diff --git a/configs/fortigate/global/antivirus.cfg b/configs/fortigate/global/antivirus.cfg new file mode 100644 index 0000000..f732470 --- /dev/null +++ b/configs/fortigate/global/antivirus.cfg @@ -0,0 +1,71 @@ +config antivirus profile + edit "g-default" + set comment "Scan files and block viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-sniffer-profile" + set comment "Scan files and monitor viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next +end diff --git a/configs/fortigate/global/application.cfg b/configs/fortigate/global/application.cfg new file mode 100644 index 0000000..816ed80 --- /dev/null +++ b/configs/fortigate/global/application.cfg @@ -0,0 +1,29 @@ +config application list + edit "g-default" + set comment "Monitor all applications." + config entries + edit 1 + set action pass + next + end + next + edit "g-sniffer-profile" + set comment "Monitor all applications." + unset options + config entries + edit 1 + set action pass + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set deep-app-inspection disable + config entries + edit 1 + set action pass + set log disable + next + end + next +end diff --git a/configs/fortigate/global/certificate.cfg b/configs/fortigate/global/certificate.cfg new file mode 100644 index 0000000..78136ba --- /dev/null +++ b/configs/fortigate/global/certificate.cfg @@ -0,0 +1,69 @@ +config certificate ca +end +config certificate local + edit "Fortinet_CA_SSL" + set password ENC *HIDDEN* + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set source factory + next + edit "Fortinet_CA_Untrusted" + set password ENC *HIDDEN* + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set source factory + next + edit "Fortinet_SSL" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_RSA1024" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_RSA2048" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_RSA4096" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_DSA1024" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_DSA2048" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_ECDSA256" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_ECDSA384" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_ECDSA521" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_ED25519" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next + edit "Fortinet_SSL_ED448" + set password ENC *HIDDEN* + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set source factory + next +end diff --git a/configs/fortigate/global/dlp.cfg b/configs/fortigate/global/dlp.cfg new file mode 100644 index 0000000..c775348 --- /dev/null +++ b/configs/fortigate/global/dlp.cfg @@ -0,0 +1,9 @@ +config dlp sensor + edit "g-default" + set comment "Default sensor." + next + edit "g-sniffer-profile" + set comment "Log a summary of email and web traffic." + set summary-proto smtp pop3 imap http-get http-post + next +end diff --git a/configs/fortigate/global/endpoint-control.cfg b/configs/fortigate/global/endpoint-control.cfg new file mode 100644 index 0000000..0ff72a7 --- /dev/null +++ b/configs/fortigate/global/endpoint-control.cfg @@ -0,0 +1,17 @@ +config endpoint-control fctems + edit 1 + set pull-sysinfo disable + set pull-vulnerabilities disable + set pull-avatars disable + set pull-tags disable + set pull-malware-hash disable + next + edit 2 + next + edit 3 + next + edit 4 + next + edit 5 + next +end diff --git a/configs/fortigate/global/file-filter.cfg b/configs/fortigate/global/file-filter.cfg new file mode 100644 index 0000000..56fff32 --- /dev/null +++ b/configs/fortigate/global/file-filter.cfg @@ -0,0 +1,8 @@ +config file-filter profile + edit "g-default" + set comment "File type inspection." + next + edit "g-sniffer-profile" + set comment "File type inspection." + next +end diff --git a/configs/fortigate/global/firewall.cfg b/configs/fortigate/global/firewall.cfg new file mode 100644 index 0000000..5192322 --- /dev/null +++ b/configs/fortigate/global/firewall.cfg @@ -0,0 +1,5230 @@ +config firewall wildcard-fqdn custom + edit "g-cdn-apple" + set wildcard-fqdn "*.cdn-apple.com" + next + edit "g-mzstatic-apple" + set wildcard-fqdn "*.mzstatic.com" + next + edit "g-adobe" + set wildcard-fqdn "*.adobe.com" + next + edit "g-Adobe Login" + set wildcard-fqdn "*.adobelogin.com" + next + edit "g-android" + set wildcard-fqdn "*.android.com" + next + edit "g-apple" + set wildcard-fqdn "*.apple.com" + next + edit "g-appstore" + set wildcard-fqdn "*.appstore.com" + next + edit "g-auth.gfx.ms" + set wildcard-fqdn "*.auth.gfx.ms" + next + edit "g-citrix" + set wildcard-fqdn "*.citrixonline.com" + next + edit "g-dropbox.com" + set wildcard-fqdn "*.dropbox.com" + next + edit "g-eease" + set wildcard-fqdn "*.eease.com" + next + edit "g-firefox update server" + set wildcard-fqdn "aus*.mozilla.org" + next + edit "g-fortinet" + set wildcard-fqdn "*.fortinet.com" + next + edit "g-googleapis.com" + set wildcard-fqdn "*.googleapis.com" + next + edit "g-google-drive" + set wildcard-fqdn "*drive.google.com" + next + edit "g-google-play2" + set wildcard-fqdn "*.ggpht.com" + next + edit "g-google-play3" + set wildcard-fqdn "*.books.google.com" + next + edit "g-Gotomeeting" + set wildcard-fqdn "*.gotomeeting.com" + next + edit "g-icloud" + set wildcard-fqdn "*.icloud.com" + next + edit "g-itunes" + set wildcard-fqdn "*itunes.apple.com" + next + edit "g-microsoft" + set wildcard-fqdn "*.microsoft.com" + next + edit "g-skype" + set wildcard-fqdn "*.messenger.live.com" + next + edit "g-softwareupdate.vmware.com" + set wildcard-fqdn "*.softwareupdate.vmware.com" + next + edit "g-verisign" + set wildcard-fqdn "*.verisign.com" + next + edit "g-Windows update 2" + set wildcard-fqdn "*.windowsupdate.com" + next + edit "g-live.com" + set wildcard-fqdn "*.live.com" + next + edit "g-google-play" + set wildcard-fqdn "*play.google.com" + next + edit "g-update.microsoft.com" + set wildcard-fqdn "*update.microsoft.com" + next + edit "g-swscan.apple.com" + set wildcard-fqdn "*swscan.apple.com" + next + edit "g-autoupdate.opera.com" + set wildcard-fqdn "*autoupdate.opera.com" + next +end +config firewall internet-service-name + edit "Google-Other" + set internet-service-id 65536 + next + edit "Google-Web" + set internet-service-id 65537 + next + edit "Google-ICMP" + set internet-service-id 65538 + next + edit "Google-DNS" + set internet-service-id 65539 + next + edit "Google-Outbound_Email" + set internet-service-id 65540 + next + edit "Google-SSH" + set internet-service-id 65542 + next + edit "Google-FTP" + set internet-service-id 65543 + next + edit "Google-NTP" + set internet-service-id 65544 + next + edit "Google-Inbound_Email" + set internet-service-id 65545 + next + edit "Google-LDAP" + set internet-service-id 65550 + next + edit "Google-NetBIOS.Session.Service" + set internet-service-id 65551 + next + edit "Google-RTMP" + set internet-service-id 65552 + next + edit "Google-NetBIOS.Name.Service" + set internet-service-id 65560 + next + edit "Google-Google.Cloud" + set internet-service-id 65641 + next + edit "Google-Google.Bot" + set internet-service-id 65643 + next + edit "Google-Gmail" + set internet-service-id 65646 + next + edit "Meta-Other" + set internet-service-id 131072 + next + edit "Meta-Web" + set internet-service-id 131073 + next + edit "Meta-ICMP" + set internet-service-id 131074 + next + edit "Meta-DNS" + set internet-service-id 131075 + next + edit "Meta-Outbound_Email" + set internet-service-id 131076 + next + edit "Meta-SSH" + set internet-service-id 131078 + next + edit "Meta-FTP" + set internet-service-id 131079 + next + edit "Meta-NTP" + set internet-service-id 131080 + next + edit "Meta-Inbound_Email" + set internet-service-id 131081 + next + edit "Meta-LDAP" + set internet-service-id 131086 + next + edit "Meta-NetBIOS.Session.Service" + set internet-service-id 131087 + next + edit "Meta-RTMP" + set internet-service-id 131088 + next + edit "Meta-NetBIOS.Name.Service" + set internet-service-id 131096 + next + edit "Meta-Whatsapp" + set internet-service-id 131184 + next + edit "Meta-Instagram" + set internet-service-id 131189 + next + edit "Apple-Other" + set internet-service-id 196608 + next + edit "Apple-Web" + set internet-service-id 196609 + next + edit "Apple-ICMP" + set internet-service-id 196610 + next + edit "Apple-DNS" + set internet-service-id 196611 + next + edit "Apple-Outbound_Email" + set internet-service-id 196612 + next + edit "Apple-SSH" + set internet-service-id 196614 + next + edit "Apple-FTP" + set internet-service-id 196615 + next + edit "Apple-NTP" + set internet-service-id 196616 + next + edit "Apple-Inbound_Email" + set internet-service-id 196617 + next + edit "Apple-LDAP" + set internet-service-id 196622 + next + edit "Apple-NetBIOS.Session.Service" + set internet-service-id 196623 + next + edit "Apple-RTMP" + set internet-service-id 196624 + next + edit "Apple-NetBIOS.Name.Service" + set internet-service-id 196632 + next + edit "Apple-App.Store" + set internet-service-id 196723 + next + edit "Apple-APNs" + set internet-service-id 196747 + next + edit "Yahoo-Other" + set internet-service-id 262144 + next + edit "Yahoo-Web" + set internet-service-id 262145 + next + edit "Yahoo-ICMP" + set internet-service-id 262146 + next + edit "Yahoo-DNS" + set internet-service-id 262147 + next + edit "Yahoo-Outbound_Email" + set internet-service-id 262148 + next + edit "Yahoo-SSH" + set internet-service-id 262150 + next + edit "Yahoo-FTP" + set internet-service-id 262151 + next + edit "Yahoo-NTP" + set internet-service-id 262152 + next + edit "Yahoo-Inbound_Email" + set internet-service-id 262153 + next + edit "Yahoo-LDAP" + set internet-service-id 262158 + next + edit "Yahoo-NetBIOS.Session.Service" + set internet-service-id 262159 + next + edit "Yahoo-RTMP" + set internet-service-id 262160 + next + edit "Yahoo-NetBIOS.Name.Service" + set internet-service-id 262168 + next + edit "Microsoft-Other" + set internet-service-id 327680 + next + edit "Microsoft-Web" + set internet-service-id 327681 + next + edit "Microsoft-ICMP" + set internet-service-id 327682 + next + edit "Microsoft-DNS" + set internet-service-id 327683 + next + edit "Microsoft-Outbound_Email" + set internet-service-id 327684 + next + edit "Microsoft-SSH" + set internet-service-id 327686 + next + edit "Microsoft-FTP" + set internet-service-id 327687 + next + edit "Microsoft-NTP" + set internet-service-id 327688 + next + edit "Microsoft-Inbound_Email" + set internet-service-id 327689 + next + edit "Microsoft-LDAP" + set internet-service-id 327694 + next + edit "Microsoft-NetBIOS.Session.Service" + set internet-service-id 327695 + next + edit "Microsoft-RTMP" + set internet-service-id 327696 + next + edit "Microsoft-NetBIOS.Name.Service" + set internet-service-id 327704 + next + edit "Microsoft-Skype_Teams" + set internet-service-id 327781 + next + edit "Microsoft-Office365" + set internet-service-id 327782 + next + edit "Microsoft-Azure" + set internet-service-id 327786 + next + edit "Microsoft-Bing.Bot" + set internet-service-id 327788 + next + edit "Microsoft-Outlook" + set internet-service-id 327791 + next + edit "Microsoft-Microsoft.Update" + set internet-service-id 327793 + next + edit "Microsoft-Dynamics" + set internet-service-id 327837 + next + edit "Microsoft-WNS" + set internet-service-id 327839 + next + edit "Microsoft-Office365.Published" + set internet-service-id 327880 + next + edit "Microsoft-Intune" + set internet-service-id 327886 + next + edit "Amazon-Other" + set internet-service-id 393216 + next + edit "Amazon-Web" + set internet-service-id 393217 + next + edit "Amazon-ICMP" + set internet-service-id 393218 + next + edit "Amazon-DNS" + set internet-service-id 393219 + next + edit "Amazon-Outbound_Email" + set internet-service-id 393220 + next + edit "Amazon-SSH" + set internet-service-id 393222 + next + edit "Amazon-FTP" + set internet-service-id 393223 + next + edit "Amazon-NTP" + set internet-service-id 393224 + next + edit "Amazon-Inbound_Email" + set internet-service-id 393225 + next + edit "Amazon-LDAP" + set internet-service-id 393230 + next + edit "Amazon-NetBIOS.Session.Service" + set internet-service-id 393231 + next + edit "Amazon-RTMP" + set internet-service-id 393232 + next + edit "Amazon-NetBIOS.Name.Service" + set internet-service-id 393240 + next + edit "Amazon-AWS" + set internet-service-id 393320 + next + edit "Amazon-AWS.WorkSpaces.Gateway" + set internet-service-id 393403 + next + edit "Amazon-Twitch" + set internet-service-id 393446 + next + edit "eBay-Other" + set internet-service-id 458752 + next + edit "eBay-Web" + set internet-service-id 458753 + next + edit "eBay-ICMP" + set internet-service-id 458754 + next + edit "eBay-DNS" + set internet-service-id 458755 + next + edit "eBay-Outbound_Email" + set internet-service-id 458756 + next + edit "eBay-SSH" + set internet-service-id 458758 + next + edit "eBay-FTP" + set internet-service-id 458759 + next + edit "eBay-NTP" + set internet-service-id 458760 + next + edit "eBay-Inbound_Email" + set internet-service-id 458761 + next + edit "eBay-LDAP" + set internet-service-id 458766 + next + edit "eBay-NetBIOS.Session.Service" + set internet-service-id 458767 + next + edit "eBay-RTMP" + set internet-service-id 458768 + next + edit "eBay-NetBIOS.Name.Service" + set internet-service-id 458776 + next + edit "PayPal-Other" + set internet-service-id 524288 + next + edit "PayPal-Web" + set internet-service-id 524289 + next + edit "PayPal-ICMP" + set internet-service-id 524290 + next + edit "PayPal-DNS" + set internet-service-id 524291 + next + edit "PayPal-Outbound_Email" + set internet-service-id 524292 + next + edit "PayPal-SSH" + set internet-service-id 524294 + next + edit "PayPal-FTP" + set internet-service-id 524295 + next + edit "PayPal-NTP" + set internet-service-id 524296 + next + edit "PayPal-Inbound_Email" + set internet-service-id 524297 + next + edit "PayPal-LDAP" + set internet-service-id 524302 + next + edit "PayPal-NetBIOS.Session.Service" + set internet-service-id 524303 + next + edit "PayPal-RTMP" + set internet-service-id 524304 + next + edit "PayPal-NetBIOS.Name.Service" + set internet-service-id 524312 + next + edit "Box-Other" + set internet-service-id 589824 + next + edit "Box-Web" + set internet-service-id 589825 + next + edit "Box-ICMP" + set internet-service-id 589826 + next + edit "Box-DNS" + set internet-service-id 589827 + next + edit "Box-Outbound_Email" + set internet-service-id 589828 + next + edit "Box-SSH" + set internet-service-id 589830 + next + edit "Box-FTP" + set internet-service-id 589831 + next + edit "Box-NTP" + set internet-service-id 589832 + next + edit "Box-Inbound_Email" + set internet-service-id 589833 + next + edit "Box-LDAP" + set internet-service-id 589838 + next + edit "Box-NetBIOS.Session.Service" + set internet-service-id 589839 + next + edit "Box-RTMP" + set internet-service-id 589840 + next + edit "Box-NetBIOS.Name.Service" + set internet-service-id 589848 + next + edit "Salesforce-Other" + set internet-service-id 655360 + next + edit "Salesforce-Web" + set internet-service-id 655361 + next + edit "Salesforce-ICMP" + set internet-service-id 655362 + next + edit "Salesforce-DNS" + set internet-service-id 655363 + next + edit "Salesforce-Outbound_Email" + set internet-service-id 655364 + next + edit "Salesforce-SSH" + set internet-service-id 655366 + next + edit "Salesforce-FTP" + set internet-service-id 655367 + next + edit "Salesforce-NTP" + set internet-service-id 655368 + next + edit "Salesforce-Inbound_Email" + set internet-service-id 655369 + next + edit "Salesforce-LDAP" + set internet-service-id 655374 + next + edit "Salesforce-NetBIOS.Session.Service" + set internet-service-id 655375 + next + edit "Salesforce-RTMP" + set internet-service-id 655376 + next + edit "Salesforce-NetBIOS.Name.Service" + set internet-service-id 655384 + next + edit "Salesforce-Email.Relay" + set internet-service-id 655530 + next + edit "Dropbox-Other" + set internet-service-id 720896 + next + edit "Dropbox-Web" + set internet-service-id 720897 + next + edit "Dropbox-ICMP" + set internet-service-id 720898 + next + edit "Dropbox-DNS" + set internet-service-id 720899 + next + edit "Dropbox-Outbound_Email" + set internet-service-id 720900 + next + edit "Dropbox-SSH" + set internet-service-id 720902 + next + edit "Dropbox-FTP" + set internet-service-id 720903 + next + edit "Dropbox-NTP" + set internet-service-id 720904 + next + edit "Dropbox-Inbound_Email" + set internet-service-id 720905 + next + edit "Dropbox-LDAP" + set internet-service-id 720910 + next + edit "Dropbox-NetBIOS.Session.Service" + set internet-service-id 720911 + next + edit "Dropbox-RTMP" + set internet-service-id 720912 + next + edit "Dropbox-NetBIOS.Name.Service" + set internet-service-id 720920 + next + edit "Netflix-Other" + set internet-service-id 786432 + next + edit "Netflix-Web" + set internet-service-id 786433 + next + edit "Netflix-ICMP" + set internet-service-id 786434 + next + edit "Netflix-DNS" + set internet-service-id 786435 + next + edit "Netflix-Outbound_Email" + set internet-service-id 786436 + next + edit "Netflix-SSH" + set internet-service-id 786438 + next + edit "Netflix-FTP" + set internet-service-id 786439 + next + edit "Netflix-NTP" + set internet-service-id 786440 + next + edit "Netflix-Inbound_Email" + set internet-service-id 786441 + next + edit "Netflix-LDAP" + set internet-service-id 786446 + next + edit "Netflix-NetBIOS.Session.Service" + set internet-service-id 786447 + next + edit "Netflix-RTMP" + set internet-service-id 786448 + next + edit "Netflix-NetBIOS.Name.Service" + set internet-service-id 786456 + next + edit "LinkedIn-Other" + set internet-service-id 851968 + next + edit "LinkedIn-Web" + set internet-service-id 851969 + next + edit "LinkedIn-ICMP" + set internet-service-id 851970 + next + edit "LinkedIn-DNS" + set internet-service-id 851971 + next + edit "LinkedIn-Outbound_Email" + set internet-service-id 851972 + next + edit "LinkedIn-SSH" + set internet-service-id 851974 + next + edit "LinkedIn-FTP" + set internet-service-id 851975 + next + edit "LinkedIn-NTP" + set internet-service-id 851976 + next + edit "LinkedIn-Inbound_Email" + set internet-service-id 851977 + next + edit "LinkedIn-LDAP" + set internet-service-id 851982 + next + edit "LinkedIn-NetBIOS.Session.Service" + set internet-service-id 851983 + next + edit "LinkedIn-RTMP" + set internet-service-id 851984 + next + edit "LinkedIn-NetBIOS.Name.Service" + set internet-service-id 851992 + next + edit "Adobe-Other" + set internet-service-id 917504 + next + edit "Adobe-Web" + set internet-service-id 917505 + next + edit "Adobe-ICMP" + set internet-service-id 917506 + next + edit "Adobe-DNS" + set internet-service-id 917507 + next + edit "Adobe-Outbound_Email" + set internet-service-id 917508 + next + edit "Adobe-SSH" + set internet-service-id 917510 + next + edit "Adobe-FTP" + set internet-service-id 917511 + next + edit "Adobe-NTP" + set internet-service-id 917512 + next + edit "Adobe-Inbound_Email" + set internet-service-id 917513 + next + edit "Adobe-LDAP" + set internet-service-id 917518 + next + edit "Adobe-NetBIOS.Session.Service" + set internet-service-id 917519 + next + edit "Adobe-RTMP" + set internet-service-id 917520 + next + edit "Adobe-NetBIOS.Name.Service" + set internet-service-id 917528 + next + edit "Adobe-Adobe.Experience.Cloud" + set internet-service-id 917640 + next + edit "Oracle-Other" + set internet-service-id 983040 + next + edit "Oracle-Web" + set internet-service-id 983041 + next + edit "Oracle-ICMP" + set internet-service-id 983042 + next + edit "Oracle-DNS" + set internet-service-id 983043 + next + edit "Oracle-Outbound_Email" + set internet-service-id 983044 + next + edit "Oracle-SSH" + set internet-service-id 983046 + next + edit "Oracle-FTP" + set internet-service-id 983047 + next + edit "Oracle-NTP" + set internet-service-id 983048 + next + edit "Oracle-Inbound_Email" + set internet-service-id 983049 + next + edit "Oracle-LDAP" + set internet-service-id 983054 + next + edit "Oracle-NetBIOS.Session.Service" + set internet-service-id 983055 + next + edit "Oracle-RTMP" + set internet-service-id 983056 + next + edit "Oracle-NetBIOS.Name.Service" + set internet-service-id 983064 + next + edit "Oracle-Oracle.Cloud" + set internet-service-id 983171 + next + edit "Hulu-Other" + set internet-service-id 1048576 + next + edit "Hulu-Web" + set internet-service-id 1048577 + next + edit "Hulu-ICMP" + set internet-service-id 1048578 + next + edit "Hulu-DNS" + set internet-service-id 1048579 + next + edit "Hulu-Outbound_Email" + set internet-service-id 1048580 + next + edit "Hulu-SSH" + set internet-service-id 1048582 + next + edit "Hulu-FTP" + set internet-service-id 1048583 + next + edit "Hulu-NTP" + set internet-service-id 1048584 + next + edit "Hulu-Inbound_Email" + set internet-service-id 1048585 + next + edit "Hulu-LDAP" + set internet-service-id 1048590 + next + edit "Hulu-NetBIOS.Session.Service" + set internet-service-id 1048591 + next + edit "Hulu-RTMP" + set internet-service-id 1048592 + next + edit "Hulu-NetBIOS.Name.Service" + set internet-service-id 1048600 + next + edit "Pinterest-Other" + set internet-service-id 1114112 + next + edit "Pinterest-Web" + set internet-service-id 1114113 + next + edit "Pinterest-ICMP" + set internet-service-id 1114114 + next + edit "Pinterest-DNS" + set internet-service-id 1114115 + next + edit "Pinterest-Outbound_Email" + set internet-service-id 1114116 + next + edit "Pinterest-SSH" + set internet-service-id 1114118 + next + edit "Pinterest-FTP" + set internet-service-id 1114119 + next + edit "Pinterest-NTP" + set internet-service-id 1114120 + next + edit "Pinterest-Inbound_Email" + set internet-service-id 1114121 + next + edit "Pinterest-LDAP" + set internet-service-id 1114126 + next + edit "Pinterest-NetBIOS.Session.Service" + set internet-service-id 1114127 + next + edit "Pinterest-RTMP" + set internet-service-id 1114128 + next + edit "Pinterest-NetBIOS.Name.Service" + set internet-service-id 1114136 + next + edit "LogMeIn-Other" + set internet-service-id 1179648 + next + edit "LogMeIn-Web" + set internet-service-id 1179649 + next + edit "LogMeIn-ICMP" + set internet-service-id 1179650 + next + edit "LogMeIn-DNS" + set internet-service-id 1179651 + next + edit "LogMeIn-Outbound_Email" + set internet-service-id 1179652 + next + edit "LogMeIn-SSH" + set internet-service-id 1179654 + next + edit "LogMeIn-FTP" + set internet-service-id 1179655 + next + edit "LogMeIn-NTP" + set internet-service-id 1179656 + next + edit "LogMeIn-Inbound_Email" + set internet-service-id 1179657 + next + edit "LogMeIn-LDAP" + set internet-service-id 1179662 + next + edit "LogMeIn-NetBIOS.Session.Service" + set internet-service-id 1179663 + next + edit "LogMeIn-RTMP" + set internet-service-id 1179664 + next + edit "LogMeIn-NetBIOS.Name.Service" + set internet-service-id 1179672 + next + edit "LogMeIn-GoTo.Suite" + set internet-service-id 1179767 + next + edit "Fortinet-Other" + set internet-service-id 1245184 + next + edit "Fortinet-Web" + set internet-service-id 1245185 + next + edit "Fortinet-ICMP" + set internet-service-id 1245186 + next + edit "Fortinet-DNS" + set internet-service-id 1245187 + next + edit "Fortinet-Outbound_Email" + set internet-service-id 1245188 + next + edit "Fortinet-SSH" + set internet-service-id 1245190 + next + edit "Fortinet-FTP" + set internet-service-id 1245191 + next + edit "Fortinet-NTP" + set internet-service-id 1245192 + next + edit "Fortinet-Inbound_Email" + set internet-service-id 1245193 + next + edit "Fortinet-LDAP" + set internet-service-id 1245198 + next + edit "Fortinet-NetBIOS.Session.Service" + set internet-service-id 1245199 + next + edit "Fortinet-RTMP" + set internet-service-id 1245200 + next + edit "Fortinet-NetBIOS.Name.Service" + set internet-service-id 1245208 + next + edit "Fortinet-FortiGuard" + set internet-service-id 1245324 + next + edit "Fortinet-FortiMail.Cloud" + set internet-service-id 1245325 + next + edit "Fortinet-FortiCloud" + set internet-service-id 1245326 + next + edit "Fortinet-FortiVoice.Cloud" + set internet-service-id 1245432 + next + edit "Fortinet-FortiGuard.Secure.DNS" + set internet-service-id 1245454 + next + edit "Kaspersky-Other" + set internet-service-id 1310720 + next + edit "Kaspersky-Web" + set internet-service-id 1310721 + next + edit "Kaspersky-ICMP" + set internet-service-id 1310722 + next + edit "Kaspersky-DNS" + set internet-service-id 1310723 + next + edit "Kaspersky-Outbound_Email" + set internet-service-id 1310724 + next + edit "Kaspersky-SSH" + set internet-service-id 1310726 + next + edit "Kaspersky-FTP" + set internet-service-id 1310727 + next + edit "Kaspersky-NTP" + set internet-service-id 1310728 + next + edit "Kaspersky-Inbound_Email" + set internet-service-id 1310729 + next + edit "Kaspersky-LDAP" + set internet-service-id 1310734 + next + edit "Kaspersky-NetBIOS.Session.Service" + set internet-service-id 1310735 + next + edit "Kaspersky-RTMP" + set internet-service-id 1310736 + next + edit "Kaspersky-NetBIOS.Name.Service" + set internet-service-id 1310744 + next + edit "McAfee-Other" + set internet-service-id 1376256 + next + edit "McAfee-Web" + set internet-service-id 1376257 + next + edit "McAfee-ICMP" + set internet-service-id 1376258 + next + edit "McAfee-DNS" + set internet-service-id 1376259 + next + edit "McAfee-Outbound_Email" + set internet-service-id 1376260 + next + edit "McAfee-SSH" + set internet-service-id 1376262 + next + edit "McAfee-FTP" + set internet-service-id 1376263 + next + edit "McAfee-NTP" + set internet-service-id 1376264 + next + edit "McAfee-Inbound_Email" + set internet-service-id 1376265 + next + edit "McAfee-LDAP" + set internet-service-id 1376270 + next + edit "McAfee-NetBIOS.Session.Service" + set internet-service-id 1376271 + next + edit "McAfee-RTMP" + set internet-service-id 1376272 + next + edit "McAfee-NetBIOS.Name.Service" + set internet-service-id 1376280 + next + edit "Symantec-Other" + set internet-service-id 1441792 + next + edit "Symantec-Web" + set internet-service-id 1441793 + next + edit "Symantec-ICMP" + set internet-service-id 1441794 + next + edit "Symantec-DNS" + set internet-service-id 1441795 + next + edit "Symantec-Outbound_Email" + set internet-service-id 1441796 + next + edit "Symantec-SSH" + set internet-service-id 1441798 + next + edit "Symantec-FTP" + set internet-service-id 1441799 + next + edit "Symantec-NTP" + set internet-service-id 1441800 + next + edit "Symantec-Inbound_Email" + set internet-service-id 1441801 + next + edit "Symantec-LDAP" + set internet-service-id 1441806 + next + edit "Symantec-NetBIOS.Session.Service" + set internet-service-id 1441807 + next + edit "Symantec-RTMP" + set internet-service-id 1441808 + next + edit "Symantec-NetBIOS.Name.Service" + set internet-service-id 1441816 + next + edit "Symantec-Symantec.Cloud" + set internet-service-id 1441922 + next + edit "VMware-Other" + set internet-service-id 1507328 + next + edit "VMware-Web" + set internet-service-id 1507329 + next + edit "VMware-ICMP" + set internet-service-id 1507330 + next + edit "VMware-DNS" + set internet-service-id 1507331 + next + edit "VMware-Outbound_Email" + set internet-service-id 1507332 + next + edit "VMware-SSH" + set internet-service-id 1507334 + next + edit "VMware-FTP" + set internet-service-id 1507335 + next + edit "VMware-NTP" + set internet-service-id 1507336 + next + edit "VMware-Inbound_Email" + set internet-service-id 1507337 + next + edit "VMware-LDAP" + set internet-service-id 1507342 + next + edit "VMware-NetBIOS.Session.Service" + set internet-service-id 1507343 + next + edit "VMware-RTMP" + set internet-service-id 1507344 + next + edit "VMware-NetBIOS.Name.Service" + set internet-service-id 1507352 + next + edit "VMware-Workspace.ONE" + set internet-service-id 1507461 + next + edit "AOL-Other" + set internet-service-id 1572864 + next + edit "AOL-Web" + set internet-service-id 1572865 + next + edit "AOL-ICMP" + set internet-service-id 1572866 + next + edit "AOL-DNS" + set internet-service-id 1572867 + next + edit "AOL-Outbound_Email" + set internet-service-id 1572868 + next + edit "AOL-SSH" + set internet-service-id 1572870 + next + edit "AOL-FTP" + set internet-service-id 1572871 + next + edit "AOL-NTP" + set internet-service-id 1572872 + next + edit "AOL-Inbound_Email" + set internet-service-id 1572873 + next + edit "AOL-LDAP" + set internet-service-id 1572878 + next + edit "AOL-NetBIOS.Session.Service" + set internet-service-id 1572879 + next + edit "AOL-RTMP" + set internet-service-id 1572880 + next + edit "AOL-NetBIOS.Name.Service" + set internet-service-id 1572888 + next + edit "RealNetworks-Other" + set internet-service-id 1638400 + next + edit "RealNetworks-Web" + set internet-service-id 1638401 + next + edit "RealNetworks-ICMP" + set internet-service-id 1638402 + next + edit "RealNetworks-DNS" + set internet-service-id 1638403 + next + edit "RealNetworks-Outbound_Email" + set internet-service-id 1638404 + next + edit "RealNetworks-SSH" + set internet-service-id 1638406 + next + edit "RealNetworks-FTP" + set internet-service-id 1638407 + next + edit "RealNetworks-NTP" + set internet-service-id 1638408 + next + edit "RealNetworks-Inbound_Email" + set internet-service-id 1638409 + next + edit "RealNetworks-LDAP" + set internet-service-id 1638414 + next + edit "RealNetworks-NetBIOS.Session.Service" + set internet-service-id 1638415 + next + edit "RealNetworks-RTMP" + set internet-service-id 1638416 + next + edit "RealNetworks-NetBIOS.Name.Service" + set internet-service-id 1638424 + next + edit "Zoho-Other" + set internet-service-id 1703936 + next + edit "Zoho-Web" + set internet-service-id 1703937 + next + edit "Zoho-ICMP" + set internet-service-id 1703938 + next + edit "Zoho-DNS" + set internet-service-id 1703939 + next + edit "Zoho-Outbound_Email" + set internet-service-id 1703940 + next + edit "Zoho-SSH" + set internet-service-id 1703942 + next + edit "Zoho-FTP" + set internet-service-id 1703943 + next + edit "Zoho-NTP" + set internet-service-id 1703944 + next + edit "Zoho-Inbound_Email" + set internet-service-id 1703945 + next + edit "Zoho-LDAP" + set internet-service-id 1703950 + next + edit "Zoho-NetBIOS.Session.Service" + set internet-service-id 1703951 + next + edit "Zoho-RTMP" + set internet-service-id 1703952 + next + edit "Zoho-NetBIOS.Name.Service" + set internet-service-id 1703960 + next + edit "Zoho-Site24x7.Monitor" + set internet-service-id 1704153 + next + edit "Mozilla-Other" + set internet-service-id 1769472 + next + edit "Mozilla-Web" + set internet-service-id 1769473 + next + edit "Mozilla-ICMP" + set internet-service-id 1769474 + next + edit "Mozilla-DNS" + set internet-service-id 1769475 + next + edit "Mozilla-Outbound_Email" + set internet-service-id 1769476 + next + edit "Mozilla-SSH" + set internet-service-id 1769478 + next + edit "Mozilla-FTP" + set internet-service-id 1769479 + next + edit "Mozilla-NTP" + set internet-service-id 1769480 + next + edit "Mozilla-Inbound_Email" + set internet-service-id 1769481 + next + edit "Mozilla-LDAP" + set internet-service-id 1769486 + next + edit "Mozilla-NetBIOS.Session.Service" + set internet-service-id 1769487 + next + edit "Mozilla-RTMP" + set internet-service-id 1769488 + next + edit "Mozilla-NetBIOS.Name.Service" + set internet-service-id 1769496 + next + edit "TeamViewer-Other" + set internet-service-id 1835008 + next + edit "TeamViewer-Web" + set internet-service-id 1835009 + next + edit "TeamViewer-ICMP" + set internet-service-id 1835010 + next + edit "TeamViewer-DNS" + set internet-service-id 1835011 + next + edit "TeamViewer-Outbound_Email" + set internet-service-id 1835012 + next + edit "TeamViewer-SSH" + set internet-service-id 1835014 + next + edit "TeamViewer-FTP" + set internet-service-id 1835015 + next + edit "TeamViewer-NTP" + set internet-service-id 1835016 + next + edit "TeamViewer-Inbound_Email" + set internet-service-id 1835017 + next + edit "TeamViewer-LDAP" + set internet-service-id 1835022 + next + edit "TeamViewer-NetBIOS.Session.Service" + set internet-service-id 1835023 + next + edit "TeamViewer-RTMP" + set internet-service-id 1835024 + next + edit "TeamViewer-NetBIOS.Name.Service" + set internet-service-id 1835032 + next + edit "TeamViewer-TeamViewer" + set internet-service-id 1835117 + next + edit "HP-Other" + set internet-service-id 1900544 + next + edit "HP-Web" + set internet-service-id 1900545 + next + edit "HP-ICMP" + set internet-service-id 1900546 + next + edit "HP-DNS" + set internet-service-id 1900547 + next + edit "HP-Outbound_Email" + set internet-service-id 1900548 + next + edit "HP-SSH" + set internet-service-id 1900550 + next + edit "HP-FTP" + set internet-service-id 1900551 + next + edit "HP-NTP" + set internet-service-id 1900552 + next + edit "HP-Inbound_Email" + set internet-service-id 1900553 + next + edit "HP-LDAP" + set internet-service-id 1900558 + next + edit "HP-NetBIOS.Session.Service" + set internet-service-id 1900559 + next + edit "HP-RTMP" + set internet-service-id 1900560 + next + edit "HP-NetBIOS.Name.Service" + set internet-service-id 1900568 + next + edit "HP-Aruba" + set internet-service-id 1900726 + next + edit "Cisco-Other" + set internet-service-id 1966080 + next + edit "Cisco-Web" + set internet-service-id 1966081 + next + edit "Cisco-ICMP" + set internet-service-id 1966082 + next + edit "Cisco-DNS" + set internet-service-id 1966083 + next + edit "Cisco-Outbound_Email" + set internet-service-id 1966084 + next + edit "Cisco-SSH" + set internet-service-id 1966086 + next + edit "Cisco-FTP" + set internet-service-id 1966087 + next + edit "Cisco-NTP" + set internet-service-id 1966088 + next + edit "Cisco-Inbound_Email" + set internet-service-id 1966089 + next + edit "Cisco-LDAP" + set internet-service-id 1966094 + next + edit "Cisco-NetBIOS.Session.Service" + set internet-service-id 1966095 + next + edit "Cisco-RTMP" + set internet-service-id 1966096 + next + edit "Cisco-NetBIOS.Name.Service" + set internet-service-id 1966104 + next + edit "Cisco-Webex" + set internet-service-id 1966183 + next + edit "Cisco-Meraki.Cloud" + set internet-service-id 1966218 + next + edit "Cisco-Duo.Security" + set internet-service-id 1966225 + next + edit "Cisco-AppDynamic" + set internet-service-id 1966260 + next + edit "Cisco-Secure.Endpoint" + set internet-service-id 1966324 + next + edit "IBM-Other" + set internet-service-id 2031616 + next + edit "IBM-Web" + set internet-service-id 2031617 + next + edit "IBM-ICMP" + set internet-service-id 2031618 + next + edit "IBM-DNS" + set internet-service-id 2031619 + next + edit "IBM-Outbound_Email" + set internet-service-id 2031620 + next + edit "IBM-SSH" + set internet-service-id 2031622 + next + edit "IBM-FTP" + set internet-service-id 2031623 + next + edit "IBM-NTP" + set internet-service-id 2031624 + next + edit "IBM-Inbound_Email" + set internet-service-id 2031625 + next + edit "IBM-LDAP" + set internet-service-id 2031630 + next + edit "IBM-NetBIOS.Session.Service" + set internet-service-id 2031631 + next + edit "IBM-RTMP" + set internet-service-id 2031632 + next + edit "IBM-NetBIOS.Name.Service" + set internet-service-id 2031640 + next + edit "IBM-IBM.Cloud" + set internet-service-id 2031748 + next + edit "Citrix-Other" + set internet-service-id 2097152 + next + edit "Citrix-Web" + set internet-service-id 2097153 + next + edit "Citrix-ICMP" + set internet-service-id 2097154 + next + edit "Citrix-DNS" + set internet-service-id 2097155 + next + edit "Citrix-Outbound_Email" + set internet-service-id 2097156 + next + edit "Citrix-SSH" + set internet-service-id 2097158 + next + edit "Citrix-FTP" + set internet-service-id 2097159 + next + edit "Citrix-NTP" + set internet-service-id 2097160 + next + edit "Citrix-Inbound_Email" + set internet-service-id 2097161 + next + edit "Citrix-LDAP" + set internet-service-id 2097166 + next + edit "Citrix-NetBIOS.Session.Service" + set internet-service-id 2097167 + next + edit "Citrix-RTMP" + set internet-service-id 2097168 + next + edit "Citrix-NetBIOS.Name.Service" + set internet-service-id 2097176 + next + edit "Twitter-Other" + set internet-service-id 2162688 + next + edit "Twitter-Web" + set internet-service-id 2162689 + next + edit "Twitter-ICMP" + set internet-service-id 2162690 + next + edit "Twitter-DNS" + set internet-service-id 2162691 + next + edit "Twitter-Outbound_Email" + set internet-service-id 2162692 + next + edit "Twitter-SSH" + set internet-service-id 2162694 + next + edit "Twitter-FTP" + set internet-service-id 2162695 + next + edit "Twitter-NTP" + set internet-service-id 2162696 + next + edit "Twitter-Inbound_Email" + set internet-service-id 2162697 + next + edit "Twitter-LDAP" + set internet-service-id 2162702 + next + edit "Twitter-NetBIOS.Session.Service" + set internet-service-id 2162703 + next + edit "Twitter-RTMP" + set internet-service-id 2162704 + next + edit "Twitter-NetBIOS.Name.Service" + set internet-service-id 2162712 + next + edit "Dell-Other" + set internet-service-id 2228224 + next + edit "Dell-Web" + set internet-service-id 2228225 + next + edit "Dell-ICMP" + set internet-service-id 2228226 + next + edit "Dell-DNS" + set internet-service-id 2228227 + next + edit "Dell-Outbound_Email" + set internet-service-id 2228228 + next + edit "Dell-SSH" + set internet-service-id 2228230 + next + edit "Dell-FTP" + set internet-service-id 2228231 + next + edit "Dell-NTP" + set internet-service-id 2228232 + next + edit "Dell-Inbound_Email" + set internet-service-id 2228233 + next + edit "Dell-LDAP" + set internet-service-id 2228238 + next + edit "Dell-NetBIOS.Session.Service" + set internet-service-id 2228239 + next + edit "Dell-RTMP" + set internet-service-id 2228240 + next + edit "Dell-NetBIOS.Name.Service" + set internet-service-id 2228248 + next + edit "Vimeo-Other" + set internet-service-id 2293760 + next + edit "Vimeo-Web" + set internet-service-id 2293761 + next + edit "Vimeo-ICMP" + set internet-service-id 2293762 + next + edit "Vimeo-DNS" + set internet-service-id 2293763 + next + edit "Vimeo-Outbound_Email" + set internet-service-id 2293764 + next + edit "Vimeo-SSH" + set internet-service-id 2293766 + next + edit "Vimeo-FTP" + set internet-service-id 2293767 + next + edit "Vimeo-NTP" + set internet-service-id 2293768 + next + edit "Vimeo-Inbound_Email" + set internet-service-id 2293769 + next + edit "Vimeo-LDAP" + set internet-service-id 2293774 + next + edit "Vimeo-NetBIOS.Session.Service" + set internet-service-id 2293775 + next + edit "Vimeo-RTMP" + set internet-service-id 2293776 + next + edit "Vimeo-NetBIOS.Name.Service" + set internet-service-id 2293784 + next + edit "Redhat-Other" + set internet-service-id 2359296 + next + edit "Redhat-Web" + set internet-service-id 2359297 + next + edit "Redhat-ICMP" + set internet-service-id 2359298 + next + edit "Redhat-DNS" + set internet-service-id 2359299 + next + edit "Redhat-Outbound_Email" + set internet-service-id 2359300 + next + edit "Redhat-SSH" + set internet-service-id 2359302 + next + edit "Redhat-FTP" + set internet-service-id 2359303 + next + edit "Redhat-NTP" + set internet-service-id 2359304 + next + edit "Redhat-Inbound_Email" + set internet-service-id 2359305 + next + edit "Redhat-LDAP" + set internet-service-id 2359310 + next + edit "Redhat-NetBIOS.Session.Service" + set internet-service-id 2359311 + next + edit "Redhat-RTMP" + set internet-service-id 2359312 + next + edit "Redhat-NetBIOS.Name.Service" + set internet-service-id 2359320 + next + edit "VK-Other" + set internet-service-id 2424832 + next + edit "VK-Web" + set internet-service-id 2424833 + next + edit "VK-ICMP" + set internet-service-id 2424834 + next + edit "VK-DNS" + set internet-service-id 2424835 + next + edit "VK-Outbound_Email" + set internet-service-id 2424836 + next + edit "VK-SSH" + set internet-service-id 2424838 + next + edit "VK-FTP" + set internet-service-id 2424839 + next + edit "VK-NTP" + set internet-service-id 2424840 + next + edit "VK-Inbound_Email" + set internet-service-id 2424841 + next + edit "VK-LDAP" + set internet-service-id 2424846 + next + edit "VK-NetBIOS.Session.Service" + set internet-service-id 2424847 + next + edit "VK-RTMP" + set internet-service-id 2424848 + next + edit "VK-NetBIOS.Name.Service" + set internet-service-id 2424856 + next + edit "TrendMicro-Other" + set internet-service-id 2490368 + next + edit "TrendMicro-Web" + set internet-service-id 2490369 + next + edit "TrendMicro-ICMP" + set internet-service-id 2490370 + next + edit "TrendMicro-DNS" + set internet-service-id 2490371 + next + edit "TrendMicro-Outbound_Email" + set internet-service-id 2490372 + next + edit "TrendMicro-SSH" + set internet-service-id 2490374 + next + edit "TrendMicro-FTP" + set internet-service-id 2490375 + next + edit "TrendMicro-NTP" + set internet-service-id 2490376 + next + edit "TrendMicro-Inbound_Email" + set internet-service-id 2490377 + next + edit "TrendMicro-LDAP" + set internet-service-id 2490382 + next + edit "TrendMicro-NetBIOS.Session.Service" + set internet-service-id 2490383 + next + edit "TrendMicro-RTMP" + set internet-service-id 2490384 + next + edit "TrendMicro-NetBIOS.Name.Service" + set internet-service-id 2490392 + next + edit "Tencent-Other" + set internet-service-id 2555904 + next + edit "Tencent-Web" + set internet-service-id 2555905 + next + edit "Tencent-ICMP" + set internet-service-id 2555906 + next + edit "Tencent-DNS" + set internet-service-id 2555907 + next + edit "Tencent-Outbound_Email" + set internet-service-id 2555908 + next + edit "Tencent-SSH" + set internet-service-id 2555910 + next + edit "Tencent-FTP" + set internet-service-id 2555911 + next + edit "Tencent-NTP" + set internet-service-id 2555912 + next + edit "Tencent-Inbound_Email" + set internet-service-id 2555913 + next + edit "Tencent-LDAP" + set internet-service-id 2555918 + next + edit "Tencent-NetBIOS.Session.Service" + set internet-service-id 2555919 + next + edit "Tencent-RTMP" + set internet-service-id 2555920 + next + edit "Tencent-NetBIOS.Name.Service" + set internet-service-id 2555928 + next + edit "Ask-Other" + set internet-service-id 2621440 + next + edit "Ask-Web" + set internet-service-id 2621441 + next + edit "Ask-ICMP" + set internet-service-id 2621442 + next + edit "Ask-DNS" + set internet-service-id 2621443 + next + edit "Ask-Outbound_Email" + set internet-service-id 2621444 + next + edit "Ask-SSH" + set internet-service-id 2621446 + next + edit "Ask-FTP" + set internet-service-id 2621447 + next + edit "Ask-NTP" + set internet-service-id 2621448 + next + edit "Ask-Inbound_Email" + set internet-service-id 2621449 + next + edit "Ask-LDAP" + set internet-service-id 2621454 + next + edit "Ask-NetBIOS.Session.Service" + set internet-service-id 2621455 + next + edit "Ask-RTMP" + set internet-service-id 2621456 + next + edit "Ask-NetBIOS.Name.Service" + set internet-service-id 2621464 + next + edit "CNN-Other" + set internet-service-id 2686976 + next + edit "CNN-Web" + set internet-service-id 2686977 + next + edit "CNN-ICMP" + set internet-service-id 2686978 + next + edit "CNN-DNS" + set internet-service-id 2686979 + next + edit "CNN-Outbound_Email" + set internet-service-id 2686980 + next + edit "CNN-SSH" + set internet-service-id 2686982 + next + edit "CNN-FTP" + set internet-service-id 2686983 + next + edit "CNN-NTP" + set internet-service-id 2686984 + next + edit "CNN-Inbound_Email" + set internet-service-id 2686985 + next + edit "CNN-LDAP" + set internet-service-id 2686990 + next + edit "CNN-NetBIOS.Session.Service" + set internet-service-id 2686991 + next + edit "CNN-RTMP" + set internet-service-id 2686992 + next + edit "CNN-NetBIOS.Name.Service" + set internet-service-id 2687000 + next + edit "Myspace-Other" + set internet-service-id 2752512 + next + edit "Myspace-Web" + set internet-service-id 2752513 + next + edit "Myspace-ICMP" + set internet-service-id 2752514 + next + edit "Myspace-DNS" + set internet-service-id 2752515 + next + edit "Myspace-Outbound_Email" + set internet-service-id 2752516 + next + edit "Myspace-SSH" + set internet-service-id 2752518 + next + edit "Myspace-FTP" + set internet-service-id 2752519 + next + edit "Myspace-NTP" + set internet-service-id 2752520 + next + edit "Myspace-Inbound_Email" + set internet-service-id 2752521 + next + edit "Myspace-LDAP" + set internet-service-id 2752526 + next + edit "Myspace-NetBIOS.Session.Service" + set internet-service-id 2752527 + next + edit "Myspace-RTMP" + set internet-service-id 2752528 + next + edit "Myspace-NetBIOS.Name.Service" + set internet-service-id 2752536 + next + edit "Tor-Relay.Node" + set internet-service-id 2818238 + next + edit "Tor-Exit.Node" + set internet-service-id 2818243 + next + edit "Baidu-Other" + set internet-service-id 2883584 + next + edit "Baidu-Web" + set internet-service-id 2883585 + next + edit "Baidu-ICMP" + set internet-service-id 2883586 + next + edit "Baidu-DNS" + set internet-service-id 2883587 + next + edit "Baidu-Outbound_Email" + set internet-service-id 2883588 + next + edit "Baidu-SSH" + set internet-service-id 2883590 + next + edit "Baidu-FTP" + set internet-service-id 2883591 + next + edit "Baidu-NTP" + set internet-service-id 2883592 + next + edit "Baidu-Inbound_Email" + set internet-service-id 2883593 + next + edit "Baidu-LDAP" + set internet-service-id 2883598 + next + edit "Baidu-NetBIOS.Session.Service" + set internet-service-id 2883599 + next + edit "Baidu-RTMP" + set internet-service-id 2883600 + next + edit "Baidu-NetBIOS.Name.Service" + set internet-service-id 2883608 + next + edit "ntp.org-Other" + set internet-service-id 2949120 + next + edit "ntp.org-Web" + set internet-service-id 2949121 + next + edit "ntp.org-ICMP" + set internet-service-id 2949122 + next + edit "ntp.org-DNS" + set internet-service-id 2949123 + next + edit "ntp.org-Outbound_Email" + set internet-service-id 2949124 + next + edit "ntp.org-SSH" + set internet-service-id 2949126 + next + edit "ntp.org-FTP" + set internet-service-id 2949127 + next + edit "ntp.org-NTP" + set internet-service-id 2949128 + next + edit "ntp.org-Inbound_Email" + set internet-service-id 2949129 + next + edit "ntp.org-LDAP" + set internet-service-id 2949134 + next + edit "ntp.org-NetBIOS.Session.Service" + set internet-service-id 2949135 + next + edit "ntp.org-RTMP" + set internet-service-id 2949136 + next + edit "ntp.org-NetBIOS.Name.Service" + set internet-service-id 2949144 + next + edit "Proxy-Proxy.Server" + set internet-service-id 3014850 + next + edit "Botnet-C&C.Server" + set internet-service-id 3080383 + next + edit "Spam-Spamming.Server" + set internet-service-id 3145920 + next + edit "Phishing-Phishing.Server" + set internet-service-id 3211457 + next + edit "Zendesk-Other" + set internet-service-id 3407872 + next + edit "Zendesk-Web" + set internet-service-id 3407873 + next + edit "Zendesk-ICMP" + set internet-service-id 3407874 + next + edit "Zendesk-DNS" + set internet-service-id 3407875 + next + edit "Zendesk-Outbound_Email" + set internet-service-id 3407876 + next + edit "Zendesk-SSH" + set internet-service-id 3407878 + next + edit "Zendesk-FTP" + set internet-service-id 3407879 + next + edit "Zendesk-NTP" + set internet-service-id 3407880 + next + edit "Zendesk-Inbound_Email" + set internet-service-id 3407881 + next + edit "Zendesk-LDAP" + set internet-service-id 3407886 + next + edit "Zendesk-NetBIOS.Session.Service" + set internet-service-id 3407887 + next + edit "Zendesk-RTMP" + set internet-service-id 3407888 + next + edit "Zendesk-NetBIOS.Name.Service" + set internet-service-id 3407896 + next + edit "Zendesk-Zendesk.Suite" + set internet-service-id 3408047 + next + edit "DocuSign-Other" + set internet-service-id 3473408 + next + edit "DocuSign-Web" + set internet-service-id 3473409 + next + edit "DocuSign-ICMP" + set internet-service-id 3473410 + next + edit "DocuSign-DNS" + set internet-service-id 3473411 + next + edit "DocuSign-Outbound_Email" + set internet-service-id 3473412 + next + edit "DocuSign-SSH" + set internet-service-id 3473414 + next + edit "DocuSign-FTP" + set internet-service-id 3473415 + next + edit "DocuSign-NTP" + set internet-service-id 3473416 + next + edit "DocuSign-Inbound_Email" + set internet-service-id 3473417 + next + edit "DocuSign-LDAP" + set internet-service-id 3473422 + next + edit "DocuSign-NetBIOS.Session.Service" + set internet-service-id 3473423 + next + edit "DocuSign-RTMP" + set internet-service-id 3473424 + next + edit "DocuSign-NetBIOS.Name.Service" + set internet-service-id 3473432 + next + edit "ServiceNow-Other" + set internet-service-id 3538944 + next + edit "ServiceNow-Web" + set internet-service-id 3538945 + next + edit "ServiceNow-ICMP" + set internet-service-id 3538946 + next + edit "ServiceNow-DNS" + set internet-service-id 3538947 + next + edit "ServiceNow-Outbound_Email" + set internet-service-id 3538948 + next + edit "ServiceNow-SSH" + set internet-service-id 3538950 + next + edit "ServiceNow-FTP" + set internet-service-id 3538951 + next + edit "ServiceNow-NTP" + set internet-service-id 3538952 + next + edit "ServiceNow-Inbound_Email" + set internet-service-id 3538953 + next + edit "ServiceNow-LDAP" + set internet-service-id 3538958 + next + edit "ServiceNow-NetBIOS.Session.Service" + set internet-service-id 3538959 + next + edit "ServiceNow-RTMP" + set internet-service-id 3538960 + next + edit "ServiceNow-NetBIOS.Name.Service" + set internet-service-id 3538968 + next + edit "GitHub-GitHub" + set internet-service-id 3604638 + next + edit "Workday-Other" + set internet-service-id 3670016 + next + edit "Workday-Web" + set internet-service-id 3670017 + next + edit "Workday-ICMP" + set internet-service-id 3670018 + next + edit "Workday-DNS" + set internet-service-id 3670019 + next + edit "Workday-Outbound_Email" + set internet-service-id 3670020 + next + edit "Workday-SSH" + set internet-service-id 3670022 + next + edit "Workday-FTP" + set internet-service-id 3670023 + next + edit "Workday-NTP" + set internet-service-id 3670024 + next + edit "Workday-Inbound_Email" + set internet-service-id 3670025 + next + edit "Workday-LDAP" + set internet-service-id 3670030 + next + edit "Workday-NetBIOS.Session.Service" + set internet-service-id 3670031 + next + edit "Workday-RTMP" + set internet-service-id 3670032 + next + edit "Workday-NetBIOS.Name.Service" + set internet-service-id 3670040 + next + edit "HubSpot-Other" + set internet-service-id 3735552 + next + edit "HubSpot-Web" + set internet-service-id 3735553 + next + edit "HubSpot-ICMP" + set internet-service-id 3735554 + next + edit "HubSpot-DNS" + set internet-service-id 3735555 + next + edit "HubSpot-Outbound_Email" + set internet-service-id 3735556 + next + edit "HubSpot-SSH" + set internet-service-id 3735558 + next + edit "HubSpot-FTP" + set internet-service-id 3735559 + next + edit "HubSpot-NTP" + set internet-service-id 3735560 + next + edit "HubSpot-Inbound_Email" + set internet-service-id 3735561 + next + edit "HubSpot-LDAP" + set internet-service-id 3735566 + next + edit "HubSpot-NetBIOS.Session.Service" + set internet-service-id 3735567 + next + edit "HubSpot-RTMP" + set internet-service-id 3735568 + next + edit "HubSpot-NetBIOS.Name.Service" + set internet-service-id 3735576 + next + edit "Twilio-Other" + set internet-service-id 3801088 + next + edit "Twilio-Web" + set internet-service-id 3801089 + next + edit "Twilio-ICMP" + set internet-service-id 3801090 + next + edit "Twilio-DNS" + set internet-service-id 3801091 + next + edit "Twilio-Outbound_Email" + set internet-service-id 3801092 + next + edit "Twilio-SSH" + set internet-service-id 3801094 + next + edit "Twilio-FTP" + set internet-service-id 3801095 + next + edit "Twilio-NTP" + set internet-service-id 3801096 + next + edit "Twilio-Inbound_Email" + set internet-service-id 3801097 + next + edit "Twilio-LDAP" + set internet-service-id 3801102 + next + edit "Twilio-NetBIOS.Session.Service" + set internet-service-id 3801103 + next + edit "Twilio-RTMP" + set internet-service-id 3801104 + next + edit "Twilio-NetBIOS.Name.Service" + set internet-service-id 3801112 + next + edit "Twilio-Elastic.SIP.Trunking" + set internet-service-id 3801277 + next + edit "Coupa-Other" + set internet-service-id 3866624 + next + edit "Coupa-Web" + set internet-service-id 3866625 + next + edit "Coupa-ICMP" + set internet-service-id 3866626 + next + edit "Coupa-DNS" + set internet-service-id 3866627 + next + edit "Coupa-Outbound_Email" + set internet-service-id 3866628 + next + edit "Coupa-SSH" + set internet-service-id 3866630 + next + edit "Coupa-FTP" + set internet-service-id 3866631 + next + edit "Coupa-NTP" + set internet-service-id 3866632 + next + edit "Coupa-Inbound_Email" + set internet-service-id 3866633 + next + edit "Coupa-LDAP" + set internet-service-id 3866638 + next + edit "Coupa-NetBIOS.Session.Service" + set internet-service-id 3866639 + next + edit "Coupa-RTMP" + set internet-service-id 3866640 + next + edit "Coupa-NetBIOS.Name.Service" + set internet-service-id 3866648 + next + edit "Atlassian-Other" + set internet-service-id 3932160 + next + edit "Atlassian-Web" + set internet-service-id 3932161 + next + edit "Atlassian-ICMP" + set internet-service-id 3932162 + next + edit "Atlassian-DNS" + set internet-service-id 3932163 + next + edit "Atlassian-Outbound_Email" + set internet-service-id 3932164 + next + edit "Atlassian-SSH" + set internet-service-id 3932166 + next + edit "Atlassian-FTP" + set internet-service-id 3932167 + next + edit "Atlassian-NTP" + set internet-service-id 3932168 + next + edit "Atlassian-Inbound_Email" + set internet-service-id 3932169 + next + edit "Atlassian-LDAP" + set internet-service-id 3932174 + next + edit "Atlassian-NetBIOS.Session.Service" + set internet-service-id 3932175 + next + edit "Atlassian-RTMP" + set internet-service-id 3932176 + next + edit "Atlassian-NetBIOS.Name.Service" + set internet-service-id 3932184 + next + edit "Atlassian-Atlassian.Cloud" + set internet-service-id 3932388 + next + edit "Xero-Other" + set internet-service-id 3997696 + next + edit "Xero-Web" + set internet-service-id 3997697 + next + edit "Xero-ICMP" + set internet-service-id 3997698 + next + edit "Xero-DNS" + set internet-service-id 3997699 + next + edit "Xero-Outbound_Email" + set internet-service-id 3997700 + next + edit "Xero-SSH" + set internet-service-id 3997702 + next + edit "Xero-FTP" + set internet-service-id 3997703 + next + edit "Xero-NTP" + set internet-service-id 3997704 + next + edit "Xero-Inbound_Email" + set internet-service-id 3997705 + next + edit "Xero-LDAP" + set internet-service-id 3997710 + next + edit "Xero-NetBIOS.Session.Service" + set internet-service-id 3997711 + next + edit "Xero-RTMP" + set internet-service-id 3997712 + next + edit "Xero-NetBIOS.Name.Service" + set internet-service-id 3997720 + next + edit "Zuora-Other" + set internet-service-id 4063232 + next + edit "Zuora-Web" + set internet-service-id 4063233 + next + edit "Zuora-ICMP" + set internet-service-id 4063234 + next + edit "Zuora-DNS" + set internet-service-id 4063235 + next + edit "Zuora-Outbound_Email" + set internet-service-id 4063236 + next + edit "Zuora-SSH" + set internet-service-id 4063238 + next + edit "Zuora-FTP" + set internet-service-id 4063239 + next + edit "Zuora-NTP" + set internet-service-id 4063240 + next + edit "Zuora-Inbound_Email" + set internet-service-id 4063241 + next + edit "Zuora-LDAP" + set internet-service-id 4063246 + next + edit "Zuora-NetBIOS.Session.Service" + set internet-service-id 4063247 + next + edit "Zuora-RTMP" + set internet-service-id 4063248 + next + edit "Zuora-NetBIOS.Name.Service" + set internet-service-id 4063256 + next + edit "AdRoll-Other" + set internet-service-id 4128768 + next + edit "AdRoll-Web" + set internet-service-id 4128769 + next + edit "AdRoll-ICMP" + set internet-service-id 4128770 + next + edit "AdRoll-DNS" + set internet-service-id 4128771 + next + edit "AdRoll-Outbound_Email" + set internet-service-id 4128772 + next + edit "AdRoll-SSH" + set internet-service-id 4128774 + next + edit "AdRoll-FTP" + set internet-service-id 4128775 + next + edit "AdRoll-NTP" + set internet-service-id 4128776 + next + edit "AdRoll-Inbound_Email" + set internet-service-id 4128777 + next + edit "AdRoll-LDAP" + set internet-service-id 4128782 + next + edit "AdRoll-NetBIOS.Session.Service" + set internet-service-id 4128783 + next + edit "AdRoll-RTMP" + set internet-service-id 4128784 + next + edit "AdRoll-NetBIOS.Name.Service" + set internet-service-id 4128792 + next + edit "Xactly-Other" + set internet-service-id 4194304 + next + edit "Xactly-Web" + set internet-service-id 4194305 + next + edit "Xactly-ICMP" + set internet-service-id 4194306 + next + edit "Xactly-DNS" + set internet-service-id 4194307 + next + edit "Xactly-Outbound_Email" + set internet-service-id 4194308 + next + edit "Xactly-SSH" + set internet-service-id 4194310 + next + edit "Xactly-FTP" + set internet-service-id 4194311 + next + edit "Xactly-NTP" + set internet-service-id 4194312 + next + edit "Xactly-Inbound_Email" + set internet-service-id 4194313 + next + edit "Xactly-LDAP" + set internet-service-id 4194318 + next + edit "Xactly-NetBIOS.Session.Service" + set internet-service-id 4194319 + next + edit "Xactly-RTMP" + set internet-service-id 4194320 + next + edit "Xactly-NetBIOS.Name.Service" + set internet-service-id 4194328 + next + edit "Intuit-Other" + set internet-service-id 4259840 + next + edit "Intuit-Web" + set internet-service-id 4259841 + next + edit "Intuit-ICMP" + set internet-service-id 4259842 + next + edit "Intuit-DNS" + set internet-service-id 4259843 + next + edit "Intuit-Outbound_Email" + set internet-service-id 4259844 + next + edit "Intuit-SSH" + set internet-service-id 4259846 + next + edit "Intuit-FTP" + set internet-service-id 4259847 + next + edit "Intuit-NTP" + set internet-service-id 4259848 + next + edit "Intuit-Inbound_Email" + set internet-service-id 4259849 + next + edit "Intuit-LDAP" + set internet-service-id 4259854 + next + edit "Intuit-NetBIOS.Session.Service" + set internet-service-id 4259855 + next + edit "Intuit-RTMP" + set internet-service-id 4259856 + next + edit "Intuit-NetBIOS.Name.Service" + set internet-service-id 4259864 + next + edit "Marketo-Other" + set internet-service-id 4325376 + next + edit "Marketo-Web" + set internet-service-id 4325377 + next + edit "Marketo-ICMP" + set internet-service-id 4325378 + next + edit "Marketo-DNS" + set internet-service-id 4325379 + next + edit "Marketo-Outbound_Email" + set internet-service-id 4325380 + next + edit "Marketo-SSH" + set internet-service-id 4325382 + next + edit "Marketo-FTP" + set internet-service-id 4325383 + next + edit "Marketo-NTP" + set internet-service-id 4325384 + next + edit "Marketo-Inbound_Email" + set internet-service-id 4325385 + next + edit "Marketo-LDAP" + set internet-service-id 4325390 + next + edit "Marketo-NetBIOS.Session.Service" + set internet-service-id 4325391 + next + edit "Marketo-RTMP" + set internet-service-id 4325392 + next + edit "Marketo-NetBIOS.Name.Service" + set internet-service-id 4325400 + next + edit "Bill-Other" + set internet-service-id 4456448 + next + edit "Bill-Web" + set internet-service-id 4456449 + next + edit "Bill-ICMP" + set internet-service-id 4456450 + next + edit "Bill-DNS" + set internet-service-id 4456451 + next + edit "Bill-Outbound_Email" + set internet-service-id 4456452 + next + edit "Bill-SSH" + set internet-service-id 4456454 + next + edit "Bill-FTP" + set internet-service-id 4456455 + next + edit "Bill-NTP" + set internet-service-id 4456456 + next + edit "Bill-Inbound_Email" + set internet-service-id 4456457 + next + edit "Bill-LDAP" + set internet-service-id 4456462 + next + edit "Bill-NetBIOS.Session.Service" + set internet-service-id 4456463 + next + edit "Bill-RTMP" + set internet-service-id 4456464 + next + edit "Bill-NetBIOS.Name.Service" + set internet-service-id 4456472 + next + edit "Shopify-Other" + set internet-service-id 4521984 + next + edit "Shopify-Web" + set internet-service-id 4521985 + next + edit "Shopify-ICMP" + set internet-service-id 4521986 + next + edit "Shopify-DNS" + set internet-service-id 4521987 + next + edit "Shopify-Outbound_Email" + set internet-service-id 4521988 + next + edit "Shopify-SSH" + set internet-service-id 4521990 + next + edit "Shopify-FTP" + set internet-service-id 4521991 + next + edit "Shopify-NTP" + set internet-service-id 4521992 + next + edit "Shopify-Inbound_Email" + set internet-service-id 4521993 + next + edit "Shopify-LDAP" + set internet-service-id 4521998 + next + edit "Shopify-NetBIOS.Session.Service" + set internet-service-id 4521999 + next + edit "Shopify-RTMP" + set internet-service-id 4522000 + next + edit "Shopify-NetBIOS.Name.Service" + set internet-service-id 4522008 + next + edit "Shopify-Shopify" + set internet-service-id 4522162 + next + edit "MuleSoft-Other" + set internet-service-id 4587520 + next + edit "MuleSoft-Web" + set internet-service-id 4587521 + next + edit "MuleSoft-ICMP" + set internet-service-id 4587522 + next + edit "MuleSoft-DNS" + set internet-service-id 4587523 + next + edit "MuleSoft-Outbound_Email" + set internet-service-id 4587524 + next + edit "MuleSoft-SSH" + set internet-service-id 4587526 + next + edit "MuleSoft-FTP" + set internet-service-id 4587527 + next + edit "MuleSoft-NTP" + set internet-service-id 4587528 + next + edit "MuleSoft-Inbound_Email" + set internet-service-id 4587529 + next + edit "MuleSoft-LDAP" + set internet-service-id 4587534 + next + edit "MuleSoft-NetBIOS.Session.Service" + set internet-service-id 4587535 + next + edit "MuleSoft-RTMP" + set internet-service-id 4587536 + next + edit "MuleSoft-NetBIOS.Name.Service" + set internet-service-id 4587544 + next + edit "Cornerstone-Other" + set internet-service-id 4653056 + next + edit "Cornerstone-Web" + set internet-service-id 4653057 + next + edit "Cornerstone-ICMP" + set internet-service-id 4653058 + next + edit "Cornerstone-DNS" + set internet-service-id 4653059 + next + edit "Cornerstone-Outbound_Email" + set internet-service-id 4653060 + next + edit "Cornerstone-SSH" + set internet-service-id 4653062 + next + edit "Cornerstone-FTP" + set internet-service-id 4653063 + next + edit "Cornerstone-NTP" + set internet-service-id 4653064 + next + edit "Cornerstone-Inbound_Email" + set internet-service-id 4653065 + next + edit "Cornerstone-LDAP" + set internet-service-id 4653070 + next + edit "Cornerstone-NetBIOS.Session.Service" + set internet-service-id 4653071 + next + edit "Cornerstone-RTMP" + set internet-service-id 4653072 + next + edit "Cornerstone-NetBIOS.Name.Service" + set internet-service-id 4653080 + next + edit "Eventbrite-Other" + set internet-service-id 4718592 + next + edit "Eventbrite-Web" + set internet-service-id 4718593 + next + edit "Eventbrite-ICMP" + set internet-service-id 4718594 + next + edit "Eventbrite-DNS" + set internet-service-id 4718595 + next + edit "Eventbrite-Outbound_Email" + set internet-service-id 4718596 + next + edit "Eventbrite-SSH" + set internet-service-id 4718598 + next + edit "Eventbrite-FTP" + set internet-service-id 4718599 + next + edit "Eventbrite-NTP" + set internet-service-id 4718600 + next + edit "Eventbrite-Inbound_Email" + set internet-service-id 4718601 + next + edit "Eventbrite-LDAP" + set internet-service-id 4718606 + next + edit "Eventbrite-NetBIOS.Session.Service" + set internet-service-id 4718607 + next + edit "Eventbrite-RTMP" + set internet-service-id 4718608 + next + edit "Eventbrite-NetBIOS.Name.Service" + set internet-service-id 4718616 + next + edit "Paychex-Other" + set internet-service-id 4784128 + next + edit "Paychex-Web" + set internet-service-id 4784129 + next + edit "Paychex-ICMP" + set internet-service-id 4784130 + next + edit "Paychex-DNS" + set internet-service-id 4784131 + next + edit "Paychex-Outbound_Email" + set internet-service-id 4784132 + next + edit "Paychex-SSH" + set internet-service-id 4784134 + next + edit "Paychex-FTP" + set internet-service-id 4784135 + next + edit "Paychex-NTP" + set internet-service-id 4784136 + next + edit "Paychex-Inbound_Email" + set internet-service-id 4784137 + next + edit "Paychex-LDAP" + set internet-service-id 4784142 + next + edit "Paychex-NetBIOS.Session.Service" + set internet-service-id 4784143 + next + edit "Paychex-RTMP" + set internet-service-id 4784144 + next + edit "Paychex-NetBIOS.Name.Service" + set internet-service-id 4784152 + next + edit "NewRelic-Other" + set internet-service-id 4849664 + next + edit "NewRelic-Web" + set internet-service-id 4849665 + next + edit "NewRelic-ICMP" + set internet-service-id 4849666 + next + edit "NewRelic-DNS" + set internet-service-id 4849667 + next + edit "NewRelic-Outbound_Email" + set internet-service-id 4849668 + next + edit "NewRelic-SSH" + set internet-service-id 4849670 + next + edit "NewRelic-FTP" + set internet-service-id 4849671 + next + edit "NewRelic-NTP" + set internet-service-id 4849672 + next + edit "NewRelic-Inbound_Email" + set internet-service-id 4849673 + next + edit "NewRelic-LDAP" + set internet-service-id 4849678 + next + edit "NewRelic-NetBIOS.Session.Service" + set internet-service-id 4849679 + next + edit "NewRelic-RTMP" + set internet-service-id 4849680 + next + edit "NewRelic-NetBIOS.Name.Service" + set internet-service-id 4849688 + next + edit "Splunk-Other" + set internet-service-id 4915200 + next + edit "Splunk-Web" + set internet-service-id 4915201 + next + edit "Splunk-ICMP" + set internet-service-id 4915202 + next + edit "Splunk-DNS" + set internet-service-id 4915203 + next + edit "Splunk-Outbound_Email" + set internet-service-id 4915204 + next + edit "Splunk-SSH" + set internet-service-id 4915206 + next + edit "Splunk-FTP" + set internet-service-id 4915207 + next + edit "Splunk-NTP" + set internet-service-id 4915208 + next + edit "Splunk-Inbound_Email" + set internet-service-id 4915209 + next + edit "Splunk-LDAP" + set internet-service-id 4915214 + next + edit "Splunk-NetBIOS.Session.Service" + set internet-service-id 4915215 + next + edit "Splunk-RTMP" + set internet-service-id 4915216 + next + edit "Splunk-NetBIOS.Name.Service" + set internet-service-id 4915224 + next + edit "Domo-Other" + set internet-service-id 4980736 + next + edit "Domo-Web" + set internet-service-id 4980737 + next + edit "Domo-ICMP" + set internet-service-id 4980738 + next + edit "Domo-DNS" + set internet-service-id 4980739 + next + edit "Domo-Outbound_Email" + set internet-service-id 4980740 + next + edit "Domo-SSH" + set internet-service-id 4980742 + next + edit "Domo-FTP" + set internet-service-id 4980743 + next + edit "Domo-NTP" + set internet-service-id 4980744 + next + edit "Domo-Inbound_Email" + set internet-service-id 4980745 + next + edit "Domo-LDAP" + set internet-service-id 4980750 + next + edit "Domo-NetBIOS.Session.Service" + set internet-service-id 4980751 + next + edit "Domo-RTMP" + set internet-service-id 4980752 + next + edit "Domo-NetBIOS.Name.Service" + set internet-service-id 4980760 + next + edit "FreshBooks-Other" + set internet-service-id 5046272 + next + edit "FreshBooks-Web" + set internet-service-id 5046273 + next + edit "FreshBooks-ICMP" + set internet-service-id 5046274 + next + edit "FreshBooks-DNS" + set internet-service-id 5046275 + next + edit "FreshBooks-Outbound_Email" + set internet-service-id 5046276 + next + edit "FreshBooks-SSH" + set internet-service-id 5046278 + next + edit "FreshBooks-FTP" + set internet-service-id 5046279 + next + edit "FreshBooks-NTP" + set internet-service-id 5046280 + next + edit "FreshBooks-Inbound_Email" + set internet-service-id 5046281 + next + edit "FreshBooks-LDAP" + set internet-service-id 5046286 + next + edit "FreshBooks-NetBIOS.Session.Service" + set internet-service-id 5046287 + next + edit "FreshBooks-RTMP" + set internet-service-id 5046288 + next + edit "FreshBooks-NetBIOS.Name.Service" + set internet-service-id 5046296 + next + edit "Tableau-Other" + set internet-service-id 5111808 + next + edit "Tableau-Web" + set internet-service-id 5111809 + next + edit "Tableau-ICMP" + set internet-service-id 5111810 + next + edit "Tableau-DNS" + set internet-service-id 5111811 + next + edit "Tableau-Outbound_Email" + set internet-service-id 5111812 + next + edit "Tableau-SSH" + set internet-service-id 5111814 + next + edit "Tableau-FTP" + set internet-service-id 5111815 + next + edit "Tableau-NTP" + set internet-service-id 5111816 + next + edit "Tableau-Inbound_Email" + set internet-service-id 5111817 + next + edit "Tableau-LDAP" + set internet-service-id 5111822 + next + edit "Tableau-NetBIOS.Session.Service" + set internet-service-id 5111823 + next + edit "Tableau-RTMP" + set internet-service-id 5111824 + next + edit "Tableau-NetBIOS.Name.Service" + set internet-service-id 5111832 + next + edit "Druva-Other" + set internet-service-id 5177344 + next + edit "Druva-Web" + set internet-service-id 5177345 + next + edit "Druva-ICMP" + set internet-service-id 5177346 + next + edit "Druva-DNS" + set internet-service-id 5177347 + next + edit "Druva-Outbound_Email" + set internet-service-id 5177348 + next + edit "Druva-SSH" + set internet-service-id 5177350 + next + edit "Druva-FTP" + set internet-service-id 5177351 + next + edit "Druva-NTP" + set internet-service-id 5177352 + next + edit "Druva-Inbound_Email" + set internet-service-id 5177353 + next + edit "Druva-LDAP" + set internet-service-id 5177358 + next + edit "Druva-NetBIOS.Session.Service" + set internet-service-id 5177359 + next + edit "Druva-RTMP" + set internet-service-id 5177360 + next + edit "Druva-NetBIOS.Name.Service" + set internet-service-id 5177368 + next + edit "Act-on-Other" + set internet-service-id 5242880 + next + edit "Act-on-Web" + set internet-service-id 5242881 + next + edit "Act-on-ICMP" + set internet-service-id 5242882 + next + edit "Act-on-DNS" + set internet-service-id 5242883 + next + edit "Act-on-Outbound_Email" + set internet-service-id 5242884 + next + edit "Act-on-SSH" + set internet-service-id 5242886 + next + edit "Act-on-FTP" + set internet-service-id 5242887 + next + edit "Act-on-NTP" + set internet-service-id 5242888 + next + edit "Act-on-Inbound_Email" + set internet-service-id 5242889 + next + edit "Act-on-LDAP" + set internet-service-id 5242894 + next + edit "Act-on-NetBIOS.Session.Service" + set internet-service-id 5242895 + next + edit "Act-on-RTMP" + set internet-service-id 5242896 + next + edit "Act-on-NetBIOS.Name.Service" + set internet-service-id 5242904 + next + edit "GoodData-Other" + set internet-service-id 5308416 + next + edit "GoodData-Web" + set internet-service-id 5308417 + next + edit "GoodData-ICMP" + set internet-service-id 5308418 + next + edit "GoodData-DNS" + set internet-service-id 5308419 + next + edit "GoodData-Outbound_Email" + set internet-service-id 5308420 + next + edit "GoodData-SSH" + set internet-service-id 5308422 + next + edit "GoodData-FTP" + set internet-service-id 5308423 + next + edit "GoodData-NTP" + set internet-service-id 5308424 + next + edit "GoodData-Inbound_Email" + set internet-service-id 5308425 + next + edit "GoodData-LDAP" + set internet-service-id 5308430 + next + edit "GoodData-NetBIOS.Session.Service" + set internet-service-id 5308431 + next + edit "GoodData-RTMP" + set internet-service-id 5308432 + next + edit "GoodData-NetBIOS.Name.Service" + set internet-service-id 5308440 + next + edit "SurveyMonkey-Other" + set internet-service-id 5373952 + next + edit "SurveyMonkey-Web" + set internet-service-id 5373953 + next + edit "SurveyMonkey-ICMP" + set internet-service-id 5373954 + next + edit "SurveyMonkey-DNS" + set internet-service-id 5373955 + next + edit "SurveyMonkey-Outbound_Email" + set internet-service-id 5373956 + next + edit "SurveyMonkey-SSH" + set internet-service-id 5373958 + next + edit "SurveyMonkey-FTP" + set internet-service-id 5373959 + next + edit "SurveyMonkey-NTP" + set internet-service-id 5373960 + next + edit "SurveyMonkey-Inbound_Email" + set internet-service-id 5373961 + next + edit "SurveyMonkey-LDAP" + set internet-service-id 5373966 + next + edit "SurveyMonkey-NetBIOS.Session.Service" + set internet-service-id 5373967 + next + edit "SurveyMonkey-RTMP" + set internet-service-id 5373968 + next + edit "SurveyMonkey-NetBIOS.Name.Service" + set internet-service-id 5373976 + next + edit "Cvent-Other" + set internet-service-id 5439488 + next + edit "Cvent-Web" + set internet-service-id 5439489 + next + edit "Cvent-ICMP" + set internet-service-id 5439490 + next + edit "Cvent-DNS" + set internet-service-id 5439491 + next + edit "Cvent-Outbound_Email" + set internet-service-id 5439492 + next + edit "Cvent-SSH" + set internet-service-id 5439494 + next + edit "Cvent-FTP" + set internet-service-id 5439495 + next + edit "Cvent-NTP" + set internet-service-id 5439496 + next + edit "Cvent-Inbound_Email" + set internet-service-id 5439497 + next + edit "Cvent-LDAP" + set internet-service-id 5439502 + next + edit "Cvent-NetBIOS.Session.Service" + set internet-service-id 5439503 + next + edit "Cvent-RTMP" + set internet-service-id 5439504 + next + edit "Cvent-NetBIOS.Name.Service" + set internet-service-id 5439512 + next + edit "Blackbaud-Other" + set internet-service-id 5505024 + next + edit "Blackbaud-Web" + set internet-service-id 5505025 + next + edit "Blackbaud-ICMP" + set internet-service-id 5505026 + next + edit "Blackbaud-DNS" + set internet-service-id 5505027 + next + edit "Blackbaud-Outbound_Email" + set internet-service-id 5505028 + next + edit "Blackbaud-SSH" + set internet-service-id 5505030 + next + edit "Blackbaud-FTP" + set internet-service-id 5505031 + next + edit "Blackbaud-NTP" + set internet-service-id 5505032 + next + edit "Blackbaud-Inbound_Email" + set internet-service-id 5505033 + next + edit "Blackbaud-LDAP" + set internet-service-id 5505038 + next + edit "Blackbaud-NetBIOS.Session.Service" + set internet-service-id 5505039 + next + edit "Blackbaud-RTMP" + set internet-service-id 5505040 + next + edit "Blackbaud-NetBIOS.Name.Service" + set internet-service-id 5505048 + next + edit "InsideSales-Other" + set internet-service-id 5570560 + next + edit "InsideSales-Web" + set internet-service-id 5570561 + next + edit "InsideSales-ICMP" + set internet-service-id 5570562 + next + edit "InsideSales-DNS" + set internet-service-id 5570563 + next + edit "InsideSales-Outbound_Email" + set internet-service-id 5570564 + next + edit "InsideSales-SSH" + set internet-service-id 5570566 + next + edit "InsideSales-FTP" + set internet-service-id 5570567 + next + edit "InsideSales-NTP" + set internet-service-id 5570568 + next + edit "InsideSales-Inbound_Email" + set internet-service-id 5570569 + next + edit "InsideSales-LDAP" + set internet-service-id 5570574 + next + edit "InsideSales-NetBIOS.Session.Service" + set internet-service-id 5570575 + next + edit "InsideSales-RTMP" + set internet-service-id 5570576 + next + edit "InsideSales-NetBIOS.Name.Service" + set internet-service-id 5570584 + next + edit "ServiceMax-Other" + set internet-service-id 5636096 + next + edit "ServiceMax-Web" + set internet-service-id 5636097 + next + edit "ServiceMax-ICMP" + set internet-service-id 5636098 + next + edit "ServiceMax-DNS" + set internet-service-id 5636099 + next + edit "ServiceMax-Outbound_Email" + set internet-service-id 5636100 + next + edit "ServiceMax-SSH" + set internet-service-id 5636102 + next + edit "ServiceMax-FTP" + set internet-service-id 5636103 + next + edit "ServiceMax-NTP" + set internet-service-id 5636104 + next + edit "ServiceMax-Inbound_Email" + set internet-service-id 5636105 + next + edit "ServiceMax-LDAP" + set internet-service-id 5636110 + next + edit "ServiceMax-NetBIOS.Session.Service" + set internet-service-id 5636111 + next + edit "ServiceMax-RTMP" + set internet-service-id 5636112 + next + edit "ServiceMax-NetBIOS.Name.Service" + set internet-service-id 5636120 + next + edit "Apptio-Other" + set internet-service-id 5701632 + next + edit "Apptio-Web" + set internet-service-id 5701633 + next + edit "Apptio-ICMP" + set internet-service-id 5701634 + next + edit "Apptio-DNS" + set internet-service-id 5701635 + next + edit "Apptio-Outbound_Email" + set internet-service-id 5701636 + next + edit "Apptio-SSH" + set internet-service-id 5701638 + next + edit "Apptio-FTP" + set internet-service-id 5701639 + next + edit "Apptio-NTP" + set internet-service-id 5701640 + next + edit "Apptio-Inbound_Email" + set internet-service-id 5701641 + next + edit "Apptio-LDAP" + set internet-service-id 5701646 + next + edit "Apptio-NetBIOS.Session.Service" + set internet-service-id 5701647 + next + edit "Apptio-RTMP" + set internet-service-id 5701648 + next + edit "Apptio-NetBIOS.Name.Service" + set internet-service-id 5701656 + next + edit "Veracode-Other" + set internet-service-id 5767168 + next + edit "Veracode-Web" + set internet-service-id 5767169 + next + edit "Veracode-ICMP" + set internet-service-id 5767170 + next + edit "Veracode-DNS" + set internet-service-id 5767171 + next + edit "Veracode-Outbound_Email" + set internet-service-id 5767172 + next + edit "Veracode-SSH" + set internet-service-id 5767174 + next + edit "Veracode-FTP" + set internet-service-id 5767175 + next + edit "Veracode-NTP" + set internet-service-id 5767176 + next + edit "Veracode-Inbound_Email" + set internet-service-id 5767177 + next + edit "Veracode-LDAP" + set internet-service-id 5767182 + next + edit "Veracode-NetBIOS.Session.Service" + set internet-service-id 5767183 + next + edit "Veracode-RTMP" + set internet-service-id 5767184 + next + edit "Veracode-NetBIOS.Name.Service" + set internet-service-id 5767192 + next + edit "Anaplan-Other" + set internet-service-id 5832704 + next + edit "Anaplan-Web" + set internet-service-id 5832705 + next + edit "Anaplan-ICMP" + set internet-service-id 5832706 + next + edit "Anaplan-DNS" + set internet-service-id 5832707 + next + edit "Anaplan-Outbound_Email" + set internet-service-id 5832708 + next + edit "Anaplan-SSH" + set internet-service-id 5832710 + next + edit "Anaplan-FTP" + set internet-service-id 5832711 + next + edit "Anaplan-NTP" + set internet-service-id 5832712 + next + edit "Anaplan-Inbound_Email" + set internet-service-id 5832713 + next + edit "Anaplan-LDAP" + set internet-service-id 5832718 + next + edit "Anaplan-NetBIOS.Session.Service" + set internet-service-id 5832719 + next + edit "Anaplan-RTMP" + set internet-service-id 5832720 + next + edit "Anaplan-NetBIOS.Name.Service" + set internet-service-id 5832728 + next + edit "Rapid7-Other" + set internet-service-id 5898240 + next + edit "Rapid7-Web" + set internet-service-id 5898241 + next + edit "Rapid7-ICMP" + set internet-service-id 5898242 + next + edit "Rapid7-DNS" + set internet-service-id 5898243 + next + edit "Rapid7-Outbound_Email" + set internet-service-id 5898244 + next + edit "Rapid7-SSH" + set internet-service-id 5898246 + next + edit "Rapid7-FTP" + set internet-service-id 5898247 + next + edit "Rapid7-NTP" + set internet-service-id 5898248 + next + edit "Rapid7-Inbound_Email" + set internet-service-id 5898249 + next + edit "Rapid7-LDAP" + set internet-service-id 5898254 + next + edit "Rapid7-NetBIOS.Session.Service" + set internet-service-id 5898255 + next + edit "Rapid7-RTMP" + set internet-service-id 5898256 + next + edit "Rapid7-NetBIOS.Name.Service" + set internet-service-id 5898264 + next + edit "AnyDesk-AnyDesk" + set internet-service-id 5963927 + next + edit "ESET-Eset.Service" + set internet-service-id 6029426 + next + edit "Slack-Other" + set internet-service-id 6094848 + next + edit "Slack-Web" + set internet-service-id 6094849 + next + edit "Slack-ICMP" + set internet-service-id 6094850 + next + edit "Slack-DNS" + set internet-service-id 6094851 + next + edit "Slack-Outbound_Email" + set internet-service-id 6094852 + next + edit "Slack-SSH" + set internet-service-id 6094854 + next + edit "Slack-FTP" + set internet-service-id 6094855 + next + edit "Slack-NTP" + set internet-service-id 6094856 + next + edit "Slack-Inbound_Email" + set internet-service-id 6094857 + next + edit "Slack-LDAP" + set internet-service-id 6094862 + next + edit "Slack-NetBIOS.Session.Service" + set internet-service-id 6094863 + next + edit "Slack-RTMP" + set internet-service-id 6094864 + next + edit "Slack-NetBIOS.Name.Service" + set internet-service-id 6094872 + next + edit "Slack-Slack" + set internet-service-id 6095024 + next + edit "ADP-Other" + set internet-service-id 6160384 + next + edit "ADP-Web" + set internet-service-id 6160385 + next + edit "ADP-ICMP" + set internet-service-id 6160386 + next + edit "ADP-DNS" + set internet-service-id 6160387 + next + edit "ADP-Outbound_Email" + set internet-service-id 6160388 + next + edit "ADP-SSH" + set internet-service-id 6160390 + next + edit "ADP-FTP" + set internet-service-id 6160391 + next + edit "ADP-NTP" + set internet-service-id 6160392 + next + edit "ADP-Inbound_Email" + set internet-service-id 6160393 + next + edit "ADP-LDAP" + set internet-service-id 6160398 + next + edit "ADP-NetBIOS.Session.Service" + set internet-service-id 6160399 + next + edit "ADP-RTMP" + set internet-service-id 6160400 + next + edit "ADP-NetBIOS.Name.Service" + set internet-service-id 6160408 + next + edit "Blackboard-Other" + set internet-service-id 6225920 + next + edit "Blackboard-Web" + set internet-service-id 6225921 + next + edit "Blackboard-ICMP" + set internet-service-id 6225922 + next + edit "Blackboard-DNS" + set internet-service-id 6225923 + next + edit "Blackboard-Outbound_Email" + set internet-service-id 6225924 + next + edit "Blackboard-SSH" + set internet-service-id 6225926 + next + edit "Blackboard-FTP" + set internet-service-id 6225927 + next + edit "Blackboard-NTP" + set internet-service-id 6225928 + next + edit "Blackboard-Inbound_Email" + set internet-service-id 6225929 + next + edit "Blackboard-LDAP" + set internet-service-id 6225934 + next + edit "Blackboard-NetBIOS.Session.Service" + set internet-service-id 6225935 + next + edit "Blackboard-RTMP" + set internet-service-id 6225936 + next + edit "Blackboard-NetBIOS.Name.Service" + set internet-service-id 6225944 + next + edit "SAP-Other" + set internet-service-id 6291456 + next + edit "SAP-Web" + set internet-service-id 6291457 + next + edit "SAP-ICMP" + set internet-service-id 6291458 + next + edit "SAP-DNS" + set internet-service-id 6291459 + next + edit "SAP-Outbound_Email" + set internet-service-id 6291460 + next + edit "SAP-SSH" + set internet-service-id 6291462 + next + edit "SAP-FTP" + set internet-service-id 6291463 + next + edit "SAP-NTP" + set internet-service-id 6291464 + next + edit "SAP-Inbound_Email" + set internet-service-id 6291465 + next + edit "SAP-LDAP" + set internet-service-id 6291470 + next + edit "SAP-NetBIOS.Session.Service" + set internet-service-id 6291471 + next + edit "SAP-RTMP" + set internet-service-id 6291472 + next + edit "SAP-NetBIOS.Name.Service" + set internet-service-id 6291480 + next + edit "SAP-HANA" + set internet-service-id 6291612 + next + edit "SAP-SuccessFactors" + set internet-service-id 6291618 + next + edit "Snap-Snapchat" + set internet-service-id 6357108 + next + edit "Zoom.us-Zoom.Meeting" + set internet-service-id 6422646 + next + edit "Sophos-Other" + set internet-service-id 6488064 + next + edit "Sophos-Web" + set internet-service-id 6488065 + next + edit "Sophos-ICMP" + set internet-service-id 6488066 + next + edit "Sophos-DNS" + set internet-service-id 6488067 + next + edit "Sophos-Outbound_Email" + set internet-service-id 6488068 + next + edit "Sophos-SSH" + set internet-service-id 6488070 + next + edit "Sophos-FTP" + set internet-service-id 6488071 + next + edit "Sophos-NTP" + set internet-service-id 6488072 + next + edit "Sophos-Inbound_Email" + set internet-service-id 6488073 + next + edit "Sophos-LDAP" + set internet-service-id 6488078 + next + edit "Sophos-NetBIOS.Session.Service" + set internet-service-id 6488079 + next + edit "Sophos-RTMP" + set internet-service-id 6488080 + next + edit "Sophos-NetBIOS.Name.Service" + set internet-service-id 6488088 + next + edit "Cloudflare-Other" + set internet-service-id 6553600 + next + edit "Cloudflare-Web" + set internet-service-id 6553601 + next + edit "Cloudflare-ICMP" + set internet-service-id 6553602 + next + edit "Cloudflare-DNS" + set internet-service-id 6553603 + next + edit "Cloudflare-Outbound_Email" + set internet-service-id 6553604 + next + edit "Cloudflare-SSH" + set internet-service-id 6553606 + next + edit "Cloudflare-FTP" + set internet-service-id 6553607 + next + edit "Cloudflare-NTP" + set internet-service-id 6553608 + next + edit "Cloudflare-Inbound_Email" + set internet-service-id 6553609 + next + edit "Cloudflare-LDAP" + set internet-service-id 6553614 + next + edit "Cloudflare-NetBIOS.Session.Service" + set internet-service-id 6553615 + next + edit "Cloudflare-RTMP" + set internet-service-id 6553616 + next + edit "Cloudflare-NetBIOS.Name.Service" + set internet-service-id 6553624 + next + edit "Cloudflare-CDN" + set internet-service-id 6553737 + next + edit "Pexip-Pexip.Meeting" + set internet-service-id 6619256 + next + edit "Zscaler-Other" + set internet-service-id 6684672 + next + edit "Zscaler-Web" + set internet-service-id 6684673 + next + edit "Zscaler-ICMP" + set internet-service-id 6684674 + next + edit "Zscaler-DNS" + set internet-service-id 6684675 + next + edit "Zscaler-Outbound_Email" + set internet-service-id 6684676 + next + edit "Zscaler-SSH" + set internet-service-id 6684678 + next + edit "Zscaler-FTP" + set internet-service-id 6684679 + next + edit "Zscaler-NTP" + set internet-service-id 6684680 + next + edit "Zscaler-Inbound_Email" + set internet-service-id 6684681 + next + edit "Zscaler-LDAP" + set internet-service-id 6684686 + next + edit "Zscaler-NetBIOS.Session.Service" + set internet-service-id 6684687 + next + edit "Zscaler-RTMP" + set internet-service-id 6684688 + next + edit "Zscaler-NetBIOS.Name.Service" + set internet-service-id 6684696 + next + edit "Zscaler-Zscaler.Cloud" + set internet-service-id 6684793 + next + edit "Yandex-Other" + set internet-service-id 6750208 + next + edit "Yandex-Web" + set internet-service-id 6750209 + next + edit "Yandex-ICMP" + set internet-service-id 6750210 + next + edit "Yandex-DNS" + set internet-service-id 6750211 + next + edit "Yandex-Outbound_Email" + set internet-service-id 6750212 + next + edit "Yandex-SSH" + set internet-service-id 6750214 + next + edit "Yandex-FTP" + set internet-service-id 6750215 + next + edit "Yandex-NTP" + set internet-service-id 6750216 + next + edit "Yandex-Inbound_Email" + set internet-service-id 6750217 + next + edit "Yandex-LDAP" + set internet-service-id 6750222 + next + edit "Yandex-NetBIOS.Session.Service" + set internet-service-id 6750223 + next + edit "Yandex-RTMP" + set internet-service-id 6750224 + next + edit "Yandex-NetBIOS.Name.Service" + set internet-service-id 6750232 + next + edit "mail.ru-Other" + set internet-service-id 6815744 + next + edit "mail.ru-Web" + set internet-service-id 6815745 + next + edit "mail.ru-ICMP" + set internet-service-id 6815746 + next + edit "mail.ru-DNS" + set internet-service-id 6815747 + next + edit "mail.ru-Outbound_Email" + set internet-service-id 6815748 + next + edit "mail.ru-SSH" + set internet-service-id 6815750 + next + edit "mail.ru-FTP" + set internet-service-id 6815751 + next + edit "mail.ru-NTP" + set internet-service-id 6815752 + next + edit "mail.ru-Inbound_Email" + set internet-service-id 6815753 + next + edit "mail.ru-LDAP" + set internet-service-id 6815758 + next + edit "mail.ru-NetBIOS.Session.Service" + set internet-service-id 6815759 + next + edit "mail.ru-RTMP" + set internet-service-id 6815760 + next + edit "mail.ru-NetBIOS.Name.Service" + set internet-service-id 6815768 + next + edit "Alibaba-Other" + set internet-service-id 6881280 + next + edit "Alibaba-Web" + set internet-service-id 6881281 + next + edit "Alibaba-ICMP" + set internet-service-id 6881282 + next + edit "Alibaba-DNS" + set internet-service-id 6881283 + next + edit "Alibaba-Outbound_Email" + set internet-service-id 6881284 + next + edit "Alibaba-SSH" + set internet-service-id 6881286 + next + edit "Alibaba-FTP" + set internet-service-id 6881287 + next + edit "Alibaba-NTP" + set internet-service-id 6881288 + next + edit "Alibaba-Inbound_Email" + set internet-service-id 6881289 + next + edit "Alibaba-LDAP" + set internet-service-id 6881294 + next + edit "Alibaba-NetBIOS.Session.Service" + set internet-service-id 6881295 + next + edit "Alibaba-RTMP" + set internet-service-id 6881296 + next + edit "Alibaba-NetBIOS.Name.Service" + set internet-service-id 6881304 + next + edit "Alibaba-Alibaba.Cloud" + set internet-service-id 6881402 + next + edit "GoDaddy-Other" + set internet-service-id 6946816 + next + edit "GoDaddy-Web" + set internet-service-id 6946817 + next + edit "GoDaddy-ICMP" + set internet-service-id 6946818 + next + edit "GoDaddy-DNS" + set internet-service-id 6946819 + next + edit "GoDaddy-Outbound_Email" + set internet-service-id 6946820 + next + edit "GoDaddy-SSH" + set internet-service-id 6946822 + next + edit "GoDaddy-FTP" + set internet-service-id 6946823 + next + edit "GoDaddy-NTP" + set internet-service-id 6946824 + next + edit "GoDaddy-Inbound_Email" + set internet-service-id 6946825 + next + edit "GoDaddy-LDAP" + set internet-service-id 6946830 + next + edit "GoDaddy-NetBIOS.Session.Service" + set internet-service-id 6946831 + next + edit "GoDaddy-RTMP" + set internet-service-id 6946832 + next + edit "GoDaddy-NetBIOS.Name.Service" + set internet-service-id 6946840 + next + edit "GoDaddy-GoDaddy.Email" + set internet-service-id 6946939 + next + edit "Webroot-Webroot.SecureAnywhere" + set internet-service-id 7078013 + next + edit "Avast-Other" + set internet-service-id 7143424 + next + edit "Avast-Web" + set internet-service-id 7143425 + next + edit "Avast-ICMP" + set internet-service-id 7143426 + next + edit "Avast-DNS" + set internet-service-id 7143427 + next + edit "Avast-Outbound_Email" + set internet-service-id 7143428 + next + edit "Avast-SSH" + set internet-service-id 7143430 + next + edit "Avast-FTP" + set internet-service-id 7143431 + next + edit "Avast-NTP" + set internet-service-id 7143432 + next + edit "Avast-Inbound_Email" + set internet-service-id 7143433 + next + edit "Avast-LDAP" + set internet-service-id 7143438 + next + edit "Avast-NetBIOS.Session.Service" + set internet-service-id 7143439 + next + edit "Avast-RTMP" + set internet-service-id 7143440 + next + edit "Avast-NetBIOS.Name.Service" + set internet-service-id 7143448 + next + edit "Avast-Avast.Security" + set internet-service-id 7143550 + next + edit "Wetransfer-Other" + set internet-service-id 7208960 + next + edit "Wetransfer-Web" + set internet-service-id 7208961 + next + edit "Wetransfer-ICMP" + set internet-service-id 7208962 + next + edit "Wetransfer-DNS" + set internet-service-id 7208963 + next + edit "Wetransfer-Outbound_Email" + set internet-service-id 7208964 + next + edit "Wetransfer-SSH" + set internet-service-id 7208966 + next + edit "Wetransfer-FTP" + set internet-service-id 7208967 + next + edit "Wetransfer-NTP" + set internet-service-id 7208968 + next + edit "Wetransfer-Inbound_Email" + set internet-service-id 7208969 + next + edit "Wetransfer-LDAP" + set internet-service-id 7208974 + next + edit "Wetransfer-NetBIOS.Session.Service" + set internet-service-id 7208975 + next + edit "Wetransfer-RTMP" + set internet-service-id 7208976 + next + edit "Wetransfer-NetBIOS.Name.Service" + set internet-service-id 7208984 + next + edit "Sendgrid-Sendgrid.Email" + set internet-service-id 7274623 + next + edit "Ubiquiti-UniFi" + set internet-service-id 7340160 + next + edit "Lifesize-Lifesize.Cloud" + set internet-service-id 7405697 + next + edit "Okta-Other" + set internet-service-id 7471104 + next + edit "Okta-Web" + set internet-service-id 7471105 + next + edit "Okta-ICMP" + set internet-service-id 7471106 + next + edit "Okta-DNS" + set internet-service-id 7471107 + next + edit "Okta-Outbound_Email" + set internet-service-id 7471108 + next + edit "Okta-SSH" + set internet-service-id 7471110 + next + edit "Okta-FTP" + set internet-service-id 7471111 + next + edit "Okta-NTP" + set internet-service-id 7471112 + next + edit "Okta-Inbound_Email" + set internet-service-id 7471113 + next + edit "Okta-LDAP" + set internet-service-id 7471118 + next + edit "Okta-NetBIOS.Session.Service" + set internet-service-id 7471119 + next + edit "Okta-RTMP" + set internet-service-id 7471120 + next + edit "Okta-NetBIOS.Name.Service" + set internet-service-id 7471128 + next + edit "Okta-Okta" + set internet-service-id 7471307 + next + edit "Cybozu-Other" + set internet-service-id 7536640 + next + edit "Cybozu-Web" + set internet-service-id 7536641 + next + edit "Cybozu-ICMP" + set internet-service-id 7536642 + next + edit "Cybozu-DNS" + set internet-service-id 7536643 + next + edit "Cybozu-Outbound_Email" + set internet-service-id 7536644 + next + edit "Cybozu-SSH" + set internet-service-id 7536646 + next + edit "Cybozu-FTP" + set internet-service-id 7536647 + next + edit "Cybozu-NTP" + set internet-service-id 7536648 + next + edit "Cybozu-Inbound_Email" + set internet-service-id 7536649 + next + edit "Cybozu-LDAP" + set internet-service-id 7536654 + next + edit "Cybozu-NetBIOS.Session.Service" + set internet-service-id 7536655 + next + edit "Cybozu-RTMP" + set internet-service-id 7536656 + next + edit "Cybozu-NetBIOS.Name.Service" + set internet-service-id 7536664 + next + edit "VNC-Other" + set internet-service-id 7602176 + next + edit "VNC-Web" + set internet-service-id 7602177 + next + edit "VNC-ICMP" + set internet-service-id 7602178 + next + edit "VNC-DNS" + set internet-service-id 7602179 + next + edit "VNC-Outbound_Email" + set internet-service-id 7602180 + next + edit "VNC-SSH" + set internet-service-id 7602182 + next + edit "VNC-FTP" + set internet-service-id 7602183 + next + edit "VNC-NTP" + set internet-service-id 7602184 + next + edit "VNC-Inbound_Email" + set internet-service-id 7602185 + next + edit "VNC-LDAP" + set internet-service-id 7602190 + next + edit "VNC-NetBIOS.Session.Service" + set internet-service-id 7602191 + next + edit "VNC-RTMP" + set internet-service-id 7602192 + next + edit "VNC-NetBIOS.Name.Service" + set internet-service-id 7602200 + next + edit "Egnyte-Egnyte" + set internet-service-id 7667846 + next + edit "CrowdStrike-CrowdStrike.Falcon.Cloud" + set internet-service-id 7733383 + next + edit "Aruba.it-Other" + set internet-service-id 7798784 + next + edit "Aruba.it-Web" + set internet-service-id 7798785 + next + edit "Aruba.it-ICMP" + set internet-service-id 7798786 + next + edit "Aruba.it-DNS" + set internet-service-id 7798787 + next + edit "Aruba.it-Outbound_Email" + set internet-service-id 7798788 + next + edit "Aruba.it-SSH" + set internet-service-id 7798790 + next + edit "Aruba.it-FTP" + set internet-service-id 7798791 + next + edit "Aruba.it-NTP" + set internet-service-id 7798792 + next + edit "Aruba.it-Inbound_Email" + set internet-service-id 7798793 + next + edit "Aruba.it-LDAP" + set internet-service-id 7798798 + next + edit "Aruba.it-NetBIOS.Session.Service" + set internet-service-id 7798799 + next + edit "Aruba.it-RTMP" + set internet-service-id 7798800 + next + edit "Aruba.it-NetBIOS.Name.Service" + set internet-service-id 7798808 + next + edit "ISLOnline-Other" + set internet-service-id 7864320 + next + edit "ISLOnline-Web" + set internet-service-id 7864321 + next + edit "ISLOnline-ICMP" + set internet-service-id 7864322 + next + edit "ISLOnline-DNS" + set internet-service-id 7864323 + next + edit "ISLOnline-Outbound_Email" + set internet-service-id 7864324 + next + edit "ISLOnline-SSH" + set internet-service-id 7864326 + next + edit "ISLOnline-FTP" + set internet-service-id 7864327 + next + edit "ISLOnline-NTP" + set internet-service-id 7864328 + next + edit "ISLOnline-Inbound_Email" + set internet-service-id 7864329 + next + edit "ISLOnline-LDAP" + set internet-service-id 7864334 + next + edit "ISLOnline-NetBIOS.Session.Service" + set internet-service-id 7864335 + next + edit "ISLOnline-RTMP" + set internet-service-id 7864336 + next + edit "ISLOnline-NetBIOS.Name.Service" + set internet-service-id 7864344 + next + edit "Akamai-CDN" + set internet-service-id 7929993 + next + edit "Rackspace-CDN" + set internet-service-id 7995529 + next + edit "Instart-CDN" + set internet-service-id 8061065 + next + edit "Bitdefender-Other" + set internet-service-id 8126464 + next + edit "Bitdefender-Web" + set internet-service-id 8126465 + next + edit "Bitdefender-ICMP" + set internet-service-id 8126466 + next + edit "Bitdefender-DNS" + set internet-service-id 8126467 + next + edit "Bitdefender-Outbound_Email" + set internet-service-id 8126468 + next + edit "Bitdefender-SSH" + set internet-service-id 8126470 + next + edit "Bitdefender-FTP" + set internet-service-id 8126471 + next + edit "Bitdefender-NTP" + set internet-service-id 8126472 + next + edit "Bitdefender-Inbound_Email" + set internet-service-id 8126473 + next + edit "Bitdefender-LDAP" + set internet-service-id 8126478 + next + edit "Bitdefender-NetBIOS.Session.Service" + set internet-service-id 8126479 + next + edit "Bitdefender-RTMP" + set internet-service-id 8126480 + next + edit "Bitdefender-NetBIOS.Name.Service" + set internet-service-id 8126488 + next + edit "Pingdom-Other" + set internet-service-id 8192000 + next + edit "Pingdom-Web" + set internet-service-id 8192001 + next + edit "Pingdom-ICMP" + set internet-service-id 8192002 + next + edit "Pingdom-DNS" + set internet-service-id 8192003 + next + edit "Pingdom-Outbound_Email" + set internet-service-id 8192004 + next + edit "Pingdom-SSH" + set internet-service-id 8192006 + next + edit "Pingdom-FTP" + set internet-service-id 8192007 + next + edit "Pingdom-NTP" + set internet-service-id 8192008 + next + edit "Pingdom-Inbound_Email" + set internet-service-id 8192009 + next + edit "Pingdom-LDAP" + set internet-service-id 8192014 + next + edit "Pingdom-NetBIOS.Session.Service" + set internet-service-id 8192015 + next + edit "Pingdom-RTMP" + set internet-service-id 8192016 + next + edit "Pingdom-NetBIOS.Name.Service" + set internet-service-id 8192024 + next + edit "UptimeRobot-Other" + set internet-service-id 8257536 + next + edit "UptimeRobot-Web" + set internet-service-id 8257537 + next + edit "UptimeRobot-ICMP" + set internet-service-id 8257538 + next + edit "UptimeRobot-DNS" + set internet-service-id 8257539 + next + edit "UptimeRobot-Outbound_Email" + set internet-service-id 8257540 + next + edit "UptimeRobot-SSH" + set internet-service-id 8257542 + next + edit "UptimeRobot-FTP" + set internet-service-id 8257543 + next + edit "UptimeRobot-NTP" + set internet-service-id 8257544 + next + edit "UptimeRobot-Inbound_Email" + set internet-service-id 8257545 + next + edit "UptimeRobot-LDAP" + set internet-service-id 8257550 + next + edit "UptimeRobot-NetBIOS.Session.Service" + set internet-service-id 8257551 + next + edit "UptimeRobot-RTMP" + set internet-service-id 8257552 + next + edit "UptimeRobot-NetBIOS.Name.Service" + set internet-service-id 8257560 + next + edit "UptimeRobot-UptimeRobot.Monitor" + set internet-service-id 8257709 + next + edit "Quovadisglobal-Other" + set internet-service-id 8323072 + next + edit "Quovadisglobal-Web" + set internet-service-id 8323073 + next + edit "Quovadisglobal-ICMP" + set internet-service-id 8323074 + next + edit "Quovadisglobal-DNS" + set internet-service-id 8323075 + next + edit "Quovadisglobal-Outbound_Email" + set internet-service-id 8323076 + next + edit "Quovadisglobal-SSH" + set internet-service-id 8323078 + next + edit "Quovadisglobal-FTP" + set internet-service-id 8323079 + next + edit "Quovadisglobal-NTP" + set internet-service-id 8323080 + next + edit "Quovadisglobal-Inbound_Email" + set internet-service-id 8323081 + next + edit "Quovadisglobal-LDAP" + set internet-service-id 8323086 + next + edit "Quovadisglobal-NetBIOS.Session.Service" + set internet-service-id 8323087 + next + edit "Quovadisglobal-RTMP" + set internet-service-id 8323088 + next + edit "Quovadisglobal-NetBIOS.Name.Service" + set internet-service-id 8323096 + next + edit "Splashtop-Splashtop" + set internet-service-id 8388751 + next + edit "Zoox-Other" + set internet-service-id 8454144 + next + edit "Zoox-Web" + set internet-service-id 8454145 + next + edit "Zoox-ICMP" + set internet-service-id 8454146 + next + edit "Zoox-DNS" + set internet-service-id 8454147 + next + edit "Zoox-Outbound_Email" + set internet-service-id 8454148 + next + edit "Zoox-SSH" + set internet-service-id 8454150 + next + edit "Zoox-FTP" + set internet-service-id 8454151 + next + edit "Zoox-NTP" + set internet-service-id 8454152 + next + edit "Zoox-Inbound_Email" + set internet-service-id 8454153 + next + edit "Zoox-LDAP" + set internet-service-id 8454158 + next + edit "Zoox-NetBIOS.Session.Service" + set internet-service-id 8454159 + next + edit "Zoox-RTMP" + set internet-service-id 8454160 + next + edit "Zoox-NetBIOS.Name.Service" + set internet-service-id 8454168 + next + edit "Skyfii-Other" + set internet-service-id 8519680 + next + edit "Skyfii-Web" + set internet-service-id 8519681 + next + edit "Skyfii-ICMP" + set internet-service-id 8519682 + next + edit "Skyfii-DNS" + set internet-service-id 8519683 + next + edit "Skyfii-Outbound_Email" + set internet-service-id 8519684 + next + edit "Skyfii-SSH" + set internet-service-id 8519686 + next + edit "Skyfii-FTP" + set internet-service-id 8519687 + next + edit "Skyfii-NTP" + set internet-service-id 8519688 + next + edit "Skyfii-Inbound_Email" + set internet-service-id 8519689 + next + edit "Skyfii-LDAP" + set internet-service-id 8519694 + next + edit "Skyfii-NetBIOS.Session.Service" + set internet-service-id 8519695 + next + edit "Skyfii-RTMP" + set internet-service-id 8519696 + next + edit "Skyfii-NetBIOS.Name.Service" + set internet-service-id 8519704 + next + edit "CoffeeBean-Other" + set internet-service-id 8585216 + next + edit "CoffeeBean-Web" + set internet-service-id 8585217 + next + edit "CoffeeBean-ICMP" + set internet-service-id 8585218 + next + edit "CoffeeBean-DNS" + set internet-service-id 8585219 + next + edit "CoffeeBean-Outbound_Email" + set internet-service-id 8585220 + next + edit "CoffeeBean-SSH" + set internet-service-id 8585222 + next + edit "CoffeeBean-FTP" + set internet-service-id 8585223 + next + edit "CoffeeBean-NTP" + set internet-service-id 8585224 + next + edit "CoffeeBean-Inbound_Email" + set internet-service-id 8585225 + next + edit "CoffeeBean-LDAP" + set internet-service-id 8585230 + next + edit "CoffeeBean-NetBIOS.Session.Service" + set internet-service-id 8585231 + next + edit "CoffeeBean-RTMP" + set internet-service-id 8585232 + next + edit "CoffeeBean-NetBIOS.Name.Service" + set internet-service-id 8585240 + next + edit "Cloud4Wi-Other" + set internet-service-id 8650752 + next + edit "Cloud4Wi-Web" + set internet-service-id 8650753 + next + edit "Cloud4Wi-ICMP" + set internet-service-id 8650754 + next + edit "Cloud4Wi-DNS" + set internet-service-id 8650755 + next + edit "Cloud4Wi-Outbound_Email" + set internet-service-id 8650756 + next + edit "Cloud4Wi-SSH" + set internet-service-id 8650758 + next + edit "Cloud4Wi-FTP" + set internet-service-id 8650759 + next + edit "Cloud4Wi-NTP" + set internet-service-id 8650760 + next + edit "Cloud4Wi-Inbound_Email" + set internet-service-id 8650761 + next + edit "Cloud4Wi-LDAP" + set internet-service-id 8650766 + next + edit "Cloud4Wi-NetBIOS.Session.Service" + set internet-service-id 8650767 + next + edit "Cloud4Wi-RTMP" + set internet-service-id 8650768 + next + edit "Cloud4Wi-NetBIOS.Name.Service" + set internet-service-id 8650776 + next + edit "Panda-Panda.Security" + set internet-service-id 8716432 + next + edit "Ewon-Talk2M" + set internet-service-id 8781970 + next + edit "Nutanix-Nutanix.Cloud" + set internet-service-id 8847507 + next + edit "Backblaze-Other" + set internet-service-id 8912896 + next + edit "Backblaze-Web" + set internet-service-id 8912897 + next + edit "Backblaze-ICMP" + set internet-service-id 8912898 + next + edit "Backblaze-DNS" + set internet-service-id 8912899 + next + edit "Backblaze-Outbound_Email" + set internet-service-id 8912900 + next + edit "Backblaze-SSH" + set internet-service-id 8912902 + next + edit "Backblaze-FTP" + set internet-service-id 8912903 + next + edit "Backblaze-NTP" + set internet-service-id 8912904 + next + edit "Backblaze-Inbound_Email" + set internet-service-id 8912905 + next + edit "Backblaze-LDAP" + set internet-service-id 8912910 + next + edit "Backblaze-NetBIOS.Session.Service" + set internet-service-id 8912911 + next + edit "Backblaze-RTMP" + set internet-service-id 8912912 + next + edit "Backblaze-NetBIOS.Name.Service" + set internet-service-id 8912920 + next + edit "Extreme-Extreme.Cloud" + set internet-service-id 8978580 + next + edit "XING-Other" + set internet-service-id 9043968 + next + edit "XING-Web" + set internet-service-id 9043969 + next + edit "XING-ICMP" + set internet-service-id 9043970 + next + edit "XING-DNS" + set internet-service-id 9043971 + next + edit "XING-Outbound_Email" + set internet-service-id 9043972 + next + edit "XING-SSH" + set internet-service-id 9043974 + next + edit "XING-FTP" + set internet-service-id 9043975 + next + edit "XING-NTP" + set internet-service-id 9043976 + next + edit "XING-Inbound_Email" + set internet-service-id 9043977 + next + edit "XING-LDAP" + set internet-service-id 9043982 + next + edit "XING-NetBIOS.Session.Service" + set internet-service-id 9043983 + next + edit "XING-RTMP" + set internet-service-id 9043984 + next + edit "XING-NetBIOS.Name.Service" + set internet-service-id 9043992 + next + edit "Genesys-PureCloud" + set internet-service-id 9109653 + next + edit "BlackBerry-Cylance" + set internet-service-id 9175190 + next + edit "DigiCert-OCSP" + set internet-service-id 9240728 + next + edit "Infomaniak-SwissTransfer" + set internet-service-id 9306265 + next + edit "Fuze-Fuze" + set internet-service-id 9371802 + next + edit "Truecaller-Truecaller" + set internet-service-id 9437339 + next + edit "GlobalSign-OCSP" + set internet-service-id 9502872 + next + edit "VeriSign-OCSP" + set internet-service-id 9568408 + next + edit "Sony-PlayStation.Network" + set internet-service-id 9633952 + next + edit "Acronis-Cyber.Cloud" + set internet-service-id 9699489 + next + edit "RingCentral-RingCentral" + set internet-service-id 9765027 + next + edit "FSecure-FSecure" + set internet-service-id 9830564 + next + edit "Kaseya-Kaseya.Cloud" + set internet-service-id 9896101 + next + edit "Shodan-Scanner" + set internet-service-id 9961638 + next + edit "Censys-Scanner" + set internet-service-id 10027174 + next + edit "Valve-Steam" + set internet-service-id 10092711 + next + edit "YouSeeU-Bongo" + set internet-service-id 10158248 + next + edit "Cato-Cato.Cloud" + set internet-service-id 10223785 + next + edit "SolarWinds-SpamExperts" + set internet-service-id 10289323 + next + edit "SolarWinds-Pingdom.Probe" + set internet-service-id 10289326 + next + edit "SolarWinds-SolarWinds.RMM" + set internet-service-id 10289379 + next + edit "8X8-8X8.Cloud" + set internet-service-id 10354860 + next + edit "Zattoo-Zattoo.TV" + set internet-service-id 10420401 + next + edit "Datto-Datto.RMM" + set internet-service-id 10485939 + next + edit "Barracuda-Barracuda.Cloud" + set internet-service-id 10551477 + next + edit "Naver-Line" + set internet-service-id 10617015 + next + edit "Disney-Disney+" + set internet-service-id 10682552 + next + edit "DNS-DoH_DoT" + set internet-service-id 10748089 + next + edit "DNS-Root.Name.Servers" + set internet-service-id 10748156 + next + edit "Quad9-Quad9.Standard.DNS" + set internet-service-id 10813626 + next + edit "Stretchoid-Scanner" + set internet-service-id 10879142 + next + edit "Poly-RealConnect.Service" + set internet-service-id 10944700 + next + edit "Telegram-Telegram" + set internet-service-id 11010249 + next + edit "Spotify-Spotify" + set internet-service-id 11075786 + next + edit "NextDNS-NextDNS" + set internet-service-id 11141324 + next + edit "Fastly-CDN" + set internet-service-id 11206793 + next + edit "Neustar-UltraDNS.Probes" + set internet-service-id 11272397 + next + edit "Malicious-Malicious.Server" + set internet-service-id 11337935 + next + edit "NIST-ITS" + set internet-service-id 11403472 + next + edit "Jamf-Jamf.Cloud" + set internet-service-id 11469009 + next + edit "Alcatel.Lucent-Rainbow" + set internet-service-id 11534546 + next + edit "Forcepoint-Forcepoint.Cloud" + set internet-service-id 11600083 + next + edit "Datadog-Datadog" + set internet-service-id 11665620 + next + edit "Mimecast-Mimecast" + set internet-service-id 11731157 + next + edit "MediaFire-Other" + set internet-service-id 11796480 + next + edit "MediaFire-Web" + set internet-service-id 11796481 + next + edit "MediaFire-ICMP" + set internet-service-id 11796482 + next + edit "MediaFire-DNS" + set internet-service-id 11796483 + next + edit "MediaFire-Outbound_Email" + set internet-service-id 11796484 + next + edit "MediaFire-SSH" + set internet-service-id 11796486 + next + edit "MediaFire-FTP" + set internet-service-id 11796487 + next + edit "MediaFire-NTP" + set internet-service-id 11796488 + next + edit "MediaFire-Inbound_Email" + set internet-service-id 11796489 + next + edit "MediaFire-LDAP" + set internet-service-id 11796494 + next + edit "MediaFire-NetBIOS.Session.Service" + set internet-service-id 11796495 + next + edit "MediaFire-RTMP" + set internet-service-id 11796496 + next + edit "MediaFire-NetBIOS.Name.Service" + set internet-service-id 11796504 + next + edit "Pandora-Pandora" + set internet-service-id 11862230 + next + edit "SiriusXM-SiriusXM" + set internet-service-id 11927767 + next + edit "Hopin-Hopin" + set internet-service-id 11993304 + next + edit "RedShield-RedShield.Cloud" + set internet-service-id 12058842 + next + edit "InterneTTL-Scanner" + set internet-service-id 12124326 + next + edit "VadeSecure-VadeSecure.Cloud" + set internet-service-id 12189915 + next + edit "Netskope-Netskope.Cloud" + set internet-service-id 12255452 + next + edit "ClickMeeting-ClickMeeting" + set internet-service-id 12320989 + next + edit "Tenable-Tenable.io.Cloud.Scanner" + set internet-service-id 12386528 + next + edit "Vidyo-VidyoCloud" + set internet-service-id 12452065 + next + edit "OpenNIC-OpenNIC.DNS" + set internet-service-id 12517602 + next + edit "Sectigo-Sectigo" + set internet-service-id 12583141 + next + edit "DigitalOcean-DigitalOcean.Platform" + set internet-service-id 12648679 + next + edit "Pitney.Bowes-Pitney.Bowes.Data.Center" + set internet-service-id 12714216 + next + edit "VPN-Anonymous.VPN" + set internet-service-id 12779753 + next + edit "Blockchain-Crypto.Mining.Pool" + set internet-service-id 12845290 + next + edit "FactSet-FactSet" + set internet-service-id 12910830 + next + edit "Bloomberg-Bloomberg" + set internet-service-id 12976367 + next + edit "Five9-Five9" + set internet-service-id 13041904 + next + edit "Gigas-Gigas.Cloud" + set internet-service-id 13107441 + next + edit "Imperva-Imperva.Cloud.WAF" + set internet-service-id 13172978 + next + edit "HorizonIQ-HorizonIQ" + set internet-service-id 13238515 + next + edit "Azion-Azion.Platform" + set internet-service-id 13304053 + next + edit "Hurricane.Electric-Hurricane.Electric.Internet.Services" + set internet-service-id 13369590 + next + edit "NodePing-NodePing.Probe" + set internet-service-id 13435127 + next + edit "Frontline-Frontline" + set internet-service-id 13500665 + next + edit "Tally-Tally.ERP" + set internet-service-id 13566202 + next + edit "Hosting-Bulletproof.Hosting" + set internet-service-id 13631739 + next + edit "Okko-Okko.TV" + set internet-service-id 13697277 + next + edit "Voximplant-Voximplant.Platform" + set internet-service-id 13762829 + next + edit "OVHcloud-OVHcloud" + set internet-service-id 13828367 + next + edit "Microsoft-Office365.Published.Optimize" + set internet-service-id 327902 + next + edit "Microsoft-Office365.Published.Allow" + set internet-service-id 327903 + next + edit "Microsoft-Office365.Published.USGOV" + set internet-service-id 327917 + next + edit "Amazon-AWS.GovCloud.US" + set internet-service-id 393452 + next + edit "Cisco-Webex.FedRAMP" + set internet-service-id 1966315 + next + edit "Adobe-Adobe.Sign" + set internet-service-id 917776 + next + edit "SentinelOne-SentinelOne.Cloud" + set internet-service-id 13893905 + next + edit "Kakao-Kakao.Services" + set internet-service-id 13959442 + next + edit "Stripe-Stripe" + set internet-service-id 14024979 + next + edit "NetScout-Scanner" + set internet-service-id 14090406 + next + edit "Recyber-Scanner" + set internet-service-id 14155942 + next + edit "Cyber.Casa-Scanner" + set internet-service-id 14221478 + next + edit "Atlassian-Atlassian.Notification" + set internet-service-id 3932436 + next + edit "Amazon-Amazon.SES" + set internet-service-id 393493 + next + edit "GTHost-Dedicated.Instant.Servers" + set internet-service-id 14287132 + next + edit "ivi-ivi.Streaming" + set internet-service-id 14352669 + next + edit "BinaryEdge-Scanner" + set internet-service-id 14418086 + next + edit "Fintech-MarketMap.Terminal" + set internet-service-id 14483742 + next + edit "xMatters-xMatters.Platform" + set internet-service-id 14549279 + next + edit "Blizzard-Battle.Net" + set internet-service-id 14614816 + next + edit "Axon-Evidence" + set internet-service-id 14680353 + next + edit "CDN77-CDN" + set internet-service-id 14745737 + next + edit "GCore.Labs-CDN" + set internet-service-id 14811273 + next + edit "Matrix42-FastViewer" + set internet-service-id 14876962 + next + edit "Fortinet-FortiEDR" + set internet-service-id 1245475 + next + edit "Bunny.net-CDN" + set internet-service-id 14942345 + next + edit "Akamai-Linode.Cloud" + set internet-service-id 7930148 + next + edit "StackPath-CDN" + set internet-service-id 15007881 + next + edit "Edgio-CDN" + set internet-service-id 15073417 + next + edit "CacheFly-CDN" + set internet-service-id 15138953 + next + edit "Fortinet-FortiClient.EMS" + set internet-service-id 1245477 + next + edit "Paylocity-Paylocity" + set internet-service-id 15204646 + next + edit "Qualys-Qualys.Cloud.Platform" + set internet-service-id 15270183 + next + edit "Dailymotion-Other" + set internet-service-id 15335424 + next + edit "Dailymotion-Web" + set internet-service-id 15335425 + next + edit "Dailymotion-ICMP" + set internet-service-id 15335426 + next + edit "Dailymotion-DNS" + set internet-service-id 15335427 + next + edit "Dailymotion-Outbound_Email" + set internet-service-id 15335428 + next + edit "Dailymotion-SSH" + set internet-service-id 15335430 + next + edit "Dailymotion-FTP" + set internet-service-id 15335431 + next + edit "Dailymotion-NTP" + set internet-service-id 15335432 + next + edit "Dailymotion-Inbound_Email" + set internet-service-id 15335433 + next + edit "Dailymotion-LDAP" + set internet-service-id 15335438 + next + edit "Dailymotion-NetBIOS.Session.Service" + set internet-service-id 15335439 + next + edit "Dailymotion-RTMP" + set internet-service-id 15335440 + next + edit "Dailymotion-NetBIOS.Name.Service" + set internet-service-id 15335448 + next + edit "Fortinet-FortiWeb.Cloud" + set internet-service-id 1245480 + next + edit "Fortinet-FortiSASE" + set internet-service-id 1245481 + next + edit "LaunchDarkly-LaunchDarkly.Platform" + set internet-service-id 15401258 + next + edit "Medianova-CDN" + set internet-service-id 15466633 + next + edit "NetDocuments-NetDocuments.Platform" + set internet-service-id 15532331 + next + edit "Vonage-Vonage.Contact.Center" + set internet-service-id 15597869 + next + edit "DNS-ARPA.Name.Servers" + set internet-service-id 10748206 + next + edit "Veritas-Enterprise.Vault.Cloud" + set internet-service-id 15663407 + next + edit "UK.NCSC-Scanner" + set internet-service-id 15728806 + next + edit "Vonage-Vonage.Video.API" + set internet-service-id 15597872 + next + edit "Restream-Restream.Platform" + set internet-service-id 15794481 + next + edit "NewRelic-Synthetic.Monitor" + set internet-service-id 4849970 + next + edit "ArcticWolf-ArcticWolf.Cloud" + set internet-service-id 15860019 + next + edit "CounterPath-Bria" + set internet-service-id 15925556 + next + edit "CriminalIP-Scanner" + set internet-service-id 15990950 + next + edit "IPFS-IPFS.Gateway" + set internet-service-id 16056629 + next + edit "Internet.Census.Group-Scanner" + set internet-service-id 16122022 + next + edit "SAP-SAP.Ariba" + set internet-service-id 6291766 + next + edit "Microsoft-Teams.Published.Worldwide.Optimize" + set internet-service-id 327991 + next + edit "Microsoft-Teams.Published.Worldwide.Allow" + set internet-service-id 327992 + next + edit "Performive-Performive.Cloud" + set internet-service-id 16187706 + next + edit "Microsoft-Azure.Monitor" + set internet-service-id 327958 + next + edit "Microsoft-Azure.SQL" + set internet-service-id 327959 + next + edit "Microsoft-Azure.AD" + set internet-service-id 327960 + next + edit "Microsoft-Azure.Data.Factory" + set internet-service-id 327961 + next + edit "Microsoft-Azure.Virtual.Desktop" + set internet-service-id 327962 + next + edit "Microsoft-Azure.Power.BI" + set internet-service-id 327963 + next + edit "Tencent-VooV.Meeting" + set internet-service-id 2556219 + next + edit "OneLogin-OneLogin" + set internet-service-id 16253244 + next + edit "Shadowserver-Scanner" + set internet-service-id 16318630 + next + edit "Turkcell-Suit.Conference" + set internet-service-id 16384317 + next + edit "LeakIX-Scanner" + set internet-service-id 16449702 + next + edit "Infoblox-BloxOne" + set internet-service-id 16515390 + next + edit "Nice-CXone" + set internet-service-id 16580927 + next + edit "Hetzner-Hetzner.Hosting.Service" + set internet-service-id 16646464 + next + edit "ThreatLocker-ThreatLocker" + set internet-service-id 16712001 + next + edit "ZPE-ZPE.Cloud" + set internet-service-id 16777538 + next + edit "Datto-Datto.BCDR" + set internet-service-id 10486083 + next + edit "ColoCrossing-ColoCrossing.Hosting.Service" + set internet-service-id 16843076 + next + edit "Sinch-Mailgun" + set internet-service-id 16908613 + next + edit "SpaceX-Starlink" + set internet-service-id 16974150 + next + edit "Ingenuity-Ingenuity.Cloud.Service" + set internet-service-id 17039688 + next + edit "Fortinet-FortiGuard.SOCaaS" + set internet-service-id 1245514 + next + edit "Skyhigh.Security-Secure.Web.Gateway" + set internet-service-id 17105227 + next + edit "Stark.Industries-Stark.Industries.Hosting.Service" + set internet-service-id 17170764 + next + edit "StatusCake-StatusCake.Monitor" + set internet-service-id 17236307 + next + edit "NAP-NAPLAN" + set internet-service-id 17301844 + next + edit "Elastic-Elastic.Cloud" + set internet-service-id 17367382 + next + edit "Alibaba-DingTalk" + set internet-service-id 6881623 + next + edit "Zoom-phones" + set type location + set internet-service-id 6422646 + set country-id 840 + set region-id 1280 + set city-id 65535 + next + edit "NFON-NFON" + set internet-service-id 17432920 + next + edit "SERVERD-SERVERD.Hosting.Service" + set internet-service-id 17498457 + next + edit "MEGA-MEGA.Cloud" + set internet-service-id 17563994 + next + edit "Hadrian-Scanner" + set internet-service-id 17629350 + next + edit "ISLOnline-ISLOnline" + set internet-service-id 7864667 + next + edit "Dotcom.Monitor-Dotcom.Monitor" + set internet-service-id 17695068 + next + edit "Ahrefs-AhrefsBot" + set internet-service-id 17760605 + next + edit "Semrush-SemrushBot" + set internet-service-id 17826142 + next + edit "Vultr-Vultr.Cloud" + set internet-service-id 17957216 + next + edit "Rapid7-Scanner" + set internet-service-id 5898406 + next + edit "Lookout-Lookout.Cloud" + set internet-service-id 18219365 + next + edit "Fortinet-FortiDLP.Cloud" + set internet-service-id 1245546 + next + edit "Fortinet-FortiSandbox" + set internet-service-id 1245560 + next + edit "Fortinet-FortiSandbox.Cloud" + set internet-service-id 1245561 + next + edit "Bluejeans-Bluejeans.Meeting" + set internet-service-id 7012476 + next + edit "DNS-Generic.TLD.Name.Servers" + set internet-service-id 10748284 + next + edit "Microsoft-Azure.Front.Door.MicrosoftSecurity" + set internet-service-id 328080 + next +end +config firewall internet-service-definition +end +config firewall ssh local-key + edit "g-Fortinet_SSH_RSA2048" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_DSA1024" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA256" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA384" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA521" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ED25519" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh local-ca + edit "g-Fortinet_SSH_CA" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_CA_Untrusted" + set password ENC *HIDDEN* + set source built-in + next +end diff --git a/configs/fortigate/global/ips.cfg b/configs/fortigate/global/ips.cfg new file mode 100644 index 0000000..f8de5cc --- /dev/null +++ b/configs/fortigate/global/ips.cfg @@ -0,0 +1,26 @@ +config ips sensor + edit "g-default" + set comment "Prevent critical attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-sniffer-profile" + set comment "Monitor IPS attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config entries + edit 1 + set severity medium high critical + next + end + next +end diff --git a/configs/fortigate/global/log.cfg b/configs/fortigate/global/log.cfg new file mode 100644 index 0000000..a4519d6 --- /dev/null +++ b/configs/fortigate/global/log.cfg @@ -0,0 +1,10 @@ +config log syslogd filter + set severity error +end +config log fortianalyzer setting + set status enable + set server "10.1.48.40" + set serial "FAZVMSTM22000402" + set source-ip "192.168.1.241" + set upload-option realtime +end diff --git a/configs/fortigate/global/system.cfg b/configs/fortigate/global/system.cfg new file mode 100644 index 0000000..be41307 --- /dev/null +++ b/configs/fortigate/global/system.cfg @@ -0,0 +1,1320 @@ +config system global + set admin-server-cert "Fortinet_Factory" + set admintimeout 59 + set alias "FortiGate-2601F" + set gui-device-latitude "43.02974913459805" + set gui-device-longitude "-76.14486694335938" + set hostname "noc-fortigate-b" + set management-port-use-admin-sport disable + set remoteauthtimeout 120 + set revision-backup-on-logout enable + set switch-controller enable + set timezone 12 + set vdom-mode multi-vdom +end +config system accprofile + edit "prof_admin" + set secfabgrp read-write + set ftviewgrp read-write + set authgrp read-write + set sysgrp read-write + set netgrp read-write + set loggrp read-write + set fwgrp read-write + set vpngrp read-write + set utmgrp read-write + set wanoptgrp read-write + set wifi read-write + next + edit "NOC_Dashboard" + set comments "For displaying info in Operations area" + set secfabgrp read + set ftviewgrp read + set authgrp read + set sysgrp read + set netgrp read + set loggrp read + set fwgrp read + set vpngrp read + set utmgrp read + set wanoptgrp read + set wifi read + set admintimeout-override enable + set system-diagnostics disable + set admintimeout 0 + next + edit "Read_Only" + set secfabgrp read + set ftviewgrp read + set authgrp read + set sysgrp read + set netgrp read + set loggrp read + set fwgrp read + set vpngrp read + set utmgrp read + set wanoptgrp read + set wifi read + next +end +config system npu + config np-queues + config ethernet-type + edit "ARP" + set type 806 + set queue 9 + next + edit "HA-SESSYNC" + set type 8892 + set queue 11 + next + edit "HA-DEF" + set type 8890 + set queue 11 + next + edit "HC-DEF" + set type 8891 + set queue 11 + next + edit "L2EP-DEF" + set type 8893 + set queue 11 + next + edit "LACP" + set type 8809 + set queue 9 + next + end + config ip-protocol + edit "OSPF" + set protocol 89 + set queue 11 + next + edit "IGMP" + set protocol 2 + set queue 11 + next + edit "ICMP" + set protocol 1 + set queue 3 + next + end + config ip-service + edit "IKE" + set protocol 17 + set sport 500 + set dport 500 + set queue 11 + next + edit "BGP" + set protocol 6 + set sport 179 + set dport 179 + set queue 9 + next + edit "BFD-single-hop" + set protocol 17 + set sport 3784 + set dport 3784 + set queue 11 + next + edit "BFD-multiple-hop" + set protocol 17 + set sport 4784 + set dport 4784 + set queue 11 + next + edit "SLBC-management" + set protocol 17 + set dport 720 + set queue 11 + next + edit "SLBC-1" + set protocol 17 + set sport 11133 + set dport 11133 + set queue 11 + next + edit "SLBC-2" + set protocol 17 + set sport 65435 + set dport 65435 + set queue 11 + next + end + end +end +config system interface + edit "port1" + set vdom "root" + set type physical + set alias "HA Port 1" + set snmp-index 1 + set speed 10000auto + next + edit "port2" + set vdom "root" + set type physical + set alias "HA Port 2" + set snmp-index 2 + set speed 10000auto + next + edit "port3" + set vdom "root" + set type physical + set snmp-index 3 + set speed 10000auto + next + edit "port4" + set vdom "root" + set type physical + set snmp-index 4 + set speed 10000auto + next + edit "port5" + set vdom "scsd" + set type physical + set snmp-index 5 + set speed 10000auto + next + edit "port6" + set vdom "scsd" + set type physical + set snmp-index 6 + set speed 10000auto + next + edit "port7" + set vdom "root" + set type physical + set snmp-index 7 + set speed 10000auto + next + edit "port8" + set vdom "root" + set type physical + set snmp-index 8 + set speed 10000auto + next + edit "port9" + set vdom "TEST" + set status down + set type physical + set alias "LAN_Test" + set snmp-index 9 + set speed 10000auto + next + edit "port10" + set vdom "TEST" + set status down + set type physical + set alias "WAN_Test" + set snmp-index 10 + set speed 10000auto + next + edit "port11" + set vdom "root" + set type physical + set snmp-index 11 + set speed 10000auto + next + edit "port12" + set vdom "root" + set type physical + set snmp-index 12 + set speed 10000auto + next + edit "port13" + set vdom "root" + set type physical + set snmp-index 13 + set speed 10000auto + next + edit "port14" + set vdom "root" + set type physical + set snmp-index 14 + set speed 10000auto + next + edit "port15" + set vdom "root" + set type physical + set snmp-index 15 + set speed 10000auto + next + edit "port16" + set vdom "root" + set type physical + set snmp-index 16 + set speed 10000auto + next + edit "port17" + set vdom "scsd" + set type physical + set mediatype sr + set snmp-index 17 + set speed 10000full + next + edit "port18" + set vdom "scsd" + set type physical + set mediatype sr + set snmp-index 18 + set speed 10000full + next + edit "port19" + set vdom "scsd" + set type physical + set mediatype sr + set snmp-index 19 + set speed 10000full + next + edit "port20" + set vdom "scsd" + set type physical + set mediatype sr + set snmp-index 20 + set speed 10000full + next + edit "port21" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 21 + set forward-error-correction disable + set speed 25000full + next + edit "port22" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 22 + set forward-error-correction disable + set speed 25000full + next + edit "port23" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 23 + set forward-error-correction disable + set speed 25000full + next + edit "port24" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 24 + set forward-error-correction disable + set speed 25000full + next + edit "port25" + set vdom "scsd" + set allowaccess ping + set status down + set type physical + set mediatype sr + set monitor-bandwidth enable + set snmp-index 25 + set speed 10000full + next + edit "port26" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 26 + set speed 10000full + next + edit "port27" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 27 + set speed 10000full + next + edit "port28" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 28 + set speed 10000full + next + edit "port29" + set vdom "scsd" + set allowaccess ping + set status down + set type physical + set mediatype sr + set monitor-bandwidth enable + set snmp-index 29 + set speed 10000full + next + edit "port30" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 30 + set speed 10000full + next + edit "port31" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 31 + set speed 10000full + next + edit "port32" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 32 + set speed 10000full + next + edit "port33" + set vdom "root" + set type physical + set mediatype sr4 + set snmp-index 33 + set forward-error-correction disable + set speed 100Gfull + next + edit "port34" + set vdom "root" + set type physical + set mediatype sr4 + set snmp-index 34 + set forward-error-correction disable + set speed 100Gfull + next + edit "port35" + set vdom "root" + set type physical + set mediatype sr4 + set snmp-index 35 + set forward-error-correction disable + set speed 100Gfull + next + edit "port36" + set vdom "root" + set type physical + set mediatype sr4 + set snmp-index 36 + set forward-error-correction disable + set speed 100Gfull + next + edit "mgmt1" + set vdom "root" + set ip 192.168.1.241 255.255.255.0 + set allowaccess ping https ssh http + set type physical + set dedicated-to management + set role lan + set snmp-index 37 + next + edit "mgmt2" + set vdom "root" + set ip 192.168.200.1 255.255.255.0 + set allowaccess ping https ssh http + set type physical + set dedicated-to management + set role lan + set snmp-index 38 + next + edit "ha1" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 39 + set speed 10000full + next + edit "ha2" + set vdom "root" + set type physical + set mediatype sr + set snmp-index 40 + set speed 10000full + next + edit "modem" + set vdom "root" + set mode pppoe + set status down + set type physical + set snmp-index 41 + next + edit "naf.root" + set vdom "root" + set type tunnel + set src-check disable + set snmp-index 51 + next + edit "l2t.root" + set vdom "root" + set type tunnel + set snmp-index 52 + next + edit "ssl.root" + set vdom "root" + set type tunnel + set alias "SSL VPN interface" + set snmp-index 42 + next + edit "naf.Policy" + set vdom "Policy" + set type tunnel + set src-check disable + set snmp-index 53 + next + edit "l2t.Policy" + set vdom "Policy" + set type tunnel + set snmp-index 54 + next + edit "ssl.Policy" + set vdom "Policy" + set type tunnel + set alias "SSL VPN interface" + set snmp-index 50 + next + edit "naf.TEST" + set vdom "TEST" + set type tunnel + set src-check disable + set snmp-index 55 + next + edit "l2t.TEST" + set vdom "TEST" + set type tunnel + set snmp-index 56 + next + edit "ssl.TEST" + set vdom "TEST" + set type tunnel + set alias "SSL VPN interface" + set snmp-index 47 + next + edit "naf.scsd" + set vdom "scsd" + set type tunnel + set src-check disable + set snmp-index 57 + next + edit "l2t.scsd" + set vdom "scsd" + set type tunnel + set snmp-index 58 + next + edit "ssl.scsd" + set vdom "scsd" + set type tunnel + set alias "SSL VPN interface" + set snmp-index 45 + next + edit "npu0_vlink0" + set vdom "root" + set type physical + set snmp-index 43 + next + edit "npu0_vlink1" + set vdom "root" + set type physical + set snmp-index 44 + next + edit "SRIC_BOCES" + set vdom "scsd" + set type tunnel + set snmp-index 46 + set interface "outside lag" + next + edit "vpn-042e9903" + set vdom "scsd" + set ip 169.254.69.218 255.255.255.255 + set allowaccess ping + set type tunnel + set tcp-mss 1379 + set remote-ip 169.254.69.217 255.255.255.252 + set snmp-index 48 + set mtu-override enable + set mtu 1427 + set interface "outside lag" + next + edit "SCHC" + set vdom "scsd" + set type tunnel + set snmp-index 49 + set interface "outside lag" + next + edit "vpn-0fc50345" + set vdom "scsd" + set ip 169.254.54.78 255.255.255.255 + set allowaccess ping + set type tunnel + set tcp-mss 1379 + set remote-ip 169.254.54.77 255.255.255.252 + set snmp-index 59 + set mtu-override enable + set mtu 1427 + set interface "outside lag" + next + edit "inside lag" + set vdom "scsd" + set ip 10.251.1.5 255.255.255.0 + set allowaccess ping + set type aggregate + set member "port17" "port19" + set alias "Inside" + set lldp-transmission enable + set monitor-bandwidth enable + set snmp-index 60 + next + edit "outside lag" + set vdom "scsd" + set ip 198.36.24.5 255.255.255.0 + set allowaccess ping + set type aggregate + set member "port18" "port20" + set alias "Outside" + set lldp-reception enable + set lldp-transmission enable + set monitor-bandwidth enable + set snmp-index 61 + next + edit "city_phones lag" + set vdom "scsd" + set ip 10.250.100.94 255.255.255.0 + set allowaccess ping + set type aggregate + set member "port6" "port5" + set description "City Phones" + set alias "City_Phones" + set lldp-transmission enable + set monitor-bandwidth enable + set snmp-index 62 + next + edit "vpn-0403e61" + set vdom "scsd" + set ip 169.254.242.194 255.255.255.255 + set allowaccess ping + set type tunnel + set tcp-mss 1379 + set remote-ip 169.254.242.193 255.255.255.252 + set snmp-index 63 + set mtu-override enable + set mtu 1427 + set interface "outside lag" + next + edit "Highstreet" + set vdom "scsd" + set ip 169.254.117.222 255.255.255.255 + set allowaccess ping + set type tunnel + set tcp-mss 1379 + set remote-ip 169.254.117.221 255.255.255.252 + set snmp-index 65 + set mtu-override enable + set mtu 1427 + set interface "outside lag" + next + edit "Highstreet_2" + set vdom "scsd" + set ip 169.254.13.86 255.255.255.255 + set allowaccess ping + set status down + set type tunnel + set tcp-mss 1379 + set remote-ip 169.254.13.85 255.255.255.252 + set snmp-index 66 + set mtu-override enable + set mtu 1427 + set interface "outside lag" + next + edit "DPS" + set vdom "scsd" + set ip 192.168.147.1 255.255.255.255 + set allowaccess ping https ssh http + set type tunnel + set remote-ip 192.168.147.2 255.255.255.255 + set snmp-index 67 + set interface "outside lag" + next + edit "RAP" + set vdom "scsd" + set type tunnel + set snmp-index 68 + set interface "outside lag" + next +end +config system physical-switch + edit "sw0" + set age-val 0 + next +end +config system custom-language + edit "en" + set filename "en" + next + edit "fr" + set filename "fr" + next + edit "sp" + set filename "sp" + next + edit "pg" + set filename "pg" + next + edit "x-sjis" + set filename "x-sjis" + next + edit "big5" + set filename "big5" + next + edit "GB2312" + set filename "GB2312" + next + edit "euc-kr" + set filename "euc-kr" + next +end +config system admin + edit "admin" + set trusthost1 10.1.6.20 255.255.255.255 + set trusthost2 10.1.6.32 255.255.255.255 + set accprofile "super_admin" + set vdom "root" + set password ENC *HIDDEN* + next + edit "tmarri81.admin" + set trusthost1 10.1.6.34 255.255.255.255 + set trusthost2 10.1.6.20 255.255.255.255 + set accprofile "super_admin" + set vdom "root" "scsd" + set password ENC *HIDDEN* + next + edit "nocview" + set trusthost1 10.1.6.0 255.255.255.0 + set accprofile "NOC_Dashboard" + set vdom "root" "scsd" + set password ENC *HIDDEN* + next + edit "josoto.admin" + set trusthost1 10.1.6.126 255.255.255.255 + set accprofile "super_admin" + set vdom "root" "scsd" + set password ENC *HIDDEN* + next + edit "jpoland" + set accprofile "super_admin" + set vdom "root" + set password ENC *HIDDEN* + next + edit "jkafta72.admin" + set accprofile "super_admin" + set vdom "root" + set password ENC *HIDDEN* + next +end +config system sso-admin +end +config system sso-forticloud-admin + edit "FortiGateCloud" + set vdom "root" + next + edit "4fc9e93dd975@fortigatecloud.com" + set vdom "root" + next +end +config system ha + set group-name "SCSD_Fortigate" + set mode a-p + set hbdev "port1" 50 "port2" 50 + set override disable + set priority 100 +end +config system storage + edit "SSD1" + set status enable + set media-status enable + set order 1 + set partition "LOGUSEDX4300F88D" + set device "/dev/nvme0n1p1" + set size 937875 + set usage log + next + edit "SSD2" + set status enable + set media-status enable + set order 2 + set partition "WANOPTXXFFCD85F8" + set device "/dev/nvme1n1p1" + set size 266562 + set usage wanopt + set wanopt-mode mix + next +end +config system dns + set primary 10.1.40.10 + set secondary 96.45.45.45 +end +config system replacemsg-image + edit "logo_fnet" + set image-type gif + set image-base64 '' + next + edit "logo_fguard_wf" + set image-type gif + set image-base64 '' + next + edit "logo_v3_fguard_app" + set image-base64 '' + next + edit "logo_fw_auth" + set image-base64 "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" + next + edit "logo_v2_fnet" + set image-base64 "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" + next + edit "logo_v2_fguard_wf" + set image-base64 "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" + next + edit "logo_v2_fguard_app" + set image-base64 "iVBORw0KGgoAAAANSUhEUgAAAewAAABSCAIAAAAZ/3CGAAAAGXRFWHRTb2Z0d2FyZQBBZG9iZSBJbWFnZVJlYWR5ccllPAAAA4ZpVFh0WE1MOmNvbS5hZG9iZS54bXAAAAAAADw/eHBhY2tldCBiZWdpbj0i77u/IiBpZD0iVzVNME1wQ2VoaUh6cmVTek5UY3prYzlkIj8+IDx4OnhtcG1ldGEgeG1sbnM6eD0iYWRvYmU6bnM6bWV0YS8iIHg6eG1wdGs9IkFkb2JlIFhNUCBDb3JlIDUuNi1jMDE0IDc5LjE1Njc5NywgMjAxNC8wOC8yMC0wOTo1MzowMiAgICAgICAgIj4gPHJkZjpSREYgeG1sbnM6cmRmPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5LzAyLzIyLXJkZi1zeW50YXgtbnMjIj4gPHJkZjpEZXNjcmlwdGlvbiByZGY6YWJvdXQ9IiIgeG1sbnM6eG1wTU09Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC9tbS8iIHhtbG5zOnN0UmVmPSJodHRwOi8vbnMuYWRvYmUuY29tL3hhcC8xLjAvc1R5cGUvUmVzb3VyY2VSZWYjIiB4bWxuczp4bXA9Imh0dHA6Ly9ucy5hZG9iZS5jb20veGFwLzEuMC8iIHhtcE1NOk9yaWdpbmFsRG9jdW1lbnRJRD0ieG1wLmRpZDo1ZjMyNDdkYS0xOGMyLTRmYWUtOGE4ZS1mNDkzMTQwOWM3Y2UiIHhtcE1NOkRvY3VtZW50SUQ9InhtcC5kaWQ6Q0IyNjY5QjU0OTBFMTFFNThFMUNGQ0FBRjMxNDhDMjMiIHhtcE1NOkluc3RhbmNlSUQ9InhtcC5paWQ6Q0IyNjY5QjQ0OTBFMTFFNThFMUNGQ0FBRjMxNDhDMjMiIHhtcDpDcmVhdG9yVG9vbD0iQWRvYmUgUGhvdG9zaG9wIENDIDIwMTQgKE1hY2ludG9zaCkiPiA8eG1wTU06RGVyaXZlZEZyb20gc3RSZWY6aW5zdGFuY2VJRD0ieG1wLmlpZDo2MDZhZmM2OC02YjBlLTRlNzAtODdiOC1hYTlmZmU5YWMwODkiIHN0UmVmOmRvY3VtZW50SUQ9ImFkb2JlOmRvY2lkOnBob3Rvc2hvcDozZmMwMGU3Zi05MTc1LTExNzgtYjM5MC1hZmEyMzFmOWJmM2EiLz4gPC9yZGY6RGVzY3JpcHRpb24+IDwvcmRmOlJERj4gPC94OnhtcG1ldGE+IDw/eHBhY2tldCBlbmQ9InIiPz746FfVAAA8XElEQVR42uydCZSUxdnvu6d7enaGYVhkVxA3iLiB4oIajRr3iFuiuCQqxtycGDUn8SbHL4nJl5zPJTdXY1zuUTGaxDVuuOGOoKKouIDsi+wwwOwr0/fX/Wceat6e6enZGgbeOpw5L2/XW8tTT/3rX089VRV+7733An7ozhAKhfLy8jIyMrowzZp4aDNaZmZmTk5O12adhhCNRmtra1OpYGuBKlNxqt+jNQc5NDQ01McDz35X8kOLIVxQUOBLofNBQBkOhyORSLdmVBcPmfGQJBrFIEIwGOxxkmxsbATB26xg8lEzHA89sfqph21NQfjuoryP+HsWiJeXl/tS6IjgwuFQPLioTY+qrq7ujuxgZKRM+m3GhIFSJHXvHifVFGcYyUfT7OxsSWwPUUWNVfrLEEjFPeCu4PdZn4n7IUbxsrKy0mydgHczm6aL5ubmJo9J2XquAQH0oaaaQHQ4Eb7V4OrrqlHyxniwB4IvFp+J73GMOz8/3/7LTD9tWcsu3CaHAt/hniB4Qzz0RKCh2FS2k4UHu5GDD1LJR0qE7GO6z8T3iADt3VnrgVrWo7N5xo8WTQdQV6L1aKpITfmbk5PTmXTg4Ihi9zaCdx9Jl+3FB/SeCuIVFRW+FMwcARBoMs7UPv2dir6UYnOIdQLiPZR9B5pstUw1OilqhIA0fLNvJxtimxN8NO9hIJ6c6+1RQTzO1gPd9SI9uG8S/5v4SbvmuVVVVTy02RxgFoPNbmD2Rc5MOCLx0EkOjkB87e1CJmHrov64uIcycWt4e3BxcA8fIRIFovlsipRT7Bv2akNIT5SqCHjnVxdkTZIMfUNK1xJzgvzTe6KPk8/EOwvf22dnjY2byqpLKmuK87P7FmSHMjI81NUPHQua6npwP1GkiRDf4lwhyTSimwaJzruBW6nkle+rU3qIuW9j2c2ZuMG3lkoqahsqG4P7DBt+8F79V61bv3jFyvxQND8rnBEPOwvKQY28vDy3nG7wF3baNYdo8blNcxNYIC/mznNwTUrS6Sy0J+O4ll7M99wPu1YPnTt3bucnX4Em76XNFTWltdsG7bXXyKGD15eUlFVUjhgyCGhcvmrtug3ri3Iye+dlh0OhdEK51gC7nE6q4ob+/paKdA4qLhtIZQ7hG/S6JPhQvvswcXebr/Crqq6hvHZbKCt3yMCBhwwakJsdoa9MfXY2c7DB/fs2RgOD+vUdOnDA2o2blq9dH9pWm58Vys4MqzcGOrEemJysZcVDoPudu10LdYviqqqqqq+v97VtZ00gWnzT2kwi0LqVqQPDxu40criU3J+29hgm7lmlNL5JG9bUbausrausbQiGI8V9eg8e0Le4sFdediSUEaSR6xsaN24pra6py8/Nqa1vqK9vqGtoQJtzcrLqauvXbSrZWro1MxjNy8rMzcrMCoeEg+aa3RnqBPXupNNxFxJ2xg9/aWhPGCFSGSqSoH/HhoT0Dw+ad5qV3KfkuzoTd00lmyrrG2PYHW0MBGMbK7Kze+XlDyjO61NYkJ0ViYRDOZHMUDgUzsiIRYkN2o3LV6+bv2TZyGFD9x48UAnW1taVVVTR+MW9C4cP2osEt5aVl1VUri+tqq+tbdzWEI4vfzIMFOdmGklPUVMjkYhtTO/k+RudV/ROHsLnB3+E6MDY0OZcoV0Wp9aIlPZnKfh8fJcA8STeKQJxzZ6qyhvGfWs0bRYKZUQbQfZoRjADtM0MZYC8IWdzY2V1zcdfLVz63rR+M/4zeH5VzYG5M44+s89hpw4d2N/4aXlFVU1NbSSSCU/vV1SoA+cYIaDsaMXHX84blJWlQzDaBPGdcp5JkpDiZks/+GFXm0OkaIMi6IwafxGoBzBxmzcBTBnB7Pr6huWr18K1CwvyYN/ZkUhG5o4N3yD94m/WfL1wUf2MxwrmfjJyeXDf/N4FxX3KVtctfvDZqhnPLTjs6LqDz+pXXJyXu8PWsS1meIltOIwGoqVllfwtLCiAjm/evFlbWkLxVdAWta2AmPGf0r+7MjHExrmqKt9y4gc/+CHdIJ7k7BRAvL6+vqamJraxuwGcDSxdtWbdps0TDz8YEBdV37SldMPmLWvXrsn4/OXeCz7N/WJL/2D+kNy+2UXbtxT2yowc1qd/1fqGlU/N3vzCmw2HDl524PHRfcZDwPv1KcoMb49WsrXsuTdnjhg6aOIRh4hfRyKR7OxsxnwPiO9qZ/UhIi2ctnnKoB86QBulCdKBaPMQcLzm3Zc+PfTDntVNZs6cmYRdQnIhmLD1aOHAMfuNXLpyNcS5MD9v9YaNjZtW5n4zJ2/D8vDSVaGVjX1Cuf2ycwojyTZA07c21VRvqKkqj1RHRxVU7z2yauCBjcMOyy8sGj5kwOp1JXD8Qf37fvzl18HStfn5+cCiHWayqxkotKVNe+X90E1B/kWpr4skb68Wg+se6vuJ+mF3Y+IQcGg4Wh47pSjeESKZ4cL83Iqq6kH3/SJraaBXJFKQmVUY6Z9ZlJJJmo4I0POP58oV9VsXLiuvX1Cx7YnG0VlVv546avjgmrq6aBzrM8NhaDggzl87pU/GCh14pLCznLfA7vjyQMg/A7Kbglo5cR62E8fsQPMLFhLpvz8V8MPOAfEk54kLxIlQWlqak9fPNDO2slHVOLZ4r85knBfO5J+ePy1ZZ3CsXMrKyui9YrupH7UqJ0VdzdWaMb0zAeCurKz0Dd/GYe1AaluCNhe0Fv3PtEkn1LTbyxrIDtKz3bMyptGOih9sCqmUynLXJ0qkXXTeamcbW1JJp7WfEkG/zeBuJLa626/udqc08Bi3SOnPvbUZlVpZDWRFcrWlp/es1EWdjIkDoEjErhxzDrQKZHSpiGKpBa0ajZpHQ8Pz8vI6fN2tmjkR4oUg7WXxutky4Bu+mwYzBngEwhgvIRtr5r863IpfdVC4C3DuUodOQhc2KTWtLjTE9xNoMYY4WU1BlvHWBmapvj5XASiJNnyhQnbIcCqNrqRUHjRfJ/3qcwqchsmB9tTIS5WSkJ3JllLptC+d/qhxxTMb6MxUwMVHvZExU1nrihLLPf3zJKE27aLW0V8JRF5qVjAbcbsPZ93jTqVanZeGliHbK+pkTFxKXFFRAf3M7xOIumjYtXNnx5NJuZCjjKFoc3qWMdUSdnOmiQwJ+Ad0JKIMMkExmDAhn/gerpz8/Hykh84wb9N7wbF7xILOHWQgzI8H3bwhlkCLkyDJCj4UmaZXylANRnTj5i0O2FYkVFqeQtr2xbeFhYX6PBUcF4KTwpZ4oDuRI0UtLi7u1asXD919BbPuU0WMVAR5Sghkqvd6o0rpffKpQJJ5QOJ7stDwqdHC/He1/EN55D5bEA+uqTM9FFVloySV8SCfC5sLSrVoaBRGN812h8VV8I18jHCIaphLdCebXsaPdom6bSYum3gzJh7YQZxNfTL69xM/j5aVR+vqMvoWN6v5phLqGuwVz6sx2rhhY8AlC8Ed6em1NQYPLYL41KlT77zzzuQSufDCC3/96193ksW3eeD1zJkzr7vuOh7uueeeY445JjHCq6+++vrrr7/22mv25r/+678GDBjQYuRdJGzevPnEE0/k4YYbbrj88ssTFUOU4cgjj9x///158/HHHy9dupTejnIfddRRBx54YGspr1ixYlE8hOPLHjbVAy6HDRvWv3//cePGWeSVK1d+8803CxculCoS3/i7p1+pP1fEw0EHHXTYYYfpp08++WTx4sV0CeWVylHs4noUia8uuugindywZMkS6ijQ1Nlb3Sd86gJCAVWnnnoqXYAaTZs2jawp1WmnnUa/4Ne33npLytmFZ6mj9hq9tFsNOdD15FxA1oj3/PPPV3nQZ42OREjPMoBGVk1QGN74O2bMmIMPPpiRzOK8/fbblA0FQz3EytVSXYvjmmsKxDXAi8QIqTqpGKQpJj5p0iTEiwa++OKLaCyJJ2notpm49Cm/OOjaxN2SBvNy8+/47/DBo/Xfqr/+veGTub2m3usmVXb5teHDxub+7MfbB5zPv6q46dfRisoWmHgsm6CZTa3xXNsI/4VwtSkRWhQw6kIi/69//etvf/sbDw8//PC+++4r3QJ99CsPqJfbip9//rnw3RN+97vf8feQQw65+eabBw8evAsa5kpKSrY3XFkZ9fKwAFpk69atGzdulJ1Not6wYQN9RvwoSeLD4wHpPf/884gL1VQi3/ve9/bay7vKMiweGO1QZTon+fbp0ycRiAXfFABFPfPMM92ODZqPHj36ySeflJ2RjpGcPAq/qN369esZaK3njBw58pVXXpFawse7lYEiEMSOeKXz/OWZktsKhNZmQHN0uwv3TOqQH5qbv+eeey5v1qxZA0dBnvrJ8FpYQxB5d20L3YTg5EWV6c6IgjYVw/CEE044gb/r1q37z3/+gz7069cPoZl/alcFSkLimzZtgm1AF3iDcqItKGfn73Sk71BHqmBNz7NYC52r80w8Kmv1dhB3xracq68wBE8xED/nqsur/s89ZhMPNqPiUZkyxcc9KEw5EKKdJ/X9738fNGwhi3AYUNDEs6smufaMWCiYjkI1YwsPurBY/6XP//KXv+QBZQJZaG/1N6gl4P7uu+9+9tlnN9544yOPPMI8fVczedN7DVDoBjrC1+UL4iDu0Tpa+pONWy+B6enTp/ft2xf6xntQoKioCLAeNGjQ3nvvPXHiROikbqS79NJLQUw+mT9//qxZs9Bj4oPXEyZMEKlHgM8++6wm+CiGB8QpD/HpRWPHjhWCP/bYY6TDf6+55hpahMnBnDlzbOabnGfJJE1pR40axZsFCxZotvGtb32LmQFloJpKxMzHrhxsIdQWYNSxPSulifFtPi47uMVULrL1mWGKAqBsMvdbynqw5VzXUOsaTOzWHjemSsh/EaYRO7ElmSY8ufNSfVMkXddH2HKcu/IklUg8M8vk5lnubnFajJKoMCeffDLNynsG2vfff5+ZluZ/xx57LIM9MqHXgwlPPfUUH1JOCmkFSF5Cu2vUszoSaH5wJn/NkmPISwFkKkwC4sorce3dLQkPiazazESdZ+Ku7QTuvEPWkVO+3QGk4KsdIB7YgeJRByYklMQ7JKviwTowshCguOeDo3Mys3YVtJEjXE/PDI9DhgxBg5HP0KFDBdY8xNx44mdvzZ07Vy8hkueddx4NgJwpJAUDZdA2ZIsKrlq16oEHHoCt71KL6WiYTS8QIJXydD/XbGeqwn9jByqUl7sLPnQqBlGoqwzcCPD+++//7W9/q4kIjAnKz6RYCA528ytTE0Y1dJqsYdCTJ0/eZ599+BUknTdvHm0qOEssD+WkUfjvF198MWPGDJTn008/5RnwZRyl/5Mg5UlOXakI6ADPov8z0vCGwYAuROOC6R9//DEDkkY1zRFtCddgWp1TXVqDuqmxFqxEYM26qvLokjnFJ03ZfF3d05LDo48+SiIkSI140IKNTe15IEFti7fUxIFkUBbnUBk0VNjSMYlrWsn4bb2GaHAOvqUReZ46dSq1ILJyV47qjJRWNmJbiVUBbElWVgIbP4zCW90VEp3KJGcKtnr16jFjxgjBKSQdh/i9e/em5ESgN82ePfv666+nA/Jyv/32W7JkCT+JY0lErZVQd7SqhAR37FQDyRCnmCTCbICea9NQdBjVjd2jUFEh1utZcpDLnLs63VpJ+AlNju3LafqcZ96ggUn0NlUmHg26Zq9mmFP1t/ubQcC8BY0lmyv/eFuzlli/oWH2HM9Ld1QwK3ucIQSy47US10i0h1BV68b9+/c//PDDE48tFIJoGcoaozNzT3cbCInTjdU/KYAMCDwA0GJGgJFinnLKKRBP2AEklMi0HE2CEjD1Q+1kovnxj38MzO1SIG7DPsLXuqIbgZdUGZlbf+NBMyd0xl4iCuo+fPhwODWKJF1cvHgxGs8bDXtLly7VM2HhwoUkwn8HDhzIA52E3rho0SKBOEC/YsUKUvCs5hk3ND0xFHO9WYy6JpmWGr7Qx0aP3j65fO+99ygSRaVUDMlyUhLWiOIwPMiXwPV+07UViA6VMB8SGWrsXOLYeUFNjEw3lqAG6lqem49UHeFsoGkPlMYGnfegIcpdaiM1Wk2ioLQaQmgCYqoABuKKKbGQgsuQSFyrxPpVbNH1F1JlVQA3WXmXqeSi+TL0y51JdbQjtIiMoKRCiZu0VQZV/OijjzbDJiM9LYJ4SZ+qMYSvX78eHD/++OOJwMQXoDdk1DDfWgll2ZeIECN/VUJ5YQkGc+OBBDUgyXHI4EjjomY5sjV51ueljbLpS8KtlUSKatXnWauDSbY6psrE86I7ViIzmq+BN65d36wnVFZFy8rrpr3m7SGQoOYxm4G4axOPtsHE3bmMFnBbq6HgW8+vxcOrr76q/zKvhxEz0Xbjv/nmm7fccgsPL7zwgkwiMoITGdpo0W666Sa9/PnPf/7ll19q+fSPf/wjSE2Lwtd0wO/IkSMBIFQN5iJ7mVRWXhynn366jC2QHWmt5X777bd7CsZsUez17rvvdo2njATPPPPMZ599pjdEgPh/+9vfTvz2Jz/5CdPMDz74ADZHfP2X9xCcd999V9UkXHbZZePHjzeUlAXQM1FQhyR302Me+K9wzR0pEw/Ak8FdwM1fgNuGRoBSLhC0pl4iNMj7gw8+KPsV4tXyfaI5RdP5ZcuWIQH4GoMHwwPEnCYgAiOBVlA1b0syepE7xYOJMz8Q4yP+/PnzzznnHDUoApeyURJiksWpp56qlXbejxs3DqC3FRHIIMWgiYEnFIP4l156KT8tX778kUceOT4eFBkMYtKA2hA5cWlBjjc8XHLJJVrvQhsF1gic0iIZLfS5qVGAvn37MhASjdwZO0mWCQ1TE1s2ICYKTEytUhIZlbZ84bN33HEHD8899xx1ueqqqxhmyJ3/arWTggGdTEyPOOIIUrZVDSr49ddff/XVVzQxjYhgyQiywk9Mj/75z3+eeOKJ9D4Vg89RS9KHBlERzyBNLtBwcgGXhW5UjTKQshie+g7qIXXStxo8yFRtSt3R6tZKqLETCVNf9Ts6IMmedNJJIv4ESkjTKy86vrUy4ac//anMpPREtOLGG2+0atITqSbpk9cbb7whMx1DUWslARw8kzD1NePmnfdOaXTMKTtCwd23NzM7/OVvlY8+Hg3E5orbQZ8BPJCRd/wxuT//iRtzy9HfsYXNaLCZR1RWykxcDljJDxCn8yDoDz/80H35n3i44IILELo+d9GH5r/55ptpmESDuAtJKuH2tYH4er1axVbV9t13X9qbn1w4o6tQQT6Hv/SPB4/BC12Rzd3q6+YogTChu/baa62ECp/Fw/PPP3/bbbcJKN3TwV5++WVGmh2LGTk5qCZo7qbwSDxcccUVnWfigeb3hxhRtTUAVJNnuPl3vhPThMGDB0+ePPmll15COAhc92eSJrmLrZi3kicLuQBSgJkzZ2qB5JprrgFVr7zySsRF/zdwlH96iy698s2QbZ0+JryYN28eYzD0ee3atTwceOCBs2bNkjKYhcTaGnB0Ezw4HigSOC7Gap2TYqCQAJZFBs4Ya0lh2rRpiMXoqsWXn59JUuuKFACAO/LII23ekJgaEIYugbaICPTxLAnIuMcAgM4wHrhrwp65jmujF4sUtec94O75cO94QFyonIGRKTPa5RYYODv33HNnzJgBjsvTQ+7FxlQEYfYJeEeX4SuGKMXUkjVYqfVt/iu9RT60HRHQhyQl1MKP5Klf0RaPUxbgfsABBzADcBHWIyLQ0iYxVPPMM8+0QZoi8RNNwEhG92+tJJKwO4alxMSTWI3FxMmbv7kB1ycwmCHbNXpfm+CKUFkW2rqxheQqvf4kdTXVkazsmHtiIHZMudvtU2fiKmQSvzHKj+DmzJnD8xlnnEFnQ0Z8wswL5vvkk09u3LhR0EayZvW+6667kB2sBE4nIyy6jpTfeecdfgUdIGVM8CERYIQ+4UGmZCbgeoOS0QYUNbHhqRqfaxortkurW+5Kyvqba6EmjrwFbIyBeoNcWiRhSGf8Zyrw+OOPQ/p4Y9+C1wiBQYvIVIfc4aeG4DBNSQZtgzI8/PDDJl4K74E8+ep6mLgIsjvNpBHFZOFBWrFB1AxpZj+BQtLxQIHp06cLxw+PhwULFhCT0YiftIYmrxItHyFPz3RbRJUiMat48cUX6TyMDTfccAO/QjOhjeQiz2sl2JqfInHk/2BL5eAv0iZHHgBxGoupFYCucZQx2OoCYlJZRMcQTnyY6VlnncV71Eb2XLKjvooslyTw/fXXX9ckA/mPGDGCvGB/DD+kj9iNfHkEHjvff9MmLcCSr9CNUgHElIGXkyZNojVJ7eSTT3766afp/7Tj+eefL41CPzWtJE16hPx5SIcJGW9uvfVWUpADFcSWmZ9Zt8yUT400FlJINEr4iNYhfNqCwYlkKdXw4cNB53vvvRdpmzsZQ46oPcMhDUq7a0p63HHHffLJJ1RcI7c1MUWi4cBiwz4aSAYiwwHbgKPPzSZGOckXOE5ewoceeogcycj4NZ/Q4jBruhu698Mf/pAmowBIidn8/fffDy+EcMi885e//IUOS2d3lyXBDWaW9DhAxgxHjHaqRWslue+++5CVax0xv/hkfiJJAF6sqmnHZrDRluChIXTaDWsi0cbOuO9llpagknWwomGBWoODuIth6kz87nhITByMQ2Q8wOyE4GeffTaarXkWYeLEiTQw0nz77bf5K/8k6zbQdpCd9pO9UmUwh3FttaAB+GvaRiNRWsRl+or2yzcjsXgoDc1J02qE0DKs5a6kbHeoDbS8pwwkiIYxBZaphBmfHAz4FbKA6gDugJeIp32LEJj4o3ZIT4IFQfQTvUjIrj4A+oARpBBoul3aUwWNgh4mrjSFswavMhkLeniG8ckuIWsDAkQ+5Ei3BIAoPPNZrWESZAUCcfiQwVLUWEZDG7PFB7XChroyALje9/S0J554gvfqopKz9r8lnkEvUBAZl0sMsEgflg2HKbxS5qdly5ZpD5rrioNAGD5JFpQnR0ZTin3xxRfz07hx4xiWtCJi2cEGAHFQg08QEaMmVAOFYXAdNWoUn8tXxJi4h6bILEsEudXzTAqoJZyOXBgUGcbABRgrkgTZSVbrLvPnzwfWEaZmMP/4xz8mTJhAZM3utSpoDldE4CfaSCOox+ePjJCGUAkezQAm1kLFEcWPfvQjhiWSZTyDQLjXE1IAKjhkyBDSBONodDnsUni+lZnera+2utiUl3zpd9oF42qCFoq1T1iblXimd7RZQpSf9nW9jBjLGXtoDnoTI8ELL7zArFf2NA268heyvtw3HlzXZz6kB4HUkHoZdgAfzb2Sywpy6Ta0FvYS+2AHmTh1rGuMVlVWU/Z+gUBWk3Wl4tr/1awzLFjUYmp1b7zduGq1dw4STycYyNhaXrmlvDozM9wrftp46ky8tcBoBhIR02zZ6ApCRKYkK9LNuAp8CykQMdU0TWUeRNujwfzVZBZBGarynp6mhSNreI0NWoK3GZZr2UQbYD2JRf39738P/6I5LXce+K9RWhuHNSmjamR0++23gzLUBTKoSqGIdFHRc34Cwmh4dwyny4mDa2h89tln9f6ggw4iBbSKl6SP3HgjEO8MEz83HlpsnRUrVjBMylwr5gXVQrNRenCHzgziyMIrKF+5ciXApIU7KiUAVX+meNQUqguCjx8/XnMORHH11VfTTFOmTLnttttgx3/961/lNURMc9rzuIfTQKq7XiJMOf6TC6OIxi0wmgrSyeldRk416pMC/ItMtbo4b9480JM3mnKhb+bPQGAElR+O9nEgN8iEVilQVKrgHlpgW8yttDrDhz6vsQ0SLcDVvAH5kDUgzk9IEpXgv3/+85+poJYuBHBHHXUUwCHrlrxi3P07ZiUT4rsUR57s/BX4BuI72vrEg4whVIfWBJi0MwAiZbrNVwxgmnbIILNq1SqlQ3YIXPcEGEvTjnGPlVxrdeYcacO5fHV0AAMp02rW45KUkKEU4QeajtgjvP/++7LjIQ0ERQkNUuUd5HrRmOeJVketnOSog0O0nml6lVxWr7zyiuvp2JVMPBqI1jZsK62szo5khsNtHJ0SpPJHjW+W1Aezk8WP79lkvlFVUQXliMb9xFNk4hdeeCG66EEZ/kvP0bAsJxCRO3qgfJKoGrpLYzCT0lKJzlswaSBNoASyYDM71MsFcXEo5GvFk3WeTM3VhPIzmMv8LSVrTQJK2Zi+yEgiE5fxl59oEa2W0Jf+9Kc/tWivF2e3b4kP1UVX0B6KCozCfwUZeo9kZHjlPUoDh+0YE0/uLgkcL1myBDIrbqh5sXbW8V/BK3FQejgarUDjyi2E6TbQpsIrvpBX+1BAfCH4G/GAtBmYGQAAyiuvvFLL1BpH7UAVF8SlKlJ162ykYMe5EJjsi4wTYfHixeq3JgEgg4EQTOQv6WhSzIQJENcSLiBukqEYVAEJ8KsaFLnZ8gaRPXtnZMp39UdGarMwkBeDH6lp3oAkGcUfffRRftIedCWIDBEmo13LXr+RiLqbDTa6eoXUkCf6b+WX6BCj+Lv8QMidxKkLOkmjLFy4UJHpRO6sAlQS8eev+XVYsiqDuztERhvgmJgasSiPRRMOiHrLb0Qe5QJ6EqFIKiGf8EwhE0vIS/7r4jJJwWmIrw3b7tZCOR3Js9udKNAWsnrbWAUvAXNoEd5rgG+zJKir+e93PROP0WNns0/I6ad5t/856GRQ9Yc/1X84O//eZiaO0rO+l3nk+Nzf3LwDZSoq6sZu32Ad2u6dEu2ATVyLS7ajQcxX+wCpmhmsJQUa1bbnyLEJqUHNQEMdSWH6hKKoqWxq6WYqF11ZUe0TiUs6au7kRlflTHb//ffTtLYIyUxK2xa0fSlFJi4Ie+aZZxi0XbFcdNFF5PLUU0+ZowUCtG/pjVoVlGxtTybV1OzVuq5QssM2cSMRzIGmTZsGqMnHWSs/6gOiIdppSTm1W0fKKsc13lAMbXb/zW9+Q2QGG56hwESQ664IKYBICoceeqjmH2+99RZwxq9wKya/9BYm1Nq2I3LNGwrpnsEiAiX3cMqgbk+Qp1BiYNIGM5D5xUVbO3vENvWYSDX5c1FYw5WMEiLd1hMRkee4Hg8TVweRfd80ROTa9vJogJHnvvysL774Ynm+W/joo4+otVYjlKZGLDcj0VuXgggxtbXNAMuqo9PH5CwkX1JQzJ2fmaDMXdoURs4byEEmL0tcvtukJhxEk+nXcimxhU0+1F7Hn/3sZ/rwD3/4g0Ghzo5WpvL19pSQXMyD020dVdaFIGKKPltknWkjzLGZt5peCzY6Xyj1krjz+y61iTsuhp5jdupenZ416XvtNYjzVbPdQ+6OzWg7vFPkJy5scjdH6XOrPFIDTdx1Yborn4DgMnXJ6GZ5yertnlnoZioiIIrtYeK8oTwyN9PVoYGy5SFG2/oh1LNOyyci79YWPMhkJuj3MHHKNmPGDCE489BzzjkHIZgtz43pMnGKJxcuKb1NFxIlo31u9lWHbeLGOGSSck8xlOg0I5YNgXDfffdp+4bESL78hQDSRppuQ980MolHyzJLstRFgEJMnmUvosxPPvnk1VdfbasLX375JfFFw93CawTSX6PhSQIyBA3BEZdgqtdphUNjjBwtTHnI18Ov7dhkjXAmZDlLuC5liUzcjjA0ZUYyHvOCXXmhU26E4KD5c889h6BkuyBfA3HlIsF6stZijHV/bRGy6mg3hl5KB2TE16qvph1u3TVaa7HanRJpO67xLauphqIFCxYIxA855BCmVjKIaYFEBFzTU3MNcF1RNZ9WIWUS8ZRQxbD4xMyLB81LXOc3QZOGSYtsDnI2sGkriQz3WgNPvSQi493CxN2tLhnZ1HZ7S1f/zx3hQw8JjdinHdtJli7jqx3anBNydmy2j4lrJdqzOcI6A1VgRkPzf/7555AOtzGIbxNYpu1UUyeguiY214iZIhMnDjmK4M+aNevTTz8VSdQmYDqSPBOIaa7Z+lAPNpuzMcMtlVlvSVb/HT9+PM1M4bU314QgbiJ7or3RVkDbxYDGo1uJkuEnGGvnvVNsyNH8N+BssBbBIWVmlzZN5kMdViWrqE6oAGisY1BaedHaLjvjfabxKpjIB7zskUcemTJlin6dPXu2fuWvOx3WWjR5kbKdnHXDDTfQXuC1AIifNm7cePLJJ8vnhCb+6quvZH0yP7m5c+fKD0SnnRBk6LTB1SRDsuQO0GgXCbnzPHToUDO2yMqUhImrn5vrERJj1iLWIsfqAw44QC7PMAkoBZxAMZnAzZs3T2uVHsOXNqEI9C0X7Q8yum0SUydFwlScoZri8axtEHzClEgWefnCenqx9IfS1sSDicXOs3S3bsnSRWmZh02YMIGvRo8e/fzzz69YsYICyCLHAxKmx51xxhm2bK4ya1mCQAkpFVVA1VEtt4TEEbNJLIk88T0++55i8ywU1f5Vl/bJpKMzIOWlmrwk8mJyl1hTYuLJ/cRFK2LLBQ31AbfJB/dqnF+int24qaT09HNCo0Zu78/rNqAOpWc14+aNS5fXrttQ/+F2y/i2RUsCBpex1AodRhOk1fLiPFq7pBLR2b0pQg6hLQ5TOidILmvaPy33Zzkn8OtLL72kmKiFbNBGN+SY7DJxN1P9qsmsa8jmJRWB8MKO77kndqjAnXfeee+990J1bT+CIj/00EP0OvdDNym6jZv7119/bbAoq4gp0KhRoyAmMvRrd5LraU5ka3503Ty+xcRPOukkrfqCPnILMR95c1xJ0U9cHCqRiRcXFyMNICPxJEiZs+nwCxcu1BrmxIkT//3vf5O4SJZ2mYGD2kyvzkYfsH3k5lSrrTEoDDMqEUzzP7P9L4RTTz31wQcf1KqjCKYZ1j3u4QA0OMtwS3uJCZIFMzMb9ceNG4fo3K1DjKbvvPOOwJostEAq5sgYSYPSRi7DRfgIWbCrU8YuuugiWzbQtNrl3SibYauxPFSIdJT7nDlzSkpKtLJHanZE1LJly9xVwQ0bNogG6gh4820XbddsycMYCBoyrZOigTrdl0FXZnGKQfWVsmp0wQUX2CI2YnTRzXyfpTauFmn6qBVF68V2KvWHH34oz2s68sMPP4y0pSpalAYKzVeHWRcF4xO0S61A67/xxhuaxnlKiMBRVG2L8ZSE+LZh1XZXyPzokgDbfpno4q0JPa1JSWSpS1ISZEVJXPOLTU06vmNT40DMjpNRGQoGoD1bSkuHDxzQMPaw6unT84I7om6b93Uzrt38vxpTtjVN9pvx5Wig4eBDtzVGv1m7viA/r7ggr4Ghb1uNbEmCDM+2OmiLe3ZKku1MVAGApjmhCeApjTp58mRkTW+cOnWq3DPAr7Fjx8oe51qlPfdn2v0Ach+G5mjDsecTWRXowGeffTZ8Aco8adKk66+//rTTTlM07ex64IEH3BFbedlaPwMA0Cwv1HfffVcbRM2XWasutn9nzJgxNDyVmjZtmu3lATjMrucOaaaOZIpkXnvtNV7eeuutaKSm1XAB2CtkLcmOTW0d9hBDsUWXcNnRpqTQ4kgs0c2cOZMmEMO68sorP/roI5FccgGJjjvuOHMYENCIEspuqOUs/n722We0CJK/5JJLnnjiCeCenn/ZZZchnB3EY/BgsIaYOhTJlqzlQk4w90T6EuMuw48MQWSkAXX58uXiU1okRH9cK8FVV1315ptvIjpewuhPOeUUMz1rdHdBXNti6cw6/e7CCy9UsjQcY6qWIl1bjeemJB3ChYiYXpAUoI/onnvuOTST9+edd57IHcCBKKgCXUZ+k8jkqaeeYoyh7oyazC0MLEQw3ZYiWYrB2OAx0+vYLGIyY9P+z2OPPZYUYEU6LOEHP/iBZiH0Oxi07AbuVE9LVhpyElXLtYnbuVSkjyQhH0xtkdW11177ySefvPXWW3J/RFXMLkQxdPIdOoYwxXJoL1Iw72y3hKiEtpW6em5K7ln50MzAbUr0ipFSzMmVkqopzk4hKYn8HZOUhJHYHa1dV5wO7tiUr9L2Mx9qq+rqY+yGuWhNbd3mwyZnF76aW9bZG34oV23vxi1HXFFdVVsaX6itLewVra/Ozc+VKVPmNsMdOT+4JjOtT7Y2TCFWtPnSSy99/PHHQc//Gw9uBHg6Gj9gwAARJQ+t9jBxHeJBuCMeSPZXv/pV4ifafX7CCScg28cee4zp5E3x4CkbzAttk5FXX6EN5557roaWa665xmKSkTwN5PJFfPotkE2N6MM2jCsMGzYMZgExoX+Svhm7EWO/eLDDPRgzgDwd8/LbeLBE6JlffPFFa0ycAuhgOas7vVQbpsVw3Zdy6U0EcaStZX3whVGNiTAxR8RDYjtSTfoAlJzhynVd0EQ7ED83HMJF3SHjN998s/stfO3pp5+++uqrA/HDN0STZaQ2NwCkwbho634gNUmBFJqty26j2RvkV2gLNNAPLRdG6wMOOGBSPLi5QwkZF7Wa6jo5MC+kMGa9MeCYPn06WVMp0FxjDH8Ro6aJ9oYBRuvnpA/PpSmFa25qkG4GSJSKOoIyYB8S5r+29Gfy0TozDIDcEY5OPSMy77Xr54UXXmA6aLLivRxS0V70UG2njVoeR1KmhpKqu1rD56gln8i+Z8SCMkhhPIf9InbtyKUJPvjgA4oHDhLzpHjwGPqY34iVoydqa+ZM9HGSPSIeEkuIwOWCklgSnbxkE2j5cfJfrYTr5RnxQCuTkRnl3WpqKYi/bZaEYiNkO9HaEiHZJJvS275jU/4xVVtLyyr3Hj5wr/qY+1SoKhDZds0plbdNz+/c8XuMLw1TvlsfzMrLzRy9376hYLCssqqufEt9Vh9j4vLWcoc+9yja5Eycr9A2wBeeghYy+6O36yf0gMYbNWqU3CdkBUvCxBEFVNE9REVTocRPyBS5MzBAA2+55Ra6PYQIEqFovIeka38X5Ah40oc6UwVGw19eAsREJoXvfve7fCIQtyNK0OnLL7+cDmy+3sSEWKF5KBNUS0Y6GSVcs7WMDJojo+V0sClTpgCjlk4gfkAHOQrEW2Ticrxzp962yOZZHbIGSjyA227eoC70OsYScboJEyZYHPoJ4LhgwQJiUjU57cqibZWyC1AYCZDn/vvvb1jM51CbV199lbyAIZmzkRJ8GY3iJR/Kh4T/AsH6atGiRaogfUkuBHLz0NK07aoFNLXaYVNyBuzTTz/dDq5BqpBQiDCAKwOUO025++67+QQct12CaIhmCdqRqzVb0V5bRfe8kVTffvttFAwcN5sYWaPqtCCIowGYWjCSoe02s6F2jIt0B3T14osvFn5pvYEyMEU78sgjrWzyy7Tc5R8lH1YERcXhmBRAp1FqykKr6TwQzSoMg8TiRTDVi0031BxaXPFsbpLBmnwRzueff06zHhIPxlGgsXRwIJ438kNVXmgXCaJdiWenuCXUam2LJXEvF1M0nWnFlIsH21hvi3OJ1ZRRWrtek5dEllJX1EqEdkmyMyaovtoaAmrWQx+Lebn26r/PiJFl1bWZ4Zg1rTAna+hdP8x+e2ukozBeFw3UfLtoxXUP1DXEXFLq6uozQ8Hly5Zl1mylhlQJFZGlyfMh0Em1ddQkigt3S2TiUnS+pSVoYCTFrBBlsrPf5FNIB9PGNt5TUzowKWvPHkrpMnFEwWjJr0ADkUVq0Foko2VA9xOtlcHBgVTBqB1lZwfRkQhJEXNUPMhplOkwRRXJFbEVclF4KjJ06FAUF8ls3LiRokIYdTSo1uil6Gpyeb8CTLyhr1JIvqWnyY9Yc3PQEIihUuQr7bTDrOUPwH8htiic55BFXW6i019lv5MBUQrHe3uJlHjf2lU4QkbNW/lKh2rJec40WBMynXEmgbhetOaArxR0lp5c4szwrZ6pWmu7nbie7voRXCJwOXpKQxTBvYlNK0OiqDq2UJ+AwjKUvfzyy++//z6EwBx7hHGF8UAWNAHKYxMy6DATC5lrZNglOzIlss7LRRp2PZtKogFMb+QCK0tCWTzIOqE5lvYZ9IoHobNMRoqmcwvMlUUeUMpF8bWQqwt05AEiWNG4QuJE04E20hNdiSf/ELm0adFIvhmqoHxJBYgSr83n1GpaNFK9EvfT2vVssi3oSEJlJ0cRu8lPwXqE1s9VcRk/Fd8tobxNtIPJUxIBiCSswhNfAxIxpTOCXS2S2SFrVk35veh9myWRTNymVyMmntyZKhM3Dw3ZOstWLS3qNyA/N7c+DkPV9Q0lP7mr/+orMhZtC7cfxxuigfr9wxum3FVRWx8JxcoXDmVsQRnWf1PUK19ns8nXKrH/67AUnVLtWTcPNN3YYLsl+QlpgtQIQjvW5PhRFA/AN7KTg63e65gFOVp4kIuY8C9ZvuxCXpUk8RPdSoF+gL80thROLEZ7QeWWp+3gWg8kaKuILs0xjRcS6ShXlZMPgQBeai1Li64a9vgvL4XjKp5OAtIamnugrpY3AXeyE+sU9IjzyjYn//HEY0aEs7YDXiYUUUX3peiM1hJbtqfFUVhmIuGFdtxJvw1BtLoogbd4MqIKo25gl+dqnc1AXGU2kmU2UFk5xUDNTdBD+c0ySy4CIK3KehTPvPTcLUU29XHtv0JM2aDsxGrdP6dRSmOAHTltV7/aEbImOtnidH+be5642/NlFpPnnB3gZScHmLjE7kU4NCRLYnbdh12UarsTeRZSy1FaSu4eqaqTRDVKaRuUlpHtGF7r47qoSNt/WlQY0RS1lO7Jk5u5DdjSPTuq26omPieVNtC3EupliyXRgqqErMKbC6ZEqph2eIaCJnmqZrtKYlRDMy1hgiXSEZu4aJ2dZd7QsHHN8sUj9h+DLm3fJxbKz771rsJfXBf8JhBqD45viwbq9snY9Lu/r68NZoS295Ka2nrSDwejIqEaf1q8tk7sDBSz2+1sLo8sEptf46oO/pbs1EnksGwTN4GFpoR2r65nXyWQymxdXUVrmPKzbvETZAuwwojdqwCkfGoz8uK90tGHZKGlfPUQImtNjMrKx1l6o6GbfLXOqR4oCHD5mq7U4a/UMdHVB7GQHVMKpWN+JiIgJCWfEw8LcC/8tstZpMdyJlP/tFuS27yzyr1k3XPVunvnS5K9oIIDS8Hgxr1Yx66zcS9SSayLXbbiydG9kwVE1nm5tt1Gu3N1TJI6sHthjfVzS41oNB8KoDYyn3H3Ih63Ioa2dh2MCVbQJjhLvNlHVbDCu9W0ZO3uAru/xtMQdv2NHix384fT8rL2LqmyLd7s45G/5z6dVK6N99wp4Umzxc+thKnf7GMlaa3wtmXJvZ/InSC61bT3KZbEve4uFeVPxsTtEnENBTEP1lXL1vTqM6zJoZXCb80bGrzz//X+zZTAwm2hFDk4/w4Mb/rdvcsrGPeiAnEaf83aNaRfVNTbTjXSXtjWSq9JjfaMCNfcPXItWI7iiO9ZH/BsjUNeZplp8ZJ7N4JYhrtNo8VPWsxXHMfc2z0fumYc1dFS0BmkrtegZxnD/VyKIvgQ/WztAkzXiUrtbmVLIlJXLAYWZtC0Azfcy8PadTVHmyfkJB8YuvD+SS8LaRrwbMw2QJRBI+AcxKGpt8cNQ9YJ3XLnvlSwwc+9FSyxAC02hImuNem5mJLIc5NAp7Vpa7kb1rj+FWkIauvUtaU7dKNjt4x2SUmSMXG1nA58MePghsVfZOfm9etTFAirowYq8gZn3Pl47zuuanxra5uHGtK20ZP6rL/u7kWbazMC2+cIjBIbSjaTMgjet29fHdOu5fjkQ5A5fQf80IpiiZJ34W3RicHmkqlcMueeLW67Ct0brXpE0BRbp3HpDQ/a+CqrRaKWir/bG636yAKeSo62O9R4mWG9hZ0rE89Vn4FAoAc1aI8OwVmzZiVvGNckv3nz5i1bttRFg/sfMbG4qFf8pIvYwVExg1dmuM9Tvwj+fU44EAi24k3YEAxErxu36MT/vXz9pnAoIzMUih2mFYiWbC1b8PG7kWC0qKhICK7LzxIv3POQRx++k42XcReLbr2GPNB0hFviXp4OUBIjJi4W7JrgbttfdZif5oWmt4lKqxU5rY95Fqy6anz1UHjP3b5po8PbmoLHsd0P3QjiSbxT3EVhbdkAwYXj9dGMEYdO6FPYq3fvXlnxlZyYPTozVLjwpcjvbwt+E/XQgpj3ydCMmltuml9w+OqNsZPkYi4uMZAOlpZXLP30/cxgoxCcv3aBSyr8QrZgvyE9rSarS3f3Iq1xJVk37ypkN+buHgmycyVsRziZZay16yYCTctLWpi1Qz8S75Psxn7ePHgofJeweLeNfBBPK4jrpNY2Z0lyU5FblUJjRnjUEcf16V3Ur7h3Tk62Fs/DGRm50cqCqTdEH52f0dBk5s+MBiePWX/Bfy9aV1ZeXVPfEDMaZoHiwYytZaWLPp6R0djQuynIk0zLxO3Vb1nGfROKXC+6uwvJmSHJokW3YqjdMuMJaQMO1xYUaDoWpjXa667ctrbqtdMgoMklOZG/txfibcnRFrd9hN35TNxtGHnjMh8EweHjMW/Z+oahY8b17duvX3FRUe/CmPEjmIFiQ0V6lS/NffJPgZlLA8eMrJj0q5WBvhu3lNbXN9Q1NADikcxwRuzilU3ffPlRdmZYPhLamCRTuOhMZ/S7NU+V3ZuA21Go3Z2XHYS/60g4kba7f/2u3kmIb43CJyqAHc7uiz09Idkphok4bnsodAIZc8OFH7xVvt+YuhH7VVbVDBrYLyszZhutadhWGRkcnnxP6PJgZXVNeUVVbcOOU7iywmFaeOXShWsXfpmbC+nO1bxS7kryhOkShlJaWmqA7t7at1sGiU47CLq7V8vXpUdMls1jLJG2++DetVYa4++ucdwXUTpAPMnhWJ7OICceO9JED7HVzhULK7dsGj768Iqq6oH9i/v03r67b+XaDW++P/uYw8YWFmzPojF+VnhlddWKr+bUlm0uLu6jLWqyopCaDtPoDn5nm7y1xWY3A3QR8O72Qgk0+c8mXvnYE2ctrdH2nuUn4wc/hNetW5e60tudFNobYoc5bFm3asPqlcMOGFtbf8CGki39iovyc7Mzw6FRQwdHMsN8WVdfX11TW9+wbfXir1d+PTczlKE9LMJWre9rw6TgNT2TdDl9d9+6XHrASAccp4FUandZ4h6o3cwkZcHdfNTjnCD9sAfNh+wsrhT1Wziug7HkMqVjPHX2RUMgo2jwiF5994qZpLMy46fmN9TVx+wwZZvWbVm9NBxo1FHIOlNCjlYeDr6zzKw7ZY2u84iTNpvAzm2dXYS8uyw+4LtC+2FXYOLt2ltlJEU+UjLF2FI7KFxRUVGybF7JN4sL+g7KLx4Qycmtq66qKFlfvmlNoKEufkJN7EQkYbdONZKHgxGfnYgRrihS3LqyczElDS4oZkWRrXOPRfBULDOBhJ2NfvBDOkC8vdZh21ct1LbTW8xWrrPoqjetKl+3XN0+duxOVlZO7166okLndZkRXNfMp9OKkkpw6W3yPUc7ccqfHl7s+iT4HaaTnN0Hdz90PYi3eNxHKmoqmBMlt5NcbP+eNkHYAWM6blEgrovQ7OQp17beA+Tl3EW7s0YX93ycNCC4HcHj95bOw7o7Bnue/eCHDoJShyHJ7CqReLBbmauqqnTQkgvi2c6dmTpsT9t5dpH9Du2qtZ2zk3h0fRoQ3G5VTyeC+/0kPbTdt8n4oSMg3pnzxkzV5HamebcgW4dSmjlFZFxBZNZ8z3suxXNF5zlotDu6untcahqChth2HTrohy4cPm16Gm0efHD3Q6J5oLPQY+ep6/4kwbedwR9wTrkz8/cucu5a1wa3vl3LlM3JPW3E3z2J2w+7IHNP5Ow+su+5IO455riTUB5octTTQfgup7NDlneuC0qagwawztTXzoRLZ5n14HPwnoLpnm7oG9x9Jt4FNMEe3LMXAruS/0n6Gbpub2nXcUK2yzRtpNgdcf2wGyB7a5zdB/fdB8RTOTvFD93BdpMfQ2qnCKWtSLak4SP4bg/uiVdz+GaZHgzi3X3ahh+SwLQRbRc6bRdPOgm4XfPo+4P7yJ5okPGRfZcG8TTfhueHFoN56wu40+mFEnBcCX0juB9MJWw3WSKg++C+a4F4jz7+aXcN6XQ/t11aPgH3Q3uZe4v4HvAN7mkG8dauP/fDnhBkQvF7nR+6CtldIu+e3u6LqBtB3L+gck9GcLm0+xzcD92E7O4mNZ8odBeI6yxvP+yBCJ6ZmWlejH7wQ3cEY+I+jncjiOfk5PhS2AMRfKef5OWHPYSMe26U9nHcZ+J+6GywY17sJC8/+KH7QNxjHPdBvOtBPDc315fCHhLs+g7/aFk/pA3EA02nb/og3l0gXlVV5Uthz2rycDgSifgg7oe0BTOL+54q3dKjfZv4HjvJDTSZVvx99n7oVibuWlR8Ju4zcT90I0PPzMz0Vzv90LVcwbeJp6Hn+js2/bA91MdDoOl8Lh/Q/dB5EDf7iV237Uumi0F8yZIlvhT8kCSA5jk5OZFIxBeFH9oL4rofBmZgfuI+iHc9iA8ZMsSXgh9SDGLo/uzNDymCuNYztaTpw3d3gbjvJ+6HDgO6Lrz2ReEHD3a7CG5/fRDvLhAvKCjwpeCHDgdZPLWJ32fofjAc93ik+J6F3Qji5eXlvhT80IUBQBdD913R99hx3RDcfMN9Gu4zcT/0SC4Gjouh+4C+R4G4S8D9xczuDv9fgAEA1RuxUIoWvOsAAAAASUVORK5CYII=" + next +end +config system replacemsg mail "partial" +end +config system replacemsg http "url-block" +end +config system replacemsg http "urlfilter-err" +end +config system replacemsg http "infcache-block" +end +config system replacemsg http "http-contenttypeblock" +end +config system replacemsg http "https-invalid-cert-block" +end +config system replacemsg http "https-untrusted-cert-block" +end +config system replacemsg http "https-blocklisted-cert-block" +end +config system replacemsg http "switching-protocols-block" +end +config system replacemsg http "http-antiphish-block" +end +config system replacemsg http "videofilter-block" +end +config system replacemsg webproxy "deny" +end +config system replacemsg webproxy "user-limit" +end +config system replacemsg webproxy "auth-challenge" +end +config system replacemsg webproxy "auth-login-fail" +end +config system replacemsg webproxy "auth-group-info-fail" +end +config system replacemsg webproxy "http-err" +end +config system replacemsg webproxy "auth-ip-blackout" +end +config system replacemsg webproxy "ztna-block" +end +config system replacemsg ftp "ftp-explicit-banner" +end +config system replacemsg fortiguard-wf "ftgd-block" +end +config system replacemsg fortiguard-wf "ftgd-ovrd" +end +config system replacemsg fortiguard-wf "ftgd-quota" +end +config system replacemsg fortiguard-wf "ftgd-warning" +end +config system replacemsg spam "ipblocklist" +end +config system replacemsg spam "smtp-spam-dnsbl" +end +config system replacemsg spam "smtp-spam-feip" +end +config system replacemsg spam "smtp-spam-helo" +end +config system replacemsg spam "smtp-spam-emailblock" +end +config system replacemsg spam "smtp-spam-mimeheader" +end +config system replacemsg spam "reversedns" +end +config system replacemsg spam "smtp-spam-ase" +end +config system replacemsg spam "submit" +end +config system replacemsg alertmail "alertmail-virus" +end +config system replacemsg alertmail "alertmail-block" +end +config system replacemsg alertmail "alertmail-nids-event" +end +config system replacemsg alertmail "alertmail-crit-event" +end +config system replacemsg alertmail "alertmail-disk-full" +end +config system replacemsg admin "pre_admin-disclaimer-text" +end +config system replacemsg admin "post_admin-disclaimer-text" +end +config system replacemsg auth "auth-disclaimer-page-1" +end +config system replacemsg auth "auth-disclaimer-page-2" +end +config system replacemsg auth "auth-disclaimer-page-3" +end +config system replacemsg auth "auth-proxy-reject-page" +end +config system replacemsg auth "auth-reject-page" +end +config system replacemsg auth "auth-login-page" +end +config system replacemsg auth "auth-login-failed-page" +end +config system replacemsg auth "auth-token-login-page" +end +config system replacemsg auth "auth-token-login-failed-page" +end +config system replacemsg auth "auth-success-msg" +end +config system replacemsg auth "auth-challenge-page" +end +config system replacemsg auth "auth-keepalive-page" +end +config system replacemsg auth "auth-portal-page" +end +config system replacemsg auth "auth-password-page" +end +config system replacemsg auth "auth-fortitoken-page" +end +config system replacemsg auth "auth-next-fortitoken-page" +end +config system replacemsg auth "auth-email-token-page" +end +config system replacemsg auth "auth-sms-token-page" +end +config system replacemsg auth "auth-email-harvesting-page" +end +config system replacemsg auth "auth-email-failed-page" +end +config system replacemsg auth "auth-cert-passwd-page" +end +config system replacemsg auth "auth-guest-print-page" +end +config system replacemsg auth "auth-guest-email-page" +end +config system replacemsg auth "auth-success-page" +end +config system replacemsg auth "auth-block-notification-page" +end +config system replacemsg auth "auth-quarantine-page" +end +config system replacemsg auth "auth-qtn-reject-page" +end +config system replacemsg auth "auth-saml-page" +end +config system replacemsg sslvpn "sslvpn-login" +end +config system replacemsg sslvpn "sslvpn-header" +end +config system replacemsg sslvpn "sslvpn-limit" +end +config system replacemsg sslvpn "hostcheck-error" +end +config system replacemsg sslvpn "sslvpn-provision-user" +end +config system replacemsg sslvpn "sslvpn-provision-user-sms" +end +config system replacemsg nac-quar "nac-quar-virus" +end +config system replacemsg nac-quar "nac-quar-dos" +end +config system replacemsg nac-quar "nac-quar-ips" +end +config system replacemsg nac-quar "nac-quar-dlp" +end +config system replacemsg nac-quar "nac-quar-admin" +end +config system replacemsg nac-quar "nac-quar-app" +end +config system replacemsg traffic-quota "per-ip-shaper-block" +end +config system replacemsg utm "virus-html" +end +config system replacemsg utm "client-virus-html" +end +config system replacemsg utm "virus-text" +end +config system replacemsg utm "dlp-html" +end +config system replacemsg utm "dlp-text" +end +config system replacemsg utm "appblk-html" +end +config system replacemsg utm "ipsblk-html" +end +config system replacemsg utm "ipsfail-html" +end +config system replacemsg utm "exe-text" +end +config system replacemsg utm "waf-html" +end +config system replacemsg utm "outbreak-prevention-html" +end +config system replacemsg utm "outbreak-prevention-text" +end +config system replacemsg utm "external-blocklist-html" +end +config system replacemsg utm "external-blocklist-text" +end +config system replacemsg utm "ems-threat-feed-html" +end +config system replacemsg utm "ems-threat-feed-text" +end +config system replacemsg utm "file-filter-html" +end +config system replacemsg utm "file-filter-text" +end +config system replacemsg utm "file-size-text" +end +config system replacemsg utm "transfer-size-text" +end +config system replacemsg utm "internal-error-text" +end +config system replacemsg utm "archive-block-html" +end +config system replacemsg utm "archive-block-text" +end +config system replacemsg utm "file-av-fail-text" +end +config system replacemsg utm "transfer-av-fail-text" +end +config system replacemsg utm "banned-word-html" +end +config system replacemsg utm "banned-word-text" +end +config system replacemsg utm "block-html" +end +config system replacemsg utm "block-text" +end +config system replacemsg utm "decompress-limit-text" +end +config system replacemsg utm "dlp-subject-text" +end +config system replacemsg utm "file-size-html" +end +config system replacemsg utm "client-file-size-html" +end +config system replacemsg icap "icap-req-resp" +end +config system replacemsg automation "automation-email" +end +config system snmp sysinfo +end +config system central-management + set type fortiguard +end +config system resource-limits + set log-disk-quota 703406 +end +config system vdom-property + edit "root" + set description "property limits for vdom root" + set snmp-index 1 + next + edit "Policy" + set description "property limits for vdom Policy" + set snmp-index 4 + next + edit "TEST" + set description "property limits for vdom TEST" + set snmp-index 3 + next + edit "scsd" + set description "property limits for vdom scsd" + set snmp-index 2 + next +end +config system cluster-sync +end +config system fortiguard + set fortiguard-anycast disable + set protocol udp + set port 53 + set update-server-location usa + set sdns-server-ip "208.91.112.220" "173.243.140.53" "210.7.96.53" +end +config system email-server + set server "notification.fortinet.net" + set port 465 + set security smtps +end +config system session-helper + edit 1 + set name pptp + set protocol 6 + set port 1723 + next + edit 2 + set name h323 + set protocol 6 + set port 1720 + next + edit 3 + set name ras + set protocol 17 + set port 1719 + next + edit 4 + set name tns + set protocol 6 + set port 1521 + next + edit 5 + set name tftp + set protocol 17 + set port 69 + next + edit 6 + set name rtsp + set protocol 6 + set port 554 + next + edit 7 + set name rtsp + set protocol 6 + set port 7070 + next + edit 8 + set name rtsp + set protocol 6 + set port 8554 + next + edit 9 + set name ftp + set protocol 6 + set port 21 + next + edit 10 + set name mms + set protocol 6 + set port 1863 + next + edit 11 + set name pmap + set protocol 6 + set port 111 + next + edit 12 + set name pmap + set protocol 17 + set port 111 + next + edit 14 + set name dns-udp + set protocol 17 + set port 53 + next + edit 15 + set name rsh + set protocol 6 + set port 514 + next + edit 16 + set name rsh + set protocol 6 + set port 512 + next + edit 17 + set name dcerpc + set protocol 6 + set port 135 + next + edit 18 + set name dcerpc + set protocol 17 + set port 135 + next + edit 19 + set name mgcp + set protocol 17 + set port 2427 + next + edit 20 + set name mgcp + set protocol 17 + set port 2727 + next +end +config system auto-install + set auto-install-config enable + set auto-install-image enable +end +config system console + set output standard +end +config system ntp + set ntpsync enable + set type custom + set syncinterval 5 + config ntpserver + edit 1 + set server "10.1.1.2" + next + edit 2 + set server "10.1.1.3" + next + end +end +config system ftm-push + set server-cert "Fortinet_Factory" +end +config system automation-trigger + edit "Network Down" + set event-type event-log + set logid 20099 + config fields + edit 1 + set name "status" + set value "DOWN" + next + end + next + edit "HA Failover" + set event-type ha-failover + next + edit "Reboot" + set event-type reboot + next + edit "FortiAnalyzer Connection Down" + set event-type event-log + set logid 22902 + next + edit "License Expired Notification" + set event-type license-near-expiry + set license-type any + next + edit "Compromised Host Quarantine" + next + edit "Incoming Webhook Call" + set event-type incoming-webhook + next + edit "Security Rating Notification" + set event-type security-rating-summary + next +end +config system automation-action + edit "Network Down_email" + set action-type email + set email-subject "Network Down" + next + edit "HA Failover_email" + set action-type email + set email-subject "HA Failover" + next + edit "Reboot_email" + set action-type email + set email-subject "Reboot" + next + edit "FortiAnalyzer Connection Down_ios-notification" + set action-type fortiexplorer-notification + next + edit "License Expired Notification_ios-notification" + set action-type fortiexplorer-notification + next + edit "Security Rating Notification_ios-notification" + set action-type fortiexplorer-notification + next + edit "Compromised Host Quarantine_quarantine" + set action-type quarantine + next + edit "Compromised Host Quarantine_quarantine-forticlient" + set action-type quarantine-forticlient + next +end +config system automation-stitch + edit "Network Down" + set status disable + set trigger "Network Down" + config actions + edit 1 + set action "Network Down_email" + next + end + next + edit "HA Failover" + set status disable + set trigger "HA Failover" + config actions + edit 1 + set action "HA Failover_email" + next + end + next + edit "Reboot" + set status disable + set trigger "Reboot" + config actions + edit 1 + set action "Reboot_email" + next + end + next + edit "FortiAnalyzer Connection Down" + set trigger "FortiAnalyzer Connection Down" + config actions + edit 1 + set action "FortiAnalyzer Connection Down_ios-notification" + next + end + next + edit "License Expired Notification" + set trigger "License Expired Notification" + config actions + edit 1 + set action "License Expired Notification_ios-notification" + next + end + next + edit "Compromised Host Quarantine" + set status disable + set trigger "Compromised Host Quarantine" + config actions + edit 1 + set action "Compromised Host Quarantine_quarantine" + next + edit 2 + set action "Compromised Host Quarantine_quarantine-forticlient" + next + end + next + edit "Incoming Webhook Quarantine" + set status disable + set trigger "Incoming Webhook Call" + config actions + edit 1 + set action "Compromised Host Quarantine_quarantine" + next + edit 2 + set action "Compromised Host Quarantine_quarantine-forticlient" + next + end + next + edit "Security Rating Notification" + set trigger "Security Rating Notification" + config actions + edit 1 + set action "Security Rating Notification_ios-notification" + next + end + next +end +config system federated-upgrade + set status disabled +end +config system ike + set dh-multiprocess disable +end +end + diff --git a/configs/fortigate/global/wanopt.cfg b/configs/fortigate/global/wanopt.cfg new file mode 100644 index 0000000..2b79305 --- /dev/null +++ b/configs/fortigate/global/wanopt.cfg @@ -0,0 +1,1309 @@ +config wanopt content-delivery-network-rule + edit "vcache://" + set comment "Static entries are not allowed to change except disable." + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/*.m3u8" + next + end + config content-id + set target hls-manifest + set start-str "/" + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/*.mpd" + next + end + config content-id + set target dash-manifest + set start-str "/" + end + next + edit "rule3" + config match-entries + edit 1 + set pattern "/*.ts" + next + end + config content-id + set target hls-fragment + set start-str "/" + end + next + edit "rule4" + config match-entries + edit 1 + set pattern "/*.*" + next + end + config content-id + set target dash-fragment + set start-str "/" + end + next + end + next + edit "vcache://youtube/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "youtube.com" + set category youtube + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/videoplayback" + next + end + config content-id + set target youtube-id + set start-str "v=" + set start-skip 2 + set end-str "&" + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/videoplayback" + next + end + config content-id + set target youtube-id + set start-str "v=" + set start-skip 2 + end + next + edit "rule3" + set match-mode any + config match-entries + edit 1 + set pattern "/stream_204" + next + edit 2 + set pattern "/ptracking" + next + edit 3 + set pattern "/get_video_info" + next + end + config content-id + set target youtube-map + set start-str "/" + end + next + end + next + edit "vcache://googlevideo/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "googlevideo.com" + set category youtube + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/videoplayback" + next + end + config content-id + set target youtube-id + set start-str "v=" + set start-skip 2 + set end-str "&" + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/videoplayback" + next + end + config content-id + set target youtube-id + set start-str "v=" + set start-skip 2 + end + next + edit "rule3" + set match-mode any + config match-entries + edit 1 + set pattern "/stream_204" + next + edit 2 + set pattern "/ptracking" + next + edit 3 + set pattern "/get_video_info" + next + end + config content-id + set target youtube-map + set start-str "/" + end + next + end + next + edit "vcache://metacafe/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "mccont.com" "akvideos.metacafe.com" "cdn.metacafe.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://facebook/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "fbcdn.net" "facebook.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://dailymotion/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "dailymotion.com" "dmcdn.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/video/*.mp4" + next + edit 2 + set pattern "/video/*.flv" + next + edit 3 + set pattern "/video/*.ts" + next + edit 4 + set pattern "/video/*.on2" + next + edit 5 + set pattern "/video/*.aac" + next + edit 6 + set pattern "/video/*.h264" + next + edit 7 + set pattern "/video/*.h263" + next + edit 8 + set pattern "/sec*.mp4" + next + edit 9 + set pattern "/sec*.flv" + next + edit 10 + set pattern "/sec*.on2" + next + edit 11 + set pattern "/sec*.aac" + next + edit 12 + set pattern "/sec*.h264" + next + edit 13 + set pattern "/sec*.h263" + next + edit 14 + set pattern "*.ts" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "start=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://break/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "break.com" "0ebe.edgecastcdn.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/dnet/media/*.flv" + next + edit 2 + set pattern "/dnet/media/*.mp4" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "ec_seek=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/*.mp4*" + next + edit 2 + set pattern "*Seg*" + next + edit 3 + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://msn/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "video.msn.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://llnwd/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "llnwd.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.fll" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "fs=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://yahoo/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "yimg.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.m4s" + next + end + config content-id + set target parameter + set start-str "vid=" + end + next + end + next + edit "vcache://myspace/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "myspacecdn.com" + set request-cache-control enable + set response-cache-control enable + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://vimeo/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "vimeo.com" "vimeocdn.com" "56skyfiregce-a.akamaihd.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.m4s" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://blip.tv/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "blip.tv" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.m4v" + next + edit 2 + set pattern "/*.flv" + next + edit 3 + set pattern "/*.mp4" + next + edit 4 + set pattern "/*.wmv" + next + edit 5 + set pattern "/*.rm" + next + edit 6 + set pattern "/*.ram" + next + edit 7 + set pattern "/*.mov" + next + edit 8 + set pattern "/*.avi" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "ms=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://maker.tv/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "videos-f.jwpsrv.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://aol/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "stream.aol.com" "5min.com" "vidiblevod-vh.akamaihd.net" "stg-ec-ore-u.uplynk.com" "vidible.tv" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/*.mp4" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "*timeoffset=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://clipfish/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "clipfish.de" "universal-music.de" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.f4v" + next + edit 3 + set pattern "/*.mp4" + next + edit 4 + set pattern "/*.m4v" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://cnn/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "cnn-vh.akamaihd.net" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/*.flv*" + next + edit 2 + set pattern "*Seg*" + next + edit 3 + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/*.mp4*" + next + edit 2 + set pattern "*Seg*" + next + edit 3 + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule3" + config match-entries + edit 1 + set pattern "/*.ts*" + next + edit 2 + set pattern "*Seg*" + next + edit 3 + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://foxnews/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "foxnews.com" "foxnews-f.akamaihd.net" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/*.mp4*" + next + edit 2 + set target parameter + set pattern "*Seg*" + next + edit 3 + set target parameter + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://discovery/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "discovery.com" "discidevflash-f.akamaihd.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://liveleak/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "edge.liveleak.com" "cdn.liveleak.com" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set target parameter + set pattern "*seek=0" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/*.mp4" + next + edit 2 + set target parameter + set pattern "*seek=0" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule3" + config match-entries + edit 1 + set pattern "/*.wmv" + next + edit 2 + set target parameter + set pattern "*seek=0" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://sevenload/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "sevenload.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "aktimeoffset=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://stupidvideos/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "stupidvideos.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://howcast/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "media.howcast.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "start=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://vevo/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "vevo.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://ooyala/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "ooyala.com" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "*Seg*" + next + edit 2 + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://ms-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "msads.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://yumenetworks-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "yumenetworks.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://2mdn-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "2mdn.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://eyewonder-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "eyewonder.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://eyereturn-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "eyereturn.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://serving-sys-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "serving-sys.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://amazonaws-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "amazonaws.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://edgesuite-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "edgesuite.net" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://gorillanation-ads/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "video.gorillanation.com" + set response-expires enable + config rules + edit "rule1" + set match-mode any + set skip-rule-mode any + config match-entries + edit 1 + set pattern "/*.flv" + next + edit 2 + set pattern "/*.mp4" + next + edit 3 + set pattern "/*.ts" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://youku/" + set comment "Static entries are not allowed to change except disable." + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/youku/*.mp4" + next + edit 2 + set target parameter + set pattern "*start=0" + next + end + config content-id + set target youku-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + edit "rule2" + config match-entries + edit 1 + set pattern "/youku/*.flv" + next + edit 2 + set target parameter + set pattern "*start=0" + next + end + config content-id + set target youku-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + edit "rule3" + config match-entries + edit 1 + set pattern "/youku/*.kux" + next + edit 2 + set target parameter + set pattern "*start=0" + next + end + config content-id + set target youku-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + edit "rule4" + config match-entries + edit 1 + set pattern "/youku/*.mp4" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "*start=*" + next + end + config content-id + set target youku-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + edit "rule5" + config match-entries + edit 1 + set pattern "/youku/*.flv" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "*start=*" + next + end + config content-id + set target youku-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + edit "rule6" + config match-entries + edit 1 + set pattern "/youku/*.kux" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "*start=*" + next + end + config content-id + set target youku-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + end + next + edit "vcache://tudou/" + set comment "Static entries are not allowed to change except disable." + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/f4v/*" + next + edit 2 + set target parameter + set pattern "*id=tudou*" + next + end + config skip-entries + edit 1 + set target parameter + set pattern "*begin=*" + next + end + config content-id + set start-str "/" + set start-skip 1 + set start-direction backward + end + next + end + next + edit "vcache://cbc/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "cbc.ca" "mobilehls-vh.akamaihd.net" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "*.mp4*" + next + edit 2 + set pattern "*Seg*" + next + edit 3 + set pattern "*Frag*" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + edit "rule2" + set match-mode any + config match-entries + edit 1 + set pattern "*.ts" + next + edit 2 + set pattern "*.mp4" + next + end + config content-id + set start-str "/" + set start-skip 1 + end + next + end + next + edit "vcache://megaupload/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "megaupload.com" + set response-expires enable + config rules + edit "rule1" + config match-entries + edit 1 + set pattern "/files/*" + next + end + config content-id + set target referrer + set start-str "d=" + set start-skip 2 + end + next + end + next + edit "update://windowsupdate/" + set comment "Static entries are not allowed to change except disable." + set host-domain-name-suffix "download.windowsupdate.com" + set request-cache-control enable + set response-cache-control enable + set response-expires enable + set updateserver enable + next +end diff --git a/configs/fortigate/global/webfilter.cfg b/configs/fortigate/global/webfilter.cfg new file mode 100644 index 0000000..60160c2 --- /dev/null +++ b/configs/fortigate/global/webfilter.cfg @@ -0,0 +1,562 @@ +config webfilter profile + edit "g-default" + set comment "Default web filtering." + config ftgd-wf + unset options + config filters + edit 1 + set action block + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next + edit "g-sniffer-profile" + set comment "Monitor web traffic." + config ftgd-wf + config filters + edit 1 + next + edit 2 + set category 1 + next + edit 3 + set category 2 + next + edit 4 + set category 3 + next + edit 5 + set category 4 + next + edit 6 + set category 5 + next + edit 7 + set category 6 + next + edit 8 + set category 7 + next + edit 9 + set category 8 + next + edit 10 + set category 9 + next + edit 11 + set category 11 + next + edit 12 + set category 12 + next + edit 13 + set category 13 + next + edit 14 + set category 14 + next + edit 15 + set category 15 + next + edit 16 + set category 16 + next + edit 17 + set category 17 + next + edit 18 + set category 18 + next + edit 19 + set category 19 + next + edit 20 + set category 20 + next + edit 21 + set category 23 + next + edit 22 + set category 24 + next + edit 23 + set category 25 + next + edit 24 + set category 26 + next + edit 25 + set category 28 + next + edit 26 + set category 29 + next + edit 27 + set category 30 + next + edit 28 + set category 31 + next + edit 29 + set category 33 + next + edit 30 + set category 34 + next + edit 31 + set category 35 + next + edit 32 + set category 36 + next + edit 33 + set category 37 + next + edit 34 + set category 38 + next + edit 35 + set category 39 + next + edit 36 + set category 40 + next + edit 37 + set category 41 + next + edit 38 + set category 42 + next + edit 39 + set category 43 + next + edit 40 + set category 44 + next + edit 41 + set category 46 + next + edit 42 + set category 47 + next + edit 43 + set category 48 + next + edit 44 + set category 49 + next + edit 45 + set category 50 + next + edit 46 + set category 51 + next + edit 47 + set category 52 + next + edit 48 + set category 53 + next + edit 49 + set category 54 + next + edit 50 + set category 55 + next + edit 51 + set category 56 + next + edit 52 + set category 57 + next + edit 53 + set category 58 + next + edit 54 + set category 59 + next + edit 55 + set category 61 + next + edit 56 + set category 62 + next + edit 57 + set category 63 + next + edit 58 + set category 64 + next + edit 59 + set category 65 + next + edit 60 + set category 66 + next + edit 61 + set category 67 + next + edit 62 + set category 68 + next + edit 63 + set category 69 + next + edit 64 + set category 70 + next + edit 65 + set category 71 + next + edit 66 + set category 72 + next + edit 67 + set category 75 + next + edit 68 + set category 76 + next + edit 69 + set category 77 + next + edit 70 + set category 78 + next + edit 71 + set category 79 + next + edit 72 + set category 80 + next + edit 73 + set category 81 + next + edit 74 + set category 82 + next + edit 75 + set category 83 + next + edit 76 + set category 84 + next + edit 77 + set category 85 + next + edit 78 + set category 86 + next + edit 79 + set category 87 + next + edit 80 + set category 88 + next + edit 81 + set category 89 + next + edit 82 + set category 90 + next + edit 83 + set category 91 + next + edit 84 + set category 92 + next + edit 85 + set category 93 + next + edit 86 + set category 94 + next + edit 87 + set category 95 + next + end + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set options block-invalid-url + config ftgd-wf + unset options + config filters + edit 1 + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next +end +config webfilter search-engine + edit "g-google" + set hostname ".*\\.google\\..*" + set url "^\\/((custom|search|images|videosearch|webhp)\\?)" + set query "q=" + set safesearch url + set safesearch-str "&safe=active" + next + edit "g-yahoo" + set hostname ".*\\.yahoo\\..*" + set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" + set query "p=" + set safesearch url + set safesearch-str "&vm=r" + next + edit "g-bing" + set hostname ".*\\.bing\\..*" + set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" + set query "q=" + set safesearch header + next + edit "g-yandex" + set hostname "yandex\\..*" + set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" + set query "text=" + set safesearch url + set safesearch-str "&family=yes" + next + edit "g-youtube" + set hostname ".*youtube.*" + set safesearch header + next + edit "g-baidu" + set hostname ".*\\.baidu\\.com" + set url "^\\/s?\\?" + set query "wd=" + next + edit "g-baidu2" + set hostname ".*\\.baidu\\.com" + set url "^\\/(ns|q|m|i|v)\\?" + set query "word=" + next + edit "g-baidu3" + set hostname "tieba\\.baidu\\.com" + set url "^\\/f\\?" + set query "kw=" + next + edit "g-vimeo" + set hostname ".*vimeo.*" + set url "^\\/search\\?" + set query "q=" + set safesearch header + next + edit "g-yt-scan-1" + set url "www.youtube.com/user/" + set safesearch yt-scan + next + edit "g-yt-scan-2" + set url "www.youtube.com/youtubei/v1/browse" + set safesearch yt-scan + next + edit "g-yt-scan-3" + set url "www.youtube.com/youtubei/v1/player" + set safesearch yt-scan + next + edit "g-yt-scan-4" + set url "www.youtube.com/youtubei/v1/navigator" + set safesearch yt-scan + next + edit "g-yt-channel" + set url "www.youtube.com/channel" + set safesearch yt-channel + next + edit "g-yt-pattern" + set url "youtube.com/channel/" + set safesearch yt-pattern + next + edit "g-twitter" + set hostname "twitter\\.com" + set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" + set query "variables=" + set safesearch translate + next + edit "g-google-translate-1" + set hostname "translate\\.google\\..*" + set url "^\\/translate" + set query "u=" + set safesearch translate + next + edit "g-google-translate-2" + set hostname ".*\\.translate\\.goog" + set url "^\\/" + set safesearch translate + next +end diff --git a/configs/fortigate/vdom_Policy/antivirus.cfg b/configs/fortigate/vdom_Policy/antivirus.cfg new file mode 100644 index 0000000..0b42758 --- /dev/null +++ b/configs/fortigate/vdom_Policy/antivirus.cfg @@ -0,0 +1,75 @@ +config antivirus settings + set machine-learning-detection enable + set grayware enable +end +config antivirus profile + edit "g-default" + set comment "Scan files and block viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-sniffer-profile" + set comment "Scan files and monitor viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next +end diff --git a/configs/fortigate/vdom_Policy/dlp.cfg b/configs/fortigate/vdom_Policy/dlp.cfg new file mode 100644 index 0000000..2d8781f --- /dev/null +++ b/configs/fortigate/vdom_Policy/dlp.cfg @@ -0,0 +1,81 @@ +config dlp filepattern + edit 1 + set name "builtin-patterns" + config entries + edit "*.bat" + next + edit "*.com" + next + edit "*.dll" + next + edit "*.doc" + next + edit "*.exe" + next + edit "*.gz" + next + edit "*.hta" + next + edit "*.ppt" + next + edit "*.rar" + next + edit "*.scr" + next + edit "*.tar" + next + edit "*.tgz" + next + edit "*.vb?" + next + edit "*.wps" + next + edit "*.xl?" + next + edit "*.zip" + next + edit "*.pif" + next + edit "*.cpl" + next + end + next + edit 2 + set name "all_executables" + config entries + edit "bat" + set filter-type type + set file-type bat + next + edit "exe" + set filter-type type + set file-type exe + next + edit "elf" + set filter-type type + set file-type elf + next + edit "hta" + set filter-type type + set file-type hta + next + end + next +end +config dlp sensitivity + edit "Private" + next + edit "Critical" + next + edit "Warning" + next +end +config dlp sensor + edit "g-default" + set comment "Default sensor." + next + edit "g-sniffer-profile" + set comment "Log a summary of email and web traffic." + set summary-proto smtp pop3 imap http-get http-post + next +end diff --git a/configs/fortigate/vdom_Policy/dnsfilter.cfg b/configs/fortigate/vdom_Policy/dnsfilter.cfg new file mode 100644 index 0000000..634b4db --- /dev/null +++ b/configs/fortigate/vdom_Policy/dnsfilter.cfg @@ -0,0 +1,84 @@ +config dnsfilter profile + edit "default" + set comment "Default dns filtering." + config ftgd-dns + config filters + edit 1 + set category 2 + next + edit 2 + set category 7 + next + edit 3 + set category 8 + next + edit 4 + set category 9 + next + edit 5 + set category 11 + next + edit 6 + set category 12 + next + edit 7 + set category 13 + next + edit 8 + set category 14 + next + edit 9 + set category 15 + next + edit 10 + set category 16 + next + edit 11 + next + edit 12 + set category 57 + next + edit 13 + set category 63 + next + edit 14 + set category 64 + next + edit 15 + set category 65 + next + edit 16 + set category 66 + next + edit 17 + set category 67 + next + edit 18 + set category 26 + set action block + next + edit 19 + set category 61 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + set block-botnet enable + next +end diff --git a/configs/fortigate/vdom_Policy/emailfilter.cfg b/configs/fortigate/vdom_Policy/emailfilter.cfg new file mode 100644 index 0000000..df79721 --- /dev/null +++ b/configs/fortigate/vdom_Policy/emailfilter.cfg @@ -0,0 +1,20 @@ +config emailfilter profile + edit "default" + set comment "Malware and phishing URL filtering." + config imap + end + config pop3 + end + config smtp + end + next + edit "sniffer-profile" + set comment "Malware and phishing URL monitoring." + config imap + end + config pop3 + end + config smtp + end + next +end diff --git a/configs/fortigate/vdom_Policy/file-filter.cfg b/configs/fortigate/vdom_Policy/file-filter.cfg new file mode 100644 index 0000000..56fff32 --- /dev/null +++ b/configs/fortigate/vdom_Policy/file-filter.cfg @@ -0,0 +1,8 @@ +config file-filter profile + edit "g-default" + set comment "File type inspection." + next + edit "g-sniffer-profile" + set comment "File type inspection." + next +end diff --git a/configs/fortigate/vdom_Policy/firewall.cfg b/configs/fortigate/vdom_Policy/firewall.cfg new file mode 100644 index 0000000..1a2987f --- /dev/null +++ b/configs/fortigate/vdom_Policy/firewall.cfg @@ -0,0 +1,1145 @@ +config firewall address + edit "none" + set subnet 0.0.0.0 255.255.255.255 + next + edit "login.microsoftonline.com" + set type fqdn + set fqdn "login.microsoftonline.com" + next + edit "login.microsoft.com" + set type fqdn + set fqdn "login.microsoft.com" + next + edit "login.windows.net" + set type fqdn + set fqdn "login.windows.net" + next + edit "gmail.com" + set type fqdn + set fqdn "gmail.com" + next + edit "wildcard.google.com" + set type fqdn + set fqdn "*.google.com" + next + edit "wildcard.dropbox.com" + set type fqdn + set fqdn "*.dropbox.com" + next + edit "SSLVPN_TUNNEL_ADDR1" + set type iprange + set start-ip 10.212.134.200 + set end-ip 10.212.134.210 + next + edit "all" + next + edit "FIREWALL_AUTH_PORTAL_ADDRESS" + next + edit "FABRIC_DEVICE" + set comment "IPv4 addresses of Fabric Devices." + next + edit "FCTEMS_ALL_FORTICLOUD_SERVERS" + set type dynamic + set sub-type ems-tag + next +end +config firewall multicast-address + edit "all_hosts" + set start-ip 224.0.0.1 + set end-ip 224.0.0.1 + next + edit "all_routers" + set start-ip 224.0.0.2 + set end-ip 224.0.0.2 + next + edit "Bonjour" + set start-ip 224.0.0.251 + set end-ip 224.0.0.251 + next + edit "EIGRP" + set start-ip 224.0.0.10 + set end-ip 224.0.0.10 + next + edit "OSPF" + set start-ip 224.0.0.5 + set end-ip 224.0.0.6 + next + edit "all" + set start-ip 224.0.0.0 + set end-ip 239.255.255.255 + next +end +config firewall address6 + edit "all" + next + edit "none" + set ip6 ::/128 + next + edit "SSLVPN_TUNNEL_IPv6_ADDR1" + set ip6 fdff:ffff::/120 + next +end +config firewall multicast-address6 + edit "all" + set ip6 ff00::/8 + next +end +config firewall addrgrp + edit "G Suite" + set member "gmail.com" "wildcard.google.com" + next + edit "Microsoft Office 365" + set member "login.microsoftonline.com" "login.microsoft.com" "login.windows.net" + next +end +config firewall wildcard-fqdn custom + edit "g-Adobe Login" + set wildcard-fqdn "*.adobelogin.com" + next + edit "g-Gotomeeting" + set wildcard-fqdn "*.gotomeeting.com" + next + edit "g-Windows update 2" + set wildcard-fqdn "*.windowsupdate.com" + next + edit "g-adobe" + set wildcard-fqdn "*.adobe.com" + next + edit "g-android" + set wildcard-fqdn "*.android.com" + next + edit "g-apple" + set wildcard-fqdn "*.apple.com" + next + edit "g-appstore" + set wildcard-fqdn "*.appstore.com" + next + edit "g-auth.gfx.ms" + set wildcard-fqdn "*.auth.gfx.ms" + next + edit "g-autoupdate.opera.com" + set wildcard-fqdn "*autoupdate.opera.com" + next + edit "g-cdn-apple" + set wildcard-fqdn "*.cdn-apple.com" + next + edit "g-citrix" + set wildcard-fqdn "*.citrixonline.com" + next + edit "g-dropbox.com" + set wildcard-fqdn "*.dropbox.com" + next + edit "g-eease" + set wildcard-fqdn "*.eease.com" + next + edit "g-firefox update server" + set wildcard-fqdn "aus*.mozilla.org" + next + edit "g-fortinet" + set wildcard-fqdn "*.fortinet.com" + next + edit "g-google-drive" + set wildcard-fqdn "*drive.google.com" + next + edit "g-google-play" + set wildcard-fqdn "*play.google.com" + next + edit "g-google-play2" + set wildcard-fqdn "*.ggpht.com" + next + edit "g-google-play3" + set wildcard-fqdn "*.books.google.com" + next + edit "g-googleapis.com" + set wildcard-fqdn "*.googleapis.com" + next + edit "g-icloud" + set wildcard-fqdn "*.icloud.com" + next + edit "g-itunes" + set wildcard-fqdn "*itunes.apple.com" + next + edit "g-live.com" + set wildcard-fqdn "*.live.com" + next + edit "g-microsoft" + set wildcard-fqdn "*.microsoft.com" + next + edit "g-mzstatic-apple" + set wildcard-fqdn "*.mzstatic.com" + next + edit "g-skype" + set wildcard-fqdn "*.messenger.live.com" + next + edit "g-softwareupdate.vmware.com" + set wildcard-fqdn "*.softwareupdate.vmware.com" + next + edit "g-swscan.apple.com" + set wildcard-fqdn "*swscan.apple.com" + next + edit "g-update.microsoft.com" + set wildcard-fqdn "*update.microsoft.com" + next + edit "g-verisign" + set wildcard-fqdn "*.verisign.com" + next +end +config firewall service category + edit "General" + set comment "General services." + next + edit "Web Access" + set comment "Web access." + next + edit "File Access" + set comment "File access." + next + edit "Email" + set comment "Email services." + next + edit "Network Services" + set comment "Network services." + next + edit "Authentication" + set comment "Authentication service." + next + edit "Remote Access" + set comment "Remote access." + next + edit "Tunneling" + set comment "Tunneling service." + next + edit "VoIP, Messaging & Other Applications" + set comment "VoIP, messaging, and other applications." + next + edit "Web Proxy" + set comment "Explicit web proxy." + next +end +config firewall service custom + edit "DNS" + set category "Network Services" + set tcp-portrange 53 + set udp-portrange 53 + next + edit "HTTP" + set category "Web Access" + set tcp-portrange 80 + next + edit "HTTPS" + set category "Web Access" + set tcp-portrange 443 + next + edit "IMAP" + set category "Email" + set tcp-portrange 143 + next + edit "IMAPS" + set category "Email" + set tcp-portrange 993 + next + edit "LDAP" + set category "Authentication" + set tcp-portrange 389 + next + edit "DCE-RPC" + set category "Remote Access" + set tcp-portrange 135 + set udp-portrange 135 + next + edit "POP3" + set category "Email" + set tcp-portrange 110 + next + edit "POP3S" + set category "Email" + set tcp-portrange 995 + next + edit "SAMBA" + set category "File Access" + set tcp-portrange 139 + next + edit "SMTP" + set category "Email" + set tcp-portrange 25 + next + edit "SMTPS" + set category "Email" + set tcp-portrange 465 + next + edit "KERBEROS" + set category "Authentication" + set tcp-portrange 88 464 + set udp-portrange 88 464 + next + edit "LDAP_UDP" + set category "Authentication" + set udp-portrange 389 + next + edit "SMB" + set category "File Access" + set tcp-portrange 445 + next + edit "FTP" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_GET" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_PUT" + set category "File Access" + set tcp-portrange 21 + next + edit "ALL" + set category "General" + set protocol IP + next + edit "ALL_TCP" + set category "General" + set tcp-portrange 1-65535 + next + edit "ALL_UDP" + set category "General" + set udp-portrange 1-65535 + next + edit "ALL_ICMP" + set category "General" + set protocol ICMP + unset icmptype + next + edit "ALL_ICMP6" + set category "General" + set protocol ICMP6 + unset icmptype + next + edit "GRE" + set category "Tunneling" + set protocol IP + set protocol-number 47 + next + edit "AH" + set category "Tunneling" + set protocol IP + set protocol-number 51 + next + edit "ESP" + set category "Tunneling" + set protocol IP + set protocol-number 50 + next + edit "AOL" + set visibility disable + set tcp-portrange 5190-5194 + next + edit "BGP" + set category "Network Services" + set tcp-portrange 179 + next + edit "DHCP" + set category "Network Services" + set udp-portrange 67-68 + next + edit "FINGER" + set visibility disable + set tcp-portrange 79 + next + edit "GOPHER" + set visibility disable + set tcp-portrange 70 + next + edit "H323" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1720 1503 + set udp-portrange 1719 + next + edit "IKE" + set category "Tunneling" + set udp-portrange 500 4500 + next + edit "Internet-Locator-Service" + set visibility disable + set tcp-portrange 389 + next + edit "IRC" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 6660-6669 + next + edit "L2TP" + set category "Tunneling" + set tcp-portrange 1701 + set udp-portrange 1701 + next + edit "NetMeeting" + set visibility disable + set tcp-portrange 1720 + next + edit "NFS" + set category "File Access" + set tcp-portrange 111 2049 + set udp-portrange 111 2049 + next + edit "NNTP" + set visibility disable + set tcp-portrange 119 + next + edit "NTP" + set category "Network Services" + set tcp-portrange 123 + set udp-portrange 123 + next + edit "OSPF" + set category "Network Services" + set protocol IP + set protocol-number 89 + next + edit "PC-Anywhere" + set category "Remote Access" + set tcp-portrange 5631 + set udp-portrange 5632 + next + edit "PING" + set category "Network Services" + set protocol ICMP + set icmptype 8 + unset icmpcode + next + edit "TIMESTAMP" + set protocol ICMP + set visibility disable + set icmptype 13 + unset icmpcode + next + edit "INFO_REQUEST" + set protocol ICMP + set visibility disable + set icmptype 15 + unset icmpcode + next + edit "INFO_ADDRESS" + set protocol ICMP + set visibility disable + set icmptype 17 + unset icmpcode + next + edit "ONC-RPC" + set category "Remote Access" + set tcp-portrange 111 + set udp-portrange 111 + next + edit "PPTP" + set category "Tunneling" + set tcp-portrange 1723 + next + edit "QUAKE" + set visibility disable + set udp-portrange 26000 27000 27910 27960 + next + edit "RAUDIO" + set visibility disable + set udp-portrange 7070 + next + edit "REXEC" + set visibility disable + set tcp-portrange 512 + next + edit "RIP" + set category "Network Services" + set udp-portrange 520 + next + edit "RLOGIN" + set visibility disable + set tcp-portrange 513:512-1023 + next + edit "RSH" + set visibility disable + set tcp-portrange 514:512-1023 + next + edit "SCCP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 2000 + next + edit "SIP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 5060 + set udp-portrange 5060 + next + edit "SIP-MSNmessenger" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1863 + next + edit "SNMP" + set category "Network Services" + set tcp-portrange 161-162 + set udp-portrange 161-162 + next + edit "SSH" + set category "Remote Access" + set tcp-portrange 22 + next + edit "SYSLOG" + set category "Network Services" + set udp-portrange 514 + next + edit "TALK" + set visibility disable + set udp-portrange 517-518 + next + edit "TELNET" + set category "Remote Access" + set tcp-portrange 23 + next + edit "TFTP" + set category "File Access" + set udp-portrange 69 + next + edit "MGCP" + set visibility disable + set udp-portrange 2427 2727 + next + edit "UUCP" + set visibility disable + set tcp-portrange 540 + next + edit "VDOLIVE" + set visibility disable + set tcp-portrange 7000-7010 + next + edit "WAIS" + set visibility disable + set tcp-portrange 210 + next + edit "WINFRAME" + set visibility disable + set tcp-portrange 1494 2598 + next + edit "X-WINDOWS" + set category "Remote Access" + set tcp-portrange 6000-6063 + next + edit "PING6" + set protocol ICMP6 + set visibility disable + set icmptype 128 + unset icmpcode + next + edit "MS-SQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1433 1434 + next + edit "MYSQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 3306 + next + edit "RDP" + set category "Remote Access" + set tcp-portrange 3389 + next + edit "VNC" + set category "Remote Access" + set tcp-portrange 5900 + next + edit "DHCP6" + set category "Network Services" + set udp-portrange 546 547 + next + edit "SQUID" + set category "Tunneling" + set tcp-portrange 3128 + next + edit "SOCKS" + set category "Tunneling" + set tcp-portrange 1080 + set udp-portrange 1080 + next + edit "WINS" + set category "Remote Access" + set tcp-portrange 1512 + set udp-portrange 1512 + next + edit "RADIUS" + set category "Authentication" + set udp-portrange 1812 1813 + next + edit "RADIUS-OLD" + set visibility disable + set udp-portrange 1645 1646 + next + edit "CVSPSERVER" + set visibility disable + set tcp-portrange 2401 + set udp-portrange 2401 + next + edit "AFS3" + set category "File Access" + set tcp-portrange 7000-7009 + set udp-portrange 7000-7009 + next + edit "TRACEROUTE" + set category "Network Services" + set udp-portrange 33434-33535 + next + edit "RTSP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 554 7070 8554 + set udp-portrange 554 + next + edit "MMS" + set visibility disable + set tcp-portrange 1755 + set udp-portrange 1024-5000 + next + edit "NONE" + set visibility disable + set tcp-portrange 0 + next + edit "webproxy" + set proxy enable + set category "Web Proxy" + set protocol ALL + set tcp-portrange 0-65535:0-65535 + next +end +config firewall service group + edit "Email Access" + set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" + next + edit "Web Access" + set member "DNS" "HTTP" "HTTPS" + next + edit "Windows AD" + set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB" + next + edit "Exchange Server" + set member "DCE-RPC" "DNS" "HTTPS" + next +end +config firewall shaper traffic-shaper + edit "high-priority" + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "medium-priority" + set maximum-bandwidth 1048576 + set priority medium + set per-policy enable + next + edit "low-priority" + set maximum-bandwidth 1048576 + set priority low + set per-policy enable + next + edit "guarantee-100kbps" + set guaranteed-bandwidth 100 + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "shared-1M-pipe" + set maximum-bandwidth 1024 + next +end +config firewall schedule recurring + edit "always" + set day sunday monday tuesday wednesday thursday friday saturday + next + edit "none" + next + edit "default-darrp-optimize" + set start 01:00 + set end 01:30 + set day sunday monday tuesday wednesday thursday friday saturday + next +end +config firewall ssh local-key + edit "g-Fortinet_SSH_DSA1024" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA256" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA384" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA521" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ED25519" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_RSA2048" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh local-ca + edit "g-Fortinet_SSH_CA" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_CA_Untrusted" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh setting + set caname "g-Fortinet_SSH_CA" + set untrusted-caname "g-Fortinet_SSH_CA_Untrusted" + set hostkey-rsa2048 "g-Fortinet_SSH_RSA2048" + set hostkey-dsa1024 "g-Fortinet_SSH_DSA1024" + set hostkey-ecdsa256 "g-Fortinet_SSH_ECDSA256" + set hostkey-ecdsa384 "g-Fortinet_SSH_ECDSA384" + set hostkey-ecdsa521 "g-Fortinet_SSH_ECDSA521" + set hostkey-ed25519 "g-Fortinet_SSH_ED25519" +end +config firewall profile-protocol-options + edit "default" + set comment "All default services." + config http + set ports 80 + unset options + unset post-lang + end + config ftp + set ports 21 + set options splice + end + config imap + set ports 143 + set options fragmail + end + config mapi + set ports 135 + set options fragmail + end + config pop3 + set ports 110 + set options fragmail + end + config smtp + set ports 25 + set options fragmail splice + end + config nntp + set ports 119 + set options splice + end + config ssh + unset options + end + config dns + set ports 53 + end + config cifs + set ports 445 + unset options + end + next +end +config firewall ssl-ssh-profile + edit "certificate-inspection" + set comment "Read-only SSL handshake inspection profile." + config https + set ports 443 + set status certificate-inspection + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next + edit "deep-inspection" + set comment "Read-only deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "custom-deep-inspection" + set comment "Customizable deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "no-inspection" + set comment "Read-only profile that does no inspection." + config https + set status disable + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next +end +config firewall policy + edit 1 + set name "Default" + set srcintf "any" + set dstintf "any" + set srcaddr "all" + set dstaddr "all" + set srcaddr6 "all" + set dstaddr6 "all" + set service "ALL" + set ssl-ssh-profile "certificate-inspection" + next +end diff --git a/configs/fortigate/vdom_Policy/icap.cfg b/configs/fortigate/vdom_Policy/icap.cfg new file mode 100644 index 0000000..c731791 --- /dev/null +++ b/configs/fortigate/vdom_Policy/icap.cfg @@ -0,0 +1,14 @@ +config icap profile + edit "default" + config icap-headers + edit 1 + set name "X-Authenticated-User" + set content "$user" + next + edit 2 + set name "X-Authenticated-Groups" + set content "$local_grp" + next + end + next +end diff --git a/configs/fortigate/vdom_Policy/ips.cfg b/configs/fortigate/vdom_Policy/ips.cfg new file mode 100644 index 0000000..f8de5cc --- /dev/null +++ b/configs/fortigate/vdom_Policy/ips.cfg @@ -0,0 +1,26 @@ +config ips sensor + edit "g-default" + set comment "Prevent critical attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-sniffer-profile" + set comment "Monitor IPS attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config entries + edit 1 + set severity medium high critical + next + end + next +end diff --git a/configs/fortigate/vdom_Policy/log.cfg b/configs/fortigate/vdom_Policy/log.cfg new file mode 100644 index 0000000..bb99ad9 --- /dev/null +++ b/configs/fortigate/vdom_Policy/log.cfg @@ -0,0 +1,80 @@ +config log threat-weight + config web + edit 1 + set category 26 + set level high + next + edit 2 + set category 61 + set level high + next + edit 3 + set category 86 + set level high + next + edit 4 + set category 1 + set level medium + next + edit 5 + set category 3 + set level medium + next + edit 6 + set category 4 + set level medium + next + edit 7 + set category 5 + set level medium + next + edit 8 + set category 6 + set level medium + next + edit 9 + set category 12 + set level medium + next + edit 10 + set category 59 + set level medium + next + edit 11 + set category 62 + set level medium + next + edit 12 + set category 83 + set level medium + next + edit 13 + set category 72 + next + edit 14 + set category 14 + next + edit 15 + set category 96 + set level medium + next + end + config application + edit 1 + set category 2 + next + edit 2 + set category 6 + set level medium + next + end +end +config log memory setting + set status enable +end +config log disk setting + set status disable +end +config log null-device setting + set status disable +end diff --git a/configs/fortigate/vdom_Policy/router.cfg b/configs/fortigate/vdom_Policy/router.cfg new file mode 100644 index 0000000..a82bcc4 --- /dev/null +++ b/configs/fortigate/vdom_Policy/router.cfg @@ -0,0 +1,96 @@ +config router rip + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ripng + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ospf + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ospf6 + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router bgp + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "static" + end + config redistribute "isis" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "static" + end + config redistribute6 "isis" + end +end +config router isis + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "static" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "bgp" + end + config redistribute6 "static" + end +end +config router multicast +end +end + diff --git a/configs/fortigate/vdom_Policy/switch-controller.cfg b/configs/fortigate/vdom_Policy/switch-controller.cfg new file mode 100644 index 0000000..2cc8def --- /dev/null +++ b/configs/fortigate/vdom_Policy/switch-controller.cfg @@ -0,0 +1,224 @@ +config switch-controller traffic-policy + edit "quarantine" + set description "Rate control for quarantined traffic" + set guaranteed-bandwidth 163840 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next + edit "sniffer" + set description "Rate control for sniffer mirrored traffic" + set guaranteed-bandwidth 50000 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next +end +config switch-controller security-policy 802-1X + edit "802-1X-policy-default" + set user-group "SSO_Guest_Users" + set mac-auth-bypass disable + set open-auth disable + set eap-passthru enable + set eap-auto-untagged-vlans enable + set guest-vlan disable + set auth-fail-vlan disable + set framevid-apply enable + set radius-timeout-overwrite disable + set authserver-timeout-vlan disable + next +end +config switch-controller security-policy local-access + edit "default" + set mgmt-allowaccess https ping ssh + set internal-allowaccess https ping ssh + next +end +config switch-controller lldp-profile + edit "default" + set med-tlvs inventory-management network-policy location-identification + set auto-isl disable + config med-network-policy + edit "voice" + next + edit "voice-signaling" + next + edit "guest-voice" + next + edit "guest-voice-signaling" + next + edit "softphone-voice" + next + edit "video-conferencing" + next + edit "streaming-video" + next + edit "video-signaling" + next + end + config med-location-service + edit "coordinates" + next + edit "address-civic" + next + edit "elin-number" + next + end + next + edit "default-auto-isl" + next + edit "default-auto-mclag-icl" + set auto-mclag-icl enable + next +end +config switch-controller qos dot1p-map + edit "voice-dot1p" + set priority-0 queue-4 + set priority-1 queue-4 + set priority-2 queue-3 + set priority-3 queue-2 + set priority-4 queue-3 + set priority-5 queue-1 + set priority-6 queue-2 + set priority-7 queue-2 + next +end +config switch-controller qos ip-dscp-map + edit "voice-dscp" + config map + edit "1" + set cos-queue 1 + set value 46 + next + edit "2" + set cos-queue 2 + set value 24,26,48,56 + next + edit "5" + set cos-queue 3 + set value 34 + next + end + next +end +config switch-controller qos queue-policy + edit "default" + set schedule round-robin + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + next + edit "queue-2" + next + edit "queue-3" + next + edit "queue-4" + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next + edit "voice-egress" + set schedule weighted + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + set weight 0 + next + edit "queue-2" + set weight 6 + next + edit "queue-3" + set weight 37 + next + edit "queue-4" + set weight 12 + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next +end +config switch-controller qos qos-policy + edit "default" + next + edit "voice-qos" + set trust-dot1p-map "voice-dot1p" + set trust-ip-dscp-map "voice-dscp" + set queue-policy "voice-egress" + next +end +config switch-controller storm-control-policy + edit "default" + set description "default storm control on all port" + next + edit "auto-config" + set description "storm control policy for fortilink-isl-icl port" + set storm-control-mode disabled + next +end +config switch-controller auto-config policy + edit "default" + next + edit "default-icl" + set poe-status disable + set igmp-flood-report enable + set igmp-flood-traffic enable + next +end +config switch-controller initial-config template + edit "_default" + set vlanid 1 + next + edit "quarantine" + set vlanid 4093 + set dhcp-server enable + next + edit "rspan" + set vlanid 4092 + set dhcp-server enable + next + edit "voice" + set vlanid 4091 + next + edit "video" + set vlanid 4090 + next + edit "onboarding" + set vlanid 4089 + next + edit "nac_segment" + set vlanid 4088 + set dhcp-server enable + next +end +config switch-controller switch-profile + edit "default" + next +end +config switch-controller ptp settings + set mode disable +end +config switch-controller ptp policy + edit "default" + set status enable + next +end +config switch-controller remote-log + edit "syslogd" + next + edit "syslogd2" + next +end diff --git a/configs/fortigate/vdom_Policy/system.cfg b/configs/fortigate/vdom_Policy/system.cfg new file mode 100644 index 0000000..e9f7e06 --- /dev/null +++ b/configs/fortigate/vdom_Policy/system.cfg @@ -0,0 +1,90 @@ +config system object-tagging + edit "default" + next +end +config system settings + set comments "Test VDOM for Policy-based" + set ngfw-mode policy-based + set h323-direct-model enable +end +config system replacemsg-group + edit "default" + set comment "Default replacement message group." + next +end +config system sdwan + config zone + edit "virtual-wan-link" + next + end + config health-check + edit "Default_DNS" + set system-dns enable + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Office_365" + set server "www.office.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Gmail" + set server "gmail.com" + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 2 + next + end + next + edit "Default_Google Search" + set server "www.google.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_FortiGuard" + set server "fortiguard.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + end +end diff --git a/configs/fortigate/vdom_Policy/user.cfg b/configs/fortigate/vdom_Policy/user.cfg new file mode 100644 index 0000000..1d9e649 --- /dev/null +++ b/configs/fortigate/vdom_Policy/user.cfg @@ -0,0 +1,7 @@ +config user setting + set auth-cert "Fortinet_Factory" +end +config user group + edit "SSO_Guest_Users" + next +end diff --git a/configs/fortigate/vdom_Policy/vpn.cfg b/configs/fortigate/vdom_Policy/vpn.cfg new file mode 100644 index 0000000..8be82c5 --- /dev/null +++ b/configs/fortigate/vdom_Policy/vpn.cfg @@ -0,0 +1,299 @@ +config vpn certificate ca +end +config vpn certificate local + edit "Fortinet_CA_SSL" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_CA_Untrusted" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_SSL" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA4096" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA256" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA384" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA521" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED25519" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED448" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next +end +config vpn ssl web host-check-software + edit "FortiClient-AV" + set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7" + next + edit "FortiClient-FW" + set type fw + set guid "528CB157-D384-4593-AAAA-E42DFF111CED" + next + edit "FortiClient-AV-Vista" + set guid "385618A6-2256-708E-3FB9-7E98B93F91F9" + next + edit "FortiClient-FW-Vista" + set type fw + set guid "006D9983-6839-71D6-14E6-D7AD47ECD682" + next + edit "FortiClient5-AV" + set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7" + next + edit "AVG-Internet-Security-AV" + set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF" + next + edit "AVG-Internet-Security-FW" + set type fw + set guid "8DECF618-9569-4340-B34A-D78D28969B66" + next + edit "AVG-Internet-Security-AV-Vista-Win7" + set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82" + next + edit "AVG-Internet-Security-FW-Vista-Win7" + set type fw + set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9" + next + edit "CA-Anti-Virus" + set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93" + next + edit "CA-Internet-Security-AV" + set guid "6B98D35F-BB76-41C0-876B-A50645ED099A" + next + edit "CA-Internet-Security-FW" + set type fw + set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3" + next + edit "CA-Internet-Security-AV-Vista-Win7" + set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F" + next + edit "CA-Internet-Security-FW-Vista-Win7" + set type fw + set guid "06D680B0-4024-4FAB-E710-E675E50F6324" + next + edit "CA-Personal-Firewall" + set type fw + set guid "14CB4B80-8E52-45EA-905E-67C1267B4160" + next + edit "F-Secure-Internet-Security-AV" + set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15" + next + edit "F-Secure-Internet-Security-FW" + set type fw + set guid "D4747503-0346-49EB-9262-997542F79BF4" + next + edit "F-Secure-Internet-Security-AV-Vista-Win7" + set guid "15414183-282E-D62C-CA37-EF24860A2F17" + next + edit "F-Secure-Internet-Security-FW-Vista-Win7" + set type fw + set guid "2D7AC0A6-6241-D774-E168-461178D9686C" + next + edit "Kaspersky-AV" + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-FW" + set type fw + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-AV-Vista-Win7" + set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE" + next + edit "Kaspersky-FW-Vista-Win7" + set type fw + set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5" + next + edit "McAfee-Internet-Security-Suite-AV" + set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83" + next + edit "McAfee-Internet-Security-Suite-FW" + set type fw + set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8" + next + edit "McAfee-Internet-Security-Suite-AV-Vista-Win7" + set guid "86355677-4064-3EA7-ABB3-1B136EB04637" + next + edit "McAfee-Internet-Security-Suite-FW-Vista-Win7" + set type fw + set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C" + next + edit "McAfee-Virus-Scan-Enterprise" + set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0" + next + edit "Norton-360-2.0-AV" + set guid "A5F1BC7C-EA33-4247-961C-0217208396C4" + next + edit "Norton-360-2.0-FW" + set type fw + set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3" + next + edit "Norton-360-3.0-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-360-3.0-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-Internet-Security-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Norton-Internet-Security-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Symantec-Endpoint-Protection-AV" + set guid "FB06448E-52B8-493A-90F3-E43226D3305C" + next + edit "Symantec-Endpoint-Protection-FW" + set type fw + set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6" + next + edit "Symantec-Endpoint-Protection-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Symantec-Endpoint-Protection-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Panda-Antivirus+Firewall-2008-AV" + set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A" + next + edit "Panda-Antivirus+Firewall-2008-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Panda-Internet-Security-AV" + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2006~2007-FW" + set type fw + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2008~2009-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Sophos-Anti-Virus" + set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW" + set type fw + set guid "0786E95E-326A-4524-9691-41EF88FB52EA" + next + edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7" + set guid "479CCF92-4960-B3E0-7373-BF453B467D2C" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7" + set type fw + set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57" + next + edit "Trend-Micro-AV" + set guid "7D2296BC-32CC-4519-917E-52E652474AF5" + next + edit "Trend-Micro-FW" + set type fw + set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6" + next + edit "Trend-Micro-AV-Vista-Win7" + set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50" + next + edit "Trend-Micro-FW-Vista-Win7" + set type fw + set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B" + next + edit "ZoneAlarm-AV" + set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF" + next + edit "ZoneAlarm-FW" + set type fw + set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B" + next + edit "ZoneAlarm-AV-Vista-Win7" + set guid "D61596DF-D219-341C-49B3-AD30538CBC5B" + next + edit "ZoneAlarm-FW-Vista-Win7" + set type fw + set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20" + next + edit "ESET-Smart-Security-AV" + set guid "19259FAE-8396-A113-46DB-15B0E7DFA289" + next + edit "ESET-Smart-Security-FW" + set type fw + set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2" + next +end +config vpn ssl web portal + edit "full-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set web-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next + edit "web-access" + set web-mode enable + next + edit "tunnel-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next +end +config vpn ssl settings + set servercert "Fortinet_Factory" + set port 443 +end diff --git a/configs/fortigate/vdom_Policy/waf.cfg b/configs/fortigate/vdom_Policy/waf.cfg new file mode 100644 index 0000000..f434b0b --- /dev/null +++ b/configs/fortigate/vdom_Policy/waf.cfg @@ -0,0 +1,106 @@ +config waf profile + edit "default" + config signature + config main-class 100000000 + set action block + set severity high + end + config main-class 20000000 + end + config main-class 30000000 + set status enable + set action block + set severity high + end + config main-class 40000000 + end + config main-class 50000000 + set status enable + set action block + set severity high + end + config main-class 60000000 + end + config main-class 70000000 + set status enable + set action block + set severity high + end + config main-class 80000000 + set status enable + set severity low + end + config main-class 110000000 + set status enable + set severity high + end + config main-class 90000000 + set status enable + set action block + set severity high + end + set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002 + end + config constraint + config header-length + set status enable + set log enable + set severity low + end + config content-length + set status enable + set log enable + set severity low + end + config param-length + set status enable + set log enable + set severity low + end + config line-length + set status enable + set log enable + set severity low + end + config url-param-length + set status enable + set log enable + set severity low + end + config version + set log enable + end + config method + set action block + set log enable + end + config hostname + set action block + set log enable + end + config malformed + set log enable + end + config max-cookie + set status enable + set log enable + set severity low + end + config max-header-line + set status enable + set log enable + set severity low + end + config max-url-param + set status enable + set log enable + set severity low + end + config max-range-segment + set status enable + set log enable + set severity high + end + end + next +end diff --git a/configs/fortigate/vdom_Policy/wanopt.cfg b/configs/fortigate/vdom_Policy/wanopt.cfg new file mode 100644 index 0000000..0311127 --- /dev/null +++ b/configs/fortigate/vdom_Policy/wanopt.cfg @@ -0,0 +1,8 @@ +config wanopt settings + set host-id "default-id" +end +config wanopt profile + edit "default" + set comments "Default WANopt profile." + next +end diff --git a/configs/fortigate/vdom_Policy/web-proxy.cfg b/configs/fortigate/vdom_Policy/web-proxy.cfg new file mode 100644 index 0000000..c7ae766 --- /dev/null +++ b/configs/fortigate/vdom_Policy/web-proxy.cfg @@ -0,0 +1,3 @@ +config web-proxy global + set proxy-fqdn "default.fqdn" +end diff --git a/configs/fortigate/vdom_Policy/webfilter.cfg b/configs/fortigate/vdom_Policy/webfilter.cfg new file mode 100644 index 0000000..bfef10d --- /dev/null +++ b/configs/fortigate/vdom_Policy/webfilter.cfg @@ -0,0 +1,129 @@ +config webfilter ftgd-local-cat + edit "custom1" + set id 140 + next + edit "custom2" + set id 141 + next +end +config webfilter ips-urlfilter-setting +end +config webfilter ips-urlfilter-setting6 +end +config webfilter profile + edit "g-default" + set comment "Default web filtering." + next + edit "g-sniffer-profile" + set comment "Monitor web traffic." + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set options block-invalid-url + next +end +config webfilter search-engine + edit "g-baidu" + set hostname ".*\\.baidu\\.com" + set url "^\\/s?\\?" + set query "wd=" + next + edit "g-baidu2" + set hostname ".*\\.baidu\\.com" + set url "^\\/(ns|q|m|i|v)\\?" + set query "word=" + next + edit "g-baidu3" + set hostname "tieba\\.baidu\\.com" + set url "^\\/f\\?" + set query "kw=" + next + edit "g-bing" + set hostname ".*\\.bing\\..*" + set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" + set query "q=" + set safesearch header + next + edit "g-google" + set hostname ".*\\.google\\..*" + set url "^\\/((custom|search|images|videosearch|webhp)\\?)" + set query "q=" + set safesearch url + set safesearch-str "&safe=active" + next + edit "g-google-translate-1" + set hostname "translate\\.google\\..*" + set url "^\\/translate" + set query "u=" + set safesearch translate + next + edit "g-google-translate-2" + set hostname ".*\\.translate\\.goog" + set url "^\\/" + set safesearch translate + next + edit "g-twitter" + set hostname "twitter\\.com" + set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" + set query "variables=" + set safesearch translate + next + edit "g-vimeo" + set hostname ".*vimeo.*" + set url "^\\/search\\?" + set query "q=" + set safesearch header + next + edit "g-yahoo" + set hostname ".*\\.yahoo\\..*" + set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" + set query "p=" + set safesearch url + set safesearch-str "&vm=r" + next + edit "g-yandex" + set hostname "yandex\\..*" + set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" + set query "text=" + set safesearch url + set safesearch-str "&family=yes" + next + edit "g-youtube" + set hostname ".*youtube.*" + set safesearch header + next + edit "g-yt-channel" + set url "www.youtube.com/channel" + set safesearch yt-channel + next + edit "g-yt-pattern" + set url "youtube.com/channel/" + set safesearch yt-pattern + next + edit "g-yt-scan-1" + set url "www.youtube.com/user/" + set safesearch yt-scan + next + edit "g-yt-scan-2" + set url "www.youtube.com/youtubei/v1/browse" + set safesearch yt-scan + next + edit "g-yt-scan-3" + set url "www.youtube.com/youtubei/v1/player" + set safesearch yt-scan + next + edit "g-yt-scan-4" + set url "www.youtube.com/youtubei/v1/navigator" + set safesearch yt-scan + next + edit "translate" + set hostname "translate\\.google\\..*" + set url "^\\/translate\\?" + set query "u=" + set safesearch translate + next + edit "yt-video" + set url "www.youtube.com/watch" + set safesearch yt-video + next +end diff --git a/configs/fortigate/vdom_Policy/wireless-controller.cfg b/configs/fortigate/vdom_Policy/wireless-controller.cfg new file mode 100644 index 0000000..c084220 --- /dev/null +++ b/configs/fortigate/vdom_Policy/wireless-controller.cfg @@ -0,0 +1,43 @@ +config wireless-controller setting + set darrp-optimize-schedules "default-darrp-optimize" +end +config wireless-controller arrp-profile + edit "arrp-default" + next +end +config wireless-controller wids-profile + edit "default" + set comment "Default WIDS profile." + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + set wireless-bridge enable + set deauth-broadcast enable + set null-ssid-probe-resp enable + set long-duration-attack enable + set invalid-mac-oui enable + set weak-wep-iv enable + set auth-frame-flood enable + set assoc-frame-flood enable + set spoofed-deauth enable + set asleap-attack enable + set eapol-start-flood enable + set eapol-logoff-flood enable + set eapol-succ-flood enable + set eapol-fail-flood enable + set eapol-pre-succ-flood enable + set eapol-pre-fail-flood enable + next + edit "default-wids-apscan-enabled" + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + next +end +config wireless-controller ble-profile + edit "fortiap-discovery" + set advertising ibeacon eddystone-uid eddystone-url + next +end diff --git a/configs/fortigate/vdom_TEST/antivirus.cfg b/configs/fortigate/vdom_TEST/antivirus.cfg new file mode 100644 index 0000000..0b42758 --- /dev/null +++ b/configs/fortigate/vdom_TEST/antivirus.cfg @@ -0,0 +1,75 @@ +config antivirus settings + set machine-learning-detection enable + set grayware enable +end +config antivirus profile + edit "g-default" + set comment "Scan files and block viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-sniffer-profile" + set comment "Scan files and monitor viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next +end diff --git a/configs/fortigate/vdom_TEST/application.cfg b/configs/fortigate/vdom_TEST/application.cfg new file mode 100644 index 0000000..816ed80 --- /dev/null +++ b/configs/fortigate/vdom_TEST/application.cfg @@ -0,0 +1,29 @@ +config application list + edit "g-default" + set comment "Monitor all applications." + config entries + edit 1 + set action pass + next + end + next + edit "g-sniffer-profile" + set comment "Monitor all applications." + unset options + config entries + edit 1 + set action pass + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set deep-app-inspection disable + config entries + edit 1 + set action pass + set log disable + next + end + next +end diff --git a/configs/fortigate/vdom_TEST/dlp.cfg b/configs/fortigate/vdom_TEST/dlp.cfg new file mode 100644 index 0000000..2d8781f --- /dev/null +++ b/configs/fortigate/vdom_TEST/dlp.cfg @@ -0,0 +1,81 @@ +config dlp filepattern + edit 1 + set name "builtin-patterns" + config entries + edit "*.bat" + next + edit "*.com" + next + edit "*.dll" + next + edit "*.doc" + next + edit "*.exe" + next + edit "*.gz" + next + edit "*.hta" + next + edit "*.ppt" + next + edit "*.rar" + next + edit "*.scr" + next + edit "*.tar" + next + edit "*.tgz" + next + edit "*.vb?" + next + edit "*.wps" + next + edit "*.xl?" + next + edit "*.zip" + next + edit "*.pif" + next + edit "*.cpl" + next + end + next + edit 2 + set name "all_executables" + config entries + edit "bat" + set filter-type type + set file-type bat + next + edit "exe" + set filter-type type + set file-type exe + next + edit "elf" + set filter-type type + set file-type elf + next + edit "hta" + set filter-type type + set file-type hta + next + end + next +end +config dlp sensitivity + edit "Private" + next + edit "Critical" + next + edit "Warning" + next +end +config dlp sensor + edit "g-default" + set comment "Default sensor." + next + edit "g-sniffer-profile" + set comment "Log a summary of email and web traffic." + set summary-proto smtp pop3 imap http-get http-post + next +end diff --git a/configs/fortigate/vdom_TEST/dnsfilter.cfg b/configs/fortigate/vdom_TEST/dnsfilter.cfg new file mode 100644 index 0000000..634b4db --- /dev/null +++ b/configs/fortigate/vdom_TEST/dnsfilter.cfg @@ -0,0 +1,84 @@ +config dnsfilter profile + edit "default" + set comment "Default dns filtering." + config ftgd-dns + config filters + edit 1 + set category 2 + next + edit 2 + set category 7 + next + edit 3 + set category 8 + next + edit 4 + set category 9 + next + edit 5 + set category 11 + next + edit 6 + set category 12 + next + edit 7 + set category 13 + next + edit 8 + set category 14 + next + edit 9 + set category 15 + next + edit 10 + set category 16 + next + edit 11 + next + edit 12 + set category 57 + next + edit 13 + set category 63 + next + edit 14 + set category 64 + next + edit 15 + set category 65 + next + edit 16 + set category 66 + next + edit 17 + set category 67 + next + edit 18 + set category 26 + set action block + next + edit 19 + set category 61 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + set block-botnet enable + next +end diff --git a/configs/fortigate/vdom_TEST/emailfilter.cfg b/configs/fortigate/vdom_TEST/emailfilter.cfg new file mode 100644 index 0000000..df79721 --- /dev/null +++ b/configs/fortigate/vdom_TEST/emailfilter.cfg @@ -0,0 +1,20 @@ +config emailfilter profile + edit "default" + set comment "Malware and phishing URL filtering." + config imap + end + config pop3 + end + config smtp + end + next + edit "sniffer-profile" + set comment "Malware and phishing URL monitoring." + config imap + end + config pop3 + end + config smtp + end + next +end diff --git a/configs/fortigate/vdom_TEST/file-filter.cfg b/configs/fortigate/vdom_TEST/file-filter.cfg new file mode 100644 index 0000000..56fff32 --- /dev/null +++ b/configs/fortigate/vdom_TEST/file-filter.cfg @@ -0,0 +1,8 @@ +config file-filter profile + edit "g-default" + set comment "File type inspection." + next + edit "g-sniffer-profile" + set comment "File type inspection." + next +end diff --git a/configs/fortigate/vdom_TEST/firewall.cfg b/configs/fortigate/vdom_TEST/firewall.cfg new file mode 100644 index 0000000..f46e62f --- /dev/null +++ b/configs/fortigate/vdom_TEST/firewall.cfg @@ -0,0 +1,1229 @@ +config firewall address + edit "none" + set subnet 0.0.0.0 255.255.255.255 + next + edit "login.microsoftonline.com" + set type fqdn + set fqdn "login.microsoftonline.com" + next + edit "login.microsoft.com" + set type fqdn + set fqdn "login.microsoft.com" + next + edit "login.windows.net" + set type fqdn + set fqdn "login.windows.net" + next + edit "gmail.com" + set type fqdn + set fqdn "gmail.com" + next + edit "wildcard.google.com" + set type fqdn + set fqdn "*.google.com" + next + edit "wildcard.dropbox.com" + set type fqdn + set fqdn "*.dropbox.com" + next + edit "SSLVPN_TUNNEL_ADDR1" + set type iprange + set start-ip 10.212.134.200 + set end-ip 10.212.134.210 + next + edit "all" + next + edit "FIREWALL_AUTH_PORTAL_ADDRESS" + next + edit "FABRIC_DEVICE" + set comment "IPv4 addresses of Fabric Devices." + next + edit "FCTEMS_ALL_FORTICLOUD_SERVERS" + set type dynamic + set sub-type ems-tag + next + edit "10.0.0.0_8" + set subnet 10.0.0.0 255.0.0.0 + next + edit "192.168.0.0_16" + set subnet 192.168.0.0 255.255.0.0 + next + edit "172.16.0.0_12" + set subnet 172.16.0.0 255.240.0.0 + next + edit "Russia" + set type geography + set color 6 + set country "RU" + next + edit "China" + set type geography + set color 6 + set country "CN" + next + edit "Belarus" + set type geography + set color 6 + set country "BY" + next +end +config firewall multicast-address + edit "all_hosts" + set start-ip 224.0.0.1 + set end-ip 224.0.0.1 + next + edit "all_routers" + set start-ip 224.0.0.2 + set end-ip 224.0.0.2 + next + edit "Bonjour" + set start-ip 224.0.0.251 + set end-ip 224.0.0.251 + next + edit "EIGRP" + set start-ip 224.0.0.10 + set end-ip 224.0.0.10 + next + edit "OSPF" + set start-ip 224.0.0.5 + set end-ip 224.0.0.6 + next + edit "all" + set start-ip 224.0.0.0 + set end-ip 239.255.255.255 + next +end +config firewall address6 + edit "all" + next + edit "none" + set ip6 ::/128 + next + edit "SSLVPN_TUNNEL_IPv6_ADDR1" + set ip6 fdff:ffff::/120 + next +end +config firewall multicast-address6 + edit "all" + set ip6 ff00::/8 + next +end +config firewall addrgrp + edit "G Suite" + set member "gmail.com" "wildcard.google.com" + next + edit "Microsoft Office 365" + set member "login.microsoftonline.com" "login.microsoft.com" "login.windows.net" + next + edit "IPv4-Private-All-RFC1918" + set member "10.0.0.0_8" "172.16.0.0_12" "192.168.0.0_16" + next + edit "Geo_Block_Group" + set member "Belarus" "China" "Russia" + set color 6 + next +end +config firewall wildcard-fqdn custom + edit "g-Adobe Login" + set wildcard-fqdn "*.adobelogin.com" + next + edit "g-Gotomeeting" + set wildcard-fqdn "*.gotomeeting.com" + next + edit "g-Windows update 2" + set wildcard-fqdn "*.windowsupdate.com" + next + edit "g-adobe" + set wildcard-fqdn "*.adobe.com" + next + edit "g-android" + set wildcard-fqdn "*.android.com" + next + edit "g-apple" + set wildcard-fqdn "*.apple.com" + next + edit "g-appstore" + set wildcard-fqdn "*.appstore.com" + next + edit "g-auth.gfx.ms" + set wildcard-fqdn "*.auth.gfx.ms" + next + edit "g-autoupdate.opera.com" + set wildcard-fqdn "*autoupdate.opera.com" + next + edit "g-cdn-apple" + set wildcard-fqdn "*.cdn-apple.com" + next + edit "g-citrix" + set wildcard-fqdn "*.citrixonline.com" + next + edit "g-dropbox.com" + set wildcard-fqdn "*.dropbox.com" + next + edit "g-eease" + set wildcard-fqdn "*.eease.com" + next + edit "g-firefox update server" + set wildcard-fqdn "aus*.mozilla.org" + next + edit "g-fortinet" + set wildcard-fqdn "*.fortinet.com" + next + edit "g-google-drive" + set wildcard-fqdn "*drive.google.com" + next + edit "g-google-play" + set wildcard-fqdn "*play.google.com" + next + edit "g-google-play2" + set wildcard-fqdn "*.ggpht.com" + next + edit "g-google-play3" + set wildcard-fqdn "*.books.google.com" + next + edit "g-googleapis.com" + set wildcard-fqdn "*.googleapis.com" + next + edit "g-icloud" + set wildcard-fqdn "*.icloud.com" + next + edit "g-itunes" + set wildcard-fqdn "*itunes.apple.com" + next + edit "g-live.com" + set wildcard-fqdn "*.live.com" + next + edit "g-microsoft" + set wildcard-fqdn "*.microsoft.com" + next + edit "g-mzstatic-apple" + set wildcard-fqdn "*.mzstatic.com" + next + edit "g-skype" + set wildcard-fqdn "*.messenger.live.com" + next + edit "g-softwareupdate.vmware.com" + set wildcard-fqdn "*.softwareupdate.vmware.com" + next + edit "g-swscan.apple.com" + set wildcard-fqdn "*swscan.apple.com" + next + edit "g-update.microsoft.com" + set wildcard-fqdn "*update.microsoft.com" + next + edit "g-verisign" + set wildcard-fqdn "*.verisign.com" + next +end +config firewall service category + edit "General" + set comment "General services." + next + edit "Web Access" + set comment "Web access." + next + edit "File Access" + set comment "File access." + next + edit "Email" + set comment "Email services." + next + edit "Network Services" + set comment "Network services." + next + edit "Authentication" + set comment "Authentication service." + next + edit "Remote Access" + set comment "Remote access." + next + edit "Tunneling" + set comment "Tunneling service." + next + edit "VoIP, Messaging & Other Applications" + set comment "VoIP, messaging, and other applications." + next + edit "Web Proxy" + set comment "Explicit web proxy." + next +end +config firewall service custom + edit "DNS" + set category "Network Services" + set tcp-portrange 53 + set udp-portrange 53 + next + edit "HTTP" + set category "Web Access" + set tcp-portrange 80 + next + edit "HTTPS" + set category "Web Access" + set tcp-portrange 443 + next + edit "IMAP" + set category "Email" + set tcp-portrange 143 + next + edit "IMAPS" + set category "Email" + set tcp-portrange 993 + next + edit "LDAP" + set category "Authentication" + set tcp-portrange 389 + next + edit "DCE-RPC" + set category "Remote Access" + set tcp-portrange 135 + set udp-portrange 135 + next + edit "POP3" + set category "Email" + set tcp-portrange 110 + next + edit "POP3S" + set category "Email" + set tcp-portrange 995 + next + edit "SAMBA" + set category "File Access" + set tcp-portrange 139 + next + edit "SMTP" + set category "Email" + set tcp-portrange 25 + next + edit "SMTPS" + set category "Email" + set tcp-portrange 465 + next + edit "KERBEROS" + set category "Authentication" + set tcp-portrange 88 464 + set udp-portrange 88 464 + next + edit "LDAP_UDP" + set category "Authentication" + set udp-portrange 389 + next + edit "SMB" + set category "File Access" + set tcp-portrange 445 + next + edit "FTP" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_GET" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_PUT" + set category "File Access" + set tcp-portrange 21 + next + edit "ALL" + set category "General" + set protocol IP + next + edit "ALL_TCP" + set category "General" + set tcp-portrange 1-65535 + next + edit "ALL_UDP" + set category "General" + set udp-portrange 1-65535 + next + edit "ALL_ICMP" + set category "General" + set protocol ICMP + unset icmptype + next + edit "ALL_ICMP6" + set category "General" + set protocol ICMP6 + unset icmptype + next + edit "GRE" + set category "Tunneling" + set protocol IP + set protocol-number 47 + next + edit "AH" + set category "Tunneling" + set protocol IP + set protocol-number 51 + next + edit "ESP" + set category "Tunneling" + set protocol IP + set protocol-number 50 + next + edit "AOL" + set visibility disable + set tcp-portrange 5190-5194 + next + edit "BGP" + set category "Network Services" + set tcp-portrange 179 + next + edit "DHCP" + set category "Network Services" + set udp-portrange 67-68 + next + edit "FINGER" + set visibility disable + set tcp-portrange 79 + next + edit "GOPHER" + set visibility disable + set tcp-portrange 70 + next + edit "H323" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1720 1503 + set udp-portrange 1719 + next + edit "IKE" + set category "Tunneling" + set udp-portrange 500 4500 + next + edit "Internet-Locator-Service" + set visibility disable + set tcp-portrange 389 + next + edit "IRC" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 6660-6669 + next + edit "L2TP" + set category "Tunneling" + set tcp-portrange 1701 + set udp-portrange 1701 + next + edit "NetMeeting" + set visibility disable + set tcp-portrange 1720 + next + edit "NFS" + set category "File Access" + set tcp-portrange 111 2049 + set udp-portrange 111 2049 + next + edit "NNTP" + set visibility disable + set tcp-portrange 119 + next + edit "NTP" + set category "Network Services" + set tcp-portrange 123 + set udp-portrange 123 + next + edit "OSPF" + set category "Network Services" + set protocol IP + set protocol-number 89 + next + edit "PC-Anywhere" + set category "Remote Access" + set tcp-portrange 5631 + set udp-portrange 5632 + next + edit "PING" + set category "Network Services" + set protocol ICMP + set icmptype 8 + unset icmpcode + next + edit "TIMESTAMP" + set protocol ICMP + set visibility disable + set icmptype 13 + unset icmpcode + next + edit "INFO_REQUEST" + set protocol ICMP + set visibility disable + set icmptype 15 + unset icmpcode + next + edit "INFO_ADDRESS" + set protocol ICMP + set visibility disable + set icmptype 17 + unset icmpcode + next + edit "ONC-RPC" + set category "Remote Access" + set tcp-portrange 111 + set udp-portrange 111 + next + edit "PPTP" + set category "Tunneling" + set tcp-portrange 1723 + next + edit "QUAKE" + set visibility disable + set udp-portrange 26000 27000 27910 27960 + next + edit "RAUDIO" + set visibility disable + set udp-portrange 7070 + next + edit "REXEC" + set visibility disable + set tcp-portrange 512 + next + edit "RIP" + set category "Network Services" + set udp-portrange 520 + next + edit "RLOGIN" + set visibility disable + set tcp-portrange 513:512-1023 + next + edit "RSH" + set visibility disable + set tcp-portrange 514:512-1023 + next + edit "SCCP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 2000 + next + edit "SIP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 5060 + set udp-portrange 5060 + next + edit "SIP-MSNmessenger" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1863 + next + edit "SNMP" + set category "Network Services" + set tcp-portrange 161-162 + set udp-portrange 161-162 + next + edit "SSH" + set category "Remote Access" + set tcp-portrange 22 + next + edit "SYSLOG" + set category "Network Services" + set udp-portrange 514 + next + edit "TALK" + set visibility disable + set udp-portrange 517-518 + next + edit "TELNET" + set category "Remote Access" + set tcp-portrange 23 + next + edit "TFTP" + set category "File Access" + set udp-portrange 69 + next + edit "MGCP" + set visibility disable + set udp-portrange 2427 2727 + next + edit "UUCP" + set visibility disable + set tcp-portrange 540 + next + edit "VDOLIVE" + set visibility disable + set tcp-portrange 7000-7010 + next + edit "WAIS" + set visibility disable + set tcp-portrange 210 + next + edit "WINFRAME" + set visibility disable + set tcp-portrange 1494 2598 + next + edit "X-WINDOWS" + set category "Remote Access" + set tcp-portrange 6000-6063 + next + edit "PING6" + set protocol ICMP6 + set visibility disable + set icmptype 128 + unset icmpcode + next + edit "MS-SQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1433 1434 + next + edit "MYSQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 3306 + next + edit "RDP" + set category "Remote Access" + set tcp-portrange 3389 + next + edit "VNC" + set category "Remote Access" + set tcp-portrange 5900 + next + edit "DHCP6" + set category "Network Services" + set udp-portrange 546 547 + next + edit "SQUID" + set category "Tunneling" + set tcp-portrange 3128 + next + edit "SOCKS" + set category "Tunneling" + set tcp-portrange 1080 + set udp-portrange 1080 + next + edit "WINS" + set category "Remote Access" + set tcp-portrange 1512 + set udp-portrange 1512 + next + edit "RADIUS" + set category "Authentication" + set udp-portrange 1812 1813 + next + edit "RADIUS-OLD" + set visibility disable + set udp-portrange 1645 1646 + next + edit "CVSPSERVER" + set visibility disable + set tcp-portrange 2401 + set udp-portrange 2401 + next + edit "AFS3" + set category "File Access" + set tcp-portrange 7000-7009 + set udp-portrange 7000-7009 + next + edit "TRACEROUTE" + set category "Network Services" + set udp-portrange 33434-33535 + next + edit "RTSP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 554 7070 8554 + set udp-portrange 554 + next + edit "MMS" + set visibility disable + set tcp-portrange 1755 + set udp-portrange 1024-5000 + next + edit "NONE" + set visibility disable + set tcp-portrange 0 + next + edit "webproxy" + set proxy enable + set category "Web Proxy" + set protocol ALL + set tcp-portrange 0-65535:0-65535 + next +end +config firewall service group + edit "Email Access" + set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" + next + edit "Web Access" + set member "DNS" "HTTP" "HTTPS" + next + edit "Windows AD" + set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB" + next + edit "Exchange Server" + set member "DCE-RPC" "DNS" "HTTPS" + next +end +config firewall shaper traffic-shaper + edit "high-priority" + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "medium-priority" + set maximum-bandwidth 1048576 + set priority medium + set per-policy enable + next + edit "low-priority" + set maximum-bandwidth 1048576 + set priority low + set per-policy enable + next + edit "guarantee-100kbps" + set guaranteed-bandwidth 100 + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "shared-1M-pipe" + set maximum-bandwidth 1024 + next +end +config firewall schedule recurring + edit "always" + set day sunday monday tuesday wednesday thursday friday saturday + next + edit "none" + next + edit "default-darrp-optimize" + set start 01:00 + set end 01:30 + set day sunday monday tuesday wednesday thursday friday saturday + next +end +config firewall ippool + edit "Outside_Pool" + set startip 198.36.24.240 + set endip 198.36.24.241 + next +end +config firewall vip + edit "VIP_Webosphere" + set extip 198.36.24.16 + set mappedip "10.1.48.117" + set extintf "port10" + next +end +config firewall ssh local-key + edit "g-Fortinet_SSH_DSA1024" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA256" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA384" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA521" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ED25519" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_RSA2048" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh local-ca + edit "g-Fortinet_SSH_CA" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_CA_Untrusted" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh setting + set caname "g-Fortinet_SSH_CA" + set untrusted-caname "g-Fortinet_SSH_CA_Untrusted" + set hostkey-rsa2048 "g-Fortinet_SSH_RSA2048" + set hostkey-dsa1024 "g-Fortinet_SSH_DSA1024" + set hostkey-ecdsa256 "g-Fortinet_SSH_ECDSA256" + set hostkey-ecdsa384 "g-Fortinet_SSH_ECDSA384" + set hostkey-ecdsa521 "g-Fortinet_SSH_ECDSA521" + set hostkey-ed25519 "g-Fortinet_SSH_ED25519" +end +config firewall profile-protocol-options + edit "default" + set comment "All default services." + config http + set ports 80 + unset options + unset post-lang + end + config ftp + set ports 21 + set options splice + end + config imap + set ports 143 + set options fragmail + end + config mapi + set ports 135 + set options fragmail + end + config pop3 + set ports 110 + set options fragmail + end + config smtp + set ports 25 + set options fragmail splice + end + config nntp + set ports 119 + set options splice + end + config ssh + unset options + end + config dns + set ports 53 + end + config cifs + set ports 445 + unset options + end + next +end +config firewall ssl-ssh-profile + edit "certificate-inspection" + set comment "Read-only SSL handshake inspection profile." + config https + set ports 443 + set status certificate-inspection + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next + edit "deep-inspection" + set comment "Read-only deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "custom-deep-inspection" + set comment "Customizable deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "no-inspection" + set comment "Read-only profile that does no inspection." + config https + set status disable + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next +end +config firewall policy + edit 3 + set name "Block_Countries_In" + set srcintf "Outside_Zone" + set dstintf "Inside_Zone" + set srcaddr "Geo_Block_Group" + set dstaddr "all" + set schedule "always" + set service "ALL" + set logtraffic disable + set match-vip enable + next + edit 4 + set name "Block_Countries_Out" + set srcintf "Inside_Zone" + set dstintf "Outside_Zone" + set srcaddr "all" + set dstaddr "Geo_Block_Group" + set schedule "always" + set service "ALL" + set logtraffic disable + set match-vip enable + next + edit 2 + set name "Webosphere" + set srcintf "Outside_Zone" + set dstintf "Inside_Zone" + set action accept + set srcaddr "all" + set dstaddr "VIP_Webosphere" + set schedule "always" + set service "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "IPS_Test" + next + edit 1 + set name "Internet_Access" + set srcintf "Inside_Zone" + set dstintf "Outside_Zone" + set action accept + set srcaddr "IPv4-Private-All-RFC1918" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "g-default" + set nat enable + set ippool enable + set poolname "Outside_Pool" + next +end diff --git a/configs/fortigate/vdom_TEST/icap.cfg b/configs/fortigate/vdom_TEST/icap.cfg new file mode 100644 index 0000000..c731791 --- /dev/null +++ b/configs/fortigate/vdom_TEST/icap.cfg @@ -0,0 +1,14 @@ +config icap profile + edit "default" + config icap-headers + edit 1 + set name "X-Authenticated-User" + set content "$user" + next + edit 2 + set name "X-Authenticated-Groups" + set content "$local_grp" + next + end + next +end diff --git a/configs/fortigate/vdom_TEST/ips.cfg b/configs/fortigate/vdom_TEST/ips.cfg new file mode 100644 index 0000000..cb43115 --- /dev/null +++ b/configs/fortigate/vdom_TEST/ips.cfg @@ -0,0 +1,39 @@ +config ips sensor + edit "g-default" + set comment "Prevent critical attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-sniffer-profile" + set comment "Monitor IPS attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "IPS_Test" + set block-malicious-url enable + set scan-botnet-connections block + config entries + edit 1 + set severity medium high critical + set action block + next + end + next + edit "gdd-botnet C&C IP blocking" + set comment "This allows you to enable botnet blocking across all traffic that matches the policy by configuring one setting in the GUI" + next +end diff --git a/configs/fortigate/vdom_TEST/log.cfg b/configs/fortigate/vdom_TEST/log.cfg new file mode 100644 index 0000000..bb99ad9 --- /dev/null +++ b/configs/fortigate/vdom_TEST/log.cfg @@ -0,0 +1,80 @@ +config log threat-weight + config web + edit 1 + set category 26 + set level high + next + edit 2 + set category 61 + set level high + next + edit 3 + set category 86 + set level high + next + edit 4 + set category 1 + set level medium + next + edit 5 + set category 3 + set level medium + next + edit 6 + set category 4 + set level medium + next + edit 7 + set category 5 + set level medium + next + edit 8 + set category 6 + set level medium + next + edit 9 + set category 12 + set level medium + next + edit 10 + set category 59 + set level medium + next + edit 11 + set category 62 + set level medium + next + edit 12 + set category 83 + set level medium + next + edit 13 + set category 72 + next + edit 14 + set category 14 + next + edit 15 + set category 96 + set level medium + next + end + config application + edit 1 + set category 2 + next + edit 2 + set category 6 + set level medium + next + end +end +config log memory setting + set status enable +end +config log disk setting + set status disable +end +config log null-device setting + set status disable +end diff --git a/configs/fortigate/vdom_TEST/router.cfg b/configs/fortigate/vdom_TEST/router.cfg new file mode 100644 index 0000000..a82bcc4 --- /dev/null +++ b/configs/fortigate/vdom_TEST/router.cfg @@ -0,0 +1,96 @@ +config router rip + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ripng + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ospf + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ospf6 + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router bgp + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "static" + end + config redistribute "isis" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "static" + end + config redistribute6 "isis" + end +end +config router isis + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "static" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "bgp" + end + config redistribute6 "static" + end +end +config router multicast +end +end + diff --git a/configs/fortigate/vdom_TEST/switch-controller.cfg b/configs/fortigate/vdom_TEST/switch-controller.cfg new file mode 100644 index 0000000..2cc8def --- /dev/null +++ b/configs/fortigate/vdom_TEST/switch-controller.cfg @@ -0,0 +1,224 @@ +config switch-controller traffic-policy + edit "quarantine" + set description "Rate control for quarantined traffic" + set guaranteed-bandwidth 163840 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next + edit "sniffer" + set description "Rate control for sniffer mirrored traffic" + set guaranteed-bandwidth 50000 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next +end +config switch-controller security-policy 802-1X + edit "802-1X-policy-default" + set user-group "SSO_Guest_Users" + set mac-auth-bypass disable + set open-auth disable + set eap-passthru enable + set eap-auto-untagged-vlans enable + set guest-vlan disable + set auth-fail-vlan disable + set framevid-apply enable + set radius-timeout-overwrite disable + set authserver-timeout-vlan disable + next +end +config switch-controller security-policy local-access + edit "default" + set mgmt-allowaccess https ping ssh + set internal-allowaccess https ping ssh + next +end +config switch-controller lldp-profile + edit "default" + set med-tlvs inventory-management network-policy location-identification + set auto-isl disable + config med-network-policy + edit "voice" + next + edit "voice-signaling" + next + edit "guest-voice" + next + edit "guest-voice-signaling" + next + edit "softphone-voice" + next + edit "video-conferencing" + next + edit "streaming-video" + next + edit "video-signaling" + next + end + config med-location-service + edit "coordinates" + next + edit "address-civic" + next + edit "elin-number" + next + end + next + edit "default-auto-isl" + next + edit "default-auto-mclag-icl" + set auto-mclag-icl enable + next +end +config switch-controller qos dot1p-map + edit "voice-dot1p" + set priority-0 queue-4 + set priority-1 queue-4 + set priority-2 queue-3 + set priority-3 queue-2 + set priority-4 queue-3 + set priority-5 queue-1 + set priority-6 queue-2 + set priority-7 queue-2 + next +end +config switch-controller qos ip-dscp-map + edit "voice-dscp" + config map + edit "1" + set cos-queue 1 + set value 46 + next + edit "2" + set cos-queue 2 + set value 24,26,48,56 + next + edit "5" + set cos-queue 3 + set value 34 + next + end + next +end +config switch-controller qos queue-policy + edit "default" + set schedule round-robin + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + next + edit "queue-2" + next + edit "queue-3" + next + edit "queue-4" + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next + edit "voice-egress" + set schedule weighted + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + set weight 0 + next + edit "queue-2" + set weight 6 + next + edit "queue-3" + set weight 37 + next + edit "queue-4" + set weight 12 + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next +end +config switch-controller qos qos-policy + edit "default" + next + edit "voice-qos" + set trust-dot1p-map "voice-dot1p" + set trust-ip-dscp-map "voice-dscp" + set queue-policy "voice-egress" + next +end +config switch-controller storm-control-policy + edit "default" + set description "default storm control on all port" + next + edit "auto-config" + set description "storm control policy for fortilink-isl-icl port" + set storm-control-mode disabled + next +end +config switch-controller auto-config policy + edit "default" + next + edit "default-icl" + set poe-status disable + set igmp-flood-report enable + set igmp-flood-traffic enable + next +end +config switch-controller initial-config template + edit "_default" + set vlanid 1 + next + edit "quarantine" + set vlanid 4093 + set dhcp-server enable + next + edit "rspan" + set vlanid 4092 + set dhcp-server enable + next + edit "voice" + set vlanid 4091 + next + edit "video" + set vlanid 4090 + next + edit "onboarding" + set vlanid 4089 + next + edit "nac_segment" + set vlanid 4088 + set dhcp-server enable + next +end +config switch-controller switch-profile + edit "default" + next +end +config switch-controller ptp settings + set mode disable +end +config switch-controller ptp policy + edit "default" + set status enable + next +end +config switch-controller remote-log + edit "syslogd" + next + edit "syslogd2" + next +end diff --git a/configs/fortigate/vdom_TEST/system.cfg b/configs/fortigate/vdom_TEST/system.cfg new file mode 100644 index 0000000..9401113 --- /dev/null +++ b/configs/fortigate/vdom_TEST/system.cfg @@ -0,0 +1,97 @@ +config system object-tagging + edit "default" + next +end +config system settings + set h323-direct-model enable + set gui-advanced-policy enable +end +config system replacemsg-group + edit "default" + set comment "Default replacement message group." + next +end +config system zone + edit "Outside_Zone" + set interface "port10" + next + edit "Inside_Zone" + set interface "port9" + next +end +config system sdwan + config zone + edit "virtual-wan-link" + next + end + config health-check + edit "Default_DNS" + set system-dns enable + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Office_365" + set server "www.office.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Gmail" + set server "gmail.com" + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 2 + next + end + next + edit "Default_Google Search" + set server "www.google.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_FortiGuard" + set server "fortiguard.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + end +end diff --git a/configs/fortigate/vdom_TEST/user.cfg b/configs/fortigate/vdom_TEST/user.cfg new file mode 100644 index 0000000..1d9e649 --- /dev/null +++ b/configs/fortigate/vdom_TEST/user.cfg @@ -0,0 +1,7 @@ +config user setting + set auth-cert "Fortinet_Factory" +end +config user group + edit "SSO_Guest_Users" + next +end diff --git a/configs/fortigate/vdom_TEST/voip.cfg b/configs/fortigate/vdom_TEST/voip.cfg new file mode 100644 index 0000000..e9ec5b1 --- /dev/null +++ b/configs/fortigate/vdom_TEST/voip.cfg @@ -0,0 +1,38 @@ +config voip profile + edit "default" + set comment "Default VoIP profile." + next + edit "strict" + config sip + set malformed-request-line discard + set malformed-header-via discard + set malformed-header-from discard + set malformed-header-to discard + set malformed-header-call-id discard + set malformed-header-cseq discard + set malformed-header-rack discard + set malformed-header-rseq discard + set malformed-header-contact discard + set malformed-header-record-route discard + set malformed-header-route discard + set malformed-header-expires discard + set malformed-header-content-type discard + set malformed-header-content-length discard + set malformed-header-max-forwards discard + set malformed-header-allow discard + set malformed-header-p-asserted-identity discard + set malformed-header-sdp-v discard + set malformed-header-sdp-o discard + set malformed-header-sdp-s discard + set malformed-header-sdp-i discard + set malformed-header-sdp-c discard + set malformed-header-sdp-b discard + set malformed-header-sdp-z discard + set malformed-header-sdp-k discard + set malformed-header-sdp-a discard + set malformed-header-sdp-t discard + set malformed-header-sdp-r discard + set malformed-header-sdp-m discard + end + next +end diff --git a/configs/fortigate/vdom_TEST/vpn.cfg b/configs/fortigate/vdom_TEST/vpn.cfg new file mode 100644 index 0000000..8be82c5 --- /dev/null +++ b/configs/fortigate/vdom_TEST/vpn.cfg @@ -0,0 +1,299 @@ +config vpn certificate ca +end +config vpn certificate local + edit "Fortinet_CA_SSL" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_CA_Untrusted" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_SSL" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA4096" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA256" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA384" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA521" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED25519" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED448" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next +end +config vpn ssl web host-check-software + edit "FortiClient-AV" + set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7" + next + edit "FortiClient-FW" + set type fw + set guid "528CB157-D384-4593-AAAA-E42DFF111CED" + next + edit "FortiClient-AV-Vista" + set guid "385618A6-2256-708E-3FB9-7E98B93F91F9" + next + edit "FortiClient-FW-Vista" + set type fw + set guid "006D9983-6839-71D6-14E6-D7AD47ECD682" + next + edit "FortiClient5-AV" + set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7" + next + edit "AVG-Internet-Security-AV" + set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF" + next + edit "AVG-Internet-Security-FW" + set type fw + set guid "8DECF618-9569-4340-B34A-D78D28969B66" + next + edit "AVG-Internet-Security-AV-Vista-Win7" + set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82" + next + edit "AVG-Internet-Security-FW-Vista-Win7" + set type fw + set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9" + next + edit "CA-Anti-Virus" + set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93" + next + edit "CA-Internet-Security-AV" + set guid "6B98D35F-BB76-41C0-876B-A50645ED099A" + next + edit "CA-Internet-Security-FW" + set type fw + set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3" + next + edit "CA-Internet-Security-AV-Vista-Win7" + set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F" + next + edit "CA-Internet-Security-FW-Vista-Win7" + set type fw + set guid "06D680B0-4024-4FAB-E710-E675E50F6324" + next + edit "CA-Personal-Firewall" + set type fw + set guid "14CB4B80-8E52-45EA-905E-67C1267B4160" + next + edit "F-Secure-Internet-Security-AV" + set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15" + next + edit "F-Secure-Internet-Security-FW" + set type fw + set guid "D4747503-0346-49EB-9262-997542F79BF4" + next + edit "F-Secure-Internet-Security-AV-Vista-Win7" + set guid "15414183-282E-D62C-CA37-EF24860A2F17" + next + edit "F-Secure-Internet-Security-FW-Vista-Win7" + set type fw + set guid "2D7AC0A6-6241-D774-E168-461178D9686C" + next + edit "Kaspersky-AV" + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-FW" + set type fw + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-AV-Vista-Win7" + set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE" + next + edit "Kaspersky-FW-Vista-Win7" + set type fw + set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5" + next + edit "McAfee-Internet-Security-Suite-AV" + set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83" + next + edit "McAfee-Internet-Security-Suite-FW" + set type fw + set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8" + next + edit "McAfee-Internet-Security-Suite-AV-Vista-Win7" + set guid "86355677-4064-3EA7-ABB3-1B136EB04637" + next + edit "McAfee-Internet-Security-Suite-FW-Vista-Win7" + set type fw + set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C" + next + edit "McAfee-Virus-Scan-Enterprise" + set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0" + next + edit "Norton-360-2.0-AV" + set guid "A5F1BC7C-EA33-4247-961C-0217208396C4" + next + edit "Norton-360-2.0-FW" + set type fw + set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3" + next + edit "Norton-360-3.0-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-360-3.0-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-Internet-Security-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Norton-Internet-Security-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Symantec-Endpoint-Protection-AV" + set guid "FB06448E-52B8-493A-90F3-E43226D3305C" + next + edit "Symantec-Endpoint-Protection-FW" + set type fw + set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6" + next + edit "Symantec-Endpoint-Protection-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Symantec-Endpoint-Protection-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Panda-Antivirus+Firewall-2008-AV" + set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A" + next + edit "Panda-Antivirus+Firewall-2008-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Panda-Internet-Security-AV" + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2006~2007-FW" + set type fw + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2008~2009-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Sophos-Anti-Virus" + set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW" + set type fw + set guid "0786E95E-326A-4524-9691-41EF88FB52EA" + next + edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7" + set guid "479CCF92-4960-B3E0-7373-BF453B467D2C" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7" + set type fw + set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57" + next + edit "Trend-Micro-AV" + set guid "7D2296BC-32CC-4519-917E-52E652474AF5" + next + edit "Trend-Micro-FW" + set type fw + set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6" + next + edit "Trend-Micro-AV-Vista-Win7" + set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50" + next + edit "Trend-Micro-FW-Vista-Win7" + set type fw + set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B" + next + edit "ZoneAlarm-AV" + set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF" + next + edit "ZoneAlarm-FW" + set type fw + set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B" + next + edit "ZoneAlarm-AV-Vista-Win7" + set guid "D61596DF-D219-341C-49B3-AD30538CBC5B" + next + edit "ZoneAlarm-FW-Vista-Win7" + set type fw + set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20" + next + edit "ESET-Smart-Security-AV" + set guid "19259FAE-8396-A113-46DB-15B0E7DFA289" + next + edit "ESET-Smart-Security-FW" + set type fw + set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2" + next +end +config vpn ssl web portal + edit "full-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set web-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next + edit "web-access" + set web-mode enable + next + edit "tunnel-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next +end +config vpn ssl settings + set servercert "Fortinet_Factory" + set port 443 +end diff --git a/configs/fortigate/vdom_TEST/waf.cfg b/configs/fortigate/vdom_TEST/waf.cfg new file mode 100644 index 0000000..f434b0b --- /dev/null +++ b/configs/fortigate/vdom_TEST/waf.cfg @@ -0,0 +1,106 @@ +config waf profile + edit "default" + config signature + config main-class 100000000 + set action block + set severity high + end + config main-class 20000000 + end + config main-class 30000000 + set status enable + set action block + set severity high + end + config main-class 40000000 + end + config main-class 50000000 + set status enable + set action block + set severity high + end + config main-class 60000000 + end + config main-class 70000000 + set status enable + set action block + set severity high + end + config main-class 80000000 + set status enable + set severity low + end + config main-class 110000000 + set status enable + set severity high + end + config main-class 90000000 + set status enable + set action block + set severity high + end + set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002 + end + config constraint + config header-length + set status enable + set log enable + set severity low + end + config content-length + set status enable + set log enable + set severity low + end + config param-length + set status enable + set log enable + set severity low + end + config line-length + set status enable + set log enable + set severity low + end + config url-param-length + set status enable + set log enable + set severity low + end + config version + set log enable + end + config method + set action block + set log enable + end + config hostname + set action block + set log enable + end + config malformed + set log enable + end + config max-cookie + set status enable + set log enable + set severity low + end + config max-header-line + set status enable + set log enable + set severity low + end + config max-url-param + set status enable + set log enable + set severity low + end + config max-range-segment + set status enable + set log enable + set severity high + end + end + next +end diff --git a/configs/fortigate/vdom_TEST/wanopt.cfg b/configs/fortigate/vdom_TEST/wanopt.cfg new file mode 100644 index 0000000..0311127 --- /dev/null +++ b/configs/fortigate/vdom_TEST/wanopt.cfg @@ -0,0 +1,8 @@ +config wanopt settings + set host-id "default-id" +end +config wanopt profile + edit "default" + set comments "Default WANopt profile." + next +end diff --git a/configs/fortigate/vdom_TEST/web-proxy.cfg b/configs/fortigate/vdom_TEST/web-proxy.cfg new file mode 100644 index 0000000..c7ae766 --- /dev/null +++ b/configs/fortigate/vdom_TEST/web-proxy.cfg @@ -0,0 +1,3 @@ +config web-proxy global + set proxy-fqdn "default.fqdn" +end diff --git a/configs/fortigate/vdom_TEST/webfilter.cfg b/configs/fortigate/vdom_TEST/webfilter.cfg new file mode 100644 index 0000000..247c24d --- /dev/null +++ b/configs/fortigate/vdom_TEST/webfilter.cfg @@ -0,0 +1,584 @@ +config webfilter ftgd-local-cat + edit "custom1" + set id 140 + next + edit "custom2" + set id 141 + next +end +config webfilter ips-urlfilter-setting +end +config webfilter ips-urlfilter-setting6 +end +config webfilter profile + edit "g-default" + set comment "Default web filtering." + config ftgd-wf + unset options + config filters + edit 1 + set action block + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next + edit "g-sniffer-profile" + set comment "Monitor web traffic." + config ftgd-wf + config filters + edit 1 + next + edit 2 + set category 1 + next + edit 3 + set category 2 + next + edit 4 + set category 3 + next + edit 5 + set category 4 + next + edit 6 + set category 5 + next + edit 7 + set category 6 + next + edit 8 + set category 7 + next + edit 9 + set category 8 + next + edit 10 + set category 9 + next + edit 11 + set category 11 + next + edit 12 + set category 12 + next + edit 13 + set category 13 + next + edit 14 + set category 14 + next + edit 15 + set category 15 + next + edit 16 + set category 16 + next + edit 17 + set category 17 + next + edit 18 + set category 18 + next + edit 19 + set category 19 + next + edit 20 + set category 20 + next + edit 21 + set category 23 + next + edit 22 + set category 24 + next + edit 23 + set category 25 + next + edit 24 + set category 26 + next + edit 25 + set category 28 + next + edit 26 + set category 29 + next + edit 27 + set category 30 + next + edit 28 + set category 31 + next + edit 29 + set category 33 + next + edit 30 + set category 34 + next + edit 31 + set category 35 + next + edit 32 + set category 36 + next + edit 33 + set category 37 + next + edit 34 + set category 38 + next + edit 35 + set category 39 + next + edit 36 + set category 40 + next + edit 37 + set category 41 + next + edit 38 + set category 42 + next + edit 39 + set category 43 + next + edit 40 + set category 44 + next + edit 41 + set category 46 + next + edit 42 + set category 47 + next + edit 43 + set category 48 + next + edit 44 + set category 49 + next + edit 45 + set category 50 + next + edit 46 + set category 51 + next + edit 47 + set category 52 + next + edit 48 + set category 53 + next + edit 49 + set category 54 + next + edit 50 + set category 55 + next + edit 51 + set category 56 + next + edit 52 + set category 57 + next + edit 53 + set category 58 + next + edit 54 + set category 59 + next + edit 55 + set category 61 + next + edit 56 + set category 62 + next + edit 57 + set category 63 + next + edit 58 + set category 64 + next + edit 59 + set category 65 + next + edit 60 + set category 66 + next + edit 61 + set category 67 + next + edit 62 + set category 68 + next + edit 63 + set category 69 + next + edit 64 + set category 70 + next + edit 65 + set category 71 + next + edit 66 + set category 72 + next + edit 67 + set category 75 + next + edit 68 + set category 76 + next + edit 69 + set category 77 + next + edit 70 + set category 78 + next + edit 71 + set category 79 + next + edit 72 + set category 80 + next + edit 73 + set category 81 + next + edit 74 + set category 82 + next + edit 75 + set category 83 + next + edit 76 + set category 84 + next + edit 77 + set category 85 + next + edit 78 + set category 86 + next + edit 79 + set category 87 + next + edit 80 + set category 88 + next + edit 81 + set category 89 + next + edit 82 + set category 90 + next + edit 83 + set category 91 + next + edit 84 + set category 92 + next + edit 85 + set category 93 + next + edit 86 + set category 94 + next + edit 87 + set category 95 + next + end + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set options block-invalid-url + config ftgd-wf + unset options + config filters + edit 1 + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next +end +config webfilter search-engine + edit "g-baidu" + set hostname ".*\\.baidu\\.com" + set url "^\\/s?\\?" + set query "wd=" + next + edit "g-baidu2" + set hostname ".*\\.baidu\\.com" + set url "^\\/(ns|q|m|i|v)\\?" + set query "word=" + next + edit "g-baidu3" + set hostname "tieba\\.baidu\\.com" + set url "^\\/f\\?" + set query "kw=" + next + edit "g-bing" + set hostname ".*\\.bing\\..*" + set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" + set query "q=" + set safesearch header + next + edit "g-google" + set hostname ".*\\.google\\..*" + set url "^\\/((custom|search|images|videosearch|webhp)\\?)" + set query "q=" + set safesearch url + set safesearch-str "&safe=active" + next + edit "g-google-translate-1" + set hostname "translate\\.google\\..*" + set url "^\\/translate" + set query "u=" + set safesearch translate + next + edit "g-google-translate-2" + set hostname ".*\\.translate\\.goog" + set url "^\\/" + set safesearch translate + next + edit "g-twitter" + set hostname "twitter\\.com" + set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" + set query "variables=" + set safesearch translate + next + edit "g-vimeo" + set hostname ".*vimeo.*" + set url "^\\/search\\?" + set query "q=" + set safesearch header + next + edit "g-yahoo" + set hostname ".*\\.yahoo\\..*" + set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" + set query "p=" + set safesearch url + set safesearch-str "&vm=r" + next + edit "g-yandex" + set hostname "yandex\\..*" + set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" + set query "text=" + set safesearch url + set safesearch-str "&family=yes" + next + edit "g-youtube" + set hostname ".*youtube.*" + set safesearch header + next + edit "g-yt-channel" + set url "www.youtube.com/channel" + set safesearch yt-channel + next + edit "g-yt-pattern" + set url "youtube.com/channel/" + set safesearch yt-pattern + next + edit "g-yt-scan-1" + set url "www.youtube.com/user/" + set safesearch yt-scan + next + edit "g-yt-scan-2" + set url "www.youtube.com/youtubei/v1/browse" + set safesearch yt-scan + next + edit "g-yt-scan-3" + set url "www.youtube.com/youtubei/v1/player" + set safesearch yt-scan + next + edit "g-yt-scan-4" + set url "www.youtube.com/youtubei/v1/navigator" + set safesearch yt-scan + next + edit "translate" + set hostname "translate\\.google\\..*" + set url "^\\/translate\\?" + set query "u=" + set safesearch translate + next + edit "yt-video" + set url "www.youtube.com/watch" + set safesearch yt-video + next +end diff --git a/configs/fortigate/vdom_TEST/wireless-controller.cfg b/configs/fortigate/vdom_TEST/wireless-controller.cfg new file mode 100644 index 0000000..c084220 --- /dev/null +++ b/configs/fortigate/vdom_TEST/wireless-controller.cfg @@ -0,0 +1,43 @@ +config wireless-controller setting + set darrp-optimize-schedules "default-darrp-optimize" +end +config wireless-controller arrp-profile + edit "arrp-default" + next +end +config wireless-controller wids-profile + edit "default" + set comment "Default WIDS profile." + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + set wireless-bridge enable + set deauth-broadcast enable + set null-ssid-probe-resp enable + set long-duration-attack enable + set invalid-mac-oui enable + set weak-wep-iv enable + set auth-frame-flood enable + set assoc-frame-flood enable + set spoofed-deauth enable + set asleap-attack enable + set eapol-start-flood enable + set eapol-logoff-flood enable + set eapol-succ-flood enable + set eapol-fail-flood enable + set eapol-pre-succ-flood enable + set eapol-pre-fail-flood enable + next + edit "default-wids-apscan-enabled" + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + next +end +config wireless-controller ble-profile + edit "fortiap-discovery" + set advertising ibeacon eddystone-uid eddystone-url + next +end diff --git a/configs/fortigate/vdom_root/antivirus.cfg b/configs/fortigate/vdom_root/antivirus.cfg new file mode 100644 index 0000000..0b42758 --- /dev/null +++ b/configs/fortigate/vdom_root/antivirus.cfg @@ -0,0 +1,75 @@ +config antivirus settings + set machine-learning-detection enable + set grayware enable +end +config antivirus profile + edit "g-default" + set comment "Scan files and block viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-sniffer-profile" + set comment "Scan files and monitor viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next +end diff --git a/configs/fortigate/vdom_root/application.cfg b/configs/fortigate/vdom_root/application.cfg new file mode 100644 index 0000000..6241729 --- /dev/null +++ b/configs/fortigate/vdom_root/application.cfg @@ -0,0 +1,39 @@ +config application list + edit "g-default" + set comment "Monitor all applications." + config entries + edit 1 + set action pass + next + end + next + edit "g-sniffer-profile" + set comment "Monitor all applications." + unset options + config entries + edit 1 + set action pass + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set deep-app-inspection disable + config entries + edit 1 + set action pass + set log disable + next + end + next + edit "block-high-risk" + config entries + edit 1 + set category 2 6 + next + edit 2 + set action pass + next + end + next +end diff --git a/configs/fortigate/vdom_root/dlp.cfg b/configs/fortigate/vdom_root/dlp.cfg new file mode 100644 index 0000000..2b06ed4 --- /dev/null +++ b/configs/fortigate/vdom_root/dlp.cfg @@ -0,0 +1,149 @@ +config dlp filepattern + edit 1 + set name "builtin-patterns" + config entries + edit "*.bat" + next + edit "*.com" + next + edit "*.dll" + next + edit "*.doc" + next + edit "*.exe" + next + edit "*.gz" + next + edit "*.hta" + next + edit "*.ppt" + next + edit "*.rar" + next + edit "*.scr" + next + edit "*.tar" + next + edit "*.tgz" + next + edit "*.vb?" + next + edit "*.wps" + next + edit "*.xl?" + next + edit "*.zip" + next + edit "*.pif" + next + edit "*.cpl" + next + end + next + edit 2 + set name "all_executables" + config entries + edit "bat" + set filter-type type + set file-type bat + next + edit "exe" + set filter-type type + set file-type exe + next + edit "elf" + set filter-type type + set file-type elf + next + edit "hta" + set filter-type type + set file-type hta + next + end + next +end +config dlp sensitivity + edit "Private" + next + edit "Critical" + next + edit "Warning" + next +end +config dlp sensor + edit "g-default" + set comment "Default sensor." + next + edit "g-sniffer-profile" + set comment "Log a summary of email and web traffic." + set summary-proto smtp pop3 imap http-get http-post + next + edit "Content_Archive" + set feature-set proxy + set full-archive-proto smtp pop3 imap http-get http-post ftp nntp mapi + set summary-proto smtp pop3 imap http-get http-post ftp nntp mapi + next + edit "Content_Summary" + set feature-set proxy + set summary-proto smtp pop3 imap http-get http-post ftp nntp mapi + next + edit "Credit-Card" + set feature-set proxy + config filter + edit 1 + set name "Credit-Card-Filter" + set severity high + set proto smtp pop3 imap http-get http-post mapi + set action log-only + next + edit 2 + set name "Credit-Card-Filter" + set severity high + set type message + set proto smtp pop3 imap http-post mapi + set action log-only + next + end + next + edit "Large-File" + set feature-set proxy + config filter + edit 1 + set name "Large-File-Filter" + set proto smtp pop3 imap http-get http-post mapi + set filter-by file-size + set file-size 5120 + set action log-only + next + end + next + edit "SSN-Sensor" + set comment "Match SSN numbers but NOT WebEx invite emails." + set feature-set proxy + config filter + edit 1 + set name "SSN-Sensor-Filter" + set severity high + set type message + set proto smtp pop3 imap mapi + set filter-by regexp + set regexp "WebEx" + next + edit 2 + set name "SSN-Sensor-Filter" + set severity high + set type message + set proto smtp pop3 imap mapi + set filter-by ssn + set action log-only + next + edit 3 + set name "SSN-Sensor-Filter" + set severity high + set proto smtp pop3 imap http-get http-post ftp mapi + set filter-by ssn + set action log-only + next + end + next +end diff --git a/configs/fortigate/vdom_root/dnsfilter.cfg b/configs/fortigate/vdom_root/dnsfilter.cfg new file mode 100644 index 0000000..634b4db --- /dev/null +++ b/configs/fortigate/vdom_root/dnsfilter.cfg @@ -0,0 +1,84 @@ +config dnsfilter profile + edit "default" + set comment "Default dns filtering." + config ftgd-dns + config filters + edit 1 + set category 2 + next + edit 2 + set category 7 + next + edit 3 + set category 8 + next + edit 4 + set category 9 + next + edit 5 + set category 11 + next + edit 6 + set category 12 + next + edit 7 + set category 13 + next + edit 8 + set category 14 + next + edit 9 + set category 15 + next + edit 10 + set category 16 + next + edit 11 + next + edit 12 + set category 57 + next + edit 13 + set category 63 + next + edit 14 + set category 64 + next + edit 15 + set category 65 + next + edit 16 + set category 66 + next + edit 17 + set category 67 + next + edit 18 + set category 26 + set action block + next + edit 19 + set category 61 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + set block-botnet enable + next +end diff --git a/configs/fortigate/vdom_root/emailfilter.cfg b/configs/fortigate/vdom_root/emailfilter.cfg new file mode 100644 index 0000000..da23c8b --- /dev/null +++ b/configs/fortigate/vdom_root/emailfilter.cfg @@ -0,0 +1,20 @@ +config emailfilter profile + edit "sniffer-profile" + set comment "Malware and phishing URL monitoring." + config imap + end + config pop3 + end + config smtp + end + next + edit "default" + set comment "Malware and phishing URL filtering." + config imap + end + config pop3 + end + config smtp + end + next +end diff --git a/configs/fortigate/vdom_root/file-filter.cfg b/configs/fortigate/vdom_root/file-filter.cfg new file mode 100644 index 0000000..56fff32 --- /dev/null +++ b/configs/fortigate/vdom_root/file-filter.cfg @@ -0,0 +1,8 @@ +config file-filter profile + edit "g-default" + set comment "File type inspection." + next + edit "g-sniffer-profile" + set comment "File type inspection." + next +end diff --git a/configs/fortigate/vdom_root/firewall.cfg b/configs/fortigate/vdom_root/firewall.cfg new file mode 100644 index 0000000..37519bf --- /dev/null +++ b/configs/fortigate/vdom_root/firewall.cfg @@ -0,0 +1,1132 @@ +config firewall address + edit "none" + set subnet 0.0.0.0 255.255.255.255 + next + edit "login.microsoftonline.com" + set type fqdn + set fqdn "login.microsoftonline.com" + next + edit "login.microsoft.com" + set type fqdn + set fqdn "login.microsoft.com" + next + edit "login.windows.net" + set type fqdn + set fqdn "login.windows.net" + next + edit "gmail.com" + set type fqdn + set fqdn "gmail.com" + next + edit "wildcard.google.com" + set type fqdn + set fqdn "*.google.com" + next + edit "wildcard.dropbox.com" + set type fqdn + set fqdn "*.dropbox.com" + next + edit "all" + next + edit "FIREWALL_AUTH_PORTAL_ADDRESS" + next + edit "FABRIC_DEVICE" + set comment "IPv4 addresses of Fabric Devices." + next + edit "SSLVPN_TUNNEL_ADDR1" + set type iprange + set start-ip 10.212.134.200 + set end-ip 10.212.134.210 + next + edit "FCTEMS_ALL_FORTICLOUD_SERVERS" + set type dynamic + set sub-type ems-tag + next +end +config firewall multicast-address + edit "all" + set start-ip 224.0.0.0 + set end-ip 239.255.255.255 + next + edit "all_hosts" + set start-ip 224.0.0.1 + set end-ip 224.0.0.1 + next + edit "all_routers" + set start-ip 224.0.0.2 + set end-ip 224.0.0.2 + next + edit "Bonjour" + set start-ip 224.0.0.251 + set end-ip 224.0.0.251 + next + edit "EIGRP" + set start-ip 224.0.0.10 + set end-ip 224.0.0.10 + next + edit "OSPF" + set start-ip 224.0.0.5 + set end-ip 224.0.0.6 + next +end +config firewall address6 + edit "SSLVPN_TUNNEL_IPv6_ADDR1" + set ip6 fdff:ffff::/120 + next + edit "all" + next + edit "none" + set ip6 ::/128 + next +end +config firewall multicast-address6 + edit "all" + set ip6 ff00::/8 + next +end +config firewall addrgrp + edit "G Suite" + set member "gmail.com" "wildcard.google.com" + next + edit "Microsoft Office 365" + set member "login.microsoftonline.com" "login.microsoft.com" "login.windows.net" + next +end +config firewall wildcard-fqdn custom + edit "g-Adobe Login" + set wildcard-fqdn "*.adobelogin.com" + next + edit "g-Gotomeeting" + set wildcard-fqdn "*.gotomeeting.com" + next + edit "g-Windows update 2" + set wildcard-fqdn "*.windowsupdate.com" + next + edit "g-adobe" + set wildcard-fqdn "*.adobe.com" + next + edit "g-android" + set wildcard-fqdn "*.android.com" + next + edit "g-apple" + set wildcard-fqdn "*.apple.com" + next + edit "g-appstore" + set wildcard-fqdn "*.appstore.com" + next + edit "g-auth.gfx.ms" + set wildcard-fqdn "*.auth.gfx.ms" + next + edit "g-autoupdate.opera.com" + set wildcard-fqdn "*autoupdate.opera.com" + next + edit "g-cdn-apple" + set wildcard-fqdn "*.cdn-apple.com" + next + edit "g-citrix" + set wildcard-fqdn "*.citrixonline.com" + next + edit "g-dropbox.com" + set wildcard-fqdn "*.dropbox.com" + next + edit "g-eease" + set wildcard-fqdn "*.eease.com" + next + edit "g-firefox update server" + set wildcard-fqdn "aus*.mozilla.org" + next + edit "g-fortinet" + set wildcard-fqdn "*.fortinet.com" + next + edit "g-google-drive" + set wildcard-fqdn "*drive.google.com" + next + edit "g-google-play" + set wildcard-fqdn "*play.google.com" + next + edit "g-google-play2" + set wildcard-fqdn "*.ggpht.com" + next + edit "g-google-play3" + set wildcard-fqdn "*.books.google.com" + next + edit "g-googleapis.com" + set wildcard-fqdn "*.googleapis.com" + next + edit "g-icloud" + set wildcard-fqdn "*.icloud.com" + next + edit "g-itunes" + set wildcard-fqdn "*itunes.apple.com" + next + edit "g-live.com" + set wildcard-fqdn "*.live.com" + next + edit "g-microsoft" + set wildcard-fqdn "*.microsoft.com" + next + edit "g-mzstatic-apple" + set wildcard-fqdn "*.mzstatic.com" + next + edit "g-skype" + set wildcard-fqdn "*.messenger.live.com" + next + edit "g-softwareupdate.vmware.com" + set wildcard-fqdn "*.softwareupdate.vmware.com" + next + edit "g-swscan.apple.com" + set wildcard-fqdn "*swscan.apple.com" + next + edit "g-update.microsoft.com" + set wildcard-fqdn "*update.microsoft.com" + next + edit "g-verisign" + set wildcard-fqdn "*.verisign.com" + next +end +config firewall service category + edit "General" + set comment "General services." + next + edit "Web Access" + set comment "Web access." + next + edit "File Access" + set comment "File access." + next + edit "Email" + set comment "Email services." + next + edit "Network Services" + set comment "Network services." + next + edit "Authentication" + set comment "Authentication service." + next + edit "Remote Access" + set comment "Remote access." + next + edit "Tunneling" + set comment "Tunneling service." + next + edit "VoIP, Messaging & Other Applications" + set comment "VoIP, messaging, and other applications." + next + edit "Web Proxy" + set comment "Explicit web proxy." + next +end +config firewall service custom + edit "DNS" + set category "Network Services" + set tcp-portrange 53 + set udp-portrange 53 + next + edit "HTTP" + set category "Web Access" + set tcp-portrange 80 + next + edit "HTTPS" + set category "Web Access" + set tcp-portrange 443 + next + edit "IMAP" + set category "Email" + set tcp-portrange 143 + next + edit "IMAPS" + set category "Email" + set tcp-portrange 993 + next + edit "LDAP" + set category "Authentication" + set tcp-portrange 389 + next + edit "DCE-RPC" + set category "Remote Access" + set tcp-portrange 135 + set udp-portrange 135 + next + edit "POP3" + set category "Email" + set tcp-portrange 110 + next + edit "POP3S" + set category "Email" + set tcp-portrange 995 + next + edit "SAMBA" + set category "File Access" + set tcp-portrange 139 + next + edit "SMTP" + set category "Email" + set tcp-portrange 25 + next + edit "SMTPS" + set category "Email" + set tcp-portrange 465 + next + edit "KERBEROS" + set category "Authentication" + set tcp-portrange 88 464 + set udp-portrange 88 464 + next + edit "LDAP_UDP" + set category "Authentication" + set udp-portrange 389 + next + edit "SMB" + set category "File Access" + set tcp-portrange 445 + next + edit "FTP" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_GET" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_PUT" + set category "File Access" + set tcp-portrange 21 + next + edit "ALL" + set category "General" + set protocol IP + next + edit "ALL_TCP" + set category "General" + set tcp-portrange 1-65535 + next + edit "ALL_UDP" + set category "General" + set udp-portrange 1-65535 + next + edit "ALL_ICMP" + set category "General" + set protocol ICMP + unset icmptype + next + edit "ALL_ICMP6" + set category "General" + set protocol ICMP6 + unset icmptype + next + edit "GRE" + set category "Tunneling" + set protocol IP + set protocol-number 47 + next + edit "AH" + set category "Tunneling" + set protocol IP + set protocol-number 51 + next + edit "ESP" + set category "Tunneling" + set protocol IP + set protocol-number 50 + next + edit "AOL" + set visibility disable + set tcp-portrange 5190-5194 + next + edit "BGP" + set category "Network Services" + set tcp-portrange 179 + next + edit "DHCP" + set category "Network Services" + set udp-portrange 67-68 + next + edit "FINGER" + set visibility disable + set tcp-portrange 79 + next + edit "GOPHER" + set visibility disable + set tcp-portrange 70 + next + edit "H323" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1720 1503 + set udp-portrange 1719 + next + edit "IKE" + set category "Tunneling" + set udp-portrange 500 4500 + next + edit "Internet-Locator-Service" + set visibility disable + set tcp-portrange 389 + next + edit "IRC" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 6660-6669 + next + edit "L2TP" + set category "Tunneling" + set tcp-portrange 1701 + set udp-portrange 1701 + next + edit "NetMeeting" + set visibility disable + set tcp-portrange 1720 + next + edit "NFS" + set category "File Access" + set tcp-portrange 111 2049 + set udp-portrange 111 2049 + next + edit "NNTP" + set visibility disable + set tcp-portrange 119 + next + edit "NTP" + set category "Network Services" + set tcp-portrange 123 + set udp-portrange 123 + next + edit "OSPF" + set category "Network Services" + set protocol IP + set protocol-number 89 + next + edit "PC-Anywhere" + set category "Remote Access" + set tcp-portrange 5631 + set udp-portrange 5632 + next + edit "PING" + set category "Network Services" + set protocol ICMP + set icmptype 8 + unset icmpcode + next + edit "TIMESTAMP" + set protocol ICMP + set visibility disable + set icmptype 13 + unset icmpcode + next + edit "INFO_REQUEST" + set protocol ICMP + set visibility disable + set icmptype 15 + unset icmpcode + next + edit "INFO_ADDRESS" + set protocol ICMP + set visibility disable + set icmptype 17 + unset icmpcode + next + edit "ONC-RPC" + set category "Remote Access" + set tcp-portrange 111 + set udp-portrange 111 + next + edit "PPTP" + set category "Tunneling" + set tcp-portrange 1723 + next + edit "QUAKE" + set visibility disable + set udp-portrange 26000 27000 27910 27960 + next + edit "RAUDIO" + set visibility disable + set udp-portrange 7070 + next + edit "REXEC" + set visibility disable + set tcp-portrange 512 + next + edit "RIP" + set category "Network Services" + set udp-portrange 520 + next + edit "RLOGIN" + set visibility disable + set tcp-portrange 513:512-1023 + next + edit "RSH" + set visibility disable + set tcp-portrange 514:512-1023 + next + edit "SCCP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 2000 + next + edit "SIP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 5060 + set udp-portrange 5060 + next + edit "SIP-MSNmessenger" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1863 + next + edit "SNMP" + set category "Network Services" + set tcp-portrange 161-162 + set udp-portrange 161-162 + next + edit "SSH" + set category "Remote Access" + set tcp-portrange 22 + next + edit "SYSLOG" + set category "Network Services" + set udp-portrange 514 + next + edit "TALK" + set visibility disable + set udp-portrange 517-518 + next + edit "TELNET" + set category "Remote Access" + set tcp-portrange 23 + next + edit "TFTP" + set category "File Access" + set udp-portrange 69 + next + edit "MGCP" + set visibility disable + set udp-portrange 2427 2727 + next + edit "UUCP" + set visibility disable + set tcp-portrange 540 + next + edit "VDOLIVE" + set visibility disable + set tcp-portrange 7000-7010 + next + edit "WAIS" + set visibility disable + set tcp-portrange 210 + next + edit "WINFRAME" + set visibility disable + set tcp-portrange 1494 2598 + next + edit "X-WINDOWS" + set category "Remote Access" + set tcp-portrange 6000-6063 + next + edit "PING6" + set protocol ICMP6 + set visibility disable + set icmptype 128 + unset icmpcode + next + edit "MS-SQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1433 1434 + next + edit "MYSQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 3306 + next + edit "RDP" + set category "Remote Access" + set tcp-portrange 3389 + next + edit "VNC" + set category "Remote Access" + set tcp-portrange 5900 + next + edit "DHCP6" + set category "Network Services" + set udp-portrange 546 547 + next + edit "SQUID" + set category "Tunneling" + set tcp-portrange 3128 + next + edit "SOCKS" + set category "Tunneling" + set tcp-portrange 1080 + set udp-portrange 1080 + next + edit "WINS" + set category "Remote Access" + set tcp-portrange 1512 + set udp-portrange 1512 + next + edit "RADIUS" + set category "Authentication" + set udp-portrange 1812 1813 + next + edit "RADIUS-OLD" + set visibility disable + set udp-portrange 1645 1646 + next + edit "CVSPSERVER" + set visibility disable + set tcp-portrange 2401 + set udp-portrange 2401 + next + edit "AFS3" + set category "File Access" + set tcp-portrange 7000-7009 + set udp-portrange 7000-7009 + next + edit "TRACEROUTE" + set category "Network Services" + set udp-portrange 33434-33535 + next + edit "RTSP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 554 7070 8554 + set udp-portrange 554 + next + edit "MMS" + set visibility disable + set tcp-portrange 1755 + set udp-portrange 1024-5000 + next + edit "NONE" + set visibility disable + set tcp-portrange 0 + next + edit "webproxy" + set proxy enable + set category "Web Proxy" + set protocol ALL + set tcp-portrange 0-65535:0-65535 + next +end +config firewall service group + edit "Email Access" + set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" + next + edit "Web Access" + set member "DNS" "HTTP" "HTTPS" + next + edit "Windows AD" + set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB" + next + edit "Exchange Server" + set member "DCE-RPC" "DNS" "HTTPS" + next +end +config firewall shaper traffic-shaper + edit "high-priority" + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "medium-priority" + set maximum-bandwidth 1048576 + set priority medium + set per-policy enable + next + edit "low-priority" + set maximum-bandwidth 1048576 + set priority low + set per-policy enable + next + edit "guarantee-100kbps" + set guaranteed-bandwidth 100 + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "shared-1M-pipe" + set maximum-bandwidth 1024 + next +end +config firewall schedule recurring + edit "always" + set day sunday monday tuesday wednesday thursday friday saturday + next + edit "none" + next + edit "default-darrp-optimize" + set start 01:00 + set end 01:30 + set day sunday monday tuesday wednesday thursday friday saturday + next +end +config firewall ssh local-key + edit "g-Fortinet_SSH_DSA1024" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA256" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA384" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA521" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ED25519" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_RSA2048" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh local-ca + edit "g-Fortinet_SSH_CA" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_CA_Untrusted" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh setting + set caname "g-Fortinet_SSH_CA" + set untrusted-caname "g-Fortinet_SSH_CA_Untrusted" + set hostkey-rsa2048 "g-Fortinet_SSH_RSA2048" + set hostkey-dsa1024 "g-Fortinet_SSH_DSA1024" + set hostkey-ecdsa256 "g-Fortinet_SSH_ECDSA256" + set hostkey-ecdsa384 "g-Fortinet_SSH_ECDSA384" + set hostkey-ecdsa521 "g-Fortinet_SSH_ECDSA521" + set hostkey-ed25519 "g-Fortinet_SSH_ED25519" +end +config firewall profile-protocol-options + edit "default" + set comment "All default services." + config http + set ports 80 + unset options + unset post-lang + end + config ftp + set ports 21 + set options splice + end + config imap + set ports 143 + set options fragmail + end + config mapi + set ports 135 + set options fragmail + end + config pop3 + set ports 110 + set options fragmail + end + config smtp + set ports 25 + set options fragmail splice + end + config nntp + set ports 119 + set options splice + end + config ssh + unset options + end + config dns + set ports 53 + end + config cifs + set ports 445 + unset options + end + next +end +config firewall ssl-ssh-profile + edit "deep-inspection" + set comment "Read-only deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "custom-deep-inspection" + set comment "Customizable deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "no-inspection" + set comment "Read-only profile that does no inspection." + config https + set status disable + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next + edit "certificate-inspection" + set comment "Read-only SSL handshake inspection profile." + config https + set ports 443 + set status certificate-inspection + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next +end diff --git a/configs/fortigate/vdom_root/icap.cfg b/configs/fortigate/vdom_root/icap.cfg new file mode 100644 index 0000000..c731791 --- /dev/null +++ b/configs/fortigate/vdom_root/icap.cfg @@ -0,0 +1,14 @@ +config icap profile + edit "default" + config icap-headers + edit 1 + set name "X-Authenticated-User" + set content "$user" + next + edit 2 + set name "X-Authenticated-Groups" + set content "$local_grp" + next + end + next +end diff --git a/configs/fortigate/vdom_root/ips.cfg b/configs/fortigate/vdom_root/ips.cfg new file mode 100644 index 0000000..250607a --- /dev/null +++ b/configs/fortigate/vdom_root/ips.cfg @@ -0,0 +1,81 @@ +config ips sensor + edit "g-default" + set comment "Prevent critical attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-sniffer-profile" + set comment "Monitor IPS attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "all_default" + set comment "All predefined signatures with default setting." + config entries + edit 1 + next + end + next + edit "all_default_pass" + set comment "All predefined signatures with PASS action." + config entries + edit 1 + set action pass + next + end + next + edit "high_security" + set comment "Blocks all Critical/High/Medium and some Low severity vulnerabilities" + set block-malicious-url enable + config entries + edit 1 + set severity medium high critical + set status enable + set action block + next + edit 2 + set severity low + next + end + next + edit "protect_client" + set comment "Protect against client-side vulnerabilities." + config entries + edit 1 + set location client + next + end + next + edit "protect_email_server" + set comment "Protect against email server-side vulnerabilities." + config entries + edit 1 + set location server + set protocol SMTP POP3 IMAP + next + end + next + edit "protect_http_server" + set comment "Protect against HTTP server-side vulnerabilities." + config entries + edit 1 + set location server + set protocol HTTP + next + end + next +end diff --git a/configs/fortigate/vdom_root/log.cfg b/configs/fortigate/vdom_root/log.cfg new file mode 100644 index 0000000..a21ea5a --- /dev/null +++ b/configs/fortigate/vdom_root/log.cfg @@ -0,0 +1,86 @@ +config log threat-weight + config web + edit 1 + set category 26 + set level high + next + edit 2 + set category 61 + set level high + next + edit 3 + set category 86 + set level high + next + edit 4 + set category 1 + set level medium + next + edit 5 + set category 3 + set level medium + next + edit 6 + set category 4 + set level medium + next + edit 7 + set category 5 + set level medium + next + edit 8 + set category 6 + set level medium + next + edit 9 + set category 12 + set level medium + next + edit 10 + set category 59 + set level medium + next + edit 11 + set category 62 + set level medium + next + edit 12 + set category 83 + set level medium + next + edit 13 + set category 72 + next + edit 14 + set category 14 + next + edit 15 + set category 96 + set level medium + next + end + config application + edit 1 + set category 2 + next + edit 2 + set category 6 + set level medium + next + end +end +config log memory setting + set status enable +end +config log disk setting + set status disable +end +config log null-device setting + set status disable +end +config log setting + set local-in-allow enable + set local-in-deny-unicast enable + set local-in-deny-broadcast enable + set local-out enable +end diff --git a/configs/fortigate/vdom_root/router.cfg b/configs/fortigate/vdom_root/router.cfg new file mode 100644 index 0000000..1696ded --- /dev/null +++ b/configs/fortigate/vdom_root/router.cfg @@ -0,0 +1,102 @@ +config router rip + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ripng + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router static + edit 1 + set gateway 192.168.1.1 + set device "mgmt1" + next +end +config router ospf + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ospf6 + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router bgp + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "static" + end + config redistribute "isis" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "static" + end + config redistribute6 "isis" + end +end +config router isis + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "static" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "bgp" + end + config redistribute6 "static" + end +end +config router multicast +end +end + diff --git a/configs/fortigate/vdom_root/switch-controller.cfg b/configs/fortigate/vdom_root/switch-controller.cfg new file mode 100644 index 0000000..2cc8def --- /dev/null +++ b/configs/fortigate/vdom_root/switch-controller.cfg @@ -0,0 +1,224 @@ +config switch-controller traffic-policy + edit "quarantine" + set description "Rate control for quarantined traffic" + set guaranteed-bandwidth 163840 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next + edit "sniffer" + set description "Rate control for sniffer mirrored traffic" + set guaranteed-bandwidth 50000 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next +end +config switch-controller security-policy 802-1X + edit "802-1X-policy-default" + set user-group "SSO_Guest_Users" + set mac-auth-bypass disable + set open-auth disable + set eap-passthru enable + set eap-auto-untagged-vlans enable + set guest-vlan disable + set auth-fail-vlan disable + set framevid-apply enable + set radius-timeout-overwrite disable + set authserver-timeout-vlan disable + next +end +config switch-controller security-policy local-access + edit "default" + set mgmt-allowaccess https ping ssh + set internal-allowaccess https ping ssh + next +end +config switch-controller lldp-profile + edit "default" + set med-tlvs inventory-management network-policy location-identification + set auto-isl disable + config med-network-policy + edit "voice" + next + edit "voice-signaling" + next + edit "guest-voice" + next + edit "guest-voice-signaling" + next + edit "softphone-voice" + next + edit "video-conferencing" + next + edit "streaming-video" + next + edit "video-signaling" + next + end + config med-location-service + edit "coordinates" + next + edit "address-civic" + next + edit "elin-number" + next + end + next + edit "default-auto-isl" + next + edit "default-auto-mclag-icl" + set auto-mclag-icl enable + next +end +config switch-controller qos dot1p-map + edit "voice-dot1p" + set priority-0 queue-4 + set priority-1 queue-4 + set priority-2 queue-3 + set priority-3 queue-2 + set priority-4 queue-3 + set priority-5 queue-1 + set priority-6 queue-2 + set priority-7 queue-2 + next +end +config switch-controller qos ip-dscp-map + edit "voice-dscp" + config map + edit "1" + set cos-queue 1 + set value 46 + next + edit "2" + set cos-queue 2 + set value 24,26,48,56 + next + edit "5" + set cos-queue 3 + set value 34 + next + end + next +end +config switch-controller qos queue-policy + edit "default" + set schedule round-robin + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + next + edit "queue-2" + next + edit "queue-3" + next + edit "queue-4" + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next + edit "voice-egress" + set schedule weighted + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + set weight 0 + next + edit "queue-2" + set weight 6 + next + edit "queue-3" + set weight 37 + next + edit "queue-4" + set weight 12 + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next +end +config switch-controller qos qos-policy + edit "default" + next + edit "voice-qos" + set trust-dot1p-map "voice-dot1p" + set trust-ip-dscp-map "voice-dscp" + set queue-policy "voice-egress" + next +end +config switch-controller storm-control-policy + edit "default" + set description "default storm control on all port" + next + edit "auto-config" + set description "storm control policy for fortilink-isl-icl port" + set storm-control-mode disabled + next +end +config switch-controller auto-config policy + edit "default" + next + edit "default-icl" + set poe-status disable + set igmp-flood-report enable + set igmp-flood-traffic enable + next +end +config switch-controller initial-config template + edit "_default" + set vlanid 1 + next + edit "quarantine" + set vlanid 4093 + set dhcp-server enable + next + edit "rspan" + set vlanid 4092 + set dhcp-server enable + next + edit "voice" + set vlanid 4091 + next + edit "video" + set vlanid 4090 + next + edit "onboarding" + set vlanid 4089 + next + edit "nac_segment" + set vlanid 4088 + set dhcp-server enable + next +end +config switch-controller switch-profile + edit "default" + next +end +config switch-controller ptp settings + set mode disable +end +config switch-controller ptp policy + edit "default" + set status enable + next +end +config switch-controller remote-log + edit "syslogd" + next + edit "syslogd2" + next +end diff --git a/configs/fortigate/vdom_root/system.cfg b/configs/fortigate/vdom_root/system.cfg new file mode 100644 index 0000000..f339824 --- /dev/null +++ b/configs/fortigate/vdom_root/system.cfg @@ -0,0 +1,91 @@ +config system object-tagging + edit "default" + next +end +config system settings + set h323-direct-model enable + set gui-webfilter disable + set gui-dnsfilter disable +end +config system replacemsg-group + edit "default" + set comment "Default replacement message group." + next +end +config system dhcp server + edit 1 + set dns-service default + set default-gateway 192.168.200.1 + set netmask 255.255.255.0 + set interface "mgmt2" + config ip-range + edit 1 + set start-ip 192.168.200.2 + set end-ip 192.168.200.254 + next + end + next +end +config system sdwan + config zone + edit "virtual-wan-link" + next + end + config health-check + edit "Default_Office_365" + set server "www.office.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Gmail" + set server "gmail.com" + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 2 + next + end + next + edit "Default_Google Search" + set server "www.google.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_FortiGuard" + set server "fortiguard.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + end +end diff --git a/configs/fortigate/vdom_root/user.cfg b/configs/fortigate/vdom_root/user.cfg new file mode 100644 index 0000000..ee55839 --- /dev/null +++ b/configs/fortigate/vdom_root/user.cfg @@ -0,0 +1,24 @@ +config user fortitoken + edit "FTKMOB2134C905F9" + set license "FTMTRIAL03307A6F" + next + edit "FTKMOB21BF31F838" + set license "FTMTRIAL03307A6F" + next +end +config user local + edit "guest" + set type password + set passwd ENC xPBvzRl0fSM2uN3J7UIN5ZgsnzDN6HlyERGlWMjnJwiOPjoavEAA7GBbieLcGi6kdM3yKTs+HoV/KJp/wFrDo5phGDorttSDcqGGcEYeOsH68xCT+1/OTAlp8NsLaa50tbQ5ujQQjWHBuFoWYqK3xqu820+DvKAP8UOceD719WobX5wwC/mKmGbCpMeJO1JZxdStzQ== + next +end +config user setting + set auth-cert "Fortinet_Factory" +end +config user group + edit "SSO_Guest_Users" + next + edit "Guest-group" + set member "guest" + next +end diff --git a/configs/fortigate/vdom_root/voip.cfg b/configs/fortigate/vdom_root/voip.cfg new file mode 100644 index 0000000..e9ec5b1 --- /dev/null +++ b/configs/fortigate/vdom_root/voip.cfg @@ -0,0 +1,38 @@ +config voip profile + edit "default" + set comment "Default VoIP profile." + next + edit "strict" + config sip + set malformed-request-line discard + set malformed-header-via discard + set malformed-header-from discard + set malformed-header-to discard + set malformed-header-call-id discard + set malformed-header-cseq discard + set malformed-header-rack discard + set malformed-header-rseq discard + set malformed-header-contact discard + set malformed-header-record-route discard + set malformed-header-route discard + set malformed-header-expires discard + set malformed-header-content-type discard + set malformed-header-content-length discard + set malformed-header-max-forwards discard + set malformed-header-allow discard + set malformed-header-p-asserted-identity discard + set malformed-header-sdp-v discard + set malformed-header-sdp-o discard + set malformed-header-sdp-s discard + set malformed-header-sdp-i discard + set malformed-header-sdp-c discard + set malformed-header-sdp-b discard + set malformed-header-sdp-z discard + set malformed-header-sdp-k discard + set malformed-header-sdp-a discard + set malformed-header-sdp-t discard + set malformed-header-sdp-r discard + set malformed-header-sdp-m discard + end + next +end diff --git a/configs/fortigate/vdom_root/vpn.cfg b/configs/fortigate/vdom_root/vpn.cfg new file mode 100644 index 0000000..c582ac0 --- /dev/null +++ b/configs/fortigate/vdom_root/vpn.cfg @@ -0,0 +1,301 @@ +config vpn certificate ca +end +config vpn certificate local + edit "Fortinet_CA_SSL" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_CA_Untrusted" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_SSL" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA4096" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA256" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA384" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA521" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED25519" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED448" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next +end +config vpn ssl web host-check-software + edit "FortiClient-AV" + set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7" + next + edit "FortiClient-FW" + set type fw + set guid "528CB157-D384-4593-AAAA-E42DFF111CED" + next + edit "FortiClient-AV-Vista" + set guid "385618A6-2256-708E-3FB9-7E98B93F91F9" + next + edit "FortiClient-FW-Vista" + set type fw + set guid "006D9983-6839-71D6-14E6-D7AD47ECD682" + next + edit "FortiClient5-AV" + set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7" + next + edit "AVG-Internet-Security-AV" + set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF" + next + edit "AVG-Internet-Security-FW" + set type fw + set guid "8DECF618-9569-4340-B34A-D78D28969B66" + next + edit "AVG-Internet-Security-AV-Vista-Win7" + set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82" + next + edit "AVG-Internet-Security-FW-Vista-Win7" + set type fw + set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9" + next + edit "CA-Anti-Virus" + set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93" + next + edit "CA-Internet-Security-AV" + set guid "6B98D35F-BB76-41C0-876B-A50645ED099A" + next + edit "CA-Internet-Security-FW" + set type fw + set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3" + next + edit "CA-Internet-Security-AV-Vista-Win7" + set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F" + next + edit "CA-Internet-Security-FW-Vista-Win7" + set type fw + set guid "06D680B0-4024-4FAB-E710-E675E50F6324" + next + edit "CA-Personal-Firewall" + set type fw + set guid "14CB4B80-8E52-45EA-905E-67C1267B4160" + next + edit "F-Secure-Internet-Security-AV" + set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15" + next + edit "F-Secure-Internet-Security-FW" + set type fw + set guid "D4747503-0346-49EB-9262-997542F79BF4" + next + edit "F-Secure-Internet-Security-AV-Vista-Win7" + set guid "15414183-282E-D62C-CA37-EF24860A2F17" + next + edit "F-Secure-Internet-Security-FW-Vista-Win7" + set type fw + set guid "2D7AC0A6-6241-D774-E168-461178D9686C" + next + edit "Kaspersky-AV" + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-FW" + set type fw + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-AV-Vista-Win7" + set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE" + next + edit "Kaspersky-FW-Vista-Win7" + set type fw + set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5" + next + edit "McAfee-Internet-Security-Suite-AV" + set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83" + next + edit "McAfee-Internet-Security-Suite-FW" + set type fw + set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8" + next + edit "McAfee-Internet-Security-Suite-AV-Vista-Win7" + set guid "86355677-4064-3EA7-ABB3-1B136EB04637" + next + edit "McAfee-Internet-Security-Suite-FW-Vista-Win7" + set type fw + set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C" + next + edit "McAfee-Virus-Scan-Enterprise" + set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0" + next + edit "Norton-360-2.0-AV" + set guid "A5F1BC7C-EA33-4247-961C-0217208396C4" + next + edit "Norton-360-2.0-FW" + set type fw + set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3" + next + edit "Norton-360-3.0-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-360-3.0-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-Internet-Security-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Norton-Internet-Security-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Symantec-Endpoint-Protection-AV" + set guid "FB06448E-52B8-493A-90F3-E43226D3305C" + next + edit "Symantec-Endpoint-Protection-FW" + set type fw + set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6" + next + edit "Symantec-Endpoint-Protection-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Symantec-Endpoint-Protection-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Panda-Antivirus+Firewall-2008-AV" + set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A" + next + edit "Panda-Antivirus+Firewall-2008-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Panda-Internet-Security-AV" + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2006~2007-FW" + set type fw + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2008~2009-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Sophos-Anti-Virus" + set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW" + set type fw + set guid "0786E95E-326A-4524-9691-41EF88FB52EA" + next + edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7" + set guid "479CCF92-4960-B3E0-7373-BF453B467D2C" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7" + set type fw + set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57" + next + edit "Trend-Micro-AV" + set guid "7D2296BC-32CC-4519-917E-52E652474AF5" + next + edit "Trend-Micro-FW" + set type fw + set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6" + next + edit "Trend-Micro-AV-Vista-Win7" + set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50" + next + edit "Trend-Micro-FW-Vista-Win7" + set type fw + set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B" + next + edit "ZoneAlarm-AV" + set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF" + next + edit "ZoneAlarm-FW" + set type fw + set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B" + next + edit "ZoneAlarm-AV-Vista-Win7" + set guid "D61596DF-D219-341C-49B3-AD30538CBC5B" + next + edit "ZoneAlarm-FW-Vista-Win7" + set type fw + set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20" + next + edit "ESET-Smart-Security-AV" + set guid "19259FAE-8396-A113-46DB-15B0E7DFA289" + next + edit "ESET-Smart-Security-FW" + set type fw + set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2" + next +end +config vpn ssl web portal + edit "full-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set web-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next + edit "web-access" + set web-mode enable + next + edit "tunnel-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next +end +config vpn ssl settings + set servercert "Fortinet_Factory" + set port 443 +end +config vpn ocvpn +end diff --git a/configs/fortigate/vdom_root/waf.cfg b/configs/fortigate/vdom_root/waf.cfg new file mode 100644 index 0000000..39fde8d --- /dev/null +++ b/configs/fortigate/vdom_root/waf.cfg @@ -0,0 +1,116 @@ +config waf profile + edit "default" + config signature + config main-class 100000000 + set action block + set log disable + set severity high + end + config main-class 20000000 + set log disable + end + config main-class 30000000 + set status enable + set action block + set log disable + set severity high + end + config main-class 40000000 + set log disable + end + config main-class 50000000 + set status enable + set action block + set log disable + set severity high + end + config main-class 60000000 + set log disable + end + config main-class 70000000 + set status enable + set action block + set log disable + set severity high + end + config main-class 80000000 + set status enable + set log disable + set severity low + end + config main-class 110000000 + set status enable + set log disable + set severity high + end + config main-class 90000000 + set status enable + set action block + set log disable + set severity high + end + set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002 + end + config constraint + config header-length + set status enable + set log enable + set severity low + end + config content-length + set status enable + set log enable + set severity low + end + config param-length + set status enable + set log enable + set severity low + end + config line-length + set status enable + set log enable + set severity low + end + config url-param-length + set status enable + set log enable + set severity low + end + config version + set log enable + end + config method + set action block + set log enable + end + config hostname + set action block + set log enable + end + config malformed + set log enable + end + config max-cookie + set status enable + set log enable + set severity low + end + config max-header-line + set status enable + set log enable + set severity low + end + config max-url-param + set status enable + set log enable + set severity low + end + config max-range-segment + set status enable + set log enable + set severity high + end + end + next +end diff --git a/configs/fortigate/vdom_root/wanopt.cfg b/configs/fortigate/vdom_root/wanopt.cfg new file mode 100644 index 0000000..0311127 --- /dev/null +++ b/configs/fortigate/vdom_root/wanopt.cfg @@ -0,0 +1,8 @@ +config wanopt settings + set host-id "default-id" +end +config wanopt profile + edit "default" + set comments "Default WANopt profile." + next +end diff --git a/configs/fortigate/vdom_root/web-proxy.cfg b/configs/fortigate/vdom_root/web-proxy.cfg new file mode 100644 index 0000000..c7ae766 --- /dev/null +++ b/configs/fortigate/vdom_root/web-proxy.cfg @@ -0,0 +1,3 @@ +config web-proxy global + set proxy-fqdn "default.fqdn" +end diff --git a/configs/fortigate/vdom_root/webfilter.cfg b/configs/fortigate/vdom_root/webfilter.cfg new file mode 100644 index 0000000..25e99e0 --- /dev/null +++ b/configs/fortigate/vdom_root/webfilter.cfg @@ -0,0 +1,1336 @@ +config webfilter ftgd-local-cat + edit "custom1" + set id 140 + next + edit "custom2" + set id 141 + next +end +config webfilter ips-urlfilter-setting +end +config webfilter ips-urlfilter-setting6 +end +config webfilter profile + edit "g-default" + set comment "Default web filtering." + config ftgd-wf + unset options + config filters + edit 1 + set action block + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next + edit "g-sniffer-profile" + set comment "Monitor web traffic." + config ftgd-wf + config filters + edit 1 + next + edit 2 + set category 1 + next + edit 3 + set category 2 + next + edit 4 + set category 3 + next + edit 5 + set category 4 + next + edit 6 + set category 5 + next + edit 7 + set category 6 + next + edit 8 + set category 7 + next + edit 9 + set category 8 + next + edit 10 + set category 9 + next + edit 11 + set category 11 + next + edit 12 + set category 12 + next + edit 13 + set category 13 + next + edit 14 + set category 14 + next + edit 15 + set category 15 + next + edit 16 + set category 16 + next + edit 17 + set category 17 + next + edit 18 + set category 18 + next + edit 19 + set category 19 + next + edit 20 + set category 20 + next + edit 21 + set category 23 + next + edit 22 + set category 24 + next + edit 23 + set category 25 + next + edit 24 + set category 26 + next + edit 25 + set category 28 + next + edit 26 + set category 29 + next + edit 27 + set category 30 + next + edit 28 + set category 31 + next + edit 29 + set category 33 + next + edit 30 + set category 34 + next + edit 31 + set category 35 + next + edit 32 + set category 36 + next + edit 33 + set category 37 + next + edit 34 + set category 38 + next + edit 35 + set category 39 + next + edit 36 + set category 40 + next + edit 37 + set category 41 + next + edit 38 + set category 42 + next + edit 39 + set category 43 + next + edit 40 + set category 44 + next + edit 41 + set category 46 + next + edit 42 + set category 47 + next + edit 43 + set category 48 + next + edit 44 + set category 49 + next + edit 45 + set category 50 + next + edit 46 + set category 51 + next + edit 47 + set category 52 + next + edit 48 + set category 53 + next + edit 49 + set category 54 + next + edit 50 + set category 55 + next + edit 51 + set category 56 + next + edit 52 + set category 57 + next + edit 53 + set category 58 + next + edit 54 + set category 59 + next + edit 55 + set category 61 + next + edit 56 + set category 62 + next + edit 57 + set category 63 + next + edit 58 + set category 64 + next + edit 59 + set category 65 + next + edit 60 + set category 66 + next + edit 61 + set category 67 + next + edit 62 + set category 68 + next + edit 63 + set category 69 + next + edit 64 + set category 70 + next + edit 65 + set category 71 + next + edit 66 + set category 72 + next + edit 67 + set category 75 + next + edit 68 + set category 76 + next + edit 69 + set category 77 + next + edit 70 + set category 78 + next + edit 71 + set category 79 + next + edit 72 + set category 80 + next + edit 73 + set category 81 + next + edit 74 + set category 82 + next + edit 75 + set category 83 + next + edit 76 + set category 84 + next + edit 77 + set category 85 + next + edit 78 + set category 86 + next + edit 79 + set category 87 + next + edit 80 + set category 88 + next + edit 81 + set category 89 + next + edit 82 + set category 90 + next + edit 83 + set category 91 + next + edit 84 + set category 92 + next + edit 85 + set category 93 + next + edit 86 + set category 94 + next + edit 87 + set category 95 + next + end + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set options block-invalid-url + config ftgd-wf + unset options + config filters + edit 1 + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next + edit "default" + set comment "Default web filtering." + set feature-set proxy + config ftgd-wf + unset options + config filters + edit 1 + set action block + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next + edit "monitor-all" + set comment "Monitor and log all visited URLs, flow-based." + set feature-set proxy + config ftgd-wf + unset options + config filters + edit 1 + set category 1 + next + edit 2 + set category 3 + next + edit 3 + set category 4 + next + edit 4 + set category 5 + next + edit 5 + set category 6 + next + edit 6 + set category 12 + next + edit 7 + set category 59 + next + edit 8 + set category 62 + next + edit 9 + set category 83 + next + edit 10 + set category 2 + next + edit 11 + set category 7 + next + edit 12 + set category 8 + next + edit 13 + set category 9 + next + edit 14 + set category 11 + next + edit 15 + set category 13 + next + edit 16 + set category 14 + next + edit 17 + set category 15 + next + edit 18 + set category 16 + next + edit 19 + set category 57 + next + edit 20 + set category 63 + next + edit 21 + set category 64 + next + edit 22 + set category 65 + next + edit 23 + set category 66 + next + edit 24 + set category 67 + next + edit 25 + set category 19 + next + edit 26 + set category 24 + next + edit 27 + set category 25 + next + edit 28 + set category 72 + next + edit 29 + set category 75 + next + edit 30 + set category 76 + next + edit 31 + set category 26 + next + edit 32 + set category 61 + next + edit 33 + set category 86 + next + edit 34 + set category 17 + next + edit 35 + set category 18 + next + edit 36 + set category 20 + next + edit 37 + set category 23 + next + edit 38 + set category 28 + next + edit 39 + set category 29 + next + edit 40 + set category 30 + next + edit 41 + set category 33 + next + edit 42 + set category 34 + next + edit 43 + set category 35 + next + edit 44 + set category 36 + next + edit 45 + set category 37 + next + edit 46 + set category 38 + next + edit 47 + set category 39 + next + edit 48 + set category 40 + next + edit 49 + set category 42 + next + edit 50 + set category 44 + next + edit 51 + set category 46 + next + edit 52 + set category 47 + next + edit 53 + set category 48 + next + edit 54 + set category 54 + next + edit 55 + set category 55 + next + edit 56 + set category 58 + next + edit 57 + set category 68 + next + edit 58 + set category 69 + next + edit 59 + set category 70 + next + edit 60 + set category 71 + next + edit 61 + set category 77 + next + edit 62 + set category 78 + next + edit 63 + set category 79 + next + edit 64 + set category 80 + next + edit 65 + set category 82 + next + edit 66 + set category 85 + next + edit 67 + set category 87 + next + edit 68 + set category 31 + next + edit 69 + set category 41 + next + edit 70 + set category 43 + next + edit 71 + set category 49 + next + edit 72 + set category 50 + next + edit 73 + set category 51 + next + edit 74 + set category 52 + next + edit 75 + set category 53 + next + edit 76 + set category 56 + next + edit 77 + set category 81 + next + edit 78 + set category 84 + next + edit 79 + next + edit 80 + set category 88 + next + edit 81 + set category 89 + next + edit 82 + set category 90 + next + edit 83 + set category 91 + next + edit 84 + set category 92 + next + edit 85 + set category 93 + next + edit 86 + set category 94 + next + edit 87 + set category 95 + next + end + end + set log-all-url enable + set web-content-log disable + set web-filter-activex-log disable + set web-filter-command-block-log disable + set web-filter-cookie-log disable + set web-filter-applet-log disable + set web-filter-jscript-log disable + set web-filter-js-log disable + set web-filter-vbs-log disable + set web-filter-unknown-log disable + set web-filter-referer-log disable + set web-filter-cookie-removal-log disable + set web-url-log disable + set web-invalid-domain-log disable + set web-ftgd-err-log disable + set web-ftgd-quota-usage disable + next + edit "sniffer-profile" + set comment "Monitor web traffic." + config ftgd-wf + config filters + edit 1 + next + edit 2 + set category 1 + next + edit 3 + set category 2 + next + edit 4 + set category 3 + next + edit 5 + set category 4 + next + edit 6 + set category 5 + next + edit 7 + set category 6 + next + edit 8 + set category 7 + next + edit 9 + set category 8 + next + edit 10 + set category 9 + next + edit 11 + set category 11 + next + edit 12 + set category 12 + next + edit 13 + set category 13 + next + edit 14 + set category 14 + next + edit 15 + set category 15 + next + edit 16 + set category 16 + next + edit 17 + set category 17 + next + edit 18 + set category 18 + next + edit 19 + set category 19 + next + edit 20 + set category 20 + next + edit 21 + set category 23 + next + edit 22 + set category 24 + next + edit 23 + set category 25 + next + edit 24 + set category 26 + next + edit 25 + set category 28 + next + edit 26 + set category 29 + next + edit 27 + set category 30 + next + edit 28 + set category 31 + next + edit 29 + set category 33 + next + edit 30 + set category 34 + next + edit 31 + set category 35 + next + edit 32 + set category 36 + next + edit 33 + set category 37 + next + edit 34 + set category 38 + next + edit 35 + set category 39 + next + edit 36 + set category 40 + next + edit 37 + set category 41 + next + edit 38 + set category 42 + next + edit 39 + set category 43 + next + edit 40 + set category 44 + next + edit 41 + set category 46 + next + edit 42 + set category 47 + next + edit 43 + set category 48 + next + edit 44 + set category 49 + next + edit 45 + set category 50 + next + edit 46 + set category 51 + next + edit 47 + set category 52 + next + edit 48 + set category 53 + next + edit 49 + set category 54 + next + edit 50 + set category 55 + next + edit 51 + set category 56 + next + edit 52 + set category 57 + next + edit 53 + set category 58 + next + edit 54 + set category 59 + next + edit 55 + set category 61 + next + edit 56 + set category 62 + next + edit 57 + set category 63 + next + edit 58 + set category 64 + next + edit 59 + set category 65 + next + edit 60 + set category 66 + next + edit 61 + set category 67 + next + edit 62 + set category 68 + next + edit 63 + set category 69 + next + edit 64 + set category 70 + next + edit 65 + set category 71 + next + edit 66 + set category 72 + next + edit 67 + set category 75 + next + edit 68 + set category 76 + next + edit 69 + set category 77 + next + edit 70 + set category 78 + next + edit 71 + set category 79 + next + edit 72 + set category 80 + next + edit 73 + set category 81 + next + edit 74 + set category 82 + next + edit 75 + set category 83 + next + edit 76 + set category 84 + next + edit 77 + set category 85 + next + edit 78 + set category 86 + next + edit 79 + set category 87 + next + edit 80 + set category 88 + next + edit 81 + set category 89 + next + edit 82 + set category 90 + next + edit 83 + set category 91 + next + edit 84 + set category 92 + next + edit 85 + set category 93 + next + edit 86 + set category 94 + next + edit 87 + set category 95 + next + end + end + next + edit "wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set feature-set proxy + set options block-invalid-url + config ftgd-wf + unset options + config filters + edit 1 + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next +end +config webfilter search-engine + edit "g-baidu" + set hostname ".*\\.baidu\\.com" + set url "^\\/s?\\?" + set query "wd=" + next + edit "g-baidu2" + set hostname ".*\\.baidu\\.com" + set url "^\\/(ns|q|m|i|v)\\?" + set query "word=" + next + edit "g-baidu3" + set hostname "tieba\\.baidu\\.com" + set url "^\\/f\\?" + set query "kw=" + next + edit "g-bing" + set hostname ".*\\.bing\\..*" + set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" + set query "q=" + set safesearch header + next + edit "g-google" + set hostname ".*\\.google\\..*" + set url "^\\/((custom|search|images|videosearch|webhp)\\?)" + set query "q=" + set safesearch url + set safesearch-str "&safe=active" + next + edit "g-google-translate-1" + set hostname "translate\\.google\\..*" + set url "^\\/translate" + set query "u=" + set safesearch translate + next + edit "g-google-translate-2" + set hostname ".*\\.translate\\.goog" + set url "^\\/" + set safesearch translate + next + edit "g-twitter" + set hostname "twitter\\.com" + set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" + set query "variables=" + set safesearch translate + next + edit "g-vimeo" + set hostname ".*vimeo.*" + set url "^\\/search\\?" + set query "q=" + set safesearch header + next + edit "g-yahoo" + set hostname ".*\\.yahoo\\..*" + set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" + set query "p=" + set safesearch url + set safesearch-str "&vm=r" + next + edit "g-yandex" + set hostname "yandex\\..*" + set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" + set query "text=" + set safesearch url + set safesearch-str "&family=yes" + next + edit "g-youtube" + set hostname ".*youtube.*" + set safesearch header + next + edit "g-yt-channel" + set url "www.youtube.com/channel" + set safesearch yt-channel + next + edit "g-yt-pattern" + set url "youtube.com/channel/" + set safesearch yt-pattern + next + edit "g-yt-scan-1" + set url "www.youtube.com/user/" + set safesearch yt-scan + next + edit "g-yt-scan-2" + set url "www.youtube.com/youtubei/v1/browse" + set safesearch yt-scan + next + edit "g-yt-scan-3" + set url "www.youtube.com/youtubei/v1/player" + set safesearch yt-scan + next + edit "g-yt-scan-4" + set url "www.youtube.com/youtubei/v1/navigator" + set safesearch yt-scan + next + edit "translate" + set hostname "translate\\.google\\..*" + set url "^\\/translate\\?" + set query "u=" + set safesearch translate + next + edit "yt-video" + set url "www.youtube.com/watch" + set safesearch yt-video + next +end diff --git a/configs/fortigate/vdom_root/wireless-controller.cfg b/configs/fortigate/vdom_root/wireless-controller.cfg new file mode 100644 index 0000000..c084220 --- /dev/null +++ b/configs/fortigate/vdom_root/wireless-controller.cfg @@ -0,0 +1,43 @@ +config wireless-controller setting + set darrp-optimize-schedules "default-darrp-optimize" +end +config wireless-controller arrp-profile + edit "arrp-default" + next +end +config wireless-controller wids-profile + edit "default" + set comment "Default WIDS profile." + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + set wireless-bridge enable + set deauth-broadcast enable + set null-ssid-probe-resp enable + set long-duration-attack enable + set invalid-mac-oui enable + set weak-wep-iv enable + set auth-frame-flood enable + set assoc-frame-flood enable + set spoofed-deauth enable + set asleap-attack enable + set eapol-start-flood enable + set eapol-logoff-flood enable + set eapol-succ-flood enable + set eapol-fail-flood enable + set eapol-pre-succ-flood enable + set eapol-pre-fail-flood enable + next + edit "default-wids-apscan-enabled" + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + next +end +config wireless-controller ble-profile + edit "fortiap-discovery" + set advertising ibeacon eddystone-uid eddystone-url + next +end diff --git a/configs/fortigate/vdom_scsd/antivirus.cfg b/configs/fortigate/vdom_scsd/antivirus.cfg new file mode 100644 index 0000000..0b42758 --- /dev/null +++ b/configs/fortigate/vdom_scsd/antivirus.cfg @@ -0,0 +1,75 @@ +config antivirus settings + set machine-learning-detection enable + set grayware enable +end +config antivirus profile + edit "g-default" + set comment "Scan files and block viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-sniffer-profile" + set comment "Scan files and monitor viruses." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config http + set av-scan block + end + config ftp + set av-scan block + end + config imap + set av-scan block + set executables virus + end + config pop3 + set av-scan block + set executables virus + end + config smtp + set av-scan block + set executables virus + end + set outbreak-prevention-archive-scan disable + set external-blocklist-enable-all enable + next +end diff --git a/configs/fortigate/vdom_scsd/application.cfg b/configs/fortigate/vdom_scsd/application.cfg new file mode 100644 index 0000000..6df1c31 --- /dev/null +++ b/configs/fortigate/vdom_scsd/application.cfg @@ -0,0 +1,58 @@ +config application list + edit "g-default" + set comment "Monitor all applications." + config entries + edit 1 + set action pass + next + end + next + edit "g-sniffer-profile" + set comment "Monitor all applications." + unset options + config entries + edit 1 + set action pass + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set deep-app-inspection disable + config entries + edit 1 + set action pass + set log disable + next + end + next + edit "App_Ctrl_1" + set other-application-log enable + set unknown-application-log enable + config entries + edit 1 + set application 43541 48977 48976 47822 + set action pass + set log disable + next + edit 2 + set application 17405 + set action pass + set log disable + next + edit 3 + set application 39243 42662 16171 25953 38547 16270 + set action pass + set log disable + next + edit 4 + set category 2 6 + next + edit 5 + set category 25 + set action pass + set log disable + next + end + next +end diff --git a/configs/fortigate/vdom_scsd/dlp.cfg b/configs/fortigate/vdom_scsd/dlp.cfg new file mode 100644 index 0000000..2d8781f --- /dev/null +++ b/configs/fortigate/vdom_scsd/dlp.cfg @@ -0,0 +1,81 @@ +config dlp filepattern + edit 1 + set name "builtin-patterns" + config entries + edit "*.bat" + next + edit "*.com" + next + edit "*.dll" + next + edit "*.doc" + next + edit "*.exe" + next + edit "*.gz" + next + edit "*.hta" + next + edit "*.ppt" + next + edit "*.rar" + next + edit "*.scr" + next + edit "*.tar" + next + edit "*.tgz" + next + edit "*.vb?" + next + edit "*.wps" + next + edit "*.xl?" + next + edit "*.zip" + next + edit "*.pif" + next + edit "*.cpl" + next + end + next + edit 2 + set name "all_executables" + config entries + edit "bat" + set filter-type type + set file-type bat + next + edit "exe" + set filter-type type + set file-type exe + next + edit "elf" + set filter-type type + set file-type elf + next + edit "hta" + set filter-type type + set file-type hta + next + end + next +end +config dlp sensitivity + edit "Private" + next + edit "Critical" + next + edit "Warning" + next +end +config dlp sensor + edit "g-default" + set comment "Default sensor." + next + edit "g-sniffer-profile" + set comment "Log a summary of email and web traffic." + set summary-proto smtp pop3 imap http-get http-post + next +end diff --git a/configs/fortigate/vdom_scsd/dnsfilter.cfg b/configs/fortigate/vdom_scsd/dnsfilter.cfg new file mode 100644 index 0000000..3f15892 --- /dev/null +++ b/configs/fortigate/vdom_scsd/dnsfilter.cfg @@ -0,0 +1,160 @@ +config dnsfilter profile + edit "default" + set comment "Default dns filtering." + config ftgd-dns + config filters + edit 1 + set category 2 + next + edit 2 + set category 7 + next + edit 3 + set category 8 + next + edit 4 + set category 9 + next + edit 5 + set category 11 + next + edit 6 + set category 12 + next + edit 7 + set category 13 + next + edit 8 + set category 14 + next + edit 9 + set category 15 + next + edit 10 + set category 16 + next + edit 11 + next + edit 12 + set category 57 + next + edit 13 + set category 63 + next + edit 14 + set category 64 + next + edit 15 + set category 65 + next + edit 16 + set category 66 + next + edit 17 + set category 67 + next + edit 18 + set category 26 + set action block + next + edit 19 + set category 61 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + set block-botnet enable + next + edit "DNS_Profile" + set comment "Default dns filtering." + config ftgd-dns + set options error-allow + config filters + edit 1 + set category 12 + next + edit 2 + set category 2 + next + edit 3 + set category 7 + next + edit 4 + set category 8 + next + edit 5 + set category 9 + next + edit 6 + set category 11 + next + edit 7 + set category 13 + next + edit 8 + set category 14 + next + edit 9 + set category 15 + next + edit 10 + set category 16 + next + edit 11 + set category 57 + next + edit 12 + set category 63 + next + edit 13 + set category 64 + next + edit 14 + set category 65 + next + edit 15 + set category 66 + next + edit 16 + set category 67 + next + edit 17 + set category 26 + next + edit 18 + set category 61 + next + edit 19 + set category 86 + next + edit 20 + set category 88 + next + edit 21 + set category 90 + next + edit 22 + set category 91 + next + edit 23 + next + end + end + next +end diff --git a/configs/fortigate/vdom_scsd/emailfilter.cfg b/configs/fortigate/vdom_scsd/emailfilter.cfg new file mode 100644 index 0000000..df79721 --- /dev/null +++ b/configs/fortigate/vdom_scsd/emailfilter.cfg @@ -0,0 +1,20 @@ +config emailfilter profile + edit "default" + set comment "Malware and phishing URL filtering." + config imap + end + config pop3 + end + config smtp + end + next + edit "sniffer-profile" + set comment "Malware and phishing URL monitoring." + config imap + end + config pop3 + end + config smtp + end + next +end diff --git a/configs/fortigate/vdom_scsd/file-filter.cfg b/configs/fortigate/vdom_scsd/file-filter.cfg new file mode 100644 index 0000000..56fff32 --- /dev/null +++ b/configs/fortigate/vdom_scsd/file-filter.cfg @@ -0,0 +1,8 @@ +config file-filter profile + edit "g-default" + set comment "File type inspection." + next + edit "g-sniffer-profile" + set comment "File type inspection." + next +end diff --git a/configs/fortigate/vdom_scsd/firewall.cfg b/configs/fortigate/vdom_scsd/firewall.cfg new file mode 100644 index 0000000..605f176 --- /dev/null +++ b/configs/fortigate/vdom_scsd/firewall.cfg @@ -0,0 +1,6568 @@ +config firewall address + edit "SSLVPN_TUNNEL_ADDR1" + set type iprange + set start-ip 10.212.134.200 + set end-ip 10.212.134.210 + next + edit "all" + next + edit "FIREWALL_AUTH_PORTAL_ADDRESS" + next + edit "FABRIC_DEVICE" + set comment "IPv4 addresses of Fabric Devices." + next + edit "SRIC_BOCES_Firewall" + set comment "SRIC BOCES - Firewall" + set subnet 170.161.52.25 255.255.255.255 + next + edit "SRIC_BOCES_Server02" + set comment "SRIC BOCES - Server" + set subnet 170.161.52.27 255.255.255.255 + next + edit "Barracuda_Internal" + set comment "Barracuda Email Internal" + set subnet 10.1.40.7 255.255.255.255 + next + edit "CK-Australia-203" + set comment "ContentKeeper Australian Support" + set color 19 + set subnet 203.22.30.0 255.255.255.0 + next + edit "CK-North-America-173" + set comment "Content Keeper North American Support" + set color 19 + set subnet 173.60.169.48 255.255.255.240 + next + edit "CK-North-America-202" + set comment "ContentKeeper North American Support" + set color 19 + set subnet 202.166.186.0 255.255.255.0 + next + edit "CK-North-America-8" + set comment "ContentKeeper North American Support" + set color 19 + set subnet 8.19.154.0 255.255.255.0 + next + edit "Nimble_Inside_1" + set subnet 192.168.1.98 255.255.255.255 + next + edit "Nimble_Inside_2" + set subnet 192.168.1.1 255.255.255.255 + next + edit "Nimble_Inside_4" + set subnet 172.16.176.98 255.255.255.255 + next + edit "Nimble_Support" + set subnet 198.54.168.5 255.255.255.255 + next + edit "ReverseProxy" + set comment "Reverseproxy.scsd.ad for ess.scsd.us" + set subnet 10.1.18.126 255.255.255.255 + next + edit "SafeSchools_01" + set comment "IP address for Safe Schools video training. Used to access LDAP authentication." + set subnet 52.27.21.77 255.255.255.255 + next + edit "ckf01-ipmi-inside" + set comment "ContentKeeper Filter 01 IPMI Port" + set color 19 + set subnet 10.251.1.31 255.255.255.255 + next + edit "ckf01-mgmt-inside" + set comment "Content Keeper Filter 01 Management Port" + set color 19 + set subnet 10.251.1.21 255.255.255.255 + next + edit "ckf02-ipmi-inside" + set comment "ContentKeeper Filter 02 IPMI Port" + set color 19 + set subnet 10.251.1.32 255.255.255.255 + next + edit "ckf02-mgmt-inside" + set comment "ContentKeeper Filter 02 Management Port" + set color 19 + set subnet 10.251.1.22 255.255.255.255 + next + edit "cklb01-ipmi-inside" + set comment "ContentKeeper Load Balancer 01 IPMI Port" + set color 19 + set subnet 10.251.1.30 255.255.255.255 + next + edit "cklb01-mgmt-inside" + set comment "ContentKeeper Load Balancer 01 Management Port" + set color 19 + set subnet 10.251.1.20 255.255.255.255 + next + edit "ckm01-ipmi-inside" + set comment "ContentKeeper Mobile 01 IPMI Port" + set color 19 + set subnet 10.251.1.34 255.255.255.255 + next + edit "ckm01-mgmt1-inside" + set comment "ContentKeeper Mobile 01 Management Port 1" + set color 19 + set subnet 10.251.1.24 255.255.255.255 + next + edit "ckm01-mgmt2-inside" + set comment "ContentKeeper Mobile 01 Management Port 2" + set color 19 + set subnet 10.251.1.28 255.255.255.255 + next + edit "ckm02-ipmi-inside" + set comment "ContentKeeper Mobile 02 IPMI Port" + set color 19 + set subnet 10.251.1.35 255.255.255.255 + next + edit "ckm02-mgmt1-inside" + set comment "ContentKeeper Mobile 02 Management Port 1" + set color 19 + set subnet 10.251.1.25 255.255.255.255 + next + edit "ckm02-mgmt2-inside" + set comment "ContentKeeper Mobile 02 Management Port 2" + set color 19 + set subnet 10.251.1.29 255.255.255.255 + next + edit "ckm03-ipmi-inside" + set comment "ContentKeeper Mobile 03 IPMI Port" + set color 19 + set subnet 10.251.1.36 255.255.255.255 + next + edit "ckm03-mgmt1-inside" + set comment "ContentKeeper Mobile 03 Management Port 1" + set color 19 + set subnet 10.251.1.26 255.255.255.255 + next + edit "ckm03-mgmt2-inside" + set comment "ContentKeeper Mobile 03 Management Port 2" + set color 19 + set subnet 10.251.1.27 255.255.255.255 + next + edit "ckr01-ipmi-inside" + set comment "ContentKeeper Reporter 01 IPMI Port" + set color 19 + set subnet 10.251.1.33 255.255.255.255 + next + edit "ckr01-mgmt-inside" + set comment "ContentKeeper Reporter 01 Management Port" + set color 19 + set subnet 10.251.1.23 255.255.255.255 + next + edit "SPD_20_DrKing" + set comment "SPD Firewall STEAM at Dr King" + set color 2 + set subnet 10.20.70.10 255.255.255.255 + next + edit "SPD_21_Danforth" + set comment "SPD Firewall Brighton Academy" + set color 2 + set subnet 10.21.70.10 255.255.255.255 + next + edit "SPD_25_Frazer" + set comment "SPD Firewall Frazer" + set color 2 + set subnet 10.25.70.10 255.255.255.255 + next + edit "SPD_44_Seymour" + set comment "SPD Firewall Seymour" + set color 2 + set subnet 10.44.70.10 255.255.255.255 + next + edit "SPD_48_Beard" + set comment "SPD Firewall McCarthy at Beard" + set color 2 + set subnet 10.48.70.10 255.255.255.255 + next + edit "SPD_53_Blodgett" + set comment "SPD Firewall Syracuse STEM at Blodgett" + set color 2 + set subnet 10.53.70.10 255.255.255.255 + next + edit "SPD_56_SSC" + set comment "SPD Firewall School Service Center" + set color 2 + set subnet 10.56.70.10 255.255.255.255 + next + edit "SPD_09_Grant" + set comment "SPD Firewall Grant" + set color 2 + set subnet 10.9.70.10 255.255.255.255 + next + edit "z_BlockIP_001" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 103.117.232.198 255.255.255.255 + next + edit "z_BlockIP_002" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 103.122.33.58 255.255.255.255 + next + edit "z_BlockIP_003" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 103.207.169.78 255.255.255.255 + next + edit "z_BlockIP_004" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 104.139.74.25 255.255.255.255 + next + edit "z_BlockIP_005" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 107.173.6.251 255.255.255.255 + next + edit "z_BlockIP_006" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 107.175.69.34 255.255.255.255 + next + edit "z_BlockIP_007" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 119.92.23.203 255.255.255.255 + next + edit "z_BlockIP_103" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 13.111.22.133 255.255.255.255 + next + edit "z_BlockIP_008" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 131.0.142.120 255.255.255.255 + next + edit "z_BlockIP_009" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 131.196.184.141 255.255.255.255 + next + edit "z_BlockIP_010" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 138.121.24.78 255.255.255.255 + next + edit "z_BlockIP_011" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 138.59.233.5 255.255.255.255 + next + edit "z_BlockIP_012" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 146.185.219.45 255.255.255.255 + next + edit "z_BlockIP_013" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 146.196.122.152 255.255.255.255 + next + edit "z_BlockIP_014" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 146.196.122.167 255.255.255.255 + next + edit "z_BlockIP_015" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 149.154.70.202 255.255.255.255 + next + edit "z_BlockIP_104" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 151.80.88.253 255.255.255.255 + next + edit "z_BlockIP_105" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 152.89.245.207 255.255.255.255 + next + edit "z_BlockIP_106" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 152.89.245.212 255.255.255.255 + next + edit "z_BlockIP_016" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 158.69.85.206 255.255.255.255 + next + edit "z_BlockIP_107" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 162.255.119.159 255.255.255.255 + next + edit "z_BlockIP_017" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 163.121.188.3 255.255.255.255 + next + edit "z_BlockIP_108" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 164.132.138.130 255.255.255.255 + next + edit "z_BlockIP_018" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 164.132.216.41 255.255.255.255 + next + edit "z_BlockIP_019" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 168.227.229.112 255.255.255.255 + next + edit "z_BlockIP_020" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 170.78.99.190 255.255.255.255 + next + edit "z_BlockIP_021" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 170.84.78.186 255.255.255.255 + next + edit "z_BlockIP_109" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 176.126.83.149 255.255.255.255 + next + edit "z_BlockIP_022" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 177.103.240.149 255.255.255.255 + next + edit "z_BlockIP_023" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 177.107.51.162 255.255.255.255 + next + edit "z_BlockIP_024" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 177.124.37.208 255.255.255.255 + next + edit "z_BlockIP_025" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 177.36.5.7 255.255.255.255 + next + edit "z_BlockIP_026" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 177.52.79.29 255.255.255.255 + next + edit "z_BlockIP_027" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 177.8.172.86 255.255.255.255 + next + edit "z_BlockIP_111" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 178.157.82.145 255.255.255.255 + next + edit "z_BlockIP_112" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 178.157.82.80 255.255.255.255 + next + edit "z_BlockIP_028" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 179.189.241.254 255.255.255.255 + next + edit "z_BlockIP_029" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 180.250.197.188 255.255.255.255 + next + edit "z_BlockIP_030" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 181.115.168.69 255.255.255.255 + next + edit "z_BlockIP_031" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 181.129.140.140 255.255.255.255 + next + edit "z_BlockIP_032" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 181.129.49.98 255.255.255.255 + next + edit "z_BlockIP_033" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 181.129.93.226 255.255.255.255 + next + edit "z_BlockIP_034" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 181.196.61.110 255.255.255.255 + next + edit "z_BlockIP_035" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.117.119.163 255.255.255.255 + next + edit "z_BlockIP_113" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.117.73.76 255.255.255.255 + next + edit "z_BlockIP_114" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.135.81.147 255.255.255.255 + next + edit "z_BlockIP_115" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.141.27.243 255.255.255.255 + next + edit "z_BlockIP_116" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.172.129.147 255.255.255.255 + next + edit "z_BlockIP_117" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.175.156.13 255.255.255.255 + next + edit "z_BlockIP_118" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.180.198.141 255.255.255.255 + next + edit "z_BlockIP_119" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.224.134.124 255.255.255.255 + next + edit "z_BlockIP_036" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.251.39.9 255.255.255.255 + next + edit "z_BlockIP_037" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.43.6.87 255.255.255.255 + next + edit "z_BlockIP_120" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.65.202.115 255.255.255.255 + next + edit "z_BlockIP_038" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 185.86.150.130 255.255.255.255 + next + edit "z_BlockIP_039" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 186.138.152.228 255.255.255.255 + next + edit "z_BlockIP_040" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 186.183.199.114 255.255.255.255 + next + edit "z_BlockIP_041" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 186.226.188.105 255.255.255.255 + next + edit "z_BlockIP_042" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 186.42.186.202 255.255.255.255 + next + edit "z_BlockIP_043" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 186.42.226.46 255.255.255.255 + next + edit "z_BlockIP_044" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 187.110.100.122 255.255.255.255 + next + edit "z_BlockIP_045" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 187.58.56.26 255.255.255.255 + next + edit "z_BlockIP_046" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 189.80.134.122 255.255.255.255 + next + edit "z_BlockIP_047" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 190.13.160.19 255.255.255.255 + next + edit "z_BlockIP_048" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 190.152.4.210 255.255.255.255 + next + edit "z_BlockIP_049" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 190.154.203.218 255.255.255.255 + next + edit "z_BlockIP_122" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 191.101.251.141 255.255.255.255 + next + edit "z_BlockIP_050" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 191.101.251.146 255.255.255.255 + next + edit "z_BlockIP_051" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 191.37.181.152 255.255.255.255 + next + edit "z_BlockIP_125" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 193.187.172.99 255.255.255.255 + next + edit "z_BlockIP_126" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 193.9.60.148 255.255.255.255 + next + edit "z_BlockIP_052" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 194.1.237.76 255.255.255.255 + next + edit "z_BlockIP_053" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.123.212.139 255.255.255.255 + next + edit "z_BlockIP_054" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.123.238.13 255.255.255.255 + next + edit "z_BlockIP_055" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.123.243.167 255.255.255.255 + next + edit "z_BlockIP_056" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.123.245.47 255.255.255.255 + next + edit "z_BlockIP_057" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.123.246.188 255.255.255.255 + next + edit "z_BlockIP_127" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.161.114.191 255.255.255.255 + next + edit "z_BlockIP_128" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 195.161.62.25 255.255.255.255 + next + edit "z_BlockIP_129" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 198.23.208.16 255.255.255.255 + next + edit "z_BlockIP_130" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 198.46.190.37 255.255.255.255 + next + edit "z_BlockIP_131" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 200.35.56.81 255.255.255.255 + next + edit "z_BlockIP_058" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 201.184.69.50 255.255.255.255 + next + edit "CK-North-America-202_B" + set comment "Content Keeper North American Support" + set color 19 + set subnet 202.166.186.64 255.255.255.255 + next + edit "z_BlockIP_059" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 212.80.216.167 255.255.255.255 + next + edit "z_BlockIP_060" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 240.0.0.1 255.255.255.255 + next + edit "z_BlockIP_132" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 31.184.255.100 255.255.255.255 + next + edit "z_BlockIP_133" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 36.66.115.180 255.255.255.255 + next + edit "z_BlockIP_061" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 36.89.85.103 255.255.255.255 + next + edit "z_BlockIP_062" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 37.18.30.99 255.255.255.255 + next + edit "z_BlockIP_063" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 37.44.215.169 255.255.255.255 + next + edit "z_BlockIP_064" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.127.222.53 255.255.255.255 + next + edit "z_BlockIP_065" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.102 255.255.255.255 + next + edit "z_BlockIP_066" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.109 255.255.255.255 + next + edit "z_BlockIP_067" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.179 255.255.255.255 + next + edit "z_BlockIP_068" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.18 255.255.255.255 + next + edit "z_BlockIP_069" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.203 255.255.255.255 + next + edit "z_BlockIP_070" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.216 255.255.255.255 + next + edit "z_BlockIP_071" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.222 255.255.255.255 + next + edit "z_BlockIP_072" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.53 255.255.255.255 + next + edit "z_BlockIP_073" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.58 255.255.255.255 + next + edit "z_BlockIP_074" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.160.145.8 255.255.255.255 + next + edit "z_BlockIP_075" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.230.176.158 255.255.255.255 + next + edit "z_BlockIP_076" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 45.67.228.192 255.255.255.255 + next + edit "z_BlockIP_077" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 47.27.175.168 255.255.255.255 + next + edit "z_BlockIP_078" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 5.189.224.172 255.255.255.255 + next + edit "z_BlockIP_079" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 5.253.63.106 255.255.255.255 + next + edit "z_BlockIP_080" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 5.4.5.4 255.255.255.255 + next + edit "Safeschools_02" + set comment "IP address for Safe Schools video training. Used to access LDAP authentication." + set subnet 18.219.244.165 255.255.255.255 + next + edit "z_BlockIP_081" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 64.44.51.108 255.255.255.255 + next + edit "z_BlockIP_082" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 64.44.51.79 255.255.255.255 + next + edit "z_BlockIP_083" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 68.186.167.196 255.255.255.255 + next + edit "z_BlockIP_084" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 78.155.206.85 255.255.255.255 + next + edit "z_BlockIP_085" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 78.155.207.139 255.255.255.255 + next + edit "z_BlockIP_086" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 80.173.224.81 255.255.255.255 + next + edit "z_BlockIP_087" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 81.177.22.238 255.255.255.255 + next + edit "z_BlockIP_088" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 82.118.22.57 255.255.255.255 + next + edit "z_BlockIP_089" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 82.118.22.71 255.255.255.255 + next + edit "z_BlockIP_090" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 82.146.46.153 255.255.255.255 + next + edit "z_BlockIP_091" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 82.202.221.160 255.255.255.255 + next + edit "z_BlockIP_092" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 85.10.234.175 255.255.255.255 + next + edit "z_BlockIP_093" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 87.246.7.228 255.255.255.255 + next + edit "z_BlockIP_094" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 91.235.129.166 255.255.255.255 + next + edit "z_BlockIP_095" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 91.240.84.159 255.255.255.255 + next + edit "z_BlockIP_096" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 91.240.85.19 255.255.255.255 + next + edit "z_BlockIP_097" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 92.223.105.86 255.255.255.255 + next + edit "z_BlockIP_098" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 92.38.160.64 255.255.255.255 + next + edit "z_BlockIP_099" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 93.189.42.220 255.255.255.255 + next + edit "z_BlockIP_100" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 96.36.253.146 255.255.255.255 + next + edit "z_BlockIP_101" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 97.87.160.98 255.255.255.255 + next + edit "Internal_10.0.0.0_8" + set comment "Internal 10.0.0.0/8 Network" + set subnet 10.0.0.0 255.0.0.0 + next + edit "SCHC_Remote_Subnet_01" + set comment "Syracuse Community Health Center Remote Subnet" + set color 8 + set subnet 10.107.100.0 255.255.255.0 + next + edit "SCHC_Remote_Subnet_02" + set comment "Syracuse Community Health Center Remote Subnet" + set color 8 + set subnet 10.107.49.0 255.255.255.0 + next + edit "SCHC_Remote_Subnet_03" + set comment "Syracuse Community Health Center Remote Subnet" + set color 8 + set subnet 10.107.50.0 255.255.255.0 + next + edit "SCHC_15_HWSmith" + set comment "Syracuse Community Health Center HW Smith Subnet" + set color 8 + set subnet 10.15.107.0 255.255.255.0 + next + edit "SCHC_20_DrKing" + set comment "Syracuse Community Health Center Dr King Subnet" + set color 8 + set subnet 10.20.107.0 255.255.255.0 + next + edit "SCHC_22_Delaware" + set comment "Syracuse Community Health Center Delaware Subnet" + set color 8 + set subnet 10.22.107.0 255.255.255.0 + next + edit "SCHC_24_Franklin" + set comment "Syracuse Community Health Center Franklin Subnet" + set color 8 + set subnet 10.24.107.0 255.255.255.0 + next + edit "SCHC_03_PSLA" + set comment "Syracuse Community Health Center PSLA Subnet" + set color 8 + set subnet 10.3.107.0 255.255.255.0 + next + edit "SCHC_34_DrWeeks" + set comment "Syracuse Community Health Center Dr Weeks Subnet" + set color 8 + set subnet 10.34.107.0 255.255.255.0 + next + edit "SCHC_53_Blodgett" + set comment "Syracuse Community Health Center Blodgett Subnet" + set color 8 + set subnet 10.53.107.0 255.255.255.0 + next + edit "SCHC_09_Grant" + set comment "Syracuse Community Health Center Grant Subnet" + set color 8 + set subnet 10.9.107.0 255.255.255.0 + next + edit "z_BlockSub_001" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 103.139.219.0 255.255.255.0 + next + edit "z_BlockSub_002" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 103.89.88.0 255.255.252.0 + next + edit "z_BlockSub_003" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 104.140.0.0 255.255.0.0 + next + edit "z_BlockSub_004" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 104.143.83.0 255.255.255.0 + next + edit "z_BlockSub_005" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 104.206.0.0 255.255.0.0 + next + edit "z_BlockSub_006" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 107.189.8.0 255.255.252.0 + next + edit "z_BlockSub_007" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 108.179.192.0 255.255.192.0 + next + edit "z_BlockSub_008" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 112.24.0.0 255.248.0.0 + next + edit "z_BlockSub_009" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 115.220.0.0 255.255.0.0 + next + edit "z_BlockSub_010" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 120.52.0.0 255.255.0.0 + next + edit "z_BlockSub_011" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 120.55.0.0 255.255.0.0 + next + edit "z_BlockSub_012" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 125.64.0.0 255.248.0.0 + next + edit "z_BlockSub_013" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 150.107.103.0 255.255.255.0 + next + edit "z_BlockSub_014" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 162.244.80.0 255.255.252.0 + next + edit "z_BlockSub_015" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 162.247.72.0 255.255.252.0 + next + edit "z_BlockSub_016" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 162.255.116.0 255.255.252.0 + next + edit "z_BlockSub_017" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 170.130.184.0 255.255.252.0 + next + edit "Internal_172.16.0.0_12" + set comment "Internal_172.16.0.0_12 Network" + set subnet 172.16.0.0 255.240.0.0 + next + edit "z_BlockSub_019" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 172.246.0.0 255.255.0.0 + next + edit "z_BlockSub_020" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 177.0.0.0 255.0.0.0 + next + edit "z_BlockSub_021" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 184.104.0.0 255.254.0.0 + next + edit "Internal_192.168.0.0_16" + set comment "Internal_192.168.0.0_16 Network" + set subnet 192.168.0.0 255.255.0.0 + next + edit "z_BlockSub_022" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 198.108.0.0 255.252.0.0 + next + edit "z_BlockSub_024" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 199.249.230.0 255.255.255.0 + next + edit "z_BlockSub_025" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 199.59.240.0 255.255.252.0 + next + edit "z_BlockSub_026" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 202.28.0.0 255.254.0.0 + next + edit "z_BlockSub_027" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 209.141.32.0 255.255.224.0 + next + edit "z_BlockSub_028" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 209.53.0.0 255.255.0.0 + next + edit "z_BlockSub_029" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 217.0.0.0 255.0.0.0 + next + edit "z_BlockSub_030" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 218.102.96.0 255.255.224.0 + next + edit "z_BlockSub_031" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 23.129.64.0 255.255.255.0 + next + edit "z_BlockSub_032" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 23.227.128.0 255.255.224.0 + next + edit "z_BlockSub_033" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 35.0.0.0 255.255.0.0 + next + edit "z_BlockSub_034" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 38.39.24.0 255.255.248.0 + next + edit "z_BlockSub_035" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 45.224.0.0 255.240.0.0 + next + edit "z_BlockSub_037" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 71.244.60.224 255.255.255.240 + next + edit "z_BlockSub_038" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 71.64.0.0 255.240.0.0 + next + edit "z_BlockSub_039" + set comment "Malicious Subnet" + set associated-interface "outside" + set color 6 + set subnet 80.0.0.0 255.0.0.0 + next + edit "nimble_Inside_3" + set subnet 172.16.175.98 255.255.255.255 + next + edit "ntss-inside" + set comment "NTSS" + set subnet 10.1.48.68 255.255.255.255 + next + edit "city_permited_subnet_1" + set comment "***Needs to be narrowed***" + set color 28 + set subnet 10.1.0.0 255.255.0.0 + next + edit "city_permited_subnet_3" + set comment "***Needs to be examined***" + set color 28 + set subnet 10.1.50.0 255.255.255.0 + next + edit "city_permited_subnet_4" + set comment "***Needs to be examined***" + set color 28 + set subnet 10.1.150.0 255.255.255.0 + next + edit "city_permited_subnet_5" + set comment "***Needs to be examined***" + set color 28 + set subnet 10.21.150.0 255.255.255.0 + next + edit "city_permited_subnet_7" + set comment "***Needs to be examined***" + set color 28 + set subnet 10.1.7.0 255.255.255.0 + next + edit "City_Side_Subnet_1" + set comment "City\'s Subnet on their side" + set color 28 + set subnet 10.250.0.0 255.255.0.0 + next + edit "City_Side_CGR_01" + set comment "City Lights CGR Subnet on City Side" + set color 28 + set allow-routing enable + set subnet 10.253.17.0 255.255.255.0 + next + edit "City_Side_CGR_02" + set comment "City Lights CGR Subnet on City Side" + set color 28 + set allow-routing enable + set subnet 10.253.18.0 255.255.255.0 + next + edit "VPN-Range" + set type iprange + set start-ip 172.16.251.1 + set end-ip 172.16.251.127 + next + edit "SPD_Network" + set type iprange + set comment "Syracuse Police Department Network Range" + set color 2 + set start-ip 10.250.100.80 + set end-ip 10.250.100.89 + next + edit "FCTEMS_ALL_FORTICLOUD_SERVERS" + set type dynamic + set sub-type ems-tag + next + edit "Russia" + set type geography + set color 7 + set country "RU" + next + edit "China" + set type geography + set color 6 + set country "CN" + next + edit "Iran" + set type geography + set color 6 + set country "IR" + next + edit "Belarus" + set type geography + set color 6 + set country "BY" + next + edit "North Korea" + set type geography + set color 6 + set country "KP" + next + edit "SSL_VPN_Range" + set comment "Remote Access VPN IP Range" + set associated-interface "ssl.scsd" + set subnet 10.212.134.0 255.255.255.0 + next + edit "United_States" + set type geography + set associated-interface "outside" + set country "US" + next + edit "SRIC_BOCES_Server01" + set comment "SRIC BOCES - Server" + set subnet 170.161.72.15 255.255.255.255 + next + edit "z_Ryuk_01" + set comment "Block IP from Ransomware Attack" + set associated-interface "outside" + set color 6 + set subnet 177.103.240.149 255.255.255.255 + next + edit "z_Ryuk_02" + set comment "Block IP from Ransomware Attack" + set associated-interface "outside" + set color 6 + set subnet 93.189.42.220 255.255.255.255 + next + edit "z_BlockIP_134" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 138.68.50.218 255.255.255.255 + next + edit "411App_WebPage" + set type fqdn + set fqdn "411app.scsd.us" + next + edit "City_Side_Parks_Phone_Subnet" + set comment "City Parks & Rec Phones and SIP Trunk Subnet" + set color 28 + set allow-routing enable + set subnet 10.250.229.0 255.255.255.0 + next + edit "Nigeria" + set type geography + set color 6 + set country "NG" + next + edit "Afghanistan" + set type geography + set color 6 + set country "AF" + next + edit "Brazil" + set type geography + set color 6 + set country "BR" + next + edit "Columbia" + set type geography + set color 6 + set country "CO" + next + edit "India" + set type geography + set color 6 + set country "IN" + next + edit "Indonesia" + set type geography + set color 6 + set country "ID" + next + edit "Romania" + set type geography + set color 6 + set country "RO" + next + edit "Thailand" + set type geography + set color 6 + set country "TH" + next + edit "Turkey" + set type geography + set color 6 + set country "TR" + next + edit "Vietnam" + set type geography + set color 6 + set country "VN" + next + edit "SPD_22_Delaware" + set comment "SPD Firewall Delaware" + set color 2 + set subnet 10.22.70.10 255.255.255.255 + next + edit "SPD_24_Franklin" + set comment "SPD Firewall Franklin" + set color 2 + set subnet 10.24.70.10 255.255.255.255 + next + edit "z_BlockIP_135" + set comment "Malicious IP Address" + set associated-interface "outside" + set color 6 + set subnet 108.174.5.112 255.255.255.255 + next + edit "SPD_Side_Genetec" + set comment "Genetec Server Range on SPD Side" + set associated-interface "city_phones" + set color 2 + set allow-routing enable + set subnet 10.211.21.16 255.255.255.240 + next + edit "ST_External_1" + set comment "SchoolTool IIS #3" + set allow-routing enable + set subnet 172.30.45.30 255.255.255.255 + next + edit "ST_External_2" + set comment "SchoolTool Reporting" + set allow-routing enable + set subnet 172.30.45.109 255.255.255.255 + next + edit "ST_External_3" + set comment "SchoolTool SQL" + set allow-routing enable + set subnet 172.30.45.25 255.255.255.255 + next + edit "PrintOC-Outside" + set color 1 + set subnet 198.36.26.119 255.255.255.255 + next + edit "ST_External_4" + set comment "SchoolTool IIS #4" + set allow-routing enable + set subnet 172.30.45.35 255.255.255.255 + next + edit "ST_External_5" + set comment "SchoolTool IIS #2" + set allow-routing enable + set subnet 172.30.45.84 255.255.255.255 + next + edit "ST_External_6" + set comment "SchoolTool IIS #1" + set allow-routing enable + set subnet 172.30.45.107 255.255.255.255 + next + edit "SchoolTool_External_Range" + set subnet 172.30.44.0 255.255.254.0 + next + edit "ckr01-mgmt-inside-temp" + set comment "ContentKeeper Reporter 01 Management Port" + set color 19 + set subnet 10.251.1.43 255.255.255.255 + next + edit "z_BlockIP_141" + set comment "now.gg" + set associated-interface "outside" + set color 6 + set subnet 18.238.49.122 255.255.255.255 + next + edit "Webosphere_Inside" + set comment "SCSD Website" + set associated-interface "inside" + set subnet 10.1.48.117 255.255.255.255 + next + edit "Day_Enterprise_Server" + set comment "Day Automation" + set associated-interface "inside" + set color 10 + set subnet 10.1.40.108 255.255.255.255 + next + edit "Day_VM_Server" + set comment "Day Automation" + set associated-interface "inside" + set color 10 + set subnet 10.1.40.173 255.255.255.255 + next + edit "WebCRD" + set comment "printshop.scsd.us" + set associated-interface "inside" + set subnet 10.1.48.96 255.255.255.255 + next + edit "Security_01_NOC" + set associated-interface "inside" + set color 25 + set subnet 10.1.70.0 255.255.254.0 + next + edit "Security_02_ITC" + set associated-interface "inside" + set color 25 + set subnet 10.2.70.0 255.255.254.0 + next + edit "Security_03_PSLA" + set associated-interface "inside" + set color 25 + set subnet 10.3.70.0 255.255.254.0 + next + edit "Security_04_Nottingham" + set associated-interface "inside" + set color 25 + set subnet 10.4.70.0 255.255.254.0 + next + edit "Security_06_Henninger" + set associated-interface "inside" + set color 25 + set subnet 10.6.70.0 255.255.254.0 + next + edit "Security_07_Corcoran" + set associated-interface "inside" + set color 25 + set subnet 10.7.70.0 255.255.254.0 + next + edit "Security_08_Clary" + set associated-interface "inside" + set color 25 + set subnet 10.8.70.0 255.255.254.0 + next + edit "Security_09_Grant" + set associated-interface "inside" + set color 25 + set subnet 10.9.70.0 255.255.254.0 + next + edit "Security_10_Levy" + set associated-interface "inside" + set color 25 + set subnet 10.10.70.0 255.255.254.0 + next + edit "Security_13_Lincoln" + set associated-interface "inside" + set color 25 + set subnet 10.13.70.0 255.255.254.0 + next + edit "Security_14_Shea" + set associated-interface "inside" + set color 25 + set subnet 10.14.70.0 255.255.254.0 + next + edit "Security_15_HWSmith" + set associated-interface "inside" + set color 25 + set subnet 10.15.70.0 255.255.254.0 + next + edit "Security_16_Bellevue" + set associated-interface "inside" + set color 25 + set subnet 10.16.70.0 255.255.254.0 + next + edit "Security_20_DrKing" + set associated-interface "inside" + set color 25 + set subnet 10.20.70.0 255.255.254.0 + next + edit "Security_21_Danforth" + set associated-interface "inside" + set color 25 + set subnet 10.21.70.0 255.255.254.0 + next + edit "Security_22_Delaware" + set associated-interface "inside" + set color 25 + set subnet 10.22.70.0 255.255.254.0 + next + edit "Security_23_Elmwood" + set associated-interface "inside" + set color 25 + set subnet 10.23.70.0 255.255.254.0 + next + edit "Security_24_Franklin" + set associated-interface "inside" + set color 25 + set subnet 10.24.70.0 255.255.254.0 + next + edit "Security_25_Frazer" + set associated-interface "inside" + set color 25 + set subnet 10.25.70.0 255.255.254.0 + next + edit "Security_27_Elmcrest" + set associated-interface "inside" + set color 25 + set subnet 10.27.70.0 255.255.254.0 + next + edit "Security_28_Latin" + set associated-interface "inside" + set color 25 + set subnet 10.28.70.0 255.255.254.0 + next + edit "Security_29_Huntington" + set associated-interface "inside" + set color 25 + set subnet 10.29.70.0 255.255.254.0 + next + edit "Security_30_SalemHyde" + set associated-interface "inside" + set color 25 + set subnet 10.30.70.0 255.255.254.0 + next + edit "Security_33_LeMoyne" + set associated-interface "inside" + set color 25 + set subnet 10.33.70.0 255.255.254.0 + next + edit "Security_34_DrWeeks" + set associated-interface "inside" + set color 25 + set subnet 10.34.70.0 255.255.254.0 + next + edit "Security_36_McKinley" + set associated-interface "inside" + set color 25 + set subnet 10.36.70.0 255.255.254.0 + next + edit "Security_37_Meachem" + set associated-interface "inside" + set color 25 + set subnet 10.37.70.0 255.255.254.0 + next + edit "Security_40_Porter" + set associated-interface "inside" + set color 25 + set subnet 10.40.70.0 255.255.254.0 + next + edit "Security_41_BOVA" + set associated-interface "inside" + set color 25 + set subnet 10.41.70.0 255.255.254.0 + next + edit "Security_42_Roberts" + set associated-interface "inside" + set color 25 + set subnet 10.42.70.0 255.255.254.0 + next + edit "Security_44_Seymour" + set associated-interface "inside" + set color 25 + set subnet 10.44.70.0 255.255.254.0 + next + edit "Security_45_EdSmith" + set associated-interface "inside" + set color 25 + set subnet 10.45.70.0 255.255.254.0 + next + edit "Security_46_Phoenix" + set associated-interface "inside" + set color 25 + set subnet 10.46.70.0 255.255.254.0 + next + edit "Security_47_McCarthy" + set associated-interface "inside" + set color 25 + set subnet 10.47.70.0 255.255.254.0 + next + edit "Security_48_Beard" + set associated-interface "inside" + set color 25 + set subnet 10.48.70.0 255.255.254.0 + next + edit "Security_49_VanDuyn" + set associated-interface "inside" + set color 25 + set subnet 10.49.70.0 255.255.254.0 + next + edit "Security_51_Webster" + set associated-interface "inside" + set color 25 + set subnet 10.51.70.0 255.255.254.0 + next + edit "Security_53_Blodgett" + set associated-interface "inside" + set color 25 + set subnet 10.53.70.0 255.255.254.0 + next + edit "Security_54_JVC" + set associated-interface "inside" + set color 25 + set subnet 10.54.70.0 255.255.254.0 + next + edit "Security_55_CentralOffice" + set associated-interface "inside" + set color 25 + set subnet 10.55.70.0 255.255.254.0 + next + edit "Security_56_SSC" + set associated-interface "inside" + set color 25 + set subnet 10.56.70.0 255.255.254.0 + next + edit "Security_57_Transportation" + set associated-interface "inside" + set color 25 + set subnet 10.57.70.0 255.255.254.0 + next + edit "Security_60_PDC" + set associated-interface "inside" + set color 25 + set subnet 10.60.70.0 255.255.254.0 + next + edit "Security_86_StLucy" + set associated-interface "inside" + set color 25 + set subnet 10.86.70.0 255.255.254.0 + next + edit "psdevdb1" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.136 255.255.255.255 + next + edit "hypprodweb1" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.84 255.255.255.255 + next + edit "psprddb1" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.138 255.255.255.255 + next + edit "psqasdb1" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.137 255.255.255.255 + next + edit "psdevfin" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.122 255.255.255.255 + next + edit "psdevhcm" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.125 255.255.255.255 + next + edit "psprdess" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.200 255.255.255.255 + next + edit "psprdfin" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.120 255.255.255.255 + next + edit "psprdhcm" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.123 255.255.255.255 + next + edit "psprdrpx" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.201 255.255.255.255 + next + edit "psqasfin" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.121 255.255.255.255 + next + edit "psqashcm" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.124 255.255.255.255 + next + edit "pstools" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.130 255.255.255.255 + next + edit "hypprodweb2" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.85 255.255.255.255 + next + edit "hypprodess" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.83 255.255.255.255 + next + edit "hypprodwin7" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.86 255.255.255.255 + next + edit "psnagus" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.131 255.255.255.255 + next + edit "psupgfin" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.150 255.255.255.255 + next + edit "psupghcm" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.151 255.255.255.255 + next + edit "hypdeveb" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.50 255.255.255.255 + next + edit "hypdevw1" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.51 255.255.255.255 + next + edit "hypdevw3" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.59 255.255.255.255 + next + edit "hypprdeb" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.53 255.255.255.255 + next + edit "hypprdw1" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.54 255.255.255.255 + next + edit "hypprdw2" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.55 255.255.255.255 + next + edit "hypqaeb" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.56 255.255.255.255 + next + edit "hypqaw1" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.57 255.255.255.255 + next + edit "hypqaw2" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.58 255.255.255.255 + next + edit "Nighttime_Inside" + set comment "Nighttime sends backups" + set associated-interface "inside" + set subnet 10.1.40.191 255.255.255.255 + next + edit "411app" + set associated-interface "inside" + set subnet 10.1.40.216 255.255.255.255 + next + edit "411sql" + set associated-interface "inside" + set subnet 10.1.40.225 255.255.255.255 + next + edit "DocHolliday" + set comment "WebCRD Server" + set associated-interface "inside" + set subnet 10.1.48.78 255.255.255.255 + next + edit "Day_Continuum_Server" + set comment "Day Automation" + set associated-interface "inside" + set color 10 + set subnet 10.1.40.188 255.255.255.255 + next + edit "Genetec" + set associated-interface "inside" + set subnet 10.1.70.30 255.255.255.255 + next + edit "DC01_A" + set comment "Domain Controller for DNS and LDAP" + set associated-interface "inside" + set color 14 + set subnet 10.1.40.10 255.255.255.255 + next + edit "DC01_B" + set comment "Domain Controller for DNS and LDAP" + set associated-interface "inside" + set color 14 + set subnet 10.1.40.95 255.255.255.255 + next + edit "DC01_C" + set comment "Domain Controller for DNS and LDAP" + set associated-interface "inside" + set color 14 + set subnet 10.1.48.120 255.255.255.255 + next + edit "HVDC02" + set comment "Domain Controller for DNS and LDAP" + set associated-interface "inside" + set color 14 + set subnet 10.21.48.10 255.255.255.255 + next + edit "HVDC03_A" + set comment "Domain Controller for DNS and LDAP" + set associated-interface "inside" + set color 14 + set subnet 10.1.48.95 255.255.255.255 + next + edit "HVDC03_B" + set comment "Domain Controller for DNS and LDAP" + set associated-interface "inside" + set color 14 + set subnet 10.1.48.10 255.255.255.255 + next + edit "Tim PC" + set associated-interface "inside" + set subnet 10.1.7.137 255.255.255.255 + next + edit "CGR_16_Bellevue" + set comment "City Lights CGR - 16_Bellevue" + set associated-interface "inside" + set color 28 + set subnet 10.16.233.11 255.255.255.255 + next + edit "CGR_55_CentralOffice" + set comment "City Lights CGR - 55_Central Offices" + set associated-interface "inside" + set color 28 + set subnet 10.55.233.11 255.255.255.255 + next + edit "CGR_45_EdSmith" + set comment "City Lights CGR - 45_EdSmith" + set associated-interface "inside" + set color 28 + set subnet 10.45.233.11 255.255.255.255 + next + edit "CGR_23_Elmwood" + set comment "City Lights CGR - 23_Elmwood" + set associated-interface "inside" + set color 28 + set subnet 10.23.233.11 255.255.255.255 + next + edit "CGR_24_Franklin" + set comment "City Lights CGR - 24_Franklin" + set associated-interface "inside" + set color 28 + set subnet 10.24.233.11 255.255.255.255 + next + edit "CGR_29_Huntington" + set comment "City Lights CGR - 29_Huntington" + set associated-interface "inside" + set color 28 + set subnet 10.29.233.11 255.255.255.255 + next + edit "CGR_15_HWSmith" + set comment "City Lights CGR - 15_HWSmith" + set associated-interface "inside" + set color 28 + set subnet 10.15.233.11 255.255.255.255 + next + edit "CGR_48_Beard" + set comment "City Lights CGR - 48_Beard" + set associated-interface "inside" + set color 28 + set subnet 10.48.233.11 255.255.255.255 + next + edit "CGR_36_McKinley" + set comment "City Lights CGR - 36_McKinley" + set associated-interface "inside" + set color 28 + set subnet 10.36.233.11 255.255.255.255 + next + edit "CGR_37_Meachem" + set comment "City Lights CGR - 37_Meachem" + set associated-interface "inside" + set color 28 + set subnet 10.37.233.11 255.255.255.255 + next + edit "CGR_40_Porter" + set comment "City Lights CGR - 40_Porter" + set associated-interface "inside" + set color 28 + set subnet 10.40.233.11 255.255.255.255 + next + edit "CGR_30_SalemHyde" + set comment "City Lights CGR - 30_SalemHyde" + set associated-interface "inside" + set color 28 + set subnet 10.30.233.11 255.255.255.255 + next + edit "CGR_44_Seymour" + set comment "City Lights CGR - 44_Seymour" + set associated-interface "inside" + set color 28 + set subnet 10.44.233.11 255.255.255.255 + next + edit "CGR_49_VanDuyn" + set comment "City Lights CGR - 49_VanDuyn" + set associated-interface "inside" + set color 28 + set subnet 10.49.233.11 255.255.255.255 + next + edit "CGR_51_Webster" + set comment "City Lights CGR - 51_Webster" + set associated-interface "inside" + set color 28 + set subnet 10.51.233.11 255.255.255.255 + next + edit "z_BlockIP_000" + set associated-interface "outside" + set color 6 + set subnet 103.117.232.199 255.255.255.255 + next + edit "hypdevw2" + set comment "Hyperion" + set associated-interface "inside" + set color 22 + set subnet 10.1.18.52 255.255.255.255 + next + edit "Access_Control_01_NOC" + set comment "01_NOC_Access_Control" + set associated-interface "inside" + set color 29 + set subnet 10.1.72.0 255.255.255.0 + next + edit "Access_Control_02_ITC" + set comment "02_ITC_Access_Control" + set associated-interface "inside" + set color 29 + set subnet 10.2.72.0 255.255.255.0 + next + edit "Access_Control_03_PSLA" + set comment "Access Control PSLA at Fowler" + set associated-interface "inside" + set color 29 + set subnet 10.3.72.0 255.255.255.0 + next + edit "Access_Control_04_Nottingham" + set comment "Access Control Nottingham" + set associated-interface "inside" + set color 29 + set subnet 10.4.72.0 255.255.255.0 + next + edit "Access_Control_06_Henninger" + set comment "Access Control Henninger" + set associated-interface "inside" + set color 29 + set subnet 10.6.72.0 255.255.255.0 + next + edit "Access_Control_07_Corcoran" + set comment "Access Control Corcoran" + set associated-interface "inside" + set color 29 + set subnet 10.7.72.0 255.255.255.0 + next + edit "Access_Control_08_Clary" + set comment "Access Control Clary" + set associated-interface "inside" + set color 29 + set subnet 10.8.72.0 255.255.255.0 + next + edit "Access_Control_09_Grant" + set comment "Access Control Grant" + set associated-interface "inside" + set color 29 + set subnet 10.9.72.0 255.255.255.0 + next + edit "Access_Control_10_Levy" + set comment "Access Control Levy" + set associated-interface "inside" + set color 29 + set subnet 10.10.72.0 255.255.255.0 + next + edit "Access_Control_40_Porter" + set comment "Access Control Porter" + set associated-interface "inside" + set color 29 + set subnet 10.40.72.0 255.255.255.0 + next + edit "PeopleTools" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.100 255.255.255.255 + next + edit "psupgfin2" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.117 255.255.255.255 + next + edit "psupghcm2" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.116 255.255.255.255 + next + edit "pum_a" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.111 255.255.255.255 + next + edit "pum_b" + set comment "Peoplesoft" + set associated-interface "inside" + set color 20 + set subnet 10.1.18.112 255.255.255.255 + next + edit "SMTP_Office365_a" + set comment "Microsoft to Barracuda Archivers" + set associated-interface "outside" + set subnet 104.47.0.0 255.255.128.0 + next + edit "SMTP_Office365_b" + set comment "Microsoft to Barracuda Archivers" + set associated-interface "outside" + set subnet 40.92.0.0 255.254.0.0 + next + edit "SMTP_Office365_c" + set comment "Microsoft to Barracuda Archivers" + set associated-interface "outside" + set subnet 40.107.0.0 255.255.0.0 + next + edit "SMTP_Office365_d" + set comment "Microsoft to Barracuda Archivers" + set associated-interface "outside" + set subnet 52.100.0.0 255.252.0.0 + next + edit "City_Side_VoIP_30" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.30.0 255.255.255.0 + next + edit "City_Side_VoIP_56" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.56.0 255.255.255.0 + next + edit "City_Side_VoIP_61" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.61.0 255.255.255.0 + next + edit "City_Side_VoIP_62" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.62.0 255.255.255.0 + next + edit "City_Side_VoIP_63" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.63.0 255.255.255.0 + next + edit "City_Side_VoIP_64" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.64.0 255.255.255.0 + next + edit "City_Side_VoIP_65" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.65.0 255.255.255.0 + next + edit "City_Side_VoIP_66" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.66.0 255.255.255.0 + next + edit "City_Side_VoIP_67" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.67.0 255.255.255.0 + next + edit "City_Side_VoIP_68" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.68.0 255.255.255.0 + next + edit "City_Side_VoIP_72" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.72.0 255.255.255.0 + next + edit "City_Side_VoIP_74" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.74.0 255.255.255.0 + next + edit "City_Side_VoIP_75" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.75.0 255.255.255.0 + next + edit "City_Side_VoIP_76" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.76.0 255.255.255.0 + next + edit "City_Side_VoIP_77" + set comment "City Side VoIP - Includes DPW Router" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.77.0 255.255.255.0 + next + edit "City_Side_VoIP_88" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.88.0 255.255.255.0 + next + edit "City_Side_VoIP_132" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.132.0 255.255.255.0 + next + edit "City_Side_VoIP_1_Park_Place_A" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.249.0.44 255.255.255.255 + next + edit "CUCM_BRIGHTON" + set comment "SCSD Cisco Call Managers" + set associated-interface "inside" + set color 5 + set subnet 10.21.150.0 255.255.255.0 + next + edit "CUCM_ITC_NOC" + set comment "SCSD Cisco Call Managers" + set associated-interface "inside" + set color 5 + set subnet 10.1.150.0 255.255.255.0 + next + edit "City_Side_VoIP_1_Park_Place_B" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.235.40.0 255.255.248.0 + next + edit "City_Side_VoIP_Router_A" + set comment "City Side VoIP Router" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.51.21 255.255.255.255 + next + edit "City_Side_VoIP_Router_B" + set comment "City Side VoIP Router" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.250.51.23 255.255.255.255 + next + edit "SPD_Side_A" + set comment "SPD Side Firewall" + set associated-interface "city_phones" + set color 2 + set allow-routing enable + set subnet 10.250.100.80 255.255.255.248 + next + edit "SPD_Side_B" + set comment "SPD Side Firewall" + set associated-interface "city_phones" + set color 2 + set allow-routing enable + set subnet 10.250.100.88 255.255.255.254 + next + edit "County_Network" + set comment "Onondaga County Purchasing Department" + set associated-interface "city_phones" + set allow-routing enable + set subnet 10.250.100.90 255.255.255.255 + next + edit "City_Side_VoIP_Water_DPW_Recorder" + set comment "City Side VoIP" + set associated-interface "city_phones" + set color 28 + set allow-routing enable + set subnet 10.249.0.46 255.255.255.255 + next + edit "Microsoft 1" + set comment "Located in India" + set associated-interface "outside" + set subnet 13.71.55.58 255.255.255.255 + next + edit "NVR-NOC" + set comment "NVR ITC Data Center" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.1.70.38 255.255.255.255 + next + edit "NVR-FAILOVER" + set comment "NVR ITC Data Center" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.1.70.27 255.255.255.255 + next + edit "NVR-RING1-CLAR" + set comment "NVR Clary MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.8.70.11 255.255.255.255 + next + edit "NVR-RING1-CLAR2" + set comment "NVR Clary MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.8.70.14 255.255.255.255 + next + edit "NVR-RING1-CORC" + set comment "NVR Corcoran MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.7.70.11 255.255.255.255 + next + edit "NVR-RING1-CORC2" + set comment "NVR Corcoran MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.7.70.14 255.255.255.255 + next + edit "NVR-RING2-DANF" + set comment "NVR Danforth MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.21.70.11 255.255.255.255 + next + edit "NVR-RING2-DANF2" + set comment "NVR Danforth MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.21.70.14 255.255.255.255 + next + edit "NVR-RING3-PSLA" + set comment "NVR PSLA MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.3.70.11 255.255.255.255 + next + edit "NVR-RING3-PSLA2" + set comment "NVR PSLA MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.3.70.14 255.255.255.255 + next + edit "NVR-RING4-BLOD" + set comment "NVR Blodgett MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.53.70.11 255.255.255.255 + next + edit "NVR-RING4-FRAZ" + set comment "NVR Frazier MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.25.70.11 255.255.255.255 + next + edit "NVR-RING5-CENT" + set comment "NVR Central Offices MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.55.70.11 255.255.255.255 + next + edit "NVR-RING6-EDSM" + set comment "NVR Ed Smith MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.45.70.11 255.255.255.255 + next + edit "NVR-RING6-HWSM" + set comment "NVR HW Smith MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.15.70.11 255.255.255.255 + next + edit "NVR-RING6-HWSM2" + set comment "NVR HW Smith MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.15.70.14 255.255.255.255 + next + edit "NVR-RING6-NOTT" + set comment "NVR Nottingham MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.4.70.11 255.255.255.255 + next + edit "NVR-RING7-BELL" + set comment "NVR Bellevue MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.16.70.11 255.255.255.255 + next + edit "NVR-RING7-GRAN" + set comment "NVR Grant 2nd Floor IDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.9.70.11 255.255.255.255 + next + edit "NVR-RING7-GRAN2" + set comment "NVR Grant 2nd Floor IDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.9.70.14 255.255.255.255 + next + edit "NVR-RING8-HENN" + set comment "NVR Henninger MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.6.70.11 255.255.255.255 + next + edit "NVR-RING8-HENN2" + set comment "NVR Henninger MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.6.70.14 255.255.255.255 + next + edit "NVR-RING8-HUNT" + set comment "NVR Huntington MDF" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.29.70.11 255.255.255.255 + next + edit "Genetec-Dir" + set comment "Genetec Directory" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.1.70.141 255.255.255.255 + next + edit "Genetec-DirBU" + set comment "Genetec Directory Backup" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.1.70.22 255.255.255.255 + next + edit "Genetec-Media" + set comment "Genetec Media Server" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.1.70.143 255.255.255.255 + next + edit "Genetec-MRouter" + set comment "Genetec Media Server" + set associated-interface "inside" + set color 2 + set allow-routing enable + set subnet 10.1.70.145 255.255.255.255 + next + edit "MS_Teams_External_A" + set comment "MS Teams for SBC" + set associated-interface "outside" + set subnet 13.107.64.0 255.255.192.0 + next + edit "MS_Teams_External_B" + set comment "MS Teams for SBC" + set associated-interface "outside" + set subnet 52.112.0.0 255.252.0.0 + next + edit "SBC-NOC" + set associated-interface "inside" + set allow-routing enable + set subnet 10.1.150.21 255.255.255.255 + next + edit "SBC-DAN" + set comment "Moved to Brighton Academy 09FEB2024" + set associated-interface "inside" + set allow-routing enable + set subnet 10.21.150.21 255.255.255.255 + next + edit "DataTools" + set comment "ODBC Connection to ST DB" + set associated-interface "inside" + set allow-routing enable + set subnet 10.1.48.67 255.255.255.255 + next + edit "ST_Internal_2" + set associated-interface "inside" + set allow-routing enable + set subnet 10.1.40.191 255.255.255.255 + next + edit "Tableau" + set comment "ODBC connections to ST DB" + set associated-interface "inside" + set subnet 10.1.48.61 255.255.255.255 + next + edit "21JumpSt" + set comment "Jumpbox for SchoolTool" + set associated-interface "inside" + set subnet 10.1.48.128 255.255.255.255 + next + edit "Fileserver03" + set comment "Cloud ST to write SMB Here" + set associated-interface "inside" + set subnet 10.1.48.97 255.255.255.255 + next + edit "SchoolTool webjs" + set comment "SchoolTool" + set associated-interface "inside" + set color 18 + set subnet 10.1.40.102 255.255.255.255 + next + edit "Server_40" + set associated-interface "inside" + set subnet 10.1.40.0 255.255.255.0 + next + edit "Server_48" + set associated-interface "inside" + set subnet 10.1.48.0 255.255.255.0 + next + edit "Test_10.10.1.20" + set subnet 10.10.1.20 255.255.255.255 + next + edit "AW_inbound.us002-prod.arcticwolf.net" + set type iprange + set comment "Arctic Wolf" + set associated-interface "outside" + set start-ip 3.145.238.128 + set end-ip 3.145.238.159 + next + edit "AW_device-activation.us-global-prod.arcticwolf.net" + set type iprange + set comment "Arctic Wolf" + set associated-interface "outside" + set start-ip 35.84.197.208 + set end-ip 35.84.197.228 + next + edit "AW_drs.us-global-prod.arcticwolf.net" + set type iprange + set comment "Arctic Wolf" + set associated-interface "outside" + set start-ip 44.239.235.232 + set end-ip 44.239.235.239 + next + edit "AW_auth.arcticwolf.com" + set type fqdn + set comment "Arctic Wolf" + set associated-interface "outside" + set fqdn "auth.arcticwolf.com" + next + edit "AW_Scanner_MerryChristmas" + set associated-interface "inside" + set subnet 10.1.40.222 255.255.255.255 + next + edit "DPS_local_subnet_1" + set allow-routing enable + next + edit "DPS_remote_subnet_1" + set allow-routing enable + next + edit "Schroeder _CT_NOC_CVM" + set comment "Nutanix CVM" + set associated-interface "inside" + set subnet 10.1.40.181 255.255.255.255 + next + edit "Pigpen_CT_NOC_CVM" + set comment "Nutanix CVM" + set associated-interface "inside" + set subnet 10.101.180.26 255.255.255.255 + next + edit "RedBaron_CT_NOC_CVM" + set comment "Nutanix CVM" + set associated-interface "inside" + set subnet 10.101.180.27 255.255.255.255 + next + edit "Sally_CT_NOC_CVM" + set comment "Nutanix CVM" + set associated-interface "inside" + set subnet 10.101.180.29 255.255.255.255 + next + edit "Patty_CT_NOC_CVM" + set comment "Nutanix CVM" + set associated-interface "inside" + set subnet 10.101.180.30 255.255.255.255 + next + edit "Nutanix_Support1" + set type fqdn + set associated-interface "outside" + set fqdn "nsc01.nutanix.net" + next + edit "Nutanix_Support2" + set type fqdn + set associated-interface "outside" + set fqdn "nsc02.nutanix.net" + next + edit "z_BlockIP_138" + set associated-interface "outside" + set color 6 + set subnet 172.86.91.155 255.255.255.255 + next + edit "z_BlockIP_139" + set associated-interface "outside" + set color 6 + set subnet 103.35.189.221 255.255.255.255 + next + edit "z_BlockIP_140" + set associated-interface "outside" + set color 6 + set subnet 94.131.101.15 255.255.255.255 + next + edit "z_BlockIP_142" + set associated-interface "outside" + set color 6 + set subnet 103.35.189.104 255.255.255.255 + next + edit "z_BlockIP_143" + set associated-interface "outside" + set color 6 + set subnet 172.86.112.56 255.255.255.255 + next + edit "z_BlockIP_144" + set associated-interface "outside" + set color 6 + set subnet 194.116.173.199 255.255.255.255 + next + edit "z_BlockIP_145" + set associated-interface "outside" + set color 6 + set subnet 172.86.84.61 255.255.255.255 + next + edit "z_BlockIP_146" + set associated-interface "outside" + set color 6 + set subnet 103.35.188.34 255.255.255.255 + next + edit "z_BlockIP_147" + set associated-interface "outside" + set color 6 + set subnet 74.119.194.18 255.255.255.255 + next + edit "z_BlockIP_148" + set associated-interface "outside" + set color 6 + set subnet 141.98.168.11 255.255.255.255 + next + edit "z_BlockIP_149" + set associated-interface "outside" + set color 6 + set subnet 103.35.188.74 255.255.255.255 + next + edit "z_BlockIP_150" + set associated-interface "outside" + set color 6 + set subnet 5.180.24.94 255.255.255.255 + next + edit "z_BlockIP_151" + set associated-interface "outside" + set color 6 + set subnet 141.98.168.14 255.255.255.255 + next + edit "z_BlockIP_" + set associated-interface "outside" + set color 6 + set subnet 45.150.65.206 255.255.255.255 + next + edit "z_BlockRange_01" + set type iprange + set associated-interface "outside" + set color 6 + set start-ip 103.35.188.0 + set end-ip 103.35.189.255 + next + edit "z_BlockRange_02" + set type iprange + set associated-interface "outside" + set color 6 + set start-ip 172.86.84.0 + set end-ip 172.86.84.255 + next + edit "z_BlockRange_03" + set type iprange + set associated-interface "outside" + set color 6 + set start-ip 194.116.173.0 + set end-ip 194.116.173.255 + next + edit "z_BlockSub_040" + set associated-interface "outside" + set color 6 + set subnet 74.119.194.0 255.255.255.0 + next + edit "z_BlockSub_041" + set associated-interface "outside" + set color 6 + set subnet 141.98.168.0 255.255.255.0 + next + edit "z_BlockSub_042" + set associated-interface "outside" + set color 6 + set subnet 5.180.24.0 255.255.255.0 + next + edit "ITC_Cafe_POS" + set comment "Point of Sale" + set associated-interface "inside" + set subnet 10.2.4.125 255.255.255.255 + next + edit "Clary_POS" + set comment "Point of Sale" + set associated-interface "inside" + set subnet 10.8.1.47 255.255.255.255 + next + edit "Porter_POS" + set comment "Point of Sale" + set associated-interface "inside" + set subnet 10.40.1.69 255.255.255.255 + next + edit "AW_Scanner _HappyHalloween" + set comment "Scanner for Servers Only" + set associated-interface "inside" + set subnet 10.1.40.211 255.255.255.255 + next + edit "AW_Scanner_HappyNewYear" + set associated-interface "inside" + set subnet 10.1.40.23 255.255.255.255 + next + edit "AW_Scanner_DiaDeLosMuertos" + set associated-interface "inside" + set subnet 10.1.40.223 255.255.255.255 + next + edit "AW_Scanner_LaborDay" + set associated-interface "inside" + set subnet 10.1.40.241 255.255.255.255 + next + edit "RAP-Users" + set associated-interface "RAP" + set allow-routing enable + set subnet 10.79.1.0 255.255.255.0 + next + edit "RAP-MGMT" + set allow-routing enable + set subnet 192.168.79.0 255.255.255.0 + next + edit "Sys-Net-Admins" + set allow-routing enable + set subnet 10.1.6.0 255.255.255.0 + next + edit "Elastic" + set subnet 10.1.48.121 255.255.255.255 + next + edit "DPS_10.46.0.0/16" + set allow-routing enable + set subnet 10.46.0.0 255.255.0.0 + next + edit "DPS_Internal" + set subnet 192.168.46.0 255.255.255.0 + next + edit "DPS_192.168.146.0/24" + set allow-routing enable + set subnet 192.168.146.0 255.255.255.0 + next +end +config firewall multicast-address + edit "all_hosts" + set start-ip 224.0.0.1 + set end-ip 224.0.0.1 + next + edit "all_routers" + set start-ip 224.0.0.2 + set end-ip 224.0.0.2 + next + edit "Bonjour" + set start-ip 224.0.0.251 + set end-ip 224.0.0.251 + next + edit "EIGRP" + set start-ip 224.0.0.10 + set end-ip 224.0.0.10 + next + edit "OSPF" + set start-ip 224.0.0.5 + set end-ip 224.0.0.6 + next + edit "all" + set start-ip 224.0.0.0 + set end-ip 239.255.255.255 + next +end +config firewall address6 + edit "all" + next + edit "none" + set ip6 ::/128 + next + edit "SSLVPN_TUNNEL_IPv6_ADDR1" + set ip6 fdff:ffff::/120 + next +end +config firewall multicast-address6 + edit "all" + set ip6 ff00::/8 + next +end +config firewall addrgrp + edit "IPv4-Private-All-RFC1918" + set member "Internal_10.0.0.0_8" "Internal_172.16.0.0_12" "Internal_192.168.0.0_16" + next + edit "SCHC_Local_Subnets_Group" + set member "SCHC_03_PSLA" "SCHC_09_Grant" "SCHC_15_HWSmith" "SCHC_20_DrKing" "SCHC_22_Delaware" "SCHC_24_Franklin" "SCHC_34_DrWeeks" "SCHC_53_Blodgett" + set color 8 + next + edit "SCHC_Remote_Subnets_Group" + set member "SCHC_Remote_Subnet_02" "SCHC_Remote_Subnet_01" "SCHC_Remote_Subnet_03" + set comment "Syracuse Community Health Center Remote Subnets Group" + set color 8 + next + edit "Country Block" + set member "China" "Russia" "Iran" "Belarus" "North Korea" "Nigeria" "Afghanistan" "Brazil" "Columbia" "India" "Indonesia" "Romania" "Thailand" "Turkey" "Vietnam" + set color 6 + next + edit "City_Side_VoIP_Park_Place_Group" + set member "City_Side_VoIP_1_Park_Place_A" "City_Side_VoIP_1_Park_Place_B" + set color 28 + set allow-routing enable + next + edit "SchoolTool_Cloud_Internal" + set member "21JumpSt" "DataTools" "Fileserver03" "Nighttime_Inside" "Tableau" "DC01_A" "DC01_B" "DC01_C" "HVDC02" "HVDC03_A" "HVDC03_B" "DocHolliday" "SchoolTool webjs" "Elastic" + set comment "Access for SchoolTool Cloud" + next + edit "CONTENTKEEPER-REMOTE-SUPPORT" + set member "CK-North-America-202" "CK-Australia-203" "CK-North-America-173" "CK-North-America-8" "CK-North-America-202_B" + set comment "ContentKeeper Remote Support Networks" + set color 19 + next + edit "Nimble_Inside_Grp" + set member "Nimble_Inside_4" "Nimble_Inside_2" "Nimble_Inside_1" "nimble_Inside_3" + next + edit "SRICBOCES-OUTSIDE" + set member "SRIC_BOCES_Server02" "SRIC_BOCES_Firewall" "SRIC_BOCES_Server01" + set comment "Eastern Suffolk BOCES" + next + edit "SPD_Firewalls_Our_Side" + set member "SPD_09_Grant" "SPD_48_Beard" "SPD_56_SSC" "SPD_21_Danforth" "SPD_25_Frazer" "SPD_53_Blodgett" "SPD_20_DrKing" "SPD_44_Seymour" "SPD_22_Delaware" "SPD_24_Franklin" + set comment "SPD firewalls on our internal network." + set color 2 + next + edit "City_Permited_Subnets_Group" + set member "city_permited_subnet_4" "city_permited_subnet_1" "city_permited_subnet_5" "city_permited_subnet_3" "city_permited_subnet_7" + set comment "Subnets City is allowed to on our side" + set color 28 + next + edit "City_Subnets_Group" + set member "City_Side_Subnet_1" "City_Side_CGR_01" "City_Side_CGR_02" "City_Side_VoIP_Water_DPW_Recorder" + set comment "City subnets on their side" + set color 28 + next + edit "Day_Server_Group" + set member "Day_Enterprise_Server" "Day_VM_Server" "Day_Continuum_Server" + set color 10 + next + edit "Security_VLAN_70_Group" + set member "Security_01_NOC" "Security_02_ITC" "Security_03_PSLA" "Security_04_Nottingham" "Security_06_Henninger" "Security_07_Corcoran" "Security_08_Clary" "Security_09_Grant" "Security_10_Levy" "Security_13_Lincoln" "Security_14_Shea" "Security_15_HWSmith" "Security_16_Bellevue" "Security_20_DrKing" "Security_21_Danforth" "Security_22_Delaware" "Security_23_Elmwood" "Security_24_Franklin" "Security_25_Frazer" "Security_27_Elmcrest" "Security_28_Latin" "Security_29_Huntington" "Security_30_SalemHyde" "Security_33_LeMoyne" "Security_34_DrWeeks" "Security_36_McKinley" "Security_37_Meachem" "Security_40_Porter" "Security_41_BOVA" "Security_42_Roberts" "Security_44_Seymour" "Security_45_EdSmith" "Security_46_Phoenix" "Security_47_McCarthy" "Security_48_Beard" "Security_49_VanDuyn" "Security_51_Webster" "Security_53_Blodgett" "Security_54_JVC" "Security_55_CentralOffice" "Security_56_SSC" "Security_57_Transportation" "Security_60_PDC" "Security_86_StLucy" + set color 25 + next + edit "Peoplesoft_RDP_Group" + set member "psdevfin" "psdevhcm" "psprdess" "psprdfin" "psprdhcm" "psprdrpx" "psqasfin" "psqashcm" "pstools" "psnagus" "psupgfin" "psupghcm" "PeopleTools" "psdevdb1" "psprddb1" "psqasdb1" "psupgfin2" "psupghcm2" "pum_a" "pum_b" + set color 20 + next + edit "Hyperion_Server_Group" + set member "hypprodess" "hypprodweb1" "hypprodweb2" "hypprodwin7" "hypdeveb" "hypdevw1" "hypdevw3" "hypprdeb" "hypprdw1" "hypprdw2" "hypqaeb" "hypqaw1" "hypqaw2" "hypdevw2" + set color 22 + next + edit "Peoplesoft_SSH_Group" + set member "psdevdb1" "psprddb1" "psqasdb1" + set color 21 + next + edit "Safeschools_Group" + set member "SafeSchools_01" "Safeschools_02" + next + edit "411_Group" + set member "411app" "411sql" "411App_WebPage" + next + edit "Domain_Controller_Group" + set member "DC01_A" "DC01_B" "DC01_C" "HVDC02" "HVDC03_A" "HVDC03_B" + set color 14 + next + edit "City_CGRs_Group" + set member "CGR_16_Bellevue" "CGR_55_CentralOffice" "CGR_45_EdSmith" "CGR_23_Elmwood" "CGR_24_Franklin" "CGR_29_Huntington" "CGR_15_HWSmith" "CGR_48_Beard" "CGR_36_McKinley" "CGR_37_Meachem" "CGR_40_Porter" "CGR_30_SalemHyde" "CGR_44_Seymour" "CGR_49_VanDuyn" "CGR_51_Webster" + set comment "City CGRs on our side" + set color 28 + next + edit "CK_Inside_Group" + set member "ckf01-ipmi-inside" "ckf01-mgmt-inside" "ckf02-ipmi-inside" "ckf02-mgmt-inside" "cklb01-ipmi-inside" "cklb01-mgmt-inside" "ckm01-ipmi-inside" "ckm01-mgmt1-inside" "ckm01-mgmt2-inside" "ckm02-ipmi-inside" "ckm02-mgmt1-inside" "ckm02-mgmt2-inside" "ckm03-ipmi-inside" "ckm03-mgmt1-inside" "ckm03-mgmt2-inside" "ckr01-ipmi-inside" "ckr01-mgmt-inside" "ckr01-mgmt-inside-temp" + set comment "Content Keeper Inside Address Group" + set color 19 + next + edit "Block_List_Group" + set member "z_BlockIP_001" "z_BlockIP_002" "z_BlockIP_003" "z_BlockIP_004" "z_BlockIP_005" "z_BlockIP_006" "z_BlockIP_008" "z_BlockIP_009" "z_BlockIP_010" "z_BlockIP_011" "z_BlockIP_012" "z_BlockIP_013" "z_BlockIP_014" "z_BlockIP_015" "z_BlockIP_016" "z_BlockIP_017" "z_BlockIP_018" "z_BlockIP_019" "z_BlockIP_020" "z_BlockIP_021" "z_BlockIP_022" "z_BlockIP_024" "z_BlockIP_025" "z_BlockIP_026" "z_BlockIP_027" "z_BlockIP_028" "z_BlockIP_030" "z_BlockIP_031" "z_BlockIP_032" "z_BlockIP_033" "z_BlockIP_034" "z_BlockIP_035" "z_BlockIP_036" "z_BlockIP_037" "z_BlockIP_038" "z_BlockIP_039" "z_BlockIP_040" "z_BlockIP_041" "z_BlockIP_042" "z_BlockIP_043" "z_BlockIP_044" "z_BlockIP_045" "z_BlockIP_046" "z_BlockIP_047" "z_BlockIP_048" "z_BlockIP_052" "z_BlockIP_053" "z_BlockIP_054" "z_BlockIP_055" "z_BlockIP_056" "z_BlockIP_057" "z_BlockIP_058" "z_BlockIP_059" "z_BlockIP_060" "z_BlockIP_061" "z_BlockIP_062" "z_BlockIP_063" "z_BlockIP_064" "z_BlockIP_065" "z_BlockIP_066" "z_BlockIP_067" "z_BlockIP_068" "z_BlockIP_069" "z_BlockIP_070" "z_BlockIP_071" "z_BlockIP_072" "z_BlockIP_073" "z_BlockIP_074" "z_BlockIP_075" "z_BlockIP_076" "z_BlockIP_077" "z_BlockIP_078" "z_BlockIP_079" "z_BlockIP_080" "z_BlockIP_081" "z_BlockIP_082" "z_BlockIP_083" "z_BlockIP_084" "z_BlockIP_085" "z_BlockIP_086" "z_BlockIP_087" "z_BlockIP_088" "z_BlockIP_089" "z_BlockIP_090" "z_BlockIP_091" "z_BlockIP_092" "z_BlockIP_093" "z_BlockIP_094" "z_BlockIP_095" "z_BlockIP_096" "z_BlockIP_097" "z_BlockIP_098" "z_BlockIP_099" "z_BlockIP_100" "z_BlockIP_101" "z_BlockIP_007" "z_BlockIP_049" "z_BlockIP_050" "z_BlockIP_051" "z_BlockIP_103" "z_BlockIP_104" "z_BlockIP_105" "z_BlockIP_106" "z_BlockIP_107" "z_BlockIP_108" "z_BlockIP_109" "z_BlockIP_111" "z_BlockIP_112" "z_BlockIP_113" "z_BlockIP_114" "z_BlockIP_115" "z_BlockIP_116" "z_BlockIP_117" "z_BlockIP_118" "z_BlockIP_119" "z_BlockIP_120" "z_BlockIP_122" "z_BlockIP_125" "z_BlockIP_126" "z_BlockIP_127" "z_BlockIP_128" "z_BlockIP_129" "z_BlockIP_130" "z_BlockIP_131" "z_BlockIP_132" "z_BlockIP_133" "z_BlockSub_001" "z_BlockSub_002" "z_BlockSub_003" "z_BlockSub_004" "z_BlockSub_005" "z_BlockSub_006" "z_BlockSub_007" "z_BlockSub_008" "z_BlockSub_009" "z_BlockSub_010" "z_BlockSub_011" "z_BlockSub_012" "z_BlockSub_013" "z_BlockSub_014" "z_BlockSub_015" "z_BlockSub_016" "z_BlockSub_017" "z_BlockSub_019" "z_BlockSub_020" "z_BlockSub_021" "z_BlockSub_022" "z_BlockSub_024" "z_BlockSub_025" "z_BlockSub_026" "z_BlockSub_027" "z_BlockSub_028" "z_BlockSub_030" "z_BlockSub_031" "z_BlockSub_032" "z_BlockSub_033" "z_BlockSub_034" "z_BlockSub_035" "z_BlockSub_037" "z_BlockSub_038" "z_BlockSub_039" "z_Ryuk_01" "z_Ryuk_02" "z_BlockIP_023" "z_BlockIP_029" "z_BlockIP_134" "z_BlockIP_135" "z_BlockIP_000" "z_BlockIP_138" "z_BlockIP_139" "z_BlockIP_140" "z_BlockIP_141" "z_BlockIP_142" "z_BlockIP_143" "z_BlockIP_144" "z_BlockIP_145" "z_BlockIP_146" "z_BlockIP_147" "z_BlockIP_148" "z_BlockIP_149" "z_BlockIP_150" "z_BlockRange_01" "z_BlockRange_02" "z_BlockRange_03" "z_BlockSub_040" "z_BlockSub_041" "z_BlockSub_042" + set comment "IPs and Subnets to be blocked as Malicious" + set color 6 + next + edit "City_Side_CGR_Group" + set member "City_Side_CGR_01" "City_Side_CGR_02" + set comment "City Lights CGR Subnets on their side." + set color 28 + set allow-routing enable + next + edit "Access_Control_VLAN_72_Group" + set member "Access_Control_40_Porter" "Access_Control_01_NOC" "Access_Control_02_ITC" "Access_Control_03_PSLA" "Access_Control_04_Nottingham" "Access_Control_06_Henninger" "Access_Control_07_Corcoran" "Access_Control_08_Clary" "Access_Control_09_Grant" "Access_Control_10_Levy" + set color 25 + next + edit "SMTP_Office365_Group" + set member "SMTP_Office365_a" "SMTP_Office365_b" "SMTP_Office365_c" "SMTP_Office365_d" + set comment "Microsoft to Barracuda Archivers" + next + edit "City_Side_VoIP_Group" + set member "City_Side_VoIP_30" "City_Side_VoIP_56" "City_Side_VoIP_61" "City_Side_VoIP_62" "City_Side_VoIP_63" "City_Side_VoIP_64" "City_Side_VoIP_65" "City_Side_VoIP_66" "City_Side_VoIP_67" "City_Side_VoIP_68" "City_Side_VoIP_72" "City_Side_VoIP_74" "City_Side_VoIP_75" "City_Side_VoIP_76" "City_Side_VoIP_77" "City_Side_VoIP_88" "City_Side_VoIP_132" "City_Side_VoIP_1_Park_Place_A" "City_Side_VoIP_1_Park_Place_B" "City_Side_VoIP_Router_A" "City_Side_VoIP_Router_B" + set comment "City VoIP Group - except Parks and Water Recorder" + set color 28 + set allow-routing enable + next + edit "SPD_Side_Firewall_Group" + set member "SPD_Side_A" "SPD_Side_B" + set comment "IP Range of SPD Side Firewalls" + set color 2 + set allow-routing enable + next + edit "Country Allow" + set member "Microsoft 1" + next + edit "Peoplesoft_Audit_Group" + set member "psdevfin" "psdevhcm" "psprdfin" "psprdhcm" "psqasfin" "psqashcm" + set comment "Group allowed for PS Auditors" + set color 20 + next + edit "Genetec_Inside_Group" + set member "NVR-NOC" "NVR-FAILOVER" "NVR-RING1-CLAR" "NVR-RING1-CLAR2" "NVR-RING1-CORC" "NVR-RING1-CORC2" "NVR-RING2-DANF" "NVR-RING2-DANF2" "NVR-RING3-PSLA" "NVR-RING3-PSLA2" "NVR-RING4-BLOD" "NVR-RING4-FRAZ" "NVR-RING5-CENT" "NVR-RING6-EDSM" "NVR-RING6-HWSM" "NVR-RING6-HWSM2" "NVR-RING6-NOTT" "NVR-RING7-BELL" "NVR-RING7-GRAN" "NVR-RING7-GRAN2" "NVR-RING8-HENN" "NVR-RING8-HENN2" "NVR-RING8-HUNT" "Genetec-Dir" "Genetec-DirBU" "Genetec-Media" "Genetec-MRouter" + set comment "District NVRs and Genetec Servers for SPD Federation" + set color 2 + set allow-routing enable + next + edit "MS_Teams_External_Group" + set member "MS_Teams_External_A" "MS_Teams_External_B" + next + edit "SchoolTool_AWS_Internal" + set member "DataTools" "ST_Internal_2" + set allow-routing enable + next + edit "SchoolTool_AWS_External" + set member "ST_External_4" "ST_External_5" "ST_External_6" "ST_External_1" "ST_External_2" "ST_External_3" + set allow-routing enable + next + edit "HighStreet_Local" + set member "DataTools" "Nighttime_Inside" + set comment "Internal IPs for Highstreet Tunnel" + next + edit "DPS_local" + set member "DPS_local_subnet_1" + set comment "VPN: DPS (Created by VPN wizard)" + set allow-routing enable + next + edit "DPS_remote" + set member "DPS_remote_subnet_1" + set comment "VPN: DPS (Created by VPN wizard)" + set allow-routing enable + next + edit "Nutanix_CVM" + set member "Patty_CT_NOC_CVM" "Pigpen_CT_NOC_CVM" "RedBaron_CT_NOC_CVM" "Sally_CT_NOC_CVM" "Schroeder _CT_NOC_CVM" + set comment "Nutanix CVM" + next + edit "Nutanix_Remote_Support" + set member "Nutanix_Support1" "Nutanix_Support2" + set comment "Nutanix Remote Support Web addresses" + next + edit "POS_Machines" + set member "Clary_POS" "ITC_Cafe_POS" "Porter_POS" + set comment "Point of Sale Machines" + next +end +config firewall wildcard-fqdn custom + edit "g-Adobe Login" + set wildcard-fqdn "*.adobelogin.com" + next + edit "g-Gotomeeting" + set wildcard-fqdn "*.gotomeeting.com" + next + edit "g-Windows update 2" + set wildcard-fqdn "*.windowsupdate.com" + next + edit "g-adobe" + set wildcard-fqdn "*.adobe.com" + next + edit "g-android" + set wildcard-fqdn "*.android.com" + next + edit "g-apple" + set wildcard-fqdn "*.apple.com" + next + edit "g-appstore" + set wildcard-fqdn "*.appstore.com" + next + edit "g-auth.gfx.ms" + set wildcard-fqdn "*.auth.gfx.ms" + next + edit "g-autoupdate.opera.com" + set wildcard-fqdn "*autoupdate.opera.com" + next + edit "g-cdn-apple" + set wildcard-fqdn "*.cdn-apple.com" + next + edit "g-citrix" + set wildcard-fqdn "*.citrixonline.com" + next + edit "g-dropbox.com" + set wildcard-fqdn "*.dropbox.com" + next + edit "g-eease" + set wildcard-fqdn "*.eease.com" + next + edit "g-firefox update server" + set wildcard-fqdn "aus*.mozilla.org" + next + edit "g-fortinet" + set wildcard-fqdn "*.fortinet.com" + next + edit "g-google-drive" + set wildcard-fqdn "*drive.google.com" + next + edit "g-google-play" + set wildcard-fqdn "*play.google.com" + next + edit "g-google-play2" + set wildcard-fqdn "*.ggpht.com" + next + edit "g-google-play3" + set wildcard-fqdn "*.books.google.com" + next + edit "g-googleapis.com" + set wildcard-fqdn "*.googleapis.com" + next + edit "g-icloud" + set wildcard-fqdn "*.icloud.com" + next + edit "g-itunes" + set wildcard-fqdn "*itunes.apple.com" + next + edit "g-live.com" + set wildcard-fqdn "*.live.com" + next + edit "g-microsoft" + set wildcard-fqdn "*.microsoft.com" + next + edit "g-mzstatic-apple" + set wildcard-fqdn "*.mzstatic.com" + next + edit "g-skype" + set wildcard-fqdn "*.messenger.live.com" + next + edit "g-softwareupdate.vmware.com" + set wildcard-fqdn "*.softwareupdate.vmware.com" + next + edit "g-swscan.apple.com" + set wildcard-fqdn "*swscan.apple.com" + next + edit "g-update.microsoft.com" + set wildcard-fqdn "*update.microsoft.com" + next + edit "g-verisign" + set wildcard-fqdn "*.verisign.com" + next + edit "YouTube" + set wildcard-fqdn "*youtube.com*" + next +end +config firewall service category + edit "General" + set comment "General services." + next + edit "Web Access" + set comment "Web access." + next + edit "File Access" + set comment "File access." + next + edit "Email" + set comment "Email services." + next + edit "Network Services" + set comment "Network services." + next + edit "Authentication" + set comment "Authentication service." + next + edit "Remote Access" + set comment "Remote access." + next + edit "Tunneling" + set comment "Tunneling service." + next + edit "VoIP, Messaging & Other Applications" + set comment "VoIP, messaging, and other applications." + next + edit "Web Proxy" + set comment "Explicit web proxy." + next +end +config firewall service custom + edit "DNS" + set category "Network Services" + set tcp-portrange 53 + set udp-portrange 53 + next + edit "HTTP" + set category "Web Access" + set tcp-portrange 80 + next + edit "HTTPS" + set category "Web Access" + set tcp-portrange 443 + next + edit "IMAP" + set category "Email" + set tcp-portrange 143 + next + edit "IMAPS" + set category "Email" + set tcp-portrange 993 + next + edit "LDAP" + set category "Authentication" + set tcp-portrange 389 + next + edit "DCE-RPC" + set category "Remote Access" + set tcp-portrange 135 + set udp-portrange 135 + next + edit "POP3" + set category "Email" + set tcp-portrange 110 + next + edit "POP3S" + set category "Email" + set tcp-portrange 995 + next + edit "SAMBA" + set category "File Access" + set tcp-portrange 139 + next + edit "SMTP" + set category "Email" + set tcp-portrange 25 + next + edit "SMTPS" + set category "Email" + set tcp-portrange 465 + next + edit "KERBEROS" + set category "Authentication" + set tcp-portrange 88 464 + set udp-portrange 88 464 + next + edit "LDAP_UDP" + set category "Authentication" + set udp-portrange 389 + next + edit "SMB" + set category "File Access" + set tcp-portrange 445 + next + edit "FTP" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_GET" + set category "File Access" + set tcp-portrange 21 + next + edit "FTP_PUT" + set category "File Access" + set tcp-portrange 21 + next + edit "ALL" + set category "General" + set protocol IP + next + edit "ALL_TCP" + set category "General" + set tcp-portrange 1-65535 + next + edit "ALL_UDP" + set category "General" + set udp-portrange 1-65535 + next + edit "ALL_ICMP" + set category "General" + set protocol ICMP + unset icmptype + next + edit "ALL_ICMP6" + set category "General" + set protocol ICMP6 + unset icmptype + next + edit "GRE" + set category "Tunneling" + set protocol IP + set protocol-number 47 + next + edit "AH" + set category "Tunneling" + set protocol IP + set protocol-number 51 + next + edit "ESP" + set category "Tunneling" + set protocol IP + set protocol-number 50 + next + edit "AOL" + set visibility disable + set tcp-portrange 5190-5194 + next + edit "BGP" + set category "Network Services" + set tcp-portrange 179 + next + edit "DHCP" + set category "Network Services" + set udp-portrange 67-68 + next + edit "FINGER" + set visibility disable + set tcp-portrange 79 + next + edit "GOPHER" + set visibility disable + set tcp-portrange 70 + next + edit "H323" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1720 1503 + set udp-portrange 1719 + next + edit "IKE" + set category "Tunneling" + set udp-portrange 500 4500 + next + edit "Internet-Locator-Service" + set visibility disable + set tcp-portrange 389 + next + edit "IRC" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 6660-6669 + next + edit "L2TP" + set category "Tunneling" + set tcp-portrange 1701 + set udp-portrange 1701 + next + edit "NetMeeting" + set visibility disable + set tcp-portrange 1720 + next + edit "NFS" + set category "File Access" + set tcp-portrange 111 2049 + set udp-portrange 111 2049 + next + edit "NNTP" + set visibility disable + set tcp-portrange 119 + next + edit "NTP" + set category "Network Services" + set tcp-portrange 123 + set udp-portrange 123 + next + edit "OSPF" + set category "Network Services" + set protocol IP + set protocol-number 89 + next + edit "PC-Anywhere" + set category "Remote Access" + set tcp-portrange 5631 + set udp-portrange 5632 + next + edit "PING" + set category "Network Services" + set protocol ICMP + set icmptype 8 + unset icmpcode + next + edit "TIMESTAMP" + set protocol ICMP + set visibility disable + set icmptype 13 + unset icmpcode + next + edit "INFO_REQUEST" + set protocol ICMP + set visibility disable + set icmptype 15 + unset icmpcode + next + edit "INFO_ADDRESS" + set protocol ICMP + set visibility disable + set icmptype 17 + unset icmpcode + next + edit "ONC-RPC" + set category "Remote Access" + set tcp-portrange 111 + set udp-portrange 111 + next + edit "PPTP" + set category "Tunneling" + set tcp-portrange 1723 + next + edit "QUAKE" + set visibility disable + set udp-portrange 26000 27000 27910 27960 + next + edit "RAUDIO" + set visibility disable + set udp-portrange 7070 + next + edit "REXEC" + set visibility disable + set tcp-portrange 512 + next + edit "RIP" + set category "Network Services" + set udp-portrange 520 + next + edit "RLOGIN" + set visibility disable + set tcp-portrange 513:512-1023 + next + edit "RSH" + set visibility disable + set tcp-portrange 514:512-1023 + next + edit "SCCP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 2000 + next + edit "SIP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 5060 + set udp-portrange 5060 + next + edit "SIP-MSNmessenger" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1863 + next + edit "SNMP" + set category "Network Services" + set tcp-portrange 161-162 + set udp-portrange 161-162 + next + edit "SSH" + set category "Remote Access" + set tcp-portrange 22 + next + edit "SYSLOG" + set category "Network Services" + set udp-portrange 514 + next + edit "TALK" + set visibility disable + set udp-portrange 517-518 + next + edit "TELNET" + set category "Remote Access" + set tcp-portrange 23 + next + edit "TFTP" + set category "File Access" + set udp-portrange 69 + next + edit "MGCP" + set visibility disable + set udp-portrange 2427 2727 + next + edit "UUCP" + set visibility disable + set tcp-portrange 540 + next + edit "VDOLIVE" + set visibility disable + set tcp-portrange 7000-7010 + next + edit "WAIS" + set visibility disable + set tcp-portrange 210 + next + edit "WINFRAME" + set visibility disable + set tcp-portrange 1494 2598 + next + edit "X-WINDOWS" + set category "Remote Access" + set tcp-portrange 6000-6063 + next + edit "PING6" + set protocol ICMP6 + set visibility disable + set icmptype 128 + unset icmpcode + next + edit "MS-SQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 1433 1434 + next + edit "MYSQL" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 3306 + next + edit "RDP" + set category "Remote Access" + set tcp-portrange 3389 + next + edit "VNC" + set category "Remote Access" + set tcp-portrange 5900 + next + edit "DHCP6" + set category "Network Services" + set udp-portrange 546 547 + next + edit "SQUID" + set category "Tunneling" + set tcp-portrange 3128 + next + edit "SOCKS" + set category "Tunneling" + set tcp-portrange 1080 + set udp-portrange 1080 + next + edit "WINS" + set category "Remote Access" + set tcp-portrange 1512 + set udp-portrange 1512 + next + edit "RADIUS" + set category "Authentication" + set udp-portrange 1812 1813 + next + edit "RADIUS-OLD" + set visibility disable + set udp-portrange 1645 1646 + next + edit "CVSPSERVER" + set visibility disable + set tcp-portrange 2401 + set udp-portrange 2401 + next + edit "AFS3" + set category "File Access" + set tcp-portrange 7000-7009 + set udp-portrange 7000-7009 + next + edit "TRACEROUTE" + set category "Network Services" + set udp-portrange 33434-33535 + next + edit "RTSP" + set category "VoIP, Messaging & Other Applications" + set tcp-portrange 554 7070 8554 + set udp-portrange 554 + next + edit "MMS" + set visibility disable + set tcp-portrange 1755 + set udp-portrange 1024-5000 + next + edit "NONE" + set visibility disable + set tcp-portrange 0 + next + edit "webproxy" + set proxy enable + set category "Web Proxy" + set protocol ALL + set tcp-portrange 0-65535:0-65535 + next + edit "TCP-109" + set tcp-portrange 109 + next + edit "TCP-1433" + set tcp-portrange 1433 + next + edit "TCP-15000-19999" + set tcp-portrange 15000-19999 + next + edit "TCP-1521" + set tcp-portrange 1521 + next + edit "TCP-1859" + set tcp-portrange 1859 + next + edit "TCP-1935" + set tcp-portrange 1935 + next + edit "TCP-20" + set tcp-portrange 20 + next + edit "TCP-2195" + set tcp-portrange 2195 + next + edit "TCP-2196" + set tcp-portrange 2196 + next + edit "TCP-2525" + set tcp-portrange 2525 + next + edit "TCP-3268" + set tcp-portrange 3268 + next + edit "TCP-3269" + set tcp-portrange 3269 + next + edit "TCP-3520" + set tcp-portrange 3520 + next + edit "TCP-389" + set tcp-portrange 389 + next + edit "TCP-49152-65535" + set tcp-portrange 49152-65535 + next + edit "TCP-5001" + set tcp-portrange 5001 + next + edit "TCP-5060" + set tcp-portrange 5060 + next + edit "TCP-5061" + set tcp-portrange 5061 + next + edit "TCP-5120" + set tcp-portrange 5120 + next + edit "TCP-5122-5127" + set tcp-portrange 5122-5127 + next + edit "TCP-587" + set tcp-portrange 587 + next + edit "TCP-5901" + set tcp-portrange 5901 + next + edit "TCP-5937" + set tcp-portrange 5937 + next + edit "TCP-623" + set tcp-portrange 623 + next + edit "TCP-636" + set tcp-portrange 636 + next + edit "TCP-6502-6510" + set tcp-portrange 6502-6510 + next + edit "TCP-7578" + set tcp-portrange 7578 + next + edit "TCP-7582" + set tcp-portrange 7582 + next + edit "TCP-8000" + set tcp-portrange 8000 + next + edit "TCP-8080" + set tcp-portrange 8080 + next + edit "TCP-8082" + set tcp-portrange 8082 + next + edit "TCP-809" + set tcp-portrange 809 + next + edit "UDP-110" + set udp-portrange 110 + next + edit "UDP-143" + set udp-portrange 143 + next + edit "UDP-1433" + set udp-portrange 1433 + next + edit "UDP-25" + set udp-portrange 25 + next + edit "UDP-2525" + set udp-portrange 2525 + next + edit "UDP-3389" + set udp-portrange 3389 + next + edit "UDP-3478" + set udp-portrange 3478 + next + edit "UDP-443" + set udp-portrange 443 + next + edit "UDP-465" + set udp-portrange 465 + next + edit "UDP-50000-52399" + set udp-portrange 50000-52399 + next + edit "UDP-5001" + set udp-portrange 5001 + next + edit "UDP-587" + set udp-portrange 587 + next + edit "UDP-60000-61799" + set udp-portrange 60000-61799 + next + edit "UDP-623" + set udp-portrange 623 + next + edit "UDP-80" + set udp-portrange 80 + next + edit "UDP-993" + set udp-portrange 993 + next + edit "UDP-995" + set udp-portrange 995 + next + edit "UDP-SRC-1025-65535-DST-3544" + set udp-portrange 3544:1025-65535 + next + edit "UDP-SRC-3544-DST-1025-65535" + set udp-portrange 1025-65535:3544 + next + edit "IP-27" + set protocol IP + set protocol-number 27 + next + edit "IP-4" + set protocol IP + set protocol-number 4 + next + edit "IP-41" + set protocol IP + set protocol-number 41 + next + edit "Webosphere_Data" + set category "File Access" + set tcp-portrange 41000-41500 + next + edit "TCP-9000-9100" + set tcp-portrange 9000-9100 + next + edit "TCP_UDP-18443" + set comment "VDI desktop" + set tcp-portrange 18443 + set udp-portrange 18443 + next + edit "TCP-19000" + set tcp-portrange 19000 + next + edit "TCP_UDP-8100" + set tcp-portrange 8100 + set udp-portrange 8100 + next + edit "TCP 5500" + set category "General" + set comment "SPD Genetec Federation" + set tcp-portrange 5500 + next + edit "TCP 4502" + set category "General" + set comment "SPD Genetec Federation" + set color 2 + set tcp-portrange 4502 + next + edit "Genetec Federation" + set category "Network Services" + set comment "SPD Genetec Federation" + set color 2 + set tcp-portrange 5500 4502 554 560 960 5004 + next + edit "SBC-UDP-Range" + set category "Network Services" + set comment "For SBC" + set udp-portrange 3478-3481 + next + edit "Zoom UDP Ports" + set category "VoIP, Messaging & Other Applications" + set comment "Firewall rules for Zoom Phone" + set color 2 + set fqdn "static.zdassets.com" + set udp-portrange 20000-64000:390 20000-64000:5091 49152-65535:8801-8810 49152-65535:3478 49152-65535:3479 + next +end +config firewall service group + edit "Email Access" + set member "DNS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" + next + edit "Web Access" + set member "DNS" "HTTP" "HTTPS" + next + edit "Windows AD" + set member "DCE-RPC" "DNS" "KERBEROS" "LDAP" "LDAP_UDP" "SAMBA" "SMB" + next + edit "Exchange Server" + set member "DCE-RPC" "DNS" "HTTPS" + next + edit "ContentKeeper-IPMI-Ports_tcp_3520_2" + set member "TCP-3520" + next + edit "ContentKeeper-IPMI-Ports_tcp_5120_3" + set member "TCP-5120" + next + edit "ContentKeeper-IPMI-Ports_tcp_5122_5127_4" + set member "TCP-5122-5127" + next + edit "ContentKeeper-IPMI-Ports_tcp_5900_5" + set member "VNC" + next + edit "ContentKeeper-IPMI-Ports_tcp_5901_6" + set member "TCP-5901" + next + edit "ContentKeeper-IPMI-Ports_tcp_623_7" + set member "TCP-623" + next + edit "ContentKeeper-IPMI-Ports_tcp_7578_8" + set member "TCP-7578" + next + edit "ContentKeeper-IPMI-Ports_tcp_7582_9" + set member "TCP-7582" + next + edit "ContentKeeper-IPMI-Ports_tcp_www_10" + set member "HTTP" + next + edit "ContentKeeper-Mobility_tcp_8080_2" + set member "TCP-8080" + next + edit "ContentKeeper-Mobility_tcp_993_3" + set member "IMAPS" + next + edit "ContentKeeper_UDP_4500" + set member "IKE" + next + edit "ContentKeeper_UDP_500" + set member "IKE" + next + edit "Day-Server_tcp_6502_6510_2" + set member "TCP-6502-6510" + next + edit "Oracle-SQL_tcp_sqlnet_2" + set member "TCP-1521" + next + edit "POP-2" + set member "TCP-109" + next + edit "POP-3" + set member "POP3" + next + edit "ContentKeeper-IPMI-Ports_tcp_https_11" + set member "HTTPS" + next + edit "ContentKeeper-MGMT-Ports_tcp_https_2" + set member "HTTPS" + next + edit "ContentKeeper-MGMT-Ports_tcp_ssh_3" + set member "SSH" + next + edit "ContentKeeper-Mobility_tcp_https_4" + set member "HTTPS" + next + edit "Airwatch_Services_Group" + set member "HTTP" "HTTPS" "Internet-Locator-Service" "SMTP" "SMTPS" "TCP-1433" "TCP-2195" "TCP-2196" "TCP-3268" "TCP-3269" "TCP-636" + set comment "Air watch service group" + next + edit "ContentKeeper-IPMI-Ports" + set member "ContentKeeper-IPMI-Ports_tcp_3520_2" "ContentKeeper-IPMI-Ports_tcp_5120_3" "ContentKeeper-IPMI-Ports_tcp_5122_5127_4" "ContentKeeper-IPMI-Ports_tcp_5900_5" "ContentKeeper-IPMI-Ports_tcp_5901_6" "ContentKeeper-IPMI-Ports_tcp_623_7" "ContentKeeper-IPMI-Ports_tcp_7578_8" "ContentKeeper-IPMI-Ports_tcp_7582_9" "ContentKeeper-IPMI-Ports_tcp_www_10" "ContentKeeper-IPMI-Ports_tcp_https_11" + set comment "Content Keeper IPMI Ports" + next + edit "Email_Services_Group" + set member "HTTP" "HTTPS" "IMAP" "IMAPS" "POP3" "POP3S" "SMTP" "SMTPS" "TCP-2525" "TCP-587" "UDP-110" "UDP-143" "UDP-25" "UDP-2525" "UDP-465" "UDP-587" "UDP-993" "UDP-995" + next + edit "CK_Mobile_Services_Group" + set member "HTTPS" "IMAPS" "TCP-8080" "IKE" + set color 19 + next + edit "CK_Support_Services_Group" + set member "HTTP" "HTTPS" "SSH" "TCP-3520" "TCP-5120" "TCP-5122-5127" "TCP-5901" "TCP-623" "TCP-7578" "TCP-7582" "VNC" + set color 19 + next +end +config firewall internet-service-group + edit "Microsoft_ISDB_Both" + set member "Microsoft-Azure" "Microsoft-Azure.AD" "Microsoft-Azure.Data.Factory" "Microsoft-Azure.Monitor" "Microsoft-Azure.Power.BI" "Microsoft-Azure.SQL" "Microsoft-Azure.Virtual.Desktop" "Microsoft-Dynamics" "Microsoft-Office365.Published" "Microsoft-Office365.Published.Allow" "Microsoft-Office365.Published.Optimize" "Microsoft-Office365.Published.USGOV" "Microsoft-Outlook" "Microsoft-Skype_Teams" "Microsoft-Teams.Published.Worldwide.Allow" "Microsoft-Teams.Published.Worldwide.Optimize" "Microsoft-WNS" + next + edit "Microsoft_ISDB_Destination" + set direction destination + set member "Microsoft-DNS" "Microsoft-FTP" "Microsoft-ICMP" "Microsoft-Inbound_Email" "Microsoft-Intune" "Microsoft-Microsoft.Update" "Microsoft-NetBIOS.Name.Service" "Microsoft-NetBIOS.Session.Service" "Microsoft-NTP" "Microsoft-Office365" "Microsoft-Other" "Microsoft-Outbound_Email" "Microsoft-RTMP" "Microsoft-SSH" "Microsoft-Web" + next +end +config firewall shaper traffic-shaper + edit "high-priority" + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "medium-priority" + set maximum-bandwidth 1048576 + set priority medium + set per-policy enable + next + edit "low-priority" + set maximum-bandwidth 1048576 + set priority low + set per-policy enable + next + edit "guarantee-100kbps" + set guaranteed-bandwidth 100 + set maximum-bandwidth 1048576 + set per-policy enable + next + edit "shared-1M-pipe" + set maximum-bandwidth 1024 + next +end +config firewall schedule recurring + edit "always" + set day sunday monday tuesday wednesday thursday friday saturday + next + edit "none" + next + edit "default-darrp-optimize" + set start 01:00 + set end 01:30 + set day sunday monday tuesday wednesday thursday friday saturday + next +end +config firewall ippool + edit "ippool-198.36.23.251" + set startip 198.36.23.251 + set endip 198.36.23.251 + next + edit "ippool-198.36.23.252" + set startip 198.36.23.252 + set endip 198.36.23.252 + next + edit "ippool-198.36.23.253" + set startip 198.36.23.253 + set endip 198.36.23.253 + next + edit "ippool-198.36.23.254" + set startip 198.36.23.254 + set endip 198.36.23.254 + next + edit "NTSS_Outside" + set startip 198.36.24.68 + set endip 198.36.24.68 + next + edit "Nighttime_Outside" + set startip 198.36.24.191 + set endip 198.36.24.191 + next + edit "MailOut_Outside" + set startip 198.36.22.227 + set endip 198.36.22.227 + next + edit "SBC-NOC-Outside" + set startip 198.36.26.37 + set endip 198.36.26.37 + next + edit "SBC-DAN-Outside" + set startip 198.36.26.38 + set endip 198.36.26.38 + next +end +config firewall vip + edit "vip-ntss" + set comment "SRIC BOCES Tunnel +170.161.52.27 (SRIC Server) - This is the source address needed for the tunnel +170.161.52.25 (SRIC Firewall) +description Eastern Suffolk BOCES access to NTSS.scsd.ad" + set src-filter "170.161.52.27-170.161.52.27" + set extip 198.36.24.68 + set mappedip "10.1.48.68" + set extintf "SRIC_BOCES" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-ckf01-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.31 + set mappedip "10.251.1.31" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + set color 19 + next + edit "vip-ckf01-mgmt" + set comment "ContentKeeper" + set extip 198.36.26.21 + set mappedip "10.251.1.21" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckf02-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.32 + set mappedip "10.251.1.32" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckf02-mgmt" + set comment "ContentKeeper" + set extip 198.36.26.22 + set mappedip "10.251.1.22" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-cklb01-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.30 + set mappedip "10.251.1.30" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-cklb01-mgmt" + set comment "ContentKeeper" + set extip 198.36.26.20 + set mappedip "10.251.1.20" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm01-mgmt2" + set comment "ContentKeeper" + set extip 198.36.26.28 + set mappedip "10.251.1.28" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckr01-mgmt" + set comment "ContentKeeper" + set extip 198.36.26.23 + set mappedip "10.251.1.23" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckr01-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.33 + set mappedip "10.251.1.33" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm01-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.34 + set mappedip "10.251.1.34" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm01-mgmt" + set comment "ContentKeeper" + set extip 198.36.26.24 + set mappedip "10.251.1.24" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm02-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.35 + set mappedip "10.251.1.35" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm02-mgmt" + set comment "ContentKeeper" + set extip 198.36.26.25 + set mappedip "10.251.1.25" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm02-mgmt2" + set comment "ContentKeeper" + set extip 198.36.26.29 + set mappedip "10.251.1.29" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm03-ipmi" + set comment "ContentKeeper" + set extip 198.36.26.36 + set mappedip "10.251.1.36" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm03-mgmt1" + set comment "ContentKeeper" + set extip 198.36.26.26 + set mappedip "10.251.1.26" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-ckm03-mgmt2" + set comment "ContentKeeper" + set extip 198.36.26.27 + set mappedip "10.251.1.27" + set extintf "outside lag" + set nat-source-vip enable + set color 19 + next + edit "vip-scsdess" + set comment "ESS" + set extip 198.36.24.100 + set mappedip "10.1.140.14" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-applecaching" + set comment "Apple caching server for managing Apple device updates" + set extip 198.36.24.57 + set mappedip "10.1.40.107" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-DC01" + set comment "Domain Controller for LDAP" + set extip 198.36.25.45 + set mappedip "10.1.40.95" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + set color 14 + next + edit "vip-tableau" + set comment "Tableau" + set extip 198.36.24.61 + set mappedip "10.1.140.12" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-ns1" + set comment "DNS External" + set extip 198.36.22.245 + set mappedip "10.1.48.45" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-ns2" + set comment "DNS External" + set extip 198.36.22.19 + set mappedip "10.1.40.41" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-webhelpdesk" + set comment "Web Help Desk" + set extip 198.36.25.20 + set mappedip "10.1.140.6" + set extintf "outside lag" + set nat-source-vip enable + next + edit "vip-Airwatchapp" + set comment "Airwatch (Workspace One) MDM" + set extip 198.36.24.56 + set mappedip "10.1.140.9" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-Webosphere" + set comment "SCSD Website" + set extip 198.36.24.16 + set mappedip "10.1.140.11" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-Neutrons" + set comment "Address Lookup" + set extip 198.36.24.210 + set mappedip "10.1.40.210" + set extintf "outside lag" + set nat-source-vip enable + next + edit "vip-Barracuda-Archive-2" + set comment "Barracuda Email" + set extip 198.36.22.229 + set mappedip "10.1.40.17" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-Barracuda-Archive-1" + set comment "Barracuda Email" + set extip 198.36.22.228 + set mappedip "10.1.40.16" + set extintf "outside lag" + set nat-source-vip enable + set srcintf-filter "outside lag" + next + edit "vip-hybrid-email" + set comment "Email" + set extip 198.36.22.143 + set mappedip "10.1.48.49" + set extintf "outside lag" + next + edit "vip-sbc-noc" + set comment "Ribbon ITC NOC" + set extip 198.36.26.37 + set mappedip "10.1.150.21" + set extintf "outside lag" + next + edit "vip-sbc-dan" + set comment "Ribbon Danforth" + set extip 198.36.26.38 + set mappedip "10.21.150.21" + set extintf "outside lag" + next + edit "vip-PrintOC" + set comment "Oracle Printer" + set extip 198.36.26.119 + set mappedip "10.1.40.219" + set extintf "outside lag" + next + edit "vip-EMS" + set comment "FortiClient EMS" + set extip 198.36.24.202 + set mappedip "10.1.40.22" + set extintf "outside lag" + next +end +config firewall vipgrp + edit "vip-grp-ck-mgmt-filters" + set interface "outside lag" + set color 19 + set member "vip-ckf01-mgmt" "vip-ckf02-mgmt" + next + edit "vip-grp-ck-all" + set interface "outside lag" + set color 19 + set member "vip-ckf01-ipmi" "vip-ckf01-mgmt" "vip-ckf02-ipmi" "vip-ckf02-mgmt" "vip-cklb01-ipmi" "vip-cklb01-mgmt" "vip-ckm01-ipmi" "vip-ckm01-mgmt" "vip-ckm01-mgmt2" "vip-ckm02-ipmi" "vip-ckm02-mgmt" "vip-ckm02-mgmt2" "vip-ckm03-ipmi" "vip-ckm03-mgmt1" "vip-ckm03-mgmt2" "vip-ckr01-ipmi" "vip-ckr01-mgmt" + next + edit "vip-grp-ckm-mgmt" + set interface "outside lag" + set color 19 + set member "vip-ckm01-mgmt" "vip-ckm01-mgmt2" "vip-ckm02-mgmt" "vip-ckm02-mgmt2" "vip-ckm03-mgmt1" "vip-ckm03-mgmt2" + next + edit "vip-grp-barracuda_Archivers" + set interface "outside lag" + set member "vip-Barracuda-Archive-1" "vip-Barracuda-Archive-2" + next +end +config firewall ssh local-key + edit "g-Fortinet_SSH_DSA1024" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA256" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA384" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ECDSA521" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_ED25519" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_RSA2048" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh local-ca + edit "g-Fortinet_SSH_CA" + set password ENC *HIDDEN* + set source built-in + next + edit "g-Fortinet_SSH_CA_Untrusted" + set password ENC *HIDDEN* + set source built-in + next +end +config firewall ssh setting + set caname "g-Fortinet_SSH_CA" + set untrusted-caname "g-Fortinet_SSH_CA_Untrusted" + set hostkey-rsa2048 "g-Fortinet_SSH_RSA2048" + set hostkey-dsa1024 "g-Fortinet_SSH_DSA1024" + set hostkey-ecdsa256 "g-Fortinet_SSH_ECDSA256" + set hostkey-ecdsa384 "g-Fortinet_SSH_ECDSA384" + set hostkey-ecdsa521 "g-Fortinet_SSH_ECDSA521" + set hostkey-ed25519 "g-Fortinet_SSH_ED25519" +end +config firewall profile-protocol-options + edit "default" + set comment "All default services." + config http + set ports 80 + unset options + unset post-lang + end + config ftp + set ports 21 + set options splice + end + config imap + set ports 143 + set options fragmail + end + config mapi + set ports 135 + set options fragmail + end + config pop3 + set ports 110 + set options fragmail + end + config smtp + set ports 25 + set options fragmail splice + end + config nntp + set ports 119 + set options splice + end + config ssh + unset options + end + config dns + set ports 53 + end + config cifs + set ports 445 + unset options + end + next +end +config firewall ssl-ssh-profile + edit "certificate-inspection" + set comment "Read-only SSL handshake inspection profile." + config https + set ports 443 + set status certificate-inspection + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next + edit "deep-inspection" + set comment "Read-only deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set fortiguard-category 31 + next + edit 2 + set fortiguard-category 33 + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 29 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 30 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 31 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "custom-deep-inspection" + set comment "Customizable deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 2 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 29 + set fortiguard-category 31 + next + edit 30 + set fortiguard-category 33 + next + edit 31 + set fortiguard-category 25 + next + edit 32 + set type wildcard-fqdn + set wildcard-fqdn "g-cdn-apple" + next + edit 33 + set type wildcard-fqdn + set wildcard-fqdn "g-mzstatic-apple" + next + end + next + edit "no-inspection" + set comment "Read-only profile that does no inspection." + config https + set status disable + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next + edit "custom-cert-inspection" + set comment "Read-only SSL handshake inspection profile." + config https + set ports 443 + set status certificate-inspection + set unsupported-ssl-version allow + end + config ftps + set status disable + set unsupported-ssl-version allow + end + config imaps + set status disable + set unsupported-ssl-version allow + end + config pop3s + set status disable + set unsupported-ssl-version allow + end + config smtps + set status disable + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + next + edit "SCSD custom-deep-inspection" + set comment "Customizable deep inspection profile." + config https + set ports 443 + set status deep-inspection + set unsupported-ssl-version allow + end + config ftps + set ports 990 + set status deep-inspection + set unsupported-ssl-version allow + end + config imaps + set ports 993 + set status deep-inspection + set unsupported-ssl-version allow + end + config pop3s + set ports 995 + set status deep-inspection + set unsupported-ssl-version allow + end + config smtps + set ports 465 + set status deep-inspection + set unsupported-ssl-version allow + end + config ssh + set ports 22 + set status disable + end + config dot + set status disable + end + config ssl-exempt + edit 1 + set type wildcard-fqdn + set wildcard-fqdn "g-adobe" + next + edit 2 + set type wildcard-fqdn + set wildcard-fqdn "g-Adobe Login" + next + edit 3 + set type wildcard-fqdn + set wildcard-fqdn "g-android" + next + edit 4 + set type wildcard-fqdn + set wildcard-fqdn "g-apple" + next + edit 5 + set type wildcard-fqdn + set wildcard-fqdn "g-appstore" + next + edit 6 + set type wildcard-fqdn + set wildcard-fqdn "g-auth.gfx.ms" + next + edit 7 + set type wildcard-fqdn + set wildcard-fqdn "g-autoupdate.opera.com" + next + edit 8 + set type wildcard-fqdn + set wildcard-fqdn "g-citrix" + next + edit 9 + set type wildcard-fqdn + set wildcard-fqdn "g-dropbox.com" + next + edit 10 + set type wildcard-fqdn + set wildcard-fqdn "g-eease" + next + edit 11 + set type wildcard-fqdn + set wildcard-fqdn "g-firefox update server" + next + edit 12 + set type wildcard-fqdn + set wildcard-fqdn "g-fortinet" + next + edit 13 + set type wildcard-fqdn + set wildcard-fqdn "g-google-drive" + next + edit 14 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play" + next + edit 15 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play2" + next + edit 16 + set type wildcard-fqdn + set wildcard-fqdn "g-google-play3" + next + edit 17 + set type wildcard-fqdn + set wildcard-fqdn "g-googleapis.com" + next + edit 18 + set type wildcard-fqdn + set wildcard-fqdn "g-Gotomeeting" + next + edit 19 + set type wildcard-fqdn + set wildcard-fqdn "g-icloud" + next + edit 20 + set type wildcard-fqdn + set wildcard-fqdn "g-itunes" + next + edit 21 + set type wildcard-fqdn + set wildcard-fqdn "g-live.com" + next + edit 22 + set type wildcard-fqdn + set wildcard-fqdn "g-microsoft" + next + edit 23 + set type wildcard-fqdn + set wildcard-fqdn "g-skype" + next + edit 24 + set type wildcard-fqdn + set wildcard-fqdn "g-softwareupdate.vmware.com" + next + edit 25 + set type wildcard-fqdn + set wildcard-fqdn "g-swscan.apple.com" + next + edit 26 + set type wildcard-fqdn + set wildcard-fqdn "g-update.microsoft.com" + next + edit 27 + set type wildcard-fqdn + set wildcard-fqdn "g-verisign" + next + edit 28 + set type wildcard-fqdn + set wildcard-fqdn "g-Windows update 2" + next + edit 29 + set fortiguard-category 31 + next + edit 30 + set fortiguard-category 33 + next + edit 31 + set fortiguard-category 25 + next + end + next +end +config firewall policy + edit 89 + set status disable + set name "Country Allow In->Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "all" + set dstaddr "Country Allow" + set schedule "always" + set service "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "g-default" + next + edit 90 + set status disable + set name "Country Allow Out->In" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "Country Allow" + set dstaddr "all" + set schedule "always" + set service "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "g-default" + set comments " (Copy of NVIDEA_LICENSING) (Reverse of NVIDEA_LICENSING)" + next + edit 109 + set name "Block Countries Out -> In" + set srcintf "outside" + set dstintf "inside" + set srcaddr "Country Block" + set dstaddr "all" + set schedule "always" + set service "ALL" + set logtraffic all + set match-vip enable + set comments "Block specific countries" + next + edit 110 + set name "Block Countries In -> Out" + set srcintf "inside" + set dstintf "outside" + set srcaddr "all" + set dstaddr "Country Block" + set schedule "always" + set service "ALL" + set logtraffic all + set match-vip enable + set comments "Block specific countries" + next + edit 10020 + set name "Deny_List_In" + set srcintf "outside" + set dstintf "inside" + set srcaddr "Block_List_Group" + set dstaddr "all" + set schedule "always" + set service "ALL" + set logtraffic all + set match-vip enable + set comments "Block Known Attachers" + next + edit 10022 + set name "Deny_List_Out" + set srcintf "inside" + set dstintf "outside" + set srcaddr "all" + set dstaddr "Block_List_Group" + set schedule "always" + set service "ALL" + set logtraffic all + set match-vip enable + set comments "Block Known Attachers" + next + edit 112 + set name "SSL_VPN_FULL" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "IPv4-Private-All-RFC1918" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "SSL_VPN_Full_Access" "FortiGateAccess" + set comments "Remote Access VPN - Full Access" + next + edit 59 + set name "VPN_Security_VLAN_70" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Security_VLAN_70_Group" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Security_Group" + set comments "Remote Access VPN - Security VLAN 70" + next + edit 78 + set name "VPN_Access_Control_VLAN_72" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Access_Control_VLAN_72_Group" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Access_Control_Group" + set comments "Remote Access VPN - Access Control VLAN 72" + next + edit 63 + set name "VPN_Hyperion_Servers" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Hyperion_Server_Group" + set schedule "always" + set service "RDP" "UDP-3389" "HTTP" "HTTPS" "TCP-19000" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Hyperion_Group" + set comments "Remote Access VPN - Hyperion Servers" + next + edit 57 + set name "VPN_Website_Server" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Webosphere_Inside" + set schedule "always" + set service "RDP" "UDP-3389" "FTP" "FTP_GET" "FTP_PUT" "TFTP" "Webosphere_Data" "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Web_Servers_Group" + set comments "Remote Access VPN - SCSD Website" + next + edit 58 + set name "VPN_DayAutomation_Servers" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Day_Server_Group" + set schedule "always" + set service "RDP" "UDP-3389" "HTTPS" "TCP-6502-6510" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_DayAuto_Group" + set comments "Remote Access VPN - Day Automation Servers" + next + edit 80 + set name "VPN_Auditors" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "psprdfin" "psprdhcm" + set schedule "always" + set service "HTTP" "HTTPS" "UDP-3389" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Auditor_Group" + set comments "Remote Access VPN - Auditors" + next + edit 66 + set name "VPN_WebCRD_Server" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "WebCRD" + set schedule "always" + set service "HTTPS" "SSH" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_WebCRD_Group" + set comments "Remote Access VPN - webCRD" + next + edit 69 + set name "VPN_DocHolliday" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "DocHolliday" + set schedule "always" + set service "RDP" "UDP-3389" "SMB" "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_DocHolliday_Group" + set comments "Remote Access VPN - DocHolliday for Katapult User" + next + edit 68 + set name "VPN_Access411_Servers" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "411_Group" + set schedule "always" + set service "RDP" "UDP-3389" "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Access411_Group" + set comments "Remote Access VPN - Access411 RDP" + next + edit 91 + set name "VPN_Peoplesoft_Audit" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Peoplesoft_Audit_Group" + set schedule "always" + set service "HTTP" "HTTPS" "TCP_UDP-8100" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Peoplesoft_Group" + set comments "Remote Access VPN - Peoplesoft Auditors" + next + edit 64 + set name "VPN_Peoplesoft_RDP" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Peoplesoft_RDP_Group" + set schedule "always" + set service "RDP" "UDP-3389" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Peoplesoft_Group" + set comments "Remote Access VPN - Peoplesoft RDP" + next + edit 65 + set name "VPN_Peoplesoft_SSH" + set srcintf "ssl.scsd" + set dstintf "inside" + set action accept + set srcaddr "SSL_VPN_Range" + set dstaddr "Peoplesoft_SSH_Group" + set schedule "always" + set service "SSH" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set groups "VPN_Peoplesoft_Group" + set comments "Remote Access VPN - Peoplesoft SSH" + next + edit 10009 + set name "Nimble_Sup_Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "Nimble_Inside_Grp" + set dstaddr "Nimble_Support" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set nat enable + set ippool enable + set poolname "ippool-198.36.23.251" "ippool-198.36.23.253" "ippool-198.36.23.254" "ippool-198.36.23.252" + set comments "Nimble Support" + next + edit 10010 + set name "Nimble_Sup_In" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "Nimble_Support" + set dstaddr "Nimble_Inside_Grp" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Nimble Support" + next + edit 107 + set status disable + set name "Content_Keeper_In -> Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "CK_Inside_Group" + set dstaddr "all" + set schedule "always" + set service "ALL" + set logtraffic all + set nat enable + set ippool enable + set poolname "ippool-198.36.23.251" "ippool-198.36.23.253" "ippool-198.36.23.254" "ippool-198.36.23.252" + set comments "ContentKeeper" + next + edit 10026 + set name "Barracuda In->Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "Barracuda_Internal" + set dstaddr "all" + set schedule "always" + set service "SMTP" "SMTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set nat enable + set ippool enable + set poolname "MailOut_Outside" + set comments "Barracuda Internal Email" + next + edit 67 + set name "Nighttime In->Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "Nighttime_Inside" + set dstaddr "all" + set schedule "always" + set service "FTP" "SSH" "TFTP" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set nat enable + set ippool enable + set poolname "Nighttime_Outside" + set comments "Forces nighttime to use specific external IP" + next + edit 10070 + set name "Reverse_Proxy" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "ReverseProxy" + set schedule "always" + set service "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Need to examine - Reverse Proxy" + next + edit 94 + set name "SBC_NOC_In->Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "SBC-NOC" + set dstaddr "MS_Teams_External_Group" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Outgoing_IPS" + set logtraffic all + set nat enable + set ippool enable + set poolname "SBC-NOC-Outside" + set comments "SBC Ribbon" + next + edit 100 + set name "SBC_DAN_In->Out" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "SBC-DAN" + set dstaddr "MS_Teams_External_Group" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Outgoing_IPS" + set logtraffic all + set nat enable + set ippool enable + set poolname "SBC-DAN-Outside" + set comments "SBC Ribbon" + next + edit 10046 + set name "SRIC_BOCES_Allow" + set srcintf "SRIC_BOCES" + set dstintf "inside" + set action accept + set srcaddr "SRICBOCES-OUTSIDE" + set dstaddr "vip-ntss" + set schedule "always" + set service "ALL_ICMP" "HTTP" "HTTPS" "TCP-1521" "TCP-9000-9100" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Site to Site VPN - SRIC BOCES NTSS" + next + edit 10174 + set name "NTSS In->Out" + set srcintf "inside" + set dstintf "SRIC_BOCES" + set action accept + set srcaddr "ntss-inside" + set dstaddr "SRICBOCES-OUTSIDE" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set nat enable + set ippool enable + set poolname "NTSS_Outside" + set comments "Site to Site VPN - SRIC BOCES NTSS" + next + edit 72 + set name "SCHC_In->Out" + set srcintf "inside" + set dstintf "SCHC" + set action accept + set srcaddr "SCHC_Local_Subnets_Group" + set dstaddr "SCHC_Remote_Subnets_Group" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "g-default" + set logtraffic all + set comments "Site to Site VPN - SCHC" + next + edit 73 + set name "SCHC_Out->In" + set srcintf "SCHC" + set dstintf "inside" + set action accept + set srcaddr "SCHC_Remote_Subnets_Group" + set dstaddr "SCHC_Local_Subnets_Group" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "g-default" + set logtraffic all + set comments "Site to Site VPN - SCHC" + next + edit 102 + set name "eScholar In->Out" + set srcintf "inside" + set dstintf "vpn-0403e61" + set action accept + set srcaddr "all" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Site to Site VPN - AWS eScholar" + next + edit 108 + set status disable + set name "eScholar Out->In" + set srcintf "vpn-0403e61" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Site to Site VPN - AWS eScholar" + next + edit 101 + set name "testing highstreet" + set srcintf "inside" + set dstintf "Highstreet" + set action accept + set srcaddr "all" + set dstaddr "all" + set schedule "always" + set service "ALL" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "Site to Site VPN - Highstreet (Copy of Highstreet_Tunnel_In->Out)" + next + edit 111 + set name "Highstreet_Tunnel_In->Out" + set srcintf "inside" + set dstintf "Highstreet" + set action accept + set srcaddr "Server_40" "Server_48" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Site to Site VPN - Highstreet" + next + edit 113 + set name "Highstreet_2_Tunnel_In->Out" + set srcintf "inside" + set dstintf "Highstreet_2" + set action accept + set srcaddr "Server_40" "Server_48" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "VPN - Highstreet 2" + next + edit 61 + set name "AWS_VPN_In->Out" + set srcintf "inside" + set dstintf "vpn-042e9903" + set action accept + set srcaddr "all" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Site to Site VPN - AWS" + next + edit 96 + set name "SchoolTool_AWS_In->Out" + set srcintf "inside" + set dstintf "vpn-0fc50345" + set action accept + set srcaddr "all" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "SchoolTool Tunnel In -> Out" + next + edit 97 + set name "SchoolTool_AWS_Out->In" + set srcintf "vpn-0fc50345" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Reverse of SchoolTool_AWS_In->Out" + next + edit 62 + set status disable + set name "Test Cert Decrypt" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "Tim PC" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "SCSD custom-deep-inspection" + set av-profile "g-default" + set ips-sensor "Incoming_IPS" + set application-list "App_Ctrl_1" + set logtraffic all + set nat enable + set ippool enable + set poolname "ippool-198.36.23.251" "ippool-198.36.23.253" "ippool-198.36.23.254" "ippool-198.36.23.252" + set tcp-mss-sender 1400 + set tcp-mss-receiver 1400 + set comments "Internet Access (Copy of Internet Access)" + next + edit 98 + set name "AW_Scanner_Allow" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "AW_Scanner_MerryChristmas" "AW_Scanner _HappyHalloween" "AW_Scanner_DiaDeLosMuertos" "AW_Scanner_HappyNewYear" "AW_Scanner_LaborDay" + set dstaddr "AW_device-activation.us-global-prod.arcticwolf.net" "AW_drs.us-global-prod.arcticwolf.net" "AW_inbound.us002-prod.arcticwolf.net" + set schedule "always" + set service "ALL" + set nat enable + next + edit 116 + set name "POS Test" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "POS_Machines" + set dstaddr "all" + set schedule "always" + set service "ALL" + set logtraffic all + set nat enable + set ippool enable + set poolname "ippool-198.36.23.251" "ippool-198.36.23.253" "ippool-198.36.23.254" "ippool-198.36.23.252" + set tcp-mss-sender 1400 + set tcp-mss-receiver 1400 + set comments "Test Point of Sale" + next + edit 106 + set name "Internet Access" + set srcintf "inside" "RAP" + set dstintf "outside" + set action accept + set srcaddr "IPv4-Private-All-RFC1918" "VPN-Range" + set dstaddr "all" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set av-profile "g-default" + set ips-sensor "Outgoing_IPS" + set application-list "App_Ctrl_1" + set logtraffic all + set nat enable + set ippool enable + set poolname "ippool-198.36.23.251" "ippool-198.36.23.253" "ippool-198.36.23.254" "ippool-198.36.23.252" + set tcp-mss-sender 1400 + set tcp-mss-receiver 1400 + set comments "Internet Access" + next + edit 71 + set name "County->Peoplesoft" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "County_Network" + set dstaddr "psprdfin" + set schedule "always" + set service "HTTP" "HTTPS" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + next + edit 82 + set name "Peoplesoft -> County" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "psprdfin" + set dstaddr "County_Network" + set schedule "always" + set service "HTTP" "HTTPS" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments " (Copy of County->Peoplesoft) (Reverse of County->Peoplesoft)" + next + edit 81 + set name "County -> DNS" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "County_Network" + set dstaddr "Domain_Controller_Group" + set schedule "always" + set service "DNS" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments " (Copy of County->Peoplesoft)" + next + edit 76 + set name "City_CGRs_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "City_Side_CGR_01" "City_Side_CGR_02" + set dstaddr "City_CGRs_Group" + set schedule "always" + set service "ESP" "IKE" "PING" "SSH" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "City Lights - CGR - Allow Ping and SSH from City-Side Subnets" + next + edit 77 + set name "City_CGRs_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "City_CGRs_Group" + set dstaddr "City_Side_CGR_01" "City_Side_CGR_02" + set schedule "always" + set service "ESP" "IKE" "PING" "SSH" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "Allow City Lights CGR to City Side Subnets" + next + edit 85 + set name "City_VoIP_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "City_Side_VoIP_Group" + set dstaddr "CUCM_BRIGHTON" "CUCM_ITC_NOC" + set schedule "always" + set service "ALL" + set logtraffic all + set comments "City Allowed Networks From them to Us (Copy of City_Phones_Out->In)" + next + edit 86 + set name "City_VoIP_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "CUCM_BRIGHTON" "CUCM_ITC_NOC" + set dstaddr "City_Side_VoIP_Group" + set schedule "always" + set service "ALL" + set logtraffic all + set comments "City Allowed Networks From them to Us (Copy of City_Phones_Out->In) (Copy of City_VoIP_Out->In) (Reverse of City_VoIP_Out->In)" + next + edit 84 + set name "City_Water_DPW_Recorder_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "City_Side_VoIP_Water_DPW_Recorder" + set dstaddr "CUCM_BRIGHTON" "CUCM_ITC_NOC" + set schedule "always" + set service "ALL" + set inspection-mode proxy + set logtraffic all + set auto-asic-offload disable + set np-acceleration disable + set comments "City Allowed Networks From them to Us (Copy of City_Phones_Out->In) (Copy of City_Parks_Phones_Out->In)" + next + edit 88 + set name "City_Water_DPW_Recorder_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "CUCM_BRIGHTON" "CUCM_ITC_NOC" + set dstaddr "City_Side_VoIP_Water_DPW_Recorder" + set schedule "always" + set service "ALL" + set inspection-mode proxy + set logtraffic all + set auto-asic-offload disable + set np-acceleration disable + set comments "City Allowed Networks From them to Us (Copy of City_Phones_Out->In) (Copy of City_Parks_Phones_Out->In) (Copy of City_Water_DPW_Recorder_Out->In) (Reverse of City_Water_DPW_Recorder_Out->In)" + next + edit 60 + set name "City_Parks_Phones_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "City_Side_Parks_Phone_Subnet" "City_Side_VoIP_Water_DPW_Recorder" + set dstaddr "CUCM_BRIGHTON" "CUCM_ITC_NOC" + set schedule "always" + set service "ALL" + set inspection-mode proxy + set logtraffic all + set auto-asic-offload disable + set np-acceleration disable + set comments "City Allowed Networks From them to Us (Copy of City_Phones_Out->In)" + next + edit 79 + set name "City_Parks_Phones_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "CUCM_BRIGHTON" "CUCM_ITC_NOC" + set dstaddr "City_Side_Parks_Phone_Subnet" "City_Side_VoIP_Water_DPW_Recorder" + set schedule "always" + set service "ALL" + set inspection-mode proxy + set logtraffic all + set comments "City Allowed Networks From Us to Them (Copy of City_Phones_In->Out)" + next + edit 70 + set status disable + set name "Block SPD DNS ACCESS" + set srcintf "city_phones" + set dstintf "inside" + set srcaddr "SPD_Network" + set dstaddr "all" + set schedule "always" + set service "DNS" + set logtraffic disable + set comments "Deny SPD DNS" + next + edit 55 + set name "SPD_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "SPD_Network" + set dstaddr "SPD_Firewalls_Our_Side" + set schedule "always" + set service "ESP" "IKE" "SNMP" "SSH" "ALL_ICMP" "HTTPS" "HTTP" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "SPD Access" + next + edit 87 + set name "SPD_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "SPD_Firewalls_Our_Side" + set dstaddr "SPD_Network" + set schedule "always" + set service "ESP" "IKE" "SNMP" "SSH" "ALL_ICMP" "HTTPS" "HTTP" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "SPD Access (Copy of SPD_Out->In) (Reverse of SPD_Out->In)" + next + edit 83 + set name "SPD_ Genetec_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "SPD_Side_Genetec" + set dstaddr "Genetec_Inside_Group" + set schedule "always" + set service "Genetec Federation" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "SPD Access for Genetec Federation" + next + edit 92 + set name "SPD_ Genetec_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "Genetec_Inside_Group" + set dstaddr "SPD_Side_Genetec" + set schedule "always" + set service "Genetec Federation" + set ssl-ssh-profile "certificate-inspection" + set logtraffic all + set comments "SPD Access for Genetec Federation" + next + edit 54 + set name "City_Phones_Out->In" + set srcintf "city_phones" + set dstintf "inside" + set action accept + set srcaddr "City_Subnets_Group" + set dstaddr "City_Permited_Subnets_Group" + set schedule "always" + set service "ALL" + set logtraffic all + set comments "City Allowed Networks From them to Us" + next + edit 75 + set name "City_Phones_In->Out" + set srcintf "inside" + set dstintf "city_phones" + set action accept + set srcaddr "City_Permited_Subnets_Group" + set dstaddr "City_Subnets_Group" + set schedule "always" + set service "ALL" + set logtraffic all + set comments "City Allowed Networks From Us to Them" + next + edit 10012 + set status disable + set name "CK_Mgmt_Filters" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-grp-ck-mgmt-filters" + set schedule "always" + set service "HTTPS" "TCP-8080" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "ContentKeeper" + next + edit 10014 + set status disable + set name "CK_Support" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "CONTENTKEEPER-REMOTE-SUPPORT" + set dstaddr "vip-grp-ck-all" + set schedule "always" + set service "CK_Support_Services_Group" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "ContentKeeper" + next + edit 10018 + set status disable + set name "CKMobile" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-grp-ckm-mgmt" + set schedule "always" + set service "CK_Mobile_Services_Group" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "ContentKeeper" + next + edit 10024 + set name "Email_Hybrid_Allow" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-hybrid-email" + set schedule "always" + set service "HTTP" "HTTPS" "SMTP" "SMTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Hybrid Email - Robert Johnson" + next + edit 10027 + set name "Barracuda_Archivers" + set srcintf "outside" + set dstintf "inside" + set action accept + set dstaddr "vip-grp-barracuda_Archivers" + set internet-service-src enable + set internet-service-src-group "Microsoft_ISDB_Both" + set schedule "always" + set service "HTTP" "HTTPS" "SMTP" "SMTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Barracuda Archivers from Microsoft" + next + edit 115 + set name "Nutanix_Remote_Support" + set srcintf "inside" + set dstintf "outside" + set action accept + set srcaddr "Nutanix_CVM" + set dstaddr "Nutanix_Remote_Support" + set schedule "always" + set service "HTTP" "HTTPS" + set logtraffic all + next + edit 10076 + set status disable + set name "Apple_Cache" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-applecaching" + set schedule "always" + set service "ALL_TCP" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Apple Caching Server Access" + next + edit 10094 + set name "DNS_ns1" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-ns1" + set schedule "always" + set service "DNS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "DNS - External" + next + edit 10092 + set name "DNS_ns2" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-ns2" + set schedule "always" + set service "DNS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "DNS - External" + next + edit 10108 + set name "LDAP_Access" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "Safeschools_Group" + set dstaddr "vip-DC01" + set schedule "always" + set service "LDAP" "LDAP_UDP" "TCP-636" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "LDAP" + next + edit 10130 + set name "Airwatch" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-Airwatchapp" + set schedule "always" + set service "Airwatch_Services_Group" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Airwatch Access" + next + edit 10054 + set name "SCSD_Website" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "vip-Webosphere" + set schedule "always" + set service "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Website - scsd.us" + next + edit 10138 + set name "WebHelpDesk" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "vip-webhelpdesk" + set schedule "always" + set service "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Webpage - helpdesk.scsd.us" + next + edit 117 + set name "RAP>Inside>DCs" + set srcintf "RAP" + set dstintf "inside" + set action accept + set srcaddr "RAP-Users" + set dstaddr "Server_40" "Server_48" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set av-profile "g-default" + set ips-sensor "Incoming_IPS" + set application-list "App_Ctrl_1" + set logtraffic all + next + edit 10150 + set name "Tableau" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "vip-tableau" + set schedule "always" + set service "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Webpage - tableau.scsd.us" + next + edit 99 + set name "PrintOC" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "vip-PrintOC" + set schedule "always" + set service "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Oracle Web Printer" + next + edit 10184 + set name "ESS" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "vip-scsdess" + set schedule "always" + set service "HTTP" "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Employee Self Service" + next + edit 10182 + set name "Address_Lookup" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "United_States" + set dstaddr "vip-Neutrons" + set schedule "always" + set service "HTTPS" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "Address Lookup for parents" + next + edit 93 + set name "SBC_Ribbon_Out->In" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "MS_Teams_External_Group" + set dstaddr "vip-sbc-noc" "vip-sbc-dan" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "SBC Ribbon" + next + edit 114 + set name "EMS_Out->In" + set srcintf "outside" + set dstintf "inside" + set action accept + set srcaddr "all" + set dstaddr "vip-EMS" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set ips-sensor "Incoming_IPS" + set logtraffic all + set comments "SBC Ribbon (Copy of SBC_Ribbon_Out->In)" + next + edit 118 + set name "Servers->RAP" + set srcintf "inside" + set dstintf "RAP" + set action accept + set srcaddr "Server_40" "Server_48" "21JumpSt" "Sys-Net-Admins" + set dstaddr "RAP-Users" "RAP-MGMT" + set schedule "always" + set service "ALL" + set utm-status enable + set ssl-ssh-profile "certificate-inspection" + set av-profile "g-default" + set ips-sensor "Incoming_IPS" + set application-list "App_Ctrl_1" + set logtraffic all + set comments " (Copy of RAP>Inside>DCs) (Reverse of RAP>Inside>DCs)" + next + edit 95 + set name "SCSD -> DPS" + set srcintf "inside" + set dstintf "DPS" + set action accept + set srcaddr "all" + set dstaddr "DPS_10.46.0.0/16" "DPS_Internal" "DPS_192.168.146.0/24" + set schedule "always" + set service "ALL" + next + edit 103 + set name "DPS-> SCSD" + set srcintf "DPS" + set dstintf "inside" + set action accept + set srcaddr "DPS_10.46.0.0/16" "DPS_192.168.146.0/24" "DPS_Internal" + set dstaddr "all" + set schedule "always" + set service "ALL" + next + edit 104 + set name "DPS-> Outside" + set srcintf "DPS" + set dstintf "outside" + set action accept + set srcaddr "DPS_10.46.0.0/16" + set dstaddr "all" + set schedule "always" + set service "ALL" + set nat enable + set ippool enable + set poolname "ippool-198.36.23.253" + next +end +config firewall DoS-policy + edit 1 + set name "Country_Block_DOS" + set comments "Thresholds set to 1 to block all traffic from specific countries." + set interface "outside" + set srcaddr "Country Block" + set dstaddr "all" + set service "ALL" + config anomaly + edit "tcp_syn_flood" + set status enable + set action block + set threshold 1 + next + edit "tcp_port_scan" + set status enable + set action block + set threshold 1 + next + edit "tcp_src_session" + set status enable + set action block + set threshold 1 + next + edit "tcp_dst_session" + set status enable + set action block + set threshold 1 + next + edit "udp_flood" + set status enable + set action block + set threshold 1 + next + edit "udp_scan" + set status enable + set action block + set threshold 1 + next + edit "udp_src_session" + set status enable + set action block + set threshold 1 + next + edit "udp_dst_session" + set status enable + set action block + set threshold 1 + next + edit "icmp_flood" + set status enable + set action block + set threshold 1 + next + edit "icmp_sweep" + set status enable + set action block + set threshold 1 + next + edit "icmp_src_session" + set status enable + set action block + set threshold 1 + next + edit "icmp_dst_session" + set status enable + set action block + set threshold 1 + next + edit "ip_src_session" + set status enable + set action block + set threshold 1 + next + edit "ip_dst_session" + set status enable + set action block + set threshold 1 + next + edit "sctp_flood" + set status enable + set action block + set threshold 1 + next + edit "sctp_scan" + set status enable + set action block + set threshold 1 + next + edit "sctp_src_session" + set status enable + set action block + set threshold 1 + next + edit "sctp_dst_session" + set status enable + set action block + set threshold 1 + next + end + next + edit 3 + set name "Zoom-bypass" + set interface "outside" + set srcaddr "all" + set dstaddr "all" + set service "Zoom UDP Ports" + config anomaly + edit "tcp_syn_flood" + set threshold 2000 + next + edit "tcp_port_scan" + set threshold 1000 + next + edit "tcp_src_session" + set threshold 5000 + next + edit "tcp_dst_session" + set threshold 5000 + next + edit "udp_flood" + set status enable + set log enable + set threshold 2000 + next + edit "udp_scan" + set threshold 2000 + next + edit "udp_src_session" + set threshold 5000 + next + edit "udp_dst_session" + set threshold 5000 + next + edit "icmp_flood" + set threshold 250 + next + edit "icmp_sweep" + set threshold 100 + next + edit "icmp_src_session" + set threshold 300 + next + edit "icmp_dst_session" + set threshold 1000 + next + edit "ip_src_session" + set threshold 5000 + next + edit "ip_dst_session" + set threshold 5000 + next + edit "sctp_flood" + set threshold 2000 + next + edit "sctp_scan" + set threshold 1000 + next + edit "sctp_src_session" + set threshold 5000 + next + edit "sctp_dst_session" + set threshold 5000 + next + end + next + edit 2 + set name "DoS_Default" + set interface "outside" + set srcaddr "all" + set dstaddr "all" + set service "ALL" + config anomaly + edit "tcp_syn_flood" + set status enable + set log enable + set action block + set threshold 2000 + next + edit "tcp_port_scan" + set status enable + set log enable + set action block + set threshold 1000 + next + edit "tcp_src_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "tcp_dst_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "udp_flood" + set status enable + set log enable + set action block + set threshold 20000 + next + edit "udp_scan" + set status enable + set log enable + set action block + set threshold 2000 + next + edit "udp_src_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "udp_dst_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "icmp_flood" + set status enable + set log enable + set action block + set threshold 250 + next + edit "icmp_sweep" + set status enable + set log enable + set action block + set threshold 100 + next + edit "icmp_src_session" + set status enable + set log enable + set action block + set threshold 300 + next + edit "icmp_dst_session" + set status enable + set log enable + set action block + set threshold 1000 + next + edit "ip_src_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "ip_dst_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "sctp_flood" + set status enable + set log enable + set action block + set threshold 2000 + next + edit "sctp_scan" + set status enable + set log enable + set action block + set threshold 1000 + next + edit "sctp_src_session" + set status enable + set log enable + set action block + set threshold 5000 + next + edit "sctp_dst_session" + set status enable + set log enable + set action block + set threshold 5000 + next + end + next +end +config firewall sniffer + edit 8 + set interface "vpn-0fc50345" + set host "172.30.45.35" + set port "3389" + set max-packet-count 100 + next + edit 4 + set interface "city_phones lag" + set host "10.250.229.0/24" + set max-packet-count 2000 + next + edit 6 + set interface "city_phones lag" + set host "10.1.150.20" + set port "8445" + set max-packet-count 50 + next + edit 5 + set interface "vpn-0403e61" + next + edit 7 + set interface "outside lag" + set host "3.20.191.182" + next + edit 9 + set interface "Highstreet" + next + edit 10 + set interface "inside lag" + set host "192.168.79.2" + next + edit 11 + set interface "inside lag" + set host "10.46.1.1" + next + edit 12 + set interface "DPS" + set host "10.46.1.1" + next + edit 13 + set interface "port17" + set host "192.168.146.5" + next + edit 14 + set interface "port19" + set host "192.168.146.5" + next + edit 15 + set interface "RAP" + set host "192.168.79.2" + set max-packet-count 10000 + next + edit 16 + set interface "city_phones lag" + next +end diff --git a/configs/fortigate/vdom_scsd/icap.cfg b/configs/fortigate/vdom_scsd/icap.cfg new file mode 100644 index 0000000..c731791 --- /dev/null +++ b/configs/fortigate/vdom_scsd/icap.cfg @@ -0,0 +1,14 @@ +config icap profile + edit "default" + config icap-headers + edit 1 + set name "X-Authenticated-User" + set content "$user" + next + edit 2 + set name "X-Authenticated-Groups" + set content "$local_grp" + next + end + next +end diff --git a/configs/fortigate/vdom_scsd/ips.cfg b/configs/fortigate/vdom_scsd/ips.cfg new file mode 100644 index 0000000..25f90fe --- /dev/null +++ b/configs/fortigate/vdom_scsd/ips.cfg @@ -0,0 +1,46 @@ +config ips sensor + edit "g-default" + set comment "Prevent critical attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-sniffer-profile" + set comment "Monitor IPS attacks." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + config entries + edit 1 + set severity medium high critical + next + end + next + edit "Incoming_IPS" + set block-malicious-url enable + config entries + edit 1 + set location server + set severity medium high critical + set action block + next + end + next + edit "Outgoing_IPS" + set block-malicious-url enable + set scan-botnet-connections block + config entries + edit 1 + set location client + set severity medium high critical + next + end + next +end diff --git a/configs/fortigate/vdom_scsd/log.cfg b/configs/fortigate/vdom_scsd/log.cfg new file mode 100644 index 0000000..a21ea5a --- /dev/null +++ b/configs/fortigate/vdom_scsd/log.cfg @@ -0,0 +1,86 @@ +config log threat-weight + config web + edit 1 + set category 26 + set level high + next + edit 2 + set category 61 + set level high + next + edit 3 + set category 86 + set level high + next + edit 4 + set category 1 + set level medium + next + edit 5 + set category 3 + set level medium + next + edit 6 + set category 4 + set level medium + next + edit 7 + set category 5 + set level medium + next + edit 8 + set category 6 + set level medium + next + edit 9 + set category 12 + set level medium + next + edit 10 + set category 59 + set level medium + next + edit 11 + set category 62 + set level medium + next + edit 12 + set category 83 + set level medium + next + edit 13 + set category 72 + next + edit 14 + set category 14 + next + edit 15 + set category 96 + set level medium + next + end + config application + edit 1 + set category 2 + next + edit 2 + set category 6 + set level medium + next + end +end +config log memory setting + set status enable +end +config log disk setting + set status disable +end +config log null-device setting + set status disable +end +config log setting + set local-in-allow enable + set local-in-deny-unicast enable + set local-in-deny-broadcast enable + set local-out enable +end diff --git a/configs/fortigate/vdom_scsd/router.cfg b/configs/fortigate/vdom_scsd/router.cfg new file mode 100644 index 0000000..d2ce5e9 --- /dev/null +++ b/configs/fortigate/vdom_scsd/router.cfg @@ -0,0 +1,306 @@ +config router rip + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ripng + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router static + edit 1 + set gateway 198.36.24.1 + set distance 1 + set device "outside lag" + set comment "Outgoing traffic" + next + edit 2 + set dst 10.0.0.0 255.0.0.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Internal traffic" + next + edit 3 + set dst 10.250.201.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 1" + next + edit 4 + set dst 10.250.202.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 2" + next + edit 5 + set dst 10.250.203.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 3" + next + edit 6 + set dst 10.250.204.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 4" + next + edit 7 + set dst 10.250.205.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 5" + next + edit 8 + set dst 10.250.206.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 6" + next + edit 9 + set dst 10.250.207.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 7" + next + edit 10 + set dst 10.250.208.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Ring 8" + next + edit 11 + set dst 172.17.0.0 255.255.0.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "CK Mobile 01 IP Range Route" + next + edit 12 + set dst 172.18.0.0 255.255.0.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "CK Mobile 02 IP Range Route" + next + edit 13 + set dst 172.19.0.0 255.255.0.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "CK Mobile 03 IP Range Route" + next + edit 14 + set dst 192.168.0.0 255.255.0.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Management Internal" + next + edit 15 + set dst 10.212.134.0 255.255.255.0 + set gateway 10.251.1.1 + set distance 1 + set device "inside lag" + set comment "Fortinet VPN" + next + edit 16 + set dst 170.161.52.27 255.255.255.255 + set distance 1 + set device "SRIC_BOCES" + set comment "SRIC BOCES Site-to-Site VPN Route" + next + edit 17 + set dst 10.222.0.0 255.255.0.0 + set device "vpn-042e9903" + set comment "eScholar AWS Site-to-Site VPN" + next + edit 18 + set dst 10.250.0.0 255.255.0.0 + set gateway 10.250.100.92 + set device "city_phones lag" + set comment "Route to City Phones" + next + edit 19 + set dst 10.107.49.0 255.255.255.0 + set device "SCHC" + set comment "Syracuse Community Health Center Routes" + next + edit 20 + set dst 10.107.100.0 255.255.255.0 + set device "SCHC" + set comment "Syracuse Community Health Center Routes" + next + edit 21 + set dst 10.107.50.0 255.255.255.0 + set device "SCHC" + set comment "Syracuse Community Health Center Routes" + next + edit 22 + set dst 10.253.17.0 255.255.255.0 + set gateway 10.250.100.92 + set device "city_phones lag" + set comment "City CGRs" + next + edit 23 + set dst 10.253.18.0 255.255.255.0 + set gateway 10.250.100.92 + set device "city_phones lag" + set comment "City CGRs" + next + edit 24 + set gateway 10.250.100.92 + set device "city_phones lag" + set comment "City Side Park Place VoIP Route" + set dstaddr "City_Side_VoIP_Park_Place_Group" + next + edit 25 + set dst 10.249.0.46 255.255.255.255 + set gateway 10.250.100.92 + set device "city_phones lag" + set comment "City Water/DPW Recording" + next + edit 26 + set gateway 10.250.100.92 + set device "city_phones lag" + set comment "SPD Genetec" + set dstaddr "SPD_Side_Genetec" + next + edit 34 + set dst 172.30.44.0 255.255.254.0 + set device "vpn-0fc50345" + next + edit 28 + set status disable + set dst 172.30.45.35 255.255.255.255 + set device "vpn-0fc50345" + next + edit 29 + set dst 172.30.44.0 255.255.254.0 + set distance 253 + set blackhole enable + next + edit 30 + set dst 10.11.0.0 255.255.240.0 + set device "vpn-0403e61" + set comment "eScholar AWS 2024" + next + edit 31 + set dst 10.46.0.0 255.255.0.0 + set device "DPS" + next + edit 32 + set dst 192.168.46.0 255.255.255.0 + set device "DPS" + next + edit 33 + set dst 10.51.62.0 255.255.255.0 + set device "Highstreet" + next + edit 37 + set dst 192.168.146.0 255.255.255.0 + set device "DPS" + next + edit 35 + set dst 192.168.79.0 255.255.255.0 + set device "RAP" + next + edit 36 + set dst 10.79.0.0 255.255.0.0 + set device "RAP" + set comment "RAP Users" + next +end +config router ospf + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router ospf6 + config redistribute "connected" + end + config redistribute "static" + end + config redistribute "rip" + end + config redistribute "bgp" + end + config redistribute "isis" + end +end +config router bgp + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "static" + end + config redistribute "isis" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "static" + end + config redistribute6 "isis" + end +end +config router isis + config redistribute "connected" + end + config redistribute "rip" + end + config redistribute "ospf" + end + config redistribute "bgp" + end + config redistribute "static" + end + config redistribute6 "connected" + end + config redistribute6 "rip" + end + config redistribute6 "ospf" + end + config redistribute6 "bgp" + end + config redistribute6 "static" + end +end +config router multicast +end diff --git a/configs/fortigate/vdom_scsd/switch-controller.cfg b/configs/fortigate/vdom_scsd/switch-controller.cfg new file mode 100644 index 0000000..2cc8def --- /dev/null +++ b/configs/fortigate/vdom_scsd/switch-controller.cfg @@ -0,0 +1,224 @@ +config switch-controller traffic-policy + edit "quarantine" + set description "Rate control for quarantined traffic" + set guaranteed-bandwidth 163840 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next + edit "sniffer" + set description "Rate control for sniffer mirrored traffic" + set guaranteed-bandwidth 50000 + set guaranteed-burst 8192 + set maximum-burst 163840 + set cos-queue 0 + next +end +config switch-controller security-policy 802-1X + edit "802-1X-policy-default" + set user-group "SSO_Guest_Users" + set mac-auth-bypass disable + set open-auth disable + set eap-passthru enable + set eap-auto-untagged-vlans enable + set guest-vlan disable + set auth-fail-vlan disable + set framevid-apply enable + set radius-timeout-overwrite disable + set authserver-timeout-vlan disable + next +end +config switch-controller security-policy local-access + edit "default" + set mgmt-allowaccess https ping ssh + set internal-allowaccess https ping ssh + next +end +config switch-controller lldp-profile + edit "default" + set med-tlvs inventory-management network-policy location-identification + set auto-isl disable + config med-network-policy + edit "voice" + next + edit "voice-signaling" + next + edit "guest-voice" + next + edit "guest-voice-signaling" + next + edit "softphone-voice" + next + edit "video-conferencing" + next + edit "streaming-video" + next + edit "video-signaling" + next + end + config med-location-service + edit "coordinates" + next + edit "address-civic" + next + edit "elin-number" + next + end + next + edit "default-auto-isl" + next + edit "default-auto-mclag-icl" + set auto-mclag-icl enable + next +end +config switch-controller qos dot1p-map + edit "voice-dot1p" + set priority-0 queue-4 + set priority-1 queue-4 + set priority-2 queue-3 + set priority-3 queue-2 + set priority-4 queue-3 + set priority-5 queue-1 + set priority-6 queue-2 + set priority-7 queue-2 + next +end +config switch-controller qos ip-dscp-map + edit "voice-dscp" + config map + edit "1" + set cos-queue 1 + set value 46 + next + edit "2" + set cos-queue 2 + set value 24,26,48,56 + next + edit "5" + set cos-queue 3 + set value 34 + next + end + next +end +config switch-controller qos queue-policy + edit "default" + set schedule round-robin + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + next + edit "queue-2" + next + edit "queue-3" + next + edit "queue-4" + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next + edit "voice-egress" + set schedule weighted + set rate-by kbps + config cos-queue + edit "queue-0" + next + edit "queue-1" + set weight 0 + next + edit "queue-2" + set weight 6 + next + edit "queue-3" + set weight 37 + next + edit "queue-4" + set weight 12 + next + edit "queue-5" + next + edit "queue-6" + next + edit "queue-7" + next + end + next +end +config switch-controller qos qos-policy + edit "default" + next + edit "voice-qos" + set trust-dot1p-map "voice-dot1p" + set trust-ip-dscp-map "voice-dscp" + set queue-policy "voice-egress" + next +end +config switch-controller storm-control-policy + edit "default" + set description "default storm control on all port" + next + edit "auto-config" + set description "storm control policy for fortilink-isl-icl port" + set storm-control-mode disabled + next +end +config switch-controller auto-config policy + edit "default" + next + edit "default-icl" + set poe-status disable + set igmp-flood-report enable + set igmp-flood-traffic enable + next +end +config switch-controller initial-config template + edit "_default" + set vlanid 1 + next + edit "quarantine" + set vlanid 4093 + set dhcp-server enable + next + edit "rspan" + set vlanid 4092 + set dhcp-server enable + next + edit "voice" + set vlanid 4091 + next + edit "video" + set vlanid 4090 + next + edit "onboarding" + set vlanid 4089 + next + edit "nac_segment" + set vlanid 4088 + set dhcp-server enable + next +end +config switch-controller switch-profile + edit "default" + next +end +config switch-controller ptp settings + set mode disable +end +config switch-controller ptp policy + edit "default" + set status enable + next +end +config switch-controller remote-log + edit "syslogd" + next + edit "syslogd2" + next +end diff --git a/configs/fortigate/vdom_scsd/system.cfg b/configs/fortigate/vdom_scsd/system.cfg new file mode 100644 index 0000000..006886d --- /dev/null +++ b/configs/fortigate/vdom_scsd/system.cfg @@ -0,0 +1,120 @@ +config system object-tagging + edit "default" + next +end +config system settings + set h323-direct-model enable + set gui-voip-profile enable + set gui-local-in-policy enable + set gui-wireless-controller disable + set gui-switch-controller disable + set gui-dnsfilter disable + set gui-advanced-policy enable + set gui-allow-unnamed-policy enable + set gui-multiple-interface-policy enable +end +config system replacemsg-group + edit "default" + set comment "Default replacement message group." + next +end +config system zone + edit "outside" + set intrazone allow + set interface "outside lag" + next + edit "inside" + set intrazone allow + set interface "inside lag" + next + edit "city_phones" + set intrazone allow + set interface "city_phones lag" + next +end +config system sdwan + config zone + edit "virtual-wan-link" + next + end + config health-check + edit "Default_DNS" + set system-dns enable + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Office_365" + set server "www.office.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_Gmail" + set server "gmail.com" + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 2 + next + end + next + edit "Default_Google Search" + set server "www.google.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + edit "Default_FortiGuard" + set server "fortiguard.com" + set protocol http + set interval 1000 + set probe-timeout 1000 + set recoverytime 10 + config sla + edit 1 + set latency-threshold 250 + set jitter-threshold 50 + set packetloss-threshold 5 + next + end + next + end +end +config system link-monitor + edit "1" + set srcintf "vpn-0fc50345" + set server "169.254.54.77" + set interval 20 + set status disable + next +end +end + diff --git a/configs/fortigate/vdom_scsd/user.cfg b/configs/fortigate/vdom_scsd/user.cfg new file mode 100644 index 0000000..59bb40b --- /dev/null +++ b/configs/fortigate/vdom_scsd/user.cfg @@ -0,0 +1,5747 @@ +config user ldap + edit "HVDC03.scsd.ad" + set server "10.1.48.95" + set cnid "sAMAccountName" + set dn "dc=scsd,dc=ad" + set type regular + set username "fortinet ldap" + set password ENC *HIDDEN* + next + edit "HVDC02.scsd.ad" + set server "10.21.48.10" + set cnid "sAMAccountName" + set dn "dc=scsd,dc=ad" + set type regular + set username "fortinet ldap" + set password ENC *HIDDEN* + next + edit "DC01.scsd.ad" + set server "10.1.40.10" + set cnid "sAMAccountName" + set dn "dc=scsd,dc=ad" + set type regular + set username "fortinet ldap" + set password ENC *HIDDEN* + next +end +config user saml + edit "azure" + set cert "StarCert-Expire03202026" + set entity-id "https://vpn.scsd.us:10443/remote/saml/metadata" + set single-sign-on-url "https://vpn.scsd.us:10443/remote/saml/login" + set single-logout-url "https://vpn.scsd.us:10443/remote/saml/logout" + set idp-entity-id "https://sts.windows.net/46bdfafa-75e0-4634-9a6b-43b9574e6f0a/" + set idp-single-sign-on-url "https://login.microsoftonline.com/46bdfafa-75e0-4634-9a6b-43b9574e6f0a/saml2" + set idp-single-logout-url "https://login.microsoftonline.com/46bdfafa-75e0-4634-9a6b-43b9574e6f0a/saml2" + set idp-cert "REMOTE_Cert_2" + set user-name "username" + set group-name "group" + set digest-method sha256 + next + edit "scsd_user_sso" + set cert "StarCert-Expire03202026" + set entity-id "https://vpn.scsd.us:10443/remote/saml/metadata" + set single-sign-on-url "https://vpn.scsd.us:10443/remote/saml/login" + set single-logout-url "https://vpn.scsd.us:10443/remote/saml/logout" + set idp-entity-id "https://sts.windows.net/5021feae-da5a-4d27-8d9d-4927b39324c7/" + set idp-single-sign-on-url "https://login.microsoftonline.com/5021feae-da5a-4d27-8d9d-4927b39324c7/saml2" + set idp-single-logout-url "https://login.microsoftonline.com/5021feae-da5a-4d27-8d9d-4927b39324c7/saml2" + set idp-cert "REMOTE_Cert_2" + set user-name "username" + set group-name "group" + set digest-method sha256 + next + edit "scsd_user2_sso" + set cert "StarCert-Expire03202026" + set entity-id "https://vpn.scsd.us:10443/remote/saml/metadata/" + set single-sign-on-url "https://vpn.scsd.us:10443/remote/saml/login" + set single-logout-url "https://vpn.scsd.us:10443/remote/saml/logout" + set idp-entity-id "https://sts.windows.net/ac4a0b00-0f87-48ae-8d66-1a74019ca4ec/" + set idp-single-sign-on-url "https://login.microsoftonline.com/ac4a0b00-0f87-48ae-8d66-1a74019ca4ec/saml2" + set idp-single-logout-url "https://login.microsoftonline.com/ac4a0b00-0f87-48ae-8d66-1a74019ca4ec/saml2" + set idp-cert "REMOTE_Cert_2" + set user-name "username" + set group-name "group" + set digest-method sha256 + next +end +config user fsso + edit "Orion" + set server "10.1.48.37" + set password ENC *HIDDEN* + next +end +config user adgrp + edit "CN=ST_STU_7-12GRADE,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_DOC,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_ACCESS411,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_WEBCRD,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VPN_FORTINET,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_AE_BLDG_SECY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_AE_SUPP_CENSUS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_AE_BLDG_TEACH,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_AE_BLDG_COUNSELOR,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_AE_BLDG_ADMIN,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GPO-ACCESSIBILITYALLOW-STUDENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_DISTRICTWEBSITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ACCOUNTING_FTP_UPLOAD_TO_ALLOVUE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WINDOWS_UPGRADE_AVAILABLE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV173538,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CONFIGMGR REMOTE CONTROL USERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T02_254_5518A,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T02_254_6518A,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T04_LIBWRKRM_5518A,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=AZURE_MFA_ENABLED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSTOOLS_DEVELOPER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FORTINETRO,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FORTINETADMINS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T57_110_330AC,OU=P57_TRANSPORTATION,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OSA-TECH-COMPUTERS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T42_LIBRARY_4518A,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_ELMS_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_ELMS_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_ELMS_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_PREK_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_FAMENG,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HYPERACCESS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_PSLA_FIELDDOOR_EXTENDEDWORKDAY_LIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_PSLA_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_PSLA_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_PSLA_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOFTWAREUPDATES_SERVER_EXCLUDE_CUA,OU=SERVERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FIREFOX,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SCCM_TECHS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_DAYAUTOMATION,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_CORCORAN_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_CORCORAN_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_CORCORAN_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_NOTTINGHAM_WORKDAY_M,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_HIGH_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_MIDDLE_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_K8_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_ELEMENTARY_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_ALL_HIGH_SCHOOLS_M_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_HIGH_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_MIDDLE_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_K8_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_ALL_ELEMENTARY_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HENNINGER_ELEVATOR,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-LICENSEONLY,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-AFTEREFFECTS,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-INDESIGNCC,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-ILLUSTRATORCC,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-PREMIEREPROCC,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-PHOTOSHOPCC,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DW-ADOBE-ACROBATCC,OU=NEW ADOBE GROUPS - TEMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_STAFF_A3_CONFERENCECALLING,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_BRIGHTON_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_BRIGHTON_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_BRIGHTON_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HENNINGER_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HENNINGER_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_CLARY_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_CLARY_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_ITC_OSA_NOC_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HENNINGER_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_CLARY_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_ITC_OSA_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_USERDEFSCREEN-REGIST,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_EXTENDEDWORKDAY_M,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_UNLIMITED_M,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_WORKDAY_M,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_STLUCY_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_SUMR-CENSUS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_STLUCY_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_STLUCY_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_STLUCY_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_WEEKLY_REPORTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ACCOUNTABILITY_ARCHIVE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WACOMTABLET,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RAPTORTECH,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_PROG-CIP,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_SERVICEMAILBOXES_A1_EMAIL_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSTOOLS_CACHE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ARC_ADVENTURES,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GPO-CONFIGMGRSTARTUP,OU=SECURITYGROUPS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_NOTTINGHAM_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_NOTTINGHAM_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_NOTTINGHAM_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_SYRSTEMATBLODGETT_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_SYRSTEMATBLODGETT_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_SYRSTEMATBLODGETT_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HUNTINGTON_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HUNTINGTON_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_HUNTINGTON_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_EDSMITH_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_EDSMITH_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_EDSMITH_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_FRAZER_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_FRAZER_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_FRAZER_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_BELLEVUE_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_BELLEVUE_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_BELLEVUE_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CBT-QUESTAR_SECURE_BROWSER,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_GRANT_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_GRANT_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_GRANT_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SKYWALKER_REPORTS_RW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_ADDRESS-EDIT,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_NOND_COUNSGUID_VO,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_ITTECH_TEMPADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WABBITEMU,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_VIEW_EXPORT,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_VIEWONLY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_DW_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_FRANKLIN_UNLIMITED,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_FRANKLIN_EXTENDEDWORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_CENTRALOFFICES_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_ADMINS,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_OSA-DELETE,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_AC_FRANKLIN_WORKDAY,OU=ACCESS-CONTROL,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYSTEMADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_IK_PROV,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOFTWAREUPDATES_SERVER_PROD_HIGHRISK,OU=SERVERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOFTWAREUPDATES_SERVER_PROD_MEDRISK,OU=SERVERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOFTWAREUPDATES_SERVER_PROD_LOWRISK,OU=SERVERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_TRANSPORTATION_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_CEDARPATH_DISTADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_PDC_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_SCHOOLSC_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_LEVY_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_HEARINGOFF_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_CO_SUPER_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_CENTRALREG_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_BOVA_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_WEBSTER_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_VANDUYN_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_SYRSTEMATBLODGETT_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_SYRLATIN_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_STEAMATKING_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_SEYMOUR_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_SALEMHYDE_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_ROBERTS_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_PSLA_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_PFLA_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_PORTER_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_OASIS_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_NOTTINGHAM_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_MEACHEM_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_MCKINLEYBRIGHTON_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_MCCARTHYATBEARD_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_LINCOLN_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_LEMOYNE_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_ITC_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_HUNTINGTON_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_HENNINGER_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_HWSMITH_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_GRANT_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_FRAZER_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_FRANKLIN_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_ELMS_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_ELMCREST_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_EDSMITH_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DRWEEKS_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DELAWAREPRIMARY_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_CORCORAN_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_CLARY_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_BRIGHTON_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_BELLEVUE_BLDGADMIN,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_REMOTEDESKTOP_SECURITY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_DPS,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_ITSYSADM,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_CAM_DW_ITTECH,OU=SECURITY-CAMERAS,OU=SECURITYGROUPS-GENETEC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_SECURITY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_STAFF_PROJECTPLAN_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_SUMR-SCHEDULING,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_SUMR-SECY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_SUMR-ADMIN,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOFTWAREUPDATES_SERVER_PILOT,OU=SERVERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=L02_NURSE_XM1246,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=O365GROUPSCREATORS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_OUTSIDE_ACCOUNTS_A1_EMAIL_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VDI_POOLUSERS-BASIC-STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_PROJOFFICE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_PROJOFFICE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_STAFF_A3_OUTLOOK_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_OSA-ASSESSMENT,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_HYPPRODESS_ORACLE_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYRPRINT2TEST,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FTP_ACCESS_MRROBOT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAC_AW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_STUDENTSOW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_LOCKERMAINT,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_QAS_HCM_PSOFT_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_QAS_FIN_SCSD_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_QAS_FIN_PSOFT_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SECURITY ADMINISTRATOR,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SECURITY READER,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ADMINS_SERVER_BTPROS,OU=IT ENGINEER,OU=OUTSIDE ACCOUNTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_COMMUNICATIONS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-OFFICE-365-STUDENTS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-OFFICE-365-FACULTY_W_VISIO,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VEXOS_UTILITY,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VEXCODE_IQ_BLOCKS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T28_LIBLAB_3508A,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_MEDICAL_VO,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PAPERCUT_OA,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-OFFICE-365-FACULTY,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-OFFICE-2019,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REIMAGEAVAILABLE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_USERDEFSCREEN-NATAMER,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VISUALIZER,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_AFTERSCHOOLPROG,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T45__LIBRARY_5508A,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_NOND_UPKADMIN,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYSTEM MANAGED ACCOUNTS GROUP,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ENTERPRISE KEY ADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=KEY ADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STORAGE REPLICA ADMINISTRATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSLA_FS_OBERNESSER_STUDENTS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_COUNSELING,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV186149,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COR_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CRC_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSB_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STA_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COR_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CRC_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PCC_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STA_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FDS_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSB_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OSA_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BOV_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=145_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=321_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=321_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=086_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=086_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=074_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=076_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=071_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=048_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=048_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=067_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=023_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=023_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P20_AV185472,OU=P20_DRKING,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CONTENTSUBMITTERS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV186148,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_353,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_320,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_321,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_ATTENDANCEREPORTS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AV177223,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OAE_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OAE_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DNSUPDATEPROXY,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ILLUSTRATOR-ITC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PPN_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PPN_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSLA_FS_TEACHERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV60285,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV181129,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV185049,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_SENTRY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RAP_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=320_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=353_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RAP_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=353_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_BIC,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=320_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV160649,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV187766,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=008_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_049,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_051,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_015,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_008,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_036,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_034,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_040,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_030,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_037,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_646,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_364,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_016,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_054,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_009,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_042,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_027,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_044,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_045,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_608,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_029,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_033,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_322,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_048,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_328,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_013,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_363,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_303,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_025,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_024,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_001,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_006,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_007,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STU_BLDG_004,OU=SECURITYGROUPS-BUILDINGS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=353_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OAE_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=321_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=320_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=042_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_NOND_BASE,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ACCESS411_RAWDATA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VENDOR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=042_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=033_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TRP_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=042_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=033_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TRP_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_DISCIPLINE,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=007_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_CO-STUSPPTSVCS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VOIP ADMIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=048_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AV156574,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_OSA-SECURITY-FACULTY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_SIERRA-CEDAR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=001_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=036_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=036_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=054_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=054_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_STSHARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=045_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DESKTOP_LOCAL_ADMIN,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=045_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=055_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV154000,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UPK_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV182145,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_ATTENDANCE,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UPK_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=015_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=AUTOCAD,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=364_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=364_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=015_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=030_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=009_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=007_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=030_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=004_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=363_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=009_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=007_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=044_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCB_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PDC_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=055_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCB_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=363_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=044_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=004_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PDC_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=066_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=013_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=328_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=303_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=051_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=029_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=027_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=008_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=040_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=303_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=021_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=008_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWD_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=037_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=006_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SSC_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=024_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=034_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=025_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=040_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=328_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=049_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=024_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=016_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=006_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=049_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=322_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=025_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=034_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=037_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWD_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=016_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=051_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=322_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=027_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=029_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=013_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=021_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AVF112924,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=020_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=020_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_DOCUWARE_HRIMPORT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_TRANSPORTATION,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_SOCIALWKR,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=022_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=022_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV186330,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_TEACH,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_THERAPIST,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NETFLIX,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV162164,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_OSA-VIEWONLY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_AD,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_CO-VIEWONLY,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAC_VAS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DHCP ADMINISTRATORS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_SPECPROG-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LOGMEIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_GALAXY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TECHSHARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV172975,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV182116,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P23_AV182633,OU=P23_ELMWOOD,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_O365_RFP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_CENSUS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV159233,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV167598,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV187108,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_CO-SPED,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TEXASINSTRUMENTS_SMARTVIEWEMULATOR,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_REPORTBUILDER,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV187221,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV173190,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV173387,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HR ADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ACROBAT-PSLA,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_SECY_MSHS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_LMS,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV158791,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_SPECPROG-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_CO-ENL,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_DOCUWARE_IMPORT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_SECY_ES,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_CUSTOMEXPORT,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_COURSECAT,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CONTENTKEEPER_CLIENT,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_HEALTHSVC,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV207634,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P27_AVF112148,OU=P27_ELMCREST,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV186579,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P09_AV999972,OU=P09_GRANT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV173353,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV60282,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV158802,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV176680,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181448,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV999973,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV999974,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV180435,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV999975,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV160634,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV167669,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV166757,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P57_AV182176,OU=P57_TRANSPORTATION,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV181526,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SVR_RDP_ORIONAPP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SVR_ADM_ORIONAPP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P57_AV182175,OU=P57_TRANSPORTATION,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P57_AV999976,OU=P57_TRANSPORTATION,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P57_AV185793,OU=P57_TRANSPORTATION,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P57_AV999977,OU=P57_TRANSPORTATION,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV181527,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV194203,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV187107,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV184840,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV172974,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV172973,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV159234,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV157310,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV154074,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV59543,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV59464,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV157308,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV99978,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV60782,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV99979,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV99980,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV60237,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV185794,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV185795,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV184924,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV167897,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AV161742,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AVF113661,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AVF113325,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_AVF113290,OU=P55_CENTRALOFFICE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P54_AV182284,OU=P54_JOHNSONCENTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P54_AV173200,OU=P54_JOHNSONCENTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P54_AV173201,OU=P54_JOHNSONCENTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P54_AVF113184,OU=P54_JOHNSONCENTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P54_AV166815,OU=P54_JOHNSONCENTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P54_AV181707,OU=P54_JOHNSONCENTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV181445,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV187724,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV186333,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV181446,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV181447,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P53_AV999981,OU=P53_BLODGETT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P51_AV185051,OU=P51_WEBSTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P51_AV186150,OU=P51_WEBSTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P51_AV184214,OU=P51_WEBSTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P51_AV187819,OU=P51_WEBSTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P51_AV182632,OU=P51_WEBSTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P48_AV59590,OU=P48_BEARD,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P48_AV188136,OU=P48_BEARD,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P48_AV177471,OU=P48_BEARD,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P47_AV178262,OU=P47_MCCARTHY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P47_AV181441,OU=P47_MCCARTHY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P47_AV177611,OU=P47_MCCARTHY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=INVENTOR,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-INDESIGN-CO,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ILLUSTRATOR-CO,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PAPERCUT_ALLACCESS,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PREMIEREPRO-CO,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PHOTOSHOP-CO,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_CO-UPK,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV161795,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_OSA,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV173188,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_STAFF_A3_TEAMS_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DNSADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV208551,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_ADMIN,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV187905,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_SUPP_SCHEDULING,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV188240,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_BLDG_COUNSELOR,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_CRC,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV999982,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=T02_LIBRARY_5518A,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAC_SU,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CONSULTANTS_IKSYSTEMS,OU=APPLICATION SUPPORT,OU=OUTSIDE ACCOUNTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAC_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAC_FT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OSA_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PREMIEREPRO-PSLA,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PHOTOSHOP-PSLA,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ELA_ONENOTE_EARLYLIT_CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ELA_ONENOTE_WRITING_CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_CONFIRMINTERVIEWS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS_RM105_LAB_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CBT-QUESTAR_SECURE_BROWSER-LEGACY,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P02_OFFICE,OU=P02_ITC,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS LAB RM305 LEX E460DN,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=006_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PREMIEREPRO-ITC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P02_GENERAL,OU=P02_ITC,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAC_NA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P47_AV173386,OU=P47_MCCARTHY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P27_AV182713,OU=P27_ELMCREST,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P27_AV182744,OU=P27_ELMCREST,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV168199,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_STAFF_A3_BASE_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-INDESIGN-ITC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PHOTOSHOP-ITC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P34_AV186000,OU=P34_DRWEEKS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_OUTSIDE_ACCOUNTS_A1PLUS_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_STUDENTS_A3_BASE_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LICENSING_O365_STUDENTS_A3_EMAIL_M,OU=LICENSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ACVPN,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV999984,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AVF110804,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV168337,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AVF110817,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REVIT,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV175376,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=001_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV174854,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P60_AV60781,OU=P60_PDC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ST_DEPT_OSA-SUPERUSER,OU=SECURITYGROUPS-SCHOOLTOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV182115,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P10_AVF113324,OU=P10_LEVY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TECHINFO,OU=DISTRIBUTIONGROUPS,OU=EMAILSPECIALOBJECTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV58838,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV60902,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV186167,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV186295,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV185800,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV167896,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV182628,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV161880,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV188406,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_GENERAL,OU=P55_CENTRAL_OFFICE,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV185043,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV179205,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV175487,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV175378,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV173295,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV171335,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV60464,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV60366,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV167365,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV179663,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV169970,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P45_AV185053,OU=P45_EDSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P44_AV181440,OU=P44_SEYMORE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P44_AV157367,OU=P44_SEYMORE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV181438,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV175377,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV173189,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV173191,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV160638,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AVF112234,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV999985,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P42_AV60766,OU=P42_ROBERTS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P40_AV184766,OU=P40_PORTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P40_AV59212,OU=P40_PORTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P40_AV60455,OU=P40_PORTER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P37_AV180434,OU=P37_MEACHEM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P37_AVF153596,OU=P37_MEACHEM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P37_AV60449,OU=P37_MEACHEM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P37_AV999989,OU=P37_MEACHEM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P37_AV186433,OU=P37_MEACHEM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P36_AV181436,OU=P36_MCKINLEY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P36_AV180433,OU=P36_MCKINLEY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P36_AV169615,OU=P36_MCKINLEY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P36_AV159702,OU=P36_MCKINLEY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P34_AV181443,OU=P34_DRWEEKS,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P33_AV181439,OU=P33_LEMOYNE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P33_AV186425,OU=P33_LEMOYNE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P33_AV60901,OU=P33_LEMOYNE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV185042,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV185077,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV168198,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV167484,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV158255,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV155019,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P30_AV154486,OU=P30_SALEMHYDE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV999990,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV186165,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV172795,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV155296,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV153482,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV60360,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV59199,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P29_AV161797,OU=P29_HUNTINGTON,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV999991,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P24_AV999993,OU=P24_FRANKLIN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P24_AV999992,OU=P24_FRANKLIN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV59251,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV59250,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV185050,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV187225,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV157335,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV157685,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P28_AV176029,OU=P28_HUGHES,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PRINTER_INSTALLERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AV180432,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AV182634,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AV182631,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AV175375,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P25_AV60679,OU=P25_FRAZER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P24_AV188211,OU=P24_FRANKLIN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P24_AV60459,OU=P24_FRANKLIN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV185044,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV181122,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV156012,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV156004,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV156011,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AVF112928,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV60454,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV60677,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P22_AV60262,OU=P22_DELAWARE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV58848,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV187899,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV179828,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV179827,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV175371,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV167730,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV60457,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P21_AV161799,OU=P21_DANFORTH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_DATA_REPOSITORY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV186576,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P20_AV185048,OU=P20_DRKING,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P20_AVF113182,OU=P20_DRKING,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P20_AV60453,OU=P20_DRKING,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P20_AV60361,OU=P20_DRKING,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P20_AV160689,OU=P20_DRKING,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P15_AV182443,OU=P15_HWSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P15_AV175379,OU=P15_HWSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P15_AVF113323,OU=P15_HWSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P15_AV60269,OU=P15_HWSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P15_AV60981,OU=P15_HWSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P15_AV188285,OU=P15_HWSMITH,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV999994,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV185041,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV187109,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV155295,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P13_AV182113,OU=P13_LINCOLN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P09_AV182766,OU=P09_GRANT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OSA-TESTGROUP,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PHOTOSHOP-FRANKLIN,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV999999,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P09_AV175372,OU=P09_GRANT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P09_AV168195,OU=P09_GRANT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P09_AVF112510,OU=P09_GRANT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P09_AV160456,OU=P09_GRANT,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV158790,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AVF111593,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV181442,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV182421,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV182332,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV174527,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV174526,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AVF112837,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P07_AV176678,OU=P07_CORCORAN,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AVF110802,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AV182458,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AV187111,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AV181065,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AV175370,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P08_AV173541,OU=P08_CLARY,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AVF111591,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV188551,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV167694,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV175743,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV173199,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV172940,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV999995,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV60768,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV60284,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV60287,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV162742,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV162747,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV186166,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV176642,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV182629,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P06_AV185076,OU=P06_HENNINGER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AVF111587,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AVF111588,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV187898,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV185046,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV174855,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV174856,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV174853,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV186161,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV168197,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV999996,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV166046,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AVF113493,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV60771,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV59205,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV999997,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P04_AV176679,OU=P04_NOTTINGHAM,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV184768,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181074,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV173539,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV173540,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181288,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181286,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181123,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181121,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181124,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV181125,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P03_AV175744,OU=P03_FOWLER,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AVF111595,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AVF110812,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV181437,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV185473,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV60949,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AVF113443,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV187266,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV160660,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV182322,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_AV999998,OU=P01_ITC,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_EDEFFECT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ACROBAT-ITC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_EMPLOY-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_EMPSVCS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_ESS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_TRANSP-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_STAFFRLTN-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_VPI-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_RECRUIT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_CALL-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-INDESIGN-WESTSIDE,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-INDESIGN-PSLA,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ILLUSTRATOR-WESTSIDE,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ILLUSTRATOR-PSLA,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-AFTEREFFECTS-ITC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PREMIEREPRO-WESTSIDE,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-PHOTOSHOP-WESTSIDE,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ACROBAT-CO,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_211_6508A,OU=P55_CENTRAL_OFFICE,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=052_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_HENN-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VDI_POOLUSERS-PLTW-STU,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_DATA-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VDI_HORIZONCLIENT,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_RISKMGT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OPERATIONS,OU=DISTRIBUTIONGROUPS,OU=EMAILSPECIALOBJECTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_BENE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VDI_POOLUSERS-PLTW-STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_106_307,OU=P55_CENTRAL_OFFICE,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ACROBAT-OSA,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=028_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=028_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SCSDAPCALERTS,OU=DISTRIBUTIONGROUPS,OU=EMAILSPECIALOBJECTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_EC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_HWSM-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P55_103_3005AC,OU=P55_CENTRAL_OFFICE,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_COUNTY_STAFF,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VCENTER_ADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_COR_CORE,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_EFRT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=052_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=010_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=010_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=003_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=003_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_EC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=034_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_PURCH-READ,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COR_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_FOODSVCS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_SPED-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_BUDGET-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ENL-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_TRANSP-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_SCITECH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_ESS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_HEALTHSVCS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_COMM-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_PD-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_LIB-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_SALEM-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_ACCTPAY-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_LIB-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_CLARY-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_PSLA-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DRKING-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_COMM-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_ROBERTS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_VAND-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_SCHPSYCH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_MONTLEMOYNE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_WSA-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_HEALTHSVCS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_SYRLAT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_CORC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_CRC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_DANF-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_HENN-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DELES-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_TEST-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_ACCTPAY-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_RISKMGT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_RECRUIT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ART-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_SCHSCRTY-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_MCCARTHY-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_CALL-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_PURCH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_PAY-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ENL-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_REFORM-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_CRC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_CTE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_JVC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DRWEEKS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_TEST-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_COUNS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_SEYM-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_REFORM-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_MATH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_BUDGET-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_NOTT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_HUGHES-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_SCITECH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_EDEFFECT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_STAFFRLTN-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_TECH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ELA-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_TECH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_EMPLOY-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_LEMOYNE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_VPI-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ART-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_MEACH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_FOODSVCS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_PAY-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_ELA-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_FRANK-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DELPRI-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_GRANT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_SOCST-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_BELL-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA_DATA-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_PZONE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_PD-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN_PURCH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_FACIL-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_MATH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_MCKBR-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_CTE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_FRAZ-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_EDSM-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_BENE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_PEHEAFAC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_ELMS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_ELMCREST-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_ATH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_HUNT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_HWSM-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_WEB-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_STUBEHAVIOR-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_SOCST-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_ITC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_HR_EMPSVCS-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_PEHEAFAC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_LINC-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_PORT-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_CORE-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_FIN-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_MENTAL-EDIT,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_7_CORCORAN,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_6_HENNINGER,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ALL_PAPERCUT_USERS,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_24_FRANKLIN,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_33_LEMOYNE,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_54_JVC,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_364_WSA,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_49_VAN DUYN,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_48_BEARD,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=P01_OSA_3005AC,OU=PAPERCUT_GROUPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_42_ROBERTS,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_15_H.W. SMITH,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_44_SEYMOUR,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_328_SYR LATIN,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_13_LINCOLN,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_51_WEBSTER,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_30_SALEM,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_40_PORTER,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_8_CLARY,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_37_MEACHEM,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_20_KING,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_16_BELLEVUE,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_303_PSLA,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_1_ITC,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_21_DANFORTH,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_36_MCKINLEY-BRIGHTON,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_9_GRANT,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_322_DELAWARE,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_CURR_SPED-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_34_WEEKS,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_29_HUNTINGTON,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_363_ELMS,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_27_ELMCREST,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_45_ED SMITH,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_4_NOTTINGHAM,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_25_FRAZER,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_FACIL-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_HUGHES-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_MCKBR-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_SALEM-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_SYRLAT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_CORC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_CLARY-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_HUNT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_ROBERTS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_WSA-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PCC_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_STUBEHAVIOR-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_SCHPSYCH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_PZONE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT_MENTAL-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_STUSPPRT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OSA-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_DEPT_OPS_SCHSCRTY-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_REQ_SHARE_10_LEVY,OU=COUNTYREQUSITIONS,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CONT_ADMINUSERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_LOCAL_ADMIN_SCHOOLTOOL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_ARCH_READONLY,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SCANNING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PRINT_TOSHIBA_VIRT_USER,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TEMPNETFLIX,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ERIC_TEST,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CONT_ENTRYEDIT,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_RAPSHARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CONT_READONLY,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CONT_EDIT,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PERS3,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CLIENT_ADMINUSERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_COUNS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_TL_ATH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_LINC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_GRANT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_FRAZ-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_ELMS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_EDSM-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_MS_DANF-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_PSLA-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_NOTT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS_ITC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_HS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_WEB-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_VAND-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_SEYM-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_PORT-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_MONTLEMOYNE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_MEACH-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_LEMOYNE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_FRANK-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DRWEEKS-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DRKING-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DELPRI-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_DELES-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES_BELL-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_ES-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_MCCARTHY-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_JVC-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_ELMCREST-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP_CORE-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPO_SCH_AP-CONTRIBUTE,OU=SECURITYGROUPS-SHAREPOINTONLINE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_ADMINGRPRAP,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BT_PROS_TEST,OU=IT ENGINEER,OU=OUTSIDE ACCOUNTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_FULLACCESS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CLIENT_EDIT,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GPO-ALLOWRUNAS,OU=SECURITYGROUPS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CLIENT_READONLY,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FMP_CLIENT_ENTRYEDIT,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLEVER_SHORTCUTS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SCHOOLTOOL4FTP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-LICENSEONLY,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_TB_HR_STAFF,OU=SECURITYGROUPS-DEPARTMENT,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PAPERCUTADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TECH_PRINT_USERS,OU=TEST,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_OPSDOCS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=YOUTUBE,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_VANDUYN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_JVC,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ESCHOLAR EDM SVC ACCT NOTIFICATIONS,OU=DISTRIBUTIONGROUPS,OU=EMAILSPECIALOBJECTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FUSION360,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_MCCARTHY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IOSCAN,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=015_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_SCSD_DIRECTORS,OU=SECURITYGROUPS-POSITIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_BELLEVUE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_GEOSHARE_STUDENTS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_DANFORTH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_RM_B5_PLTW_LEX_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IZO_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IZO_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_ELMCREST,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_DRWEEKS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_SCSD_SUPER_CHIEFS,OU=SECURITYGROUPS-POSITIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_SCSD_PRINCIPALS,OU=SECURITYGROUPS-POSITIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_SCSD_ASSISTANTSUP,OU=SECURITYGROUPS-POSITIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-ONEDRIVE-CLIENT,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEC_SCSD_BOE,OU=SECURITYGROUPS-POSITIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LASLINKS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_WESTSIDE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_DELAWARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_MSAP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_HRMS_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TABLEAUDESKTOP,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_WSLC_TEACHERSHARE_CONF_RW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_WSLC_TEACHERSHARE_CONF_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TELEFORM_APPS_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_WSLC_TEACHERSHARE_RW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_WXO_DEV,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ACCOUNTING_SHAREPOINT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAWXOPOSTPROCESSING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MSOL_AD_SYNC_RICHCOEXISTENCE,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_FOWLER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPHERE2,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=POWERSETTINGS-NOSLEEP,OU=SECURITYGROUPS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=POWERSETTINGS-NONE,OU=SECURITYGROUPS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_PSLA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TABLEAU_WIN7,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_APPR_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HUNTINGTON_TOSHIBA_GROUP_MULTI,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TEACHSCAPE_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VPN_ACCESS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OSA_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_BENEFITS_ARCHIVE_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_ROOM_A204_LEX_T644,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ESCHOLAR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_BENEFITS_ARCHIVE_RW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_ROOM_A328_TOSHIBA,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=003_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PAYROLLACCOUNTING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_CONTRACTS_VIEW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ALL_PREK,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_GEOCLASS_TEACHER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS_LIBRARY_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-DREAMWEAVER-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_QAS_HCM_OUT_READ_DELETE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBOTC,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_QAS_HCM_SCSD_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BEARD_PARPRINTER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BLENDER,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-AUDITION-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_FACILITIES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_RM_301 _TOSHIBA,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_LIBRARY_TOSHIBA MFP,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=KODU,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_QAS_HCM_IN_WRITE_DELETE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_TEACHERS_ROOM_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PRT_ITC-OSA_STAFF,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EASYTEACH_FIX,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_PORTER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=001_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_FINSRSTAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSLA_FS_MAZZAFERRO_STUDENTS,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PRT_ITC-OSA_CAO_SECURE,OU=PRINTER_DEPLOYMENT,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEYMOUR_ROOM_215A_TOSHIBA_456,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_GRANT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COMMVAULT ADMINS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_HENNINGER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_LEMOYNE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_HUNTINGTON,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_WEBSTER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_CLARY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_HWSMITH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_LATIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_BEARD,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_DRKING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_CORCORAN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_SALEMHYDE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_ITC,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_ROBERTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_PREK_RW,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_SEYMOUR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_FRANKLIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_FRAZER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_MEACHEM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MEDICAL_ADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_ELMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_PREK_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_HUGHES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_MCKINLEY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_NOTTINGHAM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_EDSMITH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SMARTVIEW,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MED_LINCOLN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HYPERION_CONSULTANTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VAN DUYN_LAB_RM203_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSALEVEL3FIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSALEVEL3HR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSALEVEL2FIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_SUMMERSCHOOLS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UPK_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TRP_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STA_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SSC_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RAP_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSB_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PPN_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PDC_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCB_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IZO_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HEO_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FDS_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWD_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CRC_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=902_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=840_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=839_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=821_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=364_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=363_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=345_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=328_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=322_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=303_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=298_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=275_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=240_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=145_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=140_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=095_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=090_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=089_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=086_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=080_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=076_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=074_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=072_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=071_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=067_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=066_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=055_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=054_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=052_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=051_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=049_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=045_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=044_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=040_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=037_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=036_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=033_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=030_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=029_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=028_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=027_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=025_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=024_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=023_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=022_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=021_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=020_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=016_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=013_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=010_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=009_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=004_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BOV_EXCEPTION,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SSC_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PCC_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HEO_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FDS_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BOV_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=902_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=840_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=839_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=821_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=345_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=298_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=275_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=240_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=145_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=140_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=095_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=090_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=089_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=080_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=076_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=074_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=072_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=071_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=067_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=066_FACULTY,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HEO_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=902_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=840_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=839_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=821_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=345_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=298_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=275_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=240_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=140_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=095_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=090_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=089_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=080_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=072_STAFF,OU=SECURITYGROUPS-LOCATIONBASED,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_AST_CONSULTANTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-AFTEREFFECTS-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_HYPERION,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HUGHES_LIBRARY_AV59250_LEX_T644,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSALEVEL4HR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_FIN_PSOFTCUSTOM_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GOPRO,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSALEVEL2HR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-INDESIGN-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_HCM_PSOFTCUSTOM_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-ILLUSTRATOR-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSATICKETENTRY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-PHOTOSHOP-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-PREMIEREPRO-ITC,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TELEFORM_INSTALLS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CISCOCALLMANAGERBILLINGRECIPIENTS,OU=SERVICEACCOUNTS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BRIDGEDESIGNER,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NETSUPPORT STUDENT,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_CRCADMIN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HYPERION,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DWCC-ACROBAT-MISC,OU=CC-DISTRICT WIDE LICENSING,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CC-PSLA,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSALEVEL4FIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_GUIDANCE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_FIN_PSOFT_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TM_STAFF_RELATIONS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TEST_ACCESS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=KITE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_CLERICALSTAFF,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_VIEWONLY,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_FIN_PSOFTCUSTOM_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PSTOOLS_DEVELOPERS_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REMOTEDESKTOP_OSA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_HCM_IN_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_FIN_OUT_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_SCSD_UPK,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_VANDUYN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCKINLEY_ALL_WORKROOM_TOSHIBA_COPIERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_GRANT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_DRKING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GRANT_LIB_237_366_PRINTERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_CLARY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_MAINOFFICE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_DEV_FIN_PSOFT_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_EDSMITH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_SYRACUSE_LATIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_SALEMHYDE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VANDUYN_MAIN_OFFICE_TOSHIBA_PRINTER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BLENDEDLEARNING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_RM_B111_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_HCM_OUT_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_HCM_PSOFT_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_MAIN_OFFICE_COLOR_TOSHIBA_MFP,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TEAM_ACADEMICS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCKINLEY_LIBRARY_LEX_MX310,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_DEV_HCM_PSOFT_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DATADRIVENCLASSROOM_EXAMSCANNER,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_FIN_IN_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SPECIALED_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_MAIN_OFFICE_COLOR_TOSHIBA_MFP,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_GUIDANCE_OFFICE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_ELL,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HW_SMITH_ALL_TOSHIBAS_EXCEPTMAINOFFICE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_DEV_HCM_SCSD_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_DEV_FIN_SCSD_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ENSEMBLE_PSLAMATH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MEACHEM_MAIN_OFFICE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EMAIL_STUDENTINFOUPDATES_ACCESS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PSOFT_PRD_HCM_PSOFTCUSTOM_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SCRATCH,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_MAIN_OFFICE_LEX_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COPIER_6_FOWLER_RM141A,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ITC,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_DRKING,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_SALEMHYDE,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_LIBRARY_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_VANDUYN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ALL,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VAN DUYN_TEACHERS_WORKROOM_TOSHIBA_COPIERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DATAANALYSTS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TALENT_MANAGEMENT_FULL_CONTROL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-PHOTOSTORY3,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_DISCP_DROPBOX,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SECURITY_DEPT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REMOTEASSISTANCEUSERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MEACHEM_LIBRARY_LEX_E260DN,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HW_SMITH_ROOM_A12_TOSHIBAS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_MAIN_OFFICE_COLOR_TOSHIBA_MFP,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSLA_RM202_LAB_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_NOTT,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_LEMOYNE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_FRANKLIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_BELLEVUE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_MSAP_HOMEBOUND,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_TRANSPORTATION,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_PORTER,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_DRWEEKS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_LINCOLN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_HUGHES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_ALL_PRINTERS_X32,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_SEYMOUR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS_RM250_AV182145_LEX_C748,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSLA_MAIN_OFFICE_COLOR_TOSHIBA_MFP,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_HUNTINGTON,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_OSA_DATA_SHARES_WRITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EMAIL_STATUS_CHECK,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ELMS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_STDAN_HEADSTART,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_DANFORTH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_PORTER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TALENT_MANAGMENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_WEBSTER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_QUAD1_PRINTER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_MEDICALREGISTRATIONSTAFF,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_ELMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_ROBERTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FACEBOOK,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LINKEDIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_HWSMITH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_FRAZER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_DELAWARE_PRIMARY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_BEARD_PREK,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TELEFORM_APPS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ELMS_MAIN_OFFICE_AV178262_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_SYRLATIN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_SPED,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_MEACHEM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_CRCDADMIN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_SUPPORTPROGRAMS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_MCKINLEY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_QUAD2_PRINTER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DRWEEKS_ALL_TOSHIBA COPIERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FRANKLIN_ROOM_208_TOSHIBA_457,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_WESTSIDE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RECORDSUSERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PAYROLL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_COPYROOM135_TOSHIBA,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DRKING_MAINOFFICE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PINTEREST,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MICROSOFT-MOVIEMAKER,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LEMOYNE TOSHIBA COPIERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SMARTBOARDSOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HUGHES_TOSHIBA_COPIERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_BELLEVUE,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ELMS_ROOM176_LEXMARK,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=INSTAGRAM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_PTECH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_MCKINBRIGHTON,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_LIBRARY_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_ITC,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_PRINTER_9,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=AUDACITY,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HENNINGER_LIBRARY_TOSHIBA,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_MAIN_OFFICE_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_RM105_LAB_LEX_E450,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_ROBERTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ITC_LIBRARY_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_HEALTH_SERVICES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ROBERTS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_QUAD3_PRINTER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER_ACCESS_TELECOMM,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_DANFORTH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_SEYMOUR,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_MERRICK_HEADSTART,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_QUAD4_PRINTER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GOOGLE CHROME,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_GRANT_CATHCHAR,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSAFULLACCESS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_EDSMITH_SUMNER,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_CORC,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_DELAWARE,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_REGISTRATIONSTAFF,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_ALL_PRINTERS_X64,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_PSLA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_PRE_KSTAFF,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LOGGERPRO,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_BLDGADMINS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GOOGLEEARTH-PLUGIN,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOCIAL MEDIA ADULTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VISITOR_ADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_CABHORSE_SALVARMY,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_BENEFITS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_MANOS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_ELMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_PTECH,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSLA_RM203_LAB_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_JOWONIO,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_CLARY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_LIBRARY_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_FRANKLIN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCKINLEY_LAB_RM134_LEX_MX310,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_WORKCOMP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GOOGLEEARTH,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_HEARING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_ADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ERWINNURSERY,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_EDULOG_ELT_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_WESTSIDE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_VIEWALL,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_LEMOYNE,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HENN-ADOBEDESIGNPREMIUM,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_SUMNER_HEADSTART,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_MEACHEM,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_PRINTER_10,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_BOARD_RECS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_POMPEII_CATHCHAR,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_FRAZER,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_PSLA,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_HUNTINGTON,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_STUDENT_SUPPORT_SERVICES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_VINCENTHOUSE,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ATONEMENT,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=INSPIRATION9,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_LEARNASGROW,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_NOTT_NRSTEM,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_SUPERADMIN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_TEACHERS_ROOM_TOSHIBA_COPIERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_HWSMITH,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CISCOWORKS,OU=DISTRIBUTIONGROUPS,OU=EMAILSPECIALOBJECTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_CORC_IB,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_STBRIGID_HEADSTART,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_ELMCREST_SMALLWONDERS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_HUNTINGTONFAMCTR,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_TM_HS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_GRANT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_HAWLEY_CATHCHAR,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_DRWEEKS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=AFTERSCHOOL,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_WEBSTER,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_ADMIN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_PARKSIDE_ARCOFONONDAGA,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_PARKST_CATHCHAR,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_HENN_HCP,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_GUIDANCE_OFFICE_LEX_MX310,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS_RM273_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IT DEPT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HUGHES_COLOR_LEX_C935,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_CAREER_LAB_HPLJ2420,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_HUNTINGTON,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_TEACHERS_RM8_PRINTERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_HSCOUNSELORS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_EDSMITH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CO_PHYS_ED_TOSHIBA_STUDIO305,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SLORESULTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_RM250_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ESL-SHARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FOWLER_COSMETOLOGY_LEX_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REGENTS_SUMMER_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_HWSMITH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_EDULOG_ELT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REGENTS_SUMMER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_P_HENN,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_MSCOUNSELORS,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_FRAZER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_LINCOLN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SLORESULTS_RO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_MSAP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_RM71_LEXE260,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BOVAIMAGES,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SC_R_ADMIND,OU=SECURITYGROUPS-SMARTCHOICE,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CHANGE_PW,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROOM_A12_TOSHIBAS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_PARKSIDEPK,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_NOTTINGHAM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_HENNINGER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_FOWLER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_DELAWARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_CORCORAN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_SS_BUILDING_MEN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLASSMATES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ASK.FM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TAGGED,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MEETME,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MEETUP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VINE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VK,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TUMBLR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BEARD_PRE_K_OFFICE_TOSHIBA,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_GUIDANCE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_RM118A_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PERS2,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PLTW-LOCAL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ABSLTTR,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TELECOM_TECHS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYNREVOICEUSERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSOFT_ACCESS_ADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRSTAFF,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTASUPLOOKUP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SOLOSUITE6PLUS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PS_OSA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TWITTER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCKINLEY_MAIN_OFFICE_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRMSPMVIEW,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SR_WUFOO_REGISTRATION,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PLTW-MACHINES,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BASICSTAMP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ESCHOOLPLUS ADMINS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HATS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PURCHASING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DRKING_ROOMB115_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ACCOUNTING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ITC-LABS,OU=001 - CENTRAL TECH,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAFAPPROVAL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NUTRIKIDS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_FISCAL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DELAWARE_LAPTOP_CARTS_X131,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_GRANTS_READ,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_EARLYCHILDHOOD,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_CONTRACTS_RECEIVING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE__OSA_ADS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SR_WUFOO_LATIN_SCHOOL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SEON,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PAYFTP,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_IB,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SR_WUFOO_DATA,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_MAIN_OFFICE_LEX_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NAUGHTY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_ALL_QUAD_PRINTERS,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_NOTTINGHAM_STEM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS_RM324_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPECIAL_ED_REG,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_CENTRAL_REGISTRATION,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MCKINLEY_MAIN_OFFICE_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DRKING_WORKROOM_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_ESL_APPLICANTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_RM324_STEM_LAB_LEX_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FINANCE MAILBOX PERMISSIONS GROUP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MINITAB17,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CISCOACSADMIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ROBERTS_RM140_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_TEACHERS_ROOM_LEX_T644,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CORCORAN_LIBRARY_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CPS,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_AS400-ARCHIVE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SCCMFULLADMIN,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TMTEAM,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_LIBRARY_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_GRANTS_FULL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT-PRODUCTIONPREMIUM,OU=ADOBE SOFTWARE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_OSA_DATA_SHARES,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EINSTRUCTION_WORKSPACE,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DANFORTH_MAINOFFICE_LEX_C748DE,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HOOTSUITE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FLICKR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SR_WUFOO_SUMMER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLARY_RM70_E460DN,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BEARD_MAINOFFICE_TOSHIBA,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ENSEMBLEUSERS,OU=SERVICE ACCOUNTS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_REG_HENNINGER_HEALTH_CAREERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GOOGLE SKETCHUP,OU=SCCM SOFTWARE INSTALL GROUPS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_EDULOG_DYN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_MAINOFFICE_LEX_MS510,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOTT_GW15_TOSHIBA_COPIER,OU=SCCM PRINTER INSTALLS,OU=BUILDINGS,OU=WORKSTATIONS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BOVASCAN,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CISCOCALLMGRALERT,OU=SERVICEACCOUNTS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=POLICE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_DATAWAREHOUSE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COGNOS AUTHORS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYSTEM GALAXY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COGNOS ADMINS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_NOTICEOFCLAIMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NOBARBYPASS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UNADDRESSEDMESSAGES31F2136C,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYSTEMEVENTMESSAGES4F1A2404,OU=GROUPS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ACCOUNTING DEPARTMENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CERTSVC_DCOM_ACCESS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CISCOEMERGENCYRESPONDERADMINS,OU=SERVICEACCOUNTS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ESCHOOLPLUS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE ENTERPRISE SERVERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PASSWORDPROPDENY,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTICKETWXO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAWXOSEARCH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTICKETHRMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAHRADMINS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE INSTALL DOMAIN SERVERS,CN=MICROSOFT EXCHANGE SYSTEM OBJECTS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAWXOPAYROLLSTAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SPECIALPROGRAMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRMSPM,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTICKETAPPLICATION,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSFINACCT,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAWXOFISCAL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAHRMSSEARCH,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_SUPERINTENDENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PROGRAMMERS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAWXOPAYROLLADMIN,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NVISION USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LMS-LOCAL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HEALTHOFFICECO,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NEWEMPENTRYAPP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PRINTSHOP,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ALLSUBSCRIBERS20FB0106,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IBM PEOPLESOFT,OU=IBM,OU=VENDORS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_GUIDANCECOUNSELORS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTASTAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_OSA_ACCOUNTABILITY,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_PERS1,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=OPERATIONS DOCUWARE,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BYPASS CONTENT FILTERING,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=STAFF ID CARDS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RECORD,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPS SYSTEM ADMINS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAWXOSUPERVISOR,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PSOFT ADMINS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPECEDSCAN,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_CONTRACTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HRTAFISCAL,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WESTSIDE STUDENTS,OU=STUDENTS,OU=WSLC USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DELAWARE.SBITBEHAVIORTEAM,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RISK MANAGEMENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CHILDREN,OU=STUDENTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MAILBOXMGMT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_LMS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ADULTS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TRANS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXAMGEN,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ALLSUBSCRIBERS4F1A2404,OU=GROUPS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IBM SHAREPOINT USERS,OU=IBM,OU=VENDORS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DHCP USERS,OU=SERVICE ACCOUNTS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SENIOR STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EDULOGUSERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PTSD,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=LOCAL ADMINISTRATOR CAPABILITY ON THEIR COMPUTER,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BENEFITS DEPARTMENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SG_BUDGET DEPARTMENT,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ALLSUBSCRIBERS31F2136C,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ALANY,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SPI SYSTEM ADMINS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SHARE_QDLS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WEBSMS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TECHS,OU=SECURITYGROUPS-MISC,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WEBSMS ADMINS,OU=ESCHOOL USERS,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=FINSTAFF,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UNADDRESSEDMESSAGES20FB0106,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TTK,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ADMIN LIST MANAGERS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UNITYVOICEMAILONLYUSERS,OU=GROUPS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYSTEMEVENTMESSAGES31F2136C,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UNITYADMINEMAILGROUP,OU=SERVICEACCOUNTS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SYSTEMEVENTMESSAGES20FB0106,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HEALTHYSHOTS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UNADDRESSEDMESSAGES4F1A2404,OU=GROUPS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ACS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SAY_YES,OU=STAFF,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HELPSERVICESGROUP,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IIS_WPG,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WIRELESS,OU=SERVICE ACCOUNTS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UNITYEXCHANGEADMINS,OU=SERVICEACCOUNTS,OU=UNITY,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GOOGLE PLUS,OU=SCSDUSERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE DOMAIN SERVERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=TERMINAL SERVER LICENSE SERVERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=IIS_IUSRS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DOMAIN ADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ADMINISTRATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ENTERPRISE ADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GUESTS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=BACKUP OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REMOTE DESKTOP USERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CERTIFICATE SERVICE DCOM ACCESS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DOMAIN COMPUTERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ACCOUNT OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PRE-WINDOWS 2000 COMPATIBLE ACCESS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DENIED RODC PASSWORD REPLICATION GROUP,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=WINDOWS AUTHORIZATION ACCESS GROUP,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REMOTE MANAGEMENT USERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=GROUP POLICY CREATOR OWNERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SCHEMA ADMINS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CERT PUBLISHERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PROTECTED USERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ACCESS CONTROL ASSISTANCE OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CLONEABLE DOMAIN CONTROLLERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HYPER-V ADMINISTRATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RDS MANAGEMENT SERVERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RDS ENDPOINT SERVERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RDS REMOTE ACCESS SERVERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=READ-ONLY DOMAIN CONTROLLERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DOMAIN CONTROLLERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=REPLICATOR,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PRINT OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RAS AND IAS SERVERS,OU=SERVICE ACCOUNTS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PERFORMANCE LOG USERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ENTERPRISE READ-ONLY DOMAIN CONTROLLERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EVENT LOG READERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ALLOWED RODC PASSWORD REPLICATION GROUP,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=CRYPTOGRAPHIC OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DOMAIN GUESTS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DISTRIBUTED COM USERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DOMAIN USERS,CN=USERS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=USERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=INCOMING FOREST TRUST BUILDERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PERFORMANCE MONITOR USERS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=NETWORK CONFIGURATION OPERATORS,CN=BUILTIN,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE IMPORT EXPORT AND DELETE,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DISCOVERY MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=SERVER MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=DELEGATED SETUP,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HYGIENE MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=COMPLIANCE MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=MANAGED AVAILABILITY SERVERS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE WINDOWS PERMISSIONS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=ORGANIZATION MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RECIPIENT MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=VIEW-ONLY ORGANIZATION MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=PUBLIC FOLDER MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=UM MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=HELP DESK,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=RECORDS MANAGEMENT,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE TRUSTED SUBSYSTEM,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGELEGACYINTEROP,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE PUBLIC FOLDER ADMINISTRATORS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE VIEW-ONLY ADMINISTRATORS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE RECIPIENT ADMINISTRATORS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE ORGANIZATION ADMINISTRATORS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next + edit "CN=EXCHANGE SERVERS,OU=MICROSOFT EXCHANGE SECURITY GROUPS,DC=SCSD,DC=AD" + set server-name "Orion" + next +end +config user local + edit "jorge-mike" + set type password + set passwd-time 2025-10-03 12:14:17 + set passwd ENC 8bdnDDRnGdGuzhmLaKSUH1It4F61Lx1CxPNwKXFZQ5tIbxf9gEz6G3O1aAmvxjckfE2Ioao2VpBMVLyX8AS/IDfJuu5jjuyJU75t0yqi/4BkAWZlvyvdcuPbL1i7uIwuULYUEJpUwO9Ni7qEjxpe17n3nHr6dOl/onsGbRIMtrVj9eJNQCvZvN60nopG2Rn4trDOuw== + next +end +config user setting + set auth-cert "Fortinet_Factory" +end +config user group + edit "SSO_Guest_Users" + next + edit "SSL_VPN_Full_Access" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=VPN_Fortinet,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=VPN_Fortinet,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=VPN_Fortinet,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Web_Servers_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_DistrictWebsite,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_DistrictWebsite,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_DistrictWebsite,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_SchoolTool_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_SchoolTool,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_SchoolTool,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_SchoolTool,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_DayAuto_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_DayAutomation,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_DayAutomation,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_DayAutomation,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Security_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_Security,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_Security,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_Security,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Hyperion_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=VPN_Hyperion,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=VPN_Hyperion,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=VPN_Hyperion,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Peoplesoft_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=VPN_Peoplesoft,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=VPN_Peoplesoft,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=VPN_Peoplesoft,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_WebCRD_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_WebCRD,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_WebCRD,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_WebCRD,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Access411_Group" + set member "HVDC02.scsd.ad" "HVDC03.scsd.ad" "DC01.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=VPN_Access_Access411,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=VPN_Access_Access411,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=VPN_Access_Access411,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_DocHolliday_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_Doc,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_Doc,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_Doc,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Access_Control_Group" + set member "HVDC02.scsd.ad" "DC01.scsd.ad" "HVDC03.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=Server_Local_Admin_Security,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=Server_Local_Admin_Security,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=Server_Local_Admin_Security,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "VPN_Auditor_Group" + set member "HVDC02.scsd.ad" "HVDC03.scsd.ad" "DC01.scsd.ad" + config match + edit 1 + set server-name "DC01.scsd.ad" + set group-name "CN=VPN_Auditors,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 2 + set server-name "HVDC02.scsd.ad" + set group-name "CN=VPN_Auditors,OU=SCSDUsers,DC=scsd,DC=ad" + next + edit 3 + set server-name "HVDC03.scsd.ad" + set group-name "CN=VPN_Auditors,OU=SCSDUsers,DC=scsd,DC=ad" + next + end + next + edit "FortiGateAccess" + set member "azure" "jorge-mike" + config match + edit 1 + set server-name "azure" + set group-name "5021feae-da5a-4d27-8d9d-4927b39324c7" + next + end + next + edit "SSL_VPN_SCSD_USER" + set member "scsd_user_sso" + next + edit "SSL_VPN_SCSD_USER2" + set member "scsd_user2_sso" + config match + edit 1 + set server-name "scsd_user2_sso" + set group-name "ac4a0b00-0f87-48ae-8d66-1a74019ca4ec" + next + end + next +end diff --git a/configs/fortigate/vdom_scsd/voip.cfg b/configs/fortigate/vdom_scsd/voip.cfg new file mode 100644 index 0000000..0edfb81 --- /dev/null +++ b/configs/fortigate/vdom_scsd/voip.cfg @@ -0,0 +1,41 @@ +config voip profile + edit "default" + set comment "Default VoIP profile." + next + edit "strict" + config sip + set malformed-request-line discard + set malformed-header-via discard + set malformed-header-from discard + set malformed-header-to discard + set malformed-header-call-id discard + set malformed-header-cseq discard + set malformed-header-rack discard + set malformed-header-rseq discard + set malformed-header-contact discard + set malformed-header-record-route discard + set malformed-header-route discard + set malformed-header-expires discard + set malformed-header-content-type discard + set malformed-header-content-length discard + set malformed-header-max-forwards discard + set malformed-header-allow discard + set malformed-header-p-asserted-identity discard + set malformed-header-sdp-v discard + set malformed-header-sdp-o discard + set malformed-header-sdp-s discard + set malformed-header-sdp-i discard + set malformed-header-sdp-c discard + set malformed-header-sdp-b discard + set malformed-header-sdp-z discard + set malformed-header-sdp-k discard + set malformed-header-sdp-a discard + set malformed-header-sdp-t discard + set malformed-header-sdp-r discard + set malformed-header-sdp-m discard + end + next + edit "parks_sip" + set comment "VoIP Profile for Parks SIP" + next +end diff --git a/configs/fortigate/vdom_scsd/vpn.cfg b/configs/fortigate/vdom_scsd/vpn.cfg new file mode 100644 index 0000000..c0fd6f0 --- /dev/null +++ b/configs/fortigate/vdom_scsd/vpn.cfg @@ -0,0 +1,1026 @@ +config vpn certificate ca +end +config vpn certificate remote + edit "REMOTE_Cert_2" + next +end +config vpn certificate local + edit "Fortinet_CA_SSL" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_CA_Untrusted" + set comments "This is the default CA certificate the SSL Inspection will use when generating new server certificates." + set range global + set source factory + next + edit "Fortinet_SSL" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_RSA4096" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA1024" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_DSA2048" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA256" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA384" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ECDSA521" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED25519" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Fortinet_SSL_ED448" + set comments "This certificate is embedded in the hardware at the factory and is unique to this unit. " + set range global + set source factory + next + edit "Star Cert Expire 4-24" + set password ENC *HIDDEN* + next + edit "StartCert-Expire042025" + set password ENC *HIDDEN* + next + edit "StarCert-Expire03202026" + set password ENC *HIDDEN* + next +end +config vpn ssl web host-check-software + edit "FortiClient-AV" + set guid "1A0271D5-3D4F-46DB-0C2C-AB37BA90D9F7" + next + edit "FortiClient-FW" + set type fw + set guid "528CB157-D384-4593-AAAA-E42DFF111CED" + next + edit "FortiClient-AV-Vista" + set guid "385618A6-2256-708E-3FB9-7E98B93F91F9" + next + edit "FortiClient-FW-Vista" + set type fw + set guid "006D9983-6839-71D6-14E6-D7AD47ECD682" + next + edit "FortiClient5-AV" + set guid "5EEDDB8C-C27A-6714-3657-DBD811D1F1B7" + next + edit "AVG-Internet-Security-AV" + set guid "17DDD097-36FF-435F-9E1B-52D74245D6BF" + next + edit "AVG-Internet-Security-FW" + set type fw + set guid "8DECF618-9569-4340-B34A-D78D28969B66" + next + edit "AVG-Internet-Security-AV-Vista-Win7" + set guid "0C939084-9E57-CBDB-EA61-0B0C7F62AF82" + next + edit "AVG-Internet-Security-FW-Vista-Win7" + set type fw + set guid "34A811A1-D438-CA83-C13E-A23981B1E8F9" + next + edit "CA-Anti-Virus" + set guid "17CFD1EA-56CF-40B5-A06B-BD3A27397C93" + next + edit "CA-Internet-Security-AV" + set guid "6B98D35F-BB76-41C0-876B-A50645ED099A" + next + edit "CA-Internet-Security-FW" + set type fw + set guid "38102F93-1B6E-4922-90E1-A35D8DC6DAA3" + next + edit "CA-Internet-Security-AV-Vista-Win7" + set guid "3EED0195-0A4B-4EF3-CC4F-4F401BDC245F" + next + edit "CA-Internet-Security-FW-Vista-Win7" + set type fw + set guid "06D680B0-4024-4FAB-E710-E675E50F6324" + next + edit "CA-Personal-Firewall" + set type fw + set guid "14CB4B80-8E52-45EA-905E-67C1267B4160" + next + edit "F-Secure-Internet-Security-AV" + set guid "E7512ED5-4245-4B4D-AF3A-382D3F313F15" + next + edit "F-Secure-Internet-Security-FW" + set type fw + set guid "D4747503-0346-49EB-9262-997542F79BF4" + next + edit "F-Secure-Internet-Security-AV-Vista-Win7" + set guid "15414183-282E-D62C-CA37-EF24860A2F17" + next + edit "F-Secure-Internet-Security-FW-Vista-Win7" + set type fw + set guid "2D7AC0A6-6241-D774-E168-461178D9686C" + next + edit "Kaspersky-AV" + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-FW" + set type fw + set guid "2C4D4BC6-0793-4956-A9F9-E252435469C0" + next + edit "Kaspersky-AV-Vista-Win7" + set guid "AE1D740B-8F0F-D137-211D-873D44B3F4AE" + next + edit "Kaspersky-FW-Vista-Win7" + set type fw + set guid "9626F52E-C560-D06F-0A42-2E08BA60B3D5" + next + edit "McAfee-Internet-Security-Suite-AV" + set guid "84B5EE75-6421-4CDE-A33A-DD43BA9FAD83" + next + edit "McAfee-Internet-Security-Suite-FW" + set type fw + set guid "94894B63-8C7F-4050-BDA4-813CA00DA3E8" + next + edit "McAfee-Internet-Security-Suite-AV-Vista-Win7" + set guid "86355677-4064-3EA7-ABB3-1B136EB04637" + next + edit "McAfee-Internet-Security-Suite-FW-Vista-Win7" + set type fw + set guid "BE0ED752-0A0B-3FFF-80EC-B2269063014C" + next + edit "McAfee-Virus-Scan-Enterprise" + set guid "918A2B0B-2C60-4016-A4AB-E868DEABF7F0" + next + edit "Norton-360-2.0-AV" + set guid "A5F1BC7C-EA33-4247-961C-0217208396C4" + next + edit "Norton-360-2.0-FW" + set type fw + set guid "371C0A40-5A0C-4AD2-A6E5-69C02037FBF3" + next + edit "Norton-360-3.0-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-360-3.0-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV" + set guid "E10A9785-9598-4754-B552-92431C1C35F8" + next + edit "Norton-Internet-Security-FW" + set type fw + set guid "7C21A4C9-F61F-4AC4-B722-A6E19C16F220" + next + edit "Norton-Internet-Security-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Norton-Internet-Security-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Symantec-Endpoint-Protection-AV" + set guid "FB06448E-52B8-493A-90F3-E43226D3305C" + next + edit "Symantec-Endpoint-Protection-FW" + set type fw + set guid "BE898FE3-CD0B-4014-85A9-03DB9923DDB6" + next + edit "Symantec-Endpoint-Protection-AV-Vista-Win7" + set guid "88C95A36-8C3B-2F2C-1B8B-30FCCFDC4855" + next + edit "Symantec-Endpoint-Protection-FW-Vista-Win7" + set type fw + set guid "B0F2DB13-C654-2E74-30D4-99C9310F0F2E" + next + edit "Panda-Antivirus+Firewall-2008-AV" + set guid "EEE2D94A-D4C1-421A-AB2C-2CE8FE51747A" + next + edit "Panda-Antivirus+Firewall-2008-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Panda-Internet-Security-AV" + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2006~2007-FW" + set type fw + set guid "4570FB70-5C9E-47E9-B16C-A3A6A06C4BF0" + next + edit "Panda-Internet-Security-2008~2009-FW" + set type fw + set guid "7B090DC0-8905-4BAF-8040-FD98A41C8FB8" + next + edit "Sophos-Anti-Virus" + set guid "3F13C776-3CBE-4DE9-8BF6-09E5183CA2BD" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW" + set type fw + set guid "0786E95E-326A-4524-9691-41EF88FB52EA" + next + edit "Sophos-Enpoint-Secuirty-and-Control-AV-Vista-Win7" + set guid "479CCF92-4960-B3E0-7373-BF453B467D2C" + next + edit "Sophos-Enpoint-Secuirty-and-Control-FW-Vista-Win7" + set type fw + set guid "7FA74EB7-030F-B2B8-582C-1670C5953A57" + next + edit "Trend-Micro-AV" + set guid "7D2296BC-32CC-4519-917E-52E652474AF5" + next + edit "Trend-Micro-FW" + set type fw + set guid "3E790E9E-6A5D-4303-A7F9-185EC20F3EB6" + next + edit "Trend-Micro-AV-Vista-Win7" + set guid "48929DFC-7A52-A34F-8351-C4DBEDBD9C50" + next + edit "Trend-Micro-FW-Vista-Win7" + set type fw + set guid "70A91CD9-303D-A217-A80E-6DEE136EDB2B" + next + edit "ZoneAlarm-AV" + set guid "5D467B10-818C-4CAB-9FF7-6893B5B8F3CF" + next + edit "ZoneAlarm-FW" + set type fw + set guid "829BDA32-94B3-44F4-8446-F8FCFF809F8B" + next + edit "ZoneAlarm-AV-Vista-Win7" + set guid "D61596DF-D219-341C-49B3-AD30538CBC5B" + next + edit "ZoneAlarm-FW-Vista-Win7" + set type fw + set guid "EE2E17FA-9876-3544-62EC-0405AD5FFB20" + next + edit "ESET-Smart-Security-AV" + set guid "19259FAE-8396-A113-46DB-15B0E7DFA289" + next + edit "ESET-Smart-Security-FW" + set type fw + set guid "211E1E8B-C9F9-A04B-6D84-BC85190CE5F2" + next +end +config vpn ssl web portal + edit "full-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set web-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + config bookmark-group + edit "gui-bookmarks" + next + end + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + next + edit "web-access" + set web-mode enable + next + edit "tunnel-access" + set tunnel-mode enable + set ipv6-tunnel-mode enable + set ip-pools "SSLVPN_TUNNEL_ADDR1" + set ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1" + next + edit "SCSD_VPN_FULL_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "IPv4-Private-All-RFC1918" + config bookmark-group + edit "gui-bookmarks" + next + end + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "SchoolTool_Portal" + set tunnel-mode enable + set web-mode enable + set forticlient-download disable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + set user-bookmark disable + config bookmark-group + edit "gui-bookmarks" + config bookmarks + edit "Obiwan_RDP" + set apptype rdp + set host "10.1.48.202" + set security any + set port 3389 + set sso auto + next + edit "HanSolo_RDP" + set apptype rdp + set host "10.1.48.201" + set security any + set port 3389 + set sso auto + next + edit "C3PO_RDP" + set apptype rdp + set host "10.1.48.133" + set security any + set port 3389 + set sso auto + next + edit "Chewbacca_RDP" + set apptype rdp + set host "10.1.48.129" + set security any + set port 3389 + set sso auto + next + edit "Skywalker_RDP" + set apptype rdp + set host "10.1.48.63" + set security any + set port 3389 + set sso auto + next + edit "Yoda_RDP" + set apptype rdp + set host "10.1.48.103" + set security any + set port 3389 + set sso auto + next + edit "MANDO_RDP" + set apptype rdp + set host "10.1.40.72" + set security any + set port 3389 + set sso auto + next + edit "GROGU_RDP" + set apptype rdp + set host "10.1.40.224" + set security any + set port 3389 + set sso auto + next + end + next + end + set display-connection-tools disable + set display-history disable + set heading "SCSD SchoolTool VPN" + next + edit "Website_Server_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + set user-bookmark disable + config bookmark-group + edit "gui-bookmarks" + config bookmarks + edit "Webosphere_RDP" + set apptype rdp + set host "10.1.48.117" + set port 3389 + set sso auto + next + edit "Webosphere_FTP" + set apptype ftp + set folder "10.1.48.117" + set sso auto + next + end + next + end + set display-connection-tools disable + set display-history disable + set display-status disable + set heading "SCSD Website VPN Portal" + set theme mariner + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "DayAutomation_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + config bookmarks + edit "Day_Enterprise_Server" + set apptype rdp + set host "10.1.40.108" + set port 3389 + set sso auto + next + edit "Day_VM_Server" + set apptype rdp + set host "10.1.40.173" + set port 3389 + set sso auto + next + edit "Day_Continuum_Server" + set apptype rdp + set host "10.1.40.188" + set port 3389 + set sso auto + next + end + next + end + set display-connection-tools disable + set display-history disable + set display-status disable + set heading "SCSD Day Automation VPN Portal" + set theme melongene + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "Security_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + next + end + set display-history disable + set display-status disable + set heading "SCSD Security VPN Portal" + set theme mariner + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "Hyperion_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + next + end + set display-history disable + set display-status disable + set heading "SCSD_Hyperion_VPN_Portal" + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "Peoplesoft_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + next + end + set display-history disable + set display-status disable + set heading "SCSD_Peoplesoft_VPN_Portal" + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "WebCRD_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + next + end + set display-history disable + set display-status disable + set heading "SCSD_WebCRD_VPN_Portal" + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "Access411_Portal" + set tunnel-mode enable + set web-mode enable + set forticlient-download disable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + set user-bookmark disable + config bookmark-group + edit "gui-bookmarks" + config bookmarks + edit "411app" + set apptype rdp + set host "10.1.40.216" + set security any + set port 3389 + set sso auto + next + edit "411sql" + set apptype rdp + set host "10.1.40.225" + set security any + set port 3389 + set sso auto + next + edit "411app HomePage" + set url "https://411app.scsd.us" + next + end + next + end + set display-connection-tools disable + set display-history disable + set display-status disable + set heading "SCSD Access411 VPN Portal" + next + edit "DocHolliday_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + next + end + set display-history disable + set display-status disable + set heading "SCSD DocHolliday Portal" + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "AccessControl_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + next + end + set display-history disable + set display-status disable + set heading "SCSD Access Control VPN Portal" + set customize-forticlient-download-url enable + set windows-forticlient-download-url "https://links.fortinet.com/forticlient/win/vpnagent" + set macos-forticlient-download-url "https://links.fortinet.com/forticlient/mac/vpnagent" + next + edit "Auditor_Portal" + set tunnel-mode enable + set web-mode enable + set forticlient-download disable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" + config bookmark-group + edit "gui-bookmarks" + config bookmarks + edit "Finance" + set url "http://psprdfin.scsd.ad/psp/FPRD/" + next + edit "HR" + set url "http://psprdhcm.scsd.ad/psp/HPRD" + next + end + next + end + set clipboard disable + next + edit "Azure_Test_Portal" + set tunnel-mode enable + set web-mode enable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" "IPv4-Private-All-RFC1918" + config bookmark-group + edit "gui-bookmarks" + next + end + set heading "Azure-VPN Portal" + next + edit "SCSD_USER_PORTAL" + set tunnel-mode enable + set web-mode enable + set forticlient-download disable + set ip-pools "SSL_VPN_Range" + set split-tunneling-routing-address "Internal_10.0.0.0_8" "IPv4-Private-All-RFC1918" + config bookmark-group + edit "gui-bookmarks" + next + end + set heading "SCSD-USER-PORTAL" + next +end +config vpn ssl settings + set servercert "StarCert-Expire03202026" + set idle-timeout 3600 + set auth-timeout 36000 + set login-timeout 180 + set tunnel-ip-pools "SSL_VPN_Range" + set dns-server1 10.1.40.10 + set dns-server2 10.21.48.10 + set source-interface "outside" + set source-address "all" + set source-address6 "all" + set default-portal "tunnel-access" + config authentication-rule + edit 1 + set groups "SSL_VPN_Full_Access" + set portal "SCSD_VPN_FULL_Portal" + next + edit 2 + set groups "VPN_SchoolTool_Group" + set portal "SchoolTool_Portal" + next + edit 4 + set groups "VPN_Web_Servers_Group" + set portal "Website_Server_Portal" + next + edit 5 + set groups "VPN_DayAuto_Group" + set portal "DayAutomation_Portal" + next + edit 6 + set groups "VPN_Security_Group" + set portal "Security_Portal" + next + edit 7 + set groups "VPN_Hyperion_Group" + set portal "Hyperion_Portal" + next + edit 8 + set groups "VPN_Peoplesoft_Group" + set portal "Peoplesoft_Portal" + next + edit 9 + set groups "VPN_WebCRD_Group" + set portal "WebCRD_Portal" + next + edit 10 + set groups "VPN_Access411_Group" + set portal "Access411_Portal" + next + edit 11 + set groups "VPN_DocHolliday_Group" + set portal "DocHolliday_Portal" + next + edit 12 + set groups "VPN_Access_Control_Group" + set portal "AccessControl_Portal" + next + edit 13 + set groups "VPN_Auditor_Group" + set portal "Auditor_Portal" + next + edit 14 + set groups "FortiGateAccess" + set portal "Azure_Test_Portal" + next + edit 15 + set groups "SSL_VPN_SCSD_USER" + set portal "SCSD_USER_PORTAL" + next + edit 16 + set groups "SSL_VPN_SCSD_USER2" + set portal "SCSD_USER_PORTAL" + next + end + set http-request-header-timeout 60 + set http-request-body-timeout 60 +end +config vpn ssl web user-bookmark + edit "vpn_user1#SSL_VPN_Full_Access" + next + edit "tmarri81#SSL_VPN_Full_Access" + config bookmarks + edit "TimMac_FTP" + set apptype ftp + set folder "10.1.7.110" + next + edit "My_PC" + set apptype rdp + set host "10.1.7.137" + set security any + set port 3389 + set sso auto + next + edit "My Mac" + set apptype vnc + set host "10.1.7.110" + set port 5900 + set logon-user "tmarris" + set logon-password ENC *HIDDEN* + next + end + next + edit "tmarri81.admin#VPN_SchoolTool_Group" + next + edit "dteacher#VPN_PrintServer_Group" + next + edit "gdaniels.admin#VPN_PrintServer_Group" + next + edit "gdaniels#SSL_VPN_Full_Access" + next + edit "tmarri81.admin#SSL_VPN_Full_Access" + config bookmarks + edit "MrRobot_FTP" + set apptype ftp + set folder "10.1.40.101" + set sso auto + next + edit "Obiwan_RDP" + set apptype rdp + set host "10.1.48.202" + set port 3389 + set sso auto + next + end + next + edit "tmarri81.la#SSL_VPN_Full_Access" + config bookmarks + edit "MrRobot_FTP" + set apptype ftp + set folder "10.1.40.101" + set sso auto + next + end + next + edit "hrice.oa#SSL_VPN_Full_Access" + next + edit "tmarri81#VPN_Security_Group" + next + edit "timoon67#SSL_VPN_Full_Access" + next + edit "tmarri81.la#VPN_Hyperion_Group" + next + edit "tmarri81.la#VPN_Peoplesoft_Group" + next + edit "tmarri81.la#VPN_WebCRD_Group" + next + edit "webcrdsupport#VPN_WebCRD_Group" + next + edit "tmarri81.la#VPN_DocHolliday_Group" + next + edit "mnichols.oa#VPN_DayAuto_Group" + next + edit "ddunn.oa#VPN_DayAuto_Group" + next + edit "jgriffin.oa#VPN_DayAuto_Group" + next + edit "swalts49#SSL_VPN_Full_Access" + next + edit "Bstrohm_admin#SSL_VPN_Full_Access" + next + edit "jgumpert#VPN_Peoplesoft_Group" + next + edit "gedelstein#VPN_DayAuto_Group" + next + edit "tmarri81.la#VPN_DayAuto_Group" + next + edit "wlakie.oa#VPN_DayAuto_Group" + next + edit "Katapult.oa#VPN_DocHolliday_Group" + next + edit "aolEVA60#SSL_VPN_Full_Access" + next + edit "aoleva60#SSL_VPN_Full_Access" + next + edit "hebuck02#SSL_VPN_Full_Access" + next + edit "kcampion.oa#VPN_DayAuto_Group" + next + edit "jchapman.oa#VPN_Hyperion_Group" + next + edit "btrzaskos.oa#VPN_DayAuto_Group" + next + edit "ysun.oa#VPN_Hyperion_Group" + next + edit "sreddy.OA#VPN_Hyperion_Group" + next + edit "bstrohm_admin#SSL_VPN_Full_Access" + next + edit "navd.oa#VPN_Peoplesoft_Group" + config bookmarks + edit "SCSD PS DEV" + set url "http://psdevhcm.scsd.ad/psp/HDEV/?cmd=login&languageCd=ENG&" + next + end + next +end +config vpn ipsec phase1-interface + edit "SRIC_BOCES" + set interface "outside lag" + set ike-version 2 + set peertype any + set net-device disable + set proposal aes256-sha256 + set dhgrp 14 + set nattraversal disable + set remote-gw 170.161.52.25 + set psksecret ENC VfwFjiI7LU47vf8pI5fkMwsyn+R6NwkJSA9lbM4TNUEDy/k5l93jMcy20CskKHZmZJvOc9WByZNHdRwGPi5k3PzDbIG049uoEDUUXv7RVS0jsDOrHBAOKl97X8GKhShDtJ7+ky0o1bISFhx+z0kpeB0V2vU4QFlY7rquVfNcMhs72OtwGrP7x6rBuWoTleuNu1rN1g== + next + edit "vpn-042e9903" + set interface "outside lag" + set ike-version 2 + set local-gw 198.36.24.5 + set keylife 28800 + set peertype any + set net-device disable + set proposal aes256-sha256 + set dhgrp 19 + set remote-gw 52.61.115.188 + set psksecret ENC pgnEiLI+KRc+PpaJbpMRzj5LYY2VqBK7fkJc0rK8DZthFdzrTiOemGkd/AAZfYDfQzjXE2ImkUPGDg7kE/bpX7zb1Q+YN2F/weXGZLFLFiC2YeJHAtw4S3S3Sxyu0oF0IX4qMRQxN3KMQoNDHw4SCZ28uySpMuSGdEB3VU3aMrixvI/aj7ZM5FI6RNyVptPig/gdUw== + set dpd-retryinterval 30 + next + edit "SCHC" + set interface "outside lag" + set ike-version 2 + set peertype any + set net-device disable + set proposal aes256-sha256 + set remote-gw 209.217.202.173 + set psksecret ENC 3F3hUIePVaRfY+I8wb/5TSpoxIg1qHmE83OjoC12VxjhTgVMpbe+q+OFQVKPz43vDsp26IG1wHhwnwvcUWUcFMVsyhaC6vWBagpJ7bl5T5yQmahbN2O9xEE3PFLdEYBnw7cVHfYgqKI+OnK1AIHSXgczu4TF7OS0mW8O68ss8I1MJOp6tUK5I133uvZuqy0SXjvZvg== + next + edit "vpn-0fc50345" + set interface "outside lag" + set local-gw 198.36.24.5 + set keylife 28800 + set peertype any + set net-device disable + set proposal aes128-sha1 + set comments "SchoolTool Tunnel" + set dhgrp 2 + set remote-gw 34.194.174.170 + set psksecret ENC hc9/IG0PLZc8nqoYi1AAzwJIUQjxZIH3/Rg3UC/t8SaPTSWlkg7+MqkQLSrfEC3jm1DxUyDRUr0tcq6QOdi4Hyf6PotXxoFyOC8CFqyTOExapKsx9TXEuHMnFDT5n1kOxyGymGnmMFy7k77gcSAnZr0TG+O0EGMG/AB70wqWhdiYonlDuXbTQKsQjB3srbUpO4R7ng== + next + edit "vpn-0403e61" + set interface "outside lag" + set ike-version 2 + set local-gw 198.36.24.5 + set keylife 28800 + set peertype any + set net-device disable + set proposal aes256-sha256 + set comments "eScholar Tunnel" + set dhgrp 19 + set remote-gw 44.216.12.227 + set psksecret ENC EATGPi9D0scvkZvkpkFaOzrdUUZXZ4uOYcdZx2rM61DfX2MhXPfEhRGsOpgn4Gj5PlYXtIME7DvK0YuoHZHzR2sLfnSPHe15YMWsqA6L0kaUdMIAM3OTP7vT0F9QDdYF6IagN0NMPhAWvCAfRCb0ZHOnt3hO/jEc0DEeNPWakjY4P5yrzzzEBzjVYEVQ11g2nVwQPQ== + set dpd-retryinterval 30 + next + edit "Highstreet" + set interface "outside lag" + set ike-version 2 + set local-gw 198.36.24.5 + set keylife 28800 + set peertype any + set net-device disable + set proposal aes128-sha1 + set dhgrp 2 + set nattraversal disable + set remote-gw 3.20.191.182 + set psksecret ENC JPr8gHWNJOHu51rYeimLjd4gIenOITSQkJuwQmpov1tp2X+/mi1yOMu/ArMbVGVHCpkkGaJd5TlV8+iQernJ0zbmIFVphMzp31ipxtYKwCcU16QbNutuRQHTCkacgfJITMzelqbTn1yX8gQmOfc+Nm5Ff21IusnWMuCX2e1JnSlsWXk93jGFKPZJ49jNodtEkyu0hA== + next + edit "Highstreet_2" + set interface "outside lag" + set ike-version 2 + set keylife 28800 + set peertype any + set net-device disable + set proposal aes128-sha1 + set dhgrp 2 + set nattraversal disable + set remote-gw 3.146.135.243 + set psksecret ENC F42JFLCV4o51MG3dJgMhxed+wKbyPNe3o/gzPVt+S1v2nPkRxaRrDHd35UTK1e2aVDhnYx3jOStK78bFmN+EyABmiaM+7D75bTUZNH9RNPXbV3QfAupRCCkJYqVzw8IcD1XEaRepKx4kJJ0sYas+vLv0zC0XVpl6mdynwdhVQ44it345OAc8hEF79t+M1ReMlLe+IA== + next + edit "DPS" + set interface "outside lag" + set ike-version 2 + set peertype any + set net-device disable + set proposal aes256-sha256 + set comments "VPN: DPS" + set remote-gw 24.39.213.214 + set psksecret ENC /mqtKX5AoPJ4lKLOsjT8SiIxw9IfSbyAqR+BYCF3BcuxyfkSPZuWZaoDN4qSAQNSuJWVNlk5cMWNVTqS39vYpMxrPYEUgFSdBCqG74v8pulNq3wdcvr0NacmGlbjjXTK9txdlxiJCqsF1DII5lVQxG4/gIvxd7gq2gCzs5hqm54K7uu6GfJqavCu7OXOk0Er2v6ODw== + next + edit "RAP" + set interface "outside lag" + set ike-version 2 + set peertype any + set net-device disable + set proposal aes256-sha256 + set nattraversal disable + set remote-gw 24.105.188.54 + set psksecret ENC Z7BghtxJ2bqbW81y491GQQbgm1fjmiQANIsczpkGL3stZKLQ/8cwEZjrwuOz3EQWG01Wr+5BgqsAMAXN1iSNAf3o0mHay3lhCPF5VU+FZa11576VRaTNR2QozweDDXgS7stmj3pIic3SArdqsIhSeQinRu+85AEzfvlkn4KgBm14I9tdZiueScCjz+2grJ1iAbDYNg== + next +end +config vpn ipsec phase2-interface + edit "SRIC_BOCES" + set phase1name "SRIC_BOCES" + set proposal aes256-sha256 + set dhgrp 14 + set auto-negotiate enable + set src-addr-type ip + set dst-addr-type ip + set keylifeseconds 28800 + set src-start-ip 198.36.24.68 + set dst-start-ip 170.161.52.27 + next + edit "vpn-042e9903" + set phase1name "vpn-042e9903" + set proposal aes256-sha256 + set dhgrp 16 + set auto-negotiate enable + set keylifeseconds 3600 + set src-subnet 10.1.48.0 255.255.255.0 + set dst-subnet 10.222.0.0 255.255.0.0 + next + edit "SCHC" + set phase1name "SCHC" + set proposal aes256-sha256 + set dhgrp 14 + set src-addr-type name + set dst-addr-type name + set keylifeseconds 28800 + set src-name "SCHC_Local_Subnets_Group" + set dst-name "SCHC_Remote_Subnets_Group" + next + edit "vpn-0fc50345" + set phase1name "vpn-0fc50345" + set proposal aes128-sha1 + set dhgrp 2 + set auto-negotiate enable + set src-addr-type name + set dst-addr-type name + set keylifeseconds 3600 + set src-name "SchoolTool_Cloud_Internal" + set dst-name "SchoolTool_External_Range" + next + edit "vpn-0403e61" + set phase1name "vpn-0403e61" + set proposal aes256-sha256 + set dhgrp 16 + set auto-negotiate enable + set keylifeseconds 3600 + set src-subnet 10.1.48.0 255.255.255.0 + set dst-subnet 10.11.0.0 255.255.240.0 + next + edit "Highstreet" + set phase1name "Highstreet" + set proposal aes128-sha1 + set dhgrp 2 + set auto-negotiate enable + set keylifeseconds 3600 + set src-subnet 10.1.0.0 255.255.192.0 + set dst-subnet 10.51.62.0 255.255.255.0 + next + edit "Highstreet_2" + set phase1name "Highstreet_2" + set proposal aes128-sha1 + set dhgrp 2 + set auto-negotiate enable + set keylifeseconds 3600 + set src-subnet 10.1.0.0 255.255.0.0 + set dst-subnet 10.51.62.32 255.255.255.240 + next + edit "DPS" + set phase1name "DPS" + set proposal aes256-sha256 + set comments "VPN: DPS" + next + edit "RAP" + set phase1name "RAP" + set proposal aes256-sha256 + next +end diff --git a/configs/fortigate/vdom_scsd/waf.cfg b/configs/fortigate/vdom_scsd/waf.cfg new file mode 100644 index 0000000..f434b0b --- /dev/null +++ b/configs/fortigate/vdom_scsd/waf.cfg @@ -0,0 +1,106 @@ +config waf profile + edit "default" + config signature + config main-class 100000000 + set action block + set severity high + end + config main-class 20000000 + end + config main-class 30000000 + set status enable + set action block + set severity high + end + config main-class 40000000 + end + config main-class 50000000 + set status enable + set action block + set severity high + end + config main-class 60000000 + end + config main-class 70000000 + set status enable + set action block + set severity high + end + config main-class 80000000 + set status enable + set severity low + end + config main-class 110000000 + set status enable + set severity high + end + config main-class 90000000 + set status enable + set action block + set severity high + end + set disabled-signature 80080005 80200001 60030001 60120001 80080003 90410001 90410002 + end + config constraint + config header-length + set status enable + set log enable + set severity low + end + config content-length + set status enable + set log enable + set severity low + end + config param-length + set status enable + set log enable + set severity low + end + config line-length + set status enable + set log enable + set severity low + end + config url-param-length + set status enable + set log enable + set severity low + end + config version + set log enable + end + config method + set action block + set log enable + end + config hostname + set action block + set log enable + end + config malformed + set log enable + end + config max-cookie + set status enable + set log enable + set severity low + end + config max-header-line + set status enable + set log enable + set severity low + end + config max-url-param + set status enable + set log enable + set severity low + end + config max-range-segment + set status enable + set log enable + set severity high + end + end + next +end diff --git a/configs/fortigate/vdom_scsd/wanopt.cfg b/configs/fortigate/vdom_scsd/wanopt.cfg new file mode 100644 index 0000000..0311127 --- /dev/null +++ b/configs/fortigate/vdom_scsd/wanopt.cfg @@ -0,0 +1,8 @@ +config wanopt settings + set host-id "default-id" +end +config wanopt profile + edit "default" + set comments "Default WANopt profile." + next +end diff --git a/configs/fortigate/vdom_scsd/web-proxy.cfg b/configs/fortigate/vdom_scsd/web-proxy.cfg new file mode 100644 index 0000000..c7ae766 --- /dev/null +++ b/configs/fortigate/vdom_scsd/web-proxy.cfg @@ -0,0 +1,3 @@ +config web-proxy global + set proxy-fqdn "default.fqdn" +end diff --git a/configs/fortigate/vdom_scsd/webfilter.cfg b/configs/fortigate/vdom_scsd/webfilter.cfg new file mode 100644 index 0000000..247c24d --- /dev/null +++ b/configs/fortigate/vdom_scsd/webfilter.cfg @@ -0,0 +1,584 @@ +config webfilter ftgd-local-cat + edit "custom1" + set id 140 + next + edit "custom2" + set id 141 + next +end +config webfilter ips-urlfilter-setting +end +config webfilter ips-urlfilter-setting6 +end +config webfilter profile + edit "g-default" + set comment "Default web filtering." + config ftgd-wf + unset options + config filters + edit 1 + set action block + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next + edit "g-sniffer-profile" + set comment "Monitor web traffic." + config ftgd-wf + config filters + edit 1 + next + edit 2 + set category 1 + next + edit 3 + set category 2 + next + edit 4 + set category 3 + next + edit 5 + set category 4 + next + edit 6 + set category 5 + next + edit 7 + set category 6 + next + edit 8 + set category 7 + next + edit 9 + set category 8 + next + edit 10 + set category 9 + next + edit 11 + set category 11 + next + edit 12 + set category 12 + next + edit 13 + set category 13 + next + edit 14 + set category 14 + next + edit 15 + set category 15 + next + edit 16 + set category 16 + next + edit 17 + set category 17 + next + edit 18 + set category 18 + next + edit 19 + set category 19 + next + edit 20 + set category 20 + next + edit 21 + set category 23 + next + edit 22 + set category 24 + next + edit 23 + set category 25 + next + edit 24 + set category 26 + next + edit 25 + set category 28 + next + edit 26 + set category 29 + next + edit 27 + set category 30 + next + edit 28 + set category 31 + next + edit 29 + set category 33 + next + edit 30 + set category 34 + next + edit 31 + set category 35 + next + edit 32 + set category 36 + next + edit 33 + set category 37 + next + edit 34 + set category 38 + next + edit 35 + set category 39 + next + edit 36 + set category 40 + next + edit 37 + set category 41 + next + edit 38 + set category 42 + next + edit 39 + set category 43 + next + edit 40 + set category 44 + next + edit 41 + set category 46 + next + edit 42 + set category 47 + next + edit 43 + set category 48 + next + edit 44 + set category 49 + next + edit 45 + set category 50 + next + edit 46 + set category 51 + next + edit 47 + set category 52 + next + edit 48 + set category 53 + next + edit 49 + set category 54 + next + edit 50 + set category 55 + next + edit 51 + set category 56 + next + edit 52 + set category 57 + next + edit 53 + set category 58 + next + edit 54 + set category 59 + next + edit 55 + set category 61 + next + edit 56 + set category 62 + next + edit 57 + set category 63 + next + edit 58 + set category 64 + next + edit 59 + set category 65 + next + edit 60 + set category 66 + next + edit 61 + set category 67 + next + edit 62 + set category 68 + next + edit 63 + set category 69 + next + edit 64 + set category 70 + next + edit 65 + set category 71 + next + edit 66 + set category 72 + next + edit 67 + set category 75 + next + edit 68 + set category 76 + next + edit 69 + set category 77 + next + edit 70 + set category 78 + next + edit 71 + set category 79 + next + edit 72 + set category 80 + next + edit 73 + set category 81 + next + edit 74 + set category 82 + next + edit 75 + set category 83 + next + edit 76 + set category 84 + next + edit 77 + set category 85 + next + edit 78 + set category 86 + next + edit 79 + set category 87 + next + edit 80 + set category 88 + next + edit 81 + set category 89 + next + edit 82 + set category 90 + next + edit 83 + set category 91 + next + edit 84 + set category 92 + next + edit 85 + set category 93 + next + edit 86 + set category 94 + next + edit 87 + set category 95 + next + end + end + next + edit "g-wifi-default" + set comment "Default configuration for offloading WiFi traffic." + set options block-invalid-url + config ftgd-wf + unset options + config filters + edit 1 + next + edit 2 + set category 2 + set action block + next + edit 3 + set category 7 + set action block + next + edit 4 + set category 8 + set action block + next + edit 5 + set category 9 + set action block + next + edit 6 + set category 11 + set action block + next + edit 7 + set category 12 + set action block + next + edit 8 + set category 13 + set action block + next + edit 9 + set category 14 + set action block + next + edit 10 + set category 15 + set action block + next + edit 11 + set category 16 + set action block + next + edit 12 + set category 26 + set action block + next + edit 13 + set category 57 + set action block + next + edit 14 + set category 61 + set action block + next + edit 15 + set category 63 + set action block + next + edit 16 + set category 64 + set action block + next + edit 17 + set category 65 + set action block + next + edit 18 + set category 66 + set action block + next + edit 19 + set category 67 + set action block + next + edit 20 + set category 86 + set action block + next + edit 21 + set category 88 + set action block + next + edit 22 + set category 90 + set action block + next + edit 23 + set category 91 + set action block + next + end + end + next +end +config webfilter search-engine + edit "g-baidu" + set hostname ".*\\.baidu\\.com" + set url "^\\/s?\\?" + set query "wd=" + next + edit "g-baidu2" + set hostname ".*\\.baidu\\.com" + set url "^\\/(ns|q|m|i|v)\\?" + set query "word=" + next + edit "g-baidu3" + set hostname "tieba\\.baidu\\.com" + set url "^\\/f\\?" + set query "kw=" + next + edit "g-bing" + set hostname ".*\\.bing\\..*" + set url "^(\\/images|\\/videos)?(\\/search|\\/async|\\/asyncv2)\\?" + set query "q=" + set safesearch header + next + edit "g-google" + set hostname ".*\\.google\\..*" + set url "^\\/((custom|search|images|videosearch|webhp)\\?)" + set query "q=" + set safesearch url + set safesearch-str "&safe=active" + next + edit "g-google-translate-1" + set hostname "translate\\.google\\..*" + set url "^\\/translate" + set query "u=" + set safesearch translate + next + edit "g-google-translate-2" + set hostname ".*\\.translate\\.goog" + set url "^\\/" + set safesearch translate + next + edit "g-twitter" + set hostname "twitter\\.com" + set url "^\\/i\\/api\\/graphql\\/.*\\/UserByScreenName" + set query "variables=" + set safesearch translate + next + edit "g-vimeo" + set hostname ".*vimeo.*" + set url "^\\/search\\?" + set query "q=" + set safesearch header + next + edit "g-yahoo" + set hostname ".*\\.yahoo\\..*" + set url "^\\/search(\\/video|\\/images){0,1}(\\?|;)" + set query "p=" + set safesearch url + set safesearch-str "&vm=r" + next + edit "g-yandex" + set hostname "yandex\\..*" + set url "^\\/((yand|images\\/|video\\/)(search)|search\\/)\\?" + set query "text=" + set safesearch url + set safesearch-str "&family=yes" + next + edit "g-youtube" + set hostname ".*youtube.*" + set safesearch header + next + edit "g-yt-channel" + set url "www.youtube.com/channel" + set safesearch yt-channel + next + edit "g-yt-pattern" + set url "youtube.com/channel/" + set safesearch yt-pattern + next + edit "g-yt-scan-1" + set url "www.youtube.com/user/" + set safesearch yt-scan + next + edit "g-yt-scan-2" + set url "www.youtube.com/youtubei/v1/browse" + set safesearch yt-scan + next + edit "g-yt-scan-3" + set url "www.youtube.com/youtubei/v1/player" + set safesearch yt-scan + next + edit "g-yt-scan-4" + set url "www.youtube.com/youtubei/v1/navigator" + set safesearch yt-scan + next + edit "translate" + set hostname "translate\\.google\\..*" + set url "^\\/translate\\?" + set query "u=" + set safesearch translate + next + edit "yt-video" + set url "www.youtube.com/watch" + set safesearch yt-video + next +end diff --git a/configs/fortigate/vdom_scsd/wireless-controller.cfg b/configs/fortigate/vdom_scsd/wireless-controller.cfg new file mode 100644 index 0000000..c084220 --- /dev/null +++ b/configs/fortigate/vdom_scsd/wireless-controller.cfg @@ -0,0 +1,43 @@ +config wireless-controller setting + set darrp-optimize-schedules "default-darrp-optimize" +end +config wireless-controller arrp-profile + edit "arrp-default" + next +end +config wireless-controller wids-profile + edit "default" + set comment "Default WIDS profile." + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + set wireless-bridge enable + set deauth-broadcast enable + set null-ssid-probe-resp enable + set long-duration-attack enable + set invalid-mac-oui enable + set weak-wep-iv enable + set auth-frame-flood enable + set assoc-frame-flood enable + set spoofed-deauth enable + set asleap-attack enable + set eapol-start-flood enable + set eapol-logoff-flood enable + set eapol-succ-flood enable + set eapol-fail-flood enable + set eapol-pre-succ-flood enable + set eapol-pre-fail-flood enable + next + edit "default-wids-apscan-enabled" + set ap-scan enable + set ap-bgscan-intv 1 + set ap-bgscan-duration 20 + set ap-bgscan-idle 0 + next +end +config wireless-controller ble-profile + edit "fortiap-discovery" + set advertising ibeacon eddystone-uid eddystone-url + next +end