=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2013.04.22 17:44:49 =~=~=~=~=~=~=~=~=~=~=~= myfw1-> get config Total Config size 15614: unset key protection enable set clock ntp set clock timezone -5 set clock dst recurring start-weekday 2 0 3 02:00 end-weekday 1 0 11 02:00 set vrouter trust-vr sharable set vrouter "untrust-vr" exit set vrouter "trust-vr" unset auto-route-export exit set vrouter name "trust2-vr" id 1025 set vrouter "trust2-vr" unset auto-route-export set protocol ospf set enable set area 0.0.0.0 range 192.168.15.0 255.255.255.0 advertise exit exit set service "SSH" timeout never set service "TELNET" timeout never set service "UCS-UDP-OPEN" protocol udp src-port 0-65535 dst-port 5060-5060 set service "UCS-UDP-OPEN" + udp src-port 0-65535 dst-port 10000-20000 set alg appleichat enable unset alg appleichat re-assembly enable set alg sctp enable set auth-server "Local" id 0 set auth-server "Local" server-name "Local" set auth default auth server "Local" set auth radius accounting port 1646 set admin name "netscreen" set admin password "12345" set admin http redirect set admin auth web timeout 10 set admin auth dial-in timeout 3 set admin auth server "Local" set admin format dos set zone "Trust" vrouter "trust-vr" set zone "Untrust" vrouter "trust-vr" set zone "DMZ" vrouter "trust-vr" set zone "VLAN" vrouter "trust-vr" set zone id 100 "lightpath" set zone "lightpath" vrouter "trust2-vr" set zone "Untrust-Tun" vrouter "trust-vr" set zone "Trust" tcp-rst set zone "Untrust" block unset zone "Untrust" tcp-rst set zone "MGT" block unset zone "V1-Trust" tcp-rst unset zone "V1-Untrust" tcp-rst set zone "DMZ" tcp-rst unset zone "V1-DMZ" tcp-rst unset zone "VLAN" tcp-rst set zone "lightpath" tcp-rst set zone "Untrust" screen tear-drop set zone "Untrust" screen syn-flood set zone "Untrust" screen ping-death set zone "Untrust" screen ip-filter-src set zone "Untrust" screen land set zone "V1-Untrust" screen tear-drop set zone "V1-Untrust" screen syn-flood set zone "V1-Untrust" screen ping-death set zone "V1-Untrust" screen ip-filter-src set zone "V1-Untrust" screen land set interface ethernet0/1 phy full 100mb set interface "ethernet0/0" zone "Untrust" set interface "ethernet0/1" zone "Null" set interface "ethernet0/1.2" tag 2 zone "Trust" set interface "ethernet0/1.10" tag 10 zone "DMZ" set interface "ethernet0/4" zone "lightpath" set interface "bgroup0" zone "Trust" set interface "tunnel.1" zone "Untrust" set interface "tunnel.2" zone "Untrust" set interface "tunnel.3" zone "Untrust" set interface bgroup0 port ethernet0/2 set interface bgroup0 port ethernet0/3 unset interface vlan1 ip set interface ethernet0/0 ip 11.22.33.44/29 set interface ethernet0/0 route set interface ethernet0/1.2 ip 10.1.15.254/24 set interface ethernet0/1.2 nat set interface ethernet0/1.10 ip 10.2.15.254/24 set interface ethernet0/1.10 nat set interface ethernet0/4 ip 172.16.0.5/24 set interface ethernet0/4 nat set interface bgroup0 ip 192.168.15.254/24 set interface bgroup0 nat set interface tunnel.1 ip unnumbered interface ethernet0/0 set interface tunnel.2 ip unnumbered interface ethernet0/0 set interface tunnel.3 ip unnumbered interface ethernet0/0 set interface ethernet0/1.10 bandwidth egress mMY 512 ingress mMY 512 set interface ethernet0/1.2 mtu 1500 set interface ethernet0/1.10 mtu 1500 unset interface vlan1 bypass-others-ipsec unset interface vlan1 bypass-non-ip set interface ethernet0/0 ip manageable set interface ethernet0/1.2 ip manageable set interface ethernet0/1.10 ip manageable set interface ethernet0/4 ip manageable set interface bgroup0 ip manageable set interface ethernet0/0 manage ping set interface ethernet0/0 manage ssh set interface ethernet0/0 manage telnet set interface ethernet0/0 manage ssl set interface ethernet0/0 manage web unset interface ethernet0/1.2 manage ping unset interface ethernet0/1.2 manage ssh unset interface ethernet0/1.2 manage telnet unset interface ethernet0/1.2 manage snmp unset interface ethernet0/1.2 manage ssl unset interface ethernet0/1.2 manage web set interface ethernet0/1.2 dhcp server service set interface ethernet0/1.10 dhcp server service set interface bgroup0 dhcp server service set interface ethernet0/1.2 dhcp server enable set interface ethernet0/1.10 dhcp server enable set interface bgroup0 dhcp server auto set interface ethernet0/1.2 dhcp server option lease 1440 set interface ethernet0/1.2 dhcp server option gateway 10.1.15.254 set interface ethernet0/1.2 dhcp server option netmask 255.255.255.0 set interface ethernet0/1.2 dhcp server option domainname LAB1.com set interface ethernet0/1.2 dhcp server option dns1 8.8.8.8 set interface ethernet0/1.2 dhcp server option dns2 8.8.4.4 set interface ethernet0/1.10 dhcp server option lease 720 set interface ethernet0/1.10 dhcp server option gateway 10.2.15.254 set interface ethernet0/1.10 dhcp server option netmask 255.255.255.0 set interface ethernet0/1.10 dhcp server option domainname null.local set interface ethernet0/1.10 dhcp server option dns1 8.8.8.8 set interface ethernet0/1.10 dhcp server option dns2 8.8.4.4 set interface bgroup0 dhcp server option gateway 192.168.15.254 set interface bgroup0 dhcp server option netmask 255.255.255.0 set interface bgroup0 dhcp server option domainname LAB1.com set interface bgroup0 dhcp server option dns1 204.255.146.8 set interface bgroup0 dhcp server option dns2 8.8.4.4 set interface ethernet0/1.2 dhcp server ip 10.1.15.100 to 10.1.15.150 set interface ethernet0/1.10 dhcp server ip 10.2.15.100 to 10.2.15.150 set interface bgroup0 dhcp server ip 192.168.15.101 to 192.168.15.199 unset interface ethernet0/1.2 dhcp server config next-server-ip unset interface ethernet0/1.2 dhcp server config updatable unset interface ethernet0/1.10 dhcp server config next-server-ip unset interface ethernet0/1.10 dhcp server config updatable unset interface bgroup0 dhcp server config next-server-ip unset interface bgroup0 dhcp server config updatable set interface "serial0/0" modem settings "USR" init "AT&F" set interface "serial0/0" modem settings "USR" active set interface "serial0/0" modem speed 115200 set interface "serial0/0" modem retry 3 set interface "serial0/0" modem interval 10 set interface "serial0/0" modem idle-time 10 set tcp mss 1200 set flow tcp-mss unset flow no-tcp-seq-check set flow tcp-syn-check unset flow tcp-syn-bit-check set flow reverse-route clear-text prefer set flow reverse-route tunnel always set console timeout 0 set console page 15 set domain LAB1.com set hostname avfw1 set pki authority default scep mode "auto" set pki x509 default cert-path partial set dns host dns1 4.2.2.2 src-interface ethernet0/0 set dns host dns2 0.0.0.0 set dns host dns3 0.0.0.0 set address "Trust" "192.168.15.0/24" 192.168.15.0 255.255.255.0 set address "Trust" "TrustWiFi" 10.1.15.0 255.255.255.0 set address "Untrust" "192.168.20.0/24" 192.168.20.0 255.255.255.0 set address "Untrust" "MY_204_Subnet" 204.255.146.0 255.255.255.0 set address "Untrust" "LAB1-DR-Network" 192.168.120.0 255.255.255.0 set address "Untrust" "www.aspemr.com" AA.BB.CC.DD 255.255.255.255 set group address "Trust" "Location_VPN_Net" set group address "Trust" "Location_VPN_Net" add "192.168.15.0/24" set group address "Trust" "Location_VPN_Net" add "TrustWiFi" set group address "Untrust" "Blocked_Hosts" set group address "Untrust" "Blocked_Hosts" add "www.sietr.com" set group address "Untrust" "MY_VPN_Networks" set group address "Untrust" "MY_VPN_Networks" add "192.168.20.0/24" set group address "Untrust" "MY_VPN_Networks" add "MY_204_Subnet" set group address "Untrust" "LAB1-DR-Network-Group" set group address "Untrust" "LAB1-DR-Network-Group" add "LAB1-DR-Network" set crypto-policy exit set ike gateway "Gateway for MY_VPN_Networks" address 1.2.3.4 Main outgoing-interface "ethernet0/0" preshare "6U2FzRgkNIHFUB" sec-level standard set ike gateway "Gateway for MY_VPN_Networks_0" address 5.6.7.8 Main outgoing-interface "ethernet0/0" preshare "CupBBFwZnHhfyUzg==" sec-level standard set ike gateway "Gateway for LAB1-DR-Network-Gro" address 10.11.12.13 Main outgoing-interface "ethernet0/0" preshare "xCSl74G8PnoXhN9Mq+SuvWz0aiL2LL4k959G+E=" sec-level standard set ike respond-bad-spi 1 set ike ikev2 ike-sa-soft-lifetime 60 unset ike ikeid-enumeration unset ike dos-protection unset ipsec access-session enable set ipsec access-session maximum 5000 set ipsec access-session upper-threshold 0 set ipsec access-session lower-threshold 0 set ipsec access-session dead-p2-sa-timeout 0 unset ipsec access-session log-error unset ipsec access-session info-exch-connected unset ipsec access-session use-error-log set vpn "VPN for MY_VPN_Networks" gateway "Gateway for MY_VPN_Networks" replay tunnel idletime 0 sec-level standard set vpn "VPN for MY_VPN_Networks" monitor set vpn "VPN for MY_VPN_Networks" id 0x1 bind interface tunnel.1 set vpn "VPN for MY_VPN_Networks_0" gateway "Gateway for MY_VPN_Networks_0" replay tunnel idletime 0 sec-level standard set vpn "VPN for MY_VPN_Networks_0" monitor set vpn "VPN for MY_VPN_Networks_0" id 0x2 bind interface tunnel.2 set vpn "VPN for LAB1-DR-Network-Group" gateway "Gateway for LAB1-DR-Network-Gro" replay tunnel idletime 0 sec-level standard set vpn "VPN for LAB1-DR-Network-Group" monitor set vpn "VPN for LAB1-DR-Network-Group" id 0x3 bind interface tunnel.3 set vrouter "untrust-vr" exit set vrouter "trust-vr" exit set vrouter "trust2-vr" exit set av scan-mgr max-content-size 30000 set url protocol type sc-cpa set url protocol sc-cpa set category "LAB1-Whitelist" url "LAB1.com/" set category "LAB1-Blacklist" url "*.aim.com/" set category "LAB1-Blacklist" url "*.facebook.com/" set category "LAB1-Blacklist" url "*.twitter.com/" set category "LAB1-Blacklist" url "*.youtube.com/" set category "LAB1-Blacklist" url "aim.com/" set category "LAB1-Blacklist" url "facebook.com/" set category "LAB1-Blacklist" url "twitter.com/" set category "LAB1-Blacklist" url "youtube.com/" set profile "ns-wireless-guest" "Adult/Sexually Explicit" block set profile "ns-wireless-guest" "Chat" block set profile "ns-wireless-guest" "Criminal Skills" block set profile "ns-wireless-guest" "Drugs, Alcohol & Tobacco" block set profile "ns-wireless-guest" "Food & Drink" block set profile "ns-wireless-guest" "Glamour & Intimate Apparel" block set profile "ns-wireless-guest" "Hacking" block set profile "ns-wireless-guest" "Hate Speech" block set profile "ns-wireless-guest" "Personals & Dating" block set profile "ns-wireless-guest" "Sex Education" block set profile "ns-wireless-guest" "Violence" block set profile "ns-wireless-guest" "Weapons" block set profile "ns-wireless-guest" "Usenet News" block set profile "LAB1-Employee" "LAB1-Blacklist" black-list set profile "LAB1-Employee" "LAB1-Whitelist" white-list set profile "LAB1-Employee" "Adult/Sexually Explicit" block set profile "LAB1-Employee" "Advertisements" block set profile "LAB1-Employee" "Arts & Entertainment" permit set profile "LAB1-Employee" "Chat" block set profile "LAB1-Employee" "Computing & Internet" permit set profile "LAB1-Employee" "Criminal Skills" block set profile "LAB1-Employee" "Drugs, Alcohol & Tobacco" block set profile "LAB1-Employee" "Education" permit set profile "LAB1-Employee" "Finance & Investment" permit set profile "LAB1-Employee" "Food & Drink" permit set profile "LAB1-Employee" "Gambling" block set profile "LAB1-Employee" "Games" block set profile "LAB1-Employee" "Glamour & Intimate Apparel" permit set profile "LAB1-Employee" "Government & Politics" permit set profile "LAB1-Employee" "Hacking" block set profile "LAB1-Employee" "Hate Speech" block set profile "LAB1-Employee" "Health & Medicine" permit set profile "LAB1-Employee" "Hobbies & Recreation" permit set profile "LAB1-Employee" "Hosting Sites" permit set profile "LAB1-Employee" "Job Search & Career Development" block set profile "LAB1-Employee" "Kids Sites" permit set profile "LAB1-Employee" "Lifestyle & Culture" permit set profile "LAB1-Employee" "Motor Vehicles" permit set profile "LAB1-Employee" "News" permit set profile "LAB1-Employee" "Personals & Dating" block set profile "LAB1-Employee" "Photo Searches" permit set profile "LAB1-Employee" "Real Estate" permit set profile "LAB1-Employee" "Reference" permit set profile "LAB1-Employee" "Religion" permit set profile "LAB1-Employee" "Remote Proxies" block set profile "LAB1-Employee" "Search Engines" permit set profile "LAB1-Employee" "Sex Education" block set profile "LAB1-Employee" "Shopping" permit set profile "LAB1-Employee" "Sports" permit set profile "LAB1-Employee" "Streaming Media" permit set profile "LAB1-Employee" "Travel" permit set profile "LAB1-Employee" "Usenet News" permit set profile "LAB1-Employee" "Violence" block set profile "LAB1-Employee" "Weapons" block set profile "LAB1-Employee" "Web-based Email" permit set enable set deny-message "Your page is blocked due to a security policy that prohibits access to $URL_CATEGORY" exit set policy id 5 from "Untrust" to "Trust" "MY_VPN_Networks" "Location_VPN_Net" "ANY" permit set policy id 5 exit set policy id 7 from "Untrust" to "Trust" "LAB1-DR-Network-Group" "Location_VPN_Net" "ANY" permit set policy id 7 exit set policy id 4 from "Trust" to "Untrust" "Location_VPN_Net" "MY_VPN_Networks" "ANY" permit set policy id 4 exit set policy id 6 from "Trust" to "Untrust" "Location_VPN_Net" "LAB1-DR-Network-Group" "ANY" permit set policy id 6 exit set policy id 1 from "Trust" to "Untrust" "Any" "Any" "ANY" nat src permit url-filter set policy id 1 av "ns-profile" set policy id 1 set url protocol sc-cpa profile "LAB1-Employee" exit set policy id 8 from "DMZ" to "Untrust" "Any" "Blocked_Hosts" "ANY" deny set policy id 8 exit set policy id 2 from "DMZ" to "Untrust" "Any" "Any" "DNS" nat src permit url-filter set policy id 2 av "ns-profile" set policy id 2 set service "HTTP" set service "HTTPS" set service "IKE" set service "IKE-NAT" set service "UCS-UDP-OPEN" set url protocol sc-cpa profile "ns-wireless-guest" exit set policy id 3 from "Trust" to "Trust" "Any" "Any" "ANY" permit set policy id 3 av "ns-profile" set policy id 3 exit set nsmgmt bulkcli reboot-timeout 60 set ssh version v2 set ssh enable set config lock timeout 5 unset license-key auto-update set telnet client enable set ntp server "nist1-ny.ustiming.org" set ntp server src-interface "ethernet0/0" set ntp server backup1 "time-a.nist.gov" set ntp server backup1 src-interface "ethernet0/0" set ntp server backup2 "time-nw.nist.gov" set ntp server backup2 src-interface "ethernet0/0" set snmp port listen 161 set snmp port trap 162 set vrouter "untrust-vr" exit set vrouter "trust-vr" unset add-default-route set route 0.0.0.0/0 interface ethernet0/0 gateway 11.22.33.43 permanent set route 192.168.20.0/24 interface tunnel.1 set route 10.20.23.0/24 interface tunnel.1 set route 10.20.23.0/24 interface tunnel.2 preference 25 set route 192.168.20.0/24 interface tunnel.2 preference 25 set route 192.168.120.0/24 interface tunnel.3 exit set vrouter "trust2-vr" set router-id 0.0.0.5 exit set interface ethernet0/4 protocol ospf area 0.0.0.0 set interface ethernet0/4 protocol ospf enable set vrouter "untrust-vr" exit set vrouter "trust-vr" exit set vrouter "trust2-vr" exit avfw1-> exit Configuration modified, save? [y]/n