diff options
author | Scott Seabolt <js9808@att.com> | 2018-03-09 15:33:13 -0500 |
---|---|---|
committer | Randa Maher <rx196w@att.com> | 2018-03-09 22:06:56 +0000 |
commit | 180b8ceb4449bc804f4dd76aabcedc031ff2d4d1 (patch) | |
tree | dece290c69d9f06a179a8f0071c63b3dd453ea02 | |
parent | c6f9a1aab9e6ba545d8148d4f7456235be1e67d8 (diff) |
Adding APPC CDT Guide
Initial Draft
Issue-ID: APPC-375
Change-Id: I79f453f0451c10fbbe352cf88687eed100f83d65
Signed-off-by: Scott Seabolt <js9808@att.com>
41 files changed, 4037 insertions, 0 deletions
diff --git a/docs/APPC CDT Guide/APPC CDT Guide.rst b/docs/APPC CDT Guide/APPC CDT Guide.rst new file mode 100644 index 000000000..ab83e8942 --- /dev/null +++ b/docs/APPC CDT Guide/APPC CDT Guide.rst @@ -0,0 +1,835 @@ +.. ============LICENSE_START==========================================
+.. ===================================================================
+.. Copyright © 2018 AT&T Intellectual Property. All rights reserved.
+.. ===================================================================
+.. Licensed under the Creative Commons License, Attribution 4.0 Intl. (the "License");
+.. you may not use this documentation except in compliance with the License.
+.. You may obtain a copy of the License at
+..
+.. https://creativecommons.org/licenses/by/4.0/
+..
+.. Unless required by applicable law or agreed to in writing, software
+.. distributed under the License is distributed on an "AS IS" BASIS,
+.. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+.. See the License for the specific language governing permissions and
+.. limitations under the License.
+.. ============LICENSE_END============================================
+.. ECOMP is a trademark and service mark of AT&T Intellectual Property.
+
+.. _appc_cdt_guide:
+
+===================
+APPC CDT User Guide
+===================
+
+Introduction
+============
+
+This document is the APPC Controller Design Tool (CDT) User Guide for self-service
+onboarding of VNF’s. VNF owners can create templates and other artifacts
+for APPC Configure command (used to apply a post-instantiation
+configuration) as well as other life cycle commands.
+
+A complete list of all APPC supported commands is contained in the
+APPC LCM API Guide available on onap.readthedocs.io.
+
+Overview of APPC Support for VNF Configuration and Lifecycle Commands
+======================================================================
+
+APPC is an ONAP component that performs functions to manage the
+lifecycle of VNF’s and their component. The picture below summarizes the
+APP-C design intent.
+
+|image0|
+
+Some lifecycle commands are supported on any VNF type, such as commands
+executed using OpenStack or for generic REST calls such as for
+HealthCheck. Other commands require models called templates to be
+created in the APPC Controller Design Tool(CDT) by the VNF owner.
+
+Templates are needed for lifecycle commands such as for
+post-instantiation configuration and for passing payloads to a Chef or
+Ansible server. Templates contain static and instance-specific
+parameters in a structured language (currently limited to xml and JSON).
+The APPC CDT allows a VNF technology owner to identify the
+instance specific parameters with a unique name.
+
+At run time, the instance specific parameter values are populated in the
+template to replace the parameter name.
+
+|image1|
+
+|image2|
+
+|image3|
+
+Overview of the Onboarding Process
+==================================
+
+Pre-Requisites for Onboarding:
+------------------------------
+
+- The VNF must support the below listed device protocols along with OpenStack for VM-level commands:
+ - Netconf,
+ - Chef,
+ - Ansible,
+ - REST - The REST protocol is used for REST interfaces to a VNF. Currently, the only action that can use REST is HealthCheck.
+ - RESTCONF - The RESTCONF protocal is used only for VNFs that support Netconf and are able to be mounted in OpenDayLight (ODL). Use the protocal NETCONF-XML if the VNF is not ODL mountable.
+
+- In order to build the templates needed for lifecycle commands, the
+ VNF owner will be asked to upload either an xml file (for Netconf) or
+ a JSON file (for Chef or Ansible). This file contains the parameter
+ values in a valid schema that would be sent to either the VNF or the
+ Chef/Ansible server to execute the action. For more detail on
+ Netconf, Chef, or Ansible, see the ONAP vendor guidelines at:
+
+ https://wiki.onap.org/pages/viewpage.action?pageId=1015852&preview=/1015849/1017888/VNF%20Management%20Requirements%20for%20OpenECOMP.pdf
+
+- The VNF related key identifiers (vnf-type, vnfc-type,
+ vnfc-function-code) that will be stored in A&AI have been defined.
+
+Onboarding Process Steps:
+-------------------------
+
+1. Use the APPC CDT GUI to populate **reference data**
+ describing the VNF and action to be onboarded.
+
+ - Select the VNF, action, and protocol to be on-boarded.
+
+ - Describe the VM/VNFC components that comprise the VNF’s. APPC
+ will use this VM/VNFC data to update A&AI when configuring the VNF
+ at run time.
+
+2. Create a **template** from a “golden” configuration file.
+
+ - Upload a “golden configuration” file (described later) into the APPC CDT GUI.
+
+ - Manually edit the configuration file to associate parameter names
+ with instance-specific values you wish to parameterize (e.g., IP addresses).
+
+ - This creates a template file, which will be used at run-time to
+ create the payload that APPC sends to the VNF or to Ansible/Chef.
+
+ - Alternative: If the golden configuration changes, rather than
+ manually re-creating an updated template, you can *automatically*
+ create an updated template by **Merging** a current parameter
+ name-value pairs file with the new configuration file. APPC will
+ scan the new configuration file, and automatically replace values
+ with parameter names.
+
+3. Create a **parameter definition** file describing instance-specific
+ parameters in the template.
+
+ - Once you have a template, use the **Synchronize** button to
+ automatically create/update a parameter definition file (and a
+ parameter name-value pair file) based on the template.
+
+ - You can then populate/update the fields describing each parameter.
+
+ - If the parameters will be populated from external systems (such as INSTAR), you can upload
+ a “key file” that automatically populates key fields used to retrieve
+ data from the external system.
+
+ - If the parameters will be populated from A&AI, you can select the
+ rules and key fields used to retrieve data from A&AI.
+
+ - The parameter definition file will be used at run time to
+ automatically obtain parameter values from external system, A&AI, or a user
+ input spreadsheet for insertion into the template.
+
+4. Create a **parameter name-value pair file** for those parameters.
+
+ - Once you have a template, use the **Synchronize** button to
+ automatically create a parameter name-value pair file (and a
+ parameter definition file) based on the template.
+
+ - The parameter name-value file serves as a guide for populating
+ instance-specific data into the user input spreadsheet used at run
+ time. The parameter name-value file can also be used to automatically
+ create a template via the **Merge** function as described in step 2.
+
+5. **Test** the template in your test environment using the **TEST** function of APPC CDT
+
+ - Use the **Save to APP-C** button in the CDT GUI to save the
+ artifacts for your VNF to APPC.
+
+ - Prepare a “user input” excel file on your PC and upload it to the
+ **TEST** function in the APPC CDT.
+
+ - Use the **TEST** function in the APPC CDT to execute the on-boarded action on the VNF. Verify the VNF works as expected.
+
+ **NOTE** The **TEST** function is currently being developed as part of Beijing release and screen shots in this document are not yet updated to show this new function yet.
+
+The screen shots in following sections illustrate how to use the APPC CDT GUI for each step.
+
+Artifacts used for Onboarding:
+------------------------------
+
+For a given VNF, each action must be on-boarded separately. Actions can
+be on-boarded in any order; it is not required that “Configure” be the first action onboarded.
+
+You will create 1 Reference Data file for each VNF, and a set of up to 3
+files for each action you are onboarding:
+
+ 1. Template
+ 2. Parameter definition file (pd\_configure)
+ 3. Parameter name-value pair file (param\_configure)
+
+For example, onboarding the “vABC” VNF for 2 actions (Configure and
+ConfigModify) may result in these 7 files:
+
+ 1. reference\_AllAction\_vABC\_0.0.1V
+ 2. template\_Configure\_vABC\_0.0.1V
+ 3. pd\_Configure\_vABC\_0.0.1V
+ 4. param\_Configure\_vABC\_0.0.1V
+ 5. template\_ConfigModify\_vABC\_0.0.1V
+ 6. pd\_ConfigModify\_vABC\_0.0.1V
+ 7. param\_ConfigModify\_vABC\_0.0.1V
+
+A **Template** is required for the Ansible, Chef and Netconf protocols.
+
+The **Parameter Definition** and **Parameter Name-Value Pair** artifacts
+are typically used with the Configure and ConfigModify templates and are
+optional for templates of other actions.
+
+OpenStack and REST protocols do not use a template or parameter
+definitions or name-value pairs.
+
+Using the APPC Design Tool for VNF Onboarding
+=============================================
+
+Go to the APPC CDT GUI in the test environment using a Firefox browser.
+
+http://<server>:8080/config-design-tool/index.html#/home
+
+|image4|
+
+Clicking on “About Us” will display the current software version and who to contact for support. The contact information is configurable. What is display in diagram is just an example.
+
+|image5|
+
+Choose “My VNF’s”.
+
+If you have not used APPC CDT previously, you will be asked to
+enter your user id. Your work will be stored under this user id. There
+is no password required at this time.
+
+Note: If multiple self-service users will be working on a set of VNF’s,
+it is suggested that you enter a group\_name rather than your user\_id.
+This group name would be used by all users in the group so that all
+users can view/edit the same set of artifacts.
+
+If you have previously used APPC CDT, you user id will
+automatically be selected.
+
+|image6|
+
+The “My VNFs” GUI displays a list of the vnf-type/vnfc-types which are
+stored under your userid in the APPC database. You can choose either
+“Create New VNF” or “View/Edit” for one of your existing VNF’s.
+
+|image7|
+
+If you have not created any VNF artifacts in the current release of the
+APPC CDT, you will see a screen like this; click “Create new
+VNF” to begin.
+
+VNF artifacts created using earlier versions of the APPC CDT
+can be uploaded and then edited/saved, as shown on later screens. You
+should not have to re-create these VNF artifacts.
+
+|image8|
+
+If you choose to create a new VNF, you will see a pop-up box like this.
+
+|image9|
+
+Enter the VNF Type (and optional VNFC Type) and click next.
+
+Alternatively, you can leave the VNF type blank and choose “PROCEED
+ANYWAY” if you want to proceed to the Reference Data screen where you
+can populate the VNF reference data by uploading an existing Reference
+File or by manually entering it.
+
+You must populate the VNF field if uploading the existing file does not
+populate it.
+
+Populate reference data describing the VNF and action to be onboarded
+---------------------------------------------------------------------
+
+|image10|
+
+|image11|
+
+|image12|
+
+|image13|
+
+|image14|
+
+Note 1: When downloading your work to APPC; the system will download
+only the artifacts that have been updated in the current session. You
+may not see all 4 artifacts unless you visit/edit the reference,
+template, parameter and parameter definition screens.
+
+Note 2: When downloading files, the system will display a pop-up window
+for each file, but the windows are all placed on top of each other. You
+can drag the pop-up windows if you want to see them all at the same
+time.
+
+|image15|
+
+Populate OpenStack actions for a VM
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+You can also onboard OpenStack commands for the VM level components of
+the VNF
+
+Under ‘Action’, select “OpenStack Actions” and then under ‘Protocol’
+select “OpenStack”.
+
+You must populate the ‘VNF type’ if it is not already populated.
+
+|image16|
+
+Next, upload an excel file of VM capabilities for your VNF. The excel
+must list OpenStack actions in the first column, and then have a column
+for each VM type (i.e., VNFC Function Code) showing which actions are
+applicable for that VM type, as shown Excel sample below:
+
+|imageA|
+
+APPC will import the data from the excel and display the results.
+
+|image17|
+
+The Template and Parameter Definition tabs do not apply to OpenStack
+commands.
+
+REFERENCE DATA SCREEN HELP
+
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| **Field/Object** | **Description** |
++==========================+==================================================================================================================+
+| **VNF Reference Data** |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Action | The action to be executed on the VNF, e.g., “CONFIGURE” (see table below). |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| VNF Type | The name of the VNF, e.g. vDBE. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| VNFC Type | NA when describing a VNF; When describing a VNFC, enter the VNFC name e.g.,MSC, SSC, MMC, etc. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Device Protocol | Choose desired protocol e.g., NETCONF-XML (see table below). |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Template | Will there be a template created for this VNF and action? Yes/No. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| User Name | Enter the user name used to configure the VNF e.g., “admin” or “root”. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Port Number | Enter the port number used to configure the VNF, e.g., 22. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Context URL | Enter the context portion of the REST URL (Currently used only for the HealthCheck action with REST protocol). |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| **VNFC information** |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| VNFC Type | Enter the VNFC name e.g. MSC, SSC, MMC, etc. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| VNFC Function Code | Enter the standard 3 character value for the VNFC. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| IP Address V4 OAM VIP | Select Y to store the O&AM VIP address with the VNFC record; otherwise select N. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Group Notation Type | Select the naming scheme for VNFC/VM instances (first-vnfc-name, fixed value, relative value) |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Group Notation Value | For first-vnfc-name type, enter text such as “pair” or “group”. |
+| | |
+| | For fixed value type, enter any alpha-numeric text “1”, “test” etc. |
+| | |
+| | For relative value type, enter a number “1”, “2”, “4”, etc |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+| Number of VM’s | Enter the # of VM’s for this VNFC. |
++--------------------------+------------------------------------------------------------------------------------------------------------------+
+
+|
+
+This table shows which actions and protocols are currently available for
+on-boarding with the Beijing release.
+
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Action** | **Netconf/ | **Ansible** | **Chef** | **REST** | **OpenStack |
+| | Restconf** | | | | (VM Level)** |
++========================================+==============+===============+============+============+================+
+| **AttachVolume** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Configure** | YES | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Config Modify** | YES | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Config Backup** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Config Restore** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **ConfigScaleOut** | YES | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **DetachVolume** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Evacuate** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **GetRunning Config\*** | YES | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **HealthCheck** | | YES | YES | YES | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Migrate** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **QuiesceTraffic** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Rebuild** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Restart** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **ResumeTraffic** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Snapshot** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Start** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Start Application** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Stop** | | | | | YES |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **Stop Application** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **UpgradeBackout** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **UpgradeBackup** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **UpgradePostCheck** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **UpgradePreCheck** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+| **UpgradeSoftware** | | YES | YES | | |
++----------------------------------------+--------------+---------------+------------+------------+----------------+
+
+ \* GetRunningConfig is used internally by APP-C and is not callable by clients via the APP-C API.
+
+
+
+Create a template from a “golden” configuration file
+----------------------------------------------------
+
+There are several ways to create a template in APPC CDT:
+
+- Start from golden instance config file; manually add parameters
+ (described in this section)
+
+- Start with a template file, manually add more parameters. (described
+ in section Synchronizing a Template)
+
+- Start with config file; create updated template by **merging**
+ name-value pairs. (described in Create a file containing name-value pairs for parameters section)
+
+Start with a working configuration for a “golden instance” of the VNF
+(xml if Netconf) or the payload to be downloaded to the Chef or Ansible
+server (JSON).
+
+Open the XML or JSON file in Notepad ++ and verify that the format is
+schema compliant. If the xml file is for a post-instantiation
+configuration, then modify the config to include only statements that
+are to be added (merged) with any configuration that is on the VNF
+instance after instantiation. For example, remove statements that might
+change root passwords, etc.
+
+Optionally, add Velocity statements to the file, if desired, to handle
+special constructs such as variable lists, template defined constants,
+conditional statements, etc.
+
+Here are links with more information about the Velocity java-based
+template engine:
+
+ http://velocity.apache.org/engine/2.0/vtl-reference.html
+
+ http://velocity.apache.org/engine/2.0/user-guide.html
+
+This screen shows a sample Golden Configuration file that has been
+uploaded to APP-C CDT.
+
+|image18|
+
+Next, designate instance-specific values as parameters, using this
+procedure:
+
+ 1) Highlight the instance-specific value with the cursor
+
+ |image19|
+
+ 2) Type “CTRL” and “4” to insert a parameter name.
+
+ |image20|
+
+ 3) Type the parameter name in the parentheses
+
+ |image21|
+
+ 4) Type “CTRL” and “S” to save the parameter.
+
+ |image22|
+
+Repeat for each instance-specific value that you wish to turn into a
+parameter.
+
+*Summary of editing commands:*
+
+ - CTRL+4 to add a parameter (also saves previous unsaved parameter)
+ - CTRL+S to save a parameter
+ - CTRL+Z to undo the last edit
+
+Notes on naming Parameters:
+
+- Choose meaningful, unique parameter names for each parameter. If the
+ same parameter value appears in multiple places in the config, the
+ parameter name which is assigned to the first instance will be
+ automatically assigned to all instances. However, you may choose a
+ different parameter name for each instance of the parameter value
+ (except when using the MERGE function).
+
+- Use only dash (-) or underline (\_) as separators between words in
+ the name.
+
+- The name should not contain spaces or any other special characters.
+
+- Do not use parameter names which are sub-strings of other parameter
+ names. For example, don’t use field1 and field12 as parameter names.
+
+
+Synchronizing a Template
+~~~~~~~~~~~~~~~~~~~~~~~~
+
+Once you have named all the parameters (this example shows 2
+parameters), click the “SYNCHRONIZE” button to automatically create a
+parameter definition file and a parameter name-value file. The next
+sections describe these files.
+
+It may take a few seconds for the system to SYNCHRONIZE; when it is
+complete, you will be taken to the Parameter Definition screen.
+
+Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
+screen to preserve your work.
+
+|image23|
+
+Modifying an Existing Template
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+In addition to creating new templates, you can also modify an existing
+template by adding or removing parameter names.
+
+To add a new parameter name, follow the steps in the Create a template from a "golden" configuration file section above.
+SYNCHRONIZE to add the new parameter to the name/value and parameter
+definition GUI.
+
+To remove an existing parameter name, remove the parameter name (i.e.,
+${name}) using the backspace key and replace with the static value. Then
+SYNCHRONIZE to remove the parameter from the name/value and parameter
+definition GUI.
+
+Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
+screen to preserve your work.
+
+Create a parameter definition file describing instance-specific parameters in the template
+------------------------------------------------------------------------------------------
+
+Clicking the “SYNCHRONIZE” button after creating a template will automatically create/update a parameter definition file for
+that template (and a parameter name-value file described in the next
+section). Alternatively, you can upload an existing parameter definition
+file from your PC.
+
+You can view or edit the definition fields for each parameter via the
+Parameter Definition screen. Note that any edits to the parameter names
+would be overwritten by a subsequent SYNCHRONIZE with the template.
+
+|image24|
+
+Select a Source for each parameter
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+There are three choices for the source:
+
+1. External Systems (e.g., INSTAR). APPC will automatically obtain parameter values from
+ an external system (typically IP addresses for VNF’s). First, obtain a
+ “key file” for your VNF. Then use the
+ “Upload Key File” button on the Parameter Definition screen. APPC
+ will automatically populate key names and values used to retrieve data
+ from an external system.
+
+
+2. ***A&AI***. APPC will automatically obtain parameter values from
+ A&AI (typically VNF/VNFC/VM identifiers). After selecting “A&AI”,
+ select a rule type and APPC will automatically populate the key
+ names and values. For rule types that include a list, populate the
+ ‘Filter By Field’ and ‘Filter By Value’.
+
+ |image26|
+
+3. ***Manual.*** APPC will use a manually-created excel to populate
+ parameter values. Later section describes this User Input Spreadsheet.
+
+Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
+screen to preserve your work.
+
+Create a file containing name-value pairs for parameters
+--------------------------------------------------------
+
+Clicking the “SYNCHRONIZE” button after creating a template (see section
+Synchronizing a Template) will automatically create/update a parameter name-value pair file
+for that template (and a parameter definition file described in the
+previous section).
+
+Navigate to the Template tab and “Param Values” subtab to view/edit
+parameter name-value pairs.
+
+If you make any edits, remember to use the SAVE and/or DOWNLOAD buttons
+on the Reference Data screen to preserve your work.
+
+|image27|
+
+Option: Using MERGE to automatically create a template from a parameter name-value pair file
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+The APPC Design Tool also provides a way to create a template from an
+existing parameter name-value pair file. This is useful when the
+configuration of the VNF has changed. Rather than manually recreating
+the template, you can use the MERGE function to automatically add
+parameter names based on a valid name-value pairs file from a previous
+template.
+
+First, navigate to the Template tab and “Param Values” subtab and click
+on UPLOAD PARAM FILE
+
+|image28|
+
+Then navigate to the Template configuration screen. Upload a
+configuration file that contains values you wish to turn into
+parameters.
+
+|image29|
+
+Next, click “MERGE”. APPC will automatically add parameters to the
+configuration file using the name-value pairs. Wherever APPC finds a
+matching value, it will add the corresponding parameter name.
+
+After using the MERGE button to create a template, you can use the
+SYNCHRONIZE button to create/update the parameter definition file and
+name-value files.
+
+Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
+screen to preserve your work.
+
+|image30|
+
+Test the template in a lab using APPC CDT Test Function
+=======================================================================
+
+User Input Spreadsheet
+----------------------
+
+The following steps are used to prepare a user input spreadsheet for the
+VNF instance and action to be tested.
+
+1. Start with this generic 1802 user input excel spreadsheet.
+
+ :download:`Generic 1802 User Input Spreadsheet v.02.xlsx` (compatible with excel 2013)
+
+2. Update the user-input sections of the spreadsheet.
+
+ a) Upload Data tab: choose action, populate VNF-ID
+
+ b) >Action< tab: Select the tab for the action being tested. Choose a
+ protocol and enter required action identifiers & request parameter
+ values. Enter any payload parameter names and values required for
+ this associated template. (copy/paste from a name-value pair file or
+ other source).
+
+ The screen shots on the following pages show the user input sections
+ highlighted in yellow.
+
+1. Save the spreadsheet with a name for your VNF instance and action.
+
+“Upload Data” tab – Select action to be tested and populate any action
+identifiers such as vnf-id.
+
+|image31|
+
+Action tab: This example is for the ConfigModify action, so the
+“ConfigModify” tab is shown. Choose a protocol and enter required action
+identifiers & request parameter values. Enter any payload parameter
+names and values required for this associated template. (You may
+copy/paste from a name-value pair file or other source).
+
+|image32|
+
+Using APPC CDT TEST action to test a VNF configuration template
+-----------------------------------------------------------------
+
+The APPC CDT **TEST** action is used to initiate configuration
+and other lifecycle commands.
+
+ ** DETAIL COMING SOON **
+
+Note on populating southbound properties:
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+
+When a new vnf-type is created or a new action is added to an existing
+vnf-type using the CDT tool and the Reference Data artifact is loaded to
+APPC, an update is made to the APPC run-time southbound properties
+file for the vnf-type. The southbound properties are needed for
+connecting to a VNF instance or Ansible server. The southbound
+properties contain the following information:
+
+``{vnf\_type}.{protocol}.{action}.user = {value}``
+
+``{vnf\_type}.{protocol}.{action}.port = {value}``
+
+``{vnf\_type}.{protocol}.{action}.password = {value}``
+
+``{vnf\_type}.{protocol}.{action}.url = {value}``
+
+The user, port, and url values are contained in the Reference Data
+artifact, if populated by the self-service user. The password value is
+updated by T2 production support using a GUI tool provided. <TO DO: CHECK ON THIS>
+
+The current process which creates the southbound properties from the
+Reference Data only updates the southbound properties file only a single
+node in the APPC cluster.
+
+
+APP-C Design Tool - File Descriptions
+=====================================
+
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+| **File Description** | **File Format** | **File name / example** |
++======================================================================================================================================+===================+======================================================+
+| | | |
+| **Pre-template Config file** –contains a ‘golden’ or working configuration (for Netconf) or JSON data block (for Chef or Ansible). | XML, JSON | :download:`simple xml config.txt` |
+| | | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+| | | |
+| **Reference file** [5]_– describes a VNF in terms of its subtending VM’s and VNFC’s and the actions/protocols being onboarded. | XML, JSON | :download:`reference_AllAction_vPQR_0.0.1V.json` |
+| | | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+| | | |
+| **Template file** – a configuration file with parameters for instance-specific fields. | XML | :download:`template_Configure_vABC_0.0.1.txt` |
+| | | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+| | | |
+| **Parameter Definition file** (aka pd\_Configure) contains **parameter definitions** associated with a template. | YAML | :download:`pd_Configure_vABC_0.0.1V.yaml.txt` |
+| | | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+| | | |
+| **Name-Value file** (aka param\_Configure) contains name-value pairs for parameters associated with a template. | JSON | :download:`param_Configure_vABC_0.0.1V.txt` |
+| | | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+| | | |
+| **Key data file** – contains external system data to populate a PD configure file. | TXT | <TO DO: Need sample file> |
+| | | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
+
+Note: Do not alter file names because APPC CDT requires a specific file naming format. Note that for yaml files, Sphinx is not able to handle correctly, so we had to add .txt to allow the download. Please remember to remove .txt from pd_Configure_vABC_0.0.1V.yaml.txt when you download it.
+
+.. |image0| image:: media/image0.png
+ :width: 7.88889in
+ :height: 4.43750in
+.. |image1| image:: media/image1.png
+ :width: 8.72292in
+ :height: 4.51788in
+.. |image2| image:: media/image2.png
+ :width: 8.75000in
+ :height: 4.58908in
+.. |image3| image:: media/image3.png
+ :width: 8.70833in
+ :height: 4.89844in
+.. |image4| image:: media/image4.png
+ :width: 7.46875in
+ :height: 4.19310in
+.. |image5| image:: media/image5.png
+ :width: 7.23958in
+ :height: 3.87172in
+.. |image6| image:: media/image6.png
+ :width: 7.58491in
+ :height: 4.26651in
+.. |image7| image:: media/image7.png
+ :width: 9.43750in
+ :height: 5.30859in
+.. |image8| image:: media/image8.png
+ :width: 7.86980in
+ :height: 4.72917in
+.. |image9| image:: media/image9.png
+ :width: 7.56250in
+ :height: 4.54450in
+.. |image10| image:: media/image10.png
+ :width: 9.01042in
+ :height: 5.06836in
+.. |image11| image:: media/image11.png
+ :width: 9.44792in
+ :height: 5.31445in
+.. |image12| image:: media/image12.png
+ :width: 9.48958in
+ :height: 5.33789in
+.. |image13| image:: media/image13.png
+ :width: 9.48125in
+ :height: 5.33320in
+.. |image14| image:: media/image14.png
+ :width: 9.25926in
+ :height: 5.20833in
+.. |image15| image:: media/image15.png
+ :width: 9.05556in
+ :height: 5.09375in
+.. |image16| image:: media/image16.png
+ :width: 5.79167in
+ :height: 3.74135in
+.. |imageA| image:: media/imageA.png
+ :width: 5.79167in
+ :height: 3.74135in
+.. |image17| image:: media/image17.png
+ :width: 6.13542in
+ :height: 4.97745in
+.. |image18| image:: media/image18.png
+ :width: 9.00000in
+ :height: 5.27639in
+.. |image19| image:: media/image19.png
+ :width: 5.43423in
+ :height: 1.83333in
+.. |image20| image:: media/image20.png
+ :width: 5.44473in
+ :height: 1.93750in
+.. |image21| image:: media/image21.png
+ :width: 5.32292in
+ :height: 1.92771in
+.. |image22| image:: media/image22.png
+ :width: 5.31153in
+ :height: 1.83333in
+.. |image23| image:: media/image23.png
+ :width: 7.54167in
+ :height: 4.24219in
+.. |image24| image:: media/image24.png
+ :width: 7.48148in
+ :height: 4.20833in
+.. |image26| image:: media/image26.png
+ :width: 6.87789in
+ :height: 3.78125in
+.. |image27| image:: media/image27.png
+ :width: 7.97170in
+ :height: 4.48408in
+.. |image28| image:: media/image28.png
+ :width: 8.56604in
+ :height: 4.81840in
+.. |image29| image:: media/image29.png
+ :width: 9.00943in
+ :height: 5.06781in
+.. |image30| image:: media/image30.png
+ :width: 8.07407in
+ :height: 4.54167in
+.. |image31| image:: media/image31.png
+ :width: 9.00000in
+ :height: 5.18958in
+.. |image32| image:: media/image32.png
+ :width: 9.00000in
+ :height: 5.18958in
+
diff --git a/docs/APPC CDT Guide/Generic 1802 User Input Spreadsheet v.02.xlsx b/docs/APPC CDT Guide/Generic 1802 User Input Spreadsheet v.02.xlsx Binary files differnew file mode 100644 index 000000000..716b69674 --- /dev/null +++ b/docs/APPC CDT Guide/Generic 1802 User Input Spreadsheet v.02.xlsx diff --git a/docs/APPC CDT Guide/media/image0.png b/docs/APPC CDT Guide/media/image0.png Binary files differnew file mode 100755 index 000000000..d531f5654 --- /dev/null +++ b/docs/APPC CDT Guide/media/image0.png diff --git a/docs/APPC CDT Guide/media/image1.png b/docs/APPC CDT Guide/media/image1.png Binary files differnew file mode 100755 index 000000000..25ebdea52 --- /dev/null +++ b/docs/APPC CDT Guide/media/image1.png diff --git a/docs/APPC CDT Guide/media/image10.png b/docs/APPC CDT Guide/media/image10.png Binary files differnew file mode 100755 index 000000000..a5f8e52f2 --- /dev/null +++ b/docs/APPC CDT Guide/media/image10.png diff --git a/docs/APPC CDT Guide/media/image11.png b/docs/APPC CDT Guide/media/image11.png Binary files differnew file mode 100755 index 000000000..3751dde04 --- /dev/null +++ b/docs/APPC CDT Guide/media/image11.png diff --git a/docs/APPC CDT Guide/media/image12.png b/docs/APPC CDT Guide/media/image12.png Binary files differnew file mode 100755 index 000000000..e9924af8f --- /dev/null +++ b/docs/APPC CDT Guide/media/image12.png diff --git a/docs/APPC CDT Guide/media/image13.png b/docs/APPC CDT Guide/media/image13.png Binary files differnew file mode 100755 index 000000000..6b89ee8f5 --- /dev/null +++ b/docs/APPC CDT Guide/media/image13.png diff --git a/docs/APPC CDT Guide/media/image14.png b/docs/APPC CDT Guide/media/image14.png Binary files differnew file mode 100755 index 000000000..9c274878e --- /dev/null +++ b/docs/APPC CDT Guide/media/image14.png diff --git a/docs/APPC CDT Guide/media/image15.png b/docs/APPC CDT Guide/media/image15.png Binary files differnew file mode 100755 index 000000000..68d2c7d93 --- /dev/null +++ b/docs/APPC CDT Guide/media/image15.png diff --git a/docs/APPC CDT Guide/media/image16.png b/docs/APPC CDT Guide/media/image16.png Binary files differnew file mode 100755 index 000000000..509fbcd63 --- /dev/null +++ b/docs/APPC CDT Guide/media/image16.png diff --git a/docs/APPC CDT Guide/media/image17.png b/docs/APPC CDT Guide/media/image17.png Binary files differnew file mode 100755 index 000000000..fe20023b8 --- /dev/null +++ b/docs/APPC CDT Guide/media/image17.png diff --git a/docs/APPC CDT Guide/media/image18.png b/docs/APPC CDT Guide/media/image18.png Binary files differnew file mode 100755 index 000000000..2000f4a45 --- /dev/null +++ b/docs/APPC CDT Guide/media/image18.png diff --git a/docs/APPC CDT Guide/media/image19.png b/docs/APPC CDT Guide/media/image19.png Binary files differnew file mode 100755 index 000000000..83148b5fe --- /dev/null +++ b/docs/APPC CDT Guide/media/image19.png diff --git a/docs/APPC CDT Guide/media/image2.png b/docs/APPC CDT Guide/media/image2.png Binary files differnew file mode 100755 index 000000000..1f3a98459 --- /dev/null +++ b/docs/APPC CDT Guide/media/image2.png diff --git a/docs/APPC CDT Guide/media/image20.png b/docs/APPC CDT Guide/media/image20.png Binary files differnew file mode 100755 index 000000000..54361ade6 --- /dev/null +++ b/docs/APPC CDT Guide/media/image20.png diff --git a/docs/APPC CDT Guide/media/image21.png b/docs/APPC CDT Guide/media/image21.png Binary files differnew file mode 100755 index 000000000..b37161731 --- /dev/null +++ b/docs/APPC CDT Guide/media/image21.png diff --git a/docs/APPC CDT Guide/media/image22.png b/docs/APPC CDT Guide/media/image22.png Binary files differnew file mode 100755 index 000000000..8f12f2917 --- /dev/null +++ b/docs/APPC CDT Guide/media/image22.png diff --git a/docs/APPC CDT Guide/media/image23.png b/docs/APPC CDT Guide/media/image23.png Binary files differnew file mode 100755 index 000000000..995dc86a6 --- /dev/null +++ b/docs/APPC CDT Guide/media/image23.png diff --git a/docs/APPC CDT Guide/media/image24.png b/docs/APPC CDT Guide/media/image24.png Binary files differnew file mode 100755 index 000000000..9d92e1011 --- /dev/null +++ b/docs/APPC CDT Guide/media/image24.png diff --git a/docs/APPC CDT Guide/media/image26.png b/docs/APPC CDT Guide/media/image26.png Binary files differnew file mode 100755 index 000000000..36d262d77 --- /dev/null +++ b/docs/APPC CDT Guide/media/image26.png diff --git a/docs/APPC CDT Guide/media/image27.png b/docs/APPC CDT Guide/media/image27.png Binary files differnew file mode 100755 index 000000000..fdd37a14f --- /dev/null +++ b/docs/APPC CDT Guide/media/image27.png diff --git a/docs/APPC CDT Guide/media/image28.png b/docs/APPC CDT Guide/media/image28.png Binary files differnew file mode 100755 index 000000000..a96e378f2 --- /dev/null +++ b/docs/APPC CDT Guide/media/image28.png diff --git a/docs/APPC CDT Guide/media/image29.png b/docs/APPC CDT Guide/media/image29.png Binary files differnew file mode 100755 index 000000000..ce504f924 --- /dev/null +++ b/docs/APPC CDT Guide/media/image29.png diff --git a/docs/APPC CDT Guide/media/image3.png b/docs/APPC CDT Guide/media/image3.png Binary files differnew file mode 100755 index 000000000..a9bd36ac2 --- /dev/null +++ b/docs/APPC CDT Guide/media/image3.png diff --git a/docs/APPC CDT Guide/media/image30.png b/docs/APPC CDT Guide/media/image30.png Binary files differnew file mode 100755 index 000000000..ed8f96c31 --- /dev/null +++ b/docs/APPC CDT Guide/media/image30.png diff --git a/docs/APPC CDT Guide/media/image31.png b/docs/APPC CDT Guide/media/image31.png Binary files differnew file mode 100755 index 000000000..a65054afb --- /dev/null +++ b/docs/APPC CDT Guide/media/image31.png diff --git a/docs/APPC CDT Guide/media/image32.png b/docs/APPC CDT Guide/media/image32.png Binary files differnew file mode 100755 index 000000000..0e59c3f96 --- /dev/null +++ b/docs/APPC CDT Guide/media/image32.png diff --git a/docs/APPC CDT Guide/media/image4.png b/docs/APPC CDT Guide/media/image4.png Binary files differnew file mode 100755 index 000000000..c2395206b --- /dev/null +++ b/docs/APPC CDT Guide/media/image4.png diff --git a/docs/APPC CDT Guide/media/image5.png b/docs/APPC CDT Guide/media/image5.png Binary files differnew file mode 100755 index 000000000..9070fce4d --- /dev/null +++ b/docs/APPC CDT Guide/media/image5.png diff --git a/docs/APPC CDT Guide/media/image6.png b/docs/APPC CDT Guide/media/image6.png Binary files differnew file mode 100755 index 000000000..6e694d0cf --- /dev/null +++ b/docs/APPC CDT Guide/media/image6.png diff --git a/docs/APPC CDT Guide/media/image7.png b/docs/APPC CDT Guide/media/image7.png Binary files differnew file mode 100755 index 000000000..1cb9f5db2 --- /dev/null +++ b/docs/APPC CDT Guide/media/image7.png diff --git a/docs/APPC CDT Guide/media/image8.png b/docs/APPC CDT Guide/media/image8.png Binary files differnew file mode 100755 index 000000000..ca30eb015 --- /dev/null +++ b/docs/APPC CDT Guide/media/image8.png diff --git a/docs/APPC CDT Guide/media/image9.png b/docs/APPC CDT Guide/media/image9.png Binary files differnew file mode 100755 index 000000000..e092c8e39 --- /dev/null +++ b/docs/APPC CDT Guide/media/image9.png diff --git a/docs/APPC CDT Guide/media/imageA.png b/docs/APPC CDT Guide/media/imageA.png Binary files differnew file mode 100755 index 000000000..00abe0594 --- /dev/null +++ b/docs/APPC CDT Guide/media/imageA.png diff --git a/docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt b/docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt new file mode 100644 index 000000000..67270b6fb --- /dev/null +++ b/docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt @@ -0,0 +1,4 @@ +{
+ "BUrouterIP": "135.69.228.1",
+ "DestinationSubnet": "0.0.0.0/0"
+}
\ No newline at end of file diff --git a/docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt b/docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt new file mode 100644 index 000000000..eacceb46f --- /dev/null +++ b/docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt @@ -0,0 +1,31 @@ +---
+kind: "Property Definition"
+version: V1
+vnf-parameter-list:
+- name: nodename
+ type: null
+ description: null
+ required: null
+ default: null
+ source: Manual
+ rule-type: null
+ request-keys: null
+ response-keys: null
+- name: BUrouterIP
+ type: null
+ description: null
+ required: null
+ default: null
+ source: Manual
+ rule-type: null
+ request-keys: null
+ response-keys: null
+- name: DestinationSubnet
+ type: null
+ description: null
+ required: null
+ default: null
+ source: Manual
+ rule-type: null
+ request-keys: null
+ response-keys: null
diff --git a/docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json b/docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json new file mode 100644 index 000000000..e3273d916 --- /dev/null +++ b/docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json @@ -0,0 +1,96 @@ +{
+ "reference_data": [
+ {
+ "action": "Configure",
+ "action-level": "vnf",
+ "scope": {
+ "vnf-type": "vPQR",
+ "vnfc-type": ""
+ },
+ "template": "Y",
+ "vm": [
+ {
+ "vm-instance": 1,
+ "vnfc": [
+ {
+ "vnfc-instance": "1",
+ "vnfc-function-code": "ppp",
+ "ipaddress-v4-oam-vip": "Y",
+ "group-notation-type": "first-vnfc-name",
+ "group-notation-value": "pair",
+ "vnfc-type": "vPPP"
+ }
+ ]
+ },
+ {
+ "vm-instance": 2,
+ "vnfc": [
+ {
+ "vnfc-instance": "1",
+ "vnfc-function-code": "ppp",
+ "ipaddress-v4-oam-vip": "Y",
+ "group-notation-type": "first-vnfc-name",
+ "group-notation-value": "pair",
+ "vnfc-type": "vPPP"
+ }
+ ]
+ },
+ {
+ "vm-instance": 3,
+ "vnfc": [
+ {
+ "vnfc-instance": "1",
+ "vnfc-function-code": "rrr",
+ "ipaddress-v4-oam-vip": "Y",
+ "group-notation-type": "first-vnfc-name",
+ "group-notation-value": "pair",
+ "vnfc-type": "vRRR"
+ }
+ ]
+ },
+ {
+ "vm-instance": 4,
+ "vnfc": [
+ {
+ "vnfc-instance": "1",
+ "vnfc-function-code": "rrr",
+ "ipaddress-v4-oam-vip": "Y",
+ "group-notation-type": "first-vnfc-name",
+ "group-notation-value": "pair",
+ "vnfc-type": "vRRR"
+ }
+ ]
+ }
+ ],
+ "protocol": "NETCONF-XML",
+ "user-name": "admin",
+ "port-number": "22",
+ "artifact-list": [
+ {
+ "artifact-name": "template_Configure_vPQR_0.0.1V.xml",
+ "artifact-type": "config_template"
+ },
+ {
+ "artifact-name": "pd_Configure_vPQR_0.0.1V.yaml",
+ "artifact-type": "parameter_definitions"
+ }
+ ],
+ "scopeType": "vnf-type",
+ "device-protocol": "NETCONF-XML"
+ },
+ {
+ "action": "AllAction",
+ "action-level": "vnf",
+ "scope": {
+ "vnf-type": "vPQR",
+ "vnfc-type": ""
+ },
+ "artifact-list": [
+ {
+ "artifact-name": "reference_AllAction_vPQR_0.0.1V.json",
+ "artifact-type": "reference_template"
+ }
+ ]
+ }
+ ]
+}
\ No newline at end of file diff --git a/docs/APPC CDT Guide/simple xml config.txt b/docs/APPC CDT Guide/simple xml config.txt new file mode 100644 index 000000000..c402a2290 --- /dev/null +++ b/docs/APPC CDT Guide/simple xml config.txt @@ -0,0 +1,1535 @@ +<rpc-reply xmlns:junos="http://xml.juniper.net/junos/15.1X49/junos">
+ <configuration junos:changed-seconds="1478714723" junos:changed-localtime="2016-11-09 18:05:23 UTC">
+ <version>15.1X49-D50.3</version>
+ <groups>
+ <name>node0</name>
+ <system>
+ <host-name>dbqx0001vm001</host-name>
+ <backup-router>
+ <address>135.69.228.1</address>
+ <destination>0.0.0.0/0</destination>
+ </backup-router>
+ <services>
+ <ssh>
+ <max-sessions-per-connection>32</max-sessions-per-connection>
+ </ssh>
+ </services>
+ <syslog>
+ <file>
+ <name>default-log-messages</name>
+ <contents>
+ <name>any</name>
+ <info/>
+ </contents>
+ <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
+ <structured-data>
+ </structured-data>
+ </file>
+ </syslog>
+ </system>
+ <interfaces>
+ <interface>
+ <name>fxp0</name>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <address>
+ <name>135.69.228.8/25</name>
+ </address>
+ </inet>
+ </family>
+ </unit>
+ </interface>
+ </interfaces>
+ </groups>
+ <groups>
+ <name>node1</name>
+ <system>
+ <host-name>dbqx0001vm002</host-name>
+ <backup-router>
+ <address>135.69.228.1</address>
+ <destination>0.0.0.0/0</destination>
+ </backup-router>
+ <services>
+ <ssh>
+ <max-sessions-per-connection>32</max-sessions-per-connection>
+ </ssh>
+ </services>
+ <syslog>
+ <file>
+ <name>default-log-messages</name>
+ <contents>
+ <name>any</name>
+ <info/>
+ </contents>
+ <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
+ <structured-data>
+ </structured-data>
+ </file>
+ </syslog>
+ </system>
+ <interfaces>
+ <interface>
+ <name>fxp0</name>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <address>
+ <name>135.69.228.9/25</name>
+ </address>
+ </inet>
+ </family>
+ </unit>
+ </interface>
+ </interfaces>
+ </groups>
+ <apply-groups>groupname</apply-groups>
+ <system>
+ <root-authentication>
+ <encrypted-password>$5$rKyWGmrv$sMeym/XUklUeJX2hKpcp5TzCG5R8jcmJ2901HcNGSeB</encrypted-password>
+ </root-authentication>
+ <name-server>
+ <name>135.188.34.84</name>
+ </name-server>
+ <login>
+ <message>\n\t\tWARNING NOTICE\n\tThis system is restricted solely to AT&T authorized users for\n\tlegitimate business purposes only.The actual or attempted\n\tunauthorized access, use, or modification of this system is\n\tstrictly prohibited by AT&T. Unauthorized users are subject to\n\tCompany disciplinary proceedings and/or criminal and civil\n\tpenalties under state, federal, or other applicable domestic and\n\tforeign laws. The use of this system may be monitored and\n\trecorded for administrative and security reasons. Anyone\n\taccessing this system expressly consents to such monitoring and\n\t is advised that if monitoring reveals possible evidence of\n\tcriminal activity, AT&T may provide the evidence of such\n\tactivity to law enforcement officials. All users must comply\n\twith AT&T company policies regarding the protection of AT&T\n\tinformation assets.\n\n</message>
+ </login>
+ <services>
+ <ssh>
+ <protocol-version>v2</protocol-version>
+ </ssh>
+ <netconf>
+ <ssh>
+ </ssh>
+ </netconf>
+ </services>
+ <syslog>
+ <user>
+ <name>*</name>
+ <contents>
+ <name>any</name>
+ <emergency/>
+ </contents>
+ </user>
+ <host>
+ <name>135.144.0.62</name>
+ <contents>
+ <name>any</name>
+ <any/>
+ </contents>
+ <structured-data>
+ </structured-data>
+ </host>
+ <file>
+ <name>messages</name>
+ <contents>
+ <name>any</name>
+ <any/>
+ </contents>
+ <contents>
+ <name>authorization</name>
+ <info/>
+ </contents>
+ </file>
+ <file>
+ <name>interactive-commands</name>
+ <contents>
+ <name>interactive-commands</name>
+ <any/>
+ </contents>
+ </file>
+ <file>
+ <name>session_log</name>
+ <contents>
+ <name>any</name>
+ <info/>
+ </contents>
+ <structured-data>
+ </structured-data>
+ </file>
+ <file>
+ <name>policy_session</name>
+ <match>RT_FLOW</match>
+ </file>
+ </syslog>
+ <license>
+ <autoupdate>
+ <url>
+ <name>https://ae1.juniper.net/junos/key_retrieval</name>
+ </url>
+ </autoupdate>
+ </license>
+ <ntp>
+ <server>
+ <name>192.20.201.162</name>
+ </server>
+ </ntp>
+ </system>
+ <chassis>
+ <cluster>
+ <control-link-recovery/>
+ <reth-count>2</reth-count>
+ <heartbeat-interval>1000</heartbeat-interval>
+ <heartbeat-threshold>3</heartbeat-threshold>
+ <redundancy-group>
+ <name>0</name>
+ <node>
+ <name>0</name>
+ <priority>100</priority>
+ </node>
+ <node>
+ <name>1</name>
+ <priority>1</priority>
+ </node>
+ </redundancy-group>
+ <redundancy-group>
+ <name>1</name>
+ <node>
+ <name>0</name>
+ <priority>100</priority>
+ </node>
+ <node>
+ <name>1</name>
+ <priority>1</priority>
+ </node>
+ <interface-monitor>
+ <name>ge-0/0/1</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <interface-monitor>
+ <name>ge-7/0/1</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <interface-monitor>
+ <name>ge-0/0/2</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <interface-monitor>
+ <name>ge-7/0/2</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <ip-monitoring>
+ <global-weight>255</global-weight>
+ <retry-interval>1</retry-interval>
+ <retry-count>5</retry-count>
+ <family>
+ <inet>
+ <address>
+ <name>10.68.16.1</name>
+ <weight>255</weight>
+ <interface>
+ <logical-interface-name>reth1.0</logical-interface-name>
+ <secondary-ip-address>10.68.16.17</secondary-ip-address>
+ </interface>
+ </address>
+ <address>
+ <name>12.102.197.129</name>
+ <weight>255</weight>
+ <interface>
+ <logical-interface-name>reth0.0</logical-interface-name>
+ <secondary-ip-address>12.102.197.135</secondary-ip-address>
+ </interface>
+ </address>
+ </inet>
+ </family>
+ </ip-monitoring>
+ </redundancy-group>
+ </cluster>
+ </chassis>
+ <services>
+ <application-identification>
+ </application-identification>
+ </services>
+ <security>
+ <idp>
+ <idp-policy>
+ <name>Space-IPS-Policy</name>
+ <rulebase-ips>
+ <rule>
+ <name>DBE-Q-IPS-policy-template-1</name>
+ <match>
+ <from-zone>any</from-zone>
+ <to-zone>any</to-zone>
+ <application>default</application>
+ <attacks>
+ <predefined-attacks>APP:ADOBE-COLDFUSION-WEBSOCKET</predefined-attacks>
+ <predefined-attacks>APP:ADOBE-FLASH-RTMP-RCE</predefined-attacks>
+ <predefined-attacks>APP:AMANDA:AMANDA-ROOT-OF2</predefined-attacks>
+ <predefined-attacks>APP:APPLE-MACOSX-ODP-RCE</predefined-attacks>
+ <predefined-attacks>APP:ASUS-WRT-INFOSVR-COMND-EXEC</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:BCK-MESSAGE</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:METHD-EXPOSURE</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:RPC-MEMRCORRUPT</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:SQLOF-1</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:TAPE-ENGNE-DOS</predefined-attacks>
+ <predefined-attacks>APP:CA:DBA-SVR-POINT</predefined-attacks>
+ <predefined-attacks>APP:CA:RPC-MSG-BO</predefined-attacks>
+ <predefined-attacks>APP:CISCO:ASA-IKE-BO</predefined-attacks>
+ <predefined-attacks>APP:CISCO:CISCO-EPNM-DESERIAL-1</predefined-attacks>
+ <predefined-attacks>APP:CISCO:VIDEO-SURVEILANCE-XSS</predefined-attacks>
+ <predefined-attacks>APP:CITRIX:PROVISIONING-OPCODE</predefined-attacks>
+ <predefined-attacks>APP:CITRIX:STREAMPROCESS-BOF</predefined-attacks>
+ <predefined-attacks>APP:DIGIUM-ASTERISK-OF</predefined-attacks>
+ <predefined-attacks>APP:EMC-ALPHASTOR-BOF</predefined-attacks>
+ <predefined-attacks>APP:EMC-ALPHASTORE-CMDEXEC</predefined-attacks>
+ <predefined-attacks>APP:EMC-APLHASTORE-FMTSTR</predefined-attacks>
+ <predefined-attacks>APP:EMC-NETWORKER-NSRD-BO</predefined-attacks>
+ <predefined-attacks>APP:EMC-NETWORKER-NSRINDEXD-OF</predefined-attacks>
+ <predefined-attacks>APP:EMC-NSRINDEXD-BO</predefined-attacks>
+ <predefined-attacks>APP:EMC-REPLICATION-MGR-CMD-EXE</predefined-attacks>
+ <predefined-attacks>APP:ESIGNAL:OVERFLOW-EXPLOIT</predefined-attacks>
+ <predefined-attacks>APP:FLEXERA-FLEXNET-BO</predefined-attacks>
+ <predefined-attacks>APP:FREEBSD-BSPATCH-RCE</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PROTECTOR-OP-DOS</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-EXEC-BAR-CE</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP-27</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP211-264</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP215-263</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP227-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP234-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP235-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP259-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP260-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP28-11</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODE</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODES</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-RDS-DOS</predefined-attacks>
+ <predefined-attacks>APP:HP-LEFTHAND-HYDRA-DIAG-OF</predefined-attacks>
+ <predefined-attacks>APP:HP-LEFTHAND-HYDRA-PING-OF</predefined-attacks>
+ <predefined-attacks>APP:HP-LOADRUNNER-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-LOADRUNNER-RCE</predefined-attacks>
+ <predefined-attacks>APP:HP-LOADRUNNER-SSL</predefined-attacks>
+ <predefined-attacks>APP:HP-LOGIN-BOF</predefined-attacks>
+ <predefined-attacks>APP:HP-MGMT-UAM-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-NNM-HLEN-BOF</predefined-attacks>
+ <predefined-attacks>APP:HP-OPENVIEW-DTPRTCTR-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-OPNVIEWSTORAGE-BOF</predefined-attacks>
+ <predefined-attacks>APP:HP-OPNVW-STORAGE-DATA-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-PROCURVE-BYPASS</predefined-attacks>
+ <predefined-attacks>APP:HP-PROTECTOR-DIR-TRAV</predefined-attacks>
+ <predefined-attacks>APP:HP-SAN-IQ-CMD-INJ</predefined-attacks>
+ <predefined-attacks>APP:HP-STORAGEWORKS-OPC22-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-SYS-IPRANGE-OF</predefined-attacks>
+ <predefined-attacks>APP:HP-SYS-RCE</predefined-attacks>
+ <predefined-attacks>APP:HP-VIRTUAL-SAN</predefined-attacks>
+ <predefined-attacks>APP:HPE-NA-RMI-DESER</predefined-attacks>
+ <predefined-attacks>APP:HPIM-SOM-EUACCNT-BYPASS</predefined-attacks>
+ <predefined-attacks>APP:HPLOADRUNNER-XDR-BO</predefined-attacks>
+ <predefined-attacks>APP:HPOV:CMD-INJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:DOMINO-BYPASS</predefined-attacks>
+ <predefined-attacks>APP:IBM:DOMINO-BYPASS-1</predefined-attacks>
+ <predefined-attacks>APP:IBM:FORMVIEWER-XFDL-BOF</predefined-attacks>
+ <predefined-attacks>APP:IBM:FXCLI-EXECBO</predefined-attacks>
+ <predefined-attacks>APP:IBM:LDAP-MODIFYREQUEST-BO</predefined-attacks>
+ <predefined-attacks>APP:IBM:OPCODE-1330-CMD-INJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIV-OP1329-BOF</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIV-OP1331-CMDINJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIV-OP1339-CMDINJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-FASTBACK-OP-BO</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-OP4115-BO</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1301</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1335</predefined-attacks>
+ <predefined-attacks>APP:IBM:TSM-CVE-2015-0119-BO</predefined-attacks>
+ <predefined-attacks>APP:IPMI-CIPHER-ZERO</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA1</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA2</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:CHKSUM-PRIV-ESC</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-TCP</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-UDP</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:KRB5-DOS</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:MULTI-REALM-DOS</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:SPNEGO-5-DOS</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:WIN-KERB-FALLBACK</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:XREALM-KDC-DOS</predefined-attacks>
+ <predefined-attacks>APP:MCAFEE-AM-INPUT-SSL</predefined-attacks>
+ <predefined-attacks>APP:MISC:ACTMQ-SHUTDN-CMD</predefined-attacks>
+ <predefined-attacks>APP:MISC:ADOBE-RTMP-UAF</predefined-attacks>
+ <predefined-attacks>APP:MISC:ALIENVALT-BAKUP-COM-RE</predefined-attacks>
+ <predefined-attacks>APP:MISC:APACHE-QPID-SEQSET-DOS</predefined-attacks>
+ <predefined-attacks>APP:MISC:APACHE-SVN-IO</predefined-attacks>
+ <predefined-attacks>APP:MISC:ARCSERVE-BKUP</predefined-attacks>
+ <predefined-attacks>APP:MISC:BIGANT-DDNF-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:CLEARSCADA-OPF-PARSE</predefined-attacks>
+ <predefined-attacks>APP:MISC:CVE-2014-0549-RTMP-MC</predefined-attacks>
+ <predefined-attacks>APP:MISC:DIASOFT-EXECCMD-CE</predefined-attacks>
+ <predefined-attacks>APP:MISC:ENTERASYS-NETSIGHT-BOF</predefined-attacks>
+ <predefined-attacks>APP:MISC:EZHOMETECH-EZSERVER-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:FREEBSD-MBUF-DOS</predefined-attacks>
+ <predefined-attacks>APP:MISC:GITORIOUS-RCE</predefined-attacks>
+ <predefined-attacks>APP:MISC:HP-INODE-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:HP-OA-HEALTH-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:NAGIOS-NRPE-CE</predefined-attacks>
+ <predefined-attacks>APP:MISC:OBJ-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:OBJ-OBJDB-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:SAM-ACTQ-MULTI</predefined-attacks>
+ <predefined-attacks>APP:MISC:SCHNEIDER-INDUSOFT-RCE</predefined-attacks>
+ <predefined-attacks>APP:MISC:SERCOMM-DEVICE-RCE</predefined-attacks>
+ <predefined-attacks>APP:MISC:SPREE-SEARCH-CMD-EXE</predefined-attacks>
+ <predefined-attacks>APP:MISC:WSHARK-ENTTEC-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:XEROX-MFP-COMND-EXEC</predefined-attacks>
+ <predefined-attacks>APP:MISC:ZABBIC-NODE-PROCESS-CE</predefined-attacks>
+ <predefined-attacks>APP:MISC:ZEND-SERVER-CE</predefined-attacks>
+ <predefined-attacks>APP:MIT-KERBEROS-5-POLICY-DOS</predefined-attacks>
+ <predefined-attacks>APP:MS-SNABASE-EXE-DOS</predefined-attacks>
+ <predefined-attacks>APP:MSDOTNET-CVE-2014-1806</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:MESSENGER-BOF</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:MESSENGER-LOGIN</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:ZENWORKS-DIR-TRAV</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:ZENWORKS-MGT-UPLOAD</predefined-attacks>
+ <predefined-attacks>APP:OPENVIEW-STORAGE-BO</predefined-attacks>
+ <predefined-attacks>APP:ORACLE:WEBLOGIC-FILE-UPLOAD</predefined-attacks>
+ <predefined-attacks>APP:ORACLE:WEBLOGIC-SRV-RCE</predefined-attacks>
+ <predefined-attacks>APP:PERSISTENT-COMMAND-EXEC</predefined-attacks>
+ <predefined-attacks>APP:PROXY:SQUID-SSLBUMP-CERT</predefined-attacks>
+ <predefined-attacks>APP:QEMU-VNC-SETPIXEL-PTR-DEREF</predefined-attacks>
+ <predefined-attacks>APP:QUEST-BIG-BRO-FD</predefined-attacks>
+ <predefined-attacks>APP:RDP-BRUTE-FORCE</predefined-attacks>
+ <predefined-attacks>APP:REAL:REAL-MPG-WIDTH</predefined-attacks>
+ <predefined-attacks>APP:REDIS-GETNUM-IO</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:CVE-2015-2373-RCE</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:NETTRANSPORT-DM</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:RDP-HEAP-BO</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:RDP-MEM-OBJ</predefined-attacks>
+ <predefined-attacks>APP:SAFENET-VPN-OF</predefined-attacks>
+ <predefined-attacks>APP:SAP:3DM-FILE-BOF</predefined-attacks>
+ <predefined-attacks>APP:SAP:3DVIS-FLIC-BO</predefined-attacks>
+ <predefined-attacks>APP:SAP:INT-GRAPHICS-PARAMS-XSS</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-BO</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-DIAGI-DOS</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-DOS</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-SOAP-RCE</predefined-attacks>
+ <predefined-attacks>APP:SNORT:BACKORIFICE-DOS</predefined-attacks>
+ <predefined-attacks>APP:SQUID-BUMP-DOS</predefined-attacks>
+ <predefined-attacks>APP:SYMC:ALTIRIS-DS-SQL-INJ</predefined-attacks>
+ <predefined-attacks>APP:SYMC:ENCRYPTED-CMD-EXEC</predefined-attacks>
+ <predefined-attacks>APP:TMIC:SP-CREATE-BIND-OF</predefined-attacks>
+ <predefined-attacks>APP:TMIC:SP-EARTH-AGENT-OF</predefined-attacks>
+ <predefined-attacks>APP:UPNP:LIBUPNP-DSN-BOF</predefined-attacks>
+ <predefined-attacks>APP:UPNP:LIBUPNP-ROOT-DSN-BOF</predefined-attacks>
+ <predefined-attacks>APP:UPNP:LIBUPNP-UUID-BOF</predefined-attacks>
+ <predefined-attacks>APP:VCENTER-JMX-RCE</predefined-attacks>
+ <predefined-attacks>APP:VCENTER-JMX-RCE2</predefined-attacks>
+ <predefined-attacks>APP:VINZANT-ARCHTCTR-AUTHWKNESS</predefined-attacks>
+ <predefined-attacks>CHAT:IRC:BOTNET:RA1NX-BOT-CE</predefined-attacks>
+ <predefined-attacks>CHAT:IRC:BOTNET:W3TW0RK-RCE</predefined-attacks>
+ <predefined-attacks>DB:IBM-SOLIDBD-WHERE-DOS</predefined-attacks>
+ <predefined-attacks>DB:IBM-SOLIDDB-ROWNUM</predefined-attacks>
+ <predefined-attacks>DB:MONGODB-NATIVEHELPER-RCE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:BENCHMARK-DOS</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:BRUTE-FORCE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:CLIENT-BOF</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:GRANT-FILE-BO</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:ORACLE-XPATH-DOS</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:ROOT-PRIVILEGE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:UPDATEXML-DOS</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:USER-ENUMERATION</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:WIN-RCE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:WINDOWS-REMOTE-ROOT</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:DBMS:OUTPUT-TO-JAVA</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:DECLARE-EXEC</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:EVTDUMP</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:SYS:LPXFSMSAX-NAME-BO</predefined-attacks>
+ <predefined-attacks>DB:POSTGRESQL:DBNAME-CLIFLAGINJ</predefined-attacks>
+ <predefined-attacks>DB:POSTGRESQL:GEO-OPS-PATH-IN</predefined-attacks>
+ <predefined-attacks>DB:POSTGRESQL:POSTGRE-DBSEC-BP</predefined-attacks>
+ <predefined-attacks>DDOS:LOIC-WEB</predefined-attacks>
+ <predefined-attacks>DHCP:SERVER:GNU-BASH-CMD-EXE</predefined-attacks>
+ <predefined-attacks>DHCP:SERVER:ISC-MAL-CLID</predefined-attacks>
+ <predefined-attacks>DNS:AUDIT:UNASSIGNED-OPCODE</predefined-attacks>
+ <predefined-attacks>DNS:AUDIT:Z-RESERVED-OPT</predefined-attacks>
+ <predefined-attacks>DNS:BIND-DBC-ASSERT-DOS</predefined-attacks>
+ <predefined-attacks>DNS:EXPLOIT:BIND-KEYPARSE-DOS</predefined-attacks>
+ <predefined-attacks>DNS:EXPLOIT:CLIBCVE-2015-7547BO</predefined-attacks>
+ <predefined-attacks>DNS:EXPLOIT:LIBCVE-2015-7547BO2</predefined-attacks>
+ <predefined-attacks>DNS:GNUTLS-DANE-BOF</predefined-attacks>
+ <predefined-attacks>DNS:ISC-ASSERTION-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-DNSSEC-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-EDNS-OPT-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-PACKAGE-DOS</predefined-attacks>
+ <predefined-attacks>DNS:MS-ISA-CE</predefined-attacks>
+ <predefined-attacks>DNS:NGINX-RESOLVER-DOS</predefined-attacks>
+ <predefined-attacks>DNS:OVERFLOW:GNU-C-GLIBC</predefined-attacks>
+ <predefined-attacks>DNS:OVERFLOW:TFTPD32</predefined-attacks>
+ <predefined-attacks>DNS:PDNS-AUTHSERV-DOS</predefined-attacks>
+ <predefined-attacks>DNS:POWERDNS-NAMESRVR-UDP-DOS</predefined-attacks>
+ <predefined-attacks>DNS:POWERDNS-NAMSRVR-TCP-DOS</predefined-attacks>
+ <predefined-attacks>DNS:REPERR:NULL-RDATA-LEN</predefined-attacks>
+ <predefined-attacks>DNS:RRSIG-QUERY</predefined-attacks>
+ <predefined-attacks>DNS:SQUID-DNS-DOS-1</predefined-attacks>
+ <predefined-attacks>DNS:TUNNEL:I2P-DNS-QUERY</predefined-attacks>
+ <predefined-attacks>DNS:TUNNEL:NULL-RECORD</predefined-attacks>
+ <predefined-attacks>DNS:WORDPRESS-SOAK-SOAK-MALWARE</predefined-attacks>
+ <predefined-attacks>DOS:DELL-NETVAULT-DOS</predefined-attacks>
+ <predefined-attacks>DOS:FREEBSD-ROUTED-DAEMON</predefined-attacks>
+ <predefined-attacks>DOS:SLOWHTTPTEST-TOOL</predefined-attacks>
+ <predefined-attacks>DOS:WINDOWS:HTTP-SYS</predefined-attacks>
+ <predefined-attacks>DOS:WINDOWS:ISCSI-TARGET</predefined-attacks>
+ <predefined-attacks>HTTP:ADOBE-FLASH-PLAYER-BO</predefined-attacks>
+ <predefined-attacks>HTTP:ADOBE-FLASHPLYR-PRIV-ESC</predefined-attacks>
+ <predefined-attacks>HTTP:ANGLER-EXPKIT-URI</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:APACHE-CHUNKREQ-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:APR-UTIL-LIB-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:COUCHDB-UUID-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:HTTPD-ERROR-400</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:HTTPD-MODLOG-COOKIE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:MOD-LOG-CONFIG-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:MOD-REWRITE-CMD-EXE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:REST-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:REV-PROXY-EXPLOIT</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-CI-SECBYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-OGNL-CE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-RST-DMI-EXEC</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-URL-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-XSLT-FI</predefined-attacks>
+ <predefined-attacks>HTTP:BACKDOOR-UPATRE-UA</predefined-attacks>
+ <predefined-attacks>HTTP:C99-SHELL-BACKDOOR</predefined-attacks>
+ <predefined-attacks>HTTP:CARBERP-BACKDOOR-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:CGI:BASH-INJECTION-HEADER</predefined-attacks>
+ <predefined-attacks>HTTP:CGI:MS-OFFICE-URL-BOF</predefined-attacks>
+ <predefined-attacks>HTTP:CISCO:DOWNLOADSERVLET-FU</predefined-attacks>
+ <predefined-attacks>HTTP:CLAMAV-ENCRYPT-PDF-MC2</predefined-attacks>
+ <predefined-attacks>HTTP:CLANSPHERE-COOKIE-LFI</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-ENCODING</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-LANG</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-AUTH-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-CONT-TYPE</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-CONTENT-MD5</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-HOST-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-REFERER-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:ZIMBRA-SERVER-LDAP</predefined-attacks>
+ <predefined-attacks>HTTP:DLINK-AUTHENTICATION-BO</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:APACHE-TOMCAT-CHUNKED2</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:HAPROXY-REQDENY</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:MIT-KERBEROS-5-POLICY</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:PHP-UPLOAD</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:SCHNEIDER-EXPRT-SCADA</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:SQUID-HDR-RANGE</predefined-attacks>
+ <predefined-attacks>HTTP:DRUPAL-CODER-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:EK-ANGLER-JAVA</predefined-attacks>
+ <predefined-attacks>HTTP:EXPLOIT:ILLEGAL-HOST-CHAR</predefined-attacks>
+ <predefined-attacks>HTTP:FORTINET-HELLO-MSG-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:HTTP-INVALID-PORT-VALUE</predefined-attacks>
+ <predefined-attacks>HTTP:HTTP_PROXY-ATTACK</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ASP-NET-MVC-SEC-BYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ASPX-URL</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ASPX-URL-1</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-1</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-2</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:IIS-6-7-AUTH-BYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:INT-OVERFLOW-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:WEB-CONFIG-INFO-LEAK</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:WEBDAV:WINDOWS-SHELL</predefined-attacks>
+ <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI</predefined-attacks>
+ <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI-TCP</predefined-attacks>
+ <predefined-attacks>HTTP:INVALID:EXPECT</predefined-attacks>
+ <predefined-attacks>HTTP:JAVA-UPDATE-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:JENKINS-CI-SERVER-CE</predefined-attacks>
+ <predefined-attacks>HTTP:LIBGD-GD2GETHEADER-IO</predefined-attacks>
+ <predefined-attacks>HTTP:LIBGD-HEAP-BO</predefined-attacks>
+ <predefined-attacks>HTTP:LIBREOFFICE-INTEGR-UNDRFLW</predefined-attacks>
+ <predefined-attacks>HTTP:MALICIOUS-SESSION-COOKIE</predefined-attacks>
+ <predefined-attacks>HTTP:MAMBO-MYSQL-INF-DISCLOSURE</predefined-attacks>
+ <predefined-attacks>HTTP:MANAGENGINE-EVTLG-INF-DISC</predefined-attacks>
+ <predefined-attacks>HTTP:MAXTHON-HISTORY-XSS</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:AVIRA-MGNT-HEADER-BOF</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:CHASYS-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:COOL-EXKIT-JAR-DL</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:CUTEZIP-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:CVE-2014-6332-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:DAZ-STUDIO-SCRIPT-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:ERS-VIEWER-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:GITLIST-URI-REQ-CE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:GRAPHITE-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:GSM-SIMEDIT-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:IRFVIEW-JP2-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:JBOSS-SEAM-EL-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:JOOMLA-UNSER-CE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MAPLE-MAPLET-CMD-EXEC</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MINIUPNPD-SOAP-ACTION</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MS-FOREFRONT-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MS-OWA-URL-REDIR</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:RUBY-RAILS-SECRET-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:SPLUNK-CUSTOM-APP-CE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:WESTERN-DIGITAL-LFI</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:WINRAR-FILENM-SPOOF</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:WIRESHARK-LUA-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MONKEY-HTTPD-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MS-VBSCRIPT-UAF-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MS-WIN-FOLDER-GUID-CE</predefined-attacks>
+ <predefined-attacks>HTTP:NAGIOS-CONFMGR-SQLINJ</predefined-attacks>
+ <predefined-attacks>HTTP:NEUTRINO-EK-SB</predefined-attacks>
+ <predefined-attacks>HTTP:NGINX-RQST-URI-SECBYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:NODEJS-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:NOVELL:GROUPWISE-NETAGT-BO</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:CONF-ACCESS</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:GENERIC-SIGNATUR-MC</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:OUTSIDE-PRDOX-BO2</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:SSO-ACCESS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:CDF-INFINITE-LOOP-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:CORE-INT-OF-CE</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:DATEINTERVAL-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:EXIF-NULL-PTR-DEREF</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:INVISION-IPS-COMM</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:JOOMLA-ADMIN-SCAN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:OPENEMR-GLOBALS-AB</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:PHAR-PARSE-TARFILE-ID</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:PHPMYADMIN:SETUP-SCAN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:PHPSPLOIT-POSTEXP</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:SPL-OBJECT-UNSERIALIZE</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:TAR-FILE-PTR</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:WP-BRUTE-FORCE-LOGIN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:WP-INCLUDES-ACCESS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:WP-README-SCAN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:XAMPP-FILE-WRITE</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:ZIPARCHIVE-IO</predefined-attacks>
+ <predefined-attacks>HTTP:PROXY:SQUID-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:REGIN-CNC-TRAFFIC</predefined-attacks>
+ <predefined-attacks>HTTP:REQERR:INV-IPV6-HOST-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:REQERR:NULL-IN-HEADER</predefined-attacks>
+ <predefined-attacks>HTTP:SOLARWINDS-AUTH-BYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:SOLARWINDS-POLICYBYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:AND-NUMBER-EQUALS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CHAR</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CHAR-ENCODE</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:COMMENT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:COMPARISON</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONCAT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONVERT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONVERT-INJ-OF</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HAVIJ-UA</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-REQ-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:INSERT-VALUES</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:INTO-OUTFILE</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:IS_SRVROLEMEMBER</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:MS-SQL-FUNCTIONS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:MS-SQL-TABLE-NAME</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:MYSQL-TABLE-NAME</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:NULLBYTE-COMMENT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:PL-SQL</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:PROC-GENERIC</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:SLASH-STAR</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:SQLMAP-ACTIVITY</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:SYSOBJECTS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:UA-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:UA-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:UNION-SELECT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:USER-ADD</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:VERSION-DETECT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:WAITFOR-DELAY</predefined-attacks>
+ <predefined-attacks>HTTP:SQUID-BUMP-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:STATIC-SERVER-BOF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ACTIVEX:KVIEW-KCHARTXY</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:2013-5065-PDF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:ACROFORM-NULL-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CONVFILTER-UAF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-2985-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3791-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3959-OF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2010-2202-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-0622-SB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3353</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3355-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5324-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5325-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5329-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0511-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0512-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0517-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0521</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0522-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0523-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0524-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0531-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0537-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0538-UF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0539-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0545-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0547-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0548-PB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0550-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0553-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0554</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0555-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0559-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0564-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0565-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0567-OF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0568-SE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0576-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0577-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0578-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0580-SB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0584-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0586-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-4671</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8440-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8441-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8447-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8449-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8450-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8451-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8455-UF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8459-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8460-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8461-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9159-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9160-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9162-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0087-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0089-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0090-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0093-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0301-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0302-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0303-SB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0305-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0306-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0307-DS</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0313-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0314-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0315-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0317-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0319-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0320-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0321-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0322-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0323-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0324-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0325-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0326-DS</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0328-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0329-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0330-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0333-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0334-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0335-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0337-PB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0338-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0339-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0340-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0341-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0342-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0346-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0347-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0348-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0349-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0350-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0351-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0352-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0353-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0354-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0355-MC</predefined-attacks>
+ </attacks>
+ </match>
+ <then>
+ <action>
+ <no-action/>
+ </action>
+ <ip-action>
+ <ip-notify/>
+ <target>source-address</target>
+ <log/>
+ <log-create/>
+ </ip-action>
+ <notification>
+ <log-attacks>
+ <alert/>
+ </log-attacks>
+ </notification>
+ </then>
+ </rule>
+ <rule>
+ <name>DBE-Q-IPS-policy-template-2</name>
+ <match>
+ <from-zone>any</from-zone>
+ <to-zone>any</to-zone>
+ <application>default</application>
+ <attacks>
+ <predefined-attack-groups>[Recommended]Critical - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - All</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Critical</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Info</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Major</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Minor</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Warning</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Info - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Major - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Minor - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Critical - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - All</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Critical</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Info</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Major</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Minor</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Warning</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Info - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Major - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Minor - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Warning - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Critical - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - All</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Critical</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Info</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Major</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Minor</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Warning</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Info - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Major - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Minor - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Warning - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Warning - ICMP</predefined-attack-groups>
+ </attacks>
+ </match>
+ <then>
+ <action>
+ <recommended/>
+ </action>
+ <ip-action>
+ <ip-notify/>
+ <target>source-address</target>
+ </ip-action>
+ <notification>
+ <log-attacks>
+ <alert/>
+ </log-attacks>
+ </notification>
+ </then>
+ </rule>
+ </rulebase-ips>
+ </idp-policy>
+ <active-policy>Space-IPS-Policy</active-policy>
+ </idp>
+ <forwarding-options>
+ <family>
+ <inet6>
+ <mode>flow-based</mode>
+ </inet6>
+ </family>
+ </forwarding-options>
+ <screen>
+ <ids-option>
+ <name>untrust-screen</name>
+ <alarm-without-drop/>
+ <icmp>
+ <ip-sweep>
+ <threshold>5000</threshold>
+ </ip-sweep>
+ <fragment/>
+ <large/>
+ <ping-death/>
+ </icmp>
+ <ip>
+ <bad-option/>
+ <record-route-option/>
+ <timestamp-option/>
+ <security-option/>
+ <stream-option/>
+ <spoofing/>
+ <source-route-option/>
+ <loose-source-route-option/>
+ <strict-source-route-option/>
+ <unknown-protocol/>
+ <tear-drop/>
+ </ip>
+ <tcp>
+ <syn-fin/>
+ <fin-no-ack/>
+ <tcp-no-flag/>
+ <syn-frag/>
+ <port-scan>
+ <threshold>5000</threshold>
+ </port-scan>
+ <syn-ack-ack-proxy>
+ </syn-ack-ack-proxy>
+ <syn-flood>
+ <alarm-threshold>1024</alarm-threshold>
+ <attack-threshold>200</attack-threshold>
+ <source-threshold>1024</source-threshold>
+ <destination-threshold>2048</destination-threshold>
+ <undocumented><queue-size>2000</queue-size></undocumented>
+ <timeout>20</timeout>
+ </syn-flood>
+ <land/>
+ </tcp>
+ </ids-option>
+ </screen>
+ <nat>
+ <source>
+ <pool>
+ <name>sp_dmzpfsnat</name>
+ <address>
+ <name>10.68.16.13/32</name>
+ </address>
+ <address>
+ <name>10.68.16.14/32</name>
+ </address>
+ <address>
+ <name>10.68.16.15/32</name>
+ </address>
+ <address>
+ <name>10.68.16.16/32</name>
+ </address>
+ <port>
+ <range>
+ <low>1024</low>
+ <to>
+ <high>63486</high>
+ </to>
+ </range>
+ </port>
+ <pool-utilization-alarm>
+ <raise-threshold>80</raise-threshold>
+ <clear-threshold>70</clear-threshold>
+ </pool-utilization-alarm>
+ </pool>
+ <rule-set>
+ <name>rs_mis2dmzpfsnat</name>
+ <from>
+ <zone>sz_dbemis</zone>
+ </from>
+ <to>
+ <zone>trust</zone>
+ </to>
+ <rule>
+ <name>nr_dmzpsnat</name>
+ <src-nat-rule-match>
+ <destination-address>10.68.16.4/32</destination-address>
+ <destination-address>10.68.16.5/32</destination-address>
+ </src-nat-rule-match>
+ <then>
+ <source-nat>
+ <pool>
+ <pool-name>sp_dmzpfsnat</pool-name>
+ </pool>
+ </source-nat>
+ </then>
+ </rule>
+ </rule-set>
+ </source>
+ <destination>
+ <pool>
+ <name>dp_dmzpf01ap1dnat</name>
+ <address>
+ <ipaddr>10.68.16.4/32</ipaddr>
+ </address>
+ </pool>
+ <pool>
+ <name>dp_dmzpf02ap1dnat</name>
+ <address>
+ <ipaddr>10.68.16.5/32</ipaddr>
+ </address>
+ </pool>
+ <rule-set>
+ <name>rs_mis2dmzpfdnat</name>
+ <from>
+ <zone>sz_dbemis</zone>
+ </from>
+ <rule>
+ <name>nr_p01ap1dnat</name>
+ <dest-nat-rule-match>
+ <destination-address>
+ <dst-addr>12.102.197.133/32</dst-addr>
+ </destination-address>
+ </dest-nat-rule-match>
+ <then>
+ <destination-nat>
+ <pool>
+ <pool-name>dp_dmzpf01ap1dnat</pool-name>
+ </pool>
+ </destination-nat>
+ </then>
+ </rule>
+ <rule>
+ <name>nr_p02ap1dnat</name>
+ <dest-nat-rule-match>
+ <destination-address>
+ <dst-addr>12.102.197.134/32</dst-addr>
+ </destination-address>
+ </dest-nat-rule-match>
+ <then>
+ <destination-nat>
+ <pool>
+ <pool-name>dp_dmzpf02ap1dnat</pool-name>
+ </pool>
+ </destination-nat>
+ </then>
+ </rule>
+ </rule-set>
+ </destination>
+ <proxy-arp>
+ <interface>
+ <name>reth0.0</name>
+ <address>
+ <name>12.102.197.133/32</name>
+ </address>
+ <address>
+ <name>12.102.197.134/32</name>
+ </address>
+ </interface>
+ <interface>
+ <name>reth1.0</name>
+ <address>
+ <name>10.68.16.13/32</name>
+ </address>
+ <address>
+ <name>10.68.16.14/32</name>
+ </address>
+ <address>
+ <name>10.68.16.15/32</name>
+ </address>
+ <address>
+ <name>10.68.16.16/32</name>
+ </address>
+ </interface>
+ </proxy-arp>
+ </nat>
+ <policies>
+ <policy>
+ <from-zone-name>trust</from-zone-name>
+ <to-zone-name>trust</to-zone-name>
+ <policy>
+ <name>default-permit</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <permit>
+ </permit>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>trust</from-zone-name>
+ <to-zone-name>untrust</to-zone-name>
+ <policy>
+ <name>default-permit</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <permit>
+ </permit>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>sz_dbemis</from-zone-name>
+ <to-zone-name>trust</to-zone-name>
+ <policy>
+ <name>sp_bwxspapi</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>as_bwdmzpxspapsrvrs_2</destination-address>
+ <application>ps_bwapi_3</application>
+ </match>
+ <then>
+ <permit>
+ </permit>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ <count>
+ </count>
+ </then>
+ </policy>
+ <policy>
+ <name>sp_bwpdeny</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <deny/>
+ <log>
+ <session-init/>
+ </log>
+ <count>
+ </count>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>trust</from-zone-name>
+ <to-zone-name>sz_dbemis</to-zone-name>
+ <policy>
+ <name>sp_bwzdeny</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <deny/>
+ <log>
+ <session-init/>
+ </log>
+ <count>
+ </count>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>untrust</from-zone-name>
+ <to-zone-name>trust</to-zone-name>
+ <policy>
+ <name>default-deny</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <deny/>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ </then>
+ </policy>
+ </policy>
+ </policies>
+ <zones>
+ <security-zone>
+ <name>trust</name>
+ <tcp-rst/>
+ <address-book>
+ <address>
+ <name>ad_bwxsp02ap1pf</name>
+ <ip-prefix>10.68.16.5/32</ip-prefix>
+ </address>
+ <address>
+ <name>ad_bwxsp01ap1pf_1</name>
+ <ip-prefix>10.68.16.4/32</ip-prefix>
+ </address>
+ <address-set>
+ <name>as_bwdmzpxspapsrvrs_2</name>
+ <address>
+ <name>ad_bwxsp01ap1pf_1</name>
+ </address>
+ <address>
+ <name>ad_bwxsp02ap1pf</name>
+ </address>
+ </address-set>
+ </address-book>
+ <host-inbound-traffic>
+ <system-services>
+ <name>all</name>
+ </system-services>
+ <protocols>
+ <name>all</name>
+ </protocols>
+ </host-inbound-traffic>
+ <interfaces>
+ <name>reth1.0</name>
+ </interfaces>
+ </security-zone>
+ <security-zone>
+ <name>untrust</name>
+ <screen>untrust-screen</screen>
+ </security-zone>
+ <security-zone>
+ <name>sz_dbemis</name>
+ <screen>untrust-screen</screen>
+ <interfaces>
+ <name>reth0.0</name>
+ </interfaces>
+ </security-zone>
+ </zones>
+ </security>
+ <interfaces>
+ <interface>
+ <name>ge-0/0/1</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth0</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>ge-0/0/2</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth1</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>ge-7/0/1</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth0</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>ge-7/0/2</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth1</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>fab0</name>
+ <fabric-options>
+ <member-interfaces>
+ <name>ge-0/0/0</name>
+ </member-interfaces>
+ </fabric-options>
+ </interface>
+ <interface>
+ <name>fab1</name>
+ <fabric-options>
+ <member-interfaces>
+ <name>ge-7/0/0</name>
+ </member-interfaces>
+ </fabric-options>
+ </interface>
+ <interface>
+ <name>fxp0</name>
+ <unit>
+ <name>0</name>
+ </unit>
+ </interface>
+ <interface>
+ <name>reth0</name>
+ <redundant-ether-options>
+ <redundancy-group>1</redundancy-group>
+ </redundant-ether-options>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <filter>
+ <input>
+ <filter-name>ff_pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>12.102.197.132/25</name>
+ </address>
+ </inet>
+ <inet6>
+ <filter>
+ <input>
+ <filter-name>ff_v6pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>2001:1890:1001:23ed::3:1/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ed::3:2/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ed::3:3/64</name>
+ </address>
+ </inet6>
+ </family>
+ </unit>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ <redundant-ether-options>
+ <redundancy-group>1</redundancy-group>
+ </redundant-ether-options>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <filter>
+ <input>
+ <filter-name>ff_pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>10.68.16.12/22</name>
+ </address>
+ </inet>
+ <inet6>
+ <filter>
+ <input>
+ <filter-name>ff_v6pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>2001:1890:1001:23ec::3:1/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:2/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:3/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:4/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:5/64</name>
+ </address>
+ </inet6>
+ </family>
+ </unit>
+ </interface>
+ </interfaces>
+ <snmp>
+ <community>
+ <name>vsbk68</name>
+ <authorization>read-only</authorization>
+ <clients>
+ <name>130.6.45.42/32</name>
+ </clients>
+ <clients>
+ <name>130.6.45.41/32</name>
+ </clients>
+ <clients>
+ <name>130.6.44.254/32</name>
+ </clients>
+ <clients>
+ <name>130.6.44.253/32</name>
+ </clients>
+ <clients>
+ <name>135.25.175.114/32</name>
+ </clients>
+ <clients>
+ <name>135.21.235.37/32</name>
+ </clients>
+ </community>
+ <community>
+ <name>space15</name>
+ <authorization>read-write</authorization>
+ <clients>
+ <name>135.144.0.60/32</name>
+ </clients>
+ <clients>
+ <name>135.144.0.59/32</name>
+ </clients>
+ <clients>
+ <name>135.144.0.61/32</name>
+ </clients>
+ </community>
+ <trap-group>
+ <name>GFP</name>
+ <version>v2</version>
+ <destination-port>162</destination-port>
+ <targets>
+ <name>135.89.33.175</name>
+ </targets>
+ <targets>
+ <name>199.37.245.24</name>
+ </targets>
+ </trap-group>
+ <trap-group>
+ <name>space</name>
+ <targets>
+ <name>135.144.0.60</name>
+ </targets>
+ </trap-group>
+ <health-monitor>
+ <idp>
+ </idp>
+ </health-monitor>
+ </snmp>
+ <routing-options>
+ <interface-routes>
+ <rib-group>
+ <inet>rg_mis2dmzp</inet>
+ <inet6>rg_v6mis2dmzp</inet6>
+ </rib-group>
+ </interface-routes>
+ <static>
+ <route>
+ <name>0.0.0.0/0</name>
+ <next-hop>135.69.228.1</next-hop>
+ </route>
+ </static>
+ <rib-groups>
+ <name>rg_mis2dmzp</name>
+ <import-rib>vrf-untrust.inet.0</import-rib>
+ <import-rib>inet.0</import-rib>
+ </rib-groups>
+ <rib-groups>
+ <name>rg_v6mis2dmzp</name>
+ <import-rib>vrf-untrust.inet6.0</import-rib>
+ <import-rib>inet6.0</import-rib>
+ </rib-groups>
+ </routing-options>
+ <class-of-service>
+ <interfaces>
+ <interface>
+ <name>reth0</name>
+ <unit>
+ <name>0</name>
+ <rewrite-rules>
+ <dscp>
+ <name>cr_pdscpaf</name>
+ </dscp>
+ <dscp-ipv6>
+ <name>cr_v6pdscpaf</name>
+ </dscp-ipv6>
+ </rewrite-rules>
+ </unit>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ <unit>
+ <name>0</name>
+ <rewrite-rules>
+ <dscp>
+ <name>cr_pdscpaf</name>
+ </dscp>
+ <dscp-ipv6>
+ <name>cr_v6pdscpaf</name>
+ </dscp-ipv6>
+ </rewrite-rules>
+ </unit>
+ </interface>
+ </interfaces>
+ <rewrite-rules>
+ <dscp>
+ <name>cr_pdscpaf</name>
+ <forwarding-class>
+ <name>assured-forwarding</name>
+ <loss-priority>
+ <name>low</name>
+ <code-point>011010</code-point>
+ </loss-priority>
+ </forwarding-class>
+ </dscp>
+ <dscp-ipv6>
+ <name>cr_v6pdscpaf</name>
+ <forwarding-class>
+ <name>assured-forwarding</name>
+ <loss-priority>
+ <name>low</name>
+ <code-point>011010</code-point>
+ </loss-priority>
+ </forwarding-class>
+ </dscp-ipv6>
+ </rewrite-rules>
+ </class-of-service>
+ <firewall>
+ <family>
+ <inet>
+ <filter>
+ <name>ff_pdscp</name>
+ <term>
+ <name>fr_pdscp</name>
+ <from>
+ <interface>
+ <name>reth0</name>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ </interface>
+ </from>
+ <then>
+ <forwarding-class>assured-forwarding</forwarding-class>
+ <accept/>
+ </then>
+ </term>
+ </filter>
+ </inet>
+ <inet6>
+ <filter>
+ <name>ff_v6pdscp</name>
+ <term>
+ <name>fr_v6pdscp</name>
+ <from>
+ <interface>
+ <name>reth0</name>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ </interface>
+ </from>
+ <then>
+ <forwarding-class>assured-forwarding</forwarding-class>
+ <accept/>
+ </then>
+ </term>
+ </filter>
+ </inet6>
+ </family>
+ </firewall>
+ <routing-instances>
+ <instance>
+ <name>vrf-untrust</name>
+ <instance-type>virtual-router</instance-type>
+ <interface>
+ <name>reth0.0</name>
+ </interface>
+ <routing-options>
+ <interface-routes>
+ <rib-group>
+ <inet>rg_mis2dmzp</inet>
+ <inet6>rg_v6mis2dmzp</inet6>
+ </rib-group>
+ </interface-routes>
+ <rib>
+ <name>vrf-untrust.inet6.0</name>
+ <static>
+ <route>
+ <name>0::/0</name>
+ <next-hop>2001:1890:1001:23ed::1</next-hop>
+ </route>
+ </static>
+ </rib>
+ <static>
+ <route>
+ <name>0.0.0.0/0</name>
+ <next-hop>12.102.197.129</next-hop>
+ </route>
+ </static>
+ </routing-options>
+ </instance>
+ </routing-instances>
+ <applications>
+ <application>
+ <name>ap_xsi-xml-https</name>
+ <protocol>tcp</protocol>
+ <destination-port>443</destination-port>
+ </application>
+ <application-set>
+ <name>ps_bwapi_3</name>
+ <application>
+ <name>ap_xsi-xml-https</name>
+ </application>
+ </application-set>
+ </applications>
+ </configuration>
\ No newline at end of file diff --git a/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt b/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt new file mode 100644 index 000000000..861dbcc5f --- /dev/null +++ b/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt @@ -0,0 +1,1535 @@ +<rpc-reply xmlns:junos="http://xml.juniper.net/junos/15.1X49/junos">
+ <configuration junos:changed-seconds="1478714723" junos:changed-localtime="2016-11-09 18:05:23 UTC">
+ <version>15.1X49-D50.3</version>
+ <groups>
+ <name>${nodename}</name>
+ <system>
+ <host-name>dbqx0001vm001</host-name>
+ <backup-router>
+ <address>${BUrouterIP}</address>
+ <destination>${DestinationSubnet}</destination>
+ </backup-router>
+ <services>
+ <ssh>
+ <max-sessions-per-connection>32</max-sessions-per-connection>
+ </ssh>
+ </services>
+ <syslog>
+ <file>
+ <name>default-log-messages</name>
+ <contents>
+ <name>any</name>
+ <info/>
+ </contents>
+ <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
+ <structured-data>
+ </structured-data>
+ </file>
+ </syslog>
+ </system>
+ <interfaces>
+ <interface>
+ <name>fxp0</name>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <address>
+ <name>135.69.228.8/25</name>
+ </address>
+ </inet>
+ </family>
+ </unit>
+ </interface>
+ </interfaces>
+ </groups>
+ <groups>
+ <name>node1</name>
+ <system>
+ <host-name>dbqx0001vm002</host-name>
+ <backup-router>
+ <address>135.69.228.1</address>
+ <destination>0.0.0.0/0</destination>
+ </backup-router>
+ <services>
+ <ssh>
+ <max-sessions-per-connection>32</max-sessions-per-connection>
+ </ssh>
+ </services>
+ <syslog>
+ <file>
+ <name>default-log-messages</name>
+ <contents>
+ <name>any</name>
+ <info/>
+ </contents>
+ <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
+ <structured-data>
+ </structured-data>
+ </file>
+ </syslog>
+ </system>
+ <interfaces>
+ <interface>
+ <name>fxp0</name>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <address>
+ <name>135.69.228.9/25</name>
+ </address>
+ </inet>
+ </family>
+ </unit>
+ </interface>
+ </interfaces>
+ </groups>
+ <apply-groups>groupname</apply-groups>
+ <system>
+ <root-authentication>
+ <encrypted-password>$5$rKyWGmrv$sMeym/XUklUeJX2hKpcp5TzCG5R8jcmJ2901HcNGSeB</encrypted-password>
+ </root-authentication>
+ <name-server>
+ <name>135.188.34.84</name>
+ </name-server>
+ <login>
+ <message>\n\t\tWARNING NOTICE\n\tThis system is restricted solely to AT&T authorized users for\n\tlegitimate business purposes only.The actual or attempted\n\tunauthorized access, use, or modification of this system is\n\tstrictly prohibited by AT&T. Unauthorized users are subject to\n\tCompany disciplinary proceedings and/or criminal and civil\n\tpenalties under state, federal, or other applicable domestic and\n\tforeign laws. The use of this system may be monitored and\n\trecorded for administrative and security reasons. Anyone\n\taccessing this system expressly consents to such monitoring and\n\t is advised that if monitoring reveals possible evidence of\n\tcriminal activity, AT&T may provide the evidence of such\n\tactivity to law enforcement officials. All users must comply\n\twith AT&T company policies regarding the protection of AT&T\n\tinformation assets.\n\n</message>
+ </login>
+ <services>
+ <ssh>
+ <protocol-version>v2</protocol-version>
+ </ssh>
+ <netconf>
+ <ssh>
+ </ssh>
+ </netconf>
+ </services>
+ <syslog>
+ <user>
+ <name>*</name>
+ <contents>
+ <name>any</name>
+ <emergency/>
+ </contents>
+ </user>
+ <host>
+ <name>135.144.0.62</name>
+ <contents>
+ <name>any</name>
+ <any/>
+ </contents>
+ <structured-data>
+ </structured-data>
+ </host>
+ <file>
+ <name>messages</name>
+ <contents>
+ <name>any</name>
+ <any/>
+ </contents>
+ <contents>
+ <name>authorization</name>
+ <info/>
+ </contents>
+ </file>
+ <file>
+ <name>interactive-commands</name>
+ <contents>
+ <name>interactive-commands</name>
+ <any/>
+ </contents>
+ </file>
+ <file>
+ <name>session_log</name>
+ <contents>
+ <name>any</name>
+ <info/>
+ </contents>
+ <structured-data>
+ </structured-data>
+ </file>
+ <file>
+ <name>policy_session</name>
+ <match>RT_FLOW</match>
+ </file>
+ </syslog>
+ <license>
+ <autoupdate>
+ <url>
+ <name>https://ae1.juniper.net/junos/key_retrieval</name>
+ </url>
+ </autoupdate>
+ </license>
+ <ntp>
+ <server>
+ <name>192.20.201.162</name>
+ </server>
+ </ntp>
+ </system>
+ <chassis>
+ <cluster>
+ <control-link-recovery/>
+ <reth-count>2</reth-count>
+ <heartbeat-interval>1000</heartbeat-interval>
+ <heartbeat-threshold>3</heartbeat-threshold>
+ <redundancy-group>
+ <name>0</name>
+ <node>
+ <name>0</name>
+ <priority>100</priority>
+ </node>
+ <node>
+ <name>1</name>
+ <priority>1</priority>
+ </node>
+ </redundancy-group>
+ <redundancy-group>
+ <name>1</name>
+ <node>
+ <name>0</name>
+ <priority>100</priority>
+ </node>
+ <node>
+ <name>1</name>
+ <priority>1</priority>
+ </node>
+ <interface-monitor>
+ <name>ge-0/0/1</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <interface-monitor>
+ <name>ge-7/0/1</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <interface-monitor>
+ <name>ge-0/0/2</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <interface-monitor>
+ <name>ge-7/0/2</name>
+ <weight>255</weight>
+ </interface-monitor>
+ <ip-monitoring>
+ <global-weight>255</global-weight>
+ <retry-interval>1</retry-interval>
+ <retry-count>5</retry-count>
+ <family>
+ <inet>
+ <address>
+ <name>10.68.16.1</name>
+ <weight>255</weight>
+ <interface>
+ <logical-interface-name>reth1.0</logical-interface-name>
+ <secondary-ip-address>10.68.16.17</secondary-ip-address>
+ </interface>
+ </address>
+ <address>
+ <name>12.102.197.129</name>
+ <weight>255</weight>
+ <interface>
+ <logical-interface-name>reth0.0</logical-interface-name>
+ <secondary-ip-address>12.102.197.135</secondary-ip-address>
+ </interface>
+ </address>
+ </inet>
+ </family>
+ </ip-monitoring>
+ </redundancy-group>
+ </cluster>
+ </chassis>
+ <services>
+ <application-identification>
+ </application-identification>
+ </services>
+ <security>
+ <idp>
+ <idp-policy>
+ <name>Space-IPS-Policy</name>
+ <rulebase-ips>
+ <rule>
+ <name>DBE-Q-IPS-policy-template-1</name>
+ <match>
+ <from-zone>any</from-zone>
+ <to-zone>any</to-zone>
+ <application>default</application>
+ <attacks>
+ <predefined-attacks>APP:ADOBE-COLDFUSION-WEBSOCKET</predefined-attacks>
+ <predefined-attacks>APP:ADOBE-FLASH-RTMP-RCE</predefined-attacks>
+ <predefined-attacks>APP:AMANDA:AMANDA-ROOT-OF2</predefined-attacks>
+ <predefined-attacks>APP:APPLE-MACOSX-ODP-RCE</predefined-attacks>
+ <predefined-attacks>APP:ASUS-WRT-INFOSVR-COMND-EXEC</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:BCK-MESSAGE</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:METHD-EXPOSURE</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:RPC-MEMRCORRUPT</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:SQLOF-1</predefined-attacks>
+ <predefined-attacks>APP:CA:ARCSRV:TAPE-ENGNE-DOS</predefined-attacks>
+ <predefined-attacks>APP:CA:DBA-SVR-POINT</predefined-attacks>
+ <predefined-attacks>APP:CA:RPC-MSG-BO</predefined-attacks>
+ <predefined-attacks>APP:CISCO:ASA-IKE-BO</predefined-attacks>
+ <predefined-attacks>APP:CISCO:CISCO-EPNM-DESERIAL-1</predefined-attacks>
+ <predefined-attacks>APP:CISCO:VIDEO-SURVEILANCE-XSS</predefined-attacks>
+ <predefined-attacks>APP:CITRIX:PROVISIONING-OPCODE</predefined-attacks>
+ <predefined-attacks>APP:CITRIX:STREAMPROCESS-BOF</predefined-attacks>
+ <predefined-attacks>APP:DIGIUM-ASTERISK-OF</predefined-attacks>
+ <predefined-attacks>APP:EMC-ALPHASTOR-BOF</predefined-attacks>
+ <predefined-attacks>APP:EMC-ALPHASTORE-CMDEXEC</predefined-attacks>
+ <predefined-attacks>APP:EMC-APLHASTORE-FMTSTR</predefined-attacks>
+ <predefined-attacks>APP:EMC-NETWORKER-NSRD-BO</predefined-attacks>
+ <predefined-attacks>APP:EMC-NETWORKER-NSRINDEXD-OF</predefined-attacks>
+ <predefined-attacks>APP:EMC-NSRINDEXD-BO</predefined-attacks>
+ <predefined-attacks>APP:EMC-REPLICATION-MGR-CMD-EXE</predefined-attacks>
+ <predefined-attacks>APP:ESIGNAL:OVERFLOW-EXPLOIT</predefined-attacks>
+ <predefined-attacks>APP:FLEXERA-FLEXNET-BO</predefined-attacks>
+ <predefined-attacks>APP:FREEBSD-BSPATCH-RCE</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PROTECTOR-OP-DOS</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-EXEC-BAR-CE</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP-27</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP211-264</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP215-263</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP227-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP234-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP235-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP259-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP260-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OP28-11</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODE</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODES</predefined-attacks>
+ <predefined-attacks>APP:HP-DATA-PRTCTR-RDS-DOS</predefined-attacks>
+ <predefined-attacks>APP:HP-LEFTHAND-HYDRA-DIAG-OF</predefined-attacks>
+ <predefined-attacks>APP:HP-LEFTHAND-HYDRA-PING-OF</predefined-attacks>
+ <predefined-attacks>APP:HP-LOADRUNNER-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-LOADRUNNER-RCE</predefined-attacks>
+ <predefined-attacks>APP:HP-LOADRUNNER-SSL</predefined-attacks>
+ <predefined-attacks>APP:HP-LOGIN-BOF</predefined-attacks>
+ <predefined-attacks>APP:HP-MGMT-UAM-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-NNM-HLEN-BOF</predefined-attacks>
+ <predefined-attacks>APP:HP-OPENVIEW-DTPRTCTR-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-OPNVIEWSTORAGE-BOF</predefined-attacks>
+ <predefined-attacks>APP:HP-OPNVW-STORAGE-DATA-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-PROCURVE-BYPASS</predefined-attacks>
+ <predefined-attacks>APP:HP-PROTECTOR-DIR-TRAV</predefined-attacks>
+ <predefined-attacks>APP:HP-SAN-IQ-CMD-INJ</predefined-attacks>
+ <predefined-attacks>APP:HP-STORAGEWORKS-OPC22-BO</predefined-attacks>
+ <predefined-attacks>APP:HP-SYS-IPRANGE-OF</predefined-attacks>
+ <predefined-attacks>APP:HP-SYS-RCE</predefined-attacks>
+ <predefined-attacks>APP:HP-VIRTUAL-SAN</predefined-attacks>
+ <predefined-attacks>APP:HPE-NA-RMI-DESER</predefined-attacks>
+ <predefined-attacks>APP:HPIM-SOM-EUACCNT-BYPASS</predefined-attacks>
+ <predefined-attacks>APP:HPLOADRUNNER-XDR-BO</predefined-attacks>
+ <predefined-attacks>APP:HPOV:CMD-INJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:DOMINO-BYPASS</predefined-attacks>
+ <predefined-attacks>APP:IBM:DOMINO-BYPASS-1</predefined-attacks>
+ <predefined-attacks>APP:IBM:FORMVIEWER-XFDL-BOF</predefined-attacks>
+ <predefined-attacks>APP:IBM:FXCLI-EXECBO</predefined-attacks>
+ <predefined-attacks>APP:IBM:LDAP-MODIFYREQUEST-BO</predefined-attacks>
+ <predefined-attacks>APP:IBM:OPCODE-1330-CMD-INJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIV-OP1329-BOF</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIV-OP1331-CMDINJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIV-OP1339-CMDINJ</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-FASTBACK-OP-BO</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-OP4115-BO</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1301</predefined-attacks>
+ <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1335</predefined-attacks>
+ <predefined-attacks>APP:IBM:TSM-CVE-2015-0119-BO</predefined-attacks>
+ <predefined-attacks>APP:IPMI-CIPHER-ZERO</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA1</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA2</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:CHKSUM-PRIV-ESC</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-TCP</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-UDP</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:KRB5-DOS</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:MULTI-REALM-DOS</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:SPNEGO-5-DOS</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:WIN-KERB-FALLBACK</predefined-attacks>
+ <predefined-attacks>APP:KERBEROS:XREALM-KDC-DOS</predefined-attacks>
+ <predefined-attacks>APP:MCAFEE-AM-INPUT-SSL</predefined-attacks>
+ <predefined-attacks>APP:MISC:ACTMQ-SHUTDN-CMD</predefined-attacks>
+ <predefined-attacks>APP:MISC:ADOBE-RTMP-UAF</predefined-attacks>
+ <predefined-attacks>APP:MISC:ALIENVALT-BAKUP-COM-RE</predefined-attacks>
+ <predefined-attacks>APP:MISC:APACHE-QPID-SEQSET-DOS</predefined-attacks>
+ <predefined-attacks>APP:MISC:APACHE-SVN-IO</predefined-attacks>
+ <predefined-attacks>APP:MISC:ARCSERVE-BKUP</predefined-attacks>
+ <predefined-attacks>APP:MISC:BIGANT-DDNF-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:CLEARSCADA-OPF-PARSE</predefined-attacks>
+ <predefined-attacks>APP:MISC:CVE-2014-0549-RTMP-MC</predefined-attacks>
+ <predefined-attacks>APP:MISC:DIASOFT-EXECCMD-CE</predefined-attacks>
+ <predefined-attacks>APP:MISC:ENTERASYS-NETSIGHT-BOF</predefined-attacks>
+ <predefined-attacks>APP:MISC:EZHOMETECH-EZSERVER-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:FREEBSD-MBUF-DOS</predefined-attacks>
+ <predefined-attacks>APP:MISC:GITORIOUS-RCE</predefined-attacks>
+ <predefined-attacks>APP:MISC:HP-INODE-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:HP-OA-HEALTH-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:NAGIOS-NRPE-CE</predefined-attacks>
+ <predefined-attacks>APP:MISC:OBJ-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:OBJ-OBJDB-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:SAM-ACTQ-MULTI</predefined-attacks>
+ <predefined-attacks>APP:MISC:SCHNEIDER-INDUSOFT-RCE</predefined-attacks>
+ <predefined-attacks>APP:MISC:SERCOMM-DEVICE-RCE</predefined-attacks>
+ <predefined-attacks>APP:MISC:SPREE-SEARCH-CMD-EXE</predefined-attacks>
+ <predefined-attacks>APP:MISC:WSHARK-ENTTEC-BO</predefined-attacks>
+ <predefined-attacks>APP:MISC:XEROX-MFP-COMND-EXEC</predefined-attacks>
+ <predefined-attacks>APP:MISC:ZABBIC-NODE-PROCESS-CE</predefined-attacks>
+ <predefined-attacks>APP:MISC:ZEND-SERVER-CE</predefined-attacks>
+ <predefined-attacks>APP:MIT-KERBEROS-5-POLICY-DOS</predefined-attacks>
+ <predefined-attacks>APP:MS-SNABASE-EXE-DOS</predefined-attacks>
+ <predefined-attacks>APP:MSDOTNET-CVE-2014-1806</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:MESSENGER-BOF</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:MESSENGER-LOGIN</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:ZENWORKS-DIR-TRAV</predefined-attacks>
+ <predefined-attacks>APP:NOVELL:ZENWORKS-MGT-UPLOAD</predefined-attacks>
+ <predefined-attacks>APP:OPENVIEW-STORAGE-BO</predefined-attacks>
+ <predefined-attacks>APP:ORACLE:WEBLOGIC-FILE-UPLOAD</predefined-attacks>
+ <predefined-attacks>APP:ORACLE:WEBLOGIC-SRV-RCE</predefined-attacks>
+ <predefined-attacks>APP:PERSISTENT-COMMAND-EXEC</predefined-attacks>
+ <predefined-attacks>APP:PROXY:SQUID-SSLBUMP-CERT</predefined-attacks>
+ <predefined-attacks>APP:QEMU-VNC-SETPIXEL-PTR-DEREF</predefined-attacks>
+ <predefined-attacks>APP:QUEST-BIG-BRO-FD</predefined-attacks>
+ <predefined-attacks>APP:RDP-BRUTE-FORCE</predefined-attacks>
+ <predefined-attacks>APP:REAL:REAL-MPG-WIDTH</predefined-attacks>
+ <predefined-attacks>APP:REDIS-GETNUM-IO</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:CVE-2015-2373-RCE</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:NETTRANSPORT-DM</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:RDP-HEAP-BO</predefined-attacks>
+ <predefined-attacks>APP:REMOTE:RDP-MEM-OBJ</predefined-attacks>
+ <predefined-attacks>APP:SAFENET-VPN-OF</predefined-attacks>
+ <predefined-attacks>APP:SAP:3DM-FILE-BOF</predefined-attacks>
+ <predefined-attacks>APP:SAP:3DVIS-FLIC-BO</predefined-attacks>
+ <predefined-attacks>APP:SAP:INT-GRAPHICS-PARAMS-XSS</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-BO</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-DIAGI-DOS</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-DOS</predefined-attacks>
+ <predefined-attacks>APP:SAP:NETWEAVER-SOAP-RCE</predefined-attacks>
+ <predefined-attacks>APP:SNORT:BACKORIFICE-DOS</predefined-attacks>
+ <predefined-attacks>APP:SQUID-BUMP-DOS</predefined-attacks>
+ <predefined-attacks>APP:SYMC:ALTIRIS-DS-SQL-INJ</predefined-attacks>
+ <predefined-attacks>APP:SYMC:ENCRYPTED-CMD-EXEC</predefined-attacks>
+ <predefined-attacks>APP:TMIC:SP-CREATE-BIND-OF</predefined-attacks>
+ <predefined-attacks>APP:TMIC:SP-EARTH-AGENT-OF</predefined-attacks>
+ <predefined-attacks>APP:UPNP:LIBUPNP-DSN-BOF</predefined-attacks>
+ <predefined-attacks>APP:UPNP:LIBUPNP-ROOT-DSN-BOF</predefined-attacks>
+ <predefined-attacks>APP:UPNP:LIBUPNP-UUID-BOF</predefined-attacks>
+ <predefined-attacks>APP:VCENTER-JMX-RCE</predefined-attacks>
+ <predefined-attacks>APP:VCENTER-JMX-RCE2</predefined-attacks>
+ <predefined-attacks>APP:VINZANT-ARCHTCTR-AUTHWKNESS</predefined-attacks>
+ <predefined-attacks>CHAT:IRC:BOTNET:RA1NX-BOT-CE</predefined-attacks>
+ <predefined-attacks>CHAT:IRC:BOTNET:W3TW0RK-RCE</predefined-attacks>
+ <predefined-attacks>DB:IBM-SOLIDBD-WHERE-DOS</predefined-attacks>
+ <predefined-attacks>DB:IBM-SOLIDDB-ROWNUM</predefined-attacks>
+ <predefined-attacks>DB:MONGODB-NATIVEHELPER-RCE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:BENCHMARK-DOS</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:BRUTE-FORCE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:CLIENT-BOF</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:GRANT-FILE-BO</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:ORACLE-XPATH-DOS</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:ROOT-PRIVILEGE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:UPDATEXML-DOS</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:USER-ENUMERATION</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:WIN-RCE</predefined-attacks>
+ <predefined-attacks>DB:MYSQL:WINDOWS-REMOTE-ROOT</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:DBMS:OUTPUT-TO-JAVA</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:DECLARE-EXEC</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:EVTDUMP</predefined-attacks>
+ <predefined-attacks>DB:ORACLE:SYS:LPXFSMSAX-NAME-BO</predefined-attacks>
+ <predefined-attacks>DB:POSTGRESQL:DBNAME-CLIFLAGINJ</predefined-attacks>
+ <predefined-attacks>DB:POSTGRESQL:GEO-OPS-PATH-IN</predefined-attacks>
+ <predefined-attacks>DB:POSTGRESQL:POSTGRE-DBSEC-BP</predefined-attacks>
+ <predefined-attacks>DDOS:LOIC-WEB</predefined-attacks>
+ <predefined-attacks>DHCP:SERVER:GNU-BASH-CMD-EXE</predefined-attacks>
+ <predefined-attacks>DHCP:SERVER:ISC-MAL-CLID</predefined-attacks>
+ <predefined-attacks>DNS:AUDIT:UNASSIGNED-OPCODE</predefined-attacks>
+ <predefined-attacks>DNS:AUDIT:Z-RESERVED-OPT</predefined-attacks>
+ <predefined-attacks>DNS:BIND-DBC-ASSERT-DOS</predefined-attacks>
+ <predefined-attacks>DNS:EXPLOIT:BIND-KEYPARSE-DOS</predefined-attacks>
+ <predefined-attacks>DNS:EXPLOIT:CLIBCVE-2015-7547BO</predefined-attacks>
+ <predefined-attacks>DNS:EXPLOIT:LIBCVE-2015-7547BO2</predefined-attacks>
+ <predefined-attacks>DNS:GNUTLS-DANE-BOF</predefined-attacks>
+ <predefined-attacks>DNS:ISC-ASSERTION-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-DNSSEC-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-EDNS-OPT-DOS</predefined-attacks>
+ <predefined-attacks>DNS:ISC-BIND-PACKAGE-DOS</predefined-attacks>
+ <predefined-attacks>DNS:MS-ISA-CE</predefined-attacks>
+ <predefined-attacks>DNS:NGINX-RESOLVER-DOS</predefined-attacks>
+ <predefined-attacks>DNS:OVERFLOW:GNU-C-GLIBC</predefined-attacks>
+ <predefined-attacks>DNS:OVERFLOW:TFTPD32</predefined-attacks>
+ <predefined-attacks>DNS:PDNS-AUTHSERV-DOS</predefined-attacks>
+ <predefined-attacks>DNS:POWERDNS-NAMESRVR-UDP-DOS</predefined-attacks>
+ <predefined-attacks>DNS:POWERDNS-NAMSRVR-TCP-DOS</predefined-attacks>
+ <predefined-attacks>DNS:REPERR:NULL-RDATA-LEN</predefined-attacks>
+ <predefined-attacks>DNS:RRSIG-QUERY</predefined-attacks>
+ <predefined-attacks>DNS:SQUID-DNS-DOS-1</predefined-attacks>
+ <predefined-attacks>DNS:TUNNEL:I2P-DNS-QUERY</predefined-attacks>
+ <predefined-attacks>DNS:TUNNEL:NULL-RECORD</predefined-attacks>
+ <predefined-attacks>DNS:WORDPRESS-SOAK-SOAK-MALWARE</predefined-attacks>
+ <predefined-attacks>DOS:DELL-NETVAULT-DOS</predefined-attacks>
+ <predefined-attacks>DOS:FREEBSD-ROUTED-DAEMON</predefined-attacks>
+ <predefined-attacks>DOS:SLOWHTTPTEST-TOOL</predefined-attacks>
+ <predefined-attacks>DOS:WINDOWS:HTTP-SYS</predefined-attacks>
+ <predefined-attacks>DOS:WINDOWS:ISCSI-TARGET</predefined-attacks>
+ <predefined-attacks>HTTP:ADOBE-FLASH-PLAYER-BO</predefined-attacks>
+ <predefined-attacks>HTTP:ADOBE-FLASHPLYR-PRIV-ESC</predefined-attacks>
+ <predefined-attacks>HTTP:ANGLER-EXPKIT-URI</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:APACHE-CHUNKREQ-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:APR-UTIL-LIB-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:COUCHDB-UUID-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:HTTPD-ERROR-400</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:HTTPD-MODLOG-COOKIE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:MOD-LOG-CONFIG-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:MOD-REWRITE-CMD-EXE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:REST-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:REV-PROXY-EXPLOIT</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-CI-SECBYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-OGNL-CE</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-RST-DMI-EXEC</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-URL-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:APACHE:STRUTS-XSLT-FI</predefined-attacks>
+ <predefined-attacks>HTTP:BACKDOOR-UPATRE-UA</predefined-attacks>
+ <predefined-attacks>HTTP:C99-SHELL-BACKDOOR</predefined-attacks>
+ <predefined-attacks>HTTP:CARBERP-BACKDOOR-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:CGI:BASH-INJECTION-HEADER</predefined-attacks>
+ <predefined-attacks>HTTP:CGI:MS-OFFICE-URL-BOF</predefined-attacks>
+ <predefined-attacks>HTTP:CISCO:DOWNLOADSERVLET-FU</predefined-attacks>
+ <predefined-attacks>HTTP:CLAMAV-ENCRYPT-PDF-MC2</predefined-attacks>
+ <predefined-attacks>HTTP:CLANSPHERE-COOKIE-LFI</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-ENCODING</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-LANG</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-AUTH-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-CONT-TYPE</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-CONTENT-MD5</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-HOST-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:HTTP-REFERER-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:DIR:ZIMBRA-SERVER-LDAP</predefined-attacks>
+ <predefined-attacks>HTTP:DLINK-AUTHENTICATION-BO</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:APACHE-TOMCAT-CHUNKED2</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:HAPROXY-REQDENY</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:MIT-KERBEROS-5-POLICY</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:PHP-UPLOAD</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:SCHNEIDER-EXPRT-SCADA</predefined-attacks>
+ <predefined-attacks>HTTP:DOS:SQUID-HDR-RANGE</predefined-attacks>
+ <predefined-attacks>HTTP:DRUPAL-CODER-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:EK-ANGLER-JAVA</predefined-attacks>
+ <predefined-attacks>HTTP:EXPLOIT:ILLEGAL-HOST-CHAR</predefined-attacks>
+ <predefined-attacks>HTTP:FORTINET-HELLO-MSG-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:HTTP-INVALID-PORT-VALUE</predefined-attacks>
+ <predefined-attacks>HTTP:HTTP_PROXY-ATTACK</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ASP-NET-MVC-SEC-BYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ASPX-URL</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ASPX-URL-1</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-1</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-2</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:IIS-6-7-AUTH-BYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:INT-OVERFLOW-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:WEB-CONFIG-INFO-LEAK</predefined-attacks>
+ <predefined-attacks>HTTP:IIS:WEBDAV:WINDOWS-SHELL</predefined-attacks>
+ <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI</predefined-attacks>
+ <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI-TCP</predefined-attacks>
+ <predefined-attacks>HTTP:INVALID:EXPECT</predefined-attacks>
+ <predefined-attacks>HTTP:JAVA-UPDATE-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:JENKINS-CI-SERVER-CE</predefined-attacks>
+ <predefined-attacks>HTTP:LIBGD-GD2GETHEADER-IO</predefined-attacks>
+ <predefined-attacks>HTTP:LIBGD-HEAP-BO</predefined-attacks>
+ <predefined-attacks>HTTP:LIBREOFFICE-INTEGR-UNDRFLW</predefined-attacks>
+ <predefined-attacks>HTTP:MALICIOUS-SESSION-COOKIE</predefined-attacks>
+ <predefined-attacks>HTTP:MAMBO-MYSQL-INF-DISCLOSURE</predefined-attacks>
+ <predefined-attacks>HTTP:MANAGENGINE-EVTLG-INF-DISC</predefined-attacks>
+ <predefined-attacks>HTTP:MAXTHON-HISTORY-XSS</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:AVIRA-MGNT-HEADER-BOF</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:CHASYS-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:COOL-EXKIT-JAR-DL</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:CUTEZIP-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:CVE-2014-6332-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:DAZ-STUDIO-SCRIPT-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:ERS-VIEWER-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:GITLIST-URI-REQ-CE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:GRAPHITE-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:GSM-SIMEDIT-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:IRFVIEW-JP2-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:JBOSS-SEAM-EL-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:JOOMLA-UNSER-CE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MAPLE-MAPLET-CMD-EXEC</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MINIUPNPD-SOAP-ACTION</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MS-FOREFRONT-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:MS-OWA-URL-REDIR</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:RUBY-RAILS-SECRET-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:SPLUNK-CUSTOM-APP-CE</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:WESTERN-DIGITAL-LFI</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:WINRAR-FILENM-SPOOF</predefined-attacks>
+ <predefined-attacks>HTTP:MISC:WIRESHARK-LUA-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MONKEY-HTTPD-BO</predefined-attacks>
+ <predefined-attacks>HTTP:MS-VBSCRIPT-UAF-RCE</predefined-attacks>
+ <predefined-attacks>HTTP:MS-WIN-FOLDER-GUID-CE</predefined-attacks>
+ <predefined-attacks>HTTP:NAGIOS-CONFMGR-SQLINJ</predefined-attacks>
+ <predefined-attacks>HTTP:NEUTRINO-EK-SB</predefined-attacks>
+ <predefined-attacks>HTTP:NGINX-RQST-URI-SECBYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:NODEJS-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:NOVELL:GROUPWISE-NETAGT-BO</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:CONF-ACCESS</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:GENERIC-SIGNATUR-MC</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:OUTSIDE-PRDOX-BO2</predefined-attacks>
+ <predefined-attacks>HTTP:ORACLE:SSO-ACCESS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:CDF-INFINITE-LOOP-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:CORE-INT-OF-CE</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:DATEINTERVAL-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:EXIF-NULL-PTR-DEREF</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:INVISION-IPS-COMM</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:JOOMLA-ADMIN-SCAN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:OPENEMR-GLOBALS-AB</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:PHAR-PARSE-TARFILE-ID</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:PHPMYADMIN:SETUP-SCAN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:PHPSPLOIT-POSTEXP</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:SPL-OBJECT-UNSERIALIZE</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:TAR-FILE-PTR</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:WP-BRUTE-FORCE-LOGIN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:WP-INCLUDES-ACCESS</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:WP-README-SCAN</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:XAMPP-FILE-WRITE</predefined-attacks>
+ <predefined-attacks>HTTP:PHP:ZIPARCHIVE-IO</predefined-attacks>
+ <predefined-attacks>HTTP:PROXY:SQUID-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:REGIN-CNC-TRAFFIC</predefined-attacks>
+ <predefined-attacks>HTTP:REQERR:INV-IPV6-HOST-HDR</predefined-attacks>
+ <predefined-attacks>HTTP:REQERR:NULL-IN-HEADER</predefined-attacks>
+ <predefined-attacks>HTTP:SOLARWINDS-AUTH-BYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:SOLARWINDS-POLICYBYPASS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:AND-NUMBER-EQUALS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CHAR</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CHAR-ENCODE</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:COMMENT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:COMPARISON</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONCAT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONVERT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:CONVERT-INJ-OF</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HAVIJ-UA</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:HTTP-REQ-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:INSERT-VALUES</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:INTO-OUTFILE</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:IS_SRVROLEMEMBER</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:MS-SQL-FUNCTIONS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:MS-SQL-TABLE-NAME</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:MYSQL-TABLE-NAME</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:NULLBYTE-COMMENT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:PL-SQL</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:PROC-GENERIC</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:SLASH-STAR</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:SQLMAP-ACTIVITY</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:SYSOBJECTS</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:UA-HDR-1</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:UA-HDR-3</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:UNION-SELECT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:USER-ADD</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:VERSION-DETECT</predefined-attacks>
+ <predefined-attacks>HTTP:SQL:INJ:WAITFOR-DELAY</predefined-attacks>
+ <predefined-attacks>HTTP:SQUID-BUMP-DOS</predefined-attacks>
+ <predefined-attacks>HTTP:STATIC-SERVER-BOF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ACTIVEX:KVIEW-KCHARTXY</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:2013-5065-PDF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:ACROFORM-NULL-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CONVFILTER-UAF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-2985-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3791-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3959-OF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2010-2202-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-0622-SB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3353</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3355-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5324-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5325-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5329-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0511-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0512-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0517-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0521</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0522-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0523-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0524-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0531-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0537-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0538-UF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0539-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0545-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0547-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0548-PB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0550-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0553-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0554</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0555-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0559-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0564-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0565-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0567-OF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0568-SE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0576-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0577-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0578-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0580-SB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0584-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0586-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-4671</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8440-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8441-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8447-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8449-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8450-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8451-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8455-UF</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8459-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8460-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8461-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9159-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9160-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9162-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0087-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0089-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0090-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0093-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0301-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0302-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0303-SB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0305-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0306-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0307-DS</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0313-ID</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0314-BO</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0315-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0317-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0319-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0320-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0321-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0322-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0323-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0324-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0325-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0326-DS</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0328-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0329-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0330-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0333-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0334-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0335-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0337-PB</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0338-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0339-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0340-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0341-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0342-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0346-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0347-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0348-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0349-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0350-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0351-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0352-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0353-CE</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0354-MC</predefined-attacks>
+ <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0355-MC</predefined-attacks>
+ </attacks>
+ </match>
+ <then>
+ <action>
+ <no-action/>
+ </action>
+ <ip-action>
+ <ip-notify/>
+ <target>source-address</target>
+ <log/>
+ <log-create/>
+ </ip-action>
+ <notification>
+ <log-attacks>
+ <alert/>
+ </log-attacks>
+ </notification>
+ </then>
+ </rule>
+ <rule>
+ <name>DBE-Q-IPS-policy-template-2</name>
+ <match>
+ <from-zone>any</from-zone>
+ <to-zone>any</to-zone>
+ <application>default</application>
+ <attacks>
+ <predefined-attack-groups>[Recommended]Critical - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - All</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Critical</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Info</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Major</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Minor</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]ICMP - Warning</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Info - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Major - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Minor - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Critical - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - All</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Critical</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Info</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Major</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Minor</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_ICMP - Warning</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Info - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Major - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Minor - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Misc_Warning - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Critical - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - All</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Critical</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Info</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Major</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Minor</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_ICMP - Warning</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Info - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Major - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Minor - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Response_Warning - ICMP</predefined-attack-groups>
+ <predefined-attack-groups>[Recommended]Warning - ICMP</predefined-attack-groups>
+ </attacks>
+ </match>
+ <then>
+ <action>
+ <recommended/>
+ </action>
+ <ip-action>
+ <ip-notify/>
+ <target>source-address</target>
+ </ip-action>
+ <notification>
+ <log-attacks>
+ <alert/>
+ </log-attacks>
+ </notification>
+ </then>
+ </rule>
+ </rulebase-ips>
+ </idp-policy>
+ <active-policy>Space-IPS-Policy</active-policy>
+ </idp>
+ <forwarding-options>
+ <family>
+ <inet6>
+ <mode>flow-based</mode>
+ </inet6>
+ </family>
+ </forwarding-options>
+ <screen>
+ <ids-option>
+ <name>untrust-screen</name>
+ <alarm-without-drop/>
+ <icmp>
+ <ip-sweep>
+ <threshold>5000</threshold>
+ </ip-sweep>
+ <fragment/>
+ <large/>
+ <ping-death/>
+ </icmp>
+ <ip>
+ <bad-option/>
+ <record-route-option/>
+ <timestamp-option/>
+ <security-option/>
+ <stream-option/>
+ <spoofing/>
+ <source-route-option/>
+ <loose-source-route-option/>
+ <strict-source-route-option/>
+ <unknown-protocol/>
+ <tear-drop/>
+ </ip>
+ <tcp>
+ <syn-fin/>
+ <fin-no-ack/>
+ <tcp-no-flag/>
+ <syn-frag/>
+ <port-scan>
+ <threshold>5000</threshold>
+ </port-scan>
+ <syn-ack-ack-proxy>
+ </syn-ack-ack-proxy>
+ <syn-flood>
+ <alarm-threshold>1024</alarm-threshold>
+ <attack-threshold>200</attack-threshold>
+ <source-threshold>1024</source-threshold>
+ <destination-threshold>2048</destination-threshold>
+ <undocumented><queue-size>2000</queue-size></undocumented>
+ <timeout>20</timeout>
+ </syn-flood>
+ <land/>
+ </tcp>
+ </ids-option>
+ </screen>
+ <nat>
+ <source>
+ <pool>
+ <name>sp_dmzpfsnat</name>
+ <address>
+ <name>10.68.16.13/32</name>
+ </address>
+ <address>
+ <name>10.68.16.14/32</name>
+ </address>
+ <address>
+ <name>10.68.16.15/32</name>
+ </address>
+ <address>
+ <name>10.68.16.16/32</name>
+ </address>
+ <port>
+ <range>
+ <low>1024</low>
+ <to>
+ <high>63486</high>
+ </to>
+ </range>
+ </port>
+ <pool-utilization-alarm>
+ <raise-threshold>80</raise-threshold>
+ <clear-threshold>70</clear-threshold>
+ </pool-utilization-alarm>
+ </pool>
+ <rule-set>
+ <name>rs_mis2dmzpfsnat</name>
+ <from>
+ <zone>sz_dbemis</zone>
+ </from>
+ <to>
+ <zone>trust</zone>
+ </to>
+ <rule>
+ <name>nr_dmzpsnat</name>
+ <src-nat-rule-match>
+ <destination-address>10.68.16.4/32</destination-address>
+ <destination-address>10.68.16.5/32</destination-address>
+ </src-nat-rule-match>
+ <then>
+ <source-nat>
+ <pool>
+ <pool-name>sp_dmzpfsnat</pool-name>
+ </pool>
+ </source-nat>
+ </then>
+ </rule>
+ </rule-set>
+ </source>
+ <destination>
+ <pool>
+ <name>dp_dmzpf01ap1dnat</name>
+ <address>
+ <ipaddr>10.68.16.4/32</ipaddr>
+ </address>
+ </pool>
+ <pool>
+ <name>dp_dmzpf02ap1dnat</name>
+ <address>
+ <ipaddr>10.68.16.5/32</ipaddr>
+ </address>
+ </pool>
+ <rule-set>
+ <name>rs_mis2dmzpfdnat</name>
+ <from>
+ <zone>sz_dbemis</zone>
+ </from>
+ <rule>
+ <name>nr_p01ap1dnat</name>
+ <dest-nat-rule-match>
+ <destination-address>
+ <dst-addr>12.102.197.133/32</dst-addr>
+ </destination-address>
+ </dest-nat-rule-match>
+ <then>
+ <destination-nat>
+ <pool>
+ <pool-name>dp_dmzpf01ap1dnat</pool-name>
+ </pool>
+ </destination-nat>
+ </then>
+ </rule>
+ <rule>
+ <name>nr_p02ap1dnat</name>
+ <dest-nat-rule-match>
+ <destination-address>
+ <dst-addr>12.102.197.134/32</dst-addr>
+ </destination-address>
+ </dest-nat-rule-match>
+ <then>
+ <destination-nat>
+ <pool>
+ <pool-name>dp_dmzpf02ap1dnat</pool-name>
+ </pool>
+ </destination-nat>
+ </then>
+ </rule>
+ </rule-set>
+ </destination>
+ <proxy-arp>
+ <interface>
+ <name>reth0.0</name>
+ <address>
+ <name>12.102.197.133/32</name>
+ </address>
+ <address>
+ <name>12.102.197.134/32</name>
+ </address>
+ </interface>
+ <interface>
+ <name>reth1.0</name>
+ <address>
+ <name>10.68.16.13/32</name>
+ </address>
+ <address>
+ <name>10.68.16.14/32</name>
+ </address>
+ <address>
+ <name>10.68.16.15/32</name>
+ </address>
+ <address>
+ <name>10.68.16.16/32</name>
+ </address>
+ </interface>
+ </proxy-arp>
+ </nat>
+ <policies>
+ <policy>
+ <from-zone-name>trust</from-zone-name>
+ <to-zone-name>trust</to-zone-name>
+ <policy>
+ <name>default-permit</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <permit>
+ </permit>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>trust</from-zone-name>
+ <to-zone-name>untrust</to-zone-name>
+ <policy>
+ <name>default-permit</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <permit>
+ </permit>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>sz_dbemis</from-zone-name>
+ <to-zone-name>trust</to-zone-name>
+ <policy>
+ <name>sp_bwxspapi</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>as_bwdmzpxspapsrvrs_2</destination-address>
+ <application>ps_bwapi_3</application>
+ </match>
+ <then>
+ <permit>
+ </permit>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ <count>
+ </count>
+ </then>
+ </policy>
+ <policy>
+ <name>sp_bwpdeny</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <deny/>
+ <log>
+ <session-init/>
+ </log>
+ <count>
+ </count>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>trust</from-zone-name>
+ <to-zone-name>sz_dbemis</to-zone-name>
+ <policy>
+ <name>sp_bwzdeny</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <deny/>
+ <log>
+ <session-init/>
+ </log>
+ <count>
+ </count>
+ </then>
+ </policy>
+ </policy>
+ <policy>
+ <from-zone-name>untrust</from-zone-name>
+ <to-zone-name>trust</to-zone-name>
+ <policy>
+ <name>default-deny</name>
+ <match>
+ <source-address>any</source-address>
+ <destination-address>any</destination-address>
+ <application>any</application>
+ </match>
+ <then>
+ <deny/>
+ <log>
+ <session-init/>
+ <session-close/>
+ </log>
+ </then>
+ </policy>
+ </policy>
+ </policies>
+ <zones>
+ <security-zone>
+ <name>trust</name>
+ <tcp-rst/>
+ <address-book>
+ <address>
+ <name>ad_bwxsp02ap1pf</name>
+ <ip-prefix>10.68.16.5/32</ip-prefix>
+ </address>
+ <address>
+ <name>ad_bwxsp01ap1pf_1</name>
+ <ip-prefix>10.68.16.4/32</ip-prefix>
+ </address>
+ <address-set>
+ <name>as_bwdmzpxspapsrvrs_2</name>
+ <address>
+ <name>ad_bwxsp01ap1pf_1</name>
+ </address>
+ <address>
+ <name>ad_bwxsp02ap1pf</name>
+ </address>
+ </address-set>
+ </address-book>
+ <host-inbound-traffic>
+ <system-services>
+ <name>all</name>
+ </system-services>
+ <protocols>
+ <name>all</name>
+ </protocols>
+ </host-inbound-traffic>
+ <interfaces>
+ <name>reth1.0</name>
+ </interfaces>
+ </security-zone>
+ <security-zone>
+ <name>untrust</name>
+ <screen>untrust-screen</screen>
+ </security-zone>
+ <security-zone>
+ <name>sz_dbemis</name>
+ <screen>untrust-screen</screen>
+ <interfaces>
+ <name>reth0.0</name>
+ </interfaces>
+ </security-zone>
+ </zones>
+ </security>
+ <interfaces>
+ <interface>
+ <name>ge-0/0/1</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth0</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>ge-0/0/2</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth1</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>ge-7/0/1</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth0</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>ge-7/0/2</name>
+ <gigether-options>
+ <redundant-parent>
+ <parent>reth1</parent>
+ </redundant-parent>
+ </gigether-options>
+ </interface>
+ <interface>
+ <name>fab0</name>
+ <fabric-options>
+ <member-interfaces>
+ <name>ge-0/0/0</name>
+ </member-interfaces>
+ </fabric-options>
+ </interface>
+ <interface>
+ <name>fab1</name>
+ <fabric-options>
+ <member-interfaces>
+ <name>ge-7/0/0</name>
+ </member-interfaces>
+ </fabric-options>
+ </interface>
+ <interface>
+ <name>fxp0</name>
+ <unit>
+ <name>0</name>
+ </unit>
+ </interface>
+ <interface>
+ <name>reth0</name>
+ <redundant-ether-options>
+ <redundancy-group>1</redundancy-group>
+ </redundant-ether-options>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <filter>
+ <input>
+ <filter-name>ff_pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>12.102.197.132/25</name>
+ </address>
+ </inet>
+ <inet6>
+ <filter>
+ <input>
+ <filter-name>ff_v6pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>2001:1890:1001:23ed::3:1/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ed::3:2/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ed::3:3/64</name>
+ </address>
+ </inet6>
+ </family>
+ </unit>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ <redundant-ether-options>
+ <redundancy-group>1</redundancy-group>
+ </redundant-ether-options>
+ <unit>
+ <name>0</name>
+ <family>
+ <inet>
+ <filter>
+ <input>
+ <filter-name>ff_pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>10.68.16.12/22</name>
+ </address>
+ </inet>
+ <inet6>
+ <filter>
+ <input>
+ <filter-name>ff_v6pdscp</filter-name>
+ </input>
+ </filter>
+ <address>
+ <name>2001:1890:1001:23ec::3:1/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:2/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:3/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:4/64</name>
+ </address>
+ <address>
+ <name>2001:1890:1001:23ec::3:5/64</name>
+ </address>
+ </inet6>
+ </family>
+ </unit>
+ </interface>
+ </interfaces>
+ <snmp>
+ <community>
+ <name>vsbk68</name>
+ <authorization>read-only</authorization>
+ <clients>
+ <name>130.6.45.42/32</name>
+ </clients>
+ <clients>
+ <name>130.6.45.41/32</name>
+ </clients>
+ <clients>
+ <name>130.6.44.254/32</name>
+ </clients>
+ <clients>
+ <name>130.6.44.253/32</name>
+ </clients>
+ <clients>
+ <name>135.25.175.114/32</name>
+ </clients>
+ <clients>
+ <name>135.21.235.37/32</name>
+ </clients>
+ </community>
+ <community>
+ <name>space15</name>
+ <authorization>read-write</authorization>
+ <clients>
+ <name>135.144.0.60/32</name>
+ </clients>
+ <clients>
+ <name>135.144.0.59/32</name>
+ </clients>
+ <clients>
+ <name>135.144.0.61/32</name>
+ </clients>
+ </community>
+ <trap-group>
+ <name>GFP</name>
+ <version>v2</version>
+ <destination-port>162</destination-port>
+ <targets>
+ <name>135.89.33.175</name>
+ </targets>
+ <targets>
+ <name>199.37.245.24</name>
+ </targets>
+ </trap-group>
+ <trap-group>
+ <name>space</name>
+ <targets>
+ <name>135.144.0.60</name>
+ </targets>
+ </trap-group>
+ <health-monitor>
+ <idp>
+ </idp>
+ </health-monitor>
+ </snmp>
+ <routing-options>
+ <interface-routes>
+ <rib-group>
+ <inet>rg_mis2dmzp</inet>
+ <inet6>rg_v6mis2dmzp</inet6>
+ </rib-group>
+ </interface-routes>
+ <static>
+ <route>
+ <name>0.0.0.0/0</name>
+ <next-hop>135.69.228.1</next-hop>
+ </route>
+ </static>
+ <rib-groups>
+ <name>rg_mis2dmzp</name>
+ <import-rib>vrf-untrust.inet.0</import-rib>
+ <import-rib>inet.0</import-rib>
+ </rib-groups>
+ <rib-groups>
+ <name>rg_v6mis2dmzp</name>
+ <import-rib>vrf-untrust.inet6.0</import-rib>
+ <import-rib>inet6.0</import-rib>
+ </rib-groups>
+ </routing-options>
+ <class-of-service>
+ <interfaces>
+ <interface>
+ <name>reth0</name>
+ <unit>
+ <name>0</name>
+ <rewrite-rules>
+ <dscp>
+ <name>cr_pdscpaf</name>
+ </dscp>
+ <dscp-ipv6>
+ <name>cr_v6pdscpaf</name>
+ </dscp-ipv6>
+ </rewrite-rules>
+ </unit>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ <unit>
+ <name>0</name>
+ <rewrite-rules>
+ <dscp>
+ <name>cr_pdscpaf</name>
+ </dscp>
+ <dscp-ipv6>
+ <name>cr_v6pdscpaf</name>
+ </dscp-ipv6>
+ </rewrite-rules>
+ </unit>
+ </interface>
+ </interfaces>
+ <rewrite-rules>
+ <dscp>
+ <name>cr_pdscpaf</name>
+ <forwarding-class>
+ <name>assured-forwarding</name>
+ <loss-priority>
+ <name>low</name>
+ <code-point>011010</code-point>
+ </loss-priority>
+ </forwarding-class>
+ </dscp>
+ <dscp-ipv6>
+ <name>cr_v6pdscpaf</name>
+ <forwarding-class>
+ <name>assured-forwarding</name>
+ <loss-priority>
+ <name>low</name>
+ <code-point>011010</code-point>
+ </loss-priority>
+ </forwarding-class>
+ </dscp-ipv6>
+ </rewrite-rules>
+ </class-of-service>
+ <firewall>
+ <family>
+ <inet>
+ <filter>
+ <name>ff_pdscp</name>
+ <term>
+ <name>fr_pdscp</name>
+ <from>
+ <interface>
+ <name>reth0</name>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ </interface>
+ </from>
+ <then>
+ <forwarding-class>assured-forwarding</forwarding-class>
+ <accept/>
+ </then>
+ </term>
+ </filter>
+ </inet>
+ <inet6>
+ <filter>
+ <name>ff_v6pdscp</name>
+ <term>
+ <name>fr_v6pdscp</name>
+ <from>
+ <interface>
+ <name>reth0</name>
+ </interface>
+ <interface>
+ <name>reth1</name>
+ </interface>
+ </from>
+ <then>
+ <forwarding-class>assured-forwarding</forwarding-class>
+ <accept/>
+ </then>
+ </term>
+ </filter>
+ </inet6>
+ </family>
+ </firewall>
+ <routing-instances>
+ <instance>
+ <name>vrf-untrust</name>
+ <instance-type>virtual-router</instance-type>
+ <interface>
+ <name>reth0.0</name>
+ </interface>
+ <routing-options>
+ <interface-routes>
+ <rib-group>
+ <inet>rg_mis2dmzp</inet>
+ <inet6>rg_v6mis2dmzp</inet6>
+ </rib-group>
+ </interface-routes>
+ <rib>
+ <name>vrf-untrust.inet6.0</name>
+ <static>
+ <route>
+ <name>0::/0</name>
+ <next-hop>2001:1890:1001:23ed::1</next-hop>
+ </route>
+ </static>
+ </rib>
+ <static>
+ <route>
+ <name>0.0.0.0/0</name>
+ <next-hop>12.102.197.129</next-hop>
+ </route>
+ </static>
+ </routing-options>
+ </instance>
+ </routing-instances>
+ <applications>
+ <application>
+ <name>ap_xsi-xml-https</name>
+ <protocol>tcp</protocol>
+ <destination-port>443</destination-port>
+ </application>
+ <application-set>
+ <name>ps_bwapi_3</name>
+ <application>
+ <name>ap_xsi-xml-https</name>
+ </application>
+ </application-set>
+ </applications>
+ </configuration>
\ No newline at end of file diff --git a/docs/index.rst b/docs/index.rst index 4279da013..e8e3f5efb 100644 --- a/docs/index.rst +++ b/docs/index.rst @@ -10,3 +10,4 @@ APPC Documentation Repository APPC Logging Guide/APPC Logging Guide APPC User Guide/APPC User Guide APPC OAM API Guide/APPC OAM API Guide + APPC CDT Guide/APPC CDT Guide |