tcl/testdata/example2.conf

1501 lines
41 KiB
Plaintext
Raw Permalink Normal View History

#TMSH-VERSION: 12.1.2
cli admin-partitions {
update-partition Common
}
apm report default-report {
report-name sessionReports/sessionSummary
user /Common/admin
}
auth user admin {
description "Admin User"
encrypted-password $6$IIhG.HP4$kmWDt3Czta4rK5Ct4rYgaGSCDtqkMbAIgCUUdIDaQ/W8HTVHy7F1EZmSM.KYO9sdxDTuggaAGHj7QO/8f9rB80
partition-access {
all-partitions {
role admin
}
}
shell bash
}
auth user f5hubblelcdadmin {
description f5hubblelcdadmin
encrypted-password O3bad8WQTUGBBhpJtjUgbt6gluzFM0ha
partition-access {
all-partitions {
role admin
}
}
shell none
}
auth user mglynn {
description mglynn
encrypted-password $6$g5xyMuOe$T0uSN/cbtiENpC3Vbrfa3Xy9OGNJdu8sIFl.w7M6hjZaM4vmmH7dV1X4hAe3CEvsbmVtqknWQy5S.53Z0DYIL.
partition-access {
all-partitions {
role guest
}
}
shell tmsh
}
auth user root {
description root
encrypted-password $6$MgRYNSCd$5hkwlvnUZXvJfK5pUcmxP./VtQIn1CEoEGNil9B5NCtUOV4K8BVCbpKwPz0O0WFv0zm8t7J0XTM33YSVZ.xS61
shell bash
}
cm cert /Common/dtca-bundle.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca-bundle.crt_37137_2
certificate-text "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
"
checksum SHA1:1314:446099e7a8c3e0143d34471d448483941d52a516
revision 2
}
cm cert /Common/dtca.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca.crt_37133_2
certificate-text "-----BEGIN CERTIFICATE-----
MIIDnTCCAoWgAwIBAgIDCSzmMA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTIzA2
YzU3YjIzLTQwZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0MB4XDTE3MDIxMDE4NTk0
NVoXDTI3MDIwODE4NTk0NVowLjEsMCoGA1UEAxMjMDZjNTdiMjMtNDBkMS00MTU4
LWJiOGMwMDUwNTY4ZGUzZTQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
AQDS+l/bwiYzhCmjyNAKGGwlfcwmjDyphmcP0svbJHWlNa30n1tsj+7jJovBPi6b
qPtHJ0cgDvmQhvDqY5gOe8rW0LCt4rpASmpTn31Hh4DQFhhFZ4DUzKcpB+Q27dGj
U1OFqjW8HxtCr7faCa/TRUCwCg0bn1yMSszJAcBN/s6EplG+ifi7H7TJes/ZvQ3D
E+WnfM3KRFMzrfQbAa59ATHNfG88hD3dPYXCmI3Q5hLN8tQO+H3ZH53hsk7+mzSG
11tK7R21ZAgmPlhRiu40ea2L+X0XAuIh31x+9TApAHDukWu1KN2/KG5GpJL/aCIV
qYsQ6yaVulBBgdpUtorUSF0lAgMBAAGjgcMwgcAwJAYDVR0RBB0wG4IZZjUuaGFh
cy03OC5wZXoucGl2b3RhbC5pbzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE
AwIBtjAdBgNVHQ4EFgQUUgI0VFrDDgzuoXhsc1nMA6mQK8EwWAYDVR0jBFEwT4AU
UgI0VFrDDgzuoXhsc1nMA6mQK8GhMqQwMC4xLDAqBgNVBAMTIzA2YzU3YjIzLTQw
ZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0ggMJLOYwDQYJKoZIhvcNAQEFBQADggEB
AL/h4v4N60iHK0otdypxyzx855xtyysm9gGeXnKb4uxj9SrEt+6qTUMn66GtMNrk
esI6603r02aPYl/6ibIp3uxwYmQlgvt4O2zQOSSD0R/r8+Vl56DGgU84/gLorKNF
UOxWAHL5mRdanWP5W78V1bnGjBk/JgeM8oHFGei9A3S0MdK18kxSsACCFGot25A0
d1B60oz5RsC2lrRKQoSDDxV3tk2SqbcU7Bu5Cp2ePup3MAQkydFlK6shWnT9Frq1
qPrug/YfnoA5HGb9ZgVZRicBZei5Hc/Tbsm3/j47KmzgKuV+Rs/kYKPIRSeohx18
GTUVKofqzFOu++0Cm9uGDJ4=
-----END CERTIFICATE-----
"
checksum SHA1:1314:446099e7a8c3e0143d34471d448483941d52a516
revision 2
}
cm cert /Common/dtdi.crt {
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtdi.crt_37129_2
certificate-text "-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
"
checksum SHA1:1298:10edd86cc9e04c9c30eb6d4a38f066ca8601d232
revision 2
}
cm device /Common/f5.haas-78.pez.pivotal.io {
active-modules { "BIG-IP, VE Trial|XGEUKHJ-ENEGRPV|Rate Shaping|External Interface and Network HSM, VE|SDN Services, VE|SSL, Forward Proxy, VE|ASM, VE|Max Compression, VE|Crytpo Offload, VE, Tier 1 (25M - 200M)|BIG-IP VE, Multicast Routing|SSL, VE|DNS (1K QPS), VE|Routing Bundle, VE|AFM, VE|DNSSEC|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Network Access|Secure Virtual Keyboard|APM, Web Application|Machine Certificate Checks|Protected Workspace|Remote Desktop|App Tunnel|CGN, BIG-IP VE, AFM ONLY|PSM, VE" }
base-mac 00:50:56:8d:e3:e4
build 0.0.249
cert /Common/dtdi.crt
chassis-id 420d3473-cd7c-9beb-0969a312da5f
edition Final
hostname f5.haas-78.pez.pivotal.io
key /Common/dtdi.key
management-ip 172.10.0.10
marketing-name "BIG-IP Virtual Edition"
platform-id Z100
product BIG-IP
self-device true
time-zone America/Los_Angeles
version 12.1.2
}
cm device-group /Common/device_trust_group {
auto-sync enabled
devices {
/Common/f5.haas-78.pez.pivotal.io { }
}
hidden true
network-failover disabled
}
cm device-group /Common/gtm {
devices {
/Common/f5.haas-78.pez.pivotal.io { }
}
hidden true
network-failover disabled
}
cm key /Common/dtca.key {
cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtca.key_37135_2
certificate-text "-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
"
checksum SHA1:1704:ef95b645dba9cd21dea1d230f447525c8b6a8df3
revision 2
}
cm key /Common/dtdi.key {
cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtdi.key_37131_2
certificate-text "-----BEGIN PRIVATE KEY-----
MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQCuE00MHyBRDEAS
447O0dnYTE7VhYRyu7jxrc0OZPGC6l3V944cmhjK7OE3rz8Dirv0SLYZ+YXJLAlZ
zV7tDUMfWRoxzSNQI0JuFa1SUX3jXLrBl9RXj5N74ripxCkneHGcywkG8PAkYwVc
F/eU3IZJFeXFIa4pTmmoZt1An24sLGXzn6kPsUIohVVh9/SzWcGgHHvrNu+nK1rR
ytw1l0Z2E3nZ1TxxqS/xE+e6HarvrSLRyQBn5dV4B1Mge185wnJLwkGj6LIsuJCp
Wt6DxhHH4iKZ6UaFq1IZd0aIRUMtsXmA4UmYshxzQx1JTZ73IuMvweFE+0lc21+Z
BgDHOUafAgMBAAECggEAJbXls5IMqLIsMUtd1R0uAccqLuSBWG+ldanOqechUNif
4moCPdz+MPvXIH6U+pnz9MxJst/U5UtmbS9p+JWubFybqZ1EoKg6zGlixloEGRyu
EqFnLV7btvNbSN/HgJb9mdd8SaYph+BxuU0x4+xQJQYa5DVTKvyjNAmwtb60Gdpa
Hjm/gewZMjSIwvkr3UlT8Zd5O9/2fGqAY4wx9aVCgbg9EGYcILFjeSsaFK6JlRgP
cLD2/7QK+j9plXeUCoBF416/PsMC7kZ7o6Qg3ooq/TUIsZQPJ7Oz3dhTdwPZp60s
anZmWrqFPWwVBMFFgr9M81592QgACKBFz2k9o0LLgQKBgQDx2CaCC58XCsDTNxhh
YEHZfmZGKKLXLyDVmY+HfItiNICrJIZid7CRKXQ8EMqu0a3x9RIQnzb5nPJT4Flm
Mnpj92IJbsv8AjhsP4/3cxMYyv/Aj4f7a11tH/V5K+aqzNeQ2uIWlCKbRzOt0Xnc
DStn4K9LM8dvRW4DKyzt39dsHwKBgQC4Q6+A8bRCUTBYc6rGDCnjjZzhDTKaRQx2
V8j8LHz48o5CKRM6+HlqRX/JYYe9Yj4uyLXlfChCtdlqYHyt5kBbzHZQnNwg/M+J
KUDq5NQDt/7Bz99vuo0n+m6jZ52KIhG0giLHRzmFzqSjCBmJszxpdGzyRSKz8/Q6
RkAMyorVgQKBgDBLKI1pgrBYPl8vLlgrn5qt6gBylun/iD//NTEqBq9qqpMCbS92
lTS3oXVpKQA18NVTSfM1yAWaeK2VLGUDCXuy58nYbTV6wAelvbr9KMAXsXCjeNUV
AIgNDLjQsnRDCXzsqJ83n52AX2qDXSE7JALPVFHhGh83LxvE4Gjz/RGjAoGASx7d
B/aCBJ9Q1F6jeoYu9aQgFufof1gzEnQLbjM858kLEhHo0xvFc/vNcu4eBqlsrGoL
LfmF+FxmvKWFbuf1yPb8LTUl0RUADu0QmDKd9L4oUB9M+iHVtjy0qk1tvojRKwP6
5b81xkVOfWCp+Kdns55RZBunYDHOmYtWRWC1ZQECgYBU+NWA3CRlFTMr3MnPuDze
lOF0J9wrhYxxS4TiweVddhV8bJd/E+hfKCZxze4UlSeY/yS6HE3S93KXx5zZDEC2
KfZ6doj405CdXwzQ0PME3Jg+J0/cCYBFfahDmHM50GQNBHnJgQqj61yaejXdWy/Y
AGLoXJAsi3hRL9yjbogPjA==
-----END PRIVATE KEY-----
"
checksum SHA1:1704:63d4a9e0c363a36018cc34fff4a1ccadee0030eb
revision 2
}
cm traffic-group /Common/traffic-group-1 {
unit-id 1
}
cm traffic-group /Common/traffic-group-local-only { }
cm trust-domain /Common/Root {
ca-cert /Common/dtca.crt
ca-cert-bundle /Common/dtca-bundle.crt
ca-devices { /Common/f5.haas-78.pez.pivotal.io }
ca-key /Common/dtca.key
guid 0c753a5b-34d5-4226-8e100050568de3e4
status standalone
trust-group /Common/device_trust_group
}
gtm global-settings metrics {
metrics-collection-protocols { icmp }
}
gtm global-settings metrics-exclusions {
addresses none
}
ltm default-node-monitor {
rule none
}
ltm pool /DMZ1/pool-dmz1_faleconosco-uat {
description irule-dmz1_wildcard-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
address 101.139.100.138
}
}
monitor /Common/http
}
ltm virtual /DMZ1/vs-dmz1_calms_http {
description IS@FSBR
destination /DMZ1/159.165.167.100%1:80
ip-protocol tcp
mask 255.255.255.255
profiles {
/Common/tcp { }
/DMZ1/http_cookie-encrypted { }
/DMZ1/request-log-dmz1_siem { }
}
rules {
/Common/_sys_https_redirect
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
vlans {
/DMZ1/vlan1401
}
vlans-enabled
}
ltm node /Common/vwfs-01 {
address 10.193.96.47%1
description "Node mit %1 am Ende"
}
ltm node /Common/vwfs-01 {
address 10.193.96.47%1:500
description "Node mit %1 am Ende"
}
ltm virtual /ZM-CS1/V_10.40.2.60_515 {
destination /ZM-CS1/10.40.2.60%1:515
ip-protocol tcp
mask 255.255.255.255
}
ltm node /Common/diego-brain-01 {
address 10.193.96.47
}
ltm node /Common/diego-brain-02 {
address 10.193.96.48
}
ltm node /Common/gorouter-01 {
address 10.193.96.46
}
ltm node /Common/gorouter-02 {
address 10.193.96.45
}
ltm node /Common/mysql-proxy-01 {
address 10.193.96.51
}
ltm node /Common/mysql-proxy-02 {
address 10.193.96.52
}
ltm node /Common/tcp-router-01 {
address 10.193.96.49
}
ltm node /Common/tcp-router-02 {
address 10.193.96.50
}
ltm pool /Common/go_routers {
description "PCF Go Routers"
load-balancing-mode least-connections-member
members {
/Common/gorouter-01:80 {
address 10.193.96.46
}
/Common/gorouter-02:80 {
address 10.193.96.45
}
}
monitor min 1 of { /Common/pcf_gorouter_mon }
}
ltm pool /Common/mysql_proxy_ert {
description "PCF ERT Mysql Proxy"
load-balancing-mode least-connections-member
members {
/Common/mysql-proxy-01:3306 {
address 10.193.96.51
}
/Common/mysql-proxy-02:3306 {
address 10.193.96.52
}
}
monitor /Common/pcf_mysqlproxy_ert_mon
}
ltm pool /Common/pcf_diego_brains {
description "PCF containers SSH proxy"
load-balancing-mode least-connections-node
members {
/Common/diego-brain-01:2222 {
address 10.193.96.47
}
/Common/diego-brain-02:2222 {
address 10.193.96.48
}
}
monitor /Common/pcf_diegobrains_mon
}
ltm pool /Common/pcf_tcp_routers {
description "PCF TCP Routers"
load-balancing-mode least-connections-node
members {
/Common/tcp-router-01:0 {
address 10.193.96.49
}
/Common/tcp-router-02:0 {
address 10.193.96.50
}
}
monitor /Common/pcf_tcprouter_mon
}
ltm rule /Common/cf_xforward_for {
when HTTP_REQUEST {
HTTP::header insert X-Forwarded-For [IP::remote_addr]
}
}
ltm rule /Common/cf_xforward_proto {
when HTTP_REQUEST {
HTTP::header insert X-Forwarded-Proto "https"
}
}
ltm rule /Common/cf_xforward_proto_http {
when HTTP_REQUEST {
HTTP::header insert X-Forwarded-Proto "http"
}
}
ltm virtual /Common/pcf_http {
description "Cloud Foundry App HTTP Access"
destination /Common/10.193.96.4:80
ip-protocol tcp
mask 255.255.255.255
pool /Common/go_routers
profiles {
/Common/http { }
/Common/tcp-lan-optimized { }
}
rules {
/Common/cf_xforward_proto_http
/Common/cf_xforward_for
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
vlans {
/Common/cf_access_vlan
}
vlans-enabled
}
ltm virtual /Common/pcf_https {
description "Cloud Foundry API & App SSL Access"
destination /Common/10.193.96.4:443
ip-protocol tcp
mask 255.255.255.255
pool /Common/go_routers
profiles {
/Common/cf_client_ssl {
context clientside
}
/Common/http { }
/Common/tcp-lan-optimized { }
}
rules {
/Common/cf_xforward_for
/Common/cf_xforward_proto
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
vlans {
/Common/cf_access_vlan
}
vlans-enabled
}
ltm virtual /Common/pcf_mysql_ert {
description "ERT Mysql Proxy"
destination /Common/10.193.96.8:3306
ip-protocol tcp
mask 255.255.255.255
pool /Common/mysql_proxy_ert
profiles {
/Common/tcp-lan-optimized { }
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
vlans {
/Common/cf_access_vlan
}
vlans-enabled
}
ltm virtual /Common/pcf_ssh_proxy {
description "Diego Brains SSH-Proxy"
destination /Common/10.193.96.4:2222
ip-protocol tcp
mask 255.255.255.255
pool /Common/pcf_diego_brains
profiles {
/Common/tcp-lan-optimized { }
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port enabled
vlans {
/Common/cf_access_vlan
}
vlans-enabled
}
ltm virtual /Common/pcf_tcp_routers {
description "CF TCP Routers"
destination /Common/10.193.96.9:0
ip-protocol tcp
mask 255.255.255.255
pool /Common/pcf_tcp_routers
profiles {
/Common/tcp-lan-optimized { }
}
source 0.0.0.0/0
source-address-translation {
type automap
}
translate-address enabled
translate-port disabled
vlans {
/Common/cf_access_vlan
}
vlans-enabled
}
ltm virtual-address /Common/10.193.96.4 {
address 10.193.96.4
arp enabled
icmp-echo enabled
mask 255.255.255.255
traffic-group /Common/traffic-group-1
}
ltm virtual-address /Common/10.193.96.8 {
address 10.193.96.8
arp enabled
icmp-echo enabled
mask 255.255.255.255
traffic-group /Common/traffic-group-1
}
ltm virtual-address /Common/10.193.96.9 {
address 10.193.96.9
arp enabled
icmp-echo enabled
mask 255.255.255.255
traffic-group /Common/traffic-group-1
}
ltm monitor http /Common/pcf_gorouter_mon {
adaptive disabled
defaults-from /Common/http
destination *:8080
interval 5
ip-dscp 0
recv none
recv-disable none
send "GET /health"
time-until-up 0
timeout 16
}
ltm monitor http /Common/pcf_tcprouter_mon {
adaptive disabled
defaults-from /Common/http
destination *:80
interval 5
ip-dscp 0
recv none
recv-disable none
send "GET /health"
time-until-up 0
timeout 16
}
ltm monitor tcp /Common/pcf_diegobrains_mon {
adaptive disabled
defaults-from /Common/tcp
destination *:2222
interval 5
ip-dscp 0
recv none
recv-disable none
send none
time-until-up 0
timeout 16
}
ltm monitor tcp /Common/pcf_mysqlproxy_ert_mon {
adaptive disabled
defaults-from /Common/tcp
destination *:1936
interval 5
ip-dscp 0
recv none
recv-disable none
send none
time-until-up 0
timeout 16
}
ltm profile client-ssl /Common/cf_client_ssl {
alert-timeout indefinite
allow-dynamic-record-sizing disabled
allow-non-ssl disabled
app-service none
cache-size 262144
cache-timeout 3600
cert /Common/cf-haas-78.crt
cert-key-chain {
cf-haas-78-key {
cert /Common/cf-haas-78.crt
key /Common/cf-haas-78-key.key
}
}
chain none
ciphers DEFAULT
defaults-from /Common/clientssl
generic-alert enabled
handshake-timeout 10
inherit-certkeychain false
key /Common/cf-haas-78-key.key
max-active-handshakes indefinite
max-aggregate-renegotiation-per-minute indefinite
max-renegotiations-per-minute 5
maximum-record-size 16384
mod-ssl-methods disabled
mode enabled
options { dont-insert-empty-fragments }
passphrase none
peer-no-renegotiate-timeout 10
proxy-ssl disabled
proxy-ssl-passthrough disabled
renegotiate-max-record-delay indefinite
renegotiate-period indefinite
renegotiate-size indefinite
renegotiation enabled
secure-renegotiation require
server-name none
session-mirroring disabled
session-ticket disabled
session-ticket-timeout 0
sni-default false
sni-require false
ssl-sign-hash any
strict-resume disabled
unclean-shutdown enabled
}
net interface 1.1 {
media-fixed 10000T-FD
}
net interface 1.2 {
media-fixed 10000T-FD
}
net interface 1.3 {
media-fixed 10000T-FD
}
net route /Common/default_route {
gw 10.193.96.1
network default
}
net route-domain /Common/0 {
id 0
vlans {
/Common/http-tunnel
/Common/socks-tunnel
/Common/cf_access_vlan
}
}
net self /Common/cf_self_ip {
address 10.193.96.5/24
traffic-group /Common/traffic-group-local-only
vlan /Common/cf_access_vlan
}
net self-allow {
defaults {
igmp:0
ospf:0
pim:0
tcp:161
tcp:22
tcp:4353
tcp:443
tcp:53
udp:1026
udp:161
udp:4353
udp:520
udp:53
}
}
net stp /Common/cist {
interfaces {
1.2 {
external-path-cost 2000
internal-path-cost 2000
}
}
vlans {
/Common/cf_access_vlan
}
}
net vlan /Common/cf_access_vlan {
interfaces {
1.2 { }
}
tag 4094
}
net fdb tunnel /Common/http-tunnel { }
net fdb tunnel /Common/socks-tunnel { }
net fdb vlan /Common/cf_access_vlan { }
net ipsec ike-daemon /Common/ikedaemon {
log-publisher /Common/default-ipsec-log-publisher
}
net tunnels tunnel /Common/http-tunnel {
description "Tunnel for http-explicit profile"
profile /Common/tcp-forward
}
net tunnels tunnel /Common/socks-tunnel {
description "Tunnel for socks profile"
profile /Common/tcp-forward
}
pem global-settings analytics { }
security dos udp-portlist /Common/dos-udp-portlist {
list-type exclude-listed-ports
}
security firewall config-change-log {
log-publisher /Common/local-db-publisher
}
security firewall port-list /Common/_sys_self_allow_tcp_defaults {
ports {
22 { }
53 { }
161 { }
443 { }
1029-1043 { }
4353 { }
}
}
security firewall port-list /Common/_sys_self_allow_udp_defaults {
ports {
53 { }
161 { }
520 { }
1026 { }
4353 { }
}
}
security firewall rule-list /Common/_sys_self_allow_all {
rules {
_sys_allow_all {
action accept
}
}
}
security firewall rule-list /Common/_sys_self_allow_defaults {
rules {
_sys_allow_tcp_defaults {
action accept
ip-protocol tcp
destination {
port-lists {
/Common/_sys_self_allow_tcp_defaults
}
}
}
_sys_allow_udp_defaults {
action accept
ip-protocol udp
destination {
port-lists {
/Common/_sys_self_allow_udp_defaults
}
}
}
_sys_allow_ospf_defaults {
action accept
ip-protocol ospf
}
_sys_allow_pim_defaults {
action accept
ip-protocol pim
}
_sys_allow_igmp_defaults {
action accept
ip-protocol igmp
}
}
}
security firewall rule-list /Common/_sys_self_allow_management {
rules {
_sys_allow_ssh {
action accept
ip-protocol tcp
destination {
ports {
22 { }
}
}
}
_sys_allow_web {
action accept
ip-protocol tcp
destination {
ports {
443 { }
}
}
}
}
}
security ip-intelligence policy /Common/ip-intelligence { }
sys db adm.block.enable {
value "1"
}
sys db gtm.peerinfototalgtms {
value "0"
}
sys db provision.1nic {
value "disable"
}
sys db provision.1nicautoconfig {
value "enable"
}
sys db provision.extramb {
value "0"
}
sys db rule.validation {
value "strict"
}
sys db systemauth.primaryadminuser {
value "admin"
}
sys db tm.allowmulticastl2destinationtraffic {
value "disable"
}
sys db tm.tcpallowinsecurerst {
value "disable"
}
sys db tmm.classallocatemetadata {
value "enable"
}
sys db tmm.coredump {
value "enable"
}
sys db tmm.dhcp.client.connection.packets.inprogress.max {
value "2000"
}
sys db tmm.dhcp.server.connection.packets.inprogress.max {
value "2000"
}
sys db tmm.gradualfileloadadjust {
value "enable"
}
sys db tmm.lb.wlcoffset {
value "disable"
}
sys db tmm.verbose {
value "disable"
}
sys db tmm.verbosecmp {
value "disable"
}
sys dns {
description configured-by-dhcp
name-servers { 10.193.96.2 }
search { haas-78.pez.pivotal.io }
}
sys feature-module cgnat {
disabled
}
sys folder / {
device-group none
hidden false
inherited-devicegroup false
inherited-traffic-group false
traffic-group /Common/traffic-group-1
}
sys folder /Common {
device-group none
hidden false
inherited-devicegroup true
inherited-traffic-group true
traffic-group /Common/traffic-group-1
}
sys folder /Common/Drafts {
device-group none
hidden false
inherited-devicegroup true
inherited-traffic-group true
traffic-group /Common/traffic-group-1
}
sys global-settings {
gui-setup disabled
hostname f5.haas-78.pez.pivotal.io
mgmt-dhcp disabled
}
sys management-dhcp /Common/sys-mgmt-dhcp-config {
request-options { subnet-mask broadcast-address routers domain-name domain-name-servers host-name ntp-servers }
}
sys management-ip 172.10.0.10/24 {
description configured-statically
}
sys management-ovsdb {
ca-cert-file none
cert-file none
cert-key-file none
disabled
log-level info
}
sys provision ltm {
level nominal
}
sys snmp {
agent-addresses { tcp6:161 udp6:161 }
communities {
/Common/comm-public {
community-name public
source default
}
}
disk-monitors {
/Common/root {
minspace 2000
path /
}
/Common/var {
minspace 10000
path /var
}
}
process-monitors {
/Common/bigd {
process bigd
}
/Common/chmand {
process chmand
}
/Common/httpd {
max-processes infinity
process httpd
}
/Common/mcpd {
process mcpd
}
/Common/sod {
process sod
}
/Common/tmm {
max-processes infinity
process tmm
}
}
}
sys ecm cloud-provider /Common/aws-ec2 {
description "The aws-ec2 parameters"
property-template {
account { }
availability-zone {
valid-values { a b c d }
}
instance-type {
valid-values { t2.micro t2.small t2.medium m3.medium m3.large m3.xlarge m3.2xlarge c3.large c3.xlarge c3.2xlarge c3.4xlarge c3.8xlarge r3.large r3.xlarge r3.2xlarge r3.4xlarge r3.8xlarge }
}
region {
valid-values { us-east-1 us-west-1 us-west-2 sa-east-1 eu-west-1 eu-central-1 ap-southeast-2 ap-southeast-1 ap-northeast-1 }
}
}
}
sys ecm cloud-provider /Common/dnet {
description "The dnet parameters"
}
sys ecm cloud-provider /Common/vsphere {
description "The vsphere parameters"
property-template {
cloud-host-ip { }
dhcp-network-name { }
end-point-url { }
node-name { }
}
}
sys file ssl-cert /Common/cf-haas-78.crt {
cache-path /config/filestore/files_d/Common_d/certificate_d/:Common:cf-haas-78.crt_38799_1
revision 1
}
sys file ssl-key /Common/cf-haas-78-key.key {
cache-path /config/filestore/files_d/Common_d/certificate_key_d/:Common:cf-haas-78-key.key_38802_1
revision 1
}
sys fpga firmware-config {
type standard-balanced-fpga
}
sys sflow global-settings http { }
sys sflow global-settings vlan { }
sys software update {
auto-check enabled
auto-phonehome enabled
frequency weekly
}
wom endpoint-discovery { }
ltm rule /Common/ir_sni_glob_a01_111.11.11.11_443 {
when HTTP_REQUEST {
if {[string tolower [HTTP::host]] contains "audifinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "seatfinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "skodafinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "volkswagenfinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "volkswagenbank.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "volkswagenbank.fr"} {
HTTP::respond 301 "Location" "https://www.vwfs.fr[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "volkswagenfs.gr"} {
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri] "
} elseif {[string tolower [HTTP::host]] contains "volkswagenbank.gr"} {
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri] "
} else {
HTTP::respond 301 Location "https://www.[HTTP::host][HTTP::uri] "
}
}
}
ltm virtual /Common/vs_111.11.11.40_443 {
description "GDC IT - CM13341553"
destination /Common/111.11.11.40:80
ip-protocol tcp
mask 255.255.255.255
persist {
/Common/vwfsag-sourceaddr-default {
default yes
}
}
policies {
/Common/Drafts/policy_10.10.10.41_443 { }
}
profiles {
/Common/pr_cssl_sni {
context clientside
}
/Common/serverssl-vwfs-ignore-insecure {
context serverside
}
/Common/vwfsag-https-default { }
/Common/vwfsag-tcp-default { }
}
source 0.0.0.0/0
translate-address enabled
translate-port enabled
vlans {
/Common/Internet-Financial-Services
}
vlans-enabled
}
ltm policy /Common/Drafts/policy_10.10.10.41_443 {
controls { forwarding }
description "GDC IT - CM10041553"
last-modified 2019-03-18:13:42:56
published-copy /Common/policy_10.10.10.41_443
requires { http }
rules {
rule_http_redirect_accessoclienti_C_8447 {
actions {
0 {
forward
select
pool /Common/pool_it-accessoclienti_C_8447
}
}
conditions {
0 {
http-host
host
contains
values { accessoclienti-k.vwfs.it/ }
}
}
description "redirect to pool accessoclienti_C_8447"
ordinal 3
}
rule_http_redirect_accessodealer_C_8448 {
actions {
0 {
forward
select
pool /Common/pool_it-accessodealer_C_8448
}
}
conditions {
0 {
http-host
host
contains
values { accessodealer-k.vwfs.it/ }
}
}
description "redirect to pool accessodealer_C_8448"
ordinal 4
}
rule_http_redirect_fleetquotation_C_8445 {
actions {
0 {
forward
select
pool /Common/pool_it-fleetquotation_C_8445
}
}
conditions {
0 {
http-host
host
contains
values { fleetquo-ext-k.vwfs.it/ }
}
}
description "redirect to pool fleetquotation_C_8445"
ordinal 1
}
rule_http_redirect_fleetservice_C_8446 {
actions {
0 {
forward
select
pool /Common/pool_it-fleetservice_C_8446
}
}
conditions {
0 {
http-host
host
contains
values { fleetservice-ext-k.vwfs.it/ }
}
}
description "redirect to pool fleetservice_C_8446"
ordinal 2
}
rule_http_redirect_isam_C_8449 {
actions {
0 {
forward
select
pool /Common/pool_it-isam_C_8449
}
}
conditions {
0 {
http-host
host
contains
values { bdmrpr.vwfs.it/ bdrpr.vwfs.it/ crmwsrpr.vwfs.it/ easyrpr.vwfs.it/ firstrpr.vwfs.it/ freeasyrpr.vwfs.it/ rpr.vwfs.it/ }
}
}
description "redirect to pool isam_C_8449"
ordinal 5
}
rule_http_redirect_volkswagenfinancialservices-k_C_8444 {
actions {
0 {
forward
select
pool /Common/pool_it-volkswagenfinancialservices-k_C_8444
}
}
conditions {
0 {
http-host
host
contains
values { www-k.volkswagenfinancialservices.it/ }
}
}
description "redirect to pool volkswagenfinancialservices-k_C_8444"
}
}
strategy /Common/first-match
}
ltm virtual /Common/vs_20.20.20.22_80 {
description "SR777777, CM00000000"
destination /Common/20.20.20.22:80
ip-protocol tcp
mask 255.255.255.255
profiles {
/Common/tcp { }
/Common/vwfsag-http-default { }
}
rules {
/Common/ir_sni_glob_a01_20.20.20.22_443
/Common/_sys_https_redirect
}
source 0.0.0.0/0
translate-address enabled
translate-port enabled
}
ltm virtual /Common/vs_20.20.20.22_443 {
description "SR777777, CM00000000"
destination /Common/20.20.20.22:44355
ip-protocol tcp
mask 255.255.255.255
profiles {
/Common/pr_cssl_sni_glob_a01_default {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.es {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.fr {
context clientside
}
/Common/tcp { }
/Common/vwfsag-https-default { }
}
rules {
/Common/ir_sni_glob_a01_20.20.20.22_443
}
source 0.0.0.0/0
translate-address enabled
translate-port enabled
vlans {
/Common/Internet-Financial-Services
}
vlans-enabled
}
ltm virtual /Common/vs_sni_glob_a01_20.20.20.22_443 {
description RM10042579
destination /Common/20.20.20.22:443
ip-protocol tcp
mask 255.255.255.255
profiles {
/Common/pr_cssl_sni_fr_a01_volkswagenbank.fr {
context clientside
}
/Common/pr_cssl_sni_glob_a01_bilfinans.no {
context clientside
}
/Common/pr_cssl_sni_glob_a01_default {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.es {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.fr {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.gr {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.ie {
context clientside
}
/Common/pr_cssl_sni_glob_a01_vwfs.pt {
context clientside
}
/Common/pr_cssl_sni_gr_a01_volkswagenbank.gr {
context clientside
}
/Common/pr_cssl_sni_gr_a01_volkswagenfs.gr {
context clientside
}
/Common/pr_cssl_sni_mx_gr_a01_vwfs_mx {
context clientside
}
/Common/pr_cssl_sni_pt_a01_audifinancialservices.pt {
context clientside
}
/Common/pr_cssl_sni_pt_a01_seatfinancialservices.pt {
context clientside
}
/Common/pr_cssl_sni_pt_a01_skodafinancialservices.pt {
context clientside
}
/Common/pr_cssl_sni_pt_a01_volkswagenbank.pt {
context clientside
}
/Common/pr_cssl_sni_pt_a01_volkswagenfinancialservices.pt {
context clientside
}
/Common/tcp { }
/Common/vwfsag-https-default { }
}
rules {
/Common/ir_sni_glob_a01_20.20.20.22_443
}
source 0.0.0.0/0
translate-address enabled
translate-port enabled
vlans {
/Common/Internet-Financial-Services
}
vlans-enabled
}
ltm rule /Common/ir_sni_glob_a01_20.20.20.22_443 {
when HTTP_REQUEST {
if {[string tolower [HTTP::host]] contains "audifinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "seatfinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "skodafinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "volkswagenfinancialservices.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "volkswagenbank.pt"} {
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "volkswagenbank.fr"} {
HTTP::respond 301 "Location" "https://www.vwfs.fr[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "volkswagenfs.gr"} {
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri]"
}
elseif {[string tolower [HTTP::host]] contains "volkswagenbank.gr"} {
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri]"
}
else {
HTTP::respond 301 Location "https://www.[HTTP::host][HTTP::uri]"
}
}
}
ltm policy /Common/Drafts/policy_10.10.10.41_443 {
controls { forwarding }
description "GDC IT - CM10041553"
last-modified 2019-03-18:13:42:56
published-copy /Common/policy_10.10.10.41_443
requires { http }
rules {
rule_http_redirect_accessoclienti_C_8447 {
actions {
0 {
forward
select
pool /Common/pool_it-accessoclienti_C_8447
}
}
conditions {
0 {
http-host
host
contains
values { accessoclienti-k.vwfs.it/ }
}
}
description "redirect to pool accessoclienti_C_8447"
ordinal 3
}
rule_http_redirect_accessodealer_C_8448 {
actions {
0 {
forward
select
pool /Common/pool_it-accessodealer_C_8448
}
}
conditions {
0 {
http-host
host
contains
values { accessodealer-k.vwfs.it/ }
}
}
description "redirect to pool accessodealer_C_8448"
ordinal 4
}
rule_http_redirect_fleetquotation_C_8445 {
actions {
0 {
forward
select
pool /Common/pool_it-fleetquotation_C_8445
}
}
conditions {
0 {
http-host
host
contains
values { fleetquo-ext-k.vwfs.it/ }
}
}
description "redirect to pool fleetquotation_C_8445"
ordinal 1
}
rule_http_redirect_fleetservice_C_8446 {
actions {
0 {
forward
select
pool /Common/pool_it-fleetservice_C_8446
}
}
conditions {
0 {
http-host
host
contains
values { fleetservice-ext-k.vwfs.it/ }
}
}
description "redirect to pool fleetservice_C_8446"
ordinal 2
}
rule_http_redirect_isam_C_8449 {
actions {
0 {
forward
select
pool /Common/pool_it-isam_C_8449
}
}
conditions {
0 {
http-host
host
contains
values { bdmrpr.vwfs.it/ bdrpr.vwfs.it/ crmwsrpr.vwfs.it/ easyrpr.vwfs.it/ firstrpr.vwfs.it/ freeasyrpr.vwfs.it/ rpr.vwfs.it/ }
}
}
description "redirect to pool isam_C_8449"
ordinal 5
}
rule_http_redirect_volkswagenfinancialservices-k_C_8444 {
actions {
0 {
forward
select
pool /Common/pool_it-volkswagenfinancialservices-k_C_8444
}
}
conditions {
0 {
http-host
host
contains
values { www-k.volkswagenfinancialservices.it/ }
}
}
description "redirect to pool volkswagenfinancialservices-k_C_8444"
}
}
strategy /Common/first-match
}
ltm pool /Common/pool_it-accessoclienti_C_8447 {
description irule-dmz1_wildcard-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
address 101.139.100.138
}
}
monitor /Common/http
}
ltm pool /Common/pool_it-accessodealer_C_8448 {
description irule-fnord-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
address 121.129.120.128
}
}
monitor /Common/http
}
ltm pool /Common/pool_it-fleetservice_C_8446 {
description irule-fnurd-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
address 131.139.130.138
}
}
monitor /Common/http
}
ltm pool /Common/pool_it-volkswagenfinancialservices-k_C_8444 {
description irule-fnard-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_fubar:5556 {
address 1.4.3.18
}
/DMZ1/node-dmz1_fubar:5556 {
address 2.4.3.18
}
}
monitor /Common/http
}
ltm pool /Common/pool_it-isam_C_8449 {
description irule-fnard-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_foobar:5556 {
address 13.4.33.138
}
}
monitor /Common/http
}
ltm pool /Common/pool_it-fleetquotation_C_8445 {
description irule-blub-uat_<YYYY>-<MM>-<DD>
members {
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
address 21.29.20.28
}
/DMZ1/node-dmz1_fsbrdmzs1013:5556 {
address 21.29.20.29
}
}
monitor /Common/http
}
ltm policy-strategy /Common/first-match { }