set clock ntp set clock timezone -5 set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00 set vrouter trust-vr sharable set vrouter "untrust-vr" exit set vrouter "trust-vr" unset auto-route-export set protocol pim exit exit set service "SSH" timeout 1 set service "NovaWeb" protocol tcp src-port 0-65535 dst-port 308-308 set service "AVG1" protocol tcp src-port 0-65535 dst-port 4156-4156 set service "IMAPS" protocol tcp src-port 0-65535 dst-port 993-993 set service "AVG2" protocol tcp src-port 0-65535 dst-port 6150-6150 set service "AVG3" protocol tcp src-port 0-65535 dst-port 6051-6051 set service "JabberSSL" protocol tcp src-port 0-65535 dst-port 5223-5223 set service "HermesHTTP" protocol tcp src-port 0-65535 dst-port 80-80 timeout 1 set service "EDI" protocol tcp src-port 0-65535 dst-port 4080-4080 set service "SQUID" protocol tcp src-port 0-65535 dst-port 3128-3128 set service "JuniperNSM" protocol tcp src-port 0-65535 dst-port 7800-7800 set service "AVG8" protocol tcp src-port 0-65535 dst-port 4158-4158 set service "Jabber" protocol tcp src-port 0-65535 dst-port 5222-5222 set service "SFTP" protocol tcp src-port 0-65535 dst-port 22-22 set service "Revintex" protocol tcp src-port 122-122 dst-port 122-122 set service "Vipre" protocol tcp src-port 0-65535 dst-port 18082-18082 set service "Viper 2" protocol tcp src-port 0-65535 dst-port 18086-18086 set service "viper3" protocol tcp src-port 0-65535 dst-port 18087-18087 set service "viper4" protocol tcp src-port 0-65535 dst-port 18088-18088 set service "e2 5222" protocol tcp src-port 0-65535 dst-port 5222-5222 set service "e2 5223" protocol tcp src-port 0-65535 dst-port 5223-5223 set service "e2-MySQL" protocol tcp src-port 0-65535 dst-port 3306-3306 set service "SSH2" protocol tcp src-port 0-65535 dst-port 1987-1987 set service "cPanel" protocol tcp src-port 0-65535 dst-port 2082-2096 set alg appleichat enable unset alg appleichat re-assembly enable set alg sctp enable set auth-server "Local" id 0 set auth-server "Local" server-name "Local" set auth-server "RSA" id 1 set auth-server "RSA" server-name "10.30.56.19" set auth-server "RSA" account-type admin set auth-server "RSA" type securid set auth-server "RSA" securid encr 0 set auth default auth server "Local" set auth radius accounting port 1646 set admin name "netscreen" set admin password "xxxxxxxxxxxxxxxxxxxxxxxxxxxxx" set admin http redirect set admin mail alert set admin mail server-name "xxxxxxxxxxxxx" set admin mail mail-addr1 "me@mycompany.net" set admin mail traffic-log set admin auth web timeout 10 set admin auth dial-in timeout 3 set admin auth server "Local" set admin auth banner telnet login "Remote Management Console - Authorized Users Only! Access is monitored! Violators will be prosecuted to the fullest extent of the law!" set admin auth banner console login "Authorized Users Only! Access is monitored! Violators will be prosecuted to the fullest extent of the law!" set admin format dos set zone "Trust" vrouter "trust-vr" set zone "Untrust" vrouter "trust-vr" set zone "DMZ" vrouter "trust-vr" set zone "VLAN" vrouter "trust-vr" set zone "Untrust-Tun" vrouter "trust-vr" set zone "Trust" tcp-rst set zone "Untrust" block unset zone "Untrust" tcp-rst set zone "MGT" block set zone "DMZ" tcp-rst set zone "VLAN" block unset zone "VLAN" tcp-rst set zone "Untrust" screen tear-drop set zone "Untrust" screen syn-flood set zone "Untrust" screen ping-death set zone "Untrust" screen ip-filter-src set zone "Untrust" screen land set zone "V1-Untrust" screen tear-drop set zone "V1-Untrust" screen syn-flood set zone "V1-Untrust" screen ping-death set zone "V1-Untrust" screen ip-filter-src set zone "V1-Untrust" screen land set interface "ethernet0/0" zone "Untrust" set interface "ethernet0/1" zone "Null" set interface "wireless0/0" zone "Null" set interface "wireless0/1" zone "Trust" set interface "bgroup0" zone "Trust" set interface "tunnel.1" zone "Untrust" set interface "tunnel.2" zone "Untrust" set interface "tunnel.3" zone "Untrust" set interface "tunnel.4" zone "Untrust" set interface bgroup0 port ethernet0/1 set interface bgroup1 port ethernet0/2 set interface bgroup1 port ethernet0/3 set interface bgroup0 port ethernet0/4 set interface bgroup0 port ethernet0/5 set interface bgroup0 port ethernet0/6 set interface bgroup0 port wireless0/0 unset interface vlan1 ip set interface ethernet0/0 ip xx.xx.xxx.xxx/xx set interface ethernet0/0 route set interface wireless0/1 ip 10.30.30.1/24 set interface wireless0/1 nat set interface bgroup0 ip 10.30.56.254/24 set interface bgroup0 nat set interface bgroup0 ip 10.31.56.254 255.255.255.0 secondary set interface tunnel.1 ip unnumbered interface ethernet0/0 set interface tunnel.2 ip unnumbered interface ethernet0/0 set interface tunnel.3 ip unnumbered interface ethernet0/0 set interface tunnel.4 ip unnumbered interface ethernet0/0 set interface tunnel.3 mtu 1500 unset interface vlan1 bypass-others-ipsec unset interface vlan1 bypass-non-ip set interface bgroup0 manage-ip 10.30.56.244 set interface ethernet0/0 ip manageable set interface wireless0/1 ip manageable set interface bgroup0 ip manageable set interface ethernet0/0 manage ping set interface ethernet0/0 manage ssh set interface ethernet0/0 manage snmp set interface ethernet0/0 manage ssl set interface ethernet0/0 manage web unset interface wireless0/1 manage ssh unset interface wireless0/1 manage telnet unset interface wireless0/1 manage snmp set interface bgroup0 manage mtrace set auth-server "RSA" src-interface "bgroup0" set interface ethernet0/0 vip xx.xx.xxx.xxx 18082 "Vipre" 10.30.56.39 set interface ethernet0/0 vip xx.xx.xxx.xxx + 18086 "Viper 2" 10.30.56.39 set interface ethernet0/0 vip xx.xx.xxx.xxx + 18087 "viper3" 10.30.56.39 set interface ethernet0/0 vip xx.xx.xxx.xxx + 18088 "viper4" 10.30.56.39 set interface ethernet0/0 vip xx.xx.xxx.xxx 80 "HTTP" 10.30.56.45 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 443 "HTTPS" 10.30.56.11 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 22 "SSH" 10.30.56.11 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 143 "IMAP" 10.30.56.11 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 993 "IMAPS" 10.30.56.11 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 5222 "Jabber" 10.30.56.43 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 3128 "SQUID" 10.30.56.11 manual set interface ethernet0/0 vip xx.xx.xxx.xxx 443 "HTTPS" 10.30.56.41 manual set interface ethernet0/0 vip xx.xx.xxx.xxx + 80 "HTTP" 10.30.56.41 manual set interface bgroup0 dhcp server service set interface bgroup0 dhcp server auto set interface bgroup0 dhcp server option gateway 10.30.56.254 set interface bgroup0 dhcp server option netmask 255.255.255.0 set interface bgroup0 dhcp server option domainname mycompany.net set interface bgroup0 dhcp server option dns1 10.30.56.48 set interface bgroup0 dhcp server option dns2 10.30.56.49 set interface bgroup0 dhcp server option wins1 10.30.56.49 set interface bgroup0 dhcp server ip 10.30.56.101 to 10.30.56.200 unset interface bgroup0 dhcp server config next-server-ip set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.14 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.235 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.18 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.246 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.42 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.142 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.43 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.5 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.231 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.230 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.24 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.25 netmask 255.255.255.255 vr "trust-vr" set interface "ethernet0/0" mip xx.xx.xxx.xxx host 10.30.56.22 netmask 255.255.255.255 vr "trust-vr" set interface "serial0/0" modem settings "USR" init "AT&F" set interface "serial0/0" modem settings "USR" active set interface "serial0/0" modem speed 115200 set interface "serial0/0" modem retry 3 set interface "serial0/0" modem interval 10 set interface "serial0/0" modem idle-time 10 set interface wireless0/0 shutdown set interface wireless0/1 shutdown set flow tcp-mss unset flow tcp-syn-check unset flow tcp-syn-bit-check set flow reverse-route clear-text prefer set flow reverse-route tunnel always set domain mycompany-systems.com set pki authority default scep mode "auto" set pki x509 default cert-path partial set dns host dns1 10.30.56.1 src-interface bgroup0 set dns host dns2 10.30.56.2 src-interface bgroup0 set dns host dns3 4.4.2.2 src-interface ethernet0/0 set dns host schedule 06:28 set address "Trust" "10.30.0.0/16" 10.30.0.0 255.255.0.0 set address "Trust" "10.30.56.0/24" 10.30.56.0 255.255.255.0 set address "Trust" "10.30.56.10/32" 10.30.56.10 255.255.255.255 set address "Trust" "10.30.56.18/32" 10.30.56.18 255.255.255.255 set address "Trust" "10.30.56.244/32" 10.30.56.244 255.255.255.255 set address "Trust" "10.30.56.32/32" 10.30.56.32 255.255.255.255 set address "Trust" "10.30.56.33/32" 10.30.56.33 255.255.255.255 set address "Trust" "192.168.1.33" 192.168.1.33 255.255.255.255 set address "Trust" "mycompany-LAN" 10.30.56.0 255.255.255.0 set address "Trust" "Client" 192.168.0.0 255.255.0.0 set address "Trust" "Client-city" 10.10.10.0 255.255.255.0 set address "Trust" "XXX - 10.30.56.147" 10.30.56.147 255.255.255.255 set address "Trust" "XXX - 10.30.56.167" 10.30.56.167 255.255.255.255 set address "Trust" "XXX - 10.30.56.188" 10.30.56.188 255.255.255.255 set address "Trust" "dunnowhy.homeip.net" dunnowhy.homeip.net set address "Untrust" "10.1.50.0/24" 10.1.50.0 255.255.255.0 set address "Untrust" "10.10.10.0/24" 10.10.10.0 255.255.255.0 set address "Untrust" "172.28.0.0/16" 172.28.0.0 255.255.0.0 set address "Untrust" "174.143.252.6/32" 174.143.252.6 255.255.255.255 set address "Untrust" "192.168.0.0/16" 192.168.0.0 255.255.0.0 set address "Untrust" "195.0.0.0/8" 195.0.0.0 255.0.0.0 set address "Untrust" "200.0.0.0/8" 200.0.0.0 255.0.0.0 set address "Untrust" "67.40.109.115/32" 67.40.109.115 255.255.255.255 set address "Untrust" "80.0.0.0/8" 80.0.0.0 255.0.0.0 set address "Untrust" "89.0.0.0/8" 89.0.0.0 255.0.0.0 set address "Untrust" "dunnowhy.homeip.net" dunnowhy.homeip.net set address "Global" "10.30.56.14/32" 10.30.56.14 255.255.255.255 set address "Global" "10.30.56.19/32" 10.30.56.19 255.255.255.255 set group service "AVG" set group service "AVG" add "AVG1" set group service "AVG" add "AVG2" set group service "AVG" add "AVG3" set user "burp" uid 5 set user "burp" type auth set user "burp" hash-password "xxxxxxxxxxxxxx/xxxxxxxxxxx" set user "burp" "enable" set user "mhurd" uid 3 set user "mhurd" ike-id fqdn "burp" share-limit 1 set user "mhurd" type ike set user "mhurd" "enable" set user "burp2" uid 4 set user "burp2" ike-id fqdn "burp2" share-limit 1 set user "burp2" type ike set user "burp2" password "xxxxxxxxxxxxxxxx" unset user "burp2" type auth set user "burp2" "enable" set user-group "WebAccess" id 2 set user-group "WebAccess" user "burp" set user-group "vpnusers" id 3 set user-group "vpnusers" user "burp" set user-group "vpnusers" user "burp2" set ike p1-proposal "Client Phase 1" preshare group1 esp aes128 sha-1 second 28800 set ike p2-proposal "Client" no-pfs esp 3des sha-1 second 3600 set ike gateway "Gateway for 192.168.0.0/16" address 192.168.1.1 Main outgoing-interface "ethernet0/0" preshare "xxxxxxxxxxxxxxxxx" proposal "FamilyRX Phase 1" set ike gateway "Gateway for 192.168.0.0/16" cert peer-ca-hash xxxxxxxxxxxxxxxxx set ike gateway "Gateway for 10.10.10.0/24" address 70.247.255.238 Main outgoing-interface "ethernet0/0" preshare "xxxxxxxxxxxxxxxxx ==" proposal "FamilyRX Phase 1" set ike gateway "Gateway for 172.28.0.0/16" address 208.176.54.228 Main outgoing-interface "ethernet0/0" preshare "xxxxxxxxxxxxxxxxx/xxxxxxxxxxxxxxxxx ==" sec-level standard set ike gateway "Gateway for 10.1.50.0/24" address 64.244.240.102 Main outgoing-interface "ethernet0/0" preshare "xxxxxxxxxxxxxxxxx" proposal "pre-g2-3des-sha" set ike respond-bad-spi 1 set ike gateway "Gateway for 192.168.0.0/16" heartbeat hello 5 set ike gateway "Gateway for 192.168.0.0/16" heartbeat reconnect 60 set ike ikev2 ike-sa-soft-lifetime 60 unset ike ikeid-enumeration unset ike dos-protection unset ipsec access-session enable set ipsec access-session maximum 5000 set ipsec access-session upper-threshold 0 set ipsec access-session lower-threshold 0 set ipsec access-session dead-p2-sa-timeout 0 unset ipsec access-session log-error unset ipsec access-session info-exch-connected unset ipsec access-session use-error-log set xauth default dns1 10.30.56.1 set xauth default dns2 10.30.56.2 set xauth default wins1 10.30.56.1 set vpn "VPN for 192.168.0.0/16" gateway "Gateway for 192.168.0.0/16" no-replay tunnel idletime 0 proposal "nopfs-esp-aes128-sha" set vpn "VPN for 192.168.0.0/16" id 0x1 bind interface tunnel.1 set vpn "VPN for 10.10.10.0/24" gateway "Gateway for 10.10.10.0/24" no-replay tunnel idletime 0 proposal "nopfs-esp-aes128-sha" set vpn "VPN for 10.10.10.0/24" id 0x3 bind interface tunnel.2 set vpn "VPN for 172.28.0.0/16" gateway "Gateway for 172.28.0.0/16" replay tunnel idletime 0 proposal "HBS" set vpn "VPN for 172.28.0.0/16" id 0x7 bind interface tunnel.4 set vrouter "untrust-vr" exit set vrouter "trust-vr" exit set l2tp default dns1 10.30.56.1 set l2tp default dns2 10.30.56.2 set l2tp default ppp-auth chap set l2tp default wins1 10.30.56.1 set attack db sigpack base set attack db mode Update set attack db schedule daily 00:00 set av profile "esc-profile" exit set url protocol type sc-cpa set url protocol sc-cpa set category "GoToMeeting" url "gotomeeting.com/" set category "GoToMeeting" url "www.gotomeeting.com/" set category "GoToMeeting" url "www1.gotomeeting.com/" set category "IT Sites" url "katz.cd/" set category "IT Sites" url "scenario.com/" set category "IT Sites" url "scenario.com/ipoker/" set category "IT Sites" url "uploads.underground.net/" set category "IT Sites" url "www.illwillpress.com/" set category "IT Sites" url "www.miniclip.com/" set category "IT Sites" url "www.miniclips.com/" set category "IT Sites" url "www.warez-bb.org/" set profile "ESC" "GoToMeeting" white-list set profile "ESC" "IT Sites" permit set profile "ESC" "Adult/Sexually Explicit" block set profile "ESC" "Advertisements" block set profile "ESC" "Arts & Entertainment" permit set profile "ESC" "Chat" permit set profile "ESC" "Computing & Internet" permit set profile "ESC" "Criminal Skills" block set profile "ESC" "Drugs, Alcohol & Tobacco" block set profile "ESC" "Education" permit set profile "ESC" "Finance & Investment" permit set profile "ESC" "Food & Drink" permit set profile "ESC" "Gambling" block set profile "ESC" "Games" block set profile "ESC" "Glamour & Intimate Apparel" permit set profile "ESC" "Government & Politics" permit set profile "ESC" "Hacking" block set profile "ESC" "Hate Speech" block set profile "ESC" "Health & Medicine" permit set profile "ESC" "Hobbies & Recreation" permit set profile "ESC" "Hosting Sites" permit set profile "ESC" "Job Search & Career Development" permit set profile "ESC" "Kids Sites" permit set profile "ESC" "Lifestyle & Culture" permit set profile "ESC" "Motor Vehicles" permit set profile "ESC" "News" permit set profile "ESC" "Personals & Dating" block set profile "ESC" "Photo Searches" permit set profile "ESC" "Real Estate" permit set profile "ESC" "Reference" permit set profile "ESC" "Religion" permit set profile "ESC" "Remote Proxies" permit set profile "ESC" "Search Engines" permit set profile "ESC" "Sex Education" block set profile "ESC" "Shopping" permit set profile "ESC" "Sports" permit set profile "ESC" "Streaming Media" permit set profile "ESC" "Travel" permit set profile "ESC" "Usenet News" permit set profile "ESC" "Violence" block set profile "ESC" "Weapons" block set profile "ESC" "Web-based Email" permit set profile "IT" "IT Sites" white-list set profile "IT" "Hacking" permit set enable set fail-mode permit set deny-message "Your page is blocked due to a security policy that prohibits access to $URL_CATEGORY" exit set anti-spam profile ns-profile set sbl default-server enable exit set vpn "VPN for 192.168.0.0/16" proxy-id local-ip 10.30.56.0/24 remote-ip 192.168.0.0/16 "ANY" set vpn "VPN for 10.10.10.0/24" proxy-id local-ip 10.30.56.0/24 remote-ip 10.10.10.0/24 "ANY" set policy id 54 name "YUBICO RADIUS" from "Trust" to "Untrust" "10.30.56.0/24" "xxx.xxx.xx.xx/32" "RADIUS" permit log set policy id 54 set log session-init exit set policy id 51 from "Untrust" to "Trust" "Any" "Any" "ANY" permit log count set policy id 51 set log session-init exit set policy id 50 from "Trust" to "Untrust" "Any" "Any" "ANY" permit set policy id 50 exit set policy id 47 from "Trust" to "Untrust" "Any" "Any" "ANY" permit log set policy id 47 exit set policy id 41 name "Revintex" from "Trust" to "Untrust" "10.30.56.33/32" "67.40.109.115/32" "Revintex" permit set policy id 41 exit set policy id 34 from "Untrust" to "Trust" "80.0.0.0/8" "Any" "ANY" deny log set policy id 34 set log session-init exit set policy id 33 from "Untrust" to "Global" "80.0.0.0/8" "Any" "ANY" deny log set policy id 33 set log session-init exit set policy id 28 name "INTLBLOCK-Panama" from "Untrust" to "Global" "200.0.0.0/8" "Any" "ANY" deny log set policy id 28 set log session-init exit set policy id 27 name "INTLBLOCK-Romania" from "Untrust" to "Global" "89.0.0.0/8" "Any" "ANY" deny log set policy id 27 set log session-init exit set policy id 30 name "INTLBLOCK-Panama" from "Untrust" to "Global" "195.0.0.0/8" "Any" "ANY" deny log set policy id 30 set log session-init exit set policy id 26 name "INTLBLOCK-Panama" from "Untrust" to "Trust" "195.0.0.0/8" "Any" "ANY" deny log set policy id 26 set log session-init exit set policy id 25 name "INTLBLOCK-Romania" from "Untrust" to "Trust" "89.0.0.0/8" "Any" "ANY" deny log set policy id 25 set log session-init exit set policy id 31 name "INTLBLOCK-Panama" from "Untrust" to "Trust" "200.0.0.0/8" "Any" "ANY" deny log set policy id 31 set log session-init exit set policy id 12 from "Untrust" to "Trust" "192.168.0.0/16" "Any" "ANY" permit log count set policy id 12 exit set policy id 11 from "Trust" to "Untrust" "mycompany-LAN" "192.168.0.0/16" "VNC" permit log count set policy id 11 set log session-init exit set policy id 15 from "Trust" to "Untrust" "mycompany-LAN" "10.10.10.0/24" "VNC" permit log count set policy id 15 set log session-init exit set policy id 16 from "Trust" to "Untrust" "10.30.0.0/16" "10.10.10.0/24" "ANY" deny set policy id 16 exit set policy id 13 from "Trust" to "Untrust" "mycompany-LAN" "192.168.0.0/16" "ANY" deny set policy id 13 exit set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" permit count url-filter set policy id 1 set url protocol sc-cpa profile "ESC" exit set policy id 3 name "Hermes" from "Untrust" to "Global" "Any" "VIP(xx.xx.xxx.xxx)" "HermesHTTP" permit log count set policy id 3 set service "HTTPS" set service "NovaWeb" set service "Viper 2" set service "viper3" set service "viper4" set service "Vipre" set log session-init exit set policy id 5 name "Client" from "Trust" to "Trust" "Any" "Client" "VNC" permit count set policy id 5 disable set policy id 5 set dst-address "Client-cit" exit set policy id 10 name "MAIL1" from "Untrust" to "Global" "Any" "VIP(xx.xx.xxx.xxx)" "cPanel" permit log count set policy id 10 set service "HTTP" set service "HTTPS" set service "IMAP" set service "IMAPS" set service "SMTP" set service "SSH2" set log session-init exit set policy id 17 name "TEST Web Server" from "Untrust" to "Global" "Any" "VIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 17 set service "HTTPS" set log session-init exit set policy id 19 name "EDI FTP" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "EDI" permit log count set policy id 19 application "FTP" set policy id 19 set service "FTP" set log session-init exit set policy id 32 from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "JuniperNSM" permit log count set policy id 32 set log session-init exit set policy id 35 name "NEW FTP SERVER server name" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "FTP" permit log count set policy id 35 disable set policy id 35 set service "SFTP" set service "SSH" set log session-init exit set policy id 37 name "PCI Test" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 37 disable set policy id 37 set service "HTTPS" set log session-init exit set policy id 42 name "Jabber Server" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "Jabber" permit log count set policy id 42 set service "JabberSSL" set log session-init exit set policy id 43 name "Bomgar" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 43 set service "HTTPS" set service "SNMP" set log session-init exit set policy id 44 from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "FTP" permit log count set policy id 44 set service "HTTP" set service "HTTPS" set log session-init exit set policy id 57 name "development-jira" from "Untrust" to "Global" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 57 set service "HTTPS" set log session-init exit set policy id 62 name "demo.mycompany.net" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 62 set service "HTTPS" set log session-init exit set policy id 63 name "jira.mycompany.net" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 63 set service "HTTPS" set log session-init exit set policy id 64 name "wiki.mycompany.net" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 64 set service "HTTPS" set log session-init exit set policy id 65 name "jiradev.mycompany.net" from "Untrust" to "Trust" "Any" "MIP(xx.xx.xxx.xxx)" "HTTP" permit log count set policy id 65 set service "HTTPS" set log session-init exit set syslog config "10.30.56.48" set syslog config "10.30.56.48" facilities local5 local6 set syslog config "10.30.56.48" log traffic set syslog config "10.30.56.48" transport tcp set syslog src-interface bgroup0 unset log module system level notification destination email set firewall log-self set nsmgmt report alarm traffic enable set nsmgmt report alarm attack enable set nsmgmt report alarm other enable set nsmgmt report alarm di enable set nsmgmt report log config enable set nsmgmt report log info enable set nsmgmt report log self enable set nsmgmt report log traffic enable set nsmgmt init id xxxxxxxxxxxxxxxx set nsmgmt server primary 10.30.56.246 port 7800 set nsmgmt bulkcli reboot-timeout 60 set nsmgmt hb-interval 20 set nsmgmt hb-threshold 5 set nsmgmt enable set ssh version v2 set ssh enable set config lock timeout 5 unset license-key auto-update set ntp server "69.50.219.51" set ntp server src-interface "ethernet0/0" set ntp server backup1 "198.137.202.16" set ntp server backup1 src-interface "ethernet0/0" set ntp server backup2 "0.0.0.0" set wlan 1 mode turbo set wlan 0 channel 7 set wlan 1 channel auto set snmp location "Main DC-TelecomRm01" set snmp contact "itadmin@mycompany.net" set snmp name "ssg5-serial-wlan" set snmp port listen 161 set snmp port trap 162 set vrouter "untrust-vr" exit set vrouter "trust-vr" unset add-default-route set route 10.30.57.0/24 interface bgroup0 gateway 10.30.56.253 preference 20 permanent set route 0.0.0.0/0 interface ethernet0/0 gateway 70.43.146.129 preference 20 permanent set route 192.168.0.0/16 interface tunnel.1 set route 10.10.10.0/24 interface tunnel.2 preference 20 permanent set route 172.28.0.0/16 interface tunnel.4 exit set vrouter "untrust-vr" exit set vrouter "trust-vr" set protocol pim exit exit