXbx2KL7Cy4snkwR3jBvEG BraXMFwkxXGc1OT+fTsxAZHzoNwx2ll7ADbXgzTkdsNM380f368UhlvzbPBceNOs1VnHdq +QAAANBaMnUzfTK63oCuoS+5E1SdyD7D4vb0g8vsDR2ZVV7ALaUjD2WuI1Nfn778b0siSD 1nD6FKS8cRG4Ybvbamn2Wxi3j6y5XWN0pJKYX1Lby74SE+9M191rsTnod4ashBJuZ3Dn8t cPJ3nGnt6bAneg6XFPpOZexjyH8Jpe4YaxpN7tmD2Wral2y+60olKFWTBsdd129LA87yxt IefwuOE5zM8HBZCw4uRcx+x2+dJvw5W9+N+Bu2/28DMPxjNUdqcKu2bPA9soqa2sx30pCw lj2U -----END OPENSSH PRIVATE KEY----- " set public-key "ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBD4w+PkTKfTlh4/dMIcEdbi4oymAJjA+yrpGFXbx2KL7Cy4snkwR3jBvEGBraXMFwkxXGc1OT+fTsxAZHzoNwx2ll7ADbXgzTkdsNM380f368UhlvzbPBceNOs1VnHdq+Q==" set source built-in next edit "Fortinet_SSH_ECDSA521" set password ENC giEv7v7JpiHJFdirAUod3y7a4S5+KitGoOCQ+iV9JI+RUx30Zajqe+Bqtk+YTTHlCUK5SsZCc7suXgxgZxAOOhaaIv49gokh4KbLm3hxLx2h5oGQPTO41JLL9eXs6M1mm55XlbQ1c2vTr7fnDWY57IVnPVDSmpONg/6s7XpF2x0tdGzsL7G6HyvHDWcZkbCaKK5UOA== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABBipSymiC PYX3AfzwESKD81AAAAEAAAAAEAAACsAAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlz dHA1MjEAAACFBAA1kJ3cHM01pYvxZzkxWr5ujvqgpC/g6VfvHZe/u/njrqizuZ2NHu88hM UPGMcwRh4tB5ilo6fY6aOrPlOV2IM+agE5wzPygSi3ODl6FgS/Dfaauu4C4/eUNu4q3JNm iXHHa5WPUMUEcxB6HvUxj5voVM/QtqgZ+XL+3CCL17eZ0EyLPAAAAQA7HTCH1lVSp8VzB3 7VrzpDQthEq6zZcidasRH5G3cCdRoUP0lZE+6y3g7Gd4JdFpL/der3gxmehYx5Z/Snd6rP PT8d3Y7Qm8fyh97+Eqsy+MrQco7z9/RtWjF0uLMOwVagSwpgf1Q5P7GUCZPkGlCYaKDvuz kl+b3JsLBePPt4q6wF6MMh0BBxFFwHvMB+iLky4/KYivzUFFZpqchc+Ph1lcbR69aSAKhB rCFHnweRUr4Yzf58fT872CmrATE+ev6mHYPwlaKPfkMBRsiXTVoLZkMuXkQhbaNTUj6WVF nMIknNjab2cLpkBHtr2cmMNxFWH1zNM04ZHNRqsg/TSPNa -----END OPENSSH PRIVATE KEY----- " set public-key "ecdsa-sha2-nistp521 AAAAE2VjZHNhLXNoYTItbmlzdHA1MjEAAAAIbmlzdHA1MjEAAACFBAA1kJ3cHM01pYvxZzkxWr5ujvqgpC/g6VfvHZe/u/njrqizuZ2NHu88hMUPGMcwRh4tB5ilo6fY6aOrPlOV2IM+agE5wzPygSi3ODl6FgS/Dfaauu4C4/eUNu4q3JNmiXHHa5WPUMUEcxB6HvUxj5voVM/QtqgZ+XL+3CCL17eZ0EyLPA==" set source built-in next edit "Fortinet_SSH_ED25519" set password ENC Ur5I9eaCi8/jYVgACdxAjUt/EFd2o0XmeG/ewv/BwXh2Nlc6SQ9Ee1RYBsGx0giUEiJNWDw4/Rc5BhVbHUniWAxVVXcPcNtxfWwaFpLwSqNTKL/C7Pk300eDuiODlJ6cM9fu0kk0vH59Cjm3xwPbQKvDbFfu2WPanzgssgfjS8IsvXGSseQ8mXfTV51qMXUrQZK6Cw== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABD7aFcERQ ADYU54Mmj+V00ZAAAAEAAAAAEAAAAzAAAAC3NzaC1lZDI1NTE5AAAAINHxUkt35Uf2eM0P 75QBQ8GjTmnACMxY7RjQkdGndo/6AAAAkA0HXGq0zIcr6ogwt1npj2ikMYkIqIJgxZAnqU 55ShIiUMvJWsP2MJ3hak1kH5SN/prm1Uz3J4A3Hv7iHoQVVUKfPRpYIsfX13zuF4702uoa lTUF8FoMhURbuBDQgwp7PrHbaD1vElyq4VO/BYX2hnsku4spujT945qqiC0R2GO9lSJJSw s2Qd2Qc/3sJOh4Ng== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINHxUkt35Uf2eM0P75QBQ8GjTmnACMxY7RjQkdGndo/6" set source built-in next end config firewall ssh local-ca edit "Fortinet_SSH_CA" set password ENC JrrrkXocEHc+6ycOYkznEWfkknSgLJVHBQ2MN0yV207iWH8X6HFAcnzv8qA0gWGpgXeozTEwAIp5mIe21OydmLQXxbkdoPqjuM9SizLvzFpoOjNLjMUtIzQp8w34aMkqIQB2dk/FbSMgQ2bbUlfb0PSJA4MVAVmAC0K/dBBxg2PXZxXn0CMF/sQ9k14EIgi/5a77Cg== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABB3aBDAEl 2E0VPg0Wj19NXVAAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQCLHuUL5tZq bJYq1lqcjq+vITKqIKdg9FzXWtXwHreYJETnDS6BHODJMVFwvXtjKLa9W1IqoivONoTI19 XaO2Eprld2jRTKDyb6CdG1Qi7T3aCu5RuRdjTtt6L3b6gBV59e1GpX+9XKULm+l/Lan/e+ QLw4YoxxFNKyVJfVin+FDCZi4nUh3THG4ZVLpzSUm4IK0mrpeLmIq5g/AcaAkrqa3Qwn/J t4hbIDyXdz7o5hYn8RtRloyex11UwuoxDE+kWpPpFlO4feBH6C5M5zRkOAAs9ZGUNhDCy2 y+ZXcv6BxnEAr1dUh2mVLmBp3luFdKsvdn7JlyIoqYw22riQHAEfAAADwD74AEDg8cxvbo tTpulmeTqROa5f59wl1gRShZZT+9CEnZSXzxn+yI3LQGcTnzSknbWArwRGpBhfMCcDsIdz S6TEQh+zHGq9MBaNcHEiHD1Db1lcMAut/ItJwKmKBzTtRYlzA6uw/3+PNl4seMxf3fea0J LQaX3tsQVTxlQ03ZagjicGB7Kq9THymMcme/iPnr2nk88sRBn773Dwp7xfE54aVaa5pK5f 60b35o6mIG7FaB00S9zxbaLfQt0ETCMLHy/UtqZzJudsa7BTDz3tDJr/mJ/dyXy/0uG64S xCEhZiBMvQxRprTpnb7Ydc+xPf3Tpuj4kd3T6a39hB+zITHfUmnxdGN0hrxaQLf6BfZdGR xuuLkE3jcdou5+TbaTeGNlV6fOhSPr2ycwBxOOBCNp+X18H1aIUZFa3LYsPmIN0u2AH5z5 uR/jDMI6XC4EYfkqWuoBhDyr2n2dju6L7cRstXHhTCaA3ytpyl15jrCoQ2K6J8mjm6PzwL ZDur8w/74qUHY9vqcnWOQ5XZsJZDaqG/ZhPb4QvqvC3I3bOcv3S6gF2pgtxU1NdhjyXilH 7owaskJ+l5zPoVhczVnyWuW+CbpQZjwZw3Nwso50zfpfqWGimiO8vAeyJsbVbJPuT0qzHw q4VEgP+RO6Fjtb4pO8JYdUDMX/gJE1uqrGJrG/NPCz4wWhff1kMQBxRL+1cq/hZfy2mTC8 Cflo1nhEyXYQ5lKXW586bgn/OPQ02kcHxaDM+3QLqgaeLFtHdKOEwko1kfZnzXi/kPh4r/ NjFs3WgY96f5MD4oc1gyEkbqoCRn5V+K6ZlmMRsWK9p5gmOyX/Q7QK4BRzTwziti5jqjNT chy6SWATFOmbuEq5dIc1RA8A+KTJJwlaAZcuE9KBZribcRp0wx0CyCftrLhLnFYNBQ+Txv 6lOJ9ySluGGEZ4B0kFPc54OIu6G7UmnLkJJPkvoMI09im3kBnJEuBhh5MVqEcpGzk39wba CTYER7vP1Mrbigpngpq5WL+U4yXgfGxEjagfzXRokOatsK6dxaaRxou7M/2nGFL/oRMhHX 2DpuyrjCqhycdRAocxrYRrp6QzQrmMbnITIMnD9lMR/sJLUbeW10g2Lzhsgk9Y2DyCbZVk xGW1FSgHwiu9xaBUS6Acv2ZBbrUXO9MXTMXbo8GNl0JEZtpiX1bIQTGIc9fv8AVd7AtuOV YCIS5wq0fNswKVQKjR6mQ8HrOui6MuorY6+217oDLaCtnfqwvE05aXAJnGGdHTRHe2W5+b uPQOFbJQ== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCLHuUL5tZqbJYq1lqcjq+vITKqIKdg9FzXWtXwHreYJETnDS6BHODJMVFwvXtjKLa9W1IqoivONoTI19XaO2Eprld2jRTKDyb6CdG1Qi7T3aCu5RuRdjTtt6L3b6gBV59e1GpX+9XKULm+l/Lan/e+QLw4YoxxFNKyVJfVin+FDCZi4nUh3THG4ZVLpzSUm4IK0mrpeLmIq5g/AcaAkrqa3Qwn/Jt4hbIDyXdz7o5hYn8RtRloyex11UwuoxDE+kWpPpFlO4feBH6C5M5zRkOAAs9ZGUNhDCy2y+ZXcv6BxnEAr1dUh2mVLmBp3luFdKsvdn7JlyIoqYw22riQHAEf" set source built-in next edit "Fortinet_SSH_CA_Untrusted" set password ENC SnX/PrmJ3M5pe5MfEAIsdyWsOHnxNUuTgtzl7GrZP5a7GlZj0ECcJq8usRsuKLsmxkzjFFI/t01fO85rJcLdWow5hcTN0rAbKGyhUyWpGjmhXaPMZsPd+AT2VVdrTE3hIO41Wvrs/g64jvK5Qw4wK/uROmK5A4NeHf2GgrUZUvYgp+NTFe2enptAO4OiPzrqvydttA== set private-key "-----BEGIN OPENSSH PRIVATE KEY----- b3BlbnNzaC1rZXktdjEAAAAACmFlczI1Ni1jdHIAAAAGYmNyeXB0AAAAGAAAABA7x3Mu1I QrPgduO22h6J00AAAAEAAAAAEAAAEXAAAAB3NzaC1yc2EAAAADAQABAAABAQDTWyVH7cOd aNvvxLY4hLnWCucMEJSZPdaUKHB6IuHEAUe7b3u6l7N8Mp5IUKCxfyJGCyqKOMLubIpRqk KDATBGMktT4vRkBtg2UwVdDAmdYhzvmv3/FH/JEO+Q3zRb5McB+WBnhOlCISAG+1lM/BVo 5DZfORt8jsJRglrnF3SBa6YkCcH98I5N0j2q4Hc6Snl0J9iwR1A+Kf/7s4ZRNkML+xrd2R ikqBMc0AFYuSwD9rTncbf5Y+bnFEQiXxWPPjqw5VcErR8d7831vaS0ACg65BMqC4LVwAy9 blzKGkJ/kttVOt8ACq6YASwHsgK8p3R5IkeTlf+tcMG04jYFN8pZAAADwGrbNUia0HLTqt XgsFTgunq2s5hpknbk9zKN6EkUOz6/c6Cpp0V6PnSGuowHT2lw105FRrULxLpzClUVWhFP AAaz1ewf9sxg+100QPBJOBEUxEpCkakhogQg0eZAiWuqo70PXMuhCF+8zl+8qhIGq7CWvA 8sc8JPJkwtziWQ3/c6VPKpQuQ9lVDUTkaAEZLZ1wQ2tG/Jscc1qtcm4PjAmK6W8OTIpnp7 Or2cyU1XdQseNKZ4zNlsMUgaFugJNLnxGt7ZMJScQqj8bEbB3Np704vIx7GmBKi0VzI/AZ EEHesuEJGWmGMuWWp/DHK51BjYIz+WJidiwJ5rcf8nplf/TuFkoiw6q0NvDuYlj4RdzRA1 ucZqtgjqscvRtmr+Dr1BxiwgQ8Bb9lsV8pN27Lsyn4rKJuh/eUIpOPlGifygLCpN2nxEIX 5pRTg1IA/4btZdQGU6fe4ZjbDGqjsw/CLC16XXXh1AnqJo+1QbC9lAd/0Tx1m+xSrfJCnY B6sE3oqanFA6O3jwnjxRLYHENrOkuc3MPBiGX1dDWrHcMlTzsmkOQEN22RRwFWjYq7jx/9 mjm1e8i9dYf+GxyeJptKPT8g116CgNKqfynmYWMn2+CBsR3j/9y2fJvElndI1FTQAbOZjm RSy0PL+uxISJHhcoSKW9BrLDC1UIGjUHTGUr3fJRW0nIHJJH0gEHgrWAuCYj1PNUiBiQtf VYaZ1smfZN1mVdoqgca9HKiYZZqw0cWrxTdkEe5hCmAxfBnXLr2v8bfGVquD6JjdXrVBAY kl47jS+Yj/MHMY4jDHeRLSwQwswYQ1ZTmHs+qKLn6QN7PIsNgFAq+y21cexyq4k7HBELCC U7OUXhJIRqdhlGz6qDKX7AIPGT7NHjhTwOzbd9uvqXNAnEggQzRd/L7P5khfXEUJNVaSRR D4A9F9cup+TbJXhoHJcj9ZnXqsZE5gCZX3dXSxekKTxShoyFLrfWEOOrv8p9HlzRVIDeaD UENqsEouqXq50U1EDe6qOy4lFM2IUWR5uw/szjBVhmelGAp8fagUXePGcSPkZ8IdVu25t7 GGeNyz7Ck1mFWF0oP8UttxkzbzKHxtb2U8PzsasmEL8CMZJYEQI5fKj2LDGqGLK7EIVcj6 sI4D033U/qre+I3UN6IdxDIgjI3AVPQCG1nw60lHCDgeZyaM3A5Lc8XztE9tpfMQkZMMHW iWXTDOkRahtMsj139rknVfTs4bJ8yBnKbaVpi1fp4Uek3j7iXhWa7RAdSnDrai4DjryiP3 9+A83kSA== -----END OPENSSH PRIVATE KEY----- " set public-key "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDTWyVH7cOdaNvvxLY4hLnWCucMEJSZPdaUKHB6IuHEAUe7b3u6l7N8Mp5IUKCxfyJGCyqKOMLubIpRqkKDATBGMktT4vRkBtg2UwVdDAmdYhzvmv3/FH/JEO+Q3zRb5McB+WBnhOlCISAG+1lM/BVo5DZfORt8jsJRglrnF3SBa6YkCcH98I5N0j2q4Hc6Snl0J9iwR1A+Kf/7s4ZRNkML+xrd2RikqBMc0AFYuSwD9rTncbf5Y+bnFEQiXxWPPjqw5VcErR8d7831vaS0ACg65BMqC4LVwAy9blzKGkJ/kttVOt8ACq6YASwHsgK8p3R5IkeTlf+tcMG04jYFN8pZ" set source built-in next end config firewall ssh setting set caname "Fortinet_SSH_CA" set untrusted-caname "Fortinet_SSH_CA_Untrusted" set hostkey-rsa2048 "Fortinet_SSH_RSA2048" set hostkey-dsa1024 "Fortinet_SSH_DSA1024" set hostkey-ecdsa256 "Fortinet_SSH_ECDSA256" set hostkey-ecdsa384 "Fortinet_SSH_ECDSA384" set hostkey-ecdsa521 "Fortinet_SSH_ECDSA521" set hostkey-ed25519 "Fortinet_SSH_ED25519" end config firewall profile-protocol-options edit "default" set comment "All default services." config http set ports 80 unset options unset post-lang end config ftp set ports 21 set options splice end config imap set ports 143 set options fragmail end config mapi set ports 135 set options fragmail end config pop3 set ports 110 set options fragmail end config smtp set ports 25 set options fragmail splice end config nntp set ports 119 set options splice end config ssh unset options end config dns set ports 53 end config cifs set ports 445 unset options end next end config firewall ssl-ssh-profile edit "deep-inspection" set comment "Read-only deep inspection profile." config https set ports 443 set status deep-inspection end config ftps set ports 990 set status deep-inspection end config imaps set ports 993 set status deep-inspection end config pop3s set ports 995 set status deep-inspection end config smtps set ports 465 set status deep-inspection end config ssh set ports 22 set status disable end config dot set status disable end config ssl-exempt edit 1 set fortiguard-category 31 next edit 2 set fortiguard-category 33 next edit 3 set type wildcard-fqdn set wildcard-fqdn "adobe" next edit 4 set type wildcard-fqdn set wildcard-fqdn "Adobe Login" next edit 5 set type wildcard-fqdn set wildcard-fqdn "android" next edit 6 set type wildcard-fqdn set wildcard-fqdn "apple" next edit 7 set type wildcard-fqdn set wildcard-fqdn "appstore" next edit 8 set type wildcard-fqdn set wildcard-fqdn "auth.gfx.ms" next edit 9 set type wildcard-fqdn set wildcard-fqdn "citrix" next edit 10 set type wildcard-fqdn set wildcard-fqdn "dropbox.com" next edit 11 set type wildcard-fqdn set wildcard-fqdn "eease" next edit 12 set type wildcard-fqdn set wildcard-fqdn "firefox update server" next edit 13 set type wildcard-fqdn set wildcard-fqdn "fortinet" next edit 14 set type wildcard-fqdn set wildcard-fqdn "googleapis.com" next edit 15 set type wildcard-fqdn set wildcard-fqdn "google-drive" next edit 16 set type wildcard-fqdn set wildcard-fqdn "google-play2" next edit 17 set type wildcard-fqdn set wildcard-fqdn "google-play3" next edit 18 set type wildcard-fqdn set wildcard-fqdn "Gotomeeting" next edit 19 set type wildcard-fqdn set wildcard-fqdn "icloud" next edit 20 set type wildcard-fqdn set wildcard-fqdn "itunes" next edit 21 set type wildcard-fqdn set wildcard-fqdn "microsoft" next edit 22 set type wildcard-fqdn set wildcard-fqdn "skype" next edit 23 set type wildcard-fqdn set wildcard-fqdn "softwareupdate.vmware.com" next edit 24 set type wildcard-fqdn set wildcard-fqdn "verisign" next edit 25 set type wildcard-fqdn set wildcard-fqdn "Windows update 2" next edit 26 set type wildcard-fqdn set wildcard-fqdn "live.com" next edit 27 set type wildcard-fqdn set wildcard-fqdn "google-play" next edit 28 set type wildcard-fqdn set wildcard-fqdn "update.microsoft.com" next edit 29 set type wildcard-fqdn set wildcard-fqdn "swscan.apple.com" next edit 30 set type wildcard-fqdn set wildcard-fqdn "autoupdate.opera.com" next edit 31 set type wildcard-fqdn set wildcard-fqdn "cdn-apple" next edit 32 set type wildcard-fqdn set wildcard-fqdn "mzstatic-apple" next end next edit "custom-deep-inspection" set comment "Customizable deep inspection profile." config https set ports 443 set status deep-inspection end config ftps set ports 990 set status deep-inspection end config imaps set ports 993 set status deep-inspection end config pop3s set ports 995 set status deep-inspection end config smtps set ports 465 set status deep-inspection end config ssh set ports 22 set status disable end config dot set status disable end config ssl-exempt edit 1 set fortiguard-category 31 next edit 2 set fortiguard-category 33 next edit 3 set type wildcard-fqdn set wildcard-fqdn "adobe" next edit 4 set type wildcard-fqdn set wildcard-fqdn "Adobe Login" next edit 5 set type wildcard-fqdn set wildcard-fqdn "android" next edit 6 set type wildcard-fqdn set wildcard-fqdn "apple" next edit 7 set type wildcard-fqdn set wildcard-fqdn "appstore" next edit 8 set type wildcard-fqdn set wildcard-fqdn "auth.gfx.ms" next edit 9 set type wildcard-fqdn set wildcard-fqdn "citrix" next edit 10 set type wildcard-fqdn set wildcard-fqdn "dropbox.com" next edit 11 set type wildcard-fqdn set wildcard-fqdn "eease" next edit 12 set type wildcard-fqdn set wildcard-fqdn "firefox update server" next edit 13 set type wildcard-fqdn set wildcard-fqdn "fortinet" next edit 14 set type wildcard-fqdn set wildcard-fqdn "googleapis.com" next edit 15 set type wildcard-fqdn set wildcard-fqdn "google-drive" next edit 16 set type wildcard-fqdn set wildcard-fqdn "google-play2" next edit 17 set type wildcard-fqdn set wildcard-fqdn "google-play3" next edit 18 set type wildcard-fqdn set wildcard-fqdn "Gotomeeting" next edit 19 set type wildcard-fqdn set wildcard-fqdn "icloud" next edit 20 set type wildcard-fqdn set wildcard-fqdn "itunes" next edit 21 set type wildcard-fqdn set wildcard-fqdn "microsoft" next edit 22 set type wildcard-fqdn set wildcard-fqdn "skype" next edit 23 set type wildcard-fqdn set wildcard-fqdn "softwareupdate.vmware.com" next edit 24 set type wildcard-fqdn set wildcard-fqdn "verisign" next edit 25 set type wildcard-fqdn set wildcard-fqdn "Windows update 2" next edit 26 set type wildcard-fqdn set wildcard-fqdn "live.com" next edit 27 set type wildcard-fqdn set wildcard-fqdn "google-play" next edit 28 set type wildcard-fqdn set wildcard-fqdn "update.microsoft.com" next edit 29 set type wildcard-fqdn set wildcard-fqdn "swscan.apple.com" next edit 30 set type wildcard-fqdn set wildcard-fqdn "autoupdate.opera.com" next edit 31 set type wildcard-fqdn set wildcard-fqdn "cdn-apple" next edit 32 set type wildcard-fqdn set wildcard-fqdn "mzstatic-apple" next end next edit "no-inspection" set comment "Read-only profile that does no inspection." config https set status disable end config ftps set status disable end config imaps set status disable end config pop3s set status disable end config smtps set status disable end config ssh set ports 22 set status disable end config dot set status disable end next edit "certificate-inspection" set comment "Read-only SSL handshake inspection profile." config https set ports 443 set status certificate-inspection end config ftps set status disable end config imaps set status disable end config pop3s set status disable end config smtps set status disable end config ssh set ports 22 set status disable end config dot set status disable end next end config waf profile edit "default" config signature config main-class 100000000 set action block set severity high end config main-class 20000000 end config main-class 30000000 set status enable set action block set severity high end config main-class 40000000 end config main-class 50000000 set status enable set action block set severity high end config main-class 60000000 end config main-class 70000000 set status enable set action block set severity high end config main-class 80000000 set status enable set severity low end config main-class 110000000 set status enable set severity high end config main-class 90000000 set status enable set action block set severity high end set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002 end config constraint config header-length set status enable set log enable set severity low end config content-length set status enable set log enable set severity low end config param-length set status enable set log enable set severity low end config line-length set status enable set log enable set severity low end config url-param-length set status enable set log enable set severity low end config version set log enable end config method set action block set log enable end config hostname set action block set log enable end config malformed set log enable end config max-cookie set status enable set log enable set severity low end config max-header-line set status enable set log enable set severity low end config max-url-param set status enable set log enable set severity low end config max-range-segment set status enable set log enable set severity high end end next end config firewall policy edit 1 set status disable set name "All" set uuid fb593cbc-7812-51ee-e808-0fd06eeb7dc6 set srcintf "port1" set dstintf "any" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all set nat enable next edit 2 set name "VPN to Local" set uuid 74bac4ee-78af-51ee-e98e-8864f8f7adac set srcintf "VPN1" "VPN2" set dstintf "HUB2-Lo" "port1" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all next edit 6 set name "From Hub to VPNs" set uuid d103ffae-a0e1-51ee-18ca-1f66749d4038 set srcintf "port1" set dstintf "VPN1" "VPN2" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all set comments " (Reverse of VPN to Local) ()" next edit 3 set name "Branch-to-Branch" set uuid 2772adf0-78b4-51ee-1805-6b8867a6bfd7 set srcintf "VPN1" "VPN2" set dstintf "VPN1" "VPN2" set action accept set srcaddr "all" set dstaddr "all" set schedule "always" set service "ALL" set logtraffic all next edit 4 set name "vpn_To-Hub1_local_0" set uuid 02e3c836-821c-51ee-b27c-08ac52abb95f set srcintf "port1" set dstintf "To-Hub1" set action accept set srcaddr "To-Hub1_local" set dstaddr "To-Hub1_remote" set schedule "always" set service "ALL" set comments "VPN: To-Hub1 (Created by VPN wizard)" next edit 5 set name "vpn_To-Hub1_remote_0" set uuid 034d11ba-821c-51ee-423f-291510b69db1 set srcintf "To-Hub1" set dstintf "port1" set action accept set srcaddr "To-Hub1_remote" set dstaddr "To-Hub1_local" set schedule "always" set service "ALL" set comments "VPN: To-Hub1 (Created by VPN wizard)" next end config switch-controller security-policy 802-1X edit "802-1X-policy-default" set user-group "SSO_Guest_Users" set mac-auth-bypass disable set open-auth disable set eap-passthru enable set eap-auto-untagged-vlans enable set guest-vlan disable set auth-fail-vlan disable set framevid-apply enable set radius-timeout-overwrite disable set authserver-timeout-vlan disable next end config switch-controller security-policy local-access edit "default" set mgmt-allowaccess https ping ssh set internal-allowaccess https ping ssh next end config switch-controller lldp-profile edit "default" set med-tlvs inventory-management network-policy location-identification set auto-isl disable config med-network-policy edit "voice" next edit "voice-signaling" next edit "guest-voice" next edit "guest-voice-signaling" next edit "softphone-voice" next edit "video-conferencing" next edit "streaming-video" next edit "video-signaling" next end config med-location-service edit "coordinates" next edit "address-civic" next edit "elin-number" next end next edit "default-auto-isl" next edit "default-auto-mclag-icl" set auto-mclag-icl enable next end config switch-controller qos dot1p-map edit "voice-dot1p" set priority-0 queue-4 set priority-1 queue-4 set priority-2 queue-3 set priority-3 queue-2 set priority-4 queue-3 set priority-5 queue-1 set priority-6 queue-2 set priority-7 queue-2 next end config switch-controller qos ip-dscp-map edit "voice-dscp" config map edit "1" set cos-queue 1 set value 46 next edit "2" set cos-queue 2 set value 24,26,48,56 next edit "5" set cos-queue 3 set value 34 next end next end config switch-controller qos queue-policy edit "default" set schedule round-robin set rate-by kbps config cos-queue edit "queue-0" next edit "queue-1" next edit "queue-2" next edit "queue-3" next edit "queue-4" next edit "queue-5" next edit "queue-6" next edit "queue-7" next end next edit "voice-egress" set schedule weighted set rate-by kbps config cos-queue edit "queue-0" next edit "queue-1" set weight 0 next edit "queue-2" set weight 6 next edit "queue-3" set weight 37 next edit "queue-4" set weight 12 next edit "queue-5" next edit "queue-6" next edit "queue-7" next end next end config switch-controller qos qos-policy edit "default" next edit "voice-qos" set trust-dot1p-map "voice-dot1p" set trust-ip-dscp-map "voice-dscp" set queue-policy "voice-egress" next end config switch-controller storm-control-policy edit "default" set description "default storm control on all port" next edit "auto-config" set description "storm control policy for fortilink-isl-icl port" set storm-control-mode disabled next end config switch-controller auto-config policy edit "pse" next edit "default" next edit "default-icl" set poe-status disable set igmp-flood-report enable set igmp-flood-traffic enable next end config switch-controller initial-config template edit "_default" set vlanid 1 next edit "quarantine" set vlanid 4093 set dhcp-server enable next edit "rspan" set vlanid 4092 set dhcp-server enable next edit "voice" set vlanid 4091 next edit "video" set vlanid 4090 next edit "onboarding" set vlanid 4089 next edit "nac_segment" set vlanid 4088 set dhcp-server enable next end config switch-controller switch-profile edit "default" next end config switch-controller ptp settings set mode disable end config switch-controller ptp policy edit "default" set status enable next end config switch-controller remote-log edit "syslogd" next edit "syslogd2" next end config wireless-controller setting set darrp-optimize-schedules "default-darrp-optimize" end config wireless-controller wids-profile edit "default" set comment "Default WIDS profile." set ap-scan enable set wireless-bridge enable set deauth-broadcast enable set null-ssid-probe-resp enable set long-duration-attack enable set invalid-mac-oui enable set weak-wep-iv enable set auth-frame-flood enable set assoc-frame-flood enable set spoofed-deauth enable set asleap-attack enable set eapol-start-flood enable set eapol-logoff-flood enable set eapol-succ-flood enable set eapol-fail-flood enable set eapol-pre-succ-flood enable set eapol-pre-fail-flood enable next edit "default-wids-apscan-enabled" set ap-scan enable next end config wireless-controller ble-profile edit "fortiap-discovery" set advertising ibeacon eddystone-uid eddystone-url set ibeacon-uuid "wtp-uuid" next end config router prefix-list edit "all_prefixes" config rule edit 1 set prefix any unset ge unset le next end next end config router route-map edit "port1_only" config rule edit 1 set match-interface "port1" unset set-ip-prefsrc next edit 2 set action deny set match-ip-address "all_prefixes" unset set-ip-prefsrc next end next edit "allowed-interfaces" config rule edit 1 set match-interface "HUB2-Lo" unset set-ip-prefsrc next edit 2 set match-interface "port1" unset set-ip-prefsrc next edit 3 set action deny set match-ip-address "all_prefixes" unset set-ip-prefsrc next end next end config router rip config redistribute "connected" end config redistribute "static" end config redistribute "ospf" end config redistribute "bgp" end config redistribute "isis" end end config router ripng config redistribute "connected" end config redistribute "static" end config redistribute "ospf" end config redistribute "bgp" end config redistribute "isis" end end config router static edit 3 set dst 11.11.11.11 255.255.255.255 set gateway 12.12.12.254 set device "port3" next edit 4 set dst 13.13.13.13 255.255.255.255 set gateway 12.12.12.254 set device "port3" next edit 5 set dst 14.14.14.14 255.255.255.255 set gateway 12.12.12.254 set device "port3" next edit 7 set dst 3.3.3.3 255.255.255.255 set gateway 2.2.2.254 set device "port2" next edit 8 set dst 4.4.4.4 255.255.255.255 set gateway 2.2.2.254 set device "port2" next edit 6 set distance 1 set sdwan-zone "DIA-Out" next edit 9 set device "To-Hub1" set comment "VPN: To-Hub1 (Created by VPN wizard)" set dstaddr "To-Hub1_remote" next edit 10 set distance 254 set comment "VPN: To-Hub1 (Created by VPN wizard)" set blackhole enable set dstaddr "To-Hub1_remote" set vrf 0 next end config router ospf set router-id 2.2.2.2 config area edit 0.0.0.0 next end config ospf-interface edit "Internal" set interface "port1" next edit "Inter-Hub" set interface "port5" next end config network edit 1 set prefix 10.2.0.0 255.255.255.0 next edit 2 set prefix 192.168.100.0 255.255.255.0 next end config redistribute "connected" end config redistribute "static" end config redistribute "rip" end config redistribute "bgp" end config redistribute "isis" end end config router ospf6 config redistribute "connected" end config redistribute "static" end config redistribute "rip" end config redistribute "bgp" end config redistribute "isis" end end config router bgp set as 65000 set router-id 172.29.100.252 set ibgp-multipath enable set additional-path enable set graceful-restart enable set additional-path-select 255 config neighbor edit "199.9.9.9" set remote-as 64299 next end config neighbor-group edit "VPN1" set capability-graceful-restart enable set link-down-failover enable set next-hop-self enable set soft-reconfiguration enable set remote-as 65000 set additional-path send set route-reflector-client enable next edit "VPN2" set capability-graceful-restart enable set link-down-failover enable set next-hop-self enable set soft-reconfiguration enable set remote-as 65000 set additional-path send set route-reflector-client enable next end config neighbor-range edit 1 set prefix 172.31.128.0 255.255.224.0 set neighbor-group "VPN1" next edit 2 set prefix 172.31.160.0 255.255.224.0 set neighbor-group "VPN2" next end config network edit 1 set prefix 172.31.128.0 255.255.224.0 next edit 2 set prefix 172.31.160.0 255.255.224.0 next end config network6 edit 1 set prefix6 ::/128 next end config redistribute "connected" set status enable set route-map "allowed-interfaces" end config redistribute "rip" end config redistribute "ospf" end config redistribute "static" end config redistribute "isis" end config redistribute6 "connected" end config redistribute6 "rip" end config redistribute6 "ospf" end config redistribute6 "static" end config redistribute6 "isis" end end config router isis config redistribute "connected" end config redistribute "rip" end config redistribute "ospf" end config redistribute "bgp" end config redistribute "static" end config redistribute6 "connected" end config redistribute6 "rip" end config redistribute6 "ospf" end config redistribute6 "bgp" end config redistribute6 "static" end end config router multicast end