1501 lines
41 KiB
Plaintext
1501 lines
41 KiB
Plaintext
#TMSH-VERSION: 12.1.2
|
|
|
|
cli admin-partitions {
|
|
update-partition Common
|
|
}
|
|
apm report default-report {
|
|
report-name sessionReports/sessionSummary
|
|
user /Common/admin
|
|
}
|
|
auth user admin {
|
|
description "Admin User"
|
|
encrypted-password $6$IIhG.HP4$kmWDt3Czta4rK5Ct4rYgaGSCDtqkMbAIgCUUdIDaQ/W8HTVHy7F1EZmSM.KYO9sdxDTuggaAGHj7QO/8f9rB80
|
|
partition-access {
|
|
all-partitions {
|
|
role admin
|
|
}
|
|
}
|
|
shell bash
|
|
}
|
|
auth user f5hubblelcdadmin {
|
|
description f5hubblelcdadmin
|
|
encrypted-password O3bad8WQTUGBBhpJtjUgbt6gluzFM0ha
|
|
partition-access {
|
|
all-partitions {
|
|
role admin
|
|
}
|
|
}
|
|
shell none
|
|
}
|
|
auth user mglynn {
|
|
description mglynn
|
|
encrypted-password $6$g5xyMuOe$T0uSN/cbtiENpC3Vbrfa3Xy9OGNJdu8sIFl.w7M6hjZaM4vmmH7dV1X4hAe3CEvsbmVtqknWQy5S.53Z0DYIL.
|
|
partition-access {
|
|
all-partitions {
|
|
role guest
|
|
}
|
|
}
|
|
shell tmsh
|
|
}
|
|
auth user root {
|
|
description root
|
|
encrypted-password $6$MgRYNSCd$5hkwlvnUZXvJfK5pUcmxP./VtQIn1CEoEGNil9B5NCtUOV4K8BVCbpKwPz0O0WFv0zm8t7J0XTM33YSVZ.xS61
|
|
shell bash
|
|
}
|
|
cm cert /Common/dtca-bundle.crt {
|
|
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca-bundle.crt_37137_2
|
|
certificate-text "-----BEGIN CERTIFICATE-----
|
|
MIIDnTCCAoWgAwIBAgIDCSzmMA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTIzA2
|
|
YzU3YjIzLTQwZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0MB4XDTE3MDIxMDE4NTk0
|
|
NVoXDTI3MDIwODE4NTk0NVowLjEsMCoGA1UEAxMjMDZjNTdiMjMtNDBkMS00MTU4
|
|
LWJiOGMwMDUwNTY4ZGUzZTQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
|
|
AQDS+l/bwiYzhCmjyNAKGGwlfcwmjDyphmcP0svbJHWlNa30n1tsj+7jJovBPi6b
|
|
qPtHJ0cgDvmQhvDqY5gOe8rW0LCt4rpASmpTn31Hh4DQFhhFZ4DUzKcpB+Q27dGj
|
|
U1OFqjW8HxtCr7faCa/TRUCwCg0bn1yMSszJAcBN/s6EplG+ifi7H7TJes/ZvQ3D
|
|
E+WnfM3KRFMzrfQbAa59ATHNfG88hD3dPYXCmI3Q5hLN8tQO+H3ZH53hsk7+mzSG
|
|
11tK7R21ZAgmPlhRiu40ea2L+X0XAuIh31x+9TApAHDukWu1KN2/KG5GpJL/aCIV
|
|
qYsQ6yaVulBBgdpUtorUSF0lAgMBAAGjgcMwgcAwJAYDVR0RBB0wG4IZZjUuaGFh
|
|
cy03OC5wZXoucGl2b3RhbC5pbzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE
|
|
AwIBtjAdBgNVHQ4EFgQUUgI0VFrDDgzuoXhsc1nMA6mQK8EwWAYDVR0jBFEwT4AU
|
|
UgI0VFrDDgzuoXhsc1nMA6mQK8GhMqQwMC4xLDAqBgNVBAMTIzA2YzU3YjIzLTQw
|
|
ZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0ggMJLOYwDQYJKoZIhvcNAQEFBQADggEB
|
|
AL/h4v4N60iHK0otdypxyzx855xtyysm9gGeXnKb4uxj9SrEt+6qTUMn66GtMNrk
|
|
esI6603r02aPYl/6ibIp3uxwYmQlgvt4O2zQOSSD0R/r8+Vl56DGgU84/gLorKNF
|
|
UOxWAHL5mRdanWP5W78V1bnGjBk/JgeM8oHFGei9A3S0MdK18kxSsACCFGot25A0
|
|
d1B60oz5RsC2lrRKQoSDDxV3tk2SqbcU7Bu5Cp2ePup3MAQkydFlK6shWnT9Frq1
|
|
qPrug/YfnoA5HGb9ZgVZRicBZei5Hc/Tbsm3/j47KmzgKuV+Rs/kYKPIRSeohx18
|
|
GTUVKofqzFOu++0Cm9uGDJ4=
|
|
-----END CERTIFICATE-----
|
|
"
|
|
checksum SHA1:1314:446099e7a8c3e0143d34471d448483941d52a516
|
|
revision 2
|
|
}
|
|
cm cert /Common/dtca.crt {
|
|
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtca.crt_37133_2
|
|
certificate-text "-----BEGIN CERTIFICATE-----
|
|
MIIDnTCCAoWgAwIBAgIDCSzmMA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTIzA2
|
|
YzU3YjIzLTQwZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0MB4XDTE3MDIxMDE4NTk0
|
|
NVoXDTI3MDIwODE4NTk0NVowLjEsMCoGA1UEAxMjMDZjNTdiMjMtNDBkMS00MTU4
|
|
LWJiOGMwMDUwNTY4ZGUzZTQwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
|
|
AQDS+l/bwiYzhCmjyNAKGGwlfcwmjDyphmcP0svbJHWlNa30n1tsj+7jJovBPi6b
|
|
qPtHJ0cgDvmQhvDqY5gOe8rW0LCt4rpASmpTn31Hh4DQFhhFZ4DUzKcpB+Q27dGj
|
|
U1OFqjW8HxtCr7faCa/TRUCwCg0bn1yMSszJAcBN/s6EplG+ifi7H7TJes/ZvQ3D
|
|
E+WnfM3KRFMzrfQbAa59ATHNfG88hD3dPYXCmI3Q5hLN8tQO+H3ZH53hsk7+mzSG
|
|
11tK7R21ZAgmPlhRiu40ea2L+X0XAuIh31x+9TApAHDukWu1KN2/KG5GpJL/aCIV
|
|
qYsQ6yaVulBBgdpUtorUSF0lAgMBAAGjgcMwgcAwJAYDVR0RBB0wG4IZZjUuaGFh
|
|
cy03OC5wZXoucGl2b3RhbC5pbzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQE
|
|
AwIBtjAdBgNVHQ4EFgQUUgI0VFrDDgzuoXhsc1nMA6mQK8EwWAYDVR0jBFEwT4AU
|
|
UgI0VFrDDgzuoXhsc1nMA6mQK8GhMqQwMC4xLDAqBgNVBAMTIzA2YzU3YjIzLTQw
|
|
ZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0ggMJLOYwDQYJKoZIhvcNAQEFBQADggEB
|
|
AL/h4v4N60iHK0otdypxyzx855xtyysm9gGeXnKb4uxj9SrEt+6qTUMn66GtMNrk
|
|
esI6603r02aPYl/6ibIp3uxwYmQlgvt4O2zQOSSD0R/r8+Vl56DGgU84/gLorKNF
|
|
UOxWAHL5mRdanWP5W78V1bnGjBk/JgeM8oHFGei9A3S0MdK18kxSsACCFGot25A0
|
|
d1B60oz5RsC2lrRKQoSDDxV3tk2SqbcU7Bu5Cp2ePup3MAQkydFlK6shWnT9Frq1
|
|
qPrug/YfnoA5HGb9ZgVZRicBZei5Hc/Tbsm3/j47KmzgKuV+Rs/kYKPIRSeohx18
|
|
GTUVKofqzFOu++0Cm9uGDJ4=
|
|
-----END CERTIFICATE-----
|
|
"
|
|
checksum SHA1:1314:446099e7a8c3e0143d34471d448483941d52a516
|
|
revision 2
|
|
}
|
|
cm cert /Common/dtdi.crt {
|
|
cache-path /config/filestore/files_d/Common_d/trust_certificate_d/:Common:dtdi.crt_37129_2
|
|
certificate-text "-----BEGIN CERTIFICATE-----
|
|
MIIDkDCCAnigAwIBAgIDBUtTMA0GCSqGSIb3DQEBBQUAMC4xLDAqBgNVBAMTIzA2
|
|
YzU3YjIzLTQwZDEtNDE1OC1iYjhjMDA1MDU2OGRlM2U0MB4XDTE3MDIxMDE4NTk0
|
|
NloXDTI3MDIwODE4NTk0NlowJDEiMCAGA1UEAxMZZjUuaGFhcy03OC5wZXoucGl2
|
|
b3RhbC5pbzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK4TTQwfIFEM
|
|
QBLjjs7R2dhMTtWFhHK7uPGtzQ5k8YLqXdX3jhyaGMrs4TevPwOKu/RIthn5hcks
|
|
CVnNXu0NQx9ZGjHNI1AjQm4VrVJRfeNcusGX1FePk3viuKnEKSd4cZzLCQbw8CRj
|
|
BVwX95TchkkV5cUhrilOaahm3UCfbiwsZfOfqQ+xQiiFVWH39LNZwaAce+s276cr
|
|
WtHK3DWXRnYTednVPHGpL/ET57odqu+tItHJAGfl1XgHUyB7XznCckvCQaPosiy4
|
|
kKla3oPGEcfiIpnpRoWrUhl3RohFQy2xeYDhSZiyHHNDHUlNnvci4y/B4UT7SVzb
|
|
X5kGAMc5Rp8CAwEAAaOBwDCBvTAkBgNVHREEHTAbghlmNS5oYWFzLTc4LnBlei5w
|
|
aXZvdGFsLmlvMAwGA1UdEwEB/wQCMAAwDgYDVR0PAQH/BAQDAgWgMB0GA1UdDgQW
|
|
BBQPPJCP4Z11/kalLrWRtZgV1fRDnDBYBgNVHSMEUTBPgBRSAjRUWsMODO6heGxz
|
|
WcwDqZArwaEypDAwLjEsMCoGA1UEAxMjMDZjNTdiMjMtNDBkMS00MTU4LWJiOGMw
|
|
MDUwNTY4ZGUzZTSCAwks5jANBgkqhkiG9w0BAQUFAAOCAQEAhovRL64PX3pFsLoJ
|
|
nMASyRlvqMffJZxWtxE4jIMQywje6SfFufnPzHXGVnm3euauUJ3uAIp9zCDH+E+E
|
|
DSE+4s2qBAM2Df6IWOZzYtz/Zrlr+KvDgpRk5b/O/yDoifShOCGVnICCGlwaQSVJ
|
|
xjARuUhF14VLJHO+zTZNaqCqMDjp1txn4CKBqD7q/YV6BwXo+lCdyfB0wsCVMimA
|
|
P69jSRhJ9ePjj3hErWS/K10gsdNCJnT2dLozLzIijoOJXoOwJQdWPKr/f2BIa0Gp
|
|
AXAM1oSd4RWbNw+EQ05G2gDF+JlZPrqJVfSfftWUFyMKPqMt7fkxMMjpdAmP9Qn7
|
|
nboUIA==
|
|
-----END CERTIFICATE-----
|
|
"
|
|
checksum SHA1:1298:10edd86cc9e04c9c30eb6d4a38f066ca8601d232
|
|
revision 2
|
|
}
|
|
cm device /Common/f5.haas-78.pez.pivotal.io {
|
|
active-modules { "BIG-IP, VE Trial|XGEUKHJ-ENEGRPV|Rate Shaping|External Interface and Network HSM, VE|SDN Services, VE|SSL, Forward Proxy, VE|ASM, VE|Max Compression, VE|Crytpo Offload, VE, Tier 1 (25M - 200M)|BIG-IP VE, Multicast Routing|SSL, VE|DNS (1K QPS), VE|Routing Bundle, VE|AFM, VE|DNSSEC|Anti-Virus Checks|Base Endpoint Security Checks|Firewall Checks|Network Access|Secure Virtual Keyboard|APM, Web Application|Machine Certificate Checks|Protected Workspace|Remote Desktop|App Tunnel|CGN, BIG-IP VE, AFM ONLY|PSM, VE" }
|
|
base-mac 00:50:56:8d:e3:e4
|
|
build 0.0.249
|
|
cert /Common/dtdi.crt
|
|
chassis-id 420d3473-cd7c-9beb-0969a312da5f
|
|
edition Final
|
|
hostname f5.haas-78.pez.pivotal.io
|
|
key /Common/dtdi.key
|
|
management-ip 172.10.0.10
|
|
marketing-name "BIG-IP Virtual Edition"
|
|
platform-id Z100
|
|
product BIG-IP
|
|
self-device true
|
|
time-zone America/Los_Angeles
|
|
version 12.1.2
|
|
}
|
|
cm device-group /Common/device_trust_group {
|
|
auto-sync enabled
|
|
devices {
|
|
/Common/f5.haas-78.pez.pivotal.io { }
|
|
}
|
|
hidden true
|
|
network-failover disabled
|
|
}
|
|
cm device-group /Common/gtm {
|
|
devices {
|
|
/Common/f5.haas-78.pez.pivotal.io { }
|
|
}
|
|
hidden true
|
|
network-failover disabled
|
|
}
|
|
cm key /Common/dtca.key {
|
|
cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtca.key_37135_2
|
|
certificate-text "-----BEGIN PRIVATE KEY-----
|
|
MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDS+l/bwiYzhCmj
|
|
yNAKGGwlfcwmjDyphmcP0svbJHWlNa30n1tsj+7jJovBPi6bqPtHJ0cgDvmQhvDq
|
|
Y5gOe8rW0LCt4rpASmpTn31Hh4DQFhhFZ4DUzKcpB+Q27dGjU1OFqjW8HxtCr7fa
|
|
Ca/TRUCwCg0bn1yMSszJAcBN/s6EplG+ifi7H7TJes/ZvQ3DE+WnfM3KRFMzrfQb
|
|
Aa59ATHNfG88hD3dPYXCmI3Q5hLN8tQO+H3ZH53hsk7+mzSG11tK7R21ZAgmPlhR
|
|
iu40ea2L+X0XAuIh31x+9TApAHDukWu1KN2/KG5GpJL/aCIVqYsQ6yaVulBBgdpU
|
|
torUSF0lAgMBAAECggEAGQPTutA1zFTmxQMp25CSvg1A1+83wBft/1vMjPKxOkH3
|
|
mrIMWn5kYi1vU53GU/GAvaqEDeKIp6DATuI5JLp7zeWXlT51O+s22SxnY8RGuyVr
|
|
gksn5NNRHJXRcsvW1+ko1YfdcC02A72m7GTKop+q8FR4wmYuSHoT9t9MyFKmdOa2
|
|
RkD06nXJHfTh42/iOjMj4RgUTa3gvKK8H/4hllcDkgF/n5S4vpyg+M/59ftrMUU0
|
|
86b1nU8gWswhvCKPtd4t10R+TP8ONMqiU8d4BLlGehIljpZp1iFBGlgk/dv1vHBu
|
|
BVJAEsXzmpZnAYtEtcmqXwYNDrSOLulJuOd4+CE2zwKBgQD2A9qYNWeJML1u0Lle
|
|
WoE4P32/XFQRfsCu/V1aV5mRdHLJXqwWA1n66rE1+0FeNHO16wXUVqRiGFKyaSlY
|
|
twT6GUZ33rtWDXHjdKOXM1XnA0fsHBSNdF114RBjNo51avRHS98j3HI6qpDLN5lM
|
|
jLZZfCrUA4vbmvQQUIT3zy1m8wKBgQDbinqPeMxc9Pg5YBAZnuuX97y5ibBUVjXn
|
|
xlhrp0VmO2KDWpzTx9sF9hEPIESdg+u6/yroOnSW9vhPqiQYx3DfKU4KKB7Yvxxg
|
|
nvk8WHN6yCAXzOQjAvbMhV/bITqZPf7PMMMAI+jGwfr8ce1uh7wvw0nufeZoi1vO
|
|
luROQpdhhwKBgQDVPYXuROwXiD3KnfTvCffTr4Tpp7fe6kVN6KNQOXoNECimzv7O
|
|
nd0Slvc/2SdR5pkdaDfHU8pslLSpnGmQUiNoPRxNrqwm7MR46ZMa7g5ZjQh8aeKO
|
|
sfyIvqqbtKBKuog+fE9QIDaLD2kuHGUuaxFsAyqEVwaVNXyz33dB7TxnbQKBgDnZ
|
|
WoQ1q3wPHN1Zf8SQiLnpkLQ/INSIRvoE3MW5NONEYKgGF28Cqab/eO1IbmwnF9WV
|
|
aUP6K0CgYTv0tEBHRWm4Y5Tvj3lDmoGnQjtxfzRqSXKcDb1gCZJIzsJaFivNFziX
|
|
O7rsu2isMquUhaDraV4YkoGicTU5C377abtpdqQ/AoGAd2pmM8fdTXU/CWGkbQ7t
|
|
r5gtVG0X/aJNx3Os/V9Dv2HSz1/ChaBTBb2awFwqC/dwwy8/ydAx6YiB/1ded1Ih
|
|
jmVWRbHQ7nC9izELlBPsz2ChfPqgUkG5OOh7YSMR7AvJNpZTphNKasFHnrQV/TR8
|
|
+NdHUy9AVoCuDAtK4nCtLVA=
|
|
-----END PRIVATE KEY-----
|
|
"
|
|
checksum SHA1:1704:ef95b645dba9cd21dea1d230f447525c8b6a8df3
|
|
revision 2
|
|
}
|
|
cm key /Common/dtdi.key {
|
|
cache-path /config/filestore/files_d/Common_d/trust_certificate_key_d/:Common:dtdi.key_37131_2
|
|
certificate-text "-----BEGIN PRIVATE KEY-----
|
|
MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQCuE00MHyBRDEAS
|
|
447O0dnYTE7VhYRyu7jxrc0OZPGC6l3V944cmhjK7OE3rz8Dirv0SLYZ+YXJLAlZ
|
|
zV7tDUMfWRoxzSNQI0JuFa1SUX3jXLrBl9RXj5N74ripxCkneHGcywkG8PAkYwVc
|
|
F/eU3IZJFeXFIa4pTmmoZt1An24sLGXzn6kPsUIohVVh9/SzWcGgHHvrNu+nK1rR
|
|
ytw1l0Z2E3nZ1TxxqS/xE+e6HarvrSLRyQBn5dV4B1Mge185wnJLwkGj6LIsuJCp
|
|
Wt6DxhHH4iKZ6UaFq1IZd0aIRUMtsXmA4UmYshxzQx1JTZ73IuMvweFE+0lc21+Z
|
|
BgDHOUafAgMBAAECggEAJbXls5IMqLIsMUtd1R0uAccqLuSBWG+ldanOqechUNif
|
|
4moCPdz+MPvXIH6U+pnz9MxJst/U5UtmbS9p+JWubFybqZ1EoKg6zGlixloEGRyu
|
|
EqFnLV7btvNbSN/HgJb9mdd8SaYph+BxuU0x4+xQJQYa5DVTKvyjNAmwtb60Gdpa
|
|
Hjm/gewZMjSIwvkr3UlT8Zd5O9/2fGqAY4wx9aVCgbg9EGYcILFjeSsaFK6JlRgP
|
|
cLD2/7QK+j9plXeUCoBF416/PsMC7kZ7o6Qg3ooq/TUIsZQPJ7Oz3dhTdwPZp60s
|
|
anZmWrqFPWwVBMFFgr9M81592QgACKBFz2k9o0LLgQKBgQDx2CaCC58XCsDTNxhh
|
|
YEHZfmZGKKLXLyDVmY+HfItiNICrJIZid7CRKXQ8EMqu0a3x9RIQnzb5nPJT4Flm
|
|
Mnpj92IJbsv8AjhsP4/3cxMYyv/Aj4f7a11tH/V5K+aqzNeQ2uIWlCKbRzOt0Xnc
|
|
DStn4K9LM8dvRW4DKyzt39dsHwKBgQC4Q6+A8bRCUTBYc6rGDCnjjZzhDTKaRQx2
|
|
V8j8LHz48o5CKRM6+HlqRX/JYYe9Yj4uyLXlfChCtdlqYHyt5kBbzHZQnNwg/M+J
|
|
KUDq5NQDt/7Bz99vuo0n+m6jZ52KIhG0giLHRzmFzqSjCBmJszxpdGzyRSKz8/Q6
|
|
RkAMyorVgQKBgDBLKI1pgrBYPl8vLlgrn5qt6gBylun/iD//NTEqBq9qqpMCbS92
|
|
lTS3oXVpKQA18NVTSfM1yAWaeK2VLGUDCXuy58nYbTV6wAelvbr9KMAXsXCjeNUV
|
|
AIgNDLjQsnRDCXzsqJ83n52AX2qDXSE7JALPVFHhGh83LxvE4Gjz/RGjAoGASx7d
|
|
B/aCBJ9Q1F6jeoYu9aQgFufof1gzEnQLbjM858kLEhHo0xvFc/vNcu4eBqlsrGoL
|
|
LfmF+FxmvKWFbuf1yPb8LTUl0RUADu0QmDKd9L4oUB9M+iHVtjy0qk1tvojRKwP6
|
|
5b81xkVOfWCp+Kdns55RZBunYDHOmYtWRWC1ZQECgYBU+NWA3CRlFTMr3MnPuDze
|
|
lOF0J9wrhYxxS4TiweVddhV8bJd/E+hfKCZxze4UlSeY/yS6HE3S93KXx5zZDEC2
|
|
KfZ6doj405CdXwzQ0PME3Jg+J0/cCYBFfahDmHM50GQNBHnJgQqj61yaejXdWy/Y
|
|
AGLoXJAsi3hRL9yjbogPjA==
|
|
-----END PRIVATE KEY-----
|
|
"
|
|
checksum SHA1:1704:63d4a9e0c363a36018cc34fff4a1ccadee0030eb
|
|
revision 2
|
|
}
|
|
cm traffic-group /Common/traffic-group-1 {
|
|
unit-id 1
|
|
}
|
|
cm traffic-group /Common/traffic-group-local-only { }
|
|
cm trust-domain /Common/Root {
|
|
ca-cert /Common/dtca.crt
|
|
ca-cert-bundle /Common/dtca-bundle.crt
|
|
ca-devices { /Common/f5.haas-78.pez.pivotal.io }
|
|
ca-key /Common/dtca.key
|
|
guid 0c753a5b-34d5-4226-8e100050568de3e4
|
|
status standalone
|
|
trust-group /Common/device_trust_group
|
|
}
|
|
gtm global-settings metrics {
|
|
metrics-collection-protocols { icmp }
|
|
}
|
|
gtm global-settings metrics-exclusions {
|
|
addresses none
|
|
}
|
|
ltm default-node-monitor {
|
|
rule none
|
|
}
|
|
ltm pool /DMZ1/pool-dmz1_faleconosco-uat {
|
|
description irule-dmz1_wildcard-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
|
|
address 101.139.100.138
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
ltm virtual /DMZ1/vs-dmz1_calms_http {
|
|
description IS@FSBR
|
|
destination /DMZ1/159.165.167.100%1:80
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
profiles {
|
|
/Common/tcp { }
|
|
/DMZ1/http_cookie-encrypted { }
|
|
/DMZ1/request-log-dmz1_siem { }
|
|
}
|
|
rules {
|
|
/Common/_sys_https_redirect
|
|
}
|
|
source 0.0.0.0/0
|
|
source-address-translation {
|
|
type automap
|
|
}
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/DMZ1/vlan1401
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm node /Common/vwfs-01 {
|
|
address 10.193.96.47%1
|
|
description "Node mit %1 am Ende"
|
|
}
|
|
ltm node /Common/vwfs-01 {
|
|
address 10.193.96.47%1:500
|
|
description "Node mit %1 am Ende"
|
|
}
|
|
ltm virtual /ZM-CS1/V_10.40.2.60_515 {
|
|
destination /ZM-CS1/10.40.2.60%1:515
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
}
|
|
|
|
ltm node /Common/diego-brain-01 {
|
|
address 10.193.96.47
|
|
}
|
|
ltm node /Common/diego-brain-02 {
|
|
address 10.193.96.48
|
|
}
|
|
ltm node /Common/gorouter-01 {
|
|
address 10.193.96.46
|
|
}
|
|
ltm node /Common/gorouter-02 {
|
|
address 10.193.96.45
|
|
}
|
|
ltm node /Common/mysql-proxy-01 {
|
|
address 10.193.96.51
|
|
}
|
|
ltm node /Common/mysql-proxy-02 {
|
|
address 10.193.96.52
|
|
}
|
|
ltm node /Common/tcp-router-01 {
|
|
address 10.193.96.49
|
|
}
|
|
ltm node /Common/tcp-router-02 {
|
|
address 10.193.96.50
|
|
}
|
|
ltm pool /Common/go_routers {
|
|
description "PCF Go Routers"
|
|
load-balancing-mode least-connections-member
|
|
members {
|
|
/Common/gorouter-01:80 {
|
|
address 10.193.96.46
|
|
}
|
|
/Common/gorouter-02:80 {
|
|
address 10.193.96.45
|
|
}
|
|
}
|
|
monitor min 1 of { /Common/pcf_gorouter_mon }
|
|
}
|
|
ltm pool /Common/mysql_proxy_ert {
|
|
description "PCF ERT Mysql Proxy"
|
|
load-balancing-mode least-connections-member
|
|
members {
|
|
/Common/mysql-proxy-01:3306 {
|
|
address 10.193.96.51
|
|
}
|
|
/Common/mysql-proxy-02:3306 {
|
|
address 10.193.96.52
|
|
}
|
|
}
|
|
monitor /Common/pcf_mysqlproxy_ert_mon
|
|
}
|
|
ltm pool /Common/pcf_diego_brains {
|
|
description "PCF containers SSH proxy"
|
|
load-balancing-mode least-connections-node
|
|
members {
|
|
/Common/diego-brain-01:2222 {
|
|
address 10.193.96.47
|
|
}
|
|
/Common/diego-brain-02:2222 {
|
|
address 10.193.96.48
|
|
}
|
|
}
|
|
monitor /Common/pcf_diegobrains_mon
|
|
}
|
|
ltm pool /Common/pcf_tcp_routers {
|
|
description "PCF TCP Routers"
|
|
load-balancing-mode least-connections-node
|
|
members {
|
|
/Common/tcp-router-01:0 {
|
|
address 10.193.96.49
|
|
}
|
|
/Common/tcp-router-02:0 {
|
|
address 10.193.96.50
|
|
}
|
|
}
|
|
monitor /Common/pcf_tcprouter_mon
|
|
}
|
|
ltm rule /Common/cf_xforward_for {
|
|
when HTTP_REQUEST {
|
|
HTTP::header insert X-Forwarded-For [IP::remote_addr]
|
|
}
|
|
}
|
|
ltm rule /Common/cf_xforward_proto {
|
|
when HTTP_REQUEST {
|
|
|
|
HTTP::header insert X-Forwarded-Proto "https"
|
|
|
|
}
|
|
}
|
|
ltm rule /Common/cf_xforward_proto_http {
|
|
when HTTP_REQUEST {
|
|
|
|
HTTP::header insert X-Forwarded-Proto "http"
|
|
|
|
}
|
|
}
|
|
|
|
ltm virtual /Common/pcf_http {
|
|
description "Cloud Foundry App HTTP Access"
|
|
destination /Common/10.193.96.4:80
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
pool /Common/go_routers
|
|
profiles {
|
|
/Common/http { }
|
|
/Common/tcp-lan-optimized { }
|
|
}
|
|
rules {
|
|
/Common/cf_xforward_proto_http
|
|
/Common/cf_xforward_for
|
|
}
|
|
source 0.0.0.0/0
|
|
source-address-translation {
|
|
type automap
|
|
}
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/cf_access_vlan
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm virtual /Common/pcf_https {
|
|
description "Cloud Foundry API & App SSL Access"
|
|
destination /Common/10.193.96.4:443
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
pool /Common/go_routers
|
|
profiles {
|
|
/Common/cf_client_ssl {
|
|
context clientside
|
|
}
|
|
/Common/http { }
|
|
/Common/tcp-lan-optimized { }
|
|
}
|
|
rules {
|
|
/Common/cf_xforward_for
|
|
/Common/cf_xforward_proto
|
|
}
|
|
source 0.0.0.0/0
|
|
source-address-translation {
|
|
type automap
|
|
}
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/cf_access_vlan
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm virtual /Common/pcf_mysql_ert {
|
|
description "ERT Mysql Proxy"
|
|
destination /Common/10.193.96.8:3306
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
pool /Common/mysql_proxy_ert
|
|
profiles {
|
|
/Common/tcp-lan-optimized { }
|
|
}
|
|
source 0.0.0.0/0
|
|
source-address-translation {
|
|
type automap
|
|
}
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/cf_access_vlan
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm virtual /Common/pcf_ssh_proxy {
|
|
description "Diego Brains SSH-Proxy"
|
|
destination /Common/10.193.96.4:2222
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
pool /Common/pcf_diego_brains
|
|
profiles {
|
|
/Common/tcp-lan-optimized { }
|
|
}
|
|
source 0.0.0.0/0
|
|
source-address-translation {
|
|
type automap
|
|
}
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/cf_access_vlan
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm virtual /Common/pcf_tcp_routers {
|
|
description "CF TCP Routers"
|
|
destination /Common/10.193.96.9:0
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
pool /Common/pcf_tcp_routers
|
|
profiles {
|
|
/Common/tcp-lan-optimized { }
|
|
}
|
|
source 0.0.0.0/0
|
|
source-address-translation {
|
|
type automap
|
|
}
|
|
translate-address enabled
|
|
translate-port disabled
|
|
vlans {
|
|
/Common/cf_access_vlan
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm virtual-address /Common/10.193.96.4 {
|
|
address 10.193.96.4
|
|
arp enabled
|
|
icmp-echo enabled
|
|
mask 255.255.255.255
|
|
traffic-group /Common/traffic-group-1
|
|
}
|
|
ltm virtual-address /Common/10.193.96.8 {
|
|
address 10.193.96.8
|
|
arp enabled
|
|
icmp-echo enabled
|
|
mask 255.255.255.255
|
|
traffic-group /Common/traffic-group-1
|
|
}
|
|
ltm virtual-address /Common/10.193.96.9 {
|
|
address 10.193.96.9
|
|
arp enabled
|
|
icmp-echo enabled
|
|
mask 255.255.255.255
|
|
traffic-group /Common/traffic-group-1
|
|
}
|
|
ltm monitor http /Common/pcf_gorouter_mon {
|
|
adaptive disabled
|
|
defaults-from /Common/http
|
|
destination *:8080
|
|
interval 5
|
|
ip-dscp 0
|
|
recv none
|
|
recv-disable none
|
|
send "GET /health"
|
|
time-until-up 0
|
|
timeout 16
|
|
}
|
|
ltm monitor http /Common/pcf_tcprouter_mon {
|
|
adaptive disabled
|
|
defaults-from /Common/http
|
|
destination *:80
|
|
interval 5
|
|
ip-dscp 0
|
|
recv none
|
|
recv-disable none
|
|
send "GET /health"
|
|
time-until-up 0
|
|
timeout 16
|
|
}
|
|
ltm monitor tcp /Common/pcf_diegobrains_mon {
|
|
adaptive disabled
|
|
defaults-from /Common/tcp
|
|
destination *:2222
|
|
interval 5
|
|
ip-dscp 0
|
|
recv none
|
|
recv-disable none
|
|
send none
|
|
time-until-up 0
|
|
timeout 16
|
|
}
|
|
ltm monitor tcp /Common/pcf_mysqlproxy_ert_mon {
|
|
adaptive disabled
|
|
defaults-from /Common/tcp
|
|
destination *:1936
|
|
interval 5
|
|
ip-dscp 0
|
|
recv none
|
|
recv-disable none
|
|
send none
|
|
time-until-up 0
|
|
timeout 16
|
|
}
|
|
ltm profile client-ssl /Common/cf_client_ssl {
|
|
alert-timeout indefinite
|
|
allow-dynamic-record-sizing disabled
|
|
allow-non-ssl disabled
|
|
app-service none
|
|
cache-size 262144
|
|
cache-timeout 3600
|
|
cert /Common/cf-haas-78.crt
|
|
cert-key-chain {
|
|
cf-haas-78-key {
|
|
cert /Common/cf-haas-78.crt
|
|
key /Common/cf-haas-78-key.key
|
|
}
|
|
}
|
|
chain none
|
|
ciphers DEFAULT
|
|
defaults-from /Common/clientssl
|
|
generic-alert enabled
|
|
handshake-timeout 10
|
|
inherit-certkeychain false
|
|
key /Common/cf-haas-78-key.key
|
|
max-active-handshakes indefinite
|
|
max-aggregate-renegotiation-per-minute indefinite
|
|
max-renegotiations-per-minute 5
|
|
maximum-record-size 16384
|
|
mod-ssl-methods disabled
|
|
mode enabled
|
|
options { dont-insert-empty-fragments }
|
|
passphrase none
|
|
peer-no-renegotiate-timeout 10
|
|
proxy-ssl disabled
|
|
proxy-ssl-passthrough disabled
|
|
renegotiate-max-record-delay indefinite
|
|
renegotiate-period indefinite
|
|
renegotiate-size indefinite
|
|
renegotiation enabled
|
|
secure-renegotiation require
|
|
server-name none
|
|
session-mirroring disabled
|
|
session-ticket disabled
|
|
session-ticket-timeout 0
|
|
sni-default false
|
|
sni-require false
|
|
ssl-sign-hash any
|
|
strict-resume disabled
|
|
unclean-shutdown enabled
|
|
}
|
|
net interface 1.1 {
|
|
media-fixed 10000T-FD
|
|
}
|
|
net interface 1.2 {
|
|
media-fixed 10000T-FD
|
|
}
|
|
net interface 1.3 {
|
|
media-fixed 10000T-FD
|
|
}
|
|
net route /Common/default_route {
|
|
gw 10.193.96.1
|
|
network default
|
|
}
|
|
net route-domain /Common/0 {
|
|
id 0
|
|
vlans {
|
|
/Common/http-tunnel
|
|
/Common/socks-tunnel
|
|
/Common/cf_access_vlan
|
|
}
|
|
}
|
|
net self /Common/cf_self_ip {
|
|
address 10.193.96.5/24
|
|
traffic-group /Common/traffic-group-local-only
|
|
vlan /Common/cf_access_vlan
|
|
}
|
|
net self-allow {
|
|
defaults {
|
|
igmp:0
|
|
ospf:0
|
|
pim:0
|
|
tcp:161
|
|
tcp:22
|
|
tcp:4353
|
|
tcp:443
|
|
tcp:53
|
|
udp:1026
|
|
udp:161
|
|
udp:4353
|
|
udp:520
|
|
udp:53
|
|
}
|
|
}
|
|
net stp /Common/cist {
|
|
interfaces {
|
|
1.2 {
|
|
external-path-cost 2000
|
|
internal-path-cost 2000
|
|
}
|
|
}
|
|
vlans {
|
|
/Common/cf_access_vlan
|
|
}
|
|
}
|
|
net vlan /Common/cf_access_vlan {
|
|
interfaces {
|
|
1.2 { }
|
|
}
|
|
tag 4094
|
|
}
|
|
net fdb tunnel /Common/http-tunnel { }
|
|
net fdb tunnel /Common/socks-tunnel { }
|
|
net fdb vlan /Common/cf_access_vlan { }
|
|
net ipsec ike-daemon /Common/ikedaemon {
|
|
log-publisher /Common/default-ipsec-log-publisher
|
|
}
|
|
net tunnels tunnel /Common/http-tunnel {
|
|
description "Tunnel for http-explicit profile"
|
|
profile /Common/tcp-forward
|
|
}
|
|
net tunnels tunnel /Common/socks-tunnel {
|
|
description "Tunnel for socks profile"
|
|
profile /Common/tcp-forward
|
|
}
|
|
pem global-settings analytics { }
|
|
security dos udp-portlist /Common/dos-udp-portlist {
|
|
list-type exclude-listed-ports
|
|
}
|
|
security firewall config-change-log {
|
|
log-publisher /Common/local-db-publisher
|
|
}
|
|
security firewall port-list /Common/_sys_self_allow_tcp_defaults {
|
|
ports {
|
|
22 { }
|
|
53 { }
|
|
161 { }
|
|
443 { }
|
|
1029-1043 { }
|
|
4353 { }
|
|
}
|
|
}
|
|
security firewall port-list /Common/_sys_self_allow_udp_defaults {
|
|
ports {
|
|
53 { }
|
|
161 { }
|
|
520 { }
|
|
1026 { }
|
|
4353 { }
|
|
}
|
|
}
|
|
security firewall rule-list /Common/_sys_self_allow_all {
|
|
rules {
|
|
_sys_allow_all {
|
|
action accept
|
|
}
|
|
}
|
|
}
|
|
security firewall rule-list /Common/_sys_self_allow_defaults {
|
|
rules {
|
|
_sys_allow_tcp_defaults {
|
|
action accept
|
|
ip-protocol tcp
|
|
destination {
|
|
port-lists {
|
|
/Common/_sys_self_allow_tcp_defaults
|
|
}
|
|
}
|
|
}
|
|
_sys_allow_udp_defaults {
|
|
action accept
|
|
ip-protocol udp
|
|
destination {
|
|
port-lists {
|
|
/Common/_sys_self_allow_udp_defaults
|
|
}
|
|
}
|
|
}
|
|
_sys_allow_ospf_defaults {
|
|
action accept
|
|
ip-protocol ospf
|
|
}
|
|
_sys_allow_pim_defaults {
|
|
action accept
|
|
ip-protocol pim
|
|
}
|
|
_sys_allow_igmp_defaults {
|
|
action accept
|
|
ip-protocol igmp
|
|
}
|
|
}
|
|
}
|
|
security firewall rule-list /Common/_sys_self_allow_management {
|
|
rules {
|
|
_sys_allow_ssh {
|
|
action accept
|
|
ip-protocol tcp
|
|
destination {
|
|
ports {
|
|
22 { }
|
|
}
|
|
}
|
|
}
|
|
_sys_allow_web {
|
|
action accept
|
|
ip-protocol tcp
|
|
destination {
|
|
ports {
|
|
443 { }
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
security ip-intelligence policy /Common/ip-intelligence { }
|
|
sys db adm.block.enable {
|
|
value "1"
|
|
}
|
|
sys db gtm.peerinfototalgtms {
|
|
value "0"
|
|
}
|
|
sys db provision.1nic {
|
|
value "disable"
|
|
}
|
|
sys db provision.1nicautoconfig {
|
|
value "enable"
|
|
}
|
|
sys db provision.extramb {
|
|
value "0"
|
|
}
|
|
sys db rule.validation {
|
|
value "strict"
|
|
}
|
|
sys db systemauth.primaryadminuser {
|
|
value "admin"
|
|
}
|
|
sys db tm.allowmulticastl2destinationtraffic {
|
|
value "disable"
|
|
}
|
|
sys db tm.tcpallowinsecurerst {
|
|
value "disable"
|
|
}
|
|
sys db tmm.classallocatemetadata {
|
|
value "enable"
|
|
}
|
|
sys db tmm.coredump {
|
|
value "enable"
|
|
}
|
|
sys db tmm.dhcp.client.connection.packets.inprogress.max {
|
|
value "2000"
|
|
}
|
|
sys db tmm.dhcp.server.connection.packets.inprogress.max {
|
|
value "2000"
|
|
}
|
|
sys db tmm.gradualfileloadadjust {
|
|
value "enable"
|
|
}
|
|
sys db tmm.lb.wlcoffset {
|
|
value "disable"
|
|
}
|
|
sys db tmm.verbose {
|
|
value "disable"
|
|
}
|
|
sys db tmm.verbosecmp {
|
|
value "disable"
|
|
}
|
|
sys dns {
|
|
description configured-by-dhcp
|
|
name-servers { 10.193.96.2 }
|
|
search { haas-78.pez.pivotal.io }
|
|
}
|
|
sys feature-module cgnat {
|
|
disabled
|
|
}
|
|
sys folder / {
|
|
device-group none
|
|
hidden false
|
|
inherited-devicegroup false
|
|
inherited-traffic-group false
|
|
traffic-group /Common/traffic-group-1
|
|
}
|
|
sys folder /Common {
|
|
device-group none
|
|
hidden false
|
|
inherited-devicegroup true
|
|
inherited-traffic-group true
|
|
traffic-group /Common/traffic-group-1
|
|
}
|
|
sys folder /Common/Drafts {
|
|
device-group none
|
|
hidden false
|
|
inherited-devicegroup true
|
|
inherited-traffic-group true
|
|
traffic-group /Common/traffic-group-1
|
|
}
|
|
sys global-settings {
|
|
gui-setup disabled
|
|
hostname f5.haas-78.pez.pivotal.io
|
|
mgmt-dhcp disabled
|
|
}
|
|
sys management-dhcp /Common/sys-mgmt-dhcp-config {
|
|
request-options { subnet-mask broadcast-address routers domain-name domain-name-servers host-name ntp-servers }
|
|
}
|
|
sys management-ip 172.10.0.10/24 {
|
|
description configured-statically
|
|
}
|
|
sys management-ovsdb {
|
|
ca-cert-file none
|
|
cert-file none
|
|
cert-key-file none
|
|
disabled
|
|
log-level info
|
|
}
|
|
sys provision ltm {
|
|
level nominal
|
|
}
|
|
sys snmp {
|
|
agent-addresses { tcp6:161 udp6:161 }
|
|
communities {
|
|
/Common/comm-public {
|
|
community-name public
|
|
source default
|
|
}
|
|
}
|
|
disk-monitors {
|
|
/Common/root {
|
|
minspace 2000
|
|
path /
|
|
}
|
|
/Common/var {
|
|
minspace 10000
|
|
path /var
|
|
}
|
|
}
|
|
process-monitors {
|
|
/Common/bigd {
|
|
process bigd
|
|
}
|
|
/Common/chmand {
|
|
process chmand
|
|
}
|
|
/Common/httpd {
|
|
max-processes infinity
|
|
process httpd
|
|
}
|
|
/Common/mcpd {
|
|
process mcpd
|
|
}
|
|
/Common/sod {
|
|
process sod
|
|
}
|
|
/Common/tmm {
|
|
max-processes infinity
|
|
process tmm
|
|
}
|
|
}
|
|
}
|
|
sys ecm cloud-provider /Common/aws-ec2 {
|
|
description "The aws-ec2 parameters"
|
|
property-template {
|
|
account { }
|
|
availability-zone {
|
|
valid-values { a b c d }
|
|
}
|
|
instance-type {
|
|
valid-values { t2.micro t2.small t2.medium m3.medium m3.large m3.xlarge m3.2xlarge c3.large c3.xlarge c3.2xlarge c3.4xlarge c3.8xlarge r3.large r3.xlarge r3.2xlarge r3.4xlarge r3.8xlarge }
|
|
}
|
|
region {
|
|
valid-values { us-east-1 us-west-1 us-west-2 sa-east-1 eu-west-1 eu-central-1 ap-southeast-2 ap-southeast-1 ap-northeast-1 }
|
|
}
|
|
}
|
|
}
|
|
sys ecm cloud-provider /Common/dnet {
|
|
description "The dnet parameters"
|
|
}
|
|
sys ecm cloud-provider /Common/vsphere {
|
|
description "The vsphere parameters"
|
|
property-template {
|
|
cloud-host-ip { }
|
|
dhcp-network-name { }
|
|
end-point-url { }
|
|
node-name { }
|
|
}
|
|
}
|
|
sys file ssl-cert /Common/cf-haas-78.crt {
|
|
cache-path /config/filestore/files_d/Common_d/certificate_d/:Common:cf-haas-78.crt_38799_1
|
|
revision 1
|
|
}
|
|
sys file ssl-key /Common/cf-haas-78-key.key {
|
|
cache-path /config/filestore/files_d/Common_d/certificate_key_d/:Common:cf-haas-78-key.key_38802_1
|
|
revision 1
|
|
}
|
|
sys fpga firmware-config {
|
|
type standard-balanced-fpga
|
|
}
|
|
sys sflow global-settings http { }
|
|
sys sflow global-settings vlan { }
|
|
sys software update {
|
|
auto-check enabled
|
|
auto-phonehome enabled
|
|
frequency weekly
|
|
}
|
|
wom endpoint-discovery { }
|
|
ltm rule /Common/ir_sni_glob_a01_111.11.11.11_443 {
|
|
when HTTP_REQUEST {
|
|
if {[string tolower [HTTP::host]] contains "audifinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "seatfinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "skodafinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "volkswagenfinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "volkswagenbank.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "volkswagenbank.fr"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.fr[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "volkswagenfs.gr"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri] "
|
|
} elseif {[string tolower [HTTP::host]] contains "volkswagenbank.gr"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri] "
|
|
} else {
|
|
HTTP::respond 301 Location "https://www.[HTTP::host][HTTP::uri] "
|
|
}
|
|
}
|
|
}
|
|
ltm virtual /Common/vs_111.11.11.40_443 {
|
|
description "GDC IT - CM13341553"
|
|
destination /Common/111.11.11.40:80
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
persist {
|
|
/Common/vwfsag-sourceaddr-default {
|
|
default yes
|
|
}
|
|
}
|
|
policies {
|
|
/Common/Drafts/policy_10.10.10.41_443 { }
|
|
}
|
|
profiles {
|
|
/Common/pr_cssl_sni {
|
|
context clientside
|
|
}
|
|
/Common/serverssl-vwfs-ignore-insecure {
|
|
context serverside
|
|
}
|
|
/Common/vwfsag-https-default { }
|
|
/Common/vwfsag-tcp-default { }
|
|
}
|
|
source 0.0.0.0/0
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/Internet-Financial-Services
|
|
}
|
|
vlans-enabled
|
|
}
|
|
ltm policy /Common/Drafts/policy_10.10.10.41_443 {
|
|
controls { forwarding }
|
|
description "GDC IT - CM10041553"
|
|
last-modified 2019-03-18:13:42:56
|
|
published-copy /Common/policy_10.10.10.41_443
|
|
requires { http }
|
|
rules {
|
|
rule_http_redirect_accessoclienti_C_8447 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-accessoclienti_C_8447
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { accessoclienti-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool accessoclienti_C_8447"
|
|
ordinal 3
|
|
}
|
|
rule_http_redirect_accessodealer_C_8448 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-accessodealer_C_8448
|
|
}
|
|
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { accessodealer-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool accessodealer_C_8448"
|
|
ordinal 4
|
|
}
|
|
rule_http_redirect_fleetquotation_C_8445 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-fleetquotation_C_8445
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { fleetquo-ext-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool fleetquotation_C_8445"
|
|
ordinal 1
|
|
}
|
|
rule_http_redirect_fleetservice_C_8446 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-fleetservice_C_8446
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { fleetservice-ext-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool fleetservice_C_8446"
|
|
ordinal 2
|
|
}
|
|
rule_http_redirect_isam_C_8449 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-isam_C_8449
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { bdmrpr.vwfs.it/ bdrpr.vwfs.it/ crmwsrpr.vwfs.it/ easyrpr.vwfs.it/ firstrpr.vwfs.it/ freeasyrpr.vwfs.it/ rpr.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool isam_C_8449"
|
|
ordinal 5
|
|
}
|
|
rule_http_redirect_volkswagenfinancialservices-k_C_8444 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-volkswagenfinancialservices-k_C_8444
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { www-k.volkswagenfinancialservices.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool volkswagenfinancialservices-k_C_8444"
|
|
}
|
|
}
|
|
strategy /Common/first-match
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ltm virtual /Common/vs_20.20.20.22_80 {
|
|
description "SR777777, CM00000000"
|
|
destination /Common/20.20.20.22:80
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
profiles {
|
|
/Common/tcp { }
|
|
/Common/vwfsag-http-default { }
|
|
}
|
|
rules {
|
|
/Common/ir_sni_glob_a01_20.20.20.22_443
|
|
/Common/_sys_https_redirect
|
|
}
|
|
source 0.0.0.0/0
|
|
translate-address enabled
|
|
translate-port enabled
|
|
}
|
|
|
|
ltm virtual /Common/vs_20.20.20.22_443 {
|
|
description "SR777777, CM00000000"
|
|
destination /Common/20.20.20.22:44355
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
profiles {
|
|
/Common/pr_cssl_sni_glob_a01_default {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.es {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.fr {
|
|
context clientside
|
|
}
|
|
/Common/tcp { }
|
|
/Common/vwfsag-https-default { }
|
|
}
|
|
rules {
|
|
/Common/ir_sni_glob_a01_20.20.20.22_443
|
|
}
|
|
source 0.0.0.0/0
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/Internet-Financial-Services
|
|
}
|
|
vlans-enabled
|
|
}
|
|
|
|
ltm virtual /Common/vs_sni_glob_a01_20.20.20.22_443 {
|
|
description RM10042579
|
|
destination /Common/20.20.20.22:443
|
|
ip-protocol tcp
|
|
mask 255.255.255.255
|
|
profiles {
|
|
/Common/pr_cssl_sni_fr_a01_volkswagenbank.fr {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_bilfinans.no {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_default {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.es {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.fr {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.gr {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.ie {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_glob_a01_vwfs.pt {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_gr_a01_volkswagenbank.gr {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_gr_a01_volkswagenfs.gr {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_mx_gr_a01_vwfs_mx {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_pt_a01_audifinancialservices.pt {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_pt_a01_seatfinancialservices.pt {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_pt_a01_skodafinancialservices.pt {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_pt_a01_volkswagenbank.pt {
|
|
context clientside
|
|
}
|
|
/Common/pr_cssl_sni_pt_a01_volkswagenfinancialservices.pt {
|
|
context clientside
|
|
}
|
|
/Common/tcp { }
|
|
/Common/vwfsag-https-default { }
|
|
}
|
|
rules {
|
|
/Common/ir_sni_glob_a01_20.20.20.22_443
|
|
}
|
|
source 0.0.0.0/0
|
|
translate-address enabled
|
|
translate-port enabled
|
|
vlans {
|
|
/Common/Internet-Financial-Services
|
|
}
|
|
vlans-enabled
|
|
}
|
|
|
|
ltm rule /Common/ir_sni_glob_a01_20.20.20.22_443 {
|
|
when HTTP_REQUEST {
|
|
if {[string tolower [HTTP::host]] contains "audifinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "seatfinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "skodafinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "volkswagenfinancialservices.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "volkswagenbank.pt"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.pt[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "volkswagenbank.fr"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.fr[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "volkswagenfs.gr"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri]"
|
|
}
|
|
elseif {[string tolower [HTTP::host]] contains "volkswagenbank.gr"} {
|
|
HTTP::respond 301 "Location" "https://www.vwfs.gr[HTTP::uri]"
|
|
}
|
|
else {
|
|
HTTP::respond 301 Location "https://www.[HTTP::host][HTTP::uri]"
|
|
}
|
|
}
|
|
}
|
|
|
|
ltm policy /Common/Drafts/policy_10.10.10.41_443 {
|
|
controls { forwarding }
|
|
description "GDC IT - CM10041553"
|
|
last-modified 2019-03-18:13:42:56
|
|
published-copy /Common/policy_10.10.10.41_443
|
|
requires { http }
|
|
rules {
|
|
rule_http_redirect_accessoclienti_C_8447 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-accessoclienti_C_8447
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { accessoclienti-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool accessoclienti_C_8447"
|
|
ordinal 3
|
|
}
|
|
rule_http_redirect_accessodealer_C_8448 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-accessodealer_C_8448
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { accessodealer-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool accessodealer_C_8448"
|
|
ordinal 4
|
|
}
|
|
rule_http_redirect_fleetquotation_C_8445 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-fleetquotation_C_8445
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { fleetquo-ext-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool fleetquotation_C_8445"
|
|
ordinal 1
|
|
}
|
|
rule_http_redirect_fleetservice_C_8446 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-fleetservice_C_8446
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { fleetservice-ext-k.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool fleetservice_C_8446"
|
|
ordinal 2
|
|
}
|
|
rule_http_redirect_isam_C_8449 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-isam_C_8449
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { bdmrpr.vwfs.it/ bdrpr.vwfs.it/ crmwsrpr.vwfs.it/ easyrpr.vwfs.it/ firstrpr.vwfs.it/ freeasyrpr.vwfs.it/ rpr.vwfs.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool isam_C_8449"
|
|
ordinal 5
|
|
}
|
|
rule_http_redirect_volkswagenfinancialservices-k_C_8444 {
|
|
actions {
|
|
0 {
|
|
forward
|
|
select
|
|
pool /Common/pool_it-volkswagenfinancialservices-k_C_8444
|
|
}
|
|
}
|
|
conditions {
|
|
0 {
|
|
http-host
|
|
host
|
|
contains
|
|
values { www-k.volkswagenfinancialservices.it/ }
|
|
}
|
|
}
|
|
description "redirect to pool volkswagenfinancialservices-k_C_8444"
|
|
}
|
|
}
|
|
strategy /Common/first-match
|
|
}
|
|
|
|
ltm pool /Common/pool_it-accessoclienti_C_8447 {
|
|
description irule-dmz1_wildcard-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
|
|
address 101.139.100.138
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
|
|
|
|
ltm pool /Common/pool_it-accessodealer_C_8448 {
|
|
description irule-fnord-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
|
|
address 121.129.120.128
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
|
|
ltm pool /Common/pool_it-fleetservice_C_8446 {
|
|
description irule-fnurd-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
|
|
address 131.139.130.138
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
|
|
ltm pool /Common/pool_it-volkswagenfinancialservices-k_C_8444 {
|
|
description irule-fnard-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_fubar:5556 {
|
|
address 1.4.3.18
|
|
}
|
|
/DMZ1/node-dmz1_fubar:5556 {
|
|
address 2.4.3.18
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
|
|
ltm pool /Common/pool_it-isam_C_8449 {
|
|
description irule-fnard-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_foobar:5556 {
|
|
address 13.4.33.138
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
|
|
|
|
ltm pool /Common/pool_it-fleetquotation_C_8445 {
|
|
description irule-blub-uat_<YYYY>-<MM>-<DD>
|
|
members {
|
|
/DMZ1/node-dmz1_fsbrdmzs1012:5556 {
|
|
address 21.29.20.28
|
|
}
|
|
/DMZ1/node-dmz1_fsbrdmzs1013:5556 {
|
|
address 21.29.20.29
|
|
}
|
|
}
|
|
monitor /Common/http
|
|
}
|
|
|
|
ltm policy-strategy /Common/first-match { }
|
|
|