#TMSH-VERSION: 16.1.2.2 cli admin-partitions { update-partition Common } apm ephemeral-auth ssh-security-config /Common/ssh-security-config { ciphers { 1 { cipher-name aes256-ctr } 2 { cipher-name aes192-ctr } 3 { cipher-name aes128-ctr } } compressions { 1 { compression-name none } } hmacs { 1 { hmac-name hmac-sha2-512 } 2 { hmac-name hmac-sha2-256 } } kex-methods { 1 { kex-method-name diffie-hellman-group-exchange-sha256 } } } apm oauth db-instance /Common/oauthdb { description "Default OAuth DB." } apm policy customization-source /Common/modern { } apm policy customization-source /Common/standard { } apm report default-report { report-name sessionReports/sessionSummary user /Common/admin } auth partition Cli_Part { default-route-domain 10 } auth radius /Common/system-auth { servers { /Common/system_auth_name1 /Common/system_auth_name2 } } auth remote-user { default-partition Common } auth source { fallback true type radius } auth user admin { description "Admin User" partition-access { all-partitions { role admin } } session-limit -1 shell none } auth user f5hubblelcdadmin { description f5hubblelcdadmin partition-access { all-partitions { role admin } } session-limit -1 shell none } auth user root { description root session-limit -1 shell bash } cm cert /Common/dtca-bundle.crt { cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca-bundle.crt_61408_2 certificate-text "-----BEGIN CERTIFICATE----- MIIDnzCCAoegAwIBAgIDDfTiMA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTI2Zj YTBiNDE1LWM2NjAtNDMyZC1iM2I2ODI4NGM3ZTM0ZjMyMB4XDTIxMTEyMjExNDc0 MFoXDTMxMTEyMDExNDc0MFowLjEsMCoGA1UEAxMjZmNhMGI0MTUtYzY2MC00MzJk LWIzYjY4Mjg0YzdlMzRmMzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDiVQvBhpBaX/jHrl12+EDqP9gffV7kD17vPSQ67SMJ9WLGmI6TtUWD04Cb/87W BJyeeee3Qo9hii5sGKnnFJYC+bAiQadXMeAOBkn9ZrtjfTM5FTM8STpPA919vTS5 59XQvfvEI8i2yQWCqdG0fzWbAgMBAAGjgcUwgcIwJgYDVR0RBB8wHYIbbWFiYV9m NV9nZW5lcmFsaS5hY2Vucy5wcml2MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ BAQDAgG2MB0GA1UdDgQWBBQ+syV1LEoJNpgop7OOoPEqzc7PUTBYBgNVHSMEUTBP gBQ+syV1LEoJNpgop7OOoPEqzc7PUaEypDAwLjEsMCoGA1UEAxMjZmNhMGI0MTUt YzY2MC00MzJkLWIzYjY4Mjg0YzdlMzRmMzKCAw304jANBgkqhkiG9w0BAQUFAAOC AQEAUJL5NiIpWr637uVKkczGEuwGVaxEqebLPh7/eu9NyPqwZYilMen9knFgakI+ 58MBzJbLjFCNuinTyfTQbhkN2aTUTbrMIWtUGJhvkP2nsms3EcYCqeZkB8fu7GXN GtK80LFFUbR9IOX98S3cazTQsf+WvhfzcwaCdT5xQOkgRKzb2bQXrK4GEHoL7uX9 2F6x7v84UBoejYUiw/etSoMPVwk/l40NsmuzwtesUcWo2iyiFgCGeCY7VkI4xcBu -----END CERTIFICATE----- " checksum SHA1:1318:d5174ed1172f9cd50e1869180f64cf6f9a7bf66c revision 2 } cm cert /Common/dtca.crt { cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca.crt_61404_2 certificate-text "-----BEGIN CERTIFICATE----- MIIDnzCCAoegAwIBAgIDDfTiMA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTI2Zj YTBiNDE1LWM2NjAtNDMyZC1iM2I2ODI4NGM3ZTM0ZjMyMB4XDTIxMTEyMjExNDc0 MFoXDTMxMTEyMDExNDc0MFowLjEsMCoGA1UEAxMjZmNhMGI0MTUtYzY2MC00MzJk LWIzYjY4Mjg0YzdlMzRmMzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB AQDiVQvBhpBaX/jHrl12+EDqP9gffV7kD17vPSQ67SMJ9WLGmI6TtUWD04Cb/87W NV9nZW5lcmFsaS5hY2Vucy5wcml2MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ BAQDAgG2MB0GA1UdDgQWBBQ+syV1LEoJNpgop7OOoPEqzc7PUTBYBgNVHSMEUTBP gBQ+syV1LEoJNpgop7OOoPEqzc7PUaEypDAwLjEsMCoGA1UEAxMjZmNhMGI0MTUt YzY2MC00MzJkLWIzYjY4Mjg0YzdlMzRmMzKCAw304jANBgkqhkiG9w0BAQUFAAOC AQEAUJL5NiIpWr637uVKkczGEuwGVaxEqebLPh7/eu9NyPqwZYilMen9knFgakI+ 58MBzJbLjFCNuinTyfTQbhkN2aTUTbrMIWtUGJhvkP2nsms3EcYCqeZkB8fu7GXN GtK80LFFUbR9IOX98S3cazTQsf+WvhfzcwaCdT5xQOkgRKzb2bQXrK4GEHoL7uX9 2F6x7v84UBoejYUiw/etSoMPVwk/l40NsmuzwtesUcWo2iyiFgCGeCY7VkI4xcBu VQAWa5VG27Kylztax95Lj0J+laK8tMk+HLxOIlm2QGeuWCn4E3MYqcY3sfPa7CPC -----END CERTIFICATE----- " checksum SHA1:1318:d5174ed1172f9cd50e1869180f64cf6f9a7bf66c revision 2 } cm cert /Common/dtdi.crt { cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtdi.crt_61400_2 certificate-text "-----BEGIN CERTIFICATE----- MIIDlDCCAnygAwIBAgIDDNH6MA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTI2Zj YTBiNDE1LWM2NjAtNDMyZC1iM2I2ODI4NGM3ZTM0ZjMyMB4XDTIxMTEyMjExNDc0 NFoXDTMxMTEyMDExNDc0NFowJjEkMCIGA1UEAxQbbWFiYV9mNV9nZW5lcmFsaS5h Y2Vucy5wcml2MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5llCWngX atJUpelp1wBqVn2uqWZ+iHtudCVR2I0pw7ke+G9foB66+WLDAZfKhGyJCiDN9FFY D7yS95ZTJPt4OHwc4mhrgkmC/6x/eBJY2ttKVggvVVhfcz04ZUl6RJZDqwwMdom+ HQ4EFgQUOW7DzLkopr4G9UaeA2iGvr1ozzQwWAYDVR0jBFEwT4AUPrMldSxKCTaY KKezjqDxKs3Oz1GhMqQwMC4xLDAqBgNVBAMTI2ZjYTBiNDE1LWM2NjAtNDMyZC1i M2I2ODI4NGM3ZTM0ZjMyggMN9OIwDQYJKoZIhvcNAQEFBQADggEBAIKyVK6S9TuN eQl71K1BYxBnIuq5L8PUs1M5JOl78Zi+I0yN76NZhEI36yyGV8q0OqUhvnG7vvHO vbudnyn50K+/63U1727Qp6liyolilfFyn8xXOSV6Y35kuJggQ8Dh/k0Yp7TnFwrP TIzX1lUlWwrmWJlLhmtTFaOoVStqFL2juwjO5TIfjYlYOKwraZ5C+cNGaqXIdf06 in6/IS6rh0NDg5OsJmjLYpkysfSWUgKvV5e09711wUt1MQy58Le36nM5n/oEP271 Ib7sgKNRquqqcXz54CbNoOJkjkHU99fBGUC6pQjB9kKo5gXUQ4eQOWwIZjasDayk -----END CERTIFICATE----- " checksum SHA1:1302:be35805d9fa13485cd37a385d942c5133c8bb02c revision 2 } cm device /Common/client.domain.net { active-modules { "Local Traffic Manager, i2600|PXUPGKH-IKYHGFK|Rate Shaping|APM, Limited|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Network Access|Secure Virtual Keyboard|APM, Web Application|Machine Certificate Checks|Protected Workspace|Remote Desktop|App Tunnel|Max SSL, i2600|Max Compression, i2600" } base-mac 00:94:a1:e7:94:00 build 0.0.28 cert /Common/dtdi.crt chassis-id "f5-itku-fdfl " edition "Point Release 2" hostname my-host key /Common/dtdi.key management-ip 10.6.252.2 marketing-name "BIG-IP i2600" optional-modules { "Access Policy Manager, Base, i26XX" "Access Policy Manager, Max, i26XX" "Advanced Firewall Manager, i2XXX" "Advanced Protocols" "Advanced Web Application Firewall, i2XXX" "Anti-Bot Mobile, i2XXX" "App Mode (TMSH Only, No Root/Bash)" "Application Security Manager, i2XXX" "ASM to AWF Upgrade, i2XXX" "BIG-IP, DNS (1K)" "BIG-IP, DNS and GTM Upgrade (1K TO MAX)" "BIG-IP, Multicast Routing" "BIG-IP, Privileged User Access, 100 Endpoints" "BIG-IP, Privileged User Access, 1000 Endpoints" "BIG-IP, Privileged User Access, 250 Endpoints" "BIG-IP, Privileged User Access, 50 Endpoints" "BIG-IP, Privileged User Access, 500 Endpoints" "Carrier Grade NAT, i2XXX" "DataSafe, i2XXX" "DNS Services" "External Interface and Network HSM" "Intrusion Prevention System, i2XXX" "IP Intelligence, 1Yr" "IP Intelligence, 1Yr, 1600" "IP Intelligence, 3Yr" "IP Intelligence, 3Yr, 1600" "IPS, 1Yr" "IPS, 3Yr" "Link Controller" "Performance Upgrade, i26XX to i28XX" "RAX Module Add-on, i2600" "Routing Bundle" SM2_SM3_SM4 "SSL Orchestrator, 2XXX/i2XXX" "SSL, Forward Proxy, 2XXX/i2XXX" "Threat Campaigns, 1Yr" "Threat Campaigns, 3Yr" "URL Filtering, 1Yr" "URL Filtering, 3Yr" "VPN Users" } platform-id C117 product BIG-IP self-device true time-zone Europe/Paris version 16.1.2.2 } cm device-group /Common/device_trust_group { auto-sync enabled devices { /Common/client.domain.net { } } hidden true network-failover disabled } cm device-group /Common/gtm { devices { /Common/client.domain.net { } } hidden true network-failover disabled } cm key /Common/dtca.key { cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtca.key_61406_2 certificate-text "-----BEGIN PRIVATE KEY----- MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDiVQvBhpBaX/jH rl12+EDqP9gffV7kD17vPSQ67SMJ9WLGmI6TtUWD04Cb/87WBJyeeee3Qo9hii5s GKnnFJYC+bAiQadXMeAOBkn9ZrtjfTM5FTM8STpPA919vTS5pVlIAdaAYcizWJ+n wwZHQuS6UNvVQyenoZkU1bJsFO9s1BhlM4Dk/WD9hDf7Ja35zHlU/atwavKXeLCD 5/mIWuOCQcQk4p3sZU4foHCSvA1Fq+c7STRUEd131Y/VtGlWp0mmGB6LE80NdRYG h397Y6neJJFyBErs9Y5sdfWh/J0lg4/+D5q/xgmcuVp0M0wU59XQvfvEI8i2yQWC qdG0fzWbAgMBAAECggEAZYXKeSt4EuHbwQ4IpLXkwG6U7kMZTmlKpzugxcHbJrto bDbANadpICG+HbuYNs3oxvldpAl6MUF/Y0OI6ruEMp93j1YtzuHzY7cUd1MemRju 1UMFoIYCrRQRLIgR+PRkodyWzsDXpq4/fJ7bDKtS+ZBqK0enwp9aZylFbi2das6J g3yHnjtZJuOsslDQAd6VeDl20QKBgQDtU3ySI8UKBem/33mQ9B9ibITanxgB9q46 UHS/PpBEq/P6Ytzbgp7zNWS7EfCPf/hwXi/qyKiesi/EPboJ7sbl07cKl0YU1Si+ tFKRs2e4xrlSZ9iUlgTmf3Ij9CH728XrbZWFisMD+404GZB+gEYfN6QPwg7UzR44 Z+SLTDVYqwKBgF+1d+uvVIo3YVKSlpOUpmK1jDKhq2SfDWZpJFXnPN4+LngbCcZQ Vm6ZAJkEGD9+Kp/bVSNnVs0iO7sqlNqUoD2ofGC4MVG6P22sR0LcIXoNe5QPB+hj lnMROGjC5VZ5uRGPPqFWJ9vMIZ3ArU9DeKJB6co9cKvXC88/rF60TvLBAoGBAOCL 9XlwTqZFIf1hPGxiDq/ZbXpMvTJebErQhSXN1EKlT5rAn6cx16LWChDV0H513mKz OzMx2BkPDxLmNHfhbF9YCgADUVO0u3B0vQsObDzwCbhmeQ1dRBWy0BQkkWLzdjhi 3u4TdKD4CY3i4kxOogo3Ywtl2RKPYOCNrDgASxkxAoGAawiu95FraZHILJch0uc/ ahCwPwzmTNV1CsXpiyoZrKZQRL0MvLThyU+tNnhcdvdRN9guD0tgpfYrq22RRcRz CohMP67LY+gnJBRLDKemSrJTUiNspP6hfPtJLE35idcSPIdwuyaJ9GV5SKB+GkwE -----END PRIVATE KEY----- " checksum SHA1:1704:7189cd7ead4574d175a4d1f4beb475dbb1884618 revision 2 } cm key /Common/dtdi.key { cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtdi.key_61402_2 certificate-text "-----BEGIN PRIVATE KEY----- MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDmWUJaeBdq0lSl 6WnXAGpWfa6pZn6Ie250JVHYjSnDuR74b1+gHrr5YsMBl8qEbIkKIM30UVgPvJL3 llMk+3g4fBziaGuCSYL/rH94Elja20pWCC9VWF9zPThlSXpElkOrDAx2ib5lCBeJ /DTgj/ObEf7EdzQQCSBPMi+DaikpMRo7ld7NI2CDBaiWIvAKBqXEH8rZK90h4x/J dxLytXSmS450NmTp9NpCJE03pXtVtZspwxBwQleZhpH1lqbbm+5dFwAWluaWWGUB XYArINK7/M7j7Vx/eIr4HeygUpZcH4Wty0KqpHTM6QKBgQDzr7ZUw0WmLR80O6xZ 6MsOVbMsidnIOmQe6bhd2eRXLEMz6GP2YP4w382OgdNvVjpzwE4kol/R/xgSUahQ QiRqprLKckOs3pAEKEopNHV6RtH1tWF5fopoY+Px8P+WD06U5qI+3Zq+VLpYeeAK EQdyXByhZouRTsvXXVOAdwuovQKBgQDx/QM095JXGefditqEsQsxQBIq5qCZsxDI iDcafOmea9FZwBd1bRSI3+08DK7LIJMhcn8Q6BYQEGoLM/7u8r8BwfSBvvlsfr+k gET3fc3ItzHDa5RH85poWeg08LuPJ7CR71BU1Bbs1C0HW3+i9LVajNiQ/zn9YLI/ 8gNKqa2j9wKBgFo8WrwQgx4B32gsIKo6ddadDXgUo7xtQt3flhHKua8+CLST/VAi on3eofN/R5gWyhZKw6T1K55LY9KEwlrV4z5K9DHbFgxRbercMHoJnubkiqL9w1aF 8SKuup3ArCQZDvQ8Yx/8V2zbWxWgK8IOhD9otIFfw5bPItRhDqanbn3RAoGBAOuI tg9fDXxkBbA4T7spy9gTIdvKAPW5OhPFqcTJYmbFUM7Hzs2H753OP03clmG2Ah9j H1SoYZkfMOhYosGXWtzuGPwUkxfMQuJtyzMNqze7P9+THY/vBxKcuAyXaCfNnOpe gdUfXnUDjBSGNbS59K7/OmffVGVQMg9Vk2ifwRg/AoGAcecGxANsXqvfzifG+wsF dnZ1bZciWp4roHaIRw//hMP7ttbu4XM2WCwiadoZ7L2pIMyk+6+DA7Lt7p43N0LI vBKGy8Td1uIPNcclD9c5ntRhz5zDBK2VNfID5agQ2XGpoOOh9YZvyNK+k5bKAXzY -----END PRIVATE KEY----- " checksum SHA1:1704:b06a594c25fb2fcb551de23baaa72beb218451bf revision 2 } cm traffic-group /Common/traffic-group-1 { unit-id 1 } cm traffic-group /Common/traffic-group-local-only { } cm trust-domain /Common/Root { ca-cert /Common/dtca.crt ca-cert-bundle /Common/dtca-bundle.crt ca-devices { /Common/client.domain.net } ca-key /Common/dtca.key guid f3c2206-b96-45a-9d8284e34f32 status standalone trust-group /Common/device_trust_group } gtm global-settings metrics { metrics-collection-protocols { icmp } } gtm global-settings metrics-exclusions { addresses none } ilx global-settings { debug-port-blacklist { 47019 54321 60000 } } ltm default-node-monitor { rule /Common/icmp } ltm profile server-ssl /Common/do-not-remove-without-replacement { app-service none } net dns-resolver /Common/f5-aws-dns { forward-zones { amazonaws.com { nameservers { 8.8.8.8:53 { } } } idservice.net { nameservers { 8.8.8.8:53 { } } } shpapi.com { nameservers { 8.8.8.8:53 { } } } } route-domain /Common/0 } net interface 1.0 { description "Service" lldp-tlvmap 114552 } net interface 2.0 { description "Balance" lldp-tlvmap 114552 } net port-list /Common/_sys_self_allow_tcp_defaults { ports { 22 { } 53 { } 161 { } 443 { } 1029-1043 { } 4353 { } } } net port-list /Common/_sys_self_allow_udp_defaults { ports { 53 { } 161 { } 520 { } 1026 { } 4353 { } } } net route-domain /Common/0 { id 0 vlans { /Common/http-tunnel /Common/socks-tunnel } } net self-allow { defaults { igmp:0 ospf:0 pim:0 tcp:161 tcp:22 tcp:4353 tcp:443 tcp:53 udp:1026 udp:161 udp:4353 udp:520 udp:53 } } net stp /Common/cist { interfaces { 1.0 { external-path-cost 20000 internal-path-cost 20000 } 2.0 { external-path-cost 20000 internal-path-cost 20000 } } vlans { /Cli_Part/Bal_00-VPARClient-4059 /Cli_Part/Ser_00-Client-4076 } } net stp-globals { config-name 00-94-A1-E7-94-00 } net fdb tunnel /Common/http-tunnel { } net fdb tunnel /Common/socks-tunnel { } net ipsec ike-daemon /Common/ikedaemon { log-publisher /Common/default-ipsec-log-publisher } net tunnels tunnel /Common/http-tunnel { description "Tunnel for http-explicit profile" profile /Common/tcp-forward } net tunnels tunnel /Common/socks-tunnel { description "Tunnel for socks profile" profile /Common/tcp-forward } pem global-settings analytics { } pem global-settings gx { } pem global-settings policy { } security bot-defense profile /Common/bot-defense { app-service none whitelist { apple_touch_1 { match-order 2 url /apple-touch-icon*.png } favicon_1 { match-order 1 url /favicon.ico } } } security bot-defense profile /Common/bot-defense-device-id-generate-after-access { api-access-strict-mitigation disabled app-service none class-overrides { "/Common/Malicious Bot" { } "/Common/Mobile Application" { } "/Common/Suspicious Browser" { } "/Common/Trusted Bot" { mitigation { action alarm } } "/Common/Untrusted Bot" { } /Common/Browser { } /Common/Unknown { } } deviceid-mode generate-after-access dos-attack-strict-mitigation disabled perform-challenge-in-transparent enabled whitelist { apple_touch_1 { match-order 2 url /apple-touch-icon*.png } favicon_1 { match-order 1 url /favicon.ico } } } security bot-defense profile /Common/bot-defense-device-id-generate-before-access { api-access-strict-mitigation disabled app-service none class-overrides { "/Common/Malicious Bot" { } "/Common/Mobile Application" { } "/Common/Suspicious Browser" { } "/Common/Trusted Bot" { mitigation { action alarm } } "/Common/Untrusted Bot" { } /Common/Browser { } /Common/Unknown { } } deviceid-mode generate-before-access dos-attack-strict-mitigation disabled perform-challenge-in-transparent enabled whitelist { apple_touch_1 { match-order 2 url /apple-touch-icon*.png } favicon_1 { match-order 1 url /favicon.ico } } } security bot-defense profile /Common/bot-defense-device-id-none { allow-browser-access enabled api-access-strict-mitigation disabled app-service none blocking-page { body "Request RejectedThe requested URL was rejected. Please consult with your administrator.

Your support ID is: <%BOTDEFENSE.support_id%>

[Go Back]" headers "Cache-Control: no-store, must-revalidate, no-cache Pragma: no-cache Connection: close" status-code 200 type default } browser-mitigation-action none captcha-response { failure { body "You have entered an invalid answer for the question. Please, try again.
%BOTDEFENSE.captcha.image% %BOTDEFENSE.captcha.audio% %BOTDEFENSE.captcha.change%
What code is in the image\? %BOTDEFENSE.captcha.solution%
%BOTDEFENSE.captcha.submit%

Your support ID is: %BOTDEFENSE.captcha.support_id%." type default } first { body "This question is for testing whether you are a human visitor and to prevent automated spam submission.
%BOTDEFENSE.captcha.image% %BOTDEFENSE.captcha.audio% %BOTDEFENSE.captcha.change%
What code is in the image\? %BOTDEFENSE.captcha.solution%
%BOTDEFENSE.captcha.submit%

Your support ID is: %BOTDEFENSE.captcha.support_id%." type default } } class-overrides { "/Common/Malicious Bot" { } "/Common/Mobile Application" { } "/Common/Suspicious Browser" { } "/Common/Trusted Bot" { mitigation { action alarm } } "/Common/Untrusted Bot" { } /Common/Browser { } /Common/Unknown { } } cross-domain-requests allow-all description none deviceid-mode none dos-attack-strict-mitigation disabled enforcement-mode transparent enforcement-readiness-period 7 grace-period 300 honeypot-page { body headers "Cache-Control: no-store, must-revalidate, no-cache Pragma: no-cache Connection: close" status-code 200 type default } mobile-detection { allow-android-rooted-device disabled allow-any-android-package enabled allow-any-ios-package enabled allow-emulators disabled allow-jailbroken-devices disabled block-debugger-enabled-device enabled client-side-challenge-mode pass } perform-challenge-in-transparent disabled redirect-to-pool-name none signature-staging-upon-update disabled single-page-application disabled template balanced whitelist { apple_touch_1 { match-order 2 url /apple-touch-icon*.png } favicon_1 { match-order 1 url /favicon.ico } } } security device-id attribute /Common/att01 { id 1 } security device-id attribute /Common/att02 { id 2 } security device-id attribute /Common/att03 { id 3 } security device-id attribute /Common/att04 { id 4 } security device-id attribute /Common/att05 { id 5 } security device-id attribute /Common/att06 { id 6 } security device-id attribute /Common/att07 { id 7 } security device-id attribute /Common/att08 { id 8 } security device-id attribute /Common/att09 { id 9 } security dos ipv6-ext-hdr /Common/dos-ipv6-ext-hdr { frame-types { auth dstopt esp frag hbh mobility route } } security dos udp-portlist /Common/dos-udp-portlist { list-type exclude-listed-ports } security firewall config-change-log { log-publisher /Common/local-db-publisher } security firewall config-entity-id /Common/uuid_entity_id { entity-id 715291968261320 } security firewall port-list /Common/_sys_self_allow_tcp_defaults { ports { 22 { } 53 { } 161 { } 443 { } 1029-1043 { } 4353 { } } } security firewall port-list /Common/_sys_self_allow_udp_defaults { ports { 53 { } 161 { } 520 { } 1026 { } 4353 { } } } security firewall rule-list /Common/_sys_self_allow_all { rules { _sys_allow_all { action accept ip-protocol any } } } security firewall rule-list /Common/_sys_self_allow_defaults { rules { _sys_allow_tcp_defaults { action accept ip-protocol tcp destination { port-lists { /Common/_sys_self_allow_tcp_defaults } } } _sys_allow_udp_defaults { action accept ip-protocol udp destination { port-lists { /Common/_sys_self_allow_udp_defaults } } } _sys_allow_ospf_defaults { action accept ip-protocol ospf } _sys_allow_pim_defaults { action accept ip-protocol pim } _sys_allow_igmp_defaults { action accept ip-protocol igmp } } } security firewall rule-list /Common/_sys_self_allow_management { rules { _sys_allow_ssh { action accept ip-protocol tcp destination { ports { 22 { } } } } _sys_allow_web { action accept ip-protocol tcp destination { ports { 443 { } } } } } } security ip-intelligence policy /Common/ip-intelligence { } security protocol-inspection compliance-map /Common/map_10426 { insp-id 10426 key-type int value-type vector-string } security protocol-inspection compliance-objects /Common/allowed_list { insp-id 10229 type vector-string } security protocol-inspection compliance-objects /Common/allowed_list { insp-id 10430 type vector-string } security protocol-inspection compliance-objects /Common/allowed_list { insp-id 10431 type vector-string } security protocol-inspection compliance-objects /Common/allowed_list { insp-id 10232 type vector-string } security protocol-inspection compliance-objects /Common/argument_len_max { insp-id 10905 type int } security protocol-inspection compliance-objects /Common/command_argument_len_max { insp-id 10609 type int } security protocol-inspection compliance-objects /Common/command_len_max { insp-id 10905 type int } security protocol-inspection compliance-objects /Common/command_len_max { insp-id 10707 type int } security protocol-inspection compliance-objects /Common/command_len_max { insp-id 10609 type int } security protocol-inspection compliance-objects /Common/command_parameter_len_max { insp-id 10707 type int } security protocol-inspection compliance-objects /Common/disallowed_list { insp-id 10229 type vector-string } security protocol-inspection compliance-objects /Common/disallowed_list { insp-id 10430 type vector-string } security protocol-inspection compliance-objects /Common/disallowed_list { insp-id 10431 type vector-string } security protocol-inspection compliance-objects /Common/disallowed_list { insp-id 10232 type vector-string } security protocol-inspection compliance-objects /Common/error_message_max { insp-id 10102 type int } security protocol-inspection compliance-objects /Common/file_name_max { insp-id 10102 type int } security protocol-inspection compliance-objects /Common/file_type_max { insp-id 10102 type int } security protocol-inspection compliance-objects /Common/header_name_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/header_name_len_max { insp-id 11016 type int } security protocol-inspection compliance-objects /Common/header_value_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/header_value_len_max { insp-id 11016 type int } security protocol-inspection compliance-objects /Common/method_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/method_len_max { insp-id 11016 type int } security protocol-inspection compliance-objects /Common/option_name_max { insp-id 10102 type int } security protocol-inspection compliance-objects /Common/option_value_max { insp-id 10102 type int } security protocol-inspection compliance-objects /Common/response_argument_len_max { insp-id 10609 type int } security protocol-inspection compliance-objects /Common/response_code_len_max { insp-id 10609 type int } security protocol-inspection compliance-objects /Common/response_parameter_len_max { insp-id 10707 type int } security protocol-inspection compliance-objects /Common/status_code_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/status_code_len_max { insp-id 11016 type int } security protocol-inspection compliance-objects /Common/status_len_max { insp-id 10707 type int } security protocol-inspection compliance-objects /Common/status_reason_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/status_reason_len_max { insp-id 11016 type int } security protocol-inspection compliance-objects /Common/tag_len_max { insp-id 10905 type int } security protocol-inspection compliance-objects /Common/uri_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/uri_len_max { insp-id 11016 type int } security protocol-inspection compliance-objects /Common/version_len_max { insp-id 11223 type int } security protocol-inspection compliance-objects /Common/version_len_max { insp-id 11016 type int } security scrubber profile /Common/scrubber-profile-default { advertisement-ttl 300 } security shared-objects port-list /Common/_sys_self_allow_tcp_defaults { ports { 22 { } 53 { } 161 { } 443 { } 1029-1043 { } 4353 { } } } security shared-objects port-list /Common/_sys_self_allow_udp_defaults { ports { 53 { } 161 { } 520 { } 1026 { } 4353 { } } } sys compatibility-level { level 0 } sys db adm.block.enable { value "1" } sys db antifraud.encryptionfieldprefix { value "__" } sys db dos.forceswdos { value "true" } sys db log.ftp.level { value "Error" } sys db tmm.dhcp.client.connection.packets.inprogress.max { value "5000" } sys db tmm.dhcp.server.connection.packets.inprogress.max { value "5000" } sys folder / { device-group none hidden false inherited-devicegroup false inherited-traffic-group false traffic-group /Common/traffic-group-1 } sys folder /Cli_Part { device-group none hidden false inherited-devicegroup true inherited-traffic-group true traffic-group /Common/traffic-group-1 } sys folder /Common { device-group none hidden false inherited-devicegroup true inherited-traffic-group true traffic-group /Common/traffic-group-1 } sys folder /Common/Drafts { device-group none hidden false inherited-devicegroup true inherited-traffic-group true traffic-group /Common/traffic-group-1 } sys global-settings { gui-setup disabled hostname my-host } sys management-dhcp /Common/sys-mgmt-dhcp-config { request-options { subnet-mask broadcast-address routers domain-name domain-name-servers host-name ntp-servers interface-mtu } } sys management-ip 10.6.252.2/22 { } sys management-ovsdb { bfd-disabled bfd-route-domain none ca-cert-file none cert-file none cert-key-file none disabled flooding-type replicator log-level info logical-routing-type none tunnel-maintenance-mode active } sys management-route /Common/default { gateway 10.6.252.1 network default } sys ntp { servers { 10.6.252.1 } timezone Europe/Madrid } sys provision ltm { level nominal } sys snmp { agent-addresses { tcp6:161 udp6:161 } allowed-addresses { 10.0.0.0/255.255.255.0 } communities { /Common/comm-public { community-name public source default } /Common/iuEsbeutA_1 { access rw community-name public } } disk-monitors { /Common/root { minspace 2000 path / } /Common/var { minspace 10000 path /var } } process-monitors { /Common/bigd { max-processes infinity process bigd } /Common/chmand { process chmand } /Common/httpd { max-processes infinity process httpd } /Common/mcpd { process mcpd } /Common/sod { process sod } /Common/tmm { max-processes infinity process tmm } } sys-location "" } sys syslog { remote-servers { /Common/remotesyslog1 { host 192.168.1.2 } } } sys diags ihealth { expiration 30 no-ihealth false options none password none user none } sys dynad settings { development-mode false } sys ecm cloud-provider /Common/aws-ec2 { description "The aws-ec2 parameters" property-template { account { } availability-zone { valid-values { a b c d } } instance-type { valid-values { t2.micro t2.small t2.medium m3.medium m3.large m3.xlarge m3.2xlarge c3.large c3.xlarge c3.2xlarge c3.4xlarge c3.8xlarge r3.large r3.xlarge r3.2xlarge r3.4xlarge r3.8xlarge } } region { valid-values { us-east-1 us-west-1 us-west-2 sa-east-1 eu-west-1 eu-central-1 ap-southeast-2 ap-southeast-1 ap-northeast-1 } } } } sys ecm cloud-provider /Common/dnet { description "The dnet parameters" } sys ecm cloud-provider /Common/vsphere { description "The vsphere parameters" property-template { cloud-host-ip { } dhcp-network-name { } end-point-url { } node-name { } } } sys file ifile /Common/mylogo { cache-path /config/filestore/files_d/Common_d/ifile_d/:Common:mylogo_57025_1 revision 1 } sys file ssl-cert /Common/f5_api_com.crt { cache-path /config/filestore/files_d/Common_d/certificate_d/:Common:f5_api_com.crt_57403_1 revision 1 source-path file:///config/ssl/ssl.crt/f5_api_com.crt } sys file ssl-key /Common/f5_api_com.key { cache-path /config/filestore/files_d/Common_d/certificate_key_d/:Common:f5_api_com.key_259946_1 revision 1 source-path file:///config/ssl/ssl.key/f5_api_com.key } sys fpga firmware-config { type standard-balanced-fpga } sys sflow global-settings http { } sys sflow global-settings vlan { } sys software update { auto-check enabled auto-phonehome enabled frequency weekly } sys turboflex profile-config { type turboflex-base } wom endpoint-discovery { } cli admin-partitions { update-partition Cli_Part } ltm ifile /Cli_Part/mylogo.png { file-name /Cli_Part/mylogo } ltm node /Cli_Part/ruper_front1 { address 192.168.96.181 monitor /Common/icmp } ltm node /Cli_Part/ruper_front2 { address 192.168.96.182 } ltm pool /Cli_Part/Pool_ruper_http_163 { description Pool_ruper_http_163 members { /Cli_Part/ruper_front1:80 { address 192.168.96.181 monitor /Cli_Part/http_ruper } /Cli_Part/ruper_front2:80 { address 192.168.96.182 monitor /Cli_Part/http_ruper } } monitor /Cli_Part/http_ruper and /Common/tcp } ltm pool /Cli_Part/Pool_ruper_https_163 { description Pool_ruper_https_163 members { /Cli_Part/ruper_front1:80 { address 192.168.96.181 } /Cli_Part/ruper_front2:80 { address 192.168.96.182 } } monitor /Common/tcp and /Cli_Part/https_ruper } ltm rule /Cli_Part/Snat_selectivo_Client { when CLIENT_ACCEPTED { if { [IP::addr [IP::client_addr] equals 192.168.96.176%10/28] } { log -noname local0. "[IP::client_addr] connected... Applying SNAT - Automap" snat automap } else { snat none } } } ltm rule /Cli_Part/sorry_page { when HTTP_REQUEST { if {[active_members [LB::server pool]] < 1} { switch [HTTP::uri] { "/mylogo.png" {HTTP::respond 200 content [ifile get "mylogo.png"] } default {HTTP::respond 200 content " Disculpe las molestias.

Disculpe las molestias.

" } } } } } ltm virtual /Cli_Part/VIP_TEST_CAJA { creation-time 2021-12-14:11:08:19 destination /Cli_Part/192.168.96.179%10:443 disabled ip-protocol tcp last-modified-time 2022-09-27:11:17:20 mask 255.255.255.255 persist { /Cli_Part/cookie_perst_caja { default yes } } pool /Cli_Part/Pool_ruper_http_163 profiles { /Cli_Part/http_ruper { } /Common/tcp { } } serverssl-use-sni disabled source 0.0.0.0/0 source-address-translation { type automap } translate-address enabled translate-port enabled } ltm virtual /Cli_Part/VS_192.168.2.33_http { creation-time 2021-11-26:18:05:06 destination /Cli_Part/192.168.98.163%10:80 ip-protocol tcp last-modified-time 2021-12-20:11:18:09 mask 255.255.255.255 persist { } pool /Cli_Part/Pool_ruper_http_163 profiles { /Cli_Part/TCP_3600 { context serverside } /Cli_Part/http_ruper { } /Common/tcp { context clientside } } rules { /Cli_Part/sorry_page /Cli_Part/Snat_selectivo_Client } serverssl-use-sni disabled source 0.0.0.0/0 translate-address enabled translate-port enabled } ltm virtual /Cli_Part/VS_192.168.2.33_https { creation-time 2021-11-26:18:12:53 destination /Cli_Part/192.168.98.163%10:443 ip-protocol tcp last-modified-time 2023-08-18:15:17:45 mask 255.255.255.255 persist { /Cli_Part/cookie_perst_caja { default yes } } pool /Cli_Part/Pool_ruper_https_163 profiles { /Cli_Part/TCP_3600 { } /Cli_Part/http_ruper { } } rules { /Cli_Part/sorry_page /Cli_Part/Snat_selectivo_Client } serverssl-use-sni disabled source 0.0.0.0/0 translate-address enabled translate-port enabled } ltm virtual /Cli_Part/VS_IN_Client { creation-time 2021-11-26:18:09:19 destination /Cli_Part/192.168.96.176%10:0 ip-forward last-modified-time 2021-11-26:18:10:39 mask 255.255.255.240 profiles { /Cli_Part/fastl4_3600 { } } serverssl-use-sni disabled source 0.0.0.0/0 translate-address disabled translate-port disabled } ltm virtual /Cli_Part/VS_OUT_Client { creation-time 2021-11-26:18:11:39 destination /Cli_Part/0.0.0.0%10:0 ip-forward last-modified-time 2021-11-26:18:11:39 mask any profiles { /Common/fastL4 { } } serverssl-use-sni disabled source 192.168.96.176/28 translate-address disabled translate-port disabled } ltm virtual-address /Cli_Part/0.0.0.0%10 { address any arp disabled icmp-echo disabled mask any traffic-group /Common/traffic-group-1 } ltm virtual-address /Cli_Part/192.168.2.33%10 { address 192.168.2.33 arp enabled icmp-echo enabled mask 255.255.255.255 traffic-group /Common/traffic-group-1 } ltm virtual-address /Cli_Part/192.168.96.176%10 { address 192.168.96.176 arp disabled icmp-echo disabled mask 255.255.255.240 traffic-group /Common/traffic-group-1 } ltm virtual-address /Cli_Part/192.168.96.179%10 { address 192.168.96.179 arp enabled icmp-echo enabled mask 255.255.255.255 traffic-group /Common/traffic-group-1 } ltm virtual-address /Cli_Part/192.168.98.163%10 { address 192.168.98.163 arp enabled icmp-echo enabled mask 255.255.255.255 traffic-group /Common/traffic-group-1 } ltm profile fastl4 /Cli_Part/fastl4_3600 { app-service none defaults-from /Common/fastL4 idle-timeout 28800 } ltm profile http /Cli_Part/http_ruper { app-service none defaults-from /Common/http proxy-type reverse } ltm profile tcp /Cli_Part/TCP_3600 { app-service none defaults-from /Common/tcp-legacy idle-timeout 28800 } net route /Cli_Part/Default_gtw_Client { gw 192.168.98.161 network default } net route-domain /Cli_Part/RD_Client { description "Route Domain Client" id 10 vlans { /Cli_Part/Bal_00-VPARClient-4059 /Cli_Part/Ser_00-Client-4076 } } net self /Cli_Part/IP_local_V4076 { address 192.168.98.162/29 traffic-group /Common/traffic-group-local-only vlan /Cli_Part/Ser_00-Client-4076 } net self /Cli_Part/IP_local_V4059 { address 192.168.96.189/28 traffic-group /Common/traffic-group-local-only vlan /Cli_Part/Bal_00-VPARClient-4059 } net vlan /Cli_Part/Bal_00-VPARClient-4059 { description "Client" interfaces { 2.0 { tagged } } sflow { poll-interval-global no sampling-rate-global no } tag 4059 } net vlan /Cli_Part/Ser_00-Client-4076 { description "Client" interfaces { 1.0 { tagged } } sflow { poll-interval-global no sampling-rate-global no } tag 4076 } net fdb vlan /Cli_Part/Bal_00-VPARClient-4059 { } net fdb vlan /Cli_Part/Ser_00-Client-4076 { } sys file ifile /Cli_Part/mylogo { cache-path /config/filestore/files_d/Cli_Part_d/ifile_d/:Cli_Part:mylogo_57032_1 revision 1 }