aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
Diffstat (limited to 'docs')
-rw-r--r--docs/APPC CDT Guide/APPC CDT Guide.rst373
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image0.pngbin146798 -> 143619 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image1.pngbin130527 -> 92941 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image10.pngbin199197 -> 161038 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image11.pngbin198896 -> 163785 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image12.pngbin221937 -> 168893 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image13.pngbin191642 -> 163047 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image14.pngbin224780 -> 172622 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image15.pngbin291249 -> 227636 bytes
-rw-r--r--docs/APPC CDT Guide/media/image15a.pngbin0 -> 177067 bytes
-rw-r--r--docs/APPC CDT Guide/media/image15b.pngbin0 -> 152827 bytes
-rw-r--r--docs/APPC CDT Guide/media/image15c.pngbin0 -> 156320 bytes
-rw-r--r--docs/APPC CDT Guide/media/image15d.pngbin0 -> 162581 bytes
-rw-r--r--docs/APPC CDT Guide/media/image15e.pngbin0 -> 157336 bytes
-rw-r--r--docs/APPC CDT Guide/media/image15f.pngbin0 -> 155737 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image16.pngbin113387 -> 244692 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image17.pngbin108081 -> 213518 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image18.pngbin237533 -> 171016 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image19.pngbin91296 -> 130212 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image2.pngbin119669 -> 138015 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image20.pngbin104655 -> 232234 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image21.pngbin102969 -> 122848 bytes
-rwxr-xr-xdocs/APPC CDT Guide/media/image22.pngbin100143 -> 0 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image23.pngbin221184 -> 214188 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image24.pngbin138210 -> 155687 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image26.pngbin104743 -> 168504 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image27.pngbin149854 -> 148849 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image28.pngbin190188 -> 177667 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image29.pngbin235176 -> 234595 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image3.pngbin124622 -> 130209 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image30.pngbin208918 -> 212685 bytes
-rw-r--r--docs/APPC CDT Guide/media/image30a.pngbin0 -> 179848 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image31.pngbin140611 -> 129285 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image32.pngbin107080 -> 96870 bytes
-rw-r--r--docs/APPC CDT Guide/media/image33.pngbin118593 -> 133699 bytes
-rw-r--r--docs/APPC CDT Guide/media/image34.pngbin120347 -> 136853 bytes
-rw-r--r--docs/APPC CDT Guide/media/image35.pngbin217321 -> 259245 bytes
-rw-r--r--docs/APPC CDT Guide/media/image36.pngbin132421 -> 160763 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image4.pngbin204691 -> 133181 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image5.pngbin127271 -> 94423 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image6.pngbin94450 -> 62694 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image7.pngbin202419 -> 130021 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image8.pngbin105428 -> 74987 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/image9.pngbin98197 -> 107306 bytes
-rw-r--r--[-rwxr-xr-x]docs/APPC CDT Guide/media/imageA.pngbin19021 -> 14058 bytes
-rw-r--r--docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt4
-rw-r--r--docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt31
-rw-r--r--docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json96
-rw-r--r--docs/APPC CDT Guide/simple xml config.txt1535
-rw-r--r--docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt1535
-rw-r--r--docs/appc-Build-20180518-NexusIQ Report.pdfbin0 -> 255291 bytes
-rw-r--r--docs/release-notes.rst150
52 files changed, 325 insertions, 3399 deletions
diff --git a/docs/APPC CDT Guide/APPC CDT Guide.rst b/docs/APPC CDT Guide/APPC CDT Guide.rst
index 1b0f2234b..3fb0709bd 100644
--- a/docs/APPC CDT Guide/APPC CDT Guide.rst
+++ b/docs/APPC CDT Guide/APPC CDT Guide.rst
@@ -119,7 +119,7 @@ Onboarding Process Steps:
3. Create a **parameter definition** file describing instance-specific
parameters in the template.
- - Once you have a template, use the **Synchronize** button to
+ - Once you have a template, use the **Synchronize Template Parameters** button to
automatically create/update a parameter definition file (and a
parameter name-value pair file) based on the template.
@@ -138,7 +138,7 @@ Onboarding Process Steps:
4. Create a **parameter name-value pair file** for those parameters.
- - Once you have a template, use the **Synchronize** button to
+ - Once you have a template, use the **Synchronize Template Parameters** button to
automatically create a parameter name-value pair file (and a
parameter definition file) based on the template.
@@ -146,19 +146,18 @@ Onboarding Process Steps:
instance-specific data into the user input spreadsheet used at run
time. The parameter name-value file can also be used to automatically
create a template via the **Merge** function as described in step 2.
+
+ - You can also use the **Synchronize With Name Values** button to update the parameter definitions to match an existing parameter name-values pair file.
5. **Test** the template in your test environment using the **TEST** function of APPC CDT
- - Use the **Save to APP-C** button in the CDT GUI to save the
- artifacts for your VNF to APPC.
+ - Use the **Save All to APP-C** button in the CDT GUI to save the
+ artifacts for your VNF to APPC. This makes the current version of artifacts available to both the APPC CDT and APPC Run Time.
- - Prepare a “user input” excel file on your PC and upload it to the
- **TEST** function in the APPC CDT.
+ - Prepare a “user input” excel file on your PC and upload it to the APPC CDT.
- - Use the **TEST** function in the APPC CDT to execute the on-boarded action on the VNF. Verify the VNF works as expected.
+ - **Execute** the onboarded action on the VNF. View test progress and test results. .
- **NOTE** The **TEST** function is currently being developed as part of Beijing release and screen shots in this document are not yet updated to show this new function yet.
-
The screen shots in following sections illustrate how to use the APPC CDT GUI for each step.
Artifacts used for Onboarding:
@@ -194,8 +193,8 @@ optional for templates of other actions.
OpenStack and REST protocols do not use a template or parameter
definitions or name-value pairs.
-Using the APPC Design Tool for VNF Onboarding
-=============================================
+Using the APPC Controller Design Tool for VNF Onboarding
+========================================================
Go to the APPC CDT GUI in the test environment using a Firefox browser.
@@ -243,7 +242,7 @@ If you choose to create a new VNF, you will see a pop-up box like this.
|image9|
-Enter the VNF Type (and optional VNFC Type) and click next.
+Enter the VNF Type (and optional VNFC Type) and click next. (The optional VNFC check box is explained later)
Alternatively, you can leave the VNF type blank and choose “PROCEED
ANYWAY” if you want to proceed to the Reference Data screen where you
@@ -276,7 +275,40 @@ for each file, but the windows are all placed on top of each other. You
can drag the pop-up windows if you want to see them all at the same
time.
-|image15|
+|
+
+
+
+|
+
+When using the Mozilla Firefox browser, selecting “Download to PC will display a dialog box giving you a choice of opening or saving the files, and an option to “Do this automatically for files like this for now on”. Choosing “save” and checking this option is a convenient way to easily save multiple downloaded artifacts from APP-C to your PC
+
+|image15a|
+
+Note regarding VNFC Type
+~~~~~~~~~~~~~~~~~~~~~~~~
+
+There are a limited number of VNF’s that are identified by both VNF type and VNFC type. When adding a new VNF of this kind to APP-C, enter the VNF type and check the VNFC box in the pop-up window, and choose NEXT.
+
+Alternatively, you can leave the VNF type blank and choose “PROCEED ANYWAY” if you want to proceed to the Reference Data screen where you can populate the VNF reference data by uploading an existing Reference File or by manually entering it.
+
+|image15b|
+
+On the subsequent Reference screen, you must add the VNFC type(s).
+
+|image15c|
+
+Enter the new VNFC type and click ADD to add it to a drop-down list of VNFC types for this VNF. Repeat for each VNFC type you wish to add.
+
+|image15d|
+
+Choose the desired VNFC Type from the drop-down list of VNFC types.
+
+|image15e|
+
+In the VNFC section, you must re-enter the VNFC type to match what you previously selected.
+
+|image15f|
Populate OpenStack actions for a VM
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -305,7 +337,7 @@ APPC will import the data from the excel and display the results.
The Template and Parameter Definition tabs do not apply to OpenStack
commands.
-REFERENCE DATA SCREEN HELP
+**REFERENCE DATA SCREEN HELP**
+--------------------------+------------------------------------------------------------------------------------------------------------------+
| **Field/Object** | **Description** |
@@ -352,63 +384,72 @@ REFERENCE DATA SCREEN HELP
This table shows which actions and protocols are currently available for
on-boarding with the Beijing release.
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Action** | **Netconf/ | **Ansible** | **Chef** | **REST** | **OpenStack |
-| | Restconf** | | | | (VM Level)** |
-+========================================+==============+===============+============+============+================+
-| **AttachVolume** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Configure** | YES | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Config Modify** | YES | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Config Backup** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Config Restore** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **ConfigScaleOut** | YES   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **DetachVolume** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Evacuate** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **GetRunning Config\*** | YES | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **HealthCheck** |   | YES | YES | YES |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Migrate** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **QuiesceTraffic** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Rebuild** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Restart** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **ResumeTraffic** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Snapshot** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Start** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Start Application** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Stop** |   |   |   |   | YES |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **Stop Application** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **UpgradeBackout** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **UpgradeBackup** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **UpgradePostCheck** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **UpgradePreCheck** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
-| **UpgradeSoftware** |   | YES | YES |   |   |
-+----------------------------------------+--------------+---------------+------------+------------+----------------+
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Action** |**Netconf-XML**| **Ansible** | **Chef** | **REST** | **OpenStack** |**Protocol is**|
+| |**Restconf** | | | | **(VM Level)** |**Not** |
+| | | | | | |**Applicable** |
++========================================+===============+===============+============+============+================+===============+
+| **ActionStatus** |   |   |   |   | | NA |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **AttachVolume** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Audit** | YES  | YES  | YES | YES  | | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **CheckLock** | | | |   | | NA |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Configure** | YES | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Config Modify** | YES | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Config Backup** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Config Restore** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **ConfigScaleOut** | YES   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **DetachVolume** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Evacuate** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **HealthCheck** |   | YES | YES | YES |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Lock** |   | | | |   | NA |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Migrate** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **QuiesceTraffic** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Rebuild** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Restart** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **ResumeTraffic** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Snapshot** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Start** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Start Application** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Stop** |   |   |   |   | YES | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Stop Application** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Sync** | YES  | YES  | YES  |  YES | | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **Unlock** |   |   |   |   | | NA |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **UpgradeBackout** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **UpgradeBackup** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **UpgradePostCheck** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **UpgradePreCheck** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
+| **UpgradeSoftware** |   | YES | YES |   |   | |
++----------------------------------------+---------------+---------------+------------+------------+----------------+---------------+
- \* GetRunningConfig is used internally by APP-C and is not callable by clients via the APP-C API.
-
Create a template from a “golden” configuration file
@@ -455,24 +496,19 @@ uploaded to APP-C CDT.
Next, designate instance-specific values as parameters, using this
procedure:
- 1) Highlight the instance-specific value with the cursor
+ 1) Highlight the instance-specific value (such as “node0 ) with the cursor and then type “CTRL” and “4”
|image19|
- 2) Type “CTRL” and “4” to insert a parameter name.
+ 2) Type the name you want to use for this parameter into the pop-up window and click SUBMIT
|image20|
- 3) Type the parameter name in the parentheses
+ 3) The system will display your parameter name after the value you highlighted
|image21|
- 4) Type “CTRL” and “S” to save the parameter.
-
- |image22|
-
-Repeat for each instance-specific value that you wish to turn into a
-parameter.
+ 4) Repeat for each instance-specific value that you wish to turn into a parameter.
*Summary of editing commands:*
@@ -497,16 +533,17 @@ Notes on naming Parameters:
- Do not use parameter names which are sub-strings of other parameter
names. For example, don’t use field1 and field12 as parameter names.
+In the template, the first instance of a parameter will be highlighted in green and subsequent instances of the same parameter will be highlighted in orange.
Synchronizing a Template
~~~~~~~~~~~~~~~~~~~~~~~~
-Once you have named all the parameters (this example shows 2
-parameters), click the “SYNCHRONIZE” button to automatically create a
+Once you have named all the parameters (this example shows 3
+parameters), click the “SYNCHRONIZE TEMPLATE PARAMETERS” button to automatically create a
parameter definition file and a parameter name-value file. The next
sections describe these files.
-It may take a few seconds for the system to SYNCHRONIZE; when it is
+It may take a few seconds for the system to synchronize; when it is
complete, you will be taken to the Parameter Definition screen.
Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
@@ -521,28 +558,30 @@ In addition to creating new templates, you can also modify an existing
template by adding or removing parameter names.
To add a new parameter name, follow the steps in the Create a template from a "golden" configuration file section above.
-SYNCHRONIZE to add the new parameter to the name/value and parameter
+SYNCHRONIZE TEMPLATE PARAMETERS to add the new parameter to the name/value and parameter
definition GUI.
To remove an existing parameter name, remove the parameter name (i.e.,
${name}) using the backspace key and replace with the static value. Then
-SYNCHRONIZE to remove the parameter from the name/value and parameter
+SYNCHRONIZE TEMPLATE PARAMETERS to remove the parameter from the name/value and parameter
definition GUI.
+If the available template has parameter names (as opposed to the golden configuration/ base config typically shared by VNF owners), you can upload that template and manually add the braces around the parameter names. Then click on SYNCHRONIZE TEMPLATE PARAMETERS to generate the PD file with source as Manual.
+
Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
screen to preserve your work.
Create a parameter definition file describing instance-specific parameters in the template
------------------------------------------------------------------------------------------
-Clicking the “SYNCHRONIZE” button after creating a template will automatically create/update a parameter definition file for
+Clicking the “SYNCHRONIZE TEMPLATE PARAMETERS” button after creating a template will automatically create/update a parameter definition file for
that template (and a parameter name-value file described in the next
section). Alternatively, you can upload an existing parameter definition
file from your PC.
You can view or edit the definition fields for each parameter via the
Parameter Definition screen. Note that any edits to the parameter names
-would be overwritten by a subsequent SYNCHRONIZE with the template.
+would be overwritten by a subsequent SYNCHRONIZE TEMPLATE PARAMETERS.
|image24|
@@ -551,7 +590,7 @@ Select a Source for each parameter
There are three choices for the source:
-1. External Systems (e.g., INSTAR). APPC will automatically obtain parameter values from
+1. **External Systems**. APPC will automatically obtain parameter values from
an external system (typically IP addresses for VNF’s). First, obtain a
“key file” for your VNF. Then use the
“Upload Key File” button on the Parameter Definition screen. APPC
@@ -559,7 +598,7 @@ There are three choices for the source:
from an external system.
-2. ***A&AI***. APPC will automatically obtain parameter values from
+2. **A&AI**. APPC will automatically obtain parameter values from
A&AI (typically VNF/VNFC/VM identifiers). After selecting “A&AI”,
select a rule type and APPC will automatically populate the key
names and values. For rule types that include a list, populate the
@@ -567,7 +606,7 @@ There are three choices for the source:
|image26|
-3. ***Manual.*** APPC will use a manually-created excel to populate
+3. **Manual**. APPC will use a manually-created excel to populate
parameter values. Later section describes this User Input Spreadsheet.
Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
@@ -576,7 +615,7 @@ screen to preserve your work.
Create a file containing name-value pairs for parameters
--------------------------------------------------------
-Clicking the “SYNCHRONIZE” button after creating a template (see section
+Clicking the “SYNCHRONIZE TEMPLATE PARAMETERS” button after creating a template (see section
Synchronizing a Template) will automatically create/update a parameter name-value pair file
for that template (and a parameter definition file described in the
previous section).
@@ -592,7 +631,7 @@ on the Reference Data screen to preserve your work.
Option: Using MERGE to automatically create a template from a parameter name-value pair file
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-The APPC Design Tool also provides a way to create a template from an
+APPC CDT also provides a way to create a template from an
existing parameter name-value pair file. This is useful when the
configuration of the VNF has changed. Rather than manually recreating
the template, you can use the MERGE function to automatically add
@@ -610,12 +649,10 @@ parameters.
|image29|
-Next, click “MERGE”. APPC will automatically add parameters to the
-configuration file using the name-value pairs. Wherever APPC finds a
-matching value, it will add the corresponding parameter name.
+Next, click “MERGE FROM PARAM”. APPC will automatically associate the parameter values in the uploaded configuration with parameter names from the parameter name/value. If duplicate parameter values are found in the configuration, APP-C will highlight the duplicate value & name in orange and let the user edit the parameter name. When the duplicate parameter name has been successfully replaced with a unique name, the highlight will change from orange to green..
-After using the MERGE button to create a template, you can use the
-SYNCHRONIZE button to create/update the parameter definition file and
+After using the MERGE FROM PARAM button to create a template, you can use the
+SYNCHRONIZE TEMPLATE PARAMETERS button to create/update the parameter definition file and
name-value files.
Remember to use the SAVE and/or DOWNLOAD buttons on the Reference Data
@@ -623,8 +660,44 @@ screen to preserve your work.
|image30|
+
+Option: Synchronize with Name/Values
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+There may be a scenario where you have created or uploaded a template, and SYNCHONIZED TEMPLATE PARAMETERS, and then you want to remove some name-value pairs. APPC provides a SYNCHRONIZE WITH NAME VALUES button that will automatically synchronize the parameter definitions with your updated name value pairs.
+
+
+ - Step 1: Create or upload template
+
+ - Step 2: SYNCHRONIZE TEMPLATE PARAMETERS. (APPC will update Parameter Definition file and Name-Value Pair file to match Template.)
+
+ - Step 3: Manually edit Name-Value Pair file (or upload a changed Name-Value Pair file)
+
+ - Step 4: SYNCHRONIZE WITH NAME VALUES. (see screen shot below)(APPC will update Parameter Definition file to match Name-Value Pair file.)
+
+ - Step 5: Examine Parameter Definitions to confirm they now match updated Name-Value Pair file.
+
+
+|image30a|
+
+
Test the template in a lab using APPC CDT Test Function
-=======================================================================
+=======================================================
+
+The APPC CDT **TEST** action is used to initiate configuration
+and other lifecycle commands
+
+**Prerequisites:**
+ - A. Testing requires an instance of the target VNF to be reachable from your test environment.
+ - B. You have created the on-boarding artifacts (e.g., reference file, template, etc) for the target VNF type and action in CDT and saved them to APPC.
+ - C. You have created a user input spreadsheet for the VNF and action you wish to test.
+
+**Steps to Test a template:**
+ - 1. Choose the TEST function on the APPC CDT home page
+ - 2. Upload the user input spreadsheet
+ - 3. Click on EXECUTE TEST
+ - 4. View test progress; poll for test status if necessary.
+ - 5. View Test Results
+
User Input Spreadsheet
----------------------
@@ -632,24 +705,19 @@ User Input Spreadsheet
The following steps are used to prepare a user input spreadsheet for the
VNF instance and action to be tested.
-1. Start with this generic 1802 user input excel spreadsheet.
+1. Start with this generic user input excel spreadsheet.
:download:`Generic 1802 User Input Spreadsheet v.02.xlsx` (compatible with excel 2013)
-2. Update the user-input sections of the spreadsheet.
+ Update the user-input sections of the spreadsheet.
- a) Upload Data tab: choose action, populate VNF-ID
+ - a) Upload Data tab: choose action, populate VNF-ID
- b) >Action< tab: Select the tab for the action being tested. Choose a
- protocol and enter required action identifiers & request parameter
- values. Enter any payload parameter names and values required for
- this associated template. (copy/paste from a name-value pair file or
- other source).
+ - b) >Action< tab: Select the tab for the action being tested. Choose a protocol and enter required action identifiers & request parameter values. Enter any payload parameter names and values required for this associated template. (copy/paste from a name-value pair file or other source).
- The screen shots on the following pages show the user input sections
- highlighted in yellow.
+ The screen shots on the following pages show the user input sections highlighted in yellow.
-1. Save the spreadsheet with a name for your VNF instance and action.
+2. Save the spreadsheet with a name for your VNF instance and action.
“Upload Data” tab – Select action to be tested and populate any action
identifiers such as vnf-id.
@@ -664,16 +732,8 @@ copy/paste from a name-value pair file or other source).
|image32|
-Using APPC CDT TEST action to test a VNF configuration template
------------------------------------------------------------------
-
-The APPC CDT **TEST** action is used to initiate configuration
-and other lifecycle commands.
-
-**Prerequisites**
- - Testing requires an instance of the target VNF to be reachable from your test environment.
- - You have created the on-boarding artifacts (e.g., reference file, template, etc) for the target VNF type and action in CDT and saved them to APPC.
- - You have created a user input spreadsheet for the VNF and action you wish to test.
+Using APPC CDT TEST Function
+----------------------------
**Steps to use the “TEST” function of the APPC Design Tool**
@@ -701,7 +761,7 @@ When a new vnf-type is created or a new action is added to an existing
vnf-type using the CDT tool and the Reference Data artifact is loaded to
APPC, an update is made to the APPC run-time southbound properties
file for the vnf-type.   The southbound properties are needed for
-connecting to a VNF instance or Ansible server.   The southbound
+connecting to a VNF instance or Ansible server.  The southbound
properties contain the following information:
``{vnf\_type}.{protocol}.{action}.user = {value}``
@@ -713,46 +773,43 @@ properties contain the following information:
``{vnf\_type}.{protocol}.{action}.url = {value}``
The user, port, and url values are contained in the Reference Data
-artifact, if populated by the self-service user.  The password value is
-updated by T2 production support using a GUI tool provided. <TO DO: CHECK ON THIS>
+artifact, if populated by the self-service user. 
-The current process which creates the southbound properties from the
-Reference Data only updates the southbound properties file only a single
-node in the APPC cluster.  
+The current process that creates the southbound properties from the Reference Data only updates the southbound properties file on a single APPC node in the ODL cluster..  
APP-C Design Tool - File Descriptions
=====================================
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-| **File Description** | **File Format** | **File name / example** |
-+======================================================================================================================================+===================+======================================================+
-| | | |
-| **Pre-template Config file** –contains a ‘golden’ or working configuration (for Netconf) or JSON data block (for Chef or Ansible). | XML, JSON | :download:`simple xml config.txt` |
-| | | |
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-| | | |
-| **Reference file** [5]_– describes a VNF in terms of its subtending VM’s and VNFC’s and the actions/protocols being onboarded. | XML, JSON | :download:`reference_AllAction_vPQR_0.0.1V.json` |
-| | | |
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-| | | |
-| **Template file** – a configuration file with parameters for instance-specific fields. | XML | :download:`template_Configure_vABC_0.0.1.txt` |
-| | | |
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-| | | |
-| **Parameter Definition file** (aka pd\_Configure) contains **parameter definitions** associated with a template. | YAML | :download:`pd_Configure_vABC_0.0.1V.yaml.txt` |
-| | | |
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-| | | |
-| **Name-Value file** (aka param\_Configure) contains name-value pairs for parameters associated with a template. | JSON | :download:`param_Configure_vABC_0.0.1V.txt` |
-| | | |
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-| | | |
-| **Key data file** – contains external system data to populate a PD configure file. | TXT | <TO DO: Need sample file> |
-| | | |
-+--------------------------------------------------------------------------------------------------------------------------------------+-------------------+------------------------------------------------------+
-
-Note: Do not alter file names because APPC CDT requires a specific file naming format. Note that for yaml files, Sphinx is not able to handle correctly, so we had to add .txt to allow the download. Please remember to remove .txt from pd_Configure_vABC_0.0.1V.yaml.txt when you download it.
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+| **File Description** | **File Format** |
++======================================================================================================================================+===================+
+| | |
+| **Pre-template Config file** –contains a ‘golden’ or working configuration (for Netconf) or JSON data block (for Chef or Ansible). | XML, JSON |
+| | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+| | |
+| **Reference file** – describes a VNF in terms of its subtending VM’s and VNFC’s and the actions/protocols being onboarded. | XML, JSON |
+| | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+| | |
+| **Template file** – a configuration file with parameters for instance-specific fields. | XML |
+| | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+| | |
+| **Parameter Definition file** (aka pd\_Configure) contains **parameter definitions** associated with a template. | YAML |
+| | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+| | |
+| **Name-Value file** (aka param\_Configure) contains name-value pairs for parameters associated with a template. | JSON |
+| | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+| | |
+| **Key data file** – contains external system data to populate a PD configure file. | TXT |
+| | |
++--------------------------------------------------------------------------------------------------------------------------------------+-------------------+
+
+
.. |image0| image:: media/image0.png
:width: 7.88889in
@@ -802,6 +859,12 @@ Note: Do not alter file names because APPC CDT requires a specific file naming f
.. |image15| image:: media/image15.png
:width: 9.05556in
:height: 5.09375in
+.. |image15a| image:: media/image15a.png
+.. |image15b| image:: media/image15b.png
+.. |image15c| image:: media/image15c.png
+.. |image15d| image:: media/image15d.png
+.. |image15e| image:: media/image15e.png
+.. |image15f| image:: media/image15f.png
.. |image16| image:: media/image16.png
:width: 5.79167in
:height: 3.74135in
@@ -823,9 +886,6 @@ Note: Do not alter file names because APPC CDT requires a specific file naming f
.. |image21| image:: media/image21.png
:width: 5.32292in
:height: 1.92771in
-.. |image22| image:: media/image22.png
- :width: 5.31153in
- :height: 1.83333in
.. |image23| image:: media/image23.png
:width: 7.54167in
:height: 4.24219in
@@ -847,6 +907,7 @@ Note: Do not alter file names because APPC CDT requires a specific file naming f
.. |image30| image:: media/image30.png
:width: 8.07407in
:height: 4.54167in
+.. |image30a| image:: media/image30a.png
.. |image31| image:: media/image31.png
:width: 9.00000in
:height: 5.18958in
diff --git a/docs/APPC CDT Guide/media/image0.png b/docs/APPC CDT Guide/media/image0.png
index d531f5654..04770cc0f 100755..100644
--- a/docs/APPC CDT Guide/media/image0.png
+++ b/docs/APPC CDT Guide/media/image0.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image1.png b/docs/APPC CDT Guide/media/image1.png
index 25ebdea52..9938985fe 100755..100644
--- a/docs/APPC CDT Guide/media/image1.png
+++ b/docs/APPC CDT Guide/media/image1.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image10.png b/docs/APPC CDT Guide/media/image10.png
index a5f8e52f2..9851fce63 100755..100644
--- a/docs/APPC CDT Guide/media/image10.png
+++ b/docs/APPC CDT Guide/media/image10.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image11.png b/docs/APPC CDT Guide/media/image11.png
index 3751dde04..de40534d2 100755..100644
--- a/docs/APPC CDT Guide/media/image11.png
+++ b/docs/APPC CDT Guide/media/image11.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image12.png b/docs/APPC CDT Guide/media/image12.png
index e9924af8f..c0106c0aa 100755..100644
--- a/docs/APPC CDT Guide/media/image12.png
+++ b/docs/APPC CDT Guide/media/image12.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image13.png b/docs/APPC CDT Guide/media/image13.png
index 6b89ee8f5..fe449376b 100755..100644
--- a/docs/APPC CDT Guide/media/image13.png
+++ b/docs/APPC CDT Guide/media/image13.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image14.png b/docs/APPC CDT Guide/media/image14.png
index 9c274878e..fb3382182 100755..100644
--- a/docs/APPC CDT Guide/media/image14.png
+++ b/docs/APPC CDT Guide/media/image14.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15.png b/docs/APPC CDT Guide/media/image15.png
index 68d2c7d93..0c70ae321 100755..100644
--- a/docs/APPC CDT Guide/media/image15.png
+++ b/docs/APPC CDT Guide/media/image15.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15a.png b/docs/APPC CDT Guide/media/image15a.png
new file mode 100644
index 000000000..f0057d855
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image15a.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15b.png b/docs/APPC CDT Guide/media/image15b.png
new file mode 100644
index 000000000..af3f0d87e
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image15b.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15c.png b/docs/APPC CDT Guide/media/image15c.png
new file mode 100644
index 000000000..a22968bcb
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image15c.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15d.png b/docs/APPC CDT Guide/media/image15d.png
new file mode 100644
index 000000000..44b9d41d3
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image15d.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15e.png b/docs/APPC CDT Guide/media/image15e.png
new file mode 100644
index 000000000..ff3e9b38d
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image15e.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image15f.png b/docs/APPC CDT Guide/media/image15f.png
new file mode 100644
index 000000000..ccd62db43
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image15f.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image16.png b/docs/APPC CDT Guide/media/image16.png
index 509fbcd63..c858ab3fc 100755..100644
--- a/docs/APPC CDT Guide/media/image16.png
+++ b/docs/APPC CDT Guide/media/image16.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image17.png b/docs/APPC CDT Guide/media/image17.png
index fe20023b8..1f949d36a 100755..100644
--- a/docs/APPC CDT Guide/media/image17.png
+++ b/docs/APPC CDT Guide/media/image17.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image18.png b/docs/APPC CDT Guide/media/image18.png
index 2000f4a45..f592fe8f2 100755..100644
--- a/docs/APPC CDT Guide/media/image18.png
+++ b/docs/APPC CDT Guide/media/image18.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image19.png b/docs/APPC CDT Guide/media/image19.png
index 83148b5fe..4893af5da 100755..100644
--- a/docs/APPC CDT Guide/media/image19.png
+++ b/docs/APPC CDT Guide/media/image19.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image2.png b/docs/APPC CDT Guide/media/image2.png
index 1f3a98459..ca5e67dc0 100755..100644
--- a/docs/APPC CDT Guide/media/image2.png
+++ b/docs/APPC CDT Guide/media/image2.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image20.png b/docs/APPC CDT Guide/media/image20.png
index 54361ade6..8a627da33 100755..100644
--- a/docs/APPC CDT Guide/media/image20.png
+++ b/docs/APPC CDT Guide/media/image20.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image21.png b/docs/APPC CDT Guide/media/image21.png
index b37161731..5e8b8985a 100755..100644
--- a/docs/APPC CDT Guide/media/image21.png
+++ b/docs/APPC CDT Guide/media/image21.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image22.png b/docs/APPC CDT Guide/media/image22.png
deleted file mode 100755
index 8f12f2917..000000000
--- a/docs/APPC CDT Guide/media/image22.png
+++ /dev/null
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image23.png b/docs/APPC CDT Guide/media/image23.png
index 995dc86a6..4bcaaa701 100755..100644
--- a/docs/APPC CDT Guide/media/image23.png
+++ b/docs/APPC CDT Guide/media/image23.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image24.png b/docs/APPC CDT Guide/media/image24.png
index 9d92e1011..680ff38f2 100755..100644
--- a/docs/APPC CDT Guide/media/image24.png
+++ b/docs/APPC CDT Guide/media/image24.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image26.png b/docs/APPC CDT Guide/media/image26.png
index 36d262d77..d9e9e4807 100755..100644
--- a/docs/APPC CDT Guide/media/image26.png
+++ b/docs/APPC CDT Guide/media/image26.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image27.png b/docs/APPC CDT Guide/media/image27.png
index fdd37a14f..2da4784e8 100755..100644
--- a/docs/APPC CDT Guide/media/image27.png
+++ b/docs/APPC CDT Guide/media/image27.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image28.png b/docs/APPC CDT Guide/media/image28.png
index a96e378f2..9f84129b3 100755..100644
--- a/docs/APPC CDT Guide/media/image28.png
+++ b/docs/APPC CDT Guide/media/image28.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image29.png b/docs/APPC CDT Guide/media/image29.png
index ce504f924..4a38cd823 100755..100644
--- a/docs/APPC CDT Guide/media/image29.png
+++ b/docs/APPC CDT Guide/media/image29.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image3.png b/docs/APPC CDT Guide/media/image3.png
index a9bd36ac2..ac1c9becd 100755..100644
--- a/docs/APPC CDT Guide/media/image3.png
+++ b/docs/APPC CDT Guide/media/image3.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image30.png b/docs/APPC CDT Guide/media/image30.png
index ed8f96c31..320511868 100755..100644
--- a/docs/APPC CDT Guide/media/image30.png
+++ b/docs/APPC CDT Guide/media/image30.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image30a.png b/docs/APPC CDT Guide/media/image30a.png
new file mode 100644
index 000000000..24b43392b
--- /dev/null
+++ b/docs/APPC CDT Guide/media/image30a.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image31.png b/docs/APPC CDT Guide/media/image31.png
index a65054afb..3ff322e8a 100755..100644
--- a/docs/APPC CDT Guide/media/image31.png
+++ b/docs/APPC CDT Guide/media/image31.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image32.png b/docs/APPC CDT Guide/media/image32.png
index 0e59c3f96..1d6d58159 100755..100644
--- a/docs/APPC CDT Guide/media/image32.png
+++ b/docs/APPC CDT Guide/media/image32.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image33.png b/docs/APPC CDT Guide/media/image33.png
index ddd73bcc8..cacc1b876 100644
--- a/docs/APPC CDT Guide/media/image33.png
+++ b/docs/APPC CDT Guide/media/image33.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image34.png b/docs/APPC CDT Guide/media/image34.png
index 024787250..ef4811524 100644
--- a/docs/APPC CDT Guide/media/image34.png
+++ b/docs/APPC CDT Guide/media/image34.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image35.png b/docs/APPC CDT Guide/media/image35.png
index b08c42242..7c546b6b8 100644
--- a/docs/APPC CDT Guide/media/image35.png
+++ b/docs/APPC CDT Guide/media/image35.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image36.png b/docs/APPC CDT Guide/media/image36.png
index b398ca545..89bebc805 100644
--- a/docs/APPC CDT Guide/media/image36.png
+++ b/docs/APPC CDT Guide/media/image36.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image4.png b/docs/APPC CDT Guide/media/image4.png
index c2395206b..99e60a28d 100755..100644
--- a/docs/APPC CDT Guide/media/image4.png
+++ b/docs/APPC CDT Guide/media/image4.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image5.png b/docs/APPC CDT Guide/media/image5.png
index 9070fce4d..119e538db 100755..100644
--- a/docs/APPC CDT Guide/media/image5.png
+++ b/docs/APPC CDT Guide/media/image5.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image6.png b/docs/APPC CDT Guide/media/image6.png
index 6e694d0cf..aae3ba4a1 100755..100644
--- a/docs/APPC CDT Guide/media/image6.png
+++ b/docs/APPC CDT Guide/media/image6.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image7.png b/docs/APPC CDT Guide/media/image7.png
index 1cb9f5db2..f4df3fc1d 100755..100644
--- a/docs/APPC CDT Guide/media/image7.png
+++ b/docs/APPC CDT Guide/media/image7.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image8.png b/docs/APPC CDT Guide/media/image8.png
index ca30eb015..b28bc1f8a 100755..100644
--- a/docs/APPC CDT Guide/media/image8.png
+++ b/docs/APPC CDT Guide/media/image8.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/image9.png b/docs/APPC CDT Guide/media/image9.png
index e092c8e39..a48ecd2d4 100755..100644
--- a/docs/APPC CDT Guide/media/image9.png
+++ b/docs/APPC CDT Guide/media/image9.png
Binary files differ
diff --git a/docs/APPC CDT Guide/media/imageA.png b/docs/APPC CDT Guide/media/imageA.png
index 00abe0594..2e81595ed 100755..100644
--- a/docs/APPC CDT Guide/media/imageA.png
+++ b/docs/APPC CDT Guide/media/imageA.png
Binary files differ
diff --git a/docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt b/docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt
deleted file mode 100644
index 67270b6fb..000000000
--- a/docs/APPC CDT Guide/param_Configure_vABC_0.0.1V.txt
+++ /dev/null
@@ -1,4 +0,0 @@
-{
- "BUrouterIP": "135.69.228.1",
- "DestinationSubnet": "0.0.0.0/0"
-} \ No newline at end of file
diff --git a/docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt b/docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt
deleted file mode 100644
index eacceb46f..000000000
--- a/docs/APPC CDT Guide/pd_Configure_vABC_0.0.1V.yaml.txt
+++ /dev/null
@@ -1,31 +0,0 @@
----
-kind: "Property Definition"
-version: V1
-vnf-parameter-list:
-- name: nodename
- type: null
- description: null
- required: null
- default: null
- source: Manual
- rule-type: null
- request-keys: null
- response-keys: null
-- name: BUrouterIP
- type: null
- description: null
- required: null
- default: null
- source: Manual
- rule-type: null
- request-keys: null
- response-keys: null
-- name: DestinationSubnet
- type: null
- description: null
- required: null
- default: null
- source: Manual
- rule-type: null
- request-keys: null
- response-keys: null
diff --git a/docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json b/docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json
deleted file mode 100644
index e3273d916..000000000
--- a/docs/APPC CDT Guide/reference_AllAction_vPQR_0.0.1V.json
+++ /dev/null
@@ -1,96 +0,0 @@
-{
- "reference_data": [
- {
- "action": "Configure",
- "action-level": "vnf",
- "scope": {
- "vnf-type": "vPQR",
- "vnfc-type": ""
- },
- "template": "Y",
- "vm": [
- {
- "vm-instance": 1,
- "vnfc": [
- {
- "vnfc-instance": "1",
- "vnfc-function-code": "ppp",
- "ipaddress-v4-oam-vip": "Y",
- "group-notation-type": "first-vnfc-name",
- "group-notation-value": "pair",
- "vnfc-type": "vPPP"
- }
- ]
- },
- {
- "vm-instance": 2,
- "vnfc": [
- {
- "vnfc-instance": "1",
- "vnfc-function-code": "ppp",
- "ipaddress-v4-oam-vip": "Y",
- "group-notation-type": "first-vnfc-name",
- "group-notation-value": "pair",
- "vnfc-type": "vPPP"
- }
- ]
- },
- {
- "vm-instance": 3,
- "vnfc": [
- {
- "vnfc-instance": "1",
- "vnfc-function-code": "rrr",
- "ipaddress-v4-oam-vip": "Y",
- "group-notation-type": "first-vnfc-name",
- "group-notation-value": "pair",
- "vnfc-type": "vRRR"
- }
- ]
- },
- {
- "vm-instance": 4,
- "vnfc": [
- {
- "vnfc-instance": "1",
- "vnfc-function-code": "rrr",
- "ipaddress-v4-oam-vip": "Y",
- "group-notation-type": "first-vnfc-name",
- "group-notation-value": "pair",
- "vnfc-type": "vRRR"
- }
- ]
- }
- ],
- "protocol": "NETCONF-XML",
- "user-name": "admin",
- "port-number": "22",
- "artifact-list": [
- {
- "artifact-name": "template_Configure_vPQR_0.0.1V.xml",
- "artifact-type": "config_template"
- },
- {
- "artifact-name": "pd_Configure_vPQR_0.0.1V.yaml",
- "artifact-type": "parameter_definitions"
- }
- ],
- "scopeType": "vnf-type",
- "device-protocol": "NETCONF-XML"
- },
- {
- "action": "AllAction",
- "action-level": "vnf",
- "scope": {
- "vnf-type": "vPQR",
- "vnfc-type": ""
- },
- "artifact-list": [
- {
- "artifact-name": "reference_AllAction_vPQR_0.0.1V.json",
- "artifact-type": "reference_template"
- }
- ]
- }
- ]
-} \ No newline at end of file
diff --git a/docs/APPC CDT Guide/simple xml config.txt b/docs/APPC CDT Guide/simple xml config.txt
deleted file mode 100644
index c402a2290..000000000
--- a/docs/APPC CDT Guide/simple xml config.txt
+++ /dev/null
@@ -1,1535 +0,0 @@
-<rpc-reply xmlns:junos="http://xml.juniper.net/junos/15.1X49/junos">
- <configuration junos:changed-seconds="1478714723" junos:changed-localtime="2016-11-09 18:05:23 UTC">
- <version>15.1X49-D50.3</version>
- <groups>
- <name>node0</name>
- <system>
- <host-name>dbqx0001vm001</host-name>
- <backup-router>
- <address>135.69.228.1</address>
- <destination>0.0.0.0/0</destination>
- </backup-router>
- <services>
- <ssh>
- <max-sessions-per-connection>32</max-sessions-per-connection>
- </ssh>
- </services>
- <syslog>
- <file>
- <name>default-log-messages</name>
- <contents>
- <name>any</name>
- <info/>
- </contents>
- <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
- <structured-data>
- </structured-data>
- </file>
- </syslog>
- </system>
- <interfaces>
- <interface>
- <name>fxp0</name>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <address>
- <name>135.69.228.8/25</name>
- </address>
- </inet>
- </family>
- </unit>
- </interface>
- </interfaces>
- </groups>
- <groups>
- <name>node1</name>
- <system>
- <host-name>dbqx0001vm002</host-name>
- <backup-router>
- <address>135.69.228.1</address>
- <destination>0.0.0.0/0</destination>
- </backup-router>
- <services>
- <ssh>
- <max-sessions-per-connection>32</max-sessions-per-connection>
- </ssh>
- </services>
- <syslog>
- <file>
- <name>default-log-messages</name>
- <contents>
- <name>any</name>
- <info/>
- </contents>
- <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
- <structured-data>
- </structured-data>
- </file>
- </syslog>
- </system>
- <interfaces>
- <interface>
- <name>fxp0</name>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <address>
- <name>135.69.228.9/25</name>
- </address>
- </inet>
- </family>
- </unit>
- </interface>
- </interfaces>
- </groups>
- <apply-groups>groupname</apply-groups>
- <system>
- <root-authentication>
- <encrypted-password>$5$rKyWGmrv$sMeym/XUklUeJX2hKpcp5TzCG5R8jcmJ2901HcNGSeB</encrypted-password>
- </root-authentication>
- <name-server>
- <name>135.188.34.84</name>
- </name-server>
- <login>
- <message>\n\t\tWARNING NOTICE\n\tThis system is restricted solely to AT&amp;T authorized users for\n\tlegitimate business purposes only.The actual or attempted\n\tunauthorized access, use, or modification of this system is\n\tstrictly prohibited by AT&amp;T. Unauthorized users are subject to\n\tCompany disciplinary proceedings and/or criminal and civil\n\tpenalties under state, federal, or other applicable domestic and\n\tforeign laws. The use of this system may be monitored and\n\trecorded for administrative and security reasons. Anyone\n\taccessing this system expressly consents to such monitoring and\n\t is advised that if monitoring reveals possible evidence of\n\tcriminal activity, AT&amp;T may provide the evidence of such\n\tactivity to law enforcement officials. All users must comply\n\twith AT&amp;T company policies regarding the protection of AT&amp;T\n\tinformation assets.\n\n</message>
- </login>
- <services>
- <ssh>
- <protocol-version>v2</protocol-version>
- </ssh>
- <netconf>
- <ssh>
- </ssh>
- </netconf>
- </services>
- <syslog>
- <user>
- <name>*</name>
- <contents>
- <name>any</name>
- <emergency/>
- </contents>
- </user>
- <host>
- <name>135.144.0.62</name>
- <contents>
- <name>any</name>
- <any/>
- </contents>
- <structured-data>
- </structured-data>
- </host>
- <file>
- <name>messages</name>
- <contents>
- <name>any</name>
- <any/>
- </contents>
- <contents>
- <name>authorization</name>
- <info/>
- </contents>
- </file>
- <file>
- <name>interactive-commands</name>
- <contents>
- <name>interactive-commands</name>
- <any/>
- </contents>
- </file>
- <file>
- <name>session_log</name>
- <contents>
- <name>any</name>
- <info/>
- </contents>
- <structured-data>
- </structured-data>
- </file>
- <file>
- <name>policy_session</name>
- <match>RT_FLOW</match>
- </file>
- </syslog>
- <license>
- <autoupdate>
- <url>
- <name>https://ae1.juniper.net/junos/key_retrieval</name>
- </url>
- </autoupdate>
- </license>
- <ntp>
- <server>
- <name>192.20.201.162</name>
- </server>
- </ntp>
- </system>
- <chassis>
- <cluster>
- <control-link-recovery/>
- <reth-count>2</reth-count>
- <heartbeat-interval>1000</heartbeat-interval>
- <heartbeat-threshold>3</heartbeat-threshold>
- <redundancy-group>
- <name>0</name>
- <node>
- <name>0</name>
- <priority>100</priority>
- </node>
- <node>
- <name>1</name>
- <priority>1</priority>
- </node>
- </redundancy-group>
- <redundancy-group>
- <name>1</name>
- <node>
- <name>0</name>
- <priority>100</priority>
- </node>
- <node>
- <name>1</name>
- <priority>1</priority>
- </node>
- <interface-monitor>
- <name>ge-0/0/1</name>
- <weight>255</weight>
- </interface-monitor>
- <interface-monitor>
- <name>ge-7/0/1</name>
- <weight>255</weight>
- </interface-monitor>
- <interface-monitor>
- <name>ge-0/0/2</name>
- <weight>255</weight>
- </interface-monitor>
- <interface-monitor>
- <name>ge-7/0/2</name>
- <weight>255</weight>
- </interface-monitor>
- <ip-monitoring>
- <global-weight>255</global-weight>
- <retry-interval>1</retry-interval>
- <retry-count>5</retry-count>
- <family>
- <inet>
- <address>
- <name>10.68.16.1</name>
- <weight>255</weight>
- <interface>
- <logical-interface-name>reth1.0</logical-interface-name>
- <secondary-ip-address>10.68.16.17</secondary-ip-address>
- </interface>
- </address>
- <address>
- <name>12.102.197.129</name>
- <weight>255</weight>
- <interface>
- <logical-interface-name>reth0.0</logical-interface-name>
- <secondary-ip-address>12.102.197.135</secondary-ip-address>
- </interface>
- </address>
- </inet>
- </family>
- </ip-monitoring>
- </redundancy-group>
- </cluster>
- </chassis>
- <services>
- <application-identification>
- </application-identification>
- </services>
- <security>
- <idp>
- <idp-policy>
- <name>Space-IPS-Policy</name>
- <rulebase-ips>
- <rule>
- <name>DBE-Q-IPS-policy-template-1</name>
- <match>
- <from-zone>any</from-zone>
- <to-zone>any</to-zone>
- <application>default</application>
- <attacks>
- <predefined-attacks>APP:ADOBE-COLDFUSION-WEBSOCKET</predefined-attacks>
- <predefined-attacks>APP:ADOBE-FLASH-RTMP-RCE</predefined-attacks>
- <predefined-attacks>APP:AMANDA:AMANDA-ROOT-OF2</predefined-attacks>
- <predefined-attacks>APP:APPLE-MACOSX-ODP-RCE</predefined-attacks>
- <predefined-attacks>APP:ASUS-WRT-INFOSVR-COMND-EXEC</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:BCK-MESSAGE</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:METHD-EXPOSURE</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:RPC-MEMRCORRUPT</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:SQLOF-1</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:TAPE-ENGNE-DOS</predefined-attacks>
- <predefined-attacks>APP:CA:DBA-SVR-POINT</predefined-attacks>
- <predefined-attacks>APP:CA:RPC-MSG-BO</predefined-attacks>
- <predefined-attacks>APP:CISCO:ASA-IKE-BO</predefined-attacks>
- <predefined-attacks>APP:CISCO:CISCO-EPNM-DESERIAL-1</predefined-attacks>
- <predefined-attacks>APP:CISCO:VIDEO-SURVEILANCE-XSS</predefined-attacks>
- <predefined-attacks>APP:CITRIX:PROVISIONING-OPCODE</predefined-attacks>
- <predefined-attacks>APP:CITRIX:STREAMPROCESS-BOF</predefined-attacks>
- <predefined-attacks>APP:DIGIUM-ASTERISK-OF</predefined-attacks>
- <predefined-attacks>APP:EMC-ALPHASTOR-BOF</predefined-attacks>
- <predefined-attacks>APP:EMC-ALPHASTORE-CMDEXEC</predefined-attacks>
- <predefined-attacks>APP:EMC-APLHASTORE-FMTSTR</predefined-attacks>
- <predefined-attacks>APP:EMC-NETWORKER-NSRD-BO</predefined-attacks>
- <predefined-attacks>APP:EMC-NETWORKER-NSRINDEXD-OF</predefined-attacks>
- <predefined-attacks>APP:EMC-NSRINDEXD-BO</predefined-attacks>
- <predefined-attacks>APP:EMC-REPLICATION-MGR-CMD-EXE</predefined-attacks>
- <predefined-attacks>APP:ESIGNAL:OVERFLOW-EXPLOIT</predefined-attacks>
- <predefined-attacks>APP:FLEXERA-FLEXNET-BO</predefined-attacks>
- <predefined-attacks>APP:FREEBSD-BSPATCH-RCE</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PROTECTOR-OP-DOS</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-EXEC-BAR-CE</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP-27</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP211-264</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP215-263</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP227-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP234-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP235-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP259-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP260-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP28-11</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODE</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODES</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-RDS-DOS</predefined-attacks>
- <predefined-attacks>APP:HP-LEFTHAND-HYDRA-DIAG-OF</predefined-attacks>
- <predefined-attacks>APP:HP-LEFTHAND-HYDRA-PING-OF</predefined-attacks>
- <predefined-attacks>APP:HP-LOADRUNNER-BO</predefined-attacks>
- <predefined-attacks>APP:HP-LOADRUNNER-RCE</predefined-attacks>
- <predefined-attacks>APP:HP-LOADRUNNER-SSL</predefined-attacks>
- <predefined-attacks>APP:HP-LOGIN-BOF</predefined-attacks>
- <predefined-attacks>APP:HP-MGMT-UAM-BO</predefined-attacks>
- <predefined-attacks>APP:HP-NNM-HLEN-BOF</predefined-attacks>
- <predefined-attacks>APP:HP-OPENVIEW-DTPRTCTR-BO</predefined-attacks>
- <predefined-attacks>APP:HP-OPNVIEWSTORAGE-BOF</predefined-attacks>
- <predefined-attacks>APP:HP-OPNVW-STORAGE-DATA-BO</predefined-attacks>
- <predefined-attacks>APP:HP-PROCURVE-BYPASS</predefined-attacks>
- <predefined-attacks>APP:HP-PROTECTOR-DIR-TRAV</predefined-attacks>
- <predefined-attacks>APP:HP-SAN-IQ-CMD-INJ</predefined-attacks>
- <predefined-attacks>APP:HP-STORAGEWORKS-OPC22-BO</predefined-attacks>
- <predefined-attacks>APP:HP-SYS-IPRANGE-OF</predefined-attacks>
- <predefined-attacks>APP:HP-SYS-RCE</predefined-attacks>
- <predefined-attacks>APP:HP-VIRTUAL-SAN</predefined-attacks>
- <predefined-attacks>APP:HPE-NA-RMI-DESER</predefined-attacks>
- <predefined-attacks>APP:HPIM-SOM-EUACCNT-BYPASS</predefined-attacks>
- <predefined-attacks>APP:HPLOADRUNNER-XDR-BO</predefined-attacks>
- <predefined-attacks>APP:HPOV:CMD-INJ</predefined-attacks>
- <predefined-attacks>APP:IBM:DOMINO-BYPASS</predefined-attacks>
- <predefined-attacks>APP:IBM:DOMINO-BYPASS-1</predefined-attacks>
- <predefined-attacks>APP:IBM:FORMVIEWER-XFDL-BOF</predefined-attacks>
- <predefined-attacks>APP:IBM:FXCLI-EXECBO</predefined-attacks>
- <predefined-attacks>APP:IBM:LDAP-MODIFYREQUEST-BO</predefined-attacks>
- <predefined-attacks>APP:IBM:OPCODE-1330-CMD-INJ</predefined-attacks>
- <predefined-attacks>APP:IBM:TIV-OP1329-BOF</predefined-attacks>
- <predefined-attacks>APP:IBM:TIV-OP1331-CMDINJ</predefined-attacks>
- <predefined-attacks>APP:IBM:TIV-OP1339-CMDINJ</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-FASTBACK-OP-BO</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-OP4115-BO</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1301</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1335</predefined-attacks>
- <predefined-attacks>APP:IBM:TSM-CVE-2015-0119-BO</predefined-attacks>
- <predefined-attacks>APP:IPMI-CIPHER-ZERO</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA1</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA2</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:CHKSUM-PRIV-ESC</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-TCP</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-UDP</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:KRB5-DOS</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:MULTI-REALM-DOS</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:SPNEGO-5-DOS</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:WIN-KERB-FALLBACK</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:XREALM-KDC-DOS</predefined-attacks>
- <predefined-attacks>APP:MCAFEE-AM-INPUT-SSL</predefined-attacks>
- <predefined-attacks>APP:MISC:ACTMQ-SHUTDN-CMD</predefined-attacks>
- <predefined-attacks>APP:MISC:ADOBE-RTMP-UAF</predefined-attacks>
- <predefined-attacks>APP:MISC:ALIENVALT-BAKUP-COM-RE</predefined-attacks>
- <predefined-attacks>APP:MISC:APACHE-QPID-SEQSET-DOS</predefined-attacks>
- <predefined-attacks>APP:MISC:APACHE-SVN-IO</predefined-attacks>
- <predefined-attacks>APP:MISC:ARCSERVE-BKUP</predefined-attacks>
- <predefined-attacks>APP:MISC:BIGANT-DDNF-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:CLEARSCADA-OPF-PARSE</predefined-attacks>
- <predefined-attacks>APP:MISC:CVE-2014-0549-RTMP-MC</predefined-attacks>
- <predefined-attacks>APP:MISC:DIASOFT-EXECCMD-CE</predefined-attacks>
- <predefined-attacks>APP:MISC:ENTERASYS-NETSIGHT-BOF</predefined-attacks>
- <predefined-attacks>APP:MISC:EZHOMETECH-EZSERVER-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:FREEBSD-MBUF-DOS</predefined-attacks>
- <predefined-attacks>APP:MISC:GITORIOUS-RCE</predefined-attacks>
- <predefined-attacks>APP:MISC:HP-INODE-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:HP-OA-HEALTH-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:NAGIOS-NRPE-CE</predefined-attacks>
- <predefined-attacks>APP:MISC:OBJ-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:OBJ-OBJDB-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:SAM-ACTQ-MULTI</predefined-attacks>
- <predefined-attacks>APP:MISC:SCHNEIDER-INDUSOFT-RCE</predefined-attacks>
- <predefined-attacks>APP:MISC:SERCOMM-DEVICE-RCE</predefined-attacks>
- <predefined-attacks>APP:MISC:SPREE-SEARCH-CMD-EXE</predefined-attacks>
- <predefined-attacks>APP:MISC:WSHARK-ENTTEC-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:XEROX-MFP-COMND-EXEC</predefined-attacks>
- <predefined-attacks>APP:MISC:ZABBIC-NODE-PROCESS-CE</predefined-attacks>
- <predefined-attacks>APP:MISC:ZEND-SERVER-CE</predefined-attacks>
- <predefined-attacks>APP:MIT-KERBEROS-5-POLICY-DOS</predefined-attacks>
- <predefined-attacks>APP:MS-SNABASE-EXE-DOS</predefined-attacks>
- <predefined-attacks>APP:MSDOTNET-CVE-2014-1806</predefined-attacks>
- <predefined-attacks>APP:NOVELL:MESSENGER-BOF</predefined-attacks>
- <predefined-attacks>APP:NOVELL:MESSENGER-LOGIN</predefined-attacks>
- <predefined-attacks>APP:NOVELL:ZENWORKS-DIR-TRAV</predefined-attacks>
- <predefined-attacks>APP:NOVELL:ZENWORKS-MGT-UPLOAD</predefined-attacks>
- <predefined-attacks>APP:OPENVIEW-STORAGE-BO</predefined-attacks>
- <predefined-attacks>APP:ORACLE:WEBLOGIC-FILE-UPLOAD</predefined-attacks>
- <predefined-attacks>APP:ORACLE:WEBLOGIC-SRV-RCE</predefined-attacks>
- <predefined-attacks>APP:PERSISTENT-COMMAND-EXEC</predefined-attacks>
- <predefined-attacks>APP:PROXY:SQUID-SSLBUMP-CERT</predefined-attacks>
- <predefined-attacks>APP:QEMU-VNC-SETPIXEL-PTR-DEREF</predefined-attacks>
- <predefined-attacks>APP:QUEST-BIG-BRO-FD</predefined-attacks>
- <predefined-attacks>APP:RDP-BRUTE-FORCE</predefined-attacks>
- <predefined-attacks>APP:REAL:REAL-MPG-WIDTH</predefined-attacks>
- <predefined-attacks>APP:REDIS-GETNUM-IO</predefined-attacks>
- <predefined-attacks>APP:REMOTE:CVE-2015-2373-RCE</predefined-attacks>
- <predefined-attacks>APP:REMOTE:NETTRANSPORT-DM</predefined-attacks>
- <predefined-attacks>APP:REMOTE:RDP-HEAP-BO</predefined-attacks>
- <predefined-attacks>APP:REMOTE:RDP-MEM-OBJ</predefined-attacks>
- <predefined-attacks>APP:SAFENET-VPN-OF</predefined-attacks>
- <predefined-attacks>APP:SAP:3DM-FILE-BOF</predefined-attacks>
- <predefined-attacks>APP:SAP:3DVIS-FLIC-BO</predefined-attacks>
- <predefined-attacks>APP:SAP:INT-GRAPHICS-PARAMS-XSS</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-BO</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-DIAGI-DOS</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-DOS</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-SOAP-RCE</predefined-attacks>
- <predefined-attacks>APP:SNORT:BACKORIFICE-DOS</predefined-attacks>
- <predefined-attacks>APP:SQUID-BUMP-DOS</predefined-attacks>
- <predefined-attacks>APP:SYMC:ALTIRIS-DS-SQL-INJ</predefined-attacks>
- <predefined-attacks>APP:SYMC:ENCRYPTED-CMD-EXEC</predefined-attacks>
- <predefined-attacks>APP:TMIC:SP-CREATE-BIND-OF</predefined-attacks>
- <predefined-attacks>APP:TMIC:SP-EARTH-AGENT-OF</predefined-attacks>
- <predefined-attacks>APP:UPNP:LIBUPNP-DSN-BOF</predefined-attacks>
- <predefined-attacks>APP:UPNP:LIBUPNP-ROOT-DSN-BOF</predefined-attacks>
- <predefined-attacks>APP:UPNP:LIBUPNP-UUID-BOF</predefined-attacks>
- <predefined-attacks>APP:VCENTER-JMX-RCE</predefined-attacks>
- <predefined-attacks>APP:VCENTER-JMX-RCE2</predefined-attacks>
- <predefined-attacks>APP:VINZANT-ARCHTCTR-AUTHWKNESS</predefined-attacks>
- <predefined-attacks>CHAT:IRC:BOTNET:RA1NX-BOT-CE</predefined-attacks>
- <predefined-attacks>CHAT:IRC:BOTNET:W3TW0RK-RCE</predefined-attacks>
- <predefined-attacks>DB:IBM-SOLIDBD-WHERE-DOS</predefined-attacks>
- <predefined-attacks>DB:IBM-SOLIDDB-ROWNUM</predefined-attacks>
- <predefined-attacks>DB:MONGODB-NATIVEHELPER-RCE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:BENCHMARK-DOS</predefined-attacks>
- <predefined-attacks>DB:MYSQL:BRUTE-FORCE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:CLIENT-BOF</predefined-attacks>
- <predefined-attacks>DB:MYSQL:GRANT-FILE-BO</predefined-attacks>
- <predefined-attacks>DB:MYSQL:ORACLE-XPATH-DOS</predefined-attacks>
- <predefined-attacks>DB:MYSQL:ROOT-PRIVILEGE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:UPDATEXML-DOS</predefined-attacks>
- <predefined-attacks>DB:MYSQL:USER-ENUMERATION</predefined-attacks>
- <predefined-attacks>DB:MYSQL:WIN-RCE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:WINDOWS-REMOTE-ROOT</predefined-attacks>
- <predefined-attacks>DB:ORACLE:DBMS:OUTPUT-TO-JAVA</predefined-attacks>
- <predefined-attacks>DB:ORACLE:DECLARE-EXEC</predefined-attacks>
- <predefined-attacks>DB:ORACLE:EVTDUMP</predefined-attacks>
- <predefined-attacks>DB:ORACLE:SYS:LPXFSMSAX-NAME-BO</predefined-attacks>
- <predefined-attacks>DB:POSTGRESQL:DBNAME-CLIFLAGINJ</predefined-attacks>
- <predefined-attacks>DB:POSTGRESQL:GEO-OPS-PATH-IN</predefined-attacks>
- <predefined-attacks>DB:POSTGRESQL:POSTGRE-DBSEC-BP</predefined-attacks>
- <predefined-attacks>DDOS:LOIC-WEB</predefined-attacks>
- <predefined-attacks>DHCP:SERVER:GNU-BASH-CMD-EXE</predefined-attacks>
- <predefined-attacks>DHCP:SERVER:ISC-MAL-CLID</predefined-attacks>
- <predefined-attacks>DNS:AUDIT:UNASSIGNED-OPCODE</predefined-attacks>
- <predefined-attacks>DNS:AUDIT:Z-RESERVED-OPT</predefined-attacks>
- <predefined-attacks>DNS:BIND-DBC-ASSERT-DOS</predefined-attacks>
- <predefined-attacks>DNS:EXPLOIT:BIND-KEYPARSE-DOS</predefined-attacks>
- <predefined-attacks>DNS:EXPLOIT:CLIBCVE-2015-7547BO</predefined-attacks>
- <predefined-attacks>DNS:EXPLOIT:LIBCVE-2015-7547BO2</predefined-attacks>
- <predefined-attacks>DNS:GNUTLS-DANE-BOF</predefined-attacks>
- <predefined-attacks>DNS:ISC-ASSERTION-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-DNSSEC-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-EDNS-OPT-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-PACKAGE-DOS</predefined-attacks>
- <predefined-attacks>DNS:MS-ISA-CE</predefined-attacks>
- <predefined-attacks>DNS:NGINX-RESOLVER-DOS</predefined-attacks>
- <predefined-attacks>DNS:OVERFLOW:GNU-C-GLIBC</predefined-attacks>
- <predefined-attacks>DNS:OVERFLOW:TFTPD32</predefined-attacks>
- <predefined-attacks>DNS:PDNS-AUTHSERV-DOS</predefined-attacks>
- <predefined-attacks>DNS:POWERDNS-NAMESRVR-UDP-DOS</predefined-attacks>
- <predefined-attacks>DNS:POWERDNS-NAMSRVR-TCP-DOS</predefined-attacks>
- <predefined-attacks>DNS:REPERR:NULL-RDATA-LEN</predefined-attacks>
- <predefined-attacks>DNS:RRSIG-QUERY</predefined-attacks>
- <predefined-attacks>DNS:SQUID-DNS-DOS-1</predefined-attacks>
- <predefined-attacks>DNS:TUNNEL:I2P-DNS-QUERY</predefined-attacks>
- <predefined-attacks>DNS:TUNNEL:NULL-RECORD</predefined-attacks>
- <predefined-attacks>DNS:WORDPRESS-SOAK-SOAK-MALWARE</predefined-attacks>
- <predefined-attacks>DOS:DELL-NETVAULT-DOS</predefined-attacks>
- <predefined-attacks>DOS:FREEBSD-ROUTED-DAEMON</predefined-attacks>
- <predefined-attacks>DOS:SLOWHTTPTEST-TOOL</predefined-attacks>
- <predefined-attacks>DOS:WINDOWS:HTTP-SYS</predefined-attacks>
- <predefined-attacks>DOS:WINDOWS:ISCSI-TARGET</predefined-attacks>
- <predefined-attacks>HTTP:ADOBE-FLASH-PLAYER-BO</predefined-attacks>
- <predefined-attacks>HTTP:ADOBE-FLASHPLYR-PRIV-ESC</predefined-attacks>
- <predefined-attacks>HTTP:ANGLER-EXPKIT-URI</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:APACHE-CHUNKREQ-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:APR-UTIL-LIB-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:COUCHDB-UUID-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:HTTPD-ERROR-400</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:HTTPD-MODLOG-COOKIE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:MOD-LOG-CONFIG-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:MOD-REWRITE-CMD-EXE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:REST-RCE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:REV-PROXY-EXPLOIT</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-CI-SECBYPASS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-OGNL-CE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-RST-DMI-EXEC</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-URL-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-XSLT-FI</predefined-attacks>
- <predefined-attacks>HTTP:BACKDOOR-UPATRE-UA</predefined-attacks>
- <predefined-attacks>HTTP:C99-SHELL-BACKDOOR</predefined-attacks>
- <predefined-attacks>HTTP:CARBERP-BACKDOOR-RCE</predefined-attacks>
- <predefined-attacks>HTTP:CGI:BASH-INJECTION-HEADER</predefined-attacks>
- <predefined-attacks>HTTP:CGI:MS-OFFICE-URL-BOF</predefined-attacks>
- <predefined-attacks>HTTP:CISCO:DOWNLOADSERVLET-FU</predefined-attacks>
- <predefined-attacks>HTTP:CLAMAV-ENCRYPT-PDF-MC2</predefined-attacks>
- <predefined-attacks>HTTP:CLANSPHERE-COOKIE-LFI</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-ENCODING</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-LANG</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-AUTH-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-CONT-TYPE</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-CONTENT-MD5</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-HOST-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-REFERER-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:ZIMBRA-SERVER-LDAP</predefined-attacks>
- <predefined-attacks>HTTP:DLINK-AUTHENTICATION-BO</predefined-attacks>
- <predefined-attacks>HTTP:DOS:APACHE-TOMCAT-CHUNKED2</predefined-attacks>
- <predefined-attacks>HTTP:DOS:HAPROXY-REQDENY</predefined-attacks>
- <predefined-attacks>HTTP:DOS:MIT-KERBEROS-5-POLICY</predefined-attacks>
- <predefined-attacks>HTTP:DOS:PHP-UPLOAD</predefined-attacks>
- <predefined-attacks>HTTP:DOS:SCHNEIDER-EXPRT-SCADA</predefined-attacks>
- <predefined-attacks>HTTP:DOS:SQUID-HDR-RANGE</predefined-attacks>
- <predefined-attacks>HTTP:DRUPAL-CODER-RCE</predefined-attacks>
- <predefined-attacks>HTTP:EK-ANGLER-JAVA</predefined-attacks>
- <predefined-attacks>HTTP:EXPLOIT:ILLEGAL-HOST-CHAR</predefined-attacks>
- <predefined-attacks>HTTP:FORTINET-HELLO-MSG-DOS</predefined-attacks>
- <predefined-attacks>HTTP:HTTP-INVALID-PORT-VALUE</predefined-attacks>
- <predefined-attacks>HTTP:HTTP_PROXY-ATTACK</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ASP-NET-MVC-SEC-BYPASS</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ASPX-URL</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ASPX-URL-1</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-1</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-2</predefined-attacks>
- <predefined-attacks>HTTP:IIS:IIS-6-7-AUTH-BYPASS</predefined-attacks>
- <predefined-attacks>HTTP:IIS:INT-OVERFLOW-DOS</predefined-attacks>
- <predefined-attacks>HTTP:IIS:WEB-CONFIG-INFO-LEAK</predefined-attacks>
- <predefined-attacks>HTTP:IIS:WEBDAV:WINDOWS-SHELL</predefined-attacks>
- <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI</predefined-attacks>
- <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI-TCP</predefined-attacks>
- <predefined-attacks>HTTP:INVALID:EXPECT</predefined-attacks>
- <predefined-attacks>HTTP:JAVA-UPDATE-RCE</predefined-attacks>
- <predefined-attacks>HTTP:JENKINS-CI-SERVER-CE</predefined-attacks>
- <predefined-attacks>HTTP:LIBGD-GD2GETHEADER-IO</predefined-attacks>
- <predefined-attacks>HTTP:LIBGD-HEAP-BO</predefined-attacks>
- <predefined-attacks>HTTP:LIBREOFFICE-INTEGR-UNDRFLW</predefined-attacks>
- <predefined-attacks>HTTP:MALICIOUS-SESSION-COOKIE</predefined-attacks>
- <predefined-attacks>HTTP:MAMBO-MYSQL-INF-DISCLOSURE</predefined-attacks>
- <predefined-attacks>HTTP:MANAGENGINE-EVTLG-INF-DISC</predefined-attacks>
- <predefined-attacks>HTTP:MAXTHON-HISTORY-XSS</predefined-attacks>
- <predefined-attacks>HTTP:MISC:AVIRA-MGNT-HEADER-BOF</predefined-attacks>
- <predefined-attacks>HTTP:MISC:CHASYS-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:COOL-EXKIT-JAR-DL</predefined-attacks>
- <predefined-attacks>HTTP:MISC:CUTEZIP-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:CVE-2014-6332-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:DAZ-STUDIO-SCRIPT-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:ERS-VIEWER-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:GITLIST-URI-REQ-CE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:GRAPHITE-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:GSM-SIMEDIT-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:IRFVIEW-JP2-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:JBOSS-SEAM-EL-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:JOOMLA-UNSER-CE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MAPLE-MAPLET-CMD-EXEC</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MINIUPNPD-SOAP-ACTION</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MS-FOREFRONT-DOS</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MS-OWA-URL-REDIR</predefined-attacks>
- <predefined-attacks>HTTP:MISC:RUBY-RAILS-SECRET-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:SPLUNK-CUSTOM-APP-CE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:WESTERN-DIGITAL-LFI</predefined-attacks>
- <predefined-attacks>HTTP:MISC:WINRAR-FILENM-SPOOF</predefined-attacks>
- <predefined-attacks>HTTP:MISC:WIRESHARK-LUA-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MONKEY-HTTPD-BO</predefined-attacks>
- <predefined-attacks>HTTP:MS-VBSCRIPT-UAF-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MS-WIN-FOLDER-GUID-CE</predefined-attacks>
- <predefined-attacks>HTTP:NAGIOS-CONFMGR-SQLINJ</predefined-attacks>
- <predefined-attacks>HTTP:NEUTRINO-EK-SB</predefined-attacks>
- <predefined-attacks>HTTP:NGINX-RQST-URI-SECBYPASS</predefined-attacks>
- <predefined-attacks>HTTP:NODEJS-DOS</predefined-attacks>
- <predefined-attacks>HTTP:NOVELL:GROUPWISE-NETAGT-BO</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:CONF-ACCESS</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:GENERIC-SIGNATUR-MC</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:OUTSIDE-PRDOX-BO2</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:SSO-ACCESS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:CDF-INFINITE-LOOP-DOS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:CORE-INT-OF-CE</predefined-attacks>
- <predefined-attacks>HTTP:PHP:DATEINTERVAL-DOS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:EXIF-NULL-PTR-DEREF</predefined-attacks>
- <predefined-attacks>HTTP:PHP:INVISION-IPS-COMM</predefined-attacks>
- <predefined-attacks>HTTP:PHP:JOOMLA-ADMIN-SCAN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:OPENEMR-GLOBALS-AB</predefined-attacks>
- <predefined-attacks>HTTP:PHP:PHAR-PARSE-TARFILE-ID</predefined-attacks>
- <predefined-attacks>HTTP:PHP:PHPMYADMIN:SETUP-SCAN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:PHPSPLOIT-POSTEXP</predefined-attacks>
- <predefined-attacks>HTTP:PHP:SPL-OBJECT-UNSERIALIZE</predefined-attacks>
- <predefined-attacks>HTTP:PHP:TAR-FILE-PTR</predefined-attacks>
- <predefined-attacks>HTTP:PHP:WP-BRUTE-FORCE-LOGIN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:WP-INCLUDES-ACCESS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:WP-README-SCAN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:XAMPP-FILE-WRITE</predefined-attacks>
- <predefined-attacks>HTTP:PHP:ZIPARCHIVE-IO</predefined-attacks>
- <predefined-attacks>HTTP:PROXY:SQUID-DOS</predefined-attacks>
- <predefined-attacks>HTTP:REGIN-CNC-TRAFFIC</predefined-attacks>
- <predefined-attacks>HTTP:REQERR:INV-IPV6-HOST-HDR</predefined-attacks>
- <predefined-attacks>HTTP:REQERR:NULL-IN-HEADER</predefined-attacks>
- <predefined-attacks>HTTP:SOLARWINDS-AUTH-BYPASS</predefined-attacks>
- <predefined-attacks>HTTP:SOLARWINDS-POLICYBYPASS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:AND-NUMBER-EQUALS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CHAR</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CHAR-ENCODE</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:COMMENT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:COMPARISON</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONCAT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONVERT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONVERT-INJ-OF</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HAVIJ-UA</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-REQ-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:INSERT-VALUES</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:INTO-OUTFILE</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:IS_SRVROLEMEMBER</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:MS-SQL-FUNCTIONS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:MS-SQL-TABLE-NAME</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:MYSQL-TABLE-NAME</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:NULLBYTE-COMMENT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:PL-SQL</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:PROC-GENERIC</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:SLASH-STAR</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:SQLMAP-ACTIVITY</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:SYSOBJECTS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:UA-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:UA-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:UNION-SELECT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:USER-ADD</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:VERSION-DETECT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:WAITFOR-DELAY</predefined-attacks>
- <predefined-attacks>HTTP:SQUID-BUMP-DOS</predefined-attacks>
- <predefined-attacks>HTTP:STATIC-SERVER-BOF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ACTIVEX:KVIEW-KCHARTXY</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:2013-5065-PDF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:ACROFORM-NULL-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CONVFILTER-UAF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-2985-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3791-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3959-OF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2010-2202-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-0622-SB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3353</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3355-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5324-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5325-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5329-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0511-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0512-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0517-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0521</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0522-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0523-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0524-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0531-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0537-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0538-UF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0539-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0545-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0547-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0548-PB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0550-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0553-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0554</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0555-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0559-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0564-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0565-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0567-OF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0568-SE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0576-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0577-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0578-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0580-SB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0584-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0586-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-4671</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8440-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8441-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8447-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8449-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8450-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8451-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8455-UF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8459-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8460-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8461-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9159-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9160-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9162-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0087-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0089-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0090-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0093-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0301-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0302-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0303-SB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0305-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0306-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0307-DS</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0313-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0314-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0315-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0317-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0319-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0320-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0321-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0322-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0323-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0324-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0325-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0326-DS</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0328-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0329-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0330-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0333-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0334-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0335-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0337-PB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0338-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0339-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0340-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0341-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0342-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0346-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0347-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0348-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0349-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0350-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0351-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0352-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0353-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0354-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0355-MC</predefined-attacks>
- </attacks>
- </match>
- <then>
- <action>
- <no-action/>
- </action>
- <ip-action>
- <ip-notify/>
- <target>source-address</target>
- <log/>
- <log-create/>
- </ip-action>
- <notification>
- <log-attacks>
- <alert/>
- </log-attacks>
- </notification>
- </then>
- </rule>
- <rule>
- <name>DBE-Q-IPS-policy-template-2</name>
- <match>
- <from-zone>any</from-zone>
- <to-zone>any</to-zone>
- <application>default</application>
- <attacks>
- <predefined-attack-groups>[Recommended]Critical - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - All</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Critical</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Info</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Major</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Minor</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Warning</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Info - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Major - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Minor - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Critical - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - All</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Critical</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Info</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Major</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Minor</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Warning</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Info - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Major - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Minor - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Warning - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Critical - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - All</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Critical</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Info</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Major</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Minor</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Warning</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Info - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Major - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Minor - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Warning - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Warning - ICMP</predefined-attack-groups>
- </attacks>
- </match>
- <then>
- <action>
- <recommended/>
- </action>
- <ip-action>
- <ip-notify/>
- <target>source-address</target>
- </ip-action>
- <notification>
- <log-attacks>
- <alert/>
- </log-attacks>
- </notification>
- </then>
- </rule>
- </rulebase-ips>
- </idp-policy>
- <active-policy>Space-IPS-Policy</active-policy>
- </idp>
- <forwarding-options>
- <family>
- <inet6>
- <mode>flow-based</mode>
- </inet6>
- </family>
- </forwarding-options>
- <screen>
- <ids-option>
- <name>untrust-screen</name>
- <alarm-without-drop/>
- <icmp>
- <ip-sweep>
- <threshold>5000</threshold>
- </ip-sweep>
- <fragment/>
- <large/>
- <ping-death/>
- </icmp>
- <ip>
- <bad-option/>
- <record-route-option/>
- <timestamp-option/>
- <security-option/>
- <stream-option/>
- <spoofing/>
- <source-route-option/>
- <loose-source-route-option/>
- <strict-source-route-option/>
- <unknown-protocol/>
- <tear-drop/>
- </ip>
- <tcp>
- <syn-fin/>
- <fin-no-ack/>
- <tcp-no-flag/>
- <syn-frag/>
- <port-scan>
- <threshold>5000</threshold>
- </port-scan>
- <syn-ack-ack-proxy>
- </syn-ack-ack-proxy>
- <syn-flood>
- <alarm-threshold>1024</alarm-threshold>
- <attack-threshold>200</attack-threshold>
- <source-threshold>1024</source-threshold>
- <destination-threshold>2048</destination-threshold>
- <undocumented><queue-size>2000</queue-size></undocumented>
- <timeout>20</timeout>
- </syn-flood>
- <land/>
- </tcp>
- </ids-option>
- </screen>
- <nat>
- <source>
- <pool>
- <name>sp_dmzpfsnat</name>
- <address>
- <name>10.68.16.13/32</name>
- </address>
- <address>
- <name>10.68.16.14/32</name>
- </address>
- <address>
- <name>10.68.16.15/32</name>
- </address>
- <address>
- <name>10.68.16.16/32</name>
- </address>
- <port>
- <range>
- <low>1024</low>
- <to>
- <high>63486</high>
- </to>
- </range>
- </port>
- <pool-utilization-alarm>
- <raise-threshold>80</raise-threshold>
- <clear-threshold>70</clear-threshold>
- </pool-utilization-alarm>
- </pool>
- <rule-set>
- <name>rs_mis2dmzpfsnat</name>
- <from>
- <zone>sz_dbemis</zone>
- </from>
- <to>
- <zone>trust</zone>
- </to>
- <rule>
- <name>nr_dmzpsnat</name>
- <src-nat-rule-match>
- <destination-address>10.68.16.4/32</destination-address>
- <destination-address>10.68.16.5/32</destination-address>
- </src-nat-rule-match>
- <then>
- <source-nat>
- <pool>
- <pool-name>sp_dmzpfsnat</pool-name>
- </pool>
- </source-nat>
- </then>
- </rule>
- </rule-set>
- </source>
- <destination>
- <pool>
- <name>dp_dmzpf01ap1dnat</name>
- <address>
- <ipaddr>10.68.16.4/32</ipaddr>
- </address>
- </pool>
- <pool>
- <name>dp_dmzpf02ap1dnat</name>
- <address>
- <ipaddr>10.68.16.5/32</ipaddr>
- </address>
- </pool>
- <rule-set>
- <name>rs_mis2dmzpfdnat</name>
- <from>
- <zone>sz_dbemis</zone>
- </from>
- <rule>
- <name>nr_p01ap1dnat</name>
- <dest-nat-rule-match>
- <destination-address>
- <dst-addr>12.102.197.133/32</dst-addr>
- </destination-address>
- </dest-nat-rule-match>
- <then>
- <destination-nat>
- <pool>
- <pool-name>dp_dmzpf01ap1dnat</pool-name>
- </pool>
- </destination-nat>
- </then>
- </rule>
- <rule>
- <name>nr_p02ap1dnat</name>
- <dest-nat-rule-match>
- <destination-address>
- <dst-addr>12.102.197.134/32</dst-addr>
- </destination-address>
- </dest-nat-rule-match>
- <then>
- <destination-nat>
- <pool>
- <pool-name>dp_dmzpf02ap1dnat</pool-name>
- </pool>
- </destination-nat>
- </then>
- </rule>
- </rule-set>
- </destination>
- <proxy-arp>
- <interface>
- <name>reth0.0</name>
- <address>
- <name>12.102.197.133/32</name>
- </address>
- <address>
- <name>12.102.197.134/32</name>
- </address>
- </interface>
- <interface>
- <name>reth1.0</name>
- <address>
- <name>10.68.16.13/32</name>
- </address>
- <address>
- <name>10.68.16.14/32</name>
- </address>
- <address>
- <name>10.68.16.15/32</name>
- </address>
- <address>
- <name>10.68.16.16/32</name>
- </address>
- </interface>
- </proxy-arp>
- </nat>
- <policies>
- <policy>
- <from-zone-name>trust</from-zone-name>
- <to-zone-name>trust</to-zone-name>
- <policy>
- <name>default-permit</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <permit>
- </permit>
- <log>
- <session-init/>
- <session-close/>
- </log>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>trust</from-zone-name>
- <to-zone-name>untrust</to-zone-name>
- <policy>
- <name>default-permit</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <permit>
- </permit>
- <log>
- <session-init/>
- <session-close/>
- </log>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>sz_dbemis</from-zone-name>
- <to-zone-name>trust</to-zone-name>
- <policy>
- <name>sp_bwxspapi</name>
- <match>
- <source-address>any</source-address>
- <destination-address>as_bwdmzpxspapsrvrs_2</destination-address>
- <application>ps_bwapi_3</application>
- </match>
- <then>
- <permit>
- </permit>
- <log>
- <session-init/>
- <session-close/>
- </log>
- <count>
- </count>
- </then>
- </policy>
- <policy>
- <name>sp_bwpdeny</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <deny/>
- <log>
- <session-init/>
- </log>
- <count>
- </count>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>trust</from-zone-name>
- <to-zone-name>sz_dbemis</to-zone-name>
- <policy>
- <name>sp_bwzdeny</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <deny/>
- <log>
- <session-init/>
- </log>
- <count>
- </count>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>untrust</from-zone-name>
- <to-zone-name>trust</to-zone-name>
- <policy>
- <name>default-deny</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <deny/>
- <log>
- <session-init/>
- <session-close/>
- </log>
- </then>
- </policy>
- </policy>
- </policies>
- <zones>
- <security-zone>
- <name>trust</name>
- <tcp-rst/>
- <address-book>
- <address>
- <name>ad_bwxsp02ap1pf</name>
- <ip-prefix>10.68.16.5/32</ip-prefix>
- </address>
- <address>
- <name>ad_bwxsp01ap1pf_1</name>
- <ip-prefix>10.68.16.4/32</ip-prefix>
- </address>
- <address-set>
- <name>as_bwdmzpxspapsrvrs_2</name>
- <address>
- <name>ad_bwxsp01ap1pf_1</name>
- </address>
- <address>
- <name>ad_bwxsp02ap1pf</name>
- </address>
- </address-set>
- </address-book>
- <host-inbound-traffic>
- <system-services>
- <name>all</name>
- </system-services>
- <protocols>
- <name>all</name>
- </protocols>
- </host-inbound-traffic>
- <interfaces>
- <name>reth1.0</name>
- </interfaces>
- </security-zone>
- <security-zone>
- <name>untrust</name>
- <screen>untrust-screen</screen>
- </security-zone>
- <security-zone>
- <name>sz_dbemis</name>
- <screen>untrust-screen</screen>
- <interfaces>
- <name>reth0.0</name>
- </interfaces>
- </security-zone>
- </zones>
- </security>
- <interfaces>
- <interface>
- <name>ge-0/0/1</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth0</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>ge-0/0/2</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth1</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>ge-7/0/1</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth0</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>ge-7/0/2</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth1</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>fab0</name>
- <fabric-options>
- <member-interfaces>
- <name>ge-0/0/0</name>
- </member-interfaces>
- </fabric-options>
- </interface>
- <interface>
- <name>fab1</name>
- <fabric-options>
- <member-interfaces>
- <name>ge-7/0/0</name>
- </member-interfaces>
- </fabric-options>
- </interface>
- <interface>
- <name>fxp0</name>
- <unit>
- <name>0</name>
- </unit>
- </interface>
- <interface>
- <name>reth0</name>
- <redundant-ether-options>
- <redundancy-group>1</redundancy-group>
- </redundant-ether-options>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <filter>
- <input>
- <filter-name>ff_pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>12.102.197.132/25</name>
- </address>
- </inet>
- <inet6>
- <filter>
- <input>
- <filter-name>ff_v6pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>2001:1890:1001:23ed::3:1/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ed::3:2/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ed::3:3/64</name>
- </address>
- </inet6>
- </family>
- </unit>
- </interface>
- <interface>
- <name>reth1</name>
- <redundant-ether-options>
- <redundancy-group>1</redundancy-group>
- </redundant-ether-options>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <filter>
- <input>
- <filter-name>ff_pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>10.68.16.12/22</name>
- </address>
- </inet>
- <inet6>
- <filter>
- <input>
- <filter-name>ff_v6pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>2001:1890:1001:23ec::3:1/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:2/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:3/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:4/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:5/64</name>
- </address>
- </inet6>
- </family>
- </unit>
- </interface>
- </interfaces>
- <snmp>
- <community>
- <name>vsbk68</name>
- <authorization>read-only</authorization>
- <clients>
- <name>130.6.45.42/32</name>
- </clients>
- <clients>
- <name>130.6.45.41/32</name>
- </clients>
- <clients>
- <name>130.6.44.254/32</name>
- </clients>
- <clients>
- <name>130.6.44.253/32</name>
- </clients>
- <clients>
- <name>135.25.175.114/32</name>
- </clients>
- <clients>
- <name>135.21.235.37/32</name>
- </clients>
- </community>
- <community>
- <name>space15</name>
- <authorization>read-write</authorization>
- <clients>
- <name>135.144.0.60/32</name>
- </clients>
- <clients>
- <name>135.144.0.59/32</name>
- </clients>
- <clients>
- <name>135.144.0.61/32</name>
- </clients>
- </community>
- <trap-group>
- <name>GFP</name>
- <version>v2</version>
- <destination-port>162</destination-port>
- <targets>
- <name>135.89.33.175</name>
- </targets>
- <targets>
- <name>199.37.245.24</name>
- </targets>
- </trap-group>
- <trap-group>
- <name>space</name>
- <targets>
- <name>135.144.0.60</name>
- </targets>
- </trap-group>
- <health-monitor>
- <idp>
- </idp>
- </health-monitor>
- </snmp>
- <routing-options>
- <interface-routes>
- <rib-group>
- <inet>rg_mis2dmzp</inet>
- <inet6>rg_v6mis2dmzp</inet6>
- </rib-group>
- </interface-routes>
- <static>
- <route>
- <name>0.0.0.0/0</name>
- <next-hop>135.69.228.1</next-hop>
- </route>
- </static>
- <rib-groups>
- <name>rg_mis2dmzp</name>
- <import-rib>vrf-untrust.inet.0</import-rib>
- <import-rib>inet.0</import-rib>
- </rib-groups>
- <rib-groups>
- <name>rg_v6mis2dmzp</name>
- <import-rib>vrf-untrust.inet6.0</import-rib>
- <import-rib>inet6.0</import-rib>
- </rib-groups>
- </routing-options>
- <class-of-service>
- <interfaces>
- <interface>
- <name>reth0</name>
- <unit>
- <name>0</name>
- <rewrite-rules>
- <dscp>
- <name>cr_pdscpaf</name>
- </dscp>
- <dscp-ipv6>
- <name>cr_v6pdscpaf</name>
- </dscp-ipv6>
- </rewrite-rules>
- </unit>
- </interface>
- <interface>
- <name>reth1</name>
- <unit>
- <name>0</name>
- <rewrite-rules>
- <dscp>
- <name>cr_pdscpaf</name>
- </dscp>
- <dscp-ipv6>
- <name>cr_v6pdscpaf</name>
- </dscp-ipv6>
- </rewrite-rules>
- </unit>
- </interface>
- </interfaces>
- <rewrite-rules>
- <dscp>
- <name>cr_pdscpaf</name>
- <forwarding-class>
- <name>assured-forwarding</name>
- <loss-priority>
- <name>low</name>
- <code-point>011010</code-point>
- </loss-priority>
- </forwarding-class>
- </dscp>
- <dscp-ipv6>
- <name>cr_v6pdscpaf</name>
- <forwarding-class>
- <name>assured-forwarding</name>
- <loss-priority>
- <name>low</name>
- <code-point>011010</code-point>
- </loss-priority>
- </forwarding-class>
- </dscp-ipv6>
- </rewrite-rules>
- </class-of-service>
- <firewall>
- <family>
- <inet>
- <filter>
- <name>ff_pdscp</name>
- <term>
- <name>fr_pdscp</name>
- <from>
- <interface>
- <name>reth0</name>
- </interface>
- <interface>
- <name>reth1</name>
- </interface>
- </from>
- <then>
- <forwarding-class>assured-forwarding</forwarding-class>
- <accept/>
- </then>
- </term>
- </filter>
- </inet>
- <inet6>
- <filter>
- <name>ff_v6pdscp</name>
- <term>
- <name>fr_v6pdscp</name>
- <from>
- <interface>
- <name>reth0</name>
- </interface>
- <interface>
- <name>reth1</name>
- </interface>
- </from>
- <then>
- <forwarding-class>assured-forwarding</forwarding-class>
- <accept/>
- </then>
- </term>
- </filter>
- </inet6>
- </family>
- </firewall>
- <routing-instances>
- <instance>
- <name>vrf-untrust</name>
- <instance-type>virtual-router</instance-type>
- <interface>
- <name>reth0.0</name>
- </interface>
- <routing-options>
- <interface-routes>
- <rib-group>
- <inet>rg_mis2dmzp</inet>
- <inet6>rg_v6mis2dmzp</inet6>
- </rib-group>
- </interface-routes>
- <rib>
- <name>vrf-untrust.inet6.0</name>
- <static>
- <route>
- <name>0::/0</name>
- <next-hop>2001:1890:1001:23ed::1</next-hop>
- </route>
- </static>
- </rib>
- <static>
- <route>
- <name>0.0.0.0/0</name>
- <next-hop>12.102.197.129</next-hop>
- </route>
- </static>
- </routing-options>
- </instance>
- </routing-instances>
- <applications>
- <application>
- <name>ap_xsi-xml-https</name>
- <protocol>tcp</protocol>
- <destination-port>443</destination-port>
- </application>
- <application-set>
- <name>ps_bwapi_3</name>
- <application>
- <name>ap_xsi-xml-https</name>
- </application>
- </application-set>
- </applications>
- </configuration> \ No newline at end of file
diff --git a/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt b/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt
deleted file mode 100644
index 861dbcc5f..000000000
--- a/docs/APPC CDT Guide/template_Configure_vABC_0.0.1.txt
+++ /dev/null
@@ -1,1535 +0,0 @@
-<rpc-reply xmlns:junos="http://xml.juniper.net/junos/15.1X49/junos">
- <configuration junos:changed-seconds="1478714723" junos:changed-localtime="2016-11-09 18:05:23 UTC">
- <version>15.1X49-D50.3</version>
- <groups>
- <name>${nodename}</name>
- <system>
- <host-name>dbqx0001vm001</host-name>
- <backup-router>
- <address>${BUrouterIP}</address>
- <destination>${DestinationSubnet}</destination>
- </backup-router>
- <services>
- <ssh>
- <max-sessions-per-connection>32</max-sessions-per-connection>
- </ssh>
- </services>
- <syslog>
- <file>
- <name>default-log-messages</name>
- <contents>
- <name>any</name>
- <info/>
- </contents>
- <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
- <structured-data>
- </structured-data>
- </file>
- </syslog>
- </system>
- <interfaces>
- <interface>
- <name>fxp0</name>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <address>
- <name>135.69.228.8/25</name>
- </address>
- </inet>
- </family>
- </unit>
- </interface>
- </interfaces>
- </groups>
- <groups>
- <name>node1</name>
- <system>
- <host-name>dbqx0001vm002</host-name>
- <backup-router>
- <address>135.69.228.1</address>
- <destination>0.0.0.0/0</destination>
- </backup-router>
- <services>
- <ssh>
- <max-sessions-per-connection>32</max-sessions-per-connection>
- </ssh>
- </services>
- <syslog>
- <file>
- <name>default-log-messages</name>
- <contents>
- <name>any</name>
- <info/>
- </contents>
- <match>(requested 'commit' operation)|(copying configuration to juniper.save)|(commit complete)|ifAdminStatus|(FRU power)|(FRU removal)|(FRU insertion)|(link UP)|transitioned|Transferred|transfer-file|(license add)|(license delete)|(package -X update)|(package -X delete)|(FRU Online)|(FRU Offline)|(plugged in)|(unplugged)|GRES</match>
- <structured-data>
- </structured-data>
- </file>
- </syslog>
- </system>
- <interfaces>
- <interface>
- <name>fxp0</name>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <address>
- <name>135.69.228.9/25</name>
- </address>
- </inet>
- </family>
- </unit>
- </interface>
- </interfaces>
- </groups>
- <apply-groups>groupname</apply-groups>
- <system>
- <root-authentication>
- <encrypted-password>$5$rKyWGmrv$sMeym/XUklUeJX2hKpcp5TzCG5R8jcmJ2901HcNGSeB</encrypted-password>
- </root-authentication>
- <name-server>
- <name>135.188.34.84</name>
- </name-server>
- <login>
- <message>\n\t\tWARNING NOTICE\n\tThis system is restricted solely to AT&amp;T authorized users for\n\tlegitimate business purposes only.The actual or attempted\n\tunauthorized access, use, or modification of this system is\n\tstrictly prohibited by AT&amp;T. Unauthorized users are subject to\n\tCompany disciplinary proceedings and/or criminal and civil\n\tpenalties under state, federal, or other applicable domestic and\n\tforeign laws. The use of this system may be monitored and\n\trecorded for administrative and security reasons. Anyone\n\taccessing this system expressly consents to such monitoring and\n\t is advised that if monitoring reveals possible evidence of\n\tcriminal activity, AT&amp;T may provide the evidence of such\n\tactivity to law enforcement officials. All users must comply\n\twith AT&amp;T company policies regarding the protection of AT&amp;T\n\tinformation assets.\n\n</message>
- </login>
- <services>
- <ssh>
- <protocol-version>v2</protocol-version>
- </ssh>
- <netconf>
- <ssh>
- </ssh>
- </netconf>
- </services>
- <syslog>
- <user>
- <name>*</name>
- <contents>
- <name>any</name>
- <emergency/>
- </contents>
- </user>
- <host>
- <name>135.144.0.62</name>
- <contents>
- <name>any</name>
- <any/>
- </contents>
- <structured-data>
- </structured-data>
- </host>
- <file>
- <name>messages</name>
- <contents>
- <name>any</name>
- <any/>
- </contents>
- <contents>
- <name>authorization</name>
- <info/>
- </contents>
- </file>
- <file>
- <name>interactive-commands</name>
- <contents>
- <name>interactive-commands</name>
- <any/>
- </contents>
- </file>
- <file>
- <name>session_log</name>
- <contents>
- <name>any</name>
- <info/>
- </contents>
- <structured-data>
- </structured-data>
- </file>
- <file>
- <name>policy_session</name>
- <match>RT_FLOW</match>
- </file>
- </syslog>
- <license>
- <autoupdate>
- <url>
- <name>https://ae1.juniper.net/junos/key_retrieval</name>
- </url>
- </autoupdate>
- </license>
- <ntp>
- <server>
- <name>192.20.201.162</name>
- </server>
- </ntp>
- </system>
- <chassis>
- <cluster>
- <control-link-recovery/>
- <reth-count>2</reth-count>
- <heartbeat-interval>1000</heartbeat-interval>
- <heartbeat-threshold>3</heartbeat-threshold>
- <redundancy-group>
- <name>0</name>
- <node>
- <name>0</name>
- <priority>100</priority>
- </node>
- <node>
- <name>1</name>
- <priority>1</priority>
- </node>
- </redundancy-group>
- <redundancy-group>
- <name>1</name>
- <node>
- <name>0</name>
- <priority>100</priority>
- </node>
- <node>
- <name>1</name>
- <priority>1</priority>
- </node>
- <interface-monitor>
- <name>ge-0/0/1</name>
- <weight>255</weight>
- </interface-monitor>
- <interface-monitor>
- <name>ge-7/0/1</name>
- <weight>255</weight>
- </interface-monitor>
- <interface-monitor>
- <name>ge-0/0/2</name>
- <weight>255</weight>
- </interface-monitor>
- <interface-monitor>
- <name>ge-7/0/2</name>
- <weight>255</weight>
- </interface-monitor>
- <ip-monitoring>
- <global-weight>255</global-weight>
- <retry-interval>1</retry-interval>
- <retry-count>5</retry-count>
- <family>
- <inet>
- <address>
- <name>10.68.16.1</name>
- <weight>255</weight>
- <interface>
- <logical-interface-name>reth1.0</logical-interface-name>
- <secondary-ip-address>10.68.16.17</secondary-ip-address>
- </interface>
- </address>
- <address>
- <name>12.102.197.129</name>
- <weight>255</weight>
- <interface>
- <logical-interface-name>reth0.0</logical-interface-name>
- <secondary-ip-address>12.102.197.135</secondary-ip-address>
- </interface>
- </address>
- </inet>
- </family>
- </ip-monitoring>
- </redundancy-group>
- </cluster>
- </chassis>
- <services>
- <application-identification>
- </application-identification>
- </services>
- <security>
- <idp>
- <idp-policy>
- <name>Space-IPS-Policy</name>
- <rulebase-ips>
- <rule>
- <name>DBE-Q-IPS-policy-template-1</name>
- <match>
- <from-zone>any</from-zone>
- <to-zone>any</to-zone>
- <application>default</application>
- <attacks>
- <predefined-attacks>APP:ADOBE-COLDFUSION-WEBSOCKET</predefined-attacks>
- <predefined-attacks>APP:ADOBE-FLASH-RTMP-RCE</predefined-attacks>
- <predefined-attacks>APP:AMANDA:AMANDA-ROOT-OF2</predefined-attacks>
- <predefined-attacks>APP:APPLE-MACOSX-ODP-RCE</predefined-attacks>
- <predefined-attacks>APP:ASUS-WRT-INFOSVR-COMND-EXEC</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:BCK-MESSAGE</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:BCKUP-AUTHSRV-DOS</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:METHD-EXPOSURE</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:RPC-MEMRCORRUPT</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:SQLOF-1</predefined-attacks>
- <predefined-attacks>APP:CA:ARCSRV:TAPE-ENGNE-DOS</predefined-attacks>
- <predefined-attacks>APP:CA:DBA-SVR-POINT</predefined-attacks>
- <predefined-attacks>APP:CA:RPC-MSG-BO</predefined-attacks>
- <predefined-attacks>APP:CISCO:ASA-IKE-BO</predefined-attacks>
- <predefined-attacks>APP:CISCO:CISCO-EPNM-DESERIAL-1</predefined-attacks>
- <predefined-attacks>APP:CISCO:VIDEO-SURVEILANCE-XSS</predefined-attacks>
- <predefined-attacks>APP:CITRIX:PROVISIONING-OPCODE</predefined-attacks>
- <predefined-attacks>APP:CITRIX:STREAMPROCESS-BOF</predefined-attacks>
- <predefined-attacks>APP:DIGIUM-ASTERISK-OF</predefined-attacks>
- <predefined-attacks>APP:EMC-ALPHASTOR-BOF</predefined-attacks>
- <predefined-attacks>APP:EMC-ALPHASTORE-CMDEXEC</predefined-attacks>
- <predefined-attacks>APP:EMC-APLHASTORE-FMTSTR</predefined-attacks>
- <predefined-attacks>APP:EMC-NETWORKER-NSRD-BO</predefined-attacks>
- <predefined-attacks>APP:EMC-NETWORKER-NSRINDEXD-OF</predefined-attacks>
- <predefined-attacks>APP:EMC-NSRINDEXD-BO</predefined-attacks>
- <predefined-attacks>APP:EMC-REPLICATION-MGR-CMD-EXE</predefined-attacks>
- <predefined-attacks>APP:ESIGNAL:OVERFLOW-EXPLOIT</predefined-attacks>
- <predefined-attacks>APP:FLEXERA-FLEXNET-BO</predefined-attacks>
- <predefined-attacks>APP:FREEBSD-BSPATCH-RCE</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PROTECTOR-OP-DOS</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-EXEC-BAR-CE</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP-27</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP211-264</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP215-263</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP227-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP234-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP235-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP259-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP260-BO</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OP28-11</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODE</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-OPCODES</predefined-attacks>
- <predefined-attacks>APP:HP-DATA-PRTCTR-RDS-DOS</predefined-attacks>
- <predefined-attacks>APP:HP-LEFTHAND-HYDRA-DIAG-OF</predefined-attacks>
- <predefined-attacks>APP:HP-LEFTHAND-HYDRA-PING-OF</predefined-attacks>
- <predefined-attacks>APP:HP-LOADRUNNER-BO</predefined-attacks>
- <predefined-attacks>APP:HP-LOADRUNNER-RCE</predefined-attacks>
- <predefined-attacks>APP:HP-LOADRUNNER-SSL</predefined-attacks>
- <predefined-attacks>APP:HP-LOGIN-BOF</predefined-attacks>
- <predefined-attacks>APP:HP-MGMT-UAM-BO</predefined-attacks>
- <predefined-attacks>APP:HP-NNM-HLEN-BOF</predefined-attacks>
- <predefined-attacks>APP:HP-OPENVIEW-DTPRTCTR-BO</predefined-attacks>
- <predefined-attacks>APP:HP-OPNVIEWSTORAGE-BOF</predefined-attacks>
- <predefined-attacks>APP:HP-OPNVW-STORAGE-DATA-BO</predefined-attacks>
- <predefined-attacks>APP:HP-PROCURVE-BYPASS</predefined-attacks>
- <predefined-attacks>APP:HP-PROTECTOR-DIR-TRAV</predefined-attacks>
- <predefined-attacks>APP:HP-SAN-IQ-CMD-INJ</predefined-attacks>
- <predefined-attacks>APP:HP-STORAGEWORKS-OPC22-BO</predefined-attacks>
- <predefined-attacks>APP:HP-SYS-IPRANGE-OF</predefined-attacks>
- <predefined-attacks>APP:HP-SYS-RCE</predefined-attacks>
- <predefined-attacks>APP:HP-VIRTUAL-SAN</predefined-attacks>
- <predefined-attacks>APP:HPE-NA-RMI-DESER</predefined-attacks>
- <predefined-attacks>APP:HPIM-SOM-EUACCNT-BYPASS</predefined-attacks>
- <predefined-attacks>APP:HPLOADRUNNER-XDR-BO</predefined-attacks>
- <predefined-attacks>APP:HPOV:CMD-INJ</predefined-attacks>
- <predefined-attacks>APP:IBM:DOMINO-BYPASS</predefined-attacks>
- <predefined-attacks>APP:IBM:DOMINO-BYPASS-1</predefined-attacks>
- <predefined-attacks>APP:IBM:FORMVIEWER-XFDL-BOF</predefined-attacks>
- <predefined-attacks>APP:IBM:FXCLI-EXECBO</predefined-attacks>
- <predefined-attacks>APP:IBM:LDAP-MODIFYREQUEST-BO</predefined-attacks>
- <predefined-attacks>APP:IBM:OPCODE-1330-CMD-INJ</predefined-attacks>
- <predefined-attacks>APP:IBM:TIV-OP1329-BOF</predefined-attacks>
- <predefined-attacks>APP:IBM:TIV-OP1331-CMDINJ</predefined-attacks>
- <predefined-attacks>APP:IBM:TIV-OP1339-CMDINJ</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-FASTBACK-OP-BO</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-OP4115-BO</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1301</predefined-attacks>
- <predefined-attacks>APP:IBM:TIVOLI-SRV-OP1335</predefined-attacks>
- <predefined-attacks>APP:IBM:TSM-CVE-2015-0119-BO</predefined-attacks>
- <predefined-attacks>APP:IPMI-CIPHER-ZERO</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA1</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:BLDPRINCIPAL-VA2</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:CHKSUM-PRIV-ESC</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-TCP</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:INV-TOKEN-DOS-UDP</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:KRB5-DOS</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:MULTI-REALM-DOS</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:SPNEGO-5-DOS</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:WIN-KERB-FALLBACK</predefined-attacks>
- <predefined-attacks>APP:KERBEROS:XREALM-KDC-DOS</predefined-attacks>
- <predefined-attacks>APP:MCAFEE-AM-INPUT-SSL</predefined-attacks>
- <predefined-attacks>APP:MISC:ACTMQ-SHUTDN-CMD</predefined-attacks>
- <predefined-attacks>APP:MISC:ADOBE-RTMP-UAF</predefined-attacks>
- <predefined-attacks>APP:MISC:ALIENVALT-BAKUP-COM-RE</predefined-attacks>
- <predefined-attacks>APP:MISC:APACHE-QPID-SEQSET-DOS</predefined-attacks>
- <predefined-attacks>APP:MISC:APACHE-SVN-IO</predefined-attacks>
- <predefined-attacks>APP:MISC:ARCSERVE-BKUP</predefined-attacks>
- <predefined-attacks>APP:MISC:BIGANT-DDNF-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:CLEARSCADA-OPF-PARSE</predefined-attacks>
- <predefined-attacks>APP:MISC:CVE-2014-0549-RTMP-MC</predefined-attacks>
- <predefined-attacks>APP:MISC:DIASOFT-EXECCMD-CE</predefined-attacks>
- <predefined-attacks>APP:MISC:ENTERASYS-NETSIGHT-BOF</predefined-attacks>
- <predefined-attacks>APP:MISC:EZHOMETECH-EZSERVER-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:FREEBSD-MBUF-DOS</predefined-attacks>
- <predefined-attacks>APP:MISC:GITORIOUS-RCE</predefined-attacks>
- <predefined-attacks>APP:MISC:HP-INODE-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:HP-OA-HEALTH-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:NAGIOS-NRPE-CE</predefined-attacks>
- <predefined-attacks>APP:MISC:OBJ-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:OBJ-OBJDB-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:SAM-ACTQ-MULTI</predefined-attacks>
- <predefined-attacks>APP:MISC:SCHNEIDER-INDUSOFT-RCE</predefined-attacks>
- <predefined-attacks>APP:MISC:SERCOMM-DEVICE-RCE</predefined-attacks>
- <predefined-attacks>APP:MISC:SPREE-SEARCH-CMD-EXE</predefined-attacks>
- <predefined-attacks>APP:MISC:WSHARK-ENTTEC-BO</predefined-attacks>
- <predefined-attacks>APP:MISC:XEROX-MFP-COMND-EXEC</predefined-attacks>
- <predefined-attacks>APP:MISC:ZABBIC-NODE-PROCESS-CE</predefined-attacks>
- <predefined-attacks>APP:MISC:ZEND-SERVER-CE</predefined-attacks>
- <predefined-attacks>APP:MIT-KERBEROS-5-POLICY-DOS</predefined-attacks>
- <predefined-attacks>APP:MS-SNABASE-EXE-DOS</predefined-attacks>
- <predefined-attacks>APP:MSDOTNET-CVE-2014-1806</predefined-attacks>
- <predefined-attacks>APP:NOVELL:MESSENGER-BOF</predefined-attacks>
- <predefined-attacks>APP:NOVELL:MESSENGER-LOGIN</predefined-attacks>
- <predefined-attacks>APP:NOVELL:ZENWORKS-DIR-TRAV</predefined-attacks>
- <predefined-attacks>APP:NOVELL:ZENWORKS-MGT-UPLOAD</predefined-attacks>
- <predefined-attacks>APP:OPENVIEW-STORAGE-BO</predefined-attacks>
- <predefined-attacks>APP:ORACLE:WEBLOGIC-FILE-UPLOAD</predefined-attacks>
- <predefined-attacks>APP:ORACLE:WEBLOGIC-SRV-RCE</predefined-attacks>
- <predefined-attacks>APP:PERSISTENT-COMMAND-EXEC</predefined-attacks>
- <predefined-attacks>APP:PROXY:SQUID-SSLBUMP-CERT</predefined-attacks>
- <predefined-attacks>APP:QEMU-VNC-SETPIXEL-PTR-DEREF</predefined-attacks>
- <predefined-attacks>APP:QUEST-BIG-BRO-FD</predefined-attacks>
- <predefined-attacks>APP:RDP-BRUTE-FORCE</predefined-attacks>
- <predefined-attacks>APP:REAL:REAL-MPG-WIDTH</predefined-attacks>
- <predefined-attacks>APP:REDIS-GETNUM-IO</predefined-attacks>
- <predefined-attacks>APP:REMOTE:CVE-2015-2373-RCE</predefined-attacks>
- <predefined-attacks>APP:REMOTE:NETTRANSPORT-DM</predefined-attacks>
- <predefined-attacks>APP:REMOTE:RDP-HEAP-BO</predefined-attacks>
- <predefined-attacks>APP:REMOTE:RDP-MEM-OBJ</predefined-attacks>
- <predefined-attacks>APP:SAFENET-VPN-OF</predefined-attacks>
- <predefined-attacks>APP:SAP:3DM-FILE-BOF</predefined-attacks>
- <predefined-attacks>APP:SAP:3DVIS-FLIC-BO</predefined-attacks>
- <predefined-attacks>APP:SAP:INT-GRAPHICS-PARAMS-XSS</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-BO</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-DIAGI-DOS</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-DOS</predefined-attacks>
- <predefined-attacks>APP:SAP:NETWEAVER-SOAP-RCE</predefined-attacks>
- <predefined-attacks>APP:SNORT:BACKORIFICE-DOS</predefined-attacks>
- <predefined-attacks>APP:SQUID-BUMP-DOS</predefined-attacks>
- <predefined-attacks>APP:SYMC:ALTIRIS-DS-SQL-INJ</predefined-attacks>
- <predefined-attacks>APP:SYMC:ENCRYPTED-CMD-EXEC</predefined-attacks>
- <predefined-attacks>APP:TMIC:SP-CREATE-BIND-OF</predefined-attacks>
- <predefined-attacks>APP:TMIC:SP-EARTH-AGENT-OF</predefined-attacks>
- <predefined-attacks>APP:UPNP:LIBUPNP-DSN-BOF</predefined-attacks>
- <predefined-attacks>APP:UPNP:LIBUPNP-ROOT-DSN-BOF</predefined-attacks>
- <predefined-attacks>APP:UPNP:LIBUPNP-UUID-BOF</predefined-attacks>
- <predefined-attacks>APP:VCENTER-JMX-RCE</predefined-attacks>
- <predefined-attacks>APP:VCENTER-JMX-RCE2</predefined-attacks>
- <predefined-attacks>APP:VINZANT-ARCHTCTR-AUTHWKNESS</predefined-attacks>
- <predefined-attacks>CHAT:IRC:BOTNET:RA1NX-BOT-CE</predefined-attacks>
- <predefined-attacks>CHAT:IRC:BOTNET:W3TW0RK-RCE</predefined-attacks>
- <predefined-attacks>DB:IBM-SOLIDBD-WHERE-DOS</predefined-attacks>
- <predefined-attacks>DB:IBM-SOLIDDB-ROWNUM</predefined-attacks>
- <predefined-attacks>DB:MONGODB-NATIVEHELPER-RCE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:BENCHMARK-DOS</predefined-attacks>
- <predefined-attacks>DB:MYSQL:BRUTE-FORCE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:CLIENT-BOF</predefined-attacks>
- <predefined-attacks>DB:MYSQL:GRANT-FILE-BO</predefined-attacks>
- <predefined-attacks>DB:MYSQL:ORACLE-XPATH-DOS</predefined-attacks>
- <predefined-attacks>DB:MYSQL:ROOT-PRIVILEGE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:UPDATEXML-DOS</predefined-attacks>
- <predefined-attacks>DB:MYSQL:USER-ENUMERATION</predefined-attacks>
- <predefined-attacks>DB:MYSQL:WIN-RCE</predefined-attacks>
- <predefined-attacks>DB:MYSQL:WINDOWS-REMOTE-ROOT</predefined-attacks>
- <predefined-attacks>DB:ORACLE:DBMS:OUTPUT-TO-JAVA</predefined-attacks>
- <predefined-attacks>DB:ORACLE:DECLARE-EXEC</predefined-attacks>
- <predefined-attacks>DB:ORACLE:EVTDUMP</predefined-attacks>
- <predefined-attacks>DB:ORACLE:SYS:LPXFSMSAX-NAME-BO</predefined-attacks>
- <predefined-attacks>DB:POSTGRESQL:DBNAME-CLIFLAGINJ</predefined-attacks>
- <predefined-attacks>DB:POSTGRESQL:GEO-OPS-PATH-IN</predefined-attacks>
- <predefined-attacks>DB:POSTGRESQL:POSTGRE-DBSEC-BP</predefined-attacks>
- <predefined-attacks>DDOS:LOIC-WEB</predefined-attacks>
- <predefined-attacks>DHCP:SERVER:GNU-BASH-CMD-EXE</predefined-attacks>
- <predefined-attacks>DHCP:SERVER:ISC-MAL-CLID</predefined-attacks>
- <predefined-attacks>DNS:AUDIT:UNASSIGNED-OPCODE</predefined-attacks>
- <predefined-attacks>DNS:AUDIT:Z-RESERVED-OPT</predefined-attacks>
- <predefined-attacks>DNS:BIND-DBC-ASSERT-DOS</predefined-attacks>
- <predefined-attacks>DNS:EXPLOIT:BIND-KEYPARSE-DOS</predefined-attacks>
- <predefined-attacks>DNS:EXPLOIT:CLIBCVE-2015-7547BO</predefined-attacks>
- <predefined-attacks>DNS:EXPLOIT:LIBCVE-2015-7547BO2</predefined-attacks>
- <predefined-attacks>DNS:GNUTLS-DANE-BOF</predefined-attacks>
- <predefined-attacks>DNS:ISC-ASSERTION-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-DNSSEC-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-EDNS-OPT-DOS</predefined-attacks>
- <predefined-attacks>DNS:ISC-BIND-PACKAGE-DOS</predefined-attacks>
- <predefined-attacks>DNS:MS-ISA-CE</predefined-attacks>
- <predefined-attacks>DNS:NGINX-RESOLVER-DOS</predefined-attacks>
- <predefined-attacks>DNS:OVERFLOW:GNU-C-GLIBC</predefined-attacks>
- <predefined-attacks>DNS:OVERFLOW:TFTPD32</predefined-attacks>
- <predefined-attacks>DNS:PDNS-AUTHSERV-DOS</predefined-attacks>
- <predefined-attacks>DNS:POWERDNS-NAMESRVR-UDP-DOS</predefined-attacks>
- <predefined-attacks>DNS:POWERDNS-NAMSRVR-TCP-DOS</predefined-attacks>
- <predefined-attacks>DNS:REPERR:NULL-RDATA-LEN</predefined-attacks>
- <predefined-attacks>DNS:RRSIG-QUERY</predefined-attacks>
- <predefined-attacks>DNS:SQUID-DNS-DOS-1</predefined-attacks>
- <predefined-attacks>DNS:TUNNEL:I2P-DNS-QUERY</predefined-attacks>
- <predefined-attacks>DNS:TUNNEL:NULL-RECORD</predefined-attacks>
- <predefined-attacks>DNS:WORDPRESS-SOAK-SOAK-MALWARE</predefined-attacks>
- <predefined-attacks>DOS:DELL-NETVAULT-DOS</predefined-attacks>
- <predefined-attacks>DOS:FREEBSD-ROUTED-DAEMON</predefined-attacks>
- <predefined-attacks>DOS:SLOWHTTPTEST-TOOL</predefined-attacks>
- <predefined-attacks>DOS:WINDOWS:HTTP-SYS</predefined-attacks>
- <predefined-attacks>DOS:WINDOWS:ISCSI-TARGET</predefined-attacks>
- <predefined-attacks>HTTP:ADOBE-FLASH-PLAYER-BO</predefined-attacks>
- <predefined-attacks>HTTP:ADOBE-FLASHPLYR-PRIV-ESC</predefined-attacks>
- <predefined-attacks>HTTP:ANGLER-EXPKIT-URI</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:APACHE-CHUNKREQ-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:APR-UTIL-LIB-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:COUCHDB-UUID-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:HTTPD-ERROR-400</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:HTTPD-MODLOG-COOKIE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:MOD-LOG-CONFIG-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:MOD-REWRITE-CMD-EXE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:REST-RCE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:REV-PROXY-EXPLOIT</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-CI-SECBYPASS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-OGNL-CE</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-RST-DMI-EXEC</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-URL-DOS</predefined-attacks>
- <predefined-attacks>HTTP:APACHE:STRUTS-XSLT-FI</predefined-attacks>
- <predefined-attacks>HTTP:BACKDOOR-UPATRE-UA</predefined-attacks>
- <predefined-attacks>HTTP:C99-SHELL-BACKDOOR</predefined-attacks>
- <predefined-attacks>HTTP:CARBERP-BACKDOOR-RCE</predefined-attacks>
- <predefined-attacks>HTTP:CGI:BASH-INJECTION-HEADER</predefined-attacks>
- <predefined-attacks>HTTP:CGI:MS-OFFICE-URL-BOF</predefined-attacks>
- <predefined-attacks>HTTP:CISCO:DOWNLOADSERVLET-FU</predefined-attacks>
- <predefined-attacks>HTTP:CLAMAV-ENCRYPT-PDF-MC2</predefined-attacks>
- <predefined-attacks>HTTP:CLANSPHERE-COOKIE-LFI</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-ENCODING</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-ACCEPT-LANG</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-AUTH-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-CONT-TYPE</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-CONTENT-MD5</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-HOST-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:HTTP-REFERER-HDR</predefined-attacks>
- <predefined-attacks>HTTP:DIR:ZIMBRA-SERVER-LDAP</predefined-attacks>
- <predefined-attacks>HTTP:DLINK-AUTHENTICATION-BO</predefined-attacks>
- <predefined-attacks>HTTP:DOS:APACHE-TOMCAT-CHUNKED2</predefined-attacks>
- <predefined-attacks>HTTP:DOS:HAPROXY-REQDENY</predefined-attacks>
- <predefined-attacks>HTTP:DOS:MIT-KERBEROS-5-POLICY</predefined-attacks>
- <predefined-attacks>HTTP:DOS:PHP-UPLOAD</predefined-attacks>
- <predefined-attacks>HTTP:DOS:SCHNEIDER-EXPRT-SCADA</predefined-attacks>
- <predefined-attacks>HTTP:DOS:SQUID-HDR-RANGE</predefined-attacks>
- <predefined-attacks>HTTP:DRUPAL-CODER-RCE</predefined-attacks>
- <predefined-attacks>HTTP:EK-ANGLER-JAVA</predefined-attacks>
- <predefined-attacks>HTTP:EXPLOIT:ILLEGAL-HOST-CHAR</predefined-attacks>
- <predefined-attacks>HTTP:FORTINET-HELLO-MSG-DOS</predefined-attacks>
- <predefined-attacks>HTTP:HTTP-INVALID-PORT-VALUE</predefined-attacks>
- <predefined-attacks>HTTP:HTTP_PROXY-ATTACK</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ASP-NET-MVC-SEC-BYPASS</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ASPX-URL</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ASPX-URL-1</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-1</predefined-attacks>
- <predefined-attacks>HTTP:IIS:ENCODING:SINGLE-DIG-2</predefined-attacks>
- <predefined-attacks>HTTP:IIS:IIS-6-7-AUTH-BYPASS</predefined-attacks>
- <predefined-attacks>HTTP:IIS:INT-OVERFLOW-DOS</predefined-attacks>
- <predefined-attacks>HTTP:IIS:WEB-CONFIG-INFO-LEAK</predefined-attacks>
- <predefined-attacks>HTTP:IIS:WEBDAV:WINDOWS-SHELL</predefined-attacks>
- <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI</predefined-attacks>
- <predefined-attacks>HTTP:INFO-LEAK:BOOT-INI-TCP</predefined-attacks>
- <predefined-attacks>HTTP:INVALID:EXPECT</predefined-attacks>
- <predefined-attacks>HTTP:JAVA-UPDATE-RCE</predefined-attacks>
- <predefined-attacks>HTTP:JENKINS-CI-SERVER-CE</predefined-attacks>
- <predefined-attacks>HTTP:LIBGD-GD2GETHEADER-IO</predefined-attacks>
- <predefined-attacks>HTTP:LIBGD-HEAP-BO</predefined-attacks>
- <predefined-attacks>HTTP:LIBREOFFICE-INTEGR-UNDRFLW</predefined-attacks>
- <predefined-attacks>HTTP:MALICIOUS-SESSION-COOKIE</predefined-attacks>
- <predefined-attacks>HTTP:MAMBO-MYSQL-INF-DISCLOSURE</predefined-attacks>
- <predefined-attacks>HTTP:MANAGENGINE-EVTLG-INF-DISC</predefined-attacks>
- <predefined-attacks>HTTP:MAXTHON-HISTORY-XSS</predefined-attacks>
- <predefined-attacks>HTTP:MISC:AVIRA-MGNT-HEADER-BOF</predefined-attacks>
- <predefined-attacks>HTTP:MISC:CHASYS-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:COOL-EXKIT-JAR-DL</predefined-attacks>
- <predefined-attacks>HTTP:MISC:CUTEZIP-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:CVE-2014-6332-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:DAZ-STUDIO-SCRIPT-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:ERS-VIEWER-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:GITLIST-URI-REQ-CE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:GRAPHITE-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:GSM-SIMEDIT-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:IRFVIEW-JP2-BO</predefined-attacks>
- <predefined-attacks>HTTP:MISC:JBOSS-SEAM-EL-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:JOOMLA-UNSER-CE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MAPLE-MAPLET-CMD-EXEC</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MINIUPNPD-SOAP-ACTION</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MS-FOREFRONT-DOS</predefined-attacks>
- <predefined-attacks>HTTP:MISC:MS-OWA-URL-REDIR</predefined-attacks>
- <predefined-attacks>HTTP:MISC:RUBY-RAILS-SECRET-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:SPLUNK-CUSTOM-APP-CE</predefined-attacks>
- <predefined-attacks>HTTP:MISC:WESTERN-DIGITAL-LFI</predefined-attacks>
- <predefined-attacks>HTTP:MISC:WINRAR-FILENM-SPOOF</predefined-attacks>
- <predefined-attacks>HTTP:MISC:WIRESHARK-LUA-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MONKEY-HTTPD-BO</predefined-attacks>
- <predefined-attacks>HTTP:MS-VBSCRIPT-UAF-RCE</predefined-attacks>
- <predefined-attacks>HTTP:MS-WIN-FOLDER-GUID-CE</predefined-attacks>
- <predefined-attacks>HTTP:NAGIOS-CONFMGR-SQLINJ</predefined-attacks>
- <predefined-attacks>HTTP:NEUTRINO-EK-SB</predefined-attacks>
- <predefined-attacks>HTTP:NGINX-RQST-URI-SECBYPASS</predefined-attacks>
- <predefined-attacks>HTTP:NODEJS-DOS</predefined-attacks>
- <predefined-attacks>HTTP:NOVELL:GROUPWISE-NETAGT-BO</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:CONF-ACCESS</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:GENERIC-SIGNATUR-MC</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:OUTSIDE-PRDOX-BO2</predefined-attacks>
- <predefined-attacks>HTTP:ORACLE:SSO-ACCESS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:CDF-INFINITE-LOOP-DOS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:CORE-INT-OF-CE</predefined-attacks>
- <predefined-attacks>HTTP:PHP:DATEINTERVAL-DOS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:EXIF-NULL-PTR-DEREF</predefined-attacks>
- <predefined-attacks>HTTP:PHP:INVISION-IPS-COMM</predefined-attacks>
- <predefined-attacks>HTTP:PHP:JOOMLA-ADMIN-SCAN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:OPENEMR-GLOBALS-AB</predefined-attacks>
- <predefined-attacks>HTTP:PHP:PHAR-PARSE-TARFILE-ID</predefined-attacks>
- <predefined-attacks>HTTP:PHP:PHPMYADMIN:SETUP-SCAN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:PHPSPLOIT-POSTEXP</predefined-attacks>
- <predefined-attacks>HTTP:PHP:SPL-OBJECT-UNSERIALIZE</predefined-attacks>
- <predefined-attacks>HTTP:PHP:TAR-FILE-PTR</predefined-attacks>
- <predefined-attacks>HTTP:PHP:WP-BRUTE-FORCE-LOGIN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:WP-INCLUDES-ACCESS</predefined-attacks>
- <predefined-attacks>HTTP:PHP:WP-README-SCAN</predefined-attacks>
- <predefined-attacks>HTTP:PHP:XAMPP-FILE-WRITE</predefined-attacks>
- <predefined-attacks>HTTP:PHP:ZIPARCHIVE-IO</predefined-attacks>
- <predefined-attacks>HTTP:PROXY:SQUID-DOS</predefined-attacks>
- <predefined-attacks>HTTP:REGIN-CNC-TRAFFIC</predefined-attacks>
- <predefined-attacks>HTTP:REQERR:INV-IPV6-HOST-HDR</predefined-attacks>
- <predefined-attacks>HTTP:REQERR:NULL-IN-HEADER</predefined-attacks>
- <predefined-attacks>HTTP:SOLARWINDS-AUTH-BYPASS</predefined-attacks>
- <predefined-attacks>HTTP:SOLARWINDS-POLICYBYPASS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:ACCEPT-LANG-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:AND-NUMBER-EQUALS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CHAR</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CHAR-ENCODE</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:COMMENT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:COMPARISON</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONCAT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-MD5-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONT-TYPE-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONVERT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:CONVERT-INJ-OF</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HAVIJ-UA</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-AUTH-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-HOST-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:HTTP-REQ-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:INSERT-VALUES</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:INTO-OUTFILE</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:IS_SRVROLEMEMBER</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:MS-SQL-FUNCTIONS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:MS-SQL-TABLE-NAME</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:MYSQL-TABLE-NAME</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:NULLBYTE-COMMENT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:PL-SQL</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:PROC-GENERIC</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:REFERER-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:SLASH-STAR</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:SQLMAP-ACTIVITY</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:SYSOBJECTS</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:UA-HDR-1</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:UA-HDR-3</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:UNION-SELECT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:USER-ADD</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:VERSION-DETECT</predefined-attacks>
- <predefined-attacks>HTTP:SQL:INJ:WAITFOR-DELAY</predefined-attacks>
- <predefined-attacks>HTTP:SQUID-BUMP-DOS</predefined-attacks>
- <predefined-attacks>HTTP:STATIC-SERVER-BOF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ACTIVEX:KVIEW-KCHARTXY</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:2013-5065-PDF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:ACROFORM-NULL-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CONVFILTER-UAF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-2985-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3791-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2009-3959-OF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2010-2202-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-0622-SB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3353</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-3355-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5324-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5325-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2013-5329-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0511-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0512-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0517-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0521</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0522-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0523-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0524-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0531-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0537-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0538-UF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0539-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0545-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0547-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0548-PB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0550-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0553-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0554</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0555-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0559-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0564-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0565-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0567-OF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0568-SE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0574-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0576-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0577-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0578-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0580-SB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0584-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-0586-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-4671</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8440-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8441-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8447-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8449-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8450-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8451-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8455-UF</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8459-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8460-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-8461-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9159-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9160-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2014-9162-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0087-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0089-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0090-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0093-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0301-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0302-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0303-SB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0305-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0306-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0307-DS</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0313-ID</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0314-BO</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0315-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0317-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0319-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0320-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0321-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0322-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0323-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0324-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0325-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0326-DS</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0328-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0329-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0330-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0333-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0334-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0335-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0337-PB</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0338-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0339-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0340-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0341-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0342-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0346-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0347-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0348-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0349-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0350-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0351-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0352-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0353-CE</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0354-MC</predefined-attacks>
- <predefined-attacks>HTTP:STC:ADOBE:CVE-2015-0355-MC</predefined-attacks>
- </attacks>
- </match>
- <then>
- <action>
- <no-action/>
- </action>
- <ip-action>
- <ip-notify/>
- <target>source-address</target>
- <log/>
- <log-create/>
- </ip-action>
- <notification>
- <log-attacks>
- <alert/>
- </log-attacks>
- </notification>
- </then>
- </rule>
- <rule>
- <name>DBE-Q-IPS-policy-template-2</name>
- <match>
- <from-zone>any</from-zone>
- <to-zone>any</to-zone>
- <application>default</application>
- <attacks>
- <predefined-attack-groups>[Recommended]Critical - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - All</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Critical</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Info</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Major</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Minor</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]ICMP - Warning</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Info - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Major - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Minor - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Critical - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - All</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Critical</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Info</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Major</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Minor</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_ICMP - Warning</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Info - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Major - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Minor - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Misc_Warning - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Critical - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - All</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Critical</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Info</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Major</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Minor</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_ICMP - Warning</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Info - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Major - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Minor - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Response_Warning - ICMP</predefined-attack-groups>
- <predefined-attack-groups>[Recommended]Warning - ICMP</predefined-attack-groups>
- </attacks>
- </match>
- <then>
- <action>
- <recommended/>
- </action>
- <ip-action>
- <ip-notify/>
- <target>source-address</target>
- </ip-action>
- <notification>
- <log-attacks>
- <alert/>
- </log-attacks>
- </notification>
- </then>
- </rule>
- </rulebase-ips>
- </idp-policy>
- <active-policy>Space-IPS-Policy</active-policy>
- </idp>
- <forwarding-options>
- <family>
- <inet6>
- <mode>flow-based</mode>
- </inet6>
- </family>
- </forwarding-options>
- <screen>
- <ids-option>
- <name>untrust-screen</name>
- <alarm-without-drop/>
- <icmp>
- <ip-sweep>
- <threshold>5000</threshold>
- </ip-sweep>
- <fragment/>
- <large/>
- <ping-death/>
- </icmp>
- <ip>
- <bad-option/>
- <record-route-option/>
- <timestamp-option/>
- <security-option/>
- <stream-option/>
- <spoofing/>
- <source-route-option/>
- <loose-source-route-option/>
- <strict-source-route-option/>
- <unknown-protocol/>
- <tear-drop/>
- </ip>
- <tcp>
- <syn-fin/>
- <fin-no-ack/>
- <tcp-no-flag/>
- <syn-frag/>
- <port-scan>
- <threshold>5000</threshold>
- </port-scan>
- <syn-ack-ack-proxy>
- </syn-ack-ack-proxy>
- <syn-flood>
- <alarm-threshold>1024</alarm-threshold>
- <attack-threshold>200</attack-threshold>
- <source-threshold>1024</source-threshold>
- <destination-threshold>2048</destination-threshold>
- <undocumented><queue-size>2000</queue-size></undocumented>
- <timeout>20</timeout>
- </syn-flood>
- <land/>
- </tcp>
- </ids-option>
- </screen>
- <nat>
- <source>
- <pool>
- <name>sp_dmzpfsnat</name>
- <address>
- <name>10.68.16.13/32</name>
- </address>
- <address>
- <name>10.68.16.14/32</name>
- </address>
- <address>
- <name>10.68.16.15/32</name>
- </address>
- <address>
- <name>10.68.16.16/32</name>
- </address>
- <port>
- <range>
- <low>1024</low>
- <to>
- <high>63486</high>
- </to>
- </range>
- </port>
- <pool-utilization-alarm>
- <raise-threshold>80</raise-threshold>
- <clear-threshold>70</clear-threshold>
- </pool-utilization-alarm>
- </pool>
- <rule-set>
- <name>rs_mis2dmzpfsnat</name>
- <from>
- <zone>sz_dbemis</zone>
- </from>
- <to>
- <zone>trust</zone>
- </to>
- <rule>
- <name>nr_dmzpsnat</name>
- <src-nat-rule-match>
- <destination-address>10.68.16.4/32</destination-address>
- <destination-address>10.68.16.5/32</destination-address>
- </src-nat-rule-match>
- <then>
- <source-nat>
- <pool>
- <pool-name>sp_dmzpfsnat</pool-name>
- </pool>
- </source-nat>
- </then>
- </rule>
- </rule-set>
- </source>
- <destination>
- <pool>
- <name>dp_dmzpf01ap1dnat</name>
- <address>
- <ipaddr>10.68.16.4/32</ipaddr>
- </address>
- </pool>
- <pool>
- <name>dp_dmzpf02ap1dnat</name>
- <address>
- <ipaddr>10.68.16.5/32</ipaddr>
- </address>
- </pool>
- <rule-set>
- <name>rs_mis2dmzpfdnat</name>
- <from>
- <zone>sz_dbemis</zone>
- </from>
- <rule>
- <name>nr_p01ap1dnat</name>
- <dest-nat-rule-match>
- <destination-address>
- <dst-addr>12.102.197.133/32</dst-addr>
- </destination-address>
- </dest-nat-rule-match>
- <then>
- <destination-nat>
- <pool>
- <pool-name>dp_dmzpf01ap1dnat</pool-name>
- </pool>
- </destination-nat>
- </then>
- </rule>
- <rule>
- <name>nr_p02ap1dnat</name>
- <dest-nat-rule-match>
- <destination-address>
- <dst-addr>12.102.197.134/32</dst-addr>
- </destination-address>
- </dest-nat-rule-match>
- <then>
- <destination-nat>
- <pool>
- <pool-name>dp_dmzpf02ap1dnat</pool-name>
- </pool>
- </destination-nat>
- </then>
- </rule>
- </rule-set>
- </destination>
- <proxy-arp>
- <interface>
- <name>reth0.0</name>
- <address>
- <name>12.102.197.133/32</name>
- </address>
- <address>
- <name>12.102.197.134/32</name>
- </address>
- </interface>
- <interface>
- <name>reth1.0</name>
- <address>
- <name>10.68.16.13/32</name>
- </address>
- <address>
- <name>10.68.16.14/32</name>
- </address>
- <address>
- <name>10.68.16.15/32</name>
- </address>
- <address>
- <name>10.68.16.16/32</name>
- </address>
- </interface>
- </proxy-arp>
- </nat>
- <policies>
- <policy>
- <from-zone-name>trust</from-zone-name>
- <to-zone-name>trust</to-zone-name>
- <policy>
- <name>default-permit</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <permit>
- </permit>
- <log>
- <session-init/>
- <session-close/>
- </log>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>trust</from-zone-name>
- <to-zone-name>untrust</to-zone-name>
- <policy>
- <name>default-permit</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <permit>
- </permit>
- <log>
- <session-init/>
- <session-close/>
- </log>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>sz_dbemis</from-zone-name>
- <to-zone-name>trust</to-zone-name>
- <policy>
- <name>sp_bwxspapi</name>
- <match>
- <source-address>any</source-address>
- <destination-address>as_bwdmzpxspapsrvrs_2</destination-address>
- <application>ps_bwapi_3</application>
- </match>
- <then>
- <permit>
- </permit>
- <log>
- <session-init/>
- <session-close/>
- </log>
- <count>
- </count>
- </then>
- </policy>
- <policy>
- <name>sp_bwpdeny</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <deny/>
- <log>
- <session-init/>
- </log>
- <count>
- </count>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>trust</from-zone-name>
- <to-zone-name>sz_dbemis</to-zone-name>
- <policy>
- <name>sp_bwzdeny</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <deny/>
- <log>
- <session-init/>
- </log>
- <count>
- </count>
- </then>
- </policy>
- </policy>
- <policy>
- <from-zone-name>untrust</from-zone-name>
- <to-zone-name>trust</to-zone-name>
- <policy>
- <name>default-deny</name>
- <match>
- <source-address>any</source-address>
- <destination-address>any</destination-address>
- <application>any</application>
- </match>
- <then>
- <deny/>
- <log>
- <session-init/>
- <session-close/>
- </log>
- </then>
- </policy>
- </policy>
- </policies>
- <zones>
- <security-zone>
- <name>trust</name>
- <tcp-rst/>
- <address-book>
- <address>
- <name>ad_bwxsp02ap1pf</name>
- <ip-prefix>10.68.16.5/32</ip-prefix>
- </address>
- <address>
- <name>ad_bwxsp01ap1pf_1</name>
- <ip-prefix>10.68.16.4/32</ip-prefix>
- </address>
- <address-set>
- <name>as_bwdmzpxspapsrvrs_2</name>
- <address>
- <name>ad_bwxsp01ap1pf_1</name>
- </address>
- <address>
- <name>ad_bwxsp02ap1pf</name>
- </address>
- </address-set>
- </address-book>
- <host-inbound-traffic>
- <system-services>
- <name>all</name>
- </system-services>
- <protocols>
- <name>all</name>
- </protocols>
- </host-inbound-traffic>
- <interfaces>
- <name>reth1.0</name>
- </interfaces>
- </security-zone>
- <security-zone>
- <name>untrust</name>
- <screen>untrust-screen</screen>
- </security-zone>
- <security-zone>
- <name>sz_dbemis</name>
- <screen>untrust-screen</screen>
- <interfaces>
- <name>reth0.0</name>
- </interfaces>
- </security-zone>
- </zones>
- </security>
- <interfaces>
- <interface>
- <name>ge-0/0/1</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth0</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>ge-0/0/2</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth1</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>ge-7/0/1</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth0</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>ge-7/0/2</name>
- <gigether-options>
- <redundant-parent>
- <parent>reth1</parent>
- </redundant-parent>
- </gigether-options>
- </interface>
- <interface>
- <name>fab0</name>
- <fabric-options>
- <member-interfaces>
- <name>ge-0/0/0</name>
- </member-interfaces>
- </fabric-options>
- </interface>
- <interface>
- <name>fab1</name>
- <fabric-options>
- <member-interfaces>
- <name>ge-7/0/0</name>
- </member-interfaces>
- </fabric-options>
- </interface>
- <interface>
- <name>fxp0</name>
- <unit>
- <name>0</name>
- </unit>
- </interface>
- <interface>
- <name>reth0</name>
- <redundant-ether-options>
- <redundancy-group>1</redundancy-group>
- </redundant-ether-options>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <filter>
- <input>
- <filter-name>ff_pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>12.102.197.132/25</name>
- </address>
- </inet>
- <inet6>
- <filter>
- <input>
- <filter-name>ff_v6pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>2001:1890:1001:23ed::3:1/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ed::3:2/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ed::3:3/64</name>
- </address>
- </inet6>
- </family>
- </unit>
- </interface>
- <interface>
- <name>reth1</name>
- <redundant-ether-options>
- <redundancy-group>1</redundancy-group>
- </redundant-ether-options>
- <unit>
- <name>0</name>
- <family>
- <inet>
- <filter>
- <input>
- <filter-name>ff_pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>10.68.16.12/22</name>
- </address>
- </inet>
- <inet6>
- <filter>
- <input>
- <filter-name>ff_v6pdscp</filter-name>
- </input>
- </filter>
- <address>
- <name>2001:1890:1001:23ec::3:1/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:2/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:3/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:4/64</name>
- </address>
- <address>
- <name>2001:1890:1001:23ec::3:5/64</name>
- </address>
- </inet6>
- </family>
- </unit>
- </interface>
- </interfaces>
- <snmp>
- <community>
- <name>vsbk68</name>
- <authorization>read-only</authorization>
- <clients>
- <name>130.6.45.42/32</name>
- </clients>
- <clients>
- <name>130.6.45.41/32</name>
- </clients>
- <clients>
- <name>130.6.44.254/32</name>
- </clients>
- <clients>
- <name>130.6.44.253/32</name>
- </clients>
- <clients>
- <name>135.25.175.114/32</name>
- </clients>
- <clients>
- <name>135.21.235.37/32</name>
- </clients>
- </community>
- <community>
- <name>space15</name>
- <authorization>read-write</authorization>
- <clients>
- <name>135.144.0.60/32</name>
- </clients>
- <clients>
- <name>135.144.0.59/32</name>
- </clients>
- <clients>
- <name>135.144.0.61/32</name>
- </clients>
- </community>
- <trap-group>
- <name>GFP</name>
- <version>v2</version>
- <destination-port>162</destination-port>
- <targets>
- <name>135.89.33.175</name>
- </targets>
- <targets>
- <name>199.37.245.24</name>
- </targets>
- </trap-group>
- <trap-group>
- <name>space</name>
- <targets>
- <name>135.144.0.60</name>
- </targets>
- </trap-group>
- <health-monitor>
- <idp>
- </idp>
- </health-monitor>
- </snmp>
- <routing-options>
- <interface-routes>
- <rib-group>
- <inet>rg_mis2dmzp</inet>
- <inet6>rg_v6mis2dmzp</inet6>
- </rib-group>
- </interface-routes>
- <static>
- <route>
- <name>0.0.0.0/0</name>
- <next-hop>135.69.228.1</next-hop>
- </route>
- </static>
- <rib-groups>
- <name>rg_mis2dmzp</name>
- <import-rib>vrf-untrust.inet.0</import-rib>
- <import-rib>inet.0</import-rib>
- </rib-groups>
- <rib-groups>
- <name>rg_v6mis2dmzp</name>
- <import-rib>vrf-untrust.inet6.0</import-rib>
- <import-rib>inet6.0</import-rib>
- </rib-groups>
- </routing-options>
- <class-of-service>
- <interfaces>
- <interface>
- <name>reth0</name>
- <unit>
- <name>0</name>
- <rewrite-rules>
- <dscp>
- <name>cr_pdscpaf</name>
- </dscp>
- <dscp-ipv6>
- <name>cr_v6pdscpaf</name>
- </dscp-ipv6>
- </rewrite-rules>
- </unit>
- </interface>
- <interface>
- <name>reth1</name>
- <unit>
- <name>0</name>
- <rewrite-rules>
- <dscp>
- <name>cr_pdscpaf</name>
- </dscp>
- <dscp-ipv6>
- <name>cr_v6pdscpaf</name>
- </dscp-ipv6>
- </rewrite-rules>
- </unit>
- </interface>
- </interfaces>
- <rewrite-rules>
- <dscp>
- <name>cr_pdscpaf</name>
- <forwarding-class>
- <name>assured-forwarding</name>
- <loss-priority>
- <name>low</name>
- <code-point>011010</code-point>
- </loss-priority>
- </forwarding-class>
- </dscp>
- <dscp-ipv6>
- <name>cr_v6pdscpaf</name>
- <forwarding-class>
- <name>assured-forwarding</name>
- <loss-priority>
- <name>low</name>
- <code-point>011010</code-point>
- </loss-priority>
- </forwarding-class>
- </dscp-ipv6>
- </rewrite-rules>
- </class-of-service>
- <firewall>
- <family>
- <inet>
- <filter>
- <name>ff_pdscp</name>
- <term>
- <name>fr_pdscp</name>
- <from>
- <interface>
- <name>reth0</name>
- </interface>
- <interface>
- <name>reth1</name>
- </interface>
- </from>
- <then>
- <forwarding-class>assured-forwarding</forwarding-class>
- <accept/>
- </then>
- </term>
- </filter>
- </inet>
- <inet6>
- <filter>
- <name>ff_v6pdscp</name>
- <term>
- <name>fr_v6pdscp</name>
- <from>
- <interface>
- <name>reth0</name>
- </interface>
- <interface>
- <name>reth1</name>
- </interface>
- </from>
- <then>
- <forwarding-class>assured-forwarding</forwarding-class>
- <accept/>
- </then>
- </term>
- </filter>
- </inet6>
- </family>
- </firewall>
- <routing-instances>
- <instance>
- <name>vrf-untrust</name>
- <instance-type>virtual-router</instance-type>
- <interface>
- <name>reth0.0</name>
- </interface>
- <routing-options>
- <interface-routes>
- <rib-group>
- <inet>rg_mis2dmzp</inet>
- <inet6>rg_v6mis2dmzp</inet6>
- </rib-group>
- </interface-routes>
- <rib>
- <name>vrf-untrust.inet6.0</name>
- <static>
- <route>
- <name>0::/0</name>
- <next-hop>2001:1890:1001:23ed::1</next-hop>
- </route>
- </static>
- </rib>
- <static>
- <route>
- <name>0.0.0.0/0</name>
- <next-hop>12.102.197.129</next-hop>
- </route>
- </static>
- </routing-options>
- </instance>
- </routing-instances>
- <applications>
- <application>
- <name>ap_xsi-xml-https</name>
- <protocol>tcp</protocol>
- <destination-port>443</destination-port>
- </application>
- <application-set>
- <name>ps_bwapi_3</name>
- <application>
- <name>ap_xsi-xml-https</name>
- </application>
- </application-set>
- </applications>
- </configuration> \ No newline at end of file
diff --git a/docs/appc-Build-20180518-NexusIQ Report.pdf b/docs/appc-Build-20180518-NexusIQ Report.pdf
new file mode 100644
index 000000000..f9124ff5f
--- /dev/null
+++ b/docs/appc-Build-20180518-NexusIQ Report.pdf
Binary files differ
diff --git a/docs/release-notes.rst b/docs/release-notes.rst
index 85ab577f9..f3d687f4e 100644
--- a/docs/release-notes.rst
+++ b/docs/release-notes.rst
@@ -1,6 +1,6 @@
-.. ============LICENSE_START==========================================
+.. ============LICENSE_START==========================================
.. ===================================================================
-.. Copyright © 2017 AT&T Intellectual Property. All rights reserved.
+.. Copyright © 2017-2018 AT&T Intellectual Property. All rights reserved.
.. ===================================================================
.. Licensed under the Creative Commons License, Attribution 4.0 Intl. (the "License");
.. you may not use this documentation except in compliance with the License.
@@ -14,7 +14,6 @@
.. See the License for the specific language governing permissions and
.. limitations under the License.
.. ============LICENSE_END============================================
-.. ECOMP is a trademark and service mark of AT&T Intellectual Property.
Release Notes
=============
@@ -27,79 +26,146 @@ Release Notes
.. * This note must be removed after content has been added.
-Version: 1.2.0
+Version: 1.3.0
--------------
-:Release Date: 2017-11-16
+:Release Date: 2018-06-07
**New Features**
-The Amsterdam release continued evolving the design driven architecture of and functionality for APPC.
-APPC aims to be completely agnostic and make no assumption about the network.
-
-The main goal of the Amsterdam release was to:
- - Support the vCPE use case as part of the closed loop action to perform a Restart on the vGMUX
- - Demonstrate integration with MultiCloud as a proxy to OpenStack
- - Continue supporting the vFW closed loop use case as part of regression from the seed contribution.
+The Beijing release added the following functionality:
+
+ - Added support for the following LCM actions:
+
+ - To support in-place software upgrade:
+
+ - QuiesceTraffic
+ - ResumeTraffic
+ - UpgradeSoftware
+ - UpgradePreCheck
+ - UpgradePostCheck
+ - UpgradeBackup
+ - UpgradeBackout
+
+ - To support storage management in OpenStack
+
+ - AttachVolume
+ - DetachVolume
+
+ - To support Manual Scale Out use case
+
+ - ConfigScaleOut (more details can be found in teh APPC Epic: `APPC-431 <https://jira.onap.org/browse/APPC-431>`)
+
+ - To support general operations
+
+ - ActionStatus
+
+ - A desciption of all of the above LCM actions can be found in the APPC LCM API Guide on readthedoc:
-Other key features added in this release include:
+ - Contributed the APPC Controller Design Tool (CDT), which enables self-serve capabilities by allowing users to model their VNF/VNFC for consumption by APPC to use in the execution of requests to perform life cycle management activities.
+
+ - More details on the APPC CDT can be found in the APPC CDT User Guide in readthedocs.
+ - Additional information on how the APPC CDT tool was used to model the vLB and build teh artifacts needed by APPC to execute teh ConfigScaleOut action can be found at the following wiki pages: https://wiki.onap.org/pages/viewpage.action?pageId=33065185
+
+ - Additional contributions as part of Beijing include:
+
+ - Support for Platform Maturity requirements, including:
+
+ - Increased security
+
+ - Added security to ODL web-based API access via AAF (see `APPC-404 <https://jira.onap.org/browse/APPC-404>` for additional details)
+ - Addressed critical alerts reported via Nexus IQ to the extent possible (see `APPC-656 <https://jira.onap.org/browse/APPC-656>`)
+
+ - Stability
+
+ - Executed 72 hour stability test on both Heat and OOM deployed environments using JMeter to drive a steady set of transactions over the 72 hour period (see the following wiki page for more details: https://wiki.onap.org/display/DW/ONAP+APPC+72+Hour+Stability+Test+Results )
+
+ - Resiliency
+
+ - Support for OOM deployment, which enables resiliency via use of Kubernetes (see `APPC-414 <https://jira.onap.org/browse/APPC-414>` for additional details)
+
+ - Upgraded OpenDaylight (ODL) version to Nitrogen
+
+
- - Support for Ansible
- - The Ansible Extension for APP-C allows management of VNFs that support Ansible. Ansible is a an open-source VNF management framework that provides an almost cli like set of tools in a structured form. APPC supports Ansible through the following three additions: An Ansible server interface, Ansible Adapter, and Ansible Directed Graph.
- - Support for Chef
- - The Chef Extension for APPC allows management of VNFs that support Chef through the following two additions: a Chef Adapter and Chef Directed Graph.
- - LifeCycle Management (LCM) APIs via standalone DGs or via the DGOrchestrator architecture to trigger actions on VMs, VNFs, or VNFCs
- - OAM APIs to manage the APPC application itself
- - Upgrade of OpenDaylight to Carbon version
+**Bug Fixes**
+ - The following defects that were documented as known issues in Amsterdam have been fixed in Beijing release:
+
+ - `APPC-316 <https://jira.onap.org/browse/APPC-316>`_ - Null payload issue for Stop Application
+
+ - `APPC-315 <https://jira.onap.org/browse/APPC-315>`_ - appc-request-handler is giving error java.lang.NoClassDefFoundError
-**Bug Fixes**
- - This is technically the first release of APPC, previous release was the seed code contribution. As such, the defects fixed in this release were raised during the course of the release. Anything not closed is captured below under Known Issues. If you want to review the defects fixed in the Amsterdam release, refer to `Jira <https://jira.onap.org/issues/?filter=10570&jql=project%20%3D%20APPC%20AND%20issuetype%20%3D%20Bug%20AND%20status%20%3D%20Closed%20AND%20fixVersion%20%3D%20%22Amsterdam%20Release%22>`_.
+ - `APPC-312 <https://jira.onap.org/browse/APPC-312>`_ - APPC request is going to wrong request handler and rejecting request.
+
+ - `APPC-311 <https://jira.onap.org/browse/APPC-311>`_ - The APPC LCM Provider Healthcheck
+
+ - `APPC-309 <https://jira.onap.org/browse/APPC-309>`_ - APPC LCM Provider URL missing in appc.properties.
+
+ - `APPC-307 <https://jira.onap.org/browse/APPC-307>`_ - Embed jackson-annotations dependency in appc-dg-common during run-time
+
+ - `APPC-276 <https://jira.onap.org/browse/APPC-276>`_ - Some Junit are breaking convention causing excessively long build
+
+ - `APPC-248 <https://jira.onap.org/browse/APPC-248>`_ - There is an compatibility issue between PowerMock and Jacoco which causes Sonar coverage not to be captured. Fix is to move to Mockito.
- - Please also refer to the notes below. Given the timeframe and resource limitations, not all functions of the release could be validated. Items that were validated are documented on the wiki at the link provide below. If you find issues in the course of your work with APPC, please open a defect in the Application Controller project of Jira (jira.onpa.org)
**Known Issues**
- - `APPC-316 <https://jira.onap.org/browse/APPC-316>`_ - Null payload issue for Stop Application; Stop action will not work with a null payload. Ensure when testing Stop action that payload is included.
+ - `APPC-912 <https://jira.onap.org/browse/APPC-912>`_ - MalformedChunkCodingException in MDSALStoreImpl.getNodeName
- - `APPC-315 <https://jira.onap.org/browse/APPC-315>`_ - appc-request-handler is giving error java.lang.NoClassDefFoundError - This error results in vnf state and lock not being released. The workaround is to manually remove the entries from the VNF_LOCK_MANAGEMENT and VNF_STATE_MANAGEMENT tables.
- - ``DELETE FROM VNF_LOCK_MANAGEMENT where RESOURCE_ID="vnf-id"``
- - ``DELETE FROM VNF_STATE_MANAGEMENT where VNF_ID="vnf-id"``
+ - `APPC-892 <https://jira.onap.org/browse/APPC-892>`_ - Cntl+4 to highlight and replace feature- Textbox is accepting space and able to submit without giving any value
- - `APPC-312 <https://jira.onap.org/browse/APPC-312>`_ - APPC request is going to wrong request handler and rejecting request. Configure request failing with following error: ``REJECTED Action Configure is not supported on VM level``.
+ - `APPC-869 <https://jira.onap.org/browse/APPC-869>`_ - VM Snapshot error occurs during image validation.
- - `APPC-311 <https://jira.onap.org/browse/APPC-311>`_ - The APPC LCM Provider Healthcheck, which does a healthceck on a VNF, is failing. No known workaround at this time.
+ - `APPC-814 <https://jira.onap.org/browse/APPC-814>`_ - Update openecomp-tosca-datatype namespace
- - `APPC-309 <https://jira.onap.org/browse/APPC-309>`_ - The property: ``appc.LCM.provider.url=http://127.0.0.1:8181/restconf/operations/appc-provider-lcm`` is missing from appc.properties in the appc deployment. The property can be manually added as a workaround, then bounce the appc container.
-
- - `APPC-307 <https://jira.onap.org/browse/APPC-307>`_ - Missing jackson-annotations dependency in appc-dg-common - This issue results in Rebuild operation via the APPC Provider not to work. Use instead Rebuild via the APPC LCM Provider using DGOrchestrator.
-
- - `APPC-276 <https://jira.onap.org/browse/APPC-276>`_ - A number of junit testcases need to be reworked because they are causing APPC builds to take much longer to complete. This issue does not cause the build to fail, just take longer. You can comment out these junit in your local build if this is a problem.
-
- - `APPC-248 <https://jira.onap.org/browse/APPC-248>`_ - There is an compatibility issue between PowerMock and Jacoco which causes Sonar coverage not to be captured. There is no functional impact on APPC.
+ - `APPC-340 <https://jira.onap.org/browse/APPC-340>`_ - APPC rejecting request even for decimal of millisecond timestamp difference
- `APPC-154 <https://jira.onap.org/browse/APPC-154>`_ - Logging issue - Request REST API of APPC has RequestID (MDC) in Body or Payload section instead of Header.
**Security Issues**
- - Communication over DMaaP currently does not use secure topics in this release.
- - AAF is deactivated by default in this release and was not validated or committed as part of the Amsterdam Release.
-
+ - Communication over DMaaP currently does not use secure topics in this release. This has dependency on DMaaP to enable.
+ - The following Nexus IQ issues are currently open on the Beijing release:
+
+ - Critical Threat Level per Nexus IQ Report (Note that these have been assessed for Beijing and determined not to be a risk for APPC based on usage)
+
+ - CVE-2017-7525 - Component: org.codehaus.jackson : jackson-mapper-asl : 1.9.13 - Filename: jackson-mapper-asl-1.9.13.jar
+ - CVE-2017-7525 - Component: org.codehaus.jackson : jackson-mapper-asl : 1.9.2 - Filename: jackson-mapper-asl-1.9.2.jar
+ - CVE-2017-7525 - Component: com.fasterxml.jackson.core : jackson-databind : 2.8.1 - Filename: jackson-databind-2.8.1.jar
+ - CVE-2017-7525 - Component: com.fasterxml.jackson.core : jackson-databind : 2.3.2 - Filename: jackson-databind-2.3.2.jar
+ - SONATYPE-2017-0355 - Component: com.fasterxml.jackson.core : jackson-core : 2.3.2 - Filename: jackson-core-2.3.2.jar
+ - SONATYPE-2017-0359 - Component: oorg.apache.karaf.jaas : org.apache.karaf.jaas.modules : 4.0.10 - 4.0.10 - Filename: org.apache.karaf.jaas.modules-4.0.10.jar
+ - SONATYPE-2017-0359 - Component: org.apache.httpcomponents : httpclient : 4.5.2 - Filename: httpclient-4.5.2.jar
+ - CVE-2017-1000028 - Component: org.glassfish.grizzly : grizzly-http : 2.3.28 - Filename: grizzly-http-2.3.28.jar
+ - SONATYPE-2017-0355 - Component: com.fasterxml.jackson.core : jackson-core : 2.8.1 - Filename: jackson-core-2.8.1.jar
+
+ - Severe Threat Level per Nexus IQ Report
+
+ - CVE-2018-10237 - Component: com.google.guava : guava : 22.0 - Filename: guava-22.0.jar
+ - CVE-2018-10237 - Component: com.google.guava : guava : 18.0 - Filename: guava-18.0.jar
+ - SONATYPE-2016-0397 - Component: com.fasterxml.jackson.core : jackson-core : 2.3.2 - Filename: jackson-core-2.3.2.jar
+ - SONATYPE-2017-0356 - Component: io.netty : netty-handler : 4.1.8.Final - Filename: netty-handler-4.1.8.Final.jar
+ - CVE-2016-5725 - Component: com.jcraft : jsch : 0.1.52 - Filename: jsch-0.1.52.jar
+ - CVE-2015-5262 - Component: org.apache.karaf.jaas : org.apache.karaf.jaas.modules : 4.0.10 - Filename: org.apache.karaf.jaas.modules-4.0.10.jar
+ - CVE-2016-5725 - Component: com.jcraft : jsch : 0.1.51 - Filename: jsch-0.1.51.jar
+
+
+ Full report from Nexus IQ - :download:`appc-Build-20180518-NexusIQ Report.pdf` Copy of full Nexus IQ Report
+
**Other**
- Limitations, Constraints and other worthy notes
- - LCM Healthcheck and Configure actions do not work.
- - The APPC actions validated in this release are captured here: https://wiki.onap.org/display/DW/APPC+Testing+Scope+and+Status
+ - It is impossible for us to test all aspect of the application. Scope of testing done in Beijing is captured on the following wiki: https://wiki.onap.org/display/DW/APPC+Beijing+Testing+Scope+and+Status
- Currently APPC only supports OpenStack
- OpenStack Hypervisorcheck is turned off by default. If you want to invoke this functionality via the appc.properties, you need to enable it and ensure you have Admin level access to OpenStack.
- Integration with MultiCloud is supported for Standalone Restart (i.e., not via DGOrchestrator). For any other action, such as Stop, Start, etc.. via MultiCloud requires the MultiCloud identity URL to be either passed in the payload or defined in appc.properties.
- APPC needs Admin level access for Tenant level operations.
- - Currently, if DGs are modified in appc.git repo, they must be manually moved to the appc/deployment repo.
- Currently, the "ModifyConfig" API and the implementation in the Master Directed Graph is only designed to work with the vFW Closed-Loop Demo.