X-Git-Url: https://gerrit.onap.org/r/gitweb?a=blobdiff_plain;f=docs%2FAPPC%20CDT%20Guide%2Ftemplate_Configure_vABC_0.0.1.txt;fp=docs%2FAPPC%20CDT%20Guide%2Ftemplate_Configure_vABC_0.0.1.txt;h=0000000000000000000000000000000000000000;hb=637ba4df11df1922ba7eb5e025c24e9a59f7ef55;hp=861dbcc5f33f8b8cbbff6355ef4587299a1ad44c;hpb=3d3f1ce714d3e2832b14084bbe17849fb64c5d41;p=appc.git diff --git a/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt b/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt deleted file mode 100644 index 861dbcc5f..000000000 --- a/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt +++ /dev/null @@ -1,1535 +0,0 @@ - - - 15.1X49-D50.3 - - ${nodename} - - dbqx0001vm001 - -
${BUrouterIP}
- ${DestinationSubnet} -
- - - 32 - - - - - default-log-messages - - any - - - (requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES - - - - -
- - - fxp0 - - 0 - - -
- 135.69.228.8/25 -
-
-
-
-
-
-
- - node1 - - dbqx0001vm002 - -
135.69.228.1
- 0.0.0.0/0 -
- - - 32 - - - - - default-log-messages - - any - - - (requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES - - - - -
- - - fxp0 - - 0 - - -
- 135.69.228.9/25 -
-
-
-
-
-
-
- groupname - - - $5$rKyWGmrv$sMeym/XUklUeJX2hKpcp5TzCG5R8jcmJ2901HcNGSeB - - - 135.188.34.84 - - - \n\t\tWARNING NOTICE\n\tThis system is restricted solely to AT&T authorized users for\n\tlegitimate business purposes only.The actual or attempted\n\tunauthorized access, use, or modification of this system is\n\tstrictly prohibited by AT&T. Unauthorized users are subject to\n\tCompany disciplinary proceedings and/or criminal and civil\n\tpenalties under state, federal, or other applicable domestic and\n\tforeign laws. The use of this system may be monitored and\n\trecorded for administrative and security reasons. Anyone\n\taccessing this system expressly consents to such monitoring and\n\t is advised that if monitoring reveals possible evidence of\n\tcriminal activity, AT&T may provide the evidence of such\n\tactivity to law enforcement officials. All users must comply\n\twith AT&T company policies regarding the protection of AT&T\n\tinformation assets.\n\n - - - - v2 - - - - - - - - - * - - any - - - - - 135.144.0.62 - - any - - - - - - - messages - - any - - - - authorization - - - - - interactive-commands - - interactive-commands - - - - - session_log - - any - - - - - - - policy_session - RT_FLOW - - - - - - https://ae1.juniper.net/junos/key_retrieval - - - - - - 192.20.201.162 - - - - - - - 2 - 1000 - 3 - - 0 - - 0 - 100 - - - 1 - 1 - - - - 1 - - 0 - 100 - - - 1 - 1 - - - ge-0/0/1 - 255 - - - ge-7/0/1 - 255 - - - ge-0/0/2 - 255 - - - ge-7/0/2 - 255 - - - 255 - 1 - 5 - - -
- 10.68.16.1 - 255 - - reth1.0 - 10.68.16.17 - -
-
- 12.102.197.129 - 255 - - reth0.0 - 12.102.197.135 - -
-
-
-
-
-
-
- - - - - - - - Space-IPS-Policy - - - DBE-Q-IPS-policy-template-1 - - any - any - default - - APP:ADOBE-COLDFUSION-WEBSOCKET - APP:ADOBE-FLASH-RTMP-RCE - APP:AMANDA:AMANDA-ROOT-OF2 - APP:APPLE-MACOSX-ODP-RCE - APP:ASUS-WRT-INFOSVR-COMND-EXEC - APP:CA:ARCSRV:BCK-MESSAGE - APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS - APP:CA:ARCSRV:METHD-EXPOSURE - APP:CA:ARCSRV:RPC-MEMRCORRUPT - APP:CA:ARCSRV:SQLOF-1 - APP:CA:ARCSRV:TAPE-ENGNE-DOS - APP:CA:DBA-SVR-POINT - APP:CA:RPC-MSG-BO - APP:CISCO:ASA-IKE-BO - APP:CISCO:CISCO-EPNM-DESERIAL-1 - APP:CISCO:VIDEO-SURVEILANCE-XSS - APP:CITRIX:PROVISIONING-OPCODE - APP:CITRIX:STREAMPROCESS-BOF - APP:DIGIUM-ASTERISK-OF - APP:EMC-ALPHASTOR-BOF - APP:EMC-ALPHASTORE-CMDEXEC - APP:EMC-APLHASTORE-FMTSTR - APP:EMC-NETWORKER-NSRD-BO - APP:EMC-NETWORKER-NSRINDEXD-OF - APP:EMC-NSRINDEXD-BO - APP:EMC-REPLICATION-MGR-CMD-EXE - APP:ESIGNAL:OVERFLOW-EXPLOIT - APP:FLEXERA-FLEXNET-BO - APP:FREEBSD-BSPATCH-RCE - APP:HP-DATA-PROTECTOR-OP-DOS - APP:HP-DATA-PRTCTR-EXEC-BAR-CE - APP:HP-DATA-PRTCTR-OP-27 - APP:HP-DATA-PRTCTR-OP211-264 - APP:HP-DATA-PRTCTR-OP215-263 - APP:HP-DATA-PRTCTR-OP227-BO - APP:HP-DATA-PRTCTR-OP234-BO - APP:HP-DATA-PRTCTR-OP235-BO - APP:HP-DATA-PRTCTR-OP259-BO - APP:HP-DATA-PRTCTR-OP260-BO - APP:HP-DATA-PRTCTR-OP28-11 - APP:HP-DATA-PRTCTR-OPCODE - APP:HP-DATA-PRTCTR-OPCODES - APP:HP-DATA-PRTCTR-RDS-DOS - APP:HP-LEFTHAND-HYDRA-DIAG-OF - APP:HP-LEFTHAND-HYDRA-PING-OF - APP:HP-LOADRUNNER-BO - APP:HP-LOADRUNNER-RCE - APP:HP-LOADRUNNER-SSL - APP:HP-LOGIN-BOF - APP:HP-MGMT-UAM-BO - APP:HP-NNM-HLEN-BOF - APP:HP-OPENVIEW-DTPRTCTR-BO - APP:HP-OPNVIEWSTORAGE-BOF - APP:HP-OPNVW-STORAGE-DATA-BO - APP:HP-PROCURVE-BYPASS - APP:HP-PROTECTOR-DIR-TRAV - APP:HP-SAN-IQ-CMD-INJ - APP:HP-STORAGEWORKS-OPC22-BO - APP:HP-SYS-IPRANGE-OF - APP:HP-SYS-RCE - APP:HP-VIRTUAL-SAN - APP:HPE-NA-RMI-DESER - APP:HPIM-SOM-EUACCNT-BYPASS - APP:HPLOADRUNNER-XDR-BO - APP:HPOV:CMD-INJ - APP:IBM:DOMINO-BYPASS - APP:IBM:DOMINO-BYPASS-1 - APP:IBM:FORMVIEWER-XFDL-BOF - APP:IBM:FXCLI-EXECBO - APP:IBM:LDAP-MODIFYREQUEST-BO - APP:IBM:OPCODE-1330-CMD-INJ - APP:IBM:TIV-OP1329-BOF - APP:IBM:TIV-OP1331-CMDINJ - APP:IBM:TIV-OP1339-CMDINJ - APP:IBM:TIVOLI-FASTBACK-OP-BO - APP:IBM:TIVOLI-OP4115-BO - APP:IBM:TIVOLI-SRV-OP1301 - APP:IBM:TIVOLI-SRV-OP1335 - APP:IBM:TSM-CVE-2015-0119-BO - APP:IPMI-CIPHER-ZERO - APP:KERBEROS:BLDPRINCIPAL-VA1 - APP:KERBEROS:BLDPRINCIPAL-VA2 - APP:KERBEROS:CHKSUM-PRIV-ESC - APP:KERBEROS:INV-TOKEN-DOS-TCP - APP:KERBEROS:INV-TOKEN-DOS-UDP - APP:KERBEROS:KRB5-DOS - APP:KERBEROS:MULTI-REALM-DOS - APP:KERBEROS:SPNEGO-5-DOS - APP:KERBEROS:WIN-KERB-FALLBACK - APP:KERBEROS:XREALM-KDC-DOS - APP:MCAFEE-AM-INPUT-SSL - APP:MISC:ACTMQ-SHUTDN-CMD - APP:MISC:ADOBE-RTMP-UAF - APP:MISC:ALIENVALT-BAKUP-COM-RE - APP:MISC:APACHE-QPID-SEQSET-DOS - APP:MISC:APACHE-SVN-IO - APP:MISC:ARCSERVE-BKUP - APP:MISC:BIGANT-DDNF-BO - APP:MISC:CLEARSCADA-OPF-PARSE - APP:MISC:CVE-2014-0549-RTMP-MC - APP:MISC:DIASOFT-EXECCMD-CE - APP:MISC:ENTERASYS-NETSIGHT-BOF - APP:MISC:EZHOMETECH-EZSERVER-BO - APP:MISC:FREEBSD-MBUF-DOS - APP:MISC:GITORIOUS-RCE - APP:MISC:HP-INODE-BO - APP:MISC:HP-OA-HEALTH-BO - APP:MISC:NAGIOS-NRPE-CE - APP:MISC:OBJ-BO - APP:MISC:OBJ-OBJDB-BO - APP:MISC:SAM-ACTQ-MULTI - APP:MISC:SCHNEIDER-INDUSOFT-RCE - APP:MISC:SERCOMM-DEVICE-RCE - APP:MISC:SPREE-SEARCH-CMD-EXE - APP:MISC:WSHARK-ENTTEC-BO - APP:MISC:XEROX-MFP-COMND-EXEC - APP:MISC:ZABBIC-NODE-PROCESS-CE - APP:MISC:ZEND-SERVER-CE - APP:MIT-KERBEROS-5-POLICY-DOS - APP:MS-SNABASE-EXE-DOS - APP:MSDOTNET-CVE-2014-1806 - APP:NOVELL:MESSENGER-BOF - APP:NOVELL:MESSENGER-LOGIN - APP:NOVELL:ZENWORKS-DIR-TRAV - APP:NOVELL:ZENWORKS-MGT-UPLOAD - APP:OPENVIEW-STORAGE-BO - APP:ORACLE:WEBLOGIC-FILE-UPLOAD - APP:ORACLE:WEBLOGIC-SRV-RCE - APP:PERSISTENT-COMMAND-EXEC - APP:PROXY:SQUID-SSLBUMP-CERT - APP:QEMU-VNC-SETPIXEL-PTR-DEREF - APP:QUEST-BIG-BRO-FD - APP:RDP-BRUTE-FORCE - APP:REAL:REAL-MPG-WIDTH - APP:REDIS-GETNUM-IO - APP:REMOTE:CVE-2015-2373-RCE - APP:REMOTE:NETTRANSPORT-DM - APP:REMOTE:RDP-HEAP-BO - APP:REMOTE:RDP-MEM-OBJ - APP:SAFENET-VPN-OF - APP:SAP:3DM-FILE-BOF - APP:SAP:3DVIS-FLIC-BO - APP:SAP:INT-GRAPHICS-PARAMS-XSS - APP:SAP:NETWEAVER-BO - APP:SAP:NETWEAVER-DIAGI-DOS - APP:SAP:NETWEAVER-DOS - APP:SAP:NETWEAVER-SOAP-RCE - APP:SNORT:BACKORIFICE-DOS - APP:SQUID-BUMP-DOS - APP:SYMC:ALTIRIS-DS-SQL-INJ - APP:SYMC:ENCRYPTED-CMD-EXEC - APP:TMIC:SP-CREATE-BIND-OF - APP:TMIC:SP-EARTH-AGENT-OF - APP:UPNP:LIBUPNP-DSN-BOF - APP:UPNP:LIBUPNP-ROOT-DSN-BOF - APP:UPNP:LIBUPNP-UUID-BOF - APP:VCENTER-JMX-RCE - APP:VCENTER-JMX-RCE2 - APP:VINZANT-ARCHTCTR-AUTHWKNESS - CHAT:IRC:BOTNET:RA1NX-BOT-CE - CHAT:IRC:BOTNET:W3TW0RK-RCE - DB:IBM-SOLIDBD-WHERE-DOS - DB:IBM-SOLIDDB-ROWNUM - DB:MONGODB-NATIVEHELPER-RCE - DB:MYSQL:BENCHMARK-DOS - DB:MYSQL:BRUTE-FORCE - DB:MYSQL:CLIENT-BOF - DB:MYSQL:GRANT-FILE-BO - DB:MYSQL:ORACLE-XPATH-DOS - DB:MYSQL:ROOT-PRIVILEGE - DB:MYSQL:UPDATEXML-DOS - DB:MYSQL:USER-ENUMERATION - DB:MYSQL:WIN-RCE - DB:MYSQL:WINDOWS-REMOTE-ROOT - DB:ORACLE:DBMS:OUTPUT-TO-JAVA - DB:ORACLE:DECLARE-EXEC - DB:ORACLE:EVTDUMP - DB:ORACLE:SYS:LPXFSMSAX-NAME-BO - DB:POSTGRESQL:DBNAME-CLIFLAGINJ - DB:POSTGRESQL:GEO-OPS-PATH-IN - DB:POSTGRESQL:POSTGRE-DBSEC-BP - DDOS:LOIC-WEB - DHCP:SERVER:GNU-BASH-CMD-EXE - DHCP:SERVER:ISC-MAL-CLID - DNS:AUDIT:UNASSIGNED-OPCODE - DNS:AUDIT:Z-RESERVED-OPT - DNS:BIND-DBC-ASSERT-DOS - DNS:EXPLOIT:BIND-KEYPARSE-DOS - DNS:EXPLOIT:CLIBCVE-2015-7547BO - DNS:EXPLOIT:LIBCVE-2015-7547BO2 - DNS:GNUTLS-DANE-BOF - DNS:ISC-ASSERTION-DOS - DNS:ISC-BIND-DNSSEC-DOS - DNS:ISC-BIND-DOS - DNS:ISC-BIND-EDNS-OPT-DOS - DNS:ISC-BIND-PACKAGE-DOS - DNS:MS-ISA-CE - DNS:NGINX-RESOLVER-DOS - DNS:OVERFLOW:GNU-C-GLIBC - DNS:OVERFLOW:TFTPD32 - DNS:PDNS-AUTHSERV-DOS - DNS:POWERDNS-NAMESRVR-UDP-DOS - DNS:POWERDNS-NAMSRVR-TCP-DOS - DNS:REPERR:NULL-RDATA-LEN - DNS:RRSIG-QUERY - DNS:SQUID-DNS-DOS-1 - DNS:TUNNEL:I2P-DNS-QUERY - DNS:TUNNEL:NULL-RECORD - DNS:WORDPRESS-SOAK-SOAK-MALWARE - DOS:DELL-NETVAULT-DOS - DOS:FREEBSD-ROUTED-DAEMON - DOS:SLOWHTTPTEST-TOOL - DOS:WINDOWS:HTTP-SYS - DOS:WINDOWS:ISCSI-TARGET - HTTP:ADOBE-FLASH-PLAYER-BO - HTTP:ADOBE-FLASHPLYR-PRIV-ESC - HTTP:ANGLER-EXPKIT-URI - HTTP:APACHE:APACHE-CHUNKREQ-DOS - HTTP:APACHE:APR-UTIL-LIB-DOS - HTTP:APACHE:COUCHDB-UUID-DOS - HTTP:APACHE:HTTPD-ERROR-400 - HTTP:APACHE:HTTPD-MODLOG-COOKIE - HTTP:APACHE:MOD-LOG-CONFIG-DOS - HTTP:APACHE:MOD-REWRITE-CMD-EXE - HTTP:APACHE:REST-RCE - HTTP:APACHE:REV-PROXY-EXPLOIT - HTTP:APACHE:STRUTS-CI-SECBYPASS - HTTP:APACHE:STRUTS-OGNL-CE - HTTP:APACHE:STRUTS-RST-DMI-EXEC - HTTP:APACHE:STRUTS-URL-DOS - HTTP:APACHE:STRUTS-XSLT-FI - HTTP:BACKDOOR-UPATRE-UA - HTTP:C99-SHELL-BACKDOOR - HTTP:CARBERP-BACKDOOR-RCE - HTTP:CGI:BASH-INJECTION-HEADER - HTTP:CGI:MS-OFFICE-URL-BOF - HTTP:CISCO:DOWNLOADSERVLET-FU - HTTP:CLAMAV-ENCRYPT-PDF-MC2 - HTTP:CLANSPHERE-COOKIE-LFI - HTTP:DIR:HTTP-ACCEPT-ENCODING - HTTP:DIR:HTTP-ACCEPT-HDR - HTTP:DIR:HTTP-ACCEPT-LANG - HTTP:DIR:HTTP-AUTH-HDR - HTTP:DIR:HTTP-CONT-TYPE - HTTP:DIR:HTTP-CONTENT-MD5 - HTTP:DIR:HTTP-HOST-HDR - HTTP:DIR:HTTP-REFERER-HDR - HTTP:DIR:ZIMBRA-SERVER-LDAP - HTTP:DLINK-AUTHENTICATION-BO - HTTP:DOS:APACHE-TOMCAT-CHUNKED2 - HTTP:DOS:HAPROXY-REQDENY - HTTP:DOS:MIT-KERBEROS-5-POLICY - HTTP:DOS:PHP-UPLOAD - HTTP:DOS:SCHNEIDER-EXPRT-SCADA - HTTP:DOS:SQUID-HDR-RANGE - HTTP:DRUPAL-CODER-RCE - HTTP:EK-ANGLER-JAVA - HTTP:EXPLOIT:ILLEGAL-HOST-CHAR - HTTP:FORTINET-HELLO-MSG-DOS - HTTP:HTTP-INVALID-PORT-VALUE - HTTP:HTTP_PROXY-ATTACK - HTTP:IIS:ASP-NET-MVC-SEC-BYPASS - HTTP:IIS:ASPX-URL - HTTP:IIS:ASPX-URL-1 - HTTP:IIS:ENCODING:SINGLE-DIG-1 - HTTP:IIS:ENCODING:SINGLE-DIG-2 - HTTP:IIS:IIS-6-7-AUTH-BYPASS - HTTP:IIS:INT-OVERFLOW-DOS - HTTP:IIS:WEB-CONFIG-INFO-LEAK - HTTP:IIS:WEBDAV:WINDOWS-SHELL - HTTP:INFO-LEAK:BOOT-INI - HTTP:INFO-LEAK:BOOT-INI-TCP - HTTP:INVALID:EXPECT - HTTP:JAVA-UPDATE-RCE - HTTP:JENKINS-CI-SERVER-CE - HTTP:LIBGD-GD2GETHEADER-IO - HTTP:LIBGD-HEAP-BO - HTTP:LIBREOFFICE-INTEGR-UNDRFLW - HTTP:MALICIOUS-SESSION-COOKIE - HTTP:MAMBO-MYSQL-INF-DISCLOSURE - HTTP:MANAGENGINE-EVTLG-INF-DISC - HTTP:MAXTHON-HISTORY-XSS - HTTP:MISC:AVIRA-MGNT-HEADER-BOF - HTTP:MISC:CHASYS-BO - HTTP:MISC:COOL-EXKIT-JAR-DL - HTTP:MISC:CUTEZIP-BO - HTTP:MISC:CVE-2014-6332-RCE - HTTP:MISC:DAZ-STUDIO-SCRIPT-RCE - HTTP:MISC:ERS-VIEWER-BO - HTTP:MISC:GITLIST-URI-REQ-CE - HTTP:MISC:GRAPHITE-RCE - HTTP:MISC:GSM-SIMEDIT-BO - HTTP:MISC:IRFVIEW-JP2-BO - HTTP:MISC:JBOSS-SEAM-EL-RCE - HTTP:MISC:JOOMLA-UNSER-CE - HTTP:MISC:MAPLE-MAPLET-CMD-EXEC - HTTP:MISC:MINIUPNPD-SOAP-ACTION - HTTP:MISC:MS-FOREFRONT-DOS - HTTP:MISC:MS-OWA-URL-REDIR - HTTP:MISC:RUBY-RAILS-SECRET-RCE - HTTP:MISC:SPLUNK-CUSTOM-APP-CE - HTTP:MISC:WESTERN-DIGITAL-LFI - HTTP:MISC:WINRAR-FILENM-SPOOF - HTTP:MISC:WIRESHARK-LUA-RCE - HTTP:MONKEY-HTTPD-BO - HTTP:MS-VBSCRIPT-UAF-RCE - HTTP:MS-WIN-FOLDER-GUID-CE - HTTP:NAGIOS-CONFMGR-SQLINJ - HTTP:NEUTRINO-EK-SB - HTTP:NGINX-RQST-URI-SECBYPASS - HTTP:NODEJS-DOS - HTTP:NOVELL:GROUPWISE-NETAGT-BO - HTTP:ORACLE:CONF-ACCESS - HTTP:ORACLE:GENERIC-SIGNATUR-MC - HTTP:ORACLE:OUTSIDE-PRDOX-BO2 - HTTP:ORACLE:SSO-ACCESS - HTTP:PHP:CDF-INFINITE-LOOP-DOS - HTTP:PHP:CORE-INT-OF-CE - HTTP:PHP:DATEINTERVAL-DOS - HTTP:PHP:EXIF-NULL-PTR-DEREF - HTTP:PHP:INVISION-IPS-COMM - HTTP:PHP:JOOMLA-ADMIN-SCAN - HTTP:PHP:OPENEMR-GLOBALS-AB - HTTP:PHP:PHAR-PARSE-TARFILE-ID - HTTP:PHP:PHPMYADMIN:SETUP-SCAN - HTTP:PHP:PHPSPLOIT-POSTEXP - HTTP:PHP:SPL-OBJECT-UNSERIALIZE - HTTP:PHP:TAR-FILE-PTR - HTTP:PHP:WP-BRUTE-FORCE-LOGIN - HTTP:PHP:WP-INCLUDES-ACCESS - HTTP:PHP:WP-README-SCAN - HTTP:PHP:XAMPP-FILE-WRITE - HTTP:PHP:ZIPARCHIVE-IO - HTTP:PROXY:SQUID-DOS - HTTP:REGIN-CNC-TRAFFIC - HTTP:REQERR:INV-IPV6-HOST-HDR - HTTP:REQERR:NULL-IN-HEADER - HTTP:SOLARWINDS-AUTH-BYPASS - HTTP:SOLARWINDS-POLICYBYPASS - HTTP:SQL:INJ:ACCEPT-HDR-1 - HTTP:SQL:INJ:ACCEPT-HDR-3 - HTTP:SQL:INJ:ACCEPT-LANG-HDR-1 - HTTP:SQL:INJ:ACCEPT-LANG-HDR-3 - HTTP:SQL:INJ:AND-NUMBER-EQUALS - HTTP:SQL:INJ:CHAR - HTTP:SQL:INJ:CHAR-ENCODE - HTTP:SQL:INJ:COMMENT - HTTP:SQL:INJ:COMPARISON - HTTP:SQL:INJ:CONCAT - HTTP:SQL:INJ:CONT-MD5-HDR-1 - HTTP:SQL:INJ:CONT-MD5-HDR-3 - HTTP:SQL:INJ:CONT-TYPE-HDR-1 - HTTP:SQL:INJ:CONT-TYPE-HDR-3 - HTTP:SQL:INJ:CONVERT - HTTP:SQL:INJ:CONVERT-INJ-OF - HTTP:SQL:INJ:HAVIJ-UA - HTTP:SQL:INJ:HTTP-AUTH-HDR-1 - HTTP:SQL:INJ:HTTP-AUTH-HDR-3 - HTTP:SQL:INJ:HTTP-HOST-HDR-1 - HTTP:SQL:INJ:HTTP-HOST-HDR-3 - HTTP:SQL:INJ:HTTP-REQ-HDR-3 - HTTP:SQL:INJ:INSERT-VALUES - HTTP:SQL:INJ:INTO-OUTFILE - HTTP:SQL:INJ:IS_SRVROLEMEMBER - HTTP:SQL:INJ:MS-SQL-FUNCTIONS - HTTP:SQL:INJ:MS-SQL-TABLE-NAME - HTTP:SQL:INJ:MYSQL-TABLE-NAME - HTTP:SQL:INJ:NULLBYTE-COMMENT - HTTP:SQL:INJ:PL-SQL - HTTP:SQL:INJ:PROC-GENERIC - HTTP:SQL:INJ:REFERER-HDR-1 - HTTP:SQL:INJ:REFERER-HDR-3 - HTTP:SQL:INJ:SLASH-STAR - HTTP:SQL:INJ:SQLMAP-ACTIVITY - HTTP:SQL:INJ:SYSOBJECTS - HTTP:SQL:INJ:UA-HDR-1 - HTTP:SQL:INJ:UA-HDR-3 - HTTP:SQL:INJ:UNION-SELECT - HTTP:SQL:INJ:USER-ADD - HTTP:SQL:INJ:VERSION-DETECT - HTTP:SQL:INJ:WAITFOR-DELAY - HTTP:SQUID-BUMP-DOS - HTTP:STATIC-SERVER-BOF - HTTP:STC:ACTIVEX:KVIEW-KCHARTXY - HTTP:STC:ADOBE:2013-5065-PDF - HTTP:STC:ADOBE:ACROFORM-NULL-CE - HTTP:STC:ADOBE:CONVFILTER-UAF - HTTP:STC:ADOBE:CVE-2009-2985-MC - HTTP:STC:ADOBE:CVE-2009-3791-MC - HTTP:STC:ADOBE:CVE-2009-3959-OF - HTTP:STC:ADOBE:CVE-2010-2202-MC - HTTP:STC:ADOBE:CVE-2013-0622-SB - HTTP:STC:ADOBE:CVE-2013-3353 - HTTP:STC:ADOBE:CVE-2013-3355-CE - HTTP:STC:ADOBE:CVE-2013-5324-MC - HTTP:STC:ADOBE:CVE-2013-5325-CE - HTTP:STC:ADOBE:CVE-2013-5329-CE - HTTP:STC:ADOBE:CVE-2014-0511-BO - HTTP:STC:ADOBE:CVE-2014-0512-CE - HTTP:STC:ADOBE:CVE-2014-0517-CE - HTTP:STC:ADOBE:CVE-2014-0521 - HTTP:STC:ADOBE:CVE-2014-0522-MC - HTTP:STC:ADOBE:CVE-2014-0523-CE - HTTP:STC:ADOBE:CVE-2014-0524-MC - HTTP:STC:ADOBE:CVE-2014-0531-MC - HTTP:STC:ADOBE:CVE-2014-0537-CE - HTTP:STC:ADOBE:CVE-2014-0538-UF - HTTP:STC:ADOBE:CVE-2014-0539-CE - HTTP:STC:ADOBE:CVE-2014-0545-MC - HTTP:STC:ADOBE:CVE-2014-0547-MC - HTTP:STC:ADOBE:CVE-2014-0548-PB - HTTP:STC:ADOBE:CVE-2014-0550-BO - HTTP:STC:ADOBE:CVE-2014-0553-MC - HTTP:STC:ADOBE:CVE-2014-0554 - HTTP:STC:ADOBE:CVE-2014-0555-BO - HTTP:STC:ADOBE:CVE-2014-0559-BO - HTTP:STC:ADOBE:CVE-2014-0564-MC - HTTP:STC:ADOBE:CVE-2014-0565-MC - HTTP:STC:ADOBE:CVE-2014-0567-OF - HTTP:STC:ADOBE:CVE-2014-0568-SE - HTTP:STC:ADOBE:CVE-2014-0574-CE - HTTP:STC:ADOBE:CVE-2014-0574-MC - HTTP:STC:ADOBE:CVE-2014-0576-CE - HTTP:STC:ADOBE:CVE-2014-0577-CE - HTTP:STC:ADOBE:CVE-2014-0578-CE - HTTP:STC:ADOBE:CVE-2014-0580-SB - HTTP:STC:ADOBE:CVE-2014-0584-CE - HTTP:STC:ADOBE:CVE-2014-0586-CE - HTTP:STC:ADOBE:CVE-2014-4671 - HTTP:STC:ADOBE:CVE-2014-8440-CE - HTTP:STC:ADOBE:CVE-2014-8441-MC - HTTP:STC:ADOBE:CVE-2014-8447-MC - HTTP:STC:ADOBE:CVE-2014-8449-CE - HTTP:STC:ADOBE:CVE-2014-8450-CE - HTTP:STC:ADOBE:CVE-2014-8451-ID - HTTP:STC:ADOBE:CVE-2014-8455-UF - HTTP:STC:ADOBE:CVE-2014-8459-MC - HTTP:STC:ADOBE:CVE-2014-8460-BO - HTTP:STC:ADOBE:CVE-2014-8461-MC - HTTP:STC:ADOBE:CVE-2014-9159-BO - HTTP:STC:ADOBE:CVE-2014-9160-CE - HTTP:STC:ADOBE:CVE-2014-9162-ID - HTTP:STC:ADOBE:CVE-2015-0087-ID - HTTP:STC:ADOBE:CVE-2015-0089-ID - HTTP:STC:ADOBE:CVE-2015-0090-CE - HTTP:STC:ADOBE:CVE-2015-0093-CE - HTTP:STC:ADOBE:CVE-2015-0301-MC - HTTP:STC:ADOBE:CVE-2015-0302-ID - HTTP:STC:ADOBE:CVE-2015-0303-SB - HTTP:STC:ADOBE:CVE-2015-0305-MC - HTTP:STC:ADOBE:CVE-2015-0306-MC - HTTP:STC:ADOBE:CVE-2015-0307-DS - HTTP:STC:ADOBE:CVE-2015-0313-ID - HTTP:STC:ADOBE:CVE-2015-0314-BO - HTTP:STC:ADOBE:CVE-2015-0315-CE - HTTP:STC:ADOBE:CVE-2015-0317-CE - HTTP:STC:ADOBE:CVE-2015-0319-CE - HTTP:STC:ADOBE:CVE-2015-0320-CE - HTTP:STC:ADOBE:CVE-2015-0321-CE - HTTP:STC:ADOBE:CVE-2015-0322-CE - HTTP:STC:ADOBE:CVE-2015-0323-CE - HTTP:STC:ADOBE:CVE-2015-0324-CE - HTTP:STC:ADOBE:CVE-2015-0325-CE - HTTP:STC:ADOBE:CVE-2015-0326-DS - HTTP:STC:ADOBE:CVE-2015-0328-CE - HTTP:STC:ADOBE:CVE-2015-0329-CE - HTTP:STC:ADOBE:CVE-2015-0330-CE - HTTP:STC:ADOBE:CVE-2015-0333-MC - HTTP:STC:ADOBE:CVE-2015-0334-CE - HTTP:STC:ADOBE:CVE-2015-0335-CE - HTTP:STC:ADOBE:CVE-2015-0337-PB - HTTP:STC:ADOBE:CVE-2015-0338-CE - HTTP:STC:ADOBE:CVE-2015-0339-CE - HTTP:STC:ADOBE:CVE-2015-0340-CE - HTTP:STC:ADOBE:CVE-2015-0341-CE - HTTP:STC:ADOBE:CVE-2015-0342-CE - HTTP:STC:ADOBE:CVE-2015-0346-CE - HTTP:STC:ADOBE:CVE-2015-0347-CE - HTTP:STC:ADOBE:CVE-2015-0348-CE - HTTP:STC:ADOBE:CVE-2015-0349-CE - HTTP:STC:ADOBE:CVE-2015-0350-MC - HTTP:STC:ADOBE:CVE-2015-0351-MC - HTTP:STC:ADOBE:CVE-2015-0352-MC - HTTP:STC:ADOBE:CVE-2015-0353-CE - HTTP:STC:ADOBE:CVE-2015-0354-MC - HTTP:STC:ADOBE:CVE-2015-0355-MC - - - - - - - - - source-address - - - - - - - - - - - - DBE-Q-IPS-policy-template-2 - - any - any - default - - [Recommended]Critical - ICMP - [Recommended]ICMP - All - [Recommended]ICMP - Critical - [Recommended]ICMP - Info - [Recommended]ICMP - Major - [Recommended]ICMP - Minor - [Recommended]ICMP - Warning - [Recommended]Info - ICMP - [Recommended]Major - ICMP - [Recommended]Minor - ICMP - [Recommended]Misc_Critical - ICMP - [Recommended]Misc_ICMP - All - [Recommended]Misc_ICMP - Critical - [Recommended]Misc_ICMP - Info - [Recommended]Misc_ICMP - Major - [Recommended]Misc_ICMP - Minor - [Recommended]Misc_ICMP - Warning - [Recommended]Misc_Info - ICMP - [Recommended]Misc_Major - ICMP - [Recommended]Misc_Minor - ICMP - [Recommended]Misc_Warning - ICMP - [Recommended]Response_Critical - ICMP - [Recommended]Response_ICMP - All - [Recommended]Response_ICMP - Critical - [Recommended]Response_ICMP - Info - [Recommended]Response_ICMP - Major - [Recommended]Response_ICMP - Minor - [Recommended]Response_ICMP - Warning - [Recommended]Response_Info - ICMP - [Recommended]Response_Major - ICMP - [Recommended]Response_Minor - ICMP - [Recommended]Response_Warning - ICMP - [Recommended]Warning - ICMP - - - - - - - - - source-address - - - - - - - - - - - Space-IPS-Policy - - - - - flow-based - - - - - - untrust-screen - - - - 5000 - - - - - - - - - - - - - - - - - - - - - - - - - 5000 - - - - - 1024 - 200 - 1024 - 2048 - 2000 - 20 - - - - - - - - - sp_dmzpfsnat -
- 10.68.16.13/32 -
-
- 10.68.16.14/32 -
-
- 10.68.16.15/32 -
-
- 10.68.16.16/32 -
- - - 1024 - - 63486 - - - - - 80 - 70 - -
- - rs_mis2dmzpfsnat - - sz_dbemis - - - trust - - - nr_dmzpsnat - - 10.68.16.4/32 - 10.68.16.5/32 - - - - - sp_dmzpfsnat - - - - - - - - - dp_dmzpf01ap1dnat -
- 10.68.16.4/32 -
-
- - dp_dmzpf02ap1dnat -
- 10.68.16.5/32 -
-
- - rs_mis2dmzpfdnat - - sz_dbemis - - - nr_p01ap1dnat - - - 12.102.197.133/32 - - - - - - dp_dmzpf01ap1dnat - - - - - - nr_p02ap1dnat - - - 12.102.197.134/32 - - - - - - dp_dmzpf02ap1dnat - - - - - -
- - - reth0.0 -
- 12.102.197.133/32 -
-
- 12.102.197.134/32 -
-
- - reth1.0 -
- 10.68.16.13/32 -
-
- 10.68.16.14/32 -
-
- 10.68.16.15/32 -
-
- 10.68.16.16/32 -
-
-
-
- - - trust - trust - - default-permit - - any - any - any - - - - - - - - - - - - - trust - untrust - - default-permit - - any - any - any - - - - - - - - - - - - - sz_dbemis - trust - - sp_bwxspapi - - any - as_bwdmzpxspapsrvrs_2 - ps_bwapi_3 - - - - - - - - - - - - - - sp_bwpdeny - - any - any - any - - - - - - - - - - - - - trust - sz_dbemis - - sp_bwzdeny - - any - any - any - - - - - - - - - - - - - untrust - trust - - default-deny - - any - any - any - - - - - - - - - - - - - - trust - - -
- ad_bwxsp02ap1pf - 10.68.16.5/32 -
-
- ad_bwxsp01ap1pf_1 - 10.68.16.4/32 -
- - as_bwdmzpxspapsrvrs_2 -
- ad_bwxsp01ap1pf_1 -
-
- ad_bwxsp02ap1pf -
-
-
- - - all - - - all - - - - reth1.0 - -
- - untrust - untrust-screen - - - sz_dbemis - untrust-screen - - reth0.0 - - -
-
- - - ge-0/0/1 - - - reth0 - - - - - ge-0/0/2 - - - reth1 - - - - - ge-7/0/1 - - - reth0 - - - - - ge-7/0/2 - - - reth1 - - - - - fab0 - - - ge-0/0/0 - - - - - fab1 - - - ge-7/0/0 - - - - - fxp0 - - 0 - - - - reth0 - - 1 - - - 0 - - - - - ff_pdscp - - -
- 12.102.197.132/25 -
-
- - - - ff_v6pdscp - - -
- 2001:1890:1001:23ed::3:1/64 -
-
- 2001:1890:1001:23ed::3:2/64 -
-
- 2001:1890:1001:23ed::3:3/64 -
-
-
-
-
- - reth1 - - 1 - - - 0 - - - - - ff_pdscp - - -
- 10.68.16.12/22 -
-
- - - - ff_v6pdscp - - -
- 2001:1890:1001:23ec::3:1/64 -
-
- 2001:1890:1001:23ec::3:2/64 -
-
- 2001:1890:1001:23ec::3:3/64 -
-
- 2001:1890:1001:23ec::3:4/64 -
-
- 2001:1890:1001:23ec::3:5/64 -
-
-
-
-
-
- - - vsbk68 - read-only - - 130.6.45.42/32 - - - 130.6.45.41/32 - - - 130.6.44.254/32 - - - 130.6.44.253/32 - - - 135.25.175.114/32 - - - 135.21.235.37/32 - - - - space15 - read-write - - 135.144.0.60/32 - - - 135.144.0.59/32 - - - 135.144.0.61/32 - - - - GFP - v2 - 162 - - 135.89.33.175 - - - 199.37.245.24 - - - - space - - 135.144.0.60 - - - - - - - - - - - rg_mis2dmzp - rg_v6mis2dmzp - - - - - 0.0.0.0/0 - 135.69.228.1 - - - - rg_mis2dmzp - vrf-untrust.inet.0 - inet.0 - - - rg_v6mis2dmzp - vrf-untrust.inet6.0 - inet6.0 - - - - - - reth0 - - 0 - - - cr_pdscpaf - - - cr_v6pdscpaf - - - - - - reth1 - - 0 - - - cr_pdscpaf - - - cr_v6pdscpaf - - - - - - - - cr_pdscpaf - - assured-forwarding - - low - 011010 - - - - - cr_v6pdscpaf - - assured-forwarding - - low - 011010 - - - - - - - - - - ff_pdscp - - fr_pdscp - - - reth0 - - - reth1 - - - - assured-forwarding - - - - - - - - ff_v6pdscp - - fr_v6pdscp - - - reth0 - - - reth1 - - - - assured-forwarding - - - - - - - - - - vrf-untrust - virtual-router - - reth0.0 - - - - - rg_mis2dmzp - rg_v6mis2dmzp - - - - vrf-untrust.inet6.0 - - - 0::/0 - 2001:1890:1001:23ed::1 - - - - - - 0.0.0.0/0 - 12.102.197.129 - - - - - - - - ap_xsi-xml-https - tcp - 443 - - - ps_bwapi_3 - - ap_xsi-xml-https - - - -
\ No newline at end of file