Page MenuHomeVyOS Platform

240228-ha-r02a-failed.txt

Authored By
matthewr
Feb 28 2024, 6:31 PM
Size
175 KB
Referenced Files
None
Subscribers
None

240228-ha-r02a-failed.txt

login as: itconsult
[email protected]'s password:
Last login: Wed Feb 28 17:42:51 2024 from bvi1.qr-r03.itconsult.net
itconsult@ha-r02a:~$ sh ver
Version: VyOS 1.3.3
Release train: equuleus
Built by: Sentrium S.L.
Built on: Mon 29 May 2023 12:55 UTC
Build UUID: a302f99b-4d44-4a40-82ba-1a4275902d5e
Build commit ID: bc64a3a72244b9
Architecture: x86_64
Boot via: installed image
System type: KVM guest
Hardware vendor: Red Hat
Hardware model: KVM
Hardware S/N:
Hardware UUID: 6e70bbb2-6767-4eb6-af05-62b466abdae3
Copyright: VyOS maintainers and contributors
itconsult@ha-r02a:~$ sh conf c | strip-private
set firewall all-ping 'enable'
set firewall broadcast-ping 'disable'
set firewall config-trap 'disable'
set firewall group network-group internaladdresses network 'xxx.xxx.42.0/24'
set firewall group network-group internaladdresses network 'xxx.xxx.23.0/29'
set firewall group network-group internaladdresses network 'xxx.xxx.203.24/29'
set firewall group network-group internaladdresses network 'xxx.xxx.69.64/29'
set firewall group network-group internaladdresses network 'xxx.xxx.72.64/29'
set firewall group network-group internaladdresses network 'xxx.xxx.4.208/29'
set firewall group network-group itconsult network 'xxx.xxx.42.0/24'
set firewall group network-group itconsult network 'xxx.xxx.134.0/24'
set firewall group network-group outviajt network 'xxx.xxx.23.0/29'
set firewall group network-group smbtom86 network 'xxx.xxx.144.150/32'
set firewall group network-group smbtom86 network 'xxx.xxx.29.81/32'
set firewall ipv6-receive-redirects 'disable'
set firewall ipv6-src-route 'disable'
set firewall ip-src-route 'disable'
set firewall log-martians 'enable'
set firewall name FROM-HAEMAIL default-action 'drop'
set firewall name FROM-HAEMAIL rule 10 action 'accept'
set firewall name FROM-HAEMAIL rule 10 description 'TCP to itconsult'
set firewall name FROM-HAEMAIL rule 10 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAEMAIL rule 10 destination port 'domain,www,https,smtp,ldap,ldaps'
set firewall name FROM-HAEMAIL rule 10 protocol 'tcp'
set firewall name FROM-HAEMAIL rule 10 source address 'xxx.xxx.42.72/29'
set firewall name FROM-HAEMAIL rule 11 action 'accept'
set firewall name FROM-HAEMAIL rule 11 description 'UDP to itconsult'
set firewall name FROM-HAEMAIL rule 11 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAEMAIL rule 11 destination port 'domain,ntp,syslog,ldap,ldaps'
set firewall name FROM-HAEMAIL rule 11 protocol 'udp'
set firewall name FROM-HAEMAIL rule 11 source address 'xxx.xxx.42.72/29'
set firewall name FROM-HAEMAIL rule 110 action 'accept'
set firewall name FROM-HAEMAIL rule 110 description 'Outgoing SMTP'
set firewall name FROM-HAEMAIL rule 110 destination port 'smtp'
set firewall name FROM-HAEMAIL rule 110 protocol 'tcp'
set firewall name FROM-HAEMAIL rule 110 source address 'xxx.xxx.42.72/29'
set firewall name FROM-HAEMAIL rule 120 action 'accept'
set firewall name FROM-HAEMAIL rule 120 description 'Internet Browsing (normally disabled)'
set firewall name FROM-HAEMAIL rule 120 destination port 'www,https'
set firewall name FROM-HAEMAIL rule 120 disable
set firewall name FROM-HAEMAIL rule 120 protocol 'tcp'
set firewall name FROM-HAEMAIL rule 120 source address 'xxx.xxx.42.72/29'
set firewall name FROM-HAEMAIL rule 996 action 'accept'
set firewall name FROM-HAEMAIL rule 996 description 'ICMP throughout'
set firewall name FROM-HAEMAIL rule 996 protocol 'icmp'
set firewall name FROM-HAEMAIL rule 997 action 'accept'
set firewall name FROM-HAEMAIL rule 997 description 'Firewall return traffic'
set firewall name FROM-HAEMAIL rule 997 state established 'enable'
set firewall name FROM-HAEMAIL rule 997 state related 'enable'
set firewall name FROM-HAEMAIL rule 999 action 'reject'
set firewall name FROM-HAEMAIL rule 999 description 'Block'
set firewall name FROM-HAEMAIL rule 999 log 'disable'
set firewall name FROM-HAEMAIL rule 999 protocol 'all'
set firewall name FROM-HAHOSTING default-action 'drop'
set firewall name FROM-HAHOSTING rule 10 action 'accept'
set firewall name FROM-HAHOSTING rule 10 description 'TCP to itconsult'
set firewall name FROM-HAHOSTING rule 10 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAHOSTING rule 10 destination port 'domain,smtp,5667'
set firewall name FROM-HAHOSTING rule 10 protocol 'tcp'
set firewall name FROM-HAHOSTING rule 10 source address 'xxx.xxx.42.0/28'
set firewall name FROM-HAHOSTING rule 11 action 'accept'
set firewall name FROM-HAHOSTING rule 11 description 'UDP to itconsult'
set firewall name FROM-HAHOSTING rule 11 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAHOSTING rule 11 destination port 'domain,ntp,syslog'
set firewall name FROM-HAHOSTING rule 11 protocol 'udp'
set firewall name FROM-HAHOSTING rule 11 source address 'xxx.xxx.42.0/28'
set firewall name FROM-HAHOSTING rule 110 action 'accept'
set firewall name FROM-HAHOSTING rule 110 description 'Outgoing SMTP'
set firewall name FROM-HAHOSTING rule 110 destination port 'smtp'
set firewall name FROM-HAHOSTING rule 110 protocol 'tcp'
set firewall name FROM-HAHOSTING rule 110 source address 'xxx.xxx.42.0/28'
set firewall name FROM-HAHOSTING rule 120 action 'accept'
set firewall name FROM-HAHOSTING rule 120 description 'Outgoing DNS'
set firewall name FROM-HAHOSTING rule 120 destination port 'domain'
set firewall name FROM-HAHOSTING rule 120 protocol 'udp'
set firewall name FROM-HAHOSTING rule 120 source address 'xxx.xxx.42.0/28'
set firewall name FROM-HAHOSTING rule 121 action 'accept'
set firewall name FROM-HAHOSTING rule 121 description 'Outgoing DNS'
set firewall name FROM-HAHOSTING rule 121 destination port 'domain'
set firewall name FROM-HAHOSTING rule 121 protocol 'tcp'
set firewall name FROM-HAHOSTING rule 121 source address 'xxx.xxx.42.0/28'
set firewall name FROM-HAHOSTING rule 130 action 'accept'
set firewall name FROM-HAHOSTING rule 130 description 'Internet Browsing (normally disabled)'
set firewall name FROM-HAHOSTING rule 130 destination port 'www,https'
set firewall name FROM-HAHOSTING rule 130 protocol 'tcp'
set firewall name FROM-HAHOSTING rule 130 source address 'xxx.xxx.42.0/28'
set firewall name FROM-HAHOSTING rule 140 action 'accept'
set firewall name FROM-HAHOSTING rule 140 description 'm64 outgoing re Cattools'
set firewall name FROM-HAHOSTING rule 140 destination port 'telnet,ssh,445'
set firewall name FROM-HAHOSTING rule 140 protocol 'tcp'
set firewall name FROM-HAHOSTING rule 140 source address 'xxx.xxx.42.10/32'
set firewall name FROM-HAHOSTING rule 141 action 'accept'
set firewall name FROM-HAHOSTING rule 141 description 'm71 ssh'
set firewall name FROM-HAHOSTING rule 141 destination port 'ssh'
set firewall name FROM-HAHOSTING rule 141 protocol 'tcp'
set firewall name FROM-HAHOSTING rule 141 source address 'xxx.xxx.42.7/32'
set firewall name FROM-HAHOSTING rule 996 action 'accept'
set firewall name FROM-HAHOSTING rule 996 description 'ICMP throughout'
set firewall name FROM-HAHOSTING rule 996 protocol 'icmp'
set firewall name FROM-HAHOSTING rule 997 action 'accept'
set firewall name FROM-HAHOSTING rule 997 description 'Firewall return traffic'
set firewall name FROM-HAHOSTING rule 997 state established 'enable'
set firewall name FROM-HAHOSTING rule 997 state related 'enable'
set firewall name FROM-HAHOSTING rule 999 action 'reject'
set firewall name FROM-HAHOSTING rule 999 description 'Block'
set firewall name FROM-HAHOSTING rule 999 log 'disable'
set firewall name FROM-HAHOSTING rule 999 protocol 'all'
set firewall name FROM-HAJTHOSTING default-action 'drop'
set firewall name FROM-HAJTHOSTING rule 10 action 'accept'
set firewall name FROM-HAJTHOSTING rule 10 description 'TCP to itconsult'
set firewall name FROM-HAJTHOSTING rule 10 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAJTHOSTING rule 10 destination port 'domain,www,https,smtp'
set firewall name FROM-HAJTHOSTING rule 10 protocol 'tcp'
set firewall name FROM-HAJTHOSTING rule 10 source address 'xxx.xxx.23.0/29'
set firewall name FROM-HAJTHOSTING rule 11 action 'accept'
set firewall name FROM-HAJTHOSTING rule 11 description 'UDP to itconsult'
set firewall name FROM-HAJTHOSTING rule 11 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAJTHOSTING rule 11 destination port 'domain,ntp,syslog,ldap,ldaps'
set firewall name FROM-HAJTHOSTING rule 11 protocol 'udp'
set firewall name FROM-HAJTHOSTING rule 11 source address 'xxx.xxx.23.0/29'
set firewall name FROM-HAJTHOSTING rule 110 action 'accept'
set firewall name FROM-HAJTHOSTING rule 110 description 'Outgoing SMTP from m81'
set firewall name FROM-HAJTHOSTING rule 110 destination port 'smtp'
set firewall name FROM-HAJTHOSTING rule 110 protocol 'tcp'
set firewall name FROM-HAJTHOSTING rule 110 source address 'xxx.xxx.23.2/32'
set firewall name FROM-HAJTHOSTING rule 120 action 'accept'
set firewall name FROM-HAJTHOSTING rule 120 description 'Internet Browsing (normally disabled)'
set firewall name FROM-HAJTHOSTING rule 120 destination port 'www,https'
set firewall name FROM-HAJTHOSTING rule 120 disable
set firewall name FROM-HAJTHOSTING rule 120 protocol 'tcp'
set firewall name FROM-HAJTHOSTING rule 120 source address 'xxx.xxx.23.0/29'
set firewall name FROM-HAJTHOSTING rule 130 action 'accept'
set firewall name FROM-HAJTHOSTING rule 130 description 'TEMP Outgoing Kali (normally disabled)'
set firewall name FROM-HAJTHOSTING rule 130 disable
set firewall name FROM-HAJTHOSTING rule 130 source address 'xxx.xxx.23.3/32'
set firewall name FROM-HAJTHOSTING rule 996 action 'accept'
set firewall name FROM-HAJTHOSTING rule 996 description 'ICMP throughout'
set firewall name FROM-HAJTHOSTING rule 996 protocol 'icmp'
set firewall name FROM-HAJTHOSTING rule 997 action 'accept'
set firewall name FROM-HAJTHOSTING rule 997 description 'Firewall return traffic'
set firewall name FROM-HAJTHOSTING rule 997 state established 'enable'
set firewall name FROM-HAJTHOSTING rule 997 state related 'enable'
set firewall name FROM-HAJTHOSTING rule 999 action 'reject'
set firewall name FROM-HAJTHOSTING rule 999 description 'Block'
set firewall name FROM-HAJTHOSTING rule 999 log 'disable'
set firewall name FROM-HAJTHOSTING rule 999 protocol 'all'
set firewall name FROM-HAUNIFI default-action 'drop'
set firewall name FROM-HAUNIFI rule 10 action 'accept'
set firewall name FROM-HAUNIFI rule 10 description 'TCP to itconsult'
set firewall name FROM-HAUNIFI rule 10 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAUNIFI rule 10 destination port 'domain,smtp'
set firewall name FROM-HAUNIFI rule 10 protocol 'tcp'
set firewall name FROM-HAUNIFI rule 10 source address 'xxx.xxx.132.0/24'
set firewall name FROM-HAUNIFI rule 11 action 'accept'
set firewall name FROM-HAUNIFI rule 11 description 'UDP to itconsult'
set firewall name FROM-HAUNIFI rule 11 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAUNIFI rule 11 destination port 'domain,ntp,syslog'
set firewall name FROM-HAUNIFI rule 11 protocol 'udp'
set firewall name FROM-HAUNIFI rule 11 source address 'xxx.xxx.132.0/24'
set firewall name FROM-HAUNIFI rule 120 action 'accept'
set firewall name FROM-HAUNIFI rule 120 description 'Internet Browsing (normally disabled)'
set firewall name FROM-HAUNIFI rule 120 destination port 'www,https'
set firewall name FROM-HAUNIFI rule 120 disable
set firewall name FROM-HAUNIFI rule 120 protocol 'tcp'
set firewall name FROM-HAUNIFI rule 120 source address 'xxx.xxx.132.0/24'
set firewall name FROM-HAUNIFI rule 996 action 'accept'
set firewall name FROM-HAUNIFI rule 996 description 'ICMP throughout'
set firewall name FROM-HAUNIFI rule 996 protocol 'icmp'
set firewall name FROM-HAUNIFI rule 997 action 'accept'
set firewall name FROM-HAUNIFI rule 997 description 'Firewall return traffic'
set firewall name FROM-HAUNIFI rule 997 state established 'enable'
set firewall name FROM-HAUNIFI rule 997 state related 'enable'
set firewall name FROM-HAUNIFI rule 999 action 'reject'
set firewall name FROM-HAUNIFI rule 999 description 'Block'
set firewall name FROM-HAUNIFI rule 999 log 'disable'
set firewall name FROM-HAUNIFI rule 999 protocol 'all'
set firewall name FROM-HAVIRT default-action 'drop'
set firewall name FROM-HAVIRT rule 10 action 'accept'
set firewall name FROM-HAVIRT rule 10 description 'All traffic to itconsult'
set firewall name FROM-HAVIRT rule 10 destination address 'xxx.xxx.42.0/24'
set firewall name FROM-HAVIRT rule 10 protocol 'all'
set firewall name FROM-HAVIRT rule 10 source address 'xxx.xxx.42.80/28'
set firewall name FROM-HAVIRT rule 11 action 'accept'
set firewall name FROM-HAVIRT rule 11 description 'All traffic to itconsult - vlan 121'
set firewall name FROM-HAVIRT rule 11 destination address 'xxx.xxx.4.208/29'
set firewall name FROM-HAVIRT rule 11 protocol 'all'
set firewall name FROM-HAVIRT rule 11 source address 'xxx.xxx.42.80/28'
set firewall name FROM-HAVIRT rule 20 action 'accept'
set firewall name FROM-HAVIRT rule 20 description 'NTP'
set firewall name FROM-HAVIRT rule 20 destination port 'ntp'
set firewall name FROM-HAVIRT rule 20 protocol 'udp'
set firewall name FROM-HAVIRT rule 20 source address 'xxx.xxx.42.80/28'
set firewall name FROM-HAVIRT rule 30 action 'accept'
set firewall name FROM-HAVIRT rule 30 description 'Browsing'
set firewall name FROM-HAVIRT rule 30 destination port 'www,https'
set firewall name FROM-HAVIRT rule 30 protocol 'tcp'
set firewall name FROM-HAVIRT rule 30 source address 'xxx.xxx.42.80/28'
set firewall name FROM-HAVIRT rule 996 action 'accept'
set firewall name FROM-HAVIRT rule 996 description 'ICMP throughout'
set firewall name FROM-HAVIRT rule 996 protocol 'icmp'
set firewall name FROM-HAVIRT rule 997 action 'accept'
set firewall name FROM-HAVIRT rule 997 description 'Firewall return traffic'
set firewall name FROM-HAVIRT rule 997 state established 'enable'
set firewall name FROM-HAVIRT rule 997 state related 'enable'
set firewall name FROM-HAVIRT rule 999 action 'reject'
set firewall name FROM-HAVIRT rule 999 description 'Block'
set firewall name FROM-HAVIRT rule 999 log 'disable'
set firewall name FROM-HAVIRT rule 999 protocol 'all'
set firewall name FROM-INSIDEH default-action 'drop'
set firewall name FROM-INSIDEH rule 11 action 'accept'
set firewall name FROM-INSIDEH rule 11 description 'Allow printer l01 only to local'
set firewall name FROM-INSIDEH rule 11 destination group network-group 'itconsult'
set firewall name FROM-INSIDEH rule 11 protocol 'all'
set firewall name FROM-INSIDEH rule 11 source address 'xxx.xxx.42.37/32'
set firewall name FROM-INSIDEH rule 12 action 'reject'
set firewall name FROM-INSIDEH rule 12 description 'Deny printer l01 to Internet'
set firewall name FROM-INSIDEH rule 12 protocol 'all'
set firewall name FROM-INSIDEH rule 12 source address 'xxx.xxx.42.37/32'
set firewall name FROM-INSIDEH rule 101 action 'accept'
set firewall name FROM-INSIDEH rule 101 description 'All outgoing'
set firewall name FROM-INSIDEH rule 101 protocol 'all'
set firewall name FROM-INSIDEH rule 101 source address 'xxx.xxx.42.0/26'
set firewall name FROM-INSIDEH rule 102 action 'accept'
set firewall name FROM-INSIDEH rule 102 description 'All outgoing from JT subnet'
set firewall name FROM-INSIDEH rule 102 protocol 'all'
set firewall name FROM-INSIDEH rule 102 source address 'xxx.xxx.23.0/29'
set firewall name FROM-INSIDEH rule 991 action 'reject'
set firewall name FROM-INSIDEH rule 991 description 'Reject broadcast without logging'
set firewall name FROM-INSIDEH rule 991 destination address 'xxx.xxx.16.7'
set firewall name FROM-INSIDEH rule 991 protocol 'all'
set firewall name FROM-INSIDEH rule 998 action 'reject'
set firewall name FROM-INSIDEH rule 998 description 'Reject broadcast without logging'
set firewall name FROM-INSIDEH rule 998 destination address 'xxx.xxx.42.127'
set firewall name FROM-INSIDEH rule 998 protocol 'all'
set firewall name FROM-INSIDEH rule 999 action 'reject'
set firewall name FROM-INSIDEH rule 999 description 'Block'
set firewall name FROM-INSIDEH rule 999 log 'disable'
set firewall name FROM-INSIDEH rule 999 protocol 'all'
set firewall name FROM-MR default-action 'drop'
set firewall name FROM-MR rule 10 action 'accept'
set firewall name FROM-MR rule 10 description 'All Outgoing'
set firewall name FROM-MR rule 10 protocol 'all'
set firewall name FROM-MR rule 10 source address 'xxx.xxx.134.0/24'
set firewall name FROM-MR rule 996 action 'accept'
set firewall name FROM-MR rule 996 description 'ICMP throughout'
set firewall name FROM-MR rule 996 protocol 'icmp'
set firewall name FROM-MR rule 997 action 'accept'
set firewall name FROM-MR rule 997 description 'Firewall return traffic'
set firewall name FROM-MR rule 997 state established 'enable'
set firewall name FROM-MR rule 997 state related 'enable'
set firewall name FROM-MR rule 999 action 'reject'
set firewall name FROM-MR rule 999 description 'Block'
set firewall name FROM-MR rule 999 log 'disable'
set firewall name FROM-MR rule 999 protocol 'all'
set firewall name TO-HAEMAIL default-action 'drop'
set firewall name TO-HAEMAIL rule 10 action 'accept'
set firewall name TO-HAEMAIL rule 10 description 'TCP from itconsult'
set firewall name TO-HAEMAIL rule 10 destination address 'xxx.xxx.42.72/29'
set firewall name TO-HAEMAIL rule 10 destination port 'ssh,smtp,pop3,imap,imaps,submission'
set firewall name TO-HAEMAIL rule 10 protocol 'tcp'
set firewall name TO-HAEMAIL rule 10 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAEMAIL rule 11 action 'accept'
set firewall name TO-HAEMAIL rule 11 description 'UDP from itconsult'
set firewall name TO-HAEMAIL rule 11 destination address 'xxx.xxx.42.72/29'
set firewall name TO-HAEMAIL rule 11 destination port 'snmp'
set firewall name TO-HAEMAIL rule 11 protocol 'udp'
set firewall name TO-HAEMAIL rule 11 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAEMAIL rule 110 action 'accept'
set firewall name TO-HAEMAIL rule 110 description 'SMTP throughout'
set firewall name TO-HAEMAIL rule 110 destination address 'xxx.xxx.42.72/29'
set firewall name TO-HAEMAIL rule 110 destination port 'smtp'
set firewall name TO-HAEMAIL rule 110 protocol 'tcp'
set firewall name TO-HAEMAIL rule 996 action 'accept'
set firewall name TO-HAEMAIL rule 996 description 'ICMP throughout'
set firewall name TO-HAEMAIL rule 996 protocol 'icmp'
set firewall name TO-HAEMAIL rule 997 action 'accept'
set firewall name TO-HAEMAIL rule 997 description 'Firewall return traffic'
set firewall name TO-HAEMAIL rule 997 state established 'enable'
set firewall name TO-HAEMAIL rule 997 state related 'enable'
set firewall name TO-HAEMAIL rule 999 action 'reject'
set firewall name TO-HAEMAIL rule 999 description 'Block'
set firewall name TO-HAEMAIL rule 999 log 'disable'
set firewall name TO-HAEMAIL rule 999 protocol 'all'
set firewall name TO-HAHOSTING default-action 'drop'
set firewall name TO-HAHOSTING rule 10 action 'accept'
set firewall name TO-HAHOSTING rule 10 description 'TCP from itconsult'
set firewall name TO-HAHOSTING rule 10 destination address 'xxx.xxx.42.0/28'
set firewall name TO-HAHOSTING rule 10 destination port 'ssh,3389,5666,pop3,445,8001,8000'
set firewall name TO-HAHOSTING rule 10 protocol 'tcp'
set firewall name TO-HAHOSTING rule 10 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAHOSTING rule 11 action 'accept'
set firewall name TO-HAHOSTING rule 11 description 'UDP from itconsult'
set firewall name TO-HAHOSTING rule 11 destination address 'xxx.xxx.42.0/28'
set firewall name TO-HAHOSTING rule 11 destination port 'snmp'
set firewall name TO-HAHOSTING rule 11 protocol 'udp'
set firewall name TO-HAHOSTING rule 11 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAHOSTING rule 110 action 'accept'
set firewall name TO-HAHOSTING rule 110 description 'SMTP/DNS'
set firewall name TO-HAHOSTING rule 110 destination address 'xxx.xxx.42.0/28'
set firewall name TO-HAHOSTING rule 110 destination port 'smtp,domain'
set firewall name TO-HAHOSTING rule 110 protocol 'tcp'
set firewall name TO-HAHOSTING rule 120 action 'accept'
set firewall name TO-HAHOSTING rule 120 description 'DNS'
set firewall name TO-HAHOSTING rule 120 destination address 'xxx.xxx.42.0/28'
set firewall name TO-HAHOSTING rule 120 destination port 'domain'
set firewall name TO-HAHOSTING rule 120 protocol 'udp'
set firewall name TO-HAHOSTING rule 130 action 'accept'
set firewall name TO-HAHOSTING rule 130 description 'SYSLOG & SMNP Trap to m63'
set firewall name TO-HAHOSTING rule 130 destination address 'xxx.xxx.42.2/32'
set firewall name TO-HAHOSTING rule 130 destination port 'syslog,162'
set firewall name TO-HAHOSTING rule 130 protocol 'udp'
set firewall name TO-HAHOSTING rule 140 action 'accept'
set firewall name TO-HAHOSTING rule 140 description 'ssh from m70'
set firewall name TO-HAHOSTING rule 140 destination address 'xxx.xxx.42.0/28'
set firewall name TO-HAHOSTING rule 140 destination port 'ssh'
set firewall name TO-HAHOSTING rule 140 protocol 'tcp'
set firewall name TO-HAHOSTING rule 140 source address 'xxx.xxx.144.150/32'
set firewall name TO-HAHOSTING rule 141 action 'accept'
set firewall name TO-HAHOSTING rule 141 description 'ssh from m72'
set firewall name TO-HAHOSTING rule 141 destination address 'xxx.xxx.42.0/28'
set firewall name TO-HAHOSTING rule 141 destination port 'ssh'
set firewall name TO-HAHOSTING rule 141 protocol 'tcp'
set firewall name TO-HAHOSTING rule 141 source address 'xxx.xxx.34.123/32'
set firewall name TO-HAHOSTING rule 142 action 'accept'
set firewall name TO-HAHOSTING rule 142 description 'ssh to m71'
set firewall name TO-HAHOSTING rule 142 destination address 'xxx.xxx.42.7/32'
set firewall name TO-HAHOSTING rule 142 destination port 'ssh'
set firewall name TO-HAHOSTING rule 142 protocol 'tcp'
set firewall name TO-HAHOSTING rule 996 action 'accept'
set firewall name TO-HAHOSTING rule 996 description 'ICMP throughout'
set firewall name TO-HAHOSTING rule 996 protocol 'icmp'
set firewall name TO-HAHOSTING rule 997 action 'accept'
set firewall name TO-HAHOSTING rule 997 description 'Firewall return traffic'
set firewall name TO-HAHOSTING rule 997 state established 'enable'
set firewall name TO-HAHOSTING rule 997 state related 'enable'
set firewall name TO-HAHOSTING rule 999 action 'reject'
set firewall name TO-HAHOSTING rule 999 description 'Block'
set firewall name TO-HAHOSTING rule 999 log 'disable'
set firewall name TO-HAHOSTING rule 999 protocol 'all'
set firewall name TO-HAJTHOSTING default-action 'drop'
set firewall name TO-HAJTHOSTING rule 10 action 'accept'
set firewall name TO-HAJTHOSTING rule 10 description 'TCP from itconsult'
set firewall name TO-HAJTHOSTING rule 10 destination address 'xxx.xxx.23.0/29'
set firewall name TO-HAJTHOSTING rule 10 destination port 'ssh,smtp,9392,https'
set firewall name TO-HAJTHOSTING rule 10 protocol 'tcp'
set firewall name TO-HAJTHOSTING rule 10 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAJTHOSTING rule 11 action 'accept'
set firewall name TO-HAJTHOSTING rule 11 description 'UDP from itconsult'
set firewall name TO-HAJTHOSTING rule 11 destination address 'xxx.xxx.23.0/29'
set firewall name TO-HAJTHOSTING rule 11 destination port 'snmp'
set firewall name TO-HAJTHOSTING rule 11 protocol 'udp'
set firewall name TO-HAJTHOSTING rule 11 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAJTHOSTING rule 110 action 'accept'
set firewall name TO-HAJTHOSTING rule 110 description 'SMTP to m81'
set firewall name TO-HAJTHOSTING rule 110 destination address 'xxx.xxx.23.2/32'
set firewall name TO-HAJTHOSTING rule 110 destination port 'smtp'
set firewall name TO-HAJTHOSTING rule 110 protocol 'tcp'
set firewall name TO-HAJTHOSTING rule 996 action 'accept'
set firewall name TO-HAJTHOSTING rule 996 description 'ICMP throughout'
set firewall name TO-HAJTHOSTING rule 996 protocol 'icmp'
set firewall name TO-HAJTHOSTING rule 997 action 'accept'
set firewall name TO-HAJTHOSTING rule 997 description 'Firewall return traffic'
set firewall name TO-HAJTHOSTING rule 997 state established 'enable'
set firewall name TO-HAJTHOSTING rule 997 state related 'enable'
set firewall name TO-HAJTHOSTING rule 999 action 'reject'
set firewall name TO-HAJTHOSTING rule 999 description 'Block'
set firewall name TO-HAJTHOSTING rule 999 log 'disable'
set firewall name TO-HAJTHOSTING rule 999 protocol 'all'
set firewall name TO-HAUNIFI default-action 'drop'
set firewall name TO-HAUNIFI rule 10 action 'accept'
set firewall name TO-HAUNIFI rule 10 description 'TCP from itconsult'
set firewall name TO-HAUNIFI rule 10 destination address 'xxx.xxx.132.0/24'
set firewall name TO-HAUNIFI rule 10 destination port 'ssh,8443'
set firewall name TO-HAUNIFI rule 10 protocol 'tcp'
set firewall name TO-HAUNIFI rule 10 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAUNIFI rule 11 action 'accept'
set firewall name TO-HAUNIFI rule 11 description 'UDP from itconsult'
set firewall name TO-HAUNIFI rule 11 destination address 'xxx.xxx.132.0/24'
set firewall name TO-HAUNIFI rule 11 destination port 'snmp'
set firewall name TO-HAUNIFI rule 11 protocol 'udp'
set firewall name TO-HAUNIFI rule 11 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAUNIFI rule 996 action 'accept'
set firewall name TO-HAUNIFI rule 996 description 'ICMP throughout'
set firewall name TO-HAUNIFI rule 996 protocol 'icmp'
set firewall name TO-HAUNIFI rule 997 action 'accept'
set firewall name TO-HAUNIFI rule 997 description 'Firewall return traffic'
set firewall name TO-HAUNIFI rule 997 state established 'enable'
set firewall name TO-HAUNIFI rule 997 state related 'enable'
set firewall name TO-HAUNIFI rule 999 action 'reject'
set firewall name TO-HAUNIFI rule 999 description 'Block'
set firewall name TO-HAUNIFI rule 999 log 'disable'
set firewall name TO-HAUNIFI rule 999 protocol 'all'
set firewall name TO-HAVIRT default-action 'drop'
set firewall name TO-HAVIRT rule 3 action 'accept'
set firewall name TO-HAVIRT rule 3 description 'Allow local ha-h02'
set firewall name TO-HAVIRT rule 3 destination address 'xxx.xxx.42.85/32'
set firewall name TO-HAVIRT rule 3 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAVIRT rule 5 action 'accept'
set firewall name TO-HAVIRT rule 5 description 'Allow local NTP'
set firewall name TO-HAVIRT rule 5 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 5 destination port 'ntp'
set firewall name TO-HAVIRT rule 5 protocol 'udp'
set firewall name TO-HAVIRT rule 5 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAVIRT rule 6 action 'accept'
set firewall name TO-HAVIRT rule 6 description 'Allow local NTP - vlan 131'
set firewall name TO-HAVIRT rule 6 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 6 destination port 'ntp'
set firewall name TO-HAVIRT rule 6 protocol 'udp'
set firewall name TO-HAVIRT rule 6 source address 'xxx.xxx.23.0/29'
set firewall name TO-HAVIRT rule 7 action 'accept'
set firewall name TO-HAVIRT rule 7 description 'Allow local NTP - vlan 141'
set firewall name TO-HAVIRT rule 7 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 7 destination port 'ntp'
set firewall name TO-HAVIRT rule 7 protocol 'udp'
set firewall name TO-HAVIRT rule 7 source address 'xxx.xxx.132.0/24'
set firewall name TO-HAVIRT rule 10 action 'reject'
set firewall name TO-HAVIRT rule 10 description 'Disallow Bassspeaker'
set firewall name TO-HAVIRT rule 10 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 10 source address 'xxx.xxx.42.216/29'
set firewall name TO-HAVIRT rule 20 action 'reject'
set firewall name TO-HAVIRT rule 20 description 'Disallow Guides'
set firewall name TO-HAVIRT rule 20 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 20 source address 'xxx.xxx.42.120/29'
set firewall name TO-HAVIRT rule 30 action 'reject'
set firewall name TO-HAVIRT rule 30 description 'Disallow Merula'
set firewall name TO-HAVIRT rule 30 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 30 source address 'xxx.xxx.42.192/29'
set firewall name TO-HAVIRT rule 40 action 'reject'
set firewall name TO-HAVIRT rule 40 description 'Disallow Island Networks'
set firewall name TO-HAVIRT rule 40 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 40 source address 'xxx.xxx.42.176/28'
set firewall name TO-HAVIRT rule 100 action 'accept'
set firewall name TO-HAVIRT rule 100 description 'Allow all local traffic'
set firewall name TO-HAVIRT rule 100 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 100 source address 'xxx.xxx.42.0/24'
set firewall name TO-HAVIRT rule 110 action 'accept'
set firewall name TO-HAVIRT rule 110 description 'Allow all m70'
set firewall name TO-HAVIRT rule 110 destination address 'xxx.xxx.42.80/28'
set firewall name TO-HAVIRT rule 110 source address 'xxx.xxx.144.150/32'
set firewall name TO-HAVIRT rule 996 action 'accept'
set firewall name TO-HAVIRT rule 996 description 'ICMP throughout'
set firewall name TO-HAVIRT rule 996 protocol 'icmp'
set firewall name TO-HAVIRT rule 997 action 'accept'
set firewall name TO-HAVIRT rule 997 description 'Firewall return traffic'
set firewall name TO-HAVIRT rule 997 state established 'enable'
set firewall name TO-HAVIRT rule 997 state related 'enable'
set firewall name TO-HAVIRT rule 999 action 'reject'
set firewall name TO-HAVIRT rule 999 description 'Block'
set firewall name TO-HAVIRT rule 999 log 'disable'
set firewall name TO-HAVIRT rule 999 protocol 'all'
set firewall name TO-INSIDEH default-action 'drop'
set firewall name TO-INSIDEH rule 1 action 'drop'
set firewall name TO-INSIDEH rule 1 description 'Drop attack traffic'
set firewall name TO-INSIDEH rule 1 source address 'xxx.xxx.102.94/32'
set firewall name TO-INSIDEH rule 10 action 'accept'
set firewall name TO-INSIDEH rule 10 description 'Allow all local traffic'
set firewall name TO-INSIDEH rule 10 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 10 source group network-group 'itconsult'
set firewall name TO-INSIDEH rule 20 action 'accept'
set firewall name TO-INSIDEH rule 20 description 'Allow all local traffic to JT subnet'
set firewall name TO-INSIDEH rule 20 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 20 source address 'xxx.xxx.23.0/29'
set firewall name TO-INSIDEH rule 30 action 'accept'
set firewall name TO-INSIDEH rule 30 description 'Permitted TCP traffic'
set firewall name TO-INSIDEH rule 30 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 30 destination port 'domain,smtp,pop3,submission,www,https,imap2,8000'
set firewall name TO-INSIDEH rule 30 protocol 'tcp'
set firewall name TO-INSIDEH rule 40 action 'accept'
set firewall name TO-INSIDEH rule 40 description 'Permitted UDP traffic'
set firewall name TO-INSIDEH rule 40 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 40 destination port 'domain'
set firewall name TO-INSIDEH rule 40 protocol 'udp'
set firewall name TO-INSIDEH rule 50 action 'accept'
set firewall name TO-INSIDEH rule 50 description 'Permitted TCP traffic to JT subnet'
set firewall name TO-INSIDEH rule 50 destination address 'xxx.xxx.23.0/29'
set firewall name TO-INSIDEH rule 50 destination port 'domain,smtp'
set firewall name TO-INSIDEH rule 50 protocol 'tcp'
set firewall name TO-INSIDEH rule 60 action 'accept'
set firewall name TO-INSIDEH rule 60 description 'Permitted UDP traffic to JT subnet'
set firewall name TO-INSIDEH rule 60 destination address 'xxx.xxx.23.0/29'
set firewall name TO-INSIDEH rule 60 destination port 'domain'
set firewall name TO-INSIDEH rule 60 protocol 'udp'
set firewall name TO-INSIDEH rule 70 action 'accept'
set firewall name TO-INSIDEH rule 70 description 'Syslog & SNMP Trap'
set firewall name TO-INSIDEH rule 70 destination address 'xxx.xxx.42.2/32'
set firewall name TO-INSIDEH rule 70 destination port 'syslog,162'
set firewall name TO-INSIDEH rule 70 protocol 'udp'
set firewall name TO-INSIDEH rule 90 action 'accept'
set firewall name TO-INSIDEH rule 90 description 'FTP to ftp'
set firewall name TO-INSIDEH rule 90 destination address 'xxx.xxx.42.20/32'
set firewall name TO-INSIDEH rule 90 destination port 'ftp'
set firewall name TO-INSIDEH rule 90 protocol 'tcp'
set firewall name TO-INSIDEH rule 100 action 'accept'
set firewall name TO-INSIDEH rule 100 description 'HTTPS to m73'
set firewall name TO-INSIDEH rule 100 destination address 'xxx.xxx.42.34/32'
set firewall name TO-INSIDEH rule 100 destination port 'https'
set firewall name TO-INSIDEH rule 100 protocol 'tcp'
set firewall name TO-INSIDEH rule 120 action 'accept'
set firewall name TO-INSIDEH rule 120 description 'NSCA to m40'
set firewall name TO-INSIDEH rule 120 destination address 'xxx.xxx.42.46/32'
set firewall name TO-INSIDEH rule 120 destination port '5667'
set firewall name TO-INSIDEH rule 120 protocol 'tcp'
set firewall name TO-INSIDEH rule 210 action 'accept'
set firewall name TO-INSIDEH rule 210 description 'IPSEC'
set firewall name TO-INSIDEH rule 210 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 210 destination port '500,4500'
set firewall name TO-INSIDEH rule 210 protocol 'udp'
set firewall name TO-INSIDEH rule 220 action 'accept'
set firewall name TO-INSIDEH rule 220 description 'IPSEC'
set firewall name TO-INSIDEH rule 220 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 220 protocol 'esp'
set firewall name TO-INSIDEH rule 230 action 'accept'
set firewall name TO-INSIDEH rule 230 description 'm70 ssh'
set firewall name TO-INSIDEH rule 230 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 230 destination port 'ssh'
set firewall name TO-INSIDEH rule 230 protocol 'tcp'
set firewall name TO-INSIDEH rule 230 source address 'xxx.xxx.144.150/32'
set firewall name TO-INSIDEH rule 231 action 'accept'
set firewall name TO-INSIDEH rule 231 description 'm72 ssh'
set firewall name TO-INSIDEH rule 231 destination address 'xxx.xxx.42.0/26'
set firewall name TO-INSIDEH rule 231 destination port 'ssh'
set firewall name TO-INSIDEH rule 231 protocol 'tcp'
set firewall name TO-INSIDEH rule 231 source address 'xxx.xxx.34.123/32'
set firewall name TO-INSIDEH rule 240 action 'accept'
set firewall name TO-INSIDEH rule 240 description 'external smb to m86'
set firewall name TO-INSIDEH rule 240 destination address 'xxx.xxx.42.48/32'
set firewall name TO-INSIDEH rule 240 destination port '445'
set firewall name TO-INSIDEH rule 240 protocol 'tcp'
set firewall name TO-INSIDEH rule 240 source group network-group 'smbtom86'
set firewall name TO-INSIDEH rule 302 action 'accept'
set firewall name TO-INSIDEH rule 302 description 'm56 ssh (temporary)'
set firewall name TO-INSIDEH rule 302 destination address 'xxx.xxx.42.36/32'
set firewall name TO-INSIDEH rule 302 destination port 'ssh'
set firewall name TO-INSIDEH rule 302 protocol 'tcp'
set firewall name TO-INSIDEH rule 303 action 'accept'
set firewall name TO-INSIDEH rule 303 description 'imaps to et11 (temporary)'
set firewall name TO-INSIDEH rule 303 destination address 'xxx.xxx.42.35/32'
set firewall name TO-INSIDEH rule 303 destination port '993'
set firewall name TO-INSIDEH rule 303 protocol 'tcp'
set firewall name TO-INSIDEH rule 304 action 'accept'
set firewall name TO-INSIDEH rule 304 description 'vlan99 to lt01 (temporary)'
set firewall name TO-INSIDEH rule 304 destination address 'xxx.xxx.42.34/32'
set firewall name TO-INSIDEH rule 304 source address 'xxx.xxx.99.0/24'
set firewall name TO-INSIDEH rule 981 action 'reject'
set firewall name TO-INSIDEH rule 981 description 'Block IDENT without logging'
set firewall name TO-INSIDEH rule 981 destination port 'auth'
set firewall name TO-INSIDEH rule 981 protocol 'tcp'
set firewall name TO-INSIDEH rule 996 action 'accept'
set firewall name TO-INSIDEH rule 996 description 'ICMP throughout'
set firewall name TO-INSIDEH rule 996 protocol 'icmp'
set firewall name TO-INSIDEH rule 997 action 'accept'
set firewall name TO-INSIDEH rule 997 description 'Firewall return traffic'
set firewall name TO-INSIDEH rule 997 state established 'enable'
set firewall name TO-INSIDEH rule 997 state related 'enable'
set firewall name TO-INSIDEH rule 999 action 'reject'
set firewall name TO-INSIDEH rule 999 description 'Block'
set firewall name TO-INSIDEH rule 999 log 'disable'
set firewall name TO-INSIDEH rule 999 protocol 'all'
set firewall name TO-MR default-action 'drop'
set firewall name TO-MR rule 996 action 'accept'
set firewall name TO-MR rule 996 description 'ICMP throughout'
set firewall name TO-MR rule 996 protocol 'icmp'
set firewall name TO-MR rule 997 action 'accept'
set firewall name TO-MR rule 997 description 'Firewall return traffic'
set firewall name TO-MR rule 997 state established 'enable'
set firewall name TO-MR rule 997 state related 'enable'
set firewall name TO-MR rule 999 action 'reject'
set firewall name TO-MR rule 999 description 'Block'
set firewall name TO-MR rule 999 log 'disable'
set firewall name TO-MR rule 999 protocol 'all'
set firewall name TO-ROUTER default-action 'drop'
set firewall name TO-ROUTER rule 10 action 'accept'
set firewall name TO-ROUTER rule 10 description 'All Local Traffic'
set firewall name TO-ROUTER rule 10 protocol 'all'
set firewall name TO-ROUTER rule 10 source address 'xxx.xxx.42.0/24'
set firewall name TO-ROUTER rule 20 action 'accept'
set firewall name TO-ROUTER rule 20 description 'All Local Foreshore Traffic'
set firewall name TO-ROUTER rule 20 protocol 'all'
set firewall name TO-ROUTER rule 20 source address 'xxx.xxx.95.24/29'
set firewall name TO-ROUTER rule 30 action 'accept'
set firewall name TO-ROUTER rule 30 description 'All Local Newtel Traffic'
set firewall name TO-ROUTER rule 30 protocol 'all'
set firewall name TO-ROUTER rule 30 source address 'xxx.xxx.203.24/28'
set firewall name TO-ROUTER rule 40 action 'accept'
set firewall name TO-ROUTER rule 40 description 'All Local JT Traffic'
set firewall name TO-ROUTER rule 40 protocol 'all'
set firewall name TO-ROUTER rule 40 source address 'xxx.xxx.23.0/29'
set firewall name TO-ROUTER rule 50 action 'accept'
set firewall name TO-ROUTER rule 50 description 'All Local JT Traffic'
set firewall name TO-ROUTER rule 50 protocol 'all'
set firewall name TO-ROUTER rule 50 source address 'xxx.xxx.4.208/29'
set firewall name TO-ROUTER rule 60 action 'accept'
set firewall name TO-ROUTER rule 60 description 'VRRP'
set firewall name TO-ROUTER rule 60 destination address 'xxx.xxx.0.18'
set firewall name TO-ROUTER rule 60 protocol '112'
set firewall name TO-ROUTER rule 70 action 'accept'
set firewall name TO-ROUTER rule 70 description 'IPSEC UDP'
set firewall name TO-ROUTER rule 70 destination port '500,4500,1701'
set firewall name TO-ROUTER rule 70 protocol 'udp'
set firewall name TO-ROUTER rule 80 action 'accept'
set firewall name TO-ROUTER rule 80 description 'IPSEC ESP'
set firewall name TO-ROUTER rule 80 protocol 'esp'
set firewall name TO-ROUTER rule 90 action 'accept'
set firewall name TO-ROUTER rule 90 description 'BGP'
set firewall name TO-ROUTER rule 90 destination port '179'
set firewall name TO-ROUTER rule 90 protocol 'tcp'
set firewall name TO-ROUTER rule 100 action 'accept'
set firewall name TO-ROUTER rule 100 description 'DHCP'
set firewall name TO-ROUTER rule 100 destination port 'bootps'
set firewall name TO-ROUTER rule 100 protocol 'udp'
set firewall name TO-ROUTER rule 996 action 'accept'
set firewall name TO-ROUTER rule 996 description 'ICMP Throughout'
set firewall name TO-ROUTER rule 996 protocol 'icmp'
set firewall name TO-ROUTER rule 997 action 'accept'
set firewall name TO-ROUTER rule 997 description 'Return Traffic'
set firewall name TO-ROUTER rule 997 state established 'enable'
set firewall name TO-ROUTER rule 997 state related 'enable'
set firewall name TO-ROUTER rule 999 action 'reject'
set firewall name TO-ROUTER rule 999 description 'Block & Log'
set firewall name TO-ROUTER rule 999 log 'disable'
set firewall name TO-ROUTER rule 999 protocol 'all'
set firewall receive-redirects 'disable'
set firewall send-redirects 'enable'
set firewall source-validation 'disable'
set firewall syn-cookies 'enable'
set firewall twa-hazards-protection 'disable'
set high-availability vrrp group eth0.10-10 advertise-interval '1'
set high-availability vrrp group eth0.10-10 interface 'eth0.10'
set high-availability vrrp group eth0.10-10 priority '150'
set high-availability vrrp group eth0.10-10 virtual-address xxx.xxx.42.62/27
set high-availability vrrp group eth0.10-10 vrid '10'
set high-availability vrrp group eth0.12-12 advertise-interval '1'
set high-availability vrrp group eth0.12-12 interface 'eth0.12'
set high-availability vrrp group eth0.12-12 priority '150'
set high-availability vrrp group eth0.12-12 virtual-address xxx.xxx.134.14/28
set high-availability vrrp group eth0.12-12 vrid '12'
set high-availability vrrp group eth0.130-130 advertise-interval '1'
set high-availability vrrp group eth0.130-130 interface 'eth0.130'
set high-availability vrrp group eth0.130-130 priority '150'
set high-availability vrrp group eth0.130-130 virtual-address xxx.xxx.42.14/28
set high-availability vrrp group eth0.130-130 vrid '130'
set high-availability vrrp group eth0.131-131 advertise-interval '1'
set high-availability vrrp group eth0.131-131 interface 'eth0.131'
set high-availability vrrp group eth0.131-131 priority '150'
set high-availability vrrp group eth0.131-131 virtual-address xxx.xxx.23.6/29
set high-availability vrrp group eth0.131-131 vrid '131'
set high-availability vrrp group eth0.140-140 advertise-interval '1'
set high-availability vrrp group eth0.140-140 interface 'eth0.140'
set high-availability vrrp group eth0.140-140 priority '150'
set high-availability vrrp group eth0.140-140 virtual-address xxx.xxx.42.94/28
set high-availability vrrp group eth0.140-140 vrid '140'
set high-availability vrrp group eth0.141-141 advertise-interval '1'
set high-availability vrrp group eth0.141-141 interface 'eth0.141'
set high-availability vrrp group eth0.141-141 priority '150'
set high-availability vrrp group eth0.141-141 virtual-address xxx.xxx.132.254/24
set high-availability vrrp group eth0.141-141 vrid '141'
set high-availability vrrp group eth0.262-262 advertise-interval '1'
set high-availability vrrp group eth0.262-262 interface 'eth0.262'
set high-availability vrrp group eth0.262-262 priority '150'
set high-availability vrrp group eth0.262-262 virtual-address xxx.xxx.42.78/29
set high-availability vrrp group eth0.262-262 vrid '62'
set interfaces dummy dum1 address 'xxx.xxx.42.188/32'
set interfaces dummy dum1 description 'outbound from vlan 12'
set interfaces dummy dum1 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 duplex 'auto'
set interfaces ethernet eth0 hw-id 'xx:xx:xx:xx:xx:c5'
set interfaces ethernet eth0 offload gro
set interfaces ethernet eth0 offload gso
set interfaces ethernet eth0 offload sg
set interfaces ethernet eth0 offload tso
set interfaces ethernet eth0 speed 'auto'
set interfaces ethernet eth0 vif 10 address 'xxx.xxx.42.61/27'
set interfaces ethernet eth0 vif 10 description 'Inside HA'
set interfaces ethernet eth0 vif 10 disable
set interfaces ethernet eth0 vif 10 firewall in name 'FROM-INSIDEH'
set interfaces ethernet eth0 vif 10 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 10 firewall out name 'TO-INSIDEH'
set interfaces ethernet eth0 vif 10 ip ospf cost '20'
set interfaces ethernet eth0 vif 10 ip ospf dead-interval '40'
set interfaces ethernet eth0 vif 10 ip ospf hello-interval '10'
set interfaces ethernet eth0 vif 10 ip ospf priority '1'
set interfaces ethernet eth0 vif 10 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 10 ip ospf transmit-delay '1'
set interfaces ethernet eth0 vif 12 address 'xxx.xxx.134.12/28'
set interfaces ethernet eth0 vif 12 description 'MR - laptop etc'
set interfaces ethernet eth0 vif 12 disable
set interfaces ethernet eth0 vif 12 firewall in name 'FROM-MR'
set interfaces ethernet eth0 vif 12 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 12 firewall out name 'TO-MR'
set interfaces ethernet eth0 vif 20 address 'xxx.xxx.42.171/28'
set interfaces ethernet eth0 vif 20 description 'Backbone HA'
set interfaces ethernet eth0 vif 20 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 20 ip ospf cost '20'
set interfaces ethernet eth0 vif 20 ip ospf dead-interval '4'
set interfaces ethernet eth0 vif 20 ip ospf hello-interval '1'
set interfaces ethernet eth0 vif 20 ip ospf priority '110'
set interfaces ethernet eth0 vif 20 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 20 ip ospf transmit-delay '1'
set interfaces ethernet eth0 vif 130 address 'xxx.xxx.42.13/28'
set interfaces ethernet eth0 vif 130 description 'HA Hosting'
set interfaces ethernet eth0 vif 130 disable
set interfaces ethernet eth0 vif 130 firewall in name 'FROM-HAHOSTING'
set interfaces ethernet eth0 vif 130 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 130 firewall out name 'TO-HAHOSTING'
set interfaces ethernet eth0 vif 130 ip ospf cost '20'
set interfaces ethernet eth0 vif 130 ip ospf dead-interval '40'
set interfaces ethernet eth0 vif 130 ip ospf hello-interval '10'
set interfaces ethernet eth0 vif 130 ip ospf priority '1'
set interfaces ethernet eth0 vif 130 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 130 ip ospf transmit-delay '1'
set interfaces ethernet eth0 vif 131 address 'xxx.xxx.23.5/29'
set interfaces ethernet eth0 vif 131 description 'HA JT Hosting'
set interfaces ethernet eth0 vif 131 disable
set interfaces ethernet eth0 vif 131 firewall in name 'FROM-HAJTHOSTING'
set interfaces ethernet eth0 vif 131 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 131 firewall out name 'TO-HAJTHOSTING'
set interfaces ethernet eth0 vif 131 ip ospf cost '20'
set interfaces ethernet eth0 vif 131 ip ospf dead-interval '40'
set interfaces ethernet eth0 vif 131 ip ospf hello-interval '10'
set interfaces ethernet eth0 vif 131 ip ospf priority '1'
set interfaces ethernet eth0 vif 131 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 131 ip ospf transmit-delay '1'
set interfaces ethernet eth0 vif 131 policy route 'outviajt'
set interfaces ethernet eth0 vif 140 address 'xxx.xxx.42.93/28'
set interfaces ethernet eth0 vif 140 description 'Virtualisation/Storage'
set interfaces ethernet eth0 vif 140 disable
set interfaces ethernet eth0 vif 140 firewall in name 'FROM-HAVIRT'
set interfaces ethernet eth0 vif 140 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 140 firewall out name 'TO-HAVIRT'
set interfaces ethernet eth0 vif 140 ip ospf cost '20'
set interfaces ethernet eth0 vif 140 ip ospf dead-interval '40'
set interfaces ethernet eth0 vif 140 ip ospf hello-interval '10'
set interfaces ethernet eth0 vif 140 ip ospf priority '1'
set interfaces ethernet eth0 vif 140 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 140 ip ospf transmit-delay '1'
set interfaces ethernet eth0 vif 141 address 'xxx.xxx.132.251/24'
set interfaces ethernet eth0 vif 141 description 'Unifi Management'
set interfaces ethernet eth0 vif 141 disable
set interfaces ethernet eth0 vif 141 firewall in name 'FROM-HAUNIFI'
set interfaces ethernet eth0 vif 141 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 141 firewall out name 'TO-HAUNIFI'
set interfaces ethernet eth0 vif 141 ip ospf cost '20'
set interfaces ethernet eth0 vif 141 ip ospf dead-interval '40'
set interfaces ethernet eth0 vif 141 ip ospf hello-interval '10'
set interfaces ethernet eth0 vif 141 ip ospf priority '1'
set interfaces ethernet eth0 vif 141 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 141 ip ospf transmit-delay '1'
set interfaces ethernet eth0 vif 262 address 'xxx.xxx.42.77/29'
set interfaces ethernet eth0 vif 262 description 'HA Email'
set interfaces ethernet eth0 vif 262 disable
set interfaces ethernet eth0 vif 262 firewall in name 'FROM-HAEMAIL'
set interfaces ethernet eth0 vif 262 firewall local name 'TO-ROUTER'
set interfaces ethernet eth0 vif 262 firewall out name 'TO-HAEMAIL'
set interfaces ethernet eth0 vif 262 ip ospf cost '20'
set interfaces ethernet eth0 vif 262 ip ospf dead-interval '40'
set interfaces ethernet eth0 vif 262 ip ospf hello-interval '10'
set interfaces ethernet eth0 vif 262 ip ospf priority '1'
set interfaces ethernet eth0 vif 262 ip ospf retransmit-interval '5'
set interfaces ethernet eth0 vif 262 ip ospf transmit-delay '1'
set interfaces loopback lo address 'xxx.xxx.42.210/32'
set interfaces loopback lo ip
set nat source rule 12 description 'vlan 12 - translate all'
set nat source rule 12 outbound-interface 'any'
set nat source rule 12 source address 'xxx.xxx.134.0/28'
set nat source rule 12 translation address 'xxx.xxx.42.188/32'
set nat source rule 141 description 'm84 outbound to internet'
set nat source rule 141 destination address '!xxx.xxx.42.0/24'
set nat source rule 141 outbound-interface 'eth0.20'
set nat source rule 141 source address 'xxx.xxx.132.1/32'
set nat source rule 141 translation address 'masquerade'
set policy route outviajt rule 10 description 'Internal Traffic'
set policy route outviajt rule 10 destination group network-group 'internaladdresses'
set policy route outviajt rule 10 set table 'main'
set policy route outviajt rule 10 source group network-group 'outviajt'
set policy route outviajt rule 20 description 'Out via JT'
set policy route outviajt rule 20 set table '1'
set policy route outviajt rule 20 source group network-group 'outviajt'
set policy route outviajt rule 30 description 'Normal Traffic'
set policy route outviajt rule 30 set table 'main'
set protocols ospf area 0 area-type normal
set protocols ospf area 0 network 'xxx.xxx.42.160/28'
set protocols ospf area 0 network 'xxx.xxx.42.210/32'
set protocols ospf area 0 network 'xxx.xxx.42.80/28'
set protocols ospf area 0 network 'xxx.xxx.42.32/27'
set protocols ospf area 0 network 'xxx.xxx.42.0/28'
set protocols ospf area 0 network 'xxx.xxx.42.72/29'
set protocols ospf area 0 network 'xxx.xxx.23.0/29'
set protocols ospf area 0 network 'xxx.xxx.132.0/24'
set protocols ospf area 0 network 'xxx.xxx.42.188/32'
set protocols ospf log-adjacency-changes detail
set protocols ospf passive-interface 'eth0.10'
set protocols ospf passive-interface 'eth0.150'
set protocols ospf passive-interface 'eth0.160'
set protocols ospf passive-interface 'eth0.170'
set protocols ospf passive-interface 'eth0.140'
set protocols ospf passive-interface 'eth0.262'
set protocols ospf passive-interface 'eth0.131'
set protocols ospf passive-interface 'eth0.141'
set protocols ospf passive-interface 'eth0.12'
set protocols ospf passive-interface 'dum1'
set protocols ospf redistribute static metric-type '2'
set protocols static route xxx.xxx.0.0/0 next-hop xxx.xxx.42.170 distance '130'
set protocols static route xxx.xxx.98.1/32 next-hop xxx.xxx.42.165
set protocols static route xxx.xxx.151.0/24 next-hop xxx.xxx.42.166
set protocols static route xxx.xxx.151.1/32 next-hop xxx.xxx.42.166
set protocols static table 1 route xxx.xxx.0.0/0 next-hop xxx.xxx.42.168
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 default-router 'xxx.xxx.42.62'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 lease '10800'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 name-server 'xxx.xxx.42.9'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 name-server 'xxx.xxx.42.130'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 range 0 start 'xxx.xxx.42.38'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 range 0 stop 'xxx.xxx.42.39'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx ip-address 'xxx.xxx.42.43'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:79'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx ip-address 'xxx.xxx.42.44'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:83'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 default-router 'xxx.xxx.134.14'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 lease '10800'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 name-server 'xxx.xxx.42.9'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 name-server 'xxx.xxx.42.130'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 range 0 start 'xxx.xxx.134.2'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 range 0 stop 'xxx.xxx.134.7'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 static-mapping xxxxxx ip-address 'xxx.xxx.134.1'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:ac'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 default-router 'xxx.xxx.132.254'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 lease '10800'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 name-server 'xxx.xxx.42.9'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 name-server 'xxx.xxx.42.130'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 range 0 start 'xxx.xxx.132.111'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 range 0 stop 'xxx.xxx.132.119'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 static-mapping xxxxxx ip-address 'xxx.xxx.132.11'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:d9'
set service snmp community [redacted] authorization 'ro'
set service snmp community [redacted] network 'xxx.xxx.42.0/24'
set service ssh port '22'
set system config-management commit-revisions '20'
set system domain-name xxxxxx
set system host-name xxxxxx
set system login banner post-login ''
set system login banner pre-login ''
set system login user xxxxxx authentication encrypted-password xxxxxx
set system login user xxxxxx authentication plaintext-password xxxxxx
set system name-server 'xxx.xxx.42.9'
set system name-server 'xxx.xxx.42.130'
set system ntp listen-address 'xxx.xxx.42.171'
set system ntp listen-address 'xxx.xxx.42.210'
set system ntp server xxxxx.tld
set system ntp server xxxxx.tld
set system ntp server xxxxx.tld
set system ntp server xxxxx.tld
set system syslog global facility all level 'debug'
set system syslog global facility protocols level 'debug'
set system syslog host xxx.xxx.42.2 facility all level 'debug'
set system time-zone 'GB'
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ sh system image
The system currently has the following image(s) installed:
1: 1.4.0-epa1
2: 1.3.3 (default boot)
itconsult@ha-r02a:~$ del system image 1.4.0-epa1
Are you sure you want to delete the
"1.4.0-epa1" image? (Yes/No) [No]: y
Deleting the "1.4.0-epa1" image...
Done
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ ls
vyos-1.4.0-epa1-amd64.iso
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ add system image vyos-1.4.0-epa1-amd64.iso
Checking SHA256 checksums of files on the ISO image... OK.
Done!
What would you like to name this image? [1.4.0-epa1]:
OK. This image will be named: 1.4.0-epa1
Installing "1.4.0-epa1" image.
Copying new release files...
Would you like to save the current configuration
directory and config file? (Yes/No) [Yes]:
Copying current configuration...
Would you like to save the SSH host keys from your
current configuration? (Yes/No) [Yes]:
Copying SSH keys...
Running post-install script...
Setting up grub configuration...
Done.
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ sh system image
The system currently has the following image(s) installed:
1: 1.4.0-epa1 (default boot)
2: 1.3.3
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ reboot
Are you sure you want to reboot this system? [y/N] y
login as: itconsult
[email protected]'s password:
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ sh ver
Version: VyOS 1.4.0-epa1
Release train: sagitta
Built by: Sentrium S.L.
Built on: Thu 22 Feb 2024 19:17 UTC
Build UUID: 97f0c92c-b99d-4bde-a67f-079ca030f2a1
Build commit ID: bcac2eb1f9b49c
Architecture: x86_64
Boot via: installed image
System type: KVM guest
Hardware vendor: Red Hat
Hardware model: KVM
Hardware S/N:
Hardware UUID: 6e70bbb2-6767-4eb6-af05-62b466abdae3
Copyright: VyOS maintainers and contributors
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ ls -l /var/tmp
total 0
drwx------ 18 frr frr 360 Feb 28 18:04 frr
drwx------ 3 root root 60 Feb 28 18:06 systemd-private-02cc97e523da4afcb30181ed9e61c661-chrony.service-Z23h57
drwx------ 3 root root 60 Feb 28 18:04 systemd-private-02cc97e523da4afcb30181ed9e61c661-haveged.service-TnBYDy
drwx------ 3 root root 60 Feb 28 18:04 systemd-private-02cc97e523da4afcb30181ed9e61c661-systemd-logind.service-zkqZHO
itconsult@ha-r02a:~$ ls -l /tmp
total 116
-rw-rw-r-- 1 root vyattacfg 109289 Feb 28 18:06 boot-config-trace
drwx------ 3 root root 60 Feb 28 18:06 systemd-private-02cc97e523da4afcb30181ed9e61c661-chrony.service-JIVOD7
drwx------ 3 root root 60 Feb 28 18:04 systemd-private-02cc97e523da4afcb30181ed9e61c661-haveged.service-iGGrke
drwx------ 3 root root 60 Feb 28 18:04 systemd-private-02cc97e523da4afcb30181ed9e61c661-systemd-logind.service-1KlorW
-rw-r--r-- 1 root vyattacfg 183 Feb 28 18:05 vyos-configd-script-stdout
-rw-rw-r-- 1 root vyattacfg 2 Feb 28 18:06 vyos-config-status
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ cat /tmp/boot-config/trace
cat: /tmp/boot-config/trace: No such file or directory
itconsult@ha-r02a:~$ cat /tmp/boot-config-trace
Traceback (most recent call last):
File "/usr/libexec/vyos/vyos-boot-config-loader.py", line 144, in <module>
commit_out = session.commit()
^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/vyos/configsession.py", line 187, in commit
out = self.__run_command([COMMIT])
^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/lib/python3/dist-packages/vyos/configsession.py", line 143, in __run_command
raise ConfigSessionError(output)
vyos.configsession.ConfigSessionError: Processing the Priority Queue
Entering the _commit_check_cfg_node
Executing the "system domain-name itconsult.net" ...
Elapsed 0.020 sec:
Executing the "system host-name ha-r02a" ...
Elapsed 0.005 sec:
Elapsed 0.025 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "system domain-name itconsult.net" ...
[ system domain-name itconsult.net ]
sudo: unable to resolve host ha-r02a: System error
Elapsed 2.789 sec:
Executing the "system host-name ha-r02a" ...
Elapsed 0.122 sec:
Elapsed 2.912 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "system time-zone GB" ...
Elapsed 0.524 sec:
Elapsed 0.524 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "system time-zone GB" ...
Elapsed 0.087 sec:
Elapsed 0.087 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Elapsed 0.000 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "policy" ...
Elapsed 1.797 sec:
Elapsed 1.797 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "policy route outviajt" ...
Elapsed 0.006 sec:
Executing the "policy route outviajt interface eth0.131" ...
Elapsed 0.012 sec:
Executing the "policy route outviajt rule 10" ...
Elapsed 0.011 sec:
Executing the "policy route outviajt rule 10 description Internal Traffic" ...
Elapsed 0.005 sec:
Executing the "policy route outviajt rule 10 set table main" ...
Elapsed 0.011 sec:
Executing the "policy route outviajt rule 20" ...
Elapsed 0.011 sec:
Executing the "policy route outviajt rule 20 description Out via JT" ...
Elapsed 0.005 sec:
Executing the "policy route outviajt rule 20 set table 1" ...
Elapsed 0.010 sec:
Executing the "policy route outviajt rule 30" ...
Elapsed 0.010 sec:
Executing the "policy route outviajt rule 30 description Normal Traffic" ...
Elapsed 0.005 sec:
Executing the "policy route outviajt rule 30 set table main" ...
Elapsed 0.010 sec:
Elapsed 0.103 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "policy route outviajt" ...
Elapsed 0.148 sec:
Elapsed 0.148 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "nat source rule 12" ...
Elapsed 0.011 sec:
Executing the "nat source rule 12 description vlan 12 - translate all" ...
Elapsed 0.006 sec:
Executing the "nat source rule 12 source address 10.193.134.0/28" ...
Elapsed 0.038 sec:
Executing the "nat source rule 12 translation address 193.201.42.188/32" ...
Elapsed 0.025 sec:
Executing the "nat source rule 141" ...
Elapsed 0.010 sec:
Executing the "nat source rule 141 description m84 outbound to internet" ...
Elapsed 0.005 sec:
Executing the "nat source rule 141 destination address !193.201.42.0/24" ...
Elapsed 0.028 sec:
Executing the "nat source rule 141 outbound-interface name eth0.20" ...
Elapsed 0.058 sec:
Executing the "nat source rule 141 source address 10.193.132.1/32" ...
Elapsed 0.032 sec:
Executing the "nat source rule 141 translation address masquerade" ...
Elapsed 0.024 sec:
Elapsed 0.241 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "nat" ...
Elapsed 0.449 sec:
Elapsed 0.449 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "interfaces loopback lo" ...
Elapsed 0.006 sec:
Executing the "interfaces loopback lo address 193.201.42.210/32" ...
Elapsed 0.018 sec:
Elapsed 0.024 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "interfaces loopback lo" ...
Elapsed 0.251 sec:
Elapsed 0.251 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "interfaces dummy dum1" ...
Elapsed 0.005 sec:
Executing the "interfaces dummy dum1 address 193.201.42.188/32" ...
Elapsed 0.013 sec:
Executing the "interfaces dummy dum1 description outbound from vlan 12" ...
Elapsed 0.005 sec:
Elapsed 0.025 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "interfaces dummy dum1" ...
Elapsed 0.209 sec:
Elapsed 0.209 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "interfaces ethernet eth0" ...
Elapsed 0.006 sec:
Executing the "interfaces ethernet eth0 duplex auto" ...
Elapsed 0.006 sec:
Executing the "interfaces ethernet eth0 hw-id 00:16:3e:40:5c:c5" ...
Elapsed 0.020 sec:
Executing the "interfaces ethernet eth0 speed auto" ...
Elapsed 0.006 sec:
Executing the "interfaces ethernet eth0 vif 10" ...
Elapsed 0.010 sec:
Executing the "interfaces ethernet eth0 vif 10 address 193.201.42.61/27" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 10 description Inside HA" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 12" ...
Elapsed 0.011 sec:
Executing the "interfaces ethernet eth0 vif 12 address 10.193.134.12/28" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 12 description MR - laptop etc" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 20" ...
Elapsed 0.010 sec:
Executing the "interfaces ethernet eth0 vif 20 address 193.201.42.171/28" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 20 description Backbone HA" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 130" ...
Elapsed 0.010 sec:
Executing the "interfaces ethernet eth0 vif 130 address 193.201.42.13/28" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 130 description HA Hosting" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 131" ...
Elapsed 0.010 sec:
Executing the "interfaces ethernet eth0 vif 131 address 212.9.23.5/29" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 131 description HA JT Hosting" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 140" ...
Elapsed 0.010 sec:
Executing the "interfaces ethernet eth0 vif 140 address 193.201.42.93/28" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 140 description Virtualisation/Storage" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 141" ...
Elapsed 0.009 sec:
Executing the "interfaces ethernet eth0 vif 141 address 10.193.132.251/24" ...
Elapsed 0.011 sec:
Executing the "interfaces ethernet eth0 vif 141 description Unifi Management" ...
Elapsed 0.005 sec:
Executing the "interfaces ethernet eth0 vif 262" ...
Elapsed 0.009 sec:
Executing the "interfaces ethernet eth0 vif 262 address 193.201.42.77/29" ...
Elapsed 0.012 sec:
Executing the "interfaces ethernet eth0 vif 262 description HA Email" ...
Elapsed 0.005 sec:
Elapsed 0.266 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "interfaces ethernet eth0" ...
Elapsed 1.855 sec:
Elapsed 1.855 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "firewall global-options all-ping enable" ...
Elapsed 0.005 sec:
Executing the "firewall global-options broadcast-ping disable" ...
Elapsed 0.005 sec:
Executing the "firewall global-options ipv6-receive-redirects disable" ...
Elapsed 0.005 sec:
Executing the "firewall global-options ipv6-src-route disable" ...
Elapsed 0.005 sec:
Executing the "firewall global-options ip-src-route disable" ...
Elapsed 0.004 sec:
Executing the "firewall global-options log-martians enable" ...
Elapsed 0.004 sec:
Executing the "firewall global-options receive-redirects disable" ...
Elapsed 0.005 sec:
Executing the "firewall global-options send-redirects enable" ...
Elapsed 0.005 sec:
Executing the "firewall global-options source-validation disable" ...
Elapsed 0.004 sec:
Executing the "firewall global-options syn-cookies enable" ...
Elapsed 0.004 sec:
Executing the "firewall global-options twa-hazards-protection disable" ...
Elapsed 0.005 sec:
Executing the "firewall group network-group internaladdresses" ...
Elapsed 0.004 sec:
Executing the "firewall group network-group internaladdresses network 193.201.42.0/24" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group internaladdresses network 212.9.23.0/29" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group internaladdresses network 213.133.203.24/29" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group internaladdresses network 213.167.69.64/29" ...
Elapsed 0.010 sec:
Executing the "firewall group network-group internaladdresses network 213.167.72.64/29" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group internaladdresses network 212.9.4.208/29" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall group network-group itconsult network 193.201.42.0/24" ...
Elapsed 0.012 sec:
Executing the "firewall group network-group itconsult network 10.193.134.0/24" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group outviajt" ...
Elapsed 0.005 sec:
Executing the "firewall group network-group outviajt network 212.9.23.0/29" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group smbtom86" ...
Elapsed 0.005 sec:
Executing the "firewall group network-group smbtom86 network 139.162.144.150/32" ...
Elapsed 0.011 sec:
Executing the "firewall group network-group smbtom86 network 212.9.29.81/32" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 forward filter default-action accept" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 5" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 forward filter rule 5 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 5 inbound-interface name eth0.10" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 forward filter rule 10" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 10 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 10 inbound-interface name eth0.12" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 forward filter rule 15" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 15 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 15 inbound-interface name eth0.130" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 forward filter rule 20" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 20 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 20 inbound-interface name eth0.131" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 25" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 25 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 25 inbound-interface name eth0.140" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 30" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 30 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 30 inbound-interface name eth0.141" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 35" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 35 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 35 inbound-interface name eth0.262" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 forward filter rule 40" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 40 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 40 outbound-interface name eth0.10" ...
Elapsed 0.060 sec:
Executing the "firewall ipv4 forward filter rule 45" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 45 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 45 outbound-interface name eth0.12" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 50" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 50 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 50 outbound-interface name eth0.130" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 forward filter rule 55" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 55 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 55 outbound-interface name eth0.131" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 60" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 60 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 60 outbound-interface name eth0.140" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 65" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 65 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 65 outbound-interface name eth0.141" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 forward filter rule 70" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 forward filter rule 70 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 forward filter rule 70 outbound-interface name eth0.262" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter default-action accept" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 5" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 input filter rule 5 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 5 inbound-interface name dum1" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter rule 10" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 10 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 10 inbound-interface name eth0.10" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter rule 15" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 15 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 15 inbound-interface name eth0.12" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter rule 20" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 20 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 20 inbound-interface name eth0.20" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter rule 25" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 25 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 25 inbound-interface name eth0.130" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 input filter rule 30" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 30 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 30 inbound-interface name eth0.131" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter rule 35" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 35 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 35 inbound-interface name eth0.140" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 input filter rule 40" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 input filter rule 40 action jump" ...
Elapsed 0.004 sec:
Executing the "firewall ipv4 input filter rule 40 inbound-interface name eth0.141" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 input filter rule 45" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 input filter rule 45 action jump" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 input filter rule 45 inbound-interface name eth0.262" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10 description TCP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10 destination address 193.201.42.0/24" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10 destination port domain,www,https,smtp,ldap,ldaps" ...
Elapsed 0.094 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10 protocol tcp" ...
Elapsed 0.059 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 10 source address 193.201.42.72/29" ...
Elapsed 0.035 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11 description UDP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11 destination address 193.201.42.0/24" ...
Elapsed 0.030 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11 destination port domain,ntp,syslog,ldap,ldaps" ...
Elapsed 0.082 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11 protocol udp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 11 source address 193.201.42.72/29" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 110" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 110 description Outgoing SMTP" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 110 destination port smtp" ...
Elapsed 0.083 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 110 protocol tcp" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 110 source address 193.201.42.72/29" ...
Elapsed 0.033 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 120" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 120 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 120 description Internet Browsing (normally disabled)" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 120 destination port www,https" ...
Elapsed 0.081 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 120 protocol tcp" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 120 source address 193.201.42.72/29" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 996" ...
Elapsed 0.013 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 996 protocol icmp" ...
Elapsed 0.060 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAEMAIL rule 999 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10 action return" ...
Elapsed 0.007 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10 description TCP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10 destination address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10 destination port domain,smtp,5667" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10 protocol tcp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 10 source address 193.201.42.0/28" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11 description UDP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11 destination address 193.201.42.0/24" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11 destination port domain,ntp,syslog" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11 protocol udp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 11 source address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 110" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 110 description Outgoing SMTP" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 110 destination port smtp" ...
Elapsed 0.091 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 110 protocol tcp" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 110 source address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 120" ...
Elapsed 0.013 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 120 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 120 description Outgoing DNS" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 120 destination port domain" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 120 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 120 source address 193.201.42.0/28" ...
Elapsed 0.034 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 121" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 121 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 121 description Outgoing DNS" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 121 destination port domain" ...
Elapsed 0.096 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 121 protocol tcp" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 121 source address 193.201.42.0/28" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 130" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 130 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 130 description Internet Browsing (normally disabled)" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 130 destination port www,https" ...
Elapsed 0.085 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 130 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 130 source address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 140" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 140 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 140 description m64 outgoing re Cattools" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 140 destination port telnet,ssh,445" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 140 protocol tcp" ...
Elapsed 0.066 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 140 source address 193.201.42.10/32" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 141" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 141 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 141 description m71 ssh" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 141 destination port ssh" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 141 protocol tcp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 141 source address 193.201.42.7/32" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 996" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 996 protocol icmp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAHOSTING rule 999 protocol all" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10 description TCP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10 destination address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10 destination port domain,www,https,smtp" ...
Elapsed 0.084 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 10 source address 212.9.23.0/29" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11 description UDP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11 destination address 193.201.42.0/24" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11 destination port domain,ntp,syslog,ldap,ldaps" ...
Elapsed 0.080 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 11 source address 212.9.23.0/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 110" ...
Elapsed 0.012 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 110 description Outgoing SMTP from m81" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 110 destination port smtp" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 110 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 110 source address 212.9.23.2/32" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 120" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 120 action return" ...
Elapsed 0.007 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 120 description Internet Browsing (normally disabled)" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 120 destination port www,https" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 120 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 120 source address 212.9.23.0/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 130" ...
Elapsed 0.012 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 130 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 130 description TEMP Outgoing Kali (normally disabled)" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 130 source address 212.9.23.3/32" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 996" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 996 action return" ...
Elapsed 0.004 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 996 description ICMP throughout" ...
Elapsed 0.004 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 996 protocol icmp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAJTHOSTING rule 999 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI default-action drop" ...
Elapsed 0.017 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10" ...
Elapsed 0.015 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10 description TCP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10 destination address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10 destination port domain,smtp" ...
Elapsed 0.083 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 10 source address 10.193.132.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11 description UDP to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11 destination address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11 destination port domain,ntp,syslog" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 11 source address 10.193.132.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 120" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 120 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 120 description Internet Browsing (normally disabled)" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 120 destination port www,https" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 120 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 120 source address 10.193.132.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 996" ...
Elapsed 0.014 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 996 protocol icmp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAUNIFI rule 999 protocol all" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAVIRT" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 10 description All traffic to itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 10 destination address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 10 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 10 source address 193.201.42.80/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 11 description All traffic to itconsult - vlan 121" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 11 destination address 212.9.4.208/29" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 11 protocol all" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 11 source address 193.201.42.80/28" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 20" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 20 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 20 description NTP" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 20 destination port ntp" ...
Elapsed 0.080 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 20 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 20 source address 193.201.42.80/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 30" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 30 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 30 description Browsing" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 30 destination port www,https" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 30 protocol tcp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 30 source address 193.201.42.80/28" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 996" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 996 protocol icmp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 997 description Firewall return traffic" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 999" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 999 description Block" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-HAVIRT rule 999 protocol all" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-INSIDEH" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 11" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 11 description Allow printer l01 only to local" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 11 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 11 source address 193.201.42.37/32" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 12" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 12 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 12 description Deny printer l01 to Internet" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 12 protocol all" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 12 source address 193.201.42.37/32" ...
Elapsed 0.034 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 101" ...
Elapsed 0.012 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 101 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 101 description All outgoing" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 101 protocol all" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 101 source address 193.201.42.0/26" ...
Elapsed 0.034 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 102" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 102 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 102 description All outgoing from JT subnet" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 102 protocol all" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 102 source address 212.9.23.0/29" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 991" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 991 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 991 description Reject broadcast without logging" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 991 destination address 212.9.16.7" ...
Elapsed 0.037 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 991 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 998" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 998 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 998 description Reject broadcast without logging" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 998 destination address 193.201.42.127" ...
Elapsed 0.037 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 998 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 999" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-INSIDEH rule 999 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-MR" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR default-action drop" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-MR rule 10" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-MR rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 10 description All Outgoing" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 10 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-MR rule 10 source address 10.193.134.0/24" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name FROM-MR rule 996" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name FROM-MR rule 996 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name FROM-MR rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 996 protocol icmp" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name FROM-MR rule 997" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-MR rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 999" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name FROM-MR rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name FROM-MR rule 999 protocol all" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAEMAIL" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10 action return" ...
Elapsed 0.007 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10 description TCP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10 destination address 193.201.42.72/29" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10 destination port ssh,smtp,pop3,imap,imaps,submission" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 10 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11 description UDP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11 destination address 193.201.42.72/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11 destination port snmp" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 11 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 110" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 110 description SMTP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 110 destination address 193.201.42.72/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 110 destination port smtp" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 110 protocol tcp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 996" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 996 protocol icmp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAEMAIL rule 999 protocol all" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name TO-HAHOSTING" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10 description TCP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10 destination address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10 destination port ssh,3389,5666,pop3,445,8001,8000" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 10 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11 description UDP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11 destination address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11 destination port snmp" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 11 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 110" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 110 description SMTP/DNS" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 110 destination address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 110 destination port smtp,domain" ...
Elapsed 0.080 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 110 protocol tcp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 120" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 120 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 120 description DNS" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 120 destination address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 120 destination port domain" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 120 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 130" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 130 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 130 description SYSLOG & SMNP Trap to m63" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 130 destination address 193.201.42.2/32" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 130 destination port syslog,162" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 130 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140 description ssh from m70" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140 destination address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140 destination port ssh" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 140 source address 139.162.144.150/32" ...
Elapsed 0.030 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141 description ssh from m72" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141 destination address 193.201.42.0/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141 destination port ssh" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 141 source address 45.63.34.123/32" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 142" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 142 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 142 description ssh to m71" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 142 destination address 193.201.42.7/32" ...
Elapsed 0.030 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 142 destination port ssh" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 142 protocol tcp" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 996" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 996 protocol icmp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAHOSTING rule 999 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10 description TCP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10 destination address 212.9.23.0/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10 destination port ssh,smtp,9392,https" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 10 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11 description UDP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11 destination address 212.9.23.0/29" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11 destination port snmp" ...
Elapsed 0.085 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 11 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 110" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 110 description SMTP to m81" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 110 destination address 212.9.23.2/32" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 110 destination port smtp" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 110 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 996" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 996 protocol icmp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAJTHOSTING rule 999 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAUNIFI" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10 description TCP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10 destination address 10.193.132.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10 destination port ssh,8443" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 10 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11 description UDP from itconsult" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11 destination address 10.193.132.0/24" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11 destination port snmp" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 11 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 996" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 996 protocol icmp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAUNIFI rule 999 protocol all" ...
Elapsed 0.055 sec:
Executing the "firewall ipv4 name TO-HAVIRT" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 3" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 3 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 3 description Allow local ha-h02" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 3 destination address 193.201.42.85/32" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 3 source address 193.201.42.0/24" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5 description Allow local NTP" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5 destination address 193.201.42.80/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5 destination port ntp" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 5 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6 description Allow local NTP - vlan 131" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6 destination address 193.201.42.80/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6 destination port ntp" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 6 source address 212.9.23.0/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7 description Allow local NTP - vlan 141" ...
Elapsed 0.004 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7 destination address 193.201.42.80/28" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7 destination port ntp" ...
Elapsed 0.077 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 7 source address 10.193.132.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 10 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 10 description Disallow Bassspeaker" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 10 destination address 193.201.42.80/28" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 10 source address 193.201.42.216/29" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 20" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 20 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 20 description Disallow Guides" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 20 destination address 193.201.42.80/28" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 20 source address 193.201.42.120/29" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 30" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 30 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 30 description Disallow Merula" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 30 destination address 193.201.42.80/28" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 30 source address 193.201.42.192/29" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 40" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 40 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 40 description Disallow Island Networks" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 40 destination address 193.201.42.80/28" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 40 source address 193.201.42.176/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 100" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 100 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 100 description Allow all local traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 100 destination address 193.201.42.80/28" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 100 source address 193.201.42.0/24" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 110" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 110 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 110 description Allow all m70" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 110 destination address 193.201.42.80/28" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 110 source address 139.162.144.150/32" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 996" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 996 protocol icmp" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 997" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-HAVIRT rule 999 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-INSIDEH" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 1" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 1 action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 1 description Drop attack traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 1 source address 202.104.102.94/32" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 10 description Allow all local traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 10 destination address 193.201.42.0/26" ...
Elapsed 0.028 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 20" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 20 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 20 description Allow all local traffic to JT subnet" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 20 destination address 193.201.42.0/26" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 20 source address 212.9.23.0/29" ...
Elapsed 0.029 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 30" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 30 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 30 description Permitted TCP traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 30 destination address 193.201.42.0/26" ...
Elapsed 0.030 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 30 destination port domain,smtp,pop3,submission,www,https,imap2,8000" ...
Elapsed 0.079 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 30 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 40" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 40 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 40 description Permitted UDP traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 40 destination address 193.201.42.0/26" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 40 destination port domain" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 40 protocol udp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 50" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 50 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 50 description Permitted TCP traffic to JT subnet" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 50 destination address 212.9.23.0/29" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 50 destination port domain,smtp" ...
Elapsed 0.083 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 50 protocol tcp" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 60" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 60 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 60 description Permitted UDP traffic to JT subnet" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 60 destination address 212.9.23.0/29" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 60 destination port domain" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 60 protocol udp" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 70" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 70 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 70 description Syslog & SNMP Trap" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 70 destination address 193.201.42.2/32" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 70 destination port syslog,162" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 70 protocol udp" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 90" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 90 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 90 description FTP to ftp" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 90 destination address 193.201.42.20/32" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 90 destination port ftp" ...
Elapsed 0.079 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 90 protocol tcp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 100" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 100 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 100 description HTTPS to m73" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 100 destination address 193.201.42.34/32" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 100 destination port https" ...
Elapsed 0.087 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 100 protocol tcp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 120" ...
Elapsed 0.012 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 120 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 120 description NSCA to m40" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 120 destination address 193.201.42.46/32" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 120 destination port 5667" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 120 protocol tcp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 210" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 210 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 210 description IPSEC" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 210 destination address 193.201.42.0/26" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 210 destination port 500,4500" ...
Elapsed 0.084 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 210 protocol udp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 220" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 220 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 220 description IPSEC" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 220 destination address 193.201.42.0/26" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 220 protocol esp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230 description m70 ssh" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230 destination address 193.201.42.0/26" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230 destination port ssh" ...
Elapsed 0.079 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230 protocol tcp" ...
Elapsed 0.054 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 230 source address 139.162.144.150/32" ...
Elapsed 0.033 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231 description m72 ssh" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231 destination address 193.201.42.0/26" ...
Elapsed 0.033 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231 destination port ssh" ...
Elapsed 0.088 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231 protocol tcp" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 231 source address 45.63.34.123/32" ...
Elapsed 0.033 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 240" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 240 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 240 description external smb to m86" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 240 destination address 193.201.42.48/32" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 240 destination port 445" ...
Elapsed 0.082 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 240 protocol tcp" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 302" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 302 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 302 description m56 ssh (temporary)" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 302 destination address 193.201.42.36/32" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 302 destination port ssh" ...
Elapsed 0.086 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 302 protocol tcp" ...
Elapsed 0.058 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 303" ...
Elapsed 0.012 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 303 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 303 description imaps to et11 (temporary)" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 303 destination address 193.201.42.35/32" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 303 destination port 993" ...
Elapsed 0.084 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 303 protocol tcp" ...
Elapsed 0.058 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 304" ...
Elapsed 0.012 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 304 action return" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 304 description vlan99 to lt01 (temporary)" ...
Elapsed 0.006 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 304 destination address 193.201.42.34/32" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 304 source address 192.168.99.0/24" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 981" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 981 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 981 description Block IDENT without logging" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 981 destination port auth" ...
Elapsed 0.078 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 981 protocol tcp" ...
Elapsed 0.057 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 996" ...
Elapsed 0.011 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 996 description ICMP throughout" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 996 protocol icmp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-INSIDEH rule 999 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-MR" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 996" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-MR rule 996 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 996 description ICMP throughout" ...
Elapsed 0.004 sec:
Executing the "firewall ipv4 name TO-MR rule 996 protocol icmp" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-MR rule 997" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-MR rule 997 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 997 description Firewall return traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 997 state established" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 997 state related" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 999" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-MR rule 999 action reject" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 999 description Block" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-MR rule 999 protocol all" ...
Elapsed 0.053 sec:
Executing the "firewall ipv4 name TO-ROUTER" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER default-action drop" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 10" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 10 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 10 description All Local Traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 10 protocol all" ...
Elapsed 0.052 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 10 source address 193.201.42.0/24" ...
Elapsed 0.031 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 20" ...
Elapsed 0.009 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 20 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 20 description All Local Foreshore Traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 20 protocol all" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 20 source address 213.167.95.24/29" ...
Elapsed 0.032 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 30" ...
Elapsed 0.010 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 30 action return" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 30 description All Local Newtel Traffic" ...
Elapsed 0.005 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 30 protocol all" ...
Elapsed 0.056 sec:
Executing the "firewall ipv4 name TO-ROUTER rule 30 source address 213.133.203.24/28" ...
[ firewall ipv4 name TO-ROUTER rule 30 source address 213.133.203.24/28 ]
Error: 213.133.203.24/28 is not a valid IPv4 address range
Error: 213.133.203.24/28 is not a valid IPv4 prefix
Error: 213.133.203.24/28 is not a valid IPv4 address
[ firewall ipv4 name TO-ROUTER rule 30 source address 213.133.203.24/28 ]
Invalid value
Elapsed 0.037 sec:
Elapsed 17.818 sec: _commit_check_cfg_node
[[firewall]] failed
Entering the _commit_check_cfg_node
Executing the "system syslog global facility all" ...
Elapsed 0.005 sec:
Executing the "system syslog global facility all level debug" ...
Elapsed 0.005 sec:
Executing the "system syslog global facility local7" ...
Elapsed 0.005 sec:
Executing the "system syslog global facility local7 level debug" ...
Elapsed 0.005 sec:
Executing the "system syslog host 193.201.42.2" ...
Elapsed 0.013 sec:
Executing the "system syslog host 193.201.42.2 facility all" ...
Elapsed 0.005 sec:
Executing the "system syslog host 193.201.42.2 facility all level debug" ...
Elapsed 0.005 sec:
Elapsed 0.047 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "system syslog" ...
Elapsed 1.000 sec:
Elapsed 1.000 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "system config-management commit-revisions 20" ...
Elapsed 0.010 sec:
Elapsed 0.010 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "system config-management" ...
Elapsed 0.025 sec:
Elapsed 0.025 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "system name-server 193.201.42.9" ...
Elapsed 0.016 sec:
Executing the "system name-server 193.201.42.130" ...
Elapsed 0.018 sec:
Elapsed 0.035 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "system name-server 193.201.42.9" ...
Elapsed 0.125 sec:
Executing the "system name-server 193.201.42.130" ...
Elapsed 0.124 sec:
Executing the "system name-server 193.201.42.9" ...
Elapsed 0.130 sec:
Executing the "system name-server 193.201.42.130" ...
Elapsed 0.127 sec:
Elapsed 0.508 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "system login user itconsult" ...
Elapsed 0.006 sec:
Executing the "system login user itconsult authentication encrypted-password [redacted]" ...
Elapsed 0.005 sec:
Elapsed 0.012 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "system login banner" ...
Elapsed 0.024 sec:
Executing the "system login" ...
Elapsed 4.349 sec:
Elapsed 4.374 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "protocols static route 0.0.0.0/0" ...
Elapsed 0.013 sec:
Executing the "protocols static route 0.0.0.0/0 next-hop 193.201.42.170" ...
Elapsed 0.012 sec:
Executing the "protocols static route 0.0.0.0/0 next-hop 193.201.42.170 distance 130" ...
Elapsed 0.010 sec:
Executing the "protocols static route 10.99.98.1/32" ...
Elapsed 0.012 sec:
Executing the "protocols static route 10.99.98.1/32 next-hop 193.201.42.165" ...
Elapsed 0.012 sec:
Executing the "protocols static route 192.168.151.0/24" ...
Elapsed 0.012 sec:
Executing the "protocols static route 192.168.151.0/24 next-hop 193.201.42.166" ...
Elapsed 0.012 sec:
Executing the "protocols static route 192.168.151.1/32" ...
Elapsed 0.012 sec:
Executing the "protocols static route 192.168.151.1/32 next-hop 193.201.42.166" ...
Elapsed 0.012 sec:
Executing the "protocols static table 1" ...
Elapsed 0.010 sec:
Executing the "protocols static table 1 route 0.0.0.0/0" ...
Elapsed 0.012 sec:
Executing the "protocols static table 1 route 0.0.0.0/0 next-hop 193.201.42.168" ...
Elapsed 0.012 sec:
Elapsed 0.148 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "protocols static" ...
Elapsed 1.099 sec:
Elapsed 1.099 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "protocols ospf area 0" ...
Elapsed 0.013 sec:
Executing the "protocols ospf area 0 network 193.201.42.160/28" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 193.201.42.210/32" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 193.201.42.80/28" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 193.201.42.32/27" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 193.201.42.0/28" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 193.201.42.72/29" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 212.9.23.0/29" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 10.193.132.0/24" ...
Elapsed 0.012 sec:
Executing the "protocols ospf area 0 network 193.201.42.188/32" ...
Elapsed 0.012 sec:
Executing the "protocols ospf interface dum1" ...
Elapsed 0.010 sec:
Executing the "protocols ospf interface eth0.10" ...
Elapsed 0.010 sec:
Executing the "protocols ospf interface eth0.10 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.10 dead-interval 40" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.10 hello-interval 10" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.10 priority 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.10 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.10 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.12" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.20" ...
Elapsed 0.010 sec:
Executing the "protocols ospf interface eth0.20 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.20 dead-interval 4" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.20 hello-interval 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.20 priority 110" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.20 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.20 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130 dead-interval 40" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130 hello-interval 10" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130 priority 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.130 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131 dead-interval 40" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131 hello-interval 10" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131 priority 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.131 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.140" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.140 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.140 dead-interval 40" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.140 hello-interval 10" ...
Elapsed 0.010 sec:
Executing the "protocols ospf interface eth0.140 priority 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.140 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.140 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.141" ...
Elapsed 0.012 sec:
Executing the "protocols ospf interface eth0.141 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.141 dead-interval 40" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.141 hello-interval 10" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.141 priority 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.141 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.141 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.150" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.160" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.170" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262 cost 20" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262 dead-interval 40" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262 hello-interval 10" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262 priority 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262 retransmit-interval 5" ...
Elapsed 0.009 sec:
Executing the "protocols ospf interface eth0.262 transmit-delay 1" ...
Elapsed 0.009 sec:
Executing the "protocols ospf passive-interface default" ...
Elapsed 0.005 sec:
Executing the "protocols ospf redistribute static metric-type 2" ...
Elapsed 0.009 sec:
Elapsed 0.669 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "protocols ospf" ...
Elapsed 0.028 sec:
Elapsed 0.028 sec: _commit_exec_cfg_node
[[protocols ospf]] failed
Entering the _commit_check_cfg_node
Executing the "high-availability vrrp group eth0.10-10 address 193.201.42.62/27" ...
Elapsed 0.019 sec:
Executing the "high-availability vrrp group eth0.10-10 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.10-10 interface eth0.10" ...
Elapsed 0.010 sec:
Executing the "high-availability vrrp group eth0.10-10 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.10-10 vrid 10" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.12-12 address 10.193.134.14/28" ...
Elapsed 0.017 sec:
Executing the "high-availability vrrp group eth0.12-12 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.12-12 interface eth0.12" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.12-12 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.12-12 vrid 12" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.130-130 address 193.201.42.14/28" ...
Elapsed 0.017 sec:
Executing the "high-availability vrrp group eth0.130-130 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.130-130 interface eth0.130" ...
Elapsed 0.010 sec:
Executing the "high-availability vrrp group eth0.130-130 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.130-130 vrid 130" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.131-131 address 212.9.23.6/29" ...
Elapsed 0.017 sec:
Executing the "high-availability vrrp group eth0.131-131 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.131-131 interface eth0.131" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.131-131 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.131-131 vrid 131" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.140-140 address 193.201.42.94/28" ...
Elapsed 0.022 sec:
Executing the "high-availability vrrp group eth0.140-140 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.140-140 interface eth0.140" ...
Elapsed 0.010 sec:
Executing the "high-availability vrrp group eth0.140-140 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.140-140 vrid 140" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.141-141 address 10.193.132.254/24" ...
Elapsed 0.017 sec:
Executing the "high-availability vrrp group eth0.141-141 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.141-141 interface eth0.141" ...
Elapsed 0.012 sec:
Executing the "high-availability vrrp group eth0.141-141 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.141-141 vrid 141" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.262-262 address 193.201.42.78/29" ...
Elapsed 0.017 sec:
Executing the "high-availability vrrp group eth0.262-262 advertise-interval 1" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.262-262 interface eth0.262" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.262-262 priority 150" ...
Elapsed 0.009 sec:
Executing the "high-availability vrrp group eth0.262-262 vrid 62" ...
Elapsed 0.009 sec:
Elapsed 0.404 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "high-availability" ...
Elapsed 0.999 sec:
Elapsed 0.999 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "service snmp community [redacted]" ...
Elapsed 0.005 sec:
Executing the "service snmp community [redacted] authorization ro" ...
Elapsed 0.005 sec:
Executing the "service snmp community [redacted] network 193.201.42.0/24" ...
Elapsed 0.019 sec:
Elapsed 0.029 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "service snmp" ...
Elapsed 5.068 sec:
Elapsed 5.068 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "service ntp allow-client address 0.0.0.0/0" ...
Elapsed 0.014 sec:
Executing the "service ntp allow-client address ::/0" ...
Elapsed 0.013 sec:
Executing the "service ntp server 193.201.42.81" ...
Elapsed 0.015 sec:
Executing the "service ntp server 193.201.42.87" ...
Elapsed 0.014 sec:
Executing the "service ntp server 193.201.42.97" ...
Elapsed 0.014 sec:
Executing the "service ntp server 193.201.42.103" ...
Elapsed 0.014 sec:
Elapsed 0.087 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "service ntp" ...
Elapsed 1.297 sec:
Elapsed 1.297 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "service dhcp-server shared-network-name vlan10" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 default-router 193.201.42.62" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 lease 10800" ...
Elapsed 0.009 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 name-server 193.201.42.9" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 name-server 193.201.42.130" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 range 0" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 range 0 start 193.201.42.38" ...
Elapsed 0.012 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 range 0 stop 193.201.42.39" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 static-mapping m53" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 static-mapping m53 ip-address 193.201.42.43" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 static-mapping m53 mac-address B8:6B:23:D9:91:79" ...
Elapsed 0.013 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 static-mapping m57" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 static-mapping m57 ip-address 193.201.42.44" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan10 subnet 193.201.42.32/27 static-mapping m57 mac-address B8:6B:23:3A:1A:83" ...
Elapsed 0.013 sec:
Executing the "service dhcp-server shared-network-name vlan12" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 default-router 10.193.134.14" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 lease 10800" ...
Elapsed 0.009 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 name-server 193.201.42.9" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 name-server 193.201.42.130" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 range 0" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 range 0 start 10.193.134.2" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 range 0 stop 10.193.134.7" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 static-mapping m88" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 static-mapping m88 ip-address 10.193.134.1" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan12 subnet 10.193.134.0/28 static-mapping m88 mac-address 88:d8:2e:69:35:ac" ...
Elapsed 0.013 sec:
Executing the "service dhcp-server shared-network-name vlan141" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 default-router 10.193.132.254" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 lease 10800" ...
Elapsed 0.009 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 name-server 193.201.42.9" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 name-server 193.201.42.130" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 range 0" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 range 0 start 10.193.132.111" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 range 0 stop 10.193.132.119" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 static-mapping ha-w01" ...
Elapsed 0.005 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 static-mapping ha-w01 ip-address 10.193.132.11" ...
Elapsed 0.011 sec:
Executing the "service dhcp-server shared-network-name vlan141 subnet 10.193.132.0/24 static-mapping ha-w01 mac-address 74:ac:b9:18:c4:d9" ...
Elapsed 0.012 sec:
Elapsed 0.384 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "service dhcp-server" ...
Elapsed 1.200 sec:
Elapsed 1.200 sec: _commit_exec_cfg_node
Entering the _commit_check_cfg_node
Executing the "service ssh port 22" ...
Elapsed 0.011 sec:
Elapsed 0.011 sec: _commit_check_cfg_node
Entering the _commit_exec_cfg_node
Executing the "service ssh" ...
Elapsed 1.130 sec:
Elapsed 1.130 sec: _commit_exec_cfg_node
Elapsed 45.323 sec: Commit execute priority tree
Commit failed
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$
itconsult@ha-r02a:~$ sh conf c | strip-private
set high-availability vrrp group eth0.10-10 address xxx.xxx.42.62/27
set high-availability vrrp group eth0.10-10 advertise-interval '1'
set high-availability vrrp group eth0.10-10 interface 'eth0.10'
set high-availability vrrp group eth0.10-10 priority '150'
set high-availability vrrp group eth0.10-10 vrid '10'
set high-availability vrrp group eth0.12-12 address xxx.xxx.134.14/28
set high-availability vrrp group eth0.12-12 advertise-interval '1'
set high-availability vrrp group eth0.12-12 interface 'eth0.12'
set high-availability vrrp group eth0.12-12 priority '150'
set high-availability vrrp group eth0.12-12 vrid '12'
set high-availability vrrp group eth0.130-130 address xxx.xxx.42.14/28
set high-availability vrrp group eth0.130-130 advertise-interval '1'
set high-availability vrrp group eth0.130-130 interface 'eth0.130'
set high-availability vrrp group eth0.130-130 priority '150'
set high-availability vrrp group eth0.130-130 vrid '130'
set high-availability vrrp group eth0.131-131 address xxx.xxx.23.6/29
set high-availability vrrp group eth0.131-131 advertise-interval '1'
set high-availability vrrp group eth0.131-131 interface 'eth0.131'
set high-availability vrrp group eth0.131-131 priority '150'
set high-availability vrrp group eth0.131-131 vrid '131'
set high-availability vrrp group eth0.140-140 address xxx.xxx.42.94/28
set high-availability vrrp group eth0.140-140 advertise-interval '1'
set high-availability vrrp group eth0.140-140 interface 'eth0.140'
set high-availability vrrp group eth0.140-140 priority '150'
set high-availability vrrp group eth0.140-140 vrid '140'
set high-availability vrrp group eth0.141-141 address xxx.xxx.132.254/24
set high-availability vrrp group eth0.141-141 advertise-interval '1'
set high-availability vrrp group eth0.141-141 interface 'eth0.141'
set high-availability vrrp group eth0.141-141 priority '150'
set high-availability vrrp group eth0.141-141 vrid '141'
set high-availability vrrp group eth0.262-262 address xxx.xxx.42.78/29
set high-availability vrrp group eth0.262-262 advertise-interval '1'
set high-availability vrrp group eth0.262-262 interface 'eth0.262'
set high-availability vrrp group eth0.262-262 priority '150'
set high-availability vrrp group eth0.262-262 vrid '62'
set interfaces dummy dum1 address 'xxx.xxx.42.188/32'
set interfaces dummy dum1 description 'outbound from vlan 12'
set interfaces ethernet eth0 duplex 'auto'
set interfaces ethernet eth0 hw-id 'xx:xx:xx:xx:xx:c5'
set interfaces ethernet eth0 offload gro
set interfaces ethernet eth0 offload gso
set interfaces ethernet eth0 offload sg
set interfaces ethernet eth0 offload tso
set interfaces ethernet eth0 speed 'auto'
set interfaces ethernet eth0 vif 10 address 'xxx.xxx.42.61/27'
set interfaces ethernet eth0 vif 10 description 'Inside HA'
set interfaces ethernet eth0 vif 10 disable
set interfaces ethernet eth0 vif 12 address 'xxx.xxx.134.12/28'
set interfaces ethernet eth0 vif 12 description 'MR - laptop etc'
set interfaces ethernet eth0 vif 12 disable
set interfaces ethernet eth0 vif 20 address 'xxx.xxx.42.171/28'
set interfaces ethernet eth0 vif 20 description 'Backbone HA'
set interfaces ethernet eth0 vif 130 address 'xxx.xxx.42.13/28'
set interfaces ethernet eth0 vif 130 description 'HA Hosting'
set interfaces ethernet eth0 vif 130 disable
set interfaces ethernet eth0 vif 131 address 'xxx.xxx.23.5/29'
set interfaces ethernet eth0 vif 131 description 'HA JT Hosting'
set interfaces ethernet eth0 vif 131 disable
set interfaces ethernet eth0 vif 140 address 'xxx.xxx.42.93/28'
set interfaces ethernet eth0 vif 140 description 'Virtualisation/Storage'
set interfaces ethernet eth0 vif 140 disable
set interfaces ethernet eth0 vif 141 address 'xxx.xxx.132.251/24'
set interfaces ethernet eth0 vif 141 description 'Unifi Management'
set interfaces ethernet eth0 vif 141 disable
set interfaces ethernet eth0 vif 262 address 'xxx.xxx.42.77/29'
set interfaces ethernet eth0 vif 262 description 'HA Email'
set interfaces ethernet eth0 vif 262 disable
set interfaces loopback lo address 'xxx.xxx.42.210/32'
set interfaces loopback lo ip
set nat source rule 12 description 'vlan 12 - translate all'
set nat source rule 12 source address 'xxx.xxx.134.0/28'
set nat source rule 12 translation address 'xxx.xxx.42.188/32'
set nat source rule 141 description 'm84 outbound to internet'
set nat source rule 141 destination address '!xxx.xxx.42.0/24'
set nat source rule 141 outbound-interface name 'eth0.20'
set nat source rule 141 source address 'xxx.xxx.132.1/32'
set nat source rule 141 translation address 'masquerade'
set policy route outviajt interface 'eth0.131'
set policy route outviajt rule 10 description 'Internal Traffic'
set policy route outviajt rule 10 destination group network-group 'internaladdresses'
set policy route outviajt rule 10 set table 'main'
set policy route outviajt rule 10 source group network-group 'outviajt'
set policy route outviajt rule 20 description 'Out via JT'
set policy route outviajt rule 20 set table '1'
set policy route outviajt rule 20 source group network-group 'outviajt'
set policy route outviajt rule 30 description 'Normal Traffic'
set policy route outviajt rule 30 set table 'main'
set protocols static route xxx.xxx.0.0/0 next-hop xxx.xxx.42.170 distance '130'
set protocols static route xxx.xxx.98.1/32 next-hop xxx.xxx.42.165
set protocols static route xxx.xxx.151.0/24 next-hop xxx.xxx.42.166
set protocols static route xxx.xxx.151.1/32 next-hop xxx.xxx.42.166
set protocols static table 1 route xxx.xxx.0.0/0 next-hop xxx.xxx.42.168
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 default-router 'xxx.xxx.42.62'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 lease '10800'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 name-server 'xxx.xxx.42.9'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 name-server 'xxx.xxx.42.130'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 range 0 start 'xxx.xxx.42.38'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 range 0 stop 'xxx.xxx.42.39'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx ip-address 'xxx.xxx.42.43'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:79'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx ip-address 'xxx.xxx.42.44'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.42.32/27 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:83'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 default-router 'xxx.xxx.134.14'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 lease '10800'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 name-server 'xxx.xxx.42.9'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 name-server 'xxx.xxx.42.130'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 range 0 start 'xxx.xxx.134.2'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 range 0 stop 'xxx.xxx.134.7'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 static-mapping xxxxxx ip-address 'xxx.xxx.134.1'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.134.0/28 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:ac'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 default-router 'xxx.xxx.132.254'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 lease '10800'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 name-server 'xxx.xxx.42.9'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 name-server 'xxx.xxx.42.130'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 range 0 start 'xxx.xxx.132.111'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 range 0 stop 'xxx.xxx.132.119'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 static-mapping xxxxxx ip-address 'xxx.xxx.132.11'
set service dhcp-server shared-network-name xxxxxx subnet xxx.xxx.132.0/24 static-mapping xxxxxx mac-address 'xx:xx:xx:xx:xx:d9'
set service ntp allow-client xxxxxx 'xxx.xxx.0.0/0'
set service ntp allow-client xxxxxx '::/0'
set service ntp server xxxxx.tld
set service ntp server xxxxx.tld
set service ntp server xxxxx.tld
set service ntp server xxxxx.tld
set service snmp community [redacted] authorization 'ro'
set service snmp community [redacted] network 'xxx.xxx.42.0/24'
set service ssh port '22'
set system config-management commit-revisions '20'
set system domain-name xxxxxx
set system host-name xxxxxx
set system login banner post-login ''
set system login banner pre-login ''
set system login user xxxxxx authentication encrypted-password xxxxxx
set system login user xxxxxx authentication plaintext-password xxxxxx
set system name-server 'xxx.xxx.42.9'
set system name-server 'xxx.xxx.42.130'
set system syslog global facility all level 'debug'
set system syslog global facility local7 level 'debug'
set system syslog host xxx.xxx.42.2 facility all level 'debug'
set system time-zone 'GB'
itconsult@ha-r02a:~$

File Metadata

Mime Type
text/plain
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
431861
Default Alt Text
240228-ha-r02a-failed.txt (175 KB)

Event Timeline